## Updated at UTC 2026-01-15T23:26:48.222435

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-22774 7.5 0.00% 1 0 2026-01-15T22:33:39 ## Summary Certain inputs can cause `devalue.parse` to consume excessive CPU ti
CVE-2026-22027 6.0 0.01% 1 0 2026-01-15T21:45:02.797000 CryptoLib provides a software-only solution using the CCSDS Space Data Link Secu
CVE-2025-69222 9.1 0.09% 1 0 2026-01-15T21:36:03.330000 LibreChat is a ChatGPT clone with additional features. Version 0.8.1-rc2 is pron
CVE-2025-70307 7.5 0.00% 1 0 2026-01-15T21:32:50 A stack overflow in the dump_ttxt_sample function of GPAC v2.4.0 allows attacker
CVE-2026-0227 None 0.00% 10 0 2026-01-15T21:31:54 A vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated
CVE-2025-69259 7.5 0.10% 1 0 2026-01-15T21:31:44 A message unchecked NULL return value vulnerability in Trend Micro Apex Central
CVE-2026-21920 7.5 0.00% 1 0 2026-01-15T21:16:08.217000 An Unchecked Return Value vulnerability in the DNS module of Juniper Networks Ju
CVE-2026-21918 7.5 0.00% 1 0 2026-01-15T21:16:08.050000 A Double Free vulnerability in the flow processing daemon (flowd) of Juniper Net
CVE-2026-21917 7.5 0.00% 1 0 2026-01-15T21:16:07.877000 An Improper Validation of Syntactic Correctness of Input vulnerability in the We
CVE-2026-21914 7.5 0.00% 1 0 2026-01-15T21:16:07.700000 An Improper Locking vulnerability in the GTP plugin of Juniper Networks Junos OS
CVE-2026-21913 7.5 0.00% 1 0 2026-01-15T21:16:07.537000 An Incorrect Initialization of Resource vulnerability in the Internal Device Man
CVE-2026-21906 7.5 0.00% 1 0 2026-01-15T21:16:06.177000 An Improper Handling of Exceptional Conditions vulnerability in the packet forwa
CVE-2026-21905 7.5 0.00% 1 0 2026-01-15T21:16:05.990000 A Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in the SI
CVE-2025-66169 5.3 0.02% 1 0 2026-01-15T21:16:04.460000 Cypher Injection vulnerability in Apache Camel camel-neo4j component. This issu
CVE-2025-60003 7.5 0.00% 1 0 2026-01-15T21:16:03.590000 A Buffer Over-read vulnerability in the routing protocol daemon (rpd) of Juniper
CVE-2025-54957 9.8 0.05% 2 1 2026-01-15T21:16:02.860000 An issue was discovered in Dolby UDC 4.5 through 4.13. A crash of the DD+ decode
CVE-2025-66292 8.1 0.00% 1 0 2026-01-15T20:17:45 ### Summary DPanel has an arbitrary file deletion vulnerability in the `/api/com
CVE-2026-23493 8.6 0.00% 1 0 2026-01-15T20:17:44 ### Summary The http_error_log file stores the $_COOKIE and $_SERVER variables,
CVE-2026-23527 8.9 0.00% 1 0 2026-01-15T20:16:05.620000 H3 is a minimal H(TTP) framework built for high performance and portability. Pri
CVE-2026-23520 9.0 0.00% 1 0 2026-01-15T20:16:05.467000 Arcane provides modern docker management. Prior to 1.13.0, Arcane has a command
CVE-2026-22775 7.5 0.00% 1 0 2026-01-15T19:16:05.963000 Svelte devalue is a JavaScript library that serializes values into strings when
CVE-2025-62193 9.8 0.00% 1 0 2026-01-15T19:16:03.753000 Sites running NOAA PMEL Live Access Server (LAS) are vulnerable to remote code e
CVE-2025-69260 7.5 0.10% 1 0 2026-01-15T19:11:14.113000 A message out-of-bounds read vulnerability in Trend Micro Apex Central could all
CVE-2025-9014 None 0.00% 2 0 2026-01-15T18:31:42 A Null Pointer Dereference vulnerability exists in the referer header check of t
CVE-2025-67076 7.5 0.00% 1 0 2026-01-15T18:31:42 Directory traversal vulnerability in Omnispace Agora Project before 25.10 allowi
CVE-2025-70308 7.5 0.00% 1 0 2026-01-15T18:31:42 An out-of-bounds read in the GSF demuxer filter component of GPAC v2.4.0 allows
CVE-2025-61973 8.8 0.00% 1 0 2026-01-15T18:31:42 A local privilege escalation vulnerability exists during the installation of Epi
CVE-2025-70298 8.2 0.00% 1 0 2026-01-15T18:31:39 GPAC v2.4.0 was discovered to contain an out-of-bounds read in the oggdmx_parse_
CVE-2025-70304 7.5 0.00% 1 0 2026-01-15T18:31:39 A buffer overflow in the vobsub_get_subpic_duration() function of GPAC v2.4.0 al
CVE-2025-70656 7.5 0.00% 1 0 2026-01-15T18:31:39 Tenda AX-1806 v1.0.0.1 was discovered to contain a stack overflow in the mac par
CVE-2026-22867 8.7 0.00% 1 0 2026-01-15T17:16:07.883000 LaSuite Doc is a collaborative note taking, wiki and documentation platform. Fro
CVE-2025-66417 7.5 0.00% 1 0 2026-01-15T17:16:04.733000 GLPI is a free asset and IT management software package. From 11.0.0, < 11.0.3,
CVE-2025-67079 9.8 0.00% 1 0 2026-01-15T16:16:11.977000 File upload vulnerability in Omnispace Agora Project before 25.10 allowing attac
CVE-2025-64516 7.5 0.00% 2 1 2026-01-15T16:16:11.487000 GLPI is a free asset and IT management software package. Prior to 10.0.21 and 11
CVE-2026-22643 8.3 0.00% 3 0 2026-01-15T15:31:35 In Grafana, an excessively long dashboard title or panel name will cause Chromiu
CVE-2026-22644 5.3 0.00% 2 0 2026-01-15T15:31:35 Certain requests pass the authentication token in the URL as string query parame
CVE-2026-22638 8.3 0.00% 3 0 2026-01-15T15:31:33 A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining
CVE-2026-22907 10.0 0.00% 3 0 2026-01-15T15:31:30 An attacker may gain unauthorized access to the host filesystem, potentially all
CVE-2026-22639 4.3 0.00% 2 0 2026-01-15T15:31:27 Grafana is an open-source platform for monitoring and observability. The Grafana
CVE-2026-22642 4.2 0.00% 2 0 2026-01-15T15:31:27 An open redirect vulnerability has been identified in Grafana OSS organization s
CVE-2026-22646 4.3 0.00% 2 0 2026-01-15T15:31:27 Certain error messages returned by the application expose internal system detail
CVE-2026-22919 3.8 0.00% 2 0 2026-01-15T15:31:26 An attacker with administrative access may inject malicious content into the log
CVE-2026-22920 3.7 0.00% 2 0 2026-01-15T15:31:26 The device's passwords have not been adequately salted, making them vulnerable t
CVE-2026-22637 6.8 0.00% 2 0 2026-01-15T15:31:25 The built-in XY Chart plugin is vulnerable to a DOM XSS vulnerability. A user wi
CVE-2025-70744 7.5 0.00% 1 0 2026-01-15T15:31:21 Tenda AX-1806 v1.0.0.1 was discovered to contain a stack overflow in the cloneTy
CVE-2026-22917 4.3 0.00% 2 0 2026-01-15T15:31:19 Improper input handling in a system endpoint may allow attackers to overload res
CVE-2026-22912 4.3 0.00% 2 0 2026-01-15T15:31:19 Improper validation of a login parameter may allow attackers to redirect users t
CVE-2026-22916 4.3 0.00% 2 0 2026-01-15T15:31:19 An attacker with low privileges may be able to trigger critical system functions
CVE-2026-22915 4.3 0.00% 2 0 2026-01-15T15:31:19 An attacker with low privileges may be able to read files from specific director
CVE-2025-13062 8.8 0.00% 1 0 2026-01-15T15:31:19 The Supreme Modules Lite plugin for WordPress is vulnerable to arbitrary file up
CVE-2026-22913 4.3 0.00% 2 0 2026-01-15T15:31:18 Improper handling of a URL parameter may allow attackers to execute code in a us
CVE-2026-22911 5.3 0.00% 2 0 2026-01-15T15:31:18 Firmware update files may expose password hashes for system accounts, which coul
CVE-2025-71019 7.5 0.00% 1 0 2026-01-15T15:15:51.720000 Tenda AX-1806 v1.0.0.1 was discovered to contain a stack overflow in the wanSpee
CVE-2026-22645 5.3 0.00% 2 0 2026-01-15T14:16:28.290000 The application discloses all used components, versions and license information
CVE-2026-22641 5.0 0.00% 2 0 2026-01-15T14:16:27.743000 This vulnerability in Grafana's datasource proxy API allows authorization checks
CVE-2026-22640 5.5 0.00% 2 0 2026-01-15T14:16:27.607000 An access control vulnerability was discovered in Grafana OSS where an Organizat
CVE-2026-22918 4.3 0.00% 2 0 2026-01-15T13:16:06.790000 An attacker may exploit missing protection against clickjacking by tricking user
CVE-2026-22914 4.3 0.00% 2 0 2026-01-15T13:16:06.250000 An attacker with limited permissions may still be able to write files to specifi
CVE-2026-22910 7.5 0.00% 3 0 2026-01-15T13:16:05.673000 The device is deployed with weak and publicly known default passwords for certai
CVE-2026-22909 7.5 0.00% 3 0 2026-01-15T13:16:05.537000 Certain system functions may be accessed without proper authorization, allowing
CVE-2026-22908 9.1 0.00% 3 0 2026-01-15T13:16:05.400000 Uploading unvalidated container images may allow remote attackers to gain full a
CVE-2026-0713 8.3 0.00% 3 0 2026-01-15T13:16:04.707000 A security vulnerability in the /apis/dashboard.grafana.app/* endpoints allows a
CVE-2026-0712 7.6 0.00% 3 0 2026-01-15T13:16:04.490000 An open redirect vulnerability has been identified in Grafana OSS that can be ex
CVE-2025-64155 9.8 0.09% 5 3 2026-01-14T21:37:40.197000 An improper neutralization of special elements used in an os command ('os comman
CVE-2026-22184 9.8 0.16% 2 0 2026-01-14T21:35:08 zlib versions up to and including 1.3.1.2 contain a global buffer overflow in th
CVE-2026-0732 6.3 0.25% 1 0 2026-01-14T21:34:06 A vulnerability was found in D-Link DI-8200G 17.12.20A1. This affects an unknown
CVE-2026-23550 10.0 0.04% 2 1 2026-01-14T21:15:54.193000 Incorrect Privilege Assignment vulnerability in Modular DS allows Privilege Esca
CVE-2025-59468 9.0 0.30% 1 0 2026-01-14T20:58:35.693000 This vulnerability allows a Backup Administrator to perform remote code executio
CVE-2026-20953 8.4 0.03% 1 0 2026-01-14T19:56:25.570000 Use after free in Microsoft Office allows an unauthorized attacker to execute co
CVE-2025-66049 7.5 0.06% 1 0 2026-01-14T18:32:20 Vivotek IP7137 camera with firmware version 0200a is vulnerable to an informatio
CVE-2025-67399 4.6 0.02% 1 1 2026-01-14T18:31:43 An issue in AIRTH SMART HOME AQI MONITOR Bootloader v.1.005 allows a physically
CVE-2026-22858 0 0.04% 1 0 2026-01-14T18:16:43.520000 FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1
CVE-2026-22857 0 0.04% 1 0 2026-01-14T18:16:43.373000 FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1
CVE-2026-22856 0 0.04% 1 0 2026-01-14T18:16:43.230000 FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1
CVE-2026-22855 0 0.04% 1 0 2026-01-14T18:16:43.080000 FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1
CVE-2026-22854 0 0.04% 1 0 2026-01-14T18:16:42.933000 FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1
CVE-2026-22852 0 0.04% 1 0 2026-01-14T18:16:42.643000 FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1
CVE-2026-22851 0 0.04% 1 0 2026-01-14T18:16:42.490000 FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1
CVE-2026-0404 0 0.51% 1 0 2026-01-14T16:26:00.933000 An insufficient input validation vulnerability in NETGEAR Orbi devices' DHCPv6
CVE-2025-71026 0 0.02% 1 0 2026-01-14T16:26:00.933000 Tenda AX-3 v16.03.12.10_CN was discovered to contain a stack overflow in the wan
CVE-2025-71027 0 0.02% 1 0 2026-01-14T16:26:00.933000 Tenda AX-3 v16.03.12.10_CN was discovered to contain a stack overflow in the wan
CVE-2025-68703 0 0.02% 1 0 2026-01-14T16:25:40.430000 Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libra
CVE-2025-68702 0 0.03% 1 0 2026-01-14T16:25:40.430000 Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libra
CVE-2025-37166 7.5 0.02% 1 0 2026-01-14T16:25:40.430000 A vulnerability affecting HPE Networking Instant On Access Points has been ident
CVE-2026-0408 0 0.04% 1 0 2026-01-14T16:25:40.430000 A path traversal vulnerability in NETGEAR WiFi range extenders allows an attack
CVE-2025-14338 0 0.02% 1 0 2026-01-14T16:25:12.057000 Polkit authentication dis isabled by default and a race condition in the Polkit
CVE-2025-67859 None 0.02% 1 0 2026-01-14T12:31:48 A Improper Authentication vulnerability in TLP allows local users to arbitrarily
CVE-2025-66005 None 0.01% 1 0 2026-01-14T12:31:39 Lack of authorization of the InputManager D-Bus interface in InputPlumber versio
CVE-2025-60188 7.5 3.13% 1 1 template 2026-01-14T00:31:25 Insertion of Sensitive Information Into Sent Data vulnerability in Vito Peleg At
CVE-2025-14847 7.5 57.25% 8 37 template 2026-01-13T22:24:20.380000 Mismatched length fields in Zlib compressed protocol headers may allow a read of
CVE-2026-22697 7.5 0.07% 1 0 2026-01-13T22:16:07.690000 CryptoLib provides a software-only solution using the CCSDS Space Data Link Secu
CVE-2026-0838 8.8 0.07% 1 0 2026-01-13T22:02:34.320000 A security flaw has been discovered in UTT 进取 520W 1.7.7-180627. This impacts th
CVE-2026-0841 8.8 0.07% 1 0 2026-01-13T21:55:32.140000 A vulnerability was detected in UTT 进取 520W 1.7.7-180627. Affected by this issue
CVE-2025-68493 8.1 0.06% 2 0 2026-01-13T21:49:04 Missing XML Validation vulnerability in Apache Struts, Apache Struts. This issu
CVE-2025-68925 None 0.03% 1 0 2026-01-13T21:41:23 ### Vulnerability https://github.com/samrocketman/jervis/blob/157d2b63ffa5c4bb1
CVE-2025-68704 None 0.04% 1 0 2026-01-13T21:41:13 ### Vulnerability https://github.com/samrocketman/jervis/blob/157d2b63ffa5c4bb1
CVE-2025-68701 None 0.03% 1 0 2026-01-13T21:40:57 ### Vulnerability https://github.com/samrocketman/jervis/blob/157d2b63ffa5c4bb1
CVE-2025-71023 7.5 0.04% 1 0 2026-01-13T21:32:48 Tenda AX-3 v16.03.12.10_CN was discovered to contain a stack overflow in the mac
CVE-2026-20805 5.5 5.16% 5 1 2026-01-13T21:31:44 Exposure of sensitive information to an unauthorized actor in Desktop Windows Ma
CVE-2026-22813 None 0.08% 1 0 2026-01-13T20:36:43 ### Summary A malicious website can abuse the server URL override feature of the
CVE-2025-66177 8.8 0.02% 1 0 2026-01-13T18:32:08 There is a Stack overflow Vulnerability in the device Search and Discovery featu
CVE-2026-21265 6.4 0.18% 1 0 2026-01-13T18:31:19 Windows Secure Boot stores Microsoft certificates in the UEFI KEK and DB. These
CVE-2026-20965 7.6 0.04% 4 0 2026-01-13T18:31:18 Improper verification of cryptographic signature in Windows Admin Center allows
CVE-2026-20952 8.4 0.03% 1 0 2026-01-13T18:31:18 Use after free in Microsoft Office allows an unauthorized attacker to execute co
CVE-2026-20944 8.4 0.03% 1 0 2026-01-13T18:31:18 Out-of-bounds read in Microsoft Office Word allows an unauthorized attacker to e
CVE-2026-0407 None 0.05% 1 0 2026-01-13T18:31:16 An insufficient authentication vulnerability in NETGEAR WiFi range extenders al
CVE-2025-59922 7.2 0.03% 1 0 2026-01-13T18:31:14 An improper neutralization of special elements used in an SQL command ('SQL Inje
CVE-2025-37165 7.5 0.03% 1 0 2026-01-13T18:31:14 A vulnerability in the router mode configuration of HPE Instant On Access Points
CVE-2026-0405 None 0.09% 1 0 2026-01-13T18:31:14 An authentication bypass vulnerability in NETGEAR Orbi devices allows users con
CVE-2026-0386 7.5 0.08% 1 0 2026-01-13T18:31:13 Improper access control in Windows Deployment Services allows an unauthorized at
CVE-2025-70753 None 0.02% 1 0 2026-01-13T18:31:12 Tenda AX-1806 v1.0.0.1 was discovered to contain a stack overflow in the securit
CVE-2025-71025 None 0.02% 1 0 2026-01-13T18:31:12 Tenda AX-3 v16.03.12.10_CN was discovered to contain a stack overflow in the clo
CVE-2025-71024 None 0.02% 1 0 2026-01-13T18:31:12 Tenda AX-3 v16.03.12.10_CN was discovered to contain a stack overflow in the ser
CVE-2026-0403 None 0.05% 1 0 2026-01-13T18:31:10 An insufficient input validation vulnerability in NETGEAR Orbi routers allows a
CVE-2026-0406 None 0.04% 1 0 2026-01-13T18:31:10 An insufficient input validation vulnerability in the NETGEAR XR1000v2 allows a
CVE-2025-68707 None 0.05% 1 0 2026-01-13T18:31:09 An authentication bypass vulnerability in the Tongyu AX1800 Wi-Fi 6 Router with
CVE-2026-21900 0 0.05% 1 0 2026-01-13T18:16:25.223000 CryptoLib provides a software-only solution using the CCSDS Space Data Link Secu
CVE-2025-66176 8.8 0.02% 1 0 2026-01-13T18:16:06.060000 There is a Stack overflow Vulnerability in the device Search and Discovery featu
CVE-2025-8110 8.8 0.77% 5 6 2026-01-13T15:50:02.180000 Improper Symbolic link handling in the PutContents API in Gogs allows Local Exec
CVE-2025-13447 8.5 0.15% 1 0 2026-01-13T15:37:12 OS Command Injection Remote Code Execution Vulnerability in API in Progress Load
CVE-2025-13444 8.5 0.15% 1 0 2026-01-13T15:37:12 OS Command Injection Remote Code Execution Vulnerability in API in Progress Load
CVE-2025-70974 10.0 0.08% 1 0 2026-01-13T14:03:46.203000 Fastjson before 1.2.48 mishandles autoType because, when an @type key is in a JS
CVE-2025-15035 0 0.03% 1 0 2026-01-13T14:03:46.203000 Improper Input Validation vulnerability in TP-Link Archer AXE75 v1.6 (vpn module
CVE-2025-67004 6.5 0.04% 1 0 2026-01-13T14:03:46.203000 An Information Disclosure vulnerability in CouchCMS 2.4 allow an Admin user to r
CVE-2025-64090 10.0 0.08% 1 0 2026-01-13T14:03:46.203000 This vulnerability allows authenticated attackers to execute commands via the ho
CVE-2026-0731 5.3 0.18% 1 0 2026-01-13T14:03:46.203000 A vulnerability has been found in TOTOLINK WA1200 5.9c.2914. The impacted elemen
CVE-2026-22079 0 0.02% 1 0 2026-01-13T14:03:46.203000 This vulnerability exists in Tenda wireless routers (300Mbps Wireless Router F3
CVE-2025-69195 7.6 0.08% 1 0 2026-01-13T14:03:46.203000 A flaw was found in GNU Wget2. This vulnerability, a stack-based buffer overflow
CVE-2025-7072 0 0.16% 1 0 2026-01-13T14:03:46.203000 The firmware in KAON CG3000TC and CG3000T routers contains hard-coded credential
CVE-2025-61686 9.1 0.06% 1 1 2026-01-13T14:03:18.990000 React Router is a router for React. In @react-router/node versions 7.0.0 through
CVE-2026-0855 8.8 0.29% 1 0 2026-01-13T14:03:18.990000 Certain IP Camera models developed by Merit LILIN has a OS Command Injection vul
CVE-2025-52694 10.0 0.08% 1 1 2026-01-13T14:03:18.990000 Successful exploitation of the SQL injection vulnerability could allow an unauth
CVE-2025-12420 None 0.07% 5 0 2026-01-13T03:32:08 A vulnerability has been identified in the ServiceNow AI Platform that could ena
CVE-2025-66689 6.5 0.04% 1 0 2026-01-12T21:31:38 A path traversal vulnerability exists in Zen MCP Server before 9.8.2 that allows
CVE-2026-21858 10.0 2.96% 9 4 template 2026-01-12T19:16:02.603000 n8n is an open source workflow automation platform. Versions starting with 1.65.
CVE-2025-50334 7.5 0.28% 1 0 2026-01-12T18:39:30.937000 An issue in Technitium DNS Server v.13.5 allows a remote attacker to cause a den
CVE-2025-70161 9.8 0.34% 1 0 2026-01-12T18:31:31 EDIMAX BR-6208AC V2_1.02 is vulnerable to Command Injection. This arises because
CVE-2025-41006 None 0.03% 1 0 2026-01-12T15:30:50 Imaster's MEMS Events CRM contains an SQL injection vulnerability in ‘phone’ par
CVE-2026-0854 8.8 0.29% 1 0 2026-01-12T06:30:20 Certain DVR/NVR models developed by Merit LILIN has a OS Command Injection vulne
CVE-2025-14523 8.2 0.04% 1 0 2026-01-12T03:32:09 A flaw in libsoup’s HTTP header handling allows multiple Host: headers in a requ
CVE-2026-0840 8.8 0.07% 1 0 2026-01-11T09:30:25 A security vulnerability has been detected in UTT 进取 520W 1.7.7-180627. Affected
CVE-2026-0837 8.8 0.07% 1 0 2026-01-11T06:30:19 A vulnerability was identified in UTT 进取 520W 1.7.7-180627. This affects the fun
CVE-2026-0836 8.8 0.07% 1 0 2026-01-11T06:30:19 A vulnerability was determined in UTT 进取 520W 1.7.7-180627. The impacted element
CVE-2026-0839 8.8 0.07% 1 0 2026-01-11T06:30:19 A weakness has been identified in UTT 进取 520W 1.7.7-180627. Affected is the func
CVE-2025-15505 2.4 0.03% 1 0 2026-01-11T03:30:13 A vulnerability was found in Luxul XWR-600 up to 4.0.1. The affected element is
CVE-2025-65731 6.8 0.03% 1 1 2026-01-09T21:32:41 An issue was discovered in D-Link Router DIR-605L (Hardware version F1; Firmware
CVE-2025-14524 5.3 0.03% 1 0 2026-01-09T21:32:41 When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer p
CVE-2025-10492 9.8 0.33% 1 1 2026-01-09T19:55:26 A Java deserialisation vulnerability has been discovered in the Jaspersoft Libra
CVE-2025-69426 None 0.05% 1 0 2026-01-09T18:31:43 The Ruckus vRIoT IoT Controller firmware versions prior to 3.0.0.0 (GA) contain
CVE-2025-69425 None 0.11% 1 0 2026-01-09T18:31:43 The Ruckus vRIoT IoT Controller firmware versions prior to 3.0.0.0 (GA) expose a
CVE-2025-14598 9.8 0.04% 1 1 2026-01-09T18:31:36 BeeS Software Solutions BET Portal contains an SQL injection vulnerability in th
CVE-2025-64091 8.6 0.05% 1 0 2026-01-09T18:31:35 This vulnerability allows authenticated attackers to execute commands via the NT
CVE-2025-64092 7.5 0.08% 1 0 2026-01-09T18:31:35 This vulnerability allows unauthenticated attackers to inject an SQL request int
CVE-2025-64093 10.0 0.29% 1 0 2026-01-09T18:31:35 Remote Code Execution vulnerability that allows unauthenticated attackers to inj
CVE-2026-22081 None 0.05% 1 0 2026-01-09T12:32:33 This vulnerability exists in Tenda wireless routers (300Mbps Wireless Router F3
CVE-2026-22082 None 0.17% 1 0 2026-01-09T12:32:33 This vulnerability exists in Tenda wireless routers (300Mbps Wireless Router F3
CVE-2026-22080 None 0.02% 1 0 2026-01-09T12:32:32 This vulnerability exists in Tenda wireless routers (300Mbps Wireless Router F3
CVE-2025-69194 8.8 0.04% 1 1 2026-01-09T09:31:24 A security issue was discovered in GNU Wget2 when handling Metalink documents. T
CVE-2025-12543 9.6 0.15% 1 0 2026-01-09T00:30:28 A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBo
CVE-2025-14025 8.6 0.07% 1 0 2026-01-09T00:30:28 A flaw was found in Ansible Automation Platform (AAP). Read-only scoped OAuth2 A
CVE-2025-52691 10.0 10.87% 7 10 template 2026-01-08T21:31:33 Successful exploitation of the vulnerability could allow an unauthenticated atta
CVE-2025-65518 7.5 0.03% 1 1 2026-01-08T21:30:40 Plesk Obsidian versions 8.0.1 through 18.0.73 are vulnerable to a Denial of Serv
CVE-2025-13151 7.5 0.05% 1 0 2026-01-08T21:30:33 Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to
CVE-2026-21441 None 0.02% 1 0 2026-01-08T20:05:42 ### Impact urllib3's [streaming API](https://urllib3.readthedocs.io/en/2.6.2/ad
CVE-2017-20214 7.5 0.04% 1 0 2026-01-08T19:15:54.560000 FLIR Thermal Camera F/FC/PT/D firmware version 8.0.0.64 contains hard-coded SSH
CVE-2017-20213 7.5 0.12% 1 0 2026-01-08T19:15:54.443000 FLIR Thermal Camera F/FC/PT/D Stream firmware version 8.0.0.64 contains an unaut
CVE-2025-59469 9.0 0.05% 1 0 2026-01-08T18:30:56 This vulnerability allows a Backup or Tape Operator to write files as root.
CVE-2025-59470 9.0 0.30% 2 0 2026-01-08T18:30:56 This vulnerability allows a Backup Operator to perform remote code execution (RC
CVE-2025-55125 7.8 0.19% 1 0 2026-01-08T18:30:56 This vulnerability allows a Backup or Tape Operator to perform remote code execu
CVE-2025-67091 6.5 0.02% 1 0 2026-01-08T18:30:56 An issue in GL Inet GL.Inet AX1800 Version 4.6.4 & 4.6.8 are vulnerable. GL.Inet
CVE-2025-67089 8.1 0.23% 1 0 2026-01-08T18:30:56 A command injection vulnerability exists in the GL-iNet GL-AXT1800 router firmwa
CVE-2025-67090 5.1 0.03% 1 0 2026-01-08T18:30:56 The LuCI web interface on Gl Inet GL.Inet AX1800 Version 4.6.4 & 4.6.8 are vulne
CVE-2026-21440 0 0.32% 1 3 2026-01-08T18:09:49.800000 AdonisJS is a TypeScript-first web framework. A Path Traversal vulnerability in
CVE-2025-68428 0 0.08% 2 2 2026-01-08T18:09:23.230000 jsPDF is a library to generate PDFs in JavaScript. Prior to version 4.0.0, user
CVE-2025-15471 9.8 0.22% 1 0 2026-01-08T18:09:23.230000 A vulnerability was detected in TRENDnet TEW-713RE 1.02. The impacted element is
CVE-2026-21876 9.3 0.04% 4 1 2026-01-08T18:08:18.457000 The OWASP core rule set (CRS) is a set of generic attack detection rules for use
CVE-2026-21877 9.9 0.05% 4 1 2026-01-08T18:08:18.457000 n8n is an open source workflow automation platform. In versions 0.121.2 and belo
CVE-2025-15346 0 0.07% 1 0 2026-01-08T18:08:18.457000 A vulnerability in the handling of verify_mode = CERT_REQUIRED in the wolfssl Py
CVE-2025-15079 5.3 0.03% 1 0 2026-01-08T18:08:18.457000 When doing SSH-based transfers using either SCP or SFTP, and setting the known_h
CVE-2025-13034 5.9 0.02% 1 0 2026-01-08T18:08:18.457000 When using `CURLOPT_PINNEDPUBLICKEY` option with libcurl or `--pinnedpubkey` wit
CVE-2025-14819 5.3 0.03% 1 0 2026-01-08T18:08:18.457000 When doing TLS related transfers with reused easy or multi handles and altering
CVE-2025-15224 3.1 0.09% 1 0 2026-01-08T15:32:30 When doing SSH-based transfers using either SCP or SFTP, and asked to do public
CVE-2025-69258 9.8 0.20% 3 0 2026-01-08T15:31:28 A LoadLibraryEX vulnerability in Trend Micro Apex Central could allow an unauthe
CVE-2025-14017 None 0.01% 1 0 2026-01-08T12:30:38 When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl, changing
CVE-2025-37164 10.0 81.31% 2 3 template 2026-01-08T00:32:16 A remote code execution issue exists in HPE OneView.
CVE-2025-62224 5.5 0.05% 1 0 2026-01-08T00:31:21 User interface (ui) misrepresentation of critical information in Microsoft Edge
CVE-2017-20216 9.8 0.44% 1 0 2026-01-08T00:31:21 FLIR Thermal Camera PT-Series firmware version 8.0.0.64 contains multiple unauth
CVE-2017-20215 8.8 0.35% 1 0 2026-01-08T00:31:21 FLIR Thermal Camera FC-S/PT firmware version 8.0.0.64 contains an authenticated
CVE-2017-20212 6.2 0.23% 1 0 2026-01-08T00:31:21 FLIR Thermal Camera F/FC/PT/D firmware version 8.0.0.64 contains an information
CVE-2009-0556 8.8 78.49% 4 0 2026-01-07T21:32:42 Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3, and PowerPoint in
CVE-2026-20029 4.9 0.04% 1 0 2026-01-07T18:30:33 A vulnerability in the licensing features of&nbsp;Cisco Identity Services Engine
CVE-2025-69277 4.5 0.02% 1 0 2026-01-07T17:16:02.003000 libsodium before ad3004e, in atypical use cases involving certain custom cryptog
CVE-2026-0628 8.8 0.02% 2 1 2026-01-07T15:31:20 Insufficient policy enforcement in WebView tag in Google Chrome prior to 143.0.7
CVE-2025-38352 7.4 0.25% 2 3 2026-01-07T15:30:14 In the Linux kernel, the following vulnerability has been resolved: posix-cpu-t
CVE-2025-14346 9.8 0.11% 2 0 2026-01-05T18:30:29 WHILL Model C2 Electric Wheelchairs and Model F Power Chairs do not enforce auth
CVE-2025-68613 9.9 63.49% 1 28 template 2026-01-02T18:28:02.143000 n8n is an open source workflow automation platform. Versions starting with 0.211
CVE-2025-13836 9.1 0.09% 1 0 2025-12-30T15:30:26 When reading an HTTP response from a server, if no read amount is specified, the
CVE-2025-64113 None 0.02% 1 1 2025-12-29T19:43:28 ### Withdrawn Advisory This advisory has been withdrawn because it incorrectly l
CVE-2025-13699 7.0 0.12% 1 0 2025-12-29T15:58:56.260000 MariaDB mariadb-dump Utility Directory Traversal Remote Code Execution Vulnerabi
CVE-2025-67724 5.4 0.04% 1 0 2025-12-22T18:49:24.303000 Tornado is a Python web framework and asynchronous networking library. In versio
CVE-2025-20393 10.0 7.28% 2 6 2025-12-17T21:30:47 Cisco is aware of a potential vulnerability.&nbsp; Cisco is currently investigat
CVE-2025-66039 0 0.05% 1 5 2025-12-12T15:19:07.567000 FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX
CVE-2025-55182 10.0 55.12% 1 100 template 2025-12-09T16:53:25 ### Impact There is an unauthenticated remote code execution vulnerability in R
CVE-2025-66471 None 0.02% 1 0 2025-12-05T18:33:09 ### Impact urllib3's [streaming API](https://urllib3.readthedocs.io/en/2.5.0/ad
CVE-2025-66516 None 0.02% 1 4 2025-12-05T02:26:57 Critical XXE in Apache Tika tika-core (1.13-3.2.1), tika-pdf-module (2.0.0-3.2.1
CVE-2025-64126 10.0 5.60% 1 0 2025-12-01T15:39:53.100000 An OS command injection vulnerability exists due to improper input validation.
CVE-2025-64127 10.0 5.60% 1 0 2025-11-26T18:31:15 An OS command injection vulnerability exists due to insufficient sanitization o
CVE-2025-64130 9.8 0.15% 1 0 2025-11-26T18:31:15 Zenitel TCIV-3+ is vulnerable to a reflected cross-site scripting vulnerability
CVE-2025-64129 7.6 0.17% 1 0 2025-11-26T18:31:15 Zenitel TCIV-3+ is vulnerable to an out-of-bounds write vulnerability, which co
CVE-2025-64128 10.0 5.60% 1 0 2025-11-26T18:31:15 An OS command injection vulnerability exists due to incomplete validation of us
CVE-2025-64446 9.8 89.81% 2 12 template 2025-11-21T18:27:33.730000 A relative path traversal vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1
CVE-2025-40300 None 0.08% 1 0 2025-11-17T18:30:25 In the Linux kernel, the following vulnerability has been resolved: x86/vmscape
CVE-2025-12818 5.9 0.06% 1 0 2025-11-14T16:42:03.187000 Integer wraparound in multiple PostgreSQL libpq client library functions allows
CVE-2025-8677 7.5 0.07% 1 0 2025-11-05T00:32:35 Querying for records within a specially crafted zone containing certain malforme
CVE-2025-40778 8.6 0.01% 1 1 2025-11-05T00:32:31 Under certain circumstances, BIND is too lenient when accepting records from ans
CVE-2025-4802 9.8 0.01% 1 1 2025-11-03T21:34:58 Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Librar
CVE-2025-30722 5.3 0.11% 1 0 2025-11-03T21:34:39 Vulnerability in the MySQL Client product of Oracle MySQL (component: Client: my
CVE-2025-30693 5.5 0.09% 1 0 2025-11-03T21:33:34 Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).
CVE-2025-21490 4.9 0.44% 1 0 2025-11-03T21:32:18 Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).
CVE-2025-6430 6.1 0.05% 1 0 2025-11-03T20:19:19.233000 When a file download is specified via the `Content-Disposition` header, that dir
CVE-2021-44228 10.0 94.36% 1 100 template 2025-10-22T19:13:26 # Summary Log4j versions prior to 2.16.0 are subject to a remote code execution
CVE-2025-22224 9.4 51.47% 1 0 2025-10-22T00:34:17 VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulner
CVE-2025-22225 8.3 7.05% 1 0 2025-10-22T00:33:13 VMware ESXi contains an arbitrary write vulnerability. A malicious actor with pr
CVE-2025-22226 7.1 3.96% 1 0 2025-10-22T00:33:13 VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerabi
CVE-2024-43451 6.5 89.93% 1 1 2025-10-22T00:33:11 NTLM Hash Disclosure Spoofing Vulnerability
CVE-2025-59816 7.3 0.10% 1 0 2025-09-26T14:32:19.853000 This vulnerability allows attackers to directly query the underlying database, p
CVE-2025-59817 9.1 0.04% 1 0 2025-09-25T21:30:37 This vulnerability allows attackers to execute arbitrary commands on the underly
CVE-2025-59815 9.1 0.06% 1 0 2025-09-25T21:30:37 This vulnerability allows malicious actors to execute arbitrary commands on the
CVE-2025-59814 9.8 0.08% 1 0 2025-09-25T21:30:36 This vulnerability allows malicious actors to gain unauthorized access to the Ze
CVE-2025-50173 7.8 0.12% 1 0 2025-08-19T14:36:03.933000 Weak authentication in Windows Installer allows an authorized attacker to elevat
CVE-2025-53136 5.5 0.05% 2 1 2025-08-19T14:13:07.783000 Exposure of sensitive information to an unauthorized actor in Windows NT OS Kern
CVE-2025-25256 9.8 26.27% 2 1 template 2025-08-15T18:15:27.583000 An improper neutralization of special elements used in an OS command ('OS Comman
CVE-2025-8286 9.8 0.58% 1 0 template 2025-07-31T21:32:03 Güralp FMUS series seismic monitoring devices expose an unauthenticated Telnet-b
CVE-2025-6842 4.7 0.03% 1 2 2025-07-01T15:32:11 A vulnerability was found in code-projects Product Inventory System 1.0 and clas
CVE-2022-23128 9.8 3.77% 1 0 2024-11-21T06:48:03.407000 Incomplete List of Disallowed Inputs vulnerability in Mitsubishi Electric MC Wor
CVE-2020-8554 6.3 24.78% 1 5 2024-11-21T05:39:01.370000 Kubernetes API server in all versions allow an attacker who is able to create a
CVE-2022-25845 8.1 89.92% 1 6 2024-05-15T06:28:36 The package com.alibaba:fastjson before 1.2.83 is vulnerable to Deserialization
CVE-2023-38408 9.8 68.75% 1 8 2024-04-19T05:07:56 The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently t
CVE-2023-31096 7.8 0.02% 1 0 2024-04-04T08:33:05 An issue was discovered in Broadcom) LSI PCI-SV92EX Soft Modem Kernel Driver thr
CVE-2017-18349 9.8 92.08% 1 1 template 2023-09-26T14:52:01 parseObject in Fastjson before 1.2.25, as used in FastjsonEngine in Pippo 1.11.0
CVE-2026-22265 0 0.00% 1 0 N/A
CVE-2026-22859 0 0.04% 1 0 N/A
CVE-2026-22853 0 0.04% 1 0 N/A
CVE-2026-22259 0 0.00% 1 0 N/A
CVE-2026-22262 0 0.00% 1 0 N/A
CVE-2026-22261 0 0.00% 1 0 N/A
CVE-2026-22264 0 0.00% 1 0 N/A
CVE-2026-22260 0 0.00% 1 0 N/A
CVE-2026-22258 0 0.00% 1 0 N/A
CVE-2026-22263 0 0.00% 1 0 N/A
CVE-2025-49844 0 6.88% 1 18 template N/A
CVE-2025-61675 0 0.04% 1 5 N/A
CVE-2025-5017 0 0.00% 1 0 N/A
CVE-2026-22026 0 0.04% 1 0 N/A
CVE-2026-21898 0 0.05% 1 0 N/A
CVE-2026-21897 0 0.04% 1 0 N/A
CVE-2026-22023 0 0.04% 1 0 N/A
CVE-2026-22024 0 0.05% 1 0 N/A
CVE-2026-22025 0 0.04% 1 0 N/A
CVE-2026-21899 0 0.03% 1 0 N/A
CVE-2025-59818 0 0.00% 1 0 N/A
CVE-2025-59819 0 0.00% 1 0 N/A
CVE-2025-63261 0 0.00% 1 0 N/A
CVE-2026-21881 0 0.09% 1 0 N/A
CVE-2025-69139 0 0.00% 1 0 N/A

