##
Updated at UTC 2026-01-13T13:56:50.474578
| CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
|---|---|---|---|---|---|---|---|
| CVE-2025-40944 | 7.5 | 0.00% | 1 | 0 | 2026-01-13T10:15:58.457000 | A vulnerability has been identified in SIMATIC ET 200AL IM 157-1 PN (6ES7157-1AB | |
| CVE-2025-40942 | 8.8 | 0.00% | 2 | 0 | 2026-01-13T10:15:58.283000 | A vulnerability has been identified in TeleControl Server Basic (All versions < | |
| CVE-2025-40805 | 10.0 | 0.00% | 1 | 0 | 2026-01-13T10:15:58.047000 | Affected devices do not properly enforce user authentication on specific API end | |
| CVE-2025-41717 | 8.8 | 0.00% | 2 | 0 | 2026-01-13T09:31:36 | An unauthenticated remote attacker can trick a high privileged user into uploadi | |
| CVE-2026-0492 | 8.8 | 0.00% | 1 | 0 | 2026-01-13T03:32:20 | SAP HANA database is vulnerable to privilege escalation allowing an attacker wit | |
| CVE-2026-0501 | 10.0 | 0.00% | 1 | 0 | 2026-01-13T03:32:20 | Due to insufficient input validation in SAP S/4HANA Private Cloud and On-Premise | |
| CVE-2025-66177 | 8.8 | 0.00% | 1 | 0 | 2026-01-13T03:32:20 | There is a Stack overflow Vulnerability in the device Search and Discovery featu | |
| CVE-2025-66176 | 8.8 | 0.00% | 1 | 0 | 2026-01-13T03:32:20 | There is a Stack overflow Vulnerability in the device Search and Discovery featu | |
| CVE-2026-0511 | 8.1 | 0.00% | 1 | 0 | 2026-01-13T03:32:20 | SAP Fiori App Intercompany Balance Reconciliation does not perform necessary aut | |
| CVE-2026-0507 | 8.5 | 0.00% | 1 | 0 | 2026-01-13T03:32:20 | Due to an OS Command Injection vulnerability in SAP Application Server for ABAP | |
| CVE-2026-0506 | 8.1 | 0.00% | 1 | 0 | 2026-01-13T03:32:20 | Due to a Missing Authorization Check vulnerability in Application Server ABAP an | |
| CVE-2026-0491 | 9.1 | 0.00% | 1 | 0 | 2026-01-13T03:32:19 | SAP Landscape Transformation allows an attacker with admin privileges to exploit | |
| CVE-2026-0500 | 9.7 | 0.00% | 1 | 0 | 2026-01-13T03:32:19 | Due to the usage of vulnerable third party component in SAP Wily Introscope Ente | |
| CVE-2025-12420 | 0 | 0.00% | 4 | 0 | 2026-01-13T03:16:00.773000 | A vulnerability has been identified in the ServiceNow AI Platform that could ena | |
| CVE-2026-0498 | 9.1 | 0.00% | 1 | 0 | 2026-01-13T02:15:52.300000 | SAP S/4HANA (Private Cloud and On-Premise) allows an attacker with admin privile | |
| CVE-2025-67146 | 9.4 | 0.00% | 1 | 0 | 2026-01-13T00:30:57 | Multiple SQL Injection vulnerabilities exist in AbhishekMali21 GYM-MANAGEMENT-SY | |
| CVE-2026-22813 | 0 | 0.00% | 2 | 0 | 2026-01-12T23:15:53.523000 | OpenCode is an open source AI coding agent. The markdown renderer used for LLM r | |
| CVE-2026-22812 | 8.8 | 0.00% | 2 | 0 | 2026-01-12T23:15:53.370000 | OpenCode is an open source AI coding agent. Prior to 1.0.216, OpenCode automatic | |
| CVE-2026-22804 | 8.0 | 0.00% | 2 | 1 | 2026-01-12T23:15:53.063000 | Termix is a web-based server management platform with SSH terminal, tunneling, a | |
| CVE-2025-67147 | 9.8 | 0.00% | 1 | 0 | 2026-01-12T22:16:07.970000 | Multiple SQL Injection vulnerabilities exist in amansuryawanshi Gym-Management-S | |
| CVE-2025-63314 | 10.0 | 0.00% | 1 | 1 | 2026-01-12T21:31:38 | A static password reset token in the password reset function of DDSN Interactive | |
| CVE-2025-66689 | 6.5 | 0.00% | 2 | 0 | 2026-01-12T21:31:38 | A path traversal vulnerability exists in Zen MCP Server before 9.8.2 that allows | |
| CVE-2025-51567 | 9.1 | 0.00% | 1 | 0 | 2026-01-12T21:30:42 | A SQL Injection was found in the /exam/user/profile.php page of kashipara Online | |
| CVE-2025-68472 | 8.1 | 0.00% | 1 | 0 | 2026-01-12T20:07:43 | ### Summary An unauthenticated path traversal in the file upload API lets any ca | |
| CVE-2025-8110 | None | 0.04% | 12 | 6 | 2026-01-12T19:18:21 | Improper Symbolic link handling in the PutContents API in Gogs allows Local Exec | |
| CVE-2026-22771 | 8.8 | 0.00% | 1 | 0 | 2026-01-12T19:16:03.470000 | Envoy Gateway is an open source project for managing Envoy Proxy as a standalone | |
| CVE-2026-22252 | 9.1 | 0.00% | 1 | 0 | 2026-01-12T19:16:03.200000 | LibreChat is a ChatGPT clone with additional features. Prior to v0.8.2-rc2, Libr | |
| CVE-2026-21858 | 10.0 | 2.70% | 16 | 4 | template | 2026-01-12T19:16:02.603000 | n8n is an open source workflow automation platform. Versions starting with 1.65. |
| CVE-2025-52435 | 7.5 | 0.01% | 1 | 0 | 2026-01-12T19:16:00.697000 | J2EE Misconfiguration: Data Transmission Without Encryption vulnerability in Apa | |
| CVE-2025-50334 | 7.5 | 0.12% | 1 | 0 | 2026-01-12T18:39:30.937000 | An issue in Technitium DNS Server v.13.5 allows a remote attacker to cause a den | |
| CVE-2025-70161 | 9.8 | 0.24% | 2 | 0 | 2026-01-12T18:31:31 | EDIMAX BR-6208AC V2_1.02 is vulnerable to Command Injection. This arises because | |
| CVE-2025-69542 | 9.8 | 0.24% | 1 | 0 | 2026-01-12T18:31:31 | A Command Injection Vulnerability has been discovered in the DHCP daemon service | |
| CVE-2026-22584 | 9.8 | 0.03% | 1 | 0 | 2026-01-12T18:31:31 | Improper Control of Generation of Code ('Code Injection') vulnerability in Sales | |
| CVE-2026-0581 | 6.3 | 3.36% | 1 | 0 | 2026-01-12T18:31:26 | A vulnerability was determined in Tenda AC1206 15.03.06.23. Affected by this iss | |
| CVE-2025-46067 | 8.2 | 0.00% | 1 | 0 | 2026-01-12T18:30:36 | An issue in Automai Director v.25.2.0 allows a remote attacker to escalate privi | |
| CVE-2025-46070 | 9.8 | 0.00% | 1 | 0 | 2026-01-12T18:30:36 | An issue in Automai BotManager v.25.2.0 allows a remote attacker to execute arbi | |
| CVE-2025-71063 | 8.2 | 0.00% | 1 | 0 | 2026-01-12T18:30:36 | Errands before 46.2.10 does not verify TLS certificates for CalDAV servers. | |
| CVE-2025-66744 | 7.5 | 0.02% | 1 | 0 | 2026-01-12T18:30:30 | In Yonyou YonBIP v3 and before, the LoginWithV8 interface in the series data app | |
| CVE-2025-67004 | 6.5 | 0.02% | 1 | 0 | 2026-01-12T18:30:29 | An Information Disclosure vulnerability in CouchCMS 2.4 allow an Admin user to r | |
| CVE-2025-14942 | 9.8 | 0.08% | 1 | 0 | 2026-01-12T17:53:19.670000 | wolfSSH’s key exchange state machine can be manipulated to leak the client’s pas | |
| CVE-2025-62235 | 8.1 | 0.05% | 1 | 0 | 2026-01-12T17:15:52.007000 | Authentication Bypass by Spoofing vulnerability in Apache NimBLE. Receiving spe | |
| CVE-2025-56225 | 7.5 | 0.02% | 1 | 0 | 2026-01-12T17:15:51.840000 | fluidsynth-2.4.6 and earlier versions is vulnerable to Null pointer dereference | |
| CVE-2025-53477 | 7.5 | 0.02% | 1 | 0 | 2026-01-12T17:15:51.687000 | NULL Pointer Dereference vulnerability in Apache Nimble. Missing validation of | |
| CVE-2025-46068 | 8.8 | 0.00% | 1 | 0 | 2026-01-12T17:15:51.050000 | An issue in Automai Director v.25.2.0 allows a remote attacker to execute arbitr | |
| CVE-2025-46066 | 9.9 | 0.00% | 2 | 0 | 2026-01-12T17:15:50.700000 | An issue in Automai Director v.25.2.0 allows a remote attacker to escalate privi | |
| CVE-2025-14847 | 7.5 | 69.62% | 6 | 32 | template | 2026-01-12T17:15:50.250000 | Mismatched length fields in Zlib compressed protocol headers may allow a read of |
| CVE-2025-55125 | 7.8 | 0.06% | 2 | 0 | 2026-01-12T16:44:01.677000 | This vulnerability allows a Backup or Tape Operator to perform remote code execu | |
| CVE-2025-68493 | 8.1 | 0.04% | 1 | 0 | 2026-01-12T15:30:42 | Missing XML Validation vulnerability in Apache Struts, Apache Struts. This issu | |
| CVE-2025-52694 | 10.0 | 0.07% | 3 | 1 | 2026-01-12T15:16:03.463000 | Successful exploitation of the SQL injection vulnerability could allow an unauth | |
| CVE-2025-41006 | 0 | 0.00% | 2 | 0 | 2026-01-12T15:16:02.910000 | Imaster's MEMS Events CRM contains an SQL injection vulnerability in ‘phone’ par | |
| CVE-2026-22184 | None | 0.08% | 2 | 0 | 2026-01-12T09:31:31 | zlib versions up to and including 1.3.1.2 contain a global buffer overflow in th | |
| CVE-2026-0855 | 8.8 | 0.29% | 3 | 0 | 2026-01-12T09:30:36 | Certain IP Camera models developed by Merit LILIN has a OS Command Injection vul | |
| CVE-2025-14279 | 8.1 | 0.02% | 1 | 0 | 2026-01-12T09:30:36 | MLFlow versions up to and including 3.4.0 are vulnerable to DNS rebinding attack | |
| CVE-2026-0854 | 8.8 | 0.29% | 3 | 0 | 2026-01-12T06:16:11.040000 | Certain DVR/NVR models developed by Merit LILIN has a OS Command Injection vulne | |
| CVE-2025-61686 | 9.1 | 0.06% | 2 | 0 | 2026-01-11T14:53:55 | If applications use `createFileSessionStorage()` from `@react-router/node` (or ` | |
| CVE-2026-0841 | 8.8 | 0.04% | 2 | 0 | 2026-01-11T09:30:26 | A vulnerability was detected in UTT 进取 520W 1.7.7-180627. Affected by this issue | |
| CVE-2026-0840 | 8.8 | 0.04% | 2 | 0 | 2026-01-11T09:30:25 | A security vulnerability has been detected in UTT 进取 520W 1.7.7-180627. Affected | |
| CVE-2026-0839 | 8.8 | 0.04% | 2 | 0 | 2026-01-11T06:30:19 | A weakness has been identified in UTT 进取 520W 1.7.7-180627. Affected is the func | |
| CVE-2026-0838 | 8.8 | 0.04% | 2 | 0 | 2026-01-11T06:15:57.300000 | A security flaw has been discovered in UTT 进取 520W 1.7.7-180627. This impacts th | |
| CVE-2026-0837 | 8.8 | 0.04% | 2 | 0 | 2026-01-11T05:15:58.893000 | A vulnerability was identified in UTT 进取 520W 1.7.7-180627. This affects the fun | |
| CVE-2026-0836 | 8.8 | 0.04% | 2 | 0 | 2026-01-11T05:15:47.947000 | A vulnerability was determined in UTT 进取 520W 1.7.7-180627. The impacted element | |
| CVE-2025-15505 | 2.4 | 0.03% | 2 | 0 | 2026-01-11T03:30:13 | A vulnerability was found in Luxul XWR-600 up to 4.0.1. The affected element is | |
| CVE-2025-15502 | 7.3 | 1.04% | 1 | 0 | 2026-01-10T09:30:24 | A vulnerability was identified in Sangfor Operation and Maintenance Management S | |
| CVE-2026-22026 | 0 | 0.04% | 2 | 0 | 2026-01-10T01:16:18.843000 | CryptoLib provides a software-only solution using the CCSDS Space Data Link Secu | |
| CVE-2026-22024 | 0 | 0.05% | 2 | 0 | 2026-01-10T01:16:18.553000 | CryptoLib provides a software-only solution using the CCSDS Space Data Link Secu | |
| CVE-2026-22023 | 0 | 0.04% | 2 | 0 | 2026-01-10T01:16:18.410000 | CryptoLib provides a software-only solution using the CCSDS Space Data Link Secu | |
| CVE-2026-21900 | 0 | 0.05% | 2 | 0 | 2026-01-10T01:16:18.263000 | CryptoLib provides a software-only solution using the CCSDS Space Data Link Secu | |
| CVE-2025-65731 | 6.8 | 0.03% | 1 | 1 | 2026-01-09T21:32:41 | An issue was discovered in D-Link Router DIR-605L (Hardware version F1; Firmware | |
| CVE-2025-14524 | 5.3 | 0.03% | 2 | 0 | 2026-01-09T21:32:41 | When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer p | |
| CVE-2026-0830 | 7.8 | 0.03% | 1 | 0 | 2026-01-09T21:31:41 | Processing specially crafted workspace folder names could allow for arbitrary co | |
| CVE-2025-10492 | 9.8 | 0.33% | 2 | 1 | 2026-01-09T19:55:26 | A Java deserialisation vulnerability has been discovered in the Jaspersoft Libra | |
| CVE-2025-15035 | None | 0.03% | 1 | 0 | 2026-01-09T18:31:43 | Improper Input Validation vulnerability in TP-Link Archer AXE75 v1.6 (vpn module | |
| CVE-2025-14598 | 9.8 | 0.03% | 1 | 1 | 2026-01-09T18:31:36 | BeeS Software Solutions BET Portal contains an SQL injection vulnerability in th | |
| CVE-2025-64091 | 8.6 | 0.04% | 1 | 0 | 2026-01-09T18:31:35 | This vulnerability allows authenticated attackers to execute commands via the NT | |
| CVE-2025-64093 | 10.0 | 0.22% | 1 | 0 | 2026-01-09T18:31:35 | Remote Code Execution vulnerability that allows unauthenticated attackers to inj | |
| CVE-2025-64092 | 7.5 | 0.06% | 1 | 0 | 2026-01-09T18:31:35 | This vulnerability allows unauthenticated attackers to inject an SQL request int | |
| CVE-2025-64090 | 10.0 | 0.06% | 1 | 0 | 2026-01-09T18:15:49.873000 | This vulnerability allows authenticated attackers to execute commands via the ho | |
| CVE-2025-69426 | 0 | 0.04% | 1 | 0 | 2026-01-09T17:15:53.997000 | The Ruckus vRIoT IoT Controller firmware versions prior to 3.0.0.0 (GA) contain | |
| CVE-2025-69425 | 0 | 0.10% | 1 | 0 | 2026-01-09T17:15:53.847000 | The Ruckus vRIoT IoT Controller firmware versions prior to 3.0.0.0 (GA) expose a | |
| CVE-2025-46645 | 6.5 | 0.45% | 1 | 0 | 2026-01-09T17:15:52.720000 | Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Featu | |
| CVE-2025-68613 | 10.0 | 8.42% | 1 | 28 | template | 2026-01-09T16:53:16 | ### Impact n8n contains a critical Remote Code Execution (RCE) vulnerability in |
| CVE-2026-22081 | None | 0.06% | 1 | 0 | 2026-01-09T12:32:33 | This vulnerability exists in Tenda wireless routers (300Mbps Wireless Router F3 | |
| CVE-2025-7072 | None | 0.12% | 1 | 0 | 2026-01-09T12:32:33 | The firmware in KAON CG3000TC and CG3000T routers contains hard-coded credential | |
| CVE-2026-22080 | None | 0.03% | 1 | 0 | 2026-01-09T12:32:32 | This vulnerability exists in Tenda wireless routers (300Mbps Wireless Router F3 | |
| CVE-2026-22079 | None | 0.03% | 1 | 0 | 2026-01-09T12:32:32 | This vulnerability exists in Tenda wireless routers (300Mbps Wireless Router F3 | |
| CVE-2025-66049 | None | 0.07% | 1 | 0 | 2026-01-09T12:32:32 | Vivotek IP7137 camera with firmware version 0200a is vulnerable to an informatio | |
| CVE-2026-22082 | 0 | 0.18% | 1 | 0 | 2026-01-09T12:15:54.403000 | This vulnerability exists in Tenda wireless routers (300Mbps Wireless Router F3 | |
| CVE-2025-69194 | 8.8 | 0.03% | 1 | 1 | 2026-01-09T09:31:24 | A security issue was discovered in GNU Wget2 when handling Metalink documents. T | |
| CVE-2025-69195 | 7.6 | 0.08% | 1 | 0 | 2026-01-09T08:15:58.147000 | A flaw was found in GNU Wget2. This vulnerability, a stack-based buffer overflow | |
| CVE-2025-70974 | 10.0 | 0.06% | 1 | 0 | 2026-01-09T07:16:02.677000 | Fastjson before 1.2.48 mishandles autoType because, when an @type key is in a JS | |
| CVE-2026-0732 | 6.3 | 0.54% | 1 | 0 | 2026-01-09T00:30:34 | A vulnerability was found in D-Link DI-8200G 17.12.20A1. This affects an unknown | |
| CVE-2025-12543 | 9.6 | 0.13% | 2 | 0 | 2026-01-09T00:30:28 | A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBo | |
| CVE-2025-14025 | 8.6 | 0.06% | 1 | 0 | 2026-01-09T00:30:28 | A flaw was found in Ansible Automation Platform (AAP). Read-only scoped OAuth2 A | |
| CVE-2026-0731 | 5.3 | 0.13% | 1 | 0 | 2026-01-08T23:15:44.117000 | A vulnerability has been found in TOTOLINK WA1200 5.9c.2914. The impacted elemen | |
| CVE-2025-13151 | 7.5 | 0.04% | 1 | 0 | 2026-01-08T21:30:33 | Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to | |
| CVE-2025-59468 | 9.0 | 0.22% | 2 | 0 | 2026-01-08T20:15:43.817000 | This vulnerability allows a Backup Administrator to perform remote code executio | |
| CVE-2026-21441 | None | 0.01% | 1 | 0 | 2026-01-08T20:05:42 | ### Impact urllib3's [streaming API](https://urllib3.readthedocs.io/en/2.6.2/ad | |
| CVE-2025-65518 | 7.5 | 0.02% | 1 | 1 | 2026-01-08T19:15:57.043000 | Plesk Obsidian versions 8.0.1 through 18.0.73 are vulnerable to a Denial of Serv | |
| CVE-2025-52691 | 10.0 | 10.87% | 8 | 10 | template | 2026-01-08T19:15:56.283000 | Successful exploitation of the vulnerability could allow an unauthenticated atta |
| CVE-2017-20216 | 9.8 | 0.31% | 1 | 0 | 2026-01-08T19:15:54.793000 | FLIR Thermal Camera PT-Series firmware version 8.0.0.64 contains multiple unauth | |
| CVE-2017-20214 | 7.5 | 0.03% | 1 | 0 | 2026-01-08T19:15:54.560000 | FLIR Thermal Camera F/FC/PT/D firmware version 8.0.0.64 contains hard-coded SSH | |
| CVE-2025-59470 | 9.0 | 0.22% | 6 | 1 | 2026-01-08T18:30:56 | This vulnerability allows a Backup Operator to perform remote code execution (RC | |
| CVE-2025-59469 | 9.0 | 0.04% | 2 | 0 | 2026-01-08T18:30:56 | This vulnerability allows a Backup or Tape Operator to write files as root. | |
| CVE-2025-67090 | 5.1 | 0.03% | 1 | 0 | 2026-01-08T18:30:56 | The LuCI web interface on Gl Inet GL.Inet AX1800 Version 4.6.4 & 4.6.8 are vulne | |
| CVE-2025-67089 | 8.1 | 0.23% | 1 | 0 | 2026-01-08T18:30:56 | A command injection vulnerability exists in the GL-iNet GL-AXT1800 router firmwa | |
| CVE-2025-67091 | 6.5 | 0.01% | 1 | 0 | 2026-01-08T18:30:56 | An issue in GL Inet GL.Inet AX1800 Version 4.6.4 & 4.6.8 are vulnerable. GL.Inet | |
| CVE-2026-0625 | None | 0.43% | 2 | 0 | 2026-01-08T18:30:33 | Multiple D-Link DSL gateway devices contain a command injection vulnerability in | |
| CVE-2025-14346 | 9.8 | 0.11% | 1 | 0 | 2026-01-08T18:09:49.800000 | WHILL Model C2 Electric Wheelchairs and Model F Power Chairs do not enforce auth | |
| CVE-2025-68428 | 0 | 0.08% | 4 | 1 | 2026-01-08T18:09:23.230000 | jsPDF is a library to generate PDFs in JavaScript. Prior to version 4.0.0, user | |
| CVE-2026-0641 | 6.3 | 4.18% | 2 | 0 | 2026-01-08T18:09:23.230000 | A security vulnerability has been detected in TOTOLINK WA300 5.2cu.7112_B2019022 | |
| CVE-2020-36925 | 9.8 | 0.62% | 2 | 0 | 2026-01-08T18:09:23.230000 | Arteco Web Client DVR/NVR contains a session hijacking vulnerability with insuff | |
| CVE-2025-15471 | 9.8 | 0.22% | 3 | 0 | 2026-01-08T18:09:23.230000 | A vulnerability was detected in TRENDnet TEW-713RE 1.02. The impacted element is | |
| CVE-2025-0980 | 6.4 | 0.01% | 1 | 0 | 2026-01-08T18:09:23.230000 | Nokia SR Linux is vulnerable to an authentication vulnerability allowing unautho | |
| CVE-2020-36923 | 9.8 | 0.09% | 1 | 0 | 2026-01-08T18:09:23.230000 | Sony BRAVIA Digital Signage 1.7.8 contains an insecure direct object reference v | |
| CVE-2020-36920 | 8.8 | 0.06% | 1 | 0 | 2026-01-08T18:09:23.230000 | iDS6 DSSPro Digital Signage System 6.2 contains an improper access control vulne | |
| CVE-2020-36916 | 8.8 | 0.03% | 1 | 0 | 2026-01-08T18:09:23.230000 | TDM Digital Signage PC Player 4.1.0.4 contains an elevation of privileges vulner | |
| CVE-2020-36907 | 7.5 | 0.50% | 1 | 0 | 2026-01-08T18:09:23.230000 | Aerohive HiveOS contains a denial of service vulnerability in the NetConfig UI t | |
| CVE-2020-36914 | 7.5 | 0.04% | 1 | 0 | 2026-01-08T18:09:23.230000 | QiHang Media Web Digital Signage 3.0.9 contains a sensitive information disclosu | |
| CVE-2020-36922 | 7.5 | 0.11% | 1 | 0 | 2026-01-08T18:09:23.230000 | Sony BRAVIA Digital Signage 1.7.8 contains an information disclosure vulnerabili | |
| CVE-2025-61489 | 6.5 | 3.07% | 1 | 0 | 2026-01-08T18:08:54.147000 | A command injection vulnerability in the shell_exec function of sonirico mcp-she | |
| CVE-2026-20029 | 4.9 | 0.03% | 2 | 0 | 2026-01-08T18:08:54.147000 | A vulnerability in the licensing features of Cisco Identity Services Engine | |
| CVE-2026-22536 | 0 | 0.01% | 1 | 0 | 2026-01-08T18:08:54.147000 | The absence of permissions control for the user XXX allows the current configura | |
| CVE-2026-20027 | 5.3 | 0.03% | 1 | 0 | 2026-01-08T18:08:54.147000 | Multiple Cisco products are affected by a vulnerability in the processing of DCE | |
| CVE-2025-15346 | 0 | 0.06% | 1 | 0 | 2026-01-08T18:08:18.457000 | A vulnerability in the handling of verify_mode = CERT_REQUIRED in the wolfssl Py | |
| CVE-2025-15079 | 5.3 | 0.03% | 2 | 0 | 2026-01-08T18:08:18.457000 | When doing SSH-based transfers using either SCP or SFTP, and setting the known_h | |
| CVE-2025-13034 | 5.9 | 0.02% | 2 | 0 | 2026-01-08T18:08:18.457000 | When using `CURLOPT_PINNEDPUBLICKEY` option with libcurl or `--pinnedpubkey` wit | |
| CVE-2025-15224 | 3.1 | 0.05% | 2 | 0 | 2026-01-08T15:32:30 | When doing SSH-based transfers using either SCP or SFTP, and asked to do public | |
| CVE-2025-14819 | 5.3 | 0.03% | 2 | 0 | 2026-01-08T15:32:29 | When doing TLS related transfers with reused easy or multi handles and altering | |
| CVE-2025-69260 | 7.5 | 0.09% | 3 | 0 | 2026-01-08T15:31:29 | A message out-of-bounds read vulnerability in Trend Micro Apex Central could all | |
| CVE-2025-69259 | 7.5 | 0.09% | 3 | 0 | 2026-01-08T15:31:29 | A message unchecked NULL return value vulnerability in Trend Micro Apex Central | |
| CVE-2025-69258 | 9.8 | 0.15% | 5 | 0 | 2026-01-08T15:31:28 | A LoadLibraryEX vulnerability in Trend Micro Apex Central could allow an unauthe | |
| CVE-2025-14017 | None | 0.01% | 2 | 0 | 2026-01-08T12:30:38 | When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl, changing | |
| CVE-2009-0556 | 8.8 | 76.76% | 6 | 0 | 2026-01-08T02:00:02.163000 | Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3, and PowerPoint in | |
| CVE-2025-37164 | 10.0 | 81.31% | 4 | 3 | template | 2026-01-08T00:32:16 | A remote code execution issue exists in HPE OneView. |
| CVE-2025-62224 | 5.5 | 0.06% | 2 | 0 | 2026-01-08T00:31:21 | User interface (ui) misrepresentation of critical information in Microsoft Edge | |
| CVE-2017-20213 | 7.5 | 0.10% | 1 | 0 | 2026-01-08T00:31:21 | FLIR Thermal Camera F/FC/PT/D Stream firmware version 8.0.0.64 contains an unaut | |
| CVE-2017-20215 | 8.8 | 0.26% | 1 | 0 | 2026-01-08T00:31:21 | FLIR Thermal Camera FC-S/PT firmware version 8.0.0.64 contains an authenticated | |
| CVE-2017-20212 | 6.2 | 0.19% | 1 | 0 | 2026-01-08T00:31:21 | FLIR Thermal Camera F/FC/PT/D firmware version 8.0.0.64 contains an information | |
| CVE-2026-20026 | 5.8 | 0.09% | 1 | 0 | 2026-01-07T18:30:33 | Multiple Cisco products are affected by a vulnerability in the processing o | |
| CVE-2026-22542 | None | 0.04% | 1 | 0 | 2026-01-07T18:30:33 | An attacker with access to the system's internal network can cause a denial of s | |
| CVE-2026-22541 | None | 0.04% | 1 | 0 | 2026-01-07T18:30:33 | The massive sending of ICMP requests causes a denial of service on one of the bo | |
| CVE-2025-69277 | 4.5 | 0.02% | 1 | 0 | 2026-01-07T17:16:02.003000 | libsodium before ad3004e, in atypical use cases involving certain custom cryptog | |
| CVE-2026-0628 | 8.8 | 0.02% | 2 | 1 | 2026-01-07T15:31:20 | Insufficient policy enforcement in WebView tag in Google Chrome prior to 143.0.7 | |
| CVE-2025-6225 | None | 0.89% | 2 | 0 | 2026-01-07T15:30:25 | Kieback&Peter Neutrino-GLT product is used for building management. It's web com | |
| CVE-2026-22540 | None | 0.04% | 1 | 0 | 2026-01-07T15:30:25 | The massive sending of ARP requests causes a denial of service on one board of t | |
| CVE-2025-38352 | 7.4 | 0.25% | 7 | 3 | 2026-01-07T15:30:14 | In the Linux kernel, the following vulnerability has been resolved: posix-cpu-t | |
| CVE-2025-68926 | 9.8 | 3.14% | 1 | 2 | template | 2026-01-07T15:22:22 | ## Vulnerability Overview ### Description RustFS implements gRPC authenticatio |
| CVE-2025-15472 | 7.2 | 0.17% | 1 | 0 | 2026-01-07T12:31:32 | A flaw has been found in TRENDnet TEW-811DRU 1.0.2.0. This affects the function | |
| CVE-2025-14631 | None | 0.02% | 1 | 0 | 2026-01-07T12:31:27 | A NULL Pointer Dereference vulnerability in TP-Link Archer BE400 V1(802.11 modul | |
| CVE-2020-36913 | 5.3 | 0.10% | 1 | 0 | 2026-01-06T21:31:40 | All-Dynamics Software enlogic:show 2.0.2 contains a session fixation vulnerabili | |
| CVE-2025-63525 | 9.6 | 0.03% | 1 | 0 | 2026-01-06T21:15:43.240000 | An issue was discovered in Blood Bank Management System 1.0 allowing authenticat | |
| CVE-2026-0640 | 8.8 | 0.09% | 1 | 0 | 2026-01-06T18:31:44 | A weakness has been identified in Tenda AC23 16.03.07.52. This affects the funct | |
| CVE-2025-39477 | 9.8 | 0.05% | 1 | 0 | 2026-01-06T18:31:43 | Missing Authorization vulnerability in Sfwebservice InWave Jobs allows Exploitin | |
| CVE-2020-36924 | 7.5 | 0.08% | 1 | 0 | 2026-01-06T18:31:43 | Sony BRAVIA Digital Signage 1.7.8 contains a remote file inclusion vulnerability | |
| CVE-2025-60262 | 9.8 | 0.14% | 1 | 0 | 2026-01-06T18:31:43 | An issue in H3C M102G HM1A0V200R010 wireless controller and BA1500L SWBA1A0V100R | |
| CVE-2020-36917 | 7.5 | 0.07% | 1 | 0 | 2026-01-06T18:31:42 | iDS6 DSSPro Digital Signage System 6.2 contains a sensitive information disclosu | |
| CVE-2020-36912 | 9.8 | 0.06% | 1 | 0 | 2026-01-06T18:31:42 | Plexus anblick Digital Signage Management 3.1.13 contains an open redirect vulne | |
| CVE-2020-36921 | 7.5 | 0.23% | 1 | 0 | 2026-01-06T18:31:42 | RED-V Super Digital Signage System 5.1.1 contains an information disclosure vuln | |
| CVE-2020-36906 | 4.3 | 0.02% | 1 | 0 | 2026-01-06T18:31:42 | P5 FNIP-8x16A FNIP-4xSH 1.0.20 contains a cross-site request forgery vulnerabili | |
| CVE-2020-36909 | 6.5 | 0.04% | 1 | 0 | 2026-01-06T18:31:42 | SnapGear Management Console SG560 3.1.5 contains a file manipulation vulnerabili | |
| CVE-2020-36918 | 4.3 | 0.02% | 1 | 0 | 2026-01-06T18:31:42 | iDS6 DSSPro Digital Signage System 6.2 contains a cross-site request forgery vul | |
| CVE-2020-36910 | 8.8 | 0.43% | 1 | 0 | 2026-01-06T18:31:42 | Cayin Signage Media Player 3.0 contains an authenticated remote command injectio | |
| CVE-2020-36915 | 7.5 | 0.05% | 1 | 0 | 2026-01-06T18:31:35 | Adtec Digital SignEdje Digital Signage Player v2.08.28 contains multiple hardcod | |
| CVE-2020-36908 | 5.3 | 0.02% | 1 | 0 | 2026-01-06T18:31:34 | SnapGear Management Console SG560 version 3.1.5 contains a cross-site request fo | |
| CVE-2020-36905 | 7.5 | 0.07% | 1 | 0 | 2026-01-06T18:31:33 | FIBARO System Home Center 5.021 contains a remote file inclusion vulnerability i | |
| CVE-2025-54957 | 6.5 | 0.05% | 3 | 1 | 2026-01-06T18:31:24 | An issue was discovered in Dolby UDC 4.5 through 4.13. A crash of the DD+ decode | |
| CVE-2026-21877 | 10.0 | 0.05% | 6 | 1 | 2026-01-06T17:48:25 | ### Impact n8n is affected by an authenticated Remote Code Execution (RCE) vulne | |
| CVE-2025-68455 | None | 0.57% | 1 | 0 | 2026-01-06T15:52:19 | Note that attackers must have administrator access to the Craft Control Panel fo | |
| CVE-2025-14997 | 7.2 | 0.61% | 1 | 0 | 2026-01-06T06:31:32 | The BuddyPress Xprofile Custom Field Types plugin for WordPress is vulnerable to | |
