## Updated at UTC 2026-01-13T13:56:50.474578

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2025-40944 7.5 0.00% 1 0 2026-01-13T10:15:58.457000 A vulnerability has been identified in SIMATIC ET 200AL IM 157-1 PN (6ES7157-1AB
CVE-2025-40942 8.8 0.00% 2 0 2026-01-13T10:15:58.283000 A vulnerability has been identified in TeleControl Server Basic (All versions <
CVE-2025-40805 10.0 0.00% 1 0 2026-01-13T10:15:58.047000 Affected devices do not properly enforce user authentication on specific API end
CVE-2025-41717 8.8 0.00% 2 0 2026-01-13T09:31:36 An unauthenticated remote attacker can trick a high privileged user into uploadi
CVE-2026-0492 8.8 0.00% 1 0 2026-01-13T03:32:20 SAP HANA database is vulnerable to privilege escalation allowing an attacker wit
CVE-2026-0501 10.0 0.00% 1 0 2026-01-13T03:32:20 Due to insufficient input validation in SAP S/4HANA Private Cloud and On-Premise
CVE-2025-66177 8.8 0.00% 1 0 2026-01-13T03:32:20 There is a Stack overflow Vulnerability in the device Search and Discovery featu
CVE-2025-66176 8.8 0.00% 1 0 2026-01-13T03:32:20 There is a Stack overflow Vulnerability in the device Search and Discovery featu
CVE-2026-0511 8.1 0.00% 1 0 2026-01-13T03:32:20 SAP Fiori App Intercompany Balance Reconciliation does not perform necessary aut
CVE-2026-0507 8.5 0.00% 1 0 2026-01-13T03:32:20 Due to an OS Command Injection vulnerability in SAP Application Server for ABAP
CVE-2026-0506 8.1 0.00% 1 0 2026-01-13T03:32:20 Due to a Missing Authorization Check vulnerability in Application Server ABAP an
CVE-2026-0491 9.1 0.00% 1 0 2026-01-13T03:32:19 SAP Landscape Transformation allows an attacker with admin privileges to exploit
CVE-2026-0500 9.7 0.00% 1 0 2026-01-13T03:32:19 Due to the usage of vulnerable third party component in SAP Wily Introscope Ente
CVE-2025-12420 0 0.00% 4 0 2026-01-13T03:16:00.773000 A vulnerability has been identified in the ServiceNow AI Platform that could ena
CVE-2026-0498 9.1 0.00% 1 0 2026-01-13T02:15:52.300000 SAP S/4HANA (Private Cloud and On-Premise) allows an attacker with admin privile
CVE-2025-67146 9.4 0.00% 1 0 2026-01-13T00:30:57 Multiple SQL Injection vulnerabilities exist in AbhishekMali21 GYM-MANAGEMENT-SY
CVE-2026-22813 0 0.00% 2 0 2026-01-12T23:15:53.523000 OpenCode is an open source AI coding agent. The markdown renderer used for LLM r
CVE-2026-22812 8.8 0.00% 2 0 2026-01-12T23:15:53.370000 OpenCode is an open source AI coding agent. Prior to 1.0.216, OpenCode automatic
CVE-2026-22804 8.0 0.00% 2 1 2026-01-12T23:15:53.063000 Termix is a web-based server management platform with SSH terminal, tunneling, a
CVE-2025-67147 9.8 0.00% 1 0 2026-01-12T22:16:07.970000 Multiple SQL Injection vulnerabilities exist in amansuryawanshi Gym-Management-S
CVE-2025-63314 10.0 0.00% 1 1 2026-01-12T21:31:38 A static password reset token in the password reset function of DDSN Interactive
CVE-2025-66689 6.5 0.00% 2 0 2026-01-12T21:31:38 A path traversal vulnerability exists in Zen MCP Server before 9.8.2 that allows
CVE-2025-51567 9.1 0.00% 1 0 2026-01-12T21:30:42 A SQL Injection was found in the /exam/user/profile.php page of kashipara Online
CVE-2025-68472 8.1 0.00% 1 0 2026-01-12T20:07:43 ### Summary An unauthenticated path traversal in the file upload API lets any ca
CVE-2025-8110 None 0.04% 12 6 2026-01-12T19:18:21 Improper Symbolic link handling in the PutContents API in Gogs allows Local Exec
CVE-2026-22771 8.8 0.00% 1 0 2026-01-12T19:16:03.470000 Envoy Gateway is an open source project for managing Envoy Proxy as a standalone
CVE-2026-22252 9.1 0.00% 1 0 2026-01-12T19:16:03.200000 LibreChat is a ChatGPT clone with additional features. Prior to v0.8.2-rc2, Libr
CVE-2026-21858 10.0 2.70% 16 4 template 2026-01-12T19:16:02.603000 n8n is an open source workflow automation platform. Versions starting with 1.65.
CVE-2025-52435 7.5 0.01% 1 0 2026-01-12T19:16:00.697000 J2EE Misconfiguration: Data Transmission Without Encryption vulnerability in Apa
CVE-2025-50334 7.5 0.12% 1 0 2026-01-12T18:39:30.937000 An issue in Technitium DNS Server v.13.5 allows a remote attacker to cause a den
CVE-2025-70161 9.8 0.24% 2 0 2026-01-12T18:31:31 EDIMAX BR-6208AC V2_1.02 is vulnerable to Command Injection. This arises because
CVE-2025-69542 9.8 0.24% 1 0 2026-01-12T18:31:31 A Command Injection Vulnerability has been discovered in the DHCP daemon service
CVE-2026-22584 9.8 0.03% 1 0 2026-01-12T18:31:31 Improper Control of Generation of Code ('Code Injection') vulnerability in Sales
CVE-2026-0581 6.3 3.36% 1 0 2026-01-12T18:31:26 A vulnerability was determined in Tenda AC1206 15.03.06.23. Affected by this iss
CVE-2025-46067 8.2 0.00% 1 0 2026-01-12T18:30:36 An issue in Automai Director v.25.2.0 allows a remote attacker to escalate privi
CVE-2025-46070 9.8 0.00% 1 0 2026-01-12T18:30:36 An issue in Automai BotManager v.25.2.0 allows a remote attacker to execute arbi
CVE-2025-71063 8.2 0.00% 1 0 2026-01-12T18:30:36 Errands before 46.2.10 does not verify TLS certificates for CalDAV servers.
CVE-2025-66744 7.5 0.02% 1 0 2026-01-12T18:30:30 In Yonyou YonBIP v3 and before, the LoginWithV8 interface in the series data app
CVE-2025-67004 6.5 0.02% 1 0 2026-01-12T18:30:29 An Information Disclosure vulnerability in CouchCMS 2.4 allow an Admin user to r
CVE-2025-14942 9.8 0.08% 1 0 2026-01-12T17:53:19.670000 wolfSSH’s key exchange state machine can be manipulated to leak the client’s pas
CVE-2025-62235 8.1 0.05% 1 0 2026-01-12T17:15:52.007000 Authentication Bypass by Spoofing vulnerability in Apache NimBLE. Receiving spe
CVE-2025-56225 7.5 0.02% 1 0 2026-01-12T17:15:51.840000 fluidsynth-2.4.6 and earlier versions is vulnerable to Null pointer dereference
CVE-2025-53477 7.5 0.02% 1 0 2026-01-12T17:15:51.687000 NULL Pointer Dereference vulnerability in Apache Nimble. Missing validation of
CVE-2025-46068 8.8 0.00% 1 0 2026-01-12T17:15:51.050000 An issue in Automai Director v.25.2.0 allows a remote attacker to execute arbitr
CVE-2025-46066 9.9 0.00% 2 0 2026-01-12T17:15:50.700000 An issue in Automai Director v.25.2.0 allows a remote attacker to escalate privi
CVE-2025-14847 7.5 69.62% 6 32 template 2026-01-12T17:15:50.250000 Mismatched length fields in Zlib compressed protocol headers may allow a read of
CVE-2025-55125 7.8 0.06% 2 0 2026-01-12T16:44:01.677000 This vulnerability allows a Backup or Tape Operator to perform remote code execu
CVE-2025-68493 8.1 0.04% 1 0 2026-01-12T15:30:42 Missing XML Validation vulnerability in Apache Struts, Apache Struts. This issu
CVE-2025-52694 10.0 0.07% 3 1 2026-01-12T15:16:03.463000 Successful exploitation of the SQL injection vulnerability could allow an unauth
CVE-2025-41006 0 0.00% 2 0 2026-01-12T15:16:02.910000 Imaster's MEMS Events CRM contains an SQL injection vulnerability in ‘phone’ par
CVE-2026-22184 None 0.08% 2 0 2026-01-12T09:31:31 zlib versions up to and including 1.3.1.2 contain a global buffer overflow in th
CVE-2026-0855 8.8 0.29% 3 0 2026-01-12T09:30:36 Certain IP Camera models developed by Merit LILIN has a OS Command Injection vul
CVE-2025-14279 8.1 0.02% 1 0 2026-01-12T09:30:36 MLFlow versions up to and including 3.4.0 are vulnerable to DNS rebinding attack
CVE-2026-0854 8.8 0.29% 3 0 2026-01-12T06:16:11.040000 Certain DVR/NVR models developed by Merit LILIN has a OS Command Injection vulne
CVE-2025-61686 9.1 0.06% 2 0 2026-01-11T14:53:55 If applications use `createFileSessionStorage()` from `@react-router/node` (or `
CVE-2026-0841 8.8 0.04% 2 0 2026-01-11T09:30:26 A vulnerability was detected in UTT 进取 520W 1.7.7-180627. Affected by this issue
CVE-2026-0840 8.8 0.04% 2 0 2026-01-11T09:30:25 A security vulnerability has been detected in UTT 进取 520W 1.7.7-180627. Affected
CVE-2026-0839 8.8 0.04% 2 0 2026-01-11T06:30:19 A weakness has been identified in UTT 进取 520W 1.7.7-180627. Affected is the func
CVE-2026-0838 8.8 0.04% 2 0 2026-01-11T06:15:57.300000 A security flaw has been discovered in UTT 进取 520W 1.7.7-180627. This impacts th
CVE-2026-0837 8.8 0.04% 2 0 2026-01-11T05:15:58.893000 A vulnerability was identified in UTT 进取 520W 1.7.7-180627. This affects the fun
CVE-2026-0836 8.8 0.04% 2 0 2026-01-11T05:15:47.947000 A vulnerability was determined in UTT 进取 520W 1.7.7-180627. The impacted element
CVE-2025-15505 2.4 0.03% 2 0 2026-01-11T03:30:13 A vulnerability was found in Luxul XWR-600 up to 4.0.1. The affected element is
CVE-2025-15502 7.3 1.04% 1 0 2026-01-10T09:30:24 A vulnerability was identified in Sangfor Operation and Maintenance Management S
CVE-2026-22026 0 0.04% 2 0 2026-01-10T01:16:18.843000 CryptoLib provides a software-only solution using the CCSDS Space Data Link Secu
CVE-2026-22024 0 0.05% 2 0 2026-01-10T01:16:18.553000 CryptoLib provides a software-only solution using the CCSDS Space Data Link Secu
CVE-2026-22023 0 0.04% 2 0 2026-01-10T01:16:18.410000 CryptoLib provides a software-only solution using the CCSDS Space Data Link Secu
CVE-2026-21900 0 0.05% 2 0 2026-01-10T01:16:18.263000 CryptoLib provides a software-only solution using the CCSDS Space Data Link Secu
CVE-2025-65731 6.8 0.03% 1 1 2026-01-09T21:32:41 An issue was discovered in D-Link Router DIR-605L (Hardware version F1; Firmware
CVE-2025-14524 5.3 0.03% 2 0 2026-01-09T21:32:41 When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer p
CVE-2026-0830 7.8 0.03% 1 0 2026-01-09T21:31:41 Processing specially crafted workspace folder names could allow for arbitrary co
CVE-2025-10492 9.8 0.33% 2 1 2026-01-09T19:55:26 A Java deserialisation vulnerability has been discovered in the Jaspersoft Libra
CVE-2025-15035 None 0.03% 1 0 2026-01-09T18:31:43 Improper Input Validation vulnerability in TP-Link Archer AXE75 v1.6 (vpn module
CVE-2025-14598 9.8 0.03% 1 1 2026-01-09T18:31:36 BeeS Software Solutions BET Portal contains an SQL injection vulnerability in th
CVE-2025-64091 8.6 0.04% 1 0 2026-01-09T18:31:35 This vulnerability allows authenticated attackers to execute commands via the NT
CVE-2025-64093 10.0 0.22% 1 0 2026-01-09T18:31:35 Remote Code Execution vulnerability that allows unauthenticated attackers to inj
CVE-2025-64092 7.5 0.06% 1 0 2026-01-09T18:31:35 This vulnerability allows unauthenticated attackers to inject an SQL request int
CVE-2025-64090 10.0 0.06% 1 0 2026-01-09T18:15:49.873000 This vulnerability allows authenticated attackers to execute commands via the ho
CVE-2025-69426 0 0.04% 1 0 2026-01-09T17:15:53.997000 The Ruckus vRIoT IoT Controller firmware versions prior to 3.0.0.0 (GA) contain
CVE-2025-69425 0 0.10% 1 0 2026-01-09T17:15:53.847000 The Ruckus vRIoT IoT Controller firmware versions prior to 3.0.0.0 (GA) expose a
CVE-2025-46645 6.5 0.45% 1 0 2026-01-09T17:15:52.720000 Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Featu
CVE-2025-68613 10.0 8.42% 1 28 template 2026-01-09T16:53:16 ### Impact n8n contains a critical Remote Code Execution (RCE) vulnerability in
CVE-2026-22081 None 0.06% 1 0 2026-01-09T12:32:33 This vulnerability exists in Tenda wireless routers (300Mbps Wireless Router F3
CVE-2025-7072 None 0.12% 1 0 2026-01-09T12:32:33 The firmware in KAON CG3000TC and CG3000T routers contains hard-coded credential
CVE-2026-22080 None 0.03% 1 0 2026-01-09T12:32:32 This vulnerability exists in Tenda wireless routers (300Mbps Wireless Router F3
CVE-2026-22079 None 0.03% 1 0 2026-01-09T12:32:32 This vulnerability exists in Tenda wireless routers (300Mbps Wireless Router F3
CVE-2025-66049 None 0.07% 1 0 2026-01-09T12:32:32 Vivotek IP7137 camera with firmware version 0200a is vulnerable to an informatio
CVE-2026-22082 0 0.18% 1 0 2026-01-09T12:15:54.403000 This vulnerability exists in Tenda wireless routers (300Mbps Wireless Router F3
CVE-2025-69194 8.8 0.03% 1 1 2026-01-09T09:31:24 A security issue was discovered in GNU Wget2 when handling Metalink documents. T
CVE-2025-69195 7.6 0.08% 1 0 2026-01-09T08:15:58.147000 A flaw was found in GNU Wget2. This vulnerability, a stack-based buffer overflow
CVE-2025-70974 10.0 0.06% 1 0 2026-01-09T07:16:02.677000 Fastjson before 1.2.48 mishandles autoType because, when an @type key is in a JS
CVE-2026-0732 6.3 0.54% 1 0 2026-01-09T00:30:34 A vulnerability was found in D-Link DI-8200G 17.12.20A1. This affects an unknown
CVE-2025-12543 9.6 0.13% 2 0 2026-01-09T00:30:28 A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBo
CVE-2025-14025 8.6 0.06% 1 0 2026-01-09T00:30:28 A flaw was found in Ansible Automation Platform (AAP). Read-only scoped OAuth2 A
CVE-2026-0731 5.3 0.13% 1 0 2026-01-08T23:15:44.117000 A vulnerability has been found in TOTOLINK WA1200 5.9c.2914. The impacted elemen
CVE-2025-13151 7.5 0.04% 1 0 2026-01-08T21:30:33 Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to
CVE-2025-59468 9.0 0.22% 2 0 2026-01-08T20:15:43.817000 This vulnerability allows a Backup Administrator to perform remote code executio
CVE-2026-21441 None 0.01% 1 0 2026-01-08T20:05:42 ### Impact urllib3's [streaming API](https://urllib3.readthedocs.io/en/2.6.2/ad
CVE-2025-65518 7.5 0.02% 1 1 2026-01-08T19:15:57.043000 Plesk Obsidian versions 8.0.1 through 18.0.73 are vulnerable to a Denial of Serv
CVE-2025-52691 10.0 10.87% 8 10 template 2026-01-08T19:15:56.283000 Successful exploitation of the vulnerability could allow an unauthenticated atta
CVE-2017-20216 9.8 0.31% 1 0 2026-01-08T19:15:54.793000 FLIR Thermal Camera PT-Series firmware version 8.0.0.64 contains multiple unauth
CVE-2017-20214 7.5 0.03% 1 0 2026-01-08T19:15:54.560000 FLIR Thermal Camera F/FC/PT/D firmware version 8.0.0.64 contains hard-coded SSH
CVE-2025-59470 9.0 0.22% 6 1 2026-01-08T18:30:56 This vulnerability allows a Backup Operator to perform remote code execution (RC
CVE-2025-59469 9.0 0.04% 2 0 2026-01-08T18:30:56 This vulnerability allows a Backup or Tape Operator to write files as root.
CVE-2025-67090 5.1 0.03% 1 0 2026-01-08T18:30:56 The LuCI web interface on Gl Inet GL.Inet AX1800 Version 4.6.4 & 4.6.8 are vulne
CVE-2025-67089 8.1 0.23% 1 0 2026-01-08T18:30:56 A command injection vulnerability exists in the GL-iNet GL-AXT1800 router firmwa
CVE-2025-67091 6.5 0.01% 1 0 2026-01-08T18:30:56 An issue in GL Inet GL.Inet AX1800 Version 4.6.4 & 4.6.8 are vulnerable. GL.Inet
CVE-2026-0625 None 0.43% 2 0 2026-01-08T18:30:33 Multiple D-Link DSL gateway devices contain a command injection vulnerability in
CVE-2025-14346 9.8 0.11% 1 0 2026-01-08T18:09:49.800000 WHILL Model C2 Electric Wheelchairs and Model F Power Chairs do not enforce auth
CVE-2025-68428 0 0.08% 4 1 2026-01-08T18:09:23.230000 jsPDF is a library to generate PDFs in JavaScript. Prior to version 4.0.0, user
CVE-2026-0641 6.3 4.18% 2 0 2026-01-08T18:09:23.230000 A security vulnerability has been detected in TOTOLINK WA300 5.2cu.7112_B2019022
CVE-2020-36925 9.8 0.62% 2 0 2026-01-08T18:09:23.230000 Arteco Web Client DVR/NVR contains a session hijacking vulnerability with insuff
CVE-2025-15471 9.8 0.22% 3 0 2026-01-08T18:09:23.230000 A vulnerability was detected in TRENDnet TEW-713RE 1.02. The impacted element is
CVE-2025-0980 6.4 0.01% 1 0 2026-01-08T18:09:23.230000 Nokia SR Linux is vulnerable to an authentication vulnerability allowing unautho
CVE-2020-36923 9.8 0.09% 1 0 2026-01-08T18:09:23.230000 Sony BRAVIA Digital Signage 1.7.8 contains an insecure direct object reference v
CVE-2020-36920 8.8 0.06% 1 0 2026-01-08T18:09:23.230000 iDS6 DSSPro Digital Signage System 6.2 contains an improper access control vulne
CVE-2020-36916 8.8 0.03% 1 0 2026-01-08T18:09:23.230000 TDM Digital Signage PC Player 4.1.0.4 contains an elevation of privileges vulner
CVE-2020-36907 7.5 0.50% 1 0 2026-01-08T18:09:23.230000 Aerohive HiveOS contains a denial of service vulnerability in the NetConfig UI t
CVE-2020-36914 7.5 0.04% 1 0 2026-01-08T18:09:23.230000 QiHang Media Web Digital Signage 3.0.9 contains a sensitive information disclosu
CVE-2020-36922 7.5 0.11% 1 0 2026-01-08T18:09:23.230000 Sony BRAVIA Digital Signage 1.7.8 contains an information disclosure vulnerabili
CVE-2025-61489 6.5 3.07% 1 0 2026-01-08T18:08:54.147000 A command injection vulnerability in the shell_exec function of sonirico mcp-she
CVE-2026-20029 4.9 0.03% 2 0 2026-01-08T18:08:54.147000 A vulnerability in the licensing features of&nbsp;Cisco Identity Services Engine
CVE-2026-22536 0 0.01% 1 0 2026-01-08T18:08:54.147000 The absence of permissions control for the user XXX allows the current configura
CVE-2026-20027 5.3 0.03% 1 0 2026-01-08T18:08:54.147000 Multiple Cisco products are affected by a vulnerability in the processing of DCE
CVE-2025-15346 0 0.06% 1 0 2026-01-08T18:08:18.457000 A vulnerability in the handling of verify_mode = CERT_REQUIRED in the wolfssl Py
CVE-2025-15079 5.3 0.03% 2 0 2026-01-08T18:08:18.457000 When doing SSH-based transfers using either SCP or SFTP, and setting the known_h
CVE-2025-13034 5.9 0.02% 2 0 2026-01-08T18:08:18.457000 When using `CURLOPT_PINNEDPUBLICKEY` option with libcurl or `--pinnedpubkey` wit
CVE-2025-15224 3.1 0.05% 2 0 2026-01-08T15:32:30 When doing SSH-based transfers using either SCP or SFTP, and asked to do public
CVE-2025-14819 5.3 0.03% 2 0 2026-01-08T15:32:29 When doing TLS related transfers with reused easy or multi handles and altering
CVE-2025-69260 7.5 0.09% 3 0 2026-01-08T15:31:29 A message out-of-bounds read vulnerability in Trend Micro Apex Central could all
CVE-2025-69259 7.5 0.09% 3 0 2026-01-08T15:31:29 A message unchecked NULL return value vulnerability in Trend Micro Apex Central
CVE-2025-69258 9.8 0.15% 5 0 2026-01-08T15:31:28 A LoadLibraryEX vulnerability in Trend Micro Apex Central could allow an unauthe
CVE-2025-14017 None 0.01% 2 0 2026-01-08T12:30:38 When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl, changing
CVE-2009-0556 8.8 76.76% 6 0 2026-01-08T02:00:02.163000 Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3, and PowerPoint in
CVE-2025-37164 10.0 81.31% 4 3 template 2026-01-08T00:32:16 A remote code execution issue exists in HPE OneView.
CVE-2025-62224 5.5 0.06% 2 0 2026-01-08T00:31:21 User interface (ui) misrepresentation of critical information in Microsoft Edge
CVE-2017-20213 7.5 0.10% 1 0 2026-01-08T00:31:21 FLIR Thermal Camera F/FC/PT/D Stream firmware version 8.0.0.64 contains an unaut
CVE-2017-20215 8.8 0.26% 1 0 2026-01-08T00:31:21 FLIR Thermal Camera FC-S/PT firmware version 8.0.0.64 contains an authenticated
CVE-2017-20212 6.2 0.19% 1 0 2026-01-08T00:31:21 FLIR Thermal Camera F/FC/PT/D firmware version 8.0.0.64 contains an information
CVE-2026-20026 5.8 0.09% 1 0 2026-01-07T18:30:33 Multiple&nbsp;Cisco products are affected by a vulnerability in the processing o
CVE-2026-22542 None 0.04% 1 0 2026-01-07T18:30:33 An attacker with access to the system's internal network can cause a denial of s
CVE-2026-22541 None 0.04% 1 0 2026-01-07T18:30:33 The massive sending of ICMP requests causes a denial of service on one of the bo
CVE-2025-69277 4.5 0.02% 1 0 2026-01-07T17:16:02.003000 libsodium before ad3004e, in atypical use cases involving certain custom cryptog
CVE-2026-0628 8.8 0.02% 2 1 2026-01-07T15:31:20 Insufficient policy enforcement in WebView tag in Google Chrome prior to 143.0.7
CVE-2025-6225 None 0.89% 2 0 2026-01-07T15:30:25 Kieback&Peter Neutrino-GLT product is used for building management. It's web com
CVE-2026-22540 None 0.04% 1 0 2026-01-07T15:30:25 The massive sending of ARP requests causes a denial of service on one board of t
CVE-2025-38352 7.4 0.25% 7 3 2026-01-07T15:30:14 In the Linux kernel, the following vulnerability has been resolved: posix-cpu-t
CVE-2025-68926 9.8 3.14% 1 2 template 2026-01-07T15:22:22 ## Vulnerability Overview ### Description RustFS implements gRPC authenticatio
CVE-2025-15472 7.2 0.17% 1 0 2026-01-07T12:31:32 A flaw has been found in TRENDnet TEW-811DRU 1.0.2.0. This affects the function
CVE-2025-14631 None 0.02% 1 0 2026-01-07T12:31:27 A NULL Pointer Dereference vulnerability in TP-Link Archer BE400 V1(802.11 modul
CVE-2020-36913 5.3 0.10% 1 0 2026-01-06T21:31:40 All-Dynamics Software enlogic:show 2.0.2 contains a session fixation vulnerabili
CVE-2025-63525 9.6 0.03% 1 0 2026-01-06T21:15:43.240000 An issue was discovered in Blood Bank Management System 1.0 allowing authenticat
CVE-2026-0640 8.8 0.09% 1 0 2026-01-06T18:31:44 A weakness has been identified in Tenda AC23 16.03.07.52. This affects the funct
CVE-2025-39477 9.8 0.05% 1 0 2026-01-06T18:31:43 Missing Authorization vulnerability in Sfwebservice InWave Jobs allows Exploitin
CVE-2020-36924 7.5 0.08% 1 0 2026-01-06T18:31:43 Sony BRAVIA Digital Signage 1.7.8 contains a remote file inclusion vulnerability
CVE-2025-60262 9.8 0.14% 1 0 2026-01-06T18:31:43 An issue in H3C M102G HM1A0V200R010 wireless controller and BA1500L SWBA1A0V100R
CVE-2020-36917 7.5 0.07% 1 0 2026-01-06T18:31:42 iDS6 DSSPro Digital Signage System 6.2 contains a sensitive information disclosu
CVE-2020-36912 9.8 0.06% 1 0 2026-01-06T18:31:42 Plexus anblick Digital Signage Management 3.1.13 contains an open redirect vulne
CVE-2020-36921 7.5 0.23% 1 0 2026-01-06T18:31:42 RED-V Super Digital Signage System 5.1.1 contains an information disclosure vuln
CVE-2020-36906 4.3 0.02% 1 0 2026-01-06T18:31:42 P5 FNIP-8x16A FNIP-4xSH 1.0.20 contains a cross-site request forgery vulnerabili
CVE-2020-36909 6.5 0.04% 1 0 2026-01-06T18:31:42 SnapGear Management Console SG560 3.1.5 contains a file manipulation vulnerabili
CVE-2020-36918 4.3 0.02% 1 0 2026-01-06T18:31:42 iDS6 DSSPro Digital Signage System 6.2 contains a cross-site request forgery vul
CVE-2020-36910 8.8 0.43% 1 0 2026-01-06T18:31:42 Cayin Signage Media Player 3.0 contains an authenticated remote command injectio
CVE-2020-36915 7.5 0.05% 1 0 2026-01-06T18:31:35 Adtec Digital SignEdje Digital Signage Player v2.08.28 contains multiple hardcod
CVE-2020-36908 5.3 0.02% 1 0 2026-01-06T18:31:34 SnapGear Management Console SG560 version 3.1.5 contains a cross-site request fo
CVE-2020-36905 7.5 0.07% 1 0 2026-01-06T18:31:33 FIBARO System Home Center 5.021 contains a remote file inclusion vulnerability i
CVE-2025-54957 6.5 0.05% 3 1 2026-01-06T18:31:24 An issue was discovered in Dolby UDC 4.5 through 4.13. A crash of the DD+ decode
CVE-2026-21877 10.0 0.05% 6 1 2026-01-06T17:48:25 ### Impact n8n is affected by an authenticated Remote Code Execution (RCE) vulne
CVE-2025-68455 None 0.57% 1 0 2026-01-06T15:52:19 Note that attackers must have administrator access to the Craft Control Panel fo
CVE-2025-14997 7.2 0.61% 1 0 2026-01-06T06:31:32 The BuddyPress Xprofile Custom Field Types plugin for WordPress is vulnerable to
CVE-2025-12793 None 0.02% 1 0 2026-01-06T03:31:42 An uncontrolled DLL loading path vulnerability exists in AsusSoftwareManagerAgen
CVE-2026-21633 8.8 0.02% 1 0 2026-01-05T21:31:37 A malicious actor with access to the adjacent network could obtain unauthorized
CVE-2025-68668 9.9 0.10% 2 0 2026-01-05T19:06:07 ### Impact A sandbox bypass vulnerability exists in the Python Code Node that us
CVE-2025-12514 7.2 0.02% 1 0 2026-01-05T12:31:32 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2025-54890 6.8 0.02% 1 0 2026-01-05T12:31:32 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site
CVE-2025-8460 6.8 0.02% 1 0 2026-01-05T10:15:58.160000 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site
CVE-2026-21440 None 0.32% 2 3 2026-01-03T00:32:10 ### Summary **Description** A Path Traversal (CWE-22) vulnerability in AdonisJS
CVE-2025-13915 9.8 0.37% 2 0 2025-12-31T21:37:43.290000 IBM API Connect 10.0.8.0 through 10.0.8.5, and 10.0.11.0 could allow a remote at
CVE-2025-66516 8.4 0.02% 1 4 2025-12-30T16:15:46.230000 Critical XXE in Apache Tika tika-core (1.13-3.2.1), tika-pdf-module (2.0.0-3.2.1
CVE-2025-13836 9.1 0.09% 1 0 2025-12-30T15:30:26 When reading an HTTP response from a server, if no read amount is specified, the
CVE-2024-12087 6.5 2.36% 1 0 2025-12-22T15:30:20 A path traversal vulnerability exists in rsync. It stems from behavior enabled b
CVE-2025-2486 8.8 0.02% 1 0 2025-12-19T18:31:07 The Ubuntu edk2 UEFI firmware packages accidentally allowed the UEFI Shell to be
CVE-2025-55182 10.0 62.33% 2 100 template 2025-12-10T02:00:02.557000 A pre-authentication remote code execution vulnerability exists in React Server
CVE-2025-66471 None 0.02% 1 0 2025-12-05T18:33:09 ### Impact urllib3's [streaming API](https://urllib3.readthedocs.io/en/2.5.0/ad
CVE-2025-66032 9.8 0.15% 1 0 2025-12-05T16:29:42.130000 Claude Code is an agentic coding tool. Prior to 1.0.93, Due to errors in parsing
CVE-2025-1910 None 0.02% 1 1 2025-12-05T00:31:05 The WatchGuard Mobile VPN with SSL Client on Windows allows a locally authentic
CVE-2025-64126 10.0 5.60% 1 0 2025-12-01T15:39:53.100000 An OS command injection vulnerability exists due to improper input validation.
CVE-2025-64128 10.0 5.60% 1 0 2025-12-01T15:39:53.100000 An OS command injection vulnerability exists due to incomplete validation of us
CVE-2025-64130 9.8 0.15% 1 0 2025-12-01T15:39:53.100000 Zenitel TCIV-3+ is vulnerable to a reflected cross-site scripting vulnerability
CVE-2025-13601 7.7 0.02% 1 0 2025-12-01T15:39:53.100000 A heap-based buffer overflow problem was found in glib through an incorrect calc
CVE-2025-64129 7.6 0.17% 1 0 2025-11-26T18:31:15 Zenitel TCIV-3+ is vulnerable to an out-of-bounds write vulnerability, which co
CVE-2025-64127 10.0 5.60% 1 0 2025-11-26T18:31:15 An OS command injection vulnerability exists due to insufficient sanitization o
CVE-2025-64496 7.3 0.25% 1 0 2025-11-26T15:36:09.183000 Open WebUI is a self-hosted artificial intelligence platform designed to operate
CVE-2025-6389 9.8 0.37% 1 3 2025-11-25T22:16:16.690000 The Sneeit Framework plugin for WordPress is vulnerable to Remote Code Execution
CVE-2025-64432 4.7 0.01% 1 0 2025-11-17T21:44:47 ### Summary _Short summary of the problem. Make the impact and severity as clear
CVE-2025-40300 None 0.08% 1 0 2025-11-17T18:30:25 In the Linux kernel, the following vulnerability has been resolved: x86/vmscape
CVE-2025-60188 7.5 2.72% 1 1 template 2025-11-17T16:15:48.830000 Insertion of Sensitive Information Into Sent Data vulnerability in Vito Peleg At
CVE-2025-6430 6.1 0.05% 1 0 2025-11-03T21:35:11 When a file download is specified via the `Content-Disposition` header, that dir
CVE-2025-4802 7.8 0.01% 1 1 2025-11-03T20:19:11.153000 Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Librar
CVE-2025-31161 9.8 82.33% 1 16 template 2025-10-31T22:04:34.230000 CrushFTP 10 before 10.8.4 and 11 before 11.3.1 allows authentication bypass and
CVE-2025-22226 7.1 3.96% 1 0 2025-10-30T19:52:41.973000 VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerabi
CVE-2021-44228 10.0 94.36% 1 100 template 2025-10-22T19:13:26 # Summary Log4j versions prior to 2.16.0 are subject to a remote code execution
CVE-2025-22224 9.4 51.47% 2 0 2025-10-22T00:34:17 VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulner
CVE-2025-22225 8.3 6.33% 1 0 2025-10-22T00:33:13 VMware ESXi contains an arbitrary write vulnerability. A malicious actor with pr
CVE-2025-11155 0 0.02% 1 0 2025-09-29T19:34:10.030000 The credentials required to access the device's web server are sent in base64 wi
CVE-2025-59815 9.1 0.06% 1 0 2025-09-25T21:30:37 This vulnerability allows malicious actors to execute arbitrary commands on the
CVE-2025-59817 9.1 0.04% 1 0 2025-09-25T21:30:37 This vulnerability allows attackers to execute arbitrary commands on the underly
CVE-2025-59814 9.8 0.08% 1 0 2025-09-25T21:30:36 This vulnerability allows malicious actors to gain unauthorized access to the Ze
CVE-2025-59816 8.1 0.10% 1 0 2025-09-25T21:30:36 This vulnerability allows attackers to directly query the underlying database, p
CVE-2025-50173 7.8 0.12% 2 0 2025-08-12T18:31:39 Weak authentication in Windows Installer allows an authorized attacker to elevat
CVE-2025-47987 7.8 0.08% 5 1 2025-07-14T17:38:41.223000 Heap-based buffer overflow in Windows Cred SSProvider Protocol allows an authori
CVE-2025-6842 4.7 0.03% 1 1 2025-07-01T14:47:11.290000 A vulnerability was found in code-projects Product Inventory System 1.0 and clas
CVE-2025-47934 0 0.03% 1 0 2025-05-21T20:25:16.407000 OpenPGP.js is a JavaScript implementation of the OpenPGP protocol. Startinf in v
CVE-2024-55947 8.8 1.60% 1 0 2025-04-10T22:56:52 ### Impact The malicious user is able to write a file to an arbitrary path on t
CVE-2022-25845 8.1 89.92% 1 6 2024-11-21T06:53:06.320000 The package com.alibaba:fastjson before 1.2.83 are vulnerable to Deserialization
CVE-2022-23128 9.8 3.77% 1 0 2024-11-21T06:48:03.407000 Incomplete List of Disallowed Inputs vulnerability in Mitsubishi Electric MC Wor
CVE-2024-38063 9.8 90.06% 1 29 2024-08-13T18:31:24 Windows TCP/IP Remote Code Execution Vulnerability
CVE-2024-2537 4.4 0.06% 1 1 2024-03-15T18:30:45 Improper Control of Dynamically-Managed Code Resources vulnerability in Logitech
CVE-2017-18349 9.8 92.08% 1 1 template 2023-09-26T14:52:01 parseObject in Fastjson before 1.2.25, as used in FastjsonEngine in Pippo 1.11.0
CVE-2026-22814 0 0.00% 1 0 N/A
CVE-2026-22794 0 0.00% 1 0 N/A
CVE-2026-22788 0 0.00% 1 0 N/A
CVE-2025-5017 0 0.00% 2 0 N/A
CVE-2026-22783 0 0.00% 1 0 N/A
CVE-2026-21898 0 0.05% 2 0 N/A
CVE-2026-22027 0 0.01% 2 0 N/A
CVE-2026-22697 0 0.07% 2 0 N/A
CVE-2026-22025 0 0.04% 2 0 N/A
CVE-2026-21897 0 0.04% 2 0 N/A
CVE-2026-21899 0 0.03% 2 0 N/A
CVE-2025-64424 0 0.66% 1 0 N/A
CVE-2026-21876 0 0.03% 4 1 N/A
CVE-2025-14338 0 0.00% 1 0 N/A
CVE-2025-66005 0 0.00% 1 0 N/A
CVE-2025-59819 0 0.00% 1 0 N/A
CVE-2025-59818 0 0.00% 1 0 N/A
CVE-2025-63261 0 0.00% 1 0 N/A
CVE-2026-21881 0 0.07% 1 0 N/A
CVE-2025-67724 0 0.04% 1 0 N/A
CVE-2025-69222 0 0.09% 1 0 N/A
CVE-2025-67859 0 0.00% 1 0 N/A
CVE-2025-69139 0 0.00% 1 0 N/A
CVE-2025-14558 0 0.00% 1 2 N/A
CVE-2025-65606 0 0.00% 2 0 N/A
CVE-2025-68615 0 0.04% 1 1 N/A

