## Updated at UTC 2026-01-23T05:31:20.089979

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-24304 9.9 0.00% 4 0 2026-01-23T02:15:55.547000 Improper access control in Azure Resource Manager allows an authorized attacker
CVE-2026-24138 7.5 0.00% 2 0 2026-01-23T01:15:51.023000 FOG is a free open-source cloning/imaging/rescue suite/inventory management syst
CVE-2026-24306 9.8 0.00% 4 0 2026-01-23T00:31:24 Improper access control in Azure Front Door (AFD) allows an unauthorized attacke
CVE-2026-24305 9.3 0.00% 2 0 2026-01-23T00:31:24 Azure Entra ID Elevation of Privilege Vulnerability
CVE-2025-54816 9.4 0.00% 2 0 2026-01-23T00:31:17 This vulnerability occurs when a WebSocket endpoint does not enforce proper aut
CVE-2026-24307 9.3 0.00% 2 0 2026-01-22T23:15:59.003000 Improper validation of specified type of input in M365 Copilot allows an unautho
CVE-2026-21520 7.5 0.00% 4 0 2026-01-22T23:15:57.657000 Exposure of Sensitive Information to an Unauthorized Actor in Copilot Studio all
CVE-2026-21264 9.3 0.00% 4 0 2026-01-22T23:15:57.407000 Improper neutralization of input during web page generation ('cross-site scripti
CVE-2026-21227 8.2 0.00% 4 0 2026-01-22T23:15:57.220000 Improper limitation of a pathname to a restricted directory ('path traversal') i
CVE-2025-53968 7.5 0.00% 4 0 2026-01-22T23:15:49.800000 This vulnerability arises because there are no limitations on the number of aut
CVE-2025-31125 5.3 3.61% 5 7 template 2026-01-22T21:47:41 ### Summary The contents of arbitrary files can be returned to the browser. ##
CVE-2025-34026 None 7.88% 5 0 template 2026-01-22T21:34:49 The Versa Concerto SD-WAN orchestration platform is vulnerable to an authenticat
CVE-2026-24061 9.8 0.36% 11 11 2026-01-22T21:15:50.227000 telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "
CVE-2026-23954 8.7 0.00% 2 0 2026-01-22T20:26:11 ### Summary A user with the ability to launch a container with a custom image (e
CVE-2026-23953 8.7 0.00% 2 0 2026-01-22T20:22:11 ### Summary A user with the ability to launch a container with a custom YAML con
CVE-2026-21962 10.0 0.03% 2 3 2026-01-22T20:16:12.937000 Vulnerability in the Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in pr
CVE-2025-68645 8.8 9.77% 5 3 template 2026-01-22T19:15:56.323000 A Local File Inclusion (LFI) vulnerability exists in the Webmail Classic UI of Z
CVE-2025-54313 7.5 0.02% 5 3 2026-01-22T19:15:53.500000 eslint-config-prettier 8.10.1, 9.1.1, 10.1.6, and 10.1.7 has embedded malicious
CVE-2026-24009 8.1 0.00% 2 0 2026-01-22T18:43:46 ### Impact A PyYAML-related Remote Code Execution (RCE) vulnerability, namely C
CVE-2025-69828 10.0 0.00% 2 0 2026-01-22T18:30:41 File Upload vulnerability in TMS Global Software TMS Management Console v.6.3.7.
CVE-2025-67968 None 0.00% 2 0 2026-01-22T18:30:41 Unrestricted Upload of File with Dangerous Type vulnerability in InspiryThemes R
CVE-2025-69764 9.8 0.00% 2 0 2026-01-22T18:30:37 Tenda AX3 firmware v16.03.12.11 contains a stack-based buffer overflow in the fo
CVE-2025-36588 8.8 0.00% 2 0 2026-01-22T18:30:32 Dell Unisphere for PowerMax, version(s) 10.2.0.x, contain(s) an Improper Neutral
CVE-2026-22643 0 0.08% 1 0 2026-01-22T18:16:45.003000 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering
CVE-2026-22642 0 0.04% 1 0 2026-01-22T18:16:44.930000 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering
CVE-2026-24006 7.5 0.04% 2 0 2026-01-22T18:02:24 Serialization of objects with extreme depth can **exceed the maximum call stack
CVE-2026-22641 0 0.03% 1 0 2026-01-22T17:16:36.630000 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering
CVE-2026-22640 0 0.06% 1 0 2026-01-22T17:16:36.570000 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering
CVE-2026-22638 0 0.04% 1 0 2026-01-22T17:16:36.450000 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering
CVE-2026-22278 8.1 0.00% 2 0 2026-01-22T17:16:31.027000 Dell PowerScale OneFS versions prior to 9.13.0.0 contains an improper restrictio
CVE-2026-22200 0 0.22% 2 1 2026-01-22T17:16:30.900000 Enhancesoft osTicket versions 1.18.x prior to 1.18.3 and 1.17.x prior to 1.17.7
CVE-2025-67221 7.5 0.00% 2 1 2026-01-22T17:16:01.433000 The orjson.dumps function in orjson thru 3.11.4 does not limit recursion for dee
CVE-2026-23956 7.5 0.04% 2 0 2026-01-22T15:43:56 Overriding RegExp serialization with extremely large patterns can **exhaust Java
CVE-2026-23965 7.5 0.01% 2 0 2026-01-22T15:43:31 ### Summary A signature forgery vulnerability exists in the SM2 signature verif
CVE-2026-23966 9.1 0.01% 4 0 2026-01-22T15:43:16 ### Summary A private key recovery vulnerability exists in the SM2 decryption l
CVE-2026-23737 7.5 0.07% 2 0 2026-01-22T15:39:50 Improper input handling in the JSON deserialization component can lead to arbitr
CVE-2026-23524 9.8 0.57% 1 0 2026-01-22T15:39:15 ### Impact This vulnerability affects Laravel Reverb versions prior to v1.7.0 w
CVE-2026-22807 8.8 0.05% 1 0 2026-01-22T15:38:35 # Summary vLLM loads Hugging Face `auto_map` dynamic modules during model resol
CVE-2026-1328 8.8 0.00% 2 0 2026-01-22T15:31:44 A vulnerability was detected in Totolink NR1800X 9.1.0u.6279_B20210910. Impacted
CVE-2025-13928 7.5 0.00% 2 0 2026-01-22T15:31:39 GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.7
CVE-2025-10856 8.1 0.00% 2 0 2026-01-22T15:31:39 Unrestricted Upload of File with Dangerous Type vulnerability in Solvera Softwar
CVE-2026-0723 7.4 0.00% 1 0 2026-01-22T15:31:39 GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.6
CVE-2025-13927 7.5 0.00% 2 0 2026-01-22T15:31:38 GitLab has remediated an issue in GitLab CE/EE affecting all versions from 11.9
CVE-2026-23760 0 0.00% 2 0 template 2026-01-22T15:16:55.120000 SmarterTools SmarterMail versions prior to build 9511 contain an authentication
CVE-2026-1329 8.8 0.00% 2 0 2026-01-22T15:16:54.757000 A flaw has been found in Tenda AX1803 1.0.0.1. The affected element is the funct
CVE-2026-1324 8.8 0.00% 2 0 2026-01-22T15:16:50.420000 A vulnerability was identified in Sangfor Operation and Maintenance Management S
CVE-2025-69766 9.8 0.05% 2 0 2026-01-22T15:16:48.843000 Tenda AX3 firmware v16.03.12.11 contains a stack-based buffer overflow in the fo
CVE-2025-10855 7.5 0.00% 2 0 2026-01-22T13:16:03.340000 Authorization Bypass Through User-Controlled Key vulnerability in Solvera Softwa
CVE-2025-10024 7.5 0.04% 2 0 2026-01-22T12:15:53.980000 Authorization Bypass Through User-Controlled Key vulnerability in EXERT Computer
CVE-2025-4764 8.0 0.03% 2 2 2026-01-22T10:16:07.520000 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-1331 9.8 0.19% 2 0 2026-01-22T09:31:48 MeetingHub developed by HAMASTAR Technology has an Arbitrary File Upload vulnera
CVE-2026-0920 9.8 0.03% 2 1 2026-01-22T09:31:48 The LA-Studio Element Kit for Elementor plugin for WordPress is vulnerable to Ad
CVE-2026-1330 7.5 0.02% 2 0 2026-01-22T09:31:40 MeetingHub developed by HAMASTAR Technology has an Arbitrary File Read vulnerabi
CVE-2026-24042 9.4 0.14% 2 0 2026-01-22T04:16:00.187000 Appsmith is a platform to build admin panels, internal tools, and dashboards. In
CVE-2025-27380 7.6 0.03% 2 0 2026-01-22T03:31:34 HTML injection in Project Release in Altium Enterprise Server (AES) 7.0.3 on all
CVE-2026-24002 9.0 0.05% 2 0 2026-01-22T03:15:47.777000 Grist is spreadsheet software using Python as its formula language. Grist offers
CVE-2026-23967 7.5 0.01% 4 0 2026-01-22T03:15:47.167000 sm-crypto provides JavaScript implementations of the Chinese cryptographic algor
CVE-2026-23957 7.5 0.04% 2 0 2026-01-22T02:15:52.470000 seroval facilitates JS value stringification, including complex structures beyon
CVE-2025-27378 8.6 0.04% 2 0 2026-01-22T01:15:51.077000 AES contains a SQL injection vulnerability due to an inactive configuration that
CVE-2026-22022 8.2 0.04% 1 0 2026-01-21T22:56:48 Deployments of Apache Solr 5.3.0 through 9.10.0 that rely on Solr's "Rule Based
CVE-2026-20045 8.2 1.76% 15 1 2026-01-21T21:31:31 A vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unif
CVE-2026-22792 9.6 0.12% 1 0 2026-01-21T21:16:09.957000 5ire is a cross-platform desktop artificial intelligence assistant and model con
CVE-2025-59465 7.5 0.05% 1 0 2026-01-21T21:16:07.270000 A malformed `HTTP/2 HEADERS` frame with oversized, invalid `HPACK` data can caus
CVE-2025-13878 7.5 0.03% 3 0 2026-01-21T19:16:02.960000 Malformed BRID/HHIT records can cause `named` to terminate unexpectedly. This is
CVE-2026-0629 None 0.05% 2 0 2026-01-21T18:31:35 Authentication bypass in the password recovery feature of the local web interfac
CVE-2026-20092 6.0 0.01% 1 0 2026-01-21T18:30:38 A vulnerability in the read-only maintenance shell of Cisco Intersight Virtual A
CVE-2026-20109 4.8 0.03% 1 0 2026-01-21T18:30:38 Multiple vulnerabilities in the web-based management interface of Cisco Packaged
CVE-2025-70650 7.5 0.04% 1 0 2026-01-21T18:30:37 Tenda AX-1806 v1.0.0.1 was discovered to contain a stack overflow in the deviceL
CVE-2025-70645 7.5 0.04% 1 0 2026-01-21T18:30:32 Tenda AX-1806 v1.0.0.1 was discovered to contain a stack overflow in the deviceL
CVE-2026-21945 7.5 0.04% 2 0 2026-01-21T18:30:29 Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Ente
CVE-2026-21956 8.3 0.01% 1 0 2026-01-21T18:30:29 Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (comp
CVE-2026-21955 8.3 0.01% 1 0 2026-01-21T18:30:29 Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (comp
CVE-2026-20080 5.3 0.10% 1 0 2026-01-21T17:16:08.410000 A vulnerability in the SSH service of Cisco IEC6400 Wireless Backhaul Edge Compu
CVE-2026-20055 4.8 0.03% 1 0 2026-01-21T17:16:08.253000 Multiple vulnerabilities in the web-based management interface of Cisco Packaged
CVE-2025-66692 7.5 0.04% 1 0 2026-01-21T17:16:06.450000 A buffer over-read in the PublicKey::verify() method of Binance - Trust Wallet C
CVE-2025-65482 9.8 0.06% 1 1 2026-01-21T16:56:56 An XML External Entity (XXE) vulnerability in opensagres XDocReport v0.9.2 to v2
CVE-2026-21957 7.5 0.01% 1 0 2026-01-21T16:16:09.647000 Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (comp
CVE-2025-70651 7.5 0.04% 1 0 2026-01-21T16:16:07.657000 Tenda AX-1803 v1.0.0.1 was discovered to contain a stack overflow in the ssid pa
CVE-2025-57156 7.5 0.10% 1 0 2026-01-21T15:32:23 NULL pointer dereference in the dacp_reply_playqueueedit_clear function in src/h
CVE-2025-63648 7.5 0.04% 1 0 2026-01-21T15:32:22 A NULL pointer dereference in the dacp_reply_playqueueedit_move function (src/ht
CVE-2025-63647 7.5 0.04% 1 0 2026-01-21T15:32:22 A NULL pointer dereference in the parse_meta function (src/httpd_daap.c) of ownt
CVE-2026-21940 7.5 0.03% 1 0 2026-01-21T15:32:22 Vulnerability in the Oracle Agile PLM product of Oracle Supply Chain (component:
CVE-2026-21982 7.5 0.02% 1 0 2026-01-21T15:32:22 Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (comp
CVE-2025-57155 7.5 0.11% 1 0 2026-01-21T15:32:17 NULL pointer dereference in the daap_reply_groups function in src/httpd_daap.c i
CVE-2026-21983 7.6 0.01% 1 0 2026-01-21T15:31:16 Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (comp
CVE-2026-21984 7.5 0.01% 1 0 2026-01-21T15:16:09.493000 Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (comp
CVE-2025-66902 7.5 0.04% 1 0 2026-01-21T15:16:07.890000 An input validation issue in in Pithikos websocket-server v.0.6.4 allows a remot
CVE-2025-64087 9.8 0.07% 1 1 2026-01-21T15:16:07.473000 A Server-Side Template Injection (SSTI) vulnerability in the FreeMarker componen
CVE-2025-56353 7.5 0.04% 1 0 2026-01-21T15:16:06.640000 In tinyMQTT commit 6226ade15bd4f97be2d196352e64dd10937c1962 (2024-02-18), a memo
CVE-2025-55423 9.8 0.19% 1 0 2026-01-21T15:16:06.457000 A command injection vulnerability exists in the upnp_relay() function in multipl
CVE-2026-22812 8.8 0.02% 1 7 2026-01-21T15:14:59.607000 OpenCode is an open source AI coding agent. Prior to 1.0.216, OpenCode automatic
CVE-2026-23885 6.4 0.02% 2 1 2026-01-21T14:55:34 ### Summary A vulnerability was discovered during a manual security audit of the
CVE-2025-60021 9.8 0.67% 1 3 2026-01-21T13:46:39.423000 Remote command injection vulnerability in heap profiler builtin service in Apach
CVE-2026-24016 7.8 0.01% 1 0 2026-01-21T09:31:40 The installer of ServerView Agents for Windows provided by Fsas Technologies Inc
CVE-2025-15521 9.8 0.07% 1 0 2026-01-21T02:15:48.363000 The Academy LMS – WordPress LMS Plugin for Complete eLearning Solution plugin fo
CVE-2026-22219 None 0.04% 3 0 2026-01-21T01:07:03 Chainlit versions prior to 2.9.4 contain a server-side request forgery (SSRF) vu
CVE-2026-21973 8.1 0.03% 1 0 2026-01-21T00:31:51 Vulnerability in the Oracle FLEXCUBE Investor Servicing product of Oracle Financ
CVE-2026-21989 8.1 0.01% 2 0 2026-01-21T00:31:51 Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (comp
CVE-2026-21988 8.3 0.01% 2 0 2026-01-21T00:31:51 Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (comp
CVE-2026-21969 9.8 0.04% 1 0 2026-01-21T00:31:50 Vulnerability in the Oracle Agile Product Lifecycle Management for Process produ
CVE-2026-21926 7.5 0.04% 1 0 2026-01-21T00:31:49 Vulnerability in the Siebel CRM Deployment product of Oracle Siebel CRM (compone
CVE-2026-21990 8.2 0.01% 1 0 2026-01-20T22:16:02.590000 Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (comp
CVE-2026-21987 8.2 0.01% 2 0 2026-01-20T22:16:02.237000 Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (comp
CVE-2026-21967 8.6 0.04% 1 0 2026-01-20T22:15:59.733000 Vulnerability in the Oracle Hospitality OPERA 5 product of Oracle Hospitality Ap
CVE-2026-0905 9.8 0.02% 1 0 2026-01-20T22:15:52.923000 Insufficient policy enforcement in Network in Google Chrome prior to 144.0.7559.
CVE-2025-56005 9.8 0.29% 1 0 2026-01-20T21:31:41 An undocumented and unsafe feature in the PLY (Python Lex-Yacc) library 3.11 all
CVE-2026-22218 0 0.03% 3 0 2026-01-20T19:15:50.700000 Chainlit versions prior to 2.9.4 contain an arbitrary file read vulnerability in
CVE-2025-71020 7.5 0.05% 1 0 2026-01-20T18:33:03 Tenda AX-1806 v1.0.0.1 was discovered to contain a stack overflow in the securit
CVE-2026-0610 9.8 0.03% 1 0 2026-01-20T18:33:03 SQL Injection vulnerability in remote-sessions in Devolutions Server.This issue
CVE-2025-33231 6.7 0.01% 1 0 2026-01-20T18:32:08 NVIDIA Nsight Systems for Windows contains a vulnerability in the application’s
CVE-2025-33230 7.3 0.03% 1 0 2026-01-20T18:32:08 NVIDIA Nsight Systems for Linux contains a vulnerability in the .run installer,
CVE-2025-33228 7.3 0.03% 1 0 2026-01-20T18:32:08 NVIDIA Nsight Systems contains a vulnerability in the gfx_hotspot recipe, where
CVE-2026-0943 7.5 0.04% 1 0 2026-01-20T18:31:56 HarfBuzz::Shaper versions before 0.032 for Perl contains a bundled library with
CVE-2026-0915 7.5 0.04% 2 0 2026-01-20T18:31:56 Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that spec
CVE-2025-64155 9.8 0.04% 3 4 2026-01-20T18:31:55 An improper neutralization of special elements used in an os command ('os comman
CVE-2025-33233 7.8 0.02% 2 0 2026-01-20T18:16:02.950000 NVIDIA Merlin Transformers4Rec for all platforms contains a vulnerability where
CVE-2025-33229 7.3 0.01% 1 0 2026-01-20T18:16:02.500000 NVIDIA Nsight Visual Studio for Windows contains a vulnerability in Nsight Monit
CVE-2025-62582 9.8 0.06% 1 0 2026-01-20T16:58:23.900000 Delta Electronics DIAView has multiple vulnerabilities.
CVE-2026-0899 8.8 0.07% 1 0 2026-01-20T15:33:12 Out of bounds memory access in V8 in Google Chrome prior to 144.0.7559.59 allowe
CVE-2026-22844 9.9 0.29% 2 1 2026-01-20T14:16:21.980000 A Command Injection vulnerability in Zoom Node Multimedia Routers (MMRs) before
CVE-2025-14533 9.8 0.08% 2 0 2026-01-20T10:16:05.583000 The Advanced Custom Fields: Extended plugin for WordPress is vulnerable to Privi
CVE-2026-23838 0 0.11% 1 0 2026-01-19T19:16:03.937000 Tandoor Recipes is a recipe manager than can be installed with the Nix package m
CVE-2026-20960 8.0 0.05% 1 0 2026-01-17T00:30:30 Improper authorization in Microsoft Power Apps allows an authorized attacker to
CVE-2026-21223 5.1 0.05% 1 0 2026-01-16T22:16:25.983000 Microsoft Edge Elevation Service exposes a privileged COM interface that inadequ
CVE-2026-23744 9.8 0.65% 2 1 2026-01-16T21:57:11 ### Summary MCPJam inspector is the local-first development platform for MCP ser
CVE-2026-23490 7.5 0.05% 1 0 2026-01-16T21:56:00 ### Summary After reviewing pyasn1 v0.6.1 a Denial-of-Service issue has been fo
CVE-2026-23745 None 0.01% 1 1 2026-01-16T21:16:24 ### Summary The `node-tar` library (`<= 7.5.2`) fails to sanitize the `linkpath
CVE-2026-23800 10.0 0.05% 1 0 2026-01-16T21:15:52.037000 Incorrect Privilege Assignment vulnerability in Modular DS modular-connector all
CVE-2025-13154 5.5 0.02% 1 0 2026-01-16T15:55:33.063000 An improper link following vulnerability was reported in the SmartPerformanceAdd
CVE-2026-22919 3.8 0.04% 1 0 2026-01-16T15:55:33.063000 An attacker with administrative access may inject malicious content into the log
CVE-2026-22908 9.1 0.20% 1 0 2026-01-16T15:55:33.063000 Uploading unvalidated container images may allow remote attackers to gain full a
CVE-2026-22916 4.3 0.05% 1 0 2026-01-16T15:55:33.063000 An attacker with low privileges may be able to trigger critical system functions
CVE-2026-22915 4.3 0.04% 1 0 2026-01-16T15:55:33.063000 An attacker with low privileges may be able to read files from specific director
CVE-2026-22912 4.3 0.08% 1 0 2026-01-16T15:55:33.063000 Improper validation of a login parameter may allow attackers to redirect users t
CVE-2026-22644 5.3 0.07% 1 0 2026-01-16T15:55:33.063000 Certain requests pass the authentication token in the URL as string query parame
CVE-2025-62581 9.8 0.06% 1 0 2026-01-16T03:30:27 Delta Electronics DIAView has multiple vulnerabilities.
CVE-2026-0227 None 0.09% 4 2 2026-01-15T21:31:54 A vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated
CVE-2025-36911 7.1 0.00% 3 6 2026-01-15T21:31:47 In key-based pairing, there is a possible ID due to a logic error in the code. T
CVE-2025-9014 None 0.11% 1 0 2026-01-15T18:31:42 A Null Pointer Dereference vulnerability exists in the referer header check of t
CVE-2026-0712 7.6 0.05% 1 0 2026-01-15T15:31:35 An open redirect vulnerability has been identified in Grafana OSS that can be ex
CVE-2026-22907 10.0 0.07% 1 0 2026-01-15T15:31:30 An attacker may gain unauthorized access to the host filesystem, potentially all
CVE-2026-22910 7.5 0.05% 1 0 2026-01-15T15:31:30 The device is deployed with weak and publicly known default passwords for certai
CVE-2026-22639 4.3 0.04% 1 0 2026-01-15T15:31:27 Grafana is an open-source platform for monitoring and observability. The Grafana
CVE-2026-22646 4.3 0.04% 1 0 2026-01-15T15:31:27 Certain error messages returned by the application expose internal system detail
CVE-2026-22645 5.3 0.04% 1 0 2026-01-15T15:31:27 The application discloses all used components, versions and license information
CVE-2026-0713 8.3 0.04% 1 0 2026-01-15T15:31:26 A security vulnerability in the /apis/dashboard.grafana.app/* endpoints allows a
CVE-2026-22920 3.7 0.05% 1 0 2026-01-15T15:31:26 The device's passwords have not been adequately salted, making them vulnerable t
CVE-2026-22637 6.8 0.03% 1 0 2026-01-15T15:31:25 The built-in XY Chart plugin is vulnerable to a DOM XSS vulnerability. A user wi
CVE-2026-22918 4.3 0.05% 1 0 2026-01-15T15:31:19 An attacker may exploit missing protection against clickjacking by tricking user
CVE-2026-22917 4.3 0.06% 1 0 2026-01-15T15:31:19 Improper input handling in a system endpoint may allow attackers to overload res
CVE-2026-22914 4.3 0.03% 1 0 2026-01-15T15:31:19 An attacker with limited permissions may still be able to write files to specifi
CVE-2026-22913 4.3 0.04% 1 0 2026-01-15T15:31:18 Improper handling of a URL parameter may allow attackers to execute code in a us
CVE-2026-22911 5.3 0.06% 1 0 2026-01-15T15:31:18 Firmware update files may expose password hashes for system accounts, which coul
CVE-2026-22909 7.5 0.07% 1 0 2026-01-15T15:31:18 Certain system functions may be accessed without proper authorization, allowing
CVE-2025-14242 6.5 0.17% 1 0 2026-01-15T00:32:39 A flaw was found in vsftpd. This vulnerability allows a denial of service (DoS)
CVE-2026-23550 10.0 6.11% 3 2 template 2026-01-14T21:15:54.193000 Incorrect Privilege Assignment vulnerability in Modular DS allows Privilege Esca
CVE-2026-20805 5.5 4.62% 3 2 2026-01-13T21:31:44 Exposure of sensitive information to an unauthorized actor in Desktop Windows Ma
CVE-2026-20965 7.6 0.03% 3 0 2026-01-13T18:31:18 Improper verification of cryptographic signature in Windows Admin Center allows
CVE-2026-20950 7.8 0.04% 1 0 2026-01-13T18:31:18 Use after free in Microsoft Office Excel allows an unauthorized attacker to exec
CVE-2025-40805 10.0 0.20% 2 0 2026-01-13T12:31:48 Affected devices do not properly enforce user authentication on specific API end
CVE-2025-12420 None 0.04% 1 1 2026-01-13T03:32:08 A vulnerability has been identified in the ServiceNow AI Platform that could ena
CVE-2022-33318 9.8 2.11% 1 1 2026-01-09T06:16:00.257000 Deserialization of Untrusted Data vulnerability in Mitsubishi Electric GENESIS64
CVE-2025-14631 None 0.02% 1 0 2026-01-07T12:31:27 A NULL Pointer Dereference vulnerability in TP-Link Archer BE400 V1(802.11 modul
CVE-2025-67268 9.8 0.11% 1 0 2026-01-06T18:32:37 gpsd before commit dc966aa contains a heap-based out-of-bounds write vulnerabili
CVE-2025-20393 10.0 4.64% 1 7 2025-12-17T21:30:47 Cisco is aware of a potential vulnerability.&nbsp; Cisco is currently investigat
CVE-2025-59718 9.8 2.27% 13 3 2025-12-17T13:54:45.390000 A improper verification of cryptographic signature vulnerability in Fortinet For
CVE-2025-68285 None 0.06% 1 0 2025-12-16T18:31:42 In the Linux kernel, the following vulnerability has been resolved: libceph: fi
CVE-2025-59719 9.8 0.08% 3 1 2025-12-09T19:59:29.507000 An improper verification of cryptographic signature vulnerability in Fortinet Fo
CVE-2025-12817 3.1 0.07% 1 0 2025-11-14T16:42:03.187000 Missing authorization in PostgreSQL CREATE STATISTICS command allows a table own
CVE-2025-10585 9.8 0.70% 1 1 2025-10-30T15:55:01.903000 Type confusion in V8 in Google Chrome prior to 140.0.7339.185 allowed a remote a
CVE-2025-21043 8.8 11.37% 1 0 2025-10-30T15:36:12.360000 Out-of-bounds write in libimagecodec.quram.so prior to SMR Sep-2025 Release 1 al
CVE-2025-39993 None 0.07% 1 0 2025-10-29T15:31:52 In the Linux kernel, the following vulnerability has been resolved: media: rc:
CVE-2025-54236 9.1 57.72% 1 3 template 2025-10-27T15:13:10 Adobe Commerce versions 2.4.9-alpha2, 2.4.8-p2, 2.4.7-p7, 2.4.6-p12, 2.4.5-p14,
CVE-2025-59830 7.5 0.07% 1 0 2025-09-25T16:39:27 ## Summary `Rack::QueryParser` in version `< 2.2.18` enforces its `params_limit
CVE-2025-54068 None 0.12% 2 4 2025-08-18T08:03:59 ### Impact In Livewire v3 (≤ 3.6.3), a vulnerability allows unauthenticated atta
CVE-2025-25256 9.8 31.60% 1 1 template 2025-08-15T18:31:55 An improper neutralization of special elements used in an OS command ('OS Comman
CVE-2017-20149 9.8 1.72% 1 0 2025-05-14T15:32:35 The Mikrotik RouterOS web server allows memory corruption in releases before Sta
CVE-2025-2104 4.3 0.10% 1 1 2025-03-13T06:30:39 The Page Builder: Pagelayer – Drag and Drop website builder plugin for WordPress
CVE-2025-1058 8.1 0.07% 1 1 2025-02-13T06:15:21.480000 CWE-494: Download of Code Without Integrity Check vulnerability exists that coul
CVE-2020-14343 9.8 13.70% 2 2 2024-11-21T05:03:03.217000 A vulnerability was discovered in the PyYAML library in versions before 5.4, whe
CVE-2022-3270 9.8 0.95% 1 0 2023-01-31T05:03:00 In multiple products by Festo a remote unauthenticated attacker could use functi
CVE-2026-24129 0 0.00% 2 0 N/A
CVE-2024-32462 0 0.19% 2 1 N/A
CVE-2026-1220 0 0.00% 2 0 N/A
CVE-2026-24038 0 0.07% 2 0 N/A
CVE-2026-23962 0 0.04% 2 0 N/A
CVE-2026-24010 0 0.05% 4 0 N/A
CVE-2026-22793 0 0.20% 1 0 N/A
CVE-2025-68137 0 0.02% 1 0 N/A
CVE-2025-63261 0 0.00% 1 0 N/A
CVE-2024-50349 0 0.39% 1 0 N/A

