##
Updated at UTC 2026-01-15T05:42:55.219566
| CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
|---|---|---|---|---|---|---|---|
| CVE-2025-13455 | 7.8 | 0.00% | 1 | 0 | 2026-01-14T23:15:55.803000 | A vulnerability was reported in ThinkPlus configuration software that could allo | |
| CVE-2025-12166 | 7.5 | 0.00% | 1 | 0 | 2026-01-14T23:15:54.180000 | The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin p | |
| CVE-2026-0861 | 8.4 | 0.00% | 1 | 0 | 2026-01-14T22:15:53.233000 | Passing too large an alignment to the memalign suite of functions (memalign, pos | |
| CVE-2025-70747 | 7.5 | 0.00% | 1 | 0 | 2026-01-14T21:35:12 | Tenda AX-1806 v1.0.0.1 was discovered to contain a stack overflow in the service | |
| CVE-2025-65397 | 8.4 | 0.00% | 1 | 0 | 2026-01-14T21:35:12 | An insecure authentication mechanism in the safe_exec.sh startup script of Blura | |
| CVE-2026-22184 | 9.8 | 0.11% | 2 | 0 | 2026-01-14T21:35:08 | zlib versions up to and including 1.3.1.2 contain a global buffer overflow in th | |
| CVE-2025-11224 | 7.7 | 0.00% | 1 | 0 | 2026-01-14T21:34:16 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 15.10 | |
| CVE-2025-33206 | 7.8 | 0.00% | 1 | 0 | 2026-01-14T21:34:16 | NVIDIA NSIGHT Graphics for Linux contains a vulnerability where an attacker coul | |
| CVE-2026-0732 | 6.3 | 0.72% | 1 | 0 | 2026-01-14T21:34:06 | A vulnerability was found in D-Link DI-8200G 17.12.20A1. This affects an unknown | |
| CVE-2026-23550 | 10.0 | 0.04% | 1 | 0 | 2026-01-14T21:15:54.193000 | Incorrect Privilege Assignment vulnerability in Modular DS allows Privilege Esca | |
| CVE-2026-23512 | 8.6 | 0.00% | 1 | 0 | 2026-01-14T21:15:54.013000 | SumatraPDF is a multi-format reader for Windows. In 3.5.2 and earlier, there is | |
| CVE-2026-23492 | 8.8 | 0.00% | 1 | 0 | 2026-01-14T21:15:44 | ### Summary An **incomplete SQL injection patch** in the Admin Search Find API a | |
| CVE-2025-59470 | 9.0 | 0.30% | 3 | 0 | 2026-01-14T20:59:08.753000 | This vulnerability allows a Backup Operator to perform remote code execution (RC | |
| CVE-2026-21272 | 8.6 | 0.03% | 1 | 0 | 2026-01-14T20:49:33.830000 | Dreamweaver Desktop versions 21.6 and earlier are affected by an Improper Input | |
| CVE-2026-21265 | 6.4 | 0.21% | 2 | 0 | 2026-01-14T20:23:43.417000 | Windows Secure Boot stores Microsoft certificates in the UEFI KEK and DB. These | |
| CVE-2025-71021 | 7.5 | 0.00% | 1 | 0 | 2026-01-14T20:16:14.003000 | Tenda AX-1806 v1.0.0.1 was discovered to contain a stack overflow in the serverN | |
| CVE-2026-21281 | 7.8 | 0.03% | 1 | 0 | 2026-01-14T19:28:33.957000 | InCopy versions 21.0, 19.5.5 and earlier are affected by a Heap-based Buffer Ove | |
| CVE-2025-37168 | 8.2 | 0.05% | 1 | 0 | 2026-01-14T19:16:41.860000 | Arbitrary file deletion vulnerability have been identified in a system function | |
| CVE-2025-14502 | 9.8 | 0.29% | 1 | 0 | 2026-01-14T18:32:34 | The News and Blog Designer Bundle plugin for WordPress is vulnerable to Local Fi | |
| CVE-2025-70968 | 9.8 | 0.00% | 1 | 0 | 2026-01-14T18:31:43 | FreeImage 3.18.0 contains a Use After Free in PluginTARGA.cpp;loadRLE(). | |
| CVE-2025-67399 | 4.6 | 0.00% | 2 | 1 | 2026-01-14T18:31:43 | An issue in AIRTH SMART HOME AQI MONITOR Bootloader v.1.005 allows a physically | |
| CVE-2026-22859 | 0 | 0.00% | 2 | 0 | 2026-01-14T18:16:43.657000 | FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1 | |
| CVE-2026-22857 | 0 | 0.00% | 2 | 0 | 2026-01-14T18:16:43.373000 | FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1 | |
| CVE-2026-22854 | 0 | 0.00% | 2 | 0 | 2026-01-14T18:16:42.933000 | FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1 | |
| CVE-2026-22851 | 0 | 0.00% | 2 | 0 | 2026-01-14T18:16:42.490000 | FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1 | |
| CVE-2025-66050 | 9.8 | 0.04% | 1 | 0 | 2026-01-14T17:48:29.730000 | Vivotek IP7137 camera with firmware version 0200a by default dos not require to | |
| CVE-2025-66049 | 7.5 | 0.07% | 1 | 0 | 2026-01-14T17:48:18.313000 | Vivotek IP7137 camera with firmware version 0200a is vulnerable to an informatio | |
| CVE-2026-0406 | 0 | 0.04% | 1 | 0 | 2026-01-14T16:26:00.933000 | An insufficient input validation vulnerability in the NETGEAR XR1000v2 allows a | |
| CVE-2025-71027 | 0 | 0.02% | 1 | 0 | 2026-01-14T16:26:00.933000 | Tenda AX-3 v16.03.12.10_CN was discovered to contain a stack overflow in the wan | |
| CVE-2025-13447 | 8.4 | 0.15% | 1 | 0 | 2026-01-14T16:26:00.933000 | OS Command Injection Remote Code Execution Vulnerability in API in Progress Load | |
| CVE-2025-68702 | 0 | 0.03% | 1 | 0 | 2026-01-14T16:25:40.430000 | Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libra | |
| CVE-2026-20944 | 8.4 | 0.03% | 1 | 0 | 2026-01-14T16:25:40.430000 | Out-of-bounds read in Microsoft Office Word allows an unauthorized attacker to e | |
| CVE-2025-37166 | 7.5 | 0.02% | 1 | 0 | 2026-01-14T16:25:40.430000 | A vulnerability affecting HPE Networking Instant On Access Points has been ident | |
| CVE-2026-0408 | 0 | 0.04% | 1 | 0 | 2026-01-14T16:25:40.430000 | A path traversal vulnerability in NETGEAR WiFi range extenders allows an attack | |
| CVE-2026-0407 | 0 | 0.05% | 1 | 0 | 2026-01-14T16:25:40.430000 | An insufficient authentication vulnerability in NETGEAR WiFi range extenders al | |
| CVE-2025-9142 | 7.5 | 0.00% | 1 | 0 | 2026-01-14T16:25:12.057000 | A local user can trigger Harmony SASE Windows client to write or delete files ou | |
| CVE-2025-66169 | 0 | 0.02% | 2 | 0 | 2026-01-14T16:25:12.057000 | Cypher Injection vulnerability in Apache Camel camel-neo4j component. This issu | |
| CVE-2025-14301 | 9.8 | 0.09% | 1 | 0 | 2026-01-14T16:25:12.057000 | The Integration Opvius AI for WooCommerce plugin for WordPress is vulnerable to | |
| CVE-2026-22686 | 10.0 | 0.10% | 1 | 0 | 2026-01-14T16:25:12.057000 | Enclave is a secure JavaScript sandbox designed for safe AI agent code execution | |
| CVE-2025-12052 | 7.8 | 0.01% | 1 | 0 | 2026-01-14T16:25:12.057000 | The drivers in the tool packages use RTL_QUERY_REGISTRY_DIRECT flag to read a re | |
| CVE-2025-68956 | 8.0 | 0.01% | 1 | 0 | 2026-01-14T16:25:12.057000 | Multi-thread race condition vulnerability in the card framework module. Impact: | |
| CVE-2025-68957 | 8.4 | 0.01% | 1 | 0 | 2026-01-14T16:25:12.057000 | Multi-thread race condition vulnerability in the card framework module. Impact: | |
| CVE-2025-68960 | 8.4 | 0.01% | 1 | 0 | 2026-01-14T16:25:12.057000 | Multi-thread race condition vulnerability in the video framework module. Impact: | |
| CVE-2025-14338 | 0 | 0.02% | 1 | 0 | 2026-01-14T16:25:12.057000 | Polkit authentication dis isabled by default and a race condition in the Polkit | |
| CVE-2025-67859 | 0 | 0.02% | 1 | 0 | 2026-01-14T16:25:12.057000 | A Improper Authentication vulnerability in TLP allows local users to arbitrarily | |
| CVE-2026-20805 | 5.5 | 23.28% | 11 | 1 | 2026-01-14T13:44:31.180000 | Exposure of sensitive information to an unauthorized actor in Desktop Windows Ma | |
| CVE-2026-0532 | 8.6 | 0.03% | 1 | 0 | 2026-01-14T12:31:48 | External Control of File Name or Path (CWE-73) combined with Server-Side Request | |
| CVE-2025-66005 | None | 0.01% | 1 | 0 | 2026-01-14T12:31:39 | Lack of authorization of the InputManager D-Bus interface in InputPlumber versio | |
| CVE-2025-14770 | 7.5 | 0.06% | 1 | 0 | 2026-01-14T09:31:20 | The Shipping Rate By Cities plugin for WordPress is vulnerable to SQL Injection | |
| CVE-2025-12053 | 7.8 | 0.01% | 1 | 0 | 2026-01-14T03:30:32 | The drivers in the tool packages use RTL_QUERY_REGISTRY_DIRECT flag to read a re | |
| CVE-2025-68958 | 8.0 | 0.01% | 1 | 0 | 2026-01-14T03:30:32 | Multi-thread race condition vulnerability in the card framework module. Impact: | |
| CVE-2025-68968 | 7.8 | 0.01% | 1 | 0 | 2026-01-14T03:30:32 | Double free vulnerability in the multi-mode input module. Impact: Successful exp | |
| CVE-2025-12050 | 7.8 | 0.01% | 1 | 0 | 2026-01-14T03:30:31 | The drivers in the tool packages use RTL_QUERY_REGISTRY_DIRECT flag to read a re | |
| CVE-2025-12051 | 7.8 | 0.01% | 1 | 0 | 2026-01-14T03:30:31 | The drivers in the tool packages use RTL_QUERY_REGISTRY_DIRECT flag to read a re | |
| CVE-2025-68955 | 8.0 | 0.01% | 1 | 0 | 2026-01-14T03:30:31 | Multi-thread race condition vulnerability in the card framework module. Impact: | |
| CVE-2025-60188 | 7.5 | 3.13% | 1 | 1 | template | 2026-01-14T00:31:25 | Insertion of Sensitive Information Into Sent Data vulnerability in Vito Peleg At |
| CVE-2025-14847 | 7.5 | 57.25% | 9 | 37 | template | 2026-01-13T22:24:20.380000 | Mismatched length fields in Zlib compressed protocol headers may allow a read of |
| CVE-2026-22697 | 7.5 | 0.07% | 1 | 0 | 2026-01-13T22:16:07.690000 | CryptoLib provides a software-only solution using the CCSDS Space Data Link Secu | |
| CVE-2026-0838 | 8.8 | 0.07% | 1 | 0 | 2026-01-13T22:02:34.320000 | A security flaw has been discovered in UTT 进取 520W 1.7.7-180627. This impacts th | |
| CVE-2026-0839 | 8.8 | 0.07% | 1 | 0 | 2026-01-13T21:57:24.170000 | A weakness has been identified in UTT 进取 520W 1.7.7-180627. Affected is the func | |
| CVE-2026-0841 | 8.8 | 0.07% | 1 | 0 | 2026-01-13T21:55:32.140000 | A vulnerability was detected in UTT 进取 520W 1.7.7-180627. Affected by this issue | |
| CVE-2025-68925 | None | 0.03% | 1 | 0 | 2026-01-13T21:41:23 | ### Vulnerability https://github.com/samrocketman/jervis/blob/157d2b63ffa5c4bb1 | |
| CVE-2025-68704 | None | 0.04% | 1 | 0 | 2026-01-13T21:41:13 | ### Vulnerability https://github.com/samrocketman/jervis/blob/157d2b63ffa5c4bb1 | |
| CVE-2025-68703 | None | 0.02% | 1 | 0 | 2026-01-13T21:41:07 | ### Vulnerability https://github.com/samrocketman/jervis/blob/157d2b63ffa5c4bb1 | |
| CVE-2025-68701 | None | 0.03% | 1 | 0 | 2026-01-13T21:40:57 | ### Vulnerability https://github.com/samrocketman/jervis/blob/157d2b63ffa5c4bb1 | |
| CVE-2025-71023 | 7.5 | 0.04% | 1 | 0 | 2026-01-13T21:32:48 | Tenda AX-3 v16.03.12.10_CN was discovered to contain a stack overflow in the mac | |
| CVE-2026-21299 | 7.8 | 0.03% | 1 | 0 | 2026-01-13T21:31:53 | Substance3D - Modeler versions 1.22.4 and earlier are affected by an out-of-boun | |
| CVE-2026-21271 | 8.6 | 0.04% | 1 | 0 | 2026-01-13T21:31:52 | Dreamweaver Desktop versions 21.6 and earlier are affected by an Improper Input | |
| CVE-2026-21268 | 8.6 | 0.04% | 1 | 0 | 2026-01-13T21:31:52 | Dreamweaver Desktop versions 21.6 and earlier are affected by an Improper Input | |
| CVE-2025-64155 | 9.8 | 0.07% | 5 | 2 | 2026-01-13T21:31:44 | An improper neutralization of special elements used in an os command ('os comman | |
| CVE-2026-22813 | None | 0.08% | 1 | 0 | 2026-01-13T20:36:43 | ### Summary A malicious website can abuse the server URL override feature of the | |
| CVE-2026-20953 | 8.4 | 0.03% | 1 | 0 | 2026-01-13T18:31:18 | Use after free in Microsoft Office allows an unauthorized attacker to execute co | |
| CVE-2026-20952 | 8.4 | 0.03% | 1 | 0 | 2026-01-13T18:31:18 | Use after free in Microsoft Office allows an unauthorized attacker to execute co | |
| CVE-2025-59922 | 7.2 | 0.12% | 2 | 0 | 2026-01-13T18:31:14 | An improper neutralization of special elements used in an SQL command ('SQL Inje | |
| CVE-2025-37165 | 7.5 | 0.03% | 1 | 0 | 2026-01-13T18:31:14 | A vulnerability in the router mode configuration of HPE Instant On Access Points | |
| CVE-2026-0405 | None | 0.09% | 1 | 0 | 2026-01-13T18:31:14 | An authentication bypass vulnerability in NETGEAR Orbi devices allows users con | |
| CVE-2026-0386 | 7.5 | 0.08% | 2 | 0 | 2026-01-13T18:31:13 | Improper access control in Windows Deployment Services allows an unauthorized at | |
| CVE-2025-70753 | None | 0.02% | 1 | 0 | 2026-01-13T18:31:12 | Tenda AX-1806 v1.0.0.1 was discovered to contain a stack overflow in the securit | |
| CVE-2025-71026 | None | 0.02% | 1 | 0 | 2026-01-13T18:31:12 | Tenda AX-3 v16.03.12.10_CN was discovered to contain a stack overflow in the wan | |
| CVE-2025-71025 | None | 0.02% | 1 | 0 | 2026-01-13T18:31:12 | Tenda AX-3 v16.03.12.10_CN was discovered to contain a stack overflow in the clo | |
| CVE-2025-71024 | None | 0.02% | 1 | 0 | 2026-01-13T18:31:12 | Tenda AX-3 v16.03.12.10_CN was discovered to contain a stack overflow in the ser | |
| CVE-2026-0403 | None | 0.05% | 1 | 0 | 2026-01-13T18:31:10 | An insufficient input validation vulnerability in NETGEAR Orbi routers allows a | |
| CVE-2026-0404 | None | 0.51% | 1 | 0 | 2026-01-13T18:31:09 | An insufficient input validation vulnerability in NETGEAR Orbi devices' DHCPv6 | |
| CVE-2025-68707 | None | 0.05% | 1 | 0 | 2026-01-13T18:31:09 | An authentication bypass vulnerability in the Tongyu AX1800 Wi-Fi 6 Router with | |
| CVE-2025-66176 | 8.8 | 0.02% | 1 | 0 | 2026-01-13T18:31:03 | There is a Stack overflow Vulnerability in the device Search and Discovery featu | |
| CVE-2025-66177 | 8.8 | 0.02% | 1 | 0 | 2026-01-13T18:16:06.193000 | There is a Stack overflow Vulnerability in the device Search and Discovery featu | |
| CVE-2025-8110 | 8.8 | 0.95% | 5 | 6 | 2026-01-13T15:50:02.180000 | Improper Symbolic link handling in the PutContents API in Gogs allows Local Exec | |
| CVE-2025-13444 | 8.5 | 0.15% | 1 | 0 | 2026-01-13T15:37:12 | OS Command Injection Remote Code Execution Vulnerability in API in Progress Load | |
| CVE-2025-12420 | 0 | 0.07% | 7 | 0 | 2026-01-13T15:15:57.787000 | A vulnerability has been identified in the ServiceNow AI Platform that could ena | |
| CVE-2026-21858 | 10.0 | 2.96% | 12 | 4 | template | 2026-01-13T15:05:00 | ### Impact A vulnerability in n8n allows an attacker to access files on the unde |
| CVE-2026-21898 | 8.2 | 0.05% | 1 | 0 | 2026-01-13T14:03:46.203000 | CryptoLib provides a software-only solution using the CCSDS Space Data Link Secu | |
| CVE-2026-21899 | 4.7 | 0.03% | 1 | 0 | 2026-01-13T14:03:46.203000 | CryptoLib provides a software-only solution using the CCSDS Space Data Link Secu | |
| CVE-2025-70974 | 10.0 | 0.06% | 1 | 0 | 2026-01-13T14:03:46.203000 | Fastjson before 1.2.48 mishandles autoType because, when an @type key is in a JS | |
| CVE-2025-69425 | 0 | 0.10% | 1 | 0 | 2026-01-13T14:03:46.203000 | The Ruckus vRIoT IoT Controller firmware versions prior to 3.0.0.0 (GA) expose a | |
| CVE-2025-70161 | 9.8 | 0.24% | 1 | 0 | 2026-01-13T14:03:46.203000 | EDIMAX BR-6208AC V2_1.02 is vulnerable to Command Injection. This arises because | |
| CVE-2025-64090 | 10.0 | 0.06% | 1 | 0 | 2026-01-13T14:03:46.203000 | This vulnerability allows authenticated attackers to execute commands via the ho | |
| CVE-2025-64093 | 10.0 | 0.22% | 1 | 0 | 2026-01-13T14:03:46.203000 | Remote Code Execution vulnerability that allows unauthenticated attackers to inj | |
| CVE-2026-22079 | 0 | 0.03% | 1 | 0 | 2026-01-13T14:03:46.203000 | This vulnerability exists in Tenda wireless routers (300Mbps Wireless Router F3 | |
| CVE-2025-69194 | 8.8 | 0.03% | 1 | 1 | 2026-01-13T14:03:46.203000 | A security issue was discovered in GNU Wget2 when handling Metalink documents. T | |
| CVE-2025-7072 | 0 | 0.12% | 1 | 0 | 2026-01-13T14:03:46.203000 | The firmware in KAON CG3000TC and CG3000T routers contains hard-coded credential | |
| CVE-2025-65731 | 6.8 | 0.03% | 1 | 1 | 2026-01-13T14:03:46.203000 | An issue was discovered in D-Link Router DIR-605L (Hardware version F1; Firmware | |
| CVE-2025-66689 | 6.5 | 0.04% | 1 | 0 | 2026-01-13T14:03:18.990000 | A path traversal vulnerability exists in Zen MCP Server before 9.8.2 that allows | |
| CVE-2026-22027 | 0 | 0.01% | 1 | 0 | 2026-01-13T14:03:18.990000 | CryptoLib provides a software-only solution using the CCSDS Space Data Link Secu | |
| CVE-2026-0854 | 8.8 | 0.29% | 1 | 0 | 2026-01-13T14:03:18.990000 | Certain DVR/NVR models developed by Merit LILIN has a OS Command Injection vulne | |
| CVE-2025-52694 | 10.0 | 0.08% | 1 | 1 | 2026-01-13T14:03:18.990000 | Successful exploitation of the SQL injection vulnerability could allow an unauth | |
| CVE-2025-50334 | 7.5 | 0.28% | 1 | 0 | 2026-01-12T18:39:30.937000 | An issue in Technitium DNS Server v.13.5 allows a remote attacker to cause a den | |
| CVE-2025-67004 | 6.5 | 0.04% | 1 | 0 | 2026-01-12T18:30:29 | An Information Disclosure vulnerability in CouchCMS 2.4 allow an Admin user to r | |
| CVE-2025-41006 | None | 0.03% | 1 | 0 | 2026-01-12T15:30:50 | Imaster's MEMS Events CRM contains an SQL injection vulnerability in ‘phone’ par | |
| CVE-2026-0855 | 8.8 | 0.29% | 1 | 0 | 2026-01-12T09:30:36 | Certain IP Camera models developed by Merit LILIN has a OS Command Injection vul | |
| CVE-2025-14523 | 8.2 | 0.04% | 1 | 0 | 2026-01-12T03:16:06.990000 | A flaw in libsoup’s HTTP header handling allows multiple Host: headers in a requ | |
| CVE-2025-61686 | 9.1 | 0.06% | 1 | 0 | 2026-01-11T14:53:55 | If applications use `createFileSessionStorage()` from `@react-router/node` (or ` | |
| CVE-2026-0840 | 8.8 | 0.07% | 1 | 0 | 2026-01-11T09:30:25 | A security vulnerability has been detected in UTT 进取 520W 1.7.7-180627. Affected | |
| CVE-2026-0836 | 8.8 | 0.07% | 1 | 0 | 2026-01-11T06:30:19 | A vulnerability was determined in UTT 进取 520W 1.7.7-180627. The impacted element | |
| CVE-2026-0837 | 8.8 | 0.07% | 1 | 0 | 2026-01-11T06:30:19 | A vulnerability was identified in UTT 进取 520W 1.7.7-180627. This affects the fun | |
| CVE-2025-15505 | 2.4 | 0.03% | 1 | 0 | 2026-01-11T03:30:13 | A vulnerability was found in Luxul XWR-600 up to 4.0.1. The affected element is | |
| CVE-2025-14524 | 5.3 | 0.03% | 1 | 0 | 2026-01-09T20:15:51.243000 | When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer p | |
| CVE-2025-10492 | 9.8 | 0.33% | 2 | 1 | 2026-01-09T19:55:26 | A Java deserialisation vulnerability has been discovered in the Jaspersoft Libra | |
| CVE-2025-15035 | None | 0.03% | 1 | 0 | 2026-01-09T18:31:43 | Improper Input Validation vulnerability in TP-Link Archer AXE75 v1.6 (vpn module | |
| CVE-2025-69426 | None | 0.04% | 1 | 0 | 2026-01-09T18:31:43 | The Ruckus vRIoT IoT Controller firmware versions prior to 3.0.0.0 (GA) contain | |
| CVE-2025-14598 | 9.8 | 0.03% | 1 | 1 | 2026-01-09T18:31:36 | BeeS Software Solutions BET Portal contains an SQL injection vulnerability in th | |
| CVE-2025-64091 | 8.6 | 0.04% | 1 | 0 | 2026-01-09T18:31:35 | This vulnerability allows authenticated attackers to execute commands via the NT | |
| CVE-2025-64092 | 7.5 | 0.06% | 1 | 0 | 2026-01-09T18:31:35 | This vulnerability allows unauthenticated attackers to inject an SQL request int | |
| CVE-2026-22082 | None | 0.18% | 1 | 0 | 2026-01-09T12:32:33 | This vulnerability exists in Tenda wireless routers (300Mbps Wireless Router F3 | |
| CVE-2026-22081 | None | 0.06% | 1 | 0 | 2026-01-09T12:32:33 | This vulnerability exists in Tenda wireless routers (300Mbps Wireless Router F3 | |
| CVE-2026-22080 | None | 0.03% | 1 | 0 | 2026-01-09T12:32:32 | This vulnerability exists in Tenda wireless routers (300Mbps Wireless Router F3 | |
| CVE-2025-69195 | 7.6 | 0.08% | 1 | 0 | 2026-01-09T09:31:24 | A flaw was found in GNU Wget2. This vulnerability, a stack-based buffer overflow | |
| CVE-2026-0731 | 5.3 | 0.18% | 1 | 0 | 2026-01-09T00:30:34 | A vulnerability has been found in TOTOLINK WA1200 5.9c.2914. The impacted elemen | |
| CVE-2025-14025 | 8.5 | 0.07% | 1 | 0 | 2026-01-08T23:15:43.673000 | A flaw was found in Ansible Automation Platform (AAP). Read-only scoped OAuth2 A | |
| CVE-2025-12543 | 9.6 | 0.15% | 2 | 0 | 2026-01-08T23:15:42.690000 | A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBo | |
| CVE-2025-59468 | 9.0 | 0.30% | 2 | 0 | 2026-01-08T21:31:39 | This vulnerability allows a Backup Administrator to perform remote code executio | |
| CVE-2025-52691 | 10.0 | 10.87% | 6 | 10 | template | 2026-01-08T21:31:33 | Successful exploitation of the vulnerability could allow an unauthenticated atta |
| CVE-2025-65518 | 7.5 | 0.03% | 1 | 1 | 2026-01-08T21:30:40 | Plesk Obsidian versions 8.0.1 through 18.0.73 are vulnerable to a Denial of Serv | |
| CVE-2025-13151 | 7.5 | 0.05% | 1 | 0 | 2026-01-08T21:30:33 | Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to | |
| CVE-2026-21441 | None | 0.02% | 1 | 0 | 2026-01-08T20:05:42 | ### Impact urllib3's [streaming API](https://urllib3.readthedocs.io/en/2.6.2/ad | |
