##
Updated at UTC 2026-01-25T19:19:00.651853
| CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-24061 | 9.8 | 0.49% | 18 | 28 | 2026-01-25T01:16:04.343000 | telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a " | |
| CVE-2026-0911 | 7.5 | 0.08% | 2 | 0 | 2026-01-24T13:15:55.300000 | The Hustle – Email Marketing, Lead Generation, Optins, Popups plugin for WordPre | |
| CVE-2026-1257 | 7.5 | 0.07% | 3 | 0 | 2026-01-24T08:16:09.517000 | The Administrative Shortcodes plugin for WordPress is vulnerable to Local File I | |
| CVE-2025-13374 | 9.8 | 0.14% | 2 | 1 | 2026-01-24T08:16:05.173000 | The Kalrav AI Agent plugin for WordPress is vulnerable to arbitrary file uploads | |
| CVE-2026-24469 | 7.5 | 0.03% | 2 | 0 | 2026-01-24T03:16:01.150000 | C++ HTTP Server is an HTTP/1.1 server built to handle client connections and ser | |
| CVE-2026-24412 | 8.8 | 0.06% | 2 | 0 | 2026-01-24T02:15:49.360000 | iccDEV provides libraries and tools for interacting with, manipulating, and appl | |
| CVE-2026-24609 | 7.5 | 0.11% | 2 | 0 | 2026-01-23T22:36:54 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP | |
| CVE-2026-24608 | 7.5 | 0.11% | 2 | 0 | 2026-01-23T22:36:54 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP | |
| CVE-2026-24635 | 7.5 | 0.11% | 2 | 0 | 2026-01-23T22:36:54 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP | |
| CVE-2025-69907 | 7.5 | 0.03% | 2 | 0 | 2026-01-23T22:35:52 | An unauthenticated information disclosure vulnerability exists in Newgen OmniDoc | |
| CVE-2026-24367 | 8.8 | 0.03% | 2 | 0 | 2026-01-23T22:16:23.753000 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
| CVE-2026-20750 | 9.1 | 0.03% | 2 | 0 | 2026-01-23T22:16:15.977000 | Gitea does not properly validate project ownership in organization project opera | |
| CVE-2025-69180 | 8.8 | 0.03% | 2 | 0 | 2026-01-23T22:16:14.630000 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
| CVE-2025-66720 | 7.5 | 0.01% | 1 | 0 | 2026-01-23T21:31:51 | Null pointer dereference in free5gc pcf 1.4.0 in file internal/sbi/processor/amp | |
| CVE-2025-67229 | 9.8 | 0.01% | 1 | 0 | 2026-01-23T21:31:51 | An improper certificate validation vulnerability exists in ToDesktop Builder v0. | |
| CVE-2025-66719 | 9.1 | 0.03% | 1 | 0 | 2026-01-23T21:31:50 | An issue was discovered in Free5gc NRF 1.4.0. In the access-token generation log | |
| CVE-2025-70983 | 10.0 | 0.01% | 1 | 0 | 2026-01-23T21:30:54 | Incorrect access control in the authRoutes function of SpringBlade v4.5.0 allows | |
| CVE-2025-70985 | 9.1 | 0.01% | 1 | 0 | 2026-01-23T21:30:44 | Incorrect access control in the update function of RuoYi v4.8.2 allows unauthori | |
| CVE-2025-70986 | 7.5 | 0.01% | 1 | 0 | 2026-01-23T21:30:44 | Incorrect access control in the selectDept function of RuoYi v4.8.2 allows unaut | |
| CVE-2026-24572 | 8.8 | 0.01% | 2 | 0 | 2026-01-23T21:30:43 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
| CVE-2026-23760 | 0 | 3.36% | 1 | 1 | template | 2026-01-23T20:16:02.600000 | SmarterTools SmarterMail versions prior to build 9511 contain an authentication |
| CVE-2025-66428 | 8.8 | 0.02% | 2 | 0 | 2026-01-23T20:15:53.510000 | An issue with WordPress directory names in WebPros WordPress Toolkit before 6.9. | |
| CVE-2025-56590 | 9.8 | 0.05% | 2 | 0 | 2026-01-23T20:15:53.183000 | An issue was discovered in the InsertFromURL() function of the Apryse HTML2PDF S | |
| CVE-2026-20912 | None | 0.03% | 2 | 0 | 2026-01-23T20:14:54 | Gitea does not properly validate repository ownership when linking attachments t | |
| CVE-2026-20897 | None | 0.03% | 2 | 0 | 2026-01-23T20:14:46 | Gitea does not properly validate repository ownership when deleting Git LFS lock | |
| CVE-2026-20736 | None | 0.03% | 2 | 0 | 2026-01-23T20:11:38 | Gitea does not properly verify repository context when deleting attachments. A u | |
| CVE-2025-11344 | 6.3 | 0.19% | 2 | 0 | 2026-01-23T19:15:51.993000 | A vulnerability was detected in ILIAS up to 8.23/9.13/10.1. Affected by this vul | |
| CVE-2024-37079 | 9.8 | 82.70% | 5 | 0 | 2026-01-23T19:15:51.807000 | vCenter Server contains a heap-overflow vulnerability in the implementation of t | |
| CVE-2025-34026 | 7.5 | 54.54% | 3 | 0 | template | 2026-01-23T18:39:24.063000 | The Versa Concerto SD-WAN orchestration platform is vulnerable to an authenticat |
| CVE-2025-54313 | 7.5 | 4.45% | 3 | 3 | 2026-01-23T18:33:09.503000 | eslint-config-prettier 8.10.1, 9.1.1, 10.1.6, and 10.1.7 has embedded malicious | |
| CVE-2025-69908 | 7.5 | 0.01% | 1 | 0 | 2026-01-23T18:31:35 | An unauthenticated information disclosure vulnerability in Newgen OmniApp allows | |
| CVE-2025-67221 | None | 0.04% | 1 | 1 | 2026-01-23T16:56:03 | The orjson.dumps function in orjson thru 3.11.4 does not limit recursion for dee | |
| CVE-2026-23954 | 8.7 | 0.09% | 1 | 0 | 2026-01-23T15:46:36 | ### Summary A user with the ability to launch a container with a custom image (e | |
| CVE-2025-4319 | 9.4 | 0.07% | 1 | 0 | 2026-01-23T15:31:44 | Improper Restriction of Excessive Authentication Attempts, Weak Password Recover | |
| CVE-2026-20613 | 7.8 | 0.01% | 1 | 0 | 2026-01-23T15:16:07.070000 | The ArchiveReader.extractContents() function used by cctl image load and contain | |
| CVE-2025-4320 | 10.0 | 0.07% | 1 | 0 | 2026-01-23T13:15:49.123000 | Authentication Bypass by Primary Weakness, Weak Password Recovery Mechanism for | |
| CVE-2025-14866 | 8.8 | 0.02% | 1 | 0 | 2026-01-23T13:15:47.983000 | The Melapress Role Editor plugin for WordPress is vulnerable to Privilege Escala | |
| CVE-2026-22273 | 8.8 | 0.02% | 1 | 0 | 2026-01-23T12:30:36 | Dell ECS, versions 3.8.1.0 through 3.8.1.7, and Dell ObjectScale versions prior | |
| CVE-2026-22271 | 7.5 | 0.02% | 1 | 0 | 2026-01-23T09:30:30 | Dell ECS, versions 3.8.1.0 through 3.8.1.7, and Dell ObjectScale versions prior | |
| CVE-2026-0603 | 8.3 | 0.07% | 1 | 0 | 2026-01-23T09:30:29 | A flaw was found in Hibernate. A remote attacker with low privileges could explo | |
| CVE-2026-1363 | 9.8 | 0.03% | 1 | 0 | 2026-01-23T09:30:29 | IAQS and I6 developed by JNC has a Client-Side Enforcement of Server-Side Securi | |
| CVE-2026-1364 | 9.8 | 0.13% | 1 | 0 | 2026-01-23T09:15:47.643000 | IAQS and I6 developed by JNC has a Missing Authentication vulnerability, allowin | |
| CVE-2026-0791 | 8.1 | 0.57% | 2 | 0 | 2026-01-23T06:31:33 | ALGO 8180 IP Audio Alerter SIP INVITE Replaces Stack-based Buffer Overflow Remot | |
| CVE-2026-0787 | 8.1 | 1.00% | 2 | 0 | 2026-01-23T06:31:33 | ALGO 8180 IP Audio Alerter SAC Command Injection Remote Code Execution Vulnerabi | |
| CVE-2026-0785 | 7.5 | 0.92% | 2 | 0 | 2026-01-23T06:31:33 | ALGO 8180 IP Audio Alerter API Command Injection Remote Code Execution Vulnerabi | |
| CVE-2026-0778 | 8.8 | 0.08% | 1 | 0 | 2026-01-23T06:31:33 | Enel X JuiceBox 40 Telnet Service Missing Authentication Remote Code Execution V | |
| CVE-2026-0792 | 8.1 | 0.57% | 1 | 0 | 2026-01-23T06:31:33 | ALGO 8180 IP Audio Alerter SIP INVITE Alert-Info Stack-based Buffer Overflow Rem | |
| CVE-2025-15349 | 7.5 | 0.09% | 1 | 0 | 2026-01-23T06:31:32 | Anritsu ShockLine SCPI Race Condition Remote Code Execution Vulnerability. This | |
| CVE-2026-0762 | 8.1 | 0.36% | 1 | 0 | 2026-01-23T06:31:32 | GPT Academic stream_daas Deserialization of Untrusted Data Remote Code Execution | |
| CVE-2026-0761 | 9.8 | 1.39% | 1 | 0 | 2026-01-23T06:31:32 | Foundation Agents MetaGPT actionoutput_str_to_mapping Code Injection Remote Code | |
| CVE-2026-0760 | 9.8 | 1.30% | 1 | 0 | 2026-01-23T06:31:32 | Foundation Agents MetaGPT deserialize_message Deserialization of Untrusted Data | |
| CVE-2026-0755 | 9.8 | 1.00% | 1 | 0 | 2026-01-23T06:31:32 | gemini-mcp-tool execAsync Command Injection Remote Code Execution Vulnerability. | |
| CVE-2026-0768 | 9.8 | 1.39% | 1 | 0 | 2026-01-23T06:31:32 | Langflow code Code Injection Remote Code Execution Vulnerability. This vulnerabi | |
| CVE-2026-0763 | 9.8 | 1.30% | 2 | 0 | 2026-01-23T06:31:32 | GPT Academic run_in_subprocess_wrapper_func Deserialization of Untrusted Data Re | |
| CVE-2026-0765 | 8.8 | 0.70% | 1 | 0 | 2026-01-23T06:31:32 | Open WebUI PIP install_frontmatter_requirements Command Injection Remote Code Ex | |
| CVE-2026-0774 | 8.8 | 0.14% | 1 | 0 | 2026-01-23T06:31:32 | WatchYourLAN Configuration Page Argument Injection Remote Code Execution Vulnera | |
| CVE-2026-0773 | 9.8 | 1.30% | 1 | 0 | 2026-01-23T06:31:32 | Upsonic Cloudpickle Deserialization of Untrusted Data Remote Code Execution Vuln | |
| CVE-2026-0794 | 8.1 | 1.15% | 2 | 0 | 2026-01-23T06:31:32 | ALGO 8180 IP Audio Alerter SIP Use-After-Free Remote Code Execution Vulnerabilit | |
| CVE-2025-15061 | 9.8 | 0.85% | 1 | 0 | 2026-01-23T06:31:24 | Framelink Figma MCP Server fetchWithRetry Command Injection Remote Code Executio | |
| CVE-2026-0710 | 8.4 | 0.05% | 1 | 0 | 2026-01-23T06:31:24 | A flaw was found in SIPp. A remote attacker could exploit this by sending specia | |
| CVE-2025-15350 | 7.8 | 0.21% | 1 | 0 | 2026-01-23T06:31:24 | Anritsu VectorStar CHX File Parsing Deserialization of Untrusted Data Remote Cod | |
| CVE-2025-15063 | 9.8 | 1.00% | 1 | 0 | 2026-01-23T06:31:24 | Ollama MCP Server execAsync Command Injection Remote Code Execution Vulnerabilit | |
| CVE-2025-15348 | 7.8 | 0.21% | 1 | 0 | 2026-01-23T06:31:23 | Anritsu ShockLine CHX File Parsing Deserialization of Untrusted Data Remote Code | |
| CVE-2025-67847 | 8.8 | 0.07% | 1 | 0 | 2026-01-23T05:16:24.250000 | A flaw was found in Moodle. An attacker with access to the restore interface cou | |
| CVE-2025-3839 | 8.0 | 0.01% | 1 | 0 | 2026-01-23T05:16:21.753000 | A flaw was found in Epiphany, a tool that allows websites to open external URL h | |
| CVE-2026-0793 | 8.1 | 0.57% | 2 | 0 | 2026-01-23T04:16:07.123000 | ALGO 8180 IP Audio Alerter InformaCast Heap-based Buffer Overflow Remote Code Ex | |
| CVE-2026-0786 | 7.5 | 1.22% | 2 | 0 | 2026-01-23T04:16:06.180000 | ALGO 8180 IP Audio Alerter SCI Command Injection Remote Code Execution Vulnerabi | |
| CVE-2026-0772 | 7.5 | 1.04% | 1 | 0 | 2026-01-23T04:16:04.333000 | Langflow Disk Cache Deserialization of Untrusted Data Remote Code Execution Vuln | |
| CVE-2026-0770 | 9.8 | 1.15% | 1 | 0 | 2026-01-23T04:16:04.063000 | Langflow exec_globals Inclusion of Functionality from Untrusted Control Sphere R | |
| CVE-2026-0769 | 9.8 | 1.04% | 1 | 0 | 2026-01-23T04:16:03.933000 | Langflow eval_custom_component_code Eval Injection Remote Code Execution Vulnera | |
| CVE-2026-0766 | 8.8 | 0.70% | 1 | 0 | 2026-01-23T04:16:03.527000 | Open WebUI load_tool_module_by_id Command Injection Remote Code Execution Vulner | |
| CVE-2026-0764 | 9.8 | 1.30% | 1 | 0 | 2026-01-23T04:16:03.250000 | GPT Academic upload Deserialization of Untrusted Data Remote Code Execution Vuln | |
| CVE-2026-0759 | 9.8 | 1.00% | 1 | 0 | 2026-01-23T04:16:02.570000 | Katana Network Development Starter Kit executeCommand Command Injection Remote C | |
| CVE-2026-0758 | 7.8 | 0.05% | 2 | 0 | 2026-01-23T04:16:02.433000 | mcp-server-siri-shortcuts shortcutName Command Injection Privilege Escalation Vu | |
| CVE-2026-0757 | 8.8 | 0.07% | 2 | 0 | 2026-01-23T04:16:02.297000 | MCP Manager for Claude Desktop execute-command Command Injection Sandbox Escape | |
| CVE-2026-0756 | 9.8 | 1.00% | 1 | 0 | 2026-01-23T04:16:02.157000 | github-kanban-mcp-server execAsync Command Injection Remote Code Execution Vulne | |
| CVE-2025-15351 | 7.8 | 0.21% | 1 | 0 | 2026-01-23T04:16:01.710000 | Anritsu VectorStar CHX File Parsing Deserialization of Untrusted Data Remote Cod | |
| CVE-2025-15062 | 7.8 | 0.05% | 1 | 0 | 2026-01-23T04:16:01.033000 | Trimble SketchUp SKP File Parsing Use-After-Free Remote Code Execution Vulnerabi | |
| CVE-2025-15059 | 7.8 | 0.06% | 1 | 0 | 2026-01-23T04:16:00.740000 | GIMP PSP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerabi | |
| CVE-2026-24304 | 9.9 | 0.08% | 2 | 0 | 2026-01-23T02:15:55.547000 | Improper access control in Azure Resource Manager allows an authorized attacker | |
| CVE-2026-24306 | 9.8 | 0.09% | 3 | 0 | 2026-01-23T00:31:24 | Improper access control in Azure Front Door (AFD) allows an unauthorized attacke | |
| CVE-2026-24305 | 9.3 | 0.07% | 2 | 0 | 2026-01-23T00:31:24 | Azure Entra ID Elevation of Privilege Vulnerability | |
| CVE-2026-21520 | 7.5 | 0.10% | 2 | 0 | 2026-01-23T00:31:24 | Exposure of Sensitive Information to an Unauthorized Actor in Copilot Studio all | |
| CVE-2026-24307 | 9.3 | 0.10% | 1 | 0 | 2026-01-22T23:15:59.003000 | Improper validation of specified type of input in M365 Copilot allows an unautho | |
| CVE-2026-21264 | 9.3 | 0.07% | 3 | 0 | 2026-01-22T23:15:57.407000 | Improper neutralization of input during web page generation ('cross-site scripti | |
| CVE-2026-21227 | 8.2 | 0.08% | 2 | 0 | 2026-01-22T23:15:57.220000 | Improper limitation of a pathname to a restricted directory ('path traversal') i | |
| CVE-2025-54816 | 9.4 | 0.07% | 2 | 0 | 2026-01-22T23:15:49.953000 | This vulnerability occurs when a WebSocket endpoint does not enforce proper aut | |
| CVE-2025-53968 | 7.5 | 0.08% | 2 | 0 | 2026-01-22T23:15:49.800000 | This vulnerability arises because there are no limitations on the number of aut | |
| CVE-2026-23953 | 8.7 | 0.01% | 1 | 0 | 2026-01-22T22:16:20.673000 | Incus is a system container and virtual machine manager. In versions 6.20.0 and | |
| CVE-2026-1201 | 0 | 0.04% | 2 | 0 | 2026-01-22T22:16:16.130000 | An Authorization Bypass Through User-Controlled Key vulnerability in Hubitat Ele | |
| CVE-2025-31125 | 5.3 | 67.18% | 3 | 7 | template | 2026-01-22T21:47:41 | ### Summary The contents of arbitrary files can be returned to the browser. ## |