CVE-2026-24304
(9.9 CRITICAL)

EPSS: 0.00%

updated 2026-01-23T02:15:55.547000

4 posts

Improper access control in Azure Resource Manager allows an authorized attacker to elevate privileges over a network.

thehackerwire@mastodon.social at 2026-01-23T02:22:19.000Z ##

🔴 CVE-2026-24304 - Critical (9.9)

Improper access control in Azure Resource Manager allows an authorized attacker to elevate privileges over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-23T02:22:05.000Z ##

🔴 CVE-2026-24304 - Critical (9.9)

Improper access control in Azure Resource Manager allows an authorized attacker to elevate privileges over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-23T02:22:19.000Z ##

🔴 CVE-2026-24304 - Critical (9.9)

Improper access control in Azure Resource Manager allows an authorized attacker to elevate privileges over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-23T02:22:05.000Z ##

🔴 CVE-2026-24304 - Critical (9.9)

Improper access control in Azure Resource Manager allows an authorized attacker to elevate privileges over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24138
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-23T01:15:51.023000

2 posts

FOG is a free open-source cloning/imaging/rescue suite/inventory management system. Versions 1.5.10.1754 and below contain an unauthenticated SSRF vulnerability in getversion.php which can be triggered by providing a user-controlled url parameter. It can be used to fetch both internal websites and files on the machine running FOG. This appears to be reachable without an authenticated web session w

thehackerwire@mastodon.social at 2026-01-23T01:45:01.000Z ##

🟠 CVE-2026-24138 - High (7.5)

FOG is a free open-source cloning/imaging/rescue suite/inventory management system. Versions 1.5.10.1754 and below contain an unauthenticated SSRF vulnerability in getversion.php which can be triggered by providing a user-controlled url parameter....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-23T01:45:01.000Z ##

🟠 CVE-2026-24138 - High (7.5)

FOG is a free open-source cloning/imaging/rescue suite/inventory management system. Versions 1.5.10.1754 and below contain an unauthenticated SSRF vulnerability in getversion.php which can be triggered by providing a user-controlled url parameter....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24306
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-01-23T00:31:24

4 posts

Improper access control in Azure Front Door (AFD) allows an unauthorized attacker to elevate privileges over a network.

thehackerwire@mastodon.social at 2026-01-23T00:02:08.000Z ##

🔴 CVE-2026-24306 - Critical (9.8)

Improper access control in Azure Front Door (AFD) allows an unauthorized attacker to elevate privileges over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T23:29:46.000Z ##

🔴 CVE-2026-24306 - Critical (9.8)

Improper access control in Azure Front Door (AFD) allows an unauthorized attacker to elevate privileges over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-23T00:02:08.000Z ##

🔴 CVE-2026-24306 - Critical (9.8)

Improper access control in Azure Front Door (AFD) allows an unauthorized attacker to elevate privileges over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T23:29:46.000Z ##

🔴 CVE-2026-24306 - Critical (9.8)

Improper access control in Azure Front Door (AFD) allows an unauthorized attacker to elevate privileges over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24305
(9.3 CRITICAL)

EPSS: 0.00%

updated 2026-01-23T00:31:24

2 posts

Azure Entra ID Elevation of Privilege Vulnerability

CVE-2025-54816
(9.4 CRITICAL)

EPSS: 0.00%

updated 2026-01-23T00:31:17

2 posts

This vulnerability occurs when a WebSocket endpoint does not enforce proper authentication mechanisms, allowing unauthorized users to establish connections. As a result, attackers can exploit this weakness to gain unauthorized access to sensitive data or perform unauthorized actions. Given that no authentication is required, this can lead to privilege escalation and potentially compromise the

thehackerwire@mastodon.social at 2026-01-22T23:30:22.000Z ##

🔴 CVE-2025-54816 - Critical (9.4)

This vulnerability occurs when a WebSocket endpoint does not enforce
proper authentication mechanisms, allowing unauthorized users to
establish connections. As a result, attackers can exploit this weakness
to gain unauthorized access to sensiti...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T23:30:22.000Z ##

🔴 CVE-2025-54816 - Critical (9.4)

This vulnerability occurs when a WebSocket endpoint does not enforce
proper authentication mechanisms, allowing unauthorized users to
establish connections. As a result, attackers can exploit this weakness
to gain unauthorized access to sensiti...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24307
(9.3 CRITICAL)

EPSS: 0.00%

updated 2026-01-22T23:15:59.003000

2 posts

Improper validation of specified type of input in M365 Copilot allows an unauthorized attacker to disclose information over a network.

thehackerwire@mastodon.social at 2026-01-22T23:27:43.000Z ##

🔴 CVE-2026-24307 - Critical (9.3)

Improper validation of specified type of input in M365 Copilot allows an unauthorized attacker to disclose information over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T23:27:43.000Z ##

🔴 CVE-2026-24307 - Critical (9.3)

Improper validation of specified type of input in M365 Copilot allows an unauthorized attacker to disclose information over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21520
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-22T23:15:57.657000

4 posts

Exposure of Sensitive Information to an Unauthorized Actor in Copilot Studio allows a unauthenticated attacker to view sensitive information through network attack vector

thehackerwire@mastodon.social at 2026-01-23T00:04:02.000Z ##

🟠 CVE-2026-21520 - High (7.5)

Exposure of Sensitive Information to an Unauthorized Actor in Copilot Studio allows a unauthenticated attacker to view sensitive information through network attack vector

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T23:30:13.000Z ##

🟠 CVE-2026-21520 - High (7.5)

Exposure of Sensitive Information to an Unauthorized Actor in Copilot Studio allows a unauthenticated attacker to view sensitive information through network attack vector

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-23T00:04:02.000Z ##

🟠 CVE-2026-21520 - High (7.5)

Exposure of Sensitive Information to an Unauthorized Actor in Copilot Studio allows a unauthenticated attacker to view sensitive information through network attack vector

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T23:30:13.000Z ##

🟠 CVE-2026-21520 - High (7.5)

Exposure of Sensitive Information to an Unauthorized Actor in Copilot Studio allows a unauthenticated attacker to view sensitive information through network attack vector

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21264
(9.3 CRITICAL)

EPSS: 0.00%

updated 2026-01-22T23:15:57.407000

4 posts

Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Account allows an unauthorized attacker to perform spoofing over a network.

thehackerwire@mastodon.social at 2026-01-23T00:02:29.000Z ##

🔴 CVE-2026-21264 - Critical (9.3)

Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Account allows an unauthorized attacker to perform spoofing over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T23:30:05.000Z ##

🔴 CVE-2026-21264 - Critical (9.3)

Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Account allows an unauthorized attacker to perform spoofing over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-23T00:02:29.000Z ##

🔴 CVE-2026-21264 - Critical (9.3)

Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Account allows an unauthorized attacker to perform spoofing over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T23:30:05.000Z ##

🔴 CVE-2026-21264 - Critical (9.3)

Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Account allows an unauthorized attacker to perform spoofing over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21227
(8.2 HIGH)

EPSS: 0.00%

updated 2026-01-22T23:15:57.220000

4 posts

Improper limitation of a pathname to a restricted directory ('path traversal') in Azure Logic Apps allows an unauthorized attacker to elevate privileges over a network.

thehackerwire@mastodon.social at 2026-01-23T00:02:19.000Z ##

🟠 CVE-2026-21227 - High (8.2)

Improper limitation of a pathname to a restricted directory ('path traversal') in Azure Logic Apps allows an unauthorized attacker to elevate privileges over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T23:29:55.000Z ##

🟠 CVE-2026-21227 - High (8.2)

Improper limitation of a pathname to a restricted directory ('path traversal') in Azure Logic Apps allows an unauthorized attacker to elevate privileges over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-23T00:02:19.000Z ##

🟠 CVE-2026-21227 - High (8.2)

Improper limitation of a pathname to a restricted directory ('path traversal') in Azure Logic Apps allows an unauthorized attacker to elevate privileges over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T23:29:55.000Z ##

🟠 CVE-2026-21227 - High (8.2)

Improper limitation of a pathname to a restricted directory ('path traversal') in Azure Logic Apps allows an unauthorized attacker to elevate privileges over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-53968
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-22T23:15:49.800000

4 posts

This vulnerability arises because there are no limitations on the number of authentication attempts a user can make. An attacker can exploit this weakness by continuously sending authentication requests, leading to a denial-of-service (DoS) condition. This can overwhelm the authentication system, rendering it unavailable to legitimate users and potentially causing service disruption. This can

thehackerwire@mastodon.social at 2026-01-23T00:04:12.000Z ##

🟠 CVE-2025-53968 - High (7.5)

This vulnerability arises because there are no limitations on the number
of authentication attempts a user can make. An attacker can exploit
this weakness by continuously sending authentication requests, leading
to a denial-of-service (DoS) con...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T23:30:22.000Z ##

🟠 CVE-2025-53968 - High (7.5)

This vulnerability arises because there are no limitations on the number
of authentication attempts a user can make. An attacker can exploit
this weakness by continuously sending authentication requests, leading
to a denial-of-service (DoS) con...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-23T00:04:12.000Z ##

🟠 CVE-2025-53968 - High (7.5)

This vulnerability arises because there are no limitations on the number
of authentication attempts a user can make. An attacker can exploit
this weakness by continuously sending authentication requests, leading
to a denial-of-service (DoS) con...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T23:30:22.000Z ##

🟠 CVE-2025-53968 - High (7.5)

This vulnerability arises because there are no limitations on the number
of authentication attempts a user can make. An attacker can exploit
this weakness by continuously sending authentication requests, leading
to a denial-of-service (DoS) con...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-31125
(5.3 MEDIUM)

EPSS: 3.61%

updated 2026-01-22T21:47:41

5 posts

### Summary The contents of arbitrary files can be returned to the browser. ### Impact Only apps explicitly exposing the Vite dev server to the network (using `--host` or [`server.host` config option](https://vitejs.dev/config/server-options.html#server-host)) are affected. ### Details - base64 encoded content of non-allowed files is exposed using `?inline&import` (originally reported as `?imp

Nuclei template

7 repos

https://github.com/nkuty/CVE-2025-30208-31125-31486-32395

https://github.com/jackieya/ViteVulScan

https://github.com/MuhammadWaseem29/Vitejs-exploit

https://github.com/harshgupptaa/Path-Transversal-CVE-2025-31125-

https://github.com/0xgh057r3c0n/CVE-2025-31125

https://github.com/xuemian168/CVE-2025-30208

https://github.com/sunhuiHi666/CVE-2025-31125

secdb at 2026-01-22T20:00:16.149Z ##

🚨 [CISA-2026:0122] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2025-31125 (secdb.nttzen.cloud/cve/detail/)
- Name: Vite Vitejs Improper Access Control Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Vite
- Product: Vitejs
- Notes: This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: github.com/vitejs/vite/commit/ ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-34026 (secdb.nttzen.cloud/cve/detail/)
- Name: Versa Concerto Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Versa
- Product: Concerto
- Notes: security-portal.versa-networks ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-54313 (secdb.nttzen.cloud/cve/detail/)
- Name: Prettier eslint-config-prettier Embedded Malicious Code Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Prettier
- Product: eslint-config-prettier
- Notes: This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: npmjs.com/package/eslint-confi ; github.com/prettier/eslint-con ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-68645 (secdb.nttzen.cloud/cve/detail/)
- Name: Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite (ZCS)
- Notes: wiki.zimbra.com/wiki/Security_ ; nvd.nist.gov/vuln/detail/CVE-2

##

cisakevtracker@mastodon.social at 2026-01-22T19:01:42.000Z ##

CVE ID: CVE-2025-31125
Vendor: Vite
Product: Vitejs
Date Added: 2026-01-22
Notes: This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: github.com/vitejs/vite/commit/ ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL at 2026-01-22T18:43:25.468Z ##

More updates from CISA:

- CVE-2025-54313: Prettier eslint-config-prettier Embedded Malicious Code Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-31125: Vite Vitejs Improper Access Control Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-34026: Versa Concerto Improper Authentication Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-68645: Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability cve.org/CVERecord?id=CVE-2025-

And several industrial advisories are listed here: cisa.gov/

##

cisakevtracker@mastodon.social at 2026-01-22T19:01:42.000Z ##

CVE ID: CVE-2025-31125
Vendor: Vite
Product: Vitejs
Date Added: 2026-01-22
Notes: This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: github.com/vitejs/vite/commit/ ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-01-22T18:43:25.000Z ##

More updates from CISA:

- CVE-2025-54313: Prettier eslint-config-prettier Embedded Malicious Code Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-31125: Vite Vitejs Improper Access Control Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-34026: Versa Concerto Improper Authentication Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-68645: Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability cve.org/CVERecord?id=CVE-2025-

And several industrial advisories are listed here: cisa.gov/ #CISA #infoec #vulnerability

##

CVE-2025-34026(CVSS UNKNOWN)

EPSS: 7.88%

updated 2026-01-22T21:34:49

5 posts

The Versa Concerto SD-WAN orchestration platform is vulnerable to an authentication bypass in the Traefik reverse proxy configuration, allowing at attacker to access administrative endpoints. The internal Actuator endpoint can be leveraged for access to heap dumps and trace logs.This issue is known to affect Concerto from 12.1.2 through 12.2.0. Additional versions may be vulnerable.

Nuclei template

secdb at 2026-01-22T20:00:16.149Z ##

🚨 [CISA-2026:0122] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2025-31125 (secdb.nttzen.cloud/cve/detail/)
- Name: Vite Vitejs Improper Access Control Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Vite
- Product: Vitejs
- Notes: This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: github.com/vitejs/vite/commit/ ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-34026 (secdb.nttzen.cloud/cve/detail/)
- Name: Versa Concerto Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Versa
- Product: Concerto
- Notes: security-portal.versa-networks ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-54313 (secdb.nttzen.cloud/cve/detail/)
- Name: Prettier eslint-config-prettier Embedded Malicious Code Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Prettier
- Product: eslint-config-prettier
- Notes: This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: npmjs.com/package/eslint-confi ; github.com/prettier/eslint-con ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-68645 (secdb.nttzen.cloud/cve/detail/)
- Name: Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite (ZCS)
- Notes: wiki.zimbra.com/wiki/Security_ ; nvd.nist.gov/vuln/detail/CVE-2

##

cisakevtracker@mastodon.social at 2026-01-22T19:01:27.000Z ##

CVE ID: CVE-2025-34026
Vendor: Versa
Product: Concerto
Date Added: 2026-01-22
Notes: security-portal.versa-networks ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL at 2026-01-22T18:43:25.468Z ##

More updates from CISA:

- CVE-2025-54313: Prettier eslint-config-prettier Embedded Malicious Code Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-31125: Vite Vitejs Improper Access Control Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-34026: Versa Concerto Improper Authentication Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-68645: Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability cve.org/CVERecord?id=CVE-2025-

And several industrial advisories are listed here: cisa.gov/

##

cisakevtracker@mastodon.social at 2026-01-22T19:01:27.000Z ##

CVE ID: CVE-2025-34026
Vendor: Versa
Product: Concerto
Date Added: 2026-01-22
Notes: security-portal.versa-networks ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-01-22T18:43:25.000Z ##

More updates from CISA:

- CVE-2025-54313: Prettier eslint-config-prettier Embedded Malicious Code Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-31125: Vite Vitejs Improper Access Control Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-34026: Versa Concerto Improper Authentication Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-68645: Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability cve.org/CVERecord?id=CVE-2025-

And several industrial advisories are listed here: cisa.gov/ #CISA #infoec #vulnerability

##

jschauma@mstdn.social at 2026-01-23T02:23:01.000Z ##

Trollolol, telnetd lets you log in without a password if you send the USER environment variable as "-f root" (which gets passed unsanitized to login(1)).

(Yes, yes, telnet, but still. :-)

openwall.com/lists/oss-securit

CVE-2026-24061

##

colin_mcmillen@piaille.fr at 2026-01-22T17:26:17.000Z ##

There is a critical auth bypass vulnerability in telnetd (nvd.nist.gov/vuln/detail/CVE-2) so I will need to update the surl-server Apple II proxy image. It has telnetd enabled (on localhost only, so is only accessible via the Apple II's serial port and you're probably already root on it)

##

hrbrmstr@mastodon.social at 2026-01-22T11:38:41.000Z ##

We caught a few (desperate) fiends trying to have their way with our vulnerable-to Telnetd -f Auth Bypass vuln (CVE-2026-24061) systems and I took a spelunk in the PCAPs:

Some of the least clever and least capable actors I've seen in a while.

"-f Around and Find Out: 18 Hours of Unsolicited Telnet Houseguests “ takes you on a deep dive into the packets.

labs.greynoise.io//grimoire/20

cc: @darses

##

hrbrmstr@mastodon.social at 2026-01-22T07:42:41.000Z ##

I shot a 📄 to the team to 👀 later today but we've seen some activity on the recent Inetutils Telnetd -f Auth Bypass vuln (CVE-2026-24061) — viz.greynoise.io/tags/inetutil

We stood up some full vulnerable systems and a cpl IPs only hit those, so the targeting precision was oddly fast.

If they don't do a main GN blog I'll post deets on the Labs blog (I'm OOO today).

Rly glad this was a nothingburger.

Spidey-sense says something yuge (not related to this) is coming soon tho. The internet feels “off”.

##

jschauma@mstdn.social at 2026-01-23T02:23:01.000Z ##

Trollolol, telnetd lets you log in without a password if you send the USER environment variable as "-f root" (which gets passed unsanitized to login(1)).

(Yes, yes, telnet, but still. :-)

openwall.com/lists/oss-securit

CVE-2026-24061

##

colin_mcmillen@piaille.fr at 2026-01-22T17:26:17.000Z ##

There is a critical auth bypass vulnerability in telnetd (nvd.nist.gov/vuln/detail/CVE-2) so I will need to update the surl-server Apple II proxy image. It has telnetd enabled (on localhost only, so is only accessible via the Apple II's serial port and you're probably already root on it)

##

hrbrmstr@mastodon.social at 2026-01-22T11:38:41.000Z ##

We caught a few (desperate) fiends trying to have their way with our vulnerable-to Telnetd -f Auth Bypass vuln (CVE-2026-24061) systems and I took a spelunk in the PCAPs:

Some of the least clever and least capable actors I've seen in a while.

"-f Around and Find Out: 18 Hours of Unsolicited Telnet Houseguests “ takes you on a deep dive into the packets.

labs.greynoise.io//grimoire/20

cc: @darses

##

linux@activitypub.awakari.com at 2026-01-22T07:19:48.000Z ## Debian: inetutils Important Telnetd Login Bypass CVE-2026-24061 DSA-6106-1 Kyu Neushwaistein discovered that telnetd from inetutils does not sanitize the USER environment variable before passing it...

#Debian #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

hrbrmstr@mastodon.social at 2026-01-22T07:42:41.000Z ##

I shot a 📄 to the team to 👀 later today but we've seen some activity on the recent Inetutils Telnetd -f Auth Bypass vuln (CVE-2026-24061) — viz.greynoise.io/tags/inetutil

We stood up some full vulnerable systems and a cpl IPs only hit those, so the targeting precision was oddly fast.

If they don't do a main GN blog I'll post deets on the Labs blog (I'm OOO today).

Rly glad this was a nothingburger.

Spidey-sense says something yuge (not related to this) is coming soon tho. The internet feels “off”.

##

cert_fr@social.numerique.gouv.fr at 2026-01-21T16:29:58.000Z ##

La vulnérabilité CVE-2026-24061 permet à un attaquant de se connecter en root en contournant l'authentification d'un service telnetd. Un code d'exploitation est disponible et son exploitation est triviale.
cert.ssi.gouv.fr/actualite/CER

##

thehackerwire@mastodon.social at 2026-01-21T08:01:15.000Z ##

🔴 CVE-2026-24061 - Critical (9.8)

telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23954
(8.7 HIGH)

EPSS: 0.00%

updated 2026-01-22T20:26:11

2 posts

### Summary A user with the ability to launch a container with a custom image (e.g a member of the ‘incus’ group) can use directory traversal or symbolic links in the templating functionality to achieve host arbitrary file read, and host arbitrary file write, ultimately resulting in arbitrary command execution on the host. This can also be exploited in IncusOS. ### Details When using an image wit

thehackerwire@mastodon.social at 2026-01-22T23:00:52.000Z ##

🟠 CVE-2026-23954 - High (8.7)

Incus is a system container and virtual machine manager. Versions 6.21.0 and below allow a user with the ability to launch a container with a custom image (e.g a member of the ‘incus’ group) to use directory traversal or symbolic links in the ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T23:00:52.000Z ##

🟠 CVE-2026-23954 - High (8.7)

Incus is a system container and virtual machine manager. Versions 6.21.0 and below allow a user with the ability to launch a container with a custom image (e.g a member of the ‘incus’ group) to use directory traversal or symbolic links in the ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23953
(8.7 HIGH)

EPSS: 0.00%

updated 2026-01-22T20:22:11

2 posts

### Summary A user with the ability to launch a container with a custom YAML configuration (e.g a member of the ‘incus’ group) can create an environment variable containing newlines, which can be used to add additional configuration items in the container’s `lxc.conf` due to the newline injection. This can allow adding arbitrary lifecycle hooks, ultimately resulting in arbitrary command execution

thehackerwire@mastodon.social at 2026-01-22T23:00:42.000Z ##

🟠 CVE-2026-23953 - High (8.7)

Incus is a system container and virtual machine manager. In versions 6.20.0 and below, a user with the ability to launch a container with a custom YAML configuration (e.g a member of the ‘incus’ group) can create an environment variable contai...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T23:00:42.000Z ##

🟠 CVE-2026-23953 - High (8.7)

Incus is a system container and virtual machine manager. In versions 6.20.0 and below, a user with the ability to launch a container with a custom YAML configuration (e.g a member of the ‘incus’ group) can create an environment variable contai...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21962
(10.0 CRITICAL)

EPSS: 0.03%

updated 2026-01-22T20:16:12.937000

2 posts

Vulnerability in the Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in product of Oracle Fusion Middleware (component: Weblogic Server Proxy Plug-in for Apache HTTP Server, Weblogic Server Proxy Plug-in for IIS). Supported versions that are affected are 12.2.1.4.0, 14.1.1.0.0 and 14.1.2.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to c

3 repos

https://github.com/Ashwesker/Ashwesker-CVE-2026-21962

https://github.com/gglessner/cve_2026_21962_scanner

https://github.com/samael0x4/CVE-2026-21962

Tinolle at 2026-01-22T17:53:01.180Z ##

Vulnerability in the Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in product of Oracle Fusion Middleware (component: Weblogic Server Proxy Plug-in for Apache HTTP Server, Weblogic Server Proxy Plug-in for IIS)
nvd.nist.gov/vuln/detail/CVE-2

##

thehackerwire@mastodon.social at 2026-01-20T22:37:43.000Z ##

🔴 CVE-2026-21962 - Critical (10)

Vulnerability in the Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in product of Oracle Fusion Middleware (component: Weblogic Server Proxy Plug-in for Apache HTTP Server, Weblogic Server Proxy Plug-in for IIS). Supported versions that ar...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-68645
(8.8 HIGH)

EPSS: 9.77%

updated 2026-01-22T19:15:56.323000

5 posts

A Local File Inclusion (LFI) vulnerability exists in the Webmail Classic UI of Zimbra Collaboration (ZCS) 10.0 and 10.1 because of improper handling of user-supplied request parameters in the RestFilter servlet. An unauthenticated remote attacker can craft requests to the /h/rest endpoint to influence internal request dispatching, allowing inclusion of arbitrary files from the WebRoot directory.