| CVE-2025-12793 | None | 0.02% | 1 | 0 | 2026-01-06T03:31:42 | An uncontrolled DLL loading path vulnerability exists in AsusSoftwareManagerAgen | |
| CVE-2026-21633 | 8.8 | 0.02% | 1 | 0 | 2026-01-05T21:31:37 | A malicious actor with access to the adjacent network could obtain unauthorized | |
| CVE-2025-68668 | 9.9 | 0.10% | 2 | 0 | 2026-01-05T19:06:07 | ### Impact A sandbox bypass vulnerability exists in the Python Code Node that us | |
| CVE-2025-12514 | 7.2 | 0.02% | 1 | 0 | 2026-01-05T12:31:32 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
| CVE-2025-54890 | 6.8 | 0.02% | 1 | 0 | 2026-01-05T12:31:32 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site | |
| CVE-2025-8460 | 6.8 | 0.02% | 1 | 0 | 2026-01-05T10:15:58.160000 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site | |
| CVE-2026-21440 | None | 0.32% | 2 | 3 | 2026-01-03T00:32:10 | ### Summary **Description** A Path Traversal (CWE-22) vulnerability in AdonisJS | |
| CVE-2025-13915 | 9.8 | 0.37% | 2 | 0 | 2025-12-31T21:37:43.290000 | IBM API Connect 10.0.8.0 through 10.0.8.5, and 10.0.11.0 could allow a remote at | |
| CVE-2025-66516 | 8.4 | 0.02% | 1 | 4 | 2025-12-30T16:15:46.230000 | Critical XXE in Apache Tika tika-core (1.13-3.2.1), tika-pdf-module (2.0.0-3.2.1 | |
| CVE-2025-13836 | 9.1 | 0.09% | 1 | 0 | 2025-12-30T15:30:26 | When reading an HTTP response from a server, if no read amount is specified, the | |
| CVE-2024-12087 | 6.5 | 2.36% | 1 | 0 | 2025-12-22T15:30:20 | A path traversal vulnerability exists in rsync. It stems from behavior enabled b | |
| CVE-2025-2486 | 8.8 | 0.02% | 1 | 0 | 2025-12-19T18:31:07 | The Ubuntu edk2 UEFI firmware packages accidentally allowed the UEFI Shell to be | |
| CVE-2025-55182 | 10.0 | 62.33% | 2 | 100 | template | 2025-12-10T02:00:02.557000 | A pre-authentication remote code execution vulnerability exists in React Server |
| CVE-2025-66471 | None | 0.02% | 1 | 0 | 2025-12-05T18:33:09 | ### Impact urllib3's [streaming API](https://urllib3.readthedocs.io/en/2.5.0/ad | |
| CVE-2025-66032 | 9.8 | 0.15% | 1 | 0 | 2025-12-05T16:29:42.130000 | Claude Code is an agentic coding tool. Prior to 1.0.93, Due to errors in parsing | |
| CVE-2025-1910 | None | 0.02% | 1 | 1 | 2025-12-05T00:31:05 | The WatchGuard Mobile VPN with SSL Client on Windows allows a locally authentic | |
| CVE-2025-64126 | 10.0 | 5.60% | 1 | 0 | 2025-12-01T15:39:53.100000 | An OS command injection vulnerability exists due to improper input validation. | |
| CVE-2025-64128 | 10.0 | 5.60% | 1 | 0 | 2025-12-01T15:39:53.100000 | An OS command injection vulnerability exists due to incomplete validation of us | |
| CVE-2025-64130 | 9.8 | 0.15% | 1 | 0 | 2025-12-01T15:39:53.100000 | Zenitel TCIV-3+ is vulnerable to a reflected cross-site scripting vulnerability | |
| CVE-2025-13601 | 7.7 | 0.02% | 1 | 0 | 2025-12-01T15:39:53.100000 | A heap-based buffer overflow problem was found in glib through an incorrect calc | |
| CVE-2025-64129 | 7.6 | 0.17% | 1 | 0 | 2025-11-26T18:31:15 | Zenitel TCIV-3+ is vulnerable to an out-of-bounds write vulnerability, which co | |
| CVE-2025-64127 | 10.0 | 5.60% | 1 | 0 | 2025-11-26T18:31:15 | An OS command injection vulnerability exists due to insufficient sanitization o | |
| CVE-2025-64496 | 7.3 | 0.25% | 1 | 0 | 2025-11-26T15:36:09.183000 | Open WebUI is a self-hosted artificial intelligence platform designed to operate | |
| CVE-2025-6389 | 9.8 | 0.37% | 1 | 3 | 2025-11-25T22:16:16.690000 | The Sneeit Framework plugin for WordPress is vulnerable to Remote Code Execution | |
| CVE-2025-64432 | 4.7 | 0.01% | 1 | 0 | 2025-11-17T21:44:47 | ### Summary _Short summary of the problem. Make the impact and severity as clear | |
| CVE-2025-40300 | None | 0.08% | 1 | 0 | 2025-11-17T18:30:25 | In the Linux kernel, the following vulnerability has been resolved: x86/vmscape | |
| CVE-2025-60188 | 7.5 | 2.72% | 1 | 1 | template | 2025-11-17T16:15:48.830000 | Insertion of Sensitive Information Into Sent Data vulnerability in Vito Peleg At |
| CVE-2025-6430 | 6.1 | 0.05% | 1 | 0 | 2025-11-03T21:35:11 | When a file download is specified via the `Content-Disposition` header, that dir | |
| CVE-2025-4802 | 7.8 | 0.01% | 1 | 1 | 2025-11-03T20:19:11.153000 | Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Librar | |
| CVE-2025-31161 | 9.8 | 82.33% | 1 | 16 | template | 2025-10-31T22:04:34.230000 | CrushFTP 10 before 10.8.4 and 11 before 11.3.1 allows authentication bypass and |
| CVE-2025-22226 | 7.1 | 3.96% | 1 | 0 | 2025-10-30T19:52:41.973000 | VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerabi | |
| CVE-2021-44228 | 10.0 | 94.36% | 1 | 100 | template | 2025-10-22T19:13:26 | # Summary Log4j versions prior to 2.16.0 are subject to a remote code execution |
| CVE-2025-22224 | 9.4 | 51.47% | 2 | 0 | 2025-10-22T00:34:17 | VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulner | |
| CVE-2025-22225 | 8.3 | 6.33% | 1 | 0 | 2025-10-22T00:33:13 | VMware ESXi contains an arbitrary write vulnerability. A malicious actor with pr | |
| CVE-2025-11155 | 0 | 0.02% | 1 | 0 | 2025-09-29T19:34:10.030000 | The credentials required to access the device's web server are sent in base64 wi | |
| CVE-2025-59815 | 9.1 | 0.06% | 1 | 0 | 2025-09-25T21:30:37 | This vulnerability allows malicious actors to execute arbitrary commands on the | |
| CVE-2025-59817 | 9.1 | 0.04% | 1 | 0 | 2025-09-25T21:30:37 | This vulnerability allows attackers to execute arbitrary commands on the underly | |
| CVE-2025-59814 | 9.8 | 0.08% | 1 | 0 | 2025-09-25T21:30:36 | This vulnerability allows malicious actors to gain unauthorized access to the Ze | |
| CVE-2025-59816 | 8.1 | 0.10% | 1 | 0 | 2025-09-25T21:30:36 | This vulnerability allows attackers to directly query the underlying database, p | |
| CVE-2025-50173 | 7.8 | 0.12% | 2 | 0 | 2025-08-12T18:31:39 | Weak authentication in Windows Installer allows an authorized attacker to elevat | |
| CVE-2025-47987 | 7.8 | 0.08% | 5 | 1 | 2025-07-14T17:38:41.223000 | Heap-based buffer overflow in Windows Cred SSProvider Protocol allows an authori | |
| CVE-2025-6842 | 4.7 | 0.03% | 1 | 1 | 2025-07-01T14:47:11.290000 | A vulnerability was found in code-projects Product Inventory System 1.0 and clas | |
| CVE-2025-47934 | 0 | 0.03% | 1 | 0 | 2025-05-21T20:25:16.407000 | OpenPGP.js is a JavaScript implementation of the OpenPGP protocol. Startinf in v | |
| CVE-2024-55947 | 8.8 | 1.60% | 1 | 0 | 2025-04-10T22:56:52 | ### Impact The malicious user is able to write a file to an arbitrary path on t | |
| CVE-2022-25845 | 8.1 | 89.92% | 1 | 6 | 2024-11-21T06:53:06.320000 | The package com.alibaba:fastjson before 1.2.83 are vulnerable to Deserialization | |
| CVE-2022-23128 | 9.8 | 3.77% | 1 | 0 | 2024-11-21T06:48:03.407000 | Incomplete List of Disallowed Inputs vulnerability in Mitsubishi Electric MC Wor | |
| CVE-2024-38063 | 9.8 | 90.06% | 1 | 29 | 2024-08-13T18:31:24 | Windows TCP/IP Remote Code Execution Vulnerability | |
| CVE-2024-2537 | 4.4 | 0.06% | 1 | 1 | 2024-03-15T18:30:45 | Improper Control of Dynamically-Managed Code Resources vulnerability in Logitech | |
| CVE-2017-18349 | 9.8 | 92.08% | 1 | 1 | template | 2023-09-26T14:52:01 | parseObject in Fastjson before 1.2.25, as used in FastjsonEngine in Pippo 1.11.0 |
| CVE-2026-22814 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2026-22794 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2026-22788 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-5017 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-22783 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2026-21898 | 0 | 0.05% | 2 | 0 | N/A | ||
| CVE-2026-22027 | 0 | 0.01% | 2 | 0 | N/A | ||
| CVE-2026-22697 | 0 | 0.07% | 2 | 0 | N/A | ||
| CVE-2026-22025 | 0 | 0.04% | 2 | 0 | N/A | ||
| CVE-2026-21897 | 0 | 0.04% | 2 | 0 | N/A | ||
| CVE-2026-21899 | 0 | 0.03% | 2 | 0 | N/A | ||
| CVE-2025-64424 | 0 | 0.66% | 1 | 0 | N/A | ||
| CVE-2026-21876 | 0 | 0.03% | 4 | 1 | N/A | ||
| CVE-2025-14338 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-66005 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-59819 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-59818 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-63261 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2026-21881 | 0 | 0.07% | 1 | 0 | N/A | ||
| CVE-2025-67724 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2025-69222 | 0 | 0.09% | 1 | 0 | N/A | ||
| CVE-2025-67859 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-69139 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-14558 | 0 | 0.00% | 1 | 2 | N/A | ||
| CVE-2025-65606 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2025-68615 | 0 | 0.04% | 1 | 1 | N/A |
updated 2026-01-13T10:15:58.457000
1 posts
🟠 CVE-2025-40944 - High (7.5)
A vulnerability has been identified in SIMATIC ET 200AL IM 157-1 PN (6ES7157-1AB00-0AB0) (All versions), SIMATIC ET 200MP IM 155-5 PN HF (6ES7155-5AA00-0AC0) (All versions >= V4.2.0), SIMATIC ET 200SP IM 155-6 MF HF (6ES7155-6MU00-0CN0) (All versi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-40944/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-13T10:15:58.283000
2 posts
🟠 CVE-2025-40942 - High (8.8)
A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.4). Affected application contains a local privilege escalation vulnerability that could allow an attacker to run arbitrary code with elevated privileges.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-40942/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-40942 - High (8.8)
A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.4). Affected application contains a local privilege escalation vulnerability that could allow an attacker to run arbitrary code with elevated privileges.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-40942/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-13T10:15:58.047000
1 posts
🔴 CVE-2025-40805 - Critical (10)
Affected devices do not properly enforce user authentication on specific API endpoints. This could facilitate an unauthenticated remote attacker to circumvent authentication and impersonate a legitimate user. Successful exploitation requires that ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-40805/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-13T09:31:36
2 posts
#OT #Advisory VDE-2025-073
Phoenix Contact: Security Advisory for TC ROUTER and CLOUD CLIENT Industrial mobile network routers
A code injection vulnerability at the upload-config endpoint in the firmware of TC ROUTER and CLOUD CLIENT Industrial Mobile network routers has been discovered that can be exploited by an high privileged attacker.
#CVE CVE-2025-41717
https://certvde.com/en/advisories/vde-2025-073/
#CSAF https://phoenixcontact.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2025-073.json
##🟠 CVE-2025-41717 - High (8.8)
An unauthenticated remote attacker can trick a high privileged user into uploading a malicious payload via the config-upload endpoint, leading to code injection as root. This results in a total loss of confidentiality, availability and integrity d...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-41717/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-13T03:32:20
1 posts
🟠 CVE-2026-0492 - High (8.8)
SAP HANA database is vulnerable to privilege escalation allowing an attacker with valid credentials of any user to switch to another user potentially gaining administrative access. This exploit could result in a total compromise of the system�s ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0492/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-13T03:32:20
1 posts
🔴 CVE-2026-0501 - Critical (9.9)
Due to insufficient input validation in SAP S/4HANA Private Cloud and On-Premise (Financials General Ledger), an authenticated user could execute crafted SQL queries to read, modify, and delete backend database data. This leads to a high impact on...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0501/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-13T03:32:20
1 posts
🟠 CVE-2025-66177 - High (8.8)
There is a Stack overflow Vulnerability in the device Search and Discovery feature of Hikvision NVR/DVR/CVR/IPC models. If exploited, an attacker on the same local area network (LAN) could cause the device to malfunction by sending specially craft...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-66177/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-13T03:32:20
1 posts
🟠 CVE-2025-66176 - High (8.8)
There is a Stack overflow Vulnerability in the device Search and Discovery feature of Hikvision Access Control Products. If exploited, an attacker on the same local area network (LAN) could cause the device to malfunction by sending specially craf...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-66176/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-13T03:32:20
1 posts
🟠 CVE-2026-0511 - High (8.1)
SAP Fiori App Intercompany Balance Reconciliation does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This has high impact on confidentiality and integrity of the application ,availabil...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0511/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-13T03:32:20
1 posts
🟠 CVE-2026-0507 - High (8.4)
Due to an OS Command Injection vulnerability in SAP Application Server for ABAP and SAP NetWeaver RFCSDK, an authenticated attacker with administrative access and adjacent network access could upload specially crafted content to the server. If pro...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0507/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-13T03:32:20
1 posts
🟠 CVE-2026-0506 - High (8.1)
Due to a Missing Authorization Check vulnerability in Application Server ABAP and ABAP Platform, an authenticated attacker could misuse an RFC function to execute form routines (FORMs) in the ABAP system. Successful exploitation could allow the at...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0506/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-13T03:32:19
1 posts
🔴 CVE-2026-0491 - Critical (9.1)
SAP Landscape Transformation allows an attacker with admin privileges to exploit a vulnerability in the function module exposed via RFC. This flaw enables the injection of arbitrary ABAP code/OS commands into the system, bypassing essential author...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0491/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-13T03:32:19
1 posts
🔴 CVE-2026-0500 - Critical (9.6)
Due to the usage of vulnerable third party component in SAP Wily Introscope Enterprise Manager (WorkStation), an unauthenticated attacker could create a malicious JNLP (Java Network Launch Protocol) file accessible by a public facing URL. When a v...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0500/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-13T03:16:00.773000
4 posts
The vulnerability, tracked as CVE-2025-12420, carries a CVSS score of 9.3 out of 10.0. https://thehackernews.com/2026/01/servicenow-patches-critical-ai-platform.html
##sev:CRIT auth bypass in SNOW.
https://www.cve.org/CVERecord?id=CVE-2025-12420
##A vulnerability has been identified in the ServiceNow AI Platform that could enable an unauthenticated user to impersonate another user and perform the operations that the impersonated user is entitled to perform. ServiceNow has addressed this vulnerability by deploying a relevant security update to hosted instances in October 2025. Security updates have also been provided to ServiceNow self-hosted customers, partners, and hosted customers with unique configurations. Additionally, the vulnerability is addressed in the listed Store App versions. We recommend that customers promptly apply an appropriate security update or upgrade if they have not already done so.
The vulnerability, tracked as CVE-2025-12420, carries a CVSS score of 9.3 out of 10.0. https://thehackernews.com/2026/01/servicenow-patches-critical-ai-platform.html
##sev:CRIT auth bypass in SNOW.
https://www.cve.org/CVERecord?id=CVE-2025-12420
##A vulnerability has been identified in the ServiceNow AI Platform that could enable an unauthenticated user to impersonate another user and perform the operations that the impersonated user is entitled to perform. ServiceNow has addressed this vulnerability by deploying a relevant security update to hosted instances in October 2025. Security updates have also been provided to ServiceNow self-hosted customers, partners, and hosted customers with unique configurations. Additionally, the vulnerability is addressed in the listed Store App versions. We recommend that customers promptly apply an appropriate security update or upgrade if they have not already done so.
updated 2026-01-13T02:15:52.300000
1 posts
🔴 CVE-2026-0498 - Critical (9.1)
SAP S/4HANA (Private Cloud and On-Premise) allows an attacker with admin privileges to exploit a vulnerability in the function module exposed via RFC. This flaw enables the injection of arbitrary ABAP code/OS commands into the system, bypassing es...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0498/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-13T00:30:57
1 posts
🔴 CVE-2025-67146 - Critical (9.4)
Multiple SQL Injection vulnerabilities exist in AbhishekMali21 GYM-MANAGEMENT-SYSTEM 1.0 via the 'name' parameter in (1) member_search.php, (2) trainer_search.php, and (3) gym_search.php, and via the 'id' parameter in (4) payment_search.php. An un...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-67146/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-12T23:15:53.523000
2 posts
OpenCode patches critical RCE flaw in Web UI
OpenCode patched a critical XSS vulnerability (CVE-2026-22813) that allowed malicious websites to execute arbitrary commands on a user's local system by abusing the tool's internal API.
**If you are using OpenCode, update to version 1.1.10 ASAP to disable the vulnerable web UI and API. Avoid clicking untrusted links, check underling URLs and don't click on any links that you haven't crafted but point to your local machine's ports .**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/opencode-patches-critical-rce-flaw-in-web-ui-c-7-g-n-7/gD2P6Ple2L
OpenCode patches critical RCE flaw in Web UI
OpenCode patched a critical XSS vulnerability (CVE-2026-22813) that allowed malicious websites to execute arbitrary commands on a user's local system by abusing the tool's internal API.
**If you are using OpenCode, update to version 1.1.10 ASAP to disable the vulnerable web UI and API. Avoid clicking untrusted links, check underling URLs and don't click on any links that you haven't crafted but point to your local machine's ports .**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/opencode-patches-critical-rce-flaw-in-web-ui-c-7-g-n-7/gD2P6Ple2L
updated 2026-01-12T23:15:53.370000
2 posts
CVEs in OSS: CVE-2026-22812 (OpenCode RCE) and CVE-2026-22804 (Termix XSS) highlighted.
- Asahi Linux on Apple Silicon: porting Linux to Apple Silicon status and progress.
- The next two years of software engineering: Addy Osmani’s forecast for the industry. [2/2]
##🟠 CVE-2026-22812 - High (8.8)
OpenCode is an open source AI coding agent. Prior to 1.0.216, OpenCode automatically starts an unauthenticated HTTP server that allows any local process (or any website via permissive CORS) to execute arbitrary shell commands with the user's privi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22812/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-12T23:15:53.063000
2 posts
1 repos
CVEs in OSS: CVE-2026-22812 (OpenCode RCE) and CVE-2026-22804 (Termix XSS) highlighted.
- Asahi Linux on Apple Silicon: porting Linux to Apple Silicon status and progress.
- The next two years of software engineering: Addy Osmani’s forecast for the industry. [2/2]
##🟠 CVE-2026-22804 - High (8)
Termix is a web-based server management platform with SSH terminal, tunneling, and file editing capabilities. From 1.7.0 to 1.9.0, Stored Cross-Site Scripting (XSS) vulnerability exists in the Termix File Manager component. The application fails t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22804/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-12T22:16:07.970000
1 posts
🔴 CVE-2025-67147 - Critical (9.8)
Multiple SQL Injection vulnerabilities exist in amansuryawanshi Gym-Management-System-PHP 1.0 via the 'name', 'email', and 'comment' parameters in (1) submit_contact.php, the 'username' and 'pass_key' parameters in (2) secure_login.php, and the 'l...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-67147/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-12T21:31:38
1 posts
1 repos
🔴 CVE-2025-63314 - Critical (10)
A static password reset token in the password reset function of DDSN Interactive Acora CMS v10.7.1 allows attackers to arbitrarily reset the user password and execute a full account takeover via a replay attack.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-63314/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-12T21:31:38
2 posts
Go ../ more MCP shit. 🤘
https://github.com/Team-Off-course/MCP-Server-Vuln-Analysis/blob/main/CVE-2025-66689.md
##Go ../ more MCP shit. 🤘
https://github.com/Team-Off-course/MCP-Server-Vuln-Analysis/blob/main/CVE-2025-66689.md
##updated 2026-01-12T21:30:42
1 posts
🔴 CVE-2025-51567 - Critical (9.1)
A SQL Injection was found in the /exam/user/profile.php page of kashipara Online Exam System V1.0, which allows remote attackers to execute arbitrary SQL command to get unauthorized database access via the rname, rcollage, rnumber, rgender and rpa...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-51567/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-12T20:07:43
1 posts
🟠 CVE-2025-68472 - High (8.1)
MindsDB is a platform for building artificial intelligence from enterprise data. Prior to version 25.11.1, an unauthenticated path traversal in the file upload API lets any caller read arbitrary files from the server filesystem and move them into ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-68472/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-12T19:18:21
12 posts
6 repos
https://github.com/zAbuQasem/gogs-CVE-2025-8110
https://github.com/Ashwesker/Ashwesker-CVE-2025-8110
https://github.com/rxerium/CVE-2025-8110
https://github.com/freiwi/CVE-2025-8110
Critical Gogs Vulnerability CVE-2025-8110, Actively Exploited, CISA Warns
A newly discovered vulnerability in Gogs, a widely-used self-hosted Git service, is raising alarms across the cybersecurity landscape. The Cybersecurity and Infrastructure Security Agency (CISA) has officially added CVE-2025-8110 to its Known Exploited Vulnerabilities (KEV) catalog, confirming that attackers are already targeting organizations running this platform. This flaw allows malicious…
https://undercodenews.com/critical-gogs-vulnerability-cve-2025-8110-actively-exploited-cisa-warns/
##Latest global tech and cybersecurity news (Jan 12-13, 2026):
The World Economic Forum's 'Global Cybersecurity Outlook 2026' highlights AI, geopolitics, and cyber-fraud as key shapers of risk, with fraud now surpassing ransomware as a top concern. CISA added a Gogs Path Traversal vulnerability (CVE-2025-8110) to its Known Exploited Vulnerabilities Catalog due to active exploitation. A critical vulnerability (CVE-2026-21858) was found in the n8n workflow automation platform, affecting thousands of systems. In technology, Google removed some medical AI Overviews following "alarming" results.
##🚨 [CISA-2026:0112] CISA Adds One Known Exploited Vulnerability to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0112)
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2025-8110 (https://secdb.nttzen.cloud/cve/detail/CVE-2025-8110)
- Name: Gogs Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Gogs
- Product: Gogs
- Notes: https://github.com/gogs/gogs/commit/553707f3fd5f68f47f531cfcff56aa3ec294c6f6 ; https://nvd.nist.gov/vuln/detail/CVE-2025-8110
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260112 #cisa20260112 #cve_2025_8110 #cve20258110
##❗️CISA has added 1 vulnerability to the KEV Catalog:
CVE-2025-8110: Gogs Path Traversal Vulnerability
##CISA has updated the KEV catalogue:
CVE-2025-8110: Gogs Path Traversal Vulnerability https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=&field_date_added_wrapper=all&sort_by=field_date_added&items_per_page=20 #CISA #infosec
##CVE ID: CVE-2025-8110
Vendor: Gogs
Product: Gogs
Date Added: 2026-01-12
Notes: https://github.com/gogs/gogs/commit/553707f3fd5f68f47f531cfcff56aa3ec294c6f6 ; https://nvd.nist.gov/vuln/detail/CVE-2025-8110
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-8110
Remember that Gogs ../ last month? It's now in the KEV Catalog.
http://wiz.io/blog/wiz-research-gogs-cve-2025-8110-rce-exploit
##Latest global tech and cybersecurity news (Jan 12-13, 2026):
The World Economic Forum's 'Global Cybersecurity Outlook 2026' highlights AI, geopolitics, and cyber-fraud as key shapers of risk, with fraud now surpassing ransomware as a top concern. CISA added a Gogs Path Traversal vulnerability (CVE-2025-8110) to its Known Exploited Vulnerabilities Catalog due to active exploitation. A critical vulnerability (CVE-2026-21858) was found in the n8n workflow automation platform, affecting thousands of systems. In technology, Google removed some medical AI Overviews following "alarming" results.