| CVE-2025-68645 | 8.8 | 26.23% | 3 | 3 | template | 2026-01-22T21:33:44 | A Local File Inclusion (LFI) vulnerability exists in the Webmail Classic UI of Z |
| CVE-2026-24009 | 8.1 | 0.10% | 1 | 0 | 2026-01-22T18:43:46 | ### Impact A PyYAML-related Remote Code Execution (RCE) vulnerability, namely C | |
| CVE-2025-13601 | 7.7 | 0.03% | 1 | 0 | 2026-01-22T18:31:34 | A heap-based buffer overflow problem was found in glib through an incorrect calc | |
| CVE-2026-22278 | 8.1 | 0.09% | 1 | 0 | 2026-01-22T18:30:45 | Dell PowerScale OneFS versions prior to 9.13.0.0 contains an improper restrictio | |
| CVE-2026-22200 | None | 4.28% | 1 | 1 | template | 2026-01-22T18:30:31 | Enhancesoft osTicket versions up to and including 1.18.2 contain an arbitrary fi |
| CVE-2026-24006 | 7.5 | 0.04% | 1 | 0 | 2026-01-22T18:02:24 | Serialization of objects with extreme depth can **exceed the maximum call stack | |
| CVE-2025-69828 | 10.0 | 0.26% | 1 | 0 | 2026-01-22T17:16:28.403000 | File Upload vulnerability in TMS Global Software TMS Management Console v.6.3.7. | |
| CVE-2025-67968 | 0 | 0.02% | 3 | 0 | 2026-01-22T17:16:06.357000 | Unrestricted Upload of File with Dangerous Type vulnerability in InspiryThemes R | |
| CVE-2025-69764 | 9.8 | 0.07% | 1 | 0 | 2026-01-22T16:16:07.660000 | Tenda AX3 firmware v16.03.12.11 contains a stack-based buffer overflow in the fo | |
| CVE-2025-36588 | 8.8 | 0.06% | 1 | 0 | 2026-01-22T16:16:07.050000 | Dell Unisphere for PowerMax, version(s) 10.2.0.x, contain(s) an Improper Neutral | |
| CVE-2026-23957 | 7.5 | 0.04% | 1 | 0 | 2026-01-22T15:44:02 | Overriding encoded array lengths by replacing them with an excessively large val | |
| CVE-2026-23965 | 7.5 | 0.01% | 1 | 0 | 2026-01-22T15:43:31 | ### Summary A signature forgery vulnerability exists in the SM2 signature verif | |
| CVE-2026-23967 | 7.5 | 0.01% | 2 | 0 | 2026-01-22T15:43:21 | ### Summary A signature malleability vulnerability exists in the SM2 signature | |
| CVE-2026-23524 | 9.8 | 0.57% | 1 | 0 | 2026-01-22T15:39:15 | ### Impact This vulnerability affects Laravel Reverb versions prior to v1.7.0 w | |
| CVE-2026-1329 | 8.8 | 0.15% | 1 | 0 | 2026-01-22T15:31:44 | A flaw has been found in Tenda AX1803 1.0.0.1. The affected element is the funct | |
| CVE-2025-13928 | 7.5 | 0.01% | 1 | 0 | 2026-01-22T15:31:39 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.7 | |
| CVE-2025-10855 | 7.5 | 0.01% | 1 | 0 | 2026-01-22T15:31:39 | Authorization Bypass Through User-Controlled Key vulnerability in Solvera Softwa | |
| CVE-2025-13927 | 7.5 | 0.03% | 1 | 0 | 2026-01-22T15:31:38 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 11.9 | |
| CVE-2026-1328 | 8.8 | 0.08% | 1 | 0 | 2026-01-22T15:16:51.173000 | A vulnerability was detected in Totolink NR1800X 9.1.0u.6279_B20210910. Impacted | |
| CVE-2026-1324 | 8.8 | 0.04% | 1 | 0 | 2026-01-22T15:16:50.420000 | A vulnerability was identified in Sangfor Operation and Maintenance Management S | |
| CVE-2025-69766 | 9.8 | 0.21% | 1 | 0 | 2026-01-22T15:16:48.843000 | Tenda AX3 firmware v16.03.12.11 contains a stack-based buffer overflow in the fo | |
| CVE-2025-10856 | 8.1 | 0.01% | 1 | 0 | 2026-01-22T13:16:04.043000 | Unrestricted Upload of File with Dangerous Type vulnerability in Solvera Softwar | |
| CVE-2025-10024 | 7.5 | 0.04% | 1 | 0 | 2026-01-22T12:31:32 | Authorization Bypass Through User-Controlled Key vulnerability in EXERT Computer | |
| CVE-2025-4764 | 8.0 | 0.01% | 1 | 2 | 2026-01-22T10:16:07.520000 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
| CVE-2026-1330 | 7.5 | 0.02% | 1 | 0 | 2026-01-22T09:31:40 | MeetingHub developed by HAMASTAR Technology has an Arbitrary File Read vulnerabi | |
| CVE-2026-1331 | 9.8 | 0.19% | 1 | 0 | 2026-01-22T09:15:52.197000 | MeetingHub developed by HAMASTAR Technology has an Arbitrary File Upload vulnera | |
| CVE-2026-0920 | 9.8 | 0.03% | 3 | 2 | 2026-01-22T07:15:50.813000 | The LA-Studio Element Kit for Elementor plugin for WordPress is vulnerable to Ad | |
| CVE-2026-24042 | 9.4 | 0.14% | 1 | 0 | 2026-01-22T04:16:00.187000 | Appsmith is a platform to build admin panels, internal tools, and dashboards. In | |
| CVE-2025-27380 | 7.6 | 0.03% | 1 | 0 | 2026-01-22T03:31:34 | HTML injection in Project Release in Altium Enterprise Server (AES) 7.0.3 on all | |
| CVE-2025-27378 | 8.6 | 0.04% | 1 | 0 | 2026-01-22T03:31:28 | AES contains a SQL injection vulnerability due to an inactive configuration that | |
| CVE-2026-24010 | 8.8 | 0.05% | 2 | 0 | 2026-01-22T03:15:48.090000 | Horilla is a free and open source Human Resource Management System (HRMS). A cri | |
| CVE-2026-24002 | 9.0 | 0.05% | 1 | 0 | 2026-01-22T03:15:47.777000 | Grist is spreadsheet software using Python as its formula language. Grist offers | |
| CVE-2026-23966 | 9.1 | 0.01% | 2 | 0 | 2026-01-22T03:15:47.007000 | sm-crypto provides JavaScript implementations of the Chinese cryptographic algor | |
| CVE-2026-23956 | 7.5 | 0.04% | 1 | 0 | 2026-01-22T02:15:52.310000 | seroval facilitates JS value stringification, including complex structures beyon | |
| CVE-2026-23737 | 7.5 | 0.07% | 1 | 0 | 2026-01-21T23:15:52.493000 | seroval facilitates JS value stringification, including complex structures beyon | |
| CVE-2026-22807 | 8.8 | 0.05% | 1 | 0 | 2026-01-21T22:15:49.077000 | vLLM is an inference and serving engine for large language models (LLMs). Starti | |
| CVE-2025-13878 | 7.5 | 0.03% | 2 | 0 | 2026-01-21T21:31:32 | Malformed BRID/HHIT records can cause `named` to terminate unexpectedly. This is | |
| CVE-2026-20045 | 8.2 | 0.68% | 8 | 1 | 2026-01-21T21:31:31 | A vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unif | |
| CVE-2026-22793 | 9.6 | 0.20% | 1 | 0 | 2026-01-21T21:16:10.107000 | 5ire is a cross-platform desktop artificial intelligence assistant and model con | |
| CVE-2025-66692 | 7.5 | 0.04% | 1 | 0 | 2026-01-21T18:31:36 | A buffer over-read in the PublicKey::verify() method of Binance - Trust Wallet C | |
| CVE-2026-20055 | 4.8 | 0.03% | 1 | 0 | 2026-01-21T18:30:38 | Multiple vulnerabilities in the web-based management interface of Cisco Packaged | |
| CVE-2026-20092 | 6.0 | 0.01% | 1 | 0 | 2026-01-21T18:30:38 | A vulnerability in the read-only maintenance shell of Cisco Intersight Virtual A | |
| CVE-2025-70650 | 7.5 | 0.04% | 1 | 0 | 2026-01-21T18:30:37 | Tenda AX-1806 v1.0.0.1 was discovered to contain a stack overflow in the deviceL | |
| CVE-2025-70651 | 7.5 | 0.04% | 1 | 0 | 2026-01-21T18:30:30 | Tenda AX-1803 v1.0.0.1 was discovered to contain a stack overflow in the ssid pa | |
| CVE-2026-20109 | 4.8 | 0.03% | 1 | 0 | 2026-01-21T17:16:08.723000 | Multiple vulnerabilities in the web-based management interface of Cisco Packaged | |
| CVE-2026-20080 | 5.3 | 0.10% | 1 | 0 | 2026-01-21T17:16:08.410000 | A vulnerability in the SSH service of Cisco IEC6400 Wireless Backhaul Edge Compu | |
| CVE-2025-64087 | 9.8 | 0.07% | 1 | 1 | 2026-01-21T16:56:51 | A Server-Side Template Injection (SSTI) vulnerability in the FreeMarker componen | |
| CVE-2026-22022 | 8.2 | 0.04% | 1 | 0 | 2026-01-21T16:16:10.360000 | Deployments of Apache Solr 5.3.0 through 9.10.0 that rely on Solr's "Rule Based | |
| CVE-2026-21945 | 7.5 | 0.04% | 1 | 0 | 2026-01-21T16:16:08.437000 | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Ente | |
| CVE-2025-57156 | 7.5 | 0.10% | 1 | 0 | 2026-01-21T15:32:23 | NULL pointer dereference in the dacp_reply_playqueueedit_clear function in src/h | |
| CVE-2025-55423 | 9.8 | 0.19% | 1 | 0 | 2026-01-21T15:32:18 | ipTIME routers A2003NS-MU 10.00.6 to 12.16.2 , N600 10.00.8 to 12.16.2, A604-V3 | |
| CVE-2025-65482 | 9.8 | 0.06% | 1 | 1 | 2026-01-21T15:16:07.750000 | An XML External Entity (XXE) vulnerability in opensagres XDocReport v0.9.2 to v2 | |
| CVE-2025-57155 | 7.5 | 0.11% | 1 | 0 | 2026-01-21T15:16:06.827000 | NULL pointer dereference in the daap_reply_groups function in src/httpd_daap.c i | |
| CVE-2025-56353 | 7.5 | 0.04% | 1 | 0 | 2026-01-21T15:16:06.640000 | In tinyMQTT commit 6226ade15bd4f97be2d196352e64dd10937c1962 (2024-02-18), a memo | |
| CVE-2026-23885 | 6.4 | 0.02% | 1 | 1 | 2026-01-21T14:55:34 | ### Summary A vulnerability was discovered during a manual security audit of the | |
| CVE-2026-22755 | None | 0.96% | 1 | 0 | 2026-01-20T21:31:34 | Improper Neutralization of Special Elements used in a Command ('Command Injectio | |
| CVE-2025-64155 | 9.8 | 0.04% | 1 | 4 | 2026-01-20T16:16:06.200000 | An improper neutralization of special elements used in an os command ('os comman | |
| CVE-2026-22844 | 10.0 | 0.29% | 1 | 1 | 2026-01-20T15:33:21 | A Command Injection vulnerability in Zoom Node Multimedia Routers (MMRs) before | |
| CVE-2026-23744 | 9.8 | 0.65% | 1 | 1 | 2026-01-16T21:57:11 | ### Summary MCPJam inspector is the local-first development platform for MCP ser | |
| CVE-2026-23490 | 7.5 | 0.05% | 1 | 0 | 2026-01-16T21:56:00 | ### Summary After reviewing pyasn1 v0.6.1 a Denial-of-Service issue has been fo | |
| CVE-2026-23745 | None | 0.01% | 1 | 1 | 2026-01-16T21:16:24 | ### Summary The `node-tar` library (`<= 7.5.2`) fails to sanitize the `linkpath | |
| CVE-2026-20965 | 7.5 | 0.03% | 2 | 0 | 2026-01-16T16:23:11.237000 | Improper verification of cryptographic signature in Windows Admin Center allows | |
| CVE-2025-59718 | 9.8 | 2.27% | 8 | 3 | 2025-12-17T13:54:45.390000 | A improper verification of cryptographic signature vulnerability in Fortinet For | |
| CVE-2025-14321 | 9.8 | 0.08% | 1 | 0 | 2025-12-11T21:15:46.907000 | Use-after-free in the WebRTC: Signaling component. This vulnerability affects Fi | |
| CVE-2025-59719 | 9.8 | 0.08% | 1 | 1 | 2025-12-09T19:59:29.507000 | An improper verification of cryptographic signature vulnerability in Fortinet Fo | |
| CVE-2025-1432 | 7.8 | 0.08% | 1 | 0 | 2025-11-13T19:34:53.453000 | A maliciously crafted 3DM file, when parsed through Autodesk AutoCAD, can force | |
| CVE-2025-12480 | 9.1 | 74.74% | 1 | 0 | template | 2025-11-12T15:32:32 | Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access |
| CVE-2021-35394 | 9.8 | 94.22% | 2 | 0 | template | 2025-11-07T19:01:01.300000 | Realtek Jungle SDK version v2.x up to v3.4.14B provides a diagnostic tool called |
| CVE-2025-34164 | None | 0.30% | 1 | 0 | 2025-11-03T18:32:42 | A heap-based buffer overflow vulnerability in NetSupport Manager 14.x versions p | |
| CVE-2025-34165 | 0 | 0.19% | 1 | 0 | 2025-09-02T15:55:35.520000 | A stack-based buffer overflow vulnerability in NetSupport Manager 14.x versions | |
| CVE-2024-32462 | 8.4 | 0.19% | 1 | 1 | 2025-08-21T00:43:47.783000 | Flatpak is a system for building, distributing, and running sandboxed desktop ap | |
| CVE-2025-54068 | None | 0.12% | 1 | 4 | 2025-08-18T08:03:59 | ### Impact In Livewire v3 (≤ 3.6.3), a vulnerability allows unauthenticated atta | |
| CVE-2007-0882 | 0 | 90.96% | 2 | 0 | 2025-04-09T00:30:58.490000 | Argument injection vulnerability in the telnet daemon (in.telnetd) in Solaris 10 | |
| CVE-2020-15250 | 4.4 | 0.02% | 1 | 0 | 2024-11-21T05:05:11.403000 | In JUnit4 from version 4.7 and before 4.13.1, the test rule TemporaryFolder cont | |
| CVE-2020-14343 | 9.8 | 13.70% | 1 | 2 | 2024-11-21T05:03:03.217000 | A vulnerability was discovered in the PyYAML library in versions before 5.4, whe | |
| CVE-1999-0113 | None | 18.66% | 1 | 0 | 2024-02-13T18:38:18 | Some implementations of rlogin allow root access if given a -froot parameter. | |
| CVE-2026-24399 | 0 | 0.01% | 4 | 0 | N/A | ||
| CVE-2026-24406 | 0 | 0.06% | 4 | 0 | N/A | ||
| CVE-2026-24405 | 0 | 0.06% | 2 | 0 | N/A | ||
| CVE-2025-48384 | 0 | 0.33% | 1 | 44 | N/A | ||
| CVE-2026-1386 | 0 | 0.01% | 1 | 0 | N/A | ||
| CVE-2026-24138 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-24129 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2026-1220 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2026-24038 | 0 | 0.07% | 1 | 0 | N/A | ||
| CVE-2026-23962 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2026-22792 | 0 | 0.12% | 1 | 0 | N/A | ||
| CVE-2025-68137 | 0 | 0.02% | 1 | 0 | N/A |
updated 2026-01-25T01:16:04.343000
18 posts
28 repos
https://github.com/midox008/CVE-2026-24061
https://github.com/parameciumzhang/Tell-Me-Root
https://github.com/h3athen/CVE-2026-24061
https://github.com/JayGLXR/CVE-2026-24061-POC
https://github.com/infat0x/CVE-2026-24061
https://github.com/monstertsl/CVE-2026-24061
https://github.com/SafeBreach-Labs/CVE-2026-24061
https://github.com/Mr-Zapi/CVE-2026-24061
https://github.com/TryA9ain/CVE-2026-24061
https://github.com/yanxinwu946/CVE-2026-24061--telnetd
https://github.com/Chocapikk/CVE-2026-24061
https://github.com/cyberpoul/CVE-2026-24061-POC
https://github.com/hackingyseguridad/root
https://github.com/DeadlyHollows/CVE-2026-24061-setup
https://github.com/leonjza/inetutils-telnetd-auth-bypass
https://github.com/Ashwesker/Ashwesker-CVE-2026-24061
https://github.com/BrainBob/Telnet-TestVuln-CVE-2026-24061
https://github.com/madfxr/Twenty-Three-Scanner
https://github.com/BrainBob/CVE-2026-24061
https://github.com/xuemian168/CVE-2026-24061
https://github.com/typeconfused/CVE-2026-24061
https://github.com/m3ngx1ng/cve_2026_24061_cli
https://github.com/Alter-N0X/CVE-2026-24061-POC
https://github.com/r00tuser111/CVE-2026-24061
https://github.com/balgan/CVE-2026-24061
https://github.com/SystemVll/CVE-2026-24061
GNU InetUtils telnetd Authentication Bypass Exploited in the Wild
A critical authentication bypass in GNU InetUtils telnetd (CVE-2026-24061) is actively exploited only days after the public reporting of the flaw. It's urgent that you block any telnet server you are using from the Internet.