| CVE-2017-20215 | 8.8 | 0.35% | 1 | 0 | 2026-01-08T19:15:54.677000 | FLIR Thermal Camera FC-S/PT firmware version 8.0.0.64 contains an authenticated | |
| CVE-2017-20214 | 7.5 | 0.04% | 1 | 0 | 2026-01-08T19:15:54.560000 | FLIR Thermal Camera F/FC/PT/D firmware version 8.0.0.64 contains hard-coded SSH | |
| CVE-2025-59469 | 9.0 | 0.05% | 2 | 0 | 2026-01-08T18:30:56 | This vulnerability allows a Backup or Tape Operator to write files as root. | |
| CVE-2025-55125 | 7.8 | 0.19% | 2 | 0 | 2026-01-08T18:30:56 | This vulnerability allows a Backup or Tape Operator to perform remote code execu | |
| CVE-2025-67091 | 6.5 | 0.02% | 1 | 0 | 2026-01-08T18:30:56 | An issue in GL Inet GL.Inet AX1800 Version 4.6.4 & 4.6.8 are vulnerable. GL.Inet | |
| CVE-2025-67089 | 8.1 | 0.23% | 1 | 0 | 2026-01-08T18:30:56 | A command injection vulnerability exists in the GL-iNet GL-AXT1800 router firmwa | |
| CVE-2025-14346 | 9.8 | 0.11% | 2 | 0 | 2026-01-08T18:09:49.800000 | WHILL Model C2 Electric Wheelchairs and Model F Power Chairs do not enforce auth | |
| CVE-2025-69222 | 9.1 | 0.09% | 1 | 0 | 2026-01-08T18:08:54.147000 | LibreChat is a ChatGPT clone with additional features. Version 0.8.1-rc2 is pron | |
| CVE-2026-22541 | 0 | 0.06% | 1 | 0 | 2026-01-08T18:08:54.147000 | The massive sending of ICMP requests causes a denial of service on one of the bo | |
| CVE-2025-69258 | 9.8 | 0.20% | 3 | 0 | 2026-01-08T18:08:18.457000 | A LoadLibraryEX vulnerability in Trend Micro Apex Central could allow an unauthe | |
| CVE-2025-62224 | 5.5 | 0.05% | 2 | 0 | 2026-01-08T18:08:18.457000 | User interface (ui) misrepresentation of critical information in Microsoft Edge | |
| CVE-2025-67090 | 5.1 | 0.03% | 1 | 0 | 2026-01-08T18:08:18.457000 | The LuCI web interface on Gl Inet GL.Inet AX1800 Version 4.6.4 & 4.6.8 are vulne | |
| CVE-2025-15346 | 0 | 0.07% | 1 | 0 | 2026-01-08T18:08:18.457000 | A vulnerability in the handling of verify_mode = CERT_REQUIRED in the wolfssl Py | |
| CVE-2025-15224 | 3.1 | 0.09% | 1 | 0 | 2026-01-08T18:08:18.457000 | When doing SSH-based transfers using either SCP or SFTP, and asked to do public | |
| CVE-2025-37164 | 10.0 | 81.31% | 3 | 3 | template | 2026-01-08T16:59:33.230000 | A remote code execution issue exists in HPE OneView. |
| CVE-2025-15079 | 5.3 | 0.03% | 1 | 0 | 2026-01-08T15:32:30 | When doing SSH-based transfers using either SCP or SFTP, and setting the known_h | |
| CVE-2025-14819 | 5.3 | 0.03% | 1 | 0 | 2026-01-08T15:32:29 | When doing TLS related transfers with reused easy or multi handles and altering | |
| CVE-2025-13034 | 5.9 | 0.02% | 1 | 0 | 2026-01-08T15:32:29 | When using `CURLOPT_PINNEDPUBLICKEY` option with libcurl or `--pinnedpubkey` wit | |
| CVE-2025-69260 | 7.5 | 0.10% | 1 | 0 | 2026-01-08T15:31:29 | A message out-of-bounds read vulnerability in Trend Micro Apex Central could all | |
| CVE-2025-69259 | 7.5 | 0.10% | 1 | 0 | 2026-01-08T15:31:29 | A message unchecked NULL return value vulnerability in Trend Micro Apex Central | |
| CVE-2025-14017 | None | 0.01% | 1 | 0 | 2026-01-08T12:30:38 | When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl, changing | |
| CVE-2017-20213 | 7.5 | 0.12% | 1 | 0 | 2026-01-08T00:31:21 | FLIR Thermal Camera F/FC/PT/D Stream firmware version 8.0.0.64 contains an unaut | |
| CVE-2017-20212 | 6.2 | 0.23% | 1 | 0 | 2026-01-08T00:31:21 | FLIR Thermal Camera F/FC/PT/D firmware version 8.0.0.64 contains an information | |
| CVE-2017-20216 | 9.8 | 0.44% | 1 | 0 | 2026-01-08T00:31:21 | FLIR Thermal Camera PT-Series firmware version 8.0.0.64 contains multiple unauth | |
| CVE-2009-0556 | 8.8 | 76.76% | 5 | 0 | 2026-01-07T21:32:42 | Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3, and PowerPoint in | |
| CVE-2026-20029 | 4.9 | 0.04% | 1 | 0 | 2026-01-07T18:30:33 | A vulnerability in the licensing features of Cisco Identity Services Engine | |
| CVE-2026-22536 | None | 0.02% | 1 | 0 | 2026-01-07T18:30:33 | The absence of permissions control for the user XXX allows the current configura | |
| CVE-2026-22542 | None | 0.06% | 1 | 0 | 2026-01-07T18:30:33 | An attacker with access to the system's internal network can cause a denial of s | |
| CVE-2025-69277 | 4.5 | 0.02% | 1 | 0 | 2026-01-07T18:30:24 | libsodium before ad3004e, in atypical use cases involving certain custom cryptog | |
| CVE-2026-0628 | 8.8 | 0.02% | 2 | 1 | 2026-01-07T15:31:20 | Insufficient policy enforcement in WebView tag in Google Chrome prior to 143.0.7 | |
| CVE-2026-22540 | None | 0.06% | 1 | 0 | 2026-01-07T15:30:25 | The massive sending of ARP requests causes a denial of service on one board of t | |
| CVE-2025-6225 | None | 1.50% | 1 | 0 | 2026-01-07T15:30:25 | Kieback&Peter Neutrino-GLT product is used for building management. It's web com | |
| CVE-2025-38352 | 7.4 | 0.25% | 6 | 3 | 2026-01-07T15:30:14 | In the Linux kernel, the following vulnerability has been resolved: posix-cpu-t | |
| CVE-2025-14631 | None | 0.02% | 1 | 0 | 2026-01-07T12:31:27 | A NULL Pointer Dereference vulnerability in TP-Link Archer BE400 V1(802.11 modul | |
| CVE-2025-15471 | 9.8 | 0.22% | 1 | 0 | 2026-01-07T03:30:32 | A vulnerability was detected in TRENDnet TEW-713RE 1.02. The impacted element is | |
| CVE-2026-21877 | 10.0 | 0.05% | 5 | 1 | 2026-01-06T17:48:25 | ### Impact n8n is affected by an authenticated Remote Code Execution (RCE) vulne | |
| CVE-2025-54957 | 5.4 | 0.05% | 1 | 1 | 2026-01-06T17:15:44.213000 | An issue was discovered in Dolby UDC 4.5 through 4.13. A crash of the DD+ decode | |
| CVE-2025-68428 | None | 0.08% | 2 | 2 | 2026-01-06T15:51:59 | ### Impact User control of the first argument of the loadFile method in the node | |
| CVE-2026-21440 | None | 0.32% | 1 | 3 | 2026-01-03T00:32:10 | ### Summary **Description** A Path Traversal (CWE-22) vulnerability in AdonisJS | |
| CVE-2025-68613 | 9.9 | 63.49% | 1 | 28 | template | 2026-01-02T18:28:02.143000 | n8n is an open source workflow automation platform. Versions starting with 0.211 |
| CVE-2025-66516 | 8.4 | 0.02% | 1 | 4 | 2025-12-30T16:15:46.230000 | Critical XXE in Apache Tika tika-core (1.13-3.2.1), tika-pdf-module (2.0.0-3.2.1 | |
| CVE-2025-13836 | 9.1 | 0.09% | 1 | 0 | 2025-12-30T15:30:26 | When reading an HTTP response from a server, if no read amount is specified, the | |
| CVE-2025-13699 | 7.0 | 0.12% | 1 | 0 | 2025-12-29T15:58:56.260000 | MariaDB mariadb-dump Utility Directory Traversal Remote Code Execution Vulnerabi | |
| CVE-2025-67724 | 5.4 | 0.04% | 1 | 0 | 2025-12-22T18:49:24.303000 | Tornado is a Python web framework and asynchronous networking library. In versio | |
| CVE-2025-14763 | 5.3 | 0.01% | 1 | 0 | 2025-12-18T15:07:42.550000 | Missing cryptographic key commitment in the Amazon S3 Encryption Client for Java | |
| CVE-2025-64113 | 0 | 0.02% | 1 | 1 | 2025-12-12T15:19:07.567000 | Emby Server is a user-installable home media server. Versions below 4.9.1.81 all | |
| CVE-2025-66039 | 0 | 0.05% | 1 | 5 | 2025-12-12T15:19:07.567000 | FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX | |
| CVE-2025-66471 | 7.5 | 0.02% | 1 | 0 | 2025-12-10T16:10:33.500000 | urllib3 is a user-friendly HTTP client library for Python. Starting in version 1 | |
| CVE-2025-12807 | None | 0.06% | 1 | 0 | 2025-12-09T18:30:41 | A security issue was discovered in DataMosaix Private Cloud, allowing users with | |
| CVE-2025-55182 | 10.0 | 62.33% | 2 | 100 | template | 2025-12-09T16:53:25 | ### Impact There is an unauthenticated remote code execution vulnerability in R |
| CVE-2025-1910 | None | 0.02% | 1 | 1 | 2025-12-05T00:31:05 | The WatchGuard Mobile VPN with SSL Client on Windows allows a locally authentic | |
| CVE-2025-64127 | 10.0 | 5.60% | 1 | 0 | 2025-12-01T15:39:53.100000 | An OS command injection vulnerability exists due to insufficient sanitization o | |
| CVE-2025-64129 | 7.6 | 0.17% | 1 | 0 | 2025-12-01T15:39:53.100000 | Zenitel TCIV-3+ is vulnerable to an out-of-bounds write vulnerability, which co | |
| CVE-2025-64128 | 10.0 | 5.60% | 1 | 0 | 2025-12-01T15:39:53.100000 | An OS command injection vulnerability exists due to incomplete validation of us | |
| CVE-2025-64130 | 9.8 | 0.15% | 1 | 0 | 2025-11-26T18:31:15 | Zenitel TCIV-3+ is vulnerable to a reflected cross-site scripting vulnerability | |
| CVE-2025-64126 | 10.0 | 5.60% | 1 | 0 | 2025-11-26T18:31:15 | An OS command injection vulnerability exists due to improper input validation. | |
| CVE-2025-40300 | None | 0.08% | 1 | 0 | 2025-11-17T18:30:25 | In the Linux kernel, the following vulnerability has been resolved: x86/vmscape | |
| CVE-2025-12818 | 5.9 | 0.06% | 1 | 0 | 2025-11-13T15:30:37 | Integer wraparound in multiple PostgreSQL libpq client library functions allows | |
| CVE-2025-8677 | 7.5 | 0.07% | 2 | 0 | 2025-11-05T00:32:35 | Querying for records within a specially crafted zone containing certain malforme | |
| CVE-2025-40778 | 8.6 | 0.01% | 2 | 1 | 2025-11-05T00:32:31 | Under certain circumstances, BIND is too lenient when accepting records from ans | |
| CVE-2025-4802 | 9.8 | 0.01% | 1 | 1 | 2025-11-03T21:34:58 | Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Librar | |
| CVE-2025-30722 | 5.3 | 0.11% | 1 | 0 | 2025-11-03T21:34:39 | Vulnerability in the MySQL Client product of Oracle MySQL (component: Client: my | |
| CVE-2025-30693 | 5.5 | 0.09% | 1 | 0 | 2025-11-03T21:33:34 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). | |
| CVE-2025-21490 | 4.9 | 0.44% | 1 | 0 | 2025-11-03T21:18:55.383000 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). | |
| CVE-2025-6430 | 6.1 | 0.05% | 1 | 0 | 2025-11-03T20:19:19.233000 | When a file download is specified via the `Content-Disposition` header, that dir | |
| CVE-2024-43451 | 6.5 | 89.93% | 2 | 1 | 2025-10-28T14:15:30.907000 | NTLM Hash Disclosure Spoofing Vulnerability | |
| CVE-2021-44228 | 10.0 | 94.36% | 1 | 100 | template | 2025-10-27T17:40:33.680000 | Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12 |
| CVE-2025-22224 | 9.4 | 51.47% | 1 | 0 | 2025-10-22T00:34:17 | VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulner | |
| CVE-2025-22226 | 7.1 | 3.96% | 1 | 0 | 2025-10-22T00:33:13 | VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerabi | |
| CVE-2025-22225 | 8.3 | 7.05% | 1 | 0 | 2025-10-22T00:33:13 | VMware ESXi contains an arbitrary write vulnerability. A malicious actor with pr | |
| CVE-2025-11573 | None | 0.06% | 1 | 0 | 2025-10-09T22:15:58 | ### Summary Amazon.IonDotnet is a library for the Dotnet language that is used t | |
| CVE-2025-11155 | 0 | 0.02% | 1 | 0 | 2025-09-29T19:34:10.030000 | The credentials required to access the device's web server are sent in base64 wi | |
| CVE-2025-59817 | 8.4 | 0.04% | 1 | 0 | 2025-09-26T14:32:19.853000 | This vulnerability allows attackers to execute arbitrary commands on the underly | |
| CVE-2025-59815 | 9.1 | 0.06% | 1 | 0 | 2025-09-25T21:30:37 | This vulnerability allows malicious actors to execute arbitrary commands on the | |
| CVE-2025-59814 | 9.8 | 0.08% | 1 | 0 | 2025-09-25T21:30:36 | This vulnerability allows malicious actors to gain unauthorized access to the Ze | |
| CVE-2025-59816 | 8.1 | 0.10% | 1 | 0 | 2025-09-25T21:30:36 | This vulnerability allows attackers to directly query the underlying database, p | |
| CVE-2025-53136 | 5.5 | 0.05% | 2 | 1 | 2025-08-19T14:13:07.783000 | Exposure of sensitive information to an unauthorized actor in Windows NT OS Kern | |
| CVE-2025-50173 | 7.8 | 0.12% | 1 | 0 | 2025-08-12T18:31:39 | Weak authentication in Windows Installer allows an authorized attacker to elevat | |
| CVE-2025-8286 | 9.8 | 0.58% | 2 | 0 | template | 2025-07-31T21:32:03 | Güralp FMUS series seismic monitoring devices expose an unauthenticated Telnet-b |
| CVE-2025-6842 | 4.7 | 0.03% | 1 | 2 | 2025-07-01T14:47:11.290000 | A vulnerability was found in code-projects Product Inventory System 1.0 and clas | |
| CVE-2023-30848 | 8.8 | 0.08% | 2 | 0 | 2024-11-21T08:00:57.933000 | Pimcore is an open source data and experience management platform. Prior to vers | |
| CVE-2022-23128 | 9.8 | 3.77% | 1 | 0 | 2024-11-21T06:48:03.407000 | Incomplete List of Disallowed Inputs vulnerability in Mitsubishi Electric MC Wor | |
| CVE-2022-25845 | 8.1 | 89.92% | 1 | 6 | 2024-05-15T06:28:36 | The package com.alibaba:fastjson before 1.2.83 is vulnerable to Deserialization | |
| CVE-2023-38408 | 9.8 | 68.75% | 2 | 8 | 2024-04-19T05:07:56 | The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently t | |
| CVE-2023-31096 | 7.8 | 0.02% | 1 | 0 | 2024-04-04T08:33:05 | An issue was discovered in Broadcom) LSI PCI-SV92EX Soft Modem Kernel Driver thr | |
| CVE-2024-2537 | 4.4 | 0.06% | 1 | 1 | 2024-03-15T18:30:45 | Improper Control of Dynamically-Managed Code Resources vulnerability in Logitech | |
| CVE-2017-18349 | 9.8 | 92.08% | 1 | 1 | template | 2023-09-26T14:52:01 | parseObject in Fastjson before 1.2.25, as used in FastjsonEngine in Pippo 1.11.0 |
| CVE-2020-8554 | 5.0 | 24.78% | 2 | 5 | 2023-01-29T05:06:36 | Kubernetes API server in all versions allow an attacker who is able to create a | |
| CVE-2026-23477 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-66478 | 0 | 0.00% | 1 | 100 | N/A | ||
| CVE-2025-11616 | 0 | 0.06% | 1 | 0 | N/A | ||
| CVE-2026-22852 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-22856 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-22855 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-22853 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-22858 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-0227 | 0 | 0.00% | 6 | 0 | N/A | ||
| CVE-2026-22261 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-22259 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-22263 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-22264 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-22260 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-22262 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-22258 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2025-49844 | 0 | 6.88% | 2 | 18 | template | N/A | |
| CVE-2025-62507 | 0 | 0.10% | 1 | 1 | N/A | ||
| CVE-2026-22794 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-22861 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2026-22245 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2025-61675 | 0 | 0.04% | 1 | 5 | N/A | ||
| CVE-2025-5017 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2026-22023 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2026-21900 | 0 | 0.05% | 1 | 0 | N/A | ||
| CVE-2026-22024 | 0 | 0.05% | 1 | 0 | N/A | ||
| CVE-2026-22025 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2026-21897 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2026-22026 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2026-21876 | 0 | 0.04% | 4 | 1 | N/A | ||
| CVE-2025-59818 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-59819 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-63261 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2026-21881 | 0 | 0.09% | 1 | 0 | N/A | ||
| CVE-2025-69139 | 0 | 0.00% | 1 | 0 | N/A |
updated 2026-01-14T23:15:55.803000
1 posts
🟠 CVE-2025-13455 - High (7.8)
A vulnerability was reported in ThinkPlus configuration software that could allow a local authenticated user to bypass ThinkPlus device authentication and enroll an untrusted fingerprint.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-13455/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-14T23:15:54.180000
1 posts
🟠 CVE-2025-12166 - High (7.5)
The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to blind SQL Injection via the `order` and `append_where_sql` parameters in all versions up to, and including, 1.6.9.9 due to insuf...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-12166/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-14T22:15:53.233000
1 posts
🟠 CVE-2026-0861 - High (8.4)
Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc, valloc, pvalloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap cor...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0861/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-14T21:35:12
1 posts
🟠 CVE-2025-70747 - High (7.5)
Tenda AX-1806 v1.0.0.1 was discovered to contain a stack overflow in the serviceName parameter of the sub_65A28 function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70747/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-14T21:35:12
1 posts
🟠 CVE-2025-65397 - High (8.4)
An insecure authentication mechanism in the safe_exec.sh startup script of Blurams Flare Camera version 24.1114.151.929 and earlier allows an attacker with physical access to the device to execute arbitrary commands with root privileges, if file /...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65397/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-14T21:35:08
2 posts
There is a critical security vulnerability in zlib that allows code smuggling. Currently, there does not appear to be an update available.
• https://seclists.org/fulldisclosure/2026/Jan/3
• https://nvd.nist.gov/vuln/detail/CVE-2026-22184
#Security #zlib #Vulnerability
sev:CRIT BoF in zlib.
##zlib versions up to and including 1.3.1.2 contain a global buffer overflow in the untgz utility. The TGZfname() function copies an attacker-supplied archive name from argv[] into a fixed-size 1024-byte static global buffer using an unbounded strcpy() call without length validation. Supplying an archive name longer than 1024 bytes results in an out-of-bounds write that can lead to memory corruption, denial of service, and potentially code execution depending on compiler, build flags, architecture, and memory layout. The overflow occurs prior to any archive parsing or validation.
updated 2026-01-14T21:34:16
1 posts
🟠 CVE-2025-11224 - High (7.7)
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 15.10 before 18.3.6, 18.4 before 18.4.4, and 18.5 before 18.5.2 that could have allowed an authenticated user to execute stored cross-site scripting through improper input ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-11224/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-14T21:34:16
1 posts
🟠 CVE-2025-33206 - High (7.8)
NVIDIA NSIGHT Graphics for Linux contains a vulnerability where an attacker could cause command injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, and denial of service.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33206/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-14T21:34:06
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##updated 2026-01-14T21:15:54.193000
1 posts
🔴 CVE-2026-23550 - Critical (10)
Incorrect Privilege Assignment vulnerability in Modular DS allows Privilege Escalation.This issue affects Modular DS: from n/a through 2.5.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23550/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-14T21:15:54.013000
1 posts
🟠 CVE-2026-23512 - High (8.6)
SumatraPDF is a multi-format reader for Windows. In 3.5.2 and earlier, there is a Untrusted Search Path vulnerability when Advanced Options setting is trigger. The application executes notepad.exe without specifying an absolute path when using the...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23512/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-14T21:15:44
1 posts
🟠 CVE-2026-23492 - High (8.8)
Pimcore is an Open Source Data & Experience Management Platform. Prior to 12.3.1 and 11.5.14, an incomplete SQL injection patch in the Admin Search Find API allows an authenticated attacker to perform blind SQL injection. Although CVE-2023-30848 a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23492/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-14T20:59:08.753000
3 posts
CVEs are now published for this.
https://www.cve.org/CVERecord?id=CVE-2025-55125
https://www.cve.org/CVERecord?id=CVE-2025-59468
##Veeam Patches Critical Remote Code Execution Flaw in Backup & Replication v13
Veeam patched multiple vulnerabilities in Backup & Replication version 13, including a critical RCE flaw (CVE-2025-59470) that allows privileged operators to execute commands as the database user. These flaws are high-value targets for ransomware groups seeking to disable recovery options during attacks.