Nuclei template

3 repos

https://github.com/Ashwesker/Ashwesker-CVE-2025-68645

https://github.com/MaxMnMl/zimbramail-CVE-2025-68645-poc

https://github.com/chinaxploiter/CVE-2025-68645-PoC

secdb at 2026-01-22T20:00:16.149Z ##

🚨 [CISA-2026:0122] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2025-31125 (secdb.nttzen.cloud/cve/detail/)
- Name: Vite Vitejs Improper Access Control Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Vite
- Product: Vitejs
- Notes: This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: github.com/vitejs/vite/commit/ ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-34026 (secdb.nttzen.cloud/cve/detail/)
- Name: Versa Concerto Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Versa
- Product: Concerto
- Notes: security-portal.versa-networks ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-54313 (secdb.nttzen.cloud/cve/detail/)
- Name: Prettier eslint-config-prettier Embedded Malicious Code Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Prettier
- Product: eslint-config-prettier
- Notes: This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: npmjs.com/package/eslint-confi ; github.com/prettier/eslint-con ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-68645 (secdb.nttzen.cloud/cve/detail/)
- Name: Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite (ZCS)
- Notes: wiki.zimbra.com/wiki/Security_ ; nvd.nist.gov/vuln/detail/CVE-2

##

cisakevtracker@mastodon.social at 2026-01-22T19:01:11.000Z ##

CVE ID: CVE-2025-68645
Vendor: Synacor
Product: Zimbra Collaboration Suite (ZCS)
Date Added: 2026-01-22
Notes: wiki.zimbra.com/wiki/Security_ ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL at 2026-01-22T18:43:25.468Z ##

More updates from CISA:

- CVE-2025-54313: Prettier eslint-config-prettier Embedded Malicious Code Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-31125: Vite Vitejs Improper Access Control Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-34026: Versa Concerto Improper Authentication Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-68645: Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability cve.org/CVERecord?id=CVE-2025-

And several industrial advisories are listed here: cisa.gov/

##

cisakevtracker@mastodon.social at 2026-01-22T19:01:11.000Z ##

CVE ID: CVE-2025-68645
Vendor: Synacor
Product: Zimbra Collaboration Suite (ZCS)
Date Added: 2026-01-22
Notes: wiki.zimbra.com/wiki/Security_ ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-01-22T18:43:25.000Z ##

More updates from CISA:

- CVE-2025-54313: Prettier eslint-config-prettier Embedded Malicious Code Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-31125: Vite Vitejs Improper Access Control Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-34026: Versa Concerto Improper Authentication Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-68645: Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability cve.org/CVERecord?id=CVE-2025-

And several industrial advisories are listed here: cisa.gov/ #CISA #infoec #vulnerability

##

CVE-2025-54313
(7.5 HIGH)

EPSS: 0.02%

updated 2026-01-22T19:15:53.500000

5 posts

eslint-config-prettier 8.10.1, 9.1.1, 10.1.6, and 10.1.7 has embedded malicious code for a supply chain compromise. Installing an affected package executes an install.js file that launches the node-gyp.dll malware on Windows.

3 repos

https://github.com/ShinP451/scavenger_scanner

https://github.com/nihilor/cve-2025-54313

https://github.com/Drasrax/npm-shai-hulud-scanner

secdb at 2026-01-22T20:00:16.149Z ##

🚨 [CISA-2026:0122] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2025-31125 (secdb.nttzen.cloud/cve/detail/)
- Name: Vite Vitejs Improper Access Control Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Vite
- Product: Vitejs
- Notes: This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: github.com/vitejs/vite/commit/ ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-34026 (secdb.nttzen.cloud/cve/detail/)
- Name: Versa Concerto Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Versa
- Product: Concerto
- Notes: security-portal.versa-networks ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-54313 (secdb.nttzen.cloud/cve/detail/)
- Name: Prettier eslint-config-prettier Embedded Malicious Code Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Prettier
- Product: eslint-config-prettier
- Notes: This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: npmjs.com/package/eslint-confi ; github.com/prettier/eslint-con ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-68645 (secdb.nttzen.cloud/cve/detail/)
- Name: Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite (ZCS)
- Notes: wiki.zimbra.com/wiki/Security_ ; nvd.nist.gov/vuln/detail/CVE-2

##

cisakevtracker@mastodon.social at 2026-01-22T19:01:58.000Z ##

CVE ID: CVE-2025-54313
Vendor: Prettier
Product: eslint-config-prettier
Date Added: 2026-01-22
Notes: This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: npmjs.com/package/eslint-confi ; github.com/prettier/eslint-con ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL at 2026-01-22T18:43:25.468Z ##

More updates from CISA:

- CVE-2025-54313: Prettier eslint-config-prettier Embedded Malicious Code Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-31125: Vite Vitejs Improper Access Control Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-34026: Versa Concerto Improper Authentication Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-68645: Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability cve.org/CVERecord?id=CVE-2025-

And several industrial advisories are listed here: cisa.gov/

##

cisakevtracker@mastodon.social at 2026-01-22T19:01:58.000Z ##

CVE ID: CVE-2025-54313
Vendor: Prettier
Product: eslint-config-prettier
Date Added: 2026-01-22
Notes: This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: npmjs.com/package/eslint-confi ; github.com/prettier/eslint-con ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-01-22T18:43:25.000Z ##

More updates from CISA:

- CVE-2025-54313: Prettier eslint-config-prettier Embedded Malicious Code Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-31125: Vite Vitejs Improper Access Control Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-34026: Versa Concerto Improper Authentication Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-68645: Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability cve.org/CVERecord?id=CVE-2025-

And several industrial advisories are listed here: cisa.gov/ #CISA #infoec #vulnerability

##

CVE-2026-24009
(8.1 HIGH)

EPSS: 0.00%

updated 2026-01-22T18:43:46

2 posts

### Impact A PyYAML-related Remote Code Execution (RCE) vulnerability, namely CVE-2020-14343, is exposed in `docling-core >=2.21.0, <2.48.4` and, specifically only if the application uses `pyyaml < 5.4` and invokes `docling_core.types.doc.DoclingDocument.load_from_yaml()` passing it untrusted YAML data. ### Patches The vulnerability has been patched in `docling-core` version **2.48.4**. The fix

thehackerwire@mastodon.social at 2026-01-22T16:22:51.000Z ##

🟠 CVE-2026-24009 - High (8.1)

Docling Core (or docling-core) is a library that defines core data types and transformations in the document processing application Docling. A PyYAML-related Remote Code Execution (RCE) vulnerability, namely CVE-2020-14343, is exposed in docling-c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T16:22:51.000Z ##

🟠 CVE-2026-24009 - High (8.1)

Docling Core (or docling-core) is a library that defines core data types and transformations in the document processing application Docling. A PyYAML-related Remote Code Execution (RCE) vulnerability, namely CVE-2020-14343, is exposed in docling-c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69828
(10.0 CRITICAL)

EPSS: 0.00%

updated 2026-01-22T18:30:41

2 posts

File Upload vulnerability in TMS Global Software TMS Management Console v.6.3.7.27386.20250818 allows a remote attacker to execute arbitrary code via the Logo upload in /Customer/AddEdit

thehackerwire@mastodon.social at 2026-01-22T17:47:52.000Z ##

🔴 CVE-2025-69828 - Critical (10)

File Upload vulnerability in TMS Global Software TMS Management Console v.6.3.7.27386.20250818 allows a remote attacker to execute arbitrary code via the Logo upload in /Customer/AddEdit

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T17:47:52.000Z ##

🔴 CVE-2025-69828 - Critical (10)

File Upload vulnerability in TMS Global Software TMS Management Console v.6.3.7.27386.20250818 allows a remote attacker to execute arbitrary code via the Logo upload in /Customer/AddEdit

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-67968(CVSS UNKNOWN)

EPSS: 0.00%

updated 2026-01-22T18:30:41

2 posts

Unrestricted Upload of File with Dangerous Type vulnerability in InspiryThemes Real Homes CRM realhomes-crm allows Using Malicious Files.This issue affects Real Homes CRM: from n/a through <= 1.0.0.

AAKL at 2026-01-22T15:47:18.686Z ##

New. CVE-2025-67968

Patchstack: Critical Arbitrary File Upload Vulnerability in RealHomes CRM Plugin Affecting 30k+ Sites patchstack.com/articles/critic

Infosecurity-Magazine: RealHomes CRM Plugin Flaw Affected 30,000 WordPress Sites c-span.org/event/house-committ

##

AAKL@infosec.exchange at 2026-01-22T15:47:18.000Z ##

New. CVE-2025-67968

Patchstack: Critical Arbitrary File Upload Vulnerability in RealHomes CRM Plugin Affecting 30k+ Sites patchstack.com/articles/critic

Infosecurity-Magazine: RealHomes CRM Plugin Flaw Affected 30,000 WordPress Sites c-span.org/event/house-committ #infosec #WordPress #vulnerability

##

CVE-2025-69764
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-01-22T18:30:37

2 posts

Tenda AX3 firmware v16.03.12.11 contains a stack-based buffer overflow in the formGetIptv function due to improper handling of the stbpvid stack buffer, which may result in memory corruption and remote code execution.

thehackerwire@mastodon.social at 2026-01-22T16:23:12.000Z ##

🔴 CVE-2025-69764 - Critical (9.8)

Tenda AX3 firmware v16.03.12.11 contains a stack-based buffer overflow in the formGetIptv function due to improper handling of the stbpvid stack buffer, which may result in memory corruption and remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T16:23:12.000Z ##

🔴 CVE-2025-69764 - Critical (9.8)

Tenda AX3 firmware v16.03.12.11 contains a stack-based buffer overflow in the formGetIptv function due to improper handling of the stbpvid stack buffer, which may result in memory corruption and remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-36588
(8.8 HIGH)

EPSS: 0.00%

updated 2026-01-22T18:30:32

2 posts

Dell Unisphere for PowerMax, version(s) 10.2.0.x, contain(s) an Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Command execution.

thehackerwire@mastodon.social at 2026-01-22T16:23:02.000Z ##

🟠 CVE-2025-36588 - High (8.8)

Dell Unisphere for PowerMax, version(s) 10.2.0.x, contain(s) an Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability. A low privileged attacker with remote access could potentially exploit this vulnera...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T16:23:02.000Z ##

🟠 CVE-2025-36588 - High (8.8)

Dell Unisphere for PowerMax, version(s) 10.2.0.x, contain(s) an Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability. A low privileged attacker with remote access could potentially exploit this vulnera...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22643
(0 None)

EPSS: 0.08%

updated 2026-01-22T18:16:45.003000

1 posts

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

CVE-2026-22642
(0 None)

EPSS: 0.04%

updated 2026-01-22T18:16:44.930000

1 posts

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

CVE-2026-24006
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-22T18:02:24

2 posts

Serialization of objects with extreme depth can **exceed the maximum call stack limit**. **Mitigation**: `Seroval` introduces a `depthLimit` parameter in serialization/deserialization methods. **An error will be thrown if the depth limit is reached.**

thehackerwire@mastodon.social at 2026-01-22T04:05:02.000Z ##

🟠 CVE-2026-24006 - High (7.5)

Seroval facilitates JS value stringification, including complex structures beyond JSON.stringify capabilities. In versions 1.4.0
and below, serialization of objects with extreme depth can exceed the maximum call stack limit. In version 1.4.1, Sero...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T04:05:02.000Z ##

🟠 CVE-2026-24006 - High (7.5)

Seroval facilitates JS value stringification, including complex structures beyond JSON.stringify capabilities. In versions 1.4.0
and below, serialization of objects with extreme depth can exceed the maximum call stack limit. In version 1.4.1, Sero...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22641
(0 None)

EPSS: 0.03%

updated 2026-01-22T17:16:36.630000

1 posts

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

CVE-2026-22640
(0 None)

EPSS: 0.06%

updated 2026-01-22T17:16:36.570000

1 posts

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

CVE-2026-22638
(0 None)

EPSS: 0.04%

updated 2026-01-22T17:16:36.450000

1 posts

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

CVE-2026-22278
(8.1 HIGH)

EPSS: 0.00%

updated 2026-01-22T17:16:31.027000

2 posts

Dell PowerScale OneFS versions prior to 9.13.0.0 contains an improper restriction of excessive authentication attempts vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access.

thehackerwire@mastodon.social at 2026-01-22T17:47:41.000Z ##

🟠 CVE-2026-22278 - High (8.1)

Dell PowerScale OneFS versions prior to 9.13.0.0 contains an improper restriction of excessive authentication attempts vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Unauthori...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T17:47:41.000Z ##

🟠 CVE-2026-22278 - High (8.1)

Dell PowerScale OneFS versions prior to 9.13.0.0 contains an improper restriction of excessive authentication attempts vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Unauthori...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22200
(0 None)

EPSS: 0.22%

updated 2026-01-22T17:16:30.900000

2 posts

Enhancesoft osTicket versions 1.18.x prior to 1.18.3 and 1.17.x prior to 1.17.7 contain an arbitrary file read vulnerability in the ticket PDF export functionality. A remote attacker can submit a ticket containing crafted rich-text HTML that includes PHP filter expressions which are insufficiently sanitized before being processed by the mPDF PDF generator during export. When the attacker exports t

1 repos

https://github.com/horizon3ai/CVE-2026-22200

CVE-2025-67221
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-22T17:16:01.433000

2 posts

The orjson.dumps function in orjson thru 3.11.4 does not limit recursion for deeply nested JSON documents.

1 repos

https://github.com/kpatsakis/CVE-2025-67221

thehackerwire@mastodon.social at 2026-01-23T01:55:11.000Z ##

🟠 CVE-2025-67221 - High (7.5)

The orjson.dumps function in orjson thru 3.11.4 does not limit recursion for deeply nested JSON documents.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-23T01:55:11.000Z ##

🟠 CVE-2025-67221 - High (7.5)

The orjson.dumps function in orjson thru 3.11.4 does not limit recursion for deeply nested JSON documents.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23956
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-22T15:43:56

2 posts

Overriding RegExp serialization with extremely large patterns can **exhaust JavaScript runtime memory** during deserialization. Additionally, overriding RegExp serialization with patterns that trigger **catastrophic backtracking** can lead to ReDoS (Regular Expression Denial of Service). **Mitigation**: `Seroval` introduces `disabledFeatures` (a bitmask) in serialization/deserialization metho

thehackerwire@mastodon.social at 2026-01-22T03:00:16.000Z ##

🟠 CVE-2026-23956 - High (7.5)

seroval facilitates JS value stringification, including complex structures beyond JSON.stringify capabilities. In versions 1.4.0
and below, overriding RegExp serialization with extremely large patterns can exhaust JavaScript runtime memory during ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T03:00:16.000Z ##

🟠 CVE-2026-23956 - High (7.5)

seroval facilitates JS value stringification, including complex structures beyond JSON.stringify capabilities. In versions 1.4.0
and below, overriding RegExp serialization with extremely large patterns can exhaust JavaScript runtime memory during ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23965
(7.5 HIGH)

EPSS: 0.01%

updated 2026-01-22T15:43:31

2 posts

### Summary A signature forgery vulnerability exists in the SM2 signature verification logic of sm-crypto. Under default configurations, an attacker can forge valid signatures for arbitrary public keys. If the message space contains sufficient redundancy, the attacker can fix the prefix of the message associated with the forged signature to satisfy specific formatting requirements. ### Credit T

thehackerwire@mastodon.social at 2026-01-22T05:07:12.000Z ##

🟠 CVE-2026-23965 - High (7.5)

sm-crypto provides JavaScript implementations of the Chinese cryptographic algorithms SM2, SM3, and SM4. A signature forgery vulnerability exists in the SM2 signature verification logic of sm-crypto prior to version 0.4.0. Under default configurat...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T05:07:12.000Z ##

🟠 CVE-2026-23965 - High (7.5)

sm-crypto provides JavaScript implementations of the Chinese cryptographic algorithms SM2, SM3, and SM4. A signature forgery vulnerability exists in the SM2 signature verification logic of sm-crypto prior to version 0.4.0. Under default configurat...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23966
(9.1 CRITICAL)

EPSS: 0.01%

updated 2026-01-22T15:43:16

4 posts

### Summary A private key recovery vulnerability exists in the SM2 decryption logic of sm-crypto. By interacting with the SM2 decryption interface multiple times, an attacker can fully recover the private key within approximately several hundred interactions. ### Credit This vulnerability was discovered by: - XlabAI Team of Tencent Xuanwu Lab - Atuin Automated Vulnerability Discovery Engine

thehackerwire@mastodon.social at 2026-01-22T04:04:19.000Z ##

🔴 CVE-2026-23966 - Critical (9.1)

sm-crypto provides JavaScript implementations of the Chinese cryptographic algorithms SM2, SM3, and SM4. A private key recovery vulnerability exists in the SM2 decryption logic of sm-crypto prior to version 0.3.14. By interacting with the SM2 decr...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T04:03:18.000Z ##

🔴 CVE-2026-23966 - Critical (9.1)

sm-crypto provides JavaScript implementations of the Chinese cryptographic algorithms SM2, SM3, and SM4. A private key recovery vulnerability exists in the SM2 decryption logic of sm-crypto prior to version 0.3.14. By interacting with the SM2 decr...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T04:04:19.000Z ##

🔴 CVE-2026-23966 - Critical (9.1)

sm-crypto provides JavaScript implementations of the Chinese cryptographic algorithms SM2, SM3, and SM4. A private key recovery vulnerability exists in the SM2 decryption logic of sm-crypto prior to version 0.3.14. By interacting with the SM2 decr...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T04:03:18.000Z ##

🔴 CVE-2026-23966 - Critical (9.1)

sm-crypto provides JavaScript implementations of the Chinese cryptographic algorithms SM2, SM3, and SM4. A private key recovery vulnerability exists in the SM2 decryption logic of sm-crypto prior to version 0.3.14. By interacting with the SM2 decr...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23737
(7.5 HIGH)

EPSS: 0.07%

updated 2026-01-22T15:39:50

2 posts

Improper input handling in the JSON deserialization component can lead to arbitrary JavaScript code execution. The vulnerability can be exploited via overriding constant value and error deserialization, which allows indirect access to unsafe JS evaluation. This requires at least the ability to perform 4 separate requests on the same function and partial knowledge of how the serialized data is use

thehackerwire@mastodon.social at 2026-01-21T23:59:59.000Z ##

🟠 CVE-2026-23737 - High (7.5)

seroval facilitates JS value stringification, including complex structures beyond JSON.stringify capabilities. In versions 1.4.0 and below, improper input handling in the JSON deserialization component can lead to arbitrary JavaScript code executi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-21T23:59:59.000Z ##

🟠 CVE-2026-23737 - High (7.5)

seroval facilitates JS value stringification, including complex structures beyond JSON.stringify capabilities. In versions 1.4.0 and below, improper input handling in the JSON deserialization component can lead to arbitrary JavaScript code executi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23524
(9.8 CRITICAL)

EPSS: 0.57%

updated 2026-01-22T15:39:15

1 posts

### Impact This vulnerability affects Laravel Reverb versions prior to v1.7.0 when horizontal scaling is enabled (`REVERB_SCALING_ENABLED=true`). The exploitability of this vulnerability is increased because Redis servers are commonly deployed without authentication. With horizontal scaling enabled, Reverb servers communicate via Redis PubSub. Reverb previously passed data from the Redis channe

thehackerwire@mastodon.social at 2026-01-21T22:18:34.000Z ##

🔴 CVE-2026-23524 - Critical (9.8)

Laravel Reverb provides a real-time WebSocket communication backend for Laravel applications. In versions 1.6.3 and below, Reverb passes data from the Redis channel directly into PHP’s unserialize() function without restricting which classes can...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22807
(8.8 HIGH)

EPSS: 0.05%

updated 2026-01-22T15:38:35

1 posts

# Summary vLLM loads Hugging Face `auto_map` dynamic modules during model resolution **without gating on `trust_remote_code`**, allowing attacker-controlled Python code in a model repo/path to execute at server startup. --- # Impact An attacker who can influence the model repo/path (local directory or remote Hugging Face repo) can achieve **arbitrary code execution** on the vLLM host during mo

thehackerwire@mastodon.social at 2026-01-21T22:18:44.000Z ##

🟠 CVE-2026-22807 - High (8.8)

vLLM is an inference and serving engine for large language models (LLMs). Starting in version 0.10.1 and prior to version 0.14.0, vLLM loads Hugging Face `auto_map` dynamic modules during model resolution without gating on `trust_remote_code`, all...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1328
(8.8 HIGH)

EPSS: 0.00%

updated 2026-01-22T15:31:44

2 posts

A vulnerability was detected in Totolink NR1800X 9.1.0u.6279_B20210910. Impacted is the function setWizardCfg of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. Performing a manipulation of the argument ssid results in buffer overflow. The attack may be initiated remotely. The exploit is now public and may be used.

thehackerwire@mastodon.social at 2026-01-22T16:00:55.000Z ##

🟠 CVE-2026-1328 - High (8.8)

A vulnerability was detected in Totolink NR1800X 9.1.0u.6279_B20210910. Impacted is the function setWizardCfg of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. Performing a manipulation of the argument ssid results in buffer ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T16:00:55.000Z ##

🟠 CVE-2026-1328 - High (8.8)

A vulnerability was detected in Totolink NR1800X 9.1.0u.6279_B20210910. Impacted is the function setWizardCfg of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. Performing a manipulation of the argument ssid results in buffer ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-13928
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-22T15:31:39

2 posts

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.7 before 18.6.4, 18.7 before 18.7.2, and 18.8 before 18.8.2 that could have allowed an unauthenticated user to cause a denial of service condition by exploiting incorrect authorization validation in API endpoints.

thehackerwire@mastodon.social at 2026-01-22T16:02:23.000Z ##

🟠 CVE-2025-13928 - High (7.5)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.7 before 18.6.4, 18.7 before 18.7.2, and 18.8 before 18.8.2 that could have allowed an unauthenticated user to cause a denial of service condition by exploiting incorrec...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T16:02:23.000Z ##

🟠 CVE-2025-13928 - High (7.5)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.7 before 18.6.4, 18.7 before 18.7.2, and 18.8 before 18.8.2 that could have allowed an unauthenticated user to cause a denial of service condition by exploiting incorrec...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-10856
(8.1 HIGH)

EPSS: 0.00%

updated 2026-01-22T15:31:39

2 posts

Unrestricted Upload of File with Dangerous Type vulnerability in Solvera Software Services Trade Inc. Teknoera allows File Content Injection.This issue affects Teknoera: through 01102025.

thehackerwire@mastodon.social at 2026-01-22T13:17:44.000Z ##

🟠 CVE-2025-10856 - High (8.1)

Unrestricted Upload of File with Dangerous Type vulnerability in Solvera Software Services Trade Inc. Teknoera allows File Content Injection.This issue affects Teknoera: through 01102025.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T13:17:44.000Z ##

🟠 CVE-2025-10856 - High (8.1)

Unrestricted Upload of File with Dangerous Type vulnerability in Solvera Software Services Trade Inc. Teknoera allows File Content Injection.This issue affects Teknoera: through 01102025.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0723
(7.4 HIGH)

EPSS: 0.00%

updated 2026-01-22T15:31:39

1 posts

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.6 before 18.6.4, 18.7 before 18.7.2, and 18.8 before 18.8.2 that could have allowed an individual with existing knowledge of a victim's credential ID to bypass two-factor authentication by submitting forged device responses.

opennet@fosstodon.su at 2026-01-22T13:00:01.000Z ##

Уязвимость в GitLab, позволяющая обойти двухфакторную аутентификацию

Опубликованы корректирующие обновления платформы для организации совместной разработки GitLab - 18.8.2, 18.7.2, 18.6.4, в которых устранена уязвимость (CVE-2026-0723), позволяющая обойти проверку при двухфакторной аутентификации. Для совершения атаки злоумышленник должен знать идентификатор учётных данных жертвы. Уязвимость вызвана отсутствием должной проверки возвращаемого значения в сервисах аутентификации.....

Источник: opennet.ru/opennews/art.shtml?
Дата: Thu, 22 Jan 2026 15:24:24 +0300

Enjoy.

##

CVE-2025-13927
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-22T15:31:38

2 posts

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 11.9 before 18.6.4, 18.7 before 18.7.2, and 18.8 before 18.8.2 that could have allowed an unauthenticated user to create a denial of service condition by sending crafted requests with malformed authentication data.

thehackerwire@mastodon.social at 2026-01-22T16:02:13.000Z ##

🟠 CVE-2025-13927 - High (7.5)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 11.9 before 18.6.4, 18.7 before 18.7.2, and 18.8 before 18.8.2 that could have allowed an unauthenticated user to create a denial of service condition by sending crafted re...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T16:02:13.000Z ##

🟠 CVE-2025-13927 - High (7.5)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 11.9 before 18.6.4, 18.7 before 18.7.2, and 18.8 before 18.8.2 that could have allowed an unauthenticated user to create a denial of service condition by sending crafted re...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23760
(0 None)

EPSS: 0.00%

updated 2026-01-22T15:16:55.120000

2 posts

SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. An unauthenticated attacker can supply a target administrator username and a new password to reset the acc

Nuclei template

AAKL at 2026-01-22T18:52:55.532Z ##

New.

Huntress: DE&TH to Vulnerabilities: Huntress Catches SmarterMail Account Takeover Leading to RCE (CVE-2026-23760) huntress.com/blog/smartermail- @huntress

##

AAKL@infosec.exchange at 2026-01-22T18:52:55.000Z ##

New.

Huntress: DE&TH to Vulnerabilities: Huntress Catches SmarterMail Account Takeover Leading to RCE (CVE-2026-23760) huntress.com/blog/smartermail- @huntress #infosec

##

CVE-2026-1329
(8.8 HIGH)

EPSS: 0.00%

updated 2026-01-22T15:16:54.757000

2 posts

A flaw has been found in Tenda AX1803 1.0.0.1. The affected element is the function fromGetWifiGuestBasic of the file /goform/WifiGuestSet. Executing a manipulation of the argument guestWrlPwd/guestEn/guestSsid/hideSsid/guestSecurity can lead to stack-based buffer overflow. The attack may be launched remotely. The exploit has been published and may be used.

thehackerwire@mastodon.social at 2026-01-22T16:00:44.000Z ##

🟠 CVE-2026-1329 - High (8.8)

A flaw has been found in Tenda AX1803 1.0.0.1. The affected element is the function fromGetWifiGuestBasic of the file /goform/WifiGuestSet. Executing a manipulation of the argument guestWrlPwd/guestEn/guestSsid/hideSsid/guestSecurity can lead to s...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T16:00:44.000Z ##

🟠 CVE-2026-1329 - High (8.8)

A flaw has been found in Tenda AX1803 1.0.0.1. The affected element is the function fromGetWifiGuestBasic of the file /goform/WifiGuestSet. Executing a manipulation of the argument guestWrlPwd/guestEn/guestSsid/hideSsid/guestSecurity can lead to s...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1324
(8.8 HIGH)

EPSS: 0.00%

updated 2026-01-22T15:16:50.420000

2 posts

A vulnerability was identified in Sangfor Operation and Maintenance Management System up to 3.0.12. Affected by this issue is the function SessionController of the file /isomp-protocol/protocol/session of the component SSH Protocol Handler. The manipulation of the argument keypassword leads to os command injection. It is possible to initiate the attack remotely. The exploit is publicly available a

thehackerwire@mastodon.social at 2026-01-22T16:01:05.000Z ##

🟠 CVE-2026-1324 - High (8.8)

A vulnerability was identified in Sangfor Operation and Maintenance Management System up to 3.0.12. Affected by this issue is the function SessionController of the file /isomp-protocol/protocol/session of the component SSH Protocol Handler. The ma...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T16:01:05.000Z ##

🟠 CVE-2026-1324 - High (8.8)

A vulnerability was identified in Sangfor Operation and Maintenance Management System up to 3.0.12. Affected by this issue is the function SessionController of the file /isomp-protocol/protocol/session of the component SSH Protocol Handler. The ma...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69766
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-01-22T15:16:48.843000

2 posts

Tenda AX3 firmware v16.03.12.11 contains a stack-based buffer overflow in the formGetIptv function due to improper handling of the citytag stack buffer, which may result in memory corruption and remote code execution.

thehackerwire@mastodon.social at 2026-01-22T16:02:34.000Z ##

🔴 CVE-2025-69766 - Critical (9.8)

Tenda AX3 firmware v16.03.12.11 contains a stack-based buffer overflow in the formGetIptv function due to improper handling of the citytag stack buffer, which may result in memory corruption and remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T16:02:34.000Z ##

🔴 CVE-2025-69766 - Critical (9.8)

Tenda AX3 firmware v16.03.12.11 contains a stack-based buffer overflow in the formGetIptv function due to improper handling of the citytag stack buffer, which may result in memory corruption and remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-10855
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-22T13:16:03.340000

2 posts

Authorization Bypass Through User-Controlled Key vulnerability in Solvera Software Services Trade Inc. Teknoera allows Exploitation of Trusted Identifiers.This issue affects Teknoera: through 01102025.

thehackerwire@mastodon.social at 2026-01-22T13:17:53.000Z ##

🟠 CVE-2025-10855 - High (7.5)

Authorization Bypass Through User-Controlled Key vulnerability in Solvera Software Services Trade Inc. Teknoera allows Exploitation of Trusted Identifiers.This issue affects Teknoera: through 01102025.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T13:17:53.000Z ##

🟠 CVE-2025-10855 - High (7.5)

Authorization Bypass Through User-Controlled Key vulnerability in Solvera Software Services Trade Inc. Teknoera allows Exploitation of Trusted Identifiers.This issue affects Teknoera: through 01102025.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-10024
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-22T12:15:53.980000

2 posts

Authorization Bypass Through User-Controlled Key vulnerability in EXERT Computer Technologies Software Ltd. Co. Education Management System allows Parameter Injection.This issue affects Education Management System: through 23.09.2025.

thehackerwire@mastodon.social at 2026-01-22T12:53:45.000Z ##

🟠 CVE-2025-10024 - High (7.5)

Authorization Bypass Through User-Controlled Key vulnerability in EXERT Computer Technologies Software Ltd. Co. Education Management System allows Parameter Injection.This issue affects Education Management System: through 23.09.2025.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T12:53:45.000Z ##

🟠 CVE-2025-10024 - High (7.5)

Authorization Bypass Through User-Controlled Key vulnerability in EXERT Computer Technologies Software Ltd. Co. Education Management System allows Parameter Injection.This issue affects Education Management System: through 23.09.2025.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-4764
(8.0 HIGH)

EPSS: 0.03%

updated 2026-01-22T10:16:07.520000

2 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aida Computer Information Technology Inc. Hotel Guest Hotspot allows SQL Injection.This issue affects Hotel Guest Hotspot: through 22012026.  NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

2 repos

https://github.com/RootHarpy/CVE-2025-47646

https://github.com/Nxploited/CVE-2025-47646

thehackerwire@mastodon.social at 2026-01-22T10:59:54.000Z ##

🟠 CVE-2025-4764 - High (8)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aida Computer Information Technology Inc. Hotel Guest Hotspot allows SQL Injection.This issue affects Hotel Guest Hotspot: through 22012026. 