**THIS IS URGENT! Check if you are using Telnet anywhere in your network. IMMEDIATELY isolate the Telnet interface to trusted networks and patch the code. Then stop using Telnet and switch to SSH.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/gnu-inetutils-telnetd-authentication-bypass-exploited-in-the-wild-8-f-f-u-3/gD2P6Ple2L
2.7までのGNU inetutilsに含まれるtelnetdに、細工した環境変数を送信するだけで認証を回避して特権ユーザーでのログインが可能な脆弱性が発見されたらしい。CVE-2026-24061。いまどきtelnetdをThe Internetに露出している人はそうそういないはずとはいえ、なかなか興味深いので調べてみたところ。`telnetd`が`execv()`で呼び出す`/usr/bin/login`のコマンドラインオプションをうまく使うことでそういうことができてしまうようで、正直興奮した。
#CVE #GNU #inetutils #login #telnetd #サイバーセキュリティ #セキュリティ #情報セキュリティ #脆弱性
##oh lol - 2026 - 9.8er (critical) CVE im *telnetd* :D (CVE-2026-24061)
##@distrowatch There's a critical vulnerability in the server side, CVE-2026-24061, to do with environment handling - see https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-telnetd-auth-bypass-flaw-to-get-root/
##Canonical not doing great on the telnetd vuln (CVE-2026-24061). Even if telnetd is not widely deployed today, it's still a huge auth bypass and the patch is simple and uncontroversial. Yet https://ubuntu.com/security/CVE-2026-24061 was last updated 3 days ago and status is "needs evaluation" for all releases.
Really makes me want to pay for their premium services.
##GNU InetUtils Telnetd Root Authentication Bypass Vulnerability (CVE-2026-24061) Exposes Critical Legacy Risk + Video
Legacy Network Services Under Modern Threat Pressure The continued presence of legacy network services in modern infrastructures has once again proven to be a silent but dangerous liability. GNU InetUtils telnetd, a component still deployed in embedded systems, academic environments, and legacy enterprise networks, has been affected by a newly disclosed…
##GNU InetUtils telnetd Authentication Bypass Exploited in the Wild
A critical authentication bypass in GNU InetUtils telnetd (CVE-2026-24061) is actively exploited only days after the public reporting of the flaw. It's urgent that you block any telnet server you are using from the Internet.
**THIS IS URGENT! Check if you are using Telnet anywhere in your network. IMMEDIATELY isolate the Telnet interface to trusted networks and patch the code. Then stop using Telnet and switch to SSH.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/gnu-inetutils-telnetd-authentication-bypass-exploited-in-the-wild-8-f-f-u-3/gD2P6Ple2L
oh lol - 2026 - 9.8er (critical) CVE im *telnetd* :D (CVE-2026-24061)
##@distrowatch There's a critical vulnerability in the server side, CVE-2026-24061, to do with environment handling - see https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-telnetd-auth-bypass-flaw-to-get-root/
##Telnet RCE Exploit https://github.com/SafeBreach-Labs/CVE-2026-24061
##Hackers are now getting instant root access to thousands of legacy devices with a single Telnet handshake—no password needed. The flaw is shockingly simple and already being exploited. How safe are your old systems?
##Trollolol, telnetd lets you log in without a password if you send the USER environment variable as "-f root" (which gets passed unsanitized to login(1)).
(Yes, yes, telnet, but still. :-)
https://www.openwall.com/lists/oss-security/2026/01/20/2
CVE-2026-24061
##There is a critical auth bypass vulnerability in telnetd (https://nvd.nist.gov/vuln/detail/CVE-2026-24061) so I will need to update the surl-server Apple II proxy image. It has telnetd enabled (on localhost only, so is only accessible via the Apple II's serial port and you're probably already root on it)
##We caught a few (desperate) fiends trying to have their way with our vulnerable-to Telnetd -f Auth Bypass vuln (CVE-2026-24061) systems and I took a spelunk in the PCAPs:
Some of the least clever and least capable actors I've seen in a while.
"-f Around and Find Out: 18 Hours of Unsolicited Telnet Houseguests “ takes you on a deep dive into the packets.
cc: @darses
##I shot a 📄 to the team to 👀 later today but we've seen some activity on the recent Inetutils Telnetd -f Auth Bypass vuln (CVE-2026-24061) — https://viz.greynoise.io/tags/inetutils-telnetd--f-auth-bypass-attempt?days=30
We stood up some full vulnerable systems and a cpl IPs only hit those, so the targeting precision was oddly fast.
If they don't do a main GN blog I'll post deets on the Labs blog (I'm OOO today).
Rly glad this was a nothingburger.
Spidey-sense says something yuge (not related to this) is coming soon tho. The internet feels “off”.
##La vulnérabilité CVE-2026-24061 permet à un attaquant de se connecter en root en contournant l'authentification d'un service telnetd. Un code d'exploitation est disponible et son exploitation est triviale.
https://www.cert.ssi.gouv.fr/actualite/CERTFR-2026-ACT-003/
updated 2026-01-24T13:15:55.300000
2 posts
🟠 CVE-2026-0911 - High (7.5)
The Hustle – Email Marketing, Lead Generation, Optins, Popups plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the action_import_module() function in all versions up to, and including, 7.8.9.2...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0911/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-0911 - High (7.5)
The Hustle – Email Marketing, Lead Generation, Optins, Popups plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the action_import_module() function in all versions up to, and including, 7.8.9.2...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0911/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-24T08:16:09.517000
3 posts
testing Megawatt Charging System (MCS) for long-haul eActros/modern EVs.
- CVE-2026-1257: Administrative Shortcodes WordPress plugin vulnerability (Local File Inclusion).
- AI in security: 73% of CISOs likely to consider AI-enabled security solutions per Foundry study. [2/2]
🟠 CVE-2026-1257 - High (7.5)
The Administrative Shortcodes plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 0.3.4 via the 'slug' attribute of the 'get_template' shortcode. This is due to insufficient path validation on user-supp...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1257/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-1257 - High (7.5)
The Administrative Shortcodes plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 0.3.4 via the 'slug' attribute of the 'get_template' shortcode. This is due to insufficient path validation on user-supp...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1257/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-24T08:16:05.173000
2 posts
1 repos
🔴 CVE-2025-13374 - Critical (9.8)
The Kalrav AI Agent plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the kalrav_upload_file AJAX action in all versions up to, and including, 2.3.3. This makes it possible for unauthenticated atta...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-13374/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-13374 - Critical (9.8)
The Kalrav AI Agent plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the kalrav_upload_file AJAX action in all versions up to, and including, 2.3.3. This makes it possible for unauthenticated atta...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-13374/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-24T03:16:01.150000
2 posts
🟠 CVE-2026-24469 - High (7.5)
C++ HTTP Server is an HTTP/1.1 server built to handle client connections and serve HTTP requests. Versions 1.0 and below are vulnerable to Path Traversal via the RequestHandler::handleRequest method. This flaw allows an unauthenticated, remote att...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24469/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24469 - High (7.5)
C++ HTTP Server is an HTTP/1.1 server built to handle client connections and serve HTTP requests. Versions 1.0 and below are vulnerable to Path Traversal via the RequestHandler::handleRequest method. This flaw allows an unauthenticated, remote att...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24469/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-24T02:15:49.360000
2 posts
🟠 CVE-2026-24412 - High (8.8)
iccDEV provides libraries and tools for interacting with, manipulating, and applying ICC color management profiles. Versions 2.3.1.1 and below have aHeap Buffer Overflow vulnerability in the CIccTagXmlSegmentedCurve::ToXml() function. This occurs ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24412/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24412 - High (8.8)
iccDEV provides libraries and tools for interacting with, manipulating, and applying ICC color management profiles. Versions 2.3.1.1 and below have aHeap Buffer Overflow vulnerability in the CIccTagXmlSegmentedCurve::ToXml() function. This occurs ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24412/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T22:36:54
2 posts
🟠 CVE-2026-24609 - High (7.5)
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Elated-Themes Laurent laurent allows PHP Local File Inclusion.This issue affects Laurent: from n/a through <= 3.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24609/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24609 - High (7.5)
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Elated-Themes Laurent laurent allows PHP Local File Inclusion.This issue affects Laurent: from n/a through <= 3.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24609/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T22:36:54
2 posts
🟠 CVE-2026-24608 - High (7.5)
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Elated-Themes Laurent Core laurent-core allows PHP Local File Inclusion.This issue affects Laurent Core: from n/a through <...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24608/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24608 - High (7.5)
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Elated-Themes Laurent Core laurent-core allows PHP Local File Inclusion.This issue affects Laurent Core: from n/a through <...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24608/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T22:36:54
2 posts
🟠 CVE-2026-24635 - High (7.5)
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in DevsBlink EduBlink Core edublink-core allows PHP Local File Inclusion.This issue affects EduBlink Core: from n/a through <=...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24635/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24635 - High (7.5)
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in DevsBlink EduBlink Core edublink-core allows PHP Local File Inclusion.This issue affects EduBlink Core: from n/a through <=...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24635/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T22:35:52
2 posts
🟠 CVE-2025-69907 - High (7.5)
An unauthenticated information disclosure vulnerability exists in Newgen OmniDocs due to missing authentication and access control on the /omnidocs/GetListofCabinet API endpoint. A remote attacker can access this endpoint without valid credentials...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-69907/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-69907 - High (7.5)
An unauthenticated information disclosure vulnerability exists in Newgen OmniDocs due to missing authentication and access control on the /omnidocs/GetListofCabinet API endpoint. A remote attacker can access this endpoint without valid credentials...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-69907/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T22:16:23.753000
2 posts
🟠 CVE-2026-24367 - High (8.8)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in shinetheme Traveler traveler allows Blind SQL Injection.This issue affects Traveler: from n/a through < 3.2.8.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24367/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24367 - High (8.8)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in shinetheme Traveler traveler allows Blind SQL Injection.This issue affects Traveler: from n/a through < 3.2.8.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24367/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T22:16:15.977000
2 posts
🔴 CVE-2026-20750 - Critical (9.1)
Gitea does not properly validate project ownership in organization project operations. A user with project write access in one organization may be able to modify projects belonging to a different organization.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20750/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-20750 - Critical (9.1)
Gitea does not properly validate project ownership in organization project operations. A user with project write access in one organization may be able to modify projects belonging to a different organization.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20750/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T22:16:14.630000
2 posts
🟠 CVE-2025-69180 - High (8.8)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in themepassion Ultra Portfolio ultra-portfolio allows Blind SQL Injection.This issue affects Ultra Portfolio: from n/a through <= 6.7.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-69180/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-69180 - High (8.8)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in themepassion Ultra Portfolio ultra-portfolio allows Blind SQL Injection.This issue affects Ultra Portfolio: from n/a through <= 6.7.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-69180/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T21:31:51
1 posts
🟠 CVE-2025-66720 - High (7.5)
Null pointer dereference in free5gc pcf 1.4.0 in file internal/sbi/processor/ampolicy.go in function HandleDeletePoliciesPolAssoId.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-66720/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T21:31:51
1 posts
🔴 CVE-2025-67229 - Critical (9.8)
An improper certificate validation vulnerability exists in ToDesktop Builder v0.32.1 This vulnerability allows an unauthenticated, on-path attacker to spoof backend responses by exploiting insufficient certificate validation.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-67229/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T21:31:50
1 posts
🔴 CVE-2025-66719 - Critical (9.1)
An issue was discovered in Free5gc NRF 1.4.0. In the access-token generation logic of free5GC, the AccessTokenScopeCheck() function in file internal/sbi/processor/access_token.go bypasses all scope validation when the attacker uses a crafted targe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-66719/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T21:30:54
1 posts
🔴 CVE-2025-70983 - Critical (9.9)
Incorrect access control in the authRoutes function of SpringBlade v4.5.0 allows attackers with low-level privileges to escalate privileges.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70983/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T21:30:44
1 posts
🔴 CVE-2025-70985 - Critical (9.1)
Incorrect access control in the update function of RuoYi v4.8.2 allows unauthorized attackers to arbitrarily modify data outside of their scope.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70985/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T21:30:44
1 posts
🟠 CVE-2025-70986 - High (7.5)
Incorrect access control in the selectDept function of RuoYi v4.8.2 allows unauthorized attackers to arbitrarily access sensitive department data.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70986/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T21:30:43
2 posts
🟠 CVE-2026-24572 - High (8.8)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Nelio Software Nelio Content nelio-content allows Blind SQL Injection.This issue affects Nelio Content: from n/a through <= 4.1.0.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24572/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24572 - High (8.8)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Nelio Software Nelio Content nelio-content allows Blind SQL Injection.This issue affects Nelio Content: from n/a through <= 4.1.0.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24572/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T20:16:02.600000
1 posts
1 repos
New.