CVE-2026-22774
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-15T22:33:39

1 posts

## Summary Certain inputs can cause `devalue.parse` to consume excessive CPU time and/or memory, potentially leading to denial of service in systems that parse input from untrusted sources. This affects applications using `devalue.parse` on externally-supplied data. The root cause is the typed array hydration expecting an `ArrayBuffer` as input, but not checking the assumption before creating the

thehackerwire@mastodon.social at 2026-01-15T20:00:15.000Z ##

🟠 CVE-2026-22774 - High (7.5)

Svelte devalue is a JavaScript library that serializes values into strings when JSON.stringify isn't sufficient for the job. From 5.3.0 to 5.6.1, certain inputs can cause devalue.parse to consume excessive CPU time and/or memory, potentially leadi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22027
(6.0 MEDIUM)

EPSS: 0.01%

updated 2026-01-15T21:45:02.797000

1 posts

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, the convert_hexstring_to_byte_array() function in the MariaDB SA interface writes decoded bytes into a caller-provided buffer without any capacit

CVE-2025-69222
(9.1 CRITICAL)

EPSS: 0.09%

updated 2026-01-15T21:36:03.330000

1 posts

LibreChat is a ChatGPT clone with additional features. Version 0.8.1-rc2 is prone to a server-side request forgery (SSRF) vulnerability due to missing restrictions of the Actions feature in the default configuration. LibreChat enables users to configure agents with predefined instructions and actions that can interact with remote services via OpenAPI specifications, supporting various HTTP methods

LLMs@activitypub.awakari.com at 2026-01-07T22:54:23.000Z ## CVE-2025-69222 - LibreChat is vulnerable to Server-Side Request Forgery due to missing restrictions CVE ID : CVE-2025-69222 Published : Jan. 7, 2026, 9:17 p.m. | 1 hour, 10 minutes ago Descriptio...


Origin | Interest | Match ##

CVE-2025-70307
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-15T21:32:50

1 posts

A stack overflow in the dump_ttxt_sample function of GPAC v2.4.0 allows attackers to cause a Denial of Service (DoS) via a crafted packet.

thehackerwire@mastodon.social at 2026-01-15T20:00:33.000Z ##

🟠 CVE-2025-70307 - High (7.5)

A stack overflow in the dump_ttxt_sample function of GPAC v2.4.0 allows attackers to cause a Denial of Service (DoS) via a crafted packet.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0227(CVSS UNKNOWN)

EPSS: 0.00%

updated 2026-01-15T21:31:54

10 posts

A vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to cause a denial of service (DoS) to the firewall. Repeated attempts to trigger this issue results in the firewall entering into maintenance mode.

cR0w at 2026-01-15T18:55:32.049Z ##

Anyone hear of a PoC for CVE-2026-0227 yet?

PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway and Portal

security.paloaltonetworks.com/

##

benzogaga33@mamot.fr at 2026-01-15T16:40:03.000Z ##

Palo Alto Networks – CVE-2026-0227 : cette nouvelle faille permet de désactiver le firewall à distance it-connect.fr/palo-alto-networ #ActuCybersécurité #Cybersécurité #Vulnérabilité #PaloAlto

##

jbhall56 at 2026-01-15T13:33:39.430Z ##

Tracked as CVE-2026-0227, this security flaw affects next-generation firewalls (running PAN-OS 10.1 or later) and Palo Alto Networks' Prisma Access configurations when the GlobalProtect gateway or portal is enabled. bleepingcomputer.com/news/secu

##

allaboutsecurity@mastodon.social at 2026-01-15T07:55:57.000Z ##

DoS-Schwachstelle in PAN-OS bedroht GlobalProtect-Infrastruktur

Palo Alto Networks hat eine kritische Sicherheitslücke in seiner Firewall-Software PAN-OS behoben. Die als CVE-2026-0227 klassifizierte Schwachstelle erlaubt es Angreifern ohne Authentifizierung, Denial-of-Service-Attacken gegen GlobalProtect-Komponenten durchzuführen und betroffene Systeme in den Wartungsmodus zu zwingen.

all-about-security.de/dos-schw

#PaloAltoNetworks #DoS #PANOS #firewall

##

cR0w@infosec.exchange at 2026-01-15T18:55:32.000Z ##

Anyone hear of a PoC for CVE-2026-0227 yet?

PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway and Portal

security.paloaltonetworks.com/

##

benzogaga33@mamot.fr at 2026-01-15T16:40:03.000Z ##

Palo Alto Networks – CVE-2026-0227 : cette nouvelle faille permet de désactiver le firewall à distance it-connect.fr/palo-alto-networ #ActuCybersécurité #Cybersécurité #Vulnérabilité #PaloAlto

##

jbhall56@infosec.exchange at 2026-01-15T13:33:39.000Z ##

Tracked as CVE-2026-0227, this security flaw affects next-generation firewalls (running PAN-OS 10.1 or later) and Palo Alto Networks' Prisma Access configurations when the GlobalProtect gateway or portal is enabled. bleepingcomputer.com/news/secu

##

cR0w@infosec.exchange at 2026-01-14T17:33:23.000Z ##

There's the DoS.

CVSS-BT: 7.7 / CVSS-B: 8.7 (CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/AU:Y/R:U/V:D/RE:M/U:Amber)

security.paloaltonetworks.com/

##

AAKL@infosec.exchange at 2026-01-14T17:29:02.000Z ##

New security advisories. You'll need a login to access details.

Palo Alto: PAN-SA-2026-0001 Chromium: Monthly Vulnerability Update (January 2026) security.paloaltonetworks.com/

CVE-2026-0227 PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway and Portal security.paloaltonetworks.com/ #PaloAlto #infosec #vulnerability #Chromium

##

wav3@infosec.exchange at 2026-01-14T17:24:40.000Z ##

@cR0w cve-2026-0227 seems spicy

##

CVE-2025-69259
(7.5 HIGH)

EPSS: 0.10%

updated 2026-01-15T21:31:44

1 posts

A message unchecked NULL return value vulnerability in Trend Micro Apex Central could allow a remote attacker to create a denial-of-service condition on affected installations. Please note: authentication is not required in order to exploit this vulnerability..

DarkWebInformer@infosec.exchange at 2026-01-12T19:06:17.000Z ##

‼️Trend Micro Apex Central Multiple Vulnerabilities

CVE:

CVE-2025-69258 (CVSS: 9.8)
CVE-2025-69259 (CVSS: 7.5)
CVE-2025-69260 (CVSS: 7.5)

CWE: CWE-1285, CWE-306, CWE-641

PoC/Writeup: tenable.com/security/research/

Disclosure Date: January 7. 2026

Disclosure: success.trendmicro.com/en-US/s

##

CVE-2026-21920
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-15T21:16:08.217000

1 posts

An Unchecked Return Value vulnerability in the DNS module of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). If an SRX Series device configured for DNS processing, receives a specifically formatted DNS request flowd will crash and restart, which causes a service interruption until the process has recovered. This iss

thehackerwire@mastodon.social at 2026-01-15T21:54:04.000Z ##

🟠 CVE-2026-21920 - High (7.5)

An Unchecked Return Value vulnerability in the DNS module of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).

If an SRX Series device configured for DNS processing, r...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21918
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-15T21:16:08.050000

1 posts

A Double Free vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on SRX and MX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). On all SRX and MX Series platforms, when during TCP session establishment a specific sequence of packets is encountered a double free happens. This causes flowd to crash and the respective FPC to re

thehackerwire@mastodon.social at 2026-01-15T21:53:55.000Z ##

🟠 CVE-2026-21918 - High (7.5)

A Double Free vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on SRX and MX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). On all SRX and MX Series platforms, when duri...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21917
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-15T21:16:07.877000

1 posts

An Improper Validation of Syntactic Correctness of Input vulnerability in the Web-Filtering module of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). If an SRX device configured for UTM Web-Filtering receives a specifically malformed SSL packet, this will cause an FPC crash and restart. This issue affects Junos OS on SR

thehackerwire@mastodon.social at 2026-01-15T22:00:27.000Z ##

🟠 CVE-2026-21917 - High (7.5)

An Improper Validation of Syntactic Correctness of Input vulnerability in the Web-Filtering module of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).

If an SRX device c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21914
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-15T21:16:07.700000

1 posts

An Improper Locking vulnerability in the GTP plugin of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (Dos). If an SRX Series device receives a specifically malformed GPRS Tunnelling Protocol (GTP) Modify Bearer Request message, a lock is acquired and never released. This results in other threads not being able to acquire a l

thehackerwire@mastodon.social at 2026-01-15T22:00:18.000Z ##

🟠 CVE-2026-21914 - High (7.5)

An Improper Locking vulnerability in the GTP plugin of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (Dos).

If an SRX Series device receives a specifically malformed GPRS Tu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21913
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-15T21:16:07.537000

1 posts

An Incorrect Initialization of Resource vulnerability in the Internal Device Manager (IDM) of Juniper Networks Junos OS on EX4000 models allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). On EX4000 models with 48 ports (EX4000-48T, EX4000-48P, EX4000-48MP) a high volume of traffic destined to the device will cause an FXPC crash and restart, which leads to a comp

thehackerwire@mastodon.social at 2026-01-15T21:54:12.000Z ##

🟠 CVE-2026-21913 - High (7.5)

An Incorrect Initialization of Resource vulnerability in the Internal Device Manager (IDM) of Juniper Networks Junos OS on EX4000 models allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).

On EX4000 models with 4...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21906
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-15T21:16:06.177000

1 posts

An Improper Handling of Exceptional Conditions vulnerability in the packet forwarding engine (PFE) of Juniper Networks Junos OS on SRX Series allows an unauthenticated network-based attacker sending a specific ICMP packet through a GRE tunnel to cause the PFE to crash and restart. When PowerMode IPsec (PMI) and GRE performance acceleration are enabled and the device receives a specific ICMP packe

thehackerwire@mastodon.social at 2026-01-15T22:00:37.000Z ##

🟠 CVE-2026-21906 - High (7.5)

An Improper Handling of Exceptional Conditions vulnerability in the packet forwarding engine (PFE) of Juniper Networks Junos OS on SRX Series allows an unauthenticated network-based attacker sending a specific ICMP packet through a GRE tunnel to c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21905
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-15T21:16:05.990000

1 posts

A Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in the SIP application layer gateway (ALG) of Juniper Networks Junos OS on SRX Series and MX Series with MX-SPC3 or MS-MPC allows an unauthenticated network-based attacker sending specific SIP messages over TCP to crash the flow management process, leading to a Denial of Service (DoS). On SRX Series, and MX Series with MX-SPC3

thehackerwire@mastodon.social at 2026-01-15T22:14:14.000Z ##

🟠 CVE-2026-21905 - High (7.5)

A Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in the SIP application layer gateway (ALG) of Juniper Networks Junos OS on SRX Series and MX Series with MX-SPC3 or MS-MPC allows an unauthenticated network-based attacker send...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-66169
(5.3 MEDIUM)

EPSS: 0.02%

updated 2026-01-15T21:16:04.460000

1 posts

Cypher Injection vulnerability in Apache Camel camel-neo4j component. This issue affects Apache Camel: from 4.10.0 before 4.10.8, from 4.14.0 before 4.14.3, from 4.15.0 before 4.17.0 Users are recommended to upgrade to version 4.10.8 for 4.10.x LTS and 4.14.3 for 4.14.x LTS and 4.17.0.

cR0w@infosec.exchange at 2026-01-14T14:16:17.000Z ##

Haven't seen a cypher injection for a while. This one is in Apache Camel-Neo4j.

camel.apache.org/security/CVE-

##

CVE-2025-60003
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-15T21:16:03.590000

1 posts

A Buffer Over-read vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). When an affected device receives a BGP update with a set of specific optional transitive attributes over an established peering session, rpd will crash and restart when attempting to advertise

thehackerwire@mastodon.social at 2026-01-15T22:14:23.000Z ##

🟠 CVE-2025-60003 - High (7.5)

A Buffer Over-read vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).

When an affected device receives a BGP u...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-54957
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-01-15T21:16:02.860000

2 posts

An issue was discovered in Dolby UDC 4.5 through 4.13. A crash of the DD+ decoder process can occur when a malformed DD+ bitstream is processed. When Evolution data is processed by evo_priv.c from the DD+ bitstream, the decoder writes that data into a buffer. The length calculation for a write can overflow due to an integer wraparound. This can lead to the allocated buffer being too small, and the

1 repos

https://github.com/AlphabugX/CVE-2025-54957

Mathrubhumi_English@mastodon.social at 2026-01-15T16:44:15.000Z ##

CERT-In urges immediate Android updates for critical Dolby audio vulnerability (CVE-2025-54957). Zero-click threat allows remote device takeover. english.mathrubhumi.com/techno #AndroidSafety #bugs #SecurityUpdate #Cybersecurity

##

jbhall56@infosec.exchange at 2026-01-08T13:10:58.000Z ##

The flaw is tracked as CVE-2025-54957 and its existence came to light in October 2025 after it was discovered by Google researchers. securityweek.com/critical-dolb

##

CVE-2025-66292
(8.1 HIGH)

EPSS: 0.00%

updated 2026-01-15T20:17:45

1 posts

### Summary DPanel has an arbitrary file deletion vulnerability in the `/api/common/attach/delete` interface. Authenticated users can delete arbitrary files on the server via path traversal. ### Details When a user logs into the administrative backend, this interface can be used to delete files. The vulnerability lies in the `Delete` function within the `app/common/http/controller/attach.go` file

thehackerwire@mastodon.social at 2026-01-15T17:50:02.000Z ##

🟠 CVE-2025-66292 - High (8.1)

DPanel is an open source server management panel written in Go. Prior to 1.9.2, DPanel has an arbitrary file deletion vulnerability in the /api/common/attach/delete interface. Authenticated users can delete arbitrary files on the server via path t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23493
(8.6 HIGH)

EPSS: 0.00%

updated 2026-01-15T20:17:44

1 posts

### Summary The http_error_log file stores the $_COOKIE and $_SERVER variables, which means sensitive information such as database passwords, cookie session data, and other details can be accessed or recovered through the Pimcore backend. ### Details It’s better to remove both lines, as this information makes little sense in this context anyway. https://github.com/pimcore/pimcore/blob/12.x/bundl

thehackerwire@mastodon.social at 2026-01-15T17:43:12.000Z ##

🟠 CVE-2026-23493 - High (8.6)

Pimcore is an Open Source Data & Experience Management Platform. Prior to 12.3.1 and 11.5.14, the http_error_log file stores the $_COOKIE and $_SERVER variables, which means sensitive information such as database passwords, cookie session data, an...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23527
(8.9 HIGH)

EPSS: 0.00%

updated 2026-01-15T20:16:05.620000

1 posts

H3 is a minimal H(TTP) framework built for high performance and portability. Prior to 1.15.5, there is a critical HTTP Request Smuggling vulnerability. readRawBody is doing a strict case-sensitive check for the Transfer-Encoding header. It explicitly looks for "chunked", but per the RFC, this header should be case-insensitive. This vulnerability is fixed in 1.15.5.

thehackerwire@mastodon.social at 2026-01-15T21:00:47.000Z ##

🟠 CVE-2026-23527 - High (8.9)

H3 is a minimal H(TTP) framework built for high performance and portability. Prior to 1.15.5, there is a critical HTTP Request Smuggling vulnerability. readRawBody is doing a strict case-sensitive check for the Transfer-Encoding header. It explici...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23520
(9.0 CRITICAL)

EPSS: 0.00%

updated 2026-01-15T20:16:05.467000

1 posts

Arcane provides modern docker management. Prior to 1.13.0, Arcane has a command injection in the updater service. Arcane’s updater service supported lifecycle labels com.getarcaneapp.arcane.lifecycle.pre-update and com.getarcaneapp.arcane.lifecycle.post-update that allowed defining a command to run before or after a container update. The label value is passed directly to /bin/sh -c without sanitiz

thehackerwire@mastodon.social at 2026-01-15T21:00:36.000Z ##

🔴 CVE-2026-23520 - Critical (9)

Arcane provides modern docker management. Prior to 1.13.0, Arcane has a command injection in the updater service. Arcane’s updater service supported lifecycle labels com.getarcaneapp.arcane.lifecycle.pre-update and com.getarcaneapp.arcane.lifecy...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22775
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-15T19:16:05.963000

1 posts

Svelte devalue is a JavaScript library that serializes values into strings when JSON.stringify isn't sufficient for the job. From 5.1.0 to 5.6.1, certain inputs can cause devalue.parse to consume excessive CPU time and/or memory, potentially leading to denial of service in systems that parse input from untrusted sources. This affects applications using devalue.parse on externally-supplied data. Th

thehackerwire@mastodon.social at 2026-01-15T20:00:24.000Z ##

🟠 CVE-2026-22775 - High (7.5)

Svelte devalue is a JavaScript library that serializes values into strings when JSON.stringify isn't sufficient for the job. From 5.1.0 to 5.6.1, certain inputs can cause devalue.parse to consume excessive CPU time and/or memory, potentially leadi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-62193
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-01-15T19:16:03.753000

1 posts

Sites running NOAA PMEL Live Access Server (LAS) are vulnerable to remote code execution via specially crafted requests that include PyFerret expressions. By leveraging a SPAWN command, a remote, unauthenticated attacker can execute arbitrary OS commands. Fixed in a version of 'gov.noaa.pmel.tmap.las.filter.RequestInputFilter.java' from 2025-09-24.

thehackerwire@mastodon.social at 2026-01-15T17:49:52.000Z ##

🔴 CVE-2025-62193 - Critical (9.8)

Sites running NOAA PMEL Live Access Server (LAS) are vulnerable to remote code execution via specially crafted requests that include PyFerret expressions. By leveraging a SPAWN command, unauthenticated attackers can execute arbitrary OS commands.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69260
(7.5 HIGH)

EPSS: 0.10%

updated 2026-01-15T19:11:14.113000

1 posts

A message out-of-bounds read vulnerability in Trend Micro Apex Central could allow a remote attacker to create a denial-of-service condition on affected installations. Please note: authentication is not required in order to exploit this vulnerability.