N...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T10:59:54.000Z ##

🟠 CVE-2025-4764 - High (8)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aida Computer Information Technology Inc. Hotel Guest Hotspot allows SQL Injection.This issue affects Hotel Guest Hotspot: through 22012026. 

N...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1331
(9.8 CRITICAL)

EPSS: 0.19%

updated 2026-01-22T09:31:48

2 posts

MeetingHub developed by HAMASTAR Technology has an Arbitrary File Upload vulnerability, allowing unauthenticated remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.

thehackerwire@mastodon.social at 2026-01-22T09:38:33.000Z ##

🔴 CVE-2026-1331 - Critical (9.8)

MeetingHub developed by HAMASTAR Technology has an Arbitrary File Upload vulnerability, allowing unauthenticated remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T09:38:33.000Z ##

🔴 CVE-2026-1331 - Critical (9.8)

MeetingHub developed by HAMASTAR Technology has an Arbitrary File Upload vulnerability, allowing unauthenticated remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0920
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-01-22T09:31:48

2 posts

The LA-Studio Element Kit for Elementor plugin for WordPress is vulnerable to Administrative User Creation in all versions up to, and including, 1.5.6.3. This is due to the 'ajax_register_handle' function not restricting what user roles a user can register with. This makes it possible for unauthenticated attackers to supply the 'lakit_bkrole' parameter during registration and gain administrator ac

1 repos

https://github.com/Galaxy-sc/CVE-2026-0920-WordPress-LA-Studio-Exploit

thehackerwire@mastodon.social at 2026-01-22T08:00:10.000Z ##

🔴 CVE-2026-0920 - Critical (9.8)

The LA-Studio Element Kit for Elementor plugin for WordPress is vulnerable to Administrative User Creation in all versions up to, and including, 1.5.6.3. This is due to the 'ajax_register_handle' function not restricting what user roles a user can...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T08:00:10.000Z ##

🔴 CVE-2026-0920 - Critical (9.8)

The LA-Studio Element Kit for Elementor plugin for WordPress is vulnerable to Administrative User Creation in all versions up to, and including, 1.5.6.3. This is due to the 'ajax_register_handle' function not restricting what user roles a user can...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1330
(7.5 HIGH)

EPSS: 0.02%

updated 2026-01-22T09:31:40

2 posts

MeetingHub developed by HAMASTAR Technology has an Arbitrary File Read vulnerability, allowing unauthenticated remote attackers to exploit Absolute Path Traversal to download arbitrary system files.

thehackerwire@mastodon.social at 2026-01-22T09:38:42.000Z ##

🟠 CVE-2026-1330 - High (7.5)

MeetingHub developed by HAMASTAR Technology has an Arbitrary File Read vulnerability, allowing unauthenticated remote attackers to exploit Absolute Path Traversal to download arbitrary system files.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T09:38:42.000Z ##

🟠 CVE-2026-1330 - High (7.5)

MeetingHub developed by HAMASTAR Technology has an Arbitrary File Read vulnerability, allowing unauthenticated remote attackers to exploit Absolute Path Traversal to download arbitrary system files.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24042
(9.4 CRITICAL)

EPSS: 0.14%

updated 2026-01-22T04:16:00.187000

2 posts

Appsmith is a platform to build admin panels, internal tools, and dashboards. In versions 1.94 and below, publicly accessible apps allow unauthenticated users to execute unpublished (edit-mode) actions by sending viewMode=false (or omitting it) to POST /api/v1/actions/execute. This bypasses the expected publish boundary where public viewers should only execute published actions, not edit-mode vers

thehackerwire@mastodon.social at 2026-01-22T05:04:32.000Z ##

🔴 CVE-2026-24042 - Critical (9.4)

Appsmith is a platform to build admin panels, internal tools, and dashboards. In versions 1.94 and below, publicly accessible apps allow unauthenticated users to execute unpublished (edit-mode) actions by sending viewMode=false (or omitting it) to...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T05:04:32.000Z ##

🔴 CVE-2026-24042 - Critical (9.4)

Appsmith is a platform to build admin panels, internal tools, and dashboards. In versions 1.94 and below, publicly accessible apps allow unauthenticated users to execute unpublished (edit-mode) actions by sending viewMode=false (or omitting it) to...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-27380
(7.6 HIGH)

EPSS: 0.03%

updated 2026-01-22T03:31:34

2 posts

HTML injection in Project Release in Altium Enterprise Server (AES) 7.0.3 on all platforms allows an authenticated attacker to execute arbitrary JavaScript in the victim’s browser via crafted HTML content.

thehackerwire@mastodon.social at 2026-01-22T03:00:34.000Z ##

🟠 CVE-2025-27380 - High (7.6)

HTML injection in Project Release in Altium Enterprise Server (AES) 7.0.3 on all platforms allows an authenticated attacker to execute arbitrary JavaScript in the victim’s browser via crafted HTML content.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T03:00:34.000Z ##

🟠 CVE-2025-27380 - High (7.6)

HTML injection in Project Release in Altium Enterprise Server (AES) 7.0.3 on all platforms allows an authenticated attacker to execute arbitrary JavaScript in the victim’s browser via crafted HTML content.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24002
(9.0 CRITICAL)

EPSS: 0.05%

updated 2026-01-22T03:15:47.777000

2 posts

Grist is spreadsheet software using Python as its formula language. Grist offers several methods for running those formulas in a sandbox, for cases where the user may be working with untrusted spreadsheets. One such method runs them in pyodide, but pyodide on node does not have a useful sandbox barrier. If a user of Grist sets `GRIST_SANDBOX_FLAVOR` to `pyodide` and opens a malicious document, tha

thehackerwire@mastodon.social at 2026-01-22T04:04:53.000Z ##

🔴 CVE-2026-24002 - Critical (9)

Grist is spreadsheet software using Python as its formula language. Grist offers several methods for running those formulas in a sandbox, for cases where the user may be working with untrusted spreadsheets. One such method runs them in pyodide, bu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T04:04:53.000Z ##

🔴 CVE-2026-24002 - Critical (9)

Grist is spreadsheet software using Python as its formula language. Grist offers several methods for running those formulas in a sandbox, for cases where the user may be working with untrusted spreadsheets. One such method runs them in pyodide, bu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23967
(7.5 HIGH)

EPSS: 0.01%

updated 2026-01-22T03:15:47.167000

4 posts

sm-crypto provides JavaScript implementations of the Chinese cryptographic algorithms SM2, SM3, and SM4. A signature malleability vulnerability exists in the SM2 signature verification logic of the sm-crypto library prior to version 0.3.14. An attacker can derive a new valid signature for a previously signed message from an existing signature. Version 0.3.14 patches the issue.

thehackerwire@mastodon.social at 2026-01-22T04:04:30.000Z ##

🟠 CVE-2026-23967 - High (7.5)

sm-crypto provides JavaScript implementations of the Chinese cryptographic algorithms SM2, SM3, and SM4. A signature malleability vulnerability exists in the SM2 signature verification logic of the sm-crypto library prior to version 0.3.14. An att...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T04:03:27.000Z ##

🟠 CVE-2026-23967 - High (7.5)

sm-crypto provides JavaScript implementations of the Chinese cryptographic algorithms SM2, SM3, and SM4. A signature malleability vulnerability exists in the SM2 signature verification logic of the sm-crypto library prior to version 0.3.14. An att...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T04:04:30.000Z ##

🟠 CVE-2026-23967 - High (7.5)

sm-crypto provides JavaScript implementations of the Chinese cryptographic algorithms SM2, SM3, and SM4. A signature malleability vulnerability exists in the SM2 signature verification logic of the sm-crypto library prior to version 0.3.14. An att...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T04:03:27.000Z ##

🟠 CVE-2026-23967 - High (7.5)

sm-crypto provides JavaScript implementations of the Chinese cryptographic algorithms SM2, SM3, and SM4. A signature malleability vulnerability exists in the SM2 signature verification logic of the sm-crypto library prior to version 0.3.14. An att...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23957
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-22T02:15:52.470000

2 posts

seroval facilitates JS value stringification, including complex structures beyond JSON.stringify capabilities. In versions 1.4.0 and below, overriding encoded array lengths by replacing them with an excessively large value causes the deserialization process to significantly increase processing time. This issue has been fixed in version 1.4.1.

thehackerwire@mastodon.social at 2026-01-22T03:00:25.000Z ##

🟠 CVE-2026-23957 - High (7.5)

seroval facilitates JS value stringification, including complex structures beyond JSON.stringify capabilities. In versions 1.4.0
and below, overriding encoded array lengths by replacing them with an excessively large value causes the deserializati...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T03:00:25.000Z ##

🟠 CVE-2026-23957 - High (7.5)

seroval facilitates JS value stringification, including complex structures beyond JSON.stringify capabilities. In versions 1.4.0
and below, overriding encoded array lengths by replacing them with an excessively large value causes the deserializati...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-27378
(8.6 HIGH)

EPSS: 0.04%

updated 2026-01-22T01:15:51.077000

2 posts

AES contains a SQL injection vulnerability due to an inactive configuration that prevents the latest SQL parsing logic from being applied. When this configuration is not enabled, crafted input may be improperly handled, allowing attackers to inject and execute arbitrary SQL queries.

thehackerwire@mastodon.social at 2026-01-22T01:25:22.000Z ##

🟠 CVE-2025-27378 - High (8.6)

AES contains a SQL injection vulnerability due to an inactive configuration that prevents the latest SQL parsing logic from being applied. When this configuration is not enabled, crafted input may be improperly handled, allowing attackers to injec...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T01:25:22.000Z ##

🟠 CVE-2025-27378 - High (8.6)

AES contains a SQL injection vulnerability due to an inactive configuration that prevents the latest SQL parsing logic from being applied. When this configuration is not enabled, crafted input may be improperly handled, allowing attackers to injec...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22022
(8.2 HIGH)

EPSS: 0.04%

updated 2026-01-21T22:56:48

1 posts

Deployments of Apache Solr 5.3.0 through 9.10.0 that rely on Solr's "Rule Based Authorization Plugin" are vulnerable to allowing unauthorized access to certain Solr APIs, due to insufficiently strict input validation in those components.  Only deployments that meet all of the following criteria are impacted by this vulnerability: * Use of Solr's "RuleBasedAuthorizationPlugin" * A RuleBasedA

thehackerwire@mastodon.social at 2026-01-21T16:22:52.000Z ##

🟠 CVE-2026-22022 - High (8.2)

Deployments of Apache Solr 5.3.0 through 9.10.0 that rely on Solr's "Rule Based Authorization Plugin" are vulnerable to allowing unauthorized access to certain Solr APIs, due to insufficiently strict input validation in those components.  Only de...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20045
(8.2 HIGH)

EPSS: 1.76%

updated 2026-01-21T21:31:31

15 posts

A vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM &amp; Presence Service (Unified CM IM&amp;P), Cisco Unity Connection, and Cisco Webex Calling Dedicated Instance could allow an unauthenticated, remote attacker&nbsp;to execute arbitrary commands on the under

1 repos

https://github.com/Ashwesker/Ashwesker-CVE-2026-20045

undercodenews@mastodon.social at 2026-01-22T17:46:38.000Z ##

Cisco Under Fire Again: Critical Zero-Day Actively Exploited Across Unified Communications Systems

A Fresh Cyberstorm Hits Cisco’s Core Enterprise Platforms Cisco is once again at the center of a high-stakes cybersecurity emergency after confirming the active exploitation of a critical zero-day vulnerability impacting its unified communications ecosystem. The flaw, now formally tracked as CVE-2026-20045, exposes some of the most widely deployed enterprise communication…

undercodenews.com/cisco-under-

##

AAKL at 2026-01-22T16:23:31.035Z ##

CISA added Cisco's critical RCE vulnerability to the KEV catalogue late yesterday.

CVE-2026-20045 Cisco Unified Communications Products Code Injection Vulnerability cisa.gov/news-events/alerts/20

More:

Computerworld: Critical Cisco UC bug actively exploited computerworld.com/article/4120

@TalosSecurity

##

threatcodex at 2026-01-22T14:51:51.173Z ##

CVE-2026-20045: Critical Zero-Day in Cisco Products Is Actively Exploited in the Wild

socprime.com/blog/cve-2026-200

##

beyondmachines1 at 2026-01-22T08:01:02.710Z ##

Cisco Patches Actively Exploited Flaw in Unified Communications Products

Cisco patched a critical remote code execution vulnerability (CVE-2026-20045) in its Unified Communications products that attackers are actively trying to exploit to gain root access. The flaw allows unauthenticated attackers to take full control of enterprise telephony and messaging infrastructure via malicious HTTP requests.

**If you are using Cisco communication platforms, read this advisory in detail. Make sure the web management interface are isolated from the internet and accessible from trusted networks only. Then plan a quick update. Because someone will find a way to reach the vulnerable interface even if it's isolated.**

beyondmachines.net/event_detai

##

undercodenews@mastodon.social at 2026-01-22T00:17:29.000Z ##

Cisco Releases Emergency Patch for Actively Exploited CVE-2026-20045 Zero-Day RCE Flaw + Video

Critical Zero-Day Exposure in Cisco Enterprise Communications Stack Cisco has released an urgent security patch addressing a critical zero-day vulnerability actively exploited in real-world attacks. The flaw, tracked as CVE-2026-20045 with a CVSS score of 8.2, allows unauthenticated remote attackers to execute arbitrary commands on affected systems. The exposure sits at the…

undercodenews.com/cisco-releas

##

undercodenews@mastodon.social at 2026-01-21T23:00:13.000Z ##

Cisco Confirms Active Exploitation of Critical Unified Communications Zero-Day (CVE-2026-20045)

Introduction: A High-Impact Cisco Flaw Moves From Theory to Reality Cisco has disclosed and patched a critical remote code execution vulnerability affecting its Unified Communications ecosystem, confirming that the flaw has already been exploited in real-world attacks. Tracked as CVE-2026-20045, the vulnerability targets core enterprise communication platforms, including…

undercodenews.com/cisco-confir

##

oversecurity@mastodon.social at 2026-01-21T22:40:07.000Z ##

Cisco fixes Unified Communications RCE zero day exploited in attacks

Cisco has fixed a critical Unified Communications and Webex Calling remote code execution vulnerability, tracked as CVE-2026-20045, that has been...

🔗️ [Bleepingcomputer] link.is.it/WDsEt3

##

AAKL@infosec.exchange at 2026-01-22T16:23:31.000Z ##

CISA added Cisco's critical RCE vulnerability to the KEV catalogue late yesterday.

CVE-2026-20045 Cisco Unified Communications Products Code Injection Vulnerability cisa.gov/news-events/alerts/20

More:

Computerworld: Critical Cisco UC bug actively exploited computerworld.com/article/4120 #infosec #Cisco #vulnerability

@TalosSecurity

##

beyondmachines1@infosec.exchange at 2026-01-22T08:01:02.000Z ##

Cisco Patches Actively Exploited Flaw in Unified Communications Products

Cisco patched a critical remote code execution vulnerability (CVE-2026-20045) in its Unified Communications products that attackers are actively trying to exploit to gain root access. The flaw allows unauthenticated attackers to take full control of enterprise telephony and messaging infrastructure via malicious HTTP requests.

**If you are using Cisco communication platforms, read this advisory in detail. Make sure the web management interface are isolated from the internet and accessible from trusted networks only. Then plan a quick update. Because someone will find a way to reach the vulnerable interface even if it's isolated.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

oversecurity@mastodon.social at 2026-01-21T22:40:07.000Z ##

Cisco fixes Unified Communications RCE zero day exploited in attacks

Cisco has fixed a critical Unified Communications and Webex Calling remote code execution vulnerability, tracked as CVE-2026-20045, that has been...

🔗️ [Bleepingcomputer] link.is.it/WDsEt3

##

DarkWebInformer@infosec.exchange at 2026-01-21T22:17:13.000Z ##

‼️Attackers Actively Probing RCE Vulnerability in Cisco Enterprise Communications Products

CVE-2026-20045: Cisco Unified Communications Products Code Injection Vulnerability

CVSS: 8.2
CISA KEV: Added today; January 21st, 2026
CVE Published: January 21st, 2026

Advisory: nvd.nist.gov/vuln/detail/CVE-2

Description: A vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM &amp; Presence Service (Unified CM IM&amp;P), Cisco Unity Connection, and Cisco Webex Calling Dedicated Instance could allow an unauthenticated, remote attacker&nbsp;to execute arbitrary commands on the underlying operating system of an affected device.&nbsp; This vulnerability is due to improper validation of user-supplied input in HTTP requests. An attacker could exploit this vulnerability by sending a sequence of crafted HTTP requests to the web-based management interface of an affected device. A successful exploit could allow the attacker to obtain user-level access to the underlying operating system and then elevate privileges to root. Note: Cisco has assigned this security advisory a Security Impact Rating (SIR) of Critical rather than High as the score indicates. The reason is that exploitation of this vulnerability could result in an attacker elevating privileges to root.

##

cisakevtracker@mastodon.social at 2026-01-21T22:01:00.000Z ##

CVE ID: CVE-2026-20045
Vendor: Cisco
Product: Unified Communications Manager
Date Added: 2026-01-21
Notes: sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

campuscodi@mastodon.social at 2026-01-21T21:43:36.000Z ##

New Cisco zero-day, CVE-2026-20045

sec.cloudapps.cisco.com/securi

##

thehackerwire@mastodon.social at 2026-01-21T17:37:55.000Z ##

🟠 CVE-2026-20045 - High (8.2)

A vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM &amp; Presence Service (Unified CM IM&amp;P), Cisco Uni...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL@infosec.exchange at 2026-01-21T17:10:43.000Z ##

Four advisories from Cisco today, one of them critical. Too bad some crows no longer follow these things. 😇

- Critical: CVE-2026-20045: Cisco Unified Communications Products Remote Code Execution Vulnerability sec.cloudapps.cisco.com/securi

- Medium severity: CVE-2026-20055 and CVE-2026-20109: Cisco Packaged Contact Center Enterprise and Cisco Unified Contact Center Enterprise Cross-Site Scripting Vulnerabilities sec.cloudapps.cisco.com/securi

- Medium severity: CVE-2026-20092: Cisco Intersight Virtual Appliance Privilege Escalation Vulnerability sec.cloudapps.cisco.com/securi

- Medium severity: CVE-2026-20080: Cisco IEC6400 Wireless Backhaul Edge Compute Software SSH Denial of Service Vulnerability sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco #infosec #vulnerability

##

CVE-2026-22792
(9.6 CRITICAL)

EPSS: 0.12%

updated 2026-01-21T21:16:09.957000

1 posts

5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. Prior to version 0.15.3, an unsafe HTML rendering permits untrusted HTML (including on* event attributes) to execute in the renderer context. An attacker can inject an `<img onerror=...>` payload to run arbitrary JavaScript in the renderer, which can call exposed bridge APIs such as `window.bridge

thehackerwire@mastodon.social at 2026-01-21T21:52:03.000Z ##

🔴 CVE-2026-22792 - Critical (9.6)

5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. Prior to version 0.15.3, an unsafe HTML rendering permits untrusted HTML (including on* event attributes) to execute in the renderer context. An ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-59465
(7.5 HIGH)

EPSS: 0.05%

updated 2026-01-21T21:16:07.270000

1 posts

A malformed `HTTP/2 HEADERS` frame with oversized, invalid `HPACK` data can cause Node.js to crash by triggering an unhandled `TLSSocket` error `ECONNRESET`. Instead of safely closing the connection, the process crashes, enabling a remote denial of service. This primarily affects applications that do not attach explicit error handlers to secure sockets, for example: ``` server.on('secureConnection

thehackerwire@mastodon.social at 2026-01-20T21:45:26.000Z ##

🟠 CVE-2025-59465 - High (7.5)

A malformed `HTTP/2 HEADERS` frame with oversized, invalid `HPACK` data can cause Node.js to crash by triggering an unhandled `TLSSocket` error `ECONNRESET`. Instead of safely closing the connection, the process crashes, enabling a remote denial o...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-13878
(7.5 HIGH)

EPSS: 0.03%

updated 2026-01-21T19:16:02.960000

3 posts

Malformed BRID/HHIT records can cause `named` to terminate unexpectedly. This issue affects BIND 9 versions 9.18.40 through 9.18.43, 9.20.13 through 9.20.17, 9.21.12 through 9.21.16, 9.18.40-S1 through 9.18.43-S1, and 9.20.13-S1 through 9.20.17-S1.

linux@activitypub.awakari.com at 2026-01-22T20:08:13.000Z ## Debian Oldstable BIND9 Critical Denial of Service DSA-6107-1 CVE-2025-13878 Vlatko Kosturjak discovered that BIND, a DNS server implementation, does not properly handle malformed BRID/HHIT records,...

#Debian #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

linux@activitypub.awakari.com at 2026-01-21T15:49:37.000Z ## Slackware: bind Critical DoS Issue CVE-2025-13878 2026-021-01 New bind packages are available for Slackware 15.0 and -current to fix security issues.

#Slackware #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

thehackerwire@mastodon.social at 2026-01-21T16:00:50.000Z ##

🟠 CVE-2025-13878 - High (7.5)

Malformed BRID/HHIT records can cause `named` to terminate unexpectedly.
This issue affects BIND 9 versions 9.18.40 through 9.18.43, 9.20.13 through 9.20.17, 9.21.12 through 9.21.16, 9.18.40-S1 through 9.18.43-S1, and 9.20.13-S1 through 9.20.17-S1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0629(CVSS UNKNOWN)

EPSS: 0.05%

updated 2026-01-21T18:31:35

2 posts

Authentication bypass in the password recovery feature of the local web interface across multiple VIGI camera models allows an attacker on the LAN to reset the admin password without verification by manipulating client-side state. Attackers can gain full administrative access to the device, compromising configuration and network security.

beyondmachines1@infosec.exchange at 2026-01-21T10:01:02.000Z ##

TP-Link Patches Authentication Bypass Flaw in VIGI Cameras

TP-Link fixed a high-severity authentication bypass vulnerability (CVE-2026-0629) in its VIGI camera series that allowed local attackers to reset administrative passwords. The flaw enables full device takeover and potential lateral movement within corporate networks.