Huntress: DE&TH to Vulnerabilities: Huntress Catches SmarterMail Account Takeover Leading to RCE (CVE-2026-23760) https://www.huntress.com/blog/smartermail-account-takeover-leading-to-rce @huntress #infosec
##updated 2026-01-23T20:15:53.510000
2 posts
🟠 CVE-2025-66428 - High (8.8)
An issue with WordPress directory names in WebPros WordPress Toolkit before 6.9.1 allows privilege escalation.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-66428/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-66428 - High (8.8)
An issue with WordPress directory names in WebPros WordPress Toolkit before 6.9.1 allows privilege escalation.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-66428/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T20:15:53.183000
2 posts
🔴 CVE-2025-56590 - Critical (9.8)
An issue was discovered in the InsertFromURL() function of the Apryse HTML2PDF SDK thru 11.10. This vulnerability could allow an attacker to execute arbitrary operating system commands on the local server.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-56590/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-56590 - Critical (9.8)
An issue was discovered in the InsertFromURL() function of the Apryse HTML2PDF SDK thru 11.10. This vulnerability could allow an attacker to execute arbitrary operating system commands on the local server.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-56590/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T20:14:54
2 posts
🔴 CVE-2026-20912 - Critical (9.1)
Gitea does not properly validate repository ownership when linking attachments to releases. An attachment uploaded to a private repository could potentially be linked to a release in a different public repository, making it accessible to unauthori...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20912/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-20912 - Critical (9.1)
Gitea does not properly validate repository ownership when linking attachments to releases. An attachment uploaded to a private repository could potentially be linked to a release in a different public repository, making it accessible to unauthori...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20912/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T20:14:46
2 posts
🔴 CVE-2026-20897 - Critical (9.1)
Gitea does not properly validate repository ownership when deleting Git LFS locks. A user with write access to one repository may be able to delete LFS locks belonging to other repositories.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20897/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-20897 - Critical (9.1)
Gitea does not properly validate repository ownership when deleting Git LFS locks. A user with write access to one repository may be able to delete LFS locks belonging to other repositories.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20897/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T20:11:38
2 posts
🟠 CVE-2026-20736 - High (7.5)
Gitea does not properly verify repository context when deleting attachments. A user who previously uploaded an attachment to a repository may be able to delete it after losing access to that repository by making the request through a different rep...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20736/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-20736 - High (7.5)
Gitea does not properly verify repository context when deleting attachments. A user who previously uploaded an attachment to a repository may be able to delete it after losing access to that repository by making the request through a different rep...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20736/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T19:15:51.993000
2 posts
ILIAS 10.0, 10.1, 10.2 – Unauthenticated RCE write-up published:
https://srlabs.de/blog/breaking-ilias-part-2-three-to-rce
Why is this being published only now?
The vulnerability discussed here is tracked as CVE-2025-11344 and was assigned a CVSS base score of 5.3 (MEDIUM). Anyone wondering why this was not classified as CRITICAL should be aware that the CNA relied on the base score and severity assessment provided by ILIAS in its security advisory, which included neither a scoring matrix nor any justification for the rating.
##ILIAS 10.0, 10.1, 10.2 – Unauthenticated RCE write-up published:
https://srlabs.de/blog/breaking-ilias-part-2-three-to-rce
Why is this being published only now?
The vulnerability discussed here is tracked as CVE-2025-11344 and was assigned a CVSS base score of 5.3 (MEDIUM). Anyone wondering why this was not classified as CRITICAL should be aware that the CNA relied on the base score and severity assessment provided by ILIAS in its security advisory, which included neither a scoring matrix nor any justification for the rating.
##updated 2026-01-23T19:15:51.807000
5 posts
The vulnerability in question is CVE-2024-37079 (CVSS score: 9.8), which refers to a heap overflow in the implementation of the DCE/RPC protocol that could allow a bad actor with network access to vCenter Server to achieve remote code execution. https://thehackernews.com/2026/01/cisa-adds-actively-exploited-vmware.html
##The vulnerability in question is CVE-2024-37079 (CVSS score: 9.8), which refers to a heap overflow in the implementation of the DCE/RPC protocol that could allow a bad actor with network access to vCenter Server to achieve remote code execution. https://thehackernews.com/2026/01/cisa-adds-actively-exploited-vmware.html
##Here's a summary of the latest in technology and cybersecurity from the last 24 hours:
**Cybersecurity:** Marlink Cyber revealed a critical DNS DoS flaw in ISC BIND (Jan 22). CISA added a Broadcom VMware vCenter vulnerability (CVE-2024-37079) to its exploited list (Jan 23). CISA & NSA warned of Chinese state-sponsored BRICKSTORM malware targeting gov networks (Jan 22).
**Technology:** Apple's Siri AI training is reportedly shifting to Google's TPUs (Jan 22). Nvidia CEO Jensen Huang linked AI growth to power constraints at Davos (Jan 22).
##‼️CISA has added 5 vulnerabilities to the KEV Catalog
https://darkwebinformer.com/cisa-kev-catalog/
CVE-2024-37079: Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability
CVE-2025-68645: Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability
CVE-2025-34026: Versa Concerto Improper Authentication Vulnerability
CVE-2025-31125: Vite Vitejs Improper Access Control Vulnerability
CVE-2025-54313: Prettier eslint-config-prettier Embedded Malicious Code Vulnerability
##CVE ID: CVE-2024-37079
Vendor: Broadcom
Product: VMware vCenter Server
Date Added: 2026-01-23
Notes: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24453 ; https://nvd.nist.gov/vuln/detail/CVE-2024-37079
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2024-37079
updated 2026-01-23T18:39:24.063000
3 posts
‼️CISA has added 5 vulnerabilities to the KEV Catalog
https://darkwebinformer.com/cisa-kev-catalog/
CVE-2024-37079: Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability
CVE-2025-68645: Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability
CVE-2025-34026: Versa Concerto Improper Authentication Vulnerability
CVE-2025-31125: Vite Vitejs Improper Access Control Vulnerability
CVE-2025-54313: Prettier eslint-config-prettier Embedded Malicious Code Vulnerability
##CVE ID: CVE-2025-34026
Vendor: Versa
Product: Concerto
Date Added: 2026-01-22
Notes: https://security-portal.versa-networks.com/emailbulletins/6830f94328defa375486ff2e ; https://nvd.nist.gov/vuln/detail/CVE-2025-34026
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-34026
More updates from CISA:
- CVE-2025-54313: Prettier eslint-config-prettier Embedded Malicious Code Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-54313
- CVE-2025-31125: Vite Vitejs Improper Access Control Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-31125
- CVE-2025-34026: Versa Concerto Improper Authentication Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-34026
- CVE-2025-68645: Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-68645
And several industrial advisories are listed here: https://www.cisa.gov/ #CISA #infoec #vulnerability
##updated 2026-01-23T18:33:09.503000
3 posts
3 repos
https://github.com/nihilor/cve-2025-54313
‼️CISA has added 5 vulnerabilities to the KEV Catalog
https://darkwebinformer.com/cisa-kev-catalog/
CVE-2024-37079: Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability
CVE-2025-68645: Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability
CVE-2025-34026: Versa Concerto Improper Authentication Vulnerability
CVE-2025-31125: Vite Vitejs Improper Access Control Vulnerability
CVE-2025-54313: Prettier eslint-config-prettier Embedded Malicious Code Vulnerability
##CVE ID: CVE-2025-54313
Vendor: Prettier
Product: eslint-config-prettier
Date Added: 2026-01-22
Notes: This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: https://www.npmjs.com/package/eslint-config-prettier?activeTab=versions ; https://github.com/prettier/eslint-config-prettier/issues/339#issuecomment-3090304490 ; https://nvd.nist.gov/vuln/detail/CVE-2025-54313
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-54313
More updates from CISA:
- CVE-2025-54313: Prettier eslint-config-prettier Embedded Malicious Code Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-54313
- CVE-2025-31125: Vite Vitejs Improper Access Control Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-31125
- CVE-2025-34026: Versa Concerto Improper Authentication Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-34026
- CVE-2025-68645: Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-68645
And several industrial advisories are listed here: https://www.cisa.gov/ #CISA #infoec #vulnerability
##updated 2026-01-23T18:31:35
1 posts
🟠 CVE-2025-69908 - High (7.5)
An unauthenticated information disclosure vulnerability in Newgen OmniApp allows attackers to enumerate valid privileged usernames via a publicly accessible client-side JavaScript resource.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-69908/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T16:56:03
1 posts
1 repos
🟠 CVE-2025-67221 - High (7.5)
The orjson.dumps function in orjson thru 3.11.4 does not limit recursion for deeply nested JSON documents.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-67221/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T15:46:36
1 posts
🟠 CVE-2026-23954 - High (8.7)
Incus is a system container and virtual machine manager. Versions 6.21.0 and below allow a user with the ability to launch a container with a custom image (e.g a member of the ‘incus’ group) to use directory traversal or symbolic links in the ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23954/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T15:31:44
1 posts
🔴 CVE-2025-4319 - Critical (9.4)
Improper Restriction of Excessive Authentication Attempts, Weak Password Recovery Mechanism for Forgotten Password vulnerability in Birebirsoft Software and Technology Solutions Sufirmam allows Brute Force, Password Recovery Exploitation.This issu...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-4319/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T15:16:07.070000
1 posts
🟠 CVE-2026-20613 - High (7.8)
The ArchiveReader.extractContents() function used by cctl image load and container image load performs no pathname validation before extracting an archive member. This means that a carelessly or maliciously constructed archive can extract a file i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20613/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T13:15:49.123000
1 posts
🔴 CVE-2025-4320 - Critical (10)
Authentication Bypass by Primary Weakness, Weak Password Recovery Mechanism for Forgotten Password vulnerability in Birebirsoft Software and Technology Solutions Sufirmam allows Authentication Bypass, Password Recovery Exploitation.This issue affe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-4320/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T13:15:47.983000
1 posts
🟠 CVE-2025-14866 - High (8.8)
The Melapress Role Editor plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.1.1. This is due to a misconfigured capability check on the 'save_secondary_roles_field' function. This makes it possible ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-14866/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T12:30:36
1 posts
🟠 CVE-2026-22273 - High (8.8)
Dell ECS, versions 3.8.1.0 through 3.8.1.7, and Dell ObjectScale versions prior to 4.2.0.0, contains an Use of Default Credentials vulnerability in the OS. A low privileged attacker with remote access could potentially exploit this vulnerability, ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22273/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T09:30:30
1 posts
🟠 CVE-2026-22271 - High (7.5)
Dell ECS, versions 3.8.1.0 through 3.8.1.7, and Dell ObjectScale versions prior to 4.2.0.0, contains a Cleartext Transmission of Sensitive Information vulnerability. An unauthenticated attacker with remote access could potentially exploit this vul...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22271/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T09:30:29
1 posts
🟠 CVE-2026-0603 - High (8.3)
A flaw was found in Hibernate. A remote attacker with low privileges could exploit a second-order SQL injection vulnerability by providing specially crafted, unsanitized non-alphanumeric characters in the ID column when the InlineIdsOrClauseBuilde...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0603/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T09:30:29
1 posts
🔴 CVE-2026-1363 - Critical (9.8)
IAQS and I6 developed by JNC has a Client-Side Enforcement of Server-Side Security vulnerability, allowing unauthenticated remote attackers to gain administrator privileges by manipulating the web front-end.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1363/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T09:15:47.643000
1 posts
🔴 CVE-2026-1364 - Critical (9.8)
IAQS and I6 developed by JNC has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to directly operate system administrative functionalities.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1364/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T06:31:33
2 posts
🟠 CVE-2026-0791 - High (8.1)
ALGO 8180 IP Audio Alerter SIP INVITE Replaces Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of ALGO 8180 IP Audio Alerter devices. A...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0791/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-0791 - High (8.1)
ALGO 8180 IP Audio Alerter SIP INVITE Replaces Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of ALGO 8180 IP Audio Alerter devices. A...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0791/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T06:31:33
2 posts
🟠 CVE-2026-0787 - High (8.1)
ALGO 8180 IP Audio Alerter SAC Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of ALGO 8180 IP Audio Alerter devices. Authentication is not requi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0787/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-0787 - High (8.1)
ALGO 8180 IP Audio Alerter SAC Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of ALGO 8180 IP Audio Alerter devices. Authentication is not requi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0787/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T06:31:33
2 posts
🟠 CVE-2026-0785 - High (7.5)
ALGO 8180 IP Audio Alerter API Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of ALGO 8180 IP Audio Alerter devices. Authentication is required ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0785/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-0785 - High (7.5)
ALGO 8180 IP Audio Alerter API Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of ALGO 8180 IP Audio Alerter devices. Authentication is required ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0785/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T06:31:33
1 posts
🟠 CVE-2026-0778 - High (8.8)
Enel X JuiceBox 40 Telnet Service Missing Authentication Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Enel X JuiceBox 40 charging stations. Authent...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0778/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T06:31:33
1 posts
🟠 CVE-2026-0792 - High (8.1)
ALGO 8180 IP Audio Alerter SIP INVITE Alert-Info Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of ALGO 8180 IP Audio Alerter devices....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0792/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T06:31:32
1 posts
🟠 CVE-2025-15349 - High (7.5)
Anritsu ShockLine SCPI Race Condition Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Anritsu ShockLine. Authentication is not required to exploit thi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15349/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T06:31:32
1 posts
🟠 CVE-2026-0762 - High (8.1)
GPT Academic stream_daas Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GPT Academic. Interaction with a malicious DAAS serve...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0762/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T06:31:32
1 posts
🔴 CVE-2026-0761 - Critical (9.8)
Foundation Agents MetaGPT actionoutput_str_to_mapping Code Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foundation Agents MetaGPT. Authentication i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0761/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T06:31:32
1 posts
🔴 CVE-2026-0760 - Critical (9.8)
Foundation Agents MetaGPT deserialize_message Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foundation Agents MetaGPT. Authe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0760/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T06:31:32
1 posts
🔴 CVE-2026-0755 - Critical (9.8)
gemini-mcp-tool execAsync Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of gemini-mcp-tool. Authentication is not required to exploit this vuln...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0755/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T06:31:32
1 posts
🔴 CVE-2026-0768 - Critical (9.8)
Langflow code Code Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Langflow. Authentication is not required to exploit this vulnerability.