CVE-2025-40944
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-13T10:15:58.457000

1 posts

A vulnerability has been identified in SIMATIC ET 200AL IM 157-1 PN (6ES7157-1AB00-0AB0) (All versions), SIMATIC ET 200MP IM 155-5 PN HF (6ES7155-5AA00-0AC0) (All versions >= V4.2.0), SIMATIC ET 200SP IM 155-6 MF HF (6ES7155-6MU00-0CN0) (All versions), SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants) (All versions < V1.3), SIMATIC ET 200SP IM 155-6 PN R1 (6ES7155-6AU00-0HM0) (All versions <

thehackerwire@mastodon.social at 2026-01-13T11:01:30.000Z ##

🟠 CVE-2025-40944 - High (7.5)

A vulnerability has been identified in SIMATIC ET 200AL IM 157-1 PN (6ES7157-1AB00-0AB0) (All versions), SIMATIC ET 200MP IM 155-5 PN HF (6ES7155-5AA00-0AC0) (All versions >= V4.2.0), SIMATIC ET 200SP IM 155-6 MF HF (6ES7155-6MU00-0CN0) (All versi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-40942
(8.8 HIGH)

EPSS: 0.00%

updated 2026-01-13T10:15:58.283000

2 posts

A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.4). Affected application contains a local privilege escalation vulnerability that could allow an attacker to run arbitrary code with elevated privileges.

thehackerwire@mastodon.social at 2026-01-13T11:36:16.000Z ##

🟠 CVE-2025-40942 - High (8.8)

A vulnerability has been identified in TeleControl Server Basic (All versions &lt; V3.1.2.4). Affected application contains a local privilege escalation vulnerability that could allow an attacker to run arbitrary code with elevated privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-13T11:01:28.000Z ##

🟠 CVE-2025-40942 - High (8.8)

A vulnerability has been identified in TeleControl Server Basic (All versions &lt; V3.1.2.4). Affected application contains a local privilege escalation vulnerability that could allow an attacker to run arbitrary code with elevated privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-40805
(10.0 CRITICAL)

EPSS: 0.00%

updated 2026-01-13T10:15:58.047000

1 posts

Affected devices do not properly enforce user authentication on specific API endpoints. This could facilitate an unauthenticated remote attacker to circumvent authentication and impersonate a legitimate user. Successful exploitation requires that the attacker has learned the identity of a legitimate user.

thehackerwire@mastodon.social at 2026-01-13T11:01:20.000Z ##

🔴 CVE-2025-40805 - Critical (10)

Affected devices do not properly enforce user authentication on specific API endpoints. This could facilitate an unauthenticated remote attacker to circumvent authentication and impersonate a legitimate user. Successful exploitation requires that ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-41717
(8.8 HIGH)

EPSS: 0.00%

updated 2026-01-13T09:31:36

2 posts

An unauthenticated remote attacker can trick a high privileged user into uploading a malicious payload via the config-upload endpoint, leading to code injection as root. This results in a total loss of confidentiality, availability and integrity due to improper control of code generation ('Code Injection’).

certvde at 2026-01-13T08:22:14.359Z ##

VDE-2025-073
Phoenix Contact: Security Advisory for TC ROUTER and CLOUD CLIENT Industrial mobile network routers

A code injection vulnerability at the upload-config endpoint in the firmware of TC ROUTER and CLOUD CLIENT Industrial Mobile network routers has been discovered that can be exploited by an high privileged attacker.
CVE-2025-41717

certvde.com/en/advisories/vde-

phoenixcontact.csaf-tp.certvde

##

thehackerwire@mastodon.social at 2026-01-13T08:19:12.000Z ##

🟠 CVE-2025-41717 - High (8.8)

An unauthenticated remote attacker can trick a high privileged user into uploading a malicious payload via the config-upload endpoint, leading to code injection as root. This results in a total loss of confidentiality, availability and integrity d...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0492
(8.8 HIGH)

EPSS: 0.00%

updated 2026-01-13T03:32:20

1 posts

SAP HANA database is vulnerable to privilege escalation allowing an attacker with valid credentials of any user to switch to another user potentially gaining administrative access. This exploit could result in a total compromise of the system�s confidentiality, integrity, and availability.

thehackerwire@mastodon.social at 2026-01-13T04:01:21.000Z ##

🟠 CVE-2026-0492 - High (8.8)

SAP HANA database is vulnerable to privilege escalation allowing an attacker with valid credentials of any user to switch to another user potentially gaining administrative access. This exploit could result in a total compromise of the system�s ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0501
(10.0 CRITICAL)

EPSS: 0.00%

updated 2026-01-13T03:32:20

1 posts

Due to insufficient input validation in SAP S/4HANA Private Cloud and On-Premise (Financials General Ledger), an authenticated user could execute crafted SQL queries to read, modify, and delete backend database data. This leads to a high impact on the confidentiality, integrity, and availability of the application.

thehackerwire@mastodon.social at 2026-01-13T04:01:11.000Z ##

🔴 CVE-2026-0501 - Critical (9.9)

Due to insufficient input validation in SAP S/4HANA Private Cloud and On-Premise (Financials General Ledger), an authenticated user could execute crafted SQL queries to read, modify, and delete backend database data. This leads to a high impact on...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-66177
(8.8 HIGH)

EPSS: 0.00%

updated 2026-01-13T03:32:20

1 posts

There is a Stack overflow Vulnerability in the device Search and Discovery feature of Hikvision NVR/DVR/CVR/IPC models. If exploited, an attacker on the same local area network (LAN) could cause the device to malfunction by sending specially crafted packets to an unpatched device.

thehackerwire@mastodon.social at 2026-01-13T03:54:35.000Z ##

🟠 CVE-2025-66177 - High (8.8)

There is a Stack overflow Vulnerability in the device Search and Discovery feature of Hikvision NVR/DVR/CVR/IPC models. If exploited, an attacker on the same local area network (LAN) could cause the device to malfunction by sending specially craft...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-66176
(8.8 HIGH)

EPSS: 0.00%

updated 2026-01-13T03:32:20

1 posts

There is a Stack overflow Vulnerability in the device Search and Discovery feature of Hikvision Access Control Products. If exploited, an attacker on the same local area network (LAN) could cause the device to malfunction by sending specially crafted packets to an unpatched device.

thehackerwire@mastodon.social at 2026-01-13T03:54:25.000Z ##

🟠 CVE-2025-66176 - High (8.8)

There is a Stack overflow Vulnerability in the device Search and Discovery feature of Hikvision Access Control Products. If exploited, an attacker on the same local area network (LAN) could cause the device to malfunction by sending specially craf...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0511
(8.1 HIGH)

EPSS: 0.00%

updated 2026-01-13T03:32:20

1 posts

SAP Fiori App Intercompany Balance Reconciliation does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This has high impact on confidentiality and integrity of the application ,availability is not impacted.

thehackerwire@mastodon.social at 2026-01-13T03:00:37.000Z ##

🟠 CVE-2026-0511 - High (8.1)

SAP Fiori App Intercompany Balance Reconciliation does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This has high impact on confidentiality and integrity of the application ,availabil...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0507
(8.5 HIGH)

EPSS: 0.00%

updated 2026-01-13T03:32:20

1 posts

Due to an OS Command Injection vulnerability in SAP Application Server for ABAP and SAP NetWeaver RFCSDK, an authenticated attacker with administrative access and adjacent network access could upload specially crafted content to the server. If processed by the application, this content enables execution of arbitrary operating system commands. Successful exploitation could lead to full compromise o

thehackerwire@mastodon.social at 2026-01-13T03:00:26.000Z ##

🟠 CVE-2026-0507 - High (8.4)

Due to an OS Command Injection vulnerability in SAP Application Server for ABAP and SAP NetWeaver RFCSDK, an authenticated attacker with administrative access and adjacent network access could upload specially crafted content to the server. If pro...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0506
(8.1 HIGH)

EPSS: 0.00%

updated 2026-01-13T03:32:20

1 posts

Due to a Missing Authorization Check vulnerability in Application Server ABAP and ABAP Platform, an authenticated attacker could misuse an RFC function to execute form routines (FORMs) in the ABAP system. Successful exploitation could allow the attacker to write or modify data accessible via FORMs and invoke system functionality exposed via FORMs, resulting in a high impact on integrity and availa

thehackerwire@mastodon.social at 2026-01-13T03:00:17.000Z ##

🟠 CVE-2026-0506 - High (8.1)

Due to a Missing Authorization Check vulnerability in Application Server ABAP and ABAP Platform, an authenticated attacker could misuse an RFC function to execute form routines (FORMs) in the ABAP system. Successful exploitation could allow the at...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0491
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-01-13T03:32:19

1 posts

SAP Landscape Transformation allows an attacker with admin privileges to exploit a vulnerability in the function module exposed via RFC. This flaw enables the injection of arbitrary ABAP code/OS commands into the system, bypassing essential authorization checks. This vulnerability effectively functions as a backdoor, creating the risk of full system compromise, undermining the confidentiality, int

thehackerwire@mastodon.social at 2026-01-13T07:01:36.000Z ##

🔴 CVE-2026-0491 - Critical (9.1)

SAP Landscape Transformation allows an attacker with admin privileges to exploit a vulnerability in the function module exposed via RFC. This flaw enables the injection of arbitrary ABAP code/OS commands into the system, bypassing essential author...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0500
(9.7 CRITICAL)

EPSS: 0.00%

updated 2026-01-13T03:32:19

1 posts

Due to the usage of vulnerable third party component in SAP Wily Introscope Enterprise Manager (WorkStation), an unauthenticated attacker could create a malicious JNLP (Java Network Launch Protocol) file accessible by a public facing URL. When a victim clicks on the URL the accessed Wily Introscope Server could execute OS commands on the victim's machine. This could completely compromising confide

thehackerwire@mastodon.social at 2026-01-13T04:01:00.000Z ##

🔴 CVE-2026-0500 - Critical (9.6)

Due to the usage of vulnerable third party component in SAP Wily Introscope Enterprise Manager (WorkStation), an unauthenticated attacker could create a malicious JNLP (Java Network Launch Protocol) file accessible by a public facing URL. When a v...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-12420
(0 None)

EPSS: 0.00%

updated 2026-01-13T03:16:00.773000

4 posts

A vulnerability has been identified in the ServiceNow AI Platform that could enable an unauthenticated user to impersonate another user and perform the operations that the impersonated user is entitled to perform. ServiceNow has addressed this vulnerability by deploying a relevant security update to  hosted instances in October 2025. Security updates have also been provided to ServiceNow self-hos

jbhall56 at 2026-01-13T12:54:25.014Z ##

The vulnerability, tracked as CVE-2025-12420, carries a CVSS score of 9.3 out of 10.0. thehackernews.com/2026/01/serv

##

cR0w at 2026-01-12T21:59:35.960Z ##

sev:CRIT auth bypass in SNOW.

cve.org/CVERecord?id=CVE-2025-

A vulnerability has been identified in the ServiceNow AI Platform that could enable an unauthenticated user to impersonate another user and perform the operations that the impersonated user is entitled to perform. ServiceNow has addressed this vulnerability by deploying a relevant security update to hosted instances in October 2025. Security updates have also been provided to ServiceNow self-hosted customers, partners, and hosted customers with unique configurations. Additionally, the vulnerability is addressed in the listed Store App versions. We recommend that customers promptly apply an appropriate security update or upgrade if they have not already done so.

##

jbhall56@infosec.exchange at 2026-01-13T12:54:25.000Z ##

The vulnerability, tracked as CVE-2025-12420, carries a CVSS score of 9.3 out of 10.0. thehackernews.com/2026/01/serv

##

cR0w@infosec.exchange at 2026-01-12T21:59:35.000Z ##

sev:CRIT auth bypass in SNOW.

cve.org/CVERecord?id=CVE-2025-

A vulnerability has been identified in the ServiceNow AI Platform that could enable an unauthenticated user to impersonate another user and perform the operations that the impersonated user is entitled to perform. ServiceNow has addressed this vulnerability by deploying a relevant security update to hosted instances in October 2025. Security updates have also been provided to ServiceNow self-hosted customers, partners, and hosted customers with unique configurations. Additionally, the vulnerability is addressed in the listed Store App versions. We recommend that customers promptly apply an appropriate security update or upgrade if they have not already done so.

##

CVE-2026-0498
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-01-13T02:15:52.300000

1 posts

SAP S/4HANA (Private Cloud and On-Premise) allows an attacker with admin privileges to exploit a vulnerability in the function module exposed via RFC. This flaw enables the injection of arbitrary ABAP code/OS commands into the system, bypassing essential authorization checks. This vulnerability effectively functions as a backdoor, creating the risk of full system compromise, undermining the confid

thehackerwire@mastodon.social at 2026-01-13T03:54:46.000Z ##

🔴 CVE-2026-0498 - Critical (9.1)

SAP S/4HANA (Private Cloud and On-Premise) allows an attacker with admin privileges to exploit a vulnerability in the function module exposed via RFC. This flaw enables the injection of arbitrary ABAP code/OS commands into the system, bypassing es...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-67146
(9.4 CRITICAL)

EPSS: 0.00%

updated 2026-01-13T00:30:57

1 posts

Multiple SQL Injection vulnerabilities exist in AbhishekMali21 GYM-MANAGEMENT-SYSTEM 1.0 via the 'name' parameter in (1) member_search.php, (2) trainer_search.php, and (3) gym_search.php, and via the 'id' parameter in (4) payment_search.php. An unauthenticated remote attacker can exploit these issues to inject malicious SQL commands, leading to unauthorized data extraction, authentication bypass,

thehackerwire@mastodon.social at 2026-01-12T23:01:33.000Z ##

🔴 CVE-2025-67146 - Critical (9.4)

Multiple SQL Injection vulnerabilities exist in AbhishekMali21 GYM-MANAGEMENT-SYSTEM 1.0 via the 'name' parameter in (1) member_search.php, (2) trainer_search.php, and (3) gym_search.php, and via the 'id' parameter in (4) payment_search.php. An un...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22813
(0 None)

EPSS: 0.00%

updated 2026-01-12T23:15:53.523000

2 posts

OpenCode is an open source AI coding agent. The markdown renderer used for LLM responses will insert arbitrary HTML into the DOM. There is no sanitization with DOMPurify or even a CSP on the web interface to prevent JavaScript execution via HTML injection. This means controlling the LLM response for a chat session gets JavaScript execution on the http://localhost:4096 origin. This vulnerability is

beyondmachines1 at 2026-01-13T12:01:43.624Z ##

OpenCode patches critical RCE flaw in Web UI

OpenCode patched a critical XSS vulnerability (CVE-2026-22813) that allowed malicious websites to execute arbitrary commands on a user's local system by abusing the tool's internal API.

**If you are using OpenCode, update to version 1.1.10 ASAP to disable the vulnerable web UI and API. Avoid clicking untrusted links, check underling URLs and don't click on any links that you haven't crafted but point to your local machine's ports .**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-01-13T12:01:43.000Z ##

OpenCode patches critical RCE flaw in Web UI

OpenCode patched a critical XSS vulnerability (CVE-2026-22813) that allowed malicious websites to execute arbitrary commands on a user's local system by abusing the tool's internal API.

**If you are using OpenCode, update to version 1.1.10 ASAP to disable the vulnerable web UI and API. Avoid clicking untrusted links, check underling URLs and don't click on any links that you haven't crafted but point to your local machine's ports .**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-22812
(8.8 HIGH)

EPSS: 0.00%

updated 2026-01-12T23:15:53.370000

2 posts

OpenCode is an open source AI coding agent. Prior to 1.0.216, OpenCode automatically starts an unauthenticated HTTP server that allows any local process (or any website via permissive CORS) to execute arbitrary shell commands with the user's privileges. This vulnerability is fixed in 1.0.216.

mastokukei@social.josko.org at 2026-01-13T09:01:31.000Z ##

CVEs in OSS: CVE-2026-22812 (OpenCode RCE) and CVE-2026-22804 (Termix XSS) highlighted.

- Asahi Linux on Apple Silicon: porting Linux to Apple Silicon status and progress.

- The next two years of software engineering: Addy Osmani’s forecast for the industry. [2/2]

##

thehackerwire@mastodon.social at 2026-01-12T23:57:16.000Z ##

🟠 CVE-2026-22812 - High (8.8)

OpenCode is an open source AI coding agent. Prior to 1.0.216, OpenCode automatically starts an unauthenticated HTTP server that allows any local process (or any website via permissive CORS) to execute arbitrary shell commands with the user's privi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22804
(8.0 HIGH)

EPSS: 0.00%

updated 2026-01-12T23:15:53.063000

2 posts

Termix is a web-based server management platform with SSH terminal, tunneling, and file editing capabilities. From 1.7.0 to 1.9.0, Stored Cross-Site Scripting (XSS) vulnerability exists in the Termix File Manager component. The application fails to sanitize SVG file content before rendering it. This allows an attacker who has compromised a managed SSH server to plant a malicious file, which, when

1 repos

https://github.com/ThemeHackers/CVE-2026-22804

mastokukei@social.josko.org at 2026-01-13T09:01:31.000Z ##

CVEs in OSS: CVE-2026-22812 (OpenCode RCE) and CVE-2026-22804 (Termix XSS) highlighted.

- Asahi Linux on Apple Silicon: porting Linux to Apple Silicon status and progress.

- The next two years of software engineering: Addy Osmani’s forecast for the industry. [2/2]

##

thehackerwire@mastodon.social at 2026-01-12T23:57:06.000Z ##

🟠 CVE-2026-22804 - High (8)

Termix is a web-based server management platform with SSH terminal, tunneling, and file editing capabilities. From 1.7.0 to 1.9.0, Stored Cross-Site Scripting (XSS) vulnerability exists in the Termix File Manager component. The application fails t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-67147
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-01-12T22:16:07.970000

1 posts

Multiple SQL Injection vulnerabilities exist in amansuryawanshi Gym-Management-System-PHP 1.0 via the 'name', 'email', and 'comment' parameters in (1) submit_contact.php, the 'username' and 'pass_key' parameters in (2) secure_login.php, and the 'login_id', 'pwfield', and 'login_key' parameters in (3) change_s_pwd.php. An unauthenticated or authenticated attacker can exploit these issues to bypass

thehackerwire@mastodon.social at 2026-01-12T23:01:42.000Z ##

🔴 CVE-2025-67147 - Critical (9.8)

Multiple SQL Injection vulnerabilities exist in amansuryawanshi Gym-Management-System-PHP 1.0 via the 'name', 'email', and 'comment' parameters in (1) submit_contact.php, the 'username' and 'pass_key' parameters in (2) secure_login.php, and the 'l...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-63314
(10.0 CRITICAL)

EPSS: 0.00%

updated 2026-01-12T21:31:38

1 posts

A static password reset token in the password reset function of DDSN Interactive Acora CMS v10.7.1 allows attackers to arbitrarily reset the user password and execute a full account takeover via a replay attack.

1 repos

https://github.com/padayali-JD/CVE-2025-63314

thehackerwire@mastodon.social at 2026-01-12T20:13:55.000Z ##

🔴 CVE-2025-63314 - Critical (10)

A static password reset token in the password reset function of DDSN Interactive Acora CMS v10.7.1 allows attackers to arbitrarily reset the user password and execute a full account takeover via a replay attack.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-66689
(6.5 MEDIUM)

EPSS: 0.00%

updated 2026-01-12T21:31:38

2 posts

A path traversal vulnerability exists in Zen MCP Server before 9.8.2 that allows authenticated attackers to read arbitrary files on the system. The vulnerability is caused by flawed logic in the is_dangerous_path() validation function that uses exact string matching against a blacklist of system directories. Attackers can bypass these restrictions by accessing subdirectories of blacklisted paths.

CVE-2025-51567
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-01-12T21:30:42

1 posts

A SQL Injection was found in the /exam/user/profile.php page of kashipara Online Exam System V1.0, which allows remote attackers to execute arbitrary SQL command to get unauthorized database access via the rname, rcollage, rnumber, rgender and rpassword parameters in a POST HTTP request.

thehackerwire@mastodon.social at 2026-01-12T21:40:23.000Z ##

🔴 CVE-2025-51567 - Critical (9.1)

A SQL Injection was found in the /exam/user/profile.php page of kashipara Online Exam System V1.0, which allows remote attackers to execute arbitrary SQL command to get unauthorized database access via the rname, rcollage, rnumber, rgender and rpa...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-68472
(8.1 HIGH)

EPSS: 0.00%

updated 2026-01-12T20:07:43

1 posts

### Summary An unauthenticated path traversal in the file upload API lets any caller read arbitrary files from the server filesystem and move them into MindsDB’s storage, exposing sensitive data. Severity: High. ### Details The PUT handler in file.py directly joins user-controlled data into a filesystem path when the request body is JSON and `source_type` is not `"url"`: - `data = request.json`

thehackerwire@mastodon.social at 2026-01-12T17:42:49.000Z ##

🟠 CVE-2025-68472 - High (8.1)

MindsDB is a platform for building artificial intelligence from enterprise data. Prior to version 25.11.1, an unauthenticated path traversal in the file upload API lets any caller read arbitrary files from the server filesystem and move them into ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

undercodenews@mastodon.social at 2026-01-13T08:36:56.000Z ##

Critical Gogs Vulnerability CVE-2025-8110, Actively Exploited, CISA Warns

A newly discovered vulnerability in Gogs, a widely-used self-hosted Git service, is raising alarms across the cybersecurity landscape. The Cybersecurity and Infrastructure Security Agency (CISA) has officially added CVE-2025-8110 to its Known Exploited Vulnerabilities (KEV) catalog, confirming that attackers are already targeting organizations running this platform. This flaw allows malicious…

undercodenews.com/critical-gog

##

youranonnewsirc@nerdculture.de at 2026-01-13T03:22:47.000Z ##

Latest global tech and cybersecurity news (Jan 12-13, 2026):

The World Economic Forum's 'Global Cybersecurity Outlook 2026' highlights AI, geopolitics, and cyber-fraud as key shapers of risk, with fraud now surpassing ransomware as a top concern. CISA added a Gogs Path Traversal vulnerability (CVE-2025-8110) to its Known Exploited Vulnerabilities Catalog due to active exploitation. A critical vulnerability (CVE-2026-21858) was found in the n8n workflow automation platform, affecting thousands of systems. In technology, Google removed some medical AI Overviews following "alarming" results.

#News #Anonymous #AnonNews_irc

##

secdb at 2026-01-12T22:00:14.257Z ##

🚨 [CISA-2026:0112] CISA Adds One Known Exploited Vulnerability to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2025-8110 (secdb.nttzen.cloud/cve/detail/)
- Name: Gogs Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Gogs
- Product: Gogs
- Notes: github.com/gogs/gogs/commit/55 ; nvd.nist.gov/vuln/detail/CVE-2

##

DarkWebInformer at 2026-01-12T20:16:14.704Z ##

❗️CISA has added 1 vulnerability to the KEV Catalog:

CVE-2025-8110: Gogs Path Traversal Vulnerability

darkwebinformer.com/cisa-kev-c

##

AAKL at 2026-01-12T19:06:20.467Z ##

CISA has updated the KEV catalogue:

CVE-2025-8110: Gogs Path Traversal Vulnerability cisa.gov/known-exploited-vulne

##

cisakevtracker@mastodon.social at 2026-01-12T19:00:56.000Z ##

CVE ID: CVE-2025-8110
Vendor: Gogs
Product: Gogs
Date Added: 2026-01-12
Notes: github.com/gogs/gogs/commit/55 ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

cR0w at 2026-01-12T18:30:58.543Z ##

Remember that Gogs ../ last month? It's now in the KEV Catalog.

wiz.io/blog/wiz-research-gogs-

nvd.nist.gov/vuln/detail/CVE-2

##

youranonnewsirc@nerdculture.de at 2026-01-13T03:22:47.000Z ##

Latest global tech and cybersecurity news (Jan 12-13, 2026):

The World Economic Forum's 'Global Cybersecurity Outlook 2026' highlights AI, geopolitics, and cyber-fraud as key shapers of risk, with fraud now surpassing ransomware as a top concern. CISA added a Gogs Path Traversal vulnerability (CVE-2025-8110) to its Known Exploited Vulnerabilities Catalog due to active exploitation. A critical vulnerability (CVE-2026-21858) was found in the n8n workflow automation platform, affecting thousands of systems. In technology, Google removed some medical AI Overviews following "alarming" results.

#News #Anonymous #AnonNews_irc

##

DarkWebInformer@infosec.exchange at 2026-01-12T20:16:14.000Z ##

❗️CISA has added 1 vulnerability to the KEV Catalog:

CVE-2025-8110: Gogs Path Traversal Vulnerability

darkwebinformer.com/cisa-kev-c

##

AAKL@infosec.exchange at 2026-01-12T19:06:20.000Z ##

CISA has updated the KEV catalogue:

CVE-2025-8110: Gogs Path Traversal Vulnerability cisa.gov/known-exploited-vulne #CISA #infosec

##

cisakevtracker@mastodon.social at 2026-01-12T19:00:56.000Z ##

CVE ID: CVE-2025-8110
Vendor: Gogs
Product: Gogs
Date Added: 2026-01-12
Notes: github.com/gogs/gogs/commit/55 ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

cR0w@infosec.exchange at 2026-01-12T18:30:58.000Z ##

Remember that Gogs ../ last month? It's now in the KEV Catalog.

wiz.io/blog/wiz-research-gogs-

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-22771
(8.8 HIGH)

EPSS: 0.00%

updated 2026-01-12T19:16:03.470000

1 posts

Envoy Gateway is an open source project for managing Envoy Proxy as a standalone or Kubernetes-based application gateway. Prior to 1.5.7 and 1.6.2, EnvoyExtensionPolicy Lua scripts executed by Envoy proxy can be used to leak the proxy's credentials. These credentials can then be used to communicate with the control plane and gain access to all secrets that are used by Envoy proxy, e.g. TLS private

thehackerwire@mastodon.social at 2026-01-12T20:01:54.000Z ##

🟠 CVE-2026-22771 - High (8.8)

Envoy Gateway is an open source project for managing Envoy Proxy as a standalone or Kubernetes-based application gateway. Prior to 1.5.7 and 1.6.2, EnvoyExtensionPolicy Lua scripts executed by Envoy proxy can be used to leak the proxy's credential...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22252
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-01-12T19:16:03.200000

1 posts

LibreChat is a ChatGPT clone with additional features. Prior to v0.8.2-rc2, LibreChat's MCP stdio transport accepts arbitrary commands without validation, allowing any authenticated user to execute shell commands as root inside the container through a single API request. This vulnerability is fixed in v0.8.2-rc2.

thehackerwire@mastodon.social at 2026-01-12T20:01:44.000Z ##

🔴 CVE-2026-22252 - Critical (9.1)

LibreChat is a ChatGPT clone with additional features. Prior to v0.8.2-rc2, LibreChat's MCP stdio transport accepts arbitrary commands without validation, allowing any authenticated user to execute shell commands as root inside the container throu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21858
(10.0 CRITICAL)

EPSS: 2.70%

updated 2026-01-12T19:16:02.603000

16 posts

n8n is an open source workflow automation platform. Versions starting with 1.65.0 and below 1.121.0 enable an attacker to access files on the underlying server through execution of certain form-based workflows. A vulnerable workflow could grant access to an unauthenticated remote attacker, resulting in exposure of sensitive information stored on the system and may enable further compromise dependi

Nuclei template

4 repos

https://github.com/Ashwesker/Ashwesker-CVE-2026-21858

https://github.com/eduardorossi84/CVE-2026-21858-POC

https://github.com/Chocapikk/CVE-2026-21858

https://github.com/cropnet/ni8mare-scanner

hasamba at 2026-01-13T11:32:31.372Z ##

🎯 Threat Intelligence
===================

Executive summary: A supply-chain campaign abused n8n community nodes by publishing malicious npm packages that harvested OAuth credentials at runtime and exfiltrated them to attacker-controlled endpoints. The campaign used packages masquerading as service integrations (example: Google Ads) and multiple malicious packages were removed from the npm registry; one package is tracked as GHSA-77g5-qpc3-x24r.

Technical details:
• Vulnerable platform: n8n (Node.js-based workflow automation) where community nodes are installed as npm packages and execute inside the n8n runtime.
• Notable package: n8n-nodes-hfgjf-irtuinvcm-lasdqewriit (posed as Google Ads node) that presented a credential form and exfiltrated OAuth tokens during workflow execution.
• Known identifiers: GHSA-77g5-qpc3-x24r, CVE-2026-21858 (Cyera reported >100,000 n8n servers vulnerable to this RCE).
• Capabilities observed: runtime access to decrypted credentials, arbitrary outbound HTTP requests for exfiltration, file system and environment variable access due to lack of node sandboxing.

Analysis:
This campaign escalates supply-chain risk by targeting workflow automation platforms that centralize credentials. Unlike traditional npm malware focused on developer environments, malicious n8n nodes can act as gateways into dozens of integrated services (Google Ads, Stripe, Salesforce) because nodes receive decrypted API keys and OAuth tokens at runtime. The technique mirrors prior abuse of CI/CD workflows (e.g., Shai-Hulud) but leverages lower-scrutiny community ecosystems inside automation runtimes.

Detection (as reported):
• Monitor outbound HTTP traffic from n8n processes for anomalous destinations during workflow runs.
• Inspect installed community node packages for unexpected code that interacts with credential storage or performs network exfiltration.
• Correlate creation/use of OAuth credentials in workflows with external connections to unknown endpoints.