DarkWebInformer@infosec.exchange at 2026-01-12T19:06:17.000Z ##

‼️Trend Micro Apex Central Multiple Vulnerabilities

CVE:

CVE-2025-69258 (CVSS: 9.8)
CVE-2025-69259 (CVSS: 7.5)
CVE-2025-69260 (CVSS: 7.5)

CWE: CWE-1285, CWE-306, CWE-641

PoC/Writeup: tenable.com/security/research/

Disclosure Date: January 7. 2026

Disclosure: success.trendmicro.com/en-US/s

##

CVE-2025-9014(CVSS UNKNOWN)

EPSS: 0.00%

updated 2026-01-15T18:31:42

2 posts

A Null Pointer Dereference vulnerability exists in the referer header check of the web portal of TP-Link TL-WR841N v14, caused by improper input validation.  A remote, unauthenticated attacker can exploit this flaw and cause Denial of Service on the web portal service.This issue affects TL-WR841N v14: before 250908.

CVE-2025-67076
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-15T18:31:42

1 posts

Directory traversal vulnerability in Omnispace Agora Project before 25.10 allowing unauthenticated attackers to read files on the system via the misc controller and the ExternalGetFile action. Only files with an extension can be read.

thehackerwire@mastodon.social at 2026-01-15T17:50:47.000Z ##

🟠 CVE-2025-67076 - High (7.5)

Directory traversal vulnerability in Omnispace Agora Project before 25.10 allowing unauthenticated attackers to read files on the system via the misc controller and the ExternalGetFile action. Only files with an extension can be read.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70308
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-15T18:31:42

1 posts

An out-of-bounds read in the GSF demuxer filter component of GPAC v2.4.0 allows attackers to cause a Denial of Service (DoS) via a crafted .gsf file.

thehackerwire@mastodon.social at 2026-01-15T17:44:43.000Z ##

🟠 CVE-2025-70308 - High (7.5)

An out-of-bounds read in the GSF demuxer filter component of GPAC v2.4.0 allows attackers to cause a Denial of Service (DoS) via a crafted .gsf file.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-61973
(8.8 HIGH)

EPSS: 0.00%

updated 2026-01-15T18:31:42

1 posts

A local privilege escalation vulnerability exists during the installation of Epic Games Store via the Microsoft Store. A low-privilege user can replace a DLL file during the installation process, which may result in unintended elevation of privileges.

thehackerwire@mastodon.social at 2026-01-15T16:50:34.000Z ##

🟠 CVE-2025-61973 - High (8.8)

A local privilege escalation vulnerability exists during the installation of Epic Games Store via the Microsoft Store. A low-privilege user can replace a DLL file during the installation process, which may result in unintended elevation of privile...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70298
(8.2 HIGH)

EPSS: 0.00%

updated 2026-01-15T18:31:39

1 posts

GPAC v2.4.0 was discovered to contain an out-of-bounds read in the oggdmx_parse_tags function.

thehackerwire@mastodon.social at 2026-01-15T19:09:14.000Z ##

🟠 CVE-2025-70298 - High (8.2)

GPAC v2.4.0 was discovered to contain an out-of-bounds read in the oggdmx_parse_tags function.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70304
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-15T18:31:39

1 posts

A buffer overflow in the vobsub_get_subpic_duration() function of GPAC v2.4.0 allows attackers to cause a Denial of Service (DoS) via a crafted packet.

thehackerwire@mastodon.social at 2026-01-15T17:45:03.000Z ##

🟠 CVE-2025-70304 - High (7.5)

A buffer overflow in the vobsub_get_subpic_duration() function of GPAC v2.4.0 allows attackers to cause a Denial of Service (DoS) via a crafted packet.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70656
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-15T18:31:39

1 posts

Tenda AX-1806 v1.0.0.1 was discovered to contain a stack overflow in the mac parameter of the sub_65B5C function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

thehackerwire@mastodon.social at 2026-01-15T17:44:54.000Z ##

🟠 CVE-2025-70656 - High (7.5)

Tenda AX-1806 v1.0.0.1 was discovered to contain a stack overflow in the mac parameter of the sub_65B5C function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22867
(8.7 HIGH)

EPSS: 0.00%

updated 2026-01-15T17:16:07.883000

1 posts

LaSuite Doc is a collaborative note taking, wiki and documentation platform. From 3.8.0 to 4.3.0, a Stored Cross-Site Scripting (XSS) vulnerability exists in the Interlinking feature. When a user creates a link to another document within the editor, the URL of that link is not validated. An attacker with document editing privileges can inject a malicious javascript: URL that executes arbitrary cod

thehackerwire@mastodon.social at 2026-01-15T17:43:31.000Z ##

🟠 CVE-2026-22867 - High (8.7)

LaSuite Doc is a collaborative note taking, wiki and documentation platform. From 3.8.0 to 4.3.0, a Stored Cross-Site Scripting (XSS) vulnerability exists in the Interlinking feature. When a user creates a link to another document within the edito...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-66417
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-15T17:16:04.733000

1 posts

GLPI is a free asset and IT management software package. From 11.0.0, < 11.0.3, an unauthenticated user can perform a SQL injection through the inventory endpoint. This vulnerability is fixed in 11.0.3.

thehackerwire@mastodon.social at 2026-01-15T17:50:11.000Z ##

🟠 CVE-2025-66417 - High (7.5)

GLPI is a free asset and IT management software package. From 11.0.0, &lt; 11.0.3, an unauthenticated user can perform a SQL injection through the inventory endpoint. This vulnerability is fixed in 11.0.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-67079
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-01-15T16:16:11.977000

1 posts

File upload vulnerability in Omnispace Agora Project before 25.10 allowing attackers to execute code through the MSL engine of the Imagick library via crafted PDF file to the file upload and thumbnail functions.

thehackerwire@mastodon.social at 2026-01-15T16:50:44.000Z ##

🔴 CVE-2025-67079 - Critical (9.8)

File upload vulnerability in Omnispace Agora Project before 25.10 allowing attackers to execute code through the MSL engine of the Imagick library via crafted PDF file to the file upload and thumbnail functions.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-64516
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-15T16:16:11.487000

2 posts

GLPI is a free asset and IT management software package. Prior to 10.0.21 and 11.0.3, an unauthorized user can access GLPI documents attached to any item (ticket, asset, ...). If the public FAQ is enabled, this unauthorized access can be performed by an anonymous user. This vulnerability is fixed in 10.0.21 and 11.0.3.

1 repos

https://github.com/lem0naids/CVE-2025-64516-POC

thehackerwire@mastodon.social at 2026-01-15T16:56:36.000Z ##

🟠 CVE-2025-64516 - High (7.5)

GLPI is a free asset and IT management software package. Prior to 10.0.21 and 11.0.3, an unauthorized user can access GLPI documents attached to any item (ticket, asset, ...). If the public FAQ is enabled, this unauthorized access can be performed...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-15T16:50:36.000Z ##

🟠 CVE-2025-64516 - High (7.5)

GLPI is a free asset and IT management software package. Prior to 10.0.21 and 11.0.3, an unauthorized user can access GLPI documents attached to any item (ticket, asset, ...). If the public FAQ is enabled, this unauthorized access can be performed...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22643
(8.3 HIGH)

EPSS: 0.00%

updated 2026-01-15T15:31:35

3 posts

In Grafana, an excessively long dashboard title or panel name will cause Chromium browsers to become unresponsive due to Improper Input Validation vulnerability in Grafana. This issue affects Grafana: before 11.6.2 and is fixed in 11.6.2 and higher.

cR0w at 2026-01-15T15:12:33.115Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

thehackerwire@mastodon.social at 2026-01-15T14:43:08.000Z ##

🟠 CVE-2026-22643 - High (8.3)

In Grafana, an excessively long dashboard title or panel name will cause Chromium browsers to become unresponsive due to Improper Input Validation vulnerability in Grafana. This issue affects Grafana: before 11.6.2 and is fixed in 11.6.2 and higher.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

cR0w@infosec.exchange at 2026-01-15T15:12:33.000Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

CVE-2026-22644
(5.3 MEDIUM)

EPSS: 0.00%

updated 2026-01-15T15:31:35

2 posts

Certain requests pass the authentication token in the URL as string query parameter, making it vulnerable to theft through server logs, proxy logs and Referer headers, which could allow an attacker to hijack the user's session and gain unauthorized access.

cR0w at 2026-01-15T15:12:33.115Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

cR0w@infosec.exchange at 2026-01-15T15:12:33.000Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

CVE-2026-22638
(8.3 HIGH)

EPSS: 0.00%

updated 2026-01-15T15:31:33

3 posts

A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is inst

cR0w at 2026-01-15T15:12:33.115Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

thehackerwire@mastodon.social at 2026-01-15T14:43:18.000Z ##

🟠 CVE-2026-22638 - High (8.3)

A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. T...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

cR0w@infosec.exchange at 2026-01-15T15:12:33.000Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

CVE-2026-22907
(10.0 CRITICAL)

EPSS: 0.00%

updated 2026-01-15T15:31:30

3 posts

An attacker may gain unauthorized access to the host filesystem, potentially allowing them to read and modify system data.

cR0w at 2026-01-15T15:12:33.115Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

thehackerwire@mastodon.social at 2026-01-15T13:48:11.000Z ##

🔴 CVE-2026-22907 - Critical (9.9)

An attacker may gain unauthorized access to the host filesystem, potentially allowing them to read and modify system data.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

cR0w@infosec.exchange at 2026-01-15T15:12:33.000Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

CVE-2026-22639
(4.3 MEDIUM)

EPSS: 0.00%

updated 2026-01-15T15:31:27

2 posts

Grafana is an open-source platform for monitoring and observability. The Grafana Alerting DingDing integration was not properly protected and could be exposed to users with Viewer permission. Fixed in versions 10.4.19+security-01, 11.2.10+security-01, 11.3.7+security-01, 11.4.5+security-01, 11.5.5+security-01, 11.6.2+security-01 and 12.0.1+security-01

cR0w at 2026-01-15T15:12:33.115Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

cR0w@infosec.exchange at 2026-01-15T15:12:33.000Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

CVE-2026-22642
(4.2 MEDIUM)

EPSS: 0.00%

updated 2026-01-15T15:31:27

2 posts

An open redirect vulnerability has been identified in Grafana OSS organization switching functionality. Prerequisites for exploitation: - Multiple organizations must exist in the Grafana instance - Victim must be on a different organization than the one specified in the URL

cR0w at 2026-01-15T15:12:33.115Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

cR0w@infosec.exchange at 2026-01-15T15:12:33.000Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

CVE-2026-22646
(4.3 MEDIUM)

EPSS: 0.00%

updated 2026-01-15T15:31:27

2 posts

Certain error messages returned by the application expose internal system details that should not be visible to end users, providing attackers with valuable reconnaissance information (like file paths, database errors, or software versions) that can be used to map the application's internal structure and discover other, more critical vulnerabilities.

cR0w at 2026-01-15T15:12:33.115Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

cR0w@infosec.exchange at 2026-01-15T15:12:33.000Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

CVE-2026-22919
(3.8 LOW)

EPSS: 0.00%

updated 2026-01-15T15:31:26

2 posts

An attacker with administrative access may inject malicious content into the login page, potentially enabling cross-site scripting (XSS) attacks, leading to the extraction of sensitive data.

cR0w at 2026-01-15T15:12:33.115Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

cR0w@infosec.exchange at 2026-01-15T15:12:33.000Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

CVE-2026-22920
(3.7 LOW)

EPSS: 0.00%

updated 2026-01-15T15:31:26

2 posts

The device's passwords have not been adequately salted, making them vulnerable to password extraction attacks.

cR0w at 2026-01-15T15:12:33.115Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

cR0w@infosec.exchange at 2026-01-15T15:12:33.000Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

CVE-2026-22637
(6.8 MEDIUM)

EPSS: 0.00%

updated 2026-01-15T15:31:25

2 posts

The built-in XY Chart plugin is vulnerable to a DOM XSS vulnerability. A user with Editor permissions is able to modify such a panel in order to make it execute arbitrary JavaScript.

cR0w at 2026-01-15T15:12:33.115Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

cR0w@infosec.exchange at 2026-01-15T15:12:33.000Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

CVE-2025-70744
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-15T15:31:21

1 posts

Tenda AX-1806 v1.0.0.1 was discovered to contain a stack overflow in the cloneType parameter of the sub_65B5C function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

thehackerwire@mastodon.social at 2026-01-15T15:37:43.000Z ##

🟠 CVE-2025-70744 - High (7.5)

Tenda AX-1806 v1.0.0.1 was discovered to contain a stack overflow in the cloneType parameter of the sub_65B5C function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22917
(4.3 MEDIUM)

EPSS: 0.00%

updated 2026-01-15T15:31:19

2 posts

Improper input handling in a system endpoint may allow attackers to overload resources, causing a denial of service.

cR0w at 2026-01-15T15:12:33.115Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

cR0w@infosec.exchange at 2026-01-15T15:12:33.000Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

CVE-2026-22912
(4.3 MEDIUM)

EPSS: 0.00%

updated 2026-01-15T15:31:19

2 posts

Improper validation of a login parameter may allow attackers to redirect users to malicious websites after authentication. This can lead to various risk including stealing credentials from unsuspecting users.

cR0w at 2026-01-15T15:12:33.115Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

cR0w@infosec.exchange at 2026-01-15T15:12:33.000Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

CVE-2026-22916
(4.3 MEDIUM)

EPSS: 0.00%

updated 2026-01-15T15:31:19

2 posts

An attacker with low privileges may be able to trigger critical system functions such as reboot or factory reset without proper restrictions, potentially leading to service disruption or loss of configuration.

cR0w at 2026-01-15T15:12:33.115Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

cR0w@infosec.exchange at 2026-01-15T15:12:33.000Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

CVE-2026-22915
(4.3 MEDIUM)

EPSS: 0.00%

updated 2026-01-15T15:31:19

2 posts

An attacker with low privileges may be able to read files from specific directories on the device, potentially exposing sensitive information.

cR0w at 2026-01-15T15:12:33.115Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

cR0w@infosec.exchange at 2026-01-15T15:12:33.000Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

CVE-2025-13062
(8.8 HIGH)

EPSS: 0.00%

updated 2026-01-15T15:31:19

1 posts

The Supreme Modules Lite plugin for WordPress is vulnerable to arbitrary file upload in all versions up to, and including, 2.5.62. This is due to insufficient file type validation detecting JSON files, allowing double extension files to bypass sanitization while being accepted as a valid JSON file. This makes it possible for authenticated attackers, with author-level access and above, to upload ar

thehackerwire@mastodon.social at 2026-01-15T14:43:28.000Z ##

🟠 CVE-2025-13062 - High (8.8)

The Supreme Modules Lite plugin for WordPress is vulnerable to arbitrary file upload in all versions up to, and including, 2.5.62. This is due to insufficient file type validation detecting JSON files, allowing double extension files to bypass san...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22913
(4.3 MEDIUM)

EPSS: 0.00%

updated 2026-01-15T15:31:18

2 posts

Improper handling of a URL parameter may allow attackers to execute code in a user's browser after login. This can lead to the extraction of sensitive data.

cR0w at 2026-01-15T15:12:33.115Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

cR0w@infosec.exchange at 2026-01-15T15:12:33.000Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

CVE-2026-22911
(5.3 MEDIUM)

EPSS: 0.00%

updated 2026-01-15T15:31:18

2 posts

Firmware update files may expose password hashes for system accounts, which could allow a remote attacker to recover credentials and gain unauthorized access to the device.

cR0w at 2026-01-15T15:12:33.115Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

cR0w@infosec.exchange at 2026-01-15T15:12:33.000Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

CVE-2025-71019
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-15T15:15:51.720000

1 posts

Tenda AX-1806 v1.0.0.1 was discovered to contain a stack overflow in the wanSpeed parameter of the sub_65B5C function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

thehackerwire@mastodon.social at 2026-01-15T15:37:53.000Z ##

🟠 CVE-2025-71019 - High (7.5)

Tenda AX-1806 v1.0.0.1 was discovered to contain a stack overflow in the wanSpeed parameter of the sub_65B5C function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22645
(5.3 MEDIUM)

EPSS: 0.00%

updated 2026-01-15T14:16:28.290000

2 posts

The application discloses all used components, versions and license information to unauthenticated actors, giving attackers the opportunity to target known security vulnerabilities of used components.

cR0w at 2026-01-15T15:12:33.115Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

cR0w@infosec.exchange at 2026-01-15T15:12:33.000Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

CVE-2026-22641
(5.0 MEDIUM)

EPSS: 0.00%

updated 2026-01-15T14:16:27.743000

2 posts

This vulnerability in Grafana's datasource proxy API allows authorization checks to be bypassed by adding an extra slash character in the URL path. Users with minimal permissions could gain unauthorized read access to GET endpoints in Alertmanager and Prometheus datasources. The issue primarily affects datasources that implement route-specific permissions, including Alertmanager and certain Promet

cR0w at 2026-01-15T15:12:33.115Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

cR0w@infosec.exchange at 2026-01-15T15:12:33.000Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

CVE-2026-22640
(5.5 MEDIUM)

EPSS: 0.00%

updated 2026-01-15T14:16:27.607000

2 posts

An access control vulnerability was discovered in Grafana OSS where an Organization administrator could permanently delete the Server administrator account. This vulnerability exists in the DELETE /api/org/users/ endpoint. The vulnerability can be exploited when: 1. An Organization administrator exists 2. The Server administrator is either: - Not part of any organization, or - Part of the same org

cR0w at 2026-01-15T15:12:33.115Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

cR0w@infosec.exchange at 2026-01-15T15:12:33.000Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

CVE-2026-22918
(4.3 MEDIUM)

EPSS: 0.00%

updated 2026-01-15T13:16:06.790000

2 posts

An attacker may exploit missing protection against clickjacking by tricking users into performing unintended actions through maliciously crafted web pages, leading to the extraction of sensitive data.

cR0w at 2026-01-15T15:12:33.115Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

cR0w@infosec.exchange at 2026-01-15T15:12:33.000Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

CVE-2026-22914
(4.3 MEDIUM)

EPSS: 0.00%

updated 2026-01-15T13:16:06.250000

2 posts

An attacker with limited permissions may still be able to write files to specific locations on the device, potentially leading to system manipulation.

cR0w at 2026-01-15T15:12:33.115Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

cR0w@infosec.exchange at 2026-01-15T15:12:33.000Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

CVE-2026-22910
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-15T13:16:05.673000

3 posts

The device is deployed with weak and publicly known default passwords for certain hidden user levels, increasing the risk of unauthorized access. This represents a high risk to the integrity of the system.

cR0w at 2026-01-15T15:12:33.115Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

thehackerwire@mastodon.social at 2026-01-15T13:51:50.000Z ##

🟠 CVE-2026-22910 - High (7.5)

The device is deployed with weak and publicly known default passwords for certain hidden user levels, increasing the risk of unauthorized access. This represents a high risk to the integrity of the system.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

cR0w@infosec.exchange at 2026-01-15T15:12:33.000Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

CVE-2026-22909
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-15T13:16:05.537000

3 posts

Certain system functions may be accessed without proper authorization, allowing attackers to start, stop, or delete installed applications, potentially disrupting system operations.

cR0w at 2026-01-15T15:12:33.115Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

thehackerwire@mastodon.social at 2026-01-15T13:48:29.000Z ##

🟠 CVE-2026-22909 - High (7.5)

Certain system functions may be accessed without proper authorization, allowing attackers to start, stop, or delete installed applications, potentially disrupting system operations.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

cR0w@infosec.exchange at 2026-01-15T15:12:33.000Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

CVE-2026-22908
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-01-15T13:16:05.400000

3 posts

Uploading unvalidated container images may allow remote attackers to gain full access to the system, potentially compromising its integrity and confidentiality.

cR0w at 2026-01-15T15:12:33.115Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

thehackerwire@mastodon.social at 2026-01-15T13:48:21.000Z ##

🔴 CVE-2026-22908 - Critical (9.1)

Uploading unvalidated container images may allow remote attackers to gain full access to the system, potentially compromising its integrity and confidentiality.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

cR0w@infosec.exchange at 2026-01-15T15:12:33.000Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

CVE-2026-0713
(8.3 HIGH)

EPSS: 0.00%

updated 2026-01-15T13:16:04.707000

3 posts

A security vulnerability in the /apis/dashboard.grafana.app/* endpoints allows authenticated users to bypass dashboard and folder permissions. The vulnerability affects all API versions (v0alpha1, v1alpha1, v2alpha1). Impact: - Viewers can view all dashboards/folders regardless of permissions - Editors can view/edit/delete all dashboards/folders regardless of permissions - Editors can create dashb

cR0w at 2026-01-15T15:12:33.115Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

thehackerwire@mastodon.social at 2026-01-15T13:52:09.000Z ##

🟠 CVE-2026-0713 - High (8.3)

A security vulnerability in the /apis/dashboard.grafana.app/* endpoints allows authenticated users to bypass dashboard and folder permissions. The vulnerability affects all API versions (v0alpha1, v1alpha1, v2alpha1). Impact: - Viewers can view al...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

cR0w@infosec.exchange at 2026-01-15T15:12:33.000Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

CVE-2026-0712
(7.6 HIGH)

EPSS: 0.00%

updated 2026-01-15T13:16:04.490000

3 posts

An open redirect vulnerability has been identified in Grafana OSS that can be exploited to achieve XSS attacks. The vulnerability was introduced in Grafana v11.5.0. The open redirect can be chained with path traversal vulnerabilities to achieve XSS. Fixed in versions 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01 and 11.3.8+security-01

cR0w at 2026-01-15T15:12:33.115Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

thehackerwire@mastodon.social at 2026-01-15T13:51:59.000Z ##

🟠 CVE-2026-0712 - High (7.6)

An open redirect vulnerability has been identified in Grafana OSS that can be exploited to achieve XSS attacks. The vulnerability was introduced in Grafana v11.5.0. The open redirect can be chained with path traversal vulnerabilities to achieve XS...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

cR0w@infosec.exchange at 2026-01-15T15:12:33.000Z ##

SICK vulns, bro.

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

CVE-2025-64155
(9.8 CRITICAL)

EPSS: 0.09%

updated 2026-01-14T21:37:40.197000

5 posts

An improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet FortiSIEM 7.4.0, FortiSIEM 7.3.0 through 7.3.4, FortiSIEM 7.1.0 through 7.1.8, FortiSIEM 7.0.0 through 7.0.4, FortiSIEM 6.7.0 through 6.7.10 may allow an attacker to execute unauthorized code or commands via crafted TCP requests.

3 repos

https://github.com/cyberdudebivash/CYBERDUDEBIVASH-FortiSIEM-CVE-2025-64155-Scanner

https://github.com/purehate/CVE-2025-64155-hunter

https://github.com/horizon3ai/CVE-2025-64155

benzogaga33@mamot.fr at 2026-01-15T10:40:03.000Z ##

Un exploit est disponible pour cette nouvelle faille critique dans Fortinet FortiSIEM : CVE-2025-64155 it-connect.fr/fortinet-fortisi #ActuCybersécurité #Cybersécurité #Vulnérabilité #Fortinet

##

benzogaga33@mamot.fr at 2026-01-15T10:40:03.000Z ##

Un exploit est disponible pour cette nouvelle faille critique dans Fortinet FortiSIEM : CVE-2025-64155 it-connect.fr/fortinet-fortisi #ActuCybersécurité #Cybersécurité #Vulnérabilité #Fortinet

##

DarkWebInformer@infosec.exchange at 2026-01-14T19:20:59.000Z ##

‼️CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution

Exploit/PoC: github.com/horizon3ai/CVE-2025

CVSS: 9.4
Published: Jan 13, 2026

Writeup: horizon3.ai/attack-research/di

Advisory: fortiguard.fortinet.com/psirt/

##

_r_netsec@infosec.exchange at 2026-01-13T18:43:06.000Z ##

CVE-2025-64155: 3 Years of Remotely Rooting the Fortinet FortiSIEM horizon3.ai/attack-research/di

##

cR0w@infosec.exchange at 2026-01-13T18:20:20.000Z ##

RE: infosec.exchange/@cR0w/1158888

Well would you look at that. Write-up now available. Go fuck up some FortiShit.

horizon3.ai/attack-research/di

##

CVE-2026-22184
(9.8 CRITICAL)

EPSS: 0.16%

updated 2026-01-14T21:35:08

2 posts

zlib versions up to and including 1.3.1.2 contain a global buffer overflow in the untgz utility. The TGZfname() function copies an attacker-supplied archive name from argv[] into a fixed-size 1024-byte static global buffer using an unbounded strcpy() call without length validation. Supplying an archive name longer than 1024 bytes results in an out-of-bounds write that can lead to memory corruption

veit@mastodon.social at 2026-01-08T08:32:49.000Z ##

There is a critical security vulnerability in zlib that allows code smuggling. Currently, there does not appear to be an update available.
seclists.org/fulldisclosure/20
nvd.nist.gov/vuln/detail/CVE-2
#Security #zlib #Vulnerability

##

cR0w@infosec.exchange at 2026-01-07T20:45:14.000Z ##

sev:CRIT BoF in zlib.

zlib versions up to and including 1.3.1.2 contain a global buffer overflow in the untgz utility. The TGZfname() function copies an attacker-supplied archive name from argv[] into a fixed-size 1024-byte static global buffer using an unbounded strcpy() call without length validation. Supplying an archive name longer than 1024 bytes results in an out-of-bounds write that can lead to memory corruption, denial of service, and potentially code execution depending on compiler, build flags, architecture, and memory layout. The overflow occurs prior to any archive parsing or validation.

cve.org/CVERecord?id=CVE-2026-

##

CVE-2026-0732
(6.3 MEDIUM)

EPSS: 0.25%

updated 2026-01-14T21:34:06

1 posts

A vulnerability was found in D-Link DI-8200G 17.12.20A1. This affects an unknown function of the file /upgrade_filter.asp. The manipulation of the argument path results in command injection. The attack may be performed from remote. The exploit has been made public and could be used.