**Make sure all CCTV devices are isolated from the internet and accessible from trusted networks only. Segment your surveillance cameras into a dedicated VLAN and if possible disable the password recovery feature on the local web interface. Then plan a patch cycle.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

maik@norden.social at 2026-01-20T17:22:44.000Z ##

Eine kritische Sicherheitslücke CVE-2026-0629 erlaubt es Angreifern, Admin-Zugriff auf zahlreiche #TPLink Vigi-Überwachungskameras per Fernzugriff zu erlangen. golem.de/specials/tp-link/

##

CVE-2026-20092
(6.0 MEDIUM)

EPSS: 0.01%

updated 2026-01-21T18:30:38

1 posts

A vulnerability in the read-only maintenance shell of Cisco Intersight Virtual Appliance could allow an authenticated, local attacker with administrative privileges to elevate privileges to root on the virtual appliance. This vulnerability is due to improper file permissions on configuration files for system accounts within the maintenance shell of the virtual appliance. An attacker could exploit

AAKL@infosec.exchange at 2026-01-21T17:10:43.000Z ##

Four advisories from Cisco today, one of them critical. Too bad some crows no longer follow these things. 😇

- Critical: CVE-2026-20045: Cisco Unified Communications Products Remote Code Execution Vulnerability sec.cloudapps.cisco.com/securi

- Medium severity: CVE-2026-20055 and CVE-2026-20109: Cisco Packaged Contact Center Enterprise and Cisco Unified Contact Center Enterprise Cross-Site Scripting Vulnerabilities sec.cloudapps.cisco.com/securi

- Medium severity: CVE-2026-20092: Cisco Intersight Virtual Appliance Privilege Escalation Vulnerability sec.cloudapps.cisco.com/securi

- Medium severity: CVE-2026-20080: Cisco IEC6400 Wireless Backhaul Edge Compute Software SSH Denial of Service Vulnerability sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco #infosec #vulnerability

##

CVE-2026-20109
(4.8 MEDIUM)

EPSS: 0.03%

updated 2026-01-21T18:30:38

1 posts

Multiple vulnerabilities in the web-based management interface of Cisco Packaged Contact Center Enterprise (Packaged CCE) and Cisco Unified Contact Center Enterprise (Unified CCE) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device.&nbsp; These vulnerabilities exist because the web-

AAKL@infosec.exchange at 2026-01-21T17:10:43.000Z ##

Four advisories from Cisco today, one of them critical. Too bad some crows no longer follow these things. 😇

- Critical: CVE-2026-20045: Cisco Unified Communications Products Remote Code Execution Vulnerability sec.cloudapps.cisco.com/securi

- Medium severity: CVE-2026-20055 and CVE-2026-20109: Cisco Packaged Contact Center Enterprise and Cisco Unified Contact Center Enterprise Cross-Site Scripting Vulnerabilities sec.cloudapps.cisco.com/securi

- Medium severity: CVE-2026-20092: Cisco Intersight Virtual Appliance Privilege Escalation Vulnerability sec.cloudapps.cisco.com/securi

- Medium severity: CVE-2026-20080: Cisco IEC6400 Wireless Backhaul Edge Compute Software SSH Denial of Service Vulnerability sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco #infosec #vulnerability

##

CVE-2025-70650
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-21T18:30:37

1 posts

Tenda AX-1806 v1.0.0.1 was discovered to contain a stack overflow in the deviceList parameter of the formSetMacFilterCfg function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

thehackerwire@mastodon.social at 2026-01-21T16:16:52.000Z ##

🟠 CVE-2025-70650 - High (7.5)

Tenda AX-1806 v1.0.0.1 was discovered to contain a stack overflow in the deviceList parameter of the formSetMacFilterCfg function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70645
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-21T18:30:32

1 posts

Tenda AX-1806 v1.0.0.1 was discovered to contain a stack overflow in the deviceList parameter of the formSetWifiMacFilterCfg function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

thehackerwire@mastodon.social at 2026-01-21T16:16:42.000Z ##

🟠 CVE-2025-70645 - High (7.5)

Tenda AX-1806 v1.0.0.1 was discovered to contain a stack overflow in the deviceList parameter of the formSetWifiMacFilterCfg function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21945
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-21T18:30:29

2 posts

Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, 25.0.1; Oracle GraalVM for JDK: 17.0.17 and 21.0.9; Oracle GraalVM Enterprise Edition: 21.3.16. Easily exploitable vulnerability allows unaut

AAKL@infosec.exchange at 2026-01-21T17:38:56.000Z ##

From yesterday, relating to CVE-2026-21945. Oracle has listed this vulnerability in its latest advisory: oracle.com/security-alerts/cpu

Tenable: SSRF Vulnerability in Java TLS Handshakes Creates DoS Risk tenable.com/blog/tenable-disco @tenable #infosec #threatresearch #JavaScript #vulnerability #DDoS #Oracle

##

thehackerwire@mastodon.social at 2026-01-20T23:59:32.000Z ##

🟠 CVE-2026-21945 - High (7.5)

Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.1...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21956
(8.3 HIGH)

EPSS: 0.01%

updated 2026-01-21T18:30:29

1 posts

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significan

thehackerwire@mastodon.social at 2026-01-20T23:59:14.000Z ##

🟠 CVE-2026-21956 - High (8.2)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastru...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21955
(8.3 HIGH)

EPSS: 0.01%

updated 2026-01-21T18:30:29

1 posts

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significan

thehackerwire@mastodon.social at 2026-01-20T22:38:40.000Z ##

🟠 CVE-2026-21955 - High (8.2)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastru...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20080
(5.3 MEDIUM)

EPSS: 0.10%

updated 2026-01-21T17:16:08.410000

1 posts

A vulnerability in the SSH service of Cisco IEC6400 Wireless Backhaul Edge Compute Software could allow an unauthenticated, remote attacker to cause the SSH service to stop responding. This vulnerability exists because the SSH service lacks effective flood protection. An attacker could exploit this vulnerability by initiating a denial of service (DoS) attack against the SSH port. A successful e

AAKL@infosec.exchange at 2026-01-21T17:10:43.000Z ##

Four advisories from Cisco today, one of them critical. Too bad some crows no longer follow these things. 😇

- Critical: CVE-2026-20045: Cisco Unified Communications Products Remote Code Execution Vulnerability sec.cloudapps.cisco.com/securi

- Medium severity: CVE-2026-20055 and CVE-2026-20109: Cisco Packaged Contact Center Enterprise and Cisco Unified Contact Center Enterprise Cross-Site Scripting Vulnerabilities sec.cloudapps.cisco.com/securi

- Medium severity: CVE-2026-20092: Cisco Intersight Virtual Appliance Privilege Escalation Vulnerability sec.cloudapps.cisco.com/securi

- Medium severity: CVE-2026-20080: Cisco IEC6400 Wireless Backhaul Edge Compute Software SSH Denial of Service Vulnerability sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco #infosec #vulnerability

##

CVE-2026-20055
(4.8 MEDIUM)

EPSS: 0.03%

updated 2026-01-21T17:16:08.253000

1 posts

Multiple vulnerabilities in the web-based management interface of Cisco Packaged Contact Center Enterprise (Packaged CCE) and Cisco Unified Contact Center Enterprise (Unified CCE) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device.&nbsp; These vulnerabilities exist because the we

AAKL@infosec.exchange at 2026-01-21T17:10:43.000Z ##

Four advisories from Cisco today, one of them critical. Too bad some crows no longer follow these things. 😇

- Critical: CVE-2026-20045: Cisco Unified Communications Products Remote Code Execution Vulnerability sec.cloudapps.cisco.com/securi

- Medium severity: CVE-2026-20055 and CVE-2026-20109: Cisco Packaged Contact Center Enterprise and Cisco Unified Contact Center Enterprise Cross-Site Scripting Vulnerabilities sec.cloudapps.cisco.com/securi

- Medium severity: CVE-2026-20092: Cisco Intersight Virtual Appliance Privilege Escalation Vulnerability sec.cloudapps.cisco.com/securi

- Medium severity: CVE-2026-20080: Cisco IEC6400 Wireless Backhaul Edge Compute Software SSH Denial of Service Vulnerability sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco #infosec #vulnerability

##

CVE-2025-66692
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-21T17:16:06.450000

1 posts

A buffer over-read in the PublicKey::verify() method of Binance - Trust Wallet Core before commit 5668c67 allows attackers to cause a Denial of Service (DoS) via a crafted input.

thehackerwire@mastodon.social at 2026-01-21T17:38:04.000Z ##

🟠 CVE-2025-66692 - High (7.5)

A buffer over-read in the PublicKey::verify() method of Binance - Trust Wallet Core before commit 5668c67 allows attackers to cause a Denial of Service (DoS) via a crafted input.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-65482
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-01-21T16:56:56

1 posts

An XML External Entity (XXE) vulnerability in opensagres XDocReport v0.9.2 to v2.0.3 allows attackers to execute arbitrary code via uploading a crafted .docx file.

1 repos

https://github.com/AT190510-Cuong/CVE-2025-65482-XXE-

thehackerwire@mastodon.social at 2026-01-21T16:25:20.000Z ##

🔴 CVE-2025-65482 - Critical (9.8)

An XML External Entity (XXE) vulnerability in opensagres XDocReport v0.9.2 to v2.0.3 allows attackers to execute arbitrary code via uploading a crafted .docx file.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21957
(7.5 HIGH)

EPSS: 0.01%

updated 2026-01-21T16:16:09.647000

1 posts

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may signific

thehackerwire@mastodon.social at 2026-01-20T23:59:23.000Z ##

🟠 CVE-2026-21957 - High (7.5)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrast...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70651
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-21T16:16:07.657000

1 posts

Tenda AX-1803 v1.0.0.1 was discovered to contain a stack overflow in the ssid parameter of the form_fast_setting_wifi_set function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

thehackerwire@mastodon.social at 2026-01-21T16:17:02.000Z ##

🟠 CVE-2025-70651 - High (7.5)

Tenda AX-1803 v1.0.0.1 was discovered to contain a stack overflow in the ssid parameter of the form_fast_setting_wifi_set function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-57156
(7.5 HIGH)

EPSS: 0.10%

updated 2026-01-21T15:32:23

1 posts

NULL pointer dereference in the dacp_reply_playqueueedit_clear function in src/httpd_dacp.c in owntone-server through commit 6d604a1 (newer commit after version 28.12) allows remote attackers to cause a Denial of Service (crash).

thehackerwire@mastodon.social at 2026-01-21T16:23:10.000Z ##

🟠 CVE-2025-57156 - High (7.5)

NULL pointer dereference in the dacp_reply_playqueueedit_clear function in src/httpd_dacp.c in owntone-server through commit 6d604a1 (newer commit after version 28.12) allows remote attackers to cause a Denial of Service (crash).

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-63648
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-21T15:32:22

1 posts

A NULL pointer dereference in the dacp_reply_playqueueedit_move function (src/httpd_dacp.c) of owntone-server commit b7e385f allows attackers to cause a Denial of Service (DoS) via sending a crafted DACP request to the server.

thehackerwire@mastodon.social at 2026-01-21T16:13:39.000Z ##

🟠 CVE-2025-63648 - High (7.5)

A NULL pointer dereference in the dacp_reply_playqueueedit_move function (src/httpd_dacp.c) of owntone-server commit b7e385f allows attackers to cause a Denial of Service (DoS) via sending a crafted DACP request to the server.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-63647
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-21T15:32:22

1 posts

A NULL pointer dereference in the parse_meta function (src/httpd_daap.c) of owntone-server commit 334beb allows attackers to cause a Denial of Service (DoS) via sending a crafted DAAP request to the server.

thehackerwire@mastodon.social at 2026-01-21T16:13:30.000Z ##

🟠 CVE-2025-63647 - High (7.5)

A NULL pointer dereference in the parse_meta function (src/httpd_daap.c) of owntone-server commit 334beb allows attackers to cause a Denial of Service (DoS) via sending a crafted DAAP request to the server.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21940
(7.5 HIGH)

EPSS: 0.03%

updated 2026-01-21T15:32:22

1 posts

Vulnerability in the Oracle Agile PLM product of Oracle Supply Chain (component: User and User Group). The supported version that is affected is 9.3.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Agile PLM. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all

thehackerwire@mastodon.social at 2026-01-21T01:31:15.000Z ##

🟠 CVE-2026-21940 - High (7.5)

Vulnerability in the Oracle Agile PLM product of Oracle Supply Chain (component: User and User Group). The supported version that is affected is 9.3.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21982
(7.5 HIGH)

EPSS: 0.02%

updated 2026-01-21T15:32:22

1 posts

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Difficult to exploit vulnerability allows unauthenticated attacker with access to the physical communication segment attached to the hardware where the Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this

thehackerwire@mastodon.social at 2026-01-20T22:29:45.000Z ##

🟠 CVE-2026-21982 - High (7.5)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Difficult to exploit vulnerability allows unauthenticated attacker with access to the physic...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-57155
(7.5 HIGH)

EPSS: 0.11%

updated 2026-01-21T15:32:17

1 posts

NULL pointer dereference in the daap_reply_groups function in src/httpd_daap.c in owntone-server through commit 5e6f19a (newer commit after version 28.2) allows remote attackers to cause a Denial of Service.

thehackerwire@mastodon.social at 2026-01-21T16:23:01.000Z ##

🟠 CVE-2025-57155 - High (7.5)

NULL pointer dereference in the daap_reply_groups function in src/httpd_daap.c in owntone-server through commit 5e6f19a (newer commit after version 28.2) allows remote attackers to cause a Denial of Service.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21983
(7.6 HIGH)

EPSS: 0.01%

updated 2026-01-21T15:31:16

1 posts

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may signific

thehackerwire@mastodon.social at 2026-01-20T22:29:54.000Z ##

🟠 CVE-2026-21983 - High (7.5)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrast...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21984
(7.5 HIGH)

EPSS: 0.01%

updated 2026-01-21T15:16:09.493000

1 posts

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may signific

thehackerwire@mastodon.social at 2026-01-20T22:37:25.000Z ##

🟠 CVE-2026-21984 - High (7.5)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrast...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-66902
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-21T15:16:07.890000

1 posts

An input validation issue in in Pithikos websocket-server v.0.6.4 allows a remote attacker to obtain sensitive information or cause unexpected server behavior via the websocket_server/websocket_server.py, WebSocketServer._message_received components.

thehackerwire@mastodon.social at 2026-01-21T16:13:49.000Z ##

🟠 CVE-2025-66902 - High (7.5)

An input validation issue in in Pithikos websocket-server v.0.6.4 allows a remote attacker to obtain sensitive information or cause unexpected server behavior via the websocket_server/websocket_server.py, WebSocketServer._message_received components.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-64087
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-01-21T15:16:07.473000

1 posts

A Server-Side Template Injection (SSTI) vulnerability in the FreeMarker component of opensagres XDocReport v1.0.0 to v2.1.0 allows attackers to execute arbitrary code via injecting crafted template expressions.

1 repos

https://github.com/AT190510-Cuong/CVE-2025-64087-SSTI-

thehackerwire@mastodon.social at 2026-01-21T16:25:11.000Z ##

🔴 CVE-2025-64087 - Critical (9.8)

A Server-Side Template Injection (SSTI) vulnerability in the FreeMarker component of opensagres XDocReport v1.0.0 to v2.1.0 allows attackers to execute arbitrary code via injecting crafted template expressions.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-56353
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-21T15:16:06.640000

1 posts

In tinyMQTT commit 6226ade15bd4f97be2d196352e64dd10937c1962 (2024-02-18), a memory leak occurs due to the broker's failure to validate or reject malformed UTF-8 strings in topic filters. An attacker can exploit this by sending repeated subscription requests with arbitrarily large or invalid filter payloads. Each request causes memory to be allocated for the malformed topic filter, but the broker d

thehackerwire@mastodon.social at 2026-01-21T16:36:44.000Z ##

🟠 CVE-2025-56353 - High (7.5)

In tinyMQTT commit 6226ade15bd4f97be2d196352e64dd10937c1962 (2024-02-18), a memory leak occurs due to the broker's failure to validate or reject malformed UTF-8 strings in topic filters. An attacker can exploit this by sending repeated subscriptio...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-55423
(9.8 CRITICAL)

EPSS: 0.19%

updated 2026-01-21T15:16:06.457000

1 posts

A command injection vulnerability exists in the upnp_relay() function in multiple ipTIME router models because the controlURL value used to pass port-forwarding information to an upper router is passed to system() without proper validation or sanitization, allowing OS command injection.

thehackerwire@mastodon.social at 2026-01-21T16:25:01.000Z ##

🔴 CVE-2025-55423 - Critical (9.8)

A command injection vulnerability exists in the upnp_relay() function in multiple ipTIME router models because the controlURL value used to pass port-forwarding information to an upper router is passed to system() without proper validation or sani...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22812
(8.8 HIGH)

EPSS: 0.02%

updated 2026-01-21T15:14:59.607000

1 posts

OpenCode is an open source AI coding agent. Prior to 1.0.216, OpenCode automatically starts an unauthenticated HTTP server that allows any local process (or any website via permissive CORS) to execute arbitrary shell commands with the user's privileges. This vulnerability is fixed in 1.0.216.

7 repos

https://github.com/rohmatariow/CVE-2026-22812-exploit

https://github.com/Udyz/CVE-2026-22812-Exp

https://github.com/mad12wader/CVE-2026-22812

https://github.com/barrersoftware/opencode-secure

https://github.com/CayberMods/CVE-2026-22812-POC

https://github.com/0xgh057r3c0n/CVE-2026-22812

https://github.com/Ashwesker/Ashwesker-CVE-2026-22812

DarkWebInformer@infosec.exchange at 2026-01-17T00:42:45.000Z ##

‼️CVE-2026-22812: OpenCode's Unauthenticated HTTP Server Allows Arbitrary Command Execution

PoC/Exploit: github.com/rohmatariow/CVE-202

CVSS: 8.8
CVE Published: January 12th, 2026
Exploit Published: January 16th, 2026
Advisory: github.com/anomalyco/opencode/

OpenCode is an open source AI coding agent. Prior to 1.0.216, OpenCode automatically starts an unauthenticated HTTP server that allows any local process (or any website via permissive CORS) to execute arbitrary shell commands with the user's privileges. This vulnerability is fixed in 1.0.216.

##

CVE-2026-23885
(6.4 MEDIUM)

EPSS: 0.02%

updated 2026-01-21T14:55:34

2 posts

### Summary A vulnerability was discovered during a manual security audit of the AlchemyCMS source code. The application uses the Ruby `eval()` function to dynamically execute a string provided by the `resource_handler.engine_name` attribute in `Alchemy::ResourcesHelper#resource_url_proxy`. ### Details The vulnerability exists in `app/helpers/alchemy/resources_helper.rb` at line 28. The code expl

1 repos

https://github.com/TheDeepOpc/CVE-2026-23885

DarkWebInformer at 2026-01-22T16:07:19.356Z ##

‼️CVE-2026-23885: AlchemyCMS has Authenticated Remote Code Execution (RCE) via eval injection in ResourcesHelper

CVSS: 6.4
CVE Published: January 19th, 2026

Advisory/Exploit/PoC: github.com/advisories/GHSA-276

Description: Alchemy is an open source content management system engine written in Ruby on Rails. Prior to versions 7.4.12 and 8.0.3, the application uses the Ruby `eval()` function to dynamically execute a string provided by the `resource_handler.engine_name` attribute in `Alchemy::ResourcesHelper#resource_url_proxy`. The vulnerability exists in `app/helpers/alchemy/resources_helper.rb` at line 28. The code explicitly bypasses security linting with `# rubocop:disable Security/Eval`, indicating that the use of a dangerous function was known but not properly mitigated. Since `engine_name` is sourced from module definitions that can be influenced by administrative configurations, it allows an authenticated attacker to escape the Ruby sandbox and execute arbitrary system commands on the host OS. Versions 7.4.12 and 8.0.3 fix the issue by replacing `eval()` with `send()`.

##

DarkWebInformer@infosec.exchange at 2026-01-22T16:07:19.000Z ##

‼️CVE-2026-23885: AlchemyCMS has Authenticated Remote Code Execution (RCE) via eval injection in ResourcesHelper

CVSS: 6.4
CVE Published: January 19th, 2026

Advisory/Exploit/PoC: github.com/advisories/GHSA-276

Description: Alchemy is an open source content management system engine written in Ruby on Rails. Prior to versions 7.4.12 and 8.0.3, the application uses the Ruby `eval()` function to dynamically execute a string provided by the `resource_handler.engine_name` attribute in `Alchemy::ResourcesHelper#resource_url_proxy`. The vulnerability exists in `app/helpers/alchemy/resources_helper.rb` at line 28. The code explicitly bypasses security linting with `# rubocop:disable Security/Eval`, indicating that the use of a dangerous function was known but not properly mitigated. Since `engine_name` is sourced from module definitions that can be influenced by administrative configurations, it allows an authenticated attacker to escape the Ruby sandbox and execute arbitrary system commands on the host OS. Versions 7.4.12 and 8.0.3 fix the issue by replacing `eval()` with `send()`.

##

CVE-2025-60021
(9.8 CRITICAL)

EPSS: 0.67%

updated 2026-01-21T13:46:39.423000

1 posts

Remote command injection vulnerability in heap profiler builtin service in Apache bRPC ((all versions < 1.15.0)) on all platforms allows attacker to inject remote command. Root Cause: The bRPC heap profiler built-in service (/pprof/heap) does not validate the user-provided extra_options parameter and executes it as a command-line argument. Attackers can execute remote commands using the extra_o

3 repos

https://github.com/Mkway/CVE-2025-60021

https://github.com/Ashwesker/Ashwesker-CVE-2025-60021

https://github.com/ninjazan420/CVE-2025-60021-PoC-Apache-bRPC-Heap-Profiler-Command-Injection

beyondmachines1@infosec.exchange at 2026-01-19T20:01:02.000Z ##

Apache bRPC Critical Remote Command Injection Vulnerability

Apache bRPC versions prior to 1.15.0 contain a critical remote command injection vulnerability (CVE-2025-60021) in the heap profiler service. Attackers can exploit unvalidated input in the extra_options parameter to execute arbitrary commands and gain full system control.

**If you are using Apache bRPC, make sure all bRPC instances are isolated from the internet and accessible from trusted networks only. Disable the heap profiler service to prevent attackers from running remote commands on your servers and plan a quick upgrade to version 1.15.0.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-24016
(7.8 HIGH)

EPSS: 0.01%

updated 2026-01-21T09:31:40

1 posts

The installer of ServerView Agents for Windows provided by Fsas Technologies Inc. may insecurely load Dynamic Link Libraries. Arbitrary code may be executed with the administrator privilege when the installer is executed.

thehackerwire@mastodon.social at 2026-01-21T08:25:00.000Z ##

🟠 CVE-2026-24016 - High (7.8)

The installer of ServerView Agents for Windows provided by Fsas Technologies Inc. may insecurely load Dynamic Link Libraries. Arbitrary code may be executed with the administrator privilege when the installer is executed.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-15521
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-01-21T02:15:48.363000

1 posts

The Academy LMS – WordPress LMS Plugin for Complete eLearning Solution plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.5.0. This is due to the plugin not properly validating a user's identity prior to updating their password and relying solely on a publicly-exposed nonce for authorization. This makes it possible for unauthenti

thehackerwire@mastodon.social at 2026-01-21T02:19:11.000Z ##

🔴 CVE-2025-15521 - Critical (9.8)

The Academy LMS – WordPress LMS Plugin for Complete eLearning Solution plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.5.0. This is due to the plugin not properly validating...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22219(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-01-21T01:07:03

3 posts

Chainlit versions prior to 2.9.4 contain a server-side request forgery (SSRF) vulnerability in the /project/element update flow when configured with the SQLAlchemy data layer backend. An authenticated client can provide a user-controlled url value in an Element, which is fetched by the SQLAlchemy element creation logic using an outbound HTTP GET request. This allows an attacker to make arbitrary H

undercodenews@mastodon.social at 2026-01-22T01:06:40.000Z ##

Critical Chainlit AI Vulnerabilities Put Servers and Sensitive Data at Risk

In a troubling development for the AI and cybersecurity communities, two critical vulnerabilities—CVE-2026-22218 and CVE-2026-22219—have been discovered in the Chainlit AI framework. These flaws allow attackers to access sensitive environment variables and perform server-side request forgery (SSRF) attacks, which could potentially lead to full system takeovers. As AI frameworks become…

undercodenews.com/critical-cha

##

beyondmachines1@infosec.exchange at 2026-01-21T09:01:02.000Z ##

Vulnerabilities in Chainlit AI Framework Expose Data and Cloud Environments

Chainlit patched two vulnerabilities, CVE-2026-22218 and CVE-2026-22219, which allow attackers to steal sensitive files, leak private user conversations, and gain unauthorized access to cloud environments.

**Ensure all AI application frameworks are isolated from the internet and accessible only through trusted networks. If you are using Chainlit, plan an update to version 2.9.4 or later. In the meantime, isolate and control PUT requests to the /project/element endpoint.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

AAKL@infosec.exchange at 2026-01-20T17:04:40.000Z ##

New. Tracked as CVE-2026-22218 and CVE-2026-22219.

Zafran Research: ChainLeak: Critical AI framework vulnerabilities expose data, enable cloud takeover zafran.io/resources/chainleak-

More:

Infosecurity-Magazine: Chainlit Security Flaws Highlight Infrastructure Risks in AI Apps infosecurity-magazine.com/news #infosec #opensource #Python #vulnerability

##

CVE-2026-21973
(8.1 HIGH)

EPSS: 0.03%

updated 2026-01-21T00:31:51

1 posts

Vulnerability in the Oracle FLEXCUBE Investor Servicing product of Oracle Financial Services Applications (component: Security Management System). Supported versions that are affected are 14.5.0.15.0, 14.7.0.8.0 and 14.8.0.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Investor Servicing. Successful attacks of this

thehackerwire@mastodon.social at 2026-01-20T22:37:34.000Z ##

🟠 CVE-2026-21973 - High (8.1)

Vulnerability in the Oracle FLEXCUBE Investor Servicing product of Oracle Financial Services Applications (component: Security Management System). Supported versions that are affected are 14.5.0.15.0, 14.7.0.8.0 and 14.8.0.1.0. Easily exploitabl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21989
(8.1 HIGH)

EPSS: 0.01%

updated 2026-01-21T00:31:51

2 posts

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significan

thehackerwire@mastodon.social at 2026-01-20T22:31:08.000Z ##

🟠 CVE-2026-21989 - High (8.1)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastru...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-20T22:29:24.000Z ##

🟠 CVE-2026-21989 - High (8.1)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastru...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21988
(8.3 HIGH)

EPSS: 0.01%

updated 2026-01-21T00:31:51

2 posts

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significan

thehackerwire@mastodon.social at 2026-01-20T22:30:58.000Z ##

🟠 CVE-2026-21988 - High (8.2)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastru...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-20T22:29:13.000Z ##

🟠 CVE-2026-21988 - High (8.2)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastru...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21969
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-01-21T00:31:50

1 posts

Vulnerability in the Oracle Agile Product Lifecycle Management for Process product of Oracle Supply Chain (component: Supplier Portal). The supported version that is affected is 6.2.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Agile Product Lifecycle Management for Process. Successful attacks of this vulnerability can resu

thehackerwire@mastodon.social at 2026-01-20T22:38:30.000Z ##

🔴 CVE-2026-21969 - Critical (9.8)

Vulnerability in the Oracle Agile Product Lifecycle Management for Process product of Oracle Supply Chain (component: Supplier Portal). The supported version that is affected is 6.2.4. Easily exploitable vulnerability allows unauthenticated atta...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21926
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-21T00:31:49

1 posts

Vulnerability in the Siebel CRM Deployment product of Oracle Siebel CRM (component: Server Infrastructure). Supported versions that are affected are 17.0-25.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via TLS to compromise Siebel CRM Deployment. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently re

thehackerwire@mastodon.social at 2026-01-21T01:31:25.000Z ##

🟠 CVE-2026-21926 - High (7.5)

Vulnerability in the Siebel CRM Deployment product of Oracle Siebel CRM (component: Server Infrastructure). Supported versions that are affected are 17.0-25.2. Easily exploitable vulnerability allows unauthenticated attacker with network access v...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21990
(8.2 HIGH)

EPSS: 0.01%

updated 2026-01-20T22:16:02.590000

1 posts

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significan

thehackerwire@mastodon.social at 2026-01-20T22:29:35.000Z ##

🟠 CVE-2026-21990 - High (8.2)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastru...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21987
(8.2 HIGH)

EPSS: 0.01%

updated 2026-01-20T22:16:02.237000

2 posts

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significan

thehackerwire@mastodon.social at 2026-01-20T22:30:47.000Z ##

🟠 CVE-2026-21987 - High (8.2)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastru...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-20T22:29:03.000Z ##

🟠 CVE-2026-21987 - High (8.2)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastru...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21967
(8.6 HIGH)

EPSS: 0.04%

updated 2026-01-20T22:15:59.733000

1 posts

Vulnerability in the Oracle Hospitality OPERA 5 product of Oracle Hospitality Applications (component: Opera Servlet). Supported versions that are affected are 5.6.19.23, 5.6.25.17, 5.6.26.10 and 5.6.27.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality OPERA 5. Successful attacks of this vulnerability can result in

thehackerwire@mastodon.social at 2026-01-20T22:38:21.000Z ##

🟠 CVE-2026-21967 - High (8.6)

Vulnerability in the Oracle Hospitality OPERA 5 product of Oracle Hospitality Applications (component: Opera Servlet). Supported versions that are affected are 5.6.19.23, 5.6.25.17, 5.6.26.10 and 5.6.27.4. Easily exploitable vulnerability allows...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0905
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-01-20T22:15:52.923000

1 posts

Insufficient policy enforcement in Network in Google Chrome prior to 144.0.7559.59 allowed an attack who obtained a network log file to potentially obtain potentially sensitive information via a network log file. (Chromium security severity: Medium)

thehackerwire@mastodon.social at 2026-01-21T01:46:08.000Z ##

🔴 CVE-2026-0905 - Critical (9.8)

Insufficient policy enforcement in Network in Google Chrome prior to 144.0.7559.59 allowed an attack who obtained a network log file to potentially obtain potentially sensitive information via a network log file. (Chromium security severity: Medium)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-56005
(9.8 CRITICAL)

EPSS: 0.29%

updated 2026-01-20T21:31:41

1 posts

An undocumented and unsafe feature in the PLY (Python Lex-Yacc) library 3.11 allows Remote Code Execution (RCE) via the `picklefile` parameter in the `yacc()` function. This parameter accepts a `.pkl` file that is deserialized with `pickle.load()` without validation. Because `pickle` allows execution of embedded code via `__reduce__()`, an attacker can achieve code execution by passing a malicious

thehackerwire@mastodon.social at 2026-01-20T19:44:12.000Z ##

🔴 CVE-2025-56005 - Critical (9.8)

An undocumented and unsafe feature in the PLY (Python Lex-Yacc) library 3.11 allows Remote Code Execution (RCE) via the `picklefile` parameter in the `yacc()` function. This parameter accepts a `.pkl` file that is deserialized with `pickle.load()`...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22218
(0 None)

EPSS: 0.03%

updated 2026-01-20T19:15:50.700000

3 posts

Chainlit versions prior to 2.9.4 contain an arbitrary file read vulnerability in the /project/element update flow. An authenticated client can send a custom Element with a user-controlled path value, causing the server to copy the referenced file into the attacker’s session. The resulting element identifier (chainlitKey) can then be used to retrieve the file contents via /project/file/<chainlitKey

undercodenews@mastodon.social at 2026-01-22T01:06:40.000Z ##

Critical Chainlit AI Vulnerabilities Put Servers and Sensitive Data at Risk

In a troubling development for the AI and cybersecurity communities, two critical vulnerabilities—CVE-2026-22218 and CVE-2026-22219—have been discovered in the Chainlit AI framework. These flaws allow attackers to access sensitive environment variables and perform server-side request forgery (SSRF) attacks, which could potentially lead to full system takeovers. As AI frameworks become…

undercodenews.com/critical-cha

##

beyondmachines1@infosec.exchange at 2026-01-21T09:01:02.000Z ##

Vulnerabilities in Chainlit AI Framework Expose Data and Cloud Environments

Chainlit patched two vulnerabilities, CVE-2026-22218 and CVE-2026-22219, which allow attackers to steal sensitive files, leak private user conversations, and gain unauthorized access to cloud environments.