Actions taken (reported):
• Multiple malicious packages were removed from the npm registry.
• The incident is tracked with advisory identifiers such as GHSA-77g5-qpc3-x24r and discussions reference CVE-2026-21858 exposure statistics.

Limitations & open questions:
• Public reporting does not quantify how many installations loaded community nodes that were malicious.
• The full list of exfiltration endpoints and actor attribution were not disclosed in the report.

🔹 n8n -2026-21858

🔗 Source: endorlabs.com/learn/n8mare-on-

##

youranonnewsirc@nerdculture.de at 2026-01-13T03:22:47.000Z ##

Latest global tech and cybersecurity news (Jan 12-13, 2026):

The World Economic Forum's 'Global Cybersecurity Outlook 2026' highlights AI, geopolitics, and cyber-fraud as key shapers of risk, with fraud now surpassing ransomware as a top concern. CISA added a Gogs Path Traversal vulnerability (CVE-2025-8110) to its Known Exploited Vulnerabilities Catalog due to active exploitation. A critical vulnerability (CVE-2026-21858) was found in the n8n workflow automation platform, affecting thousands of systems. In technology, Google removed some medical AI Overviews following "alarming" results.

#News #Anonymous #AnonNews_irc

##

sbeyer@ioc.exchange at 2026-01-13T00:12:55.000Z ##

Die erste Ausgabe von 60 Sekunden Cyber beschäftigt sich mit dem aktuellen ESA-Hack, der Situation Taiwans, CVE-2026-21858 und dem Schlag gegen Black Axe.

60-sekunden-cyber.de/kw2-2026/

#cyber #cybersicherheit #itsicherheit #news

##

cyberveille@mastobot.ping.moi at 2026-01-12T01:00:04.000Z ##

📢 CVE-2026-21858 : RCE non authentifiée critique dans n8n (maj 1.121.0 requise)
📝 Source : Cyera Research Labs (blog de recherche, 7 janvier 2026).
📖 cyberveille : cyberveille.ch/posts/2026-01-1
🌐 source : cyera.com/research-labs/ni8mar
#CVE_2026_21858 #IOC #Cyberveille

##

youranonnewsirc@nerdculture.de at 2026-01-13T03:22:47.000Z ##

Latest global tech and cybersecurity news (Jan 12-13, 2026):

The World Economic Forum's 'Global Cybersecurity Outlook 2026' highlights AI, geopolitics, and cyber-fraud as key shapers of risk, with fraud now surpassing ransomware as a top concern. CISA added a Gogs Path Traversal vulnerability (CVE-2025-8110) to its Known Exploited Vulnerabilities Catalog due to active exploitation. A critical vulnerability (CVE-2026-21858) was found in the n8n workflow automation platform, affecting thousands of systems. In technology, Google removed some medical AI Overviews following "alarming" results.

#News #Anonymous #AnonNews_irc

##

sbeyer at 2026-01-13T00:12:55.324Z ##

Die erste Ausgabe von 60 Sekunden Cyber beschäftigt sich mit dem aktuellen ESA-Hack, der Situation Taiwans, CVE-2026-21858 und dem Schlag gegen Black Axe.

60-sekunden-cyber.de/kw2-2026/

##

zeldman@front-end.social at 2026-01-09T17:16:01.000Z ##

Tell your friends.

The vulnerability, tracked as CVE-2026-21858 (CVSS score: 10.0), has been codenamed Ni8mare by Cyera Research Labs. Security researcher Dor Attias discovered and reported it on November 9, 2025.

thehackernews.com/2026/01/crit

##

hrbrmstr@mastodon.social at 2026-01-09T12:31:34.000Z ##

this was some great and necessary debunking of the ridiculous attempt at a "look how cool we are” CVE assignment.

between this and the "it's actually not a real vuln from an internet-perspective" for the recent daft D-Link CVE assignment, the cyber part of 2026 is off to a really horrible start.

horizon3.ai/attack-research/at

##

AAKL@infosec.exchange at 2026-01-08T17:33:15.000Z ##

New.

Picus: Ni8mare: n8n CVE-2026-21858 Remote Code Execution Vulnerability Explained picussecurity.com/resource/blo #threatresearch #infosec

##

jbhall56@infosec.exchange at 2026-01-08T13:41:46.000Z ##

Tracked as CVE-2026-21858 (CVSS score 10), the bug enables remote code execution without authentication. securityweek.com/critical-vuln

##

benzogaga33@mamot.fr at 2026-01-08T10:40:02.000Z ##

Ni8mare – CVE-2026-21858 : cette faille critique permet de pirater les serveurs n8n it-connect.fr/ni8mare-cve-2026 #ActuCybersécurité #Cybersécurité #Vulnérabilité #n8n

##

Dam_ned@mamot.fr at 2026-01-08T09:08:16.000Z ##

qui c'est qui se servait de #n8n ici ? on a un petit #CVE à niveau 10 là github.com/Chocapikk/CVE-2026- #iagenIsHell

##

beyondmachines1@infosec.exchange at 2026-01-08T08:01:43.000Z ##

Critical Ni8mare flaw in n8n allows unauthenticated remote takeover

n8n patched a critical vulnerability (CVE-2026-21858) that allows unauthenticated attackers to steal server files and gain full remote code execution. The flaw exploits a logic error in webhook and file upload handling to bypass authentication and compromise sensitive automation credentials.

**If you are using n8n, this is urgent. If possible, try to isolate all n8n instances from the internet and accessible from trusted networks only. Then update to version 1.121.0 ASAP. If you can't patch, block webhooks and file uploads from any access from untrusted networks and the internet.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

r3pek@r3pek.org at 2026-01-07T21:33:12.000Z ##

Say hello to #Ni8mare, the first named vulnerability of 2026.

cyera.com/research-labs/ni8mar

#cve-2026-21858

##

cR0w@infosec.exchange at 2026-01-07T16:00:06.000Z ##

RE: infosec.exchange/@cR0w/1158494

LMFAO another one. 🥳

github.com/n8n-io/n8n/security

cyera.com/research-labs/ni8mar

cve.org/CVERecord?id=CVE-2026- ( not yet published )

##

_r_netsec@infosec.exchange at 2026-01-07T15:58:07.000Z ##

Ni8mare  -  Unauthenticated Remote Code Execution in n8n (CVE-2026-21858) cyera.com/research-labs/ni8mar

##

CVE-2025-52435
(7.5 HIGH)

EPSS: 0.01%

updated 2026-01-12T19:16:00.697000

1 posts

J2EE Misconfiguration: Data Transmission Without Encryption vulnerability in Apache NimBLE. Improper handling of Pause Encryption procedure on Link Layer results in a previously encrypted connection being left in un-encrypted state allowing an eavesdropper to observe the remainder of the exchange. This issue affects Apache NimBLE: through <= 1.8.0. Users are recommended to upgrade to version 1.9

thehackerwire@mastodon.social at 2026-01-12T20:14:27.000Z ##

🟠 CVE-2025-52435 - High (7.5)

J2EE Misconfiguration: Data Transmission Without Encryption vulnerability in Apache NimBLE.

Improper handling of Pause Encryption procedure on Link Layer results in a previously encrypted connection being left in un-encrypted state allowing an ea...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-50334
(7.5 HIGH)

EPSS: 0.12%

updated 2026-01-12T18:39:30.937000

1 posts

An issue in Technitium DNS Server v.13.5 allows a remote attacker to cause a denial of service via the rate-limiting component

CVE-2025-70161
(9.8 CRITICAL)

EPSS: 0.24%

updated 2026-01-12T18:31:31

2 posts

EDIMAX BR-6208AC V2_1.02 is vulnerable to Command Injection. This arises because the pppUserName field is directly passed to a shell command via the system() function without proper sanitization. An attacker can exploit this by injecting malicious commands into the pppUserName field, allowing arbitrary code execution.

thehackerwire@mastodon.social at 2026-01-12T19:04:20.000Z ##

🔴 CVE-2025-70161 - Critical (9.8)

EDIMAX BR-6208AC V2_1.02 is vulnerable to Command Injection. This arises because the pppUserName field is directly passed to a shell command via the system() function without proper sanitization. An attacker can exploit this by injecting malicious...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

cR0w@infosec.exchange at 2026-01-09T16:52:52.000Z ##

RUCKUS

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

EDIMAX

cve.org/CVERecord?id=CVE-2025-

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-69542
(9.8 CRITICAL)

EPSS: 0.24%

updated 2026-01-12T18:31:31

1 posts

A Command Injection Vulnerability has been discovered in the DHCP daemon service of D-Link DIR895LA1 v102b07. The vulnerability exists in the lease renewal processing logic where the DHCP hostname parameter is directly concatenated into a system command without proper sanitization. When a DHCP client renews an existing lease with a malicious hostname, arbitrary commands can be executed with root p

thehackerwire@mastodon.social at 2026-01-12T18:01:01.000Z ##

🔴 CVE-2025-69542 - Critical (9.8)

A Command Injection Vulnerability has been discovered in the DHCP daemon service of D-Link DIR895LA1 v102b07. The vulnerability exists in the lease renewal processing logic where the DHCP hostname parameter is directly concatenated into a system c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22584
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-01-12T18:31:31

1 posts

Improper Control of Generation of Code ('Code Injection') vulnerability in Salesforce Uni2TS on MacOS, Windows, Linux allows Leverage Executable Code in Non-Executable Files.This issue affects Uni2TS: through 1.2.0.

thehackerwire@mastodon.social at 2026-01-12T18:00:52.000Z ##

🔴 CVE-2026-22584 - Critical (9.8)

Improper Control of Generation of Code ('Code Injection') vulnerability in Salesforce Uni2TS on MacOS, Windows, Linux allows Leverage Executable Code in Non-Executable Files.This issue affects Uni2TS: through 1.2.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0581
(6.3 MEDIUM)

EPSS: 3.36%

updated 2026-01-12T18:31:26

1 posts

A vulnerability was determined in Tenda AC1206 15.03.06.23. Affected by this issue is the function formBehaviorManager of the file /goform/BehaviorManager of the component httpd. Executing a manipulation of the argument modulename/option/data/switch can lead to command injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.

secdb at 2026-01-12T00:00:49.245Z ##

📈 CVE Published in last 7 days (2026-01-05 - 2026-01-12)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1037

Severity:
- Critical: 110
- High: 289
- Medium: 492
- Low: 32
- None: 114

Status:
- : 43
- Analyzed: 62
- Awaiting Analysis: 537
- Received: 246
- Rejected: 32
- Undergoing Analysis: 117

Top CNAs:
- GitHub, Inc.: 201
- Wordfence: 161
- Patchstack: 150
- VulDB: 78
- MITRE: 73
- VulnCheck: 57
- N/A: 43
- MediaTek, Inc.: 28
- Fortinet, Inc.: 26
- Qualcomm, Inc.: 22

Top Affected Products:
- UNKNOWN: 964
- Google Android: 23
- Color Iccdev: 12
- Fabian Online Product Reservation System: 8
- Samsung Exynos 2400 Firmware: 7
- Samsung Exynos 1580 Firmware: 7
- Samsung Exynos 1380 Firmware: 6
- Samsung Exynos 1480 Firmware: 6
- Mediatek Nr17: 5
- Mediatek Nr16: 4

Top EPSS Score:
- CVE-2026-0581 - 3.41 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-0641 - 3.17 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-61489 - 2.45 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15502 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-6225 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2020-36925 - 0.52 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-64424 - 0.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-14997 - 0.46 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-46645 - 0.45 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-68455 - 0.43 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2025-46067
(8.2 HIGH)

EPSS: 0.00%

updated 2026-01-12T18:30:36

1 posts

An issue in Automai Director v.25.2.0 allows a remote attacker to escalate privileges and obtain sensitive information via a crafted js file

thehackerwire@mastodon.social at 2026-01-12T17:44:12.000Z ##

🟠 CVE-2025-46067 - High (8.2)

An issue in Automai Director v.25.2.0 allows a remote attacker to escalate privileges and obtain sensitive information via a crafted js file

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-46070
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-01-12T18:30:36

1 posts

An issue in Automai BotManager v.25.2.0 allows a remote attacker to execute arbitrary code via the BotManager.exe component

thehackerwire@mastodon.social at 2026-01-12T17:43:10.000Z ##

🔴 CVE-2025-46070 - Critical (9.8)

An issue in Automai BotManager v.25.2.0 allows a remote attacker to execute arbitrary code via the BotManager.exe component

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-71063
(8.2 HIGH)

EPSS: 0.00%

updated 2026-01-12T18:30:36

1 posts

Errands before 46.2.10 does not verify TLS certificates for CalDAV servers.

thehackerwire@mastodon.social at 2026-01-12T16:48:01.000Z ##

🟠 CVE-2025-71063 - High (8.2)

Errands before 46.2.10 does not verify TLS certificates for CalDAV servers.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-66744
(7.5 HIGH)

EPSS: 0.02%

updated 2026-01-12T18:30:30

1 posts

In Yonyou YonBIP v3 and before, the LoginWithV8 interface in the series data application service system is vulnerable to path traversal, allowing unauthorized access to sensitive information within the system

thehackerwire@mastodon.social at 2026-01-12T19:04:29.000Z ##

🟠 CVE-2025-66744 - High (7.5)

In Yonyou YonBIP v3 and before, the LoginWithV8 interface in the series data application service system is vulnerable to path traversal, allowing unauthorized access to sensitive information within the system

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-67004
(6.5 MEDIUM)

EPSS: 0.02%

updated 2026-01-12T18:30:29

1 posts

An Information Disclosure vulnerability in CouchCMS 2.4 allow an Admin user to read arbitrary files via traversing directories back after back. It can Disclosure the source code or any other confidential information if weaponize accordingly.

CVE-2025-14942
(9.8 CRITICAL)

EPSS: 0.08%

updated 2026-01-12T17:53:19.670000

1 posts

wolfSSH’s key exchange state machine can be manipulated to leak the client’s password in the clear, trick the client to send a bogus signature, or trick the client into skipping user authentication. This affects client applications with wolfSSH version 1.4.21 and earlier. Users of wolfSSH must update or apply the fix patch and it’s recommended to update credentials used. This fix is also recommend

cR0w@infosec.exchange at 2026-01-06T17:30:20.000Z ##

Oops.

wolfSSH’s key exchange state machine can be manipulated to leak the client’s password in the clear, trick the client to send a bogus signature, or trick the client into skipping user authentication. This affects client applications with wolfSSH version 1.4.21 and earlier. Users of wolfSSH must update or apply the fix patch and it’s recommended to update credentials used. This fix is also recommended for wolfSSH server applications. While there aren’t any specific attacks on server applications, the same defect is present. Thanks to Aina Toky Rasoamanana of Valeo and Olivier Levillain of Telecom SudParis for the report.

sev:CRIT 9.4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/U:Red

cve.org/CVERecord?id=CVE-2025-

##

CVE-2025-62235
(8.1 HIGH)

EPSS: 0.05%

updated 2026-01-12T17:15:52.007000

1 posts

Authentication Bypass by Spoofing vulnerability in Apache NimBLE. Receiving specially crafted Security Request could lead to removal of original bond and re-bond with impostor. This issue affects Apache NimBLE: through 1.8.0. Users are recommended to upgrade to version 1.9.0, which fixes the issue.

thehackerwire@mastodon.social at 2026-01-12T18:00:42.000Z ##

🟠 CVE-2025-62235 - High (8.1)

Authentication Bypass by Spoofing vulnerability in Apache NimBLE.

Receiving specially crafted Security Request could lead to removal of original bond and re-bond with impostor.
This issue affects Apache NimBLE: through 1.8.0.

Users are recommen...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-56225
(7.5 HIGH)

EPSS: 0.02%

updated 2026-01-12T17:15:51.840000

1 posts

fluidsynth-2.4.6 and earlier versions is vulnerable to Null pointer dereference in fluid_synth_monopoly.c, that can be triggered when loading an invalid midi file.

thehackerwire@mastodon.social at 2026-01-12T19:04:38.000Z ##

🟠 CVE-2025-56225 - High (7.5)

fluidsynth-2.4.6 and earlier versions is vulnerable to Null pointer dereference in fluid_synth_monopoly.c, that can be triggered when loading an invalid midi file.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-53477
(7.5 HIGH)

EPSS: 0.02%

updated 2026-01-12T17:15:51.687000

1 posts

NULL Pointer Dereference vulnerability in Apache Nimble. Missing validation of HCI connection complete or HCI command TX buffer could lead to NULL pointer dereference. This issue requires disabled asserts and broken or bogus Bluetooth controller and thus severity is considered low. This issue affects Apache NimBLE: through 1.8.0. Users are recommended to upgrade to version 1.9.0, which fixes th

thehackerwire@mastodon.social at 2026-01-12T17:44:21.000Z ##

🟠 CVE-2025-53477 - High (7.5)

NULL Pointer Dereference vulnerability in Apache Nimble.

Missing validation of HCI connection complete or HCI command TX buffer could lead to NULL pointer dereference.
This issue requires disabled asserts and broken or bogus Bluetooth controller ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-46068
(8.8 HIGH)

EPSS: 0.00%

updated 2026-01-12T17:15:51.050000

1 posts

An issue in Automai Director v.25.2.0 allows a remote attacker to execute arbitrary code via the update mechanism

thehackerwire@mastodon.social at 2026-01-12T17:43:00.000Z ##

🟠 CVE-2025-46068 - High (8.8)

An issue in Automai Director v.25.2.0 allows a remote attacker to execute arbitrary code via the update mechanism

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-46066
(9.9 CRITICAL)

EPSS: 0.00%

updated 2026-01-12T17:15:50.700000

2 posts

An issue in Automai Director v.25.2.0 allows a remote attacker to escalate privileges

mastokukei@social.josko.org at 2026-01-12T18:01:11.000Z ##

discussed.

- Ukraine 5G pilot: Kyivstar launches 5G pilot in Lviv, wartime‑aware; plans expand to other cities.

- Sweden drone defense funding: Sweden to spend 440M crowns on unmanned drone systems (NATO member).

- CVE-2025-46066: Critical remote privilege escalation flaw in Automai Director v25.2.0. [2/2]

##

thehackerwire@mastodon.social at 2026-01-12T17:44:03.000Z ##

🔴 CVE-2025-46066 - Critical (9.9)

An issue in Automai Director v.25.2.0 allows a remote attacker to escalate privileges

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-14847
(7.5 HIGH)

EPSS: 69.62%

updated 2026-01-12T17:15:50.250000

6 posts

Mismatched length fields in Zlib compressed protocol headers may allow a read of uninitialized heap memory by an unauthenticated client. This issue affects all MongoDB Server v7.0 prior to 7.0.28 versions, MongoDB Server v8.0 versions prior to 8.0.17, MongoDB Server v8.2 versions prior to 8.2.3, MongoDB Server v6.0 versions prior to 6.0.27, MongoDB Server v5.0 versions prior to 5.0.32, MongoDB Ser

Nuclei template

32 repos

https://github.com/AdolfBharath/mongobleed

https://github.com/14mb1v45h/CYBERDUDEBIVASH-MONGODB-DETECTOR-v2026

https://github.com/waheeb71/CVE-2025-14847

https://github.com/franksec42/mongobleed-exploit-CVE-2025-14847

https://github.com/kuyrathdaro/cve-2025-14847

https://github.com/Ashwesker/Ashwesker-CVE-2025-14847

https://github.com/chinaxploiter/CVE-2025-14847-PoC

https://github.com/cybertechajju/CVE-2025-14847_Expolit

https://github.com/tunahantekeoglu/MongoDeepDive

https://github.com/ProbiusOfficial/CVE-2025-14847

https://github.com/nma-io/mongobleed

https://github.com/KingHacker353/CVE-2025-14847_Expolit

https://github.com/Black1hp/mongobleed-scanner

https://github.com/vfa-tuannt/CVE-2025-14847

https://github.com/saereya/CVE-2025-14847---MongoBleed

https://github.com/Security-Phoenix-demo/mongobleed-exploit-CVE-2025-14847

https://github.com/lincemorado97/CVE-2025-14847

https://github.com/AmadoBatista/mongobleed

https://github.com/FurkanKAYAPINAR/CVE-2025-14847-MongoBleed-Exploit

https://github.com/Rishi-kaul/CVE-2025-14847-MongoBleed

https://github.com/sahar042/CVE-2025-14847

https://github.com/peakcyber-security/CVE-2025-14847

https://github.com/joshuavanderpoll/CVE-2025-14847

https://github.com/onewinner/CVE-2025-14847

https://github.com/JemHadar/MongoBleed-DFIR-Triage-Script-CVE-2025-14847

https://github.com/CadGoose/MongoBleed-CVE-2025-14847-Fully-Automated-scanner

https://github.com/ElJoamy/MongoBleed-exploit

https://github.com/keraattin/Mongobleed-Detector-CVE-2025-14847

https://github.com/j0lt-github/mongobleedburp

https://github.com/NoNameError/MongoBLEED---CVE-2025-14847-POC-

https://github.com/Systemhaus-Schulz/MongoBleed-CVE-2025-14847

https://github.com/demetriusford/mongobleed

MongoDB@activitypub.awakari.com at 2026-01-06T19:36:57.000Z ## Urgent Security Update: Patching “Mongobleed” (CVE-2025-14847) in Percona Server for MongoDB At Percona, our mission has always been to provide the community with truly open-source, enterprise-...

#MongoDB #Percona #Software #mongobleed #percona #server #for #MongoDB

Origin | Interest | Match ##

MongoDB@activitypub.awakari.com at 2026-01-10T07:36:00.000Z ## MongoBleed Vulnerability Allows Attackers to Read Data from MongoDB's Heap Memory MongoDB recently patched CVE-2025-14847, a vulnerability affecting multiple supported and legacy MongoDB Server...

#Compression #MongoDB #Cloud #Security #Common #Vulnerabilities #and #Exposures #AI, #ML #&

Origin | Interest | Match ##

MongoDB@activitypub.awakari.com at 2026-01-10T07:36:00.000Z ## MongoBleed Vulnerability Allows Attackers to Read Data from MongoDB's Heap Memory MongoDB recently patched CVE-2025-14847, a vulnerability affecting multiple supported and legacy MongoDB Server...

#MongoDB #Cloud #Security #Compression #Common #Vulnerabilities #and #Exposures #AI, #ML #&

Origin | Interest | Match ##

MongoDB@activitypub.awakari.com at 2026-01-10T07:36:00.000Z ## MongoBleed Vulnerability Allows Attackers to Read Data From MongoDB's Heap Memory MongoDB recently patched CVE-2025-14847, a vulnerability affecting multiple supported and legacy MongoDB Server...

#Compression #MongoDB #Cloud #Security #Common #Vulnerabilities #and #Exposures #AI, #ML #&

Origin | Interest | Match ##

MongoDB@activitypub.awakari.com at 2026-01-10T07:36:00.000Z ## MongoBleed Vulnerability Allows Attackers to Read Data From MongoDB's Heap Memory MongoDB recently patched CVE-2025-14847, a vulnerability affecting multiple supported and legacy MongoDB Server...

#MongoDB #Cloud #Security #Compression #Common #Vulnerabilities #and #Exposures #AI, #ML #&

Origin | Interest | Match ##

MongoDB@activitypub.awakari.com at 2026-01-06T19:36:57.000Z ## Urgent Security Update: Patching “Mongobleed” (CVE-2025-14847) in Percona Server for MongoDB At Percona, our mission has always been to provide the community with truly open-source, enterprise-...

#MongoDB #Percona #Software #mongobleed #percona #server #for #MongoDB

Origin | Interest | Match ##

CVE-2025-55125
(7.8 HIGH)

EPSS: 0.06%

updated 2026-01-12T16:44:01.677000

2 posts

This vulnerability allows a Backup or Tape Operator to perform remote code execution (RCE) as root by creating a malicious backup configuration file.

cR0w@infosec.exchange at 2026-01-08T16:43:57.000Z ##

CVEs are now published for this.

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

##

DarkWebInformer@infosec.exchange at 2026-01-07T16:07:10.000Z ##

🚨 Multiple Veeam CVEs Identified: Critical Flaws Allow RCE and High-Privilege Actions

CVE-2025-55125:

A flaw that allows a Backup or Tape Operator to achieve remote code execution (RCE) as root by crafting a malicious backup configuration file.

▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing

CVE-2025-59468:

A vulnerability enabling a Backup Administrator to execute remote code as the postgres user by supplying a malicious password parameter.

▪️Severity: Medium
▪️CVSS v3.1: 6.7
▪️Source: Discovered during internal testing

CVE-2025-59469

A security issue that allows a Backup or Tape Operator to write arbitrary files with root privileges.

▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing

CVE-2025-59470

A vulnerability that permits a Backup or Tape Operator to achieve remote code execution (RCE) as the postgres user by sending a malicious interval or order parameter.

▪️CVSS Severity: Critical
▪️CVSS v3.1: 9.0
▪️Source: Discovered during internal testing

Veeam: veeam.com/kb4738
Blog format: darkwebinformer.com/multiple-v

##

CVE-2025-68493
(8.1 HIGH)

EPSS: 0.04%

updated 2026-01-12T15:30:42

1 posts

Missing XML Validation vulnerability in Apache Struts, Apache Struts. This issue affects Apache Struts: from 2.0.0 before 2.2.1; Apache Struts: from 2.2.1 through 6.1.0. Users are recommended to upgrade to version 6.1.1, which fixes the issue.

thehackerwire@mastodon.social at 2026-01-12T14:38:26.000Z ##

🟠 CVE-2025-68493 - High (8.1)

Missing XML Validation vulnerability in Apache Struts, Apache Struts.

This issue affects Apache Struts: from 2.0.0 before 2.2.1; Apache Struts: from 2.2.1 through 6.1.0.

Users are recommended to upgrade to version 6.1.1, which fixes the issue.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-52694
(10.0 CRITICAL)

EPSS: 0.07%

updated 2026-01-12T15:16:03.463000

3 posts

Successful exploitation of the SQL injection vulnerability could allow an unauthenticated remote attacker to execute arbitrary SQL commands on the vulnerable service when it is exposed to the Internet.

1 repos

https://github.com/Winz18/CVE-2025-52694-POC

beyondmachines1 at 2026-01-12T12:01:43.267Z ##

Advantech patches maximum-severity SQL injection flaw in IoT products

Advantech patched a maximum-severity SQL injection vulnerability (CVE-2025-52694) in its IoTSuite and IoT Edge products that allows unauthenticated remote attackers to execute arbitrary database commands.

**Make sure all industrial devices are isolated from the internet and accessible from trusted networks only. Update your Advantech IoTSuite and IoT Edge software to the latest versions immediately to prevent remote database takeovers.**

beyondmachines.net/event_detai

##

thehackerwire@mastodon.social at 2026-01-12T03:46:47.000Z ##

🔴 CVE-2025-52694 - Critical (10)

Successful exploitation of the SQL injection vulnerability could allow an unauthenticated remote attacker to execute arbitrary SQL commands on the vulnerable service when it is exposed to the Internet.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

beyondmachines1@infosec.exchange at 2026-01-12T12:01:43.000Z ##

Advantech patches maximum-severity SQL injection flaw in IoT products

Advantech patched a maximum-severity SQL injection vulnerability (CVE-2025-52694) in its IoTSuite and IoT Edge products that allows unauthenticated remote attackers to execute arbitrary database commands.

**Make sure all industrial devices are isolated from the internet and accessible from trusted networks only. Update your Advantech IoTSuite and IoT Edge software to the latest versions immediately to prevent remote database takeovers.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-41006
(0 None)

EPSS: 0.00%

updated 2026-01-12T15:16:02.910000

2 posts

Imaster's MEMS Events CRM contains an SQL injection vulnerability in ‘phone’ parameter in ‘/memsdemo/login.php’.

beyondmachines1 at 2026-01-13T11:01:43.528Z ##

Critical SQL Injection and XSS flaws reported in Imaster business software

Imaster's business management systems suffer from four vulnerabilities, including a critical SQL injection (CVE-2025-41006) that allows unauthenticated database access. These flaws enable attackers to steal sensitive patient data and execute malicious scripts in administrative sessions.

**If you are using Imaster MEMS Events CRM and the Patient Records Management System, make sure they are isolated from the internet and accessible from trusted networks only. Reach out to the vendor for patches, and in the meantime use a Web Application Firewall to filter malicious SQL and XSS traffic.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-01-13T11:01:43.000Z ##

Critical SQL Injection and XSS flaws reported in Imaster business software

Imaster's business management systems suffer from four vulnerabilities, including a critical SQL injection (CVE-2025-41006) that allows unauthenticated database access. These flaws enable attackers to steal sensitive patient data and execute malicious scripts in administrative sessions.

**If you are using Imaster MEMS Events CRM and the Patient Records Management System, make sure they are isolated from the internet and accessible from trusted networks only. Reach out to the vendor for patches, and in the meantime use a Web Application Firewall to filter malicious SQL and XSS traffic.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-22184(CVSS UNKNOWN)

EPSS: 0.08%

updated 2026-01-12T09:31:31

2 posts

zlib versions up to and including 1.3.1.2 contain a global buffer overflow in the untgz utility. The TGZfname() function copies an attacker-supplied archive name from argv[] into a fixed-size 1024-byte static global buffer using an unbounded strcpy() call without length validation. Supplying an archive name longer than 1024 bytes results in an out-of-bounds write that can lead to memory corruption

veit@mastodon.social at 2026-01-08T08:32:49.000Z ##

There is a critical security vulnerability in zlib that allows code smuggling. Currently, there does not appear to be an update available.
seclists.org/fulldisclosure/20
nvd.nist.gov/vuln/detail/CVE-2
#Security #zlib #Vulnerability

##

cR0w@infosec.exchange at 2026-01-07T20:45:14.000Z ##

sev:CRIT BoF in zlib.

zlib versions up to and including 1.3.1.2 contain a global buffer overflow in the untgz utility. The TGZfname() function copies an attacker-supplied archive name from argv[] into a fixed-size 1024-byte static global buffer using an unbounded strcpy() call without length validation. Supplying an archive name longer than 1024 bytes results in an out-of-bounds write that can lead to memory corruption, denial of service, and potentially code execution depending on compiler, build flags, architecture, and memory layout. The overflow occurs prior to any archive parsing or validation.

cve.org/CVERecord?id=CVE-2026-

##

CVE-2026-0855
(8.8 HIGH)

EPSS: 0.29%

updated 2026-01-12T09:30:36

3 posts

Certain IP Camera models developed by Merit LILIN has a OS Command Injection vulnerability, allowing authenticated remote attackers to inject arbitrary OS commands and execute them on the device.

CVE-2025-14279
(8.1 HIGH)

EPSS: 0.02%

updated 2026-01-12T09:30:36

1 posts

MLFlow versions up to and including 3.4.0 are vulnerable to DNS rebinding attacks due to a lack of Origin header validation in the MLFlow REST server. This vulnerability allows malicious websites to bypass Same-Origin Policy protections and execute unauthorized calls against REST endpoints. An attacker can query, update, and delete experiments via the affected endpoints, leading to potential data

thehackerwire@mastodon.social at 2026-01-12T10:00:15.000Z ##

🟠 CVE-2025-14279 - High (8.1)

MLFlow versions up to and including 3.4.0 are vulnerable to DNS rebinding attacks due to a lack of Origin header validation in the MLFlow REST server. This vulnerability allows malicious websites to bypass Same-Origin Policy protections and execut...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0854
(8.8 HIGH)

EPSS: 0.29%

updated 2026-01-12T06:16:11.040000

3 posts

Certain DVR/NVR models developed by Merit LILIN has a OS Command Injection vulnerability, allowing authenticated remote attackers to inject arbitrary OS commands and execute them on the device.

CVE-2025-61686
(9.1 CRITICAL)

EPSS: 0.06%

updated 2026-01-11T14:53:55

2 posts

If applications use `createFileSessionStorage()` from `@react-router/node` (or `@remix-run/node`/`@remix-run/deno` in Remix v2) with an [**unsigned cookie**](https://reactrouter.com/explanation/sessions-and-cookies#signing-cookies), it is possible for an attacker to cause the session to try to read/write from a location outside the specified session file directory. The success of the attack would

beyondmachines1 at 2026-01-12T16:01:43.213Z ##

Critical directory traversal vulnerability reported in React Router and Remix

React Router and Remix released patches for a critical directory traversal vulnerability, CVE-2025-61686, which allows attackers to read or write server files via unsigned session cookies.

**If you are using createFileSessionStorage in React Router and Remix, this is important and urgent. Check if you are using signed cookies for session storage. If not, change that ASAP, and update packages to the latest versions immediately. Ideally, limit file system permissions of your web server process to the bare minimum.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-01-12T16:01:43.000Z ##

Critical directory traversal vulnerability reported in React Router and Remix

React Router and Remix released patches for a critical directory traversal vulnerability, CVE-2025-61686, which allows attackers to read or write server files via unsigned session cookies.