**If you are using Veeam Backup & Replication version 13, make sure all backup systems are isolated from the internet and accessible from trusted networks only. Limit the number of users with Backup or Tape Operator roles and update to version 13.0.1.1071 as soon as possible.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/veeam-patches-critical-remote-code-execution-flaw-in-backup-replication-v13-f-f-r-b-m/gD2P6Ple2L
🚨 Multiple Veeam CVEs Identified: Critical Flaws Allow RCE and High-Privilege Actions
CVE-2025-55125:
A flaw that allows a Backup or Tape Operator to achieve remote code execution (RCE) as root by crafting a malicious backup configuration file.
▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing
CVE-2025-59468:
A vulnerability enabling a Backup Administrator to execute remote code as the postgres user by supplying a malicious password parameter.
▪️Severity: Medium
▪️CVSS v3.1: 6.7
▪️Source: Discovered during internal testing
CVE-2025-59469
A security issue that allows a Backup or Tape Operator to write arbitrary files with root privileges.
▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing
CVE-2025-59470
A vulnerability that permits a Backup or Tape Operator to achieve remote code execution (RCE) as the postgres user by sending a malicious interval or order parameter.
▪️CVSS Severity: Critical
▪️CVSS v3.1: 9.0
▪️Source: Discovered during internal testing
Veeam: https://www.veeam.com/kb4738
Blog format: https://darkwebinformer.com/multiple-veeam-cves-identified-critical-flaws-allow-rce-and-high-privilege-actions/
updated 2026-01-14T20:49:33.830000
1 posts
🟠 CVE-2026-21272 - High (8.6)
Dreamweaver Desktop versions 21.6 and earlier are affected by an Improper Input Validation vulnerability that could lead to arbitrary file system write. An attacker could leverage this vulnerability to manipulate or inject malicious data into file...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21272/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-14T20:23:43.417000
2 posts
Microsoft Flickentag 2026-01
Zum Beginn des Jahres bringt Microsoft (MS) Flicken für 113 Sicherheitslücken - eine ganze Menge. Von denen wird eine (CVE-2026-20805) bereits für Angriffe ausgenutzt (Zero-Day); eine andere (CVE-2026-21265) war schon lange bekannt, aber wird (noch) nicht für Angriffe genutzt. Von den jetzt geflickten Sicherheitslücken stuft MS 8 als kritisch ein, 5 von denen stecken in Komponenten von MS-Office. Die bereits ausgenutzte CVE-2026-20805 stuft MS nur als wichtig (nicht als kritisch) ein, das verstehe wer will. Die CISA hat diese Lücke in den KEV (Known Exploited Vulnerabilities) Katalog aufgenommen und eine Order erlassen, nach der Behörden
https://www.pc-fluesterer.info/wordpress/2026/01/14/microsoft-flickentag-2026-01/
#Warnung #0day #exploits #Microsoft #office #sicherheit #UnplugTrump #windows #zahlen #zeroday
##The publicly disclosed ones are expiring Secure Boot cert:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21265
and an old one that was published in 2023 but is apparently now applicable to all Windows systems with the Agere Soft Modem installed, even if it isn't in use.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-31096
##updated 2026-01-14T20:16:14.003000
1 posts
🟠 CVE-2025-71021 - High (7.5)
Tenda AX-1806 v1.0.0.1 was discovered to contain a stack overflow in the serverName parameter of the sub_65A28 function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-71021/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-14T19:28:33.957000
1 posts
🟠 CVE-2026-21281 - High (7.8)
InCopy versions 21.0, 19.5.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a vi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21281/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-14T19:16:41.860000
1 posts
🟠 CVE-2025-37168 - High (8.2)
Arbitrary file deletion vulnerability have been identified in a system function of mobility conductors running AOS-8 operating system. Successful exploitation of this vulnerability could allow an unauthenticated remote malicious actor to delete ar...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-37168/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-14T18:32:34
1 posts
🔴 CVE-2025-14502 - Critical (9.8)
The News and Blog Designer Bundle plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.1 via the template parameter. This makes it possible for unauthenticated attackers to include and execute arbitrar...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-14502/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-14T18:31:43
1 posts
🔴 CVE-2025-70968 - Critical (9.8)
FreeImage 3.18.0 contains a Use After Free in PluginTARGA.cpp;loadRLE().
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70968/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-14T18:31:43
2 posts
1 repos
I'm not concerned about this as a security concern, but I know people around here like their AQI monitors so this might be handy for folks trying to hack theirs for other functionality.
##I'm not concerned about this as a security concern, but I know people around here like their AQI monitors so this might be handy for folks trying to hack theirs for other functionality.
##updated 2026-01-14T18:16:43.657000
2 posts
FreeRDP
https://www.cve.org/CVERecord?id=CVE-2026-22851
https://www.cve.org/CVERecord?id=CVE-2026-22852
https://www.cve.org/CVERecord?id=CVE-2026-22853
https://www.cve.org/CVERecord?id=CVE-2026-22854
https://www.cve.org/CVERecord?id=CVE-2026-22855
https://www.cve.org/CVERecord?id=CVE-2026-22856
https://www.cve.org/CVERecord?id=CVE-2026-22857
https://www.cve.org/CVERecord?id=CVE-2026-22858
https://www.cve.org/CVERecord?id=CVE-2026-22859
Edit to add more.
##FreeRDP
https://www.cve.org/CVERecord?id=CVE-2026-22851
https://www.cve.org/CVERecord?id=CVE-2026-22852
https://www.cve.org/CVERecord?id=CVE-2026-22853
https://www.cve.org/CVERecord?id=CVE-2026-22854
https://www.cve.org/CVERecord?id=CVE-2026-22855
https://www.cve.org/CVERecord?id=CVE-2026-22856
https://www.cve.org/CVERecord?id=CVE-2026-22857
https://www.cve.org/CVERecord?id=CVE-2026-22858
https://www.cve.org/CVERecord?id=CVE-2026-22859
Edit to add more.
##updated 2026-01-14T18:16:43.373000
2 posts
FreeRDP
https://www.cve.org/CVERecord?id=CVE-2026-22851
https://www.cve.org/CVERecord?id=CVE-2026-22852
https://www.cve.org/CVERecord?id=CVE-2026-22853
https://www.cve.org/CVERecord?id=CVE-2026-22854
https://www.cve.org/CVERecord?id=CVE-2026-22855
https://www.cve.org/CVERecord?id=CVE-2026-22856
https://www.cve.org/CVERecord?id=CVE-2026-22857
https://www.cve.org/CVERecord?id=CVE-2026-22858
https://www.cve.org/CVERecord?id=CVE-2026-22859
Edit to add more.
##FreeRDP
https://www.cve.org/CVERecord?id=CVE-2026-22851
https://www.cve.org/CVERecord?id=CVE-2026-22852
https://www.cve.org/CVERecord?id=CVE-2026-22853
https://www.cve.org/CVERecord?id=CVE-2026-22854
https://www.cve.org/CVERecord?id=CVE-2026-22855
https://www.cve.org/CVERecord?id=CVE-2026-22856
https://www.cve.org/CVERecord?id=CVE-2026-22857
https://www.cve.org/CVERecord?id=CVE-2026-22858
https://www.cve.org/CVERecord?id=CVE-2026-22859
Edit to add more.
##updated 2026-01-14T18:16:42.933000
2 posts
FreeRDP
https://www.cve.org/CVERecord?id=CVE-2026-22851
https://www.cve.org/CVERecord?id=CVE-2026-22852
https://www.cve.org/CVERecord?id=CVE-2026-22853
https://www.cve.org/CVERecord?id=CVE-2026-22854
https://www.cve.org/CVERecord?id=CVE-2026-22855
https://www.cve.org/CVERecord?id=CVE-2026-22856
https://www.cve.org/CVERecord?id=CVE-2026-22857
https://www.cve.org/CVERecord?id=CVE-2026-22858
https://www.cve.org/CVERecord?id=CVE-2026-22859
Edit to add more.
##FreeRDP
https://www.cve.org/CVERecord?id=CVE-2026-22851
https://www.cve.org/CVERecord?id=CVE-2026-22852
https://www.cve.org/CVERecord?id=CVE-2026-22853
https://www.cve.org/CVERecord?id=CVE-2026-22854
https://www.cve.org/CVERecord?id=CVE-2026-22855
https://www.cve.org/CVERecord?id=CVE-2026-22856
https://www.cve.org/CVERecord?id=CVE-2026-22857
https://www.cve.org/CVERecord?id=CVE-2026-22858
https://www.cve.org/CVERecord?id=CVE-2026-22859
Edit to add more.
##updated 2026-01-14T18:16:42.490000
2 posts
FreeRDP
https://www.cve.org/CVERecord?id=CVE-2026-22851
https://www.cve.org/CVERecord?id=CVE-2026-22852
https://www.cve.org/CVERecord?id=CVE-2026-22853
https://www.cve.org/CVERecord?id=CVE-2026-22854
https://www.cve.org/CVERecord?id=CVE-2026-22855
https://www.cve.org/CVERecord?id=CVE-2026-22856
https://www.cve.org/CVERecord?id=CVE-2026-22857
https://www.cve.org/CVERecord?id=CVE-2026-22858
https://www.cve.org/CVERecord?id=CVE-2026-22859
Edit to add more.
##FreeRDP
https://www.cve.org/CVERecord?id=CVE-2026-22851
https://www.cve.org/CVERecord?id=CVE-2026-22852
https://www.cve.org/CVERecord?id=CVE-2026-22853
https://www.cve.org/CVERecord?id=CVE-2026-22854
https://www.cve.org/CVERecord?id=CVE-2026-22855
https://www.cve.org/CVERecord?id=CVE-2026-22856
https://www.cve.org/CVERecord?id=CVE-2026-22857
https://www.cve.org/CVERecord?id=CVE-2026-22858
https://www.cve.org/CVERecord?id=CVE-2026-22859
Edit to add more.
##updated 2026-01-14T17:48:29.730000
1 posts
🚨 EUVD-2026-1753
📊 Score: 6.9/10 (CVSS v3.1)
📦 Product: IP7137
🏢 Vendor: Vivotek
📅 Published: 2026-01-09 | Updated: 2026-01-14
📝 Vivotek IP7137 camera with firmware version 0200a is vulnerable to path traversal. It is possible for an authenticated attacker to access resources beyond webroot directory using a direct HTTP request. Due to CVE-2025-66050, a password f...
##updated 2026-01-14T17:48:18.313000
1 posts
updated 2026-01-14T16:26:00.933000
1 posts
Netgear
https://www.cve.org/CVERecord?id=CVE-2026-0403
https://www.cve.org/CVERecord?id=CVE-2026-0404
https://www.cve.org/CVERecord?id=CVE-2026-0405
https://www.cve.org/CVERecord?id=CVE-2026-0406
https://www.cve.org/CVERecord?id=CVE-2026-0407
##updated 2026-01-14T16:26:00.933000
1 posts
One more Tenda for old time's sake.
https://www.cve.org/CVERecord?id=CVE-2025-71023
https://www.cve.org/CVERecord?id=CVE-2025-71024
https://www.cve.org/CVERecord?id=CVE-2025-71025
https://www.cve.org/CVERecord?id=CVE-2025-71026
##updated 2026-01-14T16:26:00.933000
1 posts
updated 2026-01-14T16:25:40.430000
1 posts
I don't know this project ( Jervis ) but the fact that there are five crypto-related vulns at once seems like a legitimate opportunity for people to learn from someone else's mistakes. I don't understand many crypto vulns so they always fascinate me.
https://www.cve.org/CVERecord?id=CVE-2025-68701
https://www.cve.org/CVERecord?id=CVE-2025-68702
https://www.cve.org/CVERecord?id=CVE-2025-68703
##updated 2026-01-14T16:25:40.430000
1 posts
Three of the sev:CRIT RCEs list the Preview Pane as an attack vector.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20952
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20953
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20944
##updated 2026-01-14T16:25:40.430000
1 posts
updated 2026-01-14T16:25:40.430000
1 posts
Netgear
https://www.cve.org/CVERecord?id=CVE-2026-0403
https://www.cve.org/CVERecord?id=CVE-2026-0404
https://www.cve.org/CVERecord?id=CVE-2026-0405
https://www.cve.org/CVERecord?id=CVE-2026-0406
https://www.cve.org/CVERecord?id=CVE-2026-0407
##updated 2026-01-14T16:25:40.430000
1 posts
Netgear
https://www.cve.org/CVERecord?id=CVE-2026-0403
https://www.cve.org/CVERecord?id=CVE-2026-0404
https://www.cve.org/CVERecord?id=CVE-2026-0405
https://www.cve.org/CVERecord?id=CVE-2026-0406
https://www.cve.org/CVERecord?id=CVE-2026-0407
##updated 2026-01-14T16:25:12.057000
1 posts
🟠 CVE-2025-9142 - High (7.5)
A local user can trigger Harmony SASE Windows client to write or delete files outside the intended certificate working directory.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-9142/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-14T16:25:12.057000
2 posts
Haven't seen a cypher injection for a while. This one is in Apache Camel-Neo4j.
##Haven't seen a cypher injection for a while. This one is in Apache Camel-Neo4j.
##updated 2026-01-14T16:25:12.057000
1 posts
🔴 CVE-2025-14301 - Critical (9.8)
The Integration Opvius AI for WooCommerce plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.3.0. This is due to the `process_table_bulk_actions()` function processing user-supplied file paths without auth...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-14301/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-14T16:25:12.057000
1 posts
🔴 CVE-2026-22686 - Critical (10)
Enclave is a secure JavaScript sandbox designed for safe AI agent code execution. Prior to 2.7.0, there is a critical sandbox escape vulnerability in enclave-vm that allows untrusted, sandboxed JavaScript code to execute arbitrary code in the host...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22686/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-14T16:25:12.057000
1 posts
🟠 CVE-2025-12052 - High (7.8)
The drivers in the tool packages use RTL_QUERY_REGISTRY_DIRECT flag to read a registry value to which an untrusted user-mode application may be able to cause a buffer overflow.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-12052/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-14T16:25:12.057000
1 posts
🟠 CVE-2025-68956 - High (8)
Multi-thread race condition vulnerability in the card framework module.
Impact: Successful exploitation of this vulnerability may affect availability.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-68956/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-14T16:25:12.057000
1 posts
🟠 CVE-2025-68957 - High (8.4)
Multi-thread race condition vulnerability in the card framework module.
Impact: Successful exploitation of this vulnerability may affect availability.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-68957/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-14T16:25:12.057000
1 posts
🟠 CVE-2025-68960 - High (8.4)
Multi-thread race condition vulnerability in the video framework module.
Impact: Successful exploitation of this vulnerability may affect availability.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-68960/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-14T16:25:12.057000
1 posts
InputPlumber: Lack of D-Bus Authorization and Input Verification allows UI Input Injection and Denial-of-Service (CVE-2025-66005, CVE-2025-14338)
https://security.opensuse.org/2026/01/09/inputplumber-lack-of-dbus-auth.html
##updated 2026-01-14T16:25:12.057000
1 posts
TLP: Polkit Authentication Bypass in Profiles Daemon in Version 1.9.0 (CVE-2025-67859)
https://security.opensuse.org/2026/01/07/tlp-polkit-authentication-bypass.html
##updated 2026-01-14T13:44:31.180000
11 posts
1 repos
Microsoft patched an actively exploited Windows DWM flaw (CVE-2026-20805) in January Patch Tuesday.
CISA added it to the KEV list within hours, warning of real-world attacks.
Patch now. Medium severity, high impact when chained.
📰 Microsoft's January 2026 Patch Tuesday Fixes 114 Flaws, Including One Exploited Zero-Day
Microsoft's January 2026 Patch Tuesday is massive, fixing 114 vulnerabilities! 💻 The update includes 8 critical RCE flaws and one actively exploited zero-day (CVE-2026-20805). Prioritize patching now! #PatchTuesday #Microsoft #Cybersecurity
##📰 CISA Mandates Patch for Exploited Windows Zero-Day Used in Attack Chains
🚨 CISA adds actively exploited Windows zero-day CVE-2026-20805 to its KEV catalog! The info-disclosure flaw in Desktop Window Manager is used to bypass ASLR in attack chains. Federal agencies must patch by Feb 3. ⚠️ #Windows #ZeroDay #Infosec
##Here's a summary of the most important world, technology, and cybersecurity news from the last 24-48 hours:
World: A train crash in Thailand killed at least 22 people (Jan 14). US President Trump warned Iran amid protests and reaffirmed his desire to acquire Greenland (Jan 14).
Technology: Big Tech companies are heavily investing in energy infrastructure to power their AI ambitions amidst growing backlash over resource usage (Jan 14). Apple's status as a tech visionary is being questioned amidst the rapid AI advancements (Jan 14).
Cybersecurity: CISA and Microsoft patched an actively exploited Windows information disclosure vulnerability (CVE-2026-20805) (Jan 13-14). The World Economic Forum's 2026 outlook highlights enterprise security facing a "three-front war" from cybercrime, AI misuse, and supply chain attacks (Jan 13).
##Microsoft Flickentag 2026-01
Zum Beginn des Jahres bringt Microsoft (MS) Flicken für 113 Sicherheitslücken - eine ganze Menge. Von denen wird eine (CVE-2026-20805) bereits für Angriffe ausgenutzt (Zero-Day); eine andere (CVE-2026-21265) war schon lange bekannt, aber wird (noch) nicht für Angriffe genutzt. Von den jetzt geflickten Sicherheitslücken stuft MS 8 als kritisch ein, 5 von denen stecken in Komponenten von MS-Office. Die bereits ausgenutzte CVE-2026-20805 stuft MS nur als wichtig (nicht als kritisch) ein, das verstehe wer will. Die CISA hat diese Lücke in den KEV (Known Exploited Vulnerabilities) Katalog aufgenommen und eine Order erlassen, nach der Behörden
https://www.pc-fluesterer.info/wordpress/2026/01/14/microsoft-flickentag-2026-01/
#Warnung #0day #exploits #Microsoft #office #sicherheit #UnplugTrump #windows #zahlen #zeroday
##Microsoft Windows Vulnerability CVE-2026-20805 Added to US CISA Exploited Vulnerabilities Catalog + Video
Introduction: The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has officially added a critical Microsoft Windows vulnerability, CVE-2026-20805, to its Known Exploited Vulnerabilities (KEV) catalog, signaling a growing risk for both federal and private networks. As Microsoft’s January 2026 Patch Tuesday addresses over 110 vulnerabilities across…
##‼️ CVE-2026-20805: Microsoft Windows Information Disclosure Vulnerability has been added to the CISA KEV Catalog
https://darkwebinformer.com/cisa-kev-catalog/
0-day: Yes
CVSS: 5.5
This vulnerability was patched during January 13th, 2026 Patch Tuesday.
##Here's a summary of the most important world, technology, and cybersecurity news from the last 24-48 hours:
World: A train crash in Thailand killed at least 22 people (Jan 14). US President Trump warned Iran amid protests and reaffirmed his desire to acquire Greenland (Jan 14).
Technology: Big Tech companies are heavily investing in energy infrastructure to power their AI ambitions amidst growing backlash over resource usage (Jan 14). Apple's status as a tech visionary is being questioned amidst the rapid AI advancements (Jan 14).
Cybersecurity: CISA and Microsoft patched an actively exploited Windows information disclosure vulnerability (CVE-2026-20805) (Jan 13-14). The World Economic Forum's 2026 outlook highlights enterprise security facing a "three-front war" from cybercrime, AI misuse, and supply chain attacks (Jan 13).
##‼️ CVE-2026-20805: Microsoft Windows Information Disclosure Vulnerability has been added to the CISA KEV Catalog
https://darkwebinformer.com/cisa-kev-catalog/
0-day: Yes
CVSS: 5.5
This vulnerability was patched during January 13th, 2026 Patch Tuesday.
##CVE ID: CVE-2026-20805
Vendor: Microsoft
Product: Windows
Date Added: 2026-01-13
Notes: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-20805 ; https://nvd.nist.gov/vuln/detail/CVE-2026-20805
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-20805
The EITW one is in the Desktop Window Manager.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20805
##updated 2026-01-14T12:31:48
1 posts
🟠 CVE-2026-0532 - High (8.6)
External Control of File Name or Path (CWE-73) combined with Server-Side Request Forgery (CWE-918) can allow an attacker to cause arbitrary file disclosure through a specially crafted credentials JSON payload in the Google Gemini connector configu...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0532/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-14T12:31:39
1 posts
InputPlumber: Lack of D-Bus Authorization and Input Verification allows UI Input Injection and Denial-of-Service (CVE-2025-66005, CVE-2025-14338)
https://security.opensuse.org/2026/01/09/inputplumber-lack-of-dbus-auth.html
##updated 2026-01-14T09:31:20
1 posts
🟠 CVE-2025-14770 - High (7.5)
The Shipping Rate By Cities plugin for WordPress is vulnerable to SQL Injection via the 'city' parameter in all versions up to, and including, 2.0.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-14770/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-14T03:30:32
1 posts
🟠 CVE-2025-12053 - High (7.8)
The drivers in the tool packages use RTL_QUERY_REGISTRY_DIRECT flag to read a registry value to which an untrusted user-mode application may be able to cause a buffer overflow.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-12053/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-14T03:30:32
1 posts
🟠 CVE-2025-68958 - High (8)
Multi-thread race condition vulnerability in the card framework module.
Impact: Successful exploitation of this vulnerability may affect availability.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-68958/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-14T03:30:32
1 posts
🟠 CVE-2025-68968 - High (7.8)
Double free vulnerability in the multi-mode input module.
Impact: Successful exploitation of this vulnerability may affect the input function.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-68968/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-14T03:30:31
1 posts
🟠 CVE-2025-12050 - High (7.8)
The drivers in the tool packages use RTL_QUERY_REGISTRY_DIRECT flag to read a registry value to which an untrusted user-mode application may be able to cause a buffer overflow.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-12050/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-14T03:30:31
1 posts
🟠 CVE-2025-12051 - High (7.8)
The drivers in the tool packages use RTL_QUERY_REGISTRY_DIRECT flag to read a registry value to which an untrusted user-mode application may be able to cause a buffer overflow.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-12051/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-14T03:30:31
1 posts
🟠 CVE-2025-68955 - High (8)
Multi-thread race condition vulnerability in the card framework module.