##❗️CISA has added 1 vulnerability to the KEV Catalog:
CVE-2025-8110: Gogs Path Traversal Vulnerability
##CISA has updated the KEV catalogue:
CVE-2025-8110: Gogs Path Traversal Vulnerability https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=&field_date_added_wrapper=all&sort_by=field_date_added&items_per_page=20 #CISA #infosec
##CVE ID: CVE-2025-8110
Vendor: Gogs
Product: Gogs
Date Added: 2026-01-12
Notes: https://github.com/gogs/gogs/commit/553707f3fd5f68f47f531cfcff56aa3ec294c6f6 ; https://nvd.nist.gov/vuln/detail/CVE-2025-8110
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-8110
Remember that Gogs ../ last month? It's now in the KEV Catalog.
http://wiz.io/blog/wiz-research-gogs-cve-2025-8110-rce-exploit
##updated 2026-01-12T19:16:03.470000
1 posts
🟠 CVE-2026-22771 - High (8.8)
Envoy Gateway is an open source project for managing Envoy Proxy as a standalone or Kubernetes-based application gateway. Prior to 1.5.7 and 1.6.2, EnvoyExtensionPolicy Lua scripts executed by Envoy proxy can be used to leak the proxy's credential...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22771/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-12T19:16:03.200000
1 posts
🔴 CVE-2026-22252 - Critical (9.1)
LibreChat is a ChatGPT clone with additional features. Prior to v0.8.2-rc2, LibreChat's MCP stdio transport accepts arbitrary commands without validation, allowing any authenticated user to execute shell commands as root inside the container throu...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22252/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-12T19:16:02.603000
16 posts
4 repos
https://github.com/Ashwesker/Ashwesker-CVE-2026-21858
https://github.com/eduardorossi84/CVE-2026-21858-POC
🎯 Threat Intelligence
===================
Executive summary: A supply-chain campaign abused n8n community nodes by publishing malicious npm packages that harvested OAuth credentials at runtime and exfiltrated them to attacker-controlled endpoints. The campaign used packages masquerading as service integrations (example: Google Ads) and multiple malicious packages were removed from the npm registry; one package is tracked as GHSA-77g5-qpc3-x24r.
Technical details:
• Vulnerable platform: n8n (Node.js-based workflow automation) where community nodes are installed as npm packages and execute inside the n8n runtime.
• Notable package: n8n-nodes-hfgjf-irtuinvcm-lasdqewriit (posed as Google Ads node) that presented a credential form and exfiltrated OAuth tokens during workflow execution.
• Known identifiers: GHSA-77g5-qpc3-x24r, CVE-2026-21858 (Cyera reported >100,000 n8n servers vulnerable to this RCE).
• Capabilities observed: runtime access to decrypted credentials, arbitrary outbound HTTP requests for exfiltration, file system and environment variable access due to lack of node sandboxing.
Analysis:
This campaign escalates supply-chain risk by targeting workflow automation platforms that centralize credentials. Unlike traditional npm malware focused on developer environments, malicious n8n nodes can act as gateways into dozens of integrated services (Google Ads, Stripe, Salesforce) because nodes receive decrypted API keys and OAuth tokens at runtime. The technique mirrors prior abuse of CI/CD workflows (e.g., Shai-Hulud) but leverages lower-scrutiny community ecosystems inside automation runtimes.
Detection (as reported):
• Monitor outbound HTTP traffic from n8n processes for anomalous destinations during workflow runs.
• Inspect installed community node packages for unexpected code that interacts with credential storage or performs network exfiltration.
• Correlate creation/use of OAuth credentials in workflows with external connections to unknown endpoints.
Actions taken (reported):
• Multiple malicious packages were removed from the npm registry.
• The incident is tracked with advisory identifiers such as GHSA-77g5-qpc3-x24r and discussions reference CVE-2026-21858 exposure statistics.
Limitations & open questions:
• Public reporting does not quantify how many installations loaded community nodes that were malicious.
• The full list of exfiltration endpoints and actor attribution were not disclosed in the report.
🔹 n8n #supplychain #oauth #nodejs #CVE-2026-21858
🔗 Source: https://www.endorlabs.com/learn/n8mare-on-auth-street-supply-chain-attack-targets-n8n-ecosystem
##Latest global tech and cybersecurity news (Jan 12-13, 2026):
The World Economic Forum's 'Global Cybersecurity Outlook 2026' highlights AI, geopolitics, and cyber-fraud as key shapers of risk, with fraud now surpassing ransomware as a top concern. CISA added a Gogs Path Traversal vulnerability (CVE-2025-8110) to its Known Exploited Vulnerabilities Catalog due to active exploitation. A critical vulnerability (CVE-2026-21858) was found in the n8n workflow automation platform, affecting thousands of systems. In technology, Google removed some medical AI Overviews following "alarming" results.
##Die erste Ausgabe von 60 Sekunden Cyber beschäftigt sich mit dem aktuellen ESA-Hack, der Situation Taiwans, CVE-2026-21858 und dem Schlag gegen Black Axe.
##📢 CVE-2026-21858 : RCE non authentifiée critique dans n8n (maj 1.121.0 requise)
📝 Source : Cyera Research Labs (blog de recherche, 7 janvier 2026).
📖 cyberveille : https://cyberveille.ch/posts/2026-01-10-cve-2026-21858-rce-non-authentifiee-critique-dans-n8n-maj-1-121-0-requise/
🌐 source : https://www.cyera.com/research-labs/ni8mare-unauthenticated-remote-code-execution-in-n8n-cve-2026-21858
#CVE_2026_21858 #IOC #Cyberveille
Latest global tech and cybersecurity news (Jan 12-13, 2026):
The World Economic Forum's 'Global Cybersecurity Outlook 2026' highlights AI, geopolitics, and cyber-fraud as key shapers of risk, with fraud now surpassing ransomware as a top concern. CISA added a Gogs Path Traversal vulnerability (CVE-2025-8110) to its Known Exploited Vulnerabilities Catalog due to active exploitation. A critical vulnerability (CVE-2026-21858) was found in the n8n workflow automation platform, affecting thousands of systems. In technology, Google removed some medical AI Overviews following "alarming" results.
##Die erste Ausgabe von 60 Sekunden Cyber beschäftigt sich mit dem aktuellen ESA-Hack, der Situation Taiwans, CVE-2026-21858 und dem Schlag gegen Black Axe.
##Tell your friends.
The vulnerability, tracked as CVE-2026-21858 (CVSS score: 10.0), has been codenamed Ni8mare by Cyera Research Labs. Security researcher Dor Attias discovered and reported it on November 9, 2025.
https://thehackernews.com/2026/01/critical-n8n-vulnerability-cvss-100.html
##this was some great and necessary debunking of the ridiculous attempt at a "look how cool we are” CVE assignment.
between this and the "it's actually not a real vuln from an internet-perspective" for the recent daft D-Link CVE assignment, the cyber part of 2026 is off to a really horrible start.
##New.
Picus: Ni8mare: n8n CVE-2026-21858 Remote Code Execution Vulnerability Explained https://www.picussecurity.com/resource/blog/ni8mare-n8n-cve-2026-21858-remote-code-execution-vulnerability-explained #threatresearch #infosec
##Tracked as CVE-2026-21858 (CVSS score 10), the bug enables remote code execution without authentication. https://www.securityweek.com/critical-vulnerability-exposes-n8n-instances-to-takeover-attacks/
##Ni8mare – CVE-2026-21858 : cette faille critique permet de pirater les serveurs n8n https://www.it-connect.fr/ni8mare-cve-2026-21858-faille-critique-n8n/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #n8n
##qui c'est qui se servait de #n8n ici ? on a un petit #CVE à niveau 10 là https://github.com/Chocapikk/CVE-2026-21858 #iagenIsHell
##Critical Ni8mare flaw in n8n allows unauthenticated remote takeover
n8n patched a critical vulnerability (CVE-2026-21858) that allows unauthenticated attackers to steal server files and gain full remote code execution. The flaw exploits a logic error in webhook and file upload handling to bypass authentication and compromise sensitive automation credentials.
**If you are using n8n, this is urgent. If possible, try to isolate all n8n instances from the internet and accessible from trusted networks only. Then update to version 1.121.0 ASAP. If you can't patch, block webhooks and file uploads from any access from untrusted networks and the internet.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-ni8mare-flaw-in-n8n-allows-unauthenticated-remote-takeover-4-x-4-z-8/gD2P6Ple2L
Say hello to #Ni8mare, the first named vulnerability of 2026.
#cve-2026-21858
##RE: https://infosec.exchange/@cR0w/115849435087390469
LMFAO another one. 🥳
https://github.com/n8n-io/n8n/security/advisories/GHSA-v4pr-fm98-w9pg
https://www.cve.org/CVERecord?id=CVE-2026-21858 ( not yet published )
##Ni8mare - Unauthenticated Remote Code Execution in n8n (CVE-2026-21858) https://www.cyera.com/research-labs/ni8mare-unauthenticated-remote-code-execution-in-n8n-cve-2026-21858
##updated 2026-01-12T19:16:00.697000
1 posts
🟠 CVE-2025-52435 - High (7.5)
J2EE Misconfiguration: Data Transmission Without Encryption vulnerability in Apache NimBLE.
Improper handling of Pause Encryption procedure on Link Layer results in a previously encrypted connection being left in un-encrypted state allowing an ea...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-52435/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-12T18:39:30.937000
1 posts
DoS in Technitium DNS server.
https://github.com/FPokerFace/Security-Advisory/tree/main/CVE-2025-50334
##updated 2026-01-12T18:31:31
2 posts
🔴 CVE-2025-70161 - Critical (9.8)
EDIMAX BR-6208AC V2_1.02 is vulnerable to Command Injection. This arises because the pppUserName field is directly passed to a shell command via the system() function without proper sanitization. An attacker can exploit this by injecting malicious...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70161/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##RUCKUS
https://www.cve.org/CVERecord?id=CVE-2025-69425
https://www.cve.org/CVERecord?id=CVE-2025-69426
EDIMAX
##updated 2026-01-12T18:31:31
1 posts
🔴 CVE-2025-69542 - Critical (9.8)
A Command Injection Vulnerability has been discovered in the DHCP daemon service of D-Link DIR895LA1 v102b07. The vulnerability exists in the lease renewal processing logic where the DHCP hostname parameter is directly concatenated into a system c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-69542/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-12T18:31:31
1 posts
🔴 CVE-2026-22584 - Critical (9.8)
Improper Control of Generation of Code ('Code Injection') vulnerability in Salesforce Uni2TS on MacOS, Windows, Linux allows Leverage Executable Code in Non-Executable Files.This issue affects Uni2TS: through 1.2.0.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22584/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-12T18:31:26
1 posts
📈 CVE Published in last 7 days (2026-01-05 - 2026-01-12)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1037
Severity:
- Critical: 110
- High: 289
- Medium: 492
- Low: 32
- None: 114
Status:
- : 43
- Analyzed: 62
- Awaiting Analysis: 537
- Received: 246
- Rejected: 32
- Undergoing Analysis: 117
Top CNAs:
- GitHub, Inc.: 201
- Wordfence: 161
- Patchstack: 150
- VulDB: 78
- MITRE: 73
- VulnCheck: 57
- N/A: 43
- MediaTek, Inc.: 28
- Fortinet, Inc.: 26
- Qualcomm, Inc.: 22
Top Affected Products:
- UNKNOWN: 964
- Google Android: 23
- Color Iccdev: 12
- Fabian Online Product Reservation System: 8
- Samsung Exynos 2400 Firmware: 7
- Samsung Exynos 1580 Firmware: 7
- Samsung Exynos 1380 Firmware: 6
- Samsung Exynos 1480 Firmware: 6
- Mediatek Nr17: 5
- Mediatek Nr16: 4
Top EPSS Score:
- CVE-2026-0581 - 3.41 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-0581)
- CVE-2026-0641 - 3.17 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-0641)
- CVE-2025-61489 - 2.45 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-61489)
- CVE-2025-15502 - 1.04 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-15502)
- CVE-2025-6225 - 0.89 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-6225)
- CVE-2020-36925 - 0.52 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-36925)
- CVE-2025-64424 - 0.50 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-64424)
- CVE-2025-14997 - 0.46 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14997)
- CVE-2025-46645 - 0.45 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-46645)
- CVE-2025-68455 - 0.43 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-68455)
updated 2026-01-12T18:30:36
1 posts
🟠 CVE-2025-46067 - High (8.2)
An issue in Automai Director v.25.2.0 allows a remote attacker to escalate privileges and obtain sensitive information via a crafted js file
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-46067/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-12T18:30:36
1 posts
🔴 CVE-2025-46070 - Critical (9.8)
An issue in Automai BotManager v.25.2.0 allows a remote attacker to execute arbitrary code via the BotManager.exe component
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-46070/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-12T18:30:36
1 posts
🟠 CVE-2025-71063 - High (8.2)
Errands before 46.2.10 does not verify TLS certificates for CalDAV servers.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-71063/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-12T18:30:30
1 posts
🟠 CVE-2025-66744 - High (7.5)
In Yonyou YonBIP v3 and before, the LoginWithV8 interface in the series data application service system is vulnerable to path traversal, allowing unauthorized access to sensitive information within the system
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-66744/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-12T18:30:29
1 posts
updated 2026-01-12T17:53:19.670000
1 posts
Oops.
wolfSSH’s key exchange state machine can be manipulated to leak the client’s password in the clear, trick the client to send a bogus signature, or trick the client into skipping user authentication. This affects client applications with wolfSSH version 1.4.21 and earlier. Users of wolfSSH must update or apply the fix patch and it’s recommended to update credentials used. This fix is also recommended for wolfSSH server applications. While there aren’t any specific attacks on server applications, the same defect is present. Thanks to Aina Toky Rasoamanana of Valeo and Olivier Levillain of Telecom SudParis for the report.
sev:CRIT 9.4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/U:Red
updated 2026-01-12T17:15:52.007000
1 posts
🟠 CVE-2025-62235 - High (8.1)
Authentication Bypass by Spoofing vulnerability in Apache NimBLE.
Receiving specially crafted Security Request could lead to removal of original bond and re-bond with impostor.
This issue affects Apache NimBLE: through 1.8.0.
Users are recommen...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-62235/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-12T17:15:51.840000
1 posts
🟠 CVE-2025-56225 - High (7.5)
fluidsynth-2.4.6 and earlier versions is vulnerable to Null pointer dereference in fluid_synth_monopoly.c, that can be triggered when loading an invalid midi file.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-56225/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-12T17:15:51.687000
1 posts
🟠 CVE-2025-53477 - High (7.5)
NULL Pointer Dereference vulnerability in Apache Nimble.
Missing validation of HCI connection complete or HCI command TX buffer could lead to NULL pointer dereference.
This issue requires disabled asserts and broken or bogus Bluetooth controller ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-53477/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-12T17:15:51.050000
1 posts
🟠 CVE-2025-46068 - High (8.8)
An issue in Automai Director v.25.2.0 allows a remote attacker to execute arbitrary code via the update mechanism
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-46068/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-12T17:15:50.700000
2 posts
discussed.
- Ukraine 5G pilot: Kyivstar launches 5G pilot in Lviv, wartime‑aware; plans expand to other cities.
- Sweden drone defense funding: Sweden to spend 440M crowns on unmanned drone systems (NATO member).
- CVE-2025-46066: Critical remote privilege escalation flaw in Automai Director v25.2.0. [2/2]
##🔴 CVE-2025-46066 - Critical (9.9)
An issue in Automai Director v.25.2.0 allows a remote attacker to escalate privileges
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-46066/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-12T17:15:50.250000
6 posts
32 repos
https://github.com/AdolfBharath/mongobleed
https://github.com/14mb1v45h/CYBERDUDEBIVASH-MONGODB-DETECTOR-v2026
https://github.com/waheeb71/CVE-2025-14847
https://github.com/franksec42/mongobleed-exploit-CVE-2025-14847
https://github.com/kuyrathdaro/cve-2025-14847
https://github.com/Ashwesker/Ashwesker-CVE-2025-14847
https://github.com/chinaxploiter/CVE-2025-14847-PoC
https://github.com/cybertechajju/CVE-2025-14847_Expolit
https://github.com/tunahantekeoglu/MongoDeepDive
https://github.com/ProbiusOfficial/CVE-2025-14847
https://github.com/nma-io/mongobleed
https://github.com/KingHacker353/CVE-2025-14847_Expolit
https://github.com/Black1hp/mongobleed-scanner
https://github.com/vfa-tuannt/CVE-2025-14847
https://github.com/saereya/CVE-2025-14847---MongoBleed
https://github.com/Security-Phoenix-demo/mongobleed-exploit-CVE-2025-14847
https://github.com/lincemorado97/CVE-2025-14847
https://github.com/AmadoBatista/mongobleed
https://github.com/FurkanKAYAPINAR/CVE-2025-14847-MongoBleed-Exploit
https://github.com/Rishi-kaul/CVE-2025-14847-MongoBleed
https://github.com/sahar042/CVE-2025-14847
https://github.com/peakcyber-security/CVE-2025-14847
https://github.com/joshuavanderpoll/CVE-2025-14847
https://github.com/onewinner/CVE-2025-14847
https://github.com/JemHadar/MongoBleed-DFIR-Triage-Script-CVE-2025-14847
https://github.com/CadGoose/MongoBleed-CVE-2025-14847-Fully-Automated-scanner
https://github.com/ElJoamy/MongoBleed-exploit
https://github.com/keraattin/Mongobleed-Detector-CVE-2025-14847
https://github.com/j0lt-github/mongobleedburp
https://github.com/NoNameError/MongoBLEED---CVE-2025-14847-POC-
https://github.com/Systemhaus-Schulz/MongoBleed-CVE-2025-14847
updated 2026-01-12T16:44:01.677000
2 posts
CVEs are now published for this.
https://www.cve.org/CVERecord?id=CVE-2025-55125
https://www.cve.org/CVERecord?id=CVE-2025-59468
##🚨 Multiple Veeam CVEs Identified: Critical Flaws Allow RCE and High-Privilege Actions
CVE-2025-55125:
A flaw that allows a Backup or Tape Operator to achieve remote code execution (RCE) as root by crafting a malicious backup configuration file.
▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing
CVE-2025-59468:
A vulnerability enabling a Backup Administrator to execute remote code as the postgres user by supplying a malicious password parameter.
▪️Severity: Medium
▪️CVSS v3.1: 6.7
▪️Source: Discovered during internal testing
CVE-2025-59469
A security issue that allows a Backup or Tape Operator to write arbitrary files with root privileges.
▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing
CVE-2025-59470
A vulnerability that permits a Backup or Tape Operator to achieve remote code execution (RCE) as the postgres user by sending a malicious interval or order parameter.
▪️CVSS Severity: Critical
▪️CVSS v3.1: 9.0
▪️Source: Discovered during internal testing
Veeam: https://www.veeam.com/kb4738
Blog format: https://darkwebinformer.com/multiple-veeam-cves-identified-critical-flaws-allow-rce-and-high-privilege-actions/
updated 2026-01-12T15:30:42
1 posts
🟠 CVE-2025-68493 - High (8.1)
Missing XML Validation vulnerability in Apache Struts, Apache Struts.
This issue affects Apache Struts: from 2.0.0 before 2.2.1; Apache Struts: from 2.2.1 through 6.1.0.
Users are recommended to upgrade to version 6.1.1, which fixes the issue.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-68493/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-12T15:16:03.463000
3 posts
1 repos
Advantech patches maximum-severity SQL injection flaw in IoT products
Advantech patched a maximum-severity SQL injection vulnerability (CVE-2025-52694) in its IoTSuite and IoT Edge products that allows unauthenticated remote attackers to execute arbitrary database commands.
**Make sure all industrial devices are isolated from the internet and accessible from trusted networks only. Update your Advantech IoTSuite and IoT Edge software to the latest versions immediately to prevent remote database takeovers.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/advantech-patches-maximum-severity-sql-injection-flaw-in-iot-products-n-q-4-8-9/gD2P6Ple2L
🔴 CVE-2025-52694 - Critical (10)
Successful exploitation of the SQL injection vulnerability could allow an unauthenticated remote attacker to execute arbitrary SQL commands on the vulnerable service when it is exposed to the Internet.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-52694/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Advantech patches maximum-severity SQL injection flaw in IoT products
Advantech patched a maximum-severity SQL injection vulnerability (CVE-2025-52694) in its IoTSuite and IoT Edge products that allows unauthenticated remote attackers to execute arbitrary database commands.
**Make sure all industrial devices are isolated from the internet and accessible from trusted networks only. Update your Advantech IoTSuite and IoT Edge software to the latest versions immediately to prevent remote database takeovers.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/advantech-patches-maximum-severity-sql-injection-flaw-in-iot-products-n-q-4-8-9/gD2P6Ple2L
updated 2026-01-12T15:16:02.910000
2 posts
Critical SQL Injection and XSS flaws reported in Imaster business software
Imaster's business management systems suffer from four vulnerabilities, including a critical SQL injection (CVE-2025-41006) that allows unauthenticated database access. These flaws enable attackers to steal sensitive patient data and execute malicious scripts in administrative sessions.
**If you are using Imaster MEMS Events CRM and the Patient Records Management System, make sure they are isolated from the internet and accessible from trusted networks only. Reach out to the vendor for patches, and in the meantime use a Web Application Firewall to filter malicious SQL and XSS traffic.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-sql-injection-and-xss-vulnerabilities-discovered-in-imaster-business-software-v-f-v-d-t/gD2P6Ple2L
Critical SQL Injection and XSS flaws reported in Imaster business software
Imaster's business management systems suffer from four vulnerabilities, including a critical SQL injection (CVE-2025-41006) that allows unauthenticated database access. These flaws enable attackers to steal sensitive patient data and execute malicious scripts in administrative sessions.
**If you are using Imaster MEMS Events CRM and the Patient Records Management System, make sure they are isolated from the internet and accessible from trusted networks only. Reach out to the vendor for patches, and in the meantime use a Web Application Firewall to filter malicious SQL and XSS traffic.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-sql-injection-and-xss-vulnerabilities-discovered-in-imaster-business-software-v-f-v-d-t/gD2P6Ple2L
updated 2026-01-12T09:31:31
2 posts
There is a critical security vulnerability in zlib that allows code smuggling. Currently, there does not appear to be an update available.
• https://seclists.org/fulldisclosure/2026/Jan/3
• https://nvd.nist.gov/vuln/detail/CVE-2026-22184
#Security #zlib #Vulnerability
sev:CRIT BoF in zlib.
##zlib versions up to and including 1.3.1.2 contain a global buffer overflow in the untgz utility. The TGZfname() function copies an attacker-supplied archive name from argv[] into a fixed-size 1024-byte static global buffer using an unbounded strcpy() call without length validation. Supplying an archive name longer than 1024 bytes results in an out-of-bounds write that can lead to memory corruption, denial of service, and potentially code execution depending on compiler, build flags, architecture, and memory layout. The overflow occurs prior to any archive parsing or validation.
updated 2026-01-12T09:30:36
3 posts
Merit
https://www.cve.org/CVERecord?id=CVE-2026-0854
##🟠 CVE-2026-0855 - High (8.8)
Certain IP Camera models developed by Merit LILIN has a OS Command Injection vulnerability, allowing authenticated remote attackers to inject arbitrary OS commands and execute them on the device.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0855/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Merit
https://www.cve.org/CVERecord?id=CVE-2026-0854
##updated 2026-01-12T09:30:36
1 posts
🟠 CVE-2025-14279 - High (8.1)
MLFlow versions up to and including 3.4.0 are vulnerable to DNS rebinding attacks due to a lack of Origin header validation in the MLFlow REST server. This vulnerability allows malicious websites to bypass Same-Origin Policy protections and execut...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-14279/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-12T06:16:11.040000
3 posts
Merit
https://www.cve.org/CVERecord?id=CVE-2026-0854
##🟠 CVE-2026-0854 - High (8.8)
Certain DVR/NVR models developed by Merit LILIN has a OS Command Injection vulnerability, allowing authenticated remote attackers to inject arbitrary OS commands and execute them on the device.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0854/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Merit
https://www.cve.org/CVERecord?id=CVE-2026-0854
##updated 2026-01-11T14:53:55
2 posts
Critical directory traversal vulnerability reported in React Router and Remix
React Router and Remix released patches for a critical directory traversal vulnerability, CVE-2025-61686, which allows attackers to read or write server files via unsigned session cookies.
**If you are using createFileSessionStorage in React Router and Remix, this is important and urgent. Check if you are using signed cookies for session storage. If not, change that ASAP, and update packages to the latest versions immediately. Ideally, limit file system permissions of your web server process to the bare minimum.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-directory-traversal-vulnerability-patched-in-react-router-and-remix-f-v-1-s-w/gD2P6Ple2L
Critical directory traversal vulnerability reported in React Router and Remix
React Router and Remix released patches for a critical directory traversal vulnerability, CVE-2025-61686, which allows attackers to read or write server files via unsigned session cookies.