**If you are using createFileSessionStorage in React Router and Remix, this is important and urgent. Check if you are using signed cookies for session storage. If not, change that ASAP, and update packages to the latest versions immediately. Ideally, limit file system permissions of your web server process to the bare minimum.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-0841
(8.8 HIGH)

EPSS: 0.04%

updated 2026-01-11T09:30:26

2 posts

A vulnerability was detected in UTT 进取 520W 1.7.7-180627. Affected by this issue is the function strcpy of the file /goform/formPictureUrl. The manipulation of the argument importpictureurl results in buffer overflow. It is possible to launch the attack remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2026-0840
(8.8 HIGH)

EPSS: 0.04%

updated 2026-01-11T09:30:25

2 posts

A security vulnerability has been detected in UTT 进取 520W 1.7.7-180627. Affected by this vulnerability is the function strcpy of the file /goform/formConfigNoticeConfig. The manipulation of the argument timestart leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but

CVE-2026-0839
(8.8 HIGH)

EPSS: 0.04%

updated 2026-01-11T06:30:19

2 posts

A weakness has been identified in UTT 进取 520W 1.7.7-180627. Affected is the function strcpy of the file /goform/APSecurity. Executing a manipulation of the argument wepkey1 can lead to buffer overflow. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in

CVE-2026-0838
(8.8 HIGH)

EPSS: 0.04%

updated 2026-01-11T06:15:57.300000

2 posts

A security flaw has been discovered in UTT 进取 520W 1.7.7-180627. This impacts the function strcpy of the file /goform/ConfigWirelessBase. Performing a manipulation of the argument ssid results in buffer overflow. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did no

CVE-2026-0837
(8.8 HIGH)

EPSS: 0.04%

updated 2026-01-11T05:15:58.893000

2 posts

A vulnerability was identified in UTT 进取 520W 1.7.7-180627. This affects the function strcpy of the file /goform/formFireWall. Such manipulation of the argument GroupName leads to buffer overflow. The attack can be executed remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2026-0836
(8.8 HIGH)

EPSS: 0.04%

updated 2026-01-11T05:15:47.947000

2 posts

A vulnerability was determined in UTT 进取 520W 1.7.7-180627. The impacted element is the function strcpy of the file /goform/formConfigFastDirectionW. This manipulation of the argument ssid causes buffer overflow. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any

CVE-2025-15505
(2.4 LOW)

EPSS: 0.03%

updated 2026-01-11T03:30:13

2 posts

A vulnerability was found in Luxul XWR-600 up to 4.0.1. The affected element is an unknown function of the component Web Administration Interface. The manipulation of the argument Guest Network/Wireless Profile SSID results in cross site scripting. The attack may be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did n

CVE-2025-15502
(7.3 HIGH)

EPSS: 1.04%

updated 2026-01-10T09:30:24

1 posts

A vulnerability was identified in Sangfor Operation and Maintenance Management System up to 3.0.8. The affected element is the function SessionController of the file /isomp-protocol/protocol/session. Such manipulation of the argument Hostname leads to os command injection. The attack can be executed remotely. The exploit is publicly available and might be used. The vendor was contacted early about

secdb at 2026-01-12T00:00:49.245Z ##

📈 CVE Published in last 7 days (2026-01-05 - 2026-01-12)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1037

Severity:
- Critical: 110
- High: 289
- Medium: 492
- Low: 32
- None: 114

Status:
- : 43
- Analyzed: 62
- Awaiting Analysis: 537
- Received: 246
- Rejected: 32
- Undergoing Analysis: 117

Top CNAs:
- GitHub, Inc.: 201
- Wordfence: 161
- Patchstack: 150
- VulDB: 78
- MITRE: 73
- VulnCheck: 57
- N/A: 43
- MediaTek, Inc.: 28
- Fortinet, Inc.: 26
- Qualcomm, Inc.: 22

Top Affected Products:
- UNKNOWN: 964
- Google Android: 23
- Color Iccdev: 12
- Fabian Online Product Reservation System: 8
- Samsung Exynos 2400 Firmware: 7
- Samsung Exynos 1580 Firmware: 7
- Samsung Exynos 1380 Firmware: 6
- Samsung Exynos 1480 Firmware: 6
- Mediatek Nr17: 5
- Mediatek Nr16: 4

Top EPSS Score:
- CVE-2026-0581 - 3.41 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-0641 - 3.17 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-61489 - 2.45 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15502 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-6225 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2020-36925 - 0.52 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-64424 - 0.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-14997 - 0.46 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-46645 - 0.45 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-68455 - 0.43 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-22026
(0 None)

EPSS: 0.04%

updated 2026-01-10T01:16:18.843000

2 posts

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, the libcurl write_callback function in the KMC crypto service client allows unbounded memory growth by reallocating response buffers without any

CVE-2026-22024
(0 None)

EPSS: 0.05%

updated 2026-01-10T01:16:18.553000

2 posts

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, the cryptography_encrypt() function allocates multiple buffers for HTTP requests and JSON parsing that are never freed on any code path. Each cal

CVE-2026-22023
(0 None)

EPSS: 0.04%

updated 2026-01-10T01:16:18.410000

2 posts

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, there is an out-of-bounds heap read vulnerability in cryptography_aead_encrypt(). This issue has been patched in version 1.4.3.

CVE-2026-21900
(0 None)

EPSS: 0.05%

updated 2026-01-10T01:16:18.263000

2 posts

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, an out-of-bounds heap read vulnerability in cryptography_encrypt() occurs when parsing JSON metadata from KMC server responses. The flawed strtok

CVE-2025-65731
(6.8 MEDIUM)

EPSS: 0.03%

updated 2026-01-09T21:32:41

1 posts

An issue was discovered in D-Link Router DIR-605L (Hardware version F1; Firmware version: V6.02CN02) allowing an attacker with physical access to the UART pins to execute arbitrary commands due to presence of root terminal access on a serial interface without proper access control.

1 repos

https://github.com/whitej3rry/CVE-2025-65731

CVE-2025-14524
(5.3 MEDIUM)

EPSS: 0.03%

updated 2026-01-09T21:32:41

2 posts

When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP, POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new target host.

cR0w@infosec.exchange at 2026-01-08T15:22:45.000Z ##

ZOMG curl CVEs.

curl.se/docs/CVE-2025-14017.ht

curl.se/docs/CVE-2025-14524.ht

curl.se/docs/CVE-2025-14819.ht

curl.se/docs/CVE-2025-15079.ht

curl.se/docs/CVE-2025-15224.ht

curl.se/docs/CVE-2025-13034.ht

##

harrysintonen@infosec.exchange at 2026-01-07T07:51:27.000Z ##

#curl 8.18.0 has been released. This release fixes 2 medium and 4 low level vulnerabilities:
- CVE-2025-13034: No QUIC certificate pinning with GnuTLS curl.se/docs/CVE-2025-13034.ht
- CVE-2025-14017: broken TLS options for threaded LDAPS curl.se/docs/CVE-2025-14017.ht
- CVE-2025-14524: bearer token leak on cross-protocol redirect curl.se/docs/CVE-2025-14524.ht
- CVE-2025-14819: OpenSSL partial chain store policy bypass curl.se/docs/CVE-2025-14819.ht
- CVE-2025-15079: libssh global knownhost override curl.se/docs/CVE-2025-15079.ht
- CVE-2025-15224: libssh key passphrase bypass without agent set curl.se/docs/CVE-2025-15224.ht

I discovered the last 2 vulnerabilities.

Download curl 8.18.0 from curl.se/download.html

#vulnerabilityresearch #vulnerability #cybersecurity #infosec

##

CVE-2026-0830
(7.8 HIGH)

EPSS: 0.03%

updated 2026-01-09T21:31:41

1 posts

Processing specially crafted workspace folder names could allow for arbitrary command injection in the Kiro GitLab Merge-Request helper in Kiro IDE before version 0.6.18 when opening maliciously crafted workspaces. To mitigate, users should update to version 0.6.18.

cyberveille@mastobot.ping.moi at 2026-01-12T01:30:04.000Z ##

📢 CVE-2026-0830 : injection de commandes dans Kiro IDE (corrigé en 0.6.18)
📝 Selon un bulletin de sécurité AWS (Bulletin ID: 2026-001-AWS) publié le 9 janvier 2026, une vulnérabilité référencée **CVE-2026-0830** touche...
📖 cyberveille : cyberveille.ch/posts/2026-01-1
🌐 source : aws.amazon.com/security/securi
#CVE_2026_0830 #Injection_de_commandes #Cyberveille

##

CVE-2025-10492
(9.8 CRITICAL)

EPSS: 0.33%

updated 2026-01-09T19:55:26

2 posts

A Java deserialisation vulnerability has been discovered in the Jaspersoft Library. Improper handling of externally supplied data may allow attackers to execute arbitrary code remotely on systems that use the affected library.

1 repos

https://github.com/dovezp/CVE-2025-10492-POC

beyondmachines1@infosec.exchange at 2026-01-09T14:01:44.000Z ##

Hitachi Energy patches critical RCE flaw in Asset Suite

Hitachi Energy released a critical update for Asset Suite to patch a remote code execution vulnerability (CVE-2025-10492) caused by improper data handling in the Jaspersoft reporting library.

**Make sure your Hitachi Asset Suite uses only predefined reports and users should not be allowed to upload untrudted reports. If possible, isolate Hitachi Asset Suite to be accessible from trusted networks only and limited number of users. Then plan an update to Asset Suite version 9.8.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

AAKL@infosec.exchange at 2026-01-08T19:29:24.000Z ##

CISA ICS advisory: Hitachi Energy Asset Suite vulnerability CVE-2025-10492 cisa.gov/news-events/ics-advis #CISA #infosec #Java #JavaScript

##

CVE-2025-15035(CVSS UNKNOWN)

EPSS: 0.03%

updated 2026-01-09T18:31:43

1 posts

Improper Input Validation vulnerability in TP-Link Archer AXE75 v1.6 (vpn modules) allows an authenticated adjacent attacker to delete arbitrary server file, leading to possible loss of critical system files and service interruption or degraded functionality.This issue affects Archer AXE75 v1.6: ≤ build 20250107.

CVE-2025-14598
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-01-09T18:31:36

1 posts

BeeS Software Solutions BET Portal contains an SQL injection vulnerability in the login functionality of affected sites. The vulnerability enables arbitrary SQL commands to be executed on the backend database.

1 repos

https://github.com/Afnaan-Ahmed/CVE-2025-14598

FunctionalProgramming@activitypub.awakari.com at 2026-01-09T12:14:06.000Z ## CVE-2025-14598BeeS Software Solutions BET Portal contains an SQL injection vu... BeeS Software Solutions BET Portal contains an SQL injection vulnerability in the login functionality of affected si...


Origin | Interest | Match ##

CVE-2025-64091
(8.6 HIGH)

EPSS: 0.04%

updated 2026-01-09T18:31:35

1 posts

This vulnerability allows authenticated attackers to execute commands via the NTP-configuration of the device.

CVE-2025-64093
(10.0 CRITICAL)

EPSS: 0.22%

updated 2026-01-09T18:31:35

1 posts

Remote Code Execution vulnerability that allows unauthenticated attackers to inject arbitrary commands into the hostname of the device.

CVE-2025-64092
(7.5 HIGH)

EPSS: 0.06%

updated 2026-01-09T18:31:35

1 posts

This vulnerability allows unauthenticated attackers to inject an SQL request into GET request parameters and directly query the underlying database.

CVE-2025-64090
(10.0 CRITICAL)

EPSS: 0.06%

updated 2026-01-09T18:15:49.873000

1 posts

This vulnerability allows authenticated attackers to execute commands via the hostname of the device.

CVE-2025-69426
(0 None)

EPSS: 0.04%

updated 2026-01-09T17:15:53.997000

1 posts

The Ruckus vRIoT IoT Controller firmware versions prior to 3.0.0.0 (GA) contain hardcoded credentials for an operating system user account within an initialization script. The SSH service is network-accessible without IP-based restrictions. Although the configuration disables SCP and pseudo-TTY allocation, an attacker can authenticate using the hardcoded credentials and establish SSH local port fo

CVE-2025-69425
(0 None)

EPSS: 0.10%

updated 2026-01-09T17:15:53.847000

1 posts

The Ruckus vRIoT IoT Controller firmware versions prior to 3.0.0.0 (GA) expose a command execution service on TCP port 2004 running with root privileges. Authentication to this service relies on a hardcoded Time-based One-Time Password (TOTP) secret and an embedded static token. An attacker who extracts these credentials from the appliance or a compromised device can generate valid authentication

CVE-2025-46645
(6.5 MEDIUM)

EPSS: 0.45%

updated 2026-01-09T17:15:52.720000

1 posts

Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.4.0.0, LTS2025 release version 8.3.1.10, LTS2024 release versions 7.13.1.0 through 7.13.1.40, LTS 2023 release versions 7.10.1.0 through 7.10.1.70, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A high privileged

secdb at 2026-01-12T00:00:49.245Z ##

📈 CVE Published in last 7 days (2026-01-05 - 2026-01-12)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1037

Severity:
- Critical: 110
- High: 289
- Medium: 492
- Low: 32
- None: 114

Status:
- : 43
- Analyzed: 62
- Awaiting Analysis: 537
- Received: 246
- Rejected: 32
- Undergoing Analysis: 117

Top CNAs:
- GitHub, Inc.: 201
- Wordfence: 161
- Patchstack: 150
- VulDB: 78
- MITRE: 73
- VulnCheck: 57
- N/A: 43
- MediaTek, Inc.: 28
- Fortinet, Inc.: 26
- Qualcomm, Inc.: 22

Top Affected Products:
- UNKNOWN: 964
- Google Android: 23
- Color Iccdev: 12
- Fabian Online Product Reservation System: 8
- Samsung Exynos 2400 Firmware: 7
- Samsung Exynos 1580 Firmware: 7
- Samsung Exynos 1380 Firmware: 6
- Samsung Exynos 1480 Firmware: 6
- Mediatek Nr17: 5
- Mediatek Nr16: 4

Top EPSS Score:
- CVE-2026-0581 - 3.41 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-0641 - 3.17 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-61489 - 2.45 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15502 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-6225 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2020-36925 - 0.52 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-64424 - 0.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-14997 - 0.46 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-46645 - 0.45 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-68455 - 0.43 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2025-68613
(10.0 CRITICAL)

EPSS: 8.42%

updated 2026-01-09T16:53:16

1 posts

### Impact n8n contains a critical Remote Code Execution (RCE) vulnerability in its workflow expression evaluation system. Under certain conditions, expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime. An authenticated attacker could abuse this behavior to execute arbitrary

Nuclei template

28 repos

https://github.com/hackersatyamrastogi/n8n-exploit-CVE-2025-68613-n8n-God-Mode-Ultimate

https://github.com/reem-012/poc_CVE-2025-68613

https://github.com/mbanyamer/n8n-Authenticated-Expression-Injection-RCE-CVE-2025-68613

https://github.com/Khin-96/n8n-cve-2025-68613-thm

https://github.com/TheStingR/CVE-2025-68613-POC

https://github.com/secjoker/CVE-2025-68613

https://github.com/GnuTLam/POC-CVE-2025-68613

https://github.com/ali-py3/Exploit-CVE-2025-68613

https://github.com/r4j3sh-com/CVE-2025-68613-n8n-lab

https://github.com/rxerium/CVE-2025-68613

https://github.com/LingerANR/n8n-CVE-2025-68613

https://github.com/JohannesLks/CVE-2025-68613-Python-Exploit

https://github.com/Dlanang/homelab-CVE-2025-68613

https://github.com/ahmedshamsddin/n8n-RCE-CVE-2025-68613

https://github.com/wioui/n8n-CVE-2025-68613-exploit

https://github.com/intelligent-ears/CVE-2025-68613

https://github.com/J4ck3LSyN-Gen2/n8n-CVE-2025-68613-TryHackMe

https://github.com/nehkark/CVE-2025-68613

https://github.com/releaseown/analysis-and-poc-n8n-CVE-2025-68613

https://github.com/gagaltotal/n8n-cve-2025-68613

https://github.com/Ashwesker/Ashwesker-CVE-2025-68613

https://github.com/cv-sai-kamesh/n8n-CVE-2025-68613

https://github.com/Ak-cybe/CVE-2025-68613-n8n-rce-analysis

https://github.com/TheInterception/n8n_CVE-2025-68613_exploit_payloads

https://github.com/AbdulRKB/n8n-RCE

https://github.com/intbjw/CVE-2025-68613-poc-via-copilot

https://github.com/shibaaa204/CVE-2025-68613

https://github.com/manyaigdtuw/CVE-2025-68613_Scanner

DarkWebInformer@infosec.exchange at 2026-01-07T19:28:09.000Z ##

Another video showing how incredibly easy the n8n RCE vulnerability (CVE-2025-68613) is.

Credit: youtube.com/@0xmrsecurity

##

CVE-2026-22081(CVSS UNKNOWN)

EPSS: 0.06%

updated 2026-01-09T12:32:33

1 posts

This vulnerability exists in Tenda wireless routers (300Mbps Wireless Router F3 and N300 Easy Setup Router) due to the missing HTTPOnly flag for session cookies associated with the web-based administrative interface. A remote at-tacker could exploit this vulnerability by capturing session cookies transmitted over an insecure HTTP connection. Successful exploitation of this vulnerability could all

CVE-2025-7072(CVSS UNKNOWN)

EPSS: 0.12%

updated 2026-01-09T12:32:33

1 posts

The firmware in KAON CG3000TC and CG3000T routers contains hard-coded credentials in clear text (shared across all routers of this model) that an unauthenticated remote attacker could use to execute commands with root privileges. This vulnerability has been fixed in firmware version: 1.00.67 for CG3000TC and 1.00.27 for CG3000T.

cR0w@infosec.exchange at 2026-01-09T14:02:58.000Z ##

Hardcoded creds in KAON routers but it doesn't say what those creds are.

cve.org/CVERecord?id=CVE-2025-

##

CVE-2026-22080(CVSS UNKNOWN)

EPSS: 0.03%

updated 2026-01-09T12:32:32

1 posts

This vulnerability exists in Tenda wireless routers (300Mbps Wireless Router F3 and N300 Easy Setup Router) due to the transmission of credentials encoded using reversible Base64 encoding through the web-based administrative interface. An attacker on the same network could exploit this vulnerability by intercepting network traffic and capturing the Base64-encoded credentials. Successful exploitat

CVE-2026-22079(CVSS UNKNOWN)

EPSS: 0.03%

updated 2026-01-09T12:32:32

1 posts

This vulnerability exists in Tenda wireless routers (300Mbps Wireless Router F3 and N300 Easy Setup Router) due to the plaintext transmission of login credentials during the initial login or post-factory reset setup through the web-based administrative interface. An attacker on the same network could exploit this vulnerability by intercepting network traffic and capturing the credentials transmitt

CVE-2025-66049(CVSS UNKNOWN)

EPSS: 0.07%

updated 2026-01-09T12:32:32

1 posts

Vivotek IP7137 camera with firmware version 0200a is vulnerable to an information disclosure issue where live camera footage can be accessed through the RTSP protocol on port 8554 without requiring authentication. This allows unauthorized users with network access to view the camera's feed, potentially compromising user privacy and security.  The vendor has not replied to the CNA. Possibly all fir

CVE-2026-22082
(0 None)

EPSS: 0.18%

updated 2026-01-09T12:15:54.403000

1 posts

This vulnerability exists in Tenda wireless routers (300Mbps Wireless Router F3 and N300 Easy Setup Router) due to the use of login credentials as the session ID through its web-based administrative interface. A remote attacker could exploit this vulnerability by intercepting network traffic and capturing the session ID during insecure transmission. Successful exploitation of this vulnerability

CVE-2025-69194
(8.8 HIGH)

EPSS: 0.03%

updated 2026-01-09T09:31:24

1 posts

A security issue was discovered in GNU Wget2 when handling Metalink documents. The application fails to properly validate file paths provided in Metalink <file name> elements. An attacker can abuse this behavior to write files to unintended locations on the system. This can lead to data loss or potentially allow further compromise of the user’s environment.

1 repos

https://github.com/secdongle/POC_CVE-2025-69194

CVE-2025-69195
(7.6 HIGH)

EPSS: 0.08%

updated 2026-01-09T08:15:58.147000

1 posts

A flaw was found in GNU Wget2. This vulnerability, a stack-based buffer overflow, occurs in the filename sanitization logic when processing attacker-controlled URL paths, particularly when filename restriction options are active. A remote attacker can exploit this by providing a specially crafted URL, which, upon user interaction with wget2, can lead to memory corruption. This can cause the applic

CVE-2025-70974
(10.0 CRITICAL)

EPSS: 0.06%

updated 2026-01-09T07:16:02.677000

1 posts

Fastjson before 1.2.48 mishandles autoType because, when an @type key is in a JSON document, and the value of that key is the name of a Java class, there may be calls to certain public methods of that class. Depending on the behavior of those methods, there may be JNDI injection with an attacker-supplied payload located elsewhere in that JSON document. This was exploited in the wild in 2023 throug

cR0w@infosec.exchange at 2026-01-09T19:46:49.000Z ##

Perfect 10 in Fastjson. 🥳

It's funny that it appears to be a challenging enough bug that it bypassed at least two previous fixes.

cve.org/CVERecord?id=CVE-2025-

Fastjson before 1.2.48 mishandles autoType because, when an @type key is in a JSON document, and the value of that key is the name of a Java class, there may be calls to certain public methods of that class. Depending on the behavior of those methods, there may be JNDI injection with an attacker-supplied payload located elsewhere in that JSON document. This was exploited in the wild in 2023 through 2025. NOTE: this issue exists because of an incomplete fix for CVE-2017-18349. Also, a later bypass is covered by CVE-2022-25845.

##

CVE-2026-0732
(6.3 MEDIUM)

EPSS: 0.54%

updated 2026-01-09T00:30:34

1 posts

A vulnerability was found in D-Link DI-8200G 17.12.20A1. This affects an unknown function of the file /upgrade_filter.asp. The manipulation of the argument path results in command injection. The attack may be performed from remote. The exploit has been made public and could be used.

CVE-2025-12543
(9.6 CRITICAL)

EPSS: 0.13%

updated 2026-01-09T00:30:28

2 posts

A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBoss EAP, and other Java applications. The Undertow library fails to properly validate the Host header in incoming HTTP requests. As a result, requests containing malformed or malicious Host headers are processed without rejection, enabling attackers to poison caches, perform internal network scans, or hijack user sessio

raptor@infosec.exchange at 2026-01-09T20:42:54.000Z ##

CVE-2025-12543: Host Header Validation Bypass in #Undertow

endorlabs.com/learn/cve-2025-1

##

cR0w@infosec.exchange at 2026-01-07T16:56:51.000Z ##

access.redhat.com/security/cve

A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBoss EAP, and other Java applications. The Undertow library fails to properly validate the Host header in incoming HTTP requests.As a result, requests containing malformed or malicious Host headers are processed without rejection, enabling attackers to poison caches, perform internal network scans, or hijack user sessions.

##

CVE-2025-14025
(8.6 HIGH)

EPSS: 0.06%

updated 2026-01-09T00:30:28

1 posts

A flaw was found in Ansible Automation Platform (AAP). Read-only scoped OAuth2 API Tokens in AAP, are enforced at the Gateway level for Gateway-specific operations. However, this vulnerability allows read-only tokens to perform write operations on backend services (e.g., Controller, Hub, EDA). If this flaw were exploited, an attacker‘s capabilities would only be limited by role based access contro

cR0w@infosec.exchange at 2026-01-08T15:16:38.000Z ##

A flaw was found in Ansible Automation Platform (AAP). Read-only scoped OAuth2 API Tokens in AAP, are enforced at the Gateway level for Gateway-specific operations. However, this vulnerability allows read-only tokens to perform write operations on backend services (e.g., Controller, Hub, EDA). If this flaw were exploited, an attacker‘s capabilities would only be limited by role based access controls (RBAC).

access.redhat.com/security/cve

##

CVE-2026-0731
(5.3 MEDIUM)

EPSS: 0.13%

updated 2026-01-08T23:15:44.117000

1 posts

A vulnerability has been found in TOTOLINK WA1200 5.9c.2914. The impacted element is an unknown function of the file cstecgi.cgi of the component HTTP Request Handler. The manipulation leads to null pointer dereference. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-13151
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-08T21:30:33

1 posts

Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string.

cR0w@infosec.exchange at 2026-01-07T21:34:43.000Z ##

Reset the "Days since ASN1 vuln" sign to 0.

cve.org/CVERecord?id=CVE-2025-

Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string.

##

CVE-2025-59468
(9.0 CRITICAL)

EPSS: 0.22%

updated 2026-01-08T20:15:43.817000

2 posts

This vulnerability allows a Backup Administrator to perform remote code execution (RCE) as the postgres user by sending a malicious password parameter.

cR0w@infosec.exchange at 2026-01-08T16:43:57.000Z ##

CVEs are now published for this.

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

##

DarkWebInformer@infosec.exchange at 2026-01-07T16:07:10.000Z ##

🚨 Multiple Veeam CVEs Identified: Critical Flaws Allow RCE and High-Privilege Actions

CVE-2025-55125:

A flaw that allows a Backup or Tape Operator to achieve remote code execution (RCE) as root by crafting a malicious backup configuration file.

▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing

CVE-2025-59468:

A vulnerability enabling a Backup Administrator to execute remote code as the postgres user by supplying a malicious password parameter.

▪️Severity: Medium
▪️CVSS v3.1: 6.7
▪️Source: Discovered during internal testing

CVE-2025-59469

A security issue that allows a Backup or Tape Operator to write arbitrary files with root privileges.

▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing

CVE-2025-59470

A vulnerability that permits a Backup or Tape Operator to achieve remote code execution (RCE) as the postgres user by sending a malicious interval or order parameter.

▪️CVSS Severity: Critical
▪️CVSS v3.1: 9.0
▪️Source: Discovered during internal testing

Veeam: veeam.com/kb4738
Blog format: darkwebinformer.com/multiple-v

##

CVE-2026-21441(CVSS UNKNOWN)

EPSS: 0.01%

updated 2026-01-08T20:05:42

1 posts

### Impact urllib3's [streaming API](https://urllib3.readthedocs.io/en/2.6.2/advanced-usage.html#streaming-and-i-o) is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br

linux@activitypub.awakari.com at 2026-01-12T15:56:28.000Z ## Ubuntu: urllib3 Important Denial of Service CVE-2026-21441 urllib3 could be made to use excessive resources if it received specially crafted network traffic.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-65518
(7.5 HIGH)

EPSS: 0.02%

updated 2026-01-08T19:15:57.043000

1 posts

Plesk Obsidian versions 8.0.1 through 18.0.73 are vulnerable to a Denial of Service (DoS) condition. The vulnerability exists in the get_password.php endpoint, where a crafted request containing a malicious payload can cause the affected web interface to continuously reload, rendering the service unavailable to legitimate users. An attacker can exploit this issue remotely without authentication, r

1 repos

https://github.com/Jainil-89/CVE-2025-65518

nopatience@swecyb.com at 2026-01-13T12:46:33.000Z ##

Timeline of vulnerability (soon to be exploited...) (SmartMail):

2025-12-28: NVD CVE published. [1]
2026-01-08: Vulnerability deepdive and PoC published. [2]
2026-01-12: Reconnaissance for instances detected. [3]
2026-01-xx: Exploitation? ...

[1]: nvd.nist.gov/vuln/detail/CVE-2
[2]: labs.watchtowr.com/do-smart-pe
[3]: labs.greynoise.io/grimoire/202

##

hrbrmstr@mastodon.social at 2026-01-13T11:49:19.000Z ##

We've been working on a new AI-driven + human-in-the-loop threat signals detector and this morning it flagged this path that we have not seen before in the grid in the past 90d `/api/v1/licensing/about`. It turns out it's an unauth’d version check for SmarterTools SmarterMail.

If that name sounds familiar its b/c of CVE-2025-52691 (nvd.nist.gov/vuln/detail/CVE-2). (1/3)

##

nopatience@swecyb.com at 2026-01-13T12:46:33.000Z ##

Timeline of vulnerability (soon to be exploited...) (SmartMail):

2025-12-28: NVD CVE published. [1]
2026-01-08: Vulnerability deepdive and PoC published. [2]
2026-01-12: Reconnaissance for instances detected. [3]
2026-01-xx: Exploitation? ...

[1]: nvd.nist.gov/vuln/detail/CVE-2
[2]: labs.watchtowr.com/do-smart-pe
[3]: labs.greynoise.io/grimoire/202

##

hrbrmstr@mastodon.social at 2026-01-13T11:49:19.000Z ##

We've been working on a new AI-driven + human-in-the-loop threat signals detector and this morning it flagged this path that we have not seen before in the grid in the past 90d `/api/v1/licensing/about`. It turns out it's an unauth’d version check for SmarterTools SmarterMail.

If that name sounds familiar its b/c of CVE-2025-52691 (nvd.nist.gov/vuln/detail/CVE-2). (1/3)

##

campuscodi@mastodon.social at 2026-01-11T14:44:17.000Z ##

watchTowr has published a technical analysis of a CVSS 10 pre-auth RCE vulnerability in SmartTool's SmarterMail business email platform.

The vulnerability (CVE-2025-52691) was silently patched in Oct and publicly disclosed only a few months later in Dec

labs.watchtowr.com/do-smart-pe

##

_r_netsec@infosec.exchange at 2026-01-08T18:43:06.000Z ##

Do Smart People Ever Say They’re Smart? (SmarterTools SmarterMail Pre-Auth RCE CVE-2025-52691) - watchTowr Labs labs.watchtowr.com/do-smart-pe

##

AAKL@infosec.exchange at 2026-01-08T18:39:17.000Z ##

New.

WatchTower: Do Smart People Ever Say They’re Smart? (SmarterTools SmarterMail Pre-Auth RCE CVE-2025-52691) labs.watchtowr.com/do-smart-pe #infosec #threatresearch #vulnerability

##

cR0w@infosec.exchange at 2026-01-08T18:37:45.000Z ##

Get your popcorn, it's time for another watchTowr Labs post. This one is a pre-auth RCE in SmarterMail. :blobcatpopcorn:

labs.watchtowr.com/do-smart-pe

##

CVE-2017-20216
(9.8 CRITICAL)

EPSS: 0.31%

updated 2026-01-08T19:15:54.793000

1 posts

FLIR Thermal Camera PT-Series firmware version 8.0.0.64 contains multiple unauthenticated remote command injection vulnerabilities in the controllerFlirSystem.php script. Attackers can execute arbitrary system commands as root by exploiting unsanitized POST parameters in the execFlirSystem() function through shell_exec() calls. Exploitation evidence was observed by the Shadowserver Foundation on 2

CVE-2017-20214
(7.5 HIGH)

EPSS: 0.03%

updated 2026-01-08T19:15:54.560000

1 posts

FLIR Thermal Camera F/FC/PT/D firmware version 8.0.0.64 contains hard-coded SSH credentials that cannot be changed through normal camera operations. Attackers can leverage these persistent, unmodifiable credentials to gain unauthorized remote access to the thermal camera system.

CVE-2025-59470
(9.0 None)

EPSS: 0.22%

updated 2026-01-08T18:30:56

6 posts

This vulnerability allows a Backup Operator to perform remote code execution (RCE) as the postgres user by sending a malicious interval or order parameter.

1 repos

https://github.com/b1gchoi/CVE-2025-59470

cR0w@infosec.exchange at 2026-01-08T16:43:57.000Z ##

CVEs are now published for this.

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

##

beyondmachines1@infosec.exchange at 2026-01-08T09:01:43.000Z ##

Veeam Patches Critical Remote Code Execution Flaw in Backup & Replication v13

Veeam patched multiple vulnerabilities in Backup & Replication version 13, including a critical RCE flaw (CVE-2025-59470) that allows privileged operators to execute commands as the database user. These flaws are high-value targets for ransomware groups seeking to disable recovery options during attacks.

**If you are using Veeam Backup & Replication version 13, make sure all backup systems are isolated from the internet and accessible from trusted networks only. Limit the number of users with Backup or Tape Operator roles and update to version 13.0.1.1071 as soon as possible.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

DarkWebInformer@infosec.exchange at 2026-01-07T16:07:10.000Z ##

🚨 Multiple Veeam CVEs Identified: Critical Flaws Allow RCE and High-Privilege Actions

CVE-2025-55125:

A flaw that allows a Backup or Tape Operator to achieve remote code execution (RCE) as root by crafting a malicious backup configuration file.

▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing

CVE-2025-59468:

A vulnerability enabling a Backup Administrator to execute remote code as the postgres user by supplying a malicious password parameter.

▪️Severity: Medium
▪️CVSS v3.1: 6.7
▪️Source: Discovered during internal testing

CVE-2025-59469

A security issue that allows a Backup or Tape Operator to write arbitrary files with root privileges.

▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing

CVE-2025-59470

A vulnerability that permits a Backup or Tape Operator to achieve remote code execution (RCE) as the postgres user by sending a malicious interval or order parameter.

▪️CVSS Severity: Critical
▪️CVSS v3.1: 9.0
▪️Source: Discovered during internal testing

Veeam: veeam.com/kb4738
Blog format: darkwebinformer.com/multiple-v

##

jbhall56@infosec.exchange at 2026-01-07T13:58:39.000Z ##

Tracked as CVE-2025-59470, this RCE security flaw affects Veeam Backup & Replication 13.0.1.180 and all earlier version 13 builds. bleepingcomputer.com/news/secu

##

PostgreSQL@activitypub.awakari.com at 2026-01-07T11:31:04.000Z ## Veeam resolves CVSS 9.0 RCE flaw and other security issues Veeam patched a critical RCE flaw in Backup & Replication, CVE-2025-59470, rated CVSS 9.0, along with other vulnerabilities. Veeam rel...

#Breaking #News #Security #Hacking #hacking #news #information #security #news #IT #Information

Origin | Interest | Match ##

PostgreSQL@activitypub.awakari.com at 2026-01-07T10:46:41.000Z ## ⚠️ Veeam fixed a critical Backup & Replication flaw enabling remote code execution as the postgres user. CVE-2025-59470 can be abused by authenticated Backup or Tape Operators via crafted p...