Impact: Successful exploitation of this vulnerability may affect availability.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-68955/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-14T00:31:25
1 posts
1 repos
https://github.com/m4sh-wacker/CVE-2025-60188-Atarim-Plugin-Exploit
❗️CVE-2025-60188: Atarim Plugin PoC Exploit
GitHub: https://github.com/m4sh-wacker/CVE-2025-60188-Atarim-Plugin-Exploit
##updated 2026-01-13T22:24:20.380000
9 posts
37 repos
https://github.com/JemHadar/MongoBleed-DFIR-Triage-Script-CVE-2025-14847
https://github.com/ElJoamy/MongoBleed-exploit
https://github.com/pedrocruz2202/mongobleed-scanner
https://github.com/AmadoBatista/mongobleed
https://github.com/FurkanKAYAPINAR/CVE-2025-14847-MongoBleed-Exploit
https://github.com/Systemhaus-Schulz/MongoBleed-CVE-2025-14847
https://github.com/Rishi-kaul/CVE-2025-14847-MongoBleed
https://github.com/demetriusford/mongobleed
https://github.com/CadGoose/MongoBleed-CVE-2025-14847-Fully-Automated-scanner
https://github.com/nma-io/mongobleed
https://github.com/alexcyberx/CVE-2025-14847_Expolit
https://github.com/cybertechajju/CVE-2025-14847_Expolit
https://github.com/kuyrathdaro/cve-2025-14847
https://github.com/waheeb71/CVE-2025-14847
https://github.com/vfa-tuannt/CVE-2025-14847
https://github.com/saereya/CVE-2025-14847---MongoBleed
https://github.com/Black1hp/mongobleed-scanner
https://github.com/joshuavanderpoll/CVE-2025-14847
https://github.com/keraattin/Mongobleed-Detector-CVE-2025-14847
https://github.com/sakthivel10q/CVE-2025-14847
https://github.com/sakthivel10q/sakthivel10q.github.io
https://github.com/peakcyber-security/CVE-2025-14847
https://github.com/NoNameError/MongoBLEED---CVE-2025-14847-POC-
https://github.com/tunahantekeoglu/MongoDeepDive
https://github.com/sahar042/CVE-2025-14847
https://github.com/j0lt-github/mongobleedburp
https://github.com/lincemorado97/CVE-2025-14847
https://github.com/ProbiusOfficial/CVE-2025-14847
https://github.com/Ashwesker/Ashwesker-CVE-2025-14847
https://github.com/franksec42/mongobleed-exploit-CVE-2025-14847
https://github.com/AdolfBharath/mongobleed
https://github.com/KingHacker353/CVE-2025-14847_Expolit
https://github.com/chinaxploiter/CVE-2025-14847-PoC
https://github.com/onewinner/CVE-2025-14847
https://github.com/pedrocruz2202/pedrocruz2202.github.io
https://github.com/Security-Phoenix-demo/mongobleed-exploit-CVE-2025-14847
https://github.com/14mb1v45h/CYBERDUDEBIVASH-MONGODB-DETECTOR-v2026
SHOCKING MONGODB FLAW EXPOSES 146,000+ DATABASES: “MongoBleed” Sparks Global Data Leak Panic
Introduction A newly discovered critical vulnerability in MongoDB, dubbed “MongoBleed” (CVE-2025-14847), is sending shockwaves across the cybersecurity world. Security researchers warn that this flaw allows unauthenticated remote attackers to siphon sensitive data from exposed MongoDB servers without needing login credentials. With more than 146,000 vulnerable instances…
##Did PANW just take a couple months off? They're just now publishing a threat brief on MongoBleed? Maybe that's why we haven't seen any advisories from them. Can't wait to see what's been sitting EITW in their queues.
https://unit42.paloaltonetworks.com/mongobleed-cve-2025-14847/
##updated 2026-01-13T22:16:07.690000
1 posts
Space Hacking ( NASA Cryptolib ) 🚀
https://www.cve.org/CVERecord?id=CVE-2026-21897
https://www.cve.org/CVERecord?id=CVE-2026-21898
https://www.cve.org/CVERecord?id=CVE-2026-21899
https://www.cve.org/CVERecord?id=CVE-2026-21900
https://www.cve.org/CVERecord?id=CVE-2026-22023
https://www.cve.org/CVERecord?id=CVE-2026-22024
https://www.cve.org/CVERecord?id=CVE-2026-22025
https://www.cve.org/CVERecord?id=CVE-2026-22026
##updated 2026-01-13T22:02:34.320000
1 posts
UTT
https://www.cve.org/CVERecord?id=CVE-2026-0836
https://www.cve.org/CVERecord?id=CVE-2026-0837
https://www.cve.org/CVERecord?id=CVE-2026-0838
https://www.cve.org/CVERecord?id=CVE-2026-0839
https://www.cve.org/CVERecord?id=CVE-2026-0840
https://www.cve.org/CVERecord?id=CVE-2026-0841
Luxul
##updated 2026-01-13T21:57:24.170000
1 posts
UTT
https://www.cve.org/CVERecord?id=CVE-2026-0836
https://www.cve.org/CVERecord?id=CVE-2026-0837
https://www.cve.org/CVERecord?id=CVE-2026-0838
https://www.cve.org/CVERecord?id=CVE-2026-0839
https://www.cve.org/CVERecord?id=CVE-2026-0840
https://www.cve.org/CVERecord?id=CVE-2026-0841
Luxul
##updated 2026-01-13T21:55:32.140000
1 posts
UTT
https://www.cve.org/CVERecord?id=CVE-2026-0836
https://www.cve.org/CVERecord?id=CVE-2026-0837
https://www.cve.org/CVERecord?id=CVE-2026-0838
https://www.cve.org/CVERecord?id=CVE-2026-0839
https://www.cve.org/CVERecord?id=CVE-2026-0840
https://www.cve.org/CVERecord?id=CVE-2026-0841
Luxul
##updated 2026-01-13T21:41:23
1 posts
I don't know this project ( Jervis ) but the fact that there are five crypto-related vulns at once seems like a legitimate opportunity for people to learn from someone else's mistakes. I don't understand many crypto vulns so they always fascinate me.
https://www.cve.org/CVERecord?id=CVE-2025-68701
https://www.cve.org/CVERecord?id=CVE-2025-68702
https://www.cve.org/CVERecord?id=CVE-2025-68703
##updated 2026-01-13T21:41:13
1 posts
I don't know this project ( Jervis ) but the fact that there are five crypto-related vulns at once seems like a legitimate opportunity for people to learn from someone else's mistakes. I don't understand many crypto vulns so they always fascinate me.
https://www.cve.org/CVERecord?id=CVE-2025-68701
https://www.cve.org/CVERecord?id=CVE-2025-68702
https://www.cve.org/CVERecord?id=CVE-2025-68703
##updated 2026-01-13T21:41:07
1 posts
I don't know this project ( Jervis ) but the fact that there are five crypto-related vulns at once seems like a legitimate opportunity for people to learn from someone else's mistakes. I don't understand many crypto vulns so they always fascinate me.
https://www.cve.org/CVERecord?id=CVE-2025-68701
https://www.cve.org/CVERecord?id=CVE-2025-68702
https://www.cve.org/CVERecord?id=CVE-2025-68703
##updated 2026-01-13T21:40:57
1 posts
I don't know this project ( Jervis ) but the fact that there are five crypto-related vulns at once seems like a legitimate opportunity for people to learn from someone else's mistakes. I don't understand many crypto vulns so they always fascinate me.
https://www.cve.org/CVERecord?id=CVE-2025-68701
https://www.cve.org/CVERecord?id=CVE-2025-68702
https://www.cve.org/CVERecord?id=CVE-2025-68703
##updated 2026-01-13T21:32:48
1 posts
One more Tenda for old time's sake.
https://www.cve.org/CVERecord?id=CVE-2025-71023
https://www.cve.org/CVERecord?id=CVE-2025-71024
https://www.cve.org/CVERecord?id=CVE-2025-71025
https://www.cve.org/CVERecord?id=CVE-2025-71026
##updated 2026-01-13T21:31:53
1 posts
🟠 CVE-2026-21299 - High (7.8)
Substance3D - Modeler versions 1.22.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21299/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-13T21:31:52
1 posts
🟠 CVE-2026-21271 - High (8.6)
Dreamweaver Desktop versions 21.6 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21271/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-13T21:31:52
1 posts
🟠 CVE-2026-21268 - High (8.6)
Dreamweaver Desktop versions 21.6 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21268/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-13T21:31:44
5 posts
2 repos
‼️CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution
Exploit/PoC: https://github.com/horizon3ai/CVE-2025-64155
CVSS: 9.4
Published: Jan 13, 2026
Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-25-772
##🚨 CVE-2025-64155: Critical unauthenticated OS command injection in Fortinet FortiSIEM which may allow an unauthenticated attacker to execute unauthorised code or commands via crafted TCP requests. (CVSS 9.8)
I've created a vulnerability detection script here:
https://github.com/rxerium/rxerium-templates/blob/main/2025/CVE-2025-64155.yaml
Patches are strongly advised. If you are unable to patch it is recommended that you limit access to the phMonitor port (7900) as per Fortinet's advisory:
https://fortiguard.fortinet.com/psirt/FG-IR-25-772
‼️CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution
Exploit/PoC: https://github.com/horizon3ai/CVE-2025-64155
CVSS: 9.4
Published: Jan 13, 2026
Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-25-772
##CVE-2025-64155: 3 Years of Remotely Rooting the Fortinet FortiSIEM https://horizon3.ai/attack-research/disclosures/cve-2025-64155-three-years-of-remotely-rooting-the-fortinet-fortisiem/
##RE: https://infosec.exchange/@cR0w/115888888335126115
Well would you look at that. Write-up now available. Go fuck up some FortiShit.
##updated 2026-01-13T20:36:43
1 posts
OpenCode patches critical RCE flaw in Web UI
OpenCode patched a critical XSS vulnerability (CVE-2026-22813) that allowed malicious websites to execute arbitrary commands on a user's local system by abusing the tool's internal API.
**If you are using OpenCode, update to version 1.1.10 ASAP to disable the vulnerable web UI and API. Avoid clicking untrusted links, check underling URLs and don't click on any links that you haven't crafted but point to your local machine's ports .**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/opencode-patches-critical-rce-flaw-in-web-ui-c-7-g-n-7/gD2P6Ple2L
updated 2026-01-13T18:31:18
1 posts
Three of the sev:CRIT RCEs list the Preview Pane as an attack vector.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20952
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20953
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20944
##updated 2026-01-13T18:31:18
1 posts
Three of the sev:CRIT RCEs list the Preview Pane as an attack vector.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20952
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20953
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20944
##updated 2026-01-13T18:31:14
2 posts
Fortinet Forticlient EMS RCE CVE-2025-59922 and one IMG tag to rule them all https://baldur.dk/blog/fortinet-ems-rce.html
##Fortinet Forticlient EMS RCE CVE-2025-59922 and one IMG tag to rule them all https://baldur.dk/blog/fortinet-ems-rce.html
##updated 2026-01-13T18:31:14
1 posts
updated 2026-01-13T18:31:14
1 posts
Netgear
https://www.cve.org/CVERecord?id=CVE-2026-0403
https://www.cve.org/CVERecord?id=CVE-2026-0404
https://www.cve.org/CVERecord?id=CVE-2026-0405
https://www.cve.org/CVERecord?id=CVE-2026-0406
https://www.cve.org/CVERecord?id=CVE-2026-0407
##updated 2026-01-13T18:31:13
2 posts
Serveur WDS – CVE-2026-0386 : le correctif va impacter les fichiers de réponse https://www.it-connect.fr/serveur-wds-cve-2026-0386-le-correctif-va-impacter-les-fichiers-de-reponse/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #Microsoft #WDS
##Serveur WDS – CVE-2026-0386 : le correctif va impacter les fichiers de réponse https://www.it-connect.fr/serveur-wds-cve-2026-0386-le-correctif-va-impacter-les-fichiers-de-reponse/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #Microsoft #WDS
##updated 2026-01-13T18:31:12
1 posts
updated 2026-01-13T18:31:12
1 posts
One more Tenda for old time's sake.
https://www.cve.org/CVERecord?id=CVE-2025-71023
https://www.cve.org/CVERecord?id=CVE-2025-71024
https://www.cve.org/CVERecord?id=CVE-2025-71025
https://www.cve.org/CVERecord?id=CVE-2025-71026
##updated 2026-01-13T18:31:12
1 posts
One more Tenda for old time's sake.
https://www.cve.org/CVERecord?id=CVE-2025-71023
https://www.cve.org/CVERecord?id=CVE-2025-71024
https://www.cve.org/CVERecord?id=CVE-2025-71025
https://www.cve.org/CVERecord?id=CVE-2025-71026
##updated 2026-01-13T18:31:12
1 posts
One more Tenda for old time's sake.
https://www.cve.org/CVERecord?id=CVE-2025-71023
https://www.cve.org/CVERecord?id=CVE-2025-71024
https://www.cve.org/CVERecord?id=CVE-2025-71025
https://www.cve.org/CVERecord?id=CVE-2025-71026
##updated 2026-01-13T18:31:10
1 posts
Netgear
https://www.cve.org/CVERecord?id=CVE-2026-0403
https://www.cve.org/CVERecord?id=CVE-2026-0404
https://www.cve.org/CVERecord?id=CVE-2026-0405
https://www.cve.org/CVERecord?id=CVE-2026-0406
https://www.cve.org/CVERecord?id=CVE-2026-0407
##updated 2026-01-13T18:31:09
1 posts
Netgear
https://www.cve.org/CVERecord?id=CVE-2026-0403
https://www.cve.org/CVERecord?id=CVE-2026-0404
https://www.cve.org/CVERecord?id=CVE-2026-0405
https://www.cve.org/CVERecord?id=CVE-2026-0406
https://www.cve.org/CVERecord?id=CVE-2026-0407
##updated 2026-01-13T18:31:09
1 posts
updated 2026-01-13T18:31:03
1 posts
updated 2026-01-13T18:16:06.193000
1 posts
updated 2026-01-13T15:50:02.180000
5 posts
6 repos
https://github.com/Ashwesker/Ashwesker-CVE-2025-8110
https://github.com/rxerium/CVE-2025-8110
https://github.com/freiwi/CVE-2025-8110
https://github.com/tovd-go/CVE-2025-8110
Latest global tech and cybersecurity news (Jan 12-13, 2026):
The World Economic Forum's 'Global Cybersecurity Outlook 2026' highlights AI, geopolitics, and cyber-fraud as key shapers of risk, with fraud now surpassing ransomware as a top concern. CISA added a Gogs Path Traversal vulnerability (CVE-2025-8110) to its Known Exploited Vulnerabilities Catalog due to active exploitation. A critical vulnerability (CVE-2026-21858) was found in the n8n workflow automation platform, affecting thousands of systems. In technology, Google removed some medical AI Overviews following "alarming" results.
##❗️CISA has added 1 vulnerability to the KEV Catalog:
CVE-2025-8110: Gogs Path Traversal Vulnerability
##CISA has updated the KEV catalogue:
CVE-2025-8110: Gogs Path Traversal Vulnerability https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=&field_date_added_wrapper=all&sort_by=field_date_added&items_per_page=20 #CISA #infosec
##CVE ID: CVE-2025-8110
Vendor: Gogs
Product: Gogs
Date Added: 2026-01-12
Notes: https://github.com/gogs/gogs/commit/553707f3fd5f68f47f531cfcff56aa3ec294c6f6 ; https://nvd.nist.gov/vuln/detail/CVE-2025-8110
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-8110
Remember that Gogs ../ last month? It's now in the KEV Catalog.
http://wiz.io/blog/wiz-research-gogs-cve-2025-8110-rce-exploit
##updated 2026-01-13T15:37:12
1 posts
updated 2026-01-13T15:15:57.787000
7 posts
ServiceNow patches critical AI Platform flaw enabling user impersonation
ServiceNow patched a critical privilege escalation vulnerability (CVE-2025-12420) in its AI platform that allowed unauthenticated attackers to impersonate users and execute unauthorized actions.
**If yoy are using self hosted ServiceNow, this is very important. Make sure the API is isolated from the internet if possible and accessible from trusted networks only. Then patch. If your ServiceNow must be exposed to the internet, this is urgent. Start patching now.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/servicenow-patches-critical-ai-platform-flaw-enabling-user-impersonation-8-5-w-h-p/gD2P6Ple2L
Here's a digest of the most important news from the last 24 hours:
**World:**
US President Donald Trump ordered 25% tariffs on all countries doing business with Iran (Jan 13). The UN warned of alarming child malnutrition in Gaza, with nearly 95,000 cases in 2025.
**Technology:**
Google is set to integrate product purchases within its Gemini AI platform (Jan 13). Meta is reportedly laying off hundreds of employees in its metaverse division (Jan 13).
**Cybersecurity:**
The World Economic Forum's Global Cybersecurity Outlook 2026 highlights cybercrime, AI misuse, and supply chain risks as major threats. ServiceNow patched a critical AI platform flaw (CVE-2025-12420) on January 13, which could allow unauthenticated user impersonation.
ServiceNow patches critical AI Platform flaw enabling user impersonation
ServiceNow patched a critical privilege escalation vulnerability (CVE-2025-12420) in its AI platform that allowed unauthenticated attackers to impersonate users and execute unauthorized actions.
**If yoy are using self hosted ServiceNow, this is very important. Make sure the API is isolated from the internet if possible and accessible from trusted networks only. Then patch. If your ServiceNow must be exposed to the internet, this is urgent. Start patching now.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/servicenow-patches-critical-ai-platform-flaw-enabling-user-impersonation-8-5-w-h-p/gD2P6Ple2L
Here's a digest of the most important news from the last 24 hours:
**World:**
US President Donald Trump ordered 25% tariffs on all countries doing business with Iran (Jan 13). The UN warned of alarming child malnutrition in Gaza, with nearly 95,000 cases in 2025.
**Technology:**
Google is set to integrate product purchases within its Gemini AI platform (Jan 13). Meta is reportedly laying off hundreds of employees in its metaverse division (Jan 13).
**Cybersecurity:**
The World Economic Forum's Global Cybersecurity Outlook 2026 highlights cybercrime, AI misuse, and supply chain risks as major threats. ServiceNow patched a critical AI platform flaw (CVE-2025-12420) on January 13, which could allow unauthenticated user impersonation.
ServiceNow patches critical AI platform flaw that could allow user impersonation https://cyberscoop.com/servicenow-fixes-critical-ai-vulnerability-cve-2025-12420/
##The vulnerability, tracked as CVE-2025-12420, carries a CVSS score of 9.3 out of 10.0. https://thehackernews.com/2026/01/servicenow-patches-critical-ai-platform.html
##sev:CRIT auth bypass in SNOW.
https://www.cve.org/CVERecord?id=CVE-2025-12420
##A vulnerability has been identified in the ServiceNow AI Platform that could enable an unauthenticated user to impersonate another user and perform the operations that the impersonated user is entitled to perform. ServiceNow has addressed this vulnerability by deploying a relevant security update to hosted instances in October 2025. Security updates have also been provided to ServiceNow self-hosted customers, partners, and hosted customers with unique configurations. Additionally, the vulnerability is addressed in the listed Store App versions. We recommend that customers promptly apply an appropriate security update or upgrade if they have not already done so.
updated 2026-01-13T15:05:00
12 posts
4 repos
https://github.com/eduardorossi84/CVE-2026-21858-POC
https://github.com/cropnet/ni8mare-scanner
Latest global tech and cybersecurity news (Jan 12-13, 2026):
The World Economic Forum's 'Global Cybersecurity Outlook 2026' highlights AI, geopolitics, and cyber-fraud as key shapers of risk, with fraud now surpassing ransomware as a top concern. CISA added a Gogs Path Traversal vulnerability (CVE-2025-8110) to its Known Exploited Vulnerabilities Catalog due to active exploitation. A critical vulnerability (CVE-2026-21858) was found in the n8n workflow automation platform, affecting thousands of systems. In technology, Google removed some medical AI Overviews following "alarming" results.
##Die erste Ausgabe von 60 Sekunden Cyber beschäftigt sich mit dem aktuellen ESA-Hack, der Situation Taiwans, CVE-2026-21858 und dem Schlag gegen Black Axe.
##Tell your friends.
The vulnerability, tracked as CVE-2026-21858 (CVSS score: 10.0), has been codenamed Ni8mare by Cyera Research Labs. Security researcher Dor Attias discovered and reported it on November 9, 2025.
https://thehackernews.com/2026/01/critical-n8n-vulnerability-cvss-100.html
##this was some great and necessary debunking of the ridiculous attempt at a "look how cool we are” CVE assignment.
between this and the "it's actually not a real vuln from an internet-perspective" for the recent daft D-Link CVE assignment, the cyber part of 2026 is off to a really horrible start.
##New.
Picus: Ni8mare: n8n CVE-2026-21858 Remote Code Execution Vulnerability Explained https://www.picussecurity.com/resource/blog/ni8mare-n8n-cve-2026-21858-remote-code-execution-vulnerability-explained #threatresearch #infosec
##Tracked as CVE-2026-21858 (CVSS score 10), the bug enables remote code execution without authentication. https://www.securityweek.com/critical-vulnerability-exposes-n8n-instances-to-takeover-attacks/
##Ni8mare – CVE-2026-21858 : cette faille critique permet de pirater les serveurs n8n https://www.it-connect.fr/ni8mare-cve-2026-21858-faille-critique-n8n/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #n8n
##qui c'est qui se servait de #n8n ici ? on a un petit #CVE à niveau 10 là https://github.com/Chocapikk/CVE-2026-21858 #iagenIsHell
##Critical Ni8mare flaw in n8n allows unauthenticated remote takeover
n8n patched a critical vulnerability (CVE-2026-21858) that allows unauthenticated attackers to steal server files and gain full remote code execution. The flaw exploits a logic error in webhook and file upload handling to bypass authentication and compromise sensitive automation credentials.
**If you are using n8n, this is urgent. If possible, try to isolate all n8n instances from the internet and accessible from trusted networks only. Then update to version 1.121.0 ASAP. If you can't patch, block webhooks and file uploads from any access from untrusted networks and the internet.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-ni8mare-flaw-in-n8n-allows-unauthenticated-remote-takeover-4-x-4-z-8/gD2P6Ple2L
Say hello to #Ni8mare, the first named vulnerability of 2026.
#cve-2026-21858
##RE: https://infosec.exchange/@cR0w/115849435087390469
LMFAO another one. 🥳
https://github.com/n8n-io/n8n/security/advisories/GHSA-v4pr-fm98-w9pg
https://www.cve.org/CVERecord?id=CVE-2026-21858 ( not yet published )
##Ni8mare - Unauthenticated Remote Code Execution in n8n (CVE-2026-21858) https://www.cyera.com/research-labs/ni8mare-unauthenticated-remote-code-execution-in-n8n-cve-2026-21858
##updated 2026-01-13T14:03:46.203000
1 posts
Space Hacking ( NASA Cryptolib ) 🚀
https://www.cve.org/CVERecord?id=CVE-2026-21897
https://www.cve.org/CVERecord?id=CVE-2026-21898
https://www.cve.org/CVERecord?id=CVE-2026-21899
https://www.cve.org/CVERecord?id=CVE-2026-21900
https://www.cve.org/CVERecord?id=CVE-2026-22023
https://www.cve.org/CVERecord?id=CVE-2026-22024
https://www.cve.org/CVERecord?id=CVE-2026-22025
https://www.cve.org/CVERecord?id=CVE-2026-22026
##updated 2026-01-13T14:03:46.203000
1 posts
Space Hacking ( NASA Cryptolib ) 🚀
https://www.cve.org/CVERecord?id=CVE-2026-21897
https://www.cve.org/CVERecord?id=CVE-2026-21898
https://www.cve.org/CVERecord?id=CVE-2026-21899
https://www.cve.org/CVERecord?id=CVE-2026-21900
https://www.cve.org/CVERecord?id=CVE-2026-22023
https://www.cve.org/CVERecord?id=CVE-2026-22024
https://www.cve.org/CVERecord?id=CVE-2026-22025
https://www.cve.org/CVERecord?id=CVE-2026-22026
##updated 2026-01-13T14:03:46.203000
1 posts
Perfect 10 in Fastjson. 🥳
It's funny that it appears to be a challenging enough bug that it bypassed at least two previous fixes.
https://www.cve.org/CVERecord?id=CVE-2025-70974
##Fastjson before 1.2.48 mishandles autoType because, when an @type key is in a JSON document, and the value of that key is the name of a Java class, there may be calls to certain public methods of that class. Depending on the behavior of those methods, there may be JNDI injection with an attacker-supplied payload located elsewhere in that JSON document. This was exploited in the wild in 2023 through 2025. NOTE: this issue exists because of an incomplete fix for CVE-2017-18349. Also, a later bypass is covered by CVE-2022-25845.
updated 2026-01-13T14:03:46.203000
1 posts
updated 2026-01-13T14:03:46.203000
1 posts
updated 2026-01-13T14:03:46.203000
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##updated 2026-01-13T14:03:46.203000
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##updated 2026-01-13T14:03:46.203000
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##updated 2026-01-13T14:03:46.203000
1 posts
1 repos
updated 2026-01-13T14:03:46.203000
1 posts
Hardcoded creds in KAON routers but it doesn't say what those creds are.