The specif...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0768/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T06:31:32
2 posts
🔴 CVE-2026-0763 - Critical (9.8)
GPT Academic run_in_subprocess_wrapper_func Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GPT Academic. Authentication is no...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0763/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-0763 - Critical (9.8)
GPT Academic run_in_subprocess_wrapper_func Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GPT Academic. Authentication is no...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0763/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T06:31:32
1 posts
🟠 CVE-2026-0765 - High (8.8)
Open WebUI PIP install_frontmatter_requirements Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Open WebUI. Authentication is required to expl...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0765/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T06:31:32
1 posts
🟠 CVE-2026-0774 - High (8.8)
WatchYourLAN Configuration Page Argument Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of WatchYourLAN. Authentication is not required to exp...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0774/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T06:31:32
1 posts
🔴 CVE-2026-0773 - Critical (9.8)
Upsonic Cloudpickle Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Upsonic. Authentication is not required to exploit this vu...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0773/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T06:31:32
2 posts
🟠 CVE-2026-0794 - High (8.1)
ALGO 8180 IP Audio Alerter SIP Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of ALGO 8180 IP Audio Alerter devices. Authentication is not required...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0794/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-0794 - High (8.1)
ALGO 8180 IP Audio Alerter SIP Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of ALGO 8180 IP Audio Alerter devices. Authentication is not required...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0794/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T06:31:24
1 posts
🔴 CVE-2025-15061 - Critical (9.8)
Framelink Figma MCP Server fetchWithRetry Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Framelink Figma MCP Server. Authentication is not re...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15061/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T06:31:24
1 posts
🟠 CVE-2026-0710 - High (8.4)
A flaw was found in SIPp. A remote attacker could exploit this by sending specially crafted Session Initiation Protocol (SIP) messages during an active call. This vulnerability, a NULL pointer dereference, can cause the application to crash, leadi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0710/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T06:31:24
1 posts
🟠 CVE-2025-15350 - High (7.8)
Anritsu VectorStar CHX File Parsing Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Anritsu VectorStar. User interaction is re...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15350/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T06:31:24
1 posts
🔴 CVE-2025-15063 - Critical (9.8)
Ollama MCP Server execAsync Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ollama MCP Server. Authentication is not required to exploit this ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15063/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T06:31:23
1 posts
🟠 CVE-2025-15348 - High (7.8)
Anritsu ShockLine CHX File Parsing Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Anritsu ShockLine. User interaction is requ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15348/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T05:16:24.250000
1 posts
🟠 CVE-2025-67847 - High (8.8)
A flaw was found in Moodle. An attacker with access to the restore interface could trigger server-side execution of arbitrary code. This is due to insufficient validation of restore input, which leads to unintended interpretation by core restore r...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-67847/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T05:16:21.753000
1 posts
🟠 CVE-2025-3839 - High (8)
A flaw was found in Epiphany, a tool that allows websites to open external URL handler applications with minimal user interaction. This design can be misused to exploit vulnerabilities within those handlers, making them appear remotely exploitable...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-3839/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T04:16:07.123000
2 posts
🟠 CVE-2026-0793 - High (8.1)
ALGO 8180 IP Audio Alerter InformaCast Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of ALGO 8180 IP Audio Alerter devices. Authentica...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0793/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-0793 - High (8.1)
ALGO 8180 IP Audio Alerter InformaCast Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of ALGO 8180 IP Audio Alerter devices. Authentica...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0793/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T04:16:06.180000
2 posts
🟠 CVE-2026-0786 - High (7.5)
ALGO 8180 IP Audio Alerter SCI Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of ALGO 8180 IP Audio Alerter devices. Authentication is required ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0786/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-0786 - High (7.5)
ALGO 8180 IP Audio Alerter SCI Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of ALGO 8180 IP Audio Alerter devices. Authentication is required ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0786/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T04:16:04.333000
1 posts
🟠 CVE-2026-0772 - High (7.5)
Langflow Disk Cache Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Langflow. Authentication is required to exploit this vulne...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0772/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T04:16:04.063000
1 posts
🔴 CVE-2026-0770 - Critical (9.8)
Langflow exec_globals Inclusion of Functionality from Untrusted Control Sphere Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Langflow. Authentication is not r...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0770/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T04:16:03.933000
1 posts
🔴 CVE-2026-0769 - Critical (9.8)
Langflow eval_custom_component_code Eval Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Langflow. Authentication is not required to exploit this vuln...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0769/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T04:16:03.527000
1 posts
🟠 CVE-2026-0766 - High (8.8)
Open WebUI load_tool_module_by_id Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Open WebUI. Authentication is required to exploit this vulne...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0766/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T04:16:03.250000
1 posts
🔴 CVE-2026-0764 - Critical (9.8)
GPT Academic upload Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GPT Academic. Authentication is not required to exploit th...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0764/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T04:16:02.570000
1 posts
🔴 CVE-2026-0759 - Critical (9.8)
Katana Network Development Starter Kit executeCommand Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Katana Network Development Starter Kit. ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0759/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T04:16:02.433000
2 posts
🟠 CVE-2026-0758 - High (7.8)
mcp-server-siri-shortcuts shortcutName Command Injection Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of mcp-server-siri-shortcuts. An attacker must first obtain the...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0758/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-0758 - High (7.8)
mcp-server-siri-shortcuts shortcutName Command Injection Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of mcp-server-siri-shortcuts. An attacker must first obtain the...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0758/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T04:16:02.297000
2 posts
🟠 CVE-2026-0757 - High (8.8)
MCP Manager for Claude Desktop execute-command Command Injection Sandbox Escape Vulnerability. This vulnerability allows remote attackers to bypass the sandbox on affected installations of MCP Manager for Claude Desktop. User interaction is requir...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0757/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-0757 - High (8.8)
MCP Manager for Claude Desktop execute-command Command Injection Sandbox Escape Vulnerability. This vulnerability allows remote attackers to bypass the sandbox on affected installations of MCP Manager for Claude Desktop. User interaction is requir...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0757/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T04:16:02.157000
1 posts
🔴 CVE-2026-0756 - Critical (9.8)
github-kanban-mcp-server execAsync Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of github-kanban-mcp-server. Authentication is not required to...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0756/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T04:16:01.710000
1 posts
🟠 CVE-2025-15351 - High (7.8)
Anritsu VectorStar CHX File Parsing Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Anritsu VectorStar. User interaction is re...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15351/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T04:16:01.033000
1 posts
🟠 CVE-2025-15062 - High (7.8)
Trimble SketchUp SKP File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trimble SketchUp. User interaction is required to exploit this ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15062/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T04:16:00.740000
1 posts
🟠 CVE-2025-15059 - High (7.8)
GIMP PSP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerabilit...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15059/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T02:15:55.547000
2 posts
🔴 CVE-2026-24304 - Critical (9.9)
Improper access control in Azure Resource Manager allows an authorized attacker to elevate privileges over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24304/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-24304 - Critical (9.9)
Improper access control in Azure Resource Manager allows an authorized attacker to elevate privileges over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24304/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T00:31:24
3 posts
If you missed this, Microsoft posted several security updates yesterday, all of them critical, affecting Microsoft accounts, Copilot, Office, Azure, and Entra: https://msrc.microsoft.com/update-guide
Noteworthy:
- Microsoft Account Spoofing Vulnerability: CVE-2026-21264 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21264
- Azure Entra ID Elevation of Privilege Vulnerability: CVE-2026-24305 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-24305
- Azure Front Door Elevation of Privilege Vulnerability: CVE-2026-24306 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-24306 #infosec #Microsoft #Azure #Copilot #vulnerability
##🔴 CVE-2026-24306 - Critical (9.8)
Improper access control in Azure Front Door (AFD) allows an unauthorized attacker to elevate privileges over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24306/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-24306 - Critical (9.8)
Improper access control in Azure Front Door (AFD) allows an unauthorized attacker to elevate privileges over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24306/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T00:31:24
2 posts
If you missed this, Microsoft posted several security updates yesterday, all of them critical, affecting Microsoft accounts, Copilot, Office, Azure, and Entra: https://msrc.microsoft.com/update-guide
Noteworthy:
- Microsoft Account Spoofing Vulnerability: CVE-2026-21264 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21264
- Azure Entra ID Elevation of Privilege Vulnerability: CVE-2026-24305 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-24305
- Azure Front Door Elevation of Privilege Vulnerability: CVE-2026-24306 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-24306 #infosec #Microsoft #Azure #Copilot #vulnerability
##🔴 CVE-2026-24305 - Critical (9.3)
Azure Entra ID Elevation of Privilege Vulnerability
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24305/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T00:31:24
2 posts
🟠 CVE-2026-21520 - High (7.5)
Exposure of Sensitive Information to an Unauthorized Actor in Copilot Studio allows a unauthenticated attacker to view sensitive information through network attack vector
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21520/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-21520 - High (7.5)
Exposure of Sensitive Information to an Unauthorized Actor in Copilot Studio allows a unauthenticated attacker to view sensitive information through network attack vector
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21520/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-22T23:15:59.003000
1 posts
🔴 CVE-2026-24307 - Critical (9.3)
Improper validation of specified type of input in M365 Copilot allows an unauthorized attacker to disclose information over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24307/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-22T23:15:57.407000
3 posts
If you missed this, Microsoft posted several security updates yesterday, all of them critical, affecting Microsoft accounts, Copilot, Office, Azure, and Entra: https://msrc.microsoft.com/update-guide
Noteworthy:
- Microsoft Account Spoofing Vulnerability: CVE-2026-21264 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21264
- Azure Entra ID Elevation of Privilege Vulnerability: CVE-2026-24305 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-24305
- Azure Front Door Elevation of Privilege Vulnerability: CVE-2026-24306 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-24306 #infosec #Microsoft #Azure #Copilot #vulnerability
##🔴 CVE-2026-21264 - Critical (9.3)
Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Account allows an unauthorized attacker to perform spoofing over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21264/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-21264 - Critical (9.3)
Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Account allows an unauthorized attacker to perform spoofing over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21264/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-22T23:15:57.220000
2 posts
🟠 CVE-2026-21227 - High (8.2)
Improper limitation of a pathname to a restricted directory ('path traversal') in Azure Logic Apps allows an unauthorized attacker to elevate privileges over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21227/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-21227 - High (8.2)
Improper limitation of a pathname to a restricted directory ('path traversal') in Azure Logic Apps allows an unauthorized attacker to elevate privileges over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21227/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-22T23:15:49.953000
2 posts
Multiple Vulnerabilities Reported in EVMAPA Electric Vehicle Charging Systems
CISA reports three vulnerabilities in EVMAPA charging station management software, including a critical authentication bypass (CVE-2025-54816) that allows remote command execution and service disruption.
**Make sure all EVAMPA managed systems are isolated from the internet and accessible from trusted networks only. Two of the three laws don't have a patch yet, so your priority control is isolation. Then reach to the vendor for more details on upcoming patches.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/multiple-vulnerabilities-reported-in-evmapa-electric-vehicle-charging-systems-a-b-2-2-b/gD2P6Ple2L
🔴 CVE-2025-54816 - Critical (9.4)
This vulnerability occurs when a WebSocket endpoint does not enforce
proper authentication mechanisms, allowing unauthorized users to
establish connections. As a result, attackers can exploit this weakness
to gain unauthorized access to sensiti...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-54816/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-22T23:15:49.800000
2 posts
🟠 CVE-2025-53968 - High (7.5)
This vulnerability arises because there are no limitations on the number
of authentication attempts a user can make. An attacker can exploit
this weakness by continuously sending authentication requests, leading
to a denial-of-service (DoS) con...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-53968/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-53968 - High (7.5)
This vulnerability arises because there are no limitations on the number
of authentication attempts a user can make. An attacker can exploit
this weakness by continuously sending authentication requests, leading
to a denial-of-service (DoS) con...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-53968/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-22T22:16:20.673000
1 posts
🟠 CVE-2026-23953 - High (8.7)
Incus is a system container and virtual machine manager. In versions 6.20.0 and below, a user with the ability to launch a container with a custom YAML configuration (e.g a member of the ‘incus’ group) can create an environment variable contai...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23953/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-22T22:16:16.130000
2 posts
Hubitat Patches Critical Authorization Bypass in Elevation Hubs
Hubitat patched a critical authorization bypass vulnerability (CVE-2026-1201) in its Elevation Hubs that allowed authenticated users to gain unauthorized control over connected devices.
**Make sure all Hubitat devices are isolated from the internet and accessible from trusted networks only. Also, limit the access only to trusted users and educate them on risks of malware, infostealers, password recycling and phishing. Then plan an update cycle for your Hubitat Elevation Hub to firmware version 2.4.2.157.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/hubitat-patches-critical-authorization-bypass-in-elevation-hubs-n-y-3-f-v/gD2P6Ple2L
Hubitat Patches Critical Authorization Bypass in Elevation Hubs
Hubitat patched a critical authorization bypass vulnerability (CVE-2026-1201) in its Elevation Hubs that allowed authenticated users to gain unauthorized control over connected devices.
**Make sure all Hubitat devices are isolated from the internet and accessible from trusted networks only. Also, limit the access only to trusted users and educate them on risks of malware, infostealers, password recycling and phishing. Then plan an update cycle for your Hubitat Elevation Hub to firmware version 2.4.2.157.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/hubitat-patches-critical-authorization-bypass-in-elevation-hubs-n-y-3-f-v/gD2P6Ple2L
updated 2026-01-22T21:47:41
3 posts
7 repos
https://github.com/nkuty/CVE-2025-30208-31125-31486-32395
https://github.com/MuhammadWaseem29/Vitejs-exploit
https://github.com/sunhuiHi666/CVE-2025-31125
https://github.com/harshgupptaa/Path-Transversal-CVE-2025-31125-
https://github.com/xuemian168/CVE-2025-30208
‼️CISA has added 5 vulnerabilities to the KEV Catalog
https://darkwebinformer.com/cisa-kev-catalog/
CVE-2024-37079: Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability
CVE-2025-68645: Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability
CVE-2025-34026: Versa Concerto Improper Authentication Vulnerability
CVE-2025-31125: Vite Vitejs Improper Access Control Vulnerability
CVE-2025-54313: Prettier eslint-config-prettier Embedded Malicious Code Vulnerability
##CVE ID: CVE-2025-31125
Vendor: Vite
Product: Vitejs
Date Added: 2026-01-22
Notes: This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: https://github.com/vitejs/vite/commit/59673137c45ac2bcfad1170d954347c1a17ab949 ; https://nvd.nist.gov/vuln/detail/CVE-2025-31125
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-31125
More updates from CISA:
- CVE-2025-54313: Prettier eslint-config-prettier Embedded Malicious Code Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-54313
- CVE-2025-31125: Vite Vitejs Improper Access Control Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-31125
- CVE-2025-34026: Versa Concerto Improper Authentication Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-34026
- CVE-2025-68645: Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-68645
And several industrial advisories are listed here: https://www.cisa.gov/ #CISA #infoec #vulnerability
##updated 2026-01-22T21:33:44
3 posts
3 repos
https://github.com/chinaxploiter/CVE-2025-68645-PoC
‼️CISA has added 5 vulnerabilities to the KEV Catalog
https://darkwebinformer.com/cisa-kev-catalog/
CVE-2024-37079: Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability
CVE-2025-68645: Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability
CVE-2025-34026: Versa Concerto Improper Authentication Vulnerability
CVE-2025-31125: Vite Vitejs Improper Access Control Vulnerability
CVE-2025-54313: Prettier eslint-config-prettier Embedded Malicious Code Vulnerability
##CVE ID: CVE-2025-68645
Vendor: Synacor
Product: Zimbra Collaboration Suite (ZCS)
Date Added: 2026-01-22
Notes: https://wiki.zimbra.com/wiki/Security_Center ; https://nvd.nist.gov/vuln/detail/CVE-2025-68645
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-68645
More updates from CISA:
- CVE-2025-54313: Prettier eslint-config-prettier Embedded Malicious Code Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-54313
- CVE-2025-31125: Vite Vitejs Improper Access Control Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-31125
- CVE-2025-34026: Versa Concerto Improper Authentication Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-34026
- CVE-2025-68645: Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-68645
And several industrial advisories are listed here: https://www.cisa.gov/ #CISA #infoec #vulnerability
##updated 2026-01-22T18:43:46
1 posts
🟠 CVE-2026-24009 - High (8.1)
Docling Core (or docling-core) is a library that defines core data types and transformations in the document processing application Docling. A PyYAML-related Remote Code Execution (RCE) vulnerability, namely CVE-2020-14343, is exposed in docling-c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24009/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-22T18:31:34
1 posts
updated 2026-01-22T18:30:45
1 posts
🟠 CVE-2026-22278 - High (8.1)
Dell PowerScale OneFS versions prior to 9.13.0.0 contains an improper restriction of excessive authentication attempts vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Unauthori...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22278/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-22T18:30:31
1 posts
1 repos
CVE-2026-22200: Ticket to Shell in osTicket https://horizon3.ai/attack-research/attack-blogs/ticket-to-shell-exploiting-php-filters-and-cnext-in-osticket-cve-2026-22200/
##updated 2026-01-22T18:02:24
1 posts
🟠 CVE-2026-24006 - High (7.5)
Seroval facilitates JS value stringification, including complex structures beyond JSON.stringify capabilities. In versions 1.4.0
and below, serialization of objects with extreme depth can exceed the maximum call stack limit. In version 1.4.1, Sero...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24006/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-22T17:16:28.403000
1 posts
🔴 CVE-2025-69828 - Critical (10)
File Upload vulnerability in TMS Global Software TMS Management Console v.6.3.7.27386.20250818 allows a remote attacker to execute arbitrary code via the Logo upload in /Customer/AddEdit
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-69828/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-22T17:16:06.357000
3 posts
Critical File Upload Flaw reported RealHomes CRM Plugin
RealHomes CRM plugin version 1.0.1 patches a critical file upload vulnerability (CVE-2025-67968) that allowed low-privileged users to take over WordPress sites. The flaw affected over 30,000 real estate websites by failing to validate user permissions and file types.
**If you are using RealHomes CRM plugin, update it ASAP to version 1.0.1. Attackers can easily upload web shell and take over your website. When coding, always use proper permission checks and file type validation for file uploads.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-file-upload-flaw-reported-realhomes-crm-plugin-h-i-l-g-i/gD2P6Ple2L
Critical File Upload Flaw reported RealHomes CRM Plugin
RealHomes CRM plugin version 1.0.1 patches a critical file upload vulnerability (CVE-2025-67968) that allowed low-privileged users to take over WordPress sites. The flaw affected over 30,000 real estate websites by failing to validate user permissions and file types.