**Ensure all AI application frameworks are isolated from the internet and accessible only through trusted networks. If you are using Chainlit, plan an update to version 2.9.4 or later. In the meantime, isolate and control PUT requests to the /project/element endpoint.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

AAKL@infosec.exchange at 2026-01-20T17:04:40.000Z ##

New. Tracked as CVE-2026-22218 and CVE-2026-22219.

Zafran Research: ChainLeak: Critical AI framework vulnerabilities expose data, enable cloud takeover zafran.io/resources/chainleak-

More:

Infosecurity-Magazine: Chainlit Security Flaws Highlight Infrastructure Risks in AI Apps infosecurity-magazine.com/news #infosec #opensource #Python #vulnerability

##

CVE-2025-71020
(7.5 HIGH)

EPSS: 0.05%

updated 2026-01-20T18:33:03

1 posts

Tenda AX-1806 v1.0.0.1 was discovered to contain a stack overflow in the security parameter of the sub_4C408 function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

thehackerwire@mastodon.social at 2026-01-20T21:45:48.000Z ##

🟠 CVE-2025-71020 - High (7.5)

Tenda AX-1806 v1.0.0.1 was discovered to contain a stack overflow in the security parameter of the sub_4C408 function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0610
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-01-20T18:33:03

1 posts

SQL Injection vulnerability in remote-sessions in Devolutions Server.This issue affects Devolutions Server 2025.3.1 through 2025.3.12

thehackerwire@mastodon.social at 2026-01-20T17:35:47.000Z ##

🔴 CVE-2026-0610 - Critical (9.8)

SQL Injection vulnerability in remote-sessions in Devolutions Server.This issue affects Devolutions Server 2025.3.1 through 2025.3.12

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33231
(6.7 MEDIUM)

EPSS: 0.01%

updated 2026-01-20T18:32:08

1 posts

NVIDIA Nsight Systems for Windows contains a vulnerability in the application’s DLL loading mechanism where an attacker could cause an uncontrolled search path element by exploiting insecure DLL search paths. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service and information disclosure.

AAKL@infosec.exchange at 2026-01-20T18:13:15.000Z ##

Nvidia has posted two high-severity advisories:

Update: NVIDIA CUDA Toolkit - January 2026, relating to CVE-2025-33228, CVE-2025-33229, CVE-2025-33230, and CVE-2025-33231 nvidia.custhelp.com/app/answer

Update: NVIDIA Merlin - January 2026, relating to CVE-2025-33233 nvidia.custhelp.com/app/answer #infosec #Nvidia #vulnerability

##

CVE-2025-33230
(7.3 HIGH)

EPSS: 0.03%

updated 2026-01-20T18:32:08

1 posts

NVIDIA Nsight Systems for Linux contains a vulnerability in the .run installer, where an attacker could cause an OS command injection by supplying a malicious string to the installation path. A successful exploit of this vulnerability might lead to escalation of privileges, code execution, data tampering, denial of service, and information disclosure.

AAKL@infosec.exchange at 2026-01-20T18:13:15.000Z ##

Nvidia has posted two high-severity advisories:

Update: NVIDIA CUDA Toolkit - January 2026, relating to CVE-2025-33228, CVE-2025-33229, CVE-2025-33230, and CVE-2025-33231 nvidia.custhelp.com/app/answer

Update: NVIDIA Merlin - January 2026, relating to CVE-2025-33233 nvidia.custhelp.com/app/answer #infosec #Nvidia #vulnerability

##

CVE-2025-33228
(7.3 HIGH)

EPSS: 0.03%

updated 2026-01-20T18:32:08

1 posts

NVIDIA Nsight Systems contains a vulnerability in the gfx_hotspot recipe, where an attacker could cause an OS command injection by supplying a malicious string to the process_nsys_rep_cli.py script if the script is invoked manually. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, and information disclosure.

AAKL@infosec.exchange at 2026-01-20T18:13:15.000Z ##

Nvidia has posted two high-severity advisories:

Update: NVIDIA CUDA Toolkit - January 2026, relating to CVE-2025-33228, CVE-2025-33229, CVE-2025-33230, and CVE-2025-33231 nvidia.custhelp.com/app/answer

Update: NVIDIA Merlin - January 2026, relating to CVE-2025-33233 nvidia.custhelp.com/app/answer #infosec #Nvidia #vulnerability

##

CVE-2026-0943
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-20T18:31:56

1 posts

HarfBuzz::Shaper versions before 0.032 for Perl contains a bundled library with a null pointer dereference vulnerability.  Versions before 0.032 contain HarfBuzz 8.4.0 or earlier bundled as hb_src.tar.gz in the source tarball, which is affected by CVE-2026-22693.

thehackerwire@mastodon.social at 2026-01-20T21:45:37.000Z ##

🟠 CVE-2026-0943 - High (7.5)

HarfBuzz::Shaper versions before 0.032 for Perl contains a bundled library with a null pointer dereference vulnerability. 

Versions before 0.032 contain HarfBuzz 8.4.0 or earlier bundled as hb_src.tar.gz in the source tarball, which is affected ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0915
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-20T18:31:56

2 posts

Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.

linux@activitypub.awakari.com at 2026-01-17T11:25:33.000Z ## CVE-2026-0915: GNU C Library Fixes A Security Issue Present Since 1996 CVE-2026-0915 was published on Friday as a security issue with the GNU C Library "glibc" for code introduced 30 years ...


Origin | Interest | Match ##

andersonc0d3@infosec.exchange at 2026-01-16T16:33:48.000Z ##

GLIBC-SA-2026-0002: getnetbyaddr and getnetbyaddr_r leak stack contents to DNS resovler (CVE-2026-0915)

sourceware.org/pipermail/libc-

##

CVE-2025-64155
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-01-20T18:31:55

3 posts

An improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet FortiSIEM 7.4.0, FortiSIEM 7.3.0 through 7.3.4, FortiSIEM 7.1.0 through 7.1.8, FortiSIEM 7.0.0 through 7.0.4, FortiSIEM 6.7.0 through 6.7.10 may allow an attacker to execute unauthorized code or commands via crafted TCP requests.

4 repos

https://github.com/Ashwesker/Ashwesker-CVE-2025-64155

https://github.com/purehate/CVE-2025-64155-hunter

https://github.com/cyberdudebivash/CYBERDUDEBIVASH-FortiSIEM-CVE-2025-64155-Scanner

https://github.com/horizon3ai/CVE-2025-64155

beyondmachines1 at 2026-01-22T15:01:02.329Z ##

Attacks Target Freshly Patched Critical Fortinet Flaws

The Fortinet command injection flaw in FortiSIEM (CVE-2025-64155) is reported to be actively exploited to gain root access.

**This became urgent. FortiSIEM is actively attacked. Patch your FortiSIEM appliances to the latest version immediately and block port 7900 from any public access.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-01-22T15:01:02.000Z ##

Attacks Target Freshly Patched Critical Fortinet Flaws

The Fortinet command injection flaw in FortiSIEM (CVE-2025-64155) is reported to be actively exploited to gain root access.

**This became urgent. FortiSIEM is actively attacked. Patch your FortiSIEM appliances to the latest version immediately and block port 7900 from any public access.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

raptor@infosec.exchange at 2026-01-16T18:15:15.000Z ##

CVE-2025-64155: Three Years of Remotely Rooting the #Fortinet #FortiSIEM

horizon3.ai/attack-research/di

##

CVE-2025-33233
(7.8 HIGH)

EPSS: 0.02%

updated 2026-01-20T18:16:02.950000

2 posts

NVIDIA Merlin Transformers4Rec for all platforms contains a vulnerability where an attacker could cause code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.

thehackerwire@mastodon.social at 2026-01-20T19:00:54.000Z ##

🟠 CVE-2025-33233 - High (7.8)

NVIDIA Merlin Transformers4Rec for all platforms contains a vulnerability where an attacker could cause code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL@infosec.exchange at 2026-01-20T18:13:15.000Z ##

Nvidia has posted two high-severity advisories:

Update: NVIDIA CUDA Toolkit - January 2026, relating to CVE-2025-33228, CVE-2025-33229, CVE-2025-33230, and CVE-2025-33231 nvidia.custhelp.com/app/answer

Update: NVIDIA Merlin - January 2026, relating to CVE-2025-33233 nvidia.custhelp.com/app/answer #infosec #Nvidia #vulnerability

##

CVE-2025-33229
(7.3 HIGH)

EPSS: 0.01%

updated 2026-01-20T18:16:02.500000

1 posts

NVIDIA Nsight Visual Studio for Windows contains a vulnerability in Nsight Monitor where an attacker can execute arbitrary code with the same privileges as the NVIDIA Nsight Visual Studio Edition Monitor application. A successful exploit of this vulnerability may lead to escalation of privileges, code execution, data tampering, denial of service, and information disclosure.

AAKL@infosec.exchange at 2026-01-20T18:13:15.000Z ##

Nvidia has posted two high-severity advisories:

Update: NVIDIA CUDA Toolkit - January 2026, relating to CVE-2025-33228, CVE-2025-33229, CVE-2025-33230, and CVE-2025-33231 nvidia.custhelp.com/app/answer

Update: NVIDIA Merlin - January 2026, relating to CVE-2025-33233 nvidia.custhelp.com/app/answer #infosec #Nvidia #vulnerability

##

CVE-2025-62582
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-01-20T16:58:23.900000

1 posts

Delta Electronics DIAView has multiple vulnerabilities.

AAKL@infosec.exchange at 2026-01-20T17:52:41.000Z ##

Tenable has updated its threat research advisories, adding one new entry (including mitigation):

Critical: CVE-2025-62581 and CVE-2025-62582: Delta Electronics DIAView Multiple Vulnerabilities tenable.com/security/research/ #infosec #vulnerability

##

CVE-2026-0899
(8.8 HIGH)

EPSS: 0.07%

updated 2026-01-20T15:33:12

1 posts

Out of bounds memory access in V8 in Google Chrome prior to 144.0.7559.59 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-01-20T17:28:56.000Z ##

🟠 CVE-2026-0899 - High (8.8)

Out of bounds memory access in V8 in Google Chrome prior to 144.0.7559.59 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22844
(9.9 CRITICAL)

EPSS: 0.29%

updated 2026-01-20T14:16:21.980000

2 posts

A Command Injection vulnerability in Zoom Node Multimedia Routers (MMRs) before version 5.2.1716.0 may allow a meeting participant to conduct remote code execution of the MMR via network access.

1 repos

https://github.com/Ashwesker/Ashwesker-CVE-2026-22844

beyondmachines1 at 2026-01-22T09:01:02.207Z ##

Zoom Patches Critical Command Injection Flaw in Node Multimedia Routers

Zoom patched a critical command injection vulnerability (CVE-2026-22844) in its Node Multimedia Routers that allowed meeting participants to execute remote code. The flaw affects hybrid and connector deployments.

**Make sure all Zoom Node devices are isolated from the internet and accessible from trusted networks only. Update your MMR modules to version 5.2.1716.0 ASAP, because even if isolated there will be a way in through compromised endpoints of users.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-01-22T09:01:02.000Z ##

Zoom Patches Critical Command Injection Flaw in Node Multimedia Routers

Zoom patched a critical command injection vulnerability (CVE-2026-22844) in its Node Multimedia Routers that allowed meeting participants to execute remote code. The flaw affects hybrid and connector deployments.

**Make sure all Zoom Node devices are isolated from the internet and accessible from trusted networks only. Update your MMR modules to version 5.2.1716.0 ASAP, because even if isolated there will be a way in through compromised endpoints of users.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-14533
(9.8 CRITICAL)

EPSS: 0.08%

updated 2026-01-20T10:16:05.583000

2 posts

The Advanced Custom Fields: Extended plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 0.9.2.1. This is due to the 'insert_user' function not restricting the roles with which a user can register. This makes it possible for unauthenticated attackers to supply the 'administrator' role during registration and gain administrator access to the site. Note:

DarkWebInformer@infosec.exchange at 2026-01-20T22:45:38.000Z ##

‼️CVE-2025-14533: The Advanced Custom Fields: Extended plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 0.9.2.1, exposing 100,000 sites.

CVSS: 9.8
CVE Published: January 20th, 2026
Bounty: $975.00

Advisory: github.com/advisories/GHSA-jm7

Writeup: wordfence.com/blog/2026/01/100

Description: The Advanced Custom Fields: Extended plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 0.9.2.1. This is due to the 'insert_user' function not restricting the roles with which a user can register. This makes it possible for unauthenticated attackers to supply the 'administrator' role during registration and gain administrator access to the site. Note: The vulnerability can only be exploited if 'role' is mapped to the custom field.

##

thehackerwire@mastodon.social at 2026-01-20T10:29:05.000Z ##

🔴 CVE-2025-14533 - Critical (9.8)

The Advanced Custom Fields: Extended plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 0.9.2.1. This is due to the 'insert_user' function not restricting the roles with which a user can register. This...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23838
(0 None)

EPSS: 0.11%

updated 2026-01-19T19:16:03.937000

1 posts

Tandoor Recipes is a recipe manager than can be installed with the Nix package manager. Starting in version 23.05 and prior to version 26.05, when using the default configuration of Tandoor Recipes, specifically using SQLite and default `MEDIA_ROOT`, the full database file may be externally accessible, potentially on the Internet. The root cause is that the NixOS module configures the working dire

CVE-2026-20960
(8.0 HIGH)

EPSS: 0.05%

updated 2026-01-17T00:30:30

1 posts

Improper authorization in Microsoft Power Apps allows an authorized attacker to execute code over a network.

AAKL@infosec.exchange at 2026-01-17T18:39:00.000Z ##

If you missed this, Microsoft posted three advisories to its security guide yesterday.

- Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability, CVE-2026-21223 msrc.microsoft.com/update-guid

- Microsoft Power Apps Remote Code Execution Vulnerability, CVE-2026-20960 msrc.microsoft.com/update-guid

- Microsoft Excel Remote Code Execution Vulnerability, CVE-2026-20950 msrc.microsoft.com/update-guid #infosec #Microsoft #Office #Chromium #Edge #vulnerability

##

CVE-2026-21223
(5.1 MEDIUM)

EPSS: 0.05%

updated 2026-01-16T22:16:25.983000

1 posts

Microsoft Edge Elevation Service exposes a privileged COM interface that inadequately validates the privileges of the calling process. A standard (non‑administrator) local user can invoke the IElevatorEdge interface method LaunchUpdateCmdElevatedAndWait, causing the service to execute privileged update commands as LocalSystem. This allows a non‑administrator to enable or disable Windows Virtualiza

AAKL@infosec.exchange at 2026-01-17T18:39:00.000Z ##

If you missed this, Microsoft posted three advisories to its security guide yesterday.

- Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability, CVE-2026-21223 msrc.microsoft.com/update-guid

- Microsoft Power Apps Remote Code Execution Vulnerability, CVE-2026-20960 msrc.microsoft.com/update-guid

- Microsoft Excel Remote Code Execution Vulnerability, CVE-2026-20950 msrc.microsoft.com/update-guid #infosec #Microsoft #Office #Chromium #Edge #vulnerability

##

CVE-2026-23744
(9.8 CRITICAL)

EPSS: 0.65%

updated 2026-01-16T21:57:11

2 posts

### Summary MCPJam inspector is the local-first development platform for MCP servers. The Latest version Versions 1.4.2 and earlier are vulnerable to remote code execution (RCE) vulnerability, which allows an attacker to send a crafted HTTP request that triggers the installation of an MCP server, leading to RCE. This vulnerability is similar to CVE-2025-49596, but more severe. While CVE-2025-4959

1 repos

https://github.com/boroeurnprach/CVE-2026-23744-PoC

DarkWebInformer at 2026-01-22T00:51:05.603Z ##

‼️CVE-2026-23744: Versions 1.4.2 and earlier of MCPJam inspector are vulnerable to remote code execution (RCE)

CVSS: 9.8
CVE Published: January 16th, 2026
PoC/Exploit Published: January 20th, 2026

GitHub PoC: github.com/boroeurnprach/CVE-2

Advisory: github.com/advisories/GHSA-232

MCPJam inspector is the local-first development platform for MCP servers. Versions 1.4.2 and earlier are vulnerable to remote code execution (RCE) vulnerability, which allows an attacker to send a crafted HTTP request that triggers the installation of an MCP server, leading to RCE. Since MCPJam inspector by default listens on 0.0.0.0 instead of 127.0.0.1, an attacker can trigger the RCE remotely via a simple HTTP request. Version 1.4.3 contains a patch.

##

DarkWebInformer@infosec.exchange at 2026-01-22T00:51:05.000Z ##

‼️CVE-2026-23744: Versions 1.4.2 and earlier of MCPJam inspector are vulnerable to remote code execution (RCE)

CVSS: 9.8
CVE Published: January 16th, 2026
PoC/Exploit Published: January 20th, 2026

GitHub PoC: github.com/boroeurnprach/CVE-2

Advisory: github.com/advisories/GHSA-232

MCPJam inspector is the local-first development platform for MCP servers. Versions 1.4.2 and earlier are vulnerable to remote code execution (RCE) vulnerability, which allows an attacker to send a crafted HTTP request that triggers the installation of an MCP server, leading to RCE. Since MCPJam inspector by default listens on 0.0.0.0 instead of 127.0.0.1, an attacker can trigger the RCE remotely via a simple HTTP request. Version 1.4.3 contains a patch.

##

CVE-2026-23490
(7.5 HIGH)

EPSS: 0.05%

updated 2026-01-16T21:56:00

1 posts

### Summary After reviewing pyasn1 v0.6.1 a Denial-of-Service issue has been found that leads to memory exhaustion from malformed RELATIVE-OID with excessive continuation octets. ### Details The integer issue can be found in the decoder as `reloid += ((subId << 7) + nextSubId,)`: https://github.com/pyasn1/pyasn1/blob/main/pyasn1/codec/ber/decoder.py#L496 ### PoC For the DoS: ```py import pyas

linux@activitypub.awakari.com at 2026-01-22T20:22:00.000Z ## Ubuntu 25.10 pyasn1 Critical Denial of Service CVE-2026-23490 pyasn1 could be made to crash if it received specially crafted input.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2026-23745(CVSS UNKNOWN)

EPSS: 0.01%

updated 2026-01-16T21:16:24

1 posts

### Summary The `node-tar` library (`<= 7.5.2`) fails to sanitize the `linkpath` of `Link` (hardlink) and `SymbolicLink` entries when `preservePaths` is false (the default secure behavior). This allows malicious archives to bypass the extraction root restriction, leading to **Arbitrary File Overwrite** via hardlinks and **Symlink Poisoning** via absolute symlink targets. ### Details The vulnera

1 repos

https://github.com/Jvr2022/CVE-2026-23745

benzogaga33@mamot.fr at 2026-01-21T16:40:02.000Z ##

Node.js – CVE-2026-23745 : cette faille de sécurité dans la bibliothèque node-tar est à prendre au sérieux it-connect.fr/node-js-cve-2026 #ActuCybersécurité #Cybersécurité #Vulnérabilité

##

CVE-2026-23800
(10.0 CRITICAL)

EPSS: 0.05%

updated 2026-01-16T21:15:52.037000

1 posts

Incorrect Privilege Assignment vulnerability in Modular DS modular-connector allows Privilege Escalation.This issue affects Modular DS: from 2.5.2 before 2.6.0.

beyondmachines1@infosec.exchange at 2026-01-21T11:01:02.000Z ##

Critical Privilege Escalation in Modular DS WordPress Plugin Actively Exploited

Attackers are actively exploiting a critical privilege escalation vulnerability (CVE-2026-23800) in the Modular DS WordPress plugin to gain full administrative control.

**If you are using Modular DS plugin for Wordpress, this is urgent. Your sites are being attacked. Immediately update Modular DS to version 2.6.0 and scan your user list for unauthorized accounts like 'PoC Admin'.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

CVE-2025-13154
(5.5 MEDIUM)

EPSS: 0.02%

updated 2026-01-16T15:55:33.063000

1 posts

An improper link following vulnerability was reported in the SmartPerformanceAddin for Lenovo Vantage that could allow an authenticated local user to perform an arbitrary file deletion with elevated privileges.

rtfmkiesel@infosec.exchange at 2026-01-16T14:05:16.000Z ##

Read about CVE-2025-13154, a privilege escalation vulnerability in a Lenovo Vantage addin called SmartPerformance

cyllective.com/blog/posts/leno

##

CVE-2026-22919
(3.8 LOW)

EPSS: 0.04%

updated 2026-01-16T15:55:33.063000

1 posts

An attacker with administrative access may inject malicious content into the login page, potentially enabling cross-site scripting (XSS) attacks, leading to the extraction of sensitive data.

CVE-2026-22908
(9.1 CRITICAL)

EPSS: 0.20%

updated 2026-01-16T15:55:33.063000

1 posts

Uploading unvalidated container images may allow remote attackers to gain full access to the system, potentially compromising its integrity and confidentiality.

CVE-2026-22916
(4.3 MEDIUM)

EPSS: 0.05%

updated 2026-01-16T15:55:33.063000

1 posts

An attacker with low privileges may be able to trigger critical system functions such as reboot or factory reset without proper restrictions, potentially leading to service disruption or loss of configuration.

CVE-2026-22915
(4.3 MEDIUM)

EPSS: 0.04%

updated 2026-01-16T15:55:33.063000

1 posts

An attacker with low privileges may be able to read files from specific directories on the device, potentially exposing sensitive information.

CVE-2026-22912
(4.3 MEDIUM)

EPSS: 0.08%

updated 2026-01-16T15:55:33.063000

1 posts

Improper validation of a login parameter may allow attackers to redirect users to malicious websites after authentication. This can lead to various risk including stealing credentials from unsuspecting users.

CVE-2026-22644
(5.3 MEDIUM)

EPSS: 0.07%

updated 2026-01-16T15:55:33.063000

1 posts

Certain requests pass the authentication token in the URL as string query parameter, making it vulnerable to theft through server logs, proxy logs and Referer headers, which could allow an attacker to hijack the user's session and gain unauthorized access.

CVE-2025-62581
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-01-16T03:30:27

1 posts

Delta Electronics DIAView has multiple vulnerabilities.

AAKL@infosec.exchange at 2026-01-20T17:52:41.000Z ##

Tenable has updated its threat research advisories, adding one new entry (including mitigation):

Critical: CVE-2025-62581 and CVE-2025-62582: Delta Electronics DIAView Multiple Vulnerabilities tenable.com/security/research/ #infosec #vulnerability

##

CVE-2026-0227(CVSS UNKNOWN)

EPSS: 0.09%

updated 2026-01-15T21:31:54

4 posts

A vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to cause a denial of service (DoS) to the firewall. Repeated attempts to trigger this issue results in the firewall entering into maintenance mode.

2 repos

https://github.com/TeeyaR/CVE-2026-0227-Palo-Alto

https://github.com/CkAbhijit/CVE-2026-0227-Advanced-Scanner

youranonnewsirc@nerdculture.de at 2026-01-17T21:22:41.000Z ##

Here's a summary of the most important global, technology, and cybersecurity news from the last 24 hours:

Cyber incidents remain the top global business risk for the fifth consecutive year, with AI surging to second place, according to the Allianz Risk Barometer 2026. New EvilAI malware is masquerading as AI tools to infiltrate organizations. Microsoft has disrupted the RedVDS cybercrime infrastructure. Palo Alto Networks patched a critical denial-of-service bug (CVE-2026-0227) affecting firewalls. In technology, the US imposed AI chip tariffs on Nvidia, causing global supply chain friction. OpenAI will begin testing advertisements in ChatGPT. California is investigating xAI over sexualized deepfakes. Globally, geopolitical tensions continue, with Trump threatening tariffs amidst disputes over Greenland.