CVE-2026-23550
(10.0 CRITICAL)

EPSS: 0.04%

updated 2026-01-14T21:15:54.193000

2 posts

Incorrect Privilege Assignment vulnerability in Modular DS allows Privilege Escalation.This issue affects Modular DS: from n/a through 2.5.1.

1 repos

https://github.com/cyberdudebivash/CYBERDUDEBIVASH-Modular-DS-CVE-2026-23550-Detector

beyondmachines1 at 2026-01-15T20:01:43.116Z ##

Critical Privilege Escalation in Modular DS WordPress Plugin Actively Exploited

Attackers are exploiting a CVSS 10.0 vulnerability in the Modular DS WordPress plugin to gain unauthenticated administrative access and full site control. The flaw, tracked as CVE-2026-23550, allows hackers to bypass authentication by manipulating URL parameters.

**If you are using Modular DS plugin, this is urgent! Updat to version 2.5.2 immediately, because your site is being hacked. If you can't update, disable the plugin. After patching, check your WordPress user list for any unauthorized administrator accounts created recently.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-01-15T20:01:43.000Z ##

Critical Privilege Escalation in Modular DS WordPress Plugin Actively Exploited

Attackers are exploiting a CVSS 10.0 vulnerability in the Modular DS WordPress plugin to gain unauthenticated administrative access and full site control. The flaw, tracked as CVE-2026-23550, allows hackers to bypass authentication by manipulating URL parameters.

**If you are using Modular DS plugin, this is urgent! Updat to version 2.5.2 immediately, because your site is being hacked. If you can't update, disable the plugin. After patching, check your WordPress user list for any unauthorized administrator accounts created recently.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

CVE-2025-59468
(9.0 CRITICAL)

EPSS: 0.30%

updated 2026-01-14T20:58:35.693000

1 posts

This vulnerability allows a Backup Administrator to perform remote code execution (RCE) as the postgres user by sending a malicious password parameter.

CVE-2026-20953
(8.4 HIGH)

EPSS: 0.03%

updated 2026-01-14T19:56:25.570000

1 posts

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.

CVE-2025-66049
(7.5 HIGH)

EPSS: 0.06%

updated 2026-01-14T18:32:20

1 posts

Vivotek IP7137 camera with firmware version 0200a is vulnerable to an information disclosure issue where live camera footage can be accessed through the RTSP protocol on port 8554 without requiring authentication. This allows unauthorized users with network access to view the camera's feed, potentially compromising user privacy and security.  The vendor has not replied to the CNA. Possibly all fir

CVE-2025-67399
(4.6 MEDIUM)

EPSS: 0.02%

updated 2026-01-14T18:31:43

1 posts

An issue in AIRTH SMART HOME AQI MONITOR Bootloader v.1.005 allows a physically proximate attacker to obtain sensitive information via the UART port of the BK7231N controller (Wi-Fi and BLE module) on the device is open to access

1 repos

https://github.com/rupeshsurve04/CVE-2025-67399

cR0w@infosec.exchange at 2026-01-14T17:18:24.000Z ##

I'm not concerned about this as a security concern, but I know people around here like their AQI monitors so this might be handy for folks trying to hack theirs for other functionality.

github.com/rupeshsurve04/CVE-2

##

CVE-2026-22858
(0 None)

EPSS: 0.04%

updated 2026-01-14T18:16:43.520000

1 posts

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, global-buffer-overflow was observed in FreeRDP's Base64 decoding path. The root cause appears to be implementation-defined char signedness: on Arm/AArch64 builds, plain char is treated as unsigned, so the guard c <= 0 can be optimized into a simple c != 0 check. As a result, non-ASCII bytes (e.g., 0x80-0xFF) may bypa

CVE-2026-22857
(0 None)

EPSS: 0.04%

updated 2026-01-14T18:16:43.373000

1 posts

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a heap use-after-free occurs in irp_thread_func because the IRP is freed by irp->Complete() and then accessed again on the error path. This vulnerability is fixed in 3.20.1.

CVE-2026-22856
(0 None)

EPSS: 0.04%

updated 2026-01-14T18:16:43.230000

1 posts

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a race in the serial channel IRP thread tracking allows a heap use‑after‑free when one thread removes an entry from serial->IrpThreads while another reads it. This vulnerability is fixed in 3.20.1.

CVE-2026-22855
(0 None)

EPSS: 0.04%

updated 2026-01-14T18:16:43.080000

1 posts

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a heap out-of-bounds read occurs in the smartcard SetAttrib path when cbAttrLen does not match the actual NDR buffer length. This vulnerability is fixed in 3.20.1.

CVE-2026-22854
(0 None)

EPSS: 0.04%

updated 2026-01-14T18:16:42.933000

1 posts

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a heap-buffer-overflow occurs in drive read when a server-controlled read length is used to read file data into an IRP output stream buffer without a hard upper bound, allowing an oversized read to overwrite heap memory. This vulnerability is fixed in 3.20.1.

CVE-2026-22852
(0 None)

EPSS: 0.04%

updated 2026-01-14T18:16:42.643000

1 posts

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a malicious RDP server can trigger a heap-buffer-overflow write in the FreeRDP client when processing Audio Input (AUDIN) format lists. audin_process_formats reuses callback->formats_count across multiple MSG_SNDIN_FORMATS PDUs and writes past the newly allocated formats array, causing memory corruption and a crash.

CVE-2026-22851
(0 None)

EPSS: 0.04%

updated 2026-01-14T18:16:42.490000

1 posts

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a race condition between the RDPGFX dynamic virtual channel thread and the SDL render thread leads to a heap use-after-free. Specifically, an escaped pointer to sdl->primary (SDL_Surface) is accessed after it has been freed during RDPGFX ResetGraphics handling. This vulnerability is fixed in 3.20.1.

CVE-2026-0404
(0 None)

EPSS: 0.51%

updated 2026-01-14T16:26:00.933000

1 posts

An insufficient input validation vulnerability in NETGEAR Orbi devices' DHCPv6 functionality allows network adjacent attackers authenticated over WiFi or on LAN to execute OS command injections on the router. DHCPv6 is not enabled by default.

CVE-2025-71026
(0 None)

EPSS: 0.02%

updated 2026-01-14T16:26:00.933000

1 posts

Tenda AX-3 v16.03.12.10_CN was discovered to contain a stack overflow in the wanSpeed2 parameter of the fromAdvSetMacMtuWan function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

CVE-2025-71027
(0 None)

EPSS: 0.02%

updated 2026-01-14T16:26:00.933000

1 posts

Tenda AX-3 v16.03.12.10_CN was discovered to contain a stack overflow in the wanMTU2 parameter of the fromAdvSetMacMtuWan function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

CVE-2025-68703
(0 None)

EPSS: 0.02%

updated 2026-01-14T16:25:40.430000

1 posts

Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libraries. Prior to 2.2, the salt is derived from sha256Sum(passphrase). Two encryption operations with the same password will have the same derived key. This vulnerability is fixed in 2.2.

cR0w@infosec.exchange at 2026-01-13T19:40:53.000Z ##

I don't know this project ( Jervis ) but the fact that there are five crypto-related vulns at once seems like a legitimate opportunity for people to learn from someone else's mistakes. I don't understand many crypto vulns so they always fascinate me.

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

##

CVE-2025-68702
(0 None)

EPSS: 0.03%

updated 2026-01-14T16:25:40.430000

1 posts

Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libraries. Prior to 2.2, Jervis uses padLeft(32, '0') when it should use padLeft(64, '0') because SHA-256 produces 32 bytes which equates to 64 hex characters. This vulnerability is fixed in 2.2.

cR0w@infosec.exchange at 2026-01-13T19:40:53.000Z ##

I don't know this project ( Jervis ) but the fact that there are five crypto-related vulns at once seems like a legitimate opportunity for people to learn from someone else's mistakes. I don't understand many crypto vulns so they always fascinate me.

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

##

CVE-2025-37166
(7.5 HIGH)

EPSS: 0.02%

updated 2026-01-14T16:25:40.430000

1 posts

A vulnerability affecting HPE Networking Instant On Access Points has been identified where a device processing a specially crafted packet could enter a non-responsive state, in some cases requiring a hard reset to re-establish services. A malicious actor could leverage this vulnerability to conduct a Denial-of-Service attack on a target network.

CVE-2026-0408
(0 None)

EPSS: 0.04%

updated 2026-01-14T16:25:40.430000

1 posts

A path traversal vulnerability in NETGEAR WiFi range extenders allows an attacker with LAN authentication to access the router's IP and review the contents of the dynamically generated webproc file, which records the username and password submitted to the router GUI.

CVE-2025-14338
(0 None)

EPSS: 0.02%

updated 2026-01-14T16:25:12.057000

1 posts

Polkit authentication dis isabled by default and a race condition in the Polkit authorization check in versions before v0.69.0 can lead to the same issues as in CVE-2025-66005.

andersonc0d3@infosec.exchange at 2026-01-09T18:41:59.000Z ##

InputPlumber: Lack of D-Bus Authorization and Input Verification allows UI Input Injection and Denial-of-Service (CVE-2025-66005, CVE-2025-14338)

security.opensuse.org/2026/01/

##

CVE-2025-67859(CVSS UNKNOWN)

EPSS: 0.02%

updated 2026-01-14T12:31:48

1 posts

A Improper Authentication vulnerability in TLP allows local users to arbitrarily control the power profile in use as well as the daemon’s log settings.This issue affects TLP: from 1.9 before 1.9.1.

andersonc0d3@infosec.exchange at 2026-01-07T23:12:24.000Z ##

TLP: Polkit Authentication Bypass in Profiles Daemon in Version 1.9.0 (CVE-2025-67859)

security.opensuse.org/2026/01/

##

CVE-2025-66005(CVSS UNKNOWN)

EPSS: 0.01%

updated 2026-01-14T12:31:39

1 posts

Lack of authorization of the InputManager D-Bus interface in InputPlumber versions before v0.63.0 can lead to local Denial-of-Service, information leak or even privilege escalation in the context of the currently active user session.

andersonc0d3@infosec.exchange at 2026-01-09T18:41:59.000Z ##

InputPlumber: Lack of D-Bus Authorization and Input Verification allows UI Input Injection and Denial-of-Service (CVE-2025-66005, CVE-2025-14338)

security.opensuse.org/2026/01/

##

CVE-2025-60188
(7.5 HIGH)

EPSS: 3.13%

updated 2026-01-14T00:31:25

1 posts

Insertion of Sensitive Information Into Sent Data vulnerability in Vito Peleg Atarim atarim-visual-collaboration allows Retrieve Embedded Sensitive Data.This issue affects Atarim: from n/a through <= 4.2.

Nuclei template

1 repos

https://github.com/m4sh-wacker/CVE-2025-60188-Atarim-Plugin-Exploit

CVE-2025-14847
(7.5 HIGH)

EPSS: 57.25%

updated 2026-01-13T22:24:20.380000

8 posts

Mismatched length fields in Zlib compressed protocol headers may allow a read of uninitialized heap memory by an unauthenticated client. This issue affects all MongoDB Server v7.0 prior to 7.0.28 versions, MongoDB Server v8.0 versions prior to 8.0.17, MongoDB Server v8.2 versions prior to 8.2.3, MongoDB Server v6.0 versions prior to 6.0.27, MongoDB Server v5.0 versions prior to 5.0.32, MongoDB Ser

Nuclei template

37 repos

https://github.com/demetriusford/mongobleed

https://github.com/AmadoBatista/mongobleed

https://github.com/sakthivel10q/sakthivel10q.github.io

https://github.com/Ashwesker/Ashwesker-CVE-2025-14847

https://github.com/tunahantekeoglu/MongoDeepDive

https://github.com/chinaxploiter/CVE-2025-14847-PoC

https://github.com/Systemhaus-Schulz/MongoBleed-CVE-2025-14847

https://github.com/JemHadar/MongoBleed-DFIR-Triage-Script-CVE-2025-14847

https://github.com/keraattin/Mongobleed-Detector-CVE-2025-14847

https://github.com/Rishi-kaul/CVE-2025-14847-MongoBleed

https://github.com/alexcyberx/CVE-2025-14847_Expolit

https://github.com/FurkanKAYAPINAR/CVE-2025-14847-MongoBleed-Exploit

https://github.com/14mb1v45h/CYBERDUDEBIVASH-MONGODB-DETECTOR-v2026

https://github.com/lincemorado97/CVE-2025-14847

https://github.com/pedrocruz2202/pedrocruz2202.github.io

https://github.com/franksec42/mongobleed-exploit-CVE-2025-14847

https://github.com/joshuavanderpoll/CVE-2025-14847

https://github.com/ElJoamy/MongoBleed-exploit

https://github.com/saereya/CVE-2025-14847---MongoBleed

https://github.com/pedrocruz2202/mongobleed-scanner

https://github.com/NoNameError/MongoBLEED---CVE-2025-14847-POC-

https://github.com/onewinner/CVE-2025-14847

https://github.com/kuyrathdaro/cve-2025-14847

https://github.com/cybertechajju/CVE-2025-14847_Expolit

https://github.com/KingHacker353/CVE-2025-14847_Expolit

https://github.com/AdolfBharath/mongobleed

https://github.com/peakcyber-security/CVE-2025-14847

https://github.com/vfa-tuannt/CVE-2025-14847

https://github.com/j0lt-github/mongobleedburp

https://github.com/ProbiusOfficial/CVE-2025-14847

https://github.com/CadGoose/MongoBleed-CVE-2025-14847-Fully-Automated-scanner

https://github.com/Security-Phoenix-demo/mongobleed-exploit-CVE-2025-14847

https://github.com/Black1hp/mongobleed-scanner

https://github.com/waheeb71/CVE-2025-14847

https://github.com/sahar042/CVE-2025-14847

https://github.com/nma-io/mongobleed

https://github.com/sakthivel10q/CVE-2025-14847

MongoDB@activitypub.awakari.com at 2026-01-10T07:36:00.000Z ## MongoBleed Vulnerability Allows Attackers to Read Data from MongoDB's Heap Memory MongoDB recently patched CVE-2025-14847, a vulnerability affecting multiple supported and legacy MongoDB Server...

#Common #Vulnerabilities #and #Exposures #MongoDB #Compression #Cloud #Security #AI, #ML #&

Origin | Interest | Match ##

MongoDB@activitypub.awakari.com at 2026-01-10T07:36:00.000Z ## MongoBleed Vulnerability Allows Attackers to Read Data from MongoDB's Heap Memory MongoDB recently patched CVE-2025-14847, a vulnerability affecting multiple supported and legacy MongoDB Server...

#Compression #Common #Vulnerabilities #and #Exposures #Cloud #Security #MongoDB #AI, #ML #&

Origin | Interest | Match ##

cR0w@infosec.exchange at 2026-01-13T20:52:25.000Z ##

Did PANW just take a couple months off? They're just now publishing a threat brief on MongoBleed? Maybe that's why we haven't seen any advisories from them. Can't wait to see what's been sitting EITW in their queues.

unit42.paloaltonetworks.com/mo

##

MongoDB@activitypub.awakari.com at 2026-01-06T19:36:57.000Z ## Urgent Security Update: Patching “Mongobleed” (CVE-2025-14847) in Percona Server for MongoDB At Percona, our mission has always been to provide the community with truly open-source, enterprise-...

#MongoDB #Percona #Software #mongobleed #percona #server #for #MongoDB

Origin | Interest | Match ##

MongoDB@activitypub.awakari.com at 2026-01-10T07:36:00.000Z ## MongoBleed Vulnerability Allows Attackers to Read Data from MongoDB's Heap Memory MongoDB recently patched CVE-2025-14847, a vulnerability affecting multiple supported and legacy MongoDB Server...

#Compression #MongoDB #Cloud #Security #Common #Vulnerabilities #and #Exposures #AI, #ML #&

Origin | Interest | Match ##

MongoDB@activitypub.awakari.com at 2026-01-10T07:36:00.000Z ## MongoBleed Vulnerability Allows Attackers to Read Data from MongoDB's Heap Memory MongoDB recently patched CVE-2025-14847, a vulnerability affecting multiple supported and legacy MongoDB Server...

#MongoDB #Cloud #Security #Compression #Common #Vulnerabilities #and #Exposures #AI, #ML #&

Origin | Interest | Match ##

MongoDB@activitypub.awakari.com at 2026-01-10T07:36:00.000Z ## MongoBleed Vulnerability Allows Attackers to Read Data From MongoDB's Heap Memory MongoDB recently patched CVE-2025-14847, a vulnerability affecting multiple supported and legacy MongoDB Server...

#Compression #MongoDB #Cloud #Security #Common #Vulnerabilities #and #Exposures #AI, #ML #&

Origin | Interest | Match ##

MongoDB@activitypub.awakari.com at 2026-01-10T07:36:00.000Z ## MongoBleed Vulnerability Allows Attackers to Read Data From MongoDB's Heap Memory MongoDB recently patched CVE-2025-14847, a vulnerability affecting multiple supported and legacy MongoDB Server...

#MongoDB #Cloud #Security #Compression #Common #Vulnerabilities #and #Exposures #AI, #ML #&

Origin | Interest | Match ##

CVE-2026-22697
(7.5 HIGH)

EPSS: 0.07%

updated 2026-01-13T22:16:07.690000

1 posts

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, CryptoLib’s KMC crypto service integration is vulnerable to a heap buffer overflow when decoding Base64-encoded ciphertext/cleartext fields retur

CVE-2026-0838
(8.8 HIGH)

EPSS: 0.07%

updated 2026-01-13T22:02:34.320000

1 posts

A security flaw has been discovered in UTT 进取 520W 1.7.7-180627. This impacts the function strcpy of the file /goform/ConfigWirelessBase. Performing a manipulation of the argument ssid results in buffer overflow. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did no

CVE-2026-0841
(8.8 HIGH)

EPSS: 0.07%

updated 2026-01-13T21:55:32.140000

1 posts

A vulnerability was detected in UTT 进取 520W 1.7.7-180627. Affected by this issue is the function strcpy of the file /goform/formPictureUrl. The manipulation of the argument importpictureurl results in buffer overflow. It is possible to launch the attack remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2025-68493
(8.1 HIGH)

EPSS: 0.06%

updated 2026-01-13T21:49:04

2 posts

Missing XML Validation vulnerability in Apache Struts, Apache Struts. This issue affects Apache Struts: from 2.0.0 before 2.2.1; Apache Struts: from 2.2.1 through 6.1.0. Users are recommended to upgrade to version 6.1.1, which fixes the issue.

Hackread@mstdn.social at 2026-01-15T11:54:58.000Z ##

📢⚠️ Years-old vulnerable Apache Struts 2 versions were downloaded 387K+ times in one week, despite a high-severity CVE-2025-68493 flaw - Patch to 6.1.1 now!

Read: hackread.com/years-old-vulnera

#Cybersecurity #ApacheStruts #Vulnerability #InfoSec #DevSecOps

##

Hackread@mstdn.social at 2026-01-15T11:54:58.000Z ##

📢⚠️ Years-old vulnerable Apache Struts 2 versions were downloaded 387K+ times in one week, despite a high-severity CVE-2025-68493 flaw - Patch to 6.1.1 now!

Read: hackread.com/years-old-vulnera

#Cybersecurity #ApacheStruts #Vulnerability #InfoSec #DevSecOps

##

CVE-2025-68925(CVSS UNKNOWN)

EPSS: 0.03%

updated 2026-01-13T21:41:23

1 posts

### Vulnerability https://github.com/samrocketman/jervis/blob/157d2b63ffa5c4bb1d8ee2254950fd2231de2b05/src/main/groovy/net/gleske/jervis/tools/SecurityIO.groovy#L244-L249 The code doesn't validate that the JWT header specifies `"alg":"RS256"`. ### Impact Depending on the broader system, this could allow JWT forgery. Internally this severity is low since JWT is only intended to interface with

cR0w@infosec.exchange at 2026-01-13T19:40:53.000Z ##

I don't know this project ( Jervis ) but the fact that there are five crypto-related vulns at once seems like a legitimate opportunity for people to learn from someone else's mistakes. I don't understand many crypto vulns so they always fascinate me.

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

##

CVE-2025-68704(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-01-13T21:41:13

1 posts

### Vulnerability https://github.com/samrocketman/jervis/blob/157d2b63ffa5c4bb1d8ee2254950fd2231de2b05/src/main/groovy/net/gleske/jervis/tools/SecurityIO.groovy#L593-L594 Uses `java.util.Random()` which is not cryptographically secure. ### Impact If an attacker can predict the random delays, they may still be able to perform timing attacks. ### Patches Jervis will use `SecureRandom` for timi

cR0w@infosec.exchange at 2026-01-13T19:40:53.000Z ##

I don't know this project ( Jervis ) but the fact that there are five crypto-related vulns at once seems like a legitimate opportunity for people to learn from someone else's mistakes. I don't understand many crypto vulns so they always fascinate me.

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

##

CVE-2025-68701(CVSS UNKNOWN)

EPSS: 0.03%

updated 2026-01-13T21:40:57

1 posts

### Vulnerability https://github.com/samrocketman/jervis/blob/157d2b63ffa5c4bb1d8ee2254950fd2231de2b05/src/main/groovy/net/gleske/jervis/tools/SecurityIO.groovy#L866-L874 https://github.com/samrocketman/jervis/blob/157d2b63ffa5c4bb1d8ee2254950fd2231de2b05/src/main/groovy/net/gleske/jervis/tools/SecurityIO.groovy#L891-L900 Same passphrase + same plaintext = same ciphertext (IV reuse) ### Impact

cR0w@infosec.exchange at 2026-01-13T19:40:53.000Z ##

I don't know this project ( Jervis ) but the fact that there are five crypto-related vulns at once seems like a legitimate opportunity for people to learn from someone else's mistakes. I don't understand many crypto vulns so they always fascinate me.

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

##

CVE-2025-71023
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-13T21:32:48

1 posts

Tenda AX-3 v16.03.12.10_CN was discovered to contain a stack overflow in the mac2 parameter of the fromAdvSetMacMtuWan function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

CVE-2026-20805
(5.5 MEDIUM)

EPSS: 5.16%

updated 2026-01-13T21:31:44

5 posts

Exposure of sensitive information to an unauthorized actor in Desktop Windows Manager allows an authorized attacker to disclose information locally.

1 repos

https://github.com/fevar54/CVE-2026-20805-POC

thehackerwire@mastodon.social at 2026-01-15T00:45:54.000Z ##

Microsoft patched an actively exploited Windows DWM flaw (CVE-2026-20805) in January Patch Tuesday.

CISA added it to the KEV list within hours, warning of real-world attacks.
Patch now. Medium severity, high impact when chained.

#Windows #PatchTuesday #CyberSecurity #CVE

##

youranonnewsirc@nerdculture.de at 2026-01-14T15:22:47.000Z ##

Here's a summary of the most important world, technology, and cybersecurity news from the last 24-48 hours:

World: A train crash in Thailand killed at least 22 people (Jan 14). US President Trump warned Iran amid protests and reaffirmed his desire to acquire Greenland (Jan 14).

Technology: Big Tech companies are heavily investing in energy infrastructure to power their AI ambitions amidst growing backlash over resource usage (Jan 14). Apple's status as a tech visionary is being questioned amidst the rapid AI advancements (Jan 14).

Cybersecurity: CISA and Microsoft patched an actively exploited Windows information disclosure vulnerability (CVE-2026-20805) (Jan 13-14). The World Economic Forum's 2026 outlook highlights enterprise security facing a "three-front war" from cybercrime, AI misuse, and supply chain attacks (Jan 13).

#News #Anonymous #AnonNews_irc

##

DarkWebInformer@infosec.exchange at 2026-01-14T00:56:14.000Z ##

‼️ CVE-2026-20805: Microsoft Windows Information Disclosure Vulnerability has been added to the CISA KEV Catalog

darkwebinformer.com/cisa-kev-c

0-day: Yes
CVSS: 5.5

This vulnerability was patched during January 13th, 2026 Patch Tuesday.

##

cisakevtracker@mastodon.social at 2026-01-13T20:00:59.000Z ##

CVE ID: CVE-2026-20805
Vendor: Microsoft
Product: Windows
Date Added: 2026-01-13
Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

cR0w@infosec.exchange at 2026-01-13T18:01:19.000Z ##

The EITW one is in the Desktop Window Manager.

msrc.microsoft.com/update-guid

##

CVE-2026-22813(CVSS UNKNOWN)

EPSS: 0.08%

updated 2026-01-13T20:36:43

1 posts

### Summary A malicious website can abuse the server URL override feature of the OpenCode web UI to achieve cross-site scripting on `http://localhost:4096`. From there, it is possible to run arbitrary commands on the local system using the `/pty/` endpoints provided by the OpenCode API. ### Code execution via OpenCode API - The OpenCode API has `/pty/` endpoints that allow spawning arbitrary pro

beyondmachines1@infosec.exchange at 2026-01-13T12:01:43.000Z ##

OpenCode patches critical RCE flaw in Web UI

OpenCode patched a critical XSS vulnerability (CVE-2026-22813) that allowed malicious websites to execute arbitrary commands on a user's local system by abusing the tool's internal API.

**If you are using OpenCode, update to version 1.1.10 ASAP to disable the vulnerable web UI and API. Avoid clicking untrusted links, check underling URLs and don't click on any links that you haven't crafted but point to your local machine's ports .**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-66177
(8.8 HIGH)

EPSS: 0.02%

updated 2026-01-13T18:32:08

1 posts

There is a Stack overflow Vulnerability in the device Search and Discovery feature of Hikvision NVR/DVR/CVR/IPC models. If exploited, an attacker on the same local area network (LAN) could cause the device to malfunction by sending specially crafted packets to an unpatched device.

CVE-2026-21265
(6.4 MEDIUM)

EPSS: 0.18%

updated 2026-01-13T18:31:19

1 posts

Windows Secure Boot stores Microsoft certificates in the UEFI KEK and DB. These original certificates are approaching expiration, and devices containing affected certificate versions must update them to maintain Secure Boot functionality and avoid compromising security by losing security fixes related to Windows boot manager or Secure Boot. The operating system’s certificate update protection mech

cR0w@infosec.exchange at 2026-01-13T18:04:31.000Z ##

The publicly disclosed ones are expiring Secure Boot cert:

msrc.microsoft.com/update-guid

and an old one that was published in 2023 but is apparently now applicable to all Windows systems with the Agere Soft Modem installed, even if it isn't in use.

msrc.microsoft.com/update-guid

cve.org/CVERecord?id=CVE-2023-

##

CVE-2026-20965
(7.6 HIGH)

EPSS: 0.04%

updated 2026-01-13T18:31:18

4 posts

Improper verification of cryptographic signature in Windows Admin Center allows an authorized attacker to elevate privileges locally.

cR0w at 2026-01-15T15:48:00.807Z ##

Stupid cloud anyway.

cymulate.com/blog/cve-2026-209

##

_r_netsec at 2026-01-15T15:43:06.677Z ##

CVE-2026-20965: Cymulate Research Labs Discovers Token Validation Flaw that Leads to Tenant-Wide RCE in Azure Windows Admin Center cymulate.com/blog/cve-2026-209

##

cR0w@infosec.exchange at 2026-01-15T15:48:00.000Z ##

Stupid cloud anyway.

cymulate.com/blog/cve-2026-209

##

_r_netsec@infosec.exchange at 2026-01-15T15:43:06.000Z ##

CVE-2026-20965: Cymulate Research Labs Discovers Token Validation Flaw that Leads to Tenant-Wide RCE in Azure Windows Admin Center cymulate.com/blog/cve-2026-209

##

CVE-2026-20952
(8.4 HIGH)

EPSS: 0.03%

updated 2026-01-13T18:31:18

1 posts

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.