##updated 2026-01-13T14:03:46.203000
1 posts
1 repos
updated 2026-01-13T14:03:18.990000
1 posts
updated 2026-01-13T14:03:18.990000
1 posts
Space Hacking ( NASA Cryptolib ) 🚀
https://www.cve.org/CVERecord?id=CVE-2026-21897
https://www.cve.org/CVERecord?id=CVE-2026-21898
https://www.cve.org/CVERecord?id=CVE-2026-21899
https://www.cve.org/CVERecord?id=CVE-2026-21900
https://www.cve.org/CVERecord?id=CVE-2026-22023
https://www.cve.org/CVERecord?id=CVE-2026-22024
https://www.cve.org/CVERecord?id=CVE-2026-22025
https://www.cve.org/CVERecord?id=CVE-2026-22026
##updated 2026-01-13T14:03:18.990000
1 posts
updated 2026-01-13T14:03:18.990000
1 posts
1 repos
Advantech patches maximum-severity SQL injection flaw in IoT products
Advantech patched a maximum-severity SQL injection vulnerability (CVE-2025-52694) in its IoTSuite and IoT Edge products that allows unauthenticated remote attackers to execute arbitrary database commands.
**Make sure all industrial devices are isolated from the internet and accessible from trusted networks only. Update your Advantech IoTSuite and IoT Edge software to the latest versions immediately to prevent remote database takeovers.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/advantech-patches-maximum-severity-sql-injection-flaw-in-iot-products-n-q-4-8-9/gD2P6Ple2L
updated 2026-01-12T18:39:30.937000
1 posts
DoS in Technitium DNS server.
https://github.com/FPokerFace/Security-Advisory/tree/main/CVE-2025-50334
##updated 2026-01-12T18:30:29
1 posts
updated 2026-01-12T15:30:50
1 posts
Critical SQL Injection and XSS flaws reported in Imaster business software
Imaster's business management systems suffer from four vulnerabilities, including a critical SQL injection (CVE-2025-41006) that allows unauthenticated database access. These flaws enable attackers to steal sensitive patient data and execute malicious scripts in administrative sessions.
**If you are using Imaster MEMS Events CRM and the Patient Records Management System, make sure they are isolated from the internet and accessible from trusted networks only. Reach out to the vendor for patches, and in the meantime use a Web Application Firewall to filter malicious SQL and XSS traffic.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-sql-injection-and-xss-vulnerabilities-discovered-in-imaster-business-software-v-f-v-d-t/gD2P6Ple2L
updated 2026-01-12T09:30:36
1 posts
updated 2026-01-12T03:16:06.990000
1 posts
updated 2026-01-11T14:53:55
1 posts
Critical directory traversal vulnerability reported in React Router and Remix
React Router and Remix released patches for a critical directory traversal vulnerability, CVE-2025-61686, which allows attackers to read or write server files via unsigned session cookies.
**If you are using createFileSessionStorage in React Router and Remix, this is important and urgent. Check if you are using signed cookies for session storage. If not, change that ASAP, and update packages to the latest versions immediately. Ideally, limit file system permissions of your web server process to the bare minimum.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-directory-traversal-vulnerability-patched-in-react-router-and-remix-f-v-1-s-w/gD2P6Ple2L
updated 2026-01-11T09:30:25
1 posts
UTT
https://www.cve.org/CVERecord?id=CVE-2026-0836
https://www.cve.org/CVERecord?id=CVE-2026-0837
https://www.cve.org/CVERecord?id=CVE-2026-0838
https://www.cve.org/CVERecord?id=CVE-2026-0839
https://www.cve.org/CVERecord?id=CVE-2026-0840
https://www.cve.org/CVERecord?id=CVE-2026-0841
Luxul
##updated 2026-01-11T06:30:19
1 posts
UTT
https://www.cve.org/CVERecord?id=CVE-2026-0836
https://www.cve.org/CVERecord?id=CVE-2026-0837
https://www.cve.org/CVERecord?id=CVE-2026-0838
https://www.cve.org/CVERecord?id=CVE-2026-0839
https://www.cve.org/CVERecord?id=CVE-2026-0840
https://www.cve.org/CVERecord?id=CVE-2026-0841
Luxul
##updated 2026-01-11T06:30:19
1 posts
UTT
https://www.cve.org/CVERecord?id=CVE-2026-0836
https://www.cve.org/CVERecord?id=CVE-2026-0837
https://www.cve.org/CVERecord?id=CVE-2026-0838
https://www.cve.org/CVERecord?id=CVE-2026-0839
https://www.cve.org/CVERecord?id=CVE-2026-0840
https://www.cve.org/CVERecord?id=CVE-2026-0841
Luxul
##updated 2026-01-11T03:30:13
1 posts
UTT
https://www.cve.org/CVERecord?id=CVE-2026-0836
https://www.cve.org/CVERecord?id=CVE-2026-0837
https://www.cve.org/CVERecord?id=CVE-2026-0838
https://www.cve.org/CVERecord?id=CVE-2026-0839
https://www.cve.org/CVERecord?id=CVE-2026-0840
https://www.cve.org/CVERecord?id=CVE-2026-0841
Luxul
##updated 2026-01-09T20:15:51.243000
1 posts
updated 2026-01-09T19:55:26
2 posts
1 repos
Hitachi Energy patches critical RCE flaw in Asset Suite
Hitachi Energy released a critical update for Asset Suite to patch a remote code execution vulnerability (CVE-2025-10492) caused by improper data handling in the Jaspersoft reporting library.
**Make sure your Hitachi Asset Suite uses only predefined reports and users should not be allowed to upload untrudted reports. If possible, isolate Hitachi Asset Suite to be accessible from trusted networks only and limited number of users. Then plan an update to Asset Suite version 9.8.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/hitachi-energy-patches-critical-rce-flaw-in-asset-suite-w-5-d-c-l/gD2P6Ple2L
CISA ICS advisory: Hitachi Energy Asset Suite vulnerability CVE-2025-10492 https://www.cisa.gov/news-events/ics-advisories/icsa-26-008-01 #CISA #infosec #Java #JavaScript
##updated 2026-01-09T18:31:43
1 posts
updated 2026-01-09T18:31:43
1 posts
updated 2026-01-09T18:31:36
1 posts
1 repos
updated 2026-01-09T18:31:35
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##updated 2026-01-09T18:31:35
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##updated 2026-01-09T12:32:33
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##updated 2026-01-09T12:32:33
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##updated 2026-01-09T12:32:32
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##updated 2026-01-09T09:31:24
1 posts
DoS ( and maybe more? :crow_plead: ) in wget2.
##updated 2026-01-09T00:30:34
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##updated 2026-01-08T23:15:43.673000
1 posts
##A flaw was found in Ansible Automation Platform (AAP). Read-only scoped OAuth2 API Tokens in AAP, are enforced at the Gateway level for Gateway-specific operations. However, this vulnerability allows read-only tokens to perform write operations on backend services (e.g., Controller, Hub, EDA). If this flaw were exploited, an attacker‘s capabilities would only be limited by role based access controls (RBAC).
updated 2026-01-08T23:15:42.690000
2 posts
CVE-2025-12543: Host Header Validation Bypass in #Undertow
https://www.endorlabs.com/learn/cve-2025-12543-host-header-validation-bypass-in-undertow
##https://access.redhat.com/security/cve/cve-2025-12543
##A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBoss EAP, and other Java applications. The Undertow library fails to properly validate the Host header in incoming HTTP requests.As a result, requests containing malformed or malicious Host headers are processed without rejection, enabling attackers to poison caches, perform internal network scans, or hijack user sessions.
updated 2026-01-08T21:31:39
2 posts
CVEs are now published for this.
https://www.cve.org/CVERecord?id=CVE-2025-55125
https://www.cve.org/CVERecord?id=CVE-2025-59468
##🚨 Multiple Veeam CVEs Identified: Critical Flaws Allow RCE and High-Privilege Actions
CVE-2025-55125:
A flaw that allows a Backup or Tape Operator to achieve remote code execution (RCE) as root by crafting a malicious backup configuration file.
▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing
CVE-2025-59468:
A vulnerability enabling a Backup Administrator to execute remote code as the postgres user by supplying a malicious password parameter.
▪️Severity: Medium
▪️CVSS v3.1: 6.7
▪️Source: Discovered during internal testing
CVE-2025-59469
A security issue that allows a Backup or Tape Operator to write arbitrary files with root privileges.
▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing
CVE-2025-59470
A vulnerability that permits a Backup or Tape Operator to achieve remote code execution (RCE) as the postgres user by sending a malicious interval or order parameter.
▪️CVSS Severity: Critical
▪️CVSS v3.1: 9.0
▪️Source: Discovered during internal testing
Veeam: https://www.veeam.com/kb4738
Blog format: https://darkwebinformer.com/multiple-veeam-cves-identified-critical-flaws-allow-rce-and-high-privilege-actions/
updated 2026-01-08T21:31:33
6 posts
10 repos
https://github.com/you-ssef9/CVE-2025-52691
https://github.com/nxgn-kd01/smartermail-cve-scanner
https://github.com/DeathShotXD/CVE-2025-52691-APT-PoC
https://github.com/Ashwesker/Ashwesker-CVE-2025-52691
https://github.com/watchtowrlabs/watchTowr-vs-SmarterMail-CVE-2025-52691
https://github.com/hilwa24/CVE-2025-52691
https://github.com/SuJing-cy/CVE-2025-2025-52691-SmarterMail-Exp
https://github.com/rxerium/CVE-2025-52691
Timeline of vulnerability (soon to be exploited...) (SmartMail):
2025-12-28: NVD CVE published. [1]
2026-01-08: Vulnerability deepdive and PoC published. [2]
2026-01-12: Reconnaissance for instances detected. [3]
2026-01-xx: Exploitation? ...
[1]: https://nvd.nist.gov/vuln/detail/CVE-2025-52691
[2]: https://labs.watchtowr.com/do-smart-people-ever-say-theyre-smart-smartertools-smartermail-pre-auth-rce-cve-2025-52691/
[3]: https://www.labs.greynoise.io/grimoire/2026-01-13-smartermail-version-enumeration/
We've been working on a new AI-driven + human-in-the-loop threat signals detector and this morning it flagged this path that we have not seen before in the grid in the past 90d `/api/v1/licensing/about`. It turns out it's an unauth’d version check for SmarterTools SmarterMail.
If that name sounds familiar its b/c of CVE-2025-52691 (https://nvd.nist.gov/vuln/detail/CVE-2025-52691). (1/3)
##watchTowr has published a technical analysis of a CVSS 10 pre-auth RCE vulnerability in SmartTool's SmarterMail business email platform.
The vulnerability (CVE-2025-52691) was silently patched in Oct and publicly disclosed only a few months later in Dec
##Do Smart People Ever Say They’re Smart? (SmarterTools SmarterMail Pre-Auth RCE CVE-2025-52691) - watchTowr Labs https://labs.watchtowr.com/do-smart-people-ever-say-theyre-smart-smartertools-smartermail-pre-auth-rce-cve-2025-52691/
##New.
WatchTower: Do Smart People Ever Say They’re Smart? (SmarterTools SmarterMail Pre-Auth RCE CVE-2025-52691) https://labs.watchtowr.com/do-smart-people-ever-say-theyre-smart-smartertools-smartermail-pre-auth-rce-cve-2025-52691/ #infosec #threatresearch #vulnerability
##Get your popcorn, it's time for another watchTowr Labs post. This one is a pre-auth RCE in SmarterMail. :blobcatpopcorn:
##updated 2026-01-08T21:30:40
1 posts
1 repos
updated 2026-01-08T21:30:33
1 posts
Reset the "Days since ASN1 vuln" sign to 0.
https://www.cve.org/CVERecord?id=CVE-2025-13151
##Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string.
updated 2026-01-08T20:05:42
1 posts
updated 2026-01-08T19:15:54.677000
1 posts
Old FLIR CVEs just published.
https://www.cve.org/CVERecord?id=CVE-2017-20212
https://www.cve.org/CVERecord?id=CVE-2017-20213
https://www.cve.org/CVERecord?id=CVE-2017-20214
https://www.cve.org/CVERecord?id=CVE-2017-20215
##updated 2026-01-08T19:15:54.560000
1 posts
Old FLIR CVEs just published.
https://www.cve.org/CVERecord?id=CVE-2017-20212
https://www.cve.org/CVERecord?id=CVE-2017-20213
https://www.cve.org/CVERecord?id=CVE-2017-20214
https://www.cve.org/CVERecord?id=CVE-2017-20215
##updated 2026-01-08T18:30:56
2 posts
CVEs are now published for this.
https://www.cve.org/CVERecord?id=CVE-2025-55125
https://www.cve.org/CVERecord?id=CVE-2025-59468
##🚨 Multiple Veeam CVEs Identified: Critical Flaws Allow RCE and High-Privilege Actions
CVE-2025-55125:
A flaw that allows a Backup or Tape Operator to achieve remote code execution (RCE) as root by crafting a malicious backup configuration file.
▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing
CVE-2025-59468:
A vulnerability enabling a Backup Administrator to execute remote code as the postgres user by supplying a malicious password parameter.
▪️Severity: Medium
▪️CVSS v3.1: 6.7
▪️Source: Discovered during internal testing
CVE-2025-59469
A security issue that allows a Backup or Tape Operator to write arbitrary files with root privileges.
▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing
CVE-2025-59470
A vulnerability that permits a Backup or Tape Operator to achieve remote code execution (RCE) as the postgres user by sending a malicious interval or order parameter.
▪️CVSS Severity: Critical
▪️CVSS v3.1: 9.0
▪️Source: Discovered during internal testing
Veeam: https://www.veeam.com/kb4738
Blog format: https://darkwebinformer.com/multiple-veeam-cves-identified-critical-flaws-allow-rce-and-high-privilege-actions/
updated 2026-01-08T18:30:56
2 posts
CVEs are now published for this.
https://www.cve.org/CVERecord?id=CVE-2025-55125
https://www.cve.org/CVERecord?id=CVE-2025-59468
##🚨 Multiple Veeam CVEs Identified: Critical Flaws Allow RCE and High-Privilege Actions
CVE-2025-55125:
A flaw that allows a Backup or Tape Operator to achieve remote code execution (RCE) as root by crafting a malicious backup configuration file.
▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing
CVE-2025-59468:
A vulnerability enabling a Backup Administrator to execute remote code as the postgres user by supplying a malicious password parameter.
▪️Severity: Medium
▪️CVSS v3.1: 6.7
▪️Source: Discovered during internal testing
CVE-2025-59469
A security issue that allows a Backup or Tape Operator to write arbitrary files with root privileges.
▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing
CVE-2025-59470
A vulnerability that permits a Backup or Tape Operator to achieve remote code execution (RCE) as the postgres user by sending a malicious interval or order parameter.
▪️CVSS Severity: Critical
▪️CVSS v3.1: 9.0
▪️Source: Discovered during internal testing
Veeam: https://www.veeam.com/kb4738
Blog format: https://darkwebinformer.com/multiple-veeam-cves-identified-critical-flaws-allow-rce-and-high-privilege-actions/
updated 2026-01-08T18:30:56
1 posts
updated 2026-01-08T18:30:56
1 posts
updated 2026-01-08T18:09:49.800000
2 posts
CVE-2025-14346: WHILL electric wheelchairs models C2 and F are vulnerable to takeover over bluetooth.
Reminds me of how PGDrives Rnet systems can be controlled remotely but in that case it requires a device be plugged in to the control bus.
##CVE-2025-14346: WHILL electric wheelchairs models C2 and F are vulnerable to takeover over bluetooth.
Reminds me of how PGDrives Rnet systems can be controlled remotely but in that case it requires a device be plugged in to the control bus.
##updated 2026-01-08T18:08:54.147000
1 posts
updated 2026-01-08T18:08:54.147000
1 posts
RE: https://infosec.exchange/@cR0w/115854304322324575
Ooh, this one only requires L3 access to DoS.
The massive sending of ICMP requests causes a denial of service on one of the boards from the EVCharger that allows control the EV interfaces. Since the board must be operating correctly for the charger to also function correctly.
https://www.cve.org/CVERecord?id=CVE-2026-22541
Edit to correct the link.
##updated 2026-01-08T18:08:18.457000
3 posts
‼️Trend Micro Apex Central Multiple Vulnerabilities
CVE:
CVE-2025-69258 (CVSS: 9.8)
CVE-2025-69259 (CVSS: 7.5)
CVE-2025-69260 (CVSS: 7.5)
CWE: CWE-1285, CWE-306, CWE-641
PoC/Writeup: https://www.tenable.com/security/research/tra-2026-01
Disclosure Date: January 7. 2026
Disclosure: https://success.trendmicro.com/en-US/solution/KA-0022071
##PoC exploits are now public for CVE-2025-69258 in Trend Micro Apex Central (on-premise), a vulnerability that could allow unauthenticated RCE on affected systems.
A patch is available, and there are no confirmed exploitation reports so far. Public PoCs, however, tend to accelerate attacker interest.
Follow @technadu for objective and technically grounded infosec updates.
Source: https://www.helpnetsecurity.com/2026/01/08/trend-micro-apex-central-cve-2025-69258-rce-poc/
#Infosec #VulnerabilityDisclosure #PatchManagement #RCE #EnterpriseSecurity #ThreatLandscape
##Critical flaws and public exploits released for Trend Micro Apex Central on-premise management
Trend Micro patched a critical remote code execution vulnerability (CVE-2025-69258) in Apex Central that allows attackers to gain SYSTEM privileges. Public exploit code is now available, making immediate patching of on-premise installations vital.
**Make sure all Apex Central servers are isolated from the internet and accessible from trusted networks only. Install Critical Patch Build 7190 as soon as possible.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-flaws-and-public-exploits-released-for-trend-micro-apex-central-on-premise-management-g-t-o-p-0/gD2P6Ple2L
updated 2026-01-08T18:08:18.457000
2 posts
Microsoft posted an update to its security guide yesterday:
Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62224 #Microsoft #vulnerability #Android #Chromium #Edge
##updated 2026-01-08T18:08:18.457000
1 posts
updated 2026-01-08T18:08:18.457000
1 posts
No awoo for you.
https://www.cve.org/CVERecord?id=CVE-2025-15346
##A vulnerability in the handling of verify_mode = CERT_REQUIRED in the wolfssl Python package (wolfssl-py) causes client certificate requirements to not be fully enforced. Because the WOLFSSL_VERIFY_FAIL_IF_NO_PEER_CERT flag was not included, the behavior effectively matched CERT_OPTIONAL: a peer certificate was verified if presented, but connections were incorrectly authenticated when no client certificate was provided. This results in improper authentication, allowing attackers to bypass mutual TLS (mTLS) client authentication by omitting a client certificate during the TLS handshake. The issue affects versions up to and including 5.8.2.
updated 2026-01-08T18:08:18.457000
1 posts
updated 2026-01-08T16:59:33.230000
3 posts
3 repos
https://github.com/LACHHAB-Anas/Exploit_CVE-2025-37164
CISA urges emergency patching after a critical HPE OneView vulnerability (CVE-2025-37164) with active exploitation - Check your versions and update to OneView v11.00 or later now.
Read: https://hackread.com/cisa-emergency-patching-exploit-hpe-oneview-flaw/
##🚨 CISA adds two vulnerabilities to the KEV Catalog
https://darkwebinformer.com/cisa-kev-catalog/
CVE-2009-0556: Microsoft Office PowerPoint Code Injection Vulnerability
CVSS: 9.3
CVE-2025-37164: Hewlett Packard Enterprise OneView Code Injection Vulnerability
CVSS: 10
##CVE ID: CVE-2025-37164
Vendor: Hewlett Packard (HP)
Product: OneView
Date Added: 2026-01-07
Notes: https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04985en_us&docLocale=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2025-37164
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-37164
updated 2026-01-08T15:32:30
1 posts
updated 2026-01-08T15:32:29
1 posts
updated 2026-01-08T15:32:29
1 posts
updated 2026-01-08T15:31:29
1 posts
‼️Trend Micro Apex Central Multiple Vulnerabilities
CVE:
CVE-2025-69258 (CVSS: 9.8)
CVE-2025-69259 (CVSS: 7.5)
CVE-2025-69260 (CVSS: 7.5)
CWE: CWE-1285, CWE-306, CWE-641
PoC/Writeup: https://www.tenable.com/security/research/tra-2026-01
Disclosure Date: January 7. 2026
Disclosure: https://success.trendmicro.com/en-US/solution/KA-0022071
##updated 2026-01-08T15:31:29
1 posts
‼️Trend Micro Apex Central Multiple Vulnerabilities
CVE:
CVE-2025-69258 (CVSS: 9.8)
CVE-2025-69259 (CVSS: 7.5)
CVE-2025-69260 (CVSS: 7.5)
CWE: CWE-1285, CWE-306, CWE-641
PoC/Writeup: https://www.tenable.com/security/research/tra-2026-01
Disclosure Date: January 7. 2026
Disclosure: https://success.trendmicro.com/en-US/solution/KA-0022071
##updated 2026-01-08T12:30:38
1 posts
updated 2026-01-08T00:31:21
1 posts
Old FLIR CVEs just published.
https://www.cve.org/CVERecord?id=CVE-2017-20212
https://www.cve.org/CVERecord?id=CVE-2017-20213
https://www.cve.org/CVERecord?id=CVE-2017-20214
https://www.cve.org/CVERecord?id=CVE-2017-20215
##updated 2026-01-08T00:31:21
1 posts
Old FLIR CVEs just published.
https://www.cve.org/CVERecord?id=CVE-2017-20212
https://www.cve.org/CVERecord?id=CVE-2017-20213
https://www.cve.org/CVERecord?id=CVE-2017-20214
https://www.cve.org/CVERecord?id=CVE-2017-20215
##updated 2026-01-08T00:31:21
1 posts
Old FLIR CVEs just published.
https://www.cve.org/CVERecord?id=CVE-2017-20212
https://www.cve.org/CVERecord?id=CVE-2017-20213
https://www.cve.org/CVERecord?id=CVE-2017-20214
https://www.cve.org/CVERecord?id=CVE-2017-20215
##updated 2026-01-07T21:32:42
5 posts
CISA warns of active attacks legacy PowerPoint flaw
CISA is warning about active exploitation of CVE-2009-0556, a critical memory corruption vulnerability in legacy Microsoft PowerPoint (2000-2003 versions) that allows attackers to execute malware and move laterally through networks via malicious .ppt files.