**If you are using createFileSessionStorage in React Router and Remix, this is important and urgent. Check if you are using signed cookies for session storage. If not, change that ASAP, and update packages to the latest versions immediately. Ideally, limit file system permissions of your web server process to the bare minimum.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-directory-traversal-vulnerability-patched-in-react-router-and-remix-f-v-1-s-w/gD2P6Ple2L
updated 2026-01-11T09:30:26
2 posts
UTT
https://www.cve.org/CVERecord?id=CVE-2026-0836
https://www.cve.org/CVERecord?id=CVE-2026-0837
https://www.cve.org/CVERecord?id=CVE-2026-0838
https://www.cve.org/CVERecord?id=CVE-2026-0839
https://www.cve.org/CVERecord?id=CVE-2026-0840
https://www.cve.org/CVERecord?id=CVE-2026-0841
Luxul
##UTT
https://www.cve.org/CVERecord?id=CVE-2026-0836
https://www.cve.org/CVERecord?id=CVE-2026-0837
https://www.cve.org/CVERecord?id=CVE-2026-0838
https://www.cve.org/CVERecord?id=CVE-2026-0839
https://www.cve.org/CVERecord?id=CVE-2026-0840
https://www.cve.org/CVERecord?id=CVE-2026-0841
Luxul
##updated 2026-01-11T09:30:25
2 posts
UTT
https://www.cve.org/CVERecord?id=CVE-2026-0836
https://www.cve.org/CVERecord?id=CVE-2026-0837
https://www.cve.org/CVERecord?id=CVE-2026-0838
https://www.cve.org/CVERecord?id=CVE-2026-0839
https://www.cve.org/CVERecord?id=CVE-2026-0840
https://www.cve.org/CVERecord?id=CVE-2026-0841
Luxul
##UTT
https://www.cve.org/CVERecord?id=CVE-2026-0836
https://www.cve.org/CVERecord?id=CVE-2026-0837
https://www.cve.org/CVERecord?id=CVE-2026-0838
https://www.cve.org/CVERecord?id=CVE-2026-0839
https://www.cve.org/CVERecord?id=CVE-2026-0840
https://www.cve.org/CVERecord?id=CVE-2026-0841
Luxul
##updated 2026-01-11T06:30:19
2 posts
UTT
https://www.cve.org/CVERecord?id=CVE-2026-0836
https://www.cve.org/CVERecord?id=CVE-2026-0837
https://www.cve.org/CVERecord?id=CVE-2026-0838
https://www.cve.org/CVERecord?id=CVE-2026-0839
https://www.cve.org/CVERecord?id=CVE-2026-0840
https://www.cve.org/CVERecord?id=CVE-2026-0841
Luxul
##UTT
https://www.cve.org/CVERecord?id=CVE-2026-0836
https://www.cve.org/CVERecord?id=CVE-2026-0837
https://www.cve.org/CVERecord?id=CVE-2026-0838
https://www.cve.org/CVERecord?id=CVE-2026-0839
https://www.cve.org/CVERecord?id=CVE-2026-0840
https://www.cve.org/CVERecord?id=CVE-2026-0841
Luxul
##updated 2026-01-11T06:15:57.300000
2 posts
UTT
https://www.cve.org/CVERecord?id=CVE-2026-0836
https://www.cve.org/CVERecord?id=CVE-2026-0837
https://www.cve.org/CVERecord?id=CVE-2026-0838
https://www.cve.org/CVERecord?id=CVE-2026-0839
https://www.cve.org/CVERecord?id=CVE-2026-0840
https://www.cve.org/CVERecord?id=CVE-2026-0841
Luxul
##UTT
https://www.cve.org/CVERecord?id=CVE-2026-0836
https://www.cve.org/CVERecord?id=CVE-2026-0837
https://www.cve.org/CVERecord?id=CVE-2026-0838
https://www.cve.org/CVERecord?id=CVE-2026-0839
https://www.cve.org/CVERecord?id=CVE-2026-0840
https://www.cve.org/CVERecord?id=CVE-2026-0841
Luxul
##updated 2026-01-11T05:15:58.893000
2 posts
UTT
https://www.cve.org/CVERecord?id=CVE-2026-0836
https://www.cve.org/CVERecord?id=CVE-2026-0837
https://www.cve.org/CVERecord?id=CVE-2026-0838
https://www.cve.org/CVERecord?id=CVE-2026-0839
https://www.cve.org/CVERecord?id=CVE-2026-0840
https://www.cve.org/CVERecord?id=CVE-2026-0841
Luxul
##UTT
https://www.cve.org/CVERecord?id=CVE-2026-0836
https://www.cve.org/CVERecord?id=CVE-2026-0837
https://www.cve.org/CVERecord?id=CVE-2026-0838
https://www.cve.org/CVERecord?id=CVE-2026-0839
https://www.cve.org/CVERecord?id=CVE-2026-0840
https://www.cve.org/CVERecord?id=CVE-2026-0841
Luxul
##updated 2026-01-11T05:15:47.947000
2 posts
UTT
https://www.cve.org/CVERecord?id=CVE-2026-0836
https://www.cve.org/CVERecord?id=CVE-2026-0837
https://www.cve.org/CVERecord?id=CVE-2026-0838
https://www.cve.org/CVERecord?id=CVE-2026-0839
https://www.cve.org/CVERecord?id=CVE-2026-0840
https://www.cve.org/CVERecord?id=CVE-2026-0841
Luxul
##UTT
https://www.cve.org/CVERecord?id=CVE-2026-0836
https://www.cve.org/CVERecord?id=CVE-2026-0837
https://www.cve.org/CVERecord?id=CVE-2026-0838
https://www.cve.org/CVERecord?id=CVE-2026-0839
https://www.cve.org/CVERecord?id=CVE-2026-0840
https://www.cve.org/CVERecord?id=CVE-2026-0841
Luxul
##updated 2026-01-11T03:30:13
2 posts
UTT
https://www.cve.org/CVERecord?id=CVE-2026-0836
https://www.cve.org/CVERecord?id=CVE-2026-0837
https://www.cve.org/CVERecord?id=CVE-2026-0838
https://www.cve.org/CVERecord?id=CVE-2026-0839
https://www.cve.org/CVERecord?id=CVE-2026-0840
https://www.cve.org/CVERecord?id=CVE-2026-0841
Luxul
##UTT
https://www.cve.org/CVERecord?id=CVE-2026-0836
https://www.cve.org/CVERecord?id=CVE-2026-0837
https://www.cve.org/CVERecord?id=CVE-2026-0838
https://www.cve.org/CVERecord?id=CVE-2026-0839
https://www.cve.org/CVERecord?id=CVE-2026-0840
https://www.cve.org/CVERecord?id=CVE-2026-0841
Luxul
##updated 2026-01-10T09:30:24
1 posts
📈 CVE Published in last 7 days (2026-01-05 - 2026-01-12)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1037
Severity:
- Critical: 110
- High: 289
- Medium: 492
- Low: 32
- None: 114
Status:
- : 43
- Analyzed: 62
- Awaiting Analysis: 537
- Received: 246
- Rejected: 32
- Undergoing Analysis: 117
Top CNAs:
- GitHub, Inc.: 201
- Wordfence: 161
- Patchstack: 150
- VulDB: 78
- MITRE: 73
- VulnCheck: 57
- N/A: 43
- MediaTek, Inc.: 28
- Fortinet, Inc.: 26
- Qualcomm, Inc.: 22
Top Affected Products:
- UNKNOWN: 964
- Google Android: 23
- Color Iccdev: 12
- Fabian Online Product Reservation System: 8
- Samsung Exynos 2400 Firmware: 7
- Samsung Exynos 1580 Firmware: 7
- Samsung Exynos 1380 Firmware: 6
- Samsung Exynos 1480 Firmware: 6
- Mediatek Nr17: 5
- Mediatek Nr16: 4
Top EPSS Score:
- CVE-2026-0581 - 3.41 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-0581)
- CVE-2026-0641 - 3.17 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-0641)
- CVE-2025-61489 - 2.45 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-61489)
- CVE-2025-15502 - 1.04 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-15502)
- CVE-2025-6225 - 0.89 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-6225)
- CVE-2020-36925 - 0.52 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-36925)
- CVE-2025-64424 - 0.50 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-64424)
- CVE-2025-14997 - 0.46 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14997)
- CVE-2025-46645 - 0.45 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-46645)
- CVE-2025-68455 - 0.43 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-68455)
updated 2026-01-10T01:16:18.843000
2 posts
Space Hacking ( NASA Cryptolib ) 🚀
https://www.cve.org/CVERecord?id=CVE-2026-21897
https://www.cve.org/CVERecord?id=CVE-2026-21898
https://www.cve.org/CVERecord?id=CVE-2026-21899
https://www.cve.org/CVERecord?id=CVE-2026-21900
https://www.cve.org/CVERecord?id=CVE-2026-22023
https://www.cve.org/CVERecord?id=CVE-2026-22024
https://www.cve.org/CVERecord?id=CVE-2026-22025
https://www.cve.org/CVERecord?id=CVE-2026-22026
##Space Hacking ( NASA Cryptolib ) 🚀
https://www.cve.org/CVERecord?id=CVE-2026-21897
https://www.cve.org/CVERecord?id=CVE-2026-21898
https://www.cve.org/CVERecord?id=CVE-2026-21899
https://www.cve.org/CVERecord?id=CVE-2026-21900
https://www.cve.org/CVERecord?id=CVE-2026-22023
https://www.cve.org/CVERecord?id=CVE-2026-22024
https://www.cve.org/CVERecord?id=CVE-2026-22025
https://www.cve.org/CVERecord?id=CVE-2026-22026
##updated 2026-01-10T01:16:18.553000
2 posts
Space Hacking ( NASA Cryptolib ) 🚀
https://www.cve.org/CVERecord?id=CVE-2026-21897
https://www.cve.org/CVERecord?id=CVE-2026-21898
https://www.cve.org/CVERecord?id=CVE-2026-21899
https://www.cve.org/CVERecord?id=CVE-2026-21900
https://www.cve.org/CVERecord?id=CVE-2026-22023
https://www.cve.org/CVERecord?id=CVE-2026-22024
https://www.cve.org/CVERecord?id=CVE-2026-22025
https://www.cve.org/CVERecord?id=CVE-2026-22026
##Space Hacking ( NASA Cryptolib ) 🚀
https://www.cve.org/CVERecord?id=CVE-2026-21897
https://www.cve.org/CVERecord?id=CVE-2026-21898
https://www.cve.org/CVERecord?id=CVE-2026-21899
https://www.cve.org/CVERecord?id=CVE-2026-21900
https://www.cve.org/CVERecord?id=CVE-2026-22023
https://www.cve.org/CVERecord?id=CVE-2026-22024
https://www.cve.org/CVERecord?id=CVE-2026-22025
https://www.cve.org/CVERecord?id=CVE-2026-22026
##updated 2026-01-10T01:16:18.410000
2 posts
Space Hacking ( NASA Cryptolib ) 🚀
https://www.cve.org/CVERecord?id=CVE-2026-21897
https://www.cve.org/CVERecord?id=CVE-2026-21898
https://www.cve.org/CVERecord?id=CVE-2026-21899
https://www.cve.org/CVERecord?id=CVE-2026-21900
https://www.cve.org/CVERecord?id=CVE-2026-22023
https://www.cve.org/CVERecord?id=CVE-2026-22024
https://www.cve.org/CVERecord?id=CVE-2026-22025
https://www.cve.org/CVERecord?id=CVE-2026-22026
##Space Hacking ( NASA Cryptolib ) 🚀
https://www.cve.org/CVERecord?id=CVE-2026-21897
https://www.cve.org/CVERecord?id=CVE-2026-21898
https://www.cve.org/CVERecord?id=CVE-2026-21899
https://www.cve.org/CVERecord?id=CVE-2026-21900
https://www.cve.org/CVERecord?id=CVE-2026-22023
https://www.cve.org/CVERecord?id=CVE-2026-22024
https://www.cve.org/CVERecord?id=CVE-2026-22025
https://www.cve.org/CVERecord?id=CVE-2026-22026
##updated 2026-01-10T01:16:18.263000
2 posts
Space Hacking ( NASA Cryptolib ) 🚀
https://www.cve.org/CVERecord?id=CVE-2026-21897
https://www.cve.org/CVERecord?id=CVE-2026-21898
https://www.cve.org/CVERecord?id=CVE-2026-21899
https://www.cve.org/CVERecord?id=CVE-2026-21900
https://www.cve.org/CVERecord?id=CVE-2026-22023
https://www.cve.org/CVERecord?id=CVE-2026-22024
https://www.cve.org/CVERecord?id=CVE-2026-22025
https://www.cve.org/CVERecord?id=CVE-2026-22026
##Space Hacking ( NASA Cryptolib ) 🚀
https://www.cve.org/CVERecord?id=CVE-2026-21897
https://www.cve.org/CVERecord?id=CVE-2026-21898
https://www.cve.org/CVERecord?id=CVE-2026-21899
https://www.cve.org/CVERecord?id=CVE-2026-21900
https://www.cve.org/CVERecord?id=CVE-2026-22023
https://www.cve.org/CVERecord?id=CVE-2026-22024
https://www.cve.org/CVERecord?id=CVE-2026-22025
https://www.cve.org/CVERecord?id=CVE-2026-22026
##updated 2026-01-09T21:32:41
1 posts
1 repos
updated 2026-01-09T21:32:41
2 posts
ZOMG curl CVEs.
https://curl.se/docs/CVE-2025-14017.html
https://curl.se/docs/CVE-2025-14524.html
https://curl.se/docs/CVE-2025-14819.html
https://curl.se/docs/CVE-2025-15079.html
###curl 8.18.0 has been released. This release fixes 2 medium and 4 low level vulnerabilities:
- CVE-2025-13034: No QUIC certificate pinning with GnuTLS https://curl.se/docs/CVE-2025-13034.html
- CVE-2025-14017: broken TLS options for threaded LDAPS https://curl.se/docs/CVE-2025-14017.html
- CVE-2025-14524: bearer token leak on cross-protocol redirect https://curl.se/docs/CVE-2025-14524.html
- CVE-2025-14819: OpenSSL partial chain store policy bypass https://curl.se/docs/CVE-2025-14819.html
- CVE-2025-15079: libssh global knownhost override https://curl.se/docs/CVE-2025-15079.html
- CVE-2025-15224: libssh key passphrase bypass without agent set https://curl.se/docs/CVE-2025-15224.html
I discovered the last 2 vulnerabilities.
Download curl 8.18.0 from https://curl.se/download.html
#vulnerabilityresearch #vulnerability #cybersecurity #infosec
##updated 2026-01-09T21:31:41
1 posts
📢 CVE-2026-0830 : injection de commandes dans Kiro IDE (corrigé en 0.6.18)
📝 Selon un bulletin de sécurité AWS (Bulletin ID: 2026-001-AWS) publié le 9 janvier 2026, une vulnérabilité référencée **CVE-2026-0830** touche...
📖 cyberveille : https://cyberveille.ch/posts/2026-01-10-cve-2026-0830-injection-de-commandes-dans-kiro-ide-corrige-en-0-6-18/
🌐 source : https://aws.amazon.com/security/security-bulletins/rss/2026-001-aws/
#CVE_2026_0830 #Injection_de_commandes #Cyberveille
updated 2026-01-09T19:55:26
2 posts
1 repos
Hitachi Energy patches critical RCE flaw in Asset Suite
Hitachi Energy released a critical update for Asset Suite to patch a remote code execution vulnerability (CVE-2025-10492) caused by improper data handling in the Jaspersoft reporting library.
**Make sure your Hitachi Asset Suite uses only predefined reports and users should not be allowed to upload untrudted reports. If possible, isolate Hitachi Asset Suite to be accessible from trusted networks only and limited number of users. Then plan an update to Asset Suite version 9.8.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/hitachi-energy-patches-critical-rce-flaw-in-asset-suite-w-5-d-c-l/gD2P6Ple2L
CISA ICS advisory: Hitachi Energy Asset Suite vulnerability CVE-2025-10492 https://www.cisa.gov/news-events/ics-advisories/icsa-26-008-01 #CISA #infosec #Java #JavaScript
##updated 2026-01-09T18:31:43
1 posts
updated 2026-01-09T18:31:36
1 posts
1 repos
updated 2026-01-09T18:31:35
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##updated 2026-01-09T18:31:35
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##updated 2026-01-09T18:31:35
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##updated 2026-01-09T18:15:49.873000
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##updated 2026-01-09T17:15:53.997000
1 posts
updated 2026-01-09T17:15:53.847000
1 posts
updated 2026-01-09T17:15:52.720000
1 posts
📈 CVE Published in last 7 days (2026-01-05 - 2026-01-12)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1037
Severity:
- Critical: 110
- High: 289
- Medium: 492
- Low: 32
- None: 114
Status:
- : 43
- Analyzed: 62
- Awaiting Analysis: 537
- Received: 246
- Rejected: 32
- Undergoing Analysis: 117
Top CNAs:
- GitHub, Inc.: 201
- Wordfence: 161
- Patchstack: 150
- VulDB: 78
- MITRE: 73
- VulnCheck: 57
- N/A: 43
- MediaTek, Inc.: 28
- Fortinet, Inc.: 26
- Qualcomm, Inc.: 22
Top Affected Products:
- UNKNOWN: 964
- Google Android: 23
- Color Iccdev: 12
- Fabian Online Product Reservation System: 8
- Samsung Exynos 2400 Firmware: 7
- Samsung Exynos 1580 Firmware: 7
- Samsung Exynos 1380 Firmware: 6
- Samsung Exynos 1480 Firmware: 6
- Mediatek Nr17: 5
- Mediatek Nr16: 4
Top EPSS Score:
- CVE-2026-0581 - 3.41 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-0581)
- CVE-2026-0641 - 3.17 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-0641)
- CVE-2025-61489 - 2.45 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-61489)
- CVE-2025-15502 - 1.04 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-15502)
- CVE-2025-6225 - 0.89 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-6225)
- CVE-2020-36925 - 0.52 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-36925)
- CVE-2025-64424 - 0.50 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-64424)
- CVE-2025-14997 - 0.46 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14997)
- CVE-2025-46645 - 0.45 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-46645)
- CVE-2025-68455 - 0.43 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-68455)
updated 2026-01-09T16:53:16
1 posts
28 repos
https://github.com/hackersatyamrastogi/n8n-exploit-CVE-2025-68613-n8n-God-Mode-Ultimate
https://github.com/reem-012/poc_CVE-2025-68613
https://github.com/mbanyamer/n8n-Authenticated-Expression-Injection-RCE-CVE-2025-68613
https://github.com/Khin-96/n8n-cve-2025-68613-thm
https://github.com/TheStingR/CVE-2025-68613-POC
https://github.com/secjoker/CVE-2025-68613
https://github.com/GnuTLam/POC-CVE-2025-68613
https://github.com/ali-py3/Exploit-CVE-2025-68613
https://github.com/r4j3sh-com/CVE-2025-68613-n8n-lab
https://github.com/rxerium/CVE-2025-68613
https://github.com/LingerANR/n8n-CVE-2025-68613
https://github.com/JohannesLks/CVE-2025-68613-Python-Exploit
https://github.com/Dlanang/homelab-CVE-2025-68613
https://github.com/ahmedshamsddin/n8n-RCE-CVE-2025-68613
https://github.com/wioui/n8n-CVE-2025-68613-exploit
https://github.com/intelligent-ears/CVE-2025-68613
https://github.com/J4ck3LSyN-Gen2/n8n-CVE-2025-68613-TryHackMe
https://github.com/nehkark/CVE-2025-68613
https://github.com/releaseown/analysis-and-poc-n8n-CVE-2025-68613
https://github.com/gagaltotal/n8n-cve-2025-68613
https://github.com/Ashwesker/Ashwesker-CVE-2025-68613
https://github.com/cv-sai-kamesh/n8n-CVE-2025-68613
https://github.com/Ak-cybe/CVE-2025-68613-n8n-rce-analysis
https://github.com/TheInterception/n8n_CVE-2025-68613_exploit_payloads
https://github.com/AbdulRKB/n8n-RCE
https://github.com/intbjw/CVE-2025-68613-poc-via-copilot
Another video showing how incredibly easy the n8n RCE vulnerability (CVE-2025-68613) is.
Credit: http://youtube.com/@0xmrsecurity
##updated 2026-01-09T12:32:33
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##updated 2026-01-09T12:32:33
1 posts
Hardcoded creds in KAON routers but it doesn't say what those creds are.
##updated 2026-01-09T12:32:32
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##updated 2026-01-09T12:32:32
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##updated 2026-01-09T12:32:32
1 posts
updated 2026-01-09T12:15:54.403000
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##updated 2026-01-09T09:31:24
1 posts
1 repos
updated 2026-01-09T08:15:58.147000
1 posts
DoS ( and maybe more? :crow_plead: ) in wget2.
##updated 2026-01-09T07:16:02.677000
1 posts
Perfect 10 in Fastjson. 🥳
It's funny that it appears to be a challenging enough bug that it bypassed at least two previous fixes.
https://www.cve.org/CVERecord?id=CVE-2025-70974
##Fastjson before 1.2.48 mishandles autoType because, when an @type key is in a JSON document, and the value of that key is the name of a Java class, there may be calls to certain public methods of that class. Depending on the behavior of those methods, there may be JNDI injection with an attacker-supplied payload located elsewhere in that JSON document. This was exploited in the wild in 2023 through 2025. NOTE: this issue exists because of an incomplete fix for CVE-2017-18349. Also, a later bypass is covered by CVE-2022-25845.
updated 2026-01-09T00:30:34
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##updated 2026-01-09T00:30:28
2 posts
CVE-2025-12543: Host Header Validation Bypass in #Undertow
https://www.endorlabs.com/learn/cve-2025-12543-host-header-validation-bypass-in-undertow
##https://access.redhat.com/security/cve/cve-2025-12543
##A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBoss EAP, and other Java applications. The Undertow library fails to properly validate the Host header in incoming HTTP requests.As a result, requests containing malformed or malicious Host headers are processed without rejection, enabling attackers to poison caches, perform internal network scans, or hijack user sessions.
updated 2026-01-09T00:30:28
1 posts
##A flaw was found in Ansible Automation Platform (AAP). Read-only scoped OAuth2 API Tokens in AAP, are enforced at the Gateway level for Gateway-specific operations. However, this vulnerability allows read-only tokens to perform write operations on backend services (e.g., Controller, Hub, EDA). If this flaw were exploited, an attacker‘s capabilities would only be limited by role based access controls (RBAC).
updated 2026-01-08T23:15:44.117000
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##updated 2026-01-08T21:30:33
1 posts
Reset the "Days since ASN1 vuln" sign to 0.
https://www.cve.org/CVERecord?id=CVE-2025-13151
##Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string.
updated 2026-01-08T20:15:43.817000
2 posts
CVEs are now published for this.
https://www.cve.org/CVERecord?id=CVE-2025-55125
https://www.cve.org/CVERecord?id=CVE-2025-59468
##🚨 Multiple Veeam CVEs Identified: Critical Flaws Allow RCE and High-Privilege Actions
CVE-2025-55125:
A flaw that allows a Backup or Tape Operator to achieve remote code execution (RCE) as root by crafting a malicious backup configuration file.
▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing
CVE-2025-59468:
A vulnerability enabling a Backup Administrator to execute remote code as the postgres user by supplying a malicious password parameter.
▪️Severity: Medium
▪️CVSS v3.1: 6.7
▪️Source: Discovered during internal testing
CVE-2025-59469
A security issue that allows a Backup or Tape Operator to write arbitrary files with root privileges.
▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing
CVE-2025-59470
A vulnerability that permits a Backup or Tape Operator to achieve remote code execution (RCE) as the postgres user by sending a malicious interval or order parameter.
▪️CVSS Severity: Critical
▪️CVSS v3.1: 9.0
▪️Source: Discovered during internal testing
Veeam: https://www.veeam.com/kb4738
Blog format: https://darkwebinformer.com/multiple-veeam-cves-identified-critical-flaws-allow-rce-and-high-privilege-actions/
updated 2026-01-08T20:05:42
1 posts
updated 2026-01-08T19:15:57.043000
1 posts
1 repos
updated 2026-01-08T19:15:56.283000
8 posts
10 repos
https://github.com/yt2w/CVE-2025-52691
https://github.com/you-ssef9/CVE-2025-52691
https://github.com/Ashwesker/Ashwesker-CVE-2025-52691
https://github.com/DeathShotXD/CVE-2025-52691-APT-PoC
https://github.com/rxerium/CVE-2025-52691
https://github.com/SuJing-cy/CVE-2025-2025-52691-SmarterMail-Exp
https://github.com/sajjadsiam/CVE-2025-52691-poc
https://github.com/watchtowrlabs/watchTowr-vs-SmarterMail-CVE-2025-52691
Timeline of vulnerability (soon to be exploited...) (SmartMail):
2025-12-28: NVD CVE published. [1]
2026-01-08: Vulnerability deepdive and PoC published. [2]
2026-01-12: Reconnaissance for instances detected. [3]
2026-01-xx: Exploitation? ...
[1]: https://nvd.nist.gov/vuln/detail/CVE-2025-52691
[2]: https://labs.watchtowr.com/do-smart-people-ever-say-theyre-smart-smartertools-smartermail-pre-auth-rce-cve-2025-52691/
[3]: https://www.labs.greynoise.io/grimoire/2026-01-13-smartermail-version-enumeration/
We've been working on a new AI-driven + human-in-the-loop threat signals detector and this morning it flagged this path that we have not seen before in the grid in the past 90d `/api/v1/licensing/about`. It turns out it's an unauth’d version check for SmarterTools SmarterMail.
If that name sounds familiar its b/c of CVE-2025-52691 (https://nvd.nist.gov/vuln/detail/CVE-2025-52691). (1/3)
##Timeline of vulnerability (soon to be exploited...) (SmartMail):
2025-12-28: NVD CVE published. [1]
2026-01-08: Vulnerability deepdive and PoC published. [2]
2026-01-12: Reconnaissance for instances detected. [3]
2026-01-xx: Exploitation? ...
[1]: https://nvd.nist.gov/vuln/detail/CVE-2025-52691
[2]: https://labs.watchtowr.com/do-smart-people-ever-say-theyre-smart-smartertools-smartermail-pre-auth-rce-cve-2025-52691/
[3]: https://www.labs.greynoise.io/grimoire/2026-01-13-smartermail-version-enumeration/
We've been working on a new AI-driven + human-in-the-loop threat signals detector and this morning it flagged this path that we have not seen before in the grid in the past 90d `/api/v1/licensing/about`. It turns out it's an unauth’d version check for SmarterTools SmarterMail.
If that name sounds familiar its b/c of CVE-2025-52691 (https://nvd.nist.gov/vuln/detail/CVE-2025-52691). (1/3)
##watchTowr has published a technical analysis of a CVSS 10 pre-auth RCE vulnerability in SmartTool's SmarterMail business email platform.
The vulnerability (CVE-2025-52691) was silently patched in Oct and publicly disclosed only a few months later in Dec
##Do Smart People Ever Say They’re Smart? (SmarterTools SmarterMail Pre-Auth RCE CVE-2025-52691) - watchTowr Labs https://labs.watchtowr.com/do-smart-people-ever-say-theyre-smart-smartertools-smartermail-pre-auth-rce-cve-2025-52691/
##New.
WatchTower: Do Smart People Ever Say They’re Smart? (SmarterTools SmarterMail Pre-Auth RCE CVE-2025-52691) https://labs.watchtowr.com/do-smart-people-ever-say-theyre-smart-smartertools-smartermail-pre-auth-rce-cve-2025-52691/ #infosec #threatresearch #vulnerability
##Get your popcorn, it's time for another watchTowr Labs post. This one is a pre-auth RCE in SmarterMail. :blobcatpopcorn:
##updated 2026-01-08T19:15:54.793000
1 posts
Old FLIR CVEs just published.
https://www.cve.org/CVERecord?id=CVE-2017-20212
https://www.cve.org/CVERecord?id=CVE-2017-20213
https://www.cve.org/CVERecord?id=CVE-2017-20214
https://www.cve.org/CVERecord?id=CVE-2017-20215
##updated 2026-01-08T19:15:54.560000
1 posts
Old FLIR CVEs just published.
https://www.cve.org/CVERecord?id=CVE-2017-20212
https://www.cve.org/CVERecord?id=CVE-2017-20213
https://www.cve.org/CVERecord?id=CVE-2017-20214
https://www.cve.org/CVERecord?id=CVE-2017-20215
##updated 2026-01-08T18:30:56
6 posts
1 repos
CVEs are now published for this.
https://www.cve.org/CVERecord?id=CVE-2025-55125
https://www.cve.org/CVERecord?id=CVE-2025-59468
##Veeam Patches Critical Remote Code Execution Flaw in Backup & Replication v13
Veeam patched multiple vulnerabilities in Backup & Replication version 13, including a critical RCE flaw (CVE-2025-59470) that allows privileged operators to execute commands as the database user. These flaws are high-value targets for ransomware groups seeking to disable recovery options during attacks.
**If you are using Veeam Backup & Replication version 13, make sure all backup systems are isolated from the internet and accessible from trusted networks only. Limit the number of users with Backup or Tape Operator roles and update to version 13.0.1.1071 as soon as possible.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/veeam-patches-critical-remote-code-execution-flaw-in-backup-replication-v13-f-f-r-b-m/gD2P6Ple2L
🚨 Multiple Veeam CVEs Identified: Critical Flaws Allow RCE and High-Privilege Actions
CVE-2025-55125:
A flaw that allows a Backup or Tape Operator to achieve remote code execution (RCE) as root by crafting a malicious backup configuration file.
▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing
CVE-2025-59468:
A vulnerability enabling a Backup Administrator to execute remote code as the postgres user by supplying a malicious password parameter.
▪️Severity: Medium
▪️CVSS v3.1: 6.7
▪️Source: Discovered during internal testing
CVE-2025-59469
A security issue that allows a Backup or Tape Operator to write arbitrary files with root privileges.
▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing
CVE-2025-59470
A vulnerability that permits a Backup or Tape Operator to achieve remote code execution (RCE) as the postgres user by sending a malicious interval or order parameter.
▪️CVSS Severity: Critical
▪️CVSS v3.1: 9.0
▪️Source: Discovered during internal testing
Veeam: https://www.veeam.com/kb4738
Blog format: https://darkwebinformer.com/multiple-veeam-cves-identified-critical-flaws-allow-rce-and-high-privilege-actions/
Tracked as CVE-2025-59470, this RCE security flaw affects Veeam Backup & Replication 13.0.1.180 and all earlier version 13 builds. https://www.bleepingcomputer.com/news/security/new-veeam-vulnerabilities-expose-backup-servers-to-rce-attacks/
##updated 2026-01-08T18:30:56
2 posts
CVEs are now published for this.
https://www.cve.org/CVERecord?id=CVE-2025-55125
https://www.cve.org/CVERecord?id=CVE-2025-59468
##🚨 Multiple Veeam CVEs Identified: Critical Flaws Allow RCE and High-Privilege Actions
CVE-2025-55125:
A flaw that allows a Backup or Tape Operator to achieve remote code execution (RCE) as root by crafting a malicious backup configuration file.
▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing
CVE-2025-59468:
A vulnerability enabling a Backup Administrator to execute remote code as the postgres user by supplying a malicious password parameter.
▪️Severity: Medium
▪️CVSS v3.1: 6.7
▪️Source: Discovered during internal testing
CVE-2025-59469
A security issue that allows a Backup or Tape Operator to write arbitrary files with root privileges.
▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing
CVE-2025-59470
A vulnerability that permits a Backup or Tape Operator to achieve remote code execution (RCE) as the postgres user by sending a malicious interval or order parameter.
▪️CVSS Severity: Critical
▪️CVSS v3.1: 9.0
▪️Source: Discovered during internal testing
Veeam: https://www.veeam.com/kb4738
Blog format: https://darkwebinformer.com/multiple-veeam-cves-identified-critical-flaws-allow-rce-and-high-privilege-actions/
updated 2026-01-08T18:30:56
1 posts
updated 2026-01-08T18:30:56
1 posts
updated 2026-01-08T18:30:56
1 posts
updated 2026-01-08T18:30:33
2 posts
Tracked as CVE-2026-0625 (CVSS score of 9.3), the security defect exists because the dnscfg.cgi library does not properly sanitize user-supplied DNS configuration parameters. https://www.securityweek.com/hackers-exploit-zero-day-in-discontinued-d-link-devices/
##Critical RCE Vulnerability Exploited in Legacy D-Link DSL Routers
D-Link legacy DSL are actively exploited using a vulnerability, CVE-2026-0625, which allows unauthenticated remote code execution and DNS hijacking.
**If you are using D-Link routers, check this advisory whether you are using any of the vulnerable devices. If yes, make sure the devices are isolated from the internet, reset to complex password and force trusted upstream DNS servers. Plan a very quick replacement for these devices, they are exploitable and won't be getting patches.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/critical-rce-vulnerability-exploited-in-legacy-d-link-dsl-routers-j-2-i-i-g/gD2P6Ple2L
updated 2026-01-08T18:09:49.800000
1 posts
This seems perfect fodder for a plot device.
> https://www.cve.org/CVERecord?id=CVE-2025-14346
(Edit: original post is gone, but this is the CVE mentioned in it.)
##updated 2026-01-08T18:09:23.230000
4 posts
1 repos
📢 CVE-2025-68428 : faille critique dans jsPDF (Node.js) permettant la lecture de fichiers locaux, corrigée en 4.0.0
📝 Selon IT-Connect (08/01/2026), une vulnérabilité critique CVE-2025-68428 affecte...
📖 cyberveille : https://cyberveille.ch/posts/2026-01-10-cve-2025-68428-faille-critique-dans-jspdf-node-js-permettant-la-lecture-de-fichiers-locaux-corrigee-en-4-0-0/
🌐 source : https://www.it-connect.fr/faille-critique-jspdf-cve-2025-68428/
#CVE_2025_68428 #Node_js #Cyberveille
❗️CVE-2025-68428: Critical Path Traversal in jsPDF
GitHub: https://github.com/12nio/CVE-2025-68428_PoC
CVSS: 9.2
CVE Published: January 5th, 2026
Exploit Published: January 8th, 2026
News source: https://www.bleepingcomputer.com/news/security/critical-jspdf-flaw-lets-hackers-steal-secrets-via-generated-pdfs/
##Cette faille critique dans jsPDF (CVE-2025-68428) peut exposer les données de votre serveur https://www.it-connect.fr/faille-critique-jspdf-cve-2025-68428/ #ActuCybersécurité #Cybersécurité #Vulnérabilité
##Critical path traversal flaw reported in jsPDF library
jsPDF version 4.0.0 patches a critical path traversal vulnerability (CVE-2025-68428) that allows attackers to extract sensitive server files by embedding them into generated PDFs. The flaw affects Node.js environments where user-supplied paths are passed to methods like loadFile or addImage.
**If you are using jsPDF, review this advisory and your use case. Ideally, update to version 4.0.0 and use the Node.js --permission flag to limit which files the process can read. Also, as a normal best practice, always sanitize and validate user input before passing it to libraries.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-path-traversal-flaw-reported-in-jspdf-library-a-5-v-c-c/gD2P6Ple2L
updated 2026-01-08T18:09:23.230000
2 posts
📈 CVE Published in last 7 days (2026-01-05 - 2026-01-12)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1037
Severity:
- Critical: 110
- High: 289
- Medium: 492
- Low: 32
- None: 114
Status:
- : 43
- Analyzed: 62
- Awaiting Analysis: 537
- Received: 246
- Rejected: 32
- Undergoing Analysis: 117
Top CNAs:
- GitHub, Inc.: 201
- Wordfence: 161
- Patchstack: 150
- VulDB: 78
- MITRE: 73
- VulnCheck: 57
- N/A: 43
- MediaTek, Inc.: 28
- Fortinet, Inc.: 26
- Qualcomm, Inc.: 22
Top Affected Products:
- UNKNOWN: 964
- Google Android: 23
- Color Iccdev: 12
- Fabian Online Product Reservation System: 8
- Samsung Exynos 2400 Firmware: 7
- Samsung Exynos 1580 Firmware: 7
- Samsung Exynos 1380 Firmware: 6
- Samsung Exynos 1480 Firmware: 6
- Mediatek Nr17: 5
- Mediatek Nr16: 4
Top EPSS Score:
- CVE-2026-0581 - 3.41 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-0581)
- CVE-2026-0641 - 3.17 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-0641)
- CVE-2025-61489 - 2.45 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-61489)
- CVE-2025-15502 - 1.04 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-15502)
- CVE-2025-6225 - 0.89 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-6225)
- CVE-2020-36925 - 0.52 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-36925)
- CVE-2025-64424 - 0.50 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-64424)
- CVE-2025-14997 - 0.46 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14997)
- CVE-2025-46645 - 0.45 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-46645)
- CVE-2025-68455 - 0.43 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-68455)
TOTOLINK
##updated 2026-01-08T18:09:23.230000
2 posts
📈 CVE Published in last 7 days (2026-01-05 - 2026-01-12)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1037
Severity:
- Critical: 110
- High: 289
- Medium: 492
- Low: 32
- None: 114
Status:
- : 43
- Analyzed: 62
- Awaiting Analysis: 537
- Received: 246
- Rejected: 32
- Undergoing Analysis: 117
Top CNAs:
- GitHub, Inc.: 201
- Wordfence: 161
- Patchstack: 150
- VulDB: 78
- MITRE: 73
- VulnCheck: 57
- N/A: 43
- MediaTek, Inc.: 28
- Fortinet, Inc.: 26
- Qualcomm, Inc.: 22
Top Affected Products:
- UNKNOWN: 964
- Google Android: 23
- Color Iccdev: 12
- Fabian Online Product Reservation System: 8
- Samsung Exynos 2400 Firmware: 7
- Samsung Exynos 1580 Firmware: 7
- Samsung Exynos 1380 Firmware: 6
- Samsung Exynos 1480 Firmware: 6
- Mediatek Nr17: 5
- Mediatek Nr16: 4
Top EPSS Score:
- CVE-2026-0581 - 3.41 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-0581)
- CVE-2026-0641 - 3.17 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-0641)
- CVE-2025-61489 - 2.45 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-61489)
- CVE-2025-15502 - 1.04 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-15502)
- CVE-2025-6225 - 0.89 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-6225)
- CVE-2020-36925 - 0.52 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-36925)
- CVE-2025-64424 - 0.50 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-64424)
- CVE-2025-14997 - 0.46 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14997)
- CVE-2025-46645 - 0.45 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-46645)
- CVE-2025-68455 - 0.43 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-68455)
Assorted old vulns whose CVEs were just published. Quick glance looks like mostly random IoS stuff.
https://www.cve.org/CVERecord?id=CVE-2020-36905
https://www.cve.org/CVERecord?id=CVE-2020-36906
https://www.cve.org/CVERecord?id=CVE-2020-36907
https://www.cve.org/CVERecord?id=CVE-2020-36908
https://www.cve.org/CVERecord?id=CVE-2020-36909
https://www.cve.org/CVERecord?id=CVE-2020-36910
https://www.cve.org/CVERecord?id=CVE-2020-36912
https://www.cve.org/CVERecord?id=CVE-2020-36913
https://www.cve.org/CVERecord?id=CVE-2020-36914
https://www.cve.org/CVERecord?id=CVE-2020-36915
https://www.cve.org/CVERecord?id=CVE-2020-36916
https://www.cve.org/CVERecord?id=CVE-2020-36917
https://www.cve.org/CVERecord?id=CVE-2020-36918
https://www.cve.org/CVERecord?id=CVE-2020-36920
https://www.cve.org/CVERecord?id=CVE-2020-36921
https://www.cve.org/CVERecord?id=CVE-2020-36922
https://www.cve.org/CVERecord?id=CVE-2020-36923
https://www.cve.org/CVERecord?id=CVE-2020-36924
##updated 2026-01-08T18:09:23.230000
3 posts
Unpatched command Injection flaw reported in Trendnet TEW-713RE extenders
Trendnet TEW-713RE range extenders are reportd to have a critical command injection flaw (CVE-2025-15471) that allows unauthenticated attackers to gain root access. The flaw is not patched and the company has not responded to disclosure attempts.
**If you are using TEW-713RE range extenders, make sure they are isolated from the internet and accessible from trusted networks only. Since Trendnet has not released a fix, plan a replacement with supported hardware.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/unpatched-command-injection-flaw-reported-in-trendnet-tew-713re-extenders-i-2-q-8-w/gD2P6Ple2L
This was updated yesterday.
EUVD: Critical TRENDnet vulnerability, also known as CVE-2025-15471 https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-206251
New:
Critical: Blood Bank Management System 1.0 vulnerability CVE-2025-63525 https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-200000 #infosec
##TRENDnet
##updated 2026-01-08T18:09:23.230000
1 posts
No PoC but this one could be interesting to watch.
https://www.nokia.com/we-are-nokia/security/product-security-advisory/CVE-2025-0980/
##Nokia SR Linux is vulnerable to an authentication vulnerability allowing unauthorized access to the JSON-RPC service. When exploited, an invalid validation allows JSON RPC access without providing valid authentication credentials.
updated 2026-01-08T18:09:23.230000
1 posts
Assorted old vulns whose CVEs were just published. Quick glance looks like mostly random IoS stuff.
https://www.cve.org/CVERecord?id=CVE-2020-36905
https://www.cve.org/CVERecord?id=CVE-2020-36906
https://www.cve.org/CVERecord?id=CVE-2020-36907
https://www.cve.org/CVERecord?id=CVE-2020-36908
https://www.cve.org/CVERecord?id=CVE-2020-36909
https://www.cve.org/CVERecord?id=CVE-2020-36910
https://www.cve.org/CVERecord?id=CVE-2020-36912
https://www.cve.org/CVERecord?id=CVE-2020-36913
https://www.cve.org/CVERecord?id=CVE-2020-36914
https://www.cve.org/CVERecord?id=CVE-2020-36915
https://www.cve.org/CVERecord?id=CVE-2020-36916
https://www.cve.org/CVERecord?id=CVE-2020-36917
https://www.cve.org/CVERecord?id=CVE-2020-36918
https://www.cve.org/CVERecord?id=CVE-2020-36920
https://www.cve.org/CVERecord?id=CVE-2020-36921
https://www.cve.org/CVERecord?id=CVE-2020-36922
https://www.cve.org/CVERecord?id=CVE-2020-36923
https://www.cve.org/CVERecord?id=CVE-2020-36924
##updated 2026-01-08T18:09:23.230000
1 posts
Assorted old vulns whose CVEs were just published. Quick glance looks like mostly random IoS stuff.
https://www.cve.org/CVERecord?id=CVE-2020-36905
https://www.cve.org/CVERecord?id=CVE-2020-36906
https://www.cve.org/CVERecord?id=CVE-2020-36907
https://www.cve.org/CVERecord?id=CVE-2020-36908
https://www.cve.org/CVERecord?id=CVE-2020-36909
https://www.cve.org/CVERecord?id=CVE-2020-36910
https://www.cve.org/CVERecord?id=CVE-2020-36912
https://www.cve.org/CVERecord?id=CVE-2020-36913
https://www.cve.org/CVERecord?id=CVE-2020-36914
https://www.cve.org/CVERecord?id=CVE-2020-36915
https://www.cve.org/CVERecord?id=CVE-2020-36916
https://www.cve.org/CVERecord?id=CVE-2020-36917
https://www.cve.org/CVERecord?id=CVE-2020-36918
https://www.cve.org/CVERecord?id=CVE-2020-36920
https://www.cve.org/CVERecord?id=CVE-2020-36921
https://www.cve.org/CVERecord?id=CVE-2020-36922
https://www.cve.org/CVERecord?id=CVE-2020-36923
https://www.cve.org/CVERecord?id=CVE-2020-36924
##updated 2026-01-08T18:09:23.230000
1 posts
Assorted old vulns whose CVEs were just published. Quick glance looks like mostly random IoS stuff.
https://www.cve.org/CVERecord?id=CVE-2020-36905
https://www.cve.org/CVERecord?id=CVE-2020-36906
https://www.cve.org/CVERecord?id=CVE-2020-36907
https://www.cve.org/CVERecord?id=CVE-2020-36908
https://www.cve.org/CVERecord?id=CVE-2020-36909
https://www.cve.org/CVERecord?id=CVE-2020-36910
https://www.cve.org/CVERecord?id=CVE-2020-36912
https://www.cve.org/CVERecord?id=CVE-2020-36913
https://www.cve.org/CVERecord?id=CVE-2020-36914
https://www.cve.org/CVERecord?id=CVE-2020-36915
https://www.cve.org/CVERecord?id=CVE-2020-36916
https://www.cve.org/CVERecord?id=CVE-2020-36917
https://www.cve.org/CVERecord?id=CVE-2020-36918
https://www.cve.org/CVERecord?id=CVE-2020-36920
https://www.cve.org/CVERecord?id=CVE-2020-36921
https://www.cve.org/CVERecord?id=CVE-2020-36922
https://www.cve.org/CVERecord?id=CVE-2020-36923
https://www.cve.org/CVERecord?id=CVE-2020-36924
##updated 2026-01-08T18:09:23.230000
1 posts
Assorted old vulns whose CVEs were just published. Quick glance looks like mostly random IoS stuff.
https://www.cve.org/CVERecord?id=CVE-2020-36905
https://www.cve.org/CVERecord?id=CVE-2020-36906
https://www.cve.org/CVERecord?id=CVE-2020-36907
https://www.cve.org/CVERecord?id=CVE-2020-36908
https://www.cve.org/CVERecord?id=CVE-2020-36909
https://www.cve.org/CVERecord?id=CVE-2020-36910
https://www.cve.org/CVERecord?id=CVE-2020-36912
https://www.cve.org/CVERecord?id=CVE-2020-36913
https://www.cve.org/CVERecord?id=CVE-2020-36914
https://www.cve.org/CVERecord?id=CVE-2020-36915
https://www.cve.org/CVERecord?id=CVE-2020-36916
https://www.cve.org/CVERecord?id=CVE-2020-36917
https://www.cve.org/CVERecord?id=CVE-2020-36918
https://www.cve.org/CVERecord?id=CVE-2020-36920
https://www.cve.org/CVERecord?id=CVE-2020-36921
https://www.cve.org/CVERecord?id=CVE-2020-36922
https://www.cve.org/CVERecord?id=CVE-2020-36923
https://www.cve.org/CVERecord?id=CVE-2020-36924
##updated 2026-01-08T18:09:23.230000
1 posts
Assorted old vulns whose CVEs were just published. Quick glance looks like mostly random IoS stuff.
https://www.cve.org/CVERecord?id=CVE-2020-36905
https://www.cve.org/CVERecord?id=CVE-2020-36906
https://www.cve.org/CVERecord?id=CVE-2020-36907
https://www.cve.org/CVERecord?id=CVE-2020-36908
https://www.cve.org/CVERecord?id=CVE-2020-36909
https://www.cve.org/CVERecord?id=CVE-2020-36910
https://www.cve.org/CVERecord?id=CVE-2020-36912
https://www.cve.org/CVERecord?id=CVE-2020-36913
https://www.cve.org/CVERecord?id=CVE-2020-36914
https://www.cve.org/CVERecord?id=CVE-2020-36915
https://www.cve.org/CVERecord?id=CVE-2020-36916
https://www.cve.org/CVERecord?id=CVE-2020-36917
https://www.cve.org/CVERecord?id=CVE-2020-36918
https://www.cve.org/CVERecord?id=CVE-2020-36920
https://www.cve.org/CVERecord?id=CVE-2020-36921
https://www.cve.org/CVERecord?id=CVE-2020-36922
https://www.cve.org/CVERecord?id=CVE-2020-36923
https://www.cve.org/CVERecord?id=CVE-2020-36924
##updated 2026-01-08T18:09:23.230000
1 posts
Assorted old vulns whose CVEs were just published. Quick glance looks like mostly random IoS stuff.
https://www.cve.org/CVERecord?id=CVE-2020-36905
https://www.cve.org/CVERecord?id=CVE-2020-36906
https://www.cve.org/CVERecord?id=CVE-2020-36907
https://www.cve.org/CVERecord?id=CVE-2020-36908
https://www.cve.org/CVERecord?id=CVE-2020-36909
https://www.cve.org/CVERecord?id=CVE-2020-36910
https://www.cve.org/CVERecord?id=CVE-2020-36912
https://www.cve.org/CVERecord?id=CVE-2020-36913
https://www.cve.org/CVERecord?id=CVE-2020-36914
https://www.cve.org/CVERecord?id=CVE-2020-36915
https://www.cve.org/CVERecord?id=CVE-2020-36916
https://www.cve.org/CVERecord?id=CVE-2020-36917
https://www.cve.org/CVERecord?id=CVE-2020-36918
https://www.cve.org/CVERecord?id=CVE-2020-36920
https://www.cve.org/CVERecord?id=CVE-2020-36921
https://www.cve.org/CVERecord?id=CVE-2020-36922
https://www.cve.org/CVERecord?id=CVE-2020-36923
https://www.cve.org/CVERecord?id=CVE-2020-36924
##updated 2026-01-08T18:08:54.147000
1 posts
📈 CVE Published in last 7 days (2026-01-05 - 2026-01-12)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1037
Severity:
- Critical: 110
- High: 289
- Medium: 492
- Low: 32
- None: 114
Status:
- : 43
- Analyzed: 62
- Awaiting Analysis: 537
- Received: 246
- Rejected: 32
- Undergoing Analysis: 117
Top CNAs:
- GitHub, Inc.: 201
- Wordfence: 161
- Patchstack: 150
- VulDB: 78
- MITRE: 73
- VulnCheck: 57
- N/A: 43
- MediaTek, Inc.: 28
- Fortinet, Inc.: 26
- Qualcomm, Inc.: 22
Top Affected Products:
- UNKNOWN: 964
- Google Android: 23
- Color Iccdev: 12
- Fabian Online Product Reservation System: 8
- Samsung Exynos 2400 Firmware: 7
- Samsung Exynos 1580 Firmware: 7
- Samsung Exynos 1380 Firmware: 6
- Samsung Exynos 1480 Firmware: 6
- Mediatek Nr17: 5
- Mediatek Nr16: 4
Top EPSS Score:
- CVE-2026-0581 - 3.41 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-0581)
- CVE-2026-0641 - 3.17 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-0641)
- CVE-2025-61489 - 2.45 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-61489)
- CVE-2025-15502 - 1.04 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-15502)
- CVE-2025-6225 - 0.89 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-6225)
- CVE-2020-36925 - 0.52 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-36925)
- CVE-2025-64424 - 0.50 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-64424)
- CVE-2025-14997 - 0.46 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14997)
- CVE-2025-46645 - 0.45 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-46645)
- CVE-2025-68455 - 0.43 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-68455)
updated 2026-01-08T18:08:54.147000
2 posts
The vulnerability, tracked as CVE-2026-20029 (CVSS score: 4.9), resides in the licensing feature and could allow an authenticated, remote attacker with administrative privileges to gain access to sensitive information. https://thehackernews.com/2026/01/cisco-patches-ise-security.html
##Cisco has two new advisories:
CVE-2026-20026 and CVE-2026-20027: Multiple Cisco Products Snort 3 Distributed Computing Environment/Remote Procedure Call Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort3-dcerpc-vulns-J9HNF4tH
CVE-2026-20029: Cisco Identity Services Engine XML External Entity Processing Information Disclosure Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xxe-jWSbSDKt @TalosSecurity #Cisco #vulnerability #infosec
##updated 2026-01-08T18:08:54.147000
1 posts
WTF kind of CVE is this? It doesn't even say what product is vulnerable.
https://nvd.nist.gov/vuln/detail/CVE-2026-22536
All it says is:
The absence of permissions control for the user XXX allows the current configuration in the sudoers file to escalate privileges without any restrictions
Slow clap for S21sec.
##updated 2026-01-08T18:08:54.147000
1 posts
Cisco has two new advisories:
CVE-2026-20026 and CVE-2026-20027: Multiple Cisco Products Snort 3 Distributed Computing Environment/Remote Procedure Call Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort3-dcerpc-vulns-J9HNF4tH
CVE-2026-20029: Cisco Identity Services Engine XML External Entity Processing Information Disclosure Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xxe-jWSbSDKt @TalosSecurity #Cisco #vulnerability #infosec
##updated 2026-01-08T18:08:18.457000
1 posts
No awoo for you.
https://www.cve.org/CVERecord?id=CVE-2025-15346
##A vulnerability in the handling of verify_mode = CERT_REQUIRED in the wolfssl Python package (wolfssl-py) causes client certificate requirements to not be fully enforced. Because the WOLFSSL_VERIFY_FAIL_IF_NO_PEER_CERT flag was not included, the behavior effectively matched CERT_OPTIONAL: a peer certificate was verified if presented, but connections were incorrectly authenticated when no client certificate was provided. This results in improper authentication, allowing attackers to bypass mutual TLS (mTLS) client authentication by omitting a client certificate during the TLS handshake. The issue affects versions up to and including 5.8.2.
updated 2026-01-08T18:08:18.457000
2 posts
ZOMG curl CVEs.
https://curl.se/docs/CVE-2025-14017.html
https://curl.se/docs/CVE-2025-14524.html
https://curl.se/docs/CVE-2025-14819.html
https://curl.se/docs/CVE-2025-15079.html
###curl 8.18.0 has been released. This release fixes 2 medium and 4 low level vulnerabilities:
- CVE-2025-13034: No QUIC certificate pinning with GnuTLS https://curl.se/docs/CVE-2025-13034.html
- CVE-2025-14017: broken TLS options for threaded LDAPS https://curl.se/docs/CVE-2025-14017.html
- CVE-2025-14524: bearer token leak on cross-protocol redirect https://curl.se/docs/CVE-2025-14524.html
- CVE-2025-14819: OpenSSL partial chain store policy bypass https://curl.se/docs/CVE-2025-14819.html
- CVE-2025-15079: libssh global knownhost override https://curl.se/docs/CVE-2025-15079.html
- CVE-2025-15224: libssh key passphrase bypass without agent set https://curl.se/docs/CVE-2025-15224.html
I discovered the last 2 vulnerabilities.
Download curl 8.18.0 from https://curl.se/download.html
#vulnerabilityresearch #vulnerability #cybersecurity #infosec
##updated 2026-01-08T18:08:18.457000
2 posts
ZOMG curl CVEs.
https://curl.se/docs/CVE-2025-14017.html
https://curl.se/docs/CVE-2025-14524.html
https://curl.se/docs/CVE-2025-14819.html
https://curl.se/docs/CVE-2025-15079.html
###curl 8.18.0 has been released. This release fixes 2 medium and 4 low level vulnerabilities:
- CVE-2025-13034: No QUIC certificate pinning with GnuTLS https://curl.se/docs/CVE-2025-13034.html
- CVE-2025-14017: broken TLS options for threaded LDAPS https://curl.se/docs/CVE-2025-14017.html
- CVE-2025-14524: bearer token leak on cross-protocol redirect https://curl.se/docs/CVE-2025-14524.html
- CVE-2025-14819: OpenSSL partial chain store policy bypass https://curl.se/docs/CVE-2025-14819.html
- CVE-2025-15079: libssh global knownhost override https://curl.se/docs/CVE-2025-15079.html
- CVE-2025-15224: libssh key passphrase bypass without agent set https://curl.se/docs/CVE-2025-15224.html
I discovered the last 2 vulnerabilities.
Download curl 8.18.0 from https://curl.se/download.html
#vulnerabilityresearch #vulnerability #cybersecurity #infosec
##updated 2026-01-08T15:32:30
2 posts
ZOMG curl CVEs.
https://curl.se/docs/CVE-2025-14017.html
https://curl.se/docs/CVE-2025-14524.html
https://curl.se/docs/CVE-2025-14819.html
https://curl.se/docs/CVE-2025-15079.html
###curl 8.18.0 has been released. This release fixes 2 medium and 4 low level vulnerabilities:
- CVE-2025-13034: No QUIC certificate pinning with GnuTLS https://curl.se/docs/CVE-2025-13034.html
- CVE-2025-14017: broken TLS options for threaded LDAPS https://curl.se/docs/CVE-2025-14017.html
- CVE-2025-14524: bearer token leak on cross-protocol redirect https://curl.se/docs/CVE-2025-14524.html
- CVE-2025-14819: OpenSSL partial chain store policy bypass https://curl.se/docs/CVE-2025-14819.html
- CVE-2025-15079: libssh global knownhost override https://curl.se/docs/CVE-2025-15079.html
- CVE-2025-15224: libssh key passphrase bypass without agent set https://curl.se/docs/CVE-2025-15224.html
I discovered the last 2 vulnerabilities.
Download curl 8.18.0 from https://curl.se/download.html
#vulnerabilityresearch #vulnerability #cybersecurity #infosec
##updated 2026-01-08T15:32:29
2 posts
ZOMG curl CVEs.
https://curl.se/docs/CVE-2025-14017.html
https://curl.se/docs/CVE-2025-14524.html
https://curl.se/docs/CVE-2025-14819.html
https://curl.se/docs/CVE-2025-15079.html
###curl 8.18.0 has been released. This release fixes 2 medium and 4 low level vulnerabilities:
- CVE-2025-13034: No QUIC certificate pinning with GnuTLS https://curl.se/docs/CVE-2025-13034.html
- CVE-2025-14017: broken TLS options for threaded LDAPS https://curl.se/docs/CVE-2025-14017.html
- CVE-2025-14524: bearer token leak on cross-protocol redirect https://curl.se/docs/CVE-2025-14524.html
- CVE-2025-14819: OpenSSL partial chain store policy bypass https://curl.se/docs/CVE-2025-14819.html
- CVE-2025-15079: libssh global knownhost override https://curl.se/docs/CVE-2025-15079.html
- CVE-2025-15224: libssh key passphrase bypass without agent set https://curl.se/docs/CVE-2025-15224.html
I discovered the last 2 vulnerabilities.
Download curl 8.18.0 from https://curl.se/download.html
#vulnerabilityresearch #vulnerability #cybersecurity #infosec
##updated 2026-01-08T15:31:29
3 posts
‼️Trend Micro Apex Central Multiple Vulnerabilities
CVE:
CVE-2025-69258 (CVSS: 9.8)
CVE-2025-69259 (CVSS: 7.5)
CVE-2025-69260 (CVSS: 7.5)
CWE: CWE-1285, CWE-306, CWE-641
PoC/Writeup: https://www.tenable.com/security/research/tra-2026-01
Disclosure Date: January 7. 2026
Disclosure: https://success.trendmicro.com/en-US/solution/KA-0022071
##‼️Trend Micro Apex Central Multiple Vulnerabilities
CVE:
CVE-2025-69258 (CVSS: 9.8)
CVE-2025-69259 (CVSS: 7.5)
CVE-2025-69260 (CVSS: 7.5)
CWE: CWE-1285, CWE-306, CWE-641
PoC/Writeup: https://www.tenable.com/security/research/tra-2026-01
Disclosure Date: January 7. 2026
Disclosure: https://success.trendmicro.com/en-US/solution/KA-0022071
##Tenable Research Advisories have a new entry:
Critical: CVE-2025-69258; CVE-2025-69259 and CVE-2025-69260: Trend Micro Apex Central Multiple Vulnerabilities https://www.tenable.com/security/research/tra-2026-01 @tenable #vulnerability #infosec
##updated 2026-01-08T15:31:29
3 posts
‼️Trend Micro Apex Central Multiple Vulnerabilities
CVE:
CVE-2025-69258 (CVSS: 9.8)
CVE-2025-69259 (CVSS: 7.5)
CVE-2025-69260 (CVSS: 7.5)
CWE: CWE-1285, CWE-306, CWE-641
PoC/Writeup: https://www.tenable.com/security/research/tra-2026-01
Disclosure Date: January 7. 2026
Disclosure: https://success.trendmicro.com/en-US/solution/KA-0022071
##‼️Trend Micro Apex Central Multiple Vulnerabilities
CVE:
CVE-2025-69258 (CVSS: 9.8)
CVE-2025-69259 (CVSS: 7.5)
CVE-2025-69260 (CVSS: 7.5)
CWE: CWE-1285, CWE-306, CWE-641
PoC/Writeup: https://www.tenable.com/security/research/tra-2026-01
Disclosure Date: January 7. 2026
Disclosure: https://success.trendmicro.com/en-US/solution/KA-0022071
##Tenable Research Advisories have a new entry:
Critical: CVE-2025-69258; CVE-2025-69259 and CVE-2025-69260: Trend Micro Apex Central Multiple Vulnerabilities https://www.tenable.com/security/research/tra-2026-01 @tenable #vulnerability #infosec
##updated 2026-01-08T15:31:28
5 posts
‼️Trend Micro Apex Central Multiple Vulnerabilities
CVE:
CVE-2025-69258 (CVSS: 9.8)
CVE-2025-69259 (CVSS: 7.5)
CVE-2025-69260 (CVSS: 7.5)
CWE: CWE-1285, CWE-306, CWE-641
PoC/Writeup: https://www.tenable.com/security/research/tra-2026-01
Disclosure Date: January 7. 2026
Disclosure: https://success.trendmicro.com/en-US/solution/KA-0022071
##‼️Trend Micro Apex Central Multiple Vulnerabilities
CVE:
CVE-2025-69258 (CVSS: 9.8)
CVE-2025-69259 (CVSS: 7.5)
CVE-2025-69260 (CVSS: 7.5)
CWE: CWE-1285, CWE-306, CWE-641
PoC/Writeup: https://www.tenable.com/security/research/tra-2026-01
Disclosure Date: January 7. 2026
Disclosure: https://success.trendmicro.com/en-US/solution/KA-0022071
##PoC exploits are now public for CVE-2025-69258 in Trend Micro Apex Central (on-premise), a vulnerability that could allow unauthenticated RCE on affected systems.