CVE-2026-20944
(8.4 HIGH)

EPSS: 0.03%

updated 2026-01-13T18:31:18

1 posts

Out-of-bounds read in Microsoft Office Word allows an unauthorized attacker to execute code locally.

CVE-2026-0407(CVSS UNKNOWN)

EPSS: 0.05%

updated 2026-01-13T18:31:16

1 posts

An insufficient authentication vulnerability in NETGEAR WiFi range extenders allows a network adjacent attacker with WiFi authentication or a physical Ethernet port connection to bypass the authentication process and access the admin panel.

CVE-2025-59922
(7.2 HIGH)

EPSS: 0.03%

updated 2026-01-13T18:31:14

1 posts

An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability [CWE-89] vulnerability in Fortinet FortiClientEMS 7.4.3 through 7.4.4, FortiClientEMS 7.4.0 through 7.4.1, FortiClientEMS 7.2.0 through 7.2.10, FortiClientEMS 7.0 all versions may allow an authenticated attacker with at least read-only admin permission to execute unauthorized SQL code or commands

_r_netsec@infosec.exchange at 2026-01-14T09:43:06.000Z ##

Fortinet Forticlient EMS RCE CVE-2025-59922 and one IMG tag to rule them all baldur.dk/blog/fortinet-ems-rc

##

CVE-2025-37165
(7.5 HIGH)

EPSS: 0.03%

updated 2026-01-13T18:31:14

1 posts

A vulnerability in the router mode configuration of HPE Instant On Access Points exposed certain network configuration details to unintended interfaces. A malicious actor could gain knowledge of internal network configuration details through inspecting impacted packets.

CVE-2026-0405(CVSS UNKNOWN)

EPSS: 0.09%

updated 2026-01-13T18:31:14

1 posts

An authentication bypass vulnerability in NETGEAR Orbi devices allows users connected to the local network to access the router web interface as an admin.

CVE-2026-0386
(7.5 HIGH)

EPSS: 0.08%

updated 2026-01-13T18:31:13

1 posts

Improper access control in Windows Deployment Services allows an unauthorized attacker to execute code over an adjacent network.

CVE-2025-70753(CVSS UNKNOWN)

EPSS: 0.02%

updated 2026-01-13T18:31:12

1 posts

Tenda AX-1806 v1.0.0.1 was discovered to contain a stack overflow in the security_5g parameter of the sub_4CA50 function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

CVE-2025-71025(CVSS UNKNOWN)

EPSS: 0.02%

updated 2026-01-13T18:31:12

1 posts

Tenda AX-3 v16.03.12.10_CN was discovered to contain a stack overflow in the cloneType2 parameter of the fromAdvSetMacMtuWan function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

CVE-2025-71024(CVSS UNKNOWN)

EPSS: 0.02%

updated 2026-01-13T18:31:12

1 posts

Tenda AX-3 v16.03.12.10_CN was discovered to contain a stack overflow in the serviceName2 parameter of the fromAdvSetMacMtuWan function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

CVE-2026-0403(CVSS UNKNOWN)

EPSS: 0.05%

updated 2026-01-13T18:31:10

1 posts

An insufficient input validation vulnerability in NETGEAR Orbi routers allows attackers connected to the router's LAN to execute OS command injections.

CVE-2026-0406(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-01-13T18:31:10

1 posts

An insufficient input validation vulnerability in the NETGEAR XR1000v2 allows attackers connected to the router's LAN to execute OS command injections.

CVE-2025-68707(CVSS UNKNOWN)

EPSS: 0.05%

updated 2026-01-13T18:31:09

1 posts

An authentication bypass vulnerability in the Tongyu AX1800 Wi-Fi 6 Router with firmware 1.0.0 allows unauthenticated network-adjacent attackers to perform arbitrary configuration changes without providing credentials, as long as a valid admin session is active. This can result in full compromise of the device (i.e., via unauthenticated access to /boaform/formSaveConfig and /boaform/admin endpoint

CVE-2026-21900
(0 None)

EPSS: 0.05%

updated 2026-01-13T18:16:25.223000

1 posts

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, an out-of-bounds heap read vulnerability in cryptography_encrypt() occurs when parsing JSON metadata from KMC server responses. The flawed strtok

CVE-2025-66176
(8.8 HIGH)

EPSS: 0.02%

updated 2026-01-13T18:16:06.060000

1 posts

There is a Stack overflow Vulnerability in the device Search and Discovery feature of Hikvision Access Control Products. If exploited, an attacker on the same local area network (LAN) could cause the device to malfunction by sending specially crafted packets to an unpatched device.

youranonnewsirc@nerdculture.de at 2026-01-13T03:22:47.000Z ##

Latest global tech and cybersecurity news (Jan 12-13, 2026):

The World Economic Forum's 'Global Cybersecurity Outlook 2026' highlights AI, geopolitics, and cyber-fraud as key shapers of risk, with fraud now surpassing ransomware as a top concern. CISA added a Gogs Path Traversal vulnerability (CVE-2025-8110) to its Known Exploited Vulnerabilities Catalog due to active exploitation. A critical vulnerability (CVE-2026-21858) was found in the n8n workflow automation platform, affecting thousands of systems. In technology, Google removed some medical AI Overviews following "alarming" results.

#News #Anonymous #AnonNews_irc

##

DarkWebInformer@infosec.exchange at 2026-01-12T20:16:14.000Z ##

❗️CISA has added 1 vulnerability to the KEV Catalog:

CVE-2025-8110: Gogs Path Traversal Vulnerability

darkwebinformer.com/cisa-kev-c

##

AAKL@infosec.exchange at 2026-01-12T19:06:20.000Z ##

CISA has updated the KEV catalogue:

CVE-2025-8110: Gogs Path Traversal Vulnerability cisa.gov/known-exploited-vulne #CISA #infosec

##

cisakevtracker@mastodon.social at 2026-01-12T19:00:56.000Z ##

CVE ID: CVE-2025-8110
Vendor: Gogs
Product: Gogs
Date Added: 2026-01-12
Notes: github.com/gogs/gogs/commit/55 ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

cR0w@infosec.exchange at 2026-01-12T18:30:58.000Z ##

Remember that Gogs ../ last month? It's now in the KEV Catalog.

wiz.io/blog/wiz-research-gogs-

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-13447
(8.5 HIGH)

EPSS: 0.15%

updated 2026-01-13T15:37:12

1 posts

OS Command Injection Remote Code Execution Vulnerability in API in Progress LoadMaster allows an authenticated attacker with “User Administration” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in the API input parameters

CVE-2025-13444
(8.5 HIGH)

EPSS: 0.15%

updated 2026-01-13T15:37:12

1 posts

OS Command Injection Remote Code Execution Vulnerability in API in Progress LoadMaster allows an authenticated attacker with “User Administration” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in the API input parameters

CVE-2025-70974
(10.0 CRITICAL)

EPSS: 0.08%

updated 2026-01-13T14:03:46.203000

1 posts

Fastjson before 1.2.48 mishandles autoType because, when an @type key is in a JSON document, and the value of that key is the name of a Java class, there may be calls to certain public methods of that class. Depending on the behavior of those methods, there may be JNDI injection with an attacker-supplied payload located elsewhere in that JSON document. This was exploited in the wild in 2023 throug

cR0w@infosec.exchange at 2026-01-09T19:46:49.000Z ##

Perfect 10 in Fastjson. 🥳

It's funny that it appears to be a challenging enough bug that it bypassed at least two previous fixes.

cve.org/CVERecord?id=CVE-2025-

Fastjson before 1.2.48 mishandles autoType because, when an @type key is in a JSON document, and the value of that key is the name of a Java class, there may be calls to certain public methods of that class. Depending on the behavior of those methods, there may be JNDI injection with an attacker-supplied payload located elsewhere in that JSON document. This was exploited in the wild in 2023 through 2025. NOTE: this issue exists because of an incomplete fix for CVE-2017-18349. Also, a later bypass is covered by CVE-2022-25845.

##

CVE-2025-15035
(0 None)

EPSS: 0.03%

updated 2026-01-13T14:03:46.203000

1 posts

Improper Input Validation vulnerability in TP-Link Archer AXE75 v1.6 (vpn modules) allows an authenticated adjacent attacker to delete arbitrary server file, leading to possible loss of critical system files and service interruption or degraded functionality.This issue affects Archer AXE75 v1.6: ≤ build 20250107.

CVE-2025-67004
(6.5 MEDIUM)

EPSS: 0.04%

updated 2026-01-13T14:03:46.203000

1 posts

An Information Disclosure vulnerability in CouchCMS 2.4 allow an Admin user to read arbitrary files via traversing directories back after back. It can Disclosure the source code or any other confidential information if weaponize accordingly.

CVE-2025-64090
(10.0 CRITICAL)

EPSS: 0.08%

updated 2026-01-13T14:03:46.203000

1 posts

This vulnerability allows authenticated attackers to execute commands via the hostname of the device.

CVE-2026-0731
(5.3 MEDIUM)

EPSS: 0.18%

updated 2026-01-13T14:03:46.203000

1 posts

A vulnerability has been found in TOTOLINK WA1200 5.9c.2914. The impacted element is an unknown function of the file cstecgi.cgi of the component HTTP Request Handler. The manipulation leads to null pointer dereference. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.

CVE-2026-22079
(0 None)

EPSS: 0.02%

updated 2026-01-13T14:03:46.203000

1 posts

This vulnerability exists in Tenda wireless routers (300Mbps Wireless Router F3 and N300 Easy Setup Router) due to the plaintext transmission of login credentials during the initial login or post-factory reset setup through the web-based administrative interface. An attacker on the same network could exploit this vulnerability by intercepting network traffic and capturing the credentials transmitt

CVE-2025-69195
(7.6 HIGH)

EPSS: 0.08%

updated 2026-01-13T14:03:46.203000

1 posts

A flaw was found in GNU Wget2. This vulnerability, a stack-based buffer overflow, occurs in the filename sanitization logic when processing attacker-controlled URL paths, particularly when filename restriction options are active. A remote attacker can exploit this by providing a specially crafted URL, which, upon user interaction with wget2, can lead to memory corruption. This can cause the applic

CVE-2025-7072
(0 None)

EPSS: 0.16%

updated 2026-01-13T14:03:46.203000

1 posts

The firmware in KAON CG3000TC and CG3000T routers contains hard-coded credentials in clear text (shared across all routers of this model) that an unauthenticated remote attacker could use to execute commands with root privileges. This vulnerability has been fixed in firmware version: 1.00.67 for CG3000TC and 1.00.27 for CG3000T.

cR0w@infosec.exchange at 2026-01-09T14:02:58.000Z ##

Hardcoded creds in KAON routers but it doesn't say what those creds are.

cve.org/CVERecord?id=CVE-2025-

##

CVE-2025-61686
(9.1 CRITICAL)

EPSS: 0.06%

updated 2026-01-13T14:03:18.990000

1 posts

React Router is a router for React. In @react-router/node versions 7.0.0 through 7.9.3, @remix-run/deno prior to version 2.17.2, and @remix-run/node prior to version 2.17.2, if createFileSessionStorage() is being used from @react-router/node (or @remix-run/node/@remix-run/deno in Remix v2) with an unsigned cookie, it is possible for an attacker to cause the session to try to read/write from a loca

1 repos

https://github.com/FlowerWitch/CVE-2025-61686_docker

beyondmachines1@infosec.exchange at 2026-01-12T16:01:43.000Z ##

Critical directory traversal vulnerability reported in React Router and Remix

React Router and Remix released patches for a critical directory traversal vulnerability, CVE-2025-61686, which allows attackers to read or write server files via unsigned session cookies.

**If you are using createFileSessionStorage in React Router and Remix, this is important and urgent. Check if you are using signed cookies for session storage. If not, change that ASAP, and update packages to the latest versions immediately. Ideally, limit file system permissions of your web server process to the bare minimum.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-0855
(8.8 HIGH)

EPSS: 0.29%

updated 2026-01-13T14:03:18.990000

1 posts

Certain IP Camera models developed by Merit LILIN has a OS Command Injection vulnerability, allowing authenticated remote attackers to inject arbitrary OS commands and execute them on the device.

CVE-2025-52694
(10.0 CRITICAL)

EPSS: 0.08%

updated 2026-01-13T14:03:18.990000

1 posts

Successful exploitation of the SQL injection vulnerability could allow an unauthenticated remote attacker to execute arbitrary SQL commands on the vulnerable service when it is exposed to the Internet.

1 repos

https://github.com/Winz18/CVE-2025-52694-POC

beyondmachines1@infosec.exchange at 2026-01-12T12:01:43.000Z ##

Advantech patches maximum-severity SQL injection flaw in IoT products

Advantech patched a maximum-severity SQL injection vulnerability (CVE-2025-52694) in its IoTSuite and IoT Edge products that allows unauthenticated remote attackers to execute arbitrary database commands.

**Make sure all industrial devices are isolated from the internet and accessible from trusted networks only. Update your Advantech IoTSuite and IoT Edge software to the latest versions immediately to prevent remote database takeovers.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-12420(CVSS UNKNOWN)

EPSS: 0.07%

updated 2026-01-13T03:32:08

5 posts

A vulnerability has been identified in the ServiceNow AI Platform that could enable an unauthenticated user to impersonate another user and perform the operations that the impersonated user is entitled to perform. ServiceNow has addressed this vulnerability by deploying a relevant security update to  hosted instances in October 2025. Security updates have also been provided to ServiceNow self-hos

beyondmachines1@infosec.exchange at 2026-01-14T10:01:43.000Z ##

ServiceNow patches critical AI Platform flaw enabling user impersonation

ServiceNow patched a critical privilege escalation vulnerability (CVE-2025-12420) in its AI platform that allowed unauthenticated attackers to impersonate users and execute unauthorized actions.

**If yoy are using self hosted ServiceNow, this is very important. Make sure the API is isolated from the internet if possible and accessible from trusted networks only. Then patch. If your ServiceNow must be exposed to the internet, this is urgent. Start patching now.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

youranonnewsirc@nerdculture.de at 2026-01-14T03:22:44.000Z ##

Here's a digest of the most important news from the last 24 hours:

**World:**
US President Donald Trump ordered 25% tariffs on all countries doing business with Iran (Jan 13). The UN warned of alarming child malnutrition in Gaza, with nearly 95,000 cases in 2025.

**Technology:**
Google is set to integrate product purchases within its Gemini AI platform (Jan 13). Meta is reportedly laying off hundreds of employees in its metaverse division (Jan 13).

**Cybersecurity:**
The World Economic Forum's Global Cybersecurity Outlook 2026 highlights cybercrime, AI misuse, and supply chain risks as major threats. ServiceNow patched a critical AI platform flaw (CVE-2025-12420) on January 13, which could allow unauthenticated user impersonation.

#News #Anonymous #AnonNews_irc

##

patrickcmiller@infosec.exchange at 2026-01-13T18:12:00.000Z ##

ServiceNow patches critical AI platform flaw that could allow user impersonation cyberscoop.com/servicenow-fixe

##

jbhall56@infosec.exchange at 2026-01-13T12:54:25.000Z ##

The vulnerability, tracked as CVE-2025-12420, carries a CVSS score of 9.3 out of 10.0. thehackernews.com/2026/01/serv

##

cR0w@infosec.exchange at 2026-01-12T21:59:35.000Z ##

sev:CRIT auth bypass in SNOW.

cve.org/CVERecord?id=CVE-2025-

A vulnerability has been identified in the ServiceNow AI Platform that could enable an unauthenticated user to impersonate another user and perform the operations that the impersonated user is entitled to perform. ServiceNow has addressed this vulnerability by deploying a relevant security update to hosted instances in October 2025. Security updates have also been provided to ServiceNow self-hosted customers, partners, and hosted customers with unique configurations. Additionally, the vulnerability is addressed in the listed Store App versions. We recommend that customers promptly apply an appropriate security update or upgrade if they have not already done so.

##

CVE-2025-66689
(6.5 MEDIUM)

EPSS: 0.04%

updated 2026-01-12T21:31:38

1 posts

A path traversal vulnerability exists in Zen MCP Server before 9.8.2 that allows authenticated attackers to read arbitrary files on the system. The vulnerability is caused by flawed logic in the is_dangerous_path() validation function that uses exact string matching against a blacklist of system directories. Attackers can bypass these restrictions by accessing subdirectories of blacklisted paths.

CVE-2026-21858
(10.0 CRITICAL)

EPSS: 2.96%

updated 2026-01-12T19:16:02.603000

9 posts

n8n is an open source workflow automation platform. Versions starting with 1.65.0 and below 1.121.0 enable an attacker to access files on the underlying server through execution of certain form-based workflows. A vulnerable workflow could grant access to an unauthenticated remote attacker, resulting in exposure of sensitive information stored on the system and may enable further compromise dependi

Nuclei template

4 repos

https://github.com/cropnet/ni8mare-scanner

https://github.com/Ashwesker/Ashwesker-CVE-2026-21858

https://github.com/Chocapikk/CVE-2026-21858

https://github.com/eduardorossi84/CVE-2026-21858-POC

youranonnewsirc@nerdculture.de at 2026-01-13T03:22:47.000Z ##

Latest global tech and cybersecurity news (Jan 12-13, 2026):

The World Economic Forum's 'Global Cybersecurity Outlook 2026' highlights AI, geopolitics, and cyber-fraud as key shapers of risk, with fraud now surpassing ransomware as a top concern. CISA added a Gogs Path Traversal vulnerability (CVE-2025-8110) to its Known Exploited Vulnerabilities Catalog due to active exploitation. A critical vulnerability (CVE-2026-21858) was found in the n8n workflow automation platform, affecting thousands of systems. In technology, Google removed some medical AI Overviews following "alarming" results.

#News #Anonymous #AnonNews_irc

##

sbeyer at 2026-01-13T00:12:55.324Z ##

Die erste Ausgabe von 60 Sekunden Cyber beschäftigt sich mit dem aktuellen ESA-Hack, der Situation Taiwans, CVE-2026-21858 und dem Schlag gegen Black Axe.

60-sekunden-cyber.de/kw2-2026/

##

zeldman@front-end.social at 2026-01-09T17:16:01.000Z ##

Tell your friends.

The vulnerability, tracked as CVE-2026-21858 (CVSS score: 10.0), has been codenamed Ni8mare by Cyera Research Labs. Security researcher Dor Attias discovered and reported it on November 9, 2025.

thehackernews.com/2026/01/crit

##

hrbrmstr@mastodon.social at 2026-01-09T12:31:34.000Z ##

this was some great and necessary debunking of the ridiculous attempt at a "look how cool we are” CVE assignment.

between this and the "it's actually not a real vuln from an internet-perspective" for the recent daft D-Link CVE assignment, the cyber part of 2026 is off to a really horrible start.

horizon3.ai/attack-research/at

##

jbhall56@infosec.exchange at 2026-01-08T13:41:46.000Z ##

Tracked as CVE-2026-21858 (CVSS score 10), the bug enables remote code execution without authentication. securityweek.com/critical-vuln

##

benzogaga33@mamot.fr at 2026-01-08T10:40:02.000Z ##

Ni8mare – CVE-2026-21858 : cette faille critique permet de pirater les serveurs n8n it-connect.fr/ni8mare-cve-2026 #ActuCybersécurité #Cybersécurité #Vulnérabilité #n8n

##

Dam_ned@mamot.fr at 2026-01-08T09:08:16.000Z ##

qui c'est qui se servait de #n8n ici ? on a un petit #CVE à niveau 10 là github.com/Chocapikk/CVE-2026- #iagenIsHell

##

beyondmachines1@infosec.exchange at 2026-01-08T08:01:43.000Z ##

Critical Ni8mare flaw in n8n allows unauthenticated remote takeover

n8n patched a critical vulnerability (CVE-2026-21858) that allows unauthenticated attackers to steal server files and gain full remote code execution. The flaw exploits a logic error in webhook and file upload handling to bypass authentication and compromise sensitive automation credentials.

**If you are using n8n, this is urgent. If possible, try to isolate all n8n instances from the internet and accessible from trusted networks only. Then update to version 1.121.0 ASAP. If you can't patch, block webhooks and file uploads from any access from untrusted networks and the internet.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

r3pek@r3pek.org at 2026-01-07T21:33:12.000Z ##

Say hello to #Ni8mare, the first named vulnerability of 2026.

cyera.com/research-labs/ni8mar

#cve-2026-21858

##

CVE-2025-50334
(7.5 HIGH)

EPSS: 0.28%

updated 2026-01-12T18:39:30.937000

1 posts

An issue in Technitium DNS Server v.13.5 allows a remote attacker to cause a denial of service via the rate-limiting component

CVE-2025-70161
(9.8 CRITICAL)

EPSS: 0.34%

updated 2026-01-12T18:31:31

1 posts

EDIMAX BR-6208AC V2_1.02 is vulnerable to Command Injection. This arises because the pppUserName field is directly passed to a shell command via the system() function without proper sanitization. An attacker can exploit this by injecting malicious commands into the pppUserName field, allowing arbitrary code execution.

CVE-2025-41006(CVSS UNKNOWN)

EPSS: 0.03%

updated 2026-01-12T15:30:50

1 posts

Imaster's MEMS Events CRM contains an SQL injection vulnerability in ‘phone’ parameter in ‘/memsdemo/login.php’.

beyondmachines1@infosec.exchange at 2026-01-13T11:01:43.000Z ##

Critical SQL Injection and XSS flaws reported in Imaster business software

Imaster's business management systems suffer from four vulnerabilities, including a critical SQL injection (CVE-2025-41006) that allows unauthenticated database access. These flaws enable attackers to steal sensitive patient data and execute malicious scripts in administrative sessions.

**If you are using Imaster MEMS Events CRM and the Patient Records Management System, make sure they are isolated from the internet and accessible from trusted networks only. Reach out to the vendor for patches, and in the meantime use a Web Application Firewall to filter malicious SQL and XSS traffic.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-0854
(8.8 HIGH)

EPSS: 0.29%

updated 2026-01-12T06:30:20

1 posts

Certain DVR/NVR models developed by Merit LILIN has a OS Command Injection vulnerability, allowing authenticated remote attackers to inject arbitrary OS commands and execute them on the device.

CVE-2025-14523
(8.2 HIGH)

EPSS: 0.04%

updated 2026-01-12T03:32:09

1 posts

A flaw in libsoup’s HTTP header handling allows multiple Host: headers in a request and returns the last occurrence for server-side processing. Common front proxies often honor the first Host: header, so this mismatch can cause vhost confusion where a proxy routes a request to one backend but the backend interprets it as destined for another host. This discrepancy enables request-smuggling style a

linux@activitypub.awakari.com at 2026-01-12T22:15:49.000Z ## Oracle Linux 8 ELSA-2026-0421 libsoup Important CVE-2025-14523 Update The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:

#Oracle #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2026-0840
(8.8 HIGH)

EPSS: 0.07%

updated 2026-01-11T09:30:25

1 posts

A security vulnerability has been detected in UTT 进取 520W 1.7.7-180627. Affected by this vulnerability is the function strcpy of the file /goform/formConfigNoticeConfig. The manipulation of the argument timestart leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but

CVE-2026-0837
(8.8 HIGH)

EPSS: 0.07%

updated 2026-01-11T06:30:19

1 posts

A vulnerability was identified in UTT 进取 520W 1.7.7-180627. This affects the function strcpy of the file /goform/formFireWall. Such manipulation of the argument GroupName leads to buffer overflow. The attack can be executed remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2026-0836
(8.8 HIGH)

EPSS: 0.07%

updated 2026-01-11T06:30:19

1 posts

A vulnerability was determined in UTT 进取 520W 1.7.7-180627. The impacted element is the function strcpy of the file /goform/formConfigFastDirectionW. This manipulation of the argument ssid causes buffer overflow. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any

CVE-2026-0839
(8.8 HIGH)

EPSS: 0.07%

updated 2026-01-11T06:30:19

1 posts

A weakness has been identified in UTT 进取 520W 1.7.7-180627. Affected is the function strcpy of the file /goform/APSecurity. Executing a manipulation of the argument wepkey1 can lead to buffer overflow. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in

CVE-2025-15505
(2.4 LOW)

EPSS: 0.03%

updated 2026-01-11T03:30:13

1 posts

A vulnerability was found in Luxul XWR-600 up to 4.0.1. The affected element is an unknown function of the component Web Administration Interface. The manipulation of the argument Guest Network/Wireless Profile SSID results in cross site scripting. The attack may be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did n

CVE-2025-65731
(6.8 MEDIUM)

EPSS: 0.03%

updated 2026-01-09T21:32:41

1 posts

An issue was discovered in D-Link Router DIR-605L (Hardware version F1; Firmware version: V6.02CN02) allowing an attacker with physical access to the UART pins to execute arbitrary commands due to presence of root terminal access on a serial interface without proper access control.

1 repos

https://github.com/whitej3rry/CVE-2025-65731

CVE-2025-14524
(5.3 MEDIUM)

EPSS: 0.03%

updated 2026-01-09T21:32:41

1 posts

When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP, POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new target host.

CVE-2025-10492
(9.8 CRITICAL)

EPSS: 0.33%

updated 2026-01-09T19:55:26

1 posts

A Java deserialisation vulnerability has been discovered in the Jaspersoft Library. Improper handling of externally supplied data may allow attackers to execute arbitrary code remotely on systems that use the affected library.

1 repos

https://github.com/dovezp/CVE-2025-10492-POC

beyondmachines1@infosec.exchange at 2026-01-09T14:01:44.000Z ##

Hitachi Energy patches critical RCE flaw in Asset Suite

Hitachi Energy released a critical update for Asset Suite to patch a remote code execution vulnerability (CVE-2025-10492) caused by improper data handling in the Jaspersoft reporting library.

**Make sure your Hitachi Asset Suite uses only predefined reports and users should not be allowed to upload untrudted reports. If possible, isolate Hitachi Asset Suite to be accessible from trusted networks only and limited number of users. Then plan an update to Asset Suite version 9.8.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-69426(CVSS UNKNOWN)

EPSS: 0.05%

updated 2026-01-09T18:31:43

1 posts

The Ruckus vRIoT IoT Controller firmware versions prior to 3.0.0.0 (GA) contain hardcoded credentials for an operating system user account within an initialization script. The SSH service is network-accessible without IP-based restrictions. Although the configuration disables SCP and pseudo-TTY allocation, an attacker can authenticate using the hardcoded credentials and establish SSH local port fo

CVE-2025-69425(CVSS UNKNOWN)

EPSS: 0.11%

updated 2026-01-09T18:31:43

1 posts

The Ruckus vRIoT IoT Controller firmware versions prior to 3.0.0.0 (GA) expose a command execution service on TCP port 2004 running with root privileges. Authentication to this service relies on a hardcoded Time-based One-Time Password (TOTP) secret and an embedded static token. An attacker who extracts these credentials from the appliance or a compromised device can generate valid authentication

CVE-2025-14598
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-01-09T18:31:36

1 posts

BeeS Software Solutions BET Portal contains an SQL injection vulnerability in the login functionality of affected sites. The vulnerability enables arbitrary SQL commands to be executed on the backend database.