**If you're still running legacy Microsoft Office (2000-2003 or 2004 for Mac), remove it and upgrade immediately to a supported version. This 15-year-old PowerPoint flaw is being actively exploited to install malware. If upgrading isn't possible right away, remove PowerPoint from these old systems and avoid opening any .ppt files.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/cisa-warns-of-active-attacks-legacy-powerpoint-flaw-c-b-1-9-i/gD2P6Ple2L
🚨 CISA adds two vulnerabilities to the KEV Catalog
https://darkwebinformer.com/cisa-kev-catalog/
CVE-2009-0556: Microsoft Office PowerPoint Code Injection Vulnerability
CVSS: 9.3
CVE-2025-37164: Hewlett Packard Enterprise OneView Code Injection Vulnerability
CVSS: 10
##Yesterday (2026-01-07) CISA added a new entry to it's catalog of known exploited vulnerabilities. It's about CVE-2009-0556, a vulnerability in PowerPoint 2003 which is EOL since 2014.
#InfoSec is a lost cause if we keep using unmaintained software.
##Huh, CVE-2009-0556 added to KEV? :blobcateyes: https://www.cisa.gov/news-events/alerts/2026/01/07/cisa-adds-two-known-exploited-vulnerabilities-catalog
##CVE ID: CVE-2009-0556
Vendor: Microsoft
Product: Office
Date Added: 2026-01-07
Notes: https://learn.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017 ; https://nvd.nist.gov/vuln/detail/CVE-2009-0556
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2009-0556
updated 2026-01-07T18:30:33
1 posts
The vulnerability, tracked as CVE-2026-20029 (CVSS score: 4.9), resides in the licensing feature and could allow an authenticated, remote attacker with administrative privileges to gain access to sensitive information. https://thehackernews.com/2026/01/cisco-patches-ise-security.html
##updated 2026-01-07T18:30:33
1 posts
WTF kind of CVE is this? It doesn't even say what product is vulnerable.
https://nvd.nist.gov/vuln/detail/CVE-2026-22536
All it says is:
The absence of permissions control for the user XXX allows the current configuration in the sudoers file to escalate privileges without any restrictions
Slow clap for S21sec.
##updated 2026-01-07T18:30:33
1 posts
RE: https://infosec.exchange/@cR0w/115854579789971369
This one is even better. 🤣
An attacker with access to the system's internal network can cause a denial of service on the system by making two concurrent connections through the Telnet service.
Good luck with your Nessus scans.
##updated 2026-01-07T18:30:24
1 posts
updated 2026-01-07T15:31:20
2 posts
1 repos
Microsoft's Security Guide has added one new entry:
January 2026 Release Notes: Chromium: CVE-2026-0628 Insufficient policy enforcement in WebView tag https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-0628 #Microsoft #infosec #Chromium #Chrome #Edge
##Google patches high-risk WebView flaw in first 2026 Chrome update
Google released Chrome 143.0.7499.192/193 to fix a high-risk vulnerability (CVE-2026-0628) in the WebView component that could allow malicious extensions to inject scripts into privileged pages.
**If you are using Google Chrome or other Chromium-based browsers (Edge, Brave, Vivaldi, Opera...) patch your browser ASAP. No critical flaws in this update, but don't wait for the flaw to become actively exploited. Update now, it's trivial and all your tabs reopen after the update.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/google-patches-high-risk-webview-flaw-in-first-2026-chrome-update-8-y-o-a-0/gD2P6Ple2L
updated 2026-01-07T15:30:25
1 posts
DoS via ARP flood. In 2026. And this is the kind of shit people are putting on the Internet and connecting to home and industrial networks.
##The massive sending of ARP requests causes a denial of service on one board of the charger that allows control of the EV interfaces. Since the board must be operating correctly for the charger to also function correctly, the denial of service (DoS) results in a restart of the charger functionalities.
updated 2026-01-07T15:30:25
1 posts
updated 2026-01-07T15:30:14
6 posts
3 repos
https://github.com/farazsth98/chronomaly
❗️Chronomaly: Android kernel exploit for CVE-2025-38352, previously exploited in-the-wild. Targets vulnerable Linux kernels v5.10.x.
##updated 2026-01-07T12:31:27
1 posts
updated 2026-01-07T03:30:32
1 posts
Unpatched command Injection flaw reported in Trendnet TEW-713RE extenders
Trendnet TEW-713RE range extenders are reportd to have a critical command injection flaw (CVE-2025-15471) that allows unauthenticated attackers to gain root access. The flaw is not patched and the company has not responded to disclosure attempts.
**If you are using TEW-713RE range extenders, make sure they are isolated from the internet and accessible from trusted networks only. Since Trendnet has not released a fix, plan a replacement with supported hardware.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/unpatched-command-injection-flaw-reported-in-trendnet-tew-713re-extenders-i-2-q-8-w/gD2P6Ple2L
updated 2026-01-06T17:48:25
5 posts
1 repos
Another critical RCE flaw reported in n8n automation platform
n8n patched another critical remote code execution vulnerability, CVE-2026-21877, which allows authenticated users to bypass sandboxes and take full control of automation servers. Over 100,000 instances are potentially exposed.
**Make sure all automation servers are isolated from the internet and accessible from trusted networks only. Update n8n to version 1.121.3 immediately and restrict workflow creation rights to a small group of trusted administrators to prevent unauthorized code execution.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/another-critical-rce-flaw-reported-in-n8n-automation-platform-m-8-g-u-s/gD2P6Ple2L
Uh... how is https://github.com/n8n-io/n8n/security/advisories/GHSA-v364-rw7m-3263 (CVE-2026-21877) a 10.0 with PR:L? That is not possible, either it's a 9.9 or it has PR:N.
##n8n users need to update immediately after a CVSS 10.0 (CVE-2026-21877) authenticated remote code execution flaw was found that could let an attacker take over the system. Update to version 1.121.3 or higher and restrict privileges now.
Read: https://hackread.com/n8n-users-patch-full-system-takeover-vulnerability/
##"Une seconde faille critique RCE affecte n8n – CVE-2026-21877 : comment se protéger ?"
👇
https://www.it-connect.fr/n8n-cve-2026-21877-faille-critique-rce/
Pas mal d'instances pas à jour et exposées aussi sur les réseaux EU et CH selon Onyphe
👇
https://bsky.app/profile/onyphe.io/post/3mbvqc665zc2w
Infos
👇
https://cve.circl.lu/vuln/CVE-2026-21877
Une seconde faille critique RCE affecte n8n – CVE-2026-21877 : comment se protéger ? https://www.it-connect.fr/n8n-cve-2026-21877-faille-critique-rce/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #n8n
##updated 2026-01-06T17:15:44.213000
1 posts
1 repos
The flaw is tracked as CVE-2025-54957 and its existence came to light in October 2025 after it was discovered by Google researchers. https://www.securityweek.com/critical-dolby-vulnerability-patched-in-android/
##updated 2026-01-06T15:51:59
2 posts
2 repos
https://github.com/12nio/CVE-2025-68428_PoC
https://github.com/Nurjaman2004/jsPDF-Bulk-Detector-CVE-2025-68428-
❗️CVE-2025-68428: Critical Path Traversal in jsPDF
GitHub: https://github.com/12nio/CVE-2025-68428_PoC
CVSS: 9.2
CVE Published: January 5th, 2026
Exploit Published: January 8th, 2026
News source: https://www.bleepingcomputer.com/news/security/critical-jspdf-flaw-lets-hackers-steal-secrets-via-generated-pdfs/
##Cette faille critique dans jsPDF (CVE-2025-68428) peut exposer les données de votre serveur https://www.it-connect.fr/faille-critique-jspdf-cve-2025-68428/ #ActuCybersécurité #Cybersécurité #Vulnérabilité
##updated 2026-01-03T00:32:10
1 posts
3 repos
https://github.com/you-ssef9/CVE-2026-21440
❗️CVE-2026-21440: A critical path traversal vulnerability affecting the AdonisJS framework, specifically its multipart file upload handling.
PoC Exploit: https://github.com/Ashwesker/Ashwesker-CVE-2026-21440
▪️CVSS: 9.2
▪️CVE Published: January 2nd, 2026
▪️Exploit Published: January 5th, 2026
Details:
AdonisJS is a TypeScript-first web framework. A Path Traversal vulnerability in AdonisJS multipart file handling may allow a remote attacker to write arbitrary files to arbitrary locations on the server filesystem. This impacts @adonisjs/bodyparser through version 10.1.1 and 11.x prerelease versions prior to 11.0.0-next.6. This issue has been patched in @adonisjs/bodyparser versions 10.1.2 and 11.0.0-next.6.
##updated 2026-01-02T18:28:02.143000
1 posts
28 repos
https://github.com/gagaltotal/n8n-cve-2025-68613
https://github.com/Ak-cybe/CVE-2025-68613-n8n-rce-analysis
https://github.com/r4j3sh-com/CVE-2025-68613-n8n-lab
https://github.com/manyaigdtuw/CVE-2025-68613_Scanner
https://github.com/TheInterception/n8n_CVE-2025-68613_exploit_payloads
https://github.com/AbdulRKB/n8n-RCE
https://github.com/releaseown/analysis-and-poc-n8n-CVE-2025-68613
https://github.com/TheStingR/CVE-2025-68613-POC
https://github.com/reem-012/poc_CVE-2025-68613
https://github.com/JohannesLks/CVE-2025-68613-Python-Exploit
https://github.com/secjoker/CVE-2025-68613
https://github.com/intbjw/CVE-2025-68613-poc-via-copilot
https://github.com/ali-py3/Exploit-CVE-2025-68613
https://github.com/J4ck3LSyN-Gen2/n8n-CVE-2025-68613-TryHackMe
https://github.com/cv-sai-kamesh/n8n-CVE-2025-68613
https://github.com/LingerANR/n8n-CVE-2025-68613
https://github.com/Khin-96/n8n-cve-2025-68613-thm
https://github.com/Dlanang/homelab-CVE-2025-68613
https://github.com/mbanyamer/n8n-Authenticated-Expression-Injection-RCE-CVE-2025-68613
https://github.com/shibaaa204/CVE-2025-68613
https://github.com/Ashwesker/Ashwesker-CVE-2025-68613
https://github.com/intelligent-ears/CVE-2025-68613
https://github.com/GnuTLam/POC-CVE-2025-68613
https://github.com/ahmedshamsddin/n8n-RCE-CVE-2025-68613
https://github.com/wioui/n8n-CVE-2025-68613-exploit
https://github.com/nehkark/CVE-2025-68613
https://github.com/hackersatyamrastogi/n8n-exploit-CVE-2025-68613-n8n-God-Mode-Ultimate
Another video showing how incredibly easy the n8n RCE vulnerability (CVE-2025-68613) is.
Credit: http://youtube.com/@0xmrsecurity
##updated 2025-12-30T16:15:46.230000
1 posts
4 repos
https://github.com/intSheep/Tika-CVE-2025-66516-Lab
https://github.com/chasingimpact/CVE-2025-66516-Writeup-POC
New.
Picus: Apache Tika XXE Vulnerability CVE-2025-66516 Explained https://www.picussecurity.com/resource/blog/apache-tika-xxe-vulnerability-cve-2025-66516-explained #infosec #vulnerability #Apache #threatresearch #opensource
##updated 2025-12-30T15:30:26
1 posts
updated 2025-12-29T15:58:56.260000
1 posts
updated 2025-12-22T18:49:24.303000
1 posts
updated 2025-12-18T15:07:42.550000
1 posts
Key Commitment Issues in S3 Encryption Clients
Bulletin ID: AWS-2025-032 Scope: AWS Content Type: Important (requires attention) Publication Date: 2025/12/17 12:15 PM PST
We identify the following CVEs:
CVE-2025-14763 - Key Commitment Issues in S3 Encryption Client in Java
updated 2025-12-12T15:19:07.567000
1 posts
1 repos
Here's my analysis of the recent-ish 9.3 Critical in #Emby (CVE-2025-64113).
Sadly, the vulnerability turned out to be pretty boring, but I've tried to make the best of it.
##updated 2025-12-12T15:19:07.567000
1 posts
5 repos
https://github.com/jhow019/FreePBX-Vulns-December-25
https://github.com/cyberleelawat/FreePBX-Multiple-CVEs-2025
https://github.com/rxerium/FreePBX-Vulns-December-25
https://github.com/jhow019/jhow019.github.io
https://github.com/BimBoxH4/CVE-2025-66039_CVE-2025-61675_CVE-2025-61678_reePBX
New.
Picus: Critical FreePBX Vulnerabilities: CVE-2025-66039, CVE-2025-61675, CVE-2025-61675 https://www.picussecurity.com/resource/blog/critical-freepbx-vulnerabilities-cve-2025-66039-cve-2025-61675-cve-2025-61675 #infosec #vilnerability #threatresearch #opensource
##updated 2025-12-10T16:10:33.500000
1 posts
updated 2025-12-09T18:30:41
1 posts
📰 CISA Warns of Critical Flaws in Rockwell & YoSmart ICS Equipment
CISA issues multiple ICS advisories for critical flaws in Rockwell Automation & YoSmart devices. 🏭 Vulnerabilities include SQL injection (CVE-2025-12807) and potential for remote device takeover. Patch now! #ICS #SCADA #Vulnerability
##updated 2025-12-09T16:53:25
2 posts
100 repos
https://github.com/sickwell/CVE-2025-55182
https://github.com/aliclub0x00/CVE-2025-55182-POC-NEXTJS
https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc
https://github.com/LemonTeatw1/CVE-2025-55182-exploit
https://github.com/theman001/CVE-2025-55182
https://github.com/sho-luv/React2Shell
https://github.com/ThemeHackers/CVE-2025-55182
https://github.com/alfazhossain/CVE-2025-55182-Exploiter
https://github.com/dwisiswant0/CVE-2025-55182
https://github.com/xcanwin/CVE-2025-55182-React-RCE
https://github.com/timsonner/React2Shell-CVE-2025-55182
https://github.com/Cr4at0r/Next.js-RCE-Scanner-BurpSuite-Extension-
https://github.com/chrahman/react2shell-CVE-2025-55182-full-rce-script
https://github.com/sumanrox/rschunter
https://github.com/CirqueiraDev/MassExploit-CVE-2025-55182
https://github.com/momika233/CVE-2025-55182-bypass
https://github.com/heiheishushu/rsc_detect_CVE-2025-55182
https://github.com/msanft/CVE-2025-55182
https://github.com/assetnote/react2shell-scanner
https://github.com/shyambhanushali/React2Shell
https://github.com/vrx7men2/RSC-Detect-CVE-2025-55182
https://github.com/MrR0b0t19/CVE-2025-55182-shellinteractive
https://github.com/santihabib/CVE-2025-55182-analysis
https://github.com/zack0x01/vuln-app-CVE-2025-55182
https://github.com/Pizz33/CVE-2025-55182-burpscanner
https://github.com/Rsatan/Next.js-Exploit-Tool
https://github.com/fatguru/CVE-2025-55182-scanner
https://github.com/songsanggggg/CVE-2025-55182
https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension
https://github.com/l4rm4nd/CVE-2025-55182
https://github.com/Saturate/CVE-2025-55182-Scanner
https://github.com/kondukto-io/vulnerable-next-js-poc
https://github.com/vijay-shirhatti/RSC-Detect-CVE-2025-55182
https://github.com/yz9yt/React2Shell-CTF
https://github.com/hualy13/CVE-2025-55182
https://github.com/sudo-Yangziran/CVE-2025-55182POC
https://github.com/keklick1337/CVE-2025-55182-golang-PoC
https://github.com/ZihxS/check-react-rce-cve-2025-55182
https://github.com/logesh-GIT001/CVE-2025-55182
https://github.com/emredavut/CVE-2025-55182
https://github.com/Chocapikk/CVE-2025-55182
https://github.com/Cillian-Collins/CVE-2025-55182
https://github.com/SainiONHacks/CVE-2025-55182-Scanner
https://github.com/zack0x01/CVE-2025-55182-advanced-scanner-
https://github.com/M4xSec/CVE-2025-55182-React2Shell-RCE-Shell
https://github.com/kavienanj/CVE-2025-55182
https://github.com/theori-io/reactguard
https://github.com/fullhunt/react2shell-test-server
https://github.com/im-ezboy/CVE-2025-55182-zoomeye
https://github.com/alsaut1/react2shell-lab
https://github.com/EynaExp/CVE-2025-55182-POC
https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension
https://github.com/CymulateResearch/React2Shell-Scanner
https://github.com/onlylovetx/CVE-2025-55182-CVE-2025-66478-Exploit-GUI
https://github.com/hoosin/CVE-2025-55182
https://github.com/XiaomingX/CVE-2025-55182-poc
https://github.com/yanoshercohen/React2Shell_CVE-2025-55182
https://github.com/c0rydoras/CVE-2025-55182
https://github.com/Spritualkb/CVE-2025-55182-exp
https://github.com/websecuritylabs/React2Shell-Library
https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js
https://github.com/subhdotsol/CVE-2025-55182
https://github.com/BeichenDream/CVE-2025-55182-GodzillaMemoryShell
https://github.com/kOaDT/poc-cve-2025-55182
https://github.com/ynsmroztas/NextRce
https://github.com/ejpir/CVE-2025-55182-research
https://github.com/techgaun/cve-2025-55182-scanner
https://github.com/MoLeft/React2Shell-Toolbox
https://github.com/AliHzSec/CVE-2025-55182
https://github.com/TrixSec/CVE-2025-55182-Scanner
https://github.com/nehkark/CVE-2025-55182
https://github.com/Updatelap/CVE-2025-55182
https://github.com/Dh4v4l8/CVE-2025-55182-poc-tool
https://github.com/BlackTechX011/React2Shell
https://github.com/ejpir/CVE-2025-55182-bypass
https://github.com/mrknow001/RSC_Detector
https://github.com/StealthMoud/CVE-2025-55182-Scanner
https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script
https://github.com/acheong08/CVE-2025-55182-poc
https://github.com/VeilVulp/RscScan-cve-2025-55182
https://github.com/whiteov3rflow/CVE-2025-55182-poc
https://github.com/xkillbit/cve-2025-55182-scanner
https://github.com/shamo0/react2shell-PoC
https://github.com/hackersatyamrastogi/react2shell-ultimate
https://github.com/cybertechajju/R2C-CVE-2025-55182-66478
https://github.com/GelukCrab/React-Server-Components-RCE
https://github.com/Faithtiannn/CVE-2025-55182
https://github.com/Ashwesker/Ashwesker-CVE-2025-55182
https://github.com/jf0x3a/CVE-2025-55182-exploit
https://github.com/C00LN3T/React2Shell
https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool
https://github.com/zr0n/react2shell
https://github.com/hidden-investigations/react2shell-scanner
https://github.com/gensecaihq/react2shell-scanner
https://github.com/freeqaz/react2shell
https://github.com/RuoJi6/CVE-2025-55182-RCE-shell
https://github.com/zzhorc/CVE-2025-55182
CVE-2025-66478: RCE in React Server Components
Bulletin ID: AWS-2025-030 Scope: AWS Content Type: Important (requires attention) Publication Date: 2025/12/03 20:00 PM PST
Description:
AWS is aware of the recently disclosed CVE-2025-55182 which affects the React Server Flight...
https://aws.amazon.com/security/security-bulletins/rss/aws-2025-030/
##I had a chance last week to chat with Benjamin Read of #Wiz. Last month, Read and other members of his team published a deep dive into the #React2Shell
(CVE-2025-55182) vulnerability, and I was curious to see what has been hitting my honeypot, so I took a closer look.
This is doing some weird stuff, friends.
As is normally the case with exploits targeting internet-facing devices, once the exploit becomes known, it ends up in the automated scanners used by threat actors and security researchers. What I've seen over the past week is a combination of both.
In just a few hours of operation, I identified a small number of source IP addresses exploiting React2Shell by pointing the vulnerable system at URLs hosting BASH scripts. These scripts are really familiar to anyone who routinely looks at honeypot data - they contain a series of commands that pull down and execute malicious payloads.
And as I've seen in the past, some of these payloads use racially inflammatory language in their malware. It's weird and gross, but unfortunately, really common.
But while most of these payloads were "the usual suspects" - remote shells, cryptocurrency miners - there was one payload that stuck out.
It's an exploit file, based on this proof-of-concept [https://github.com/iotwar/FIVEM-POC/blob/main/fivem-poc.py] designed to DDoS a modded server running "FiveM," a popular version of the game Grand Theft Auto V.
Let that one sink in: among the earliest adopters of a brand new exploit are...people trying to mess with other people's online game servers.
I've long said that exploits like these are the canaries in the datacenter coal mine. After all, if an attacker can force your server to run a cryptominer (or a game DDoS tool), they can force it to run far more malicious code.
I guess someone, or a group of someones, just want to ruin everyone's good time, no matter how or what form that takes. And they'll do it in the most offensive way possible.
Anyway, patch your servers, please, if only to stick it to these people who want to be the reason we can't have nice things.
#PoC #exploit #CVE_2025_55182 #DDoS #FiveM #REACT #Bash #cryptominer #malware
##updated 2025-12-05T00:31:05
1 posts
1 repos
https://github.com/lutrasecurity/CVE-2025-1910-WatchGuard-Privilege-Escalation
After coming across an outdated version of WatchGuard's Mobile VPN with SSL last year and being unable to quickly find a public proof of concept for CVE-2025-1910, we took a closer look and created one ourselves: https://lutrasecurity.com/en/articles/cve-2025-1910-watchguard-privilege-escalation/
Thanks to @tomtom of #AKASEC for finding the vulnerability and providing a great write-up!
##updated 2025-12-01T15:39:53.100000
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##updated 2025-12-01T15:39:53.100000
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##updated 2025-12-01T15:39:53.100000
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##updated 2025-11-26T18:31:15
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##updated 2025-11-26T18:31:15
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##updated 2025-11-17T18:30:25
1 posts
updated 2025-11-13T15:30:37
1 posts
updated 2025-11-05T00:32:35
2 posts
Still no fix in BIG-IP DNS for CVE-2025-8677.
##Still no fix in BIG-IP DNS for CVE-2025-8677.
##updated 2025-11-05T00:32:31
2 posts
1 repos
Nor is there one for CVE-2025-40778.
##Nor is there one for CVE-2025-40778.
##updated 2025-11-03T21:34:58
1 posts
1 repos
https://github.com/Betim-Hodza/CVE-2025-4802-Proof-of-Concept
Cool bug 🐞
CVE-2025-4802: Arbitrary library path #vulnerability in static setuid binary in #GLIBC
https://hackyboiz.github.io/2025/12/03/millet/cve-2025-4802/
##updated 2025-11-03T21:34:39
1 posts
updated 2025-11-03T21:33:34
1 posts
updated 2025-11-03T21:18:55.383000
1 posts
updated 2025-11-03T20:19:19.233000
1 posts
⚪ Firefox Patches Vulnerability Discovered by a Positive Technologies Expert
🗨️ Exploitation of the vulnerability became possible after injecting malicious code into an arbitrary website, allowing an attacker to steal credentials and redirect users to phishing pages.
##updated 2025-10-28T14:15:30.907000
2 posts
1 repos
German Manufacturing Under Phishing Attacks: Tracking a Stealthy AsyncRATCampaign
Learn about a new phishing campaign targeting German manufacturing companies using CVE-2024-43451.