**If you are using RealHomes CRM plugin, update it ASAP to version 1.0.1. Attackers can easily upload web shell and take over your website. When coding, always use proper permission checks and file type validation for file uploads.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-file-upload-flaw-reported-realhomes-crm-plugin-h-i-l-g-i/gD2P6Ple2L
New. CVE-2025-67968
Patchstack: Critical Arbitrary File Upload Vulnerability in RealHomes CRM Plugin Affecting 30k+ Sites https://patchstack.com/articles/critical-arbitrary-file-upload-vulnerability-in-realhomes-crm-plugin-affecting-30k-sites/
Infosecurity-Magazine: RealHomes CRM Plugin Flaw Affected 30,000 WordPress Sites https://www.c-span.org/event/house-committee/former-special-counsel-jack-smith-testifies-on-trump-investigations/439618 #infosec #WordPress #vulnerability
##updated 2026-01-22T16:16:07.660000
1 posts
🔴 CVE-2025-69764 - Critical (9.8)
Tenda AX3 firmware v16.03.12.11 contains a stack-based buffer overflow in the formGetIptv function due to improper handling of the stbpvid stack buffer, which may result in memory corruption and remote code execution.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-69764/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-22T16:16:07.050000
1 posts
🟠 CVE-2025-36588 - High (8.8)
Dell Unisphere for PowerMax, version(s) 10.2.0.x, contain(s) an Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability. A low privileged attacker with remote access could potentially exploit this vulnera...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-36588/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-22T15:44:02
1 posts
🟠 CVE-2026-23957 - High (7.5)
seroval facilitates JS value stringification, including complex structures beyond JSON.stringify capabilities. In versions 1.4.0
and below, overriding encoded array lengths by replacing them with an excessively large value causes the deserializati...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23957/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-22T15:43:31
1 posts
🟠 CVE-2026-23965 - High (7.5)
sm-crypto provides JavaScript implementations of the Chinese cryptographic algorithms SM2, SM3, and SM4. A signature forgery vulnerability exists in the SM2 signature verification logic of sm-crypto prior to version 0.4.0. Under default configurat...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23965/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-22T15:43:21
2 posts
🟠 CVE-2026-23967 - High (7.5)
sm-crypto provides JavaScript implementations of the Chinese cryptographic algorithms SM2, SM3, and SM4. A signature malleability vulnerability exists in the SM2 signature verification logic of the sm-crypto library prior to version 0.3.14. An att...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23967/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-23967 - High (7.5)
sm-crypto provides JavaScript implementations of the Chinese cryptographic algorithms SM2, SM3, and SM4. A signature malleability vulnerability exists in the SM2 signature verification logic of the sm-crypto library prior to version 0.3.14. An att...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23967/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-22T15:39:15
1 posts
🔴 CVE-2026-23524 - Critical (9.8)
Laravel Reverb provides a real-time WebSocket communication backend for Laravel applications. In versions 1.6.3 and below, Reverb passes data from the Redis channel directly into PHP’s unserialize() function without restricting which classes can...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23524/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-22T15:31:44
1 posts
🟠 CVE-2026-1329 - High (8.8)
A flaw has been found in Tenda AX1803 1.0.0.1. The affected element is the function fromGetWifiGuestBasic of the file /goform/WifiGuestSet. Executing a manipulation of the argument guestWrlPwd/guestEn/guestSsid/hideSsid/guestSecurity can lead to s...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1329/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-22T15:31:39
1 posts
🟠 CVE-2025-13928 - High (7.5)
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.7 before 18.6.4, 18.7 before 18.7.2, and 18.8 before 18.8.2 that could have allowed an unauthenticated user to cause a denial of service condition by exploiting incorrec...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-13928/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-22T15:31:39
1 posts
🟠 CVE-2025-10855 - High (7.5)
Authorization Bypass Through User-Controlled Key vulnerability in Solvera Software Services Trade Inc. Teknoera allows Exploitation of Trusted Identifiers.This issue affects Teknoera: through 01102025.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-10855/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-22T15:31:38
1 posts
🟠 CVE-2025-13927 - High (7.5)
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 11.9 before 18.6.4, 18.7 before 18.7.2, and 18.8 before 18.8.2 that could have allowed an unauthenticated user to create a denial of service condition by sending crafted re...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-13927/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-22T15:16:51.173000
1 posts
🟠 CVE-2026-1328 - High (8.8)
A vulnerability was detected in Totolink NR1800X 9.1.0u.6279_B20210910. Impacted is the function setWizardCfg of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. Performing a manipulation of the argument ssid results in buffer ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1328/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-22T15:16:50.420000
1 posts
🟠 CVE-2026-1324 - High (8.8)
A vulnerability was identified in Sangfor Operation and Maintenance Management System up to 3.0.12. Affected by this issue is the function SessionController of the file /isomp-protocol/protocol/session of the component SSH Protocol Handler. The ma...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1324/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-22T15:16:48.843000
1 posts
🔴 CVE-2025-69766 - Critical (9.8)
Tenda AX3 firmware v16.03.12.11 contains a stack-based buffer overflow in the formGetIptv function due to improper handling of the citytag stack buffer, which may result in memory corruption and remote code execution.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-69766/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-22T13:16:04.043000
1 posts
🟠 CVE-2025-10856 - High (8.1)
Unrestricted Upload of File with Dangerous Type vulnerability in Solvera Software Services Trade Inc. Teknoera allows File Content Injection.This issue affects Teknoera: through 01102025.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-10856/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-22T12:31:32
1 posts
🟠 CVE-2025-10024 - High (7.5)
Authorization Bypass Through User-Controlled Key vulnerability in EXERT Computer Technologies Software Ltd. Co. Education Management System allows Parameter Injection.This issue affects Education Management System: through 23.09.2025.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-10024/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-22T10:16:07.520000
1 posts
2 repos
🟠 CVE-2025-4764 - High (8)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aida Computer Information Technology Inc. Hotel Guest Hotspot allows SQL Injection.This issue affects Hotel Guest Hotspot: through 22012026.
N...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-4764/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-22T09:31:40
1 posts
🟠 CVE-2026-1330 - High (7.5)
MeetingHub developed by HAMASTAR Technology has an Arbitrary File Read vulnerability, allowing unauthenticated remote attackers to exploit Absolute Path Traversal to download arbitrary system files.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1330/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-22T09:15:52.197000
1 posts
🔴 CVE-2026-1331 - Critical (9.8)
MeetingHub developed by HAMASTAR Technology has an Arbitrary File Upload vulnerability, allowing unauthenticated remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1331/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-22T07:15:50.813000
3 posts
2 repos
https://github.com/Galaxy-sc/CVE-2026-0920-WordPress-LA-Studio-Exploit
20,000 WordPress Sites Exposed to Backdoor in LA-Studio Element Kit
LA-Studio patched a critical backdoor in its Element Kit for Elementor plugin (CVE-2026-0920) that allowed unauthenticated attackers to create administrator accounts. The malicious code was planted by a former employee and affected over 20,000 WordPress websites.
**If you are using Element Kit for Elementor, this is URGENT. Your plugin may have an active backdoor. Update the LA-Studio Element Kit plugin to version 1.6.0 immediately to remove the backdoor and review your Wordpress server users for unexpected user accounts.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/20000-wordpress-sites-exposed-to-backdoor-in-la-studio-element-kit-h-0-g-u-q/gD2P6Ple2L
20,000 WordPress Sites Exposed to Backdoor in LA-Studio Element Kit
LA-Studio patched a critical backdoor in its Element Kit for Elementor plugin (CVE-2026-0920) that allowed unauthenticated attackers to create administrator accounts. The malicious code was planted by a former employee and affected over 20,000 WordPress websites.
**If you are using Element Kit for Elementor, this is URGENT. Your plugin may have an active backdoor. Update the LA-Studio Element Kit plugin to version 1.6.0 immediately to remove the backdoor and review your Wordpress server users for unexpected user accounts.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/20000-wordpress-sites-exposed-to-backdoor-in-la-studio-element-kit-h-0-g-u-q/gD2P6Ple2L
🔴 CVE-2026-0920 - Critical (9.8)
The LA-Studio Element Kit for Elementor plugin for WordPress is vulnerable to Administrative User Creation in all versions up to, and including, 1.5.6.3. This is due to the 'ajax_register_handle' function not restricting what user roles a user can...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0920/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-22T04:16:00.187000
1 posts
🔴 CVE-2026-24042 - Critical (9.4)
Appsmith is a platform to build admin panels, internal tools, and dashboards. In versions 1.94 and below, publicly accessible apps allow unauthenticated users to execute unpublished (edit-mode) actions by sending viewMode=false (or omitting it) to...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24042/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-22T03:31:34
1 posts
🟠 CVE-2025-27380 - High (7.6)
HTML injection in Project Release in Altium Enterprise Server (AES) 7.0.3 on all platforms allows an authenticated attacker to execute arbitrary JavaScript in the victim’s browser via crafted HTML content.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-27380/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-22T03:31:28
1 posts
🟠 CVE-2025-27378 - High (8.6)
AES contains a SQL injection vulnerability due to an inactive configuration that prevents the latest SQL parsing logic from being applied. When this configuration is not enabled, crafted input may be improperly handled, allowing attackers to injec...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-27378/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-22T03:15:48.090000
2 posts
🟠 CVE-2026-24010 - High (8.8)
Horilla is a free and open source Human Resource Management System (HRMS). A critical File Upload vulnerability in versions prior to 1.5.0, with Social Engineering, allows authenticated users to deploy phishing attacks. By uploading a malicious HT...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24010/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24010 - High (8.8)
Horilla is a free and open source Human Resource Management System (HRMS). A critical File Upload vulnerability in versions prior to 1.5.0, with Social Engineering, allows authenticated users to deploy phishing attacks. By uploading a malicious HT...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24010/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-22T03:15:47.777000
1 posts
🔴 CVE-2026-24002 - Critical (9)
Grist is spreadsheet software using Python as its formula language. Grist offers several methods for running those formulas in a sandbox, for cases where the user may be working with untrusted spreadsheets. One such method runs them in pyodide, bu...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24002/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-22T03:15:47.007000
2 posts
🔴 CVE-2026-23966 - Critical (9.1)
sm-crypto provides JavaScript implementations of the Chinese cryptographic algorithms SM2, SM3, and SM4. A private key recovery vulnerability exists in the SM2 decryption logic of sm-crypto prior to version 0.3.14. By interacting with the SM2 decr...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23966/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-23966 - Critical (9.1)
sm-crypto provides JavaScript implementations of the Chinese cryptographic algorithms SM2, SM3, and SM4. A private key recovery vulnerability exists in the SM2 decryption logic of sm-crypto prior to version 0.3.14. By interacting with the SM2 decr...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23966/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-22T02:15:52.310000
1 posts
🟠 CVE-2026-23956 - High (7.5)
seroval facilitates JS value stringification, including complex structures beyond JSON.stringify capabilities. In versions 1.4.0
and below, overriding RegExp serialization with extremely large patterns can exhaust JavaScript runtime memory during ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23956/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-21T23:15:52.493000
1 posts
🟠 CVE-2026-23737 - High (7.5)
seroval facilitates JS value stringification, including complex structures beyond JSON.stringify capabilities. In versions 1.4.0 and below, improper input handling in the JSON deserialization component can lead to arbitrary JavaScript code executi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23737/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-21T22:15:49.077000
1 posts
🟠 CVE-2026-22807 - High (8.8)
vLLM is an inference and serving engine for large language models (LLMs). Starting in version 0.10.1 and prior to version 0.14.0, vLLM loads Hugging Face `auto_map` dynamic modules during model resolution without gating on `trust_remote_code`, all...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22807/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-21T21:31:32
2 posts
updated 2026-01-21T21:31:31
8 posts
1 repos
CISA added Cisco's critical RCE vulnerability to the KEV catalogue late yesterday.
CVE-2026-20045 Cisco Unified Communications Products Code Injection Vulnerability https://www.cisa.gov/news-events/alerts/2026/01/21/cisa-adds-one-known-exploited-vulnerability-catalog
More:
Computerworld: Critical Cisco UC bug actively exploited https://www.computerworld.com/article/4120764/critical-cisco-uc-bug-actively-exploited.html #infosec #Cisco #vulnerability
##Cisco Patches Actively Exploited Flaw in Unified Communications Products
Cisco patched a critical remote code execution vulnerability (CVE-2026-20045) in its Unified Communications products that attackers are actively trying to exploit to gain root access. The flaw allows unauthenticated attackers to take full control of enterprise telephony and messaging infrastructure via malicious HTTP requests.
**If you are using Cisco communication platforms, read this advisory in detail. Make sure the web management interface are isolated from the internet and accessible from trusted networks only. Then plan a quick update. Because someone will find a way to reach the vulnerable interface even if it's isolated.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/cisco-patches-actively-exploited-flaw-in-unified-communications-products-4-u-1-t-8/gD2P6Ple2L
Cisco fixes Unified Communications RCE zero day exploited in attacks
Cisco has fixed a critical Unified Communications and Webex Calling remote code execution vulnerability, tracked as CVE-2026-20045, that has been...
🔗️ [Bleepingcomputer] https://link.is.it/WDsEt3
##‼️Attackers Actively Probing RCE Vulnerability in Cisco Enterprise Communications Products
CVE-2026-20045: Cisco Unified Communications Products Code Injection Vulnerability
CVSS: 8.2
CISA KEV: Added today; January 21st, 2026
CVE Published: January 21st, 2026
Advisory: https://nvd.nist.gov/vuln/detail/CVE-2026-20045
Description: A vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), Cisco Unity Connection, and Cisco Webex Calling Dedicated Instance could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. This vulnerability is due to improper validation of user-supplied input in HTTP requests. An attacker could exploit this vulnerability by sending a sequence of crafted HTTP requests to the web-based management interface of an affected device. A successful exploit could allow the attacker to obtain user-level access to the underlying operating system and then elevate privileges to root. Note: Cisco has assigned this security advisory a Security Impact Rating (SIR) of Critical rather than High as the score indicates. The reason is that exploitation of this vulnerability could result in an attacker elevating privileges to root.