1 repos

https://github.com/Afnaan-Ahmed/CVE-2025-14598

FunctionalProgramming@activitypub.awakari.com at 2026-01-09T12:14:06.000Z ## CVE-2025-14598BeeS Software Solutions BET Portal contains an SQL injection vu... BeeS Software Solutions BET Portal contains an SQL injection vulnerability in the login functionality of affected si...


Origin | Interest | Match ##

CVE-2025-64091
(8.6 HIGH)

EPSS: 0.05%

updated 2026-01-09T18:31:35

1 posts

This vulnerability allows authenticated attackers to execute commands via the NTP-configuration of the device.

CVE-2025-64092
(7.5 HIGH)

EPSS: 0.08%

updated 2026-01-09T18:31:35

1 posts

This vulnerability allows unauthenticated attackers to inject an SQL request into GET request parameters and directly query the underlying database.

CVE-2025-64093
(10.0 CRITICAL)

EPSS: 0.29%

updated 2026-01-09T18:31:35

1 posts

Remote Code Execution vulnerability that allows unauthenticated attackers to inject arbitrary commands into the hostname of the device.

CVE-2026-22081(CVSS UNKNOWN)

EPSS: 0.05%

updated 2026-01-09T12:32:33

1 posts

This vulnerability exists in Tenda wireless routers (300Mbps Wireless Router F3 and N300 Easy Setup Router) due to the missing HTTPOnly flag for session cookies associated with the web-based administrative interface. A remote at-tacker could exploit this vulnerability by capturing session cookies transmitted over an insecure HTTP connection. Successful exploitation of this vulnerability could all

CVE-2026-22082(CVSS UNKNOWN)

EPSS: 0.17%

updated 2026-01-09T12:32:33

1 posts

This vulnerability exists in Tenda wireless routers (300Mbps Wireless Router F3 and N300 Easy Setup Router) due to the use of login credentials as the session ID through its web-based administrative interface. A remote attacker could exploit this vulnerability by intercepting network traffic and capturing the session ID during insecure transmission. Successful exploitation of this vulnerability

CVE-2026-22080(CVSS UNKNOWN)

EPSS: 0.02%

updated 2026-01-09T12:32:32

1 posts

This vulnerability exists in Tenda wireless routers (300Mbps Wireless Router F3 and N300 Easy Setup Router) due to the transmission of credentials encoded using reversible Base64 encoding through the web-based administrative interface. An attacker on the same network could exploit this vulnerability by intercepting network traffic and capturing the Base64-encoded credentials. Successful exploitat

CVE-2025-69194
(8.8 HIGH)

EPSS: 0.04%

updated 2026-01-09T09:31:24

1 posts

A security issue was discovered in GNU Wget2 when handling Metalink documents. The application fails to properly validate file paths provided in Metalink <file name> elements. An attacker can abuse this behavior to write files to unintended locations on the system. This can lead to data loss or potentially allow further compromise of the user’s environment.

1 repos

https://github.com/secdongle/POC_CVE-2025-69194

CVE-2025-12543
(9.6 CRITICAL)

EPSS: 0.15%

updated 2026-01-09T00:30:28

1 posts

A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBoss EAP, and other Java applications. The Undertow library fails to properly validate the Host header in incoming HTTP requests. As a result, requests containing malformed or malicious Host headers are processed without rejection, enabling attackers to poison caches, perform internal network scans, or hijack user sessio

CVE-2025-14025
(8.6 HIGH)

EPSS: 0.07%

updated 2026-01-09T00:30:28

1 posts

A flaw was found in Ansible Automation Platform (AAP). Read-only scoped OAuth2 API Tokens in AAP, are enforced at the Gateway level for Gateway-specific operations. However, this vulnerability allows read-only tokens to perform write operations on backend services (e.g., Controller, Hub, EDA). If this flaw were exploited, an attacker‘s capabilities would only be limited by role based access contro

cR0w@infosec.exchange at 2026-01-08T15:16:38.000Z ##

A flaw was found in Ansible Automation Platform (AAP). Read-only scoped OAuth2 API Tokens in AAP, are enforced at the Gateway level for Gateway-specific operations. However, this vulnerability allows read-only tokens to perform write operations on backend services (e.g., Controller, Hub, EDA). If this flaw were exploited, an attacker‘s capabilities would only be limited by role based access controls (RBAC).

access.redhat.com/security/cve

##

christopherkunz@chaos.social at 2026-01-15T06:49:23.000Z ##

@ljrk I see your ../../../../../ and raise you one ../../../../../../../../../../../../../../../
labs.watchtowr.com/do-smart-pe

##

christopherkunz@chaos.social at 2026-01-15T06:49:23.000Z ##

@ljrk I see your ../../../../../ and raise you one ../../../../../../../../../../../../../../../
labs.watchtowr.com/do-smart-pe

##

nopatience@swecyb.com at 2026-01-13T12:46:33.000Z ##

Timeline of vulnerability (soon to be exploited...) (SmartMail):

2025-12-28: NVD CVE published. [1]
2026-01-08: Vulnerability deepdive and PoC published. [2]
2026-01-12: Reconnaissance for instances detected. [3]
2026-01-xx: Exploitation? ...

[1]: nvd.nist.gov/vuln/detail/CVE-2
[2]: labs.watchtowr.com/do-smart-pe
[3]: labs.greynoise.io/grimoire/202

##

hrbrmstr@mastodon.social at 2026-01-13T11:49:19.000Z ##

We've been working on a new AI-driven + human-in-the-loop threat signals detector and this morning it flagged this path that we have not seen before in the grid in the past 90d `/api/v1/licensing/about`. It turns out it's an unauth’d version check for SmarterTools SmarterMail.

If that name sounds familiar its b/c of CVE-2025-52691 (nvd.nist.gov/vuln/detail/CVE-2). (1/3)

##

campuscodi@mastodon.social at 2026-01-11T14:44:17.000Z ##

watchTowr has published a technical analysis of a CVSS 10 pre-auth RCE vulnerability in SmartTool's SmarterMail business email platform.

The vulnerability (CVE-2025-52691) was silently patched in Oct and publicly disclosed only a few months later in Dec

labs.watchtowr.com/do-smart-pe

##

_r_netsec@infosec.exchange at 2026-01-08T18:43:06.000Z ##

Do Smart People Ever Say They’re Smart? (SmarterTools SmarterMail Pre-Auth RCE CVE-2025-52691) - watchTowr Labs labs.watchtowr.com/do-smart-pe

##

cR0w@infosec.exchange at 2026-01-08T18:37:45.000Z ##

Get your popcorn, it's time for another watchTowr Labs post. This one is a pre-auth RCE in SmarterMail. :blobcatpopcorn:

labs.watchtowr.com/do-smart-pe

##

CVE-2025-65518
(7.5 HIGH)

EPSS: 0.03%

updated 2026-01-08T21:30:40

1 posts

Plesk Obsidian versions 8.0.1 through 18.0.73 are vulnerable to a Denial of Service (DoS) condition. The vulnerability exists in the get_password.php endpoint, where a crafted request containing a malicious payload can cause the affected web interface to continuously reload, rendering the service unavailable to legitimate users. An attacker can exploit this issue remotely without authentication, r

1 repos

https://github.com/Jainil-89/CVE-2025-65518

CVE-2025-13151
(7.5 HIGH)

EPSS: 0.05%

updated 2026-01-08T21:30:33

1 posts

Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string.

cR0w@infosec.exchange at 2026-01-07T21:34:43.000Z ##

Reset the "Days since ASN1 vuln" sign to 0.

cve.org/CVERecord?id=CVE-2025-

Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string.

##

CVE-2026-21441(CVSS UNKNOWN)

EPSS: 0.02%

updated 2026-01-08T20:05:42

1 posts

### Impact urllib3's [streaming API](https://urllib3.readthedocs.io/en/2.6.2/advanced-usage.html#streaming-and-i-o) is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br

linux@activitypub.awakari.com at 2026-01-12T15:56:28.000Z ## Ubuntu: urllib3 Important Denial of Service CVE-2026-21441 urllib3 could be made to use excessive resources if it received specially crafted network traffic.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2017-20214
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-08T19:15:54.560000

1 posts

FLIR Thermal Camera F/FC/PT/D firmware version 8.0.0.64 contains hard-coded SSH credentials that cannot be changed through normal camera operations. Attackers can leverage these persistent, unmodifiable credentials to gain unauthorized remote access to the thermal camera system.

CVE-2017-20213
(7.5 HIGH)

EPSS: 0.12%

updated 2026-01-08T19:15:54.443000

1 posts

FLIR Thermal Camera F/FC/PT/D Stream firmware version 8.0.0.64 contains an unauthenticated vulnerability that allows remote attackers to access live camera streams without credentials. Attackers can exploit the vulnerability to view unauthorized thermal camera video feeds across multiple camera series without requiring any authentication.

CVE-2025-59469
(9.0 None)

EPSS: 0.05%

updated 2026-01-08T18:30:56

1 posts

This vulnerability allows a Backup or Tape Operator to write files as root.

CVE-2025-59470
(9.0 None)

EPSS: 0.30%

updated 2026-01-08T18:30:56

2 posts

This vulnerability allows a Backup Operator to perform remote code execution (RCE) as the postgres user by sending a malicious interval or order parameter.

cR0w@infosec.exchange at 2026-01-08T16:43:57.000Z ##

CVEs are now published for this.

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

##

beyondmachines1@infosec.exchange at 2026-01-08T09:01:43.000Z ##

Veeam Patches Critical Remote Code Execution Flaw in Backup & Replication v13

Veeam patched multiple vulnerabilities in Backup & Replication version 13, including a critical RCE flaw (CVE-2025-59470) that allows privileged operators to execute commands as the database user. These flaws are high-value targets for ransomware groups seeking to disable recovery options during attacks.

**If you are using Veeam Backup & Replication version 13, make sure all backup systems are isolated from the internet and accessible from trusted networks only. Limit the number of users with Backup or Tape Operator roles and update to version 13.0.1.1071 as soon as possible.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-55125
(7.8 HIGH)

EPSS: 0.19%

updated 2026-01-08T18:30:56

1 posts

This vulnerability allows a Backup or Tape Operator to perform remote code execution (RCE) as root by creating a malicious backup configuration file.

CVE-2025-67091
(6.5 MEDIUM)

EPSS: 0.02%

updated 2026-01-08T18:30:56

1 posts

An issue in GL Inet GL.Inet AX1800 Version 4.6.4 & 4.6.8 are vulnerable. GL.Inet AX1800 Version 4.6.4 & 4.6.8 in the GL.iNet custom opkg wrapper script located at /usr/libexec/opkg-call. The script is executed with root privileges when triggered via the LuCI web interface or authenticated API calls to manage packages. The vulnerable code uses shell redirection to create a lock file in the world-wr

CVE-2025-67089
(8.1 HIGH)

EPSS: 0.23%

updated 2026-01-08T18:30:56

1 posts

A command injection vulnerability exists in the GL-iNet GL-AXT1800 router firmware v4.6.8. The vulnerability is present in the `plugins.install_package` RPC method, which fails to properly sanitize user input in package names. Authenticated attackers can exploit this to execute arbitrary commands with root privileges

CVE-2025-67090
(5.1 MEDIUM)

EPSS: 0.03%

updated 2026-01-08T18:30:56

1 posts

The LuCI web interface on Gl Inet GL.Inet AX1800 Version 4.6.4 & 4.6.8 are vulnerable. Fix available in version 4.8.2 GL.Inet AX1800 Version 4.6.4 & 4.6.8 lacks rate limiting or account lockout mechanisms on the authentication endpoint (`/cgi-bin/luci`). An unauthenticated attacker on the local network can perform unlimited password attempts against the admin interface.

CVE-2026-21440
(0 None)

EPSS: 0.32%

updated 2026-01-08T18:09:49.800000

1 posts

AdonisJS is a TypeScript-first web framework. A Path Traversal vulnerability in AdonisJS multipart file handling may allow a remote attacker to write arbitrary files to arbitrary locations on the server filesystem. This impacts @adonisjs/bodyparser through version 10.1.1 and 11.x prerelease versions prior to 11.0.0-next.6. This issue has been patched in @adonisjs/bodyparser versions 10.1.2 and 11.

3 repos

https://github.com/Ashwesker/Ashwesker-CVE-2026-21440

https://github.com/you-ssef9/CVE-2026-21440

https://github.com/k0nnect/cve-2026-21440-writeup-poc

DarkWebInformer@infosec.exchange at 2026-01-11T00:27:42.000Z ##

❗️CVE-2026-21440: A critical path traversal vulnerability affecting the AdonisJS framework, specifically its multipart file upload handling.

PoC Exploit: github.com/Ashwesker/Ashwesker

▪️CVSS: 9.2
▪️CVE Published: January 2nd, 2026
▪️Exploit Published: January 5th, 2026

Details:

AdonisJS is a TypeScript-first web framework. A Path Traversal vulnerability in AdonisJS multipart file handling may allow a remote attacker to write arbitrary files to arbitrary locations on the server filesystem. This impacts @adonisjs/bodyparser through version 10.1.1 and 11.x prerelease versions prior to 11.0.0-next.6. This issue has been patched in @adonisjs/bodyparser versions 10.1.2 and 11.0.0-next.6.

##

CVE-2025-68428
(0 None)

EPSS: 0.08%

updated 2026-01-08T18:09:23.230000

2 posts

jsPDF is a library to generate PDFs in JavaScript. Prior to version 4.0.0, user control of the first argument of the loadFile method in the node.js build allows local file inclusion/path traversal. If given the possibility to pass unsanitized paths to the loadFile method, a user can retrieve file contents of arbitrary files in the local file system the node process is running in. The file contents

2 repos

https://github.com/12nio/CVE-2025-68428_PoC

https://github.com/Nurjaman2004/jsPDF-Bulk-Detector-CVE-2025-68428-

DarkWebInformer@infosec.exchange at 2026-01-11T02:00:20.000Z ##

❗️CVE-2025-68428: Critical Path Traversal in jsPDF

GitHub: github.com/12nio/CVE-2025-6842

CVSS: 9.2
CVE Published: January 5th, 2026
Exploit Published: January 8th, 2026

News source: bleepingcomputer.com/news/secu

##

benzogaga33@mamot.fr at 2026-01-09T10:40:03.000Z ##

Cette faille critique dans jsPDF (CVE-2025-68428) peut exposer les données de votre serveur it-connect.fr/faille-critique- #ActuCybersécurité #Cybersécurité #Vulnérabilité

##

CVE-2025-15471
(9.8 CRITICAL)

EPSS: 0.22%

updated 2026-01-08T18:09:23.230000

1 posts

A vulnerability was detected in TRENDnet TEW-713RE 1.02. The impacted element is an unknown function of the file /goformX/formFSrvX. The manipulation of the argument SZCMD results in os command injection. It is possible to launch the attack remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

beyondmachines1@infosec.exchange at 2026-01-08T10:01:43.000Z ##

Unpatched command Injection flaw reported in Trendnet TEW-713RE extenders

Trendnet TEW-713RE range extenders are reportd to have a critical command injection flaw (CVE-2025-15471) that allows unauthenticated attackers to gain root access. The flaw is not patched and the company has not responded to disclosure attempts.

**If you are using TEW-713RE range extenders, make sure they are isolated from the internet and accessible from trusted networks only. Since Trendnet has not released a fix, plan a replacement with supported hardware.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-21876
(9.3 CRITICAL)

EPSS: 0.04%

updated 2026-01-08T18:08:18.457000

4 posts

The OWASP core rule set (CRS) is a set of generic attack detection rules for use with compatible web application firewalls. Prior to versions 4.22.0 and 3.3.8, the current rule 922110 has a bug when processing multipart requests with multiple parts. When the first rule in a chain iterates over a collection (like `MULTIPART_PART_HEADERS`), the capture variables (`TX:0`, `TX:1`) get overwritten with

1 repos

https://github.com/daytriftnewgen/CVE-2026-21876

beyondmachines1@infosec.exchange at 2026-01-10T09:01:07.000Z ##

OWASP CRS Patches Critical Multipart Charset Validation Bypass

OWASP CRS released patches for a critical vulnerability (CVE-2026-21876) that allows attackers to bypass charset validation in multipart requests. By placing malicious payloads in early request parts, attackers can slip UTF-7/16/32 encoded XSS attacks past the WAF.

**If you are using WAF OWASP Core Rule Set to version 4.22.0 or 3.3.8 this is important. Update the Core rule 922110 ASAP. Don't not rely on default settings for rule 922110 until you have applied these patches. Attackers can easily hide malicious scripts in multi-part uploads.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

_r_netsec@infosec.exchange at 2026-01-08T20:28:06.000Z ##

CVE-2026-21876: OWASP Modsecurity CRS WAF bypass blogpost is out! coreruleset.org/20260106/cve-2

##

_r_netsec@infosec.exchange at 2026-01-08T19:58:06.000Z ##

Critical (9.3 CVSS) OWASP ModSecurity CRS WAF bypass advisory and walkthrough is out! coreruleset.org/20260106/cve-2

##

cR0w@infosec.exchange at 2026-01-07T21:09:45.000Z ##

Docker WAF doesn't filter on username, apparently. Seems weird. The CVE isn't published yet but they are claiming a number for it in the repo. Either way, if you have Docker WAF logs, maybe look for interesting payloads in the username parameter. Or don't.

github.com/daytriftnewgen/CVE-

##

CVE-2026-21877
(9.9 CRITICAL)

EPSS: 0.05%

updated 2026-01-08T18:08:18.457000

4 posts

n8n is an open source workflow automation platform. In versions 0.121.2 and below, an authenticated attacker may be able to execute malicious code using the n8n service. This could result in full compromise and can impact both self-hosted and n8n Cloud instances. This issue is fixed in version 1.121.3. Administrators can reduce exposure by disabling the Git node and limiting access for untrusted u

1 repos

https://github.com/Ashwesker/Ashwesker-CVE-2026-21877

beyondmachines1@infosec.exchange at 2026-01-09T16:01:43.000Z ##

Another critical RCE flaw reported in n8n automation platform

n8n patched another critical remote code execution vulnerability, CVE-2026-21877, which allows authenticated users to bypass sandboxes and take full control of automation servers. Over 100,000 instances are potentially exposed.

**Make sure all automation servers are isolated from the internet and accessible from trusted networks only. Update n8n to version 1.121.3 immediately and restrict workflow creation rights to a small group of trusted administrators to prevent unauthorized code execution.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

christopherkunz@chaos.social at 2026-01-09T12:00:20.000Z ##

Uh... how is github.com/n8n-io/n8n/security (CVE-2026-21877) a 10.0 with PR:L? That is not possible, either it's a 9.9 or it has PR:N.

##

Hackread@mstdn.social at 2026-01-08T20:09:35.000Z ##

n8n users need to update immediately after a CVSS 10.0 (CVE-2026-21877) authenticated remote code execution flaw was found that could let an attacker take over the system. Update to version 1.121.3 or higher and restrict privileges now.

Read: hackread.com/n8n-users-patch-f

#n8n #Cybersecurity #Vulnerability #Infosec

##

decio@infosec.exchange at 2026-01-08T11:29:24.000Z ##

"Une seconde faille critique RCE affecte n8n – CVE-2026-21877 : comment se protéger ?"
👇
it-connect.fr/n8n-cve-2026-218

Pas mal d'instances pas à jour et exposées aussi sur les réseaux EU et CH selon Onyphe
👇
bsky.app/profile/onyphe.io/pos

Infos
👇
cve.circl.lu/vuln/CVE-2026-218

💬
⬇️
infosec.pub/post/40204482

#CyberVeille #n8n

##

CVE-2025-15346
(0 None)

EPSS: 0.07%

updated 2026-01-08T18:08:18.457000

1 posts

A vulnerability in the handling of verify_mode = CERT_REQUIRED in the wolfssl Python package (wolfssl-py) causes client certificate requirements to not be fully enforced.  Because the WOLFSSL_VERIFY_FAIL_IF_NO_PEER_CERT flag was not included, the behavior effectively matched CERT_OPTIONAL: a peer certificate was verified if presented, but connections were incorrectly authenticated when no client

cR0w@infosec.exchange at 2026-01-08T15:31:23.000Z ##

No awoo for you.

cve.org/CVERecord?id=CVE-2025-

A vulnerability in the handling of verify_mode = CERT_REQUIRED in the wolfssl Python package (wolfssl-py) causes client certificate requirements to not be fully enforced. Because the WOLFSSL_VERIFY_FAIL_IF_NO_PEER_CERT flag was not included, the behavior effectively matched CERT_OPTIONAL: a peer certificate was verified if presented, but connections were incorrectly authenticated when no client certificate was provided. This results in improper authentication, allowing attackers to bypass mutual TLS (mTLS) client authentication by omitting a client certificate during the TLS handshake. The issue affects versions up to and including 5.8.2.

##

CVE-2025-15079
(5.3 MEDIUM)

EPSS: 0.03%

updated 2026-01-08T18:08:18.457000

1 posts

When doing SSH-based transfers using either SCP or SFTP, and setting the known_hosts file, libcurl could still mistakenly accept connecting to hosts *not present* in the specified file if they were added as recognized in the libssh *global* known_hosts file.

CVE-2025-13034
(5.9 MEDIUM)

EPSS: 0.02%

updated 2026-01-08T18:08:18.457000

1 posts

When using `CURLOPT_PINNEDPUBLICKEY` option with libcurl or `--pinnedpubkey` with the curl tool,curl should check the public key of the server certificate to verify the peer. This check was skipped in a certain condition that would then make curl allow the connection without performing the proper check, thus not noticing a possible impostor. To skip this check, the connection had to be done with

CVE-2025-14819
(5.3 MEDIUM)

EPSS: 0.03%

updated 2026-01-08T18:08:18.457000

1 posts

When doing TLS related transfers with reused easy or multi handles and altering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally reuse a CA store cached in memory for which the partial chain option was reversed. Contrary to the user's wishes and expectations. This could make libcurl find and accept a trust chain that it otherwise would not.

CVE-2025-15224
(3.1 LOW)

EPSS: 0.09%

updated 2026-01-08T15:32:30

1 posts

When doing SSH-based transfers using either SCP or SFTP, and asked to do public key authentication, curl would wrongly still ask and authenticate using a locally running SSH agent.

CVE-2025-69258
(9.8 CRITICAL)

EPSS: 0.20%

updated 2026-01-08T15:31:28

3 posts

A LoadLibraryEX vulnerability in Trend Micro Apex Central could allow an unauthenticated remote attacker to load an attacker-controlled DLL into a key executable, leading to execution of attacker-supplied code under the context of SYSTEM on affected installations.

DarkWebInformer@infosec.exchange at 2026-01-12T19:06:17.000Z ##

‼️Trend Micro Apex Central Multiple Vulnerabilities

CVE:

CVE-2025-69258 (CVSS: 9.8)
CVE-2025-69259 (CVSS: 7.5)
CVE-2025-69260 (CVSS: 7.5)

CWE: CWE-1285, CWE-306, CWE-641

PoC/Writeup: tenable.com/security/research/

Disclosure Date: January 7. 2026

Disclosure: success.trendmicro.com/en-US/s

##

technadu@infosec.exchange at 2026-01-09T10:10:46.000Z ##

PoC exploits are now public for CVE-2025-69258 in Trend Micro Apex Central (on-premise), a vulnerability that could allow unauthenticated RCE on affected systems.

A patch is available, and there are no confirmed exploitation reports so far. Public PoCs, however, tend to accelerate attacker interest.

Follow @technadu for objective and technically grounded infosec updates.

Source: helpnetsecurity.com/2026/01/08

#Infosec #VulnerabilityDisclosure #PatchManagement #RCE #EnterpriseSecurity #ThreatLandscape

##

beyondmachines1@infosec.exchange at 2026-01-09T08:01:42.000Z ##

Critical flaws and public exploits released for Trend Micro Apex Central on-premise management

Trend Micro patched a critical remote code execution vulnerability (CVE-2025-69258) in Apex Central that allows attackers to gain SYSTEM privileges. Public exploit code is now available, making immediate patching of on-premise installations vital.

**Make sure all Apex Central servers are isolated from the internet and accessible from trusted networks only. Install Critical Patch Build 7190 as soon as possible.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-14017(CVSS UNKNOWN)

EPSS: 0.01%

updated 2026-01-08T12:30:38

1 posts

When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl, changing TLS options in one thread would inadvertently change them globally and therefore possibly also affect other concurrently setup transfers. Disabling certificate verification for a specific transfer could unintentionally disable the feature for other threads as well.

CVE-2025-37164
(10.0 CRITICAL)

EPSS: 81.31%

updated 2026-01-08T00:32:16

2 posts

A remote code execution issue exists in HPE OneView.

Nuclei template

3 repos

https://github.com/g0vguy/CVE-2025-37164-PoC

https://github.com/rxerium/CVE-2025-37164

https://github.com/LACHHAB-Anas/Exploit_CVE-2025-37164

Hackread@mstdn.social at 2026-01-10T14:02:18.000Z ##

CISA urges emergency patching after a critical HPE OneView vulnerability (CVE-2025-37164) with active exploitation - Check your versions and update to OneView v11.00 or later now.

Read: hackread.com/cisa-emergency-pa

#Cybersecurity #HPE #OneView #CISA #Vulnerability

##

DarkWebInformer@infosec.exchange at 2026-01-08T15:33:41.000Z ##

🚨 CISA adds two vulnerabilities to the KEV Catalog

darkwebinformer.com/cisa-kev-c

CVE-2009-0556: Microsoft Office PowerPoint Code Injection Vulnerability

CVSS: 9.3

CVE-2025-37164: Hewlett Packard Enterprise OneView Code Injection Vulnerability

CVSS: 10

##

CVE-2025-62224
(5.5 MEDIUM)

EPSS: 0.05%

updated 2026-01-08T00:31:21

1 posts

User interface (ui) misrepresentation of critical information in Microsoft Edge for Android allows an authorized attacker to perform spoofing over a network.

Android@activitypub.awakari.com at 2026-01-07T08:00:00.000Z ## CVE-2025-62224 Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability User interface (ui) misrepresentation of critical information in Microsoft Edge for Android allows an authorized at...

#CVE

Origin | Interest | Match ##

CVE-2017-20216
(9.8 CRITICAL)

EPSS: 0.44%

updated 2026-01-08T00:31:21

1 posts

FLIR Thermal Camera PT-Series firmware version 8.0.0.64 contains multiple unauthenticated remote command injection vulnerabilities in the controllerFlirSystem.php script. Attackers can execute arbitrary system commands as root by exploiting unsanitized POST parameters in the execFlirSystem() function through shell_exec() calls. Exploitation evidence was observed by the Shadowserver Foundation on 2

CVE-2017-20215
(8.8 HIGH)

EPSS: 0.35%

updated 2026-01-08T00:31:21

1 posts

FLIR Thermal Camera FC-S/PT firmware version 8.0.0.64 contains an authenticated OS command injection vulnerability that allows attackers to execute shell commands with root privileges. Authenticated attackers can inject arbitrary shell commands through unvalidated input parameters to gain complete control of the thermal camera system.

CVE-2017-20212
(6.2 MEDIUM)

EPSS: 0.23%

updated 2026-01-08T00:31:21

1 posts

FLIR Thermal Camera F/FC/PT/D firmware version 8.0.0.64 contains an information disclosure vulnerability that allows unauthenticated attackers to read arbitrary files through unverified input parameters. Attackers can exploit the /var/www/data/controllers/api/xml.php readFile() function to access local system files without authentication.

