## Updated at UTC 2026-01-08T23:09:19.127029

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2025-15464 7.5 0.00% 1 0 2026-01-08T22:16:01.950000 Exported Activity allows external applications to gain application context and d
CVE-2025-50334 7.5 0.00% 2 0 2026-01-08T21:31:39 An issue in Technitium DNS Server v.13.5 allows a remote attacker to cause a den
CVE-2025-59468 9.0 0.00% 2 0 2026-01-08T21:31:39 This vulnerability allows a Backup Administrator to perform remote code executio
CVE-2025-14025 8.6 0.00% 1 0 2026-01-08T21:31:39 A flaw was found in Ansible Automation Platform (AAP). Read-only scoped OAuth2 A
CVE-2025-52691 10.0 0.23% 5 9 2026-01-08T21:31:33 Successful exploitation of the vulnerability could allow an unauthenticated atta
CVE-2025-66916 9.4 0.00% 1 0 2026-01-08T21:30:40 The snailjob component in RuoYi-Vue-Plus versions 5.5.1 and earlier, interface /
CVE-2025-66913 9.8 0.00% 1 0 2026-01-08T21:30:40 JimuReport thru version 2.1.3 is vulnerable to remote code execution when proces
CVE-2025-65518 7.5 0.00% 2 1 2026-01-08T21:30:40 Plesk Obsidian versions 8.0.1 through 18.0.73 are vulnerable to a Denial of Serv
CVE-2025-65731 None 0.00% 1 1 2026-01-08T21:30:40 An issue was discovered in D-Link Router DIR-605L (Hardware version F1; Firmware
CVE-2025-68719 8.8 0.00% 1 0 2026-01-08T21:15:43.603000 KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 mishandle configuration managem
CVE-2025-68717 9.4 0.00% 3 0 2026-01-08T21:15:43.353000 KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 allow authentication bypass dur
CVE-2025-68716 8.4 0.00% 1 0 2026-01-08T21:15:43.187000 KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 enable the SSH service enabled
CVE-2025-15346 None 0.06% 1 0 2026-01-08T20:57:58 A vulnerability in the handling of verify_mode = CERT_REQUIRED in the wolfssl Py
CVE-2026-21858 10.0 0.03% 10 3 2026-01-08T20:15:45.453000 n8n is an open source workflow automation platform. Versions starting with 1.65.
CVE-2025-61548 9.8 0.00% 1 0 2026-01-08T20:15:44.070000 SQL Injection is present on the hfInventoryDistFormID parameter in the /PSP/appN
CVE-2025-61246 9.8 0.00% 1 1 2026-01-08T20:15:43.923000 indieka900 online-shopping-system-php 1.0 is vulnerable to SQL Injection in mast
CVE-2025-56424 7.5 0.00% 1 0 2026-01-08T20:15:43.677000 An issue in Insiders Technologies GmbH e-invoice pro before release 1 Service Pa
CVE-2025-13151 7.5 0.04% 1 0 2026-01-08T19:15:55.983000 Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to
CVE-2017-20216 9.8 0.31% 1 0 2026-01-08T19:15:54.793000 FLIR Thermal Camera PT-Series firmware version 8.0.0.64 contains multiple unauth
CVE-2017-20215 8.8 0.26% 1 0 2026-01-08T19:15:54.677000 FLIR Thermal Camera FC-S/PT firmware version 8.0.0.64 contains an authenticated
CVE-2025-12543 9.6 0.10% 1 0 2026-01-08T18:31:46 A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBo
CVE-2025-15026 9.8 0.03% 1 0 2026-01-08T18:31:36 Missing Authentication for Critical Function vulnerability in Centreon Infra Mon
CVE-2025-15029 9.8 0.02% 1 0 2026-01-08T18:31:36 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2025-12513 6.8 0.01% 1 0 2026-01-08T18:31:36 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site
CVE-2025-5965 7.2 0.10% 1 0 2026-01-08T18:31:36 In the backup parameters, a user with high privilege is able to concatenate cust
CVE-2025-12519 5.3 0.01% 1 0 2026-01-08T18:31:36 Missing Authorization vulnerability in Centreon Infra Monitoring (Administration
CVE-2026-22230 7.6 0.00% 1 0 2026-01-08T18:30:57 OPEXUS eCASE Audit allows an authenticated attacker to modify client-side JavaSc
CVE-2026-22235 7.5 0.00% 1 0 2026-01-08T18:30:57 OPEXUS eComplaint before version 9.0.45.0 allows an attacker to visit the the 'D
CVE-2025-55125 7.8 0.00% 3 0 2026-01-08T18:30:56 This vulnerability allows a Backup or Tape Operator to perform remote code execu
CVE-2025-59470 9.0 0.00% 7 1 2026-01-08T18:30:56 This vulnerability allows a Backup Operator to perform remote code execution (RC
CVE-2025-59469 9.0 0.00% 3 0 2026-01-08T18:30:56 This vulnerability allows a Backup or Tape Operator to write files as root.