#News #Anonymous #AnonNews_irc

##

cR0w@infosec.exchange at 2026-01-15T18:55:32.000Z ##

Anyone hear of a PoC for CVE-2026-0227 yet?

PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway and Portal

security.paloaltonetworks.com/

##

benzogaga33@mamot.fr at 2026-01-15T16:40:03.000Z ##

Palo Alto Networks – CVE-2026-0227 : cette nouvelle faille permet de désactiver le firewall à distance it-connect.fr/palo-alto-networ #ActuCybersécurité #Cybersécurité #Vulnérabilité #PaloAlto

##

jbhall56@infosec.exchange at 2026-01-15T13:33:39.000Z ##

Tracked as CVE-2026-0227, this security flaw affects next-generation firewalls (running PAN-OS 10.1 or later) and Palo Alto Networks' Prisma Access configurations when the GlobalProtect gateway or portal is enabled. bleepingcomputer.com/news/secu

##

CVE-2025-36911
(7.1 HIGH)

EPSS: 0.00%

updated 2026-01-15T21:31:47

3 posts

In key-based pairing, there is a possible ID due to a logic error in the code. This could lead to remote (proximal/adjacent) information disclosure of user's conversations and location with no additional execution privileges needed. User interaction is not needed for exploitation.

6 repos

https://github.com/PivotChip/FrostedFastPair

https://github.com/ap425q/whisper-pair

https://github.com/Cedric-Martz/CVE-2025-36911_scan

https://github.com/SteamPunk424/CVE-2025-36911-Wisper_Pair_Target_Finder-

https://github.com/zalexdev/wpair-app

https://github.com/SpectrixDev/DIY_WhisperPair

DarkWebInformer@infosec.exchange at 2026-01-20T22:25:40.000Z ##

‼️WPair is a defensive security research tool that demonstrates the CVE-2025-36911 (eg WhisperPair) vulnerability in Google's Fast Pair protocol.

github.com/zalexdev/wpair-app

Features:

▪️BLE Scanner - Discovers Fast Pair devices broadcasting the 0xFE2C service UUID

▪️Vulnerability Tester - Non-invasive check if device is patched against CVE-2025-36911

▪️Exploit Demonstration - Full proof-of-concept for authorized security testing

▪️HFP Audio Access - Demonstrates microphone access post-exploitation

▪️Live Listening - Real-time audio streaming to phone speaker

▪️Recording - Save captured audio as M4A files

##

PC_Fluesterer@social.tchncs.de at 2026-01-20T07:57:27.000Z ##

Google „Fast Pair“ ist Sicherheitsrisiko

Hier kann man wieder sehen, dass "Komfort" (oder was auch immer die Amerikaner dafür halten) ein natürlicher Feind der Sicherheit ist. Google hatte ein Verfahren namens Fast Pair ersonnen, das die Kopplung von Bluetooth (BT) Zubehörgeräten mit Android vereinfachen soll. Gut gedacht, schlecht gemacht. Forschende der Uni Leuven (Belgien) haben schon im vorigen Jahr eine Schwachstelle in dem System gefunden und vertraulich an Google gemeldet. Wann genau das war, ist nirgends dokumentiert. Die zugeordnete Fehlernummer CVE-2025-36911 muss (aus der Zahl zu schließen) ungefähr um die Jahresmitte vergeben worden sein.
Die Schwachstelle

pc-fluesterer.info/wordpress/2

#Empfehlung #Mobilfunk #Warnung #android #bluetooth #google #hersteller #sicherheit #vorbeugen

##

AAKL@infosec.exchange at 2026-01-16T17:51:56.000Z ##

The vulnerability for this was updated yesterday: cve.org/CVERecord?id=CVE-2025-

Malwarebytes: WhisperPair exposes Bluetooth earbuds and headphones to tracking and eavesdropping malwarebytes.com/blog/news/202

More about Bluetooth hijacking: whisperpair.eu/ #infosec #bluetooth #vulnerability

##

CVE-2025-9014(CVSS UNKNOWN)

EPSS: 0.11%

updated 2026-01-15T18:31:42

1 posts

A Null Pointer Dereference vulnerability exists in the referer header check of the web portal of TP-Link TL-WR841N v14, caused by improper input validation.  A remote, unauthenticated attacker can exploit this flaw and cause Denial of Service on the web portal service.This issue affects TL-WR841N v14: before 250908.

CVE-2026-0712
(7.6 HIGH)

EPSS: 0.05%

updated 2026-01-15T15:31:35

1 posts

An open redirect vulnerability has been identified in Grafana OSS that can be exploited to achieve XSS attacks. The vulnerability was introduced in Grafana v11.5.0. The open redirect can be chained with path traversal vulnerabilities to achieve XSS. Fixed in versions 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01 and 11.3.8+security-01

CVE-2026-22907
(10.0 CRITICAL)

EPSS: 0.07%

updated 2026-01-15T15:31:30

1 posts

An attacker may gain unauthorized access to the host filesystem, potentially allowing them to read and modify system data.

CVE-2026-22910
(7.5 HIGH)

EPSS: 0.05%

updated 2026-01-15T15:31:30

1 posts

The device is deployed with weak and publicly known default passwords for certain hidden user levels, increasing the risk of unauthorized access. This represents a high risk to the integrity of the system.

CVE-2026-22639
(4.3 MEDIUM)

EPSS: 0.04%

updated 2026-01-15T15:31:27

1 posts

Grafana is an open-source platform for monitoring and observability. The Grafana Alerting DingDing integration was not properly protected and could be exposed to users with Viewer permission. Fixed in versions 10.4.19+security-01, 11.2.10+security-01, 11.3.7+security-01, 11.4.5+security-01, 11.5.5+security-01, 11.6.2+security-01 and 12.0.1+security-01

CVE-2026-22646
(4.3 MEDIUM)

EPSS: 0.04%

updated 2026-01-15T15:31:27

1 posts

Certain error messages returned by the application expose internal system details that should not be visible to end users, providing attackers with valuable reconnaissance information (like file paths, database errors, or software versions) that can be used to map the application's internal structure and discover other, more critical vulnerabilities.

CVE-2026-22645
(5.3 MEDIUM)

EPSS: 0.04%

updated 2026-01-15T15:31:27

1 posts

The application discloses all used components, versions and license information to unauthenticated actors, giving attackers the opportunity to target known security vulnerabilities of used components.

CVE-2026-0713
(8.3 HIGH)

EPSS: 0.04%

updated 2026-01-15T15:31:26

1 posts

A security vulnerability in the /apis/dashboard.grafana.app/* endpoints allows authenticated users to bypass dashboard and folder permissions. The vulnerability affects all API versions (v0alpha1, v1alpha1, v2alpha1). Impact: - Viewers can view all dashboards/folders regardless of permissions - Editors can view/edit/delete all dashboards/folders regardless of permissions - Editors can create dashb

CVE-2026-22920
(3.7 LOW)

EPSS: 0.05%

updated 2026-01-15T15:31:26

1 posts

The device's passwords have not been adequately salted, making them vulnerable to password extraction attacks.

CVE-2026-22637
(6.8 MEDIUM)

EPSS: 0.03%

updated 2026-01-15T15:31:25

1 posts

The built-in XY Chart plugin is vulnerable to a DOM XSS vulnerability. A user with Editor permissions is able to modify such a panel in order to make it execute arbitrary JavaScript.

CVE-2026-22918
(4.3 MEDIUM)

EPSS: 0.05%

updated 2026-01-15T15:31:19

1 posts

An attacker may exploit missing protection against clickjacking by tricking users into performing unintended actions through maliciously crafted web pages, leading to the extraction of sensitive data.

CVE-2026-22917
(4.3 MEDIUM)

EPSS: 0.06%

updated 2026-01-15T15:31:19

1 posts

Improper input handling in a system endpoint may allow attackers to overload resources, causing a denial of service.

CVE-2026-22914
(4.3 MEDIUM)

EPSS: 0.03%

updated 2026-01-15T15:31:19

1 posts

An attacker with limited permissions may still be able to write files to specific locations on the device, potentially leading to system manipulation.

CVE-2026-22913
(4.3 MEDIUM)

EPSS: 0.04%

updated 2026-01-15T15:31:18

1 posts

Improper handling of a URL parameter may allow attackers to execute code in a user's browser after login. This can lead to the extraction of sensitive data.

CVE-2026-22911
(5.3 MEDIUM)

EPSS: 0.06%

updated 2026-01-15T15:31:18

1 posts

Firmware update files may expose password hashes for system accounts, which could allow a remote attacker to recover credentials and gain unauthorized access to the device.

CVE-2026-22909
(7.5 HIGH)

EPSS: 0.07%

updated 2026-01-15T15:31:18

1 posts

Certain system functions may be accessed without proper authorization, allowing attackers to start, stop, or delete installed applications, potentially disrupting system operations.

CVE-2025-14242
(6.5 MEDIUM)

EPSS: 0.17%

updated 2026-01-15T00:32:39

1 posts

A flaw was found in vsftpd. This vulnerability allows a denial of service (DoS) via an integer overflow in the ls command parameter parsing, triggered by a remote, authenticated attacker sending a crafted STAT command with a specific byte sequence.

andersonc0d3@infosec.exchange at 2026-01-16T04:17:31.000Z ##

I noticed a vulnerability was fixed in vsftpd a few days ago (CVE-2025-14242). It’s a very interesting project, and Chris Evans' work has taught me several important lessons.

I searched for more details about the issue but couldn't find much initially. Today, I saw that the issue seems to have been introduced by a Red Hat patch. That makes sense!

Bug 2419826 (CVE-2025-14242) - CVE-2025-14242 vsftpd: vsftpd: Denial of service via integer overflow in ls command parameter parsing[NEEDINFO]
bugzilla.redhat.com/show_bug.c

2ed5ba6 Resolve CVE-2025-14242
src.fedoraproject.org/rpms/vsf

##

CVE-2026-23550
(10.0 CRITICAL)

EPSS: 6.11%

updated 2026-01-14T21:15:54.193000

3 posts

Incorrect Privilege Assignment vulnerability in Modular DS allows Privilege Escalation.This issue affects Modular DS: from n/a through 2.5.1.

Nuclei template

2 repos

https://github.com/cyberdudebivash/CYBERDUDEBIVASH-Modular-DS-CVE-2026-23550-Detector

https://github.com/TheTorjanCaptain/CVE-2026-23550-PoC

blog@insicurezzadigitale.com at 2026-01-16T10:07:49.000Z ##

origin-mo: il trucco pigro che ha aperto 40.000 siti WordPress agli hacker

I ricercatori hanno scoperto una vulnerabilità critica nel plugin Modular DS per WordPress che ha permesso a hacker di compromettere oltre 40.000 siti con un metodo sorprendentemente semplice. La vulnerabilità CVE-2026-23550 Il plugin Modular DS, installato su decine di migliaia di siti WordPress, presentava una falla di privilege escalation classificata con un punteggio CVSS di 10.0, il massimo livello di severità. Questa debolezza, identificata come CVE-2026-23550 e catalogata nel […]

insicurezzadigitale.com/origin

##

DarkWebInformer@infosec.exchange at 2026-01-16T00:49:24.000Z ##

‼️ 40,000 WordPress Sites Exposed to Risk Due to Modular DS Admin Bypass Vulnerability

CVE-2026-23550: Critical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Access

CVSS: 10
CVE Published: January 14th, 2026

Attacking IP Addresses:

45[.]11[.]89[.]19
185[.]196[.]0[.]11

Reference: help.modulards.com/en/article/

##

beyondmachines1@infosec.exchange at 2026-01-15T20:01:43.000Z ##

Critical Privilege Escalation in Modular DS WordPress Plugin Actively Exploited

Attackers are exploiting a CVSS 10.0 vulnerability in the Modular DS WordPress plugin to gain unauthenticated administrative access and full site control. The flaw, tracked as CVE-2026-23550, allows hackers to bypass authentication by manipulating URL parameters.

**If you are using Modular DS plugin, this is urgent! Updat to version 2.5.2 immediately, because your site is being hacked. If you can't update, disable the plugin. After patching, check your WordPress user list for any unauthorized administrator accounts created recently.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

CVE-2026-20805
(5.5 MEDIUM)

EPSS: 4.62%

updated 2026-01-13T21:31:44

3 posts

Exposure of sensitive information to an unauthorized actor in Desktop Windows Manager allows an authorized attacker to disclose information locally.

2 repos

https://github.com/fevar54/CVE-2026-20805-POC

https://github.com/Uzair-Baig0900/CVE-2026-20805-PoC

youranonnewsirc@nerdculture.de at 2026-01-20T09:22:33.000Z ##

Here's a summary of the latest important news in technology and cybersecurity from the last 24 hours:

**Cybersecurity:** Microsoft issued an emergency patch for a critical Windows zero-day vulnerability (CVE-2026-20805) actively being exploited as of January 19, 2026. The World Economic Forum's 2026 Outlook highlights accelerating cyber risks due to AI advancements and geopolitical fragmentation.

**Technology:** NASA is preparing its Artemis II mission with a wet dress rehearsal for its Orion spacecraft (January 19, 2026). Nvidia solidified its AI hardware dominance by acquiring Groq's AI inference IP for $20 billion (early January 2026).

**Global:** A strong G3/G4 geomagnetic storm is expected, potentially making the Northern Lights visible across 24 US states on January 19-20, 2026.

#News #Anonymous #AnonNews_irc

##

youranonnewsirc@nerdculture.de at 2026-01-20T03:22:37.000Z ##

Here's a digest of the latest in technology and cybersecurity:

**Cybersecurity:** Microsoft issued an emergency patch on January 19, 2026, for a critical Windows zero-day vulnerability (CVE-2026-20805) that is currently being actively exploited by attackers.

**Technology:** Elon Musk is seeking up to $134 billion in damages from OpenAI and Microsoft in an escalating AI courtroom dispute, as of January 19, 2026. NASA also began rolling out its Artemis 2 space launch system and Orion spacecraft on January 19, 2026. Additionally, NVIDIA's $20 billion acquisition of Groq's AI inference intellectual property is consolidating power in AI hardware.

#News #Anonymous #AnonNews_irc

##

Mathrubhumi_English@mastodon.social at 2026-01-17T05:36:12.000Z ##

CERT-In issues high-severity alert for Windows 10, Windows 11 and Microsoft Office over CVE-2026-20805 vulnerability. Microsoft confirms exploit in the wild, urges urgent updates. english.mathrubhumi.com/techno #WindowsSecurity #MicrosoftAlert #CERTIn #CyberSecurity

##

CVE-2026-20965
(7.6 HIGH)

EPSS: 0.03%

updated 2026-01-13T18:31:18

3 posts

Improper verification of cryptographic signature in Windows Admin Center allows an authorized attacker to elevate privileges locally.

DarkWebInformer@infosec.exchange at 2026-01-19T19:57:40.000Z ##

‼️CVE-2026-20965: Windows Admin Center Azure SSO Flaw Risks Tenant-Wide Compromise

Details: Improper verification of cryptographic signature in Windows Admin Center allows an authorized attacker to elevate privileges locally.

CVSS: 7.5
CVE Published: January 13th, 2026

Advisory: msrc.microsoft.com/update-guid

Writeup: cymulate.com/blog/cve-2026-209

##

cR0w@infosec.exchange at 2026-01-15T15:48:00.000Z ##

Stupid cloud anyway.

cymulate.com/blog/cve-2026-209

##

_r_netsec@infosec.exchange at 2026-01-15T15:43:06.000Z ##

CVE-2026-20965: Cymulate Research Labs Discovers Token Validation Flaw that Leads to Tenant-Wide RCE in Azure Windows Admin Center cymulate.com/blog/cve-2026-209

##

CVE-2026-20950
(7.8 HIGH)

EPSS: 0.04%

updated 2026-01-13T18:31:18

1 posts

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

AAKL@infosec.exchange at 2026-01-17T18:39:00.000Z ##

If you missed this, Microsoft posted three advisories to its security guide yesterday.

- Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability, CVE-2026-21223 msrc.microsoft.com/update-guid

- Microsoft Power Apps Remote Code Execution Vulnerability, CVE-2026-20960 msrc.microsoft.com/update-guid

- Microsoft Excel Remote Code Execution Vulnerability, CVE-2026-20950 msrc.microsoft.com/update-guid #infosec #Microsoft #Office #Chromium #Edge #vulnerability

##

CVE-2025-40805
(10.0 CRITICAL)

EPSS: 0.20%

updated 2026-01-13T12:31:48

2 posts

Affected devices do not properly enforce user authentication on specific API endpoints. This could facilitate an unauthenticated remote attacker to circumvent authentication and impersonate a legitimate user. Successful exploitation requires that the attacker has learned the identity of a legitimate user.

beyondmachines1@infosec.exchange at 2026-01-16T13:01:43.000Z ##

Siemens Patches Critical Authentication Bypass in Industrial Edge Device Kit

Siemens reports a maximum severity critical authentication bypass vulnerability (CVE-2025-40805) in its Industrial Edge Device Kit that allows remote attackers to impersonate users and gain unauthorized access to industrial systems.

**If you are using Siemens Industrial Edge Device Kit, this is urgent and important. Make sure all Industrial Edge Device Kit systems are isolated from the internet and accessible from trusted networks only. Then plan a very quick update, this is a perfect 10 score vulnerability. Even with all the isolation, there may be a way in, so better patch.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-01-16T08:01:43.000Z ##

Siemens Issues Fix for Maximum Severit flaw in Industrial Edge Devices

Siemens disclosed a max severity (10) critical vulnerability (CVE-2025-40805) in its Industrial Edge Devices that allows unauthenticated remote attackers to bypass authentication and impersonate users.

**This is maximum severity, so don't ignore it. Review the advisory to check if you use any of these product lines. Ofcourse, make sure all industrial devices are isolated from the internet and accessible from trusted networks only. Then plan a quick update cycle.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-12420(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-01-13T03:32:08

1 posts

A vulnerability has been identified in the ServiceNow AI Platform that could enable an unauthenticated user to impersonate another user and perform the operations that the impersonated user is entitled to perform. ServiceNow has addressed this vulnerability by deploying a relevant security update to  hosted instances in October 2025. Security updates have also been provided to ServiceNow self-hos

1 repos

https://github.com/cyberdudebivash/CYBERDUDEBIVASH-ServiceNow-AI-Agent-Audit-Script

Markcarter@infosec.exchange at 2026-01-16T12:23:06.000Z ##

Fascinating 🛡️ BodySnatcher (CVE-2025-12420): A Broken Authentication and Agentic Hijacking Vulnerability in ServiceNow 🛡️
Key Takeaways
AI agents significantly amplify the impact of traditional security flaws.
A Virtual Agent integration flaw (CVE-2025-12420) allowed unauthenticated attackers to impersonate any ServiceNow user using only an email address, bypassing MFA and SSO.
Virtual Agent APIs can become unintended execution paths for privileged AI workflows.
Internal topics such as AIA-Agent Invoker AutoChat enable AI agents to be executed outside expected deployment constraints.
Point-in-time fixes do not eliminate systemic risk from insecure provider and agent configurations.
Preventing abuse of agentic AI in conversational channels requires:
Strong provider configuration controls, including enforced MFA for account linking
Establishing an agent approval-process
Implementing lifecycle management policies to de-provision unused or stagnant agents.
appomni.com/ao-labs/bodysnatch #InfoSec

##

CVE-2022-33318
(9.8 CRITICAL)

EPSS: 2.11%

updated 2026-01-09T06:16:00.257000

1 posts

Deserialization of Untrusted Data vulnerability in Mitsubishi Electric GENESIS64 versions 10.97 to 10.97.1, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97 to 10.97.1, Mitsubishi Electric ICONICS Suite versions 10.97 to 10.97.1, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97 to 10.97.1, Mitsubishi Electric GENESIS32 versions 9.7 and prior, Mitsubi

1 repos

https://github.com/0vercl0k/paracosme

beyondmachines1@infosec.exchange at 2026-01-16T11:01:44.000Z ##

Mitsubishi Electric and ICONICS Patch Critical Industrial Software Flaws

Mitsubishi Electric and ICONICS patched multiple vulnerabilities in industrial software, including a critical remote code execution flaw (CVE-2022-33318). These bugs allow attackers to take over systems, steal data, or disrupt manufacturing operations across several product lines.

**Review the advisory to check if you are using the affected product lines. As usual, make sure all industrial devices are isolated from the internet and accessible from trusted networks only. Then plan a patch cycle. For older products like MC Works64 and GENESIS32 plan a replacement path, they won't be getting a patch.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-14631(CVSS UNKNOWN)

EPSS: 0.02%

updated 2026-01-07T12:31:27

1 posts

A NULL Pointer Dereference vulnerability in TP-Link Archer BE400 V1(802.11 modules) allows  an adjacent attacker to cause a denial-of-service (DoS) by triggering a device reboot. This issue affects Archer BE400: xi 1.1.0 Build 20250710 rel.14914.

ChrisShort@hachyderm.io at 2026-01-16T20:09:44.000Z ##

CyRC Discovers Critical WLAN Vulnerabilities in ASUS and TP-Link Routers (CVE-2025-14631) | Black Duck Blog #devopsish blackduck.com/blog/cyrc-discov

##

CVE-2025-67268
(9.8 CRITICAL)

EPSS: 0.11%

updated 2026-01-06T18:32:37

1 posts

gpsd before commit dc966aa contains a heap-based out-of-bounds write vulnerability in the drivers/driver_nmea2000.c file. The hnd_129540 function, which handles NMEA2000 PGN 129540 (GNSS Satellites in View) packets, fails to validate the user-supplied satellite count against the size of the skyview array (184 elements). This allows an attacker to write beyond the bounds of the array by providing a

linux@activitypub.awakari.com at 2026-01-21T04:05:32.000Z ## Oracle Linux 10: gpsd Important Buff Overflow CVE-2025-67268 ELSA-2026-0770 The following updated rpms for Oracle Linux 10 have been uploaded to the Unbreakable Linux Network:

#Oracle #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

youranonnewsirc@nerdculture.de at 2026-01-17T15:22:35.000Z ##

Here's a brief on the latest global, tech, and cybersecurity news from the last 24 hours:

Global: Uganda's Yoweri Museveni was declared winner of the presidential election. Over 100 people have died in torrential rains and floods across Southern Africa.

Tech: OpenAI is reportedly considering introducing ads to ChatGPT. Google filed to appeal a decision in its search monopoly case, and new generative AI features are rolling out for Gmail.

Cybersecurity: Cisco patched a zero-day vulnerability (CVE-2025-20393) exploited by a China-linked APT (Jan 16). A new PayPal phishing scam uses verified invoices with fake support numbers, and the GhostPoster browser malware, active for five years, was exposed.

#News #Anonymous #AnonNews_irc

##

CVE-2025-59718
(9.8 CRITICAL)

EPSS: 2.27%

updated 2025-12-17T13:54:45.390000

13 posts

A improper verification of cryptographic signature vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0.0 through 7.0.17, FortiProxy 7.6.0 through 7.6.3, FortiProxy 7.4.0 through 7.4.10, FortiProxy 7.2.0 through 7.2.14, FortiProxy 7.0.0 through 7.0.21, FortiSwitchManager 7.2.0 through 7.2.6, FortiSwitchManager 7.0.0 through 7

3 repos

https://github.com/exfil0/CVE-2025-59718-PoC

https://github.com/Ashwesker/Ashwesker-CVE-2025-59718

https://github.com/moften/CVE-2025-59718-Fortinet-Poc

undercodenews@mastodon.social at 2026-01-23T04:10:43.000Z ##

FortiGate Under Siege: Hackers Exploit Critical SSO Vulnerabilities to Hijack Firewalls

Introduction: FortiGate Devices in the Crosshairs FortiGate, one of the leading providers of enterprise firewall solutions, has come under intense cyberattack in January 2026. Security researchers have identified active exploitation of two critical vulnerabilities—CVE-2025-59718 and CVE-2025-59719—allowing attackers to bypass FortiCloud Single Sign-On (SSO). This breach has alarmed…

undercodenews.com/fortigate-un

##

zeljkazorz at 2026-01-22T13:19:37.585Z ##

CVE-2025-59718, a critical authentication bypass flaw that attackers exploited in December 2025 to compromise FortiGate appliances, appears to persist in newer, purportedly fixed releases of the underlying FortiOS.

helpnetsecurity.com/2026/01/21

##

technadu at 2026-01-22T12:24:34.702Z ##

Fortinet FortiGate admins are observing exploitation patterns consistent with CVE-2025-59718 even on patched systems, suggesting incomplete mitigation in earlier updates.

Reports include SSO-based admin creation and activity aligned with previously documented attacks. Additional FortiOS releases are expected.

The situation reinforces the need for defense-in-depth around identity, logging, and privileged access.

Source: bleepingcomputer.com/news/secu

Follow @technadu for neutral, operationally focused security reporting.

##

beyondmachines1 at 2026-01-22T12:01:02.449Z ##

FortiGate Firewalls Compromised Despite Recent Patches for CVE-2025-59718

Fortinet FortiGate firewalls are reported to still be vulnerable to authentication bypass attacks via CVE-2025-59718 even after applying initial patches. Attackers use malicious SAML responses to create unauthorized admin accounts and steal configuration data.

**If you are using Fortinet FortiGate, this is important and urgent. Your device may still be vulnerable. Disable the FortiCloud SSO login feature immediately on all FortiGate appliances to prevent unauthorized administrative access.**

beyondmachines.net/event_detai

##

benzogaga33@mamot.fr at 2026-01-22T10:40:03.000Z ##

CVE-2025-59718 – Des firewalls FortiGate piratés malgré l’installation des derniers patchs it-connect.fr/cve-2025-59718-d #ActuCybersécurité #Cybersécurité #Vulnérabilité #Fortinet

##

guardingpearsoftware@mastodon.social at 2026-01-22T07:52:43.000Z ##

Fortinet customers are reporting that attackers are exploiting a previously fixed vulnerability (CVE-2025-59718) to hack patched firewalls.
bleepingcomputer.com/news/secu

##

decio at 2026-01-22T07:38:37.167Z ##

Si vous administrez des FortiGate/FortiOS : des admins signalent un contournement du patch de la vulnérabilité critique CVE-2025-59718 (FortiCloud SSO fortiguard.fortinet.com/psirt/ ) → compromission possible même sur des firewalls « patchés » (ex. 7.4.9/7.4.10).

( reddit.com/r/fortinet/comments )

Préreq : “Allow administrative login using FortiCloud SSO” activé (souvent après enregistrement FortiCare).

Mitigation : désactiver admin-forticloud-sso-login + restreindre l’accès admin + vérifier logs/nouveaux comptes.

Chaîne d'exploitation: CVE-2025-59718 (+ CVE-2025-59719 côté FortiWeb) ➡️ envoi de messages SAML forgés ➡️ bypass de vérification de signature ➡️ accès admin non autorisé.