CVE-2009-0556
(8.8 HIGH)

EPSS: 78.49%

updated 2026-01-07T21:32:42

4 posts

Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3, and PowerPoint in Microsoft Office 2004 for Mac, allows remote attackers to execute arbitrary code via a PowerPoint file with an OutlineTextRefAtom containing an an invalid index value that triggers memory corruption, as exploited in the wild in April 2009 by Exploit:Win32/Apptom.gen, aka "Memory Corruption Vulnerability."

beyondmachines1@infosec.exchange at 2026-01-09T12:01:43.000Z ##

CISA warns of active attacks legacy PowerPoint flaw

CISA is warning about active exploitation of CVE-2009-0556, a critical memory corruption vulnerability in legacy Microsoft PowerPoint (2000-2003 versions) that allows attackers to execute malware and move laterally through networks via malicious .ppt files.

**If you're still running legacy Microsoft Office (2000-2003 or 2004 for Mac), remove it and upgrade immediately to a supported version. This 15-year-old PowerPoint flaw is being actively exploited to install malware. If upgrading isn't possible right away, remove PowerPoint from these old systems and avoid opening any .ppt files.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

DarkWebInformer@infosec.exchange at 2026-01-08T15:33:41.000Z ##

🚨 CISA adds two vulnerabilities to the KEV Catalog

darkwebinformer.com/cisa-kev-c

CVE-2009-0556: Microsoft Office PowerPoint Code Injection Vulnerability

CVSS: 9.3

CVE-2025-37164: Hewlett Packard Enterprise OneView Code Injection Vulnerability

CVSS: 10

##

hexmasteen@chaos.social at 2026-01-08T08:55:01.000Z ##

Yesterday (2026-01-07) CISA added a new entry to it's catalog of known exploited vulnerabilities. It's about CVE-2009-0556, a vulnerability in PowerPoint 2003 which is EOL since 2014.

#InfoSec is a lost cause if we keep using unmaintained software.

##

j91321@infosec.exchange at 2026-01-07T19:26:42.000Z ##

Huh, CVE-2009-0556 added to KEV? :blobcateyes: cisa.gov/news-events/alerts/20

##

CVE-2026-20029
(4.9 MEDIUM)

EPSS: 0.04%

updated 2026-01-07T18:30:33

1 posts

A vulnerability in the licensing features of&nbsp;Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an authenticated, remote attacker with administrative privileges to gain access to sensitive information.&nbsp; This vulnerability is due to improper parsing of XML that is processed by the web-based management interface of Cisco ISE and Cisco ISE-P

jbhall56@infosec.exchange at 2026-01-08T13:20:22.000Z ##

The vulnerability, tracked as CVE-2026-20029 (CVSS score: 4.9), resides in the licensing feature and could allow an authenticated, remote attacker with administrative privileges to gain access to sensitive information. thehackernews.com/2026/01/cisc

##

CVE-2025-69277
(4.5 MEDIUM)

EPSS: 0.02%

updated 2026-01-07T17:16:02.003000

1 posts

libsodium before ad3004e, in atypical use cases involving certain custom cryptography or untrusted data to crypto_core_ed25519_is_valid_point, mishandles checks for whether an elliptic curve point is valid because it sometimes allows points that aren't in the main cryptographic group.

Ubuntu@activitypub.awakari.com at 2026-01-08T16:59:39.000Z ## Ubuntu 22.04 LTS: Critical Info Exposure in libsodium CVE-2025-69277 Sodium could be made to expose sensitive information.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2026-0628
(8.8 HIGH)

EPSS: 0.02%

updated 2026-01-07T15:31:20

2 posts

Insufficient policy enforcement in WebView tag in Google Chrome prior to 143.0.7499.192 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: High)

1 repos

https://github.com/fevar54/CVE-2026-0628-POC

AAKL@infosec.exchange at 2026-01-13T16:21:11.000Z ##

Microsoft's Security Guide has added one new entry:

January 2026 Release Notes: Chromium: CVE-2026-0628 Insufficient policy enforcement in WebView tag msrc.microsoft.com/update-guid #Microsoft #infosec #Chromium #Chrome #Edge

##

beyondmachines1@infosec.exchange at 2026-01-08T12:01:43.000Z ##

Google patches high-risk WebView flaw in first 2026 Chrome update

Google released Chrome 143.0.7499.192/193 to fix a high-risk vulnerability (CVE-2026-0628) in the WebView component that could allow malicious extensions to inject scripts into privileged pages.

**If you are using Google Chrome or other Chromium-based browsers (Edge, Brave, Vivaldi, Opera...) patch your browser ASAP. No critical flaws in this update, but don't wait for the flaw to become actively exploited. Update now, it's trivial and all your tabs reopen after the update.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-38352
(7.4 HIGH)

EPSS: 0.25%

updated 2026-01-07T15:30:14

2 posts

In the Linux kernel, the following vulnerability has been resolved: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand(). If a concurrent posix_cpu_timer_del() runs at that

3 repos

https://github.com/Crime2/poc-CVE-2025-38352

https://github.com/farazsth98/poc-CVE-2025-38352

https://github.com/farazsth98/chronomaly

DarkWebInformer@infosec.exchange at 2026-01-12T17:52:24.000Z ##

❗️Chronomaly: Android kernel exploit for CVE-2025-38352, previously exploited in-the-wild. Targets vulnerable Linux kernels v5.10.x.

GitHub: github.com/farazsth98/chronoma

##

Android@activitypub.awakari.com at 2026-01-07T14:40:40.000Z ## Chronomaly — PoC Exploit Released for Android/Linux Kernel Vulnerability CVE-2025-38352 https://cybersecuritynews.com/chronomaly-exploit/ Commentaires : voir le flux Atom ouvrir dans le navigateur

#kernel #noyau_linux #android #faille #programmation_concurrente #exploit

Origin | Interest | Match ##

CVE-2025-14346
(9.8 CRITICAL)

EPSS: 0.11%

updated 2026-01-05T18:30:29

2 posts

WHILL Model C2 Electric Wheelchairs and Model F Power Chairs do not enforce authentication for Bluetooth connections. An attacker within range can pair with the device and issue movement commands, override speed restrictions, and manipulate configuration profiles without any credentials or user interaction.

hotarubiko at 2026-01-15T03:28:58.357Z ##

CVE-2025-14346: WHILL electric wheelchairs models C2 and F are vulnerable to takeover over bluetooth.

Reminds me of how PGDrives Rnet systems can be controlled remotely but in that case it requires a device be plugged in to the control bus.

##

hotarubiko@infosec.exchange at 2026-01-15T03:28:58.000Z ##

CVE-2025-14346: WHILL electric wheelchairs models C2 and F are vulnerable to takeover over bluetooth.

Reminds me of how PGDrives Rnet systems can be controlled remotely but in that case it requires a device be plugged in to the control bus.

##

CVE-2025-68613
(9.9 CRITICAL)

EPSS: 63.49%

updated 2026-01-02T18:28:02.143000

1 posts

n8n is an open source workflow automation platform. Versions starting with 0.211.0 and prior to 1.120.4, 1.121.1, and 1.122.0 contain a critical Remote Code Execution (RCE) vulnerability in their workflow expression evaluation system. Under certain conditions, expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently

Nuclei template

28 repos

https://github.com/intbjw/CVE-2025-68613-poc-via-copilot

https://github.com/intelligent-ears/CVE-2025-68613

https://github.com/hackersatyamrastogi/n8n-exploit-CVE-2025-68613-n8n-God-Mode-Ultimate

https://github.com/JohannesLks/CVE-2025-68613-Python-Exploit

https://github.com/mbanyamer/n8n-Authenticated-Expression-Injection-RCE-CVE-2025-68613

https://github.com/Ashwesker/Ashwesker-CVE-2025-68613

https://github.com/shibaaa204/CVE-2025-68613

https://github.com/TheStingR/CVE-2025-68613-POC

https://github.com/Dlanang/homelab-CVE-2025-68613

https://github.com/LingerANR/n8n-CVE-2025-68613

https://github.com/nehkark/CVE-2025-68613

https://github.com/GnuTLam/POC-CVE-2025-68613

https://github.com/r4j3sh-com/CVE-2025-68613-n8n-lab

https://github.com/ali-py3/Exploit-CVE-2025-68613

https://github.com/gagaltotal/n8n-cve-2025-68613

https://github.com/reem-012/poc_CVE-2025-68613

https://github.com/wioui/n8n-CVE-2025-68613-exploit

https://github.com/ahmedshamsddin/n8n-RCE-CVE-2025-68613

https://github.com/manyaigdtuw/CVE-2025-68613_Scanner

https://github.com/AbdulRKB/n8n-RCE

https://github.com/Khin-96/n8n-cve-2025-68613-thm

https://github.com/rxerium/CVE-2025-68613

https://github.com/Ak-cybe/CVE-2025-68613-n8n-rce-analysis

https://github.com/secjoker/CVE-2025-68613

https://github.com/cv-sai-kamesh/n8n-CVE-2025-68613

https://github.com/releaseown/analysis-and-poc-n8n-CVE-2025-68613

https://github.com/J4ck3LSyN-Gen2/n8n-CVE-2025-68613-TryHackMe

https://github.com/TheInterception/n8n_CVE-2025-68613_exploit_payloads

DarkWebInformer@infosec.exchange at 2026-01-07T19:28:09.000Z ##

Another video showing how incredibly easy the n8n RCE vulnerability (CVE-2025-68613) is.

Credit: youtube.com/@0xmrsecurity

##

CVE-2025-13836
(9.1 CRITICAL)

EPSS: 0.09%

updated 2025-12-30T15:30:26

1 posts

When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.

linux@activitypub.awakari.com at 2026-01-12T11:47:18.000Z ## Ubuntu: Python Important Denial Of Service Issue USN-7951-1 CVE-2025-13836 Python could be made to crash if it received specially crafted network traffic.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-64113(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-12-29T19:43:28

1 posts

### Withdrawn Advisory This advisory has been withdrawn because it incorrectly listed [MediaBrowser.Server.Core](https://www.nuget.org/packages/MediaBrowser.Server.Core) as vulnerable. CVE-2025-64113 affects Emby Server versions 4.9.1.80 and prior, and Emby Server Beta versions 4.9.2.6 and prior. ### Original Description ### Impact This vulnerability affects all Emby Server versions - beta and s

1 repos

https://github.com/Ashwesker/Ashwesker-CVE-2025-64113

GEBIRGE@infosec.exchange at 2026-01-13T20:20:19.000Z ##

Here's my analysis of the recent-ish 9.3 Critical in #Emby (CVE-2025-64113).

Sadly, the vulnerability turned out to be pretty boring, but I've tried to make the best of it.

gebir.ge/blog/its-not-mine-cve

##

CVE-2025-13699
(7.0 HIGH)

EPSS: 0.12%

updated 2025-12-29T15:58:56.260000

1 posts

MariaDB mariadb-dump Utility Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of MariaDB. Interaction with the mariadb-dump utility is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the handling of view names. T

CVE-2025-67724
(5.4 MEDIUM)

EPSS: 0.04%

updated 2025-12-22T18:49:24.303000

1 posts

Tornado is a Python web framework and asynchronous networking library. In versions 6.5.2 and below, the supplied reason phrase is used unescaped in HTTP headers (where it could be used for header injection) or in HTML in the default error page (where it could be used for XSS) and can be exploited by passing untrusted or malicious data into the reason argument. Used by both RequestHandler.set_statu

Ubuntu@activitypub.awakari.com at 2026-01-08T20:43:44.000Z ## Ubuntu 25.10: Tornado Critical XSS DoS Flaws USN-7950-1 CVE-2025-67724 Several security issues were fixed in Tornado.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-20393
(10.0 CRITICAL)

EPSS: 7.28%

updated 2025-12-17T21:30:47

2 posts

Cisco is aware of a potential vulnerability.&nbsp; Cisco is currently investigating and&nbsp;will update these details as appropriate&nbsp;as more information becomes available.

6 repos

https://github.com/Ashwesker/Ashwesker-CVE-2025-20393

https://github.com/MRH701/mrh701.github.io

https://github.com/KingHacker353/CVE-2025-20393

https://github.com/StasonJatham/cisco-sa-sma-attack-N9bf4

https://github.com/cyberleelawat/CVE-2025-20393

https://github.com/MRH701/cisco-sa-sma-attack-N9bf4

AAKL at 2026-01-15T16:25:01.723Z ##

Updated Cisco advisory. "Rudolph, the red-nosed reindeer ...." 🎵 🎶 🎧

"There are no workarounds identified that directly mitigate the risk concerning this attack campaign, but administrators can view and follow the guidance provided in the Recommendations section of this advisory."

Cisco: CVE-2025-20393, critical: Reports About Cyberattacks Against Cisco Secure Email Gateway And Cisco Secure Email and Web Manager sec.cloudapps.cisco.com/securi

There are three other entries for today:

- Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerability sec.cloudapps.cisco.com/securi

- Cisco Identity Services Engine Cross-Site Scripting Vulnerability sec.cloudapps.cisco.com/securi

- Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability sec.cloudapps.cisco.com/securi @TalosSecurity

@cR0w

##

AAKL@infosec.exchange at 2026-01-15T16:25:01.000Z ##

Updated Cisco advisory. "Rudolph, the red-nosed reindeer ...." 🎵 🎶 🎧

"There are no workarounds identified that directly mitigate the risk concerning this attack campaign, but administrators can view and follow the guidance provided in the Recommendations section of this advisory."

Cisco: CVE-2025-20393, critical: Reports About Cyberattacks Against Cisco Secure Email Gateway And Cisco Secure Email and Web Manager sec.cloudapps.cisco.com/securi

There are three other entries for today:

- Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerability sec.cloudapps.cisco.com/securi

- Cisco Identity Services Engine Cross-Site Scripting Vulnerability sec.cloudapps.cisco.com/securi

- Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability sec.cloudapps.cisco.com/securi @TalosSecurity #infosec #Cisco #vulnerability

@cR0w

##

CVE-2025-66039
(0 None)

EPSS: 0.05%

updated 2025-12-12T15:19:07.567000

1 posts

FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions are vulnerable to authentication bypass when the authentication type is set to "webserver." When providing an Authorization header with an arbitrary value, a session is associated with the target user regardless of valid credentials. This issue is fixed in versions 16.0.44 and 17.0.23.

5 repos

https://github.com/jhow019/jhow019.github.io

https://github.com/cyberleelawat/FreePBX-Multiple-CVEs-2025

https://github.com/BimBoxH4/CVE-2025-66039_CVE-2025-61675_CVE-2025-61678_reePBX

https://github.com/rxerium/FreePBX-Vulns-December-25

https://github.com/jhow019/FreePBX-Vulns-December-25

CVE-2025-55182
(10.0 CRITICAL)

EPSS: 55.12%

updated 2025-12-09T16:53:25

1 posts

### Impact There is an unauthenticated remote code execution vulnerability in React Server Components. We recommend upgrading immediately. The vulnerability is present in versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 of: * [react-server-dom-webpack](https://www.npmjs.com/package/react-server-dom-webpack) * [react-server-dom-parcel](https://www.npmjs.com/package/react-server-dom-parcel) * [react-s

Nuclei template

100 repos

https://github.com/Updatelap/CVE-2025-55182

https://github.com/Dh4v4l8/CVE-2025-55182-poc-tool

https://github.com/xkillbit/cve-2025-55182-scanner

https://github.com/VeilVulp/RscScan-cve-2025-55182

https://github.com/RuoJi6/CVE-2025-55182-RCE-shell

https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc

https://github.com/gensecaihq/react2shell-scanner

https://github.com/subhdotsol/CVE-2025-55182

https://github.com/im-ezboy/CVE-2025-55182-zoomeye

https://github.com/Chocapikk/CVE-2025-55182

https://github.com/MrR0b0t19/CVE-2025-55182-shellinteractive

https://github.com/zr0n/react2shell

https://github.com/xalgord/React2Shell

https://github.com/EynaExp/CVE-2025-55182-POC

https://github.com/acheong08/CVE-2025-55182-poc

https://github.com/kondukto-io/vulnerable-next-js-poc

https://github.com/yz9yt/React2Shell-CTF

https://github.com/mrknow001/RSC_Detector

https://github.com/ynsmroztas/NextRce

https://github.com/surajhacx/react2shellpoc

https://github.com/alfazhossain/CVE-2025-55182-Exploiter

https://github.com/BeichenDream/CVE-2025-55182-GodzillaMemoryShell

https://github.com/fatguru/CVE-2025-55182-scanner

https://github.com/dwisiswant0/CVE-2025-55182

https://github.com/hackersatyamrastogi/react2shell-ultimate

https://github.com/freeqaz/react2shell

https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension

https://github.com/theman001/CVE-2025-55182

https://github.com/msanft/CVE-2025-55182

https://github.com/hualy13/CVE-2025-55182

https://github.com/c0rydoras/CVE-2025-55182

https://github.com/Faithtiannn/CVE-2025-55182

https://github.com/AdityaBhatt3010/React2Shell-CVE-2025-55182-The-Deserialization-Bug-That-Broke-the-Web

https://github.com/kavienanj/CVE-2025-55182

https://github.com/zack0x01/CVE-2025-55182-advanced-scanner-

https://github.com/chrahman/react2shell-CVE-2025-55182-full-rce-script

https://github.com/hidden-investigations/react2shell-scanner

https://github.com/techgaun/cve-2025-55182-scanner

https://github.com/aliclub0x00/CVE-2025-55182-POC-NEXTJS

https://github.com/zack0x01/vuln-app-CVE-2025-55182

https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool

https://github.com/Cr4at0r/Next.js-RCE-Scanner-BurpSuite-Extension-

https://github.com/zzhorc/CVE-2025-55182

https://github.com/jf0x3a/CVE-2025-55182-exploit

https://github.com/fullhunt/react2shell-test-server

https://github.com/GelukCrab/React-Server-Components-RCE

https://github.com/shamo0/react2shell-PoC

https://github.com/SainiONHacks/CVE-2025-55182-Scanner

https://github.com/MoLeft/React2Shell-Toolbox

https://github.com/songsanggggg/CVE-2025-55182

https://github.com/Rsatan/Next.js-Exploit-Tool

https://github.com/CirqueiraDev/MassExploit-CVE-2025-55182

https://github.com/xcanwin/CVE-2025-55182-React-RCE

https://github.com/timsonner/React2Shell-CVE-2025-55182

https://github.com/websecuritylabs/React2Shell-Library

https://github.com/CymulateResearch/React2Shell-Scanner

https://github.com/alsaut1/react2shell-lab

https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script

https://github.com/l4rm4nd/CVE-2025-55182

https://github.com/sickwell/CVE-2025-55182

https://github.com/AliHzSec/CVE-2025-55182

https://github.com/TrixSec/CVE-2025-55182-Scanner

https://github.com/whiteov3rflow/CVE-2025-55182-poc

https://github.com/LemonTeatw1/CVE-2025-55182-exploit

https://github.com/Security-Phoenix-demo/react2shell-scanner-rce-react-next-CVE-2025-55182-CVE-2025-66478

https://github.com/momika233/CVE-2025-55182-bypass

https://github.com/ZihxS/check-react-rce-cve-2025-55182

https://github.com/heiheishushu/rsc_detect_CVE-2025-55182

https://github.com/sumanrox/rschunter

https://github.com/hoosin/CVE-2025-55182

https://github.com/assetnote/react2shell-scanner

https://github.com/cybertechajju/R2C-CVE-2025-55182-66478

https://github.com/theori-io/reactguard

https://github.com/XiaomingX/CVE-2025-55182-poc

https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension

https://github.com/emredavut/CVE-2025-55182

https://github.com/santihabib/CVE-2025-55182-analysis

https://github.com/C00LN3T/React2Shell

https://github.com/sho-luv/React2Shell

https://github.com/kOaDT/poc-cve-2025-55182

https://github.com/onlylovetx/CVE-2025-55182-CVE-2025-66478-Exploit-GUI

https://github.com/sudo-Yangziran/CVE-2025-55182POC

https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js

https://github.com/logesh-GIT001/CVE-2025-55182

https://github.com/Ashwesker/Ashwesker-CVE-2025-55182

https://github.com/shyambhanushali/React2Shell

https://github.com/yanoshercohen/React2Shell_CVE-2025-55182

https://github.com/vijay-shirhatti/RSC-Detect-CVE-2025-55182

https://github.com/nehkark/CVE-2025-55182

https://github.com/Spritualkb/CVE-2025-55182-exp

https://github.com/Pizz33/CVE-2025-55182-burpscanner

https://github.com/M4xSec/CVE-2025-55182-React2Shell-RCE-Shell

https://github.com/Cillian-Collins/CVE-2025-55182

https://github.com/ThemeHackers/CVE-2025-55182

https://github.com/Saturate/CVE-2025-55182-Scanner

https://github.com/StealthMoud/CVE-2025-55182-Scanner

https://github.com/BlackTechX011/React2Shell

https://github.com/ejpir/CVE-2025-55182-bypass

https://github.com/keklick1337/CVE-2025-55182-golang-PoC

https://github.com/ejpir/CVE-2025-55182-research

threatresearch@infosec.exchange at 2026-01-12T22:27:57.000Z ##

I had a chance last week to chat with Benjamin Read of #Wiz. Last month, Read and other members of his team published a deep dive into the #React2Shell
(CVE-2025-55182) vulnerability, and I was curious to see what has been hitting my honeypot, so I took a closer look.

This is doing some weird stuff, friends.

As is normally the case with exploits targeting internet-facing devices, once the exploit becomes known, it ends up in the automated scanners used by threat actors and security researchers. What I've seen over the past week is a combination of both.

In just a few hours of operation, I identified a small number of source IP addresses exploiting React2Shell by pointing the vulnerable system at URLs hosting BASH scripts. These scripts are really familiar to anyone who routinely looks at honeypot data - they contain a series of commands that pull down and execute malicious payloads.

And as I've seen in the past, some of these payloads use racially inflammatory language in their malware. It's weird and gross, but unfortunately, really common.

But while most of these payloads were "the usual suspects" - remote shells, cryptocurrency miners - there was one payload that stuck out.

It's an exploit file, based on this proof-of-concept [github.com/iotwar/FIVEM-POC/bl] designed to DDoS a modded server running "FiveM," a popular version of the game Grand Theft Auto V.

Let that one sink in: among the earliest adopters of a brand new exploit are...people trying to mess with other people's online game servers.

I've long said that exploits like these are the canaries in the datacenter coal mine. After all, if an attacker can force your server to run a cryptominer (or a game DDoS tool), they can force it to run far more malicious code.

I guess someone, or a group of someones, just want to ruin everyone's good time, no matter how or what form that takes. And they'll do it in the most offensive way possible.

Anyway, patch your servers, please, if only to stick it to these people who want to be the reason we can't have nice things.

#PoC #exploit #CVE_2025_55182 #DDoS #FiveM #REACT #Bash #cryptominer #malware

##

CVE-2025-66471(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-12-05T18:33:09

1 posts

### Impact urllib3's [streaming API](https://urllib3.readthedocs.io/en/2.5.0/advanced-usage.html#streaming-and-i-o) is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding

Ubuntu@activitypub.awakari.com at 2026-01-12T23:08:08.000Z ## Ubuntu: urllib3 Critical DoS Regression USN-7927-2 CVE-2025-66471 USN-7927-1 introduced a regression in urllib3

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-66516(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-12-05T02:26:57

1 posts

Critical XXE in Apache Tika tika-core (1.13-3.2.1), tika-pdf-module (2.0.0-3.2.1) and tika-parsers (1.13-1.28.5) modules on all platforms allows an attacker to carry out XML External Entity injection via a crafted XFA file inside of a PDF. This CVE covers the same vulnerability as in CVE-2025-54988. However, this CVE expands the scope of affected packages in two ways. First, while the entrypoi

4 repos

https://github.com/sid6224/CVE-2025-66516-POC

https://github.com/intSheep/Tika-CVE-2025-66516-Lab

https://github.com/chasingimpact/CVE-2025-66516-Writeup-POC

https://github.com/Ashwesker/Ashwesker-CVE-2025-66516

CVE-2025-64126
(10.0 CRITICAL)

EPSS: 5.60%

updated 2025-12-01T15:39:53.100000

1 posts

An OS command injection vulnerability exists due to improper input validation. The application accepts a parameter directly from user input without verifying it is a valid IP address or filtering potentially malicious characters. This could allow an unauthenticated attacker to inject arbitrary commands.

CVE-2025-64127
(10.0 CRITICAL)

EPSS: 5.60%

updated 2025-11-26T18:31:15

1 posts

An OS command injection vulnerability exists due to insufficient sanitization of user-supplied input. The application accepts parameters that are later incorporated into OS commands without adequate validation. This could allow an unauthenticated attacker to execute arbitrary commands remotely.

CVE-2025-64130
(9.8 CRITICAL)

EPSS: 0.15%

updated 2025-11-26T18:31:15

1 posts

Zenitel TCIV-3+ is vulnerable to a reflected cross-site scripting vulnerability, which could allow a remote attacker to execute arbitrary JavaScript on the victim's browser.

CVE-2025-64129
(7.6 HIGH)

EPSS: 0.17%

updated 2025-11-26T18:31:15

1 posts

Zenitel TCIV-3+ is vulnerable to an out-of-bounds write vulnerability, which could allow a remote attacker to crash the device.

CVE-2025-64128
(10.0 CRITICAL)

EPSS: 5.60%

updated 2025-11-26T18:31:15

1 posts

An OS command injection vulnerability exists due to incomplete validation of user-supplied input. Validation fails to enforce sufficient formatting rules, which could permit attackers to append arbitrary data. This could allow an unauthenticated attacker to inject arbitrary commands.

technadu at 2026-01-15T13:03:28.636Z ##

Sicarii RaaS uses Israeli/Jewish iconography — but researchers say it’s likely deceptive branding.

• Geo-fencing to avoid Israeli systems
• CVE-2025-64446 exploitation
• Data theft + destructive ransomware

technadu.com/sicarii-ransomwar

What’s your assessment of attribution through branding?

##

technadu@infosec.exchange at 2026-01-15T13:03:28.000Z ##

Sicarii RaaS uses Israeli/Jewish iconography — but researchers say it’s likely deceptive branding.

• Geo-fencing to avoid Israeli systems
• CVE-2025-64446 exploitation
• Data theft + destructive ransomware

technadu.com/sicarii-ransomwar

What’s your assessment of attribution through branding?

#Infosec #Ransomware #ThreatIntelligence

##

CVE-2025-40300(CVSS UNKNOWN)

EPSS: 0.08%

updated 2025-11-17T18:30:25

1 posts

In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors af

Ubuntu@activitypub.awakari.com at 2026-01-09T16:55:37.000Z ## Ubuntu 24.04: Linux-azure-nvidia Critical Issues CVE-2025-40300 Several security issues were fixed in the Linux kernel.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-12818
(5.9 MEDIUM)

EPSS: 0.06%

updated 2025-11-14T16:42:03.187000

1 posts

Integer wraparound in multiple PostgreSQL libpq client library functions allows an application input provider or network peer to cause libpq to undersize an allocation and write out-of-bounds by hundreds of megabytes. This results in a segmentation fault for the application using libpq. Versions before PostgreSQL 18.1, 17.7, 16.11, 15.15, 14.20, and 13.23 are affected.

linux@activitypub.awakari.com at 2026-01-12T22:14:42.000Z ## Oracle Linux 9: ELSA-2026-0458 libpq Moderate Threat CVE-2025-12818 The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:

#Oracle #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-8677
(7.5 HIGH)

EPSS: 0.07%

updated 2025-11-05T00:32:35

1 posts

Querying for records within a specially crafted zone containing certain malformed DNSKEY records can lead to CPU exhaustion. This issue affects BIND 9 versions 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.

CVE-2025-40778
(8.6 HIGH)

EPSS: 0.01%

updated 2025-11-05T00:32:31

1 posts

Under certain circumstances, BIND is too lenient when accepting records from answers, allowing an attacker to inject forged data into the cache. This issue affects BIND 9 versions 9.11.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.