🔗️ [Any] https://link.is.it/F0JDjf
##German Manufacturing Under Phishing Attacks: Tracking a Stealthy AsyncRATCampaign
Learn about a new phishing campaign targeting German manufacturing companies using CVE-2024-43451.
🔗️ [Any] https://link.is.it/F0JDjf
##updated 2025-10-27T17:40:33.680000
1 posts
100 repos
https://github.com/logpresso/CVE-2021-44228-Scanner
https://github.com/toramanemre/apache-solr-log4j-CVE-2021-44228
https://github.com/CrackerCat/CVE-2021-44228-Log4j-Payloads
https://github.com/RedDrip7/Log4Shell_CVE-2021-44228_related_attacks_IOCs
https://github.com/1lann/log4shelldetect
https://github.com/yahoo/check-log4j
https://github.com/faisalfs10x/Log4j2-CVE-2021-44228-revshell
https://github.com/thomaspatzke/Log4Pot
https://github.com/puzzlepeaches/Log4jHorizon
https://github.com/greymd/CVE-2021-44228
https://github.com/f0ng/log4j2burpscanner
https://github.com/future-client/CVE-2021-44228
https://github.com/MalwareTech/Log4jTools
https://github.com/lfama/log4j_checker
https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words
https://github.com/alexandre-lavoie/python-log4rce
https://github.com/Adikso/minecraft-log4j-honeypot
https://github.com/puzzlepeaches/Log4jCenter
https://github.com/fireeye/CVE-2021-44228
https://github.com/LiveOverflow/log4shell
https://github.com/darkarnium/Log4j-CVE-Detect
https://github.com/leonjza/log4jpwn
https://github.com/thecyberneh/Log4j-RCE-Exploiter
https://github.com/corretto/hotpatch-for-apache-log4j2
https://github.com/sassoftware/loguccino
https://github.com/sunnyvale-it/CVE-2021-44228-PoC
https://github.com/julian911015/Log4j-Scanner-Exploit
https://github.com/kozmer/log4j-shell-poc
https://github.com/Diverto/nse-log4shell
https://github.com/puzzlepeaches/Log4jUnifi
https://github.com/AlexandreHeroux/Fix-CVE-2021-44228
https://github.com/christophetd/log4shell-vulnerable-app
https://github.com/BinaryDefense/log4j-honeypot-flask
https://github.com/Malwar3Ninja/Exploitation-of-Log4j2-CVE-2021-44228
https://github.com/mubix/CVE-2021-44228-Log4Shell-Hashes
https://github.com/lucab85/log4j-cve-2021-44228
https://github.com/NS-Sp4ce/Vm4J
https://github.com/CodeShield-Security/Log4JShell-Bytecode-Detector
https://github.com/qingtengyun/cve-2021-44228-qingteng-patch
https://github.com/fullhunt/log4j-scan
https://github.com/toramanemre/log4j-rce-detect-waf-bypass
https://github.com/mzlogin/CVE-2021-44228-Demo
https://github.com/claranet/ansible-role-log4shell
https://github.com/aws-samples/kubernetes-log4j-cve-2021-44228-node-agent
https://github.com/0xInfection/LogMePwn
https://github.com/corelight/cve-2021-44228
https://github.com/KosmX/CVE-2021-44228-example
https://github.com/shamo0/CVE-2021-44228
https://github.com/NorthwaveSecurity/log4jcheck
https://github.com/dwisiswant0/look4jar
https://github.com/simonis/Log4jPatch
https://github.com/bigsizeme/Log4j-check
https://github.com/mufeedvh/log4jail
https://github.com/kubearmor/log4j-CVE-2021-44228
https://github.com/tippexs/nginx-njs-waf-cve2021-44228
https://github.com/TaroballzChen/CVE-2021-44228-log4jVulnScanner-metasploit
https://github.com/qingtengyun/cve-2021-44228-qingteng-online-patch
https://github.com/alexbakker/log4shell-tools
https://github.com/nccgroup/log4j-jndi-be-gone
https://github.com/roxas-tan/CVE-2021-44228
https://github.com/blake-fm/vcenter-log4j
https://github.com/sec13b/CVE-2021-44228-POC
https://github.com/Azeemering/CVE-2021-44228-DFIR-Notes
https://github.com/stripe/log4j-remediation-tools
https://github.com/mr-vill4in/log4j-fuzzer
https://github.com/boundaryx/cloudrasp-log4j2
https://github.com/Jeromeyoung/log4j2burpscanner
https://github.com/redhuntlabs/Log4JHunt
https://github.com/mergebase/log4j-detector
https://github.com/irgoncalves/f5-waf-enforce-sig-CVE-2021-44228
https://github.com/twseptian/spring-boot-log4j-cve-2021-44228-docker-lab
https://github.com/hackinghippo/log4shell_ioc_ips
https://github.com/mr-r3b00t/CVE-2021-44228
https://github.com/rubo77/log4j_checker_beta
https://github.com/korteke/log4shell-demo
https://github.com/justakazh/Log4j-CVE-2021-44228
https://github.com/momos1337/Log4j-RCE
https://github.com/r3kind1e/Log4Shell-obfuscated-payloads-generator
https://github.com/Kadantte/CVE-2021-44228-poc
https://github.com/infiniroot/nginx-mitigate-log4shell
https://github.com/pedrohavay/exploit-CVE-2021-44228
https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce
https://github.com/giterlizzi/nmap-log4shell
https://github.com/ssl/scan4log4j
https://github.com/CERTCC/CVE-2021-44228_scanner
https://github.com/cyberxml/log4j-poc
https://github.com/HyCraftHD/Log4J-RCE-Proof-Of-Concept
https://github.com/back2root/log4shell-rex
https://github.com/takito1812/log4j-detect
https://github.com/cisagov/log4j-scanner
https://github.com/fox-it/log4j-finder
https://github.com/wortell/log4j
https://github.com/DragonSurvivalEU/RCE
https://github.com/HynekPetrak/log4shell-finder
https://github.com/irgoncalves/f5-waf-quick-patch-cve-2021-44228
https://github.com/marcourbano/CVE-2021-44228
https://github.com/jas502n/Log4j2-CVE-2021-44228
https://github.com/NCSC-NL/log4shell
Cloudflare has even bragged on their blog¹ about how they run data analytics on all of the web requests going through their system. This data may be collected for government surveillance purposes as well.
##updated 2025-10-22T00:34:17
1 posts
The three bugs, tracked as CVE-2025-22224, CVE-2025-22225 and CVE-2025-22226, and named ESXicape, allow privileged attackers to execute arbitrary code and escape the VM to compromise the hypervisor itself. https://www.securityweek.com/exploit-for-vmware-zero-day-flaws-likely-built-a-year-before-public-disclosure/
##updated 2025-10-22T00:33:13
1 posts
The three bugs, tracked as CVE-2025-22224, CVE-2025-22225 and CVE-2025-22226, and named ESXicape, allow privileged attackers to execute arbitrary code and escape the VM to compromise the hypervisor itself. https://www.securityweek.com/exploit-for-vmware-zero-day-flaws-likely-built-a-year-before-public-disclosure/
##updated 2025-10-22T00:33:13
1 posts
The three bugs, tracked as CVE-2025-22224, CVE-2025-22225 and CVE-2025-22226, and named ESXicape, allow privileged attackers to execute arbitrary code and escape the VM to compromise the hypervisor itself. https://www.securityweek.com/exploit-for-vmware-zero-day-flaws-likely-built-a-year-before-public-disclosure/
##updated 2025-10-09T22:15:58
1 posts
CVE-2025-11573 - Denial of Service issue in Amazon.IonDotnet
Bulletin ID: AWS-2025-022 Scope: Amazon Content Type: Important (requires attention) Publication Date: 2025/10/09 11:00 PM PDT
Description:
Amazon.IonDotnet is a library for the Dotnet language that is used to read and write Ama...
https://aws.amazon.com/security/security-bulletins/rss/aws-2025-022/
##updated 2025-09-29T19:34:10.030000
1 posts
updated 2025-09-26T14:32:19.853000
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##updated 2025-09-25T21:30:37
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##updated 2025-09-25T21:30:36
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##updated 2025-09-25T21:30:36
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##updated 2025-08-19T14:13:07.783000
2 posts
1 repos
❗️CVE-2025-53136: Windows Kernel Information Disclosure through Race condition
PoC/Exploit: https://github.com/nu1lptr0/CVE-2025-53136
CVSS: 5.5
CVE Published: Aug 12th, 2025
❗️CVE-2025-53136: Windows Kernel Information Disclosure through Race condition
PoC/Exploit: https://github.com/nu1lptr0/CVE-2025-53136
CVSS: 5.5
CVE Published: Aug 12th, 2025
updated 2025-08-12T18:31:39
1 posts
⚪ August Windows updates may block app installations
🗨️ Microsoft reported that the Windows security updates for August 2025 may trigger unexpected User Account Control (UAC) prompts and cause problems with app installations. The bug affects users without administrator…
##updated 2025-07-31T21:32:03
2 posts
Critical authentication bypass in Güralp Systems seismic monitoring devices
Güralp Systems reported a critical authentication bypass vulnerability (CVE-2025-8286) in its FMUS and MIN series seismic devices, allowing unauthenticated attackers to modify configurations or factory reset hardware.
**Make sure all Güralp devices are isolated from the internet and accessible from trusted networks only. Review the patch, and consult with the vendor since it's still experimental. At minimum, isolate all systems from the internet, then wait for the final patch.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-authentication-bypass-in-guralp-systems-seismic-monitoring-devices-n-i-c-w-x/gD2P6Ple2L
Critical authentication bypass in Güralp Systems seismic monitoring devices
Güralp Systems reported a critical authentication bypass vulnerability (CVE-2025-8286) in its FMUS and MIN series seismic devices, allowing unauthenticated attackers to modify configurations or factory reset hardware.
**Make sure all Güralp devices are isolated from the internet and accessible from trusted networks only. Review the patch, and consult with the vendor since it's still experimental. At minimum, isolate all systems from the internet, then wait for the final patch.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-authentication-bypass-in-guralp-systems-seismic-monitoring-devices-n-i-c-w-x/gD2P6Ple2L
updated 2025-07-01T14:47:11.290000
1 posts
2 repos
https://github.com/12nio/CVE-2025-68428_PoC
https://github.com/Nurjaman2004/jsPDF-Bulk-Detector-CVE-2025-68428-
❗️CVE-2025-68428: Critical Path Traversal in jsPDF
GitHub: https://github.com/12nio/CVE-2025-68428_PoC
CVSS: 9.2
CVE Published: January 5th, 2026
Exploit Published: January 8th, 2026
News source: https://www.bleepingcomputer.com/news/security/critical-jspdf-flaw-lets-hackers-steal-secrets-via-generated-pdfs/
##updated 2024-11-21T08:00:57.933000
2 posts
🚨 EUVD-2026-2449
📊 Score: n/a
📅 Updated: 2026-01-14
📝 Pimcore Has an Incomplete Patch for CVE-2023-30848
##🟠 CVE-2026-23492 - High (8.8)
Pimcore is an Open Source Data & Experience Management Platform. Prior to 12.3.1 and 11.5.14, an incomplete SQL injection patch in the Admin Search Find API allows an authenticated attacker to perform blind SQL injection. Although CVE-2023-30848 a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23492/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2024-11-21T06:48:03.407000
1 posts
Mitsubishi Electric patches critical SCADA and HMI vulnerabilities
Mitsubishi Electric patched several vulnerabilities in its ICONICS and HMI SCADA suites, including a critical bypass flaw (CVE-2022-23128) that allows unauthorized system control.
**Make sure all Mitsubishi Electric and ICONICS Digital Solutions devices are isolated from the internet and accessible from trusted networks only. Update to GENESIS64 version 10.97.1 immediately and all other systems which have patches. Since GENESIS32 is retired and won't be patched, use strict network isolation and plan a replacement.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/mitsubishi-electric-patches-critical-scada-and-hmi-vulnerabilities-p-5-i-0-o/gD2P6Ple2L
updated 2024-05-15T06:28:36
1 posts
6 repos
https://github.com/nerowander/CVE-2022-25845-exploit
https://github.com/cuijiung/fastjson-CVE-2022-25845
https://github.com/scabench/fastjson-tp1fn1
https://github.com/hosch3n/FastjsonVulns
Perfect 10 in Fastjson. 🥳
It's funny that it appears to be a challenging enough bug that it bypassed at least two previous fixes.
https://www.cve.org/CVERecord?id=CVE-2025-70974
##Fastjson before 1.2.48 mishandles autoType because, when an @type key is in a JSON document, and the value of that key is the name of a Java class, there may be calls to certain public methods of that class. Depending on the behavior of those methods, there may be JNDI injection with an attacker-supplied payload located elsewhere in that JSON document. This was exploited in the wild in 2023 through 2025. NOTE: this issue exists because of an incomplete fix for CVE-2017-18349. Also, a later bypass is covered by CVE-2022-25845.
updated 2024-04-19T05:07:56
2 posts
8 repos
https://github.com/TX-One/CVE-2023-38408
https://github.com/LucasPDiniz/CVE-2023-38408
https://github.com/Adel2411/cve-2023-38408
https://github.com/mrtacojr/CVE-2023-38408
https://github.com/classic130/CVE-2023-38408
https://github.com/kali-mx/CVE-2023-38408
Critical OpenSSH flaw exposes Moxa industrial switches to remote takeover
Moxa issued a critical advisory for a remote code execution vulnerability (CVE-2023-38408) affecting several industrial Ethernet switch series. The flaw allows unauthenticated attackers to take full control of devices if a user forwards an ssh-agent to a compromised system.
**Make sure all Moza devices are isolated from the internet and accessible from trusted networks only. Contact Moxa support to get the latest firmware for your EDS and RKS switches.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-openssh-flaw-exposes-moxa-industrial-switches-to-remote-takeover-f-u-h-q-u/gD2P6Ple2L
Critical OpenSSH flaw exposes Moxa industrial switches to remote takeover
Moxa issued a critical advisory for a remote code execution vulnerability (CVE-2023-38408) affecting several industrial Ethernet switch series. The flaw allows unauthenticated attackers to take full control of devices if a user forwards an ssh-agent to a compromised system.
**Make sure all Moza devices are isolated from the internet and accessible from trusted networks only. Contact Moxa support to get the latest firmware for your EDS and RKS switches.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-openssh-flaw-exposes-moxa-industrial-switches-to-remote-takeover-f-u-h-q-u/gD2P6Ple2L
updated 2024-04-04T08:33:05
1 posts
The publicly disclosed ones are expiring Secure Boot cert:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21265
and an old one that was published in 2023 but is apparently now applicable to all Windows systems with the Agere Soft Modem installed, even if it isn't in use.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-31096
##updated 2024-03-15T18:30:45
1 posts
1 repos
@0xabad1dea @mkj @emaksovalec okay _actually_ the last one now, re: that footnote
Logitech has also messed up their code signing security several times so that even such a screw-up would actually not crash their app on macOS in particular, which is bad in its own right: https://nvd.nist.gov/vuln/detail/CVE-2024-2537
tl;dr: avoid logitech's drivers if you can, they are routinely stepping on security & reliability rakes completely unprompted
##updated 2023-09-26T14:52:01
1 posts
1 repos
Perfect 10 in Fastjson. 🥳
It's funny that it appears to be a challenging enough bug that it bypassed at least two previous fixes.
https://www.cve.org/CVERecord?id=CVE-2025-70974
##Fastjson before 1.2.48 mishandles autoType because, when an @type key is in a JSON document, and the value of that key is the name of a Java class, there may be calls to certain public methods of that class. Depending on the behavior of those methods, there may be JNDI injection with an attacker-supplied payload located elsewhere in that JSON document. This was exploited in the wild in 2023 through 2025. NOTE: this issue exists because of an incomplete fix for CVE-2017-18349. Also, a later bypass is covered by CVE-2022-25845.
updated 2023-01-29T05:06:36
2 posts
5 repos
https://github.com/jrmurray000/CVE-2020-8554
https://github.com/rancher/externalip-webhook
https://github.com/alebedev87/gatekeeper-cve-2020-8554
For anyone who's been to one of my #Kubernetes #Security talks over the last couple of years, you may have seen me mention "the unpatchable 4", which is a set of Kubernetes CVEs for which there are no patches, you need to mitigate them with configuration or architecture choices.
I've been meaning to write more about them, and finally got a chance so here's the first in a mini-series of posts looking at the CVEs and the underlying reasons they occur. This time it's CVE-2020-8554.
https://securitylabs.datadoghq.com/articles/unpatchable-kubernetes-vulnerabilities-cve-2020-8554/
##For anyone who's been to one of my #Kubernetes #Security talks over the last couple of years, you may have seen me mention "the unpatchable 4", which is a set of Kubernetes CVEs for which there are no patches, you need to mitigate them with configuration or architecture choices.
I've been meaning to write more about them, and finally got a chance so here's the first in a mini-series of posts looking at the CVEs and the underlying reasons they occur. This time it's CVE-2020-8554.
https://securitylabs.datadoghq.com/articles/unpatchable-kubernetes-vulnerabilities-cve-2020-8554/
##🟠 CVE-2026-23477 - High (7.7)
Rocket.Chat is an open-source, secure, fully customizable communications platform. In Rocket.Chat versions up to 6.12.0, the API endpoint GET /api/v1/oauth-apps.get is exposed to any authenticated user, regardless of their role or permissions. Thi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23477/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##1 posts
100 repos
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-peer-conflict
https://github.com/mattcbarrett/check-cve-2025-66478
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-berry
https://github.com/chrahman/react2shell-CVE-2025-55182-full-rce-script
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-hoisting
https://github.com/sumanrox/rschunter
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-yarn-workspaces
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-tilde
https://github.com/heiheishushu/rsc_detect_CVE-2025-55182
https://github.com/assetnote/react2shell-scanner
https://github.com/shyambhanushali/React2Shell
https://github.com/Code42Cate/nexts-cve-2025-66478-exploit
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-workspaces
https://github.com/Malayke/Next.js-RSC-RCE-Scanner-CVE-2025-66478
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-tag-latest
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-pnpm-overrides
https://github.com/ExpTechTW/CVE-2025-66478
https://github.com/FurkanKAYAPINAR/ReactNext2Shell
https://github.com/songsanggggg/CVE-2025-55182
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-alias
https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-build-metadata
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-range
https://github.com/l4rm4nd/CVE-2025-55182
https://github.com/Mustafa1p/Next.js-RCE-Scanner---CVE-2025-55182-CVE-2025-66478
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-pnpm
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-pnpm-catalog
https://github.com/NAYLINNU/CVE-2025-66478
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-no-lockfile
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-shrinkwrap
https://github.com/ZihxS/check-react-rce-cve-2025-55182
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-canary-15x
https://github.com/emredavut/CVE-2025-55182
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-lockfile-mismatch
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-caret
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-realworld-supabase-pnpm-monorepo
https://github.com/grp-ops/react2shell
https://github.com/strainxx/react2shell-honeypot
https://github.com/aiexz/CVE-2025-66478-kinda-waf
https://github.com/DavionGowie/-vercel-application-is-vulnerable-to-CVE-2025-66478.
https://github.com/KingHacker353/R2C-CVE-2025-55182-66478
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-pnpm-symlinks
https://github.com/zhixiangyao/CVE-2025-66478-Exploit-PoC
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-realworld-dub-pnpm-monorepo
https://github.com/Letalandroid/cve-2025-66478_rce_vulnerable
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-bun
https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension
https://github.com/CymulateResearch/React2Shell-Scanner
https://github.com/onlylovetx/CVE-2025-55182-CVE-2025-66478-Exploit-GUI
https://github.com/ToritoIO/Torito-R2S
https://github.com/FurkanKAYAPINAR/React-Next-Scanner
https://github.com/enesbuyuk/react2shell-security-tool
https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js
https://github.com/xiaopeng-ye/react2shell-detector
https://github.com/abdozkaya/rsc-security-auditor
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-v-prefix
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-rsc-webpack
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-nested-versions
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-realworld-calcom-yarn-monorepo
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-canary-14x
https://github.com/mounta11n/CHECK-CVE-2025-55182-AND-CVE-2025-66478
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-overrides
https://github.com/nehkark/CVE-2025-55182
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-transitive
https://github.com/khadafigans/React2Shell
https://github.com/arashiyans/CVE-2025-55182-CVE-2025-66478
https://github.com/Geekujin/React2-PowerShell-CVE-Checker
https://github.com/wangxso/CVE-2025-66478-POC
https://github.com/lincemorado97/CVE-2025-55182_CVE-2025-66478
https://github.com/namest504/CVE-2025-66478-Exploit-Poc
https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-optional-deps
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-zero-installs
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-canary-16x
https://github.com/shamo0/react2shell-PoC
https://github.com/abhirajranjan/cve-2025-66478
https://github.com/hackersatyamrastogi/react2shell-ultimate
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-packagemanager-field
https://github.com/cybertechajju/R2C-CVE-2025-55182-66478
https://github.com/jctommasi/react2shellVulnApp
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-patch-package
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-resolutions
https://github.com/aseemyash/krle
https://github.com/gagaltotal/tot-react-rce-CVE-2025-55182
https://github.com/Jibaru/CVE-2025-66478-github-patcher
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-git-dep
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-pnp
https://github.com/abtonc/next-cve-2025-66478
https://github.com/C00LN3T/React2Shell
https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool
https://github.com/hidden-investigations/react2shell-scanner
https://github.com/cypholab/evilact
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-devdeps
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-turborepo
https://github.com/freeqaz/react2shell
CVE-2025-66478: RCE in React Server Components
Bulletin ID: AWS-2025-030 Scope: AWS Content Type: Important (requires attention) Publication Date: 2025/12/03 20:00 PM PST
Description:
AWS is aware of the recently disclosed CVE-2025-55182 which affects the React Server Flight...
https://aws.amazon.com/security/security-bulletins/rss/aws-2025-030/
##Buffer Over-read when receiving improperly sized ICMPv6 packets
Bulletin ID: AWS-2025-023 Scope: AWS Content Type: Important (requires attention) Publication Date: 2025/10/10 10:15 PM PDT
We identified the following CVEs:
CVE-2025-11616 - A Buffer Over-read when receiving ICMPv6 packets of certain ...
https://aws.amazon.com/security/security-bulletins/rss/aws-2025-023/
##FreeRDP
https://www.cve.org/CVERecord?id=CVE-2026-22851
https://www.cve.org/CVERecord?id=CVE-2026-22852
https://www.cve.org/CVERecord?id=CVE-2026-22853
https://www.cve.org/CVERecord?id=CVE-2026-22854
https://www.cve.org/CVERecord?id=CVE-2026-22855
https://www.cve.org/CVERecord?id=CVE-2026-22856
https://www.cve.org/CVERecord?id=CVE-2026-22857
https://www.cve.org/CVERecord?id=CVE-2026-22858
https://www.cve.org/CVERecord?id=CVE-2026-22859
Edit to add more.
##FreeRDP
https://www.cve.org/CVERecord?id=CVE-2026-22851
https://www.cve.org/CVERecord?id=CVE-2026-22852
https://www.cve.org/CVERecord?id=CVE-2026-22853
https://www.cve.org/CVERecord?id=CVE-2026-22854
https://www.cve.org/CVERecord?id=CVE-2026-22855
https://www.cve.org/CVERecord?id=CVE-2026-22856
https://www.cve.org/CVERecord?id=CVE-2026-22857
https://www.cve.org/CVERecord?id=CVE-2026-22858
https://www.cve.org/CVERecord?id=CVE-2026-22859
Edit to add more.