Origin | Interest | Match ##

CVE-2025-59469
(9.0 None)

EPSS: 0.04%

updated 2026-01-08T18:30:56

2 posts

This vulnerability allows a Backup or Tape Operator to write files as root.

cR0w@infosec.exchange at 2026-01-08T16:43:57.000Z ##

CVEs are now published for this.

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

##

DarkWebInformer@infosec.exchange at 2026-01-07T16:07:10.000Z ##

🚨 Multiple Veeam CVEs Identified: Critical Flaws Allow RCE and High-Privilege Actions

CVE-2025-55125:

A flaw that allows a Backup or Tape Operator to achieve remote code execution (RCE) as root by crafting a malicious backup configuration file.

▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing

CVE-2025-59468:

A vulnerability enabling a Backup Administrator to execute remote code as the postgres user by supplying a malicious password parameter.

▪️Severity: Medium
▪️CVSS v3.1: 6.7
▪️Source: Discovered during internal testing

CVE-2025-59469

A security issue that allows a Backup or Tape Operator to write arbitrary files with root privileges.

▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing

CVE-2025-59470

A vulnerability that permits a Backup or Tape Operator to achieve remote code execution (RCE) as the postgres user by sending a malicious interval or order parameter.

▪️CVSS Severity: Critical
▪️CVSS v3.1: 9.0
▪️Source: Discovered during internal testing

Veeam: veeam.com/kb4738
Blog format: darkwebinformer.com/multiple-v

##

CVE-2025-67090
(5.1 MEDIUM)

EPSS: 0.03%

updated 2026-01-08T18:30:56

1 posts

The LuCI web interface on Gl Inet GL.Inet AX1800 Version 4.6.4 & 4.6.8 are vulnerable. Fix available in version 4.8.2 GL.Inet AX1800 Version 4.6.4 & 4.6.8 lacks rate limiting or account lockout mechanisms on the authentication endpoint (`/cgi-bin/luci`). An unauthenticated attacker on the local network can perform unlimited password attempts against the admin interface.

CVE-2025-67089
(8.1 HIGH)

EPSS: 0.23%

updated 2026-01-08T18:30:56

1 posts

A command injection vulnerability exists in the GL-iNet GL-AXT1800 router firmware v4.6.8. The vulnerability is present in the `plugins.install_package` RPC method, which fails to properly sanitize user input in package names. Authenticated attackers can exploit this to execute arbitrary commands with root privileges

CVE-2025-67091
(6.5 MEDIUM)

EPSS: 0.01%

updated 2026-01-08T18:30:56

1 posts

An issue in GL Inet GL.Inet AX1800 Version 4.6.4 & 4.6.8 are vulnerable. GL.Inet AX1800 Version 4.6.4 & 4.6.8 in the GL.iNet custom opkg wrapper script located at /usr/libexec/opkg-call. The script is executed with root privileges when triggered via the LuCI web interface or authenticated API calls to manage packages. The vulnerable code uses shell redirection to create a lock file in the world-wr

CVE-2026-0625(CVSS UNKNOWN)

EPSS: 0.43%

updated 2026-01-08T18:30:33

2 posts

Multiple D-Link DSL gateway devices contain a command injection vulnerability in the dnscfg.cgi endpoint due to improper sanitization of user-supplied DNS configuration parameters. An unauthenticated remote attacker can inject and execute arbitrary shell commands, resulting in remote code execution. The affected endpoint is also associated with unauthenticated DNS modification (“DNSChanger”) behav

jbhall56@infosec.exchange at 2026-01-07T13:50:08.000Z ##

Tracked as CVE-2026-0625 (CVSS score of 9.3), the security defect exists because the dnscfg.cgi library does not properly sanitize user-supplied DNS configuration parameters. securityweek.com/hackers-explo

##

beyondmachines1@infosec.exchange at 2026-01-07T10:01:16.000Z ##

Critical RCE Vulnerability Exploited in Legacy D-Link DSL Routers

D-Link legacy DSL are actively exploited using a vulnerability, CVE-2026-0625, which allows unauthenticated remote code execution and DNS hijacking.

**If you are using D-Link routers, check this advisory whether you are using any of the vulnerable devices. If yes, make sure the devices are isolated from the internet, reset to complex password and force trusted upstream DNS servers. Plan a very quick replacement for these devices, they are exploitable and won't be getting patches.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

CVE-2025-14346
(9.8 CRITICAL)

EPSS: 0.11%

updated 2026-01-08T18:09:49.800000

1 posts

WHILL Model C2 Electric Wheelchairs and Model F Power Chairs do not enforce authentication for Bluetooth connections. An attacker within range can pair with the device and issue movement commands, override speed restrictions, and manipulate configuration profiles without any credentials or user interaction.

encthenet@flyovercountry.social at 2026-01-05T22:32:06.000Z ##

@mwl

This seems perfect fodder for a plot device.

> cve.org/CVERecord?id=CVE-2025-

(Edit: original post is gone, but this is the CVE mentioned in it.)

##

CVE-2025-68428
(0 None)

EPSS: 0.08%

updated 2026-01-08T18:09:23.230000

4 posts

jsPDF is a library to generate PDFs in JavaScript. Prior to version 4.0.0, user control of the first argument of the loadFile method in the node.js build allows local file inclusion/path traversal. If given the possibility to pass unsanitized paths to the loadFile method, a user can retrieve file contents of arbitrary files in the local file system the node process is running in. The file contents

1 repos

https://github.com/12nio/CVE-2025-68428_PoC

cyberveille@mastobot.ping.moi at 2026-01-12T01:30:04.000Z ##

📢 CVE-2025-68428 : faille critique dans jsPDF (Node.js) permettant la lecture de fichiers locaux, corrigée en 4.0.0
📝 Selon IT-Connect (08/01/2026), une vulnérabilité critique CVE-2025-68428 affecte...
📖 cyberveille : cyberveille.ch/posts/2026-01-1
🌐 source : it-connect.fr/faille-critique-
#CVE_2025_68428 #Node_js #Cyberveille

##

DarkWebInformer@infosec.exchange at 2026-01-11T02:00:20.000Z ##

❗️CVE-2025-68428: Critical Path Traversal in jsPDF

GitHub: github.com/12nio/CVE-2025-6842

CVSS: 9.2
CVE Published: January 5th, 2026
Exploit Published: January 8th, 2026

News source: bleepingcomputer.com/news/secu

##

benzogaga33@mamot.fr at 2026-01-09T10:40:03.000Z ##

Cette faille critique dans jsPDF (CVE-2025-68428) peut exposer les données de votre serveur it-connect.fr/faille-critique- #ActuCybersécurité #Cybersécurité #Vulnérabilité

##

beyondmachines1@infosec.exchange at 2026-01-07T09:01:17.000Z ##

Critical path traversal flaw reported in jsPDF library

jsPDF version 4.0.0 patches a critical path traversal vulnerability (CVE-2025-68428) that allows attackers to extract sensitive server files by embedding them into generated PDFs. The flaw affects Node.js environments where user-supplied paths are passed to methods like loadFile or addImage.

**If you are using jsPDF, review this advisory and your use case. Ideally, update to version 4.0.0 and use the Node.js --permission flag to limit which files the process can read. Also, as a normal best practice, always sanitize and validate user input before passing it to libraries.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-0641
(6.3 MEDIUM)

EPSS: 4.18%

updated 2026-01-08T18:09:23.230000

2 posts

A security vulnerability has been detected in TOTOLINK WA300 5.2cu.7112_B20190227. This vulnerability affects the function sub_401510 of the file cstecgi.cgi. The manipulation of the argument UPLOAD_FILENAME leads to command injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.

secdb at 2026-01-12T00:00:49.245Z ##

📈 CVE Published in last 7 days (2026-01-05 - 2026-01-12)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1037

Severity:
- Critical: 110
- High: 289
- Medium: 492
- Low: 32
- None: 114

Status:
- : 43
- Analyzed: 62
- Awaiting Analysis: 537
- Received: 246
- Rejected: 32
- Undergoing Analysis: 117

Top CNAs:
- GitHub, Inc.: 201
- Wordfence: 161
- Patchstack: 150
- VulDB: 78
- MITRE: 73
- VulnCheck: 57
- N/A: 43
- MediaTek, Inc.: 28
- Fortinet, Inc.: 26
- Qualcomm, Inc.: 22

Top Affected Products:
- UNKNOWN: 964
- Google Android: 23
- Color Iccdev: 12
- Fabian Online Product Reservation System: 8
- Samsung Exynos 2400 Firmware: 7
- Samsung Exynos 1580 Firmware: 7
- Samsung Exynos 1380 Firmware: 6
- Samsung Exynos 1480 Firmware: 6
- Mediatek Nr17: 5
- Mediatek Nr16: 4

Top EPSS Score:
- CVE-2026-0581 - 3.41 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-0641 - 3.17 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-61489 - 2.45 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15502 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-6225 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2020-36925 - 0.52 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-64424 - 0.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-14997 - 0.46 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-46645 - 0.45 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-68455 - 0.43 % (secdb.nttzen.cloud/cve/detail/)

##

cR0w@infosec.exchange at 2026-01-06T19:32:47.000Z ##

TOTOLINK

cve.org/CVERecord?id=CVE-2026-

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2020-36925
(9.8 CRITICAL)

EPSS: 0.62%

updated 2026-01-08T18:09:23.230000

2 posts

Arteco Web Client DVR/NVR contains a session hijacking vulnerability with insufficient session ID complexity that allows remote attackers to bypass authentication. Attackers can brute force session IDs within a specific numeric range to obtain valid sessions and access live camera streams without authorization.

secdb at 2026-01-12T00:00:49.245Z ##

📈 CVE Published in last 7 days (2026-01-05 - 2026-01-12)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1037

Severity:
- Critical: 110
- High: 289
- Medium: 492
- Low: 32
- None: 114

Status:
- : 43
- Analyzed: 62
- Awaiting Analysis: 537
- Received: 246
- Rejected: 32
- Undergoing Analysis: 117

Top CNAs:
- GitHub, Inc.: 201
- Wordfence: 161
- Patchstack: 150
- VulDB: 78
- MITRE: 73
- VulnCheck: 57
- N/A: 43
- MediaTek, Inc.: 28
- Fortinet, Inc.: 26
- Qualcomm, Inc.: 22

Top Affected Products:
- UNKNOWN: 964
- Google Android: 23
- Color Iccdev: 12
- Fabian Online Product Reservation System: 8
- Samsung Exynos 2400 Firmware: 7
- Samsung Exynos 1580 Firmware: 7
- Samsung Exynos 1380 Firmware: 6
- Samsung Exynos 1480 Firmware: 6
- Mediatek Nr17: 5
- Mediatek Nr16: 4

Top EPSS Score:
- CVE-2026-0581 - 3.41 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-0641 - 3.17 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-61489 - 2.45 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15502 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-6225 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2020-36925 - 0.52 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-64424 - 0.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-14997 - 0.46 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-46645 - 0.45 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-68455 - 0.43 % (secdb.nttzen.cloud/cve/detail/)

##

cR0w@infosec.exchange at 2026-01-06T16:10:56.000Z ##

Assorted old vulns whose CVEs were just published. Quick glance looks like mostly random IoS stuff.

cve.org/CVERecord?id=CVE-2020-

cve.org/CVERecord?id=CVE-2020-

cve.org/CVERecord?id=CVE-2020-

cve.org/CVERecord?id=CVE-2020-

cve.org/CVERecord?id=CVE-2020-

cve.org/CVERecord?id=CVE-2020-

cve.org/CVERecord?id=CVE-2020-

cve.org/CVERecord?id=CVE-2020-

cve.org/CVERecord?id=CVE-2020-

cve.org/CVERecord?id=CVE-2020-

cve.org/CVERecord?id=CVE-2020-

cve.org/CVERecord?id=CVE-2020-

cve.org/CVERecord?id=CVE-2020-

cve.org/CVERecord?id=CVE-2020-

cve.org/CVERecord?id=CVE-2020-

cve.org/CVERecord?id=CVE-2020-

cve.org/CVERecord?id=CVE-2020-

cve.org/CVERecord?id=CVE-2020-

cve.org/CVERecord?id=CVE-2020-

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-15471
(9.8 CRITICAL)

EPSS: 0.22%

updated 2026-01-08T18:09:23.230000

3 posts

A vulnerability was detected in TRENDnet TEW-713RE 1.02. The impacted element is an unknown function of the file /goformX/formFSrvX. The manipulation of the argument SZCMD results in os command injection. It is possible to launch the attack remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

beyondmachines1@infosec.exchange at 2026-01-08T10:01:43.000Z ##

Unpatched command Injection flaw reported in Trendnet TEW-713RE extenders

Trendnet TEW-713RE range extenders are reportd to have a critical command injection flaw (CVE-2025-15471) that allows unauthenticated attackers to gain root access. The flaw is not patched and the company has not responded to disclosure attempts.

**If you are using TEW-713RE range extenders, make sure they are isolated from the internet and accessible from trusted networks only. Since Trendnet has not released a fix, plan a replacement with supported hardware.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

AAKL@infosec.exchange at 2026-01-07T17:15:33.000Z ##

This was updated yesterday.

EUVD: Critical TRENDnet vulnerability, also known as CVE-2025-15471 euvd.enisa.europa.eu/vulnerabi

New:

Critical: Blood Bank Management System 1.0 vulnerability CVE-2025-63525 euvd.enisa.europa.eu/vulnerabi #infosec

##

cR0w@infosec.exchange at 2026-01-06T21:54:37.000Z ##

TRENDnet

cve.org/CVERecord?id=CVE-2025-

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-0980
(6.4 MEDIUM)

EPSS: 0.01%

updated 2026-01-08T18:09:23.230000

1 posts

Nokia SR Linux is vulnerable to an authentication vulnerability allowing unauthorized access to the JSON-RPC service. When exploited, an invalid validation allows JSON RPC access without providing valid authentication credentials.

cR0w@infosec.exchange at 2026-01-07T14:17:58.000Z ##

No PoC but this one could be interesting to watch.

nokia.com/we-are-nokia/securit

Nokia SR Linux is vulnerable to an authentication vulnerability allowing unauthorized access to the JSON-RPC service. When exploited, an invalid validation allows JSON RPC access without providing valid authentication credentials.

##

CVE-2020-36923
(9.8 CRITICAL)

EPSS: 0.09%

updated 2026-01-08T18:09:23.230000

1 posts

Sony BRAVIA Digital Signage 1.7.8 contains an insecure direct object reference vulnerability that allows attackers to bypass authorization controls. Attackers can access hidden system resources like '/#/content-creation' by manipulating client-side access restrictions.

CVE-2020-36920
(8.8 HIGH)

EPSS: 0.06%

updated 2026-01-08T18:09:23.230000

1 posts

iDS6 DSSPro Digital Signage System 6.2 contains an improper access control vulnerability that allows authenticated users to elevate privileges through console JavaScript functions. Attackers can create users, modify roles and permissions, and potentially achieve full application takeover by exploiting insecure direct object references.

CVE-2020-36916
(8.8 HIGH)

EPSS: 0.03%

updated 2026-01-08T18:09:23.230000

1 posts

TDM Digital Signage PC Player 4.1.0.4 contains an elevation of privileges vulnerability that allows authenticated users to modify executable files. Attackers can leverage the 'Modify' permissions for authenticated users to replace executable files with malicious binaries and gain elevated system access.

CVE-2020-36907
(7.5 HIGH)

EPSS: 0.50%

updated 2026-01-08T18:09:23.230000

1 posts

Aerohive HiveOS contains a denial of service vulnerability in the NetConfig UI that allows unauthenticated attackers to render the web interface unusable. Attackers can send a crafted HTTP request to the action.php5 script with specific parameters to trigger a 5-minute service disruption.

CVE-2020-36914
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-08T18:09:23.230000

1 posts

QiHang Media Web Digital Signage 3.0.9 contains a sensitive information disclosure vulnerability that allows remote attackers to intercept user authentication credentials through cleartext cookie transmission. Attackers can perform man-in-the-middle attacks to capture and potentially misuse stored authentication credentials transmitted in an insecure manner.

CVE-2020-36922
(7.5 HIGH)

EPSS: 0.11%

updated 2026-01-08T18:09:23.230000

1 posts

Sony BRAVIA Digital Signage 1.7.8 contains an information disclosure vulnerability that allows unauthenticated attackers to access sensitive system details through API endpoints. Attackers can retrieve network interface information, server configurations, and system metadata by sending requests to the exposed system API.

CVE-2025-61489
(6.5 MEDIUM)

EPSS: 3.07%

updated 2026-01-08T18:08:54.147000

1 posts

A command injection vulnerability in the shell_exec function of sonirico mcp-shell v0.3.1 allows attackers to execute arbitrary commands via supplying a crafted command string.

secdb at 2026-01-12T00:00:49.245Z ##

📈 CVE Published in last 7 days (2026-01-05 - 2026-01-12)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1037

Severity:
- Critical: 110
- High: 289
- Medium: 492
- Low: 32
- None: 114

Status:
- : 43
- Analyzed: 62
- Awaiting Analysis: 537
- Received: 246
- Rejected: 32
- Undergoing Analysis: 117

Top CNAs:
- GitHub, Inc.: 201
- Wordfence: 161
- Patchstack: 150
- VulDB: 78
- MITRE: 73
- VulnCheck: 57
- N/A: 43
- MediaTek, Inc.: 28
- Fortinet, Inc.: 26
- Qualcomm, Inc.: 22

Top Affected Products:
- UNKNOWN: 964
- Google Android: 23
- Color Iccdev: 12
- Fabian Online Product Reservation System: 8
- Samsung Exynos 2400 Firmware: 7
- Samsung Exynos 1580 Firmware: 7
- Samsung Exynos 1380 Firmware: 6
- Samsung Exynos 1480 Firmware: 6
- Mediatek Nr17: 5
- Mediatek Nr16: 4

Top EPSS Score:
- CVE-2026-0581 - 3.41 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-0641 - 3.17 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-61489 - 2.45 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15502 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-6225 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2020-36925 - 0.52 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-64424 - 0.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-14997 - 0.46 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-46645 - 0.45 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-68455 - 0.43 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-20029
(4.9 MEDIUM)

EPSS: 0.03%

updated 2026-01-08T18:08:54.147000

2 posts

A vulnerability in the licensing features of&nbsp;Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an authenticated, remote attacker with administrative privileges to gain access to sensitive information.&nbsp; This vulnerability is due to improper parsing of XML that is processed by the web-based management interface of Cisco ISE and Cisco ISE

jbhall56@infosec.exchange at 2026-01-08T13:20:22.000Z ##

The vulnerability, tracked as CVE-2026-20029 (CVSS score: 4.9), resides in the licensing feature and could allow an authenticated, remote attacker with administrative privileges to gain access to sensitive information. thehackernews.com/2026/01/cisc

##

AAKL@infosec.exchange at 2026-01-07T16:25:43.000Z ##

Cisco has two new advisories:

CVE-2026-20026 and CVE-2026-20027: Multiple Cisco Products Snort 3 Distributed Computing Environment/Remote Procedure Call Vulnerabilities sec.cloudapps.cisco.com/securi

CVE-2026-20029: Cisco Identity Services Engine XML External Entity Processing Information Disclosure Vulnerability sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco #vulnerability #infosec

##

CVE-2026-22536
(0 None)

EPSS: 0.01%

updated 2026-01-08T18:08:54.147000

1 posts

The absence of permissions control for the user XXX allows the current configuration in the sudoers file to escalate privileges without any restrictions

cR0w@infosec.exchange at 2026-01-07T18:40:05.000Z ##

WTF kind of CVE is this? It doesn't even say what product is vulnerable.

nvd.nist.gov/vuln/detail/CVE-2

All it says is:

The absence of permissions control for the user XXX allows the current configuration in the sudoers file to escalate privileges without any restrictions

Slow clap for S21sec.

##

CVE-2026-20027
(5.3 MEDIUM)

EPSS: 0.03%

updated 2026-01-08T18:08:54.147000

1 posts

Multiple Cisco products are affected by a vulnerability in the processing of DCE/RPC requests that could allow an unauthenticated, remote attacker to cause the Snort 3 Detection Engine to leak sensitive information or to restart, resulting in an interruption of packet inspection. This vulnerability is due to an error in buffer handling logic when processing DCE/RPC requests, which can result in

AAKL@infosec.exchange at 2026-01-07T16:25:43.000Z ##

Cisco has two new advisories:

CVE-2026-20026 and CVE-2026-20027: Multiple Cisco Products Snort 3 Distributed Computing Environment/Remote Procedure Call Vulnerabilities sec.cloudapps.cisco.com/securi

CVE-2026-20029: Cisco Identity Services Engine XML External Entity Processing Information Disclosure Vulnerability sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco #vulnerability #infosec

##

CVE-2025-15346
(0 None)

EPSS: 0.06%

updated 2026-01-08T18:08:18.457000

1 posts

A vulnerability in the handling of verify_mode = CERT_REQUIRED in the wolfssl Python package (wolfssl-py) causes client certificate requirements to not be fully enforced.  Because the WOLFSSL_VERIFY_FAIL_IF_NO_PEER_CERT flag was not included, the behavior effectively matched CERT_OPTIONAL: a peer certificate was verified if presented, but connections were incorrectly authenticated when no client

cR0w@infosec.exchange at 2026-01-08T15:31:23.000Z ##

No awoo for you.

cve.org/CVERecord?id=CVE-2025-

A vulnerability in the handling of verify_mode = CERT_REQUIRED in the wolfssl Python package (wolfssl-py) causes client certificate requirements to not be fully enforced. Because the WOLFSSL_VERIFY_FAIL_IF_NO_PEER_CERT flag was not included, the behavior effectively matched CERT_OPTIONAL: a peer certificate was verified if presented, but connections were incorrectly authenticated when no client certificate was provided. This results in improper authentication, allowing attackers to bypass mutual TLS (mTLS) client authentication by omitting a client certificate during the TLS handshake. The issue affects versions up to and including 5.8.2.

##

CVE-2025-15079
(5.3 MEDIUM)

EPSS: 0.03%

updated 2026-01-08T18:08:18.457000

2 posts

When doing SSH-based transfers using either SCP or SFTP, and setting the known_hosts file, libcurl could still mistakenly accept connecting to hosts *not present* in the specified file if they were added as recognized in the libssh *global* known_hosts file.

cR0w@infosec.exchange at 2026-01-08T15:22:45.000Z ##

ZOMG curl CVEs.

curl.se/docs/CVE-2025-14017.ht

curl.se/docs/CVE-2025-14524.ht

curl.se/docs/CVE-2025-14819.ht

curl.se/docs/CVE-2025-15079.ht

curl.se/docs/CVE-2025-15224.ht

curl.se/docs/CVE-2025-13034.ht

##

harrysintonen@infosec.exchange at 2026-01-07T07:51:27.000Z ##

#curl 8.18.0 has been released. This release fixes 2 medium and 4 low level vulnerabilities:
- CVE-2025-13034: No QUIC certificate pinning with GnuTLS curl.se/docs/CVE-2025-13034.ht
- CVE-2025-14017: broken TLS options for threaded LDAPS curl.se/docs/CVE-2025-14017.ht
- CVE-2025-14524: bearer token leak on cross-protocol redirect curl.se/docs/CVE-2025-14524.ht
- CVE-2025-14819: OpenSSL partial chain store policy bypass curl.se/docs/CVE-2025-14819.ht
- CVE-2025-15079: libssh global knownhost override curl.se/docs/CVE-2025-15079.ht
- CVE-2025-15224: libssh key passphrase bypass without agent set curl.se/docs/CVE-2025-15224.ht

I discovered the last 2 vulnerabilities.

Download curl 8.18.0 from curl.se/download.html

#vulnerabilityresearch #vulnerability #cybersecurity #infosec

##

CVE-2025-13034
(5.9 MEDIUM)

EPSS: 0.02%

updated 2026-01-08T18:08:18.457000

2 posts

When using `CURLOPT_PINNEDPUBLICKEY` option with libcurl or `--pinnedpubkey` with the curl tool,curl should check the public key of the server certificate to verify the peer. This check was skipped in a certain condition that would then make curl allow the connection without performing the proper check, thus not noticing a possible impostor. To skip this check, the connection had to be done with

cR0w@infosec.exchange at 2026-01-08T15:22:45.000Z ##

ZOMG curl CVEs.

curl.se/docs/CVE-2025-14017.ht

curl.se/docs/CVE-2025-14524.ht

curl.se/docs/CVE-2025-14819.ht

curl.se/docs/CVE-2025-15079.ht

curl.se/docs/CVE-2025-15224.ht

curl.se/docs/CVE-2025-13034.ht

##

harrysintonen@infosec.exchange at 2026-01-07T07:51:27.000Z ##

#curl 8.18.0 has been released. This release fixes 2 medium and 4 low level vulnerabilities:
- CVE-2025-13034: No QUIC certificate pinning with GnuTLS curl.se/docs/CVE-2025-13034.ht
- CVE-2025-14017: broken TLS options for threaded LDAPS curl.se/docs/CVE-2025-14017.ht
- CVE-2025-14524: bearer token leak on cross-protocol redirect curl.se/docs/CVE-2025-14524.ht
- CVE-2025-14819: OpenSSL partial chain store policy bypass curl.se/docs/CVE-2025-14819.ht
- CVE-2025-15079: libssh global knownhost override curl.se/docs/CVE-2025-15079.ht
- CVE-2025-15224: libssh key passphrase bypass without agent set curl.se/docs/CVE-2025-15224.ht

I discovered the last 2 vulnerabilities.

Download curl 8.18.0 from curl.se/download.html

#vulnerabilityresearch #vulnerability #cybersecurity #infosec

##

CVE-2025-15224
(3.1 LOW)

EPSS: 0.05%

updated 2026-01-08T15:32:30

2 posts

When doing SSH-based transfers using either SCP or SFTP, and asked to do public key authentication, curl would wrongly still ask and authenticate using a locally running SSH agent.

cR0w@infosec.exchange at 2026-01-08T15:22:45.000Z ##

ZOMG curl CVEs.

curl.se/docs/CVE-2025-14017.ht

curl.se/docs/CVE-2025-14524.ht

curl.se/docs/CVE-2025-14819.ht

curl.se/docs/CVE-2025-15079.ht

curl.se/docs/CVE-2025-15224.ht

curl.se/docs/CVE-2025-13034.ht

##

harrysintonen@infosec.exchange at 2026-01-07T07:51:27.000Z ##

#curl 8.18.0 has been released. This release fixes 2 medium and 4 low level vulnerabilities:
- CVE-2025-13034: No QUIC certificate pinning with GnuTLS curl.se/docs/CVE-2025-13034.ht
- CVE-2025-14017: broken TLS options for threaded LDAPS curl.se/docs/CVE-2025-14017.ht
- CVE-2025-14524: bearer token leak on cross-protocol redirect curl.se/docs/CVE-2025-14524.ht
- CVE-2025-14819: OpenSSL partial chain store policy bypass curl.se/docs/CVE-2025-14819.ht
- CVE-2025-15079: libssh global knownhost override curl.se/docs/CVE-2025-15079.ht
- CVE-2025-15224: libssh key passphrase bypass without agent set curl.se/docs/CVE-2025-15224.ht

I discovered the last 2 vulnerabilities.

Download curl 8.18.0 from curl.se/download.html

#vulnerabilityresearch #vulnerability #cybersecurity #infosec

##

CVE-2025-14819
(5.3 MEDIUM)

EPSS: 0.03%

updated 2026-01-08T15:32:29

2 posts

When doing TLS related transfers with reused easy or multi handles and altering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally reuse a CA store cached in memory for which the partial chain option was reversed. Contrary to the user's wishes and expectations. This could make libcurl find and accept a trust chain that it otherwise would not.

cR0w@infosec.exchange at 2026-01-08T15:22:45.000Z ##

ZOMG curl CVEs.

curl.se/docs/CVE-2025-14017.ht

curl.se/docs/CVE-2025-14524.ht

curl.se/docs/CVE-2025-14819.ht

curl.se/docs/CVE-2025-15079.ht

curl.se/docs/CVE-2025-15224.ht

curl.se/docs/CVE-2025-13034.ht

##

harrysintonen@infosec.exchange at 2026-01-07T07:51:27.000Z ##

#curl 8.18.0 has been released. This release fixes 2 medium and 4 low level vulnerabilities:
- CVE-2025-13034: No QUIC certificate pinning with GnuTLS curl.se/docs/CVE-2025-13034.ht
- CVE-2025-14017: broken TLS options for threaded LDAPS curl.se/docs/CVE-2025-14017.ht
- CVE-2025-14524: bearer token leak on cross-protocol redirect curl.se/docs/CVE-2025-14524.ht
- CVE-2025-14819: OpenSSL partial chain store policy bypass curl.se/docs/CVE-2025-14819.ht
- CVE-2025-15079: libssh global knownhost override curl.se/docs/CVE-2025-15079.ht
- CVE-2025-15224: libssh key passphrase bypass without agent set curl.se/docs/CVE-2025-15224.ht

I discovered the last 2 vulnerabilities.

Download curl 8.18.0 from curl.se/download.html

#vulnerabilityresearch #vulnerability #cybersecurity #infosec

##

CVE-2025-69260
(7.5 HIGH)

EPSS: 0.09%

updated 2026-01-08T15:31:29

3 posts

A message out-of-bounds read vulnerability in Trend Micro Apex Central could allow a remote attacker to create a denial-of-service condition on affected installations. Please note: authentication is not required in order to exploit this vulnerability.

DarkWebInformer at 2026-01-12T19:06:17.837Z ##

‼️Trend Micro Apex Central Multiple Vulnerabilities

CVE:

CVE-2025-69258 (CVSS: 9.8)
CVE-2025-69259 (CVSS: 7.5)
CVE-2025-69260 (CVSS: 7.5)

CWE: CWE-1285, CWE-306, CWE-641

PoC/Writeup: tenable.com/security/research/

Disclosure Date: January 7. 2026

Disclosure: success.trendmicro.com/en-US/s

##

DarkWebInformer@infosec.exchange at 2026-01-12T19:06:17.000Z ##

‼️Trend Micro Apex Central Multiple Vulnerabilities

CVE:

CVE-2025-69258 (CVSS: 9.8)
CVE-2025-69259 (CVSS: 7.5)
CVE-2025-69260 (CVSS: 7.5)

CWE: CWE-1285, CWE-306, CWE-641

PoC/Writeup: tenable.com/security/research/

Disclosure Date: January 7. 2026

Disclosure: success.trendmicro.com/en-US/s

##

AAKL@infosec.exchange at 2026-01-07T16:58:30.000Z ##

Tenable Research Advisories have a new entry:

Critical: CVE-2025-69258; CVE-2025-69259 and CVE-2025-69260: Trend Micro Apex Central Multiple Vulnerabilities tenable.com/security/research/ @tenable #vulnerability #infosec

##

CVE-2025-69259
(7.5 HIGH)

EPSS: 0.09%

updated 2026-01-08T15:31:29

3 posts

A message unchecked NULL return value vulnerability in Trend Micro Apex Central could allow a remote attacker to create a denial-of-service condition on affected installations. Please note: authentication is not required in order to exploit this vulnerability..

DarkWebInformer at 2026-01-12T19:06:17.837Z ##

‼️Trend Micro Apex Central Multiple Vulnerabilities

CVE:

CVE-2025-69258 (CVSS: 9.8)
CVE-2025-69259 (CVSS: 7.5)
CVE-2025-69260 (CVSS: 7.5)

CWE: CWE-1285, CWE-306, CWE-641

PoC/Writeup: tenable.com/security/research/

Disclosure Date: January 7. 2026

Disclosure: success.trendmicro.com/en-US/s

##

DarkWebInformer@infosec.exchange at 2026-01-12T19:06:17.000Z ##

‼️Trend Micro Apex Central Multiple Vulnerabilities

CVE:

CVE-2025-69258 (CVSS: 9.8)
CVE-2025-69259 (CVSS: 7.5)
CVE-2025-69260 (CVSS: 7.5)

CWE: CWE-1285, CWE-306, CWE-641

PoC/Writeup: tenable.com/security/research/

Disclosure Date: January 7. 2026

Disclosure: success.trendmicro.com/en-US/s

##

AAKL@infosec.exchange at 2026-01-07T16:58:30.000Z ##

Tenable Research Advisories have a new entry:

Critical: CVE-2025-69258; CVE-2025-69259 and CVE-2025-69260: Trend Micro Apex Central Multiple Vulnerabilities tenable.com/security/research/ @tenable #vulnerability #infosec

##

CVE-2025-69258
(9.8 CRITICAL)

EPSS: 0.15%

updated 2026-01-08T15:31:28

5 posts

A LoadLibraryEX vulnerability in Trend Micro Apex Central could allow an unauthenticated remote attacker to load an attacker-controlled DLL into a key executable, leading to execution of attacker-supplied code under the context of SYSTEM on affected installations.

DarkWebInformer at 2026-01-12T19:06:17.837Z ##

‼️Trend Micro Apex Central Multiple Vulnerabilities

CVE:

CVE-2025-69258 (CVSS: 9.8)
CVE-2025-69259 (CVSS: 7.5)
CVE-2025-69260 (CVSS: 7.5)

CWE: CWE-1285, CWE-306, CWE-641

PoC/Writeup: tenable.com/security/research/

Disclosure Date: January 7. 2026

Disclosure: success.trendmicro.com/en-US/s

##

DarkWebInformer@infosec.exchange at 2026-01-12T19:06:17.000Z ##

‼️Trend Micro Apex Central Multiple Vulnerabilities

CVE:

CVE-2025-69258 (CVSS: 9.8)
CVE-2025-69259 (CVSS: 7.5)
CVE-2025-69260 (CVSS: 7.5)

CWE: CWE-1285, CWE-306, CWE-641

PoC/Writeup: tenable.com/security/research/

Disclosure Date: January 7. 2026

Disclosure: success.trendmicro.com/en-US/s

##

technadu@infosec.exchange at 2026-01-09T10:10:46.000Z ##

PoC exploits are now public for CVE-2025-69258 in Trend Micro Apex Central (on-premise), a vulnerability that could allow unauthenticated RCE on affected systems.