1 repos

https://github.com/nehkark/CVE-2025-40778

CVE-2025-4802
(9.8 CRITICAL)

EPSS: 0.01%

updated 2025-11-03T21:34:58

1 posts

Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo).

1 repos

https://github.com/Betim-Hodza/CVE-2025-4802-Proof-of-Concept

raptor@infosec.exchange at 2026-01-10T09:07:31.000Z ##

Cool bug 🐞

CVE-2025-4802: Arbitrary library path #vulnerability in static setuid binary in #GLIBC

hackyboiz.github.io/2025/12/03

##

CVE-2025-30722
(5.3 MEDIUM)

EPSS: 0.11%

updated 2025-11-03T21:34:39

1 posts

Vulnerability in the MySQL Client product of Oracle MySQL (component: Client: mysqldump). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized access to critica

CVE-2025-30693
(5.5 MEDIUM)

EPSS: 0.09%

updated 2025-11-03T21:33:34

1 posts

Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or fre

CVE-2025-21490
(4.9 MEDIUM)

EPSS: 0.44%

updated 2025-11-03T21:32:18

1 posts

Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a

CVE-2025-6430
(6.1 MEDIUM)

EPSS: 0.05%

updated 2025-11-03T20:19:19.233000

1 posts

When a file download is specified via the `Content-Disposition` header, that directive would be ignored if the file was included via a `&lt;embed&gt;` or `&lt;object&gt;` tag, potentially making a website vulnerable to a cross-site scripting attack. This vulnerability affects Firefox < 140, Firefox ESR < 128.12, Thunderbird < 140, and Thunderbird < 128.12.

hackmag@infosec.exchange at 2026-01-10T10:04:30.000Z ##

⚪ Firefox Patches Vulnerability Discovered by a Positive Technologies Expert

🗨️ Exploitation of the vulnerability became possible after injecting malicious code into an arbitrary website, allowing an attacker to steal credentials and redirect users to phishing pages.

🔗 hackmag.com/news/cve-2025-6430

#news

##

CVE-2021-44228
(10.0 CRITICAL)

EPSS: 94.36%

updated 2025-10-22T19:13:26

1 posts

# Summary Log4j versions prior to 2.16.0 are subject to a remote code execution vulnerability via the ldap JNDI parser. As per [Apache's Log4j security guide](https://logging.apache.org/log4j/2.x/security.html): Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who

Nuclei template

100 repos

https://github.com/marcourbano/CVE-2021-44228

https://github.com/claranet/ansible-role-log4shell

https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words

https://github.com/sunnyvale-it/CVE-2021-44228-PoC

https://github.com/NS-Sp4ce/Vm4J

https://github.com/AlexandreHeroux/Fix-CVE-2021-44228

https://github.com/jas502n/Log4j2-CVE-2021-44228

https://github.com/NCSC-NL/log4shell

https://github.com/faisalfs10x/Log4j2-CVE-2021-44228-revshell

https://github.com/mr-r3b00t/CVE-2021-44228

https://github.com/thecyberneh/Log4j-RCE-Exploiter

https://github.com/justakazh/Log4j-CVE-2021-44228

https://github.com/korteke/log4shell-demo

https://github.com/0xDexter0us/Log4J-Scanner

https://github.com/giterlizzi/nmap-log4shell

https://github.com/Jeromeyoung/log4j2burpscanner

https://github.com/mzlogin/CVE-2021-44228-Demo

https://github.com/puzzlepeaches/Log4jCenter

https://github.com/qingtengyun/cve-2021-44228-qingteng-patch

https://github.com/MalwareTech/Log4jTools

https://github.com/kubearmor/log4j-CVE-2021-44228

https://github.com/twseptian/spring-boot-log4j-cve-2021-44228-docker-lab

https://github.com/back2root/log4shell-rex

https://github.com/BinaryDefense/log4j-honeypot-flask

https://github.com/blake-fm/vcenter-log4j

https://github.com/RedDrip7/Log4Shell_CVE-2021-44228_related_attacks_IOCs

https://github.com/mergebase/log4j-detector

https://github.com/boundaryx/cloudrasp-log4j2

https://github.com/puzzlepeaches/Log4jHorizon

https://github.com/bigsizeme/Log4j-check

https://github.com/infiniroot/nginx-mitigate-log4shell

https://github.com/puzzlepeaches/Log4jUnifi

https://github.com/HynekPetrak/log4shell-finder

https://github.com/sassoftware/loguccino

https://github.com/TaroballzChen/CVE-2021-44228-log4jVulnScanner-metasploit

https://github.com/CodeShield-Security/Log4JShell-Bytecode-Detector

https://github.com/Adikso/minecraft-log4j-honeypot

https://github.com/Diverto/nse-log4shell

https://github.com/r3kind1e/Log4Shell-obfuscated-payloads-generator

https://github.com/nccgroup/log4j-jndi-be-gone

https://github.com/1lann/log4shelldetect

https://github.com/christophetd/log4shell-vulnerable-app

https://github.com/redhuntlabs/Log4JHunt

https://github.com/logpresso/CVE-2021-44228-Scanner

https://github.com/momos1337/Log4j-RCE

https://github.com/shamo0/CVE-2021-44228

https://github.com/DragonSurvivalEU/RCE

https://github.com/alexandre-lavoie/python-log4rce

https://github.com/Malwar3Ninja/Exploitation-of-Log4j2-CVE-2021-44228

https://github.com/julian911015/Log4j-Scanner-Exploit

https://github.com/ssl/scan4log4j

https://github.com/lfama/log4j_checker

https://github.com/roxas-tan/CVE-2021-44228

https://github.com/simonis/Log4jPatch

https://github.com/qingtengyun/cve-2021-44228-qingteng-online-patch

https://github.com/Azeemering/CVE-2021-44228-DFIR-Notes

https://github.com/thomaspatzke/Log4Pot

https://github.com/stripe/log4j-remediation-tools

https://github.com/darkarnium/Log4j-CVE-Detect

https://github.com/leonjza/log4jpwn

https://github.com/cisagov/log4j-scanner

https://github.com/corretto/hotpatch-for-apache-log4j2

https://github.com/NorthwaveSecurity/log4jcheck

https://github.com/future-client/CVE-2021-44228

https://github.com/mufeedvh/log4jail

https://github.com/fox-it/log4j-finder

https://github.com/fullhunt/log4j-scan

https://github.com/cyberxml/log4j-poc

https://github.com/f0ng/log4j2burpscanner

https://github.com/mr-vill4in/log4j-fuzzer

https://github.com/mubix/CVE-2021-44228-Log4Shell-Hashes

https://github.com/corelight/cve-2021-44228

https://github.com/LiveOverflow/log4shell

https://github.com/alexbakker/log4shell-tools

https://github.com/rubo77/log4j_checker_beta

https://github.com/dwisiswant0/look4jar

https://github.com/yahoo/check-log4j

https://github.com/CERTCC/CVE-2021-44228_scanner

https://github.com/aws-samples/kubernetes-log4j-cve-2021-44228-node-agent

https://github.com/takito1812/log4j-detect

https://github.com/sec13b/CVE-2021-44228-POC

https://github.com/kozmer/log4j-shell-poc

https://github.com/tippexs/nginx-njs-waf-cve2021-44228

https://github.com/Kadantte/CVE-2021-44228-poc

https://github.com/fireeye/CVE-2021-44228

https://github.com/irgoncalves/f5-waf-quick-patch-cve-2021-44228

https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce

https://github.com/wortell/log4j

https://github.com/HyCraftHD/Log4J-RCE-Proof-Of-Concept

https://github.com/toramanemre/apache-solr-log4j-CVE-2021-44228

https://github.com/0xInfection/LogMePwn

https://github.com/irgoncalves/f5-waf-enforce-sig-CVE-2021-44228

https://github.com/pedrohavay/exploit-CVE-2021-44228

https://github.com/lucab85/log4j-cve-2021-44228

https://github.com/KosmX/CVE-2021-44228-example

https://github.com/greymd/CVE-2021-44228

https://github.com/Nanitor/log4fix

https://github.com/CrackerCat/CVE-2021-44228-Log4j-Payloads

https://github.com/hackinghippo/log4shell_ioc_ips

https://github.com/toramanemre/log4j-rce-detect-waf-bypass

nono@toot.paris at 2026-01-08T21:46:36.000Z ##

Cloudflare has even bragged on their blog¹ about how they run data analytics on all of the web requests going through their system. This data may be collected for government surveillance purposes as well.

1: blog.cloudflare.com/exploitati

##

CVE-2025-22224
(9.4 CRITICAL)

EPSS: 51.47%

updated 2025-10-22T00:34:17

1 posts

VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.

jbhall56@infosec.exchange at 2026-01-09T12:57:40.000Z ##

The three bugs, tracked as CVE-2025-22224, CVE-2025-22225 and CVE-2025-22226, and named ESXicape, allow privileged attackers to execute arbitrary code and escape the VM to compromise the hypervisor itself. securityweek.com/exploit-for-v

##

CVE-2025-22225
(8.3 HIGH)

EPSS: 7.05%

updated 2025-10-22T00:33:13

1 posts

VMware ESXi contains an arbitrary write vulnerability. A malicious actor with privileges within the VMX process may trigger an arbitrary kernel write leading to an escape of the sandbox.

jbhall56@infosec.exchange at 2026-01-09T12:57:40.000Z ##

The three bugs, tracked as CVE-2025-22224, CVE-2025-22225 and CVE-2025-22226, and named ESXicape, allow privileged attackers to execute arbitrary code and escape the VM to compromise the hypervisor itself. securityweek.com/exploit-for-v

##

CVE-2025-22226
(7.1 HIGH)

EPSS: 3.96%

updated 2025-10-22T00:33:13

1 posts

VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability due to an out-of-bounds read in HGFS. A malicious actor with administrative privileges to a virtual machine may be able to exploit this issue to leak memory from the vmx process.

jbhall56@infosec.exchange at 2026-01-09T12:57:40.000Z ##

The three bugs, tracked as CVE-2025-22224, CVE-2025-22225 and CVE-2025-22226, and named ESXicape, allow privileged attackers to execute arbitrary code and escape the VM to compromise the hypervisor itself. securityweek.com/exploit-for-v

##

CVE-2024-43451
(6.5 MEDIUM)

EPSS: 89.93%

updated 2025-10-22T00:33:11

1 posts

NTLM Hash Disclosure Spoofing Vulnerability

1 repos

https://github.com/RonF98/CVE-2024-43451-POC

oversecurity@mastodon.social at 2026-01-14T09:40:05.000Z ##

German Manufacturing Under Phishing Attacks: Tracking a Stealthy AsyncRATCampaign

Learn about a new phishing campaign targeting German manufacturing companies using CVE-2024-43451.

🔗️ [Any] link.is.it/F0JDjf

##

CVE-2025-59816
(7.3 HIGH)

EPSS: 0.10%

updated 2025-09-26T14:32:19.853000

1 posts

This vulnerability allows attackers to directly query the underlying database, potentially retrieving all data stored in the Billing Admin database, including user credentials. User passwords are stored in plaintext, significantly increasing the severity of this issue.

CVE-2025-59817
(9.1 CRITICAL)

EPSS: 0.04%

updated 2025-09-25T21:30:37

1 posts

This vulnerability allows attackers to execute arbitrary commands on the underlying system. Because the web portal runs with root privileges, successful exploitation grants full control over the device, potentially compromising its availability, confidentiality, and integrity.

CVE-2025-59815
(9.1 CRITICAL)

EPSS: 0.06%

updated 2025-09-25T21:30:37

1 posts

This vulnerability allows malicious actors to execute arbitrary commands on the underlying system of the Zenitel ICX500 and ICX510 Gateway, granting shell access. Exploitation can compromise the device’s availability, confidentiality, and integrity.

CVE-2025-59814
(9.8 CRITICAL)

EPSS: 0.08%

updated 2025-09-25T21:30:36

1 posts

This vulnerability allows malicious actors to gain unauthorized access to the Zenitel ICX500 and ICX510 Gateway Billing Admin endpoint, enabling them to read the entire contents of the Billing Admin database.

CVE-2025-50173
(7.8 HIGH)

EPSS: 0.12%

updated 2025-08-19T14:36:03.933000

1 posts

Weak authentication in Windows Installer allows an authorized attacker to elevate privileges locally.

hackmag@infosec.exchange at 2026-01-12T20:15:45.000Z ##

⚪ August Windows updates may block app installations

🗨️ Microsoft reported that the Windows security updates for August 2025 may trigger unexpected User Account Control (UAC) prompts and cause problems with app installations. The bug affects users without administrator…

🔗 hackmag.com/news/cve-2025-5017

#news

##

CVE-2025-53136
(5.5 MEDIUM)

EPSS: 0.05%

updated 2025-08-19T14:13:07.783000

2 posts

Exposure of sensitive information to an unauthorized actor in Windows NT OS Kernel allows an authorized attacker to disclose information locally.

1 repos

https://github.com/nu1lptr0/CVE-2025-53136

DarkWebInformer at 2026-01-15T01:23:28.650Z ##

❗️CVE-2025-53136: Windows Kernel Information Disclosure through Race condition

PoC/Exploit: github.com/nu1lptr0/CVE-2025-5

CVSS: 5.5
CVE Published: Aug 12th, 2025

##

DarkWebInformer@infosec.exchange at 2026-01-15T01:23:28.000Z ##

❗️CVE-2025-53136: Windows Kernel Information Disclosure through Race condition

PoC/Exploit: github.com/nu1lptr0/CVE-2025-5

CVSS: 5.5
CVE Published: Aug 12th, 2025

##

CVE-2025-25256
(9.8 CRITICAL)

EPSS: 26.27%

updated 2025-08-15T18:15:27.583000

2 posts

An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiSIEM version 7.3.0 through 7.3.1, 7.2.0 through 7.2.5, 7.1.0 through 7.1.7, 7.0.0 through 7.0.3 and before 6.7.9 allows an unauthenticated attacker to execute unauthorized code or commands via crafted CLI requests.

Nuclei template

1 repos

https://github.com/watchtowrlabs/watchTowr-vs-FortiSIEM-CVE-2025-25256

jbhall56 at 2026-01-15T14:35:44.623Z ##

The vulnerability is tracked as CVE-2025-25256, and is a combination of two issues that permit arbitrary write with admin permissions and privilege escalation to root access. bleepingcomputer.com/news/secu

##

jbhall56@infosec.exchange at 2026-01-15T14:35:44.000Z ##

The vulnerability is tracked as CVE-2025-25256, and is a combination of two issues that permit arbitrary write with admin permissions and privilege escalation to root access. bleepingcomputer.com/news/secu

##

CVE-2025-8286
(9.8 CRITICAL)

EPSS: 0.58%

updated 2025-07-31T21:32:03

1 posts

Güralp FMUS series seismic monitoring devices expose an unauthenticated Telnet-based command line interface that could allow an attacker to modify hardware configurations, manipulate data, or factory reset the device.

Nuclei template

beyondmachines1@infosec.exchange at 2026-01-14T11:01:43.000Z ##

Critical authentication bypass in Güralp Systems seismic monitoring devices

Güralp Systems reported a critical authentication bypass vulnerability (CVE-2025-8286) in its FMUS and MIN series seismic devices, allowing unauthenticated attackers to modify configurations or factory reset hardware.

**Make sure all Güralp devices are isolated from the internet and accessible from trusted networks only. Review the patch, and consult with the vendor since it's still experimental. At minimum, isolate all systems from the internet, then wait for the final patch.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-6842
(4.7 MEDIUM)

EPSS: 0.03%

updated 2025-07-01T15:32:11

1 posts

A vulnerability was found in code-projects Product Inventory System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/edit_user.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

2 repos

https://github.com/12nio/CVE-2025-68428_PoC

https://github.com/Nurjaman2004/jsPDF-Bulk-Detector-CVE-2025-68428-

DarkWebInformer@infosec.exchange at 2026-01-11T02:00:20.000Z ##

❗️CVE-2025-68428: Critical Path Traversal in jsPDF

GitHub: github.com/12nio/CVE-2025-6842

CVSS: 9.2
CVE Published: January 5th, 2026
Exploit Published: January 8th, 2026

News source: bleepingcomputer.com/news/secu

##

CVE-2022-23128
(9.8 CRITICAL)

EPSS: 3.77%

updated 2024-11-21T06:48:03.407000

1 posts

Incomplete List of Disallowed Inputs vulnerability in Mitsubishi Electric MC Works64 versions 4.00A (10.95.201.23) to 4.04E (10.95.210.01), ICONICS GENESIS64 versions 10.95.3 to 10.97, ICONICS Hyper Historian versions 10.95.3 to 10.97, ICONICS AnalytiX versions 10.95.3 to 10.97 and ICONICS MobileHMI versions 10.95.3 to 10.97 allows a remote unauthenticated attacker to bypass the authentication of

beyondmachines1@infosec.exchange at 2026-01-09T13:01:45.000Z ##

Mitsubishi Electric patches critical SCADA and HMI vulnerabilities

Mitsubishi Electric patched several vulnerabilities in its ICONICS and HMI SCADA suites, including a critical bypass flaw (CVE-2022-23128) that allows unauthorized system control.

**Make sure all Mitsubishi Electric and ICONICS Digital Solutions devices are isolated from the internet and accessible from trusted networks only. Update to GENESIS64 version 10.97.1 immediately and all other systems which have patches. Since GENESIS32 is retired and won't be patched, use strict network isolation and plan a replacement.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2020-8554
(6.3 MEDIUM)

EPSS: 24.78%

updated 2024-11-21T05:39:01.370000

1 posts

Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker who is able to patch the status (which is considered a privileged operation and should not typically be granted to users) of a LoadBalancer service can set the status.loadBalancer.ingress.ip to simil

5 repos

https://github.com/Dviejopomata/CVE-2020-8554

https://github.com/alebedev87/gatekeeper-cve-2020-8554

https://github.com/rancher/externalip-webhook

https://github.com/twistlock/k8s-cve-2020-8554-mitigations

https://github.com/jrmurray000/CVE-2020-8554

raesene@infosec.exchange at 2026-01-14T09:43:23.000Z ##

For anyone who's been to one of my #Kubernetes #Security talks over the last couple of years, you may have seen me mention "the unpatchable 4", which is a set of Kubernetes CVEs for which there are no patches, you need to mitigate them with configuration or architecture choices.

I've been meaning to write more about them, and finally got a chance so here's the first in a mini-series of posts looking at the CVEs and the underlying reasons they occur. This time it's CVE-2020-8554.

securitylabs.datadoghq.com/art

##

CVE-2022-25845
(8.1 HIGH)

EPSS: 89.92%

updated 2024-05-15T06:28:36

1 posts

The package com.alibaba:fastjson before 1.2.83 is vulnerable to Deserialization of Untrusted Data by bypassing the default autoType shutdown restrictions, which is possible under certain conditions. Exploiting this vulnerability allows attacking remote servers. Workaround: If upgrading is not possible, you can enable [safeMode](https://github.com/alibaba/fastjson/wiki/fastjson_safemode).

6 repos

https://github.com/hosch3n/FastjsonVulns

https://github.com/nerowander/CVE-2022-25845-exploit

https://github.com/ph0ebus/CVE-2022-25845-In-Spring

https://github.com/luelueking/CVE-2022-25845-In-Spring

https://github.com/scabench/fastjson-tp1fn1

https://github.com/cuijiung/fastjson-CVE-2022-25845

cR0w@infosec.exchange at 2026-01-09T19:46:49.000Z ##

Perfect 10 in Fastjson. 🥳

It's funny that it appears to be a challenging enough bug that it bypassed at least two previous fixes.

cve.org/CVERecord?id=CVE-2025-

Fastjson before 1.2.48 mishandles autoType because, when an @type key is in a JSON document, and the value of that key is the name of a Java class, there may be calls to certain public methods of that class. Depending on the behavior of those methods, there may be JNDI injection with an attacker-supplied payload located elsewhere in that JSON document. This was exploited in the wild in 2023 through 2025. NOTE: this issue exists because of an incomplete fix for CVE-2017-18349. Also, a later bypass is covered by CVE-2022-25845.

##

CVE-2023-38408
(9.8 CRITICAL)

EPSS: 68.75%

updated 2024-04-19T05:07:56

1 posts

The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.

8 repos

https://github.com/wxrdnx/CVE-2023-38408

https://github.com/kali-mx/CVE-2023-38408

https://github.com/Adel2411/cve-2023-38408

https://github.com/classic130/CVE-2023-38408

https://github.com/fazilbaig1/cve_2023_38408_scanner

https://github.com/LucasPDiniz/CVE-2023-38408

https://github.com/mrtacojr/CVE-2023-38408

https://github.com/TX-One/CVE-2023-38408

beyondmachines1@infosec.exchange at 2026-01-14T12:01:44.000Z ##

Critical OpenSSH flaw exposes Moxa industrial switches to remote takeover

Moxa issued a critical advisory for a remote code execution vulnerability (CVE-2023-38408) affecting several industrial Ethernet switch series. The flaw allows unauthenticated attackers to take full control of devices if a user forwards an ssh-agent to a compromised system.

**Make sure all Moza devices are isolated from the internet and accessible from trusted networks only. Contact Moxa support to get the latest firmware for your EDS and RKS switches.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2023-31096
(7.8 HIGH)

EPSS: 0.02%

updated 2024-04-04T08:33:05

1 posts

An issue was discovered in Broadcom) LSI PCI-SV92EX Soft Modem Kernel Driver through 2.2.100.1 (aka AGRSM64.sys). There is Local Privilege Escalation to SYSTEM via a Stack Overflow in RTLCopyMemory (IOCTL 0x1b2150). An attacker can exploit this to elevate privileges from a medium-integrity process to SYSTEM. This can also be used to bypass kernel-level protections such as AV or PPL, because exploi

cR0w@infosec.exchange at 2026-01-13T18:04:31.000Z ##

The publicly disclosed ones are expiring Secure Boot cert:

msrc.microsoft.com/update-guid

and an old one that was published in 2023 but is apparently now applicable to all Windows systems with the Agere Soft Modem installed, even if it isn't in use.

msrc.microsoft.com/update-guid

cve.org/CVERecord?id=CVE-2023-

##

CVE-2017-18349
(9.8 CRITICAL)

EPSS: 92.08%

updated 2023-09-26T14:52:01

1 posts

parseObject in Fastjson before 1.2.25, as used in FastjsonEngine in Pippo 1.11.0 and other products, allows remote attackers to execute arbitrary code via a crafted JSON request, as demonstrated by a crafted rmi:// URI in the dataSourceName field of HTTP POST data to the Pippo /json URI, which is mishandled in AjaxApplication.java.

Nuclei template

1 repos

https://github.com/h0cksr/Fastjson--CVE-2017-18349-

cR0w@infosec.exchange at 2026-01-09T19:46:49.000Z ##

Perfect 10 in Fastjson. 🥳

It's funny that it appears to be a challenging enough bug that it bypassed at least two previous fixes.

cve.org/CVERecord?id=CVE-2025-

Fastjson before 1.2.48 mishandles autoType because, when an @type key is in a JSON document, and the value of that key is the name of a Java class, there may be calls to certain public methods of that class. Depending on the behavior of those methods, there may be JNDI injection with an attacker-supplied payload located elsewhere in that JSON document. This was exploited in the wild in 2023 through 2025. NOTE: this issue exists because of an incomplete fix for CVE-2017-18349. Also, a later bypass is covered by CVE-2022-25845.

##

CVE-2026-22265
(0 None)

EPSS: 0.00%

1 posts

N/A

thehackerwire@mastodon.social at 2026-01-15T17:43:21.000Z ##

🟠 CVE-2026-22265 - High (7.5)

Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Prior to 8.2.8.2, command injection vulnerability exists in the log viewing functionality that allows authenticated users to execute arbitrary system commands. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22859
(0 None)

EPSS: 0.04%

1 posts

N/A

CVE-2026-22853
(0 None)

EPSS: 0.04%

1 posts

N/A

CVE-2026-22259
(0 None)

EPSS: 0.00%

1 posts

N/A

CVE-2026-22262
(0 None)

EPSS: 0.00%

1 posts

N/A

CVE-2026-22261
(0 None)

EPSS: 0.00%

1 posts

N/A

CVE-2026-22264
(0 None)

EPSS: 0.00%

1 posts

N/A

CVE-2026-22260
(0 None)

EPSS: 0.00%

1 posts

N/A

CVE-2026-22258
(0 None)

EPSS: 0.00%

1 posts

N/A

CVE-2026-22263
(0 None)

EPSS: 0.00%

1 posts

N/A

CVE-2025-5017
(0 None)

EPSS: 0.00%

1 posts

N/A

hackmag@infosec.exchange at 2026-01-12T20:15:45.000Z ##

⚪ August Windows updates may block app installations

🗨️ Microsoft reported that the Windows security updates for August 2025 may trigger unexpected User Account Control (UAC) prompts and cause problems with app installations. The bug affects users without administrator…

🔗 hackmag.com/news/cve-2025-5017

#news

##

CVE-2026-22026
(0 None)

EPSS: 0.04%

1 posts

N/A

CVE-2026-21898
(0 None)

EPSS: 0.05%

1 posts

N/A

CVE-2026-21897
(0 None)

EPSS: 0.04%

1 posts

N/A

CVE-2026-22023
(0 None)

EPSS: 0.04%

1 posts

N/A

CVE-2026-22024
(0 None)

EPSS: 0.05%

1 posts

N/A

CVE-2026-22025
(0 None)

EPSS: 0.04%

1 posts

N/A

CVE-2026-21899
(0 None)

EPSS: 0.03%

1 posts

N/A

CVE-2025-59818
(0 None)

EPSS: 0.00%

1 posts

N/A

CVE-2025-59819
(0 None)

EPSS: 0.00%

1 posts

N/A

CVE-2025-63261
(0 None)

EPSS: 0.00%

1 posts

N/A

pentesttools@infosec.exchange at 2026-01-09T12:36:00.000Z ##

Our researchers at Pentest-Tools.com just found a new RCE in cPanel (CVE-2025-63261). 🔧

We discovered that a classic Unsafe Perl Open in AWStats allows command execution. The application fails to sanitize input before the open() call, so a well-placed pipe | character tricks the system into spawning a shell instead of reading a file.

This exploit requires zero actual plumbing. 🪠

Read Part 1 of the technical breakdown by Matei Badanoiu: pentest-tools.com/blog/cpanel-

#infosec #cybersecurity #cPanel #RCE #vulnerability #PentestTools

##

CVE-2026-21881
(0 None)

EPSS: 0.09%

1 posts

N/A

beyondmachines1@infosec.exchange at 2026-01-09T10:01:43.000Z ##

Kanboard patches critical authentication bypass and information disclosure flaws

Kanboard version 1.2.49 fixes a critical authentication bypass (CVE-2026-21881) and two other flaws that allow attackers to impersonate users, enumerate LDAP data, and perform open redirects. The most severe vulnerability allows full administrative access by spoofing HTTP headers when reverse proxy authentication is enabled.

**If possible, ensure your Kanboard instance is isolated from the internet and accessible only via a trusted network or VPN. Then plan a quick patch. If you use reverse proxy authentication, prioritize configuring your web server to strip all identity headers from external requests, since that's the most dangerous attack vector.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-69139
(0 None)

EPSS: 0.00%

1 posts

N/A

cR0w@infosec.exchange at 2026-01-07T20:05:48.000Z ##

That's a weird thing to do intentionally.

An unused function in MicroServer can start a reverse SSH connection to a vendor registered domain, without mutual authentication. An attacker on the local network with admin access to the web server, and the ability to manipulate DNS responses, can redirect the SSH connection to an attacker controlled device.

cve.org/CVERecord?id=CVE-2025-

##

Visit counter For Websites