A patch is available, and there are no confirmed exploitation reports so far. Public PoCs, however, tend to accelerate attacker interest.
Follow @technadu for objective and technically grounded infosec updates.
Source: https://www.helpnetsecurity.com/2026/01/08/trend-micro-apex-central-cve-2025-69258-rce-poc/
#Infosec #VulnerabilityDisclosure #PatchManagement #RCE #EnterpriseSecurity #ThreatLandscape
##Critical flaws and public exploits released for Trend Micro Apex Central on-premise management
Trend Micro patched a critical remote code execution vulnerability (CVE-2025-69258) in Apex Central that allows attackers to gain SYSTEM privileges. Public exploit code is now available, making immediate patching of on-premise installations vital.
**Make sure all Apex Central servers are isolated from the internet and accessible from trusted networks only. Install Critical Patch Build 7190 as soon as possible.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-flaws-and-public-exploits-released-for-trend-micro-apex-central-on-premise-management-g-t-o-p-0/gD2P6Ple2L
Tenable Research Advisories have a new entry:
Critical: CVE-2025-69258; CVE-2025-69259 and CVE-2025-69260: Trend Micro Apex Central Multiple Vulnerabilities https://www.tenable.com/security/research/tra-2026-01 @tenable #vulnerability #infosec
##updated 2026-01-08T12:30:38
2 posts
ZOMG curl CVEs.
https://curl.se/docs/CVE-2025-14017.html
https://curl.se/docs/CVE-2025-14524.html
https://curl.se/docs/CVE-2025-14819.html
https://curl.se/docs/CVE-2025-15079.html
###curl 8.18.0 has been released. This release fixes 2 medium and 4 low level vulnerabilities:
- CVE-2025-13034: No QUIC certificate pinning with GnuTLS https://curl.se/docs/CVE-2025-13034.html
- CVE-2025-14017: broken TLS options for threaded LDAPS https://curl.se/docs/CVE-2025-14017.html
- CVE-2025-14524: bearer token leak on cross-protocol redirect https://curl.se/docs/CVE-2025-14524.html
- CVE-2025-14819: OpenSSL partial chain store policy bypass https://curl.se/docs/CVE-2025-14819.html
- CVE-2025-15079: libssh global knownhost override https://curl.se/docs/CVE-2025-15079.html
- CVE-2025-15224: libssh key passphrase bypass without agent set https://curl.se/docs/CVE-2025-15224.html
I discovered the last 2 vulnerabilities.
Download curl 8.18.0 from https://curl.se/download.html
#vulnerabilityresearch #vulnerability #cybersecurity #infosec
##updated 2026-01-08T02:00:02.163000
6 posts
CISA warns of active attacks legacy PowerPoint flaw
CISA is warning about active exploitation of CVE-2009-0556, a critical memory corruption vulnerability in legacy Microsoft PowerPoint (2000-2003 versions) that allows attackers to execute malware and move laterally through networks via malicious .ppt files.
**If you're still running legacy Microsoft Office (2000-2003 or 2004 for Mac), remove it and upgrade immediately to a supported version. This 15-year-old PowerPoint flaw is being actively exploited to install malware. If upgrading isn't possible right away, remove PowerPoint from these old systems and avoid opening any .ppt files.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/cisa-warns-of-active-attacks-legacy-powerpoint-flaw-c-b-1-9-i/gD2P6Ple2L
🚨 CISA adds two vulnerabilities to the KEV Catalog
https://darkwebinformer.com/cisa-kev-catalog/
CVE-2009-0556: Microsoft Office PowerPoint Code Injection Vulnerability
CVSS: 9.3
CVE-2025-37164: Hewlett Packard Enterprise OneView Code Injection Vulnerability
CVSS: 10
##Yesterday (2026-01-07) CISA added a new entry to it's catalog of known exploited vulnerabilities. It's about CVE-2009-0556, a vulnerability in PowerPoint 2003 which is EOL since 2014.
#InfoSec is a lost cause if we keep using unmaintained software.
##CISA has updated the KEV catalogue.
CVE-2025-37164: Hewlett Packard Enterprise OneView Code Injection Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-37164
CVE-2009-0556: Microsoft Office PowerPoint Code Injection Vulnerability https://www.cve.org/CVERecord?id=CVE-2009-0556 #infosec #CISA #Microsoft #HP
##Huh, CVE-2009-0556 added to KEV? :blobcateyes: https://www.cisa.gov/news-events/alerts/2026/01/07/cisa-adds-two-known-exploited-vulnerabilities-catalog
##CVE ID: CVE-2009-0556
Vendor: Microsoft
Product: Office
Date Added: 2026-01-07
Notes: https://learn.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017 ; https://nvd.nist.gov/vuln/detail/CVE-2009-0556
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2009-0556
updated 2026-01-08T00:32:16
4 posts
3 repos
https://github.com/g0vguy/CVE-2025-37164-PoC
CISA urges emergency patching after a critical HPE OneView vulnerability (CVE-2025-37164) with active exploitation - Check your versions and update to OneView v11.00 or later now.
Read: https://hackread.com/cisa-emergency-patching-exploit-hpe-oneview-flaw/
##🚨 CISA adds two vulnerabilities to the KEV Catalog
https://darkwebinformer.com/cisa-kev-catalog/
CVE-2009-0556: Microsoft Office PowerPoint Code Injection Vulnerability
CVSS: 9.3
CVE-2025-37164: Hewlett Packard Enterprise OneView Code Injection Vulnerability
CVSS: 10
##CISA has updated the KEV catalogue.
CVE-2025-37164: Hewlett Packard Enterprise OneView Code Injection Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-37164
CVE-2009-0556: Microsoft Office PowerPoint Code Injection Vulnerability https://www.cve.org/CVERecord?id=CVE-2009-0556 #infosec #CISA #Microsoft #HP
##CVE ID: CVE-2025-37164
Vendor: Hewlett Packard (HP)
Product: OneView
Date Added: 2026-01-07
Notes: https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04985en_us&docLocale=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2025-37164
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-37164
updated 2026-01-08T00:31:21
2 posts
Microsoft posted an update to its security guide yesterday:
Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62224 #Microsoft #vulnerability #Android #Chromium #Edge
##updated 2026-01-08T00:31:21
1 posts
Old FLIR CVEs just published.
https://www.cve.org/CVERecord?id=CVE-2017-20212
https://www.cve.org/CVERecord?id=CVE-2017-20213
https://www.cve.org/CVERecord?id=CVE-2017-20214
https://www.cve.org/CVERecord?id=CVE-2017-20215
##updated 2026-01-08T00:31:21
1 posts
Old FLIR CVEs just published.
https://www.cve.org/CVERecord?id=CVE-2017-20212
https://www.cve.org/CVERecord?id=CVE-2017-20213
https://www.cve.org/CVERecord?id=CVE-2017-20214
https://www.cve.org/CVERecord?id=CVE-2017-20215
##updated 2026-01-08T00:31:21
1 posts
Old FLIR CVEs just published.
https://www.cve.org/CVERecord?id=CVE-2017-20212
https://www.cve.org/CVERecord?id=CVE-2017-20213
https://www.cve.org/CVERecord?id=CVE-2017-20214
https://www.cve.org/CVERecord?id=CVE-2017-20215
##updated 2026-01-07T18:30:33
1 posts
Cisco has two new advisories:
CVE-2026-20026 and CVE-2026-20027: Multiple Cisco Products Snort 3 Distributed Computing Environment/Remote Procedure Call Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort3-dcerpc-vulns-J9HNF4tH
CVE-2026-20029: Cisco Identity Services Engine XML External Entity Processing Information Disclosure Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xxe-jWSbSDKt @TalosSecurity #Cisco #vulnerability #infosec
##updated 2026-01-07T18:30:33
1 posts
RE: https://infosec.exchange/@cR0w/115854579789971369
This one is even better. 🤣
An attacker with access to the system's internal network can cause a denial of service on the system by making two concurrent connections through the Telnet service.
Good luck with your Nessus scans.
##updated 2026-01-07T18:30:33
1 posts
RE: https://infosec.exchange/@cR0w/115854304322324575
Ooh, this one only requires L3 access to DoS.
The massive sending of ICMP requests causes a denial of service on one of the boards from the EVCharger that allows control the EV interfaces. Since the board must be operating correctly for the charger to also function correctly.
https://www.cve.org/CVERecord?id=CVE-2026-22541
Edit to correct the link.
##updated 2026-01-07T17:16:02.003000
1 posts
updated 2026-01-07T15:31:20
2 posts
1 repos
Google patches high-risk WebView flaw in first 2026 Chrome update
Google released Chrome 143.0.7499.192/193 to fix a high-risk vulnerability (CVE-2026-0628) in the WebView component that could allow malicious extensions to inject scripts into privileged pages.
**If you are using Google Chrome or other Chromium-based browsers (Edge, Brave, Vivaldi, Opera...) patch your browser ASAP. No critical flaws in this update, but don't wait for the flaw to become actively exploited. Update now, it's trivial and all your tabs reopen after the update.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/google-patches-high-risk-webview-flaw-in-first-2026-chrome-update-8-y-o-a-0/gD2P6Ple2L
Google has patched a high-severity Chrome WebView vulnerability tracked as CVE-2026-0628, caused by insufficient policy enforcement in the tag component.
The flaw could allow attackers to bypass security controls in applications embedding WebView, increasing risk across desktop and mobile ecosystems.
Full Article :
https://www.technadu.com/google-patches-high-severity-chrome-webview-flaw-cve-2026-0628-in-the-tag-component/617762/
#ChromeSecurity #WebView #CVE2026 #Infosec #ApplicationSecurity
##updated 2026-01-07T15:30:25
2 posts
📈 CVE Published in last 7 days (2026-01-05 - 2026-01-12)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1037
Severity:
- Critical: 110
- High: 289
- Medium: 492
- Low: 32
- None: 114
Status:
- : 43
- Analyzed: 62
- Awaiting Analysis: 537
- Received: 246
- Rejected: 32
- Undergoing Analysis: 117
Top CNAs:
- GitHub, Inc.: 201
- Wordfence: 161
- Patchstack: 150
- VulDB: 78
- MITRE: 73
- VulnCheck: 57
- N/A: 43
- MediaTek, Inc.: 28
- Fortinet, Inc.: 26
- Qualcomm, Inc.: 22
Top Affected Products:
- UNKNOWN: 964
- Google Android: 23
- Color Iccdev: 12
- Fabian Online Product Reservation System: 8
- Samsung Exynos 2400 Firmware: 7
- Samsung Exynos 1580 Firmware: 7
- Samsung Exynos 1380 Firmware: 6
- Samsung Exynos 1480 Firmware: 6
- Mediatek Nr17: 5
- Mediatek Nr16: 4
Top EPSS Score:
- CVE-2026-0581 - 3.41 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-0581)
- CVE-2026-0641 - 3.17 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-0641)
- CVE-2025-61489 - 2.45 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-61489)
- CVE-2025-15502 - 1.04 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-15502)
- CVE-2025-6225 - 0.89 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-6225)
- CVE-2020-36925 - 0.52 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-36925)
- CVE-2025-64424 - 0.50 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-64424)
- CVE-2025-14997 - 0.46 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14997)
- CVE-2025-46645 - 0.45 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-46645)
- CVE-2025-68455 - 0.43 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-68455)
Kieback&Peter
##updated 2026-01-07T15:30:25
1 posts
DoS via ARP flood. In 2026. And this is the kind of shit people are putting on the Internet and connecting to home and industrial networks.
##The massive sending of ARP requests causes a denial of service on one board of the charger that allows control of the EV interfaces. Since the board must be operating correctly for the charger to also function correctly, the denial of service (DoS) results in a restart of the charger functionalities.
updated 2026-01-07T15:30:14
7 posts
3 repos
https://github.com/farazsth98/poc-CVE-2025-38352
❗️Chronomaly: Android kernel exploit for CVE-2025-38352, previously exploited in-the-wild. Targets vulnerable Linux kernels v5.10.x.
##❗️Chronomaly: Android kernel exploit for CVE-2025-38352, previously exploited in-the-wild. Targets vulnerable Linux kernels v5.10.x.
##updated 2026-01-07T15:22:22
1 posts
2 repos
⚪ A pre-defined access token was found in the open-source project RustFS
🗨️ In the source code of the open-source project RustFS (which develops an S3-compatible distributed object storage solution), experts identified a critical vulnerability (CVE-2025-68926). The issue arises due to the presence of a hardcoded access token in the code, allowing connection to the network s…
##updated 2026-01-07T12:31:32
1 posts
updated 2026-01-07T12:31:27
1 posts
updated 2026-01-06T21:31:40
1 posts
Assorted old vulns whose CVEs were just published. Quick glance looks like mostly random IoS stuff.
https://www.cve.org/CVERecord?id=CVE-2020-36905
https://www.cve.org/CVERecord?id=CVE-2020-36906
https://www.cve.org/CVERecord?id=CVE-2020-36907
https://www.cve.org/CVERecord?id=CVE-2020-36908
https://www.cve.org/CVERecord?id=CVE-2020-36909
https://www.cve.org/CVERecord?id=CVE-2020-36910
https://www.cve.org/CVERecord?id=CVE-2020-36912
https://www.cve.org/CVERecord?id=CVE-2020-36913
https://www.cve.org/CVERecord?id=CVE-2020-36914
https://www.cve.org/CVERecord?id=CVE-2020-36915
https://www.cve.org/CVERecord?id=CVE-2020-36916
https://www.cve.org/CVERecord?id=CVE-2020-36917
https://www.cve.org/CVERecord?id=CVE-2020-36918
https://www.cve.org/CVERecord?id=CVE-2020-36920
https://www.cve.org/CVERecord?id=CVE-2020-36921
https://www.cve.org/CVERecord?id=CVE-2020-36922
https://www.cve.org/CVERecord?id=CVE-2020-36923
https://www.cve.org/CVERecord?id=CVE-2020-36924
##updated 2026-01-06T21:15:43.240000
1 posts
This was updated yesterday.
EUVD: Critical TRENDnet vulnerability, also known as CVE-2025-15471 https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-206251
New:
Critical: Blood Bank Management System 1.0 vulnerability CVE-2025-63525 https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-200000 #infosec
##updated 2026-01-06T18:31:44
1 posts
updated 2026-01-06T18:31:43
1 posts
🔴 CVE-2025-39477 - Critical (9.8)
Missing Authorization vulnerability in Sfwebservice InWave Jobs allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects InWave Jobs: from n/a through 3.5.8.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-39477/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##updated 2026-01-06T18:31:43
1 posts
Assorted old vulns whose CVEs were just published. Quick glance looks like mostly random IoS stuff.
https://www.cve.org/CVERecord?id=CVE-2020-36905
https://www.cve.org/CVERecord?id=CVE-2020-36906
https://www.cve.org/CVERecord?id=CVE-2020-36907
https://www.cve.org/CVERecord?id=CVE-2020-36908
https://www.cve.org/CVERecord?id=CVE-2020-36909
https://www.cve.org/CVERecord?id=CVE-2020-36910
https://www.cve.org/CVERecord?id=CVE-2020-36912
https://www.cve.org/CVERecord?id=CVE-2020-36913
https://www.cve.org/CVERecord?id=CVE-2020-36914
https://www.cve.org/CVERecord?id=CVE-2020-36915
https://www.cve.org/CVERecord?id=CVE-2020-36916
https://www.cve.org/CVERecord?id=CVE-2020-36917
https://www.cve.org/CVERecord?id=CVE-2020-36918
https://www.cve.org/CVERecord?id=CVE-2020-36920
https://www.cve.org/CVERecord?id=CVE-2020-36921
https://www.cve.org/CVERecord?id=CVE-2020-36922
https://www.cve.org/CVERecord?id=CVE-2020-36923
https://www.cve.org/CVERecord?id=CVE-2020-36924
##updated 2026-01-06T18:31:43
1 posts
updated 2026-01-06T18:31:42
1 posts
Assorted old vulns whose CVEs were just published. Quick glance looks like mostly random IoS stuff.
https://www.cve.org/CVERecord?id=CVE-2020-36905
https://www.cve.org/CVERecord?id=CVE-2020-36906
https://www.cve.org/CVERecord?id=CVE-2020-36907
https://www.cve.org/CVERecord?id=CVE-2020-36908
https://www.cve.org/CVERecord?id=CVE-2020-36909
https://www.cve.org/CVERecord?id=CVE-2020-36910
https://www.cve.org/CVERecord?id=CVE-2020-36912
https://www.cve.org/CVERecord?id=CVE-2020-36913
https://www.cve.org/CVERecord?id=CVE-2020-36914
https://www.cve.org/CVERecord?id=CVE-2020-36915
https://www.cve.org/CVERecord?id=CVE-2020-36916
https://www.cve.org/CVERecord?id=CVE-2020-36917
https://www.cve.org/CVERecord?id=CVE-2020-36918
https://www.cve.org/CVERecord?id=CVE-2020-36920
https://www.cve.org/CVERecord?id=CVE-2020-36921
https://www.cve.org/CVERecord?id=CVE-2020-36922
https://www.cve.org/CVERecord?id=CVE-2020-36923
https://www.cve.org/CVERecord?id=CVE-2020-36924
##updated 2026-01-06T18:31:42
1 posts
Assorted old vulns whose CVEs were just published. Quick glance looks like mostly random IoS stuff.
https://www.cve.org/CVERecord?id=CVE-2020-36905
https://www.cve.org/CVERecord?id=CVE-2020-36906
https://www.cve.org/CVERecord?id=CVE-2020-36907
https://www.cve.org/CVERecord?id=CVE-2020-36908
https://www.cve.org/CVERecord?id=CVE-2020-36909
https://www.cve.org/CVERecord?id=CVE-2020-36910
https://www.cve.org/CVERecord?id=CVE-2020-36912
https://www.cve.org/CVERecord?id=CVE-2020-36913
https://www.cve.org/CVERecord?id=CVE-2020-36914
https://www.cve.org/CVERecord?id=CVE-2020-36915
https://www.cve.org/CVERecord?id=CVE-2020-36916
https://www.cve.org/CVERecord?id=CVE-2020-36917
https://www.cve.org/CVERecord?id=CVE-2020-36918
https://www.cve.org/CVERecord?id=CVE-2020-36920
https://www.cve.org/CVERecord?id=CVE-2020-36921
https://www.cve.org/CVERecord?id=CVE-2020-36922
https://www.cve.org/CVERecord?id=CVE-2020-36923
https://www.cve.org/CVERecord?id=CVE-2020-36924
##updated 2026-01-06T18:31:42
1 posts
Assorted old vulns whose CVEs were just published. Quick glance looks like mostly random IoS stuff.
https://www.cve.org/CVERecord?id=CVE-2020-36905
https://www.cve.org/CVERecord?id=CVE-2020-36906
https://www.cve.org/CVERecord?id=CVE-2020-36907
https://www.cve.org/CVERecord?id=CVE-2020-36908
https://www.cve.org/CVERecord?id=CVE-2020-36909
https://www.cve.org/CVERecord?id=CVE-2020-36910
https://www.cve.org/CVERecord?id=CVE-2020-36912
https://www.cve.org/CVERecord?id=CVE-2020-36913
https://www.cve.org/CVERecord?id=CVE-2020-36914
https://www.cve.org/CVERecord?id=CVE-2020-36915
https://www.cve.org/CVERecord?id=CVE-2020-36916
https://www.cve.org/CVERecord?id=CVE-2020-36917
https://www.cve.org/CVERecord?id=CVE-2020-36918
https://www.cve.org/CVERecord?id=CVE-2020-36920
https://www.cve.org/CVERecord?id=CVE-2020-36921
https://www.cve.org/CVERecord?id=CVE-2020-36922
https://www.cve.org/CVERecord?id=CVE-2020-36923
https://www.cve.org/CVERecord?id=CVE-2020-36924
##updated 2026-01-06T18:31:42
1 posts
Assorted old vulns whose CVEs were just published. Quick glance looks like mostly random IoS stuff.
https://www.cve.org/CVERecord?id=CVE-2020-36905
https://www.cve.org/CVERecord?id=CVE-2020-36906
https://www.cve.org/CVERecord?id=CVE-2020-36907
https://www.cve.org/CVERecord?id=CVE-2020-36908
https://www.cve.org/CVERecord?id=CVE-2020-36909
https://www.cve.org/CVERecord?id=CVE-2020-36910
https://www.cve.org/CVERecord?id=CVE-2020-36912
https://www.cve.org/CVERecord?id=CVE-2020-36913
https://www.cve.org/CVERecord?id=CVE-2020-36914
https://www.cve.org/CVERecord?id=CVE-2020-36915
https://www.cve.org/CVERecord?id=CVE-2020-36916
https://www.cve.org/CVERecord?id=CVE-2020-36917
https://www.cve.org/CVERecord?id=CVE-2020-36918
https://www.cve.org/CVERecord?id=CVE-2020-36920
https://www.cve.org/CVERecord?id=CVE-2020-36921
https://www.cve.org/CVERecord?id=CVE-2020-36922
https://www.cve.org/CVERecord?id=CVE-2020-36923
https://www.cve.org/CVERecord?id=CVE-2020-36924
##updated 2026-01-06T18:31:42
1 posts
Assorted old vulns whose CVEs were just published. Quick glance looks like mostly random IoS stuff.
https://www.cve.org/CVERecord?id=CVE-2020-36905
https://www.cve.org/CVERecord?id=CVE-2020-36906
https://www.cve.org/CVERecord?id=CVE-2020-36907
https://www.cve.org/CVERecord?id=CVE-2020-36908
https://www.cve.org/CVERecord?id=CVE-2020-36909
https://www.cve.org/CVERecord?id=CVE-2020-36910
https://www.cve.org/CVERecord?id=CVE-2020-36912
https://www.cve.org/CVERecord?id=CVE-2020-36913
https://www.cve.org/CVERecord?id=CVE-2020-36914
https://www.cve.org/CVERecord?id=CVE-2020-36915
https://www.cve.org/CVERecord?id=CVE-2020-36916
https://www.cve.org/CVERecord?id=CVE-2020-36917
https://www.cve.org/CVERecord?id=CVE-2020-36918
https://www.cve.org/CVERecord?id=CVE-2020-36920
https://www.cve.org/CVERecord?id=CVE-2020-36921
https://www.cve.org/CVERecord?id=CVE-2020-36922
https://www.cve.org/CVERecord?id=CVE-2020-36923
https://www.cve.org/CVERecord?id=CVE-2020-36924
##updated 2026-01-06T18:31:42
1 posts
Assorted old vulns whose CVEs were just published. Quick glance looks like mostly random IoS stuff.
https://www.cve.org/CVERecord?id=CVE-2020-36905
https://www.cve.org/CVERecord?id=CVE-2020-36906
https://www.cve.org/CVERecord?id=CVE-2020-36907
https://www.cve.org/CVERecord?id=CVE-2020-36908
https://www.cve.org/CVERecord?id=CVE-2020-36909
https://www.cve.org/CVERecord?id=CVE-2020-36910
https://www.cve.org/CVERecord?id=CVE-2020-36912
https://www.cve.org/CVERecord?id=CVE-2020-36913
https://www.cve.org/CVERecord?id=CVE-2020-36914
https://www.cve.org/CVERecord?id=CVE-2020-36915
https://www.cve.org/CVERecord?id=CVE-2020-36916
https://www.cve.org/CVERecord?id=CVE-2020-36917
https://www.cve.org/CVERecord?id=CVE-2020-36918
https://www.cve.org/CVERecord?id=CVE-2020-36920
https://www.cve.org/CVERecord?id=CVE-2020-36921
https://www.cve.org/CVERecord?id=CVE-2020-36922
https://www.cve.org/CVERecord?id=CVE-2020-36923
https://www.cve.org/CVERecord?id=CVE-2020-36924
##updated 2026-01-06T18:31:42
1 posts
Assorted old vulns whose CVEs were just published. Quick glance looks like mostly random IoS stuff.
https://www.cve.org/CVERecord?id=CVE-2020-36905
https://www.cve.org/CVERecord?id=CVE-2020-36906
https://www.cve.org/CVERecord?id=CVE-2020-36907
https://www.cve.org/CVERecord?id=CVE-2020-36908
https://www.cve.org/CVERecord?id=CVE-2020-36909
https://www.cve.org/CVERecord?id=CVE-2020-36910
https://www.cve.org/CVERecord?id=CVE-2020-36912
https://www.cve.org/CVERecord?id=CVE-2020-36913
https://www.cve.org/CVERecord?id=CVE-2020-36914
https://www.cve.org/CVERecord?id=CVE-2020-36915
https://www.cve.org/CVERecord?id=CVE-2020-36916
https://www.cve.org/CVERecord?id=CVE-2020-36917
https://www.cve.org/CVERecord?id=CVE-2020-36918
https://www.cve.org/CVERecord?id=CVE-2020-36920
https://www.cve.org/CVERecord?id=CVE-2020-36921
https://www.cve.org/CVERecord?id=CVE-2020-36922
https://www.cve.org/CVERecord?id=CVE-2020-36923
https://www.cve.org/CVERecord?id=CVE-2020-36924
##updated 2026-01-06T18:31:35
1 posts
Assorted old vulns whose CVEs were just published. Quick glance looks like mostly random IoS stuff.
https://www.cve.org/CVERecord?id=CVE-2020-36905
https://www.cve.org/CVERecord?id=CVE-2020-36906
https://www.cve.org/CVERecord?id=CVE-2020-36907
https://www.cve.org/CVERecord?id=CVE-2020-36908
https://www.cve.org/CVERecord?id=CVE-2020-36909
https://www.cve.org/CVERecord?id=CVE-2020-36910
https://www.cve.org/CVERecord?id=CVE-2020-36912
https://www.cve.org/CVERecord?id=CVE-2020-36913
https://www.cve.org/CVERecord?id=CVE-2020-36914
https://www.cve.org/CVERecord?id=CVE-2020-36915
https://www.cve.org/CVERecord?id=CVE-2020-36916
https://www.cve.org/CVERecord?id=CVE-2020-36917
https://www.cve.org/CVERecord?id=CVE-2020-36918
https://www.cve.org/CVERecord?id=CVE-2020-36920
https://www.cve.org/CVERecord?id=CVE-2020-36921
https://www.cve.org/CVERecord?id=CVE-2020-36922
https://www.cve.org/CVERecord?id=CVE-2020-36923
https://www.cve.org/CVERecord?id=CVE-2020-36924
##updated 2026-01-06T18:31:34
1 posts
Assorted old vulns whose CVEs were just published. Quick glance looks like mostly random IoS stuff.
https://www.cve.org/CVERecord?id=CVE-2020-36905
https://www.cve.org/CVERecord?id=CVE-2020-36906
https://www.cve.org/CVERecord?id=CVE-2020-36907
https://www.cve.org/CVERecord?id=CVE-2020-36908
https://www.cve.org/CVERecord?id=CVE-2020-36909
https://www.cve.org/CVERecord?id=CVE-2020-36910
https://www.cve.org/CVERecord?id=CVE-2020-36912
https://www.cve.org/CVERecord?id=CVE-2020-36913
https://www.cve.org/CVERecord?id=CVE-2020-36914
https://www.cve.org/CVERecord?id=CVE-2020-36915
https://www.cve.org/CVERecord?id=CVE-2020-36916
https://www.cve.org/CVERecord?id=CVE-2020-36917
https://www.cve.org/CVERecord?id=CVE-2020-36918
https://www.cve.org/CVERecord?id=CVE-2020-36920
https://www.cve.org/CVERecord?id=CVE-2020-36921
https://www.cve.org/CVERecord?id=CVE-2020-36922
https://www.cve.org/CVERecord?id=CVE-2020-36923
https://www.cve.org/CVERecord?id=CVE-2020-36924
##updated 2026-01-06T18:31:33
1 posts
Assorted old vulns whose CVEs were just published. Quick glance looks like mostly random IoS stuff.
https://www.cve.org/CVERecord?id=CVE-2020-36905
https://www.cve.org/CVERecord?id=CVE-2020-36906
https://www.cve.org/CVERecord?id=CVE-2020-36907
https://www.cve.org/CVERecord?id=CVE-2020-36908
https://www.cve.org/CVERecord?id=CVE-2020-36909
https://www.cve.org/CVERecord?id=CVE-2020-36910
https://www.cve.org/CVERecord?id=CVE-2020-36912
https://www.cve.org/CVERecord?id=CVE-2020-36913
https://www.cve.org/CVERecord?id=CVE-2020-36914
https://www.cve.org/CVERecord?id=CVE-2020-36915
https://www.cve.org/CVERecord?id=CVE-2020-36916
https://www.cve.org/CVERecord?id=CVE-2020-36917
https://www.cve.org/CVERecord?id=CVE-2020-36918
https://www.cve.org/CVERecord?id=CVE-2020-36920
https://www.cve.org/CVERecord?id=CVE-2020-36921
https://www.cve.org/CVERecord?id=CVE-2020-36922
https://www.cve.org/CVERecord?id=CVE-2020-36923
https://www.cve.org/CVERecord?id=CVE-2020-36924
##updated 2026-01-06T18:31:24
3 posts
1 repos
The flaw is tracked as CVE-2025-54957 and its existence came to light in October 2025 after it was discovered by Google researchers. https://www.securityweek.com/critical-dolby-vulnerability-patched-in-android/
##updated 2026-01-06T17:48:25
6 posts
1 repos
Another critical RCE flaw reported in n8n automation platform
n8n patched another critical remote code execution vulnerability, CVE-2026-21877, which allows authenticated users to bypass sandboxes and take full control of automation servers. Over 100,000 instances are potentially exposed.