A patch is available, and there are no confirmed exploitation reports so far. Public PoCs, however, tend to accelerate attacker interest.

Follow @technadu for objective and technically grounded infosec updates.

Source: helpnetsecurity.com/2026/01/08

#Infosec #VulnerabilityDisclosure #PatchManagement #RCE #EnterpriseSecurity #ThreatLandscape

##

beyondmachines1@infosec.exchange at 2026-01-09T08:01:42.000Z ##

Critical flaws and public exploits released for Trend Micro Apex Central on-premise management

Trend Micro patched a critical remote code execution vulnerability (CVE-2025-69258) in Apex Central that allows attackers to gain SYSTEM privileges. Public exploit code is now available, making immediate patching of on-premise installations vital.

**Make sure all Apex Central servers are isolated from the internet and accessible from trusted networks only. Install Critical Patch Build 7190 as soon as possible.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

AAKL@infosec.exchange at 2026-01-07T16:58:30.000Z ##

Tenable Research Advisories have a new entry:

Critical: CVE-2025-69258; CVE-2025-69259 and CVE-2025-69260: Trend Micro Apex Central Multiple Vulnerabilities tenable.com/security/research/ @tenable #vulnerability #infosec

##

CVE-2025-14017(CVSS UNKNOWN)

EPSS: 0.01%

updated 2026-01-08T12:30:38

2 posts

When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl, changing TLS options in one thread would inadvertently change them globally and therefore possibly also affect other concurrently setup transfers. Disabling certificate verification for a specific transfer could unintentionally disable the feature for other threads as well.

cR0w@infosec.exchange at 2026-01-08T15:22:45.000Z ##

ZOMG curl CVEs.

curl.se/docs/CVE-2025-14017.ht

curl.se/docs/CVE-2025-14524.ht

curl.se/docs/CVE-2025-14819.ht

curl.se/docs/CVE-2025-15079.ht

curl.se/docs/CVE-2025-15224.ht

curl.se/docs/CVE-2025-13034.ht

##

harrysintonen@infosec.exchange at 2026-01-07T07:51:27.000Z ##

#curl 8.18.0 has been released. This release fixes 2 medium and 4 low level vulnerabilities:
- CVE-2025-13034: No QUIC certificate pinning with GnuTLS curl.se/docs/CVE-2025-13034.ht
- CVE-2025-14017: broken TLS options for threaded LDAPS curl.se/docs/CVE-2025-14017.ht
- CVE-2025-14524: bearer token leak on cross-protocol redirect curl.se/docs/CVE-2025-14524.ht
- CVE-2025-14819: OpenSSL partial chain store policy bypass curl.se/docs/CVE-2025-14819.ht
- CVE-2025-15079: libssh global knownhost override curl.se/docs/CVE-2025-15079.ht
- CVE-2025-15224: libssh key passphrase bypass without agent set curl.se/docs/CVE-2025-15224.ht

I discovered the last 2 vulnerabilities.

Download curl 8.18.0 from curl.se/download.html

#vulnerabilityresearch #vulnerability #cybersecurity #infosec

##

CVE-2009-0556
(8.8 HIGH)

EPSS: 76.76%

updated 2026-01-08T02:00:02.163000

6 posts

Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3, and PowerPoint in Microsoft Office 2004 for Mac, allows remote attackers to execute arbitrary code via a PowerPoint file with an OutlineTextRefAtom containing an an invalid index value that triggers memory corruption, as exploited in the wild in April 2009 by Exploit:Win32/Apptom.gen, aka "Memory Corruption Vulnerability."

beyondmachines1@infosec.exchange at 2026-01-09T12:01:43.000Z ##

CISA warns of active attacks legacy PowerPoint flaw

CISA is warning about active exploitation of CVE-2009-0556, a critical memory corruption vulnerability in legacy Microsoft PowerPoint (2000-2003 versions) that allows attackers to execute malware and move laterally through networks via malicious .ppt files.

**If you're still running legacy Microsoft Office (2000-2003 or 2004 for Mac), remove it and upgrade immediately to a supported version. This 15-year-old PowerPoint flaw is being actively exploited to install malware. If upgrading isn't possible right away, remove PowerPoint from these old systems and avoid opening any .ppt files.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

DarkWebInformer@infosec.exchange at 2026-01-08T15:33:41.000Z ##

🚨 CISA adds two vulnerabilities to the KEV Catalog

darkwebinformer.com/cisa-kev-c

CVE-2009-0556: Microsoft Office PowerPoint Code Injection Vulnerability

CVSS: 9.3

CVE-2025-37164: Hewlett Packard Enterprise OneView Code Injection Vulnerability

CVSS: 10

##

hexmasteen@chaos.social at 2026-01-08T08:55:01.000Z ##

Yesterday (2026-01-07) CISA added a new entry to it's catalog of known exploited vulnerabilities. It's about CVE-2009-0556, a vulnerability in PowerPoint 2003 which is EOL since 2014.

#InfoSec is a lost cause if we keep using unmaintained software.

##

AAKL@infosec.exchange at 2026-01-07T19:41:11.000Z ##

CISA has updated the KEV catalogue.

CVE-2025-37164: Hewlett Packard Enterprise OneView Code Injection Vulnerability cve.org/CVERecord?id=CVE-2025-

CVE-2009-0556: Microsoft Office PowerPoint Code Injection Vulnerability cve.org/CVERecord?id=CVE-2009- #infosec #CISA #Microsoft #HP

##

j91321@infosec.exchange at 2026-01-07T19:26:42.000Z ##

Huh, CVE-2009-0556 added to KEV? :blobcateyes: cisa.gov/news-events/alerts/20

##

cisakevtracker@mastodon.social at 2026-01-07T19:00:58.000Z ##

CVE ID: CVE-2009-0556
Vendor: Microsoft
Product: Office
Date Added: 2026-01-07
Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-37164
(10.0 CRITICAL)

EPSS: 81.31%

updated 2026-01-08T00:32:16

4 posts

A remote code execution issue exists in HPE OneView.

Nuclei template

3 repos

https://github.com/g0vguy/CVE-2025-37164-PoC

https://github.com/LACHHAB-Anas/Exploit_CVE-2025-37164

https://github.com/rxerium/CVE-2025-37164

Hackread@mstdn.social at 2026-01-10T14:02:18.000Z ##

CISA urges emergency patching after a critical HPE OneView vulnerability (CVE-2025-37164) with active exploitation - Check your versions and update to OneView v11.00 or later now.

Read: hackread.com/cisa-emergency-pa

#Cybersecurity #HPE #OneView #CISA #Vulnerability

##

DarkWebInformer@infosec.exchange at 2026-01-08T15:33:41.000Z ##

🚨 CISA adds two vulnerabilities to the KEV Catalog

darkwebinformer.com/cisa-kev-c

CVE-2009-0556: Microsoft Office PowerPoint Code Injection Vulnerability

CVSS: 9.3

CVE-2025-37164: Hewlett Packard Enterprise OneView Code Injection Vulnerability

CVSS: 10

##

AAKL@infosec.exchange at 2026-01-07T19:41:11.000Z ##

CISA has updated the KEV catalogue.

CVE-2025-37164: Hewlett Packard Enterprise OneView Code Injection Vulnerability cve.org/CVERecord?id=CVE-2025-

CVE-2009-0556: Microsoft Office PowerPoint Code Injection Vulnerability cve.org/CVERecord?id=CVE-2009- #infosec #CISA #Microsoft #HP

##

cisakevtracker@mastodon.social at 2026-01-07T19:01:14.000Z ##

CVE ID: CVE-2025-37164
Vendor: Hewlett Packard (HP)
Product: OneView
Date Added: 2026-01-07
Notes: support.hpe.com/hpesc/public/d ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-62224
(5.5 MEDIUM)

EPSS: 0.06%

updated 2026-01-08T00:31:21

2 posts

User interface (ui) misrepresentation of critical information in Microsoft Edge for Android allows an authorized attacker to perform spoofing over a network.

AAKL@infosec.exchange at 2026-01-08T17:31:11.000Z ##

Microsoft posted an update to its security guide yesterday:

Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability msrc.microsoft.com/update-guid #Microsoft #vulnerability #Android #Chromium #Edge

##

Android@activitypub.awakari.com at 2026-01-07T08:00:00.000Z ## CVE-2025-62224 Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability User interface (ui) misrepresentation of critical information in Microsoft Edge for Android allows an authorized at...

#CVE

Origin | Interest | Match ##

CVE-2017-20213
(7.5 HIGH)

EPSS: 0.10%

updated 2026-01-08T00:31:21

1 posts

FLIR Thermal Camera F/FC/PT/D Stream firmware version 8.0.0.64 contains an unauthenticated vulnerability that allows remote attackers to access live camera streams without credentials. Attackers can exploit the vulnerability to view unauthorized thermal camera video feeds across multiple camera series without requiring any authentication.

CVE-2017-20215
(8.8 HIGH)

EPSS: 0.26%

updated 2026-01-08T00:31:21

1 posts

FLIR Thermal Camera FC-S/PT firmware version 8.0.0.64 contains an authenticated OS command injection vulnerability that allows attackers to execute shell commands with root privileges. Authenticated attackers can inject arbitrary shell commands through unvalidated input parameters to gain complete control of the thermal camera system.

CVE-2017-20212
(6.2 MEDIUM)

EPSS: 0.19%

updated 2026-01-08T00:31:21

1 posts

FLIR Thermal Camera F/FC/PT/D firmware version 8.0.0.64 contains an information disclosure vulnerability that allows unauthenticated attackers to read arbitrary files through unverified input parameters. Attackers can exploit the /var/www/data/controllers/api/xml.php readFile() function to access local system files without authentication.

CVE-2026-20026
(5.8 MEDIUM)

EPSS: 0.09%

updated 2026-01-07T18:30:33

1 posts

Multiple&nbsp;Cisco products are affected by a vulnerability in the processing of DCE/RPC requests that could allow an unauthenticated, remote attacker to cause the Snort 3 Detection Engine to leak sensitive information or to restart, resulting in an interruption of packet inspection. This vulnerability is due to an error in buffer handling logic when processing DCE/RPC requests, which can result

AAKL@infosec.exchange at 2026-01-07T16:25:43.000Z ##

Cisco has two new advisories:

CVE-2026-20026 and CVE-2026-20027: Multiple Cisco Products Snort 3 Distributed Computing Environment/Remote Procedure Call Vulnerabilities sec.cloudapps.cisco.com/securi

CVE-2026-20029: Cisco Identity Services Engine XML External Entity Processing Information Disclosure Vulnerability sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco #vulnerability #infosec

##

CVE-2026-22542(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-01-07T18:30:33

1 posts

An attacker with access to the system's internal network can cause a denial of service on the system by making two concurrent connections through the Telnet service.

cR0w@infosec.exchange at 2026-01-07T15:47:58.000Z ##

RE: infosec.exchange/@cR0w/1158545

This one is even better. 🤣

An attacker with access to the system's internal network can cause a denial of service on the system by making two concurrent connections through the Telnet service.

Good luck with your Nessus scans.

cve.org/CVERecord?id=CVE-2026-

##

CVE-2026-22541(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-01-07T18:30:33

1 posts

The massive sending of ICMP requests causes a denial of service on one of the boards from the EVCharger that allows control the EV interfaces. Since the board must be operating correctly for the charger to also function correctly.

cR0w@infosec.exchange at 2026-01-07T15:43:14.000Z ##

RE: infosec.exchange/@cR0w/1158543

Ooh, this one only requires L3 access to DoS.

The massive sending of ICMP requests causes a denial of service on one of the boards from the EVCharger that allows control the EV interfaces. Since the board must be operating correctly for the charger to also function correctly.

cve.org/CVERecord?id=CVE-2026-

Edit to correct the link.

##

CVE-2025-69277
(4.5 MEDIUM)

EPSS: 0.02%

updated 2026-01-07T17:16:02.003000

1 posts

libsodium before ad3004e, in atypical use cases involving certain custom cryptography or untrusted data to crypto_core_ed25519_is_valid_point, mishandles checks for whether an elliptic curve point is valid because it sometimes allows points that aren't in the main cryptographic group.

Ubuntu@activitypub.awakari.com at 2026-01-08T16:59:39.000Z ## Ubuntu 22.04 LTS: Critical Info Exposure in libsodium CVE-2025-69277 Sodium could be made to expose sensitive information.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2026-0628
(8.8 HIGH)

EPSS: 0.02%

updated 2026-01-07T15:31:20

2 posts

Insufficient policy enforcement in WebView tag in Google Chrome prior to 143.0.7499.192 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: High)

1 repos

https://github.com/fevar54/CVE-2026-0628-POC

beyondmachines1@infosec.exchange at 2026-01-08T12:01:43.000Z ##

Google patches high-risk WebView flaw in first 2026 Chrome update

Google released Chrome 143.0.7499.192/193 to fix a high-risk vulnerability (CVE-2026-0628) in the WebView component that could allow malicious extensions to inject scripts into privileged pages.

**If you are using Google Chrome or other Chromium-based browsers (Edge, Brave, Vivaldi, Opera...) patch your browser ASAP. No critical flaws in this update, but don't wait for the flaw to become actively exploited. Update now, it's trivial and all your tabs reopen after the update.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

technadu@infosec.exchange at 2026-01-07T11:42:45.000Z ##

Google has patched a high-severity Chrome WebView vulnerability tracked as CVE-2026-0628, caused by insufficient policy enforcement in the tag component.

The flaw could allow attackers to bypass security controls in applications embedding WebView, increasing risk across desktop and mobile ecosystems.

Full Article :
technadu.com/google-patches-hi

#ChromeSecurity #WebView #CVE2026 #Infosec #ApplicationSecurity

##

CVE-2025-6225(CVSS UNKNOWN)

EPSS: 0.89%

updated 2026-01-07T15:30:25

2 posts

Kieback&Peter Neutrino-GLT product is used for building management. It's web component "SM70 PHWEB" is vulnerable to shell command injection via login form. The injected commands would execute with low privileges. The vulnerability has been fixed in version 9.40.02

secdb at 2026-01-12T00:00:49.245Z ##

📈 CVE Published in last 7 days (2026-01-05 - 2026-01-12)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1037

Severity:
- Critical: 110
- High: 289
- Medium: 492
- Low: 32
- None: 114

Status:
- : 43
- Analyzed: 62
- Awaiting Analysis: 537
- Received: 246
- Rejected: 32
- Undergoing Analysis: 117

Top CNAs:
- GitHub, Inc.: 201
- Wordfence: 161
- Patchstack: 150
- VulDB: 78
- MITRE: 73
- VulnCheck: 57
- N/A: 43
- MediaTek, Inc.: 28
- Fortinet, Inc.: 26
- Qualcomm, Inc.: 22

Top Affected Products:
- UNKNOWN: 964
- Google Android: 23
- Color Iccdev: 12
- Fabian Online Product Reservation System: 8
- Samsung Exynos 2400 Firmware: 7
- Samsung Exynos 1580 Firmware: 7
- Samsung Exynos 1380 Firmware: 6
- Samsung Exynos 1480 Firmware: 6
- Mediatek Nr17: 5
- Mediatek Nr16: 4

Top EPSS Score:
- CVE-2026-0581 - 3.41 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-0641 - 3.17 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-61489 - 2.45 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15502 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-6225 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2020-36925 - 0.52 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-64424 - 0.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-14997 - 0.46 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-46645 - 0.45 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-68455 - 0.43 % (secdb.nttzen.cloud/cve/detail/)

##

cR0w@infosec.exchange at 2026-01-07T14:21:20.000Z ##

Kieback&Peter

cve.org/CVERecord?id=CVE-2025-

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2026-22540(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-01-07T15:30:25

1 posts

The massive sending of ARP requests causes a denial of service on one board of the charger that allows control of the EV interfaces. Since the board must be operating correctly for the charger to also function correctly.

cR0w@infosec.exchange at 2026-01-07T14:33:11.000Z ##

DoS via ARP flood. In 2026. And this is the kind of shit people are putting on the Internet and connecting to home and industrial networks.

The massive sending of ARP requests causes a denial of service on one board of the charger that allows control of the EV interfaces. Since the board must be operating correctly for the charger to also function correctly, the denial of service (DoS) results in a restart of the charger functionalities.

cve.org/CVERecord?id=CVE-2026-

##

CVE-2025-38352
(7.4 HIGH)

EPSS: 0.25%

updated 2026-01-07T15:30:14

7 posts

In the Linux kernel, the following vulnerability has been resolved: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand(). If a concurrent posix_cpu_timer_del() runs at that

3 repos

https://github.com/farazsth98/poc-CVE-2025-38352

https://github.com/Crime2/poc-CVE-2025-38352

https://github.com/farazsth98/chronomaly

DarkWebInformer at 2026-01-12T17:52:24.596Z ##

❗️Chronomaly: Android kernel exploit for CVE-2025-38352, previously exploited in-the-wild. Targets vulnerable Linux kernels v5.10.x.

GitHub: github.com/farazsth98/chronoma

##

DarkWebInformer@infosec.exchange at 2026-01-12T17:52:24.000Z ##

❗️Chronomaly: Android kernel exploit for CVE-2025-38352, previously exploited in-the-wild. Targets vulnerable Linux kernels v5.10.x.

GitHub: github.com/farazsth98/chronoma

##

Android@activitypub.awakari.com at 2026-01-07T14:40:40.000Z ## Chronomaly — PoC Exploit Released for Android/Linux Kernel Vulnerability CVE-2025-38352 https://cybersecuritynews.com/chronomaly-exploit/ Commentaires : voir le flux Atom ouvrir dans le navigateur

#kernel #noyau_linux #android #faille #programmation_concurrente #exploit

Origin | Interest | Match ##

Android@activitypub.awakari.com at 2026-01-07T14:40:40.000Z ## Chronomaly — PoC Exploit Released for Android/Linux Kernel Vulnerability CVE-2025-38352 https://cybersecuritynews.com/chronomaly-exploit/ Commentaires : voir le flux Atom ouvrir dans le navigateur

#exploit #kernel #noyau_linux #android #faille #programmation_concurrente

Origin | Interest | Match ##

linux@activitypub.awakari.com at 2026-01-07T14:40:40.000Z ## Chronomaly — PoC Exploit Released for Android/Linux Kernel Vulnerability CVE-2025-38352 https://cybersecuritynews.com/chronomaly-exploit/ Commentaires : voir le flux Atom ouvrir dans le navigateur

#android #faille #programmation_concurrente #exploit #kernel #noyau_linux

Origin | Interest | Match ##

Android@activitypub.awakari.com at 2026-01-07T14:09:29.000Z ## PoC Exploit Released for Android/Linux Kernel Vulnerability CVE-2025-38352 A proof-of-concept (PoC) exploit for CVE-2025-38352, a critical race condition vulnerability in the Linux kernel, has been...

#Cyber #Security #News #Vulnerability #News #cyber #security #cyber #security #news #vulnerability

Origin | Interest | Match ##

Android@activitypub.awakari.com at 2026-01-07T13:47:51.000Z ## PoC Exploit Released for Android and Linux Kernel Vulnerability CVE-2025-38352 A fully functional exploit has been released for CVE-2025-38352, a critical use-after-free vulnerability in the Linux ...

#Cyber #Security #News #Cybersecurity #Linux #Vulnerabilities #Cyber #Security #Cyber #security #news

Origin | Interest | Match ##

CVE-2025-68926
(9.8 CRITICAL)

EPSS: 3.14%

updated 2026-01-07T15:22:22

1 posts

## Vulnerability Overview ### Description RustFS implements gRPC authentication using a hardcoded static token `"rustfs rpc"` that is: 1. **Publicly exposed** in the source code repository 2. **Hardcoded** on both client and server sides 3. **Non-configurable** with no mechanism for token rotation 4. **Universally valid** across all RustFS deployments Any attacker with network access to the gRP

Nuclei template

2 repos

https://github.com/Arcueld/CVE-2025-68926

https://github.com/Chocapikk/CVE-2025-68926

hackmag@infosec.exchange at 2026-01-06T10:00:32.000Z ##

⚪ A pre-defined access token was found in the open-source project RustFS

🗨️ In the source code of the open-source project RustFS (which develops an S3-compatible distributed object storage solution), experts identified a critical vulnerability (CVE-2025-68926). The issue arises due to the presence of a hardcoded access token in the code, allowing connection to the network s…

🔗 hackmag.com/news/a-pre-defined

#news

##

CVE-2025-15472
(7.2 HIGH)

EPSS: 0.17%

updated 2026-01-07T12:31:32

1 posts

A flaw has been found in TRENDnet TEW-811DRU 1.0.2.0. This affects the function setDeviceURL  of the file uapply.cgi of the component httpd . This manipulation of the argument DeviceURL causes os command injection. The attack can be initiated remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2025-14631(CVSS UNKNOWN)

EPSS: 0.02%

updated 2026-01-07T12:31:27

1 posts

A NULL Pointer Dereference vulnerability in TP-Link Archer BE400 V1(802.11 modules) allows  an adjacent attacker to cause a denial-of-service (DoS) by triggering a device reboot. This issue affects Archer BE400: xi 1.1.0 Build 20250710 rel.14914.

CVE-2020-36913
(5.3 MEDIUM)

EPSS: 0.10%

updated 2026-01-06T21:31:40

1 posts

All-Dynamics Software enlogic:show 2.0.2 contains a session fixation vulnerability that allows attackers to set a predefined PHP session identifier during the login process. Attackers can forge HTTP GET requests to welcome.php with a manipulated session token to bypass authentication and potentially execute cross-site request forgery attacks.

CVE-2025-63525
(9.6 CRITICAL)

EPSS: 0.03%

updated 2026-01-06T21:15:43.240000

1 posts

An issue was discovered in Blood Bank Management System 1.0 allowing authenticated attackers to perform actions with escalated privileges via crafted request to delete.php.

AAKL@infosec.exchange at 2026-01-07T17:15:33.000Z ##

This was updated yesterday.

EUVD: Critical TRENDnet vulnerability, also known as CVE-2025-15471 euvd.enisa.europa.eu/vulnerabi

New:

Critical: Blood Bank Management System 1.0 vulnerability CVE-2025-63525 euvd.enisa.europa.eu/vulnerabi #infosec

##

CVE-2026-0640
(8.8 HIGH)

EPSS: 0.09%

updated 2026-01-06T18:31:44

1 posts

A weakness has been identified in Tenda AC23 16.03.07.52. This affects the function sscanf of the file /goform/PowerSaveSet. Executing a manipulation of the argument Time can lead to buffer overflow. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.

CVE-2025-39477
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-01-06T18:31:43

1 posts

Missing Authorization vulnerability in Sfwebservice InWave Jobs allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects InWave Jobs: from n/a through 3.5.8.

thehackerwire@mastodon.social at 2026-01-06T17:22:52.000Z ##

🔴 CVE-2025-39477 - Critical (9.8)

Missing Authorization vulnerability in Sfwebservice InWave Jobs allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects InWave Jobs: from n/a through 3.5.8.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

CVE-2020-36924
(7.5 HIGH)

EPSS: 0.08%

updated 2026-01-06T18:31:43

1 posts

Sony BRAVIA Digital Signage 1.7.8 contains a remote file inclusion vulnerability that allows attackers to inject arbitrary client-side scripts through the content material URL parameter. Attackers can exploit this vulnerability to hijack user sessions, execute cross-site scripting code, and modify display content by manipulating the input material type.

CVE-2025-60262
(9.8 CRITICAL)

EPSS: 0.14%

updated 2026-01-06T18:31:43

1 posts

An issue in H3C M102G HM1A0V200R010 wireless controller and BA1500L SWBA1A0V100R006 wireless access point, there is a misconfiguration vulnerability about vsftpd. Through this vulnerability, all files uploaded anonymously via the FTP protocol is automatically owned by the root user and remote attackers could gain root-level control over the devices.

CVE-2020-36917
(7.5 HIGH)

EPSS: 0.07%

updated 2026-01-06T18:31:42

1 posts

iDS6 DSSPro Digital Signage System 6.2 contains a sensitive information disclosure vulnerability that allows remote attackers to intercept authentication credentials through cleartext cookie transmission. Attackers can exploit the autoSave feature to capture user passwords during man-in-the-middle attacks on HTTP communications.

CVE-2020-36912
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-01-06T18:31:42

1 posts

Plexus anblick Digital Signage Management 3.1.13 contains an open redirect vulnerability in the 'PantallaLogin' script that allows attackers to manipulate the 'pagina' GET parameter. Attackers can craft malicious links that redirect users to arbitrary websites by exploiting improper input validation in the parameter.

CVE-2020-36921
(7.5 HIGH)

EPSS: 0.23%

updated 2026-01-06T18:31:42

1 posts

RED-V Super Digital Signage System 5.1.1 contains an information disclosure vulnerability that allows unauthenticated attackers to access sensitive webserver log files. Attackers can visit multiple endpoints to retrieve system resources and debug log information without authentication.

CVE-2020-36906
(4.3 MEDIUM)

EPSS: 0.02%

updated 2026-01-06T18:31:42

1 posts

P5 FNIP-8x16A FNIP-4xSH 1.0.20 contains a cross-site request forgery vulnerability that allows attackers to perform administrative actions without user consent. Attackers can craft malicious web pages to add new admin users, change passwords, and modify system configurations by tricking authenticated users into loading a specially crafted form.

CVE-2020-36909
(6.5 MEDIUM)

EPSS: 0.04%

updated 2026-01-06T18:31:42

1 posts

SnapGear Management Console SG560 3.1.5 contains a file manipulation vulnerability that allows authenticated users to read, write, and delete files using the edit_config_files CGI script. Attackers can manipulate POST request parameters in /cgi-bin/cgix/edit_config_files to access and modify files outside the intended /etc/config/ directory.

CVE-2020-36918
(4.3 MEDIUM)

EPSS: 0.02%

updated 2026-01-06T18:31:42

1 posts

iDS6 DSSPro Digital Signage System 6.2 contains a cross-site request forgery vulnerability that allows attackers to perform administrative actions without request validation. Attackers can craft malicious web pages to trick logged-in administrators into adding unauthorized users by exploiting the lack of CSRF protections.

CVE-2020-36910
(8.8 HIGH)

EPSS: 0.43%

updated 2026-01-06T18:31:42

1 posts

Cayin Signage Media Player 3.0 contains an authenticated remote command injection vulnerability in system.cgi and wizard_system.cgi pages. Attackers can exploit the 'NTP_Server_IP' parameter with default credentials to execute arbitrary shell commands as root.

CVE-2020-36915
(7.5 HIGH)

EPSS: 0.05%

updated 2026-01-06T18:31:35

1 posts

Adtec Digital SignEdje Digital Signage Player v2.08.28 contains multiple hardcoded default credentials that allow unauthenticated remote access to web, telnet, and SSH interfaces. Attackers can exploit these credentials to gain root-level access and execute system commands across multiple Adtec Digital product versions.

CVE-2020-36908
(5.3 MEDIUM)

EPSS: 0.02%

updated 2026-01-06T18:31:34

1 posts

SnapGear Management Console SG560 version 3.1.5 contains a cross-site request forgery vulnerability that allows attackers to perform administrative actions without user consent. Attackers can craft a malicious web page that automatically submits a form to create a new super user account with full administrative privileges when a logged-in user visits the page.

CVE-2020-36905
(7.5 HIGH)

EPSS: 0.07%

updated 2026-01-06T18:31:33

1 posts

FIBARO System Home Center 5.021 contains a remote file inclusion vulnerability in the undocumented proxy API that allows attackers to include arbitrary client-side scripts. Attackers can exploit the 'url' GET parameter to inject malicious JavaScript and potentially hijack user sessions or manipulate page content.

CVE-2025-54957
(6.5 MEDIUM)

EPSS: 0.05%

updated 2026-01-06T18:31:24

3 posts

An issue was discovered in Dolby UDC 4.5 through 4.13. A crash of the DD+ decoder process can occur when a malformed DD+ bitstream is processed. When Evolution data is processed by evo_priv.c from the DD+ bitstream, the decoder writes that data into a buffer. The length calculation for a write can overflow due to an integer wraparound. This can lead to the allocated buffer being too small, and the

1 repos

https://github.com/AlphabugX/CVE-2025-54957

jbhall56@infosec.exchange at 2026-01-08T13:10:58.000Z ##

The flaw is tracked as CVE-2025-54957 and its existence came to light in October 2025 after it was discovered by Google researchers. securityweek.com/critical-dolb

##

Android@activitypub.awakari.com at 2026-01-06T18:54:22.000Z ## Google fixes critical Dolby Decoder bug in Android January update Android’s January 2026 update fixes CVE-2025-54957, a critical Dolby audio decoder flaw discovered by Google researchers in Octob...

#Breaking #News #Mobile #Security #Android #CVE-2025-54957 #Google #Hacking #hacking #news #information

Origin | Interest | Match ##

Android@activitypub.awakari.com at 2026-01-06T13:50:36.000Z ## Critical Dolby Vulnerability Patched in Android The flaw is tracked as CVE-2025-54957 and its existence came to light in October 2025 after it was discovered by Google researchers. The post Critica...

#Vulnerabilities #Android #Dolby #vulnerability

Origin | Interest | Match ##

CVE-2026-21877
(10.0 CRITICAL)

EPSS: 0.05%

updated 2026-01-06T17:48:25

6 posts

### Impact n8n is affected by an authenticated Remote Code Execution (RCE) vulnerability. Under certain conditions, an authenticated user may be able to cause untrusted code to be executed by the n8n service. This could result in full compromise of the affected instance. Both self-hosted and n8n Cloud instances are impacted. ### Patches The issue has been resolved in n8n version 1.121.3. Users

1 repos

https://github.com/Ashwesker/Ashwesker-CVE-2026-21877

beyondmachines1@infosec.exchange at 2026-01-09T16:01:43.000Z ##

Another critical RCE flaw reported in n8n automation platform

n8n patched another critical remote code execution vulnerability, CVE-2026-21877, which allows authenticated users to bypass sandboxes and take full control of automation servers. Over 100,000 instances are potentially exposed.

**Make sure all automation servers are isolated from the internet and accessible from trusted networks only. Update n8n to version 1.121.3 immediately and restrict workflow creation rights to a small group of trusted administrators to prevent unauthorized code execution.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

christopherkunz@chaos.social at 2026-01-09T12:00:20.000Z ##

Uh... how is github.com/n8n-io/n8n/security (CVE-2026-21877) a 10.0 with PR:L? That is not possible, either it's a 9.9 or it has PR:N.

##

Hackread@mstdn.social at 2026-01-08T20:09:35.000Z ##

n8n users need to update immediately after a CVSS 10.0 (CVE-2026-21877) authenticated remote code execution flaw was found that could let an attacker take over the system. Update to version 1.121.3 or higher and restrict privileges now.