[Références]
"Fortinet admins report patched FortiGate firewalls getting hacked"
👇
bleepingcomputer.com/news/secu

( cyberveille.ch/posts/2026-01-2)

💬
⬇️
infosec.pub/post/40878137

##

cyberveille@mastobot.ping.moi at 2026-01-21T23:30:04.000Z ##

📢 FortiGate : contournement de correctif sur l’authentification FortiCloud SSO (CVE-2025-59718) activement exploité
📝 BleepingComputer rappor...
📖 cyberveille : cyberveille.ch/posts/2026-01-2
🌐 source : bleepingcomputer.com/news/secu
#CVE_2025_59718 #FortiCloud_SSO #Cyberveille

##

zeljkazorz@infosec.exchange at 2026-01-22T13:19:37.000Z ##

CVE-2025-59718, a critical authentication bypass flaw that attackers exploited in December 2025 to compromise FortiGate appliances, appears to persist in newer, purportedly fixed releases of the underlying FortiOS.

helpnetsecurity.com/2026/01/21

#Cybersecurity #Fortinet #CVE

##

technadu@infosec.exchange at 2026-01-22T12:24:34.000Z ##

Fortinet FortiGate admins are observing exploitation patterns consistent with CVE-2025-59718 even on patched systems, suggesting incomplete mitigation in earlier updates.

Reports include SSO-based admin creation and activity aligned with previously documented attacks. Additional FortiOS releases are expected.

The situation reinforces the need for defense-in-depth around identity, logging, and privileged access.

Source: bleepingcomputer.com/news/secu

Follow @technadu for neutral, operationally focused security reporting.

#Infosec #Fortinet #FirewallSecurity #IAM #VulnerabilityManagement #TechNadu

##

beyondmachines1@infosec.exchange at 2026-01-22T12:01:02.000Z ##

FortiGate Firewalls Compromised Despite Recent Patches for CVE-2025-59718

Fortinet FortiGate firewalls are reported to still be vulnerable to authentication bypass attacks via CVE-2025-59718 even after applying initial patches. Attackers use malicious SAML responses to create unauthorized admin accounts and steal configuration data.

**If you are using Fortinet FortiGate, this is important and urgent. Your device may still be vulnerable. Disable the FortiCloud SSO login feature immediately on all FortiGate appliances to prevent unauthorized administrative access.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

benzogaga33@mamot.fr at 2026-01-22T10:40:03.000Z ##

CVE-2025-59718 – Des firewalls FortiGate piratés malgré l’installation des derniers patchs it-connect.fr/cve-2025-59718-d #ActuCybersécurité #Cybersécurité #Vulnérabilité #Fortinet

##

decio@infosec.exchange at 2026-01-22T07:38:37.000Z ##

Si vous administrez des FortiGate/FortiOS : des admins signalent un contournement du patch de la vulnérabilité critique CVE-2025-59718 (FortiCloud SSO fortiguard.fortinet.com/psirt/ ) → compromission possible même sur des firewalls « patchés » (ex. 7.4.9/7.4.10).

( reddit.com/r/fortinet/comments )

Préreq : “Allow administrative login using FortiCloud SSO” activé (souvent après enregistrement FortiCare).

Mitigation : désactiver admin-forticloud-sso-login + restreindre l’accès admin + vérifier logs/nouveaux comptes.

Chaîne d'exploitation: CVE-2025-59718 (+ CVE-2025-59719 côté FortiWeb) ➡️ envoi de messages SAML forgés ➡️ bypass de vérification de signature ➡️ accès admin non autorisé.

[Références]
"Fortinet admins report patched FortiGate firewalls getting hacked"
👇
bleepingcomputer.com/news/secu

( cyberveille.ch/posts/2026-01-2)

💬
⬇️
infosec.pub/post/40878137

#CyberVeille #Fortinet #FortiGate #FortiOS #CVE_2025_59718

##

CVE-2025-68285(CVSS UNKNOWN)

EPSS: 0.06%

updated 2025-12-16T18:31:42

1 posts

In the Linux kernel, the following vulnerability has been resolved: libceph: fix potential use-after-free in have_mon_and_osd_map() The wait loop in __ceph_open_session() can race with the client receiving a new monmap or osdmap shortly after the initial map is received. Both ceph_monc_handle_map() and handle_one_map() install a new map immediately after freeing the old one kfree(monc->mon

jwildeboer@social.wildeboer.net at 2026-01-20T11:45:45.000Z ##

Heads up for my fellow Red Hat Enterprise Linux (RHEL) 10 users:

Important: kernel security update

kernel: libceph: fix potential use-after-free in have_mon_and_osd_map() (CVE-2025-68285)

So do your `dnf update` ASAP :)

More details: access.redhat.com/errata/RHSA-

#SelfHost #Security #CVE2025_68285 @homelab

##

CVE-2025-59719
(9.8 CRITICAL)

EPSS: 0.08%

updated 2025-12-09T19:59:29.507000

3 posts

An improper verification of cryptographic signature vulnerability in Fortinet FortiWeb 8.0.0, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9 may allow an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML response message.

1 repos

https://github.com/moften/CVE-2025-59718-Fortinet-Poc

undercodenews@mastodon.social at 2026-01-23T04:10:43.000Z ##

FortiGate Under Siege: Hackers Exploit Critical SSO Vulnerabilities to Hijack Firewalls

Introduction: FortiGate Devices in the Crosshairs FortiGate, one of the leading providers of enterprise firewall solutions, has come under intense cyberattack in January 2026. Security researchers have identified active exploitation of two critical vulnerabilities—CVE-2025-59718 and CVE-2025-59719—allowing attackers to bypass FortiCloud Single Sign-On (SSO). This breach has alarmed…

undercodenews.com/fortigate-un

##

decio at 2026-01-22T07:38:37.167Z ##

Si vous administrez des FortiGate/FortiOS : des admins signalent un contournement du patch de la vulnérabilité critique CVE-2025-59718 (FortiCloud SSO fortiguard.fortinet.com/psirt/ ) → compromission possible même sur des firewalls « patchés » (ex. 7.4.9/7.4.10).

( reddit.com/r/fortinet/comments )

Préreq : “Allow administrative login using FortiCloud SSO” activé (souvent après enregistrement FortiCare).

Mitigation : désactiver admin-forticloud-sso-login + restreindre l’accès admin + vérifier logs/nouveaux comptes.

Chaîne d'exploitation: CVE-2025-59718 (+ CVE-2025-59719 côté FortiWeb) ➡️ envoi de messages SAML forgés ➡️ bypass de vérification de signature ➡️ accès admin non autorisé.

[Références]
"Fortinet admins report patched FortiGate firewalls getting hacked"
👇
bleepingcomputer.com/news/secu

( cyberveille.ch/posts/2026-01-2)

💬
⬇️
infosec.pub/post/40878137

##

decio@infosec.exchange at 2026-01-22T07:38:37.000Z ##

Si vous administrez des FortiGate/FortiOS : des admins signalent un contournement du patch de la vulnérabilité critique CVE-2025-59718 (FortiCloud SSO fortiguard.fortinet.com/psirt/ ) → compromission possible même sur des firewalls « patchés » (ex. 7.4.9/7.4.10).

( reddit.com/r/fortinet/comments )

Préreq : “Allow administrative login using FortiCloud SSO” activé (souvent après enregistrement FortiCare).

Mitigation : désactiver admin-forticloud-sso-login + restreindre l’accès admin + vérifier logs/nouveaux comptes.

Chaîne d'exploitation: CVE-2025-59718 (+ CVE-2025-59719 côté FortiWeb) ➡️ envoi de messages SAML forgés ➡️ bypass de vérification de signature ➡️ accès admin non autorisé.

[Références]
"Fortinet admins report patched FortiGate firewalls getting hacked"
👇
bleepingcomputer.com/news/secu

( cyberveille.ch/posts/2026-01-2)

💬
⬇️
infosec.pub/post/40878137

#CyberVeille #Fortinet #FortiGate #FortiOS #CVE_2025_59718

##

CVE-2025-12817
(3.1 LOW)

EPSS: 0.07%

updated 2025-11-14T16:42:03.187000

1 posts

Missing authorization in PostgreSQL CREATE STATISTICS command allows a table owner to achieve denial of service against other CREATE STATISTICS users by creating in any schema. A later CREATE STATISTICS for the same name, from a user having the CREATE privilege, would then fail. Versions before PostgreSQL 18.1, 17.7, 16.11, 15.15, 14.20, and 13.23 are affected.

PostgreSQL@activitypub.awakari.com at 2026-01-14T15:27:54.000Z ## Oracle Linux 8: ELSA-2026-0524 PostgreSQL 15 Moderate DoS CVE-2025-12817 The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:

#Oracle #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-10585
(9.8 CRITICAL)

EPSS: 0.70%

updated 2025-10-30T15:55:01.903000

1 posts

Type confusion in V8 in Google Chrome prior to 140.0.7339.185 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

1 repos

https://github.com/AdityaBhatt3010/CVE-2025-10585-The-Chrome-V8-Zero-Day

hackmag@infosec.exchange at 2026-01-20T13:12:39.000Z ##

⚪ Google patches a Chrome zero-day; the vulnerability is already being exploited in attacks

🗨️ Google has released updates for Chrome to address four vulnerabilities. According to the company, one of them (CVE-2025-10585) has already been exploited by attackers.

🔗 hackmag.com/news/cve-2025-1058

#news

##

CVE-2025-21043
(8.8 HIGH)

EPSS: 11.37%

updated 2025-10-30T15:36:12.360000

1 posts

Out-of-bounds write in libimagecodec.quram.so prior to SMR Sep-2025 Release 1 allows remote attackers to execute arbitrary code.

hackmag@infosec.exchange at 2026-01-19T12:37:17.000Z ##

⚪ Samsung patches a 0‑day exploited in attacks against Android users

🗨️ Samsung has patched a zero-day RCE vulnerability that was already being exploited in attacks against devices running Android.

🔗 hackmag.com/news/cve-2025-2104

#news

##

CVE-2025-39993(CVSS UNKNOWN)

EPSS: 0.07%

updated 2025-10-29T15:31:52

1 posts

In the Linux kernel, the following vulnerability has been resolved: media: rc: fix races with imon_disconnect() Syzbot reports a KASAN issue as below: BUG: KASAN: use-after-free in __create_pipe include/linux/usb.h:1945 [inline] BUG: KASAN: use-after-free in send_packet+0xa2d/0xbc0 drivers/media/rc/imon.c:627 Read of size 4 at addr ffff8880256fb000 by task syz-executor314/4465 CPU: 2 PID: 4465

linux@activitypub.awakari.com at 2026-01-14T15:27:46.000Z ## Oracle Linux 8: ELSA-2026-0444 Kernel Important DoS CVE-2025-39993 The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:

#Oracle #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-54236
(9.1 CRITICAL)

EPSS: 57.72%

updated 2025-10-27T15:13:10

1 posts

Adobe Commerce versions 2.4.9-alpha2, 2.4.8-p2, 2.4.7-p7, 2.4.6-p12, 2.4.5-p14, 2.4.4-p15 and earlier are affected by an Improper Input Validation vulnerability that could result in a Security feature bypass. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact to high. Exploitation of this issue does not require user interaction.

Nuclei template

3 repos

https://github.com/amalpvatayam67/day01-sessionreaper-lab

https://github.com/wubinworks/magento2-session-reaper-patch

https://github.com/Baba01hacker666/cve-2025-54236

hackmag@infosec.exchange at 2026-01-16T09:08:29.000Z ##

⚪ Adobe Commerce and Magento Vulnerability Enables Account Takeover

🗨️ Adobe has disclosed a critical bug (CVE-2025-54236) that affects the Commerce and Magento platforms. Researchers have dubbed this vulnerability SessionReaper and describe it as one of the most serious in…

🔗 hackmag.com/news/sessionreaper

#news

##

CVE-2025-59830
(7.5 HIGH)

EPSS: 0.07%

updated 2025-09-25T16:39:27

1 posts

## Summary `Rack::QueryParser` in version `< 2.2.18` enforces its `params_limit` only for parameters separated by `&`, while still splitting on both `&` and `;`. As a result, attackers could use `;` separators to bypass the parameter count limit and submit more parameters than intended. ## Details The issue arises because `Rack::QueryParser#check_query_string` counts only `&` characters when de

Ubuntu@activitypub.awakari.com at 2026-01-15T08:19:37.000Z ## Ubuntu 25.10: Rack Critical DoS Risk Fix USN-7960-1 CVE-2025-59830 Several security issues were fixed in Rack.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-54068(CVSS UNKNOWN)

EPSS: 0.12%

updated 2025-08-18T08:03:59

2 posts

### Impact In Livewire v3 (≤ 3.6.3), a vulnerability allows unauthenticated attackers to achieve remote command execution in specific scenarios. The issue stems from how certain component property updates are hydrated. This vulnerability is unique to Livewire v3 and does not affect prior major versions. Exploitation requires a component to be mounted and configured in a particular way, but does no

4 repos

https://github.com/synacktiv/Livepyre

https://github.com/z0d131482700x/Livewire2025CVE

https://github.com/haxorstars/CVE-2025-54068

https://github.com/flame-11/CVE-2025-54068-livewire

DarkWebInformer at 2026-01-22T19:25:25.165Z ##

‼️Livepyre: A tool designed to exploit CVE-2025-54068 and Remote Command Execution if the APP_KEY of the Livewire project is known.

GitHub: github.com/synacktiv/Livepyre

Writeup: synacktiv.com/en/publications/

CVSS: 9.2

Description: Livewire is a full-stack framework for Laravel. In Livewire v3 up to and including v3.6.3, a vulnerability allows unauthenticated attackers to achieve remote command execution in specific scenarios. The issue stems from how certain component property updates are hydrated. This vulnerability is unique to Livewire v3 and does not affect prior major versions. Exploitation requires a component to be mounted and configured in a particular way, but does not require authentication or user interaction. This issue has been patched in Livewire v3.6.4. All users are strongly encouraged to upgrade to this version or later as soon as possible. No known workarounds are available.

##

DarkWebInformer@infosec.exchange at 2026-01-22T19:25:25.000Z ##

‼️Livepyre: A tool designed to exploit CVE-2025-54068 and Remote Command Execution if the APP_KEY of the Livewire project is known.

GitHub: github.com/synacktiv/Livepyre

Writeup: synacktiv.com/en/publications/

CVSS: 9.2

Description: Livewire is a full-stack framework for Laravel. In Livewire v3 up to and including v3.6.3, a vulnerability allows unauthenticated attackers to achieve remote command execution in specific scenarios. The issue stems from how certain component property updates are hydrated. This vulnerability is unique to Livewire v3 and does not affect prior major versions. Exploitation requires a component to be mounted and configured in a particular way, but does not require authentication or user interaction. This issue has been patched in Livewire v3.6.4. All users are strongly encouraged to upgrade to this version or later as soon as possible. No known workarounds are available.

##

CVE-2025-25256
(9.8 CRITICAL)

EPSS: 31.60%

updated 2025-08-15T18:31:55

1 posts

An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiSIEM version 7.3.0 through 7.3.1, 7.2.0 through 7.2.5, 7.1.0 through 7.1.7, 7.0.0 through 7.0.3 and before 6.7.9 allows an unauthenticated attacker to execute unauthorized code or commands via crafted CLI requests.

Nuclei template

1 repos

https://github.com/watchtowrlabs/watchTowr-vs-FortiSIEM-CVE-2025-25256

jbhall56@infosec.exchange at 2026-01-15T14:35:44.000Z ##

The vulnerability is tracked as CVE-2025-25256, and is a combination of two issues that permit arbitrary write with admin permissions and privilege escalation to root access. bleepingcomputer.com/news/secu

##

CVE-2017-20149
(9.8 CRITICAL)

EPSS: 1.72%

updated 2025-05-14T15:32:35

1 posts

The Mikrotik RouterOS web server allows memory corruption in releases before Stable 6.38.5 and Long-term 6.37.5, aka Chimay-Red. A remote and unauthenticated user can trigger the vulnerability by sending a crafted HTTP request. An attacker can use this vulnerability to execute arbitrary code on the affected system, as exploited in the wild in mid-2017 and later.

hrbrmstr@mastodon.social at 2026-01-20T08:59:38.000Z ##

This looks to be Hajime only going after Mikrotik routers in some scanner's inventory. Highly targeted (only hitting our Mikrotiks), low and slow over time.

Definitely coming from a wide array of other compromised edge devices.

viz.greynoise.io/tags/mikrotik

##

CVE-2025-2104
(4.3 MEDIUM)

EPSS: 0.10%

updated 2025-03-13T06:30:39

1 posts

The Page Builder: Pagelayer – Drag and Drop website builder plugin for WordPress is vulnerable to unauthorized post publication due to insufficient validation on the pagelayer_save_content() function in all versions up to, and including, 1.9.8. This makes it possible for authenticated attackers, with Contributor-level access and above, to bypass post moderation and publish posts to the site.

1 repos

https://github.com/Ashwesker/Ashwesker-CVE-2025-21042

hackmag@infosec.exchange at 2026-01-19T12:37:17.000Z ##

⚪ Samsung patches a 0‑day exploited in attacks against Android users

🗨️ Samsung has patched a zero-day RCE vulnerability that was already being exploited in attacks against devices running Android.

🔗 hackmag.com/news/cve-2025-2104

#news

##

CVE-2025-1058
(8.1 HIGH)

EPSS: 0.07%

updated 2025-02-13T06:15:21.480000

1 posts

CWE-494: Download of Code Without Integrity Check vulnerability exists that could render the device inoperable when malicious firmware is downloaded.

1 repos

https://github.com/AdityaBhatt3010/CVE-2025-10585-The-Chrome-V8-Zero-Day

hackmag@infosec.exchange at 2026-01-20T13:12:39.000Z ##

⚪ Google patches a Chrome zero-day; the vulnerability is already being exploited in attacks

🗨️ Google has released updates for Chrome to address four vulnerabilities. According to the company, one of them (CVE-2025-10585) has already been exploited by attackers.

🔗 hackmag.com/news/cve-2025-1058

#news

##

CVE-2020-14343
(9.8 CRITICAL)

EPSS: 13.70%

updated 2024-11-21T05:03:03.217000

2 posts

A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing

2 repos

https://github.com/j4k0m/loader-CVE-2020-14343

https://github.com/Kairo-one/CVE-2020-14343-PyYAML

thehackerwire@mastodon.social at 2026-01-22T16:22:51.000Z ##

🟠 CVE-2026-24009 - High (8.1)

Docling Core (or docling-core) is a library that defines core data types and transformations in the document processing application Docling. A PyYAML-related Remote Code Execution (RCE) vulnerability, namely CVE-2020-14343, is exposed in docling-c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T16:22:51.000Z ##

🟠 CVE-2026-24009 - High (8.1)

Docling Core (or docling-core) is a library that defines core data types and transformations in the document processing application Docling. A PyYAML-related Remote Code Execution (RCE) vulnerability, namely CVE-2020-14343, is exposed in docling-c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2022-3270
(9.8 CRITICAL)

EPSS: 0.95%

updated 2023-01-31T05:03:00

1 posts

In multiple products by Festo a remote unauthenticated attacker could use functions of an undocumented protocol which could lead to a complete loss of confidentiality, integrity and availability.

beyondmachines1@infosec.exchange at 2026-01-16T14:01:44.000Z ##

Critical Unsecured Protocol Vulnerability Reported in Festo Industrial Firmware

Festo reports a critical exposure (CVE-2022-3270) in numerous industrial controllers and bus modules caused by undocumented and unsecured protocols that allow unauthenticated remote takeover.

**This is a weird report - there will be no patch, the unsecured ports will remain unsecured. Your only option is to isolate the systems from the internet and make them accessible from trusted networks only.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-24129
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-01-22T23:27:52.000Z ##

🟠 CVE-2026-24129 - High (8)

Runtipi is a Docker-based, personal homeserver orchestrator that facilitates multiple services on a single server. Versions 3.7.0 and above allow an authenticated user to execute arbitrary system commands on the host server by injecting shell meta...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T23:27:52.000Z ##

🟠 CVE-2026-24129 - High (8)

Runtipi is a Docker-based, personal homeserver orchestrator that facilitates multiple services on a single server. Versions 3.7.0 and above allow an authenticated user to execute arbitrary system commands on the host server by injecting shell meta...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2024-32462
(0 None)

EPSS: 0.19%

2 posts

N/A

1 repos

https://github.com/SpiralBL0CK/CVE-2024-32462

alip@mastodon.online at 2026-01-22T17:50:13.000Z ##

Sometimes devil is in the details. #POSIX requires option parsing to terminate when the initial non-option argument is encountered. This is different than the #GNU style which continues parsing arguments until an explicit "--" is encountered. The latter has been susceptible to command line injection attacks. One recent example is in #bubblewrap & #flatpak combo with CVE-2024-32462. Otoh, #sydbox and all its utilities use posixly correct option parsing: nvd.nist.gov/vuln/detail/cve-2 #linux #security

##

alip@mastodon.online at 2026-01-22T17:50:13.000Z ##

Sometimes devil is in the details. #POSIX requires option parsing to terminate when the initial non-option argument is encountered. This is different than the #GNU style which continues parsing arguments until an explicit "--" is encountered. The latter has been susceptible to command line injection attacks. One recent example is in #bubblewrap & #flatpak combo with CVE-2024-32462. Otoh, #sydbox and all its utilities use posixly correct option parsing: nvd.nist.gov/vuln/detail/cve-2 #linux #security

##

CVE-2026-1220
(0 None)

EPSS: 0.00%

2 posts

N/A

beyondmachines1 at 2026-01-22T10:01:03.060Z ##

Google Patches High-Severity V8 Race Condition in Chrome 144

Google released Chrome 144 to patch a high-severity race condition in the V8 engine (CVE-2026-1220) that could allow arbitrary code execution.

**If you are using Google Chrome or other Chromium-based browsers (Edge, Brave, Vivaldi, Opera...) patch your browser ASAP. Even if the flaw is not critical, you shouldn't wait for the flaw to become actively exploited. Update now, it's trivial and all your tabs reopen after the update.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-01-22T10:01:03.000Z ##

Google Patches High-Severity V8 Race Condition in Chrome 144

Google released Chrome 144 to patch a high-severity race condition in the V8 engine (CVE-2026-1220) that could allow arbitrary code execution.

**If you are using Google Chrome or other Chromium-based browsers (Edge, Brave, Vivaldi, Opera...) patch your browser ASAP. Even if the flaw is not critical, you shouldn't wait for the flaw to become actively exploited. Update now, it's trivial and all your tabs reopen after the update.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-24038
(0 None)

EPSS: 0.07%

2 posts

N/A

thehackerwire@mastodon.social at 2026-01-22T05:07:02.000Z ##

🟠 CVE-2026-24038 - High (8.1)

Horilla is a free and open source Human Resource Management System (HRMS). In version 1.4.0, the OTP handling logic has a flawed equality check that can be bypassed. When an OTP expires, the server returns None, and if an attacker omits the otp fi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T05:07:02.000Z ##

🟠 CVE-2026-24038 - High (8.1)

Horilla is a free and open source Human Resource Management System (HRMS). In version 1.4.0, the OTP handling logic has a flawed equality check that can be bypassed. When an OTP expires, the server returns None, and if an attacker omits the otp fi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23962
(0 None)

EPSS: 0.04%

2 posts

N/A

thehackerwire@mastodon.social at 2026-01-22T04:05:11.000Z ##

🟠 CVE-2026-23962 - High (7.5)

Mastodon is a free, open-source social network server based on ActivityPub. Mastodon versions before v4.3.18, v4.4.12, and v4.5.5 do not have a limit on the maximum number of poll options for remote posts, allowing attackers to create polls with a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T04:05:11.000Z ##

🟠 CVE-2026-23962 - High (7.5)

Mastodon is a free, open-source social network server based on ActivityPub. Mastodon versions before v4.3.18, v4.4.12, and v4.5.5 do not have a limit on the maximum number of poll options for remote posts, allowing attackers to create polls with a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24010
(0 None)

EPSS: 0.05%

4 posts

N/A

thehackerwire@mastodon.social at 2026-01-22T04:04:10.000Z ##

🟠 CVE-2026-24010 - High (8.8)

Horilla is a free and open source Human Resource Management System (HRMS). A critical File Upload vulnerability in versions prior to 1.5.0, with Social Engineering, allows authenticated users to deploy phishing attacks. By uploading a malicious HT...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T04:03:07.000Z ##

🟠 CVE-2026-24010 - High (8.8)

Horilla is a free and open source Human Resource Management System (HRMS). A critical File Upload vulnerability in versions prior to 1.5.0, with Social Engineering, allows authenticated users to deploy phishing attacks. By uploading a malicious HT...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T04:04:10.000Z ##

🟠 CVE-2026-24010 - High (8.8)

Horilla is a free and open source Human Resource Management System (HRMS). A critical File Upload vulnerability in versions prior to 1.5.0, with Social Engineering, allows authenticated users to deploy phishing attacks. By uploading a malicious HT...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-22T04:03:07.000Z ##

🟠 CVE-2026-24010 - High (8.8)

Horilla is a free and open source Human Resource Management System (HRMS). A critical File Upload vulnerability in versions prior to 1.5.0, with Social Engineering, allows authenticated users to deploy phishing attacks. By uploading a malicious HT...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22793
(0 None)

EPSS: 0.20%

1 posts

N/A

thehackerwire@mastodon.social at 2026-01-21T21:51:53.000Z ##

🔴 CVE-2026-22793 - Critical (9.6)

5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. Prior to version 0.15.3, an unsafe option parsing vulnerability in the ECharts Markdown plugin allows any user able to submit ECharts code blocks...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-68137
(0 None)

EPSS: 0.02%

1 posts

N/A

thehackerwire@mastodon.social at 2026-01-21T20:34:12.000Z ##

🟠 CVE-2025-68137 - High (8.3)

EVerest is an EV charging software stack. Prior to version 2025.10.0, an integer overflow occurring in `SdpPacket::parse_header()` allows the current buffer length to be set to 7 after a complete header of size 8 has been read. The remaining lengt...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-63261
(0 None)

EPSS: 0.00%

1 posts

N/A

pentesttools@infosec.exchange at 2026-01-19T12:31:55.000Z ##

Ever named your own CVE? We sure did. 😏

Meet PTT-2025-021 (aka CVE-2025-63261).

A vulnerability in AWStats hiding inside cPanel.

One misplaced "|" flips log analysis into command execution.

No magic. Just unsafe open() and legacy code trusting input.

On our blog, we walk through how we traced it, proved it, and why this vulnerability class still bites.

Special thanks to Matei Badanoiu for the research. 👏

See the full attack path in Part 1: pentest-tools.com/blog/cpanel-

##

CVE-2024-50349
(0 None)

EPSS: 0.39%

1 posts

N/A

linux@activitypub.awakari.com at 2026-01-15T19:36:02.000Z ## Ubuntu 18.04: Git Critical Credential Issues USN-7964-1 CVE-2024-50349 Several security issues were fixed in Git.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

Visit counter For Websites