**Make sure all automation servers are isolated from the internet and accessible from trusted networks only. Update n8n to version 1.121.3 immediately and restrict workflow creation rights to a small group of trusted administrators to prevent unauthorized code execution.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/another-critical-rce-flaw-reported-in-n8n-automation-platform-m-8-g-u-s/gD2P6Ple2L
Uh... how is https://github.com/n8n-io/n8n/security/advisories/GHSA-v364-rw7m-3263 (CVE-2026-21877) a 10.0 with PR:L? That is not possible, either it's a 9.9 or it has PR:N.
##n8n users need to update immediately after a CVSS 10.0 (CVE-2026-21877) authenticated remote code execution flaw was found that could let an attacker take over the system. Update to version 1.121.3 or higher and restrict privileges now.
Read: https://hackread.com/n8n-users-patch-full-system-takeover-vulnerability/
##"Une seconde faille critique RCE affecte n8n – CVE-2026-21877 : comment se protéger ?"
👇
https://www.it-connect.fr/n8n-cve-2026-21877-faille-critique-rce/
Pas mal d'instances pas à jour et exposées aussi sur les réseaux EU et CH selon Onyphe
👇
https://bsky.app/profile/onyphe.io/post/3mbvqc665zc2w
Infos
👇
https://cve.circl.lu/vuln/CVE-2026-21877
Une seconde faille critique RCE affecte n8n – CVE-2026-21877 : comment se protéger ? https://www.it-connect.fr/n8n-cve-2026-21877-faille-critique-rce/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #n8n
##Another perfect 10 in n8n? LMFAO. 🥳
https://github.com/n8n-io/n8n/security/advisories/GHSA-v364-rw7m-3263
Edit to add the link to the CVE. It's not published at this time though.
##updated 2026-01-06T15:52:19
1 posts
📈 CVE Published in last 7 days (2026-01-05 - 2026-01-12)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1037
Severity:
- Critical: 110
- High: 289
- Medium: 492
- Low: 32
- None: 114
Status:
- : 43
- Analyzed: 62
- Awaiting Analysis: 537
- Received: 246
- Rejected: 32
- Undergoing Analysis: 117
Top CNAs:
- GitHub, Inc.: 201
- Wordfence: 161
- Patchstack: 150
- VulDB: 78
- MITRE: 73
- VulnCheck: 57
- N/A: 43
- MediaTek, Inc.: 28
- Fortinet, Inc.: 26
- Qualcomm, Inc.: 22
Top Affected Products:
- UNKNOWN: 964
- Google Android: 23
- Color Iccdev: 12
- Fabian Online Product Reservation System: 8
- Samsung Exynos 2400 Firmware: 7
- Samsung Exynos 1580 Firmware: 7
- Samsung Exynos 1380 Firmware: 6
- Samsung Exynos 1480 Firmware: 6
- Mediatek Nr17: 5
- Mediatek Nr16: 4
Top EPSS Score:
- CVE-2026-0581 - 3.41 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-0581)
- CVE-2026-0641 - 3.17 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-0641)
- CVE-2025-61489 - 2.45 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-61489)
- CVE-2025-15502 - 1.04 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-15502)
- CVE-2025-6225 - 0.89 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-6225)
- CVE-2020-36925 - 0.52 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-36925)
- CVE-2025-64424 - 0.50 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-64424)
- CVE-2025-14997 - 0.46 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14997)
- CVE-2025-46645 - 0.45 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-46645)
- CVE-2025-68455 - 0.43 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-68455)
updated 2026-01-06T06:31:32
1 posts
📈 CVE Published in last 7 days (2026-01-05 - 2026-01-12)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1037
Severity:
- Critical: 110
- High: 289
- Medium: 492
- Low: 32
- None: 114
Status:
- : 43
- Analyzed: 62
- Awaiting Analysis: 537
- Received: 246
- Rejected: 32
- Undergoing Analysis: 117
Top CNAs:
- GitHub, Inc.: 201
- Wordfence: 161
- Patchstack: 150
- VulDB: 78
- MITRE: 73
- VulnCheck: 57
- N/A: 43
- MediaTek, Inc.: 28
- Fortinet, Inc.: 26
- Qualcomm, Inc.: 22
Top Affected Products:
- UNKNOWN: 964
- Google Android: 23
- Color Iccdev: 12
- Fabian Online Product Reservation System: 8
- Samsung Exynos 2400 Firmware: 7
- Samsung Exynos 1580 Firmware: 7
- Samsung Exynos 1380 Firmware: 6
- Samsung Exynos 1480 Firmware: 6
- Mediatek Nr17: 5
- Mediatek Nr16: 4
Top EPSS Score:
- CVE-2026-0581 - 3.41 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-0581)
- CVE-2026-0641 - 3.17 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-0641)
- CVE-2025-61489 - 2.45 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-61489)
- CVE-2025-15502 - 1.04 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-15502)
- CVE-2025-6225 - 0.89 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-6225)
- CVE-2020-36925 - 0.52 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-36925)
- CVE-2025-64424 - 0.50 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-64424)
- CVE-2025-14997 - 0.46 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14997)
- CVE-2025-46645 - 0.45 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-46645)
- CVE-2025-68455 - 0.43 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-68455)
updated 2026-01-06T03:31:42
1 posts
ASUS released a patch yesterday for CVE-2025-12793.
Security Update for MyASUS https://www.asus.com/security-advisory/#bulletins #ASUS #infosec
##updated 2026-01-05T21:31:37
1 posts
Ubiquiti patches security flaws in UniFi Protect camera software
Ubiquiti patched two vulnerabilities in the UniFi Protect Application, including CVE-2026-21633 which allows attackers on the local network to access camera feeds without authorization.
**If you are using UniFi Protect Application, plan a quick update. And as usual, make sure all cameras and camera controllers are isolated from the internet and accessible from trusted networks only. Use VLANs to separate your security cameras from guest or general-purpose networks.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/ubiquiti-patches-security-flaws-in-unifi-protect-camera-software-s-f-f-b-f/gD2P6Ple2L
updated 2026-01-05T19:06:07
2 posts
Critical sandbox bypass reported in n8n automation platform
n8n patched a critical sandbox bypass vulnerability (CVE-2025-68668) that allows authenticated users to run arbitrary system commands on the host server.
**If you are using n8n, make sure it's isolated from the internet and accessible from trusted users only. Then patch n8n to version 2.0.0 ASAP. Until you can patch, either disable the Python or the entire Code Node.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-sandbox-bypass-reported-in-n8n-automation-platform-v-9-8-b-2/gD2P6Ple2L
Critical n8n vulnerability (CVE-2025-68668, CVSS 9.9) enables authenticated arbitrary command execution via the Code Node.
Patch released: mitigations include disabling the node or using the task-runner Python sandbox.
Are automation platforms getting enough security scrutiny?
##updated 2026-01-05T12:31:32
1 posts
I don't remember if I posted the Centreon stuff yesterday but it's still open in a tab so here you are anyway.
##updated 2026-01-05T12:31:32
1 posts
I don't remember if I posted the Centreon stuff yesterday but it's still open in a tab so here you are anyway.
##updated 2026-01-05T10:15:58.160000
1 posts
I don't remember if I posted the Centreon stuff yesterday but it's still open in a tab so here you are anyway.
##updated 2026-01-03T00:32:10
2 posts
3 repos
https://github.com/you-ssef9/CVE-2026-21440
❗️CVE-2026-21440: A critical path traversal vulnerability affecting the AdonisJS framework, specifically its multipart file upload handling.
PoC Exploit: https://github.com/Ashwesker/Ashwesker-CVE-2026-21440
▪️CVSS: 9.2
▪️CVE Published: January 2nd, 2026
▪️Exploit Published: January 5th, 2026
Details:
AdonisJS is a TypeScript-first web framework. A Path Traversal vulnerability in AdonisJS multipart file handling may allow a remote attacker to write arbitrary files to arbitrary locations on the server filesystem. This impacts @adonisjs/bodyparser through version 10.1.1 and 11.x prerelease versions prior to 11.0.0-next.6. This issue has been patched in @adonisjs/bodyparser versions 10.1.2 and 11.0.0-next.6.
##Critical path traversal flaw in AdonisJS enable server takeover
AdonisJS patched a critical path traversal vulnerabilities (CVE-2026-21440) that allow attackers to write or read arbitrary files on servers.
**Update your AdonisJS dependencies immediately to prevent attackers from overwriting your application code or stealing local files. Always sanitize user-provided filenames and use the Node.js permission flag to limit file system access.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-path-traversal-flaw-in-adonisjs-enable-server-takeover-l-o-y-a-8/gD2P6Ple2L
updated 2025-12-31T21:37:43.290000
2 posts
New.
Cyble: Singapore Cyber Agency Warns of Critical IBM API Connect Vulnerability (CVE-2025-13915) https://cyble.com/blog/cve-2025-13915-ibm-api-connect-vulnerability/ #infosec #vulnerability #IBM
##Singapore Cyber Agency Warns of Critical IBM API Connect Vulnerability (CVE-2025-13915)
Singapore warns of critical CVE-2025-13915 in IBM API Connect. Authentication bypass flaw scored 9.8 CVSS. Patches and mitigations released.
🔗️ [Cyble] https://link.is.it/WZmUnX
##updated 2025-12-30T16:15:46.230000
1 posts
4 repos
https://github.com/sid6224/CVE-2025-66516-POC
https://github.com/chasingimpact/CVE-2025-66516-Writeup-POC
New.
Picus: Apache Tika XXE Vulnerability CVE-2025-66516 Explained https://www.picussecurity.com/resource/blog/apache-tika-xxe-vulnerability-cve-2025-66516-explained #infosec #vulnerability #Apache #threatresearch #opensource
##updated 2025-12-30T15:30:26
1 posts
updated 2025-12-22T15:30:20
1 posts
updated 2025-12-19T18:31:07
1 posts
updated 2025-12-10T02:00:02.557000
2 posts
100 repos
https://github.com/yz9yt/React2Shell-CTF
https://github.com/hoosin/CVE-2025-55182
https://github.com/songsanggggg/CVE-2025-55182
https://github.com/fullhunt/react2shell-test-server
https://github.com/l4rm4nd/CVE-2025-55182
https://github.com/surajhacx/react2shellpoc
https://github.com/zack0x01/vuln-app-CVE-2025-55182
https://github.com/Cr4at0r/Next.js-RCE-Scanner-BurpSuite-Extension-
https://github.com/xkillbit/cve-2025-55182-scanner
https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool
https://github.com/jf0x3a/CVE-2025-55182-exploit
https://github.com/LemonTeatw1/CVE-2025-55182-exploit
https://github.com/MoLeft/React2Shell-Toolbox
https://github.com/ejpir/CVE-2025-55182-bypass
https://github.com/hackersatyamrastogi/react2shell-ultimate
https://github.com/Ashwesker/Ashwesker-CVE-2025-55182
https://github.com/xcanwin/CVE-2025-55182-React-RCE
https://github.com/keklick1337/CVE-2025-55182-golang-PoC
https://github.com/mrknow001/RSC_Detector
https://github.com/M4xSec/CVE-2025-55182-React2Shell-RCE-Shell
https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js
https://github.com/ThemeHackers/CVE-2025-55182
https://github.com/BeichenDream/CVE-2025-55182-GodzillaMemoryShell
https://github.com/CirqueiraDev/MassExploit-CVE-2025-55182
https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script
https://github.com/BlackTechX011/React2Shell
https://github.com/xalgord/React2Shell
https://github.com/sudo-Yangziran/CVE-2025-55182POC
https://github.com/Saturate/CVE-2025-55182-Scanner
https://github.com/subhdotsol/CVE-2025-55182
https://github.com/theori-io/reactguard
https://github.com/freeqaz/react2shell
https://github.com/sumanrox/rschunter
https://github.com/sho-luv/React2Shell
https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension
https://github.com/heiheishushu/rsc_detect_CVE-2025-55182
https://github.com/GelukCrab/React-Server-Components-RCE
https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension
https://github.com/Rsatan/Next.js-Exploit-Tool
https://github.com/santihabib/CVE-2025-55182-analysis
https://github.com/shamo0/react2shell-PoC
https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc
https://github.com/Pizz33/CVE-2025-55182-burpscanner
https://github.com/CymulateResearch/React2Shell-Scanner
https://github.com/Chocapikk/CVE-2025-55182
https://github.com/Faithtiannn/CVE-2025-55182
https://github.com/gensecaihq/react2shell-scanner
https://github.com/StealthMoud/CVE-2025-55182-Scanner
https://github.com/yanoshercohen/React2Shell_CVE-2025-55182
https://github.com/ZihxS/check-react-rce-cve-2025-55182
https://github.com/websecuritylabs/React2Shell-Library
https://github.com/TrixSec/CVE-2025-55182-Scanner
https://github.com/EynaExp/CVE-2025-55182-POC
https://github.com/assetnote/react2shell-scanner
https://github.com/fatguru/CVE-2025-55182-scanner
https://github.com/alsaut1/react2shell-lab
https://github.com/acheong08/CVE-2025-55182-poc
https://github.com/VeilVulp/RscScan-cve-2025-55182
https://github.com/chrahman/react2shell-CVE-2025-55182-full-rce-script
https://github.com/logesh-GIT001/CVE-2025-55182
https://github.com/Dh4v4l8/CVE-2025-55182-poc-tool
https://github.com/ynsmroztas/NextRce
https://github.com/dwisiswant0/CVE-2025-55182
https://github.com/SainiONHacks/CVE-2025-55182-Scanner
https://github.com/Syrins/CVE-2025-55182-React2Shell-RCE
https://github.com/timsonner/React2Shell-CVE-2025-55182
https://github.com/XiaomingX/CVE-2025-55182-poc
https://github.com/im-ezboy/CVE-2025-55182-zoomeye
https://github.com/zr0n/react2shell
https://github.com/ejpir/CVE-2025-55182-research
https://github.com/emredavut/CVE-2025-55182
https://github.com/vrx7men2/RSC-Detect-CVE-2025-55182
https://github.com/onlylovetx/CVE-2025-55182-CVE-2025-66478-Exploit-GUI
https://github.com/hidden-investigations/react2shell-scanner
https://github.com/alfazhossain/CVE-2025-55182-Exploiter
https://github.com/aliclub0x00/CVE-2025-55182-POC-NEXTJS
https://github.com/Spritualkb/CVE-2025-55182-exp
https://github.com/MrR0b0t19/CVE-2025-55182-shellinteractive
https://github.com/RuoJi6/CVE-2025-55182-RCE-shell
https://github.com/zzhorc/CVE-2025-55182
https://github.com/kavienanj/CVE-2025-55182
https://github.com/momika233/CVE-2025-55182-bypass
https://github.com/kondukto-io/vulnerable-next-js-poc
https://github.com/zack0x01/CVE-2025-55182-advanced-scanner-
https://github.com/Cillian-Collins/CVE-2025-55182
https://github.com/sickwell/CVE-2025-55182
https://github.com/Updatelap/CVE-2025-55182
https://github.com/nehkark/CVE-2025-55182
https://github.com/shyambhanushali/React2Shell
https://github.com/vijay-shirhatti/RSC-Detect-CVE-2025-55182
https://github.com/cybertechajju/R2C-CVE-2025-55182-66478
https://github.com/kOaDT/poc-cve-2025-55182
https://github.com/theman001/CVE-2025-55182
https://github.com/AliHzSec/CVE-2025-55182
https://github.com/whiteov3rflow/CVE-2025-55182-poc
https://github.com/hualy13/CVE-2025-55182
https://github.com/techgaun/cve-2025-55182-scanner
I had a chance last week to chat with Benjamin Read of #Wiz. Last month, Read and other members of his team published a deep dive into the #React2Shell
(CVE-2025-55182) vulnerability, and I was curious to see what has been hitting my honeypot, so I took a closer look.
This is doing some weird stuff, friends.
As is normally the case with exploits targeting internet-facing devices, once the exploit becomes known, it ends up in the automated scanners used by threat actors and security researchers. What I've seen over the past week is a combination of both.
In just a few hours of operation, I identified a small number of source IP addresses exploiting React2Shell by pointing the vulnerable system at URLs hosting BASH scripts. These scripts are really familiar to anyone who routinely looks at honeypot data - they contain a series of commands that pull down and execute malicious payloads.
And as I've seen in the past, some of these payloads use racially inflammatory language in their malware. It's weird and gross, but unfortunately, really common.
But while most of these payloads were "the usual suspects" - remote shells, cryptocurrency miners - there was one payload that stuck out.
It's an exploit file, based on this proof-of-concept [https://github.com/iotwar/FIVEM-POC/blob/main/fivem-poc.py] designed to DDoS a modded server running "FiveM," a popular version of the game Grand Theft Auto V.
Let that one sink in: among the earliest adopters of a brand new exploit are...people trying to mess with other people's online game servers.
I've long said that exploits like these are the canaries in the datacenter coal mine. After all, if an attacker can force your server to run a cryptominer (or a game DDoS tool), they can force it to run far more malicious code.
I guess someone, or a group of someones, just want to ruin everyone's good time, no matter how or what form that takes. And they'll do it in the most offensive way possible.
Anyway, patch your servers, please, if only to stick it to these people who want to be the reason we can't have nice things.
#PoC #exploit #CVE_2025_55182 #DDoS #FiveM #REACT #Bash #cryptominer #malware
##I had a chance last week to chat with Benjamin Read of #Wiz. Last month, Read and other members of his team published a deep dive into the #React2Shell
(CVE-2025-55182) vulnerability, and I was curious to see what has been hitting my honeypot, so I took a closer look.
This is doing some weird stuff, friends.
As is normally the case with exploits targeting internet-facing devices, once the exploit becomes known, it ends up in the automated scanners used by threat actors and security researchers. What I've seen over the past week is a combination of both.
In just a few hours of operation, I identified a small number of source IP addresses exploiting React2Shell by pointing the vulnerable system at URLs hosting BASH scripts. These scripts are really familiar to anyone who routinely looks at honeypot data - they contain a series of commands that pull down and execute malicious payloads.
And as I've seen in the past, some of these payloads use racially inflammatory language in their malware. It's weird and gross, but unfortunately, really common.
But while most of these payloads were "the usual suspects" - remote shells, cryptocurrency miners - there was one payload that stuck out.
It's an exploit file, based on this proof-of-concept [https://github.com/iotwar/FIVEM-POC/blob/main/fivem-poc.py] designed to DDoS a modded server running "FiveM," a popular version of the game Grand Theft Auto V.
Let that one sink in: among the earliest adopters of a brand new exploit are...people trying to mess with other people's online game servers.
I've long said that exploits like these are the canaries in the datacenter coal mine. After all, if an attacker can force your server to run a cryptominer (or a game DDoS tool), they can force it to run far more malicious code.
I guess someone, or a group of someones, just want to ruin everyone's good time, no matter how or what form that takes. And they'll do it in the most offensive way possible.
Anyway, patch your servers, please, if only to stick it to these people who want to be the reason we can't have nice things.
#PoC #exploit #CVE_2025_55182 #DDoS #FiveM #REACT #Bash #cryptominer #malware
##updated 2025-12-05T18:33:09
1 posts
updated 2025-12-05T16:29:42.130000
1 posts
🎯 AI
===================
Executive summary: Claude Code used an allowlist-plus-manual-approval permission model to let select "read-only" commands execute without user intervention. Multiple flaws in the blocklist/argument-filtering logic allowed eight distinct bypass paths that led to arbitrary command execution. The issues are tracked as CVE-2025-66032 and addressed in Claude Code v1.0.93.
Technical details:
• The permission model allowed pre-approved commands (an allowlist) and required manual approval otherwise. Default allowlisted commands included echo, sort, sed, and man.
• Blocklist checks relied on regular expressions intended to forbid dangerous flags or patterns in arguments, for example to block -P/--pager for man and -o/--output for sort.
• Specific bypasses discovered include:
• man --html style arguments that accept rendering helpers and can inject shell commands.
• sort --compress-program which delegates to an external program and can be leveraged to execute code via fed input.
• sed -e usage that allows command execution when argument parsing is not properly constrained.
• Ambiguous git argument parsing where certain inputs were misinterpreted and passed through.
• Chains of bash variable expansion that collapsed into executable commands when combined with other parsing gaps.
Analysis:
• Root cause is fragile argument validation based on regexes that did not comprehensively account for alternative flags, quoting forms, or differences in how subprograms consume inputs.
• Allowlisting read-only utilities without complete argument sanitization creates a blind spot: trusted binaries can be turned into execution vectors when they accept program or shell-like parameters.
Detection:
• Monitor conversational logs for allowlisted commands paired with unusual flags such as --html, --compress-program, -e/-E, or unexpected quoted payloads.
• Alert on sequences where multiple argument-parsing gaps appear in a single request (e.g., variable expansions plus program-specifying flags).
Mitigation and status:
• Claude Code team assigned CVE-2025-66032 and released fixes in v1.0.93 to harden blocklist logic and tighten parsing.
• Longer-term mitigations should replace ad-hoc regex-based argument filters with deterministic parsers and explicit allowlists of safe argument forms.
🔹 claudecode #CVE-2025-66032 #commandinjection #regex #llmsecurity
🔗 Source: https://flatt.tech/research/posts/pwning-claude-code-in-8-different-ways/
##updated 2025-12-05T00:31:05
1 posts
1 repos
https://github.com/lutrasecurity/CVE-2025-1910-WatchGuard-Privilege-Escalation
After coming across an outdated version of WatchGuard's Mobile VPN with SSL last year and being unable to quickly find a public proof of concept for CVE-2025-1910, we took a closer look and created one ourselves: https://lutrasecurity.com/en/articles/cve-2025-1910-watchguard-privilege-escalation/
Thanks to @tomtom of #AKASEC for finding the vulnerability and providing a great write-up!
##updated 2025-12-01T15:39:53.100000
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##updated 2025-12-01T15:39:53.100000
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##updated 2025-12-01T15:39:53.100000
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##updated 2025-12-01T15:39:53.100000
1 posts
updated 2025-11-26T18:31:15
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##updated 2025-11-26T18:31:15
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##updated 2025-11-26T15:36:09.183000
1 posts
📰 High-Severity Code Injection Flaw in Open WebUI (CVE-2025-64496) Allows RCE
🚨 High-severity flaw CVE-2025-64496 in Open WebUI allows account takeover and RCE! A malicious AI server can inject code to steal auth tokens. Affects versions <= 0.6.34. Patch immediately to v0.6.35. #Vulnerability #RCE #AI #OpenWebUI
##updated 2025-11-25T22:16:16.690000
1 posts
3 repos
https://github.com/Ashwesker/Ashwesker-CVE-2025-6389
https://github.com/thorat-shubham/JXL_Infotainment_CVE-2025-63895
🚨 CVE-2025-6389: WordPress Sneeit Framework plugin vulnerability currently under active exploitation
PoC: https://github.com/Ashwesker/Ashwesker-CVE-2025-6389
▪️Vulnerability Type: Remote Code Execution (RCE)
▪️CVSS: 9.8
▪️Published: 11/24/2025
Impact:
▪️Full site compromise
▪️Create admin accounts
▪️Install backdoors/malicious files
▪️Redirect visitors or inject malware
Credit: youtube.com/@Nxploited
##updated 2025-11-17T21:44:47
1 posts
updated 2025-11-17T18:30:25
1 posts
updated 2025-11-17T16:15:48.830000
1 posts
1 repos
https://github.com/m4sh-wacker/CVE-2025-60188-Atarim-Plugin-Exploit
❗️CVE-2025-60188: Atarim Plugin PoC Exploit
GitHub: https://github.com/m4sh-wacker/CVE-2025-60188-Atarim-Plugin-Exploit
##updated 2025-11-03T21:35:11
1 posts
⚪ Firefox Patches Vulnerability Discovered by a Positive Technologies Expert
🗨️ Exploitation of the vulnerability became possible after injecting malicious code into an arbitrary website, allowing an attacker to steal credentials and redirect users to phishing pages.