Read: hackread.com/n8n-users-patch-f

#n8n #Cybersecurity #Vulnerability #Infosec

##

decio@infosec.exchange at 2026-01-08T11:29:24.000Z ##

"Une seconde faille critique RCE affecte n8n – CVE-2026-21877 : comment se protéger ?"
👇
it-connect.fr/n8n-cve-2026-218

Pas mal d'instances pas à jour et exposées aussi sur les réseaux EU et CH selon Onyphe
👇
bsky.app/profile/onyphe.io/pos

Infos
👇
cve.circl.lu/vuln/CVE-2026-218

💬
⬇️
infosec.pub/post/40204482

#CyberVeille #n8n

##

benzogaga33@mamot.fr at 2026-01-07T16:40:02.000Z ##

Une seconde faille critique RCE affecte n8n – CVE-2026-21877 : comment se protéger ? it-connect.fr/n8n-cve-2026-218 #ActuCybersécurité #Cybersécurité #Vulnérabilité #n8n

##

cR0w@infosec.exchange at 2026-01-06T17:54:53.000Z ##

Another perfect 10 in n8n? LMFAO. 🥳

github.com/n8n-io/n8n/security

Edit to add the link to the CVE. It's not published at this time though.

cve.org/CVERecord?id=CVE-2026-

##

CVE-2025-68455(CVSS UNKNOWN)

EPSS: 0.57%

updated 2026-01-06T15:52:19

1 posts

Note that attackers must have administrator access to the Craft Control Panel for this to work. Users should update to the patched versions (5.8.21 and 4.16.17) to mitigate the issue. Resources: https://github.com/craftcms/cms/commit/6e608a1a5bfb36943f94f584b7548ca542a86fef https://github.com/craftcms/cms/commit/27f55886098b56c00ddc53b69239c9c9192252c7 https://github.com/craftcms/cms/commit/e

secdb at 2026-01-12T00:00:49.245Z ##

📈 CVE Published in last 7 days (2026-01-05 - 2026-01-12)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1037

Severity:
- Critical: 110
- High: 289
- Medium: 492
- Low: 32
- None: 114

Status:
- : 43
- Analyzed: 62
- Awaiting Analysis: 537
- Received: 246
- Rejected: 32
- Undergoing Analysis: 117

Top CNAs:
- GitHub, Inc.: 201
- Wordfence: 161
- Patchstack: 150
- VulDB: 78
- MITRE: 73
- VulnCheck: 57
- N/A: 43
- MediaTek, Inc.: 28
- Fortinet, Inc.: 26
- Qualcomm, Inc.: 22

Top Affected Products:
- UNKNOWN: 964
- Google Android: 23
- Color Iccdev: 12
- Fabian Online Product Reservation System: 8
- Samsung Exynos 2400 Firmware: 7
- Samsung Exynos 1580 Firmware: 7
- Samsung Exynos 1380 Firmware: 6
- Samsung Exynos 1480 Firmware: 6
- Mediatek Nr17: 5
- Mediatek Nr16: 4

Top EPSS Score:
- CVE-2026-0581 - 3.41 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-0641 - 3.17 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-61489 - 2.45 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15502 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-6225 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2020-36925 - 0.52 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-64424 - 0.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-14997 - 0.46 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-46645 - 0.45 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-68455 - 0.43 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2025-14997
(7.2 HIGH)

EPSS: 0.61%

updated 2026-01-06T06:31:32

1 posts

The BuddyPress Xprofile Custom Field Types plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'delete_field' function in all versions up to, and including, 1.2.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code executio

secdb at 2026-01-12T00:00:49.245Z ##

📈 CVE Published in last 7 days (2026-01-05 - 2026-01-12)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1037

Severity:
- Critical: 110
- High: 289
- Medium: 492
- Low: 32
- None: 114

Status:
- : 43
- Analyzed: 62
- Awaiting Analysis: 537
- Received: 246
- Rejected: 32
- Undergoing Analysis: 117

Top CNAs:
- GitHub, Inc.: 201
- Wordfence: 161
- Patchstack: 150
- VulDB: 78
- MITRE: 73
- VulnCheck: 57
- N/A: 43
- MediaTek, Inc.: 28
- Fortinet, Inc.: 26
- Qualcomm, Inc.: 22

Top Affected Products:
- UNKNOWN: 964
- Google Android: 23
- Color Iccdev: 12
- Fabian Online Product Reservation System: 8
- Samsung Exynos 2400 Firmware: 7
- Samsung Exynos 1580 Firmware: 7
- Samsung Exynos 1380 Firmware: 6
- Samsung Exynos 1480 Firmware: 6
- Mediatek Nr17: 5
- Mediatek Nr16: 4

Top EPSS Score:
- CVE-2026-0581 - 3.41 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-0641 - 3.17 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-61489 - 2.45 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15502 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-6225 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2020-36925 - 0.52 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-64424 - 0.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-14997 - 0.46 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-46645 - 0.45 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-68455 - 0.43 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2025-12793(CVSS UNKNOWN)

EPSS: 0.02%

updated 2026-01-06T03:31:42

1 posts

An uncontrolled DLL loading path vulnerability exists in AsusSoftwareManagerAgent. A local attacker may influence the application to load a DLL from an attacker-controlled location, potentially resulting in arbitrary code execution. Refer to the ' Security Update for MyASUS' section on the ASUS Security Advisory for more information.

AAKL@infosec.exchange at 2026-01-07T17:52:27.000Z ##

ASUS released a patch yesterday for CVE-2025-12793.

Security Update for MyASUS asus.com/security-advisory/#bu #ASUS #infosec

##

CVE-2026-21633
(8.8 HIGH)

EPSS: 0.02%

updated 2026-01-05T21:31:37

1 posts

A malicious actor with access to the adjacent network could obtain unauthorized access to a UniFi Protect Camera by exploiting a discovery protocol vulnerability in the Unifi Protect Application (Version 6.1.79 and earlier). Affected Products: UniFi Protect Application (Version 6.1.79 and earlier). Mitigation: Update your UniFi Protect Application to Version 6.2.72 or later.

beyondmachines1@infosec.exchange at 2026-01-07T08:01:17.000Z ##

Ubiquiti patches security flaws in UniFi Protect camera software

Ubiquiti patched two vulnerabilities in the UniFi Protect Application, including CVE-2026-21633 which allows attackers on the local network to access camera feeds without authorization.

**If you are using UniFi Protect Application, plan a quick update. And as usual, make sure all cameras and camera controllers are isolated from the internet and accessible from trusted networks only. Use VLANs to separate your security cameras from guest or general-purpose networks.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-68668
(9.9 CRITICAL)

EPSS: 0.10%

updated 2026-01-05T19:06:07

2 posts

### Impact A sandbox bypass vulnerability exists in the Python Code Node that uses Pyodide. An authenticated user with permission to create or modify workflows can exploit this vulnerability to execute arbitrary commands on the host system running n8n, using the same privileges as the n8n process. ### Patches In n8n version 1.111.0, a task-runner-based native Python implementation was introduced

beyondmachines1@infosec.exchange at 2026-01-06T19:01:17.000Z ##

Critical sandbox bypass reported in n8n automation platform

n8n patched a critical sandbox bypass vulnerability (CVE-2025-68668) that allows authenticated users to run arbitrary system commands on the host server.

**If you are using n8n, make sure it's isolated from the internet and accessible from trusted users only. Then patch n8n to version 2.0.0 ASAP. Until you can patch, either disable the Python or the entire Code Node.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

technadu@infosec.exchange at 2026-01-06T14:06:22.000Z ##

Critical n8n vulnerability (CVE-2025-68668, CVSS 9.9) enables authenticated arbitrary command execution via the Code Node.

Patch released: mitigations include disabling the node or using the task-runner Python sandbox.

technadu.com/critical-new-vuln

Are automation platforms getting enough security scrutiny?

#InfoSec #CVE #n8n #DevSecOps #AutomationSecurity

##

CVE-2025-12514
(7.2 HIGH)

EPSS: 0.02%

updated 2026-01-05T12:31:32

1 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Centreon Infra Monitoring - Open-tickets (Notification rules configuration parameters, Open tickets modules) allows SQL Injection to user with elevated privileges.This issue affects Infra Monitoring - Open-tickets: from 24.10.0 before 24.10.5, from 24.04.0 before 24.04.5, from 23.10.0 before 23.

CVE-2025-54890
(6.8 MEDIUM)

EPSS: 0.02%

updated 2026-01-05T12:31:32

1 posts

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Centreon Infra Monitoring (Hostgroup configuration page) allows Stored XSS by users with elevated privileges.This issue affects Infra Monitoring: from 24.10.0 before 24.10.15, from 24.04.0 before 24.04.19, from 23.10.0 before 23.10.29.

CVE-2025-8460
(6.8 MEDIUM)

EPSS: 0.02%

updated 2026-01-05T10:15:58.160000

1 posts

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Centreon Infra Monitoring (Notification rules, Open tickets module) allows Stored XSS by users with elevated privileges.This issue affects Infra Monitoring: from 24.10.0 before 24.10.5, from 24.04.0 before 24.04.5, from 23.10.0 before 23.10.4.

CVE-2026-21440(CVSS UNKNOWN)

EPSS: 0.32%

updated 2026-01-03T00:32:10

2 posts

### Summary **Description** A Path Traversal (CWE-22) vulnerability in AdonisJS multipart file handling may allow a remote attacker to write arbitrary files to arbitrary locations on the server filesystem. This impacts @adonisjs/bodyparser through version 10.1.1 and 11.x prerelease versions prior to 11.0.0-next.6. This issue has been patched in @adonisjs/bodyparser versions 10.1.2 and 11.0.0-next

3 repos

https://github.com/you-ssef9/CVE-2026-21440

https://github.com/k0nnect/cve-2026-21440-writeup-poc

https://github.com/Ashwesker/Ashwesker-CVE-2026-21440

DarkWebInformer@infosec.exchange at 2026-01-11T00:27:42.000Z ##

❗️CVE-2026-21440: A critical path traversal vulnerability affecting the AdonisJS framework, specifically its multipart file upload handling.

PoC Exploit: github.com/Ashwesker/Ashwesker

▪️CVSS: 9.2
▪️CVE Published: January 2nd, 2026
▪️Exploit Published: January 5th, 2026

Details:

AdonisJS is a TypeScript-first web framework. A Path Traversal vulnerability in AdonisJS multipart file handling may allow a remote attacker to write arbitrary files to arbitrary locations on the server filesystem. This impacts @adonisjs/bodyparser through version 10.1.1 and 11.x prerelease versions prior to 11.0.0-next.6. This issue has been patched in @adonisjs/bodyparser versions 10.1.2 and 11.0.0-next.6.

##

beyondmachines1@infosec.exchange at 2026-01-06T20:01:16.000Z ##

Critical path traversal flaw in AdonisJS enable server takeover

AdonisJS patched a critical path traversal vulnerabilities (CVE-2026-21440) that allow attackers to write or read arbitrary files on servers.

**Update your AdonisJS dependencies immediately to prevent attackers from overwriting your application code or stealing local files. Always sanitize user-provided filenames and use the Node.js permission flag to limit file system access.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-13915
(9.8 CRITICAL)

EPSS: 0.37%

updated 2025-12-31T21:37:43.290000

2 posts

IBM API Connect 10.0.8.0 through 10.0.8.5, and 10.0.11.0 could allow a remote attacker to bypass authentication mechanisms and gain unauthorized access to the application.

AAKL@infosec.exchange at 2026-01-06T16:12:27.000Z ##

New.

Cyble: Singapore Cyber Agency Warns of Critical IBM API Connect Vulnerability (CVE-2025-13915) cyble.com/blog/cve-2025-13915- #infosec #vulnerability #IBM

##

oversecurity@mastodon.social at 2026-01-06T08:10:11.000Z ##

Singapore Cyber Agency Warns of Critical IBM API Connect Vulnerability (CVE-2025-13915)

Singapore warns of critical CVE-2025-13915 in IBM API Connect. Authentication bypass flaw scored 9.8 CVSS. Patches and mitigations released.

🔗️ [Cyble] link.is.it/WZmUnX

##

CVE-2025-66516
(8.4 HIGH)

EPSS: 0.02%

updated 2025-12-30T16:15:46.230000

1 posts

Critical XXE in Apache Tika tika-core (1.13-3.2.1), tika-pdf-module (2.0.0-3.2.1) and tika-parsers (1.13-1.28.5) modules on all platforms allows an attacker to carry out XML External Entity injection via a crafted XFA file inside of a PDF. This CVE covers the same vulnerability as in CVE-2025-54988. However, this CVE expands the scope of affected packages in two ways. First, while the entrypoi

4 repos

https://github.com/sid6224/CVE-2025-66516-POC

https://github.com/chasingimpact/CVE-2025-66516-Writeup-POC

https://github.com/Ashwesker/Ashwesker-CVE-2025-66516

https://github.com/intSheep/Tika-CVE-2025-66516-Lab

CVE-2025-13836
(9.1 CRITICAL)

EPSS: 0.09%

updated 2025-12-30T15:30:26

1 posts

When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.

linux@activitypub.awakari.com at 2026-01-12T11:47:18.000Z ## Ubuntu: Python Important Denial Of Service Issue USN-7951-1 CVE-2025-13836 Python could be made to crash if it received specially crafted network traffic.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2024-12087
(6.5 MEDIUM)

EPSS: 2.36%

updated 2025-12-22T15:30:20

1 posts

A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow

linux@activitypub.awakari.com at 2026-01-06T02:18:51.000Z ## Oracle Linux 7: rsync Moderate Risk Advisory ELSA-2025-23415 CVE-2024-12087 The following updated rpms for Oracle Linux 7 have been uploaded to the Unbreakable Linux Network:

#Oracle #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-2486
(8.8 HIGH)

EPSS: 0.02%

updated 2025-12-19T18:31:07

1 posts

The Ubuntu edk2 UEFI firmware packages accidentally allowed the UEFI Shell to be accessed in Secure Boot environments, possibly allowing bypass of Secure Boot constraints. Versions 2024.05-2ubuntu0.3 and 2024.02-2ubuntu0.3 disable the Shell. Some previous versions inserted a secure-boot-based decision to continue running inside the Shell itself, which is believed to be sufficient to enforce Secure

Ubuntu@activitypub.awakari.com at 2026-01-03T01:39:24.000Z ## CVE-2025-2486 UEFI Shell accessible in AAVMF with Secure Boot enabled on Ubuntu Information published.

#CVE

Origin | Interest | Match ##

CVE-2025-55182
(10.0 CRITICAL)

EPSS: 62.33%

updated 2025-12-10T02:00:02.557000

2 posts

A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.

Nuclei template

100 repos

https://github.com/yz9yt/React2Shell-CTF

https://github.com/hoosin/CVE-2025-55182

https://github.com/songsanggggg/CVE-2025-55182

https://github.com/fullhunt/react2shell-test-server

https://github.com/l4rm4nd/CVE-2025-55182

https://github.com/surajhacx/react2shellpoc

https://github.com/zack0x01/vuln-app-CVE-2025-55182

https://github.com/Cr4at0r/Next.js-RCE-Scanner-BurpSuite-Extension-

https://github.com/xkillbit/cve-2025-55182-scanner

https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool

https://github.com/jf0x3a/CVE-2025-55182-exploit

https://github.com/LemonTeatw1/CVE-2025-55182-exploit

https://github.com/MoLeft/React2Shell-Toolbox

https://github.com/ejpir/CVE-2025-55182-bypass

https://github.com/hackersatyamrastogi/react2shell-ultimate

https://github.com/Ashwesker/Ashwesker-CVE-2025-55182

https://github.com/xcanwin/CVE-2025-55182-React-RCE

https://github.com/keklick1337/CVE-2025-55182-golang-PoC

https://github.com/mrknow001/RSC_Detector

https://github.com/M4xSec/CVE-2025-55182-React2Shell-RCE-Shell

https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js

https://github.com/ThemeHackers/CVE-2025-55182

https://github.com/BeichenDream/CVE-2025-55182-GodzillaMemoryShell

https://github.com/CirqueiraDev/MassExploit-CVE-2025-55182

https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script

https://github.com/BlackTechX011/React2Shell

https://github.com/xalgord/React2Shell

https://github.com/sudo-Yangziran/CVE-2025-55182POC

https://github.com/Saturate/CVE-2025-55182-Scanner

https://github.com/subhdotsol/CVE-2025-55182

https://github.com/theori-io/reactguard

https://github.com/freeqaz/react2shell

https://github.com/sumanrox/rschunter

https://github.com/sho-luv/React2Shell

https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension

https://github.com/heiheishushu/rsc_detect_CVE-2025-55182

https://github.com/GelukCrab/React-Server-Components-RCE

https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension

https://github.com/Rsatan/Next.js-Exploit-Tool

https://github.com/santihabib/CVE-2025-55182-analysis

https://github.com/shamo0/react2shell-PoC

https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc

https://github.com/Pizz33/CVE-2025-55182-burpscanner

https://github.com/CymulateResearch/React2Shell-Scanner

https://github.com/Chocapikk/CVE-2025-55182

https://github.com/Faithtiannn/CVE-2025-55182

https://github.com/gensecaihq/react2shell-scanner

https://github.com/StealthMoud/CVE-2025-55182-Scanner

https://github.com/yanoshercohen/React2Shell_CVE-2025-55182

https://github.com/ZihxS/check-react-rce-cve-2025-55182

https://github.com/websecuritylabs/React2Shell-Library

https://github.com/TrixSec/CVE-2025-55182-Scanner

https://github.com/EynaExp/CVE-2025-55182-POC

https://github.com/assetnote/react2shell-scanner

https://github.com/fatguru/CVE-2025-55182-scanner

https://github.com/alsaut1/react2shell-lab

https://github.com/acheong08/CVE-2025-55182-poc

https://github.com/VeilVulp/RscScan-cve-2025-55182

https://github.com/chrahman/react2shell-CVE-2025-55182-full-rce-script

https://github.com/logesh-GIT001/CVE-2025-55182

https://github.com/Dh4v4l8/CVE-2025-55182-poc-tool

https://github.com/ynsmroztas/NextRce

https://github.com/dwisiswant0/CVE-2025-55182

https://github.com/SainiONHacks/CVE-2025-55182-Scanner

https://github.com/Syrins/CVE-2025-55182-React2Shell-RCE

https://github.com/timsonner/React2Shell-CVE-2025-55182

https://github.com/XiaomingX/CVE-2025-55182-poc

https://github.com/im-ezboy/CVE-2025-55182-zoomeye

https://github.com/zr0n/react2shell

https://github.com/ejpir/CVE-2025-55182-research

https://github.com/emredavut/CVE-2025-55182

https://github.com/vrx7men2/RSC-Detect-CVE-2025-55182

https://github.com/onlylovetx/CVE-2025-55182-CVE-2025-66478-Exploit-GUI

https://github.com/hidden-investigations/react2shell-scanner

https://github.com/alfazhossain/CVE-2025-55182-Exploiter

https://github.com/aliclub0x00/CVE-2025-55182-POC-NEXTJS

https://github.com/Spritualkb/CVE-2025-55182-exp

https://github.com/MrR0b0t19/CVE-2025-55182-shellinteractive

https://github.com/RuoJi6/CVE-2025-55182-RCE-shell

https://github.com/zzhorc/CVE-2025-55182

https://github.com/kavienanj/CVE-2025-55182

https://github.com/momika233/CVE-2025-55182-bypass

https://github.com/Security-Phoenix-demo/react2shell-scanner-rce-react-next-CVE-2025-55182-CVE-2025-66478

https://github.com/kondukto-io/vulnerable-next-js-poc

https://github.com/zack0x01/CVE-2025-55182-advanced-scanner-

https://github.com/Cillian-Collins/CVE-2025-55182

https://github.com/sickwell/CVE-2025-55182

https://github.com/Updatelap/CVE-2025-55182

https://github.com/nehkark/CVE-2025-55182

https://github.com/shyambhanushali/React2Shell

https://github.com/vijay-shirhatti/RSC-Detect-CVE-2025-55182

https://github.com/cybertechajju/R2C-CVE-2025-55182-66478

https://github.com/kOaDT/poc-cve-2025-55182

https://github.com/theman001/CVE-2025-55182

https://github.com/AliHzSec/CVE-2025-55182

https://github.com/whiteov3rflow/CVE-2025-55182-poc

https://github.com/hualy13/CVE-2025-55182

https://github.com/techgaun/cve-2025-55182-scanner

https://github.com/msanft/CVE-2025-55182

https://github.com/c0rydoras/CVE-2025-55182

threatresearch at 2026-01-12T22:27:57.965Z ##

I had a chance last week to chat with Benjamin Read of . Last month, Read and other members of his team published a deep dive into the
(CVE-2025-55182) vulnerability, and I was curious to see what has been hitting my honeypot, so I took a closer look.

This is doing some weird stuff, friends.

As is normally the case with exploits targeting internet-facing devices, once the exploit becomes known, it ends up in the automated scanners used by threat actors and security researchers. What I've seen over the past week is a combination of both.

In just a few hours of operation, I identified a small number of source IP addresses exploiting React2Shell by pointing the vulnerable system at URLs hosting BASH scripts. These scripts are really familiar to anyone who routinely looks at honeypot data - they contain a series of commands that pull down and execute malicious payloads.

And as I've seen in the past, some of these payloads use racially inflammatory language in their malware. It's weird and gross, but unfortunately, really common.

But while most of these payloads were "the usual suspects" - remote shells, cryptocurrency miners - there was one payload that stuck out.

It's an exploit file, based on this proof-of-concept [github.com/iotwar/FIVEM-POC/bl] designed to DDoS a modded server running "FiveM," a popular version of the game Grand Theft Auto V.

Let that one sink in: among the earliest adopters of a brand new exploit are...people trying to mess with other people's online game servers.

I've long said that exploits like these are the canaries in the datacenter coal mine. After all, if an attacker can force your server to run a cryptominer (or a game DDoS tool), they can force it to run far more malicious code.

I guess someone, or a group of someones, just want to ruin everyone's good time, no matter how or what form that takes. And they'll do it in the most offensive way possible.

Anyway, patch your servers, please, if only to stick it to these people who want to be the reason we can't have nice things.

##

threatresearch@infosec.exchange at 2026-01-12T22:27:57.000Z ##

I had a chance last week to chat with Benjamin Read of #Wiz. Last month, Read and other members of his team published a deep dive into the #React2Shell
(CVE-2025-55182) vulnerability, and I was curious to see what has been hitting my honeypot, so I took a closer look.

This is doing some weird stuff, friends.

As is normally the case with exploits targeting internet-facing devices, once the exploit becomes known, it ends up in the automated scanners used by threat actors and security researchers. What I've seen over the past week is a combination of both.

In just a few hours of operation, I identified a small number of source IP addresses exploiting React2Shell by pointing the vulnerable system at URLs hosting BASH scripts. These scripts are really familiar to anyone who routinely looks at honeypot data - they contain a series of commands that pull down and execute malicious payloads.

And as I've seen in the past, some of these payloads use racially inflammatory language in their malware. It's weird and gross, but unfortunately, really common.

But while most of these payloads were "the usual suspects" - remote shells, cryptocurrency miners - there was one payload that stuck out.

It's an exploit file, based on this proof-of-concept [github.com/iotwar/FIVEM-POC/bl] designed to DDoS a modded server running "FiveM," a popular version of the game Grand Theft Auto V.

Let that one sink in: among the earliest adopters of a brand new exploit are...people trying to mess with other people's online game servers.

I've long said that exploits like these are the canaries in the datacenter coal mine. After all, if an attacker can force your server to run a cryptominer (or a game DDoS tool), they can force it to run far more malicious code.

I guess someone, or a group of someones, just want to ruin everyone's good time, no matter how or what form that takes. And they'll do it in the most offensive way possible.

Anyway, patch your servers, please, if only to stick it to these people who want to be the reason we can't have nice things.

#PoC #exploit #CVE_2025_55182 #DDoS #FiveM #REACT #Bash #cryptominer #malware

##

CVE-2025-66471(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-12-05T18:33:09

1 posts

### Impact urllib3's [streaming API](https://urllib3.readthedocs.io/en/2.5.0/advanced-usage.html#streaming-and-i-o) is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding

Ubuntu@activitypub.awakari.com at 2026-01-12T23:08:08.000Z ## Ubuntu: urllib3 Critical DoS Regression USN-7927-2 CVE-2025-66471 USN-7927-1 introduced a regression in urllib3

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-66032
(9.8 CRITICAL)

EPSS: 0.15%

updated 2025-12-05T16:29:42.130000

1 posts

Claude Code is an agentic coding tool. Prior to 1.0.93, Due to errors in parsing shell commands related to $IFS and short CLI flags, it was possible to bypass the Claude Code read-only validation and trigger arbitrary code execution. Reliably exploiting this requires the ability to add untrusted content into a Claude Code context window. This vulnerability is fixed in 1.0.93.

hasamba at 2026-01-13T10:15:43.735Z ##

🎯 AI
===================

Executive summary: Claude Code used an allowlist-plus-manual-approval permission model to let select "read-only" commands execute without user intervention. Multiple flaws in the blocklist/argument-filtering logic allowed eight distinct bypass paths that led to arbitrary command execution. The issues are tracked as CVE-2025-66032 and addressed in Claude Code v1.0.93.

Technical details:
• The permission model allowed pre-approved commands (an allowlist) and required manual approval otherwise. Default allowlisted commands included echo, sort, sed, and man.
• Blocklist checks relied on regular expressions intended to forbid dangerous flags or patterns in arguments, for example to block -P/--pager for man and -o/--output for sort.
• Specific bypasses discovered include:
• man --html style arguments that accept rendering helpers and can inject shell commands.
• sort --compress-program which delegates to an external program and can be leveraged to execute code via fed input.
• sed -e usage that allows command execution when argument parsing is not properly constrained.
• Ambiguous git argument parsing where certain inputs were misinterpreted and passed through.
• Chains of bash variable expansion that collapsed into executable commands when combined with other parsing gaps.

Analysis:
• Root cause is fragile argument validation based on regexes that did not comprehensively account for alternative flags, quoting forms, or differences in how subprograms consume inputs.
• Allowlisting read-only utilities without complete argument sanitization creates a blind spot: trusted binaries can be turned into execution vectors when they accept program or shell-like parameters.

Detection:
• Monitor conversational logs for allowlisted commands paired with unusual flags such as --html, --compress-program, -e/-E, or unexpected quoted payloads.
• Alert on sequences where multiple argument-parsing gaps appear in a single request (e.g., variable expansions plus program-specifying flags).

Mitigation and status:
• Claude Code team assigned CVE-2025-66032 and released fixes in v1.0.93 to harden blocklist logic and tighten parsing.
• Longer-term mitigations should replace ad-hoc regex-based argument filters with deterministic parsers and explicit allowlists of safe argument forms.

🔹 claudecode -2025-66032

🔗 Source: flatt.tech/research/posts/pwni

##

CVE-2025-1910(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-12-05T00:31:05

1 posts

The WatchGuard Mobile VPN with SSL Client on Windows allows a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY/SYSTEM on the Windows machine where the VPN Client is installed.This issue affects the Mobile VPN with SSL Client 12.0 up to and including 12.11.2.

1 repos

https://github.com/lutrasecurity/CVE-2025-1910-WatchGuard-Privilege-Escalation

lutrasecurity@infosec.exchange at 2026-01-07T17:21:17.000Z ##

After coming across an outdated version of WatchGuard's Mobile VPN with SSL last year and being unable to quickly find a public proof of concept for CVE-2025-1910, we took a closer look and created one ourselves: lutrasecurity.com/en/articles/

Thanks to @tomtom of #AKASEC for finding the vulnerability and providing a great write-up!

##

CVE-2025-64126
(10.0 CRITICAL)

EPSS: 5.60%

updated 2025-12-01T15:39:53.100000

1 posts

An OS command injection vulnerability exists due to improper input validation. The application accepts a parameter directly from user input without verifying it is a valid IP address or filtering potentially malicious characters. This could allow an unauthenticated attacker to inject arbitrary commands.

CVE-2025-64128
(10.0 CRITICAL)

EPSS: 5.60%

updated 2025-12-01T15:39:53.100000

1 posts

An OS command injection vulnerability exists due to incomplete validation of user-supplied input. Validation fails to enforce sufficient formatting rules, which could permit attackers to append arbitrary data. This could allow an unauthenticated attacker to inject arbitrary commands.

CVE-2025-64130
(9.8 CRITICAL)

EPSS: 0.15%

updated 2025-12-01T15:39:53.100000

1 posts

Zenitel TCIV-3+ is vulnerable to a reflected cross-site scripting vulnerability, which could allow a remote attacker to execute arbitrary JavaScript on the victim's browser.

CVE-2025-13601
(7.7 HIGH)

EPSS: 0.02%

updated 2025-12-01T15:39:53.100000

1 posts

A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.

linux@activitypub.awakari.com at 2026-01-06T15:38:05.000Z ## Ubuntu 25.10: GLib Critical Vulnerabilities USN-7942-1 CVE-2025-13601 Several security issues were fixed in GLib.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-64129
(7.6 HIGH)

EPSS: 0.17%

updated 2025-11-26T18:31:15

1 posts

Zenitel TCIV-3+ is vulnerable to an out-of-bounds write vulnerability, which could allow a remote attacker to crash the device.

CVE-2025-64127
(10.0 CRITICAL)

EPSS: 5.60%

updated 2025-11-26T18:31:15

1 posts

An OS command injection vulnerability exists due to insufficient sanitization of user-supplied input. The application accepts parameters that are later incorporated into OS commands without adequate validation. This could allow an unauthenticated attacker to execute arbitrary commands remotely.

CVE-2025-64496
(7.3 HIGH)

EPSS: 0.25%

updated 2025-11-26T15:36:09.183000

1 posts

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Versions 0.6.224 and prior contain a code injection vulnerability in the Direct Connections feature that allows malicious external model servers to execute arbitrary JavaScript in victim browsers via Server-Sent Event (SSE) execute events. This leads to authentication token theft, complete account ta

netsecio@mastodon.social at 2026-01-12T16:50:25.000Z ##

📰 High-Severity Code Injection Flaw in Open WebUI (CVE-2025-64496) Allows RCE

🚨 High-severity flaw CVE-2025-64496 in Open WebUI allows account takeover and RCE! A malicious AI server can inject code to steal auth tokens. Affects versions <= 0.6.34. Patch immediately to v0.6.35. #Vulnerability #RCE #AI #OpenWebUI

🔗 cyber.netsecops.io/articles/hi

##

CVE-2025-6389
(9.8 CRITICAL)

EPSS: 0.37%

updated 2025-11-25T22:16:16.690000

1 posts

The Sneeit Framework plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 8.3 via the sneeit_articles_pagination_callback() function. This is due to the function accepting user input and then passing that through call_user_func(). This makes it possible for unauthenticated attackers to execute code on the server which can be leveraged to inject backdoor

3 repos

https://github.com/Ashwesker/Ashwesker-CVE-2025-6389

https://github.com/thorat-shubham/JXL_Infotainment_CVE-2025-63895

https://github.com/itsismarcos/SneeitScanner-CVE-2025-6389

DarkWebInformer@infosec.exchange at 2026-01-06T19:51:11.000Z ##

🚨 CVE-2025-6389: WordPress Sneeit Framework plugin vulnerability currently under active exploitation

PoC: github.com/Ashwesker/Ashwesker

▪️Vulnerability Type: Remote Code Execution (RCE)
▪️CVSS: 9.8
▪️Published: 11/24/2025

Impact:

▪️Full site compromise
▪️Create admin accounts
▪️Install backdoors/malicious files
▪️Redirect visitors or inject malware

Credit: youtube.com/@Nxploited

##

CVE-2025-64432
(4.7 MEDIUM)

EPSS: 0.01%

updated 2025-11-17T21:44:47

1 posts

### Summary _Short summary of the problem. Make the impact and severity as clear as possible. A flawed implementation of the Kubernetes aggregation layer's authentication flow could enable bypassing RBAC controls. ### Details _Give all details on the vulnerability. Pointing to the incriminated source code is very helpful for the maintainer._ It was discovered that the `virt-api` component fails

Kubernetes@activitypub.awakari.com at 2026-01-02T14:39:19.000Z ## CVE-2025-64432 KubeVirt Affected by an Authentication Bypass in Kubernetes Aggregation Layer Information published.

#CVE

Origin | Interest | Match ##

CVE-2025-40300(CVSS UNKNOWN)

EPSS: 0.08%

updated 2025-11-17T18:30:25

1 posts

In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors af

Ubuntu@activitypub.awakari.com at 2026-01-09T16:55:37.000Z ## Ubuntu 24.04: Linux-azure-nvidia Critical Issues CVE-2025-40300 Several security issues were fixed in the Linux kernel.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-60188
(7.5 HIGH)

EPSS: 2.72%

updated 2025-11-17T16:15:48.830000

1 posts

Insertion of Sensitive Information Into Sent Data vulnerability in Vito Peleg Atarim atarim-visual-collaboration allows Retrieve Embedded Sensitive Data.This issue affects Atarim: from n/a through <= 4.2.

Nuclei template

1 repos

https://github.com/m4sh-wacker/CVE-2025-60188-Atarim-Plugin-Exploit

CVE-2025-6430
(6.1 MEDIUM)

EPSS: 0.05%

updated 2025-11-03T21:35:11

1 posts

When a file download is specified via the `Content-Disposition` header, that directive would be ignored if the file was included via a `&lt;embed&gt;` or `&lt;object&gt;` tag, potentially making a website vulnerable to a cross-site scripting attack. This vulnerability affects Firefox < 140 and Firefox ESR < 128.12.

hackmag@infosec.exchange at 2026-01-10T10:04:30.000Z ##

⚪ Firefox Patches Vulnerability Discovered by a Positive Technologies Expert

🗨️ Exploitation of the vulnerability became possible after injecting malicious code into an arbitrary website, allowing an attacker to steal credentials and redirect users to phishing pages.

🔗 hackmag.com/news/cve-2025-6430

#news

##

CVE-2025-4802
(7.8 HIGH)

EPSS: 0.01%

updated 2025-11-03T20:19:11.153000

1 posts

Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo).

1 repos

https://github.com/Betim-Hodza/CVE-2025-4802-Proof-of-Concept

raptor@infosec.exchange at 2026-01-10T09:07:31.000Z ##

Cool bug 🐞

CVE-2025-4802: Arbitrary library path #vulnerability in static setuid binary in #GLIBC

hackyboiz.github.io/2025/12/03

##

linux@activitypub.awakari.com at 2026-01-05T13:46:37.000Z ## Soulmate HTB Walkthrough HTB Soulmate Walkthrough Initial Reconnaissance I started the Soulmate HackTheBox challenge by performing an nmap scan to identify active services on the target system. nm...