##CVE ID: CVE-2026-20045
Vendor: Cisco
Product: Unified Communications Manager
Date Added: 2026-01-21
Notes: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voice-rce-mORhqY4b ; https://nvd.nist.gov/vuln/detail/CVE-2026-20045
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-20045
New Cisco zero-day, CVE-2026-20045
##🟠 CVE-2026-20045 - High (8.2)
A vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), Cisco Uni...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20045/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Four advisories from Cisco today, one of them critical. Too bad some crows no longer follow these things. 😇
- Critical: CVE-2026-20045: Cisco Unified Communications Products Remote Code Execution Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voice-rce-mORhqY4b
- Medium severity: CVE-2026-20055 and CVE-2026-20109: Cisco Packaged Contact Center Enterprise and Cisco Unified Contact Center Enterprise Cross-Site Scripting Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucce-pcce-xss-2JVyg3uD
- Medium severity: CVE-2026-20092: Cisco Intersight Virtual Appliance Privilege Escalation Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-intersight-privesc-p6tBm6jk
- Medium severity: CVE-2026-20080: Cisco IEC6400 Wireless Backhaul Edge Compute Software SSH Denial of Service Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iec6400-Pem5uQ7v @TalosSecurity #Cisco #infosec #vulnerability
##updated 2026-01-21T21:16:10.107000
1 posts
🔴 CVE-2026-22793 - Critical (9.6)
5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. Prior to version 0.15.3, an unsafe option parsing vulnerability in the ECharts Markdown plugin allows any user able to submit ECharts code blocks...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22793/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-21T18:31:36
1 posts
🟠 CVE-2025-66692 - High (7.5)
A buffer over-read in the PublicKey::verify() method of Binance - Trust Wallet Core before commit 5668c67 allows attackers to cause a Denial of Service (DoS) via a crafted input.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-66692/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-21T18:30:38
1 posts
Four advisories from Cisco today, one of them critical. Too bad some crows no longer follow these things. 😇
- Critical: CVE-2026-20045: Cisco Unified Communications Products Remote Code Execution Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voice-rce-mORhqY4b
- Medium severity: CVE-2026-20055 and CVE-2026-20109: Cisco Packaged Contact Center Enterprise and Cisco Unified Contact Center Enterprise Cross-Site Scripting Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucce-pcce-xss-2JVyg3uD
- Medium severity: CVE-2026-20092: Cisco Intersight Virtual Appliance Privilege Escalation Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-intersight-privesc-p6tBm6jk
- Medium severity: CVE-2026-20080: Cisco IEC6400 Wireless Backhaul Edge Compute Software SSH Denial of Service Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iec6400-Pem5uQ7v @TalosSecurity #Cisco #infosec #vulnerability
##updated 2026-01-21T18:30:38
1 posts
Four advisories from Cisco today, one of them critical. Too bad some crows no longer follow these things. 😇
- Critical: CVE-2026-20045: Cisco Unified Communications Products Remote Code Execution Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voice-rce-mORhqY4b
- Medium severity: CVE-2026-20055 and CVE-2026-20109: Cisco Packaged Contact Center Enterprise and Cisco Unified Contact Center Enterprise Cross-Site Scripting Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucce-pcce-xss-2JVyg3uD
- Medium severity: CVE-2026-20092: Cisco Intersight Virtual Appliance Privilege Escalation Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-intersight-privesc-p6tBm6jk
- Medium severity: CVE-2026-20080: Cisco IEC6400 Wireless Backhaul Edge Compute Software SSH Denial of Service Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iec6400-Pem5uQ7v @TalosSecurity #Cisco #infosec #vulnerability
##updated 2026-01-21T18:30:37
1 posts
🟠 CVE-2025-70650 - High (7.5)
Tenda AX-1806 v1.0.0.1 was discovered to contain a stack overflow in the deviceList parameter of the formSetMacFilterCfg function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70650/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-21T18:30:30
1 posts
🟠 CVE-2025-70651 - High (7.5)
Tenda AX-1803 v1.0.0.1 was discovered to contain a stack overflow in the ssid parameter of the form_fast_setting_wifi_set function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70651/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-21T17:16:08.723000
1 posts
Four advisories from Cisco today, one of them critical. Too bad some crows no longer follow these things. 😇
- Critical: CVE-2026-20045: Cisco Unified Communications Products Remote Code Execution Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voice-rce-mORhqY4b
- Medium severity: CVE-2026-20055 and CVE-2026-20109: Cisco Packaged Contact Center Enterprise and Cisco Unified Contact Center Enterprise Cross-Site Scripting Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucce-pcce-xss-2JVyg3uD
- Medium severity: CVE-2026-20092: Cisco Intersight Virtual Appliance Privilege Escalation Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-intersight-privesc-p6tBm6jk
- Medium severity: CVE-2026-20080: Cisco IEC6400 Wireless Backhaul Edge Compute Software SSH Denial of Service Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iec6400-Pem5uQ7v @TalosSecurity #Cisco #infosec #vulnerability
##updated 2026-01-21T17:16:08.410000
1 posts
Four advisories from Cisco today, one of them critical. Too bad some crows no longer follow these things. 😇
- Critical: CVE-2026-20045: Cisco Unified Communications Products Remote Code Execution Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voice-rce-mORhqY4b
- Medium severity: CVE-2026-20055 and CVE-2026-20109: Cisco Packaged Contact Center Enterprise and Cisco Unified Contact Center Enterprise Cross-Site Scripting Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucce-pcce-xss-2JVyg3uD
- Medium severity: CVE-2026-20092: Cisco Intersight Virtual Appliance Privilege Escalation Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-intersight-privesc-p6tBm6jk
- Medium severity: CVE-2026-20080: Cisco IEC6400 Wireless Backhaul Edge Compute Software SSH Denial of Service Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iec6400-Pem5uQ7v @TalosSecurity #Cisco #infosec #vulnerability
##updated 2026-01-21T16:56:51
1 posts
1 repos
🔴 CVE-2025-64087 - Critical (9.8)
A Server-Side Template Injection (SSTI) vulnerability in the FreeMarker component of opensagres XDocReport v1.0.0 to v2.1.0 allows attackers to execute arbitrary code via injecting crafted template expressions.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-64087/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-21T16:16:10.360000
1 posts
🟠 CVE-2026-22022 - High (8.2)
Deployments of Apache Solr 5.3.0 through 9.10.0 that rely on Solr's "Rule Based Authorization Plugin" are vulnerable to allowing unauthorized access to certain Solr APIs, due to insufficiently strict input validation in those components. Only de...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22022/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-21T16:16:08.437000
1 posts
From yesterday, relating to CVE-2026-21945. Oracle has listed this vulnerability in its latest advisory: https://www.oracle.com/security-alerts/cpujan2026.html
Tenable: SSRF Vulnerability in Java TLS Handshakes Creates DoS Risk https://www.tenable.com/blog/tenable-discovers-ssrf-vulnerability-in-java-tls-handshakes-that-creates-dos-risk @tenable #infosec #threatresearch #JavaScript #vulnerability #DDoS #Oracle
##updated 2026-01-21T15:32:23
1 posts
🟠 CVE-2025-57156 - High (7.5)
NULL pointer dereference in the dacp_reply_playqueueedit_clear function in src/httpd_dacp.c in owntone-server through commit 6d604a1 (newer commit after version 28.12) allows remote attackers to cause a Denial of Service (crash).
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-57156/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-21T15:32:18
1 posts
🔴 CVE-2025-55423 - Critical (9.8)
A command injection vulnerability exists in the upnp_relay() function in multiple ipTIME router models because the controlURL value used to pass port-forwarding information to an upper router is passed to system() without proper validation or sani...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-55423/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-21T15:16:07.750000
1 posts
1 repos
🔴 CVE-2025-65482 - Critical (9.8)
An XML External Entity (XXE) vulnerability in opensagres XDocReport v0.9.2 to v2.0.3 allows attackers to execute arbitrary code via uploading a crafted .docx file.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65482/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-21T15:16:06.827000
1 posts
🟠 CVE-2025-57155 - High (7.5)
NULL pointer dereference in the daap_reply_groups function in src/httpd_daap.c in owntone-server through commit 5e6f19a (newer commit after version 28.2) allows remote attackers to cause a Denial of Service.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-57155/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-21T15:16:06.640000
1 posts
🟠 CVE-2025-56353 - High (7.5)
In tinyMQTT commit 6226ade15bd4f97be2d196352e64dd10937c1962 (2024-02-18), a memory leak occurs due to the broker's failure to validate or reject malformed UTF-8 strings in topic filters. An attacker can exploit this by sending repeated subscriptio...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-56353/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-21T14:55:34
1 posts
1 repos
‼️CVE-2026-23885: AlchemyCMS has Authenticated Remote Code Execution (RCE) via eval injection in ResourcesHelper
CVSS: 6.4
CVE Published: January 19th, 2026
Advisory/Exploit/PoC: https://github.com/advisories/GHSA-2762-657x-v979
Description: Alchemy is an open source content management system engine written in Ruby on Rails. Prior to versions 7.4.12 and 8.0.3, the application uses the Ruby `eval()` function to dynamically execute a string provided by the `resource_handler.engine_name` attribute in `Alchemy::ResourcesHelper#resource_url_proxy`. The vulnerability exists in `app/helpers/alchemy/resources_helper.rb` at line 28. The code explicitly bypasses security linting with `# rubocop:disable Security/Eval`, indicating that the use of a dangerous function was known but not properly mitigated. Since `engine_name` is sourced from module definitions that can be influenced by administrative configurations, it allows an authenticated attacker to escape the Ruby sandbox and execute arbitrary system commands on the host OS. Versions 7.4.12 and 8.0.3 fix the issue by replacing `eval()` with `send()`.
##updated 2026-01-20T21:31:34
1 posts
Critical Command Injection Vulnerability in Legacy Vivotek Cameras
Akamai SIRT discovered a critical command injection vulnerability (CVE-2026-22755) in legacy Vivotek cameras that allows unauthenticated attackers to execute arbitrary code as root.
**If you are using Vivotek cameras, this is important and urgent. Make sure your cameras are isolated from the internet and accessible from trusted networks only. Check and enforce password authentication. Then check your firmware version and if there's an update, patch ASAP. For end-of-life devices, isolate them, enforce passwords and plan a replacement process.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-command-injection-vulnerability-in-legacy-vivotek-cameras-s-y-d-d-o/gD2P6Ple2L
updated 2026-01-20T16:16:06.200000
1 posts
4 repos
https://github.com/Ashwesker/Ashwesker-CVE-2025-64155
https://github.com/purehate/CVE-2025-64155-hunter
https://github.com/horizon3ai/CVE-2025-64155
https://github.com/cyberdudebivash/CYBERDUDEBIVASH-FortiSIEM-CVE-2025-64155-Scanner
Attacks Target Freshly Patched Critical Fortinet Flaws
The Fortinet command injection flaw in FortiSIEM (CVE-2025-64155) is reported to be actively exploited to gain root access.
**This became urgent. FortiSIEM is actively attacked. Patch your FortiSIEM appliances to the latest version immediately and block port 7900 from any public access.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/attacks-target-freshly-patched-critical-fortinet-flaws-l-g-c-h-i/gD2P6Ple2L
updated 2026-01-20T15:33:21
1 posts
1 repos
Zoom Patches Critical Command Injection Flaw in Node Multimedia Routers
Zoom patched a critical command injection vulnerability (CVE-2026-22844) in its Node Multimedia Routers that allowed meeting participants to execute remote code. The flaw affects hybrid and connector deployments.
**Make sure all Zoom Node devices are isolated from the internet and accessible from trusted networks only. Update your MMR modules to version 5.2.1716.0 ASAP, because even if isolated there will be a way in through compromised endpoints of users.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/zoom-patches-critical-command-injection-flaw-in-node-multimedia-routers-q-d-d-f-1/gD2P6Ple2L
updated 2026-01-16T21:57:11
1 posts
1 repos
‼️CVE-2026-23744: Versions 1.4.2 and earlier of MCPJam inspector are vulnerable to remote code execution (RCE)
CVSS: 9.8
CVE Published: January 16th, 2026
PoC/Exploit Published: January 20th, 2026
GitHub PoC: https://github.com/boroeurnprach/CVE-2026-23744-PoC/
Advisory: https://github.com/advisories/GHSA-232v-j27c-5pp6
MCPJam inspector is the local-first development platform for MCP servers. Versions 1.4.2 and earlier are vulnerable to remote code execution (RCE) vulnerability, which allows an attacker to send a crafted HTTP request that triggers the installation of an MCP server, leading to RCE. Since MCPJam inspector by default listens on 0.0.0.0 instead of 127.0.0.1, an attacker can trigger the RCE remotely via a simple HTTP request. Version 1.4.3 contains a patch.
##updated 2026-01-16T21:56:00
1 posts
updated 2026-01-16T21:16:24
1 posts
1 repos
Node.js – CVE-2026-23745 : cette faille de sécurité dans la bibliothèque node-tar est à prendre au sérieux https://www.it-connect.fr/node-js-cve-2026-23745-node-tar-vulnerabilite/ #ActuCybersécurité #Cybersécurité #Vulnérabilité
##updated 2026-01-16T16:23:11.237000
2 posts
Microslop is a bit late for the new year celebration (or a bit early for Chinese new year).
Either way they're starting/ending the year with a banger: CVE-2026-20965
Being able to steal Global Admin token and labeling it a medium severity.
##Microslop is a bit late for the new year celebration (or a bit early for Chinese new year).
Either way they're starting/ending the year with a banger: CVE-2026-20965
Being able to steal Global Admin token and labeling it a medium severity.
##updated 2025-12-17T13:54:45.390000
8 posts
3 repos
https://github.com/moften/CVE-2025-59718-Fortinet-Poc
Fortinet Under Fire: Critical FortiCloud SSO Bypass Actively Exploited While Patch Still Missing
A Silent Crisis Unfolding in Enterprise Networks Fortinet, one of the world’s most widely deployed cybersecurity vendors, is facing mounting scrutiny after confirming that a critical FortiCloud Single Sign-On (SSO) authentication bypass vulnerability remains unpatched. Tracked as CVE-2025-59718, the flaw is not theoretical or limited to lab conditions—it is already being…
##Fortinet Firewall Chaos: Patched FortiGate Devices Still Wide Open to Admin Takeovers
Introduction: A Patch That Didn’t Patch Fortinet customers who believed they were safe after applying the latest FortiGate updates are now facing an uncomfortable reality. A newly disclosed authentication bypass flaw, tracked as CVE-2025-59718, continues to expose FortiGate firewalls to full administrative compromise—even on systems already updated to version 7.4.10. The issue has…
##FortiCloud SSO : des firewalls Fortinet piratés, des configurations volées ! https://www.it-connect.fr/forticloud-sso-cve-2025-59718-firewalls-fortinet-pirates-des-configurations-volees/ #ActuCybersécurité #Cybersécurité
##CVE-2025-59718, a critical authentication bypass flaw that attackers exploited in December 2025 to compromise FortiGate appliances, appears to persist in newer, purportedly fixed releases of the underlying FortiOS.
https://www.helpnetsecurity.com/2026/01/21/patched-fortigate-compromised-via-cve-2025-59718/
##Fortinet FortiGate admins are observing exploitation patterns consistent with CVE-2025-59718 even on patched systems, suggesting incomplete mitigation in earlier updates.
Reports include SSO-based admin creation and activity aligned with previously documented attacks. Additional FortiOS releases are expected.
The situation reinforces the need for defense-in-depth around identity, logging, and privileged access.
Follow @technadu for neutral, operationally focused security reporting.
#Infosec #Fortinet #FirewallSecurity #IAM #VulnerabilityManagement #TechNadu
##FortiGate Firewalls Compromised Despite Recent Patches for CVE-2025-59718
Fortinet FortiGate firewalls are reported to still be vulnerable to authentication bypass attacks via CVE-2025-59718 even after applying initial patches. Attackers use malicious SAML responses to create unauthorized admin accounts and steal configuration data.
**If you are using Fortinet FortiGate, this is important and urgent. Your device may still be vulnerable. Disable the FortiCloud SSO login feature immediately on all FortiGate appliances to prevent unauthorized administrative access.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/fortigate-firewalls-compromised-despite-recent-patches-for-cve-2025-59718-l-2-0-x-k/gD2P6Ple2L
CVE-2025-59718 – Des firewalls FortiGate piratés malgré l’installation des derniers patchs https://www.it-connect.fr/cve-2025-59718-des-firewalls-fortigate-pirates-malgre-linstallation-des-derniers-patchs/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #Fortinet
##Si vous administrez des FortiGate/FortiOS : des admins signalent un contournement du patch de la vulnérabilité critique CVE-2025-59718 (FortiCloud SSO https://fortiguard.fortinet.com/psirt/FG-IR-25-647 ) → compromission possible même sur des firewalls « patchés » (ex. 7.4.9/7.4.10).
( https://www.reddit.com/r/fortinet/comments/1qibdcb/possible_new_sso_exploit_cve202559718_on_749/ )
Préreq : “Allow administrative login using FortiCloud SSO” activé (souvent après enregistrement FortiCare).
Mitigation : désactiver admin-forticloud-sso-login + restreindre l’accès admin + vérifier logs/nouveaux comptes.
Chaîne d'exploitation: CVE-2025-59718 (+ CVE-2025-59719 côté FortiWeb) ➡️ envoi de messages SAML forgés ➡️ bypass de vérification de signature ➡️ accès admin non autorisé.
[Références]
"Fortinet admins report patched FortiGate firewalls getting hacked"
👇
https://www.bleepingcomputer.com/news/security/fortinet-admins-report-patched-fortigate-firewalls-getting-hacked/
updated 2025-12-11T21:15:46.907000
1 posts
Firefox / WebRTC Encoded Transforms: UAF via undetached ArrayBuffer / CVE-2025-1432 https://aisle.com/blog/firefox-webrtc-encoded-transforms-uaf-via-undetached-arraybuffer-cve-2025-14321
##updated 2025-12-09T19:59:29.507000
1 posts
1 repos
Si vous administrez des FortiGate/FortiOS : des admins signalent un contournement du patch de la vulnérabilité critique CVE-2025-59718 (FortiCloud SSO https://fortiguard.fortinet.com/psirt/FG-IR-25-647 ) → compromission possible même sur des firewalls « patchés » (ex. 7.4.9/7.4.10).
( https://www.reddit.com/r/fortinet/comments/1qibdcb/possible_new_sso_exploit_cve202559718_on_749/ )
Préreq : “Allow administrative login using FortiCloud SSO” activé (souvent après enregistrement FortiCare).
Mitigation : désactiver admin-forticloud-sso-login + restreindre l’accès admin + vérifier logs/nouveaux comptes.
Chaîne d'exploitation: CVE-2025-59718 (+ CVE-2025-59719 côté FortiWeb) ➡️ envoi de messages SAML forgés ➡️ bypass de vérification de signature ➡️ accès admin non autorisé.