##FreeRDP
https://www.cve.org/CVERecord?id=CVE-2026-22851
https://www.cve.org/CVERecord?id=CVE-2026-22852
https://www.cve.org/CVERecord?id=CVE-2026-22853
https://www.cve.org/CVERecord?id=CVE-2026-22854
https://www.cve.org/CVERecord?id=CVE-2026-22855
https://www.cve.org/CVERecord?id=CVE-2026-22856
https://www.cve.org/CVERecord?id=CVE-2026-22857
https://www.cve.org/CVERecord?id=CVE-2026-22858
https://www.cve.org/CVERecord?id=CVE-2026-22859
Edit to add more.
##FreeRDP
https://www.cve.org/CVERecord?id=CVE-2026-22851
https://www.cve.org/CVERecord?id=CVE-2026-22852
https://www.cve.org/CVERecord?id=CVE-2026-22853
https://www.cve.org/CVERecord?id=CVE-2026-22854
https://www.cve.org/CVERecord?id=CVE-2026-22855
https://www.cve.org/CVERecord?id=CVE-2026-22856
https://www.cve.org/CVERecord?id=CVE-2026-22857
https://www.cve.org/CVERecord?id=CVE-2026-22858
https://www.cve.org/CVERecord?id=CVE-2026-22859
Edit to add more.
##FreeRDP
https://www.cve.org/CVERecord?id=CVE-2026-22851
https://www.cve.org/CVERecord?id=CVE-2026-22852
https://www.cve.org/CVERecord?id=CVE-2026-22853
https://www.cve.org/CVERecord?id=CVE-2026-22854
https://www.cve.org/CVERecord?id=CVE-2026-22855
https://www.cve.org/CVERecord?id=CVE-2026-22856
https://www.cve.org/CVERecord?id=CVE-2026-22857
https://www.cve.org/CVERecord?id=CVE-2026-22858
https://www.cve.org/CVERecord?id=CVE-2026-22859
Edit to add more.
##FreeRDP
https://www.cve.org/CVERecord?id=CVE-2026-22851
https://www.cve.org/CVERecord?id=CVE-2026-22852
https://www.cve.org/CVERecord?id=CVE-2026-22853
https://www.cve.org/CVERecord?id=CVE-2026-22854
https://www.cve.org/CVERecord?id=CVE-2026-22855
https://www.cve.org/CVERecord?id=CVE-2026-22856
https://www.cve.org/CVERecord?id=CVE-2026-22857
https://www.cve.org/CVERecord?id=CVE-2026-22858
https://www.cve.org/CVERecord?id=CVE-2026-22859
Edit to add more.
##FreeRDP
https://www.cve.org/CVERecord?id=CVE-2026-22851
https://www.cve.org/CVERecord?id=CVE-2026-22852
https://www.cve.org/CVERecord?id=CVE-2026-22853
https://www.cve.org/CVERecord?id=CVE-2026-22854
https://www.cve.org/CVERecord?id=CVE-2026-22855
https://www.cve.org/CVERecord?id=CVE-2026-22856
https://www.cve.org/CVERecord?id=CVE-2026-22857
https://www.cve.org/CVERecord?id=CVE-2026-22858
https://www.cve.org/CVERecord?id=CVE-2026-22859
Edit to add more.
##FreeRDP
https://www.cve.org/CVERecord?id=CVE-2026-22851
https://www.cve.org/CVERecord?id=CVE-2026-22852
https://www.cve.org/CVERecord?id=CVE-2026-22853
https://www.cve.org/CVERecord?id=CVE-2026-22854
https://www.cve.org/CVERecord?id=CVE-2026-22855
https://www.cve.org/CVERecord?id=CVE-2026-22856
https://www.cve.org/CVERecord?id=CVE-2026-22857
https://www.cve.org/CVERecord?id=CVE-2026-22858
https://www.cve.org/CVERecord?id=CVE-2026-22859
Edit to add more.
##FreeRDP
https://www.cve.org/CVERecord?id=CVE-2026-22851
https://www.cve.org/CVERecord?id=CVE-2026-22852
https://www.cve.org/CVERecord?id=CVE-2026-22853
https://www.cve.org/CVERecord?id=CVE-2026-22854
https://www.cve.org/CVERecord?id=CVE-2026-22855
https://www.cve.org/CVERecord?id=CVE-2026-22856
https://www.cve.org/CVERecord?id=CVE-2026-22857
https://www.cve.org/CVERecord?id=CVE-2026-22858
https://www.cve.org/CVERecord?id=CVE-2026-22859
Edit to add more.
##FreeRDP
https://www.cve.org/CVERecord?id=CVE-2026-22851
https://www.cve.org/CVERecord?id=CVE-2026-22852
https://www.cve.org/CVERecord?id=CVE-2026-22853
https://www.cve.org/CVERecord?id=CVE-2026-22854
https://www.cve.org/CVERecord?id=CVE-2026-22855
https://www.cve.org/CVERecord?id=CVE-2026-22856
https://www.cve.org/CVERecord?id=CVE-2026-22857
https://www.cve.org/CVERecord?id=CVE-2026-22858
https://www.cve.org/CVERecord?id=CVE-2026-22859
Edit to add more.
##There's the DoS.
CVSS-BT: 7.7 / CVSS-B: 8.7 (CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/AU:Y/R:U/V:D/RE:M/U:Amber)
New security advisories. You'll need a login to access details.
Palo Alto: PAN-SA-2026-0001 Chromium: Monthly Vulnerability Update (January 2026) https://security.paloaltonetworks.com/PAN-SA-2026-0001
CVE-2026-0227 PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway and Portal https://security.paloaltonetworks.com/CVE-2026-0227 #PaloAlto #infosec #vulnerability #Chromium
##@cR0w cve-2026-0227 seems spicy
##There's the DoS.
CVSS-BT: 7.7 / CVSS-B: 8.7 (CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/AU:Y/R:U/V:D/RE:M/U:Amber)
New security advisories. You'll need a login to access details.
Palo Alto: PAN-SA-2026-0001 Chromium: Monthly Vulnerability Update (January 2026) https://security.paloaltonetworks.com/PAN-SA-2026-0001
CVE-2026-0227 PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway and Portal https://security.paloaltonetworks.com/CVE-2026-0227 #PaloAlto #infosec #vulnerability #Chromium
##@cR0w cve-2026-0227 seems spicy
##Suricata
https://www.cve.org/CVERecord?id=CVE-2026-22258
https://www.cve.org/CVERecord?id=CVE-2026-22259
https://www.cve.org/CVERecord?id=CVE-2026-22260
https://www.cve.org/CVERecord?id=CVE-2026-22261
https://www.cve.org/CVERecord?id=CVE-2026-22262
https://www.cve.org/CVERecord?id=CVE-2026-22263
##Suricata
https://www.cve.org/CVERecord?id=CVE-2026-22258
https://www.cve.org/CVERecord?id=CVE-2026-22259
https://www.cve.org/CVERecord?id=CVE-2026-22260
https://www.cve.org/CVERecord?id=CVE-2026-22261
https://www.cve.org/CVERecord?id=CVE-2026-22262
https://www.cve.org/CVERecord?id=CVE-2026-22263
##Suricata
https://www.cve.org/CVERecord?id=CVE-2026-22258
https://www.cve.org/CVERecord?id=CVE-2026-22259
https://www.cve.org/CVERecord?id=CVE-2026-22260
https://www.cve.org/CVERecord?id=CVE-2026-22261
https://www.cve.org/CVERecord?id=CVE-2026-22262
https://www.cve.org/CVERecord?id=CVE-2026-22263
##Suricata
https://www.cve.org/CVERecord?id=CVE-2026-22258
https://www.cve.org/CVERecord?id=CVE-2026-22259
https://www.cve.org/CVERecord?id=CVE-2026-22260
https://www.cve.org/CVERecord?id=CVE-2026-22261
https://www.cve.org/CVERecord?id=CVE-2026-22262
https://www.cve.org/CVERecord?id=CVE-2026-22263
##Suricata
https://www.cve.org/CVERecord?id=CVE-2026-22258
https://www.cve.org/CVERecord?id=CVE-2026-22259
https://www.cve.org/CVERecord?id=CVE-2026-22260
https://www.cve.org/CVERecord?id=CVE-2026-22261
https://www.cve.org/CVERecord?id=CVE-2026-22262
https://www.cve.org/CVERecord?id=CVE-2026-22263
##Suricata
https://www.cve.org/CVERecord?id=CVE-2026-22258
https://www.cve.org/CVERecord?id=CVE-2026-22259
https://www.cve.org/CVERecord?id=CVE-2026-22260
https://www.cve.org/CVERecord?id=CVE-2026-22261
https://www.cve.org/CVERecord?id=CVE-2026-22262
https://www.cve.org/CVERecord?id=CVE-2026-22263
##Suricata
https://www.cve.org/CVERecord?id=CVE-2026-22258
https://www.cve.org/CVERecord?id=CVE-2026-22259
https://www.cve.org/CVERecord?id=CVE-2026-22260
https://www.cve.org/CVERecord?id=CVE-2026-22261
https://www.cve.org/CVERecord?id=CVE-2026-22262
https://www.cve.org/CVERecord?id=CVE-2026-22263
##Suricata
https://www.cve.org/CVERecord?id=CVE-2026-22258
https://www.cve.org/CVERecord?id=CVE-2026-22259
https://www.cve.org/CVERecord?id=CVE-2026-22260
https://www.cve.org/CVERecord?id=CVE-2026-22261
https://www.cve.org/CVERecord?id=CVE-2026-22262
https://www.cve.org/CVERecord?id=CVE-2026-22263
##Suricata
https://www.cve.org/CVERecord?id=CVE-2026-22258
https://www.cve.org/CVERecord?id=CVE-2026-22259
https://www.cve.org/CVERecord?id=CVE-2026-22260
https://www.cve.org/CVERecord?id=CVE-2026-22261
https://www.cve.org/CVERecord?id=CVE-2026-22262
https://www.cve.org/CVERecord?id=CVE-2026-22263
##Suricata
https://www.cve.org/CVERecord?id=CVE-2026-22258
https://www.cve.org/CVERecord?id=CVE-2026-22259
https://www.cve.org/CVERecord?id=CVE-2026-22260
https://www.cve.org/CVERecord?id=CVE-2026-22261
https://www.cve.org/CVERecord?id=CVE-2026-22262
https://www.cve.org/CVERecord?id=CVE-2026-22263
##Suricata
https://www.cve.org/CVERecord?id=CVE-2026-22258
https://www.cve.org/CVERecord?id=CVE-2026-22259
https://www.cve.org/CVERecord?id=CVE-2026-22260
https://www.cve.org/CVERecord?id=CVE-2026-22261
https://www.cve.org/CVERecord?id=CVE-2026-22262
https://www.cve.org/CVERecord?id=CVE-2026-22263
##Suricata
https://www.cve.org/CVERecord?id=CVE-2026-22258
https://www.cve.org/CVERecord?id=CVE-2026-22259
https://www.cve.org/CVERecord?id=CVE-2026-22260
https://www.cve.org/CVERecord?id=CVE-2026-22261
https://www.cve.org/CVERecord?id=CVE-2026-22262
https://www.cve.org/CVERecord?id=CVE-2026-22263
##Suricata
https://www.cve.org/CVERecord?id=CVE-2026-22258
https://www.cve.org/CVERecord?id=CVE-2026-22259
https://www.cve.org/CVERecord?id=CVE-2026-22260
https://www.cve.org/CVERecord?id=CVE-2026-22261
https://www.cve.org/CVERecord?id=CVE-2026-22262
https://www.cve.org/CVERecord?id=CVE-2026-22263
##Suricata
https://www.cve.org/CVERecord?id=CVE-2026-22258
https://www.cve.org/CVERecord?id=CVE-2026-22259
https://www.cve.org/CVERecord?id=CVE-2026-22260
https://www.cve.org/CVERecord?id=CVE-2026-22261
https://www.cve.org/CVERecord?id=CVE-2026-22262
https://www.cve.org/CVERecord?id=CVE-2026-22263
##2 posts
18 repos
https://github.com/dwisiswant0/CVE-2025-49844
https://github.com/srozb/reditrap
https://github.com/hzhsec/redis-cve_2025_49844
https://github.com/MiclelsonCN/CVE-2025-49844_POC
https://github.com/angelusrivera/CVE-2025-49844
https://github.com/raminfp/redis_exploit
https://github.com/ksnnd32/redis_exploit
https://github.com/pedrorichil/CVE-2025-49844
https://github.com/Network-Sec/CVE-2025-49844-RediShell-AI-made-Revshell
https://github.com/Mufti22/CVE-2025-49844-RediShell-Vulnerability-Scanner
https://github.com/gopinaath/CVE-2025-49844-discovery
https://github.com/imbas007/CVE-2025-49844-Vulnerability-Scanner
https://github.com/Zain3311/CVE-2025-49844
https://github.com/saneki/cve-2025-49844
https://github.com/Ashwesker/Ashwesker-CVE-2025-49844
https://github.com/elyasbassir/CVE-2025-49844
Redis Lua vuln impacts BIG-IP Next and no patches are available.
##Redis Lua vuln impacts BIG-IP Next and no patches are available.
##1 posts
1 repos
https://github.com/Network-Sec/CVE-2025-62507-Buffer-Overflow_PoC
Dissecting and Exploiting CVE-2025-62507: Remote Code Execution in Redis
#CVE_2025_62507
https://jfrog.com/blog/exploiting-remote-code-execution-in-redis/
🚨 Critical (CVSS 9.6) vulnerability in Appsmith allows account takeover via Origin header manipulation in password reset/email verification flows.
I've created a vulnerability detection script here:
https://github.com/rxerium/rxerium-templates/blob/main/2026/CVE-2026-22794.yaml
Reference:
https://github.com/appsmithorg/appsmith/security/advisories/GHSA-7hf5-mc28-xmcv
🟠 CVE-2026-22861 - High (8.8)
iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of International Color Consortium (ICC) color management profiles. Prior to 2.3.1.2, There is a heap-based buffer overflow in SIccCalcOp::De...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22861/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##XserverからMastodonに関して重大かつ緊急性の高いセキュリティ脆弱性が確認されたとのことで昨日メールが届いていた。@mstdn.mrmts.com のMastodonの現在のバージョンはv4.5.4です。ちのみに、@mstdn.jp のMastodonのバージョンはv4.1.25です。以下転載。
■発表された脆弱性
CVE-2026-22245
■影響を受ける環境
Mastodonをご利用の環境
■脆弱性を確認したバージョン
v4.2.29未満
v4.3.17未満
v4.4.11未満
v4.5.4未満
■脆弱性の影響
脆弱性の悪用により、第三者がサーバー内部の情報へ
不正にアクセスし、機密情報が漏洩する恐れがあります。
■対策
開発元の指示に従い、脆弱性が修正された最新バージョンへのアップデート
を適用してください。
■詳細について(外部サイト)
https://nvd.nist.gov/vuln/detail/CVE-2026-22245
1 posts
5 repos
https://github.com/jhow019/FreePBX-Vulns-December-25
https://github.com/cyberleelawat/FreePBX-Multiple-CVEs-2025
https://github.com/rxerium/FreePBX-Vulns-December-25
https://github.com/jhow019/jhow019.github.io
https://github.com/BimBoxH4/CVE-2025-66039_CVE-2025-61675_CVE-2025-61678_reePBX
New.
Picus: Critical FreePBX Vulnerabilities: CVE-2025-66039, CVE-2025-61675, CVE-2025-61675 https://www.picussecurity.com/resource/blog/critical-freepbx-vulnerabilities-cve-2025-66039-cve-2025-61675-cve-2025-61675 #infosec #vilnerability #threatresearch #opensource
##⚪ August Windows updates may block app installations
🗨️ Microsoft reported that the Windows security updates for August 2025 may trigger unexpected User Account Control (UAC) prompts and cause problems with app installations. The bug affects users without administrator…
##Space Hacking ( NASA Cryptolib ) 🚀
https://www.cve.org/CVERecord?id=CVE-2026-21897
https://www.cve.org/CVERecord?id=CVE-2026-21898
https://www.cve.org/CVERecord?id=CVE-2026-21899
https://www.cve.org/CVERecord?id=CVE-2026-21900
https://www.cve.org/CVERecord?id=CVE-2026-22023
https://www.cve.org/CVERecord?id=CVE-2026-22024
https://www.cve.org/CVERecord?id=CVE-2026-22025
https://www.cve.org/CVERecord?id=CVE-2026-22026
##Space Hacking ( NASA Cryptolib ) 🚀
https://www.cve.org/CVERecord?id=CVE-2026-21897
https://www.cve.org/CVERecord?id=CVE-2026-21898
https://www.cve.org/CVERecord?id=CVE-2026-21899
https://www.cve.org/CVERecord?id=CVE-2026-21900
https://www.cve.org/CVERecord?id=CVE-2026-22023
https://www.cve.org/CVERecord?id=CVE-2026-22024
https://www.cve.org/CVERecord?id=CVE-2026-22025
https://www.cve.org/CVERecord?id=CVE-2026-22026
##Space Hacking ( NASA Cryptolib ) 🚀
https://www.cve.org/CVERecord?id=CVE-2026-21897
https://www.cve.org/CVERecord?id=CVE-2026-21898
https://www.cve.org/CVERecord?id=CVE-2026-21899
https://www.cve.org/CVERecord?id=CVE-2026-21900
https://www.cve.org/CVERecord?id=CVE-2026-22023
https://www.cve.org/CVERecord?id=CVE-2026-22024
https://www.cve.org/CVERecord?id=CVE-2026-22025
https://www.cve.org/CVERecord?id=CVE-2026-22026
##Space Hacking ( NASA Cryptolib ) 🚀
https://www.cve.org/CVERecord?id=CVE-2026-21897
https://www.cve.org/CVERecord?id=CVE-2026-21898
https://www.cve.org/CVERecord?id=CVE-2026-21899
https://www.cve.org/CVERecord?id=CVE-2026-21900
https://www.cve.org/CVERecord?id=CVE-2026-22023
https://www.cve.org/CVERecord?id=CVE-2026-22024
https://www.cve.org/CVERecord?id=CVE-2026-22025
https://www.cve.org/CVERecord?id=CVE-2026-22026
##Space Hacking ( NASA Cryptolib ) 🚀
https://www.cve.org/CVERecord?id=CVE-2026-21897
https://www.cve.org/CVERecord?id=CVE-2026-21898
https://www.cve.org/CVERecord?id=CVE-2026-21899
https://www.cve.org/CVERecord?id=CVE-2026-21900
https://www.cve.org/CVERecord?id=CVE-2026-22023
https://www.cve.org/CVERecord?id=CVE-2026-22024
https://www.cve.org/CVERecord?id=CVE-2026-22025
https://www.cve.org/CVERecord?id=CVE-2026-22026
##Space Hacking ( NASA Cryptolib ) 🚀
https://www.cve.org/CVERecord?id=CVE-2026-21897
https://www.cve.org/CVERecord?id=CVE-2026-21898
https://www.cve.org/CVERecord?id=CVE-2026-21899
https://www.cve.org/CVERecord?id=CVE-2026-21900
https://www.cve.org/CVERecord?id=CVE-2026-22023
https://www.cve.org/CVERecord?id=CVE-2026-22024
https://www.cve.org/CVERecord?id=CVE-2026-22025
https://www.cve.org/CVERecord?id=CVE-2026-22026
##OWASP CRS Patches Critical Multipart Charset Validation Bypass
OWASP CRS released patches for a critical vulnerability (CVE-2026-21876) that allows attackers to bypass charset validation in multipart requests. By placing malicious payloads in early request parts, attackers can slip UTF-7/16/32 encoded XSS attacks past the WAF.
**If you are using WAF OWASP Core Rule Set to version 4.22.0 or 3.3.8 this is important. Update the Core rule 922110 ASAP. Don't not rely on default settings for rule 922110 until you have applied these patches. Attackers can easily hide malicious scripts in multi-part uploads.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/owasp-crs-patches-critical-multipart-charset-validation-bypass-6-n-o-8-z/gD2P6Ple2L
CVE-2026-21876: OWASP Modsecurity CRS WAF bypass blogpost is out! https://coreruleset.org/20260106/cve-2026-21876-critical-multipart-charset-bypass-fixed-in-crs-4.22.0-and-3.3.8/
##Critical (9.3 CVSS) OWASP ModSecurity CRS WAF bypass advisory and walkthrough is out! https://coreruleset.org/20260106/cve-2026-21876-critical-multipart-charset-bypass-fixed-in-crs-4.22.0-and-3.3.8/
##Docker WAF doesn't filter on username, apparently. Seems weird. The CVE isn't published yet but they are claiming a number for it in the repo. Either way, if you have Docker WAF logs, maybe look for interesting payloads in the username parameter. Or don't.
Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##Tenda
https://www.cve.org/CVERecord?id=CVE-2026-22079
https://www.cve.org/CVERecord?id=CVE-2026-22080
https://www.cve.org/CVERecord?id=CVE-2026-22081
https://www.cve.org/CVERecord?id=CVE-2026-22082
D-Link
https://www.cve.org/CVERecord?id=CVE-2026-0732
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2026-0731
Zenitel
https://www.cve.org/CVERecord?id=CVE-2025-64126
https://www.cve.org/CVERecord?id=CVE-2025-64127
https://www.cve.org/CVERecord?id=CVE-2025-64128
https://www.cve.org/CVERecord?id=CVE-2025-64129
https://www.cve.org/CVERecord?id=CVE-2025-64130
https://www.cve.org/CVERecord?id=CVE-2025-59814
https://www.cve.org/CVERecord?id=CVE-2025-59815
https://www.cve.org/CVERecord?id=CVE-2025-59816
https://www.cve.org/CVERecord?id=CVE-2025-59817
https://www.cve.org/CVERecord?id=CVE-2025-59818
https://www.cve.org/CVERecord?id=CVE-2025-59819
https://www.cve.org/CVERecord?id=CVE-2025-64090
https://www.cve.org/CVERecord?id=CVE-2025-64091
https://www.cve.org/CVERecord?id=CVE-2025-64092
##Our researchers at Pentest-Tools.com just found a new RCE in cPanel (CVE-2025-63261). 🔧
We discovered that a classic Unsafe Perl Open in AWStats allows command execution. The application fails to sanitize input before the open() call, so a well-placed pipe | character tricks the system into spawning a shell instead of reading a file.
This exploit requires zero actual plumbing. 🪠
Read Part 1 of the technical breakdown by Matei Badanoiu: https://pentest-tools.com/blog/cpanel-cve-ptt-2025-021-part-1
#infosec #cybersecurity #cPanel #RCE #vulnerability #PentestTools
##Kanboard patches critical authentication bypass and information disclosure flaws
Kanboard version 1.2.49 fixes a critical authentication bypass (CVE-2026-21881) and two other flaws that allow attackers to impersonate users, enumerate LDAP data, and perform open redirects. The most severe vulnerability allows full administrative access by spoofing HTTP headers when reverse proxy authentication is enabled.
**If possible, ensure your Kanboard instance is isolated from the internet and accessible only via a trusted network or VPN. Then plan a quick patch. If you use reverse proxy authentication, prioritize configuring your web server to strip all identity headers from external requests, since that's the most dangerous attack vector.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/kanboard-patches-critical-authentication-bypass-and-information-disclosure-flaws-d-m-l-8-h/gD2P6Ple2L
That's a weird thing to do intentionally.
##An unused function in MicroServer can start a reverse SSH connection to a vendor registered domain, without mutual authentication. An attacker on the local network with admin access to the web server, and the ability to manipulate DNS responses, can redirect the SSH connection to an attacker controlled device.