#hackthebox #soulmate-writeup #hackthebox-writeup #soulmate-htb #cve-2025-31161

Origin | Interest | Match ##

CVE-2025-22226
(7.1 HIGH)

EPSS: 3.96%

updated 2025-10-30T19:52:41.973000

1 posts

VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability due to an out-of-bounds read in HGFS. A malicious actor with administrative privileges to a virtual machine may be able to exploit this issue to leak memory from the vmx process.

jbhall56@infosec.exchange at 2026-01-09T12:57:40.000Z ##

The three bugs, tracked as CVE-2025-22224, CVE-2025-22225 and CVE-2025-22226, and named ESXicape, allow privileged attackers to execute arbitrary code and escape the VM to compromise the hypervisor itself. securityweek.com/exploit-for-v

##

CVE-2021-44228
(10.0 CRITICAL)

EPSS: 94.36%

updated 2025-10-22T19:13:26

1 posts

# Summary Log4j versions prior to 2.16.0 are subject to a remote code execution vulnerability via the ldap JNDI parser. As per [Apache's Log4j security guide](https://logging.apache.org/log4j/2.x/security.html): Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who

Nuclei template

100 repos

https://github.com/sunnyvale-it/CVE-2021-44228-PoC

https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words

https://github.com/greymd/CVE-2021-44228

https://github.com/thecyberneh/Log4j-RCE-Exploiter

https://github.com/sec13b/CVE-2021-44228-POC

https://github.com/mergebase/log4j-detector

https://github.com/MalwareTech/Log4jTools

https://github.com/cisagov/log4j-scanner

https://github.com/jas502n/Log4j2-CVE-2021-44228

https://github.com/toramanemre/log4j-rce-detect-waf-bypass

https://github.com/shamo0/CVE-2021-44228

https://github.com/Diverto/nse-log4shell

https://github.com/wortell/log4j

https://github.com/stripe/log4j-remediation-tools

https://github.com/logpresso/CVE-2021-44228-Scanner

https://github.com/cyberxml/log4j-poc

https://github.com/qingtengyun/cve-2021-44228-qingteng-patch

https://github.com/puzzlepeaches/Log4jUnifi

https://github.com/back2root/log4shell-rex

https://github.com/giterlizzi/nmap-log4shell

https://github.com/alexbakker/log4shell-tools

https://github.com/kozmer/log4j-shell-poc

https://github.com/Azeemering/CVE-2021-44228-DFIR-Notes

https://github.com/future-client/CVE-2021-44228

https://github.com/NCSC-NL/log4shell

https://github.com/kubearmor/log4j-CVE-2021-44228

https://github.com/yahoo/check-log4j

https://github.com/twseptian/spring-boot-log4j-cve-2021-44228-docker-lab

https://github.com/DragonSurvivalEU/RCE

https://github.com/alexandre-lavoie/python-log4rce

https://github.com/redhuntlabs/Log4JHunt

https://github.com/fireeye/CVE-2021-44228

https://github.com/NorthwaveSecurity/log4jcheck

https://github.com/mr-vill4in/log4j-fuzzer

https://github.com/corelight/cve-2021-44228

https://github.com/0xInfection/LogMePwn

https://github.com/1lann/log4shelldetect

https://github.com/Kadantte/CVE-2021-44228-poc

https://github.com/irgoncalves/f5-waf-quick-patch-cve-2021-44228

https://github.com/marcourbano/CVE-2021-44228

https://github.com/HynekPetrak/log4shell-finder

https://github.com/bigsizeme/Log4j-check

https://github.com/sassoftware/loguccino

https://github.com/pedrohavay/exploit-CVE-2021-44228

https://github.com/fox-it/log4j-finder

https://github.com/mubix/CVE-2021-44228-Log4Shell-Hashes

https://github.com/puzzlepeaches/Log4jHorizon

https://github.com/irgoncalves/f5-waf-enforce-sig-CVE-2021-44228

https://github.com/Malwar3Ninja/Exploitation-of-Log4j2-CVE-2021-44228

https://github.com/simonis/Log4jPatch

https://github.com/takito1812/log4j-detect

https://github.com/CodeShield-Security/Log4JShell-Bytecode-Detector

https://github.com/BinaryDefense/log4j-honeypot-flask

https://github.com/claranet/ansible-role-log4shell

https://github.com/mr-r3b00t/CVE-2021-44228

https://github.com/KosmX/CVE-2021-44228-example

https://github.com/CrackerCat/CVE-2021-44228-Log4j-Payloads

https://github.com/rubo77/log4j_checker_beta

https://github.com/qingtengyun/cve-2021-44228-qingteng-online-patch

https://github.com/faisalfs10x/Log4j2-CVE-2021-44228-revshell

https://github.com/aws-samples/kubernetes-log4j-cve-2021-44228-node-agent

https://github.com/boundaryx/cloudrasp-log4j2

https://github.com/NS-Sp4ce/Vm4J

https://github.com/nccgroup/log4j-jndi-be-gone

https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce

https://github.com/f0ng/log4j2burpscanner

https://github.com/Nanitor/log4fix

https://github.com/CERTCC/CVE-2021-44228_scanner

https://github.com/tippexs/nginx-njs-waf-cve2021-44228

https://github.com/r3kind1e/Log4Shell-obfuscated-payloads-generator

https://github.com/AlexandreHeroux/Fix-CVE-2021-44228

https://github.com/fullhunt/log4j-scan

https://github.com/justakazh/Log4j-CVE-2021-44228

https://github.com/christophetd/log4shell-vulnerable-app

https://github.com/lfama/log4j_checker

https://github.com/HyCraftHD/Log4J-RCE-Proof-Of-Concept

https://github.com/toramanemre/apache-solr-log4j-CVE-2021-44228

https://github.com/lucab85/log4j-cve-2021-44228

https://github.com/mzlogin/CVE-2021-44228-Demo

https://github.com/corretto/hotpatch-for-apache-log4j2

https://github.com/hackinghippo/log4shell_ioc_ips

https://github.com/ssl/scan4log4j

https://github.com/TaroballzChen/CVE-2021-44228-log4jVulnScanner-metasploit

https://github.com/blake-fm/vcenter-log4j

https://github.com/roxas-tan/CVE-2021-44228

https://github.com/infiniroot/nginx-mitigate-log4shell

https://github.com/Adikso/minecraft-log4j-honeypot

https://github.com/leonjza/log4jpwn

https://github.com/julian911015/Log4j-Scanner-Exploit

https://github.com/mufeedvh/log4jail

https://github.com/Jeromeyoung/log4j2burpscanner

https://github.com/RedDrip7/Log4Shell_CVE-2021-44228_related_attacks_IOCs

https://github.com/dwisiswant0/look4jar

https://github.com/korteke/log4shell-demo

https://github.com/LiveOverflow/log4shell

https://github.com/0xDexter0us/Log4J-Scanner

https://github.com/puzzlepeaches/Log4jCenter

https://github.com/darkarnium/Log4j-CVE-Detect

https://github.com/momos1337/Log4j-RCE

https://github.com/thomaspatzke/Log4Pot

nono@toot.paris at 2026-01-08T21:46:36.000Z ##

Cloudflare has even bragged on their blog¹ about how they run data analytics on all of the web requests going through their system. This data may be collected for government surveillance purposes as well.

1: blog.cloudflare.com/exploitati

##

CVE-2025-22224
(9.4 CRITICAL)

EPSS: 51.47%

updated 2025-10-22T00:34:17

2 posts

VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.

cyberveille@mastobot.ping.moi at 2026-01-11T23:00:04.000Z ##

📢 Huntress détaille un kit d’évasion VMware ESXi exploitant CVE-2025-22224/22225/22226
📝 Selon Huntress (Tactical Response et SOC), une intrusion observée en décembre 2025 a mené au déploiement d’un kit d’exploits visant VMwar...
📖 cyberveille : cyberveille.ch/posts/2026-01-1
🌐 source : huntress.com/blog/esxi-vm-esca
#CVE_2025_22224_22225_22226 #IOC #Cyberveille

##

jbhall56@infosec.exchange at 2026-01-09T12:57:40.000Z ##

The three bugs, tracked as CVE-2025-22224, CVE-2025-22225 and CVE-2025-22226, and named ESXicape, allow privileged attackers to execute arbitrary code and escape the VM to compromise the hypervisor itself. securityweek.com/exploit-for-v

##

CVE-2025-22225
(8.3 HIGH)

EPSS: 6.33%

updated 2025-10-22T00:33:13

1 posts

VMware ESXi contains an arbitrary write vulnerability. A malicious actor with privileges within the VMX process may trigger an arbitrary kernel write leading to an escape of the sandbox.

jbhall56@infosec.exchange at 2026-01-09T12:57:40.000Z ##

The three bugs, tracked as CVE-2025-22224, CVE-2025-22225 and CVE-2025-22226, and named ESXicape, allow privileged attackers to execute arbitrary code and escape the VM to compromise the hypervisor itself. securityweek.com/exploit-for-v

##

CVE-2025-11155
(0 None)

EPSS: 0.02%

updated 2025-09-29T19:34:10.030000

1 posts

The credentials required to access the device's web server are sent in base64 within the HTTP headers. Since base64 is not considered a strong cipher, an attacker could intercept the web request handling the login and obtain the credentials.

CVE-2025-59815
(9.1 CRITICAL)

EPSS: 0.06%

updated 2025-09-25T21:30:37

1 posts

This vulnerability allows malicious actors to execute arbitrary commands on the underlying system of the Zenitel ICX500 and ICX510 Gateway, granting shell access. Exploitation can compromise the device’s availability, confidentiality, and integrity.

CVE-2025-59817
(9.1 CRITICAL)

EPSS: 0.04%

updated 2025-09-25T21:30:37

1 posts

This vulnerability allows attackers to execute arbitrary commands on the underlying system. Because the web portal runs with root privileges, successful exploitation grants full control over the device, potentially compromising its availability, confidentiality, and integrity.

CVE-2025-59814
(9.8 CRITICAL)

EPSS: 0.08%

updated 2025-09-25T21:30:36

1 posts

This vulnerability allows malicious actors to gain unauthorized access to the Zenitel ICX500 and ICX510 Gateway Billing Admin endpoint, enabling them to read the entire contents of the Billing Admin database.

CVE-2025-59816
(8.1 HIGH)

EPSS: 0.10%

updated 2025-09-25T21:30:36

1 posts

This vulnerability allows attackers to directly query the underlying database, potentially retrieving all data stored in the Billing Admin database, including user credentials. User passwords are stored in plaintext, significantly increasing the severity of this issue.

CVE-2025-50173
(7.8 HIGH)

EPSS: 0.12%

updated 2025-08-12T18:31:39

2 posts

Weak authentication in Windows Installer allows an authorized attacker to elevate privileges locally.

hackmag at 2026-01-12T20:15:45.551Z ##

⚪ August Windows updates may block app installations

🗨️ Microsoft reported that the Windows security updates for August 2025 may trigger unexpected User Account Control (UAC) prompts and cause problems with app installations. The bug affects users without administrator…

🔗 hackmag.com/news/cve-2025-5017

##

hackmag@infosec.exchange at 2026-01-12T20:15:45.000Z ##

⚪ August Windows updates may block app installations

🗨️ Microsoft reported that the Windows security updates for August 2025 may trigger unexpected User Account Control (UAC) prompts and cause problems with app installations. The bug affects users without administrator…

🔗 hackmag.com/news/cve-2025-5017

#news

##

CVE-2025-47987
(7.8 HIGH)

EPSS: 0.08%

updated 2025-07-14T17:38:41.223000

5 posts

Heap-based buffer overflow in Windows Cred SSProvider Protocol allows an authorized attacker to elevate privileges locally.

1 repos

https://github.com/Kryptoenix/CVE-2025-47987_PoC

Reverse-Engineering@activitypub.awakari.com at 2026-01-06T14:11:00.000Z ## Micropatches Released for Credential Security Support Provider Protocol (CredSSP) Elevation of Privilege Vulnerability (CVE-2025-47987)   July 2025 Windows Updates brought a patch for  CVE-2025-4...


Origin | Interest | Match ##

Reverse-Engineering@activitypub.awakari.com at 2026-01-06T14:15:37.000Z ## Micropatches Released for Credential Security Support Provider Protocol (CredSSP) Elevation of Privilege Vulnerability (CVE-2025-47987)   July 2025 Windows Updates brought a patch for  CVE-2025-4...

#Malware #News

Origin | Interest | Match ##

Reverse-Engineering@activitypub.awakari.com at 2026-01-06T14:11:00.000Z ## Micropatches Released for Credential Security Support Provider Protocol (CredSSP) Elevation of Privilege Vulnerability (CVE-2025-47987)   July 2025 Windows Updates brought a patch for  CVE-2025-4...


Origin | Interest | Match ##

Reverse-Engineering@activitypub.awakari.com at 2026-01-06T14:11:00.000Z ## Micropatches Released for Credential Security Support Provider Protocol (CredSSP) Elevation of Privilege Vulnerability (CVE-2025-47987)   July 2025 Windows Updates brought a patch for  CVE-2025-4...


Origin | Interest | Match ##

Reverse-Engineering@activitypub.awakari.com at 2026-01-06T14:11:00.000Z ## Micropatches Released for Credential Security Support Provider Protocol (CredSSP) Elevation of Privilege Vulnerability (CVE-2025-47987)   July 2025 Windows Updates brought a patch for  CVE-2025-4...


Origin | Interest | Match ##

CVE-2025-6842
(4.7 MEDIUM)

EPSS: 0.03%

updated 2025-07-01T14:47:11.290000

1 posts

A vulnerability was found in code-projects Product Inventory System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/edit_user.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

1 repos

https://github.com/12nio/CVE-2025-68428_PoC

DarkWebInformer@infosec.exchange at 2026-01-11T02:00:20.000Z ##

❗️CVE-2025-68428: Critical Path Traversal in jsPDF

GitHub: github.com/12nio/CVE-2025-6842

CVSS: 9.2
CVE Published: January 5th, 2026
Exploit Published: January 8th, 2026

News source: bleepingcomputer.com/news/secu

##

CVE-2025-47934
(0 None)

EPSS: 0.03%

updated 2025-05-21T20:25:16.407000

1 posts

OpenPGP.js is a JavaScript implementation of the OpenPGP protocol. Startinf in version 5.0.1 and prior to versions 5.11.3 and 6.1.1, a maliciously modified message can be passed to either `openpgp.verify` or `openpgp.decrypt`, causing these functions to return a valid signature verification result while returning data that was not actually signed. This flaw allows signature verifications of inline

CVE-2024-55947
(8.8 HIGH)

EPSS: 1.60%

updated 2025-04-10T22:56:52

1 posts

### Impact The malicious user is able to write a file to an arbitrary path on the server to gain SSH access to the server. ### Patches Writing files outside repository Git directory has been prohibited via the repository file update API (https://github.com/gogs/gogs/pull/7859). Users should upgrade to 0.13.1 or the latest 0.14.0+dev. ### Workarounds No viable workaround available, please onl

EUVD_Bot@mastodon.social at 2026-01-12T22:31:22.000Z ##

🚨 EUVD-2025-202425

📊 Score: 8.7/10 (CVSS v3.1)
📦 Product: gogs, gogs
🏢 Vendor: gogs
📅 Published: 2025-12-10 | Updated: 2026-01-12

📝 Gogs vulnerable to a bypass of CVE-2024-55947

🔗 euvd.enisa.europa.eu/vulnerabi

#cybersecurity #infosec #euvd #cve #vulnerability

##

CVE-2022-25845
(8.1 HIGH)

EPSS: 89.92%

updated 2024-11-21T06:53:06.320000

1 posts

The package com.alibaba:fastjson before 1.2.83 are vulnerable to Deserialization of Untrusted Data by bypassing the default autoType shutdown restrictions, which is possible under certain conditions. Exploiting this vulnerability allows attacking remote servers. Workaround: If upgrading is not possible, you can enable [safeMode](https://github.com/alibaba/fastjson/wiki/fastjson_safemode).

6 repos

https://github.com/ph0ebus/CVE-2022-25845-In-Spring

https://github.com/scabench/fastjson-tp1fn1

https://github.com/cuijiung/fastjson-CVE-2022-25845

https://github.com/luelueking/CVE-2022-25845-In-Spring

https://github.com/nerowander/CVE-2022-25845-exploit

https://github.com/hosch3n/FastjsonVulns

cR0w@infosec.exchange at 2026-01-09T19:46:49.000Z ##

Perfect 10 in Fastjson. 🥳

It's funny that it appears to be a challenging enough bug that it bypassed at least two previous fixes.

cve.org/CVERecord?id=CVE-2025-

Fastjson before 1.2.48 mishandles autoType because, when an @type key is in a JSON document, and the value of that key is the name of a Java class, there may be calls to certain public methods of that class. Depending on the behavior of those methods, there may be JNDI injection with an attacker-supplied payload located elsewhere in that JSON document. This was exploited in the wild in 2023 through 2025. NOTE: this issue exists because of an incomplete fix for CVE-2017-18349. Also, a later bypass is covered by CVE-2022-25845.

##

CVE-2022-23128
(9.8 CRITICAL)

EPSS: 3.77%

updated 2024-11-21T06:48:03.407000

1 posts

Incomplete List of Disallowed Inputs vulnerability in Mitsubishi Electric MC Works64 versions 4.00A (10.95.201.23) to 4.04E (10.95.210.01), ICONICS GENESIS64 versions 10.95.3 to 10.97, ICONICS Hyper Historian versions 10.95.3 to 10.97, ICONICS AnalytiX versions 10.95.3 to 10.97 and ICONICS MobileHMI versions 10.95.3 to 10.97 allows a remote unauthenticated attacker to bypass the authentication of

beyondmachines1@infosec.exchange at 2026-01-09T13:01:45.000Z ##

Mitsubishi Electric patches critical SCADA and HMI vulnerabilities

Mitsubishi Electric patched several vulnerabilities in its ICONICS and HMI SCADA suites, including a critical bypass flaw (CVE-2022-23128) that allows unauthorized system control.

**Make sure all Mitsubishi Electric and ICONICS Digital Solutions devices are isolated from the internet and accessible from trusted networks only. Update to GENESIS64 version 10.97.1 immediately and all other systems which have patches. Since GENESIS32 is retired and won't be patched, use strict network isolation and plan a replacement.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2024-38063
(9.8 CRITICAL)

EPSS: 90.06%

updated 2024-08-13T18:31:24

1 posts

Windows TCP/IP Remote Code Execution Vulnerability

29 repos

https://github.com/ArenaldyP/CVE-2024-38063-Medium

https://github.com/Th3Tr1ckst3r/CVE-2024-38063

https://github.com/KernelKraze/CVE-2024-38063_PoC

https://github.com/PumpkinBridge/Windows-CVE-2024-38063

https://github.com/dweger-scripts/CVE-2024-38063-Remediation

https://github.com/ps-interactive/cve-2024-38063

https://github.com/Sachinart/CVE-2024-38063-poc

https://github.com/fredagsguf/Windows-CVE-2024-38063

https://github.com/Dragkob/CVE-2024-38063

https://github.com/Th3Tr1ckst3r/Exip6

https://github.com/becrevex/CVE-2024-38063

https://github.com/jip-0-0-0-0-0/CVE-2024-38063-scanner

https://github.com/AliHj98/cve-2024-38063-Anonyvader

https://github.com/almogopp/Disable-IPv6-CVE-2024-38063-Fix

https://github.com/zenzue/CVE-2024-38063-POC

https://github.com/ynwarcs/CVE-2024-38063

https://github.com/AdminPentester/CVE-2024-38063-

https://github.com/thanawee321/CVE-2024-38063

https://github.com/patchpoint/CVE-2024-38063

https://github.com/akozsentre/CVE-2024-38063

https://github.com/Skac44/CVE-2024-38063

https://github.com/idkwastaken/CVE-2024-38063

https://github.com/FrancescoDiSalesGithub/quick-fix-cve-2024-38063

https://github.com/diegoalbuquerque/CVE-2024-38063

https://github.com/p33d/cve-2024-38063

https://github.com/Faizan-Khanx/CVE-2024-38063

https://github.com/haroonawanofficial/AI-CVE-2024-38063-0-DAY

https://github.com/brownpanda29/Cve-2024-38063

https://github.com/ThemeHackers/CVE-2024-38063

CVE-2024-2537
(4.4 MEDIUM)

EPSS: 0.06%

updated 2024-03-15T18:30:45

1 posts

Improper Control of Dynamically-Managed Code Resources vulnerability in Logitech Logi Tune on MacOS allows Local Code Inclusion.

1 repos

https://github.com/ewilded/CVE-2024-25376-POC

glyph@mastodon.social at 2026-01-07T17:25:14.000Z ##

@0xabad1dea @mkj @emaksovalec okay _actually_ the last one now, re: that footnote

Logitech has also messed up their code signing security several times so that even such a screw-up would actually not crash their app on macOS in particular, which is bad in its own right: nvd.nist.gov/vuln/detail/CVE-2

tl;dr: avoid logitech's drivers if you can, they are routinely stepping on security & reliability rakes completely unprompted

##

CVE-2017-18349
(9.8 CRITICAL)

EPSS: 92.08%

updated 2023-09-26T14:52:01

1 posts

parseObject in Fastjson before 1.2.25, as used in FastjsonEngine in Pippo 1.11.0 and other products, allows remote attackers to execute arbitrary code via a crafted JSON request, as demonstrated by a crafted rmi:// URI in the dataSourceName field of HTTP POST data to the Pippo /json URI, which is mishandled in AjaxApplication.java.

Nuclei template

1 repos

https://github.com/h0cksr/Fastjson--CVE-2017-18349-

cR0w@infosec.exchange at 2026-01-09T19:46:49.000Z ##

Perfect 10 in Fastjson. 🥳

It's funny that it appears to be a challenging enough bug that it bypassed at least two previous fixes.

cve.org/CVERecord?id=CVE-2025-

Fastjson before 1.2.48 mishandles autoType because, when an @type key is in a JSON document, and the value of that key is the name of a Java class, there may be calls to certain public methods of that class. Depending on the behavior of those methods, there may be JNDI injection with an attacker-supplied payload located elsewhere in that JSON document. This was exploited in the wild in 2023 through 2025. NOTE: this issue exists because of an incomplete fix for CVE-2017-18349. Also, a later bypass is covered by CVE-2022-25845.

##

CVE-2026-22814
(0 None)

EPSS: 0.00%

1 posts

N/A

adonisjs.com@bsky.brid.gy at 2026-01-13T07:16:39.454Z ##

We've published a security fix for a Mass Assignment vulnerability affecting Lucid in AdonisJS (CVE-2026-22814). Update now: - v6 users → adonisjs/lucid 21.8.2 - v7 users → adonisjs/lucid 22.0.0-next.6 github.com/adonisjs/luc...

Mass Assignment in AdonisJS Lu...

##

CVE-2026-22794
(0 None)

EPSS: 0.00%

1 posts

N/A

thehackerwire@mastodon.social at 2026-01-12T23:00:27.000Z ##

🔴 CVE-2026-22794 - Critical (9.6)

Appsmith is a platform to build admin panels, internal tools, and dashboards. Prior to 1.93, the server uses the Origin value from the request headers as the email link baseUrl without validation. If an attacker controls the Origin, password reset...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22788
(0 None)

EPSS: 0.00%

1 posts

N/A

thehackerwire@mastodon.social at 2026-01-12T23:00:18.000Z ##

🟠 CVE-2026-22788 - High (8.2)

WebErpMesv2 is a Resource Management and Manufacturing execution system Web for industry. Prior to 1.19, the WebErpMesV2 application exposes multiple sensitive API endpoints without authentication middleware. An unauthenticated remote attacker can...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-5017
(0 None)

EPSS: 0.00%

2 posts

N/A

hackmag at 2026-01-12T20:15:45.551Z ##

⚪ August Windows updates may block app installations

🗨️ Microsoft reported that the Windows security updates for August 2025 may trigger unexpected User Account Control (UAC) prompts and cause problems with app installations. The bug affects users without administrator…

🔗 hackmag.com/news/cve-2025-5017

##

hackmag@infosec.exchange at 2026-01-12T20:15:45.000Z ##

⚪ August Windows updates may block app installations

🗨️ Microsoft reported that the Windows security updates for August 2025 may trigger unexpected User Account Control (UAC) prompts and cause problems with app installations. The bug affects users without administrator…

🔗 hackmag.com/news/cve-2025-5017

#news

##

CVE-2026-22783
(0 None)

EPSS: 0.00%

1 posts

N/A

thehackerwire@mastodon.social at 2026-01-12T20:02:04.000Z ##

🔴 CVE-2026-22783 - Critical (9.6)

Iris is a web collaborative platform that helps incident responders share technical details during investigations. Prior to 2.4.24, the DFIR-IRIS datastore file management system has a vulnerability where mass assignment of the file_local_name fie...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21898
(0 None)

EPSS: 0.05%

2 posts

N/A

CVE-2026-22027
(0 None)

EPSS: 0.01%

2 posts

N/A

CVE-2026-22697
(0 None)

EPSS: 0.07%

2 posts

N/A

CVE-2026-22025
(0 None)

EPSS: 0.04%

2 posts

N/A

CVE-2026-21897
(0 None)

EPSS: 0.04%

2 posts

N/A

CVE-2026-21899
(0 None)

EPSS: 0.03%

2 posts

N/A

CVE-2025-64424
(0 None)

EPSS: 0.66%

1 posts

N/A

secdb at 2026-01-12T00:00:49.245Z ##

📈 CVE Published in last 7 days (2026-01-05 - 2026-01-12)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1037

Severity:
- Critical: 110
- High: 289
- Medium: 492
- Low: 32
- None: 114

Status:
- : 43
- Analyzed: 62
- Awaiting Analysis: 537
- Received: 246
- Rejected: 32
- Undergoing Analysis: 117

Top CNAs:
- GitHub, Inc.: 201
- Wordfence: 161
- Patchstack: 150
- VulDB: 78
- MITRE: 73
- VulnCheck: 57
- N/A: 43
- MediaTek, Inc.: 28
- Fortinet, Inc.: 26
- Qualcomm, Inc.: 22

Top Affected Products:
- UNKNOWN: 964
- Google Android: 23
- Color Iccdev: 12
- Fabian Online Product Reservation System: 8
- Samsung Exynos 2400 Firmware: 7
- Samsung Exynos 1580 Firmware: 7
- Samsung Exynos 1380 Firmware: 6
- Samsung Exynos 1480 Firmware: 6
- Mediatek Nr17: 5
- Mediatek Nr16: 4

Top EPSS Score:
- CVE-2026-0581 - 3.41 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-0641 - 3.17 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-61489 - 2.45 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15502 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-6225 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2020-36925 - 0.52 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-64424 - 0.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-14997 - 0.46 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-46645 - 0.45 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-68455 - 0.43 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-21876
(0 None)

EPSS: 0.03%

4 posts

N/A

1 repos

https://github.com/daytriftnewgen/CVE-2026-21876

beyondmachines1@infosec.exchange at 2026-01-10T09:01:07.000Z ##

OWASP CRS Patches Critical Multipart Charset Validation Bypass

OWASP CRS released patches for a critical vulnerability (CVE-2026-21876) that allows attackers to bypass charset validation in multipart requests. By placing malicious payloads in early request parts, attackers can slip UTF-7/16/32 encoded XSS attacks past the WAF.

**If you are using WAF OWASP Core Rule Set to version 4.22.0 or 3.3.8 this is important. Update the Core rule 922110 ASAP. Don't not rely on default settings for rule 922110 until you have applied these patches. Attackers can easily hide malicious scripts in multi-part uploads.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

_r_netsec@infosec.exchange at 2026-01-08T20:28:06.000Z ##

CVE-2026-21876: OWASP Modsecurity CRS WAF bypass blogpost is out! coreruleset.org/20260106/cve-2

##

_r_netsec@infosec.exchange at 2026-01-08T19:58:06.000Z ##

Critical (9.3 CVSS) OWASP ModSecurity CRS WAF bypass advisory and walkthrough is out! coreruleset.org/20260106/cve-2

##

cR0w@infosec.exchange at 2026-01-07T21:09:45.000Z ##

Docker WAF doesn't filter on username, apparently. Seems weird. The CVE isn't published yet but they are claiming a number for it in the repo. Either way, if you have Docker WAF logs, maybe look for interesting payloads in the username parameter. Or don't.

github.com/daytriftnewgen/CVE-

##

CVE-2025-14338
(0 None)

EPSS: 0.00%

1 posts

N/A

andersonc0d3@infosec.exchange at 2026-01-09T18:41:59.000Z ##

InputPlumber: Lack of D-Bus Authorization and Input Verification allows UI Input Injection and Denial-of-Service (CVE-2025-66005, CVE-2025-14338)

security.opensuse.org/2026/01/

##

CVE-2025-66005
(0 None)

EPSS: 0.00%

1 posts

N/A

andersonc0d3@infosec.exchange at 2026-01-09T18:41:59.000Z ##

InputPlumber: Lack of D-Bus Authorization and Input Verification allows UI Input Injection and Denial-of-Service (CVE-2025-66005, CVE-2025-14338)

security.opensuse.org/2026/01/

##

CVE-2025-59819
(0 None)

EPSS: 0.00%

1 posts

N/A

CVE-2025-59818
(0 None)

EPSS: 0.00%

1 posts

N/A

CVE-2025-63261
(0 None)

EPSS: 0.00%

1 posts

N/A

pentesttools@infosec.exchange at 2026-01-09T12:36:00.000Z ##

Our researchers at Pentest-Tools.com just found a new RCE in cPanel (CVE-2025-63261). 🔧

We discovered that a classic Unsafe Perl Open in AWStats allows command execution. The application fails to sanitize input before the open() call, so a well-placed pipe | character tricks the system into spawning a shell instead of reading a file.

This exploit requires zero actual plumbing. 🪠

Read Part 1 of the technical breakdown by Matei Badanoiu: pentest-tools.com/blog/cpanel-

#infosec #cybersecurity #cPanel #RCE #vulnerability #PentestTools

##

CVE-2026-21881
(0 None)

EPSS: 0.07%

1 posts

N/A

beyondmachines1@infosec.exchange at 2026-01-09T10:01:43.000Z ##

Kanboard patches critical authentication bypass and information disclosure flaws

Kanboard version 1.2.49 fixes a critical authentication bypass (CVE-2026-21881) and two other flaws that allow attackers to impersonate users, enumerate LDAP data, and perform open redirects. The most severe vulnerability allows full administrative access by spoofing HTTP headers when reverse proxy authentication is enabled.

**If possible, ensure your Kanboard instance is isolated from the internet and accessible only via a trusted network or VPN. Then plan a quick patch. If you use reverse proxy authentication, prioritize configuring your web server to strip all identity headers from external requests, since that's the most dangerous attack vector.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-67724
(0 None)

EPSS: 0.04%

1 posts

N/A

Ubuntu@activitypub.awakari.com at 2026-01-08T20:43:44.000Z ## Ubuntu 25.10: Tornado Critical XSS DoS Flaws USN-7950-1 CVE-2025-67724 Several security issues were fixed in Tornado.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-69222
(0 None)

EPSS: 0.09%

1 posts

N/A

LLMs@activitypub.awakari.com at 2026-01-07T22:54:23.000Z ## CVE-2025-69222 - LibreChat is vulnerable to Server-Side Request Forgery due to missing restrictions CVE ID : CVE-2025-69222 Published : Jan. 7, 2026, 9:17 p.m. | 1 hour, 10 minutes ago Descriptio...


Origin | Interest | Match ##

CVE-2025-67859
(0 None)

EPSS: 0.00%

1 posts

N/A

andersonc0d3@infosec.exchange at 2026-01-07T23:12:24.000Z ##

TLP: Polkit Authentication Bypass in Profiles Daemon in Version 1.9.0 (CVE-2025-67859)

security.opensuse.org/2026/01/

##

CVE-2025-69139
(0 None)

EPSS: 0.00%

1 posts

N/A

cR0w@infosec.exchange at 2026-01-07T20:05:48.000Z ##

That's a weird thing to do intentionally.

An unused function in MicroServer can start a reverse SSH connection to a vendor registered domain, without mutual authentication. An attacker on the local network with admin access to the web server, and the ability to manipulate DNS responses, can redirect the SSH connection to an attacker controlled device.

cve.org/CVERecord?id=CVE-2025-

##

securityland@mastodon.social at 2026-01-07T13:39:58.000Z ##

CVE-2025-14558 is a 9.8-severity vulnerability in FreeBSD's IPv6 auto-configuration that lets attackers execute arbitrary code with a single crafted network packet. FreeBSD released patches on December 16, 2024, but the threat escalated when multiple proof-of-concept exploits hit GitHub about two weeks ago.

Read More: security.land/freebsd-ipv6-fla

#SecurityLand #CyberWatch #FreeBSD #Cybersecurity #VulnerabilityManagement #IPv6 #CVE

##

CVE-2025-65606
(0 None)

EPSS: 0.00%

2 posts

N/A

beyondmachines1@infosec.exchange at 2026-01-07T13:01:17.000Z ##

Unpatched root backdoor found in EoL TOTOLINK EX200 extenders

CERT/CC warned of an unpatched vulnerability (CVE-2025-65606) in the end-of-life TOTOLINK EX200 range extender that allows authenticated attackers to open a root-level telnet backdoor. Because the device is no longer supported, no official fix is available.

**If you are using TOTOLINK EX200, be aware that it can be exploited trivially by anyone with minimal access. Ideally, replace it with another device. If that's not possible, limit the number of authenticated users on the web management, with strong passwords and never expose the management interface to the internet.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

cR0w@infosec.exchange at 2026-01-06T15:10:41.000Z ##

TOTOLINK

cve.org/CVERecord?id=CVE-2025- ( not yet published )

kb.cert.org/vuls/id/295169

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-68615
(0 None)

EPSS: 0.04%

1 posts

N/A

1 repos

https://github.com/yt2w/CVE-2025-68615

hackmag@infosec.exchange at 2026-01-07T10:00:23.000Z ##

⚪ Critical RCE vulnerability has been discovered in Net-SNMP

🗨️ A critical remote code execution vulnerability (CVE-2025-68615) has been identified in the open-source networking package Net-SNMP, which implements SNMP protocols versions 1, 2c, and 3. This flaw allows attackers to execute arbitrary code remotely on any server where the snmptrapd service is used t…

🔗 hackmag.com/news/critical-rce-

#news

##

Visit counter For Websites