[Références]
"Fortinet admins report patched FortiGate firewalls getting hacked"
👇
https://www.bleepingcomputer.com/news/security/fortinet-admins-report-patched-fortigate-firewalls-getting-hacked/
updated 2025-11-13T19:34:53.453000
1 posts
Firefox / WebRTC Encoded Transforms: UAF via undetached ArrayBuffer / CVE-2025-1432 https://aisle.com/blog/firefox-webrtc-encoded-transforms-uaf-via-undetached-arraybuffer-cve-2025-14321
##updated 2025-11-12T15:32:32
1 posts
Join @vulncheck next week for our new In the Wild webcast series! This month, our research team will do a deep dive on developing an exploit for Gladinet Triofox CVE-2025-12480, a process that wound up being significantly more complex than expected.
Wednesday, Jan. 28 @ 1 PM ET (and the last Wednesday of every month!)
https://wwv.vulncheck.com/in-the-wild-with-vulncheck-webinar-series
##updated 2025-11-07T19:01:01.300000
2 posts
185.93.89.75 was a busy bee today! Attempting Realtek Jungle SDK formWsc Injection aimed mostly @ the U.S.
That SDK is used in RTL819x series chipsets (RTL819xD and related) that provide wireless capabilities for a broad range of IoT devices. Based on the ONEKEY/IoT Inspector research that disclosed CVE-2021-35394 and related vulnerabilities.
Wonder what mischief they're up to?
##185.93.89.75 was a busy bee today! Attempting Realtek Jungle SDK formWsc Injection aimed mostly @ the U.S.
That SDK is used in RTL819x series chipsets (RTL819xD and related) that provide wireless capabilities for a broad range of IoT devices. Based on the ONEKEY/IoT Inspector research that disclosed CVE-2021-35394 and related vulnerabilities.
Wonder what mischief they're up to?
##updated 2025-11-03T18:32:42
1 posts
You like technical deep dives into binary exploitation and crazy heap wizardry? Then you'll like our blog post about unauth'ed RCE in NetSupport Manager aka CVE-2025-34164 & CVE-2025-34165 https://code-white.com/blog/2026-01-nsm-rce/
##updated 2025-09-02T15:55:35.520000
1 posts
You like technical deep dives into binary exploitation and crazy heap wizardry? Then you'll like our blog post about unauth'ed RCE in NetSupport Manager aka CVE-2025-34164 & CVE-2025-34165 https://code-white.com/blog/2026-01-nsm-rce/
##updated 2025-08-21T00:43:47.783000
1 posts
1 repos
Sometimes devil is in the details. #POSIX requires option parsing to terminate when the initial non-option argument is encountered. This is different than the #GNU style which continues parsing arguments until an explicit "--" is encountered. The latter has been susceptible to command line injection attacks. One recent example is in #bubblewrap & #flatpak combo with CVE-2024-32462. Otoh, #sydbox and all its utilities use posixly correct option parsing: https://nvd.nist.gov/vuln/detail/cve-2024-32462 #linux #security
##updated 2025-08-18T08:03:59
1 posts
4 repos
https://github.com/haxorstars/CVE-2025-54068
https://github.com/z0d131482700x/Livewire2025CVE
‼️Livepyre: A tool designed to exploit CVE-2025-54068 and Remote Command Execution if the APP_KEY of the Livewire project is known.
GitHub: https://github.com/synacktiv/Livepyre
Writeup: https://www.synacktiv.com/en/publications/livewire-remote-command-execution-through-unmarshaling
CVSS: 9.2
Description: Livewire is a full-stack framework for Laravel. In Livewire v3 up to and including v3.6.3, a vulnerability allows unauthenticated attackers to achieve remote command execution in specific scenarios. The issue stems from how certain component property updates are hydrated. This vulnerability is unique to Livewire v3 and does not affect prior major versions. Exploitation requires a component to be mounted and configured in a particular way, but does not require authentication or user interaction. This issue has been patched in Livewire v3.6.4. All users are strongly encouraged to upgrade to this version or later as soon as possible. No known workarounds are available.
##updated 2025-04-09T00:30:58.490000
2 posts
OMG. -froot bug resurfaced. https://seclists.org/oss-sec/2026/q1/89
I see the headlines, "10 years old bug".
My friends, this bug is older. Much older. Not this particular instance, but it is a classical mistake to make. It's a command line injection when calling the login executable.
Some people point to CVE-2007-0882. Solaris had that, almost 20 years ago.
But it's even older than that. It's so old it predates the CVE system. I don't remember exact dates, but we popped Linux and AIX boxes with that, mid 90s.
But it is *even older* than that. Have a look at System V R4, ©1990, getty calling login with unsanitized input:
But how deep does the rabbit hole go? When was this bug introduced?
Getty called login with user input since the dawn of time (UNIX V2, 1972):
https://www.tuhs.org/cgi-bin/utree.pl?file=V2/cmd/getty.s
But this predates command line arguments in login:
https://www.tuhs.org/cgi-bin/utree.pl?file=V2/cmd/login.s
So, when did this particular command line feature of login appear?
In the BSD universe, -f was introduced with POSIX compatibilitiy in 4.3BSD-Reno:
https://www.tuhs.org/cgi-bin/utree.pl?file=4.3BSD-Reno/src/usr.bin/login/login.c
But someone paid attention and filtered out user names starting with - in getty:
https://www.tuhs.org/cgi-bin/utree.pl?file=4.3BSD-Reno/src/libexec/getty/main.c
RCS timestamp says 6/29/1990, so same age as SysV R4.
The original 4.3BSD (1986) doesn't filter the user name:
https://www.tuhs.org/cgi-bin/utree.pl?file=4.3BSD/usr/src/etc/getty/main.c
And it does have a -r option in login:
https://www.tuhs.org/cgi-bin/utree.pl?file=4.3BSD/usr/src/bin/login.c
Exploitable? No idea, argv processing might be a problem. I'll find out another day.
In conclusion: bug existed since 1990, it's so easy to make when implementing POSIX that it keeps resurfacing, and at least one person in Berkeley knew since day 0.
##OMG. -froot bug resurfaced. https://seclists.org/oss-sec/2026/q1/89
I see the headlines, "10 years old bug".
My friends, this bug is older. Much older. Not this particular instance, but it is a classical mistake to make. It's a command line injection when calling the login executable.
Some people point to CVE-2007-0882. Solaris had that, almost 20 years ago.
But it's even older than that. It's so old it predates the CVE system. I don't remember exact dates, but we popped Linux and AIX boxes with that, mid 90s.
But it is *even older* than that. Have a look at System V R4, ©1990, getty calling login with unsanitized input:
But how deep does the rabbit hole go? When was this bug introduced?
Getty called login with user input since the dawn of time (UNIX V2, 1972):
https://www.tuhs.org/cgi-bin/utree.pl?file=V2/cmd/getty.s
But this predates command line arguments in login:
https://www.tuhs.org/cgi-bin/utree.pl?file=V2/cmd/login.s
So, when did this particular command line feature of login appear?
In the BSD universe, -f was introduced with POSIX compatibilitiy in 4.3BSD-Reno:
https://www.tuhs.org/cgi-bin/utree.pl?file=4.3BSD-Reno/src/usr.bin/login/login.c
But someone paid attention and filtered out user names starting with - in getty:
https://www.tuhs.org/cgi-bin/utree.pl?file=4.3BSD-Reno/src/libexec/getty/main.c
RCS timestamp says 6/29/1990, so same age as SysV R4.
The original 4.3BSD (1986) doesn't filter the user name:
https://www.tuhs.org/cgi-bin/utree.pl?file=4.3BSD/usr/src/etc/getty/main.c
And it does have a -r option in login:
https://www.tuhs.org/cgi-bin/utree.pl?file=4.3BSD/usr/src/bin/login.c
Exploitable? No idea, argv processing might be a problem. I'll find out another day.
In conclusion: bug existed since 1990, it's so easy to make when implementing POSIX that it keeps resurfacing, and at least one person in Berkeley knew since day 0.
##updated 2024-11-21T05:05:11.403000
1 posts
@bradwilson @xunit well well, just because we are not running something in production doesn’t mean it can’t have vulnerablilities 😊😈
https://nvd.nist.gov/vuln/detail/cve-2020-15250?utm_source=chatgpt.com
##updated 2024-11-21T05:03:03.217000
1 posts
2 repos
🟠 CVE-2026-24009 - High (8.1)
Docling Core (or docling-core) is a library that defines core data types and transformations in the document processing application Docling. A PyYAML-related Remote Code Execution (RCE) vulnerability, namely CVE-2020-14343, is exposed in docling-c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24009/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2024-02-13T18:38:18
1 posts
I remember a similar one on AIX with rlogind in the early 90s. (CVE-1999-0113 from 1994 it seems). I may or may not have used this at the time :-)
##🔴 CVE-2026-24399 - Critical (9.3)
ChatterMate is a no-code AI chatbot agent framework. In versions 1.0.8 and below, the chatbot accepts and executes malicious HTML/JavaScript payloads when supplied as chat input. Specifically, an payload containing a javascript: URI can be proces...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24399/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-24399 - Critical (9.3)
ChatterMate is a no-code AI chatbot agent framework. In versions 1.0.8 and below, the chatbot accepts and executes malicious HTML/JavaScript payloads when supplied as chat input. Specifically, an payload containing a javascript: URI can be proces...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24399/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-24399 - Critical (9.3)
ChatterMate is a no-code AI chatbot agent framework. In versions 1.0.8 and below, the chatbot accepts and executes malicious HTML/JavaScript payloads when supplied as chat input. Specifically, an payload containing a javascript: URI can be proces...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24399/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-24399 - Critical (9.3)
ChatterMate is a no-code AI chatbot agent framework. In versions 1.0.8 and below, the chatbot accepts and executes malicious HTML/JavaScript payloads when supplied as chat input. Specifically, an payload containing a javascript: URI can be proces...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24399/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24406 - High (8.8)
iccDEV provides libraries and tools for interacting with, manipulating, and applying ICC color management profiles. Versions 2.3.1.1 and below have a Heap Buffer Overflow vulnerability in CIccTagNamedColor2::SetSize(). This occurs when user-contro...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24406/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24406 - High (8.8)
iccDEV provides libraries and tools for interacting with, manipulating, and applying ICC color management profiles. Versions 2.3.1.1 and below have a Heap Buffer Overflow vulnerability in CIccTagNamedColor2::SetSize(). This occurs when user-contro...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24406/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24406 - High (8.8)
iccDEV provides libraries and tools for interacting with, manipulating, and applying ICC color management profiles. Versions 2.3.1.1 and below have a Heap Buffer Overflow vulnerability in CIccTagNamedColor2::SetSize(). This occurs when user-contro...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24406/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24406 - High (8.8)
iccDEV provides libraries and tools for interacting with, manipulating, and applying ICC color management profiles. Versions 2.3.1.1 and below have a Heap Buffer Overflow vulnerability in CIccTagNamedColor2::SetSize(). This occurs when user-contro...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24406/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24405 - High (8.8)
iccDEV provides libraries and tools for interacting with, manipulating, and applying ICC color management profiles. Versions 2.3.1.1 and below have a Heap Buffer Overflow vulnerability in CIccMpeCalculator::Read(). This occurs when user-controllab...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24405/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24405 - High (8.8)
iccDEV provides libraries and tools for interacting with, manipulating, and applying ICC color management profiles. Versions 2.3.1.1 and below have a Heap Buffer Overflow vulnerability in CIccMpeCalculator::Read(). This occurs when user-controllab...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24405/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##1 posts
44 repos
https://github.com/vignesh21-git/CVE-2025-48384
https://github.com/jacobholtz/CVE-2025-48384-submodule
https://github.com/beishanxueyuan/CVE-2025-48384
https://github.com/mukesh-610/cve-2025-48384-exploit
https://github.com/eliox01/CVE-2025-48384
https://github.com/acheong08/CVE-2025-48384
https://github.com/p1026/CVE-2025-48384
https://github.com/altm4n/cve-2025-48384
https://github.com/ECHO6789/CVE-2025-48384-submodule
https://github.com/replicatorbot/CVE-2025-48384
https://github.com/kallydev/cve-2025-48384-hook
https://github.com/vignesh21-git/CVE-2025-48384-submodule
https://github.com/mukesh-610/cve-2025-48384
https://github.com/nguyentranbaotran/cve-2025-48384-poc
https://github.com/liamg/CVE-2025-48384-submodule
https://github.com/liamg/CVE-2025-48384
https://github.com/zr0n/CVE-2025-48384-sub
https://github.com/IK-20211125/CVE-2025-48384
https://github.com/EdwardYeIntrix/CVE-2025-48384-Scanner
https://github.com/s41r4j/CVE-2025-48384-submodule
https://github.com/s41r4j/CVE-2025-48384
https://github.com/beishanxueyuan/CVE-2025-48384-test
https://github.com/butyraldehyde/CVE-2025-48384-PoC
https://github.com/fluoworite/CVE-2025-48384
https://github.com/greatyy/CVE-2025-48384-p
https://github.com/butyraldehyde/CVE-2025-48384-PoC-Part2
https://github.com/elprogramadorgt/CVE-2025-48384
https://github.com/fishyyh/CVE-2025-48384
https://github.com/arun1033/CVE-2025-48384
https://github.com/altm4n/cve-2025-48384-hub
https://github.com/fishyyh/CVE-2025-48384-POC
https://github.com/NigelX/CVE-2025-48384
https://github.com/fluoworite/CVE-2025-48384-sub
https://github.com/f1shh/CVE-2025-48384
https://github.com/replicatorbot/CVE-2025-48384-POC
https://github.com/vinieger/vinieger-CVE-2025-48384-Dockerfile
https://github.com/ppd520/CVE-2025-48384
https://github.com/admin-ping/CVE-2025-48384-RCE
https://github.com/Anezatraa/CVE-2025-48384-submodule
https://github.com/testdjshan/CVE-2025-48384
https://github.com/jacobholtz/CVE-2025-48384-poc
https://github.com/MarcoTondolo/cve-2025-48384-poc
https://github.com/zr0n/CVE-2025-48384-main
https://github.com/simplyfurious/CVE-2025-48384-submodule_test
🟠 CVE-2026-24138 - High (7.5)
FOG is a free open-source cloning/imaging/rescue suite/inventory management system. Versions 1.5.10.1754 and below contain an unauthenticated SSRF vulnerability in getversion.php which can be triggered by providing a user-controlled url parameter....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24138/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24129 - High (8)
Runtipi is a Docker-based, personal homeserver orchestrator that facilitates multiple services on a single server. Versions 3.7.0 and above allow an authenticated user to execute arbitrary system commands on the host server by injecting shell meta...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24129/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Google Patches High-Severity V8 Race Condition in Chrome 144
Google released Chrome 144 to patch a high-severity race condition in the V8 engine (CVE-2026-1220) that could allow arbitrary code execution.
**If you are using Google Chrome or other Chromium-based browsers (Edge, Brave, Vivaldi, Opera...) patch your browser ASAP. Even if the flaw is not critical, you shouldn't wait for the flaw to become actively exploited. Update now, it's trivial and all your tabs reopen after the update.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/google-patches-high-severity-v8-race-condition-in-chrome-144-b-f-y-a-y/gD2P6Ple2L
🟠 CVE-2026-24038 - High (8.1)
Horilla is a free and open source Human Resource Management System (HRMS). In version 1.4.0, the OTP handling logic has a flawed equality check that can be bypassed. When an OTP expires, the server returns None, and if an attacker omits the otp fi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24038/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-23962 - High (7.5)
Mastodon is a free, open-source social network server based on ActivityPub. Mastodon versions before v4.3.18, v4.4.12, and v4.5.5 do not have a limit on the maximum number of poll options for remote posts, allowing attackers to create polls with a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23962/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-22792 - Critical (9.6)
5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. Prior to version 0.15.3, an unsafe HTML rendering permits untrusted HTML (including on* event attributes) to execute in the renderer context. An ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22792/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-68137 - High (8.3)
EVerest is an EV charging software stack. Prior to version 2025.10.0, an integer overflow occurring in `SdpPacket::parse_header()` allows the current buffer length to be set to 7 after a complete header of size 8 has been read. The remaining lengt...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-68137/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##