##updated 2025-11-03T20:19:11.153000
1 posts
1 repos
https://github.com/Betim-Hodza/CVE-2025-4802-Proof-of-Concept
Cool bug 🐞
CVE-2025-4802: Arbitrary library path #vulnerability in static setuid binary in #GLIBC
https://hackyboiz.github.io/2025/12/03/millet/cve-2025-4802/
##updated 2025-10-31T22:04:34.230000
1 posts
16 repos
https://github.com/r0otk3r/CVE-2025-31161
https://github.com/Immersive-Labs-Sec/CVE-2025-31161
https://github.com/cesarbtakeda/CVE-2025-31161
https://github.com/ghostsec420/ShatteredFTP
https://github.com/Teexo/CVE-2025-31161
https://github.com/ibrahmsql/CVE-2025-31161
https://github.com/Ashwesker/Ashwesker-CVE-2025-31161
https://github.com/SUPRAAA-1337/CVE-2025-31161_exploit
https://github.com/Dairrow/CVE-2025-31161
https://github.com/f4dee-backup/CVE-2025-31161
https://github.com/ch3m1cl/CVE-2025-31161
https://github.com/SUPRAAA-1337/Nuclei_CVE-2025-31161_CVE-2025-2825
https://github.com/0xgh057r3c0n/CVE-2025-31161
https://github.com/0xDTC/CrushFTP-auth-bypass-CVE-2025-31161
updated 2025-10-30T19:52:41.973000
1 posts
The three bugs, tracked as CVE-2025-22224, CVE-2025-22225 and CVE-2025-22226, and named ESXicape, allow privileged attackers to execute arbitrary code and escape the VM to compromise the hypervisor itself. https://www.securityweek.com/exploit-for-vmware-zero-day-flaws-likely-built-a-year-before-public-disclosure/
##updated 2025-10-22T19:13:26
1 posts
100 repos
https://github.com/sunnyvale-it/CVE-2021-44228-PoC
https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words
https://github.com/greymd/CVE-2021-44228
https://github.com/thecyberneh/Log4j-RCE-Exploiter
https://github.com/sec13b/CVE-2021-44228-POC
https://github.com/mergebase/log4j-detector
https://github.com/MalwareTech/Log4jTools
https://github.com/cisagov/log4j-scanner
https://github.com/jas502n/Log4j2-CVE-2021-44228
https://github.com/toramanemre/log4j-rce-detect-waf-bypass
https://github.com/shamo0/CVE-2021-44228
https://github.com/Diverto/nse-log4shell
https://github.com/wortell/log4j
https://github.com/stripe/log4j-remediation-tools
https://github.com/logpresso/CVE-2021-44228-Scanner
https://github.com/cyberxml/log4j-poc
https://github.com/qingtengyun/cve-2021-44228-qingteng-patch
https://github.com/puzzlepeaches/Log4jUnifi
https://github.com/back2root/log4shell-rex
https://github.com/giterlizzi/nmap-log4shell
https://github.com/alexbakker/log4shell-tools
https://github.com/kozmer/log4j-shell-poc
https://github.com/Azeemering/CVE-2021-44228-DFIR-Notes
https://github.com/future-client/CVE-2021-44228
https://github.com/NCSC-NL/log4shell
https://github.com/kubearmor/log4j-CVE-2021-44228
https://github.com/yahoo/check-log4j
https://github.com/twseptian/spring-boot-log4j-cve-2021-44228-docker-lab
https://github.com/DragonSurvivalEU/RCE
https://github.com/alexandre-lavoie/python-log4rce
https://github.com/redhuntlabs/Log4JHunt
https://github.com/fireeye/CVE-2021-44228
https://github.com/NorthwaveSecurity/log4jcheck
https://github.com/mr-vill4in/log4j-fuzzer
https://github.com/corelight/cve-2021-44228
https://github.com/0xInfection/LogMePwn
https://github.com/1lann/log4shelldetect
https://github.com/Kadantte/CVE-2021-44228-poc
https://github.com/irgoncalves/f5-waf-quick-patch-cve-2021-44228
https://github.com/marcourbano/CVE-2021-44228
https://github.com/HynekPetrak/log4shell-finder
https://github.com/bigsizeme/Log4j-check
https://github.com/sassoftware/loguccino
https://github.com/pedrohavay/exploit-CVE-2021-44228
https://github.com/fox-it/log4j-finder
https://github.com/mubix/CVE-2021-44228-Log4Shell-Hashes
https://github.com/puzzlepeaches/Log4jHorizon
https://github.com/irgoncalves/f5-waf-enforce-sig-CVE-2021-44228
https://github.com/Malwar3Ninja/Exploitation-of-Log4j2-CVE-2021-44228
https://github.com/simonis/Log4jPatch
https://github.com/takito1812/log4j-detect
https://github.com/CodeShield-Security/Log4JShell-Bytecode-Detector
https://github.com/BinaryDefense/log4j-honeypot-flask
https://github.com/claranet/ansible-role-log4shell
https://github.com/mr-r3b00t/CVE-2021-44228
https://github.com/KosmX/CVE-2021-44228-example
https://github.com/CrackerCat/CVE-2021-44228-Log4j-Payloads
https://github.com/rubo77/log4j_checker_beta
https://github.com/qingtengyun/cve-2021-44228-qingteng-online-patch
https://github.com/faisalfs10x/Log4j2-CVE-2021-44228-revshell
https://github.com/aws-samples/kubernetes-log4j-cve-2021-44228-node-agent
https://github.com/boundaryx/cloudrasp-log4j2
https://github.com/NS-Sp4ce/Vm4J
https://github.com/nccgroup/log4j-jndi-be-gone
https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce
https://github.com/f0ng/log4j2burpscanner
https://github.com/Nanitor/log4fix
https://github.com/CERTCC/CVE-2021-44228_scanner
https://github.com/tippexs/nginx-njs-waf-cve2021-44228
https://github.com/r3kind1e/Log4Shell-obfuscated-payloads-generator
https://github.com/AlexandreHeroux/Fix-CVE-2021-44228
https://github.com/fullhunt/log4j-scan
https://github.com/justakazh/Log4j-CVE-2021-44228
https://github.com/christophetd/log4shell-vulnerable-app
https://github.com/lfama/log4j_checker
https://github.com/HyCraftHD/Log4J-RCE-Proof-Of-Concept
https://github.com/toramanemre/apache-solr-log4j-CVE-2021-44228
https://github.com/lucab85/log4j-cve-2021-44228
https://github.com/mzlogin/CVE-2021-44228-Demo
https://github.com/corretto/hotpatch-for-apache-log4j2
https://github.com/hackinghippo/log4shell_ioc_ips
https://github.com/ssl/scan4log4j
https://github.com/TaroballzChen/CVE-2021-44228-log4jVulnScanner-metasploit
https://github.com/blake-fm/vcenter-log4j
https://github.com/roxas-tan/CVE-2021-44228
https://github.com/infiniroot/nginx-mitigate-log4shell
https://github.com/Adikso/minecraft-log4j-honeypot
https://github.com/leonjza/log4jpwn
https://github.com/julian911015/Log4j-Scanner-Exploit
https://github.com/mufeedvh/log4jail
https://github.com/Jeromeyoung/log4j2burpscanner
https://github.com/RedDrip7/Log4Shell_CVE-2021-44228_related_attacks_IOCs
https://github.com/dwisiswant0/look4jar
https://github.com/korteke/log4shell-demo
https://github.com/LiveOverflow/log4shell
https://github.com/0xDexter0us/Log4J-Scanner
https://github.com/puzzlepeaches/Log4jCenter
https://github.com/darkarnium/Log4j-CVE-Detect
Cloudflare has even bragged on their blog¹ about how they run data analytics on all of the web requests going through their system. This data may be collected for government surveillance purposes as well.
##updated 2025-10-22T00:34:17
2 posts
📢 Huntress détaille un kit d’évasion VMware ESXi exploitant CVE-2025-22224/22225/22226
📝 Selon Huntress (Tactical Response et SOC), une intrusion observée en décembre 2025 a mené au déploiement d’un kit d’exploits visant VMwar...
📖 cyberveille : https://cyberveille.ch/posts/2026-01-10-huntress-detaille-un-kit-devasion-vmware-esxi-exploitant-cve-2025-22224-22225-22226/
🌐 source : https://www.huntress.com/blog/esxi-vm-escape-exploit
#CVE_2025_22224_22225_22226 #IOC #Cyberveille
The three bugs, tracked as CVE-2025-22224, CVE-2025-22225 and CVE-2025-22226, and named ESXicape, allow privileged attackers to execute arbitrary code and escape the VM to compromise the hypervisor itself. https://www.securityweek.com/exploit-for-vmware-zero-day-flaws-likely-built-a-year-before-public-disclosure/
##updated 2025-10-22T00:33:13
1 posts
The three bugs, tracked as CVE-2025-22224, CVE-2025-22225 and CVE-2025-22226, and named ESXicape, allow privileged attackers to execute arbitrary code and escape the VM to compromise the hypervisor itself. https://www.securityweek.com/exploit-for-vmware-zero-day-flaws-likely-built-a-year-before-public-disclosure/
##updated 2025-09-29T19:34:10.030000
1 posts
updated 2025-09-25T21:30:37
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##updated 2025-09-25T21:30:37
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##updated 2025-09-25T21:30:36
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##updated 2025-09-25T21:30:36
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##updated 2025-08-12T18:31:39
2 posts
⚪ August Windows updates may block app installations
🗨️ Microsoft reported that the Windows security updates for August 2025 may trigger unexpected User Account Control (UAC) prompts and cause problems with app installations. The bug affects users without administrator…
##⚪ August Windows updates may block app installations
🗨️ Microsoft reported that the Windows security updates for August 2025 may trigger unexpected User Account Control (UAC) prompts and cause problems with app installations. The bug affects users without administrator…
##updated 2025-07-14T17:38:41.223000
5 posts
1 repos
updated 2025-07-01T14:47:11.290000
1 posts
1 repos
❗️CVE-2025-68428: Critical Path Traversal in jsPDF
GitHub: https://github.com/12nio/CVE-2025-68428_PoC
CVSS: 9.2
CVE Published: January 5th, 2026
Exploit Published: January 8th, 2026
News source: https://www.bleepingcomputer.com/news/security/critical-jspdf-flaw-lets-hackers-steal-secrets-via-generated-pdfs/
##updated 2025-05-21T20:25:16.407000
1 posts
New.
Codean Labs: CVE-2025-47934 – Spoofing OpenPGP.js signature verification https://codeanlabs.com/2025/06/cve-2025-47934-spoofing-openpgp-js-signatures/ @Codean #threatresearch #infosec #vulnerability #JavaScript
##updated 2025-04-10T22:56:52
1 posts
🚨 EUVD-2025-202425
📊 Score: 8.7/10 (CVSS v3.1)
📦 Product: gogs, gogs
🏢 Vendor: gogs
📅 Published: 2025-12-10 | Updated: 2026-01-12
📝 Gogs vulnerable to a bypass of CVE-2024-55947
🔗 https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-202425
##updated 2024-11-21T06:53:06.320000
1 posts
6 repos
https://github.com/ph0ebus/CVE-2022-25845-In-Spring
https://github.com/scabench/fastjson-tp1fn1
https://github.com/cuijiung/fastjson-CVE-2022-25845
https://github.com/luelueking/CVE-2022-25845-In-Spring
Perfect 10 in Fastjson. 🥳
It's funny that it appears to be a challenging enough bug that it bypassed at least two previous fixes.
https://www.cve.org/CVERecord?id=CVE-2025-70974
##Fastjson before 1.2.48 mishandles autoType because, when an @type key is in a JSON document, and the value of that key is the name of a Java class, there may be calls to certain public methods of that class. Depending on the behavior of those methods, there may be JNDI injection with an attacker-supplied payload located elsewhere in that JSON document. This was exploited in the wild in 2023 through 2025. NOTE: this issue exists because of an incomplete fix for CVE-2017-18349. Also, a later bypass is covered by CVE-2022-25845.
updated 2024-11-21T06:48:03.407000
1 posts
Mitsubishi Electric patches critical SCADA and HMI vulnerabilities
Mitsubishi Electric patched several vulnerabilities in its ICONICS and HMI SCADA suites, including a critical bypass flaw (CVE-2022-23128) that allows unauthorized system control.
**Make sure all Mitsubishi Electric and ICONICS Digital Solutions devices are isolated from the internet and accessible from trusted networks only. Update to GENESIS64 version 10.97.1 immediately and all other systems which have patches. Since GENESIS32 is retired and won't be patched, use strict network isolation and plan a replacement.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/mitsubishi-electric-patches-critical-scada-and-hmi-vulnerabilities-p-5-i-0-o/gD2P6Ple2L
updated 2024-08-13T18:31:24
1 posts
29 repos
https://github.com/ArenaldyP/CVE-2024-38063-Medium
https://github.com/Th3Tr1ckst3r/CVE-2024-38063
https://github.com/KernelKraze/CVE-2024-38063_PoC
https://github.com/PumpkinBridge/Windows-CVE-2024-38063
https://github.com/dweger-scripts/CVE-2024-38063-Remediation
https://github.com/ps-interactive/cve-2024-38063
https://github.com/Sachinart/CVE-2024-38063-poc
https://github.com/fredagsguf/Windows-CVE-2024-38063
https://github.com/Dragkob/CVE-2024-38063
https://github.com/Th3Tr1ckst3r/Exip6
https://github.com/becrevex/CVE-2024-38063
https://github.com/jip-0-0-0-0-0/CVE-2024-38063-scanner
https://github.com/AliHj98/cve-2024-38063-Anonyvader
https://github.com/almogopp/Disable-IPv6-CVE-2024-38063-Fix
https://github.com/zenzue/CVE-2024-38063-POC
https://github.com/ynwarcs/CVE-2024-38063
https://github.com/AdminPentester/CVE-2024-38063-
https://github.com/thanawee321/CVE-2024-38063
https://github.com/patchpoint/CVE-2024-38063
https://github.com/akozsentre/CVE-2024-38063
https://github.com/Skac44/CVE-2024-38063
https://github.com/idkwastaken/CVE-2024-38063
https://github.com/FrancescoDiSalesGithub/quick-fix-cve-2024-38063
https://github.com/diegoalbuquerque/CVE-2024-38063
https://github.com/p33d/cve-2024-38063
https://github.com/Faizan-Khanx/CVE-2024-38063
https://github.com/haroonawanofficial/AI-CVE-2024-38063-0-DAY
Let's also not forget this golden moment: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38063
##updated 2024-03-15T18:30:45
1 posts
1 repos
@0xabad1dea @mkj @emaksovalec okay _actually_ the last one now, re: that footnote
Logitech has also messed up their code signing security several times so that even such a screw-up would actually not crash their app on macOS in particular, which is bad in its own right: https://nvd.nist.gov/vuln/detail/CVE-2024-2537
tl;dr: avoid logitech's drivers if you can, they are routinely stepping on security & reliability rakes completely unprompted
##updated 2023-09-26T14:52:01
1 posts
1 repos
Perfect 10 in Fastjson. 🥳
It's funny that it appears to be a challenging enough bug that it bypassed at least two previous fixes.
https://www.cve.org/CVERecord?id=CVE-2025-70974
##Fastjson before 1.2.48 mishandles autoType because, when an @type key is in a JSON document, and the value of that key is the name of a Java class, there may be calls to certain public methods of that class. Depending on the behavior of those methods, there may be JNDI injection with an attacker-supplied payload located elsewhere in that JSON document. This was exploited in the wild in 2023 through 2025. NOTE: this issue exists because of an incomplete fix for CVE-2017-18349. Also, a later bypass is covered by CVE-2022-25845.
We've published a security fix for a Mass Assignment vulnerability affecting Lucid in AdonisJS (CVE-2026-22814).
Update now:
- v6 users → adonisjs/lucid 21.8.2
- v7 users → adonisjs/lucid 22.0.0-next.6
github.com/adonisjs/luc...
Mass Assignment in AdonisJS Lu...
🔴 CVE-2026-22794 - Critical (9.6)
Appsmith is a platform to build admin panels, internal tools, and dashboards. Prior to 1.93, the server uses the Origin value from the request headers as the email link baseUrl without validation. If an attacker controls the Origin, password reset...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22794/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-22788 - High (8.2)
WebErpMesv2 is a Resource Management and Manufacturing execution system Web for industry. Prior to 1.19, the WebErpMesV2 application exposes multiple sensitive API endpoints without authentication middleware. An unauthenticated remote attacker can...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22788/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚪ August Windows updates may block app installations
🗨️ Microsoft reported that the Windows security updates for August 2025 may trigger unexpected User Account Control (UAC) prompts and cause problems with app installations. The bug affects users without administrator…
##⚪ August Windows updates may block app installations
🗨️ Microsoft reported that the Windows security updates for August 2025 may trigger unexpected User Account Control (UAC) prompts and cause problems with app installations. The bug affects users without administrator…
##🔴 CVE-2026-22783 - Critical (9.6)
Iris is a web collaborative platform that helps incident responders share technical details during investigations. Prior to 2.4.24, the DFIR-IRIS datastore file management system has a vulnerability where mass assignment of the file_local_name fie...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22783/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Space Hacking ( NASA Cryptolib ) 🚀
https://www.cve.org/CVERecord?id=CVE-2026-21897
https://www.cve.org/CVERecord?id=CVE-2026-21898
https://www.cve.org/CVERecord?id=CVE-2026-21899
https://www.cve.org/CVERecord?id=CVE-2026-21900
https://www.cve.org/CVERecord?id=CVE-2026-22023
https://www.cve.org/CVERecord?id=CVE-2026-22024
https://www.cve.org/CVERecord?id=CVE-2026-22025
https://www.cve.org/CVERecord?id=CVE-2026-22026
##Space Hacking ( NASA Cryptolib ) 🚀
https://www.cve.org/CVERecord?id=CVE-2026-21897
https://www.cve.org/CVERecord?id=CVE-2026-21898
https://www.cve.org/CVERecord?id=CVE-2026-21899
https://www.cve.org/CVERecord?id=CVE-2026-21900
https://www.cve.org/CVERecord?id=CVE-2026-22023
https://www.cve.org/CVERecord?id=CVE-2026-22024
https://www.cve.org/CVERecord?id=CVE-2026-22025
https://www.cve.org/CVERecord?id=CVE-2026-22026
##Space Hacking ( NASA Cryptolib ) 🚀
https://www.cve.org/CVERecord?id=CVE-2026-21897
https://www.cve.org/CVERecord?id=CVE-2026-21898
https://www.cve.org/CVERecord?id=CVE-2026-21899
https://www.cve.org/CVERecord?id=CVE-2026-21900
https://www.cve.org/CVERecord?id=CVE-2026-22023
https://www.cve.org/CVERecord?id=CVE-2026-22024
https://www.cve.org/CVERecord?id=CVE-2026-22025
https://www.cve.org/CVERecord?id=CVE-2026-22026
##Space Hacking ( NASA Cryptolib ) 🚀
https://www.cve.org/CVERecord?id=CVE-2026-21897
https://www.cve.org/CVERecord?id=CVE-2026-21898
https://www.cve.org/CVERecord?id=CVE-2026-21899
https://www.cve.org/CVERecord?id=CVE-2026-21900
https://www.cve.org/CVERecord?id=CVE-2026-22023
https://www.cve.org/CVERecord?id=CVE-2026-22024
https://www.cve.org/CVERecord?id=CVE-2026-22025
https://www.cve.org/CVERecord?id=CVE-2026-22026
##Space Hacking ( NASA Cryptolib ) 🚀
https://www.cve.org/CVERecord?id=CVE-2026-21897
https://www.cve.org/CVERecord?id=CVE-2026-21898
https://www.cve.org/CVERecord?id=CVE-2026-21899
https://www.cve.org/CVERecord?id=CVE-2026-21900
https://www.cve.org/CVERecord?id=CVE-2026-22023
https://www.cve.org/CVERecord?id=CVE-2026-22024
https://www.cve.org/CVERecord?id=CVE-2026-22025
https://www.cve.org/CVERecord?id=CVE-2026-22026
##Space Hacking ( NASA Cryptolib ) 🚀
https://www.cve.org/CVERecord?id=CVE-2026-21897
https://www.cve.org/CVERecord?id=CVE-2026-21898
https://www.cve.org/CVERecord?id=CVE-2026-21899
https://www.cve.org/CVERecord?id=CVE-2026-21900
https://www.cve.org/CVERecord?id=CVE-2026-22023
https://www.cve.org/CVERecord?id=CVE-2026-22024
https://www.cve.org/CVERecord?id=CVE-2026-22025
https://www.cve.org/CVERecord?id=CVE-2026-22026
##Space Hacking ( NASA Cryptolib ) 🚀
https://www.cve.org/CVERecord?id=CVE-2026-21897
https://www.cve.org/CVERecord?id=CVE-2026-21898
https://www.cve.org/CVERecord?id=CVE-2026-21899
https://www.cve.org/CVERecord?id=CVE-2026-21900
https://www.cve.org/CVERecord?id=CVE-2026-22023
https://www.cve.org/CVERecord?id=CVE-2026-22024
https://www.cve.org/CVERecord?id=CVE-2026-22025
https://www.cve.org/CVERecord?id=CVE-2026-22026
##Space Hacking ( NASA Cryptolib ) 🚀
https://www.cve.org/CVERecord?id=CVE-2026-21897
https://www.cve.org/CVERecord?id=CVE-2026-21898
https://www.cve.org/CVERecord?id=CVE-2026-21899
https://www.cve.org/CVERecord?id=CVE-2026-21900
https://www.cve.org/CVERecord?id=CVE-2026-22023
https://www.cve.org/CVERecord?id=CVE-2026-22024
https://www.cve.org/CVERecord?id=CVE-2026-22025
https://www.cve.org/CVERecord?id=CVE-2026-22026
##Space Hacking ( NASA Cryptolib ) 🚀
https://www.cve.org/CVERecord?id=CVE-2026-21897
https://www.cve.org/CVERecord?id=CVE-2026-21898
https://www.cve.org/CVERecord?id=CVE-2026-21899
https://www.cve.org/CVERecord?id=CVE-2026-21900
https://www.cve.org/CVERecord?id=CVE-2026-22023
https://www.cve.org/CVERecord?id=CVE-2026-22024
https://www.cve.org/CVERecord?id=CVE-2026-22025
https://www.cve.org/CVERecord?id=CVE-2026-22026
##Space Hacking ( NASA Cryptolib ) 🚀
https://www.cve.org/CVERecord?id=CVE-2026-21897
https://www.cve.org/CVERecord?id=CVE-2026-21898
https://www.cve.org/CVERecord?id=CVE-2026-21899
https://www.cve.org/CVERecord?id=CVE-2026-21900
https://www.cve.org/CVERecord?id=CVE-2026-22023
https://www.cve.org/CVERecord?id=CVE-2026-22024
https://www.cve.org/CVERecord?id=CVE-2026-22025
https://www.cve.org/CVERecord?id=CVE-2026-22026
##Space Hacking ( NASA Cryptolib ) 🚀
https://www.cve.org/CVERecord?id=CVE-2026-21897
https://www.cve.org/CVERecord?id=CVE-2026-21898
https://www.cve.org/CVERecord?id=CVE-2026-21899
https://www.cve.org/CVERecord?id=CVE-2026-21900
https://www.cve.org/CVERecord?id=CVE-2026-22023
https://www.cve.org/CVERecord?id=CVE-2026-22024
https://www.cve.org/CVERecord?id=CVE-2026-22025
https://www.cve.org/CVERecord?id=CVE-2026-22026
##Space Hacking ( NASA Cryptolib ) 🚀
https://www.cve.org/CVERecord?id=CVE-2026-21897
https://www.cve.org/CVERecord?id=CVE-2026-21898
https://www.cve.org/CVERecord?id=CVE-2026-21899
https://www.cve.org/CVERecord?id=CVE-2026-21900
https://www.cve.org/CVERecord?id=CVE-2026-22023
https://www.cve.org/CVERecord?id=CVE-2026-22024
https://www.cve.org/CVERecord?id=CVE-2026-22025
https://www.cve.org/CVERecord?id=CVE-2026-22026
##📈 CVE Published in last 7 days (2026-01-05 - 2026-01-12)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1037
Severity:
- Critical: 110
- High: 289
- Medium: 492
- Low: 32
- None: 114
Status:
- : 43
- Analyzed: 62
- Awaiting Analysis: 537
- Received: 246
- Rejected: 32
- Undergoing Analysis: 117
Top CNAs:
- GitHub, Inc.: 201
- Wordfence: 161
- Patchstack: 150
- VulDB: 78
- MITRE: 73
- VulnCheck: 57
- N/A: 43
- MediaTek, Inc.: 28
- Fortinet, Inc.: 26
- Qualcomm, Inc.: 22
Top Affected Products:
- UNKNOWN: 964
- Google Android: 23
- Color Iccdev: 12
- Fabian Online Product Reservation System: 8
- Samsung Exynos 2400 Firmware: 7
- Samsung Exynos 1580 Firmware: 7
- Samsung Exynos 1380 Firmware: 6
- Samsung Exynos 1480 Firmware: 6
- Mediatek Nr17: 5
- Mediatek Nr16: 4
Top EPSS Score:
- CVE-2026-0581 - 3.41 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-0581)
- CVE-2026-0641 - 3.17 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-0641)
- CVE-2025-61489 - 2.45 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-61489)
- CVE-2025-15502 - 1.04 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-15502)
- CVE-2025-6225 - 0.89 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-6225)
- CVE-2020-36925 - 0.52 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-36925)
- CVE-2025-64424 - 0.50 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-64424)
- CVE-2025-14997 - 0.46 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14997)
- CVE-2025-46645 - 0.45 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-46645)
- CVE-2025-68455 - 0.43 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-68455)
OWASP CRS Patches Critical Multipart Charset Validation Bypass
OWASP CRS released patches for a critical vulnerability (CVE-2026-21876) that allows attackers to bypass charset validation in multipart requests. By placing malicious payloads in early request parts, attackers can slip UTF-7/16/32 encoded XSS attacks past the WAF.
**If you are using WAF OWASP Core Rule Set to version 4.22.0 or 3.3.8 this is important. Update the Core rule 922110 ASAP. Don't not rely on default settings for rule 922110 until you have applied these patches. Attackers can easily hide malicious scripts in multi-part uploads.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/owasp-crs-patches-critical-multipart-charset-validation-bypass-6-n-o-8-z/gD2P6Ple2L
CVE-2026-21876: OWASP Modsecurity CRS WAF bypass blogpost is out! https://coreruleset.org/20260106/cve-2026-21876-critical-multipart-charset-bypass-fixed-in-crs-4.22.0-and-3.3.8/
##Critical (9.3 CVSS) OWASP ModSecurity CRS WAF bypass advisory and walkthrough is out! https://coreruleset.org/20260106/cve-2026-21876-critical-multipart-charset-bypass-fixed-in-crs-4.22.0-and-3.3.8/
##Docker WAF doesn't filter on username, apparently. Seems weird. The CVE isn't published yet but they are claiming a number for it in the repo. Either way, if you have Docker WAF logs, maybe look for interesting payloads in the username parameter. Or don't.
InputPlumber: Lack of D-Bus Authorization and Input Verification allows UI Input Injection and Denial-of-Service (CVE-2025-66005, CVE-2025-14338)
https://security.opensuse.org/2026/01/09/inputplumber-lack-of-dbus-auth.html
##InputPlumber: Lack of D-Bus Authorization and Input Verification allows UI Input Injection and Denial-of-Service (CVE-2025-66005, CVE-2025-14338)
https://security.opensuse.org/2026/01/09/inputplumber-lack-of-dbus-auth.html
##Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##Our researchers at Pentest-Tools.com just found a new RCE in cPanel (CVE-2025-63261). 🔧
We discovered that a classic Unsafe Perl Open in AWStats allows command execution. The application fails to sanitize input before the open() call, so a well-placed pipe | character tricks the system into spawning a shell instead of reading a file.
This exploit requires zero actual plumbing. 🪠
Read Part 1 of the technical breakdown by Matei Badanoiu: https://pentest-tools.com/blog/cpanel-cve-ptt-2025-021-part-1
#infosec #cybersecurity #cPanel #RCE #vulnerability #PentestTools
##Kanboard patches critical authentication bypass and information disclosure flaws
Kanboard version 1.2.49 fixes a critical authentication bypass (CVE-2026-21881) and two other flaws that allow attackers to impersonate users, enumerate LDAP data, and perform open redirects. The most severe vulnerability allows full administrative access by spoofing HTTP headers when reverse proxy authentication is enabled.
**If possible, ensure your Kanboard instance is isolated from the internet and accessible only via a trusted network or VPN. Then plan a quick patch. If you use reverse proxy authentication, prioritize configuring your web server to strip all identity headers from external requests, since that's the most dangerous attack vector.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/kanboard-patches-critical-authentication-bypass-and-information-disclosure-flaws-d-m-l-8-h/gD2P6Ple2L
TLP: Polkit Authentication Bypass in Profiles Daemon in Version 1.9.0 (CVE-2025-67859)
https://security.opensuse.org/2026/01/07/tlp-polkit-authentication-bypass.html
##That's a weird thing to do intentionally.
##An unused function in MicroServer can start a reverse SSH connection to a vendor registered domain, without mutual authentication. An attacker on the local network with admin access to the web server, and the ability to manipulate DNS responses, can redirect the SSH connection to an attacker controlled device.
1 posts
2 repos
CVE-2025-14558 is a 9.8-severity vulnerability in FreeBSD's IPv6 auto-configuration that lets attackers execute arbitrary code with a single crafted network packet. FreeBSD released patches on December 16, 2024, but the threat escalated when multiple proof-of-concept exploits hit GitHub about two weeks ago.
Read More: https://www.security.land/freebsd-ipv6-flaw-enables-remote-code-execution-attacks/
#SecurityLand #CyberWatch #FreeBSD #Cybersecurity #VulnerabilityManagement #IPv6 #CVE
##Unpatched root backdoor found in EoL TOTOLINK EX200 extenders
CERT/CC warned of an unpatched vulnerability (CVE-2025-65606) in the end-of-life TOTOLINK EX200 range extender that allows authenticated attackers to open a root-level telnet backdoor. Because the device is no longer supported, no official fix is available.
**If you are using TOTOLINK EX200, be aware that it can be exploited trivially by anyone with minimal access. Ideally, replace it with another device. If that's not possible, limit the number of authenticated users on the web management, with strong passwords and never expose the management interface to the internet.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/unpatched-root-backdoor-found-in-eol-totolink-ex200-extenders-7-e-d-z-s/gD2P6Ple2L
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-65606 ( not yet published )
##⚪ Critical RCE vulnerability has been discovered in Net-SNMP
🗨️ A critical remote code execution vulnerability (CVE-2025-68615) has been identified in the open-source networking package Net-SNMP, which implements SNMP protocols versions 1, 2c, and 3. This flaw allows attackers to execute arbitrary code remotely on any server where the snmptrapd service is used t…
##