CVE-2025-67090 5.1 0.00% 1 0 2026-01-08T18:30:56 The LuCI web interface on Gl Inet GL.Inet AX1800 Version 4.6.4 & 4.6.8 are vulne
CVE-2025-67091 6.5 0.00% 1 0 2026-01-08T18:30:56 An issue in GL Inet GL.Inet AX1800 Version 4.6.4 & 4.6.8 are vulnerable. GL.Inet
CVE-2025-67089 8.1 0.00% 1 0 2026-01-08T18:30:56 A command injection vulnerability exists in the GL-iNet GL-AXT1800 router firmwa
CVE-2026-0625 None 1.38% 3 0 2026-01-08T18:30:33 Multiple D-Link DSL gateway devices contain a command injection vulnerability in
CVE-2026-21440 0 0.32% 1 3 2026-01-08T18:09:49.800000 AdonisJS is a TypeScript-first web framework. A Path Traversal vulnerability in
CVE-2025-67303 7.5 0.03% 1 0 2026-01-08T18:09:49.800000 An issue in ComfyUI-Manager prior to version 3.38 allowed remote attackers to po
CVE-2025-13056 6.8 0.01% 1 0 2026-01-08T18:09:49.800000 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site
CVE-2025-12511 6.8 0.01% 1 0 2026-01-08T18:09:49.800000 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site
CVE-2025-12793 0 0.01% 1 0 2026-01-08T18:09:23.230000 An uncontrolled DLL loading path vulnerability exists in AsusSoftwareManagerAgen
CVE-2020-36918 4.3 0.02% 1 0 2026-01-08T18:09:23.230000 iDS6 DSSPro Digital Signage System 6.2 contains a cross-site request forgery vul
CVE-2020-36925 9.8 0.52% 1 0 2026-01-08T18:09:23.230000 Arteco Web Client DVR/NVR contains a session hijacking vulnerability with insuff
CVE-2020-36923 9.8 0.07% 1 0 2026-01-08T18:09:23.230000 Sony BRAVIA Digital Signage 1.7.8 contains an insecure direct object reference v
CVE-2020-36910 8.8 0.33% 1 0 2026-01-08T18:09:23.230000 Cayin Signage Media Player 3.0 contains an authenticated remote command injectio
CVE-2020-36912 9.8 0.04% 1 0 2026-01-08T18:09:23.230000 Plexus anblick Digital Signage Management 3.1.13 contains an open redirect vulne
CVE-2020-36915 7.5 0.04% 1 0 2026-01-08T18:09:23.230000 Adtec Digital SignEdje Digital Signage Player v2.08.28 contains multiple hardcod
CVE-2026-20026 5.8 0.09% 1 0 2026-01-08T18:08:54.147000 Multiple Cisco products are affected by a vulnerability in the processing o
CVE-2025-6225 0 0.71% 1 0 2026-01-08T18:08:54.147000 Kieback&Peter Neutrino-GLT product is used for building management. It's web com
CVE-2025-15472 7.2 0.12% 1 0 2026-01-08T18:08:54.147000 A flaw has been found in TRENDnet TEW-811DRU 1.0.2.0. This affects the function
CVE-2025-63611 8.7 0.00% 1 0 2026-01-08T18:08:18.457000 Cross-Site Scripting in phpgurukul Hostel Management System v2.1 user-provided c
CVE-2025-15224 3.1 0.03% 2 0 2026-01-08T18:08:18.457000 When doing SSH-based transfers using either SCP or SFTP, and asked to do public
CVE-2025-14819 5.3 0.01% 2 0 2026-01-08T18:08:18.457000 When doing TLS related transfers with reused easy or multi handles and altering
CVE-2025-69259 7.5 0.00% 1 0 2026-01-08T18:08:18.457000 A message unchecked NULL return value vulnerability in Trend Micro Apex Central
CVE-2025-15079 5.3 0.02% 2 0 2026-01-08T15:32:30 When doing SSH-based transfers using either SCP or SFTP, and setting the known_h
CVE-2025-13034 5.9 0.01% 2 0 2026-01-08T15:32:29 When using `CURLOPT_PINNEDPUBLICKEY` option with libcurl or `--pinnedpubkey` wit
CVE-2025-69260 7.5 0.00% 1 0 2026-01-08T15:31:29 A message out-of-bounds read vulnerability in Trend Micro Apex Central could all
CVE-2025-69258 9.8 0.00% 1 0 2026-01-08T15:31:28 A LoadLibraryEX vulnerability in Trend Micro Apex Central could allow an unauthe
CVE-2025-14017 None 0.01% 2 0 2026-01-08T12:30:38 When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl, changing
CVE-2025-14524 None 0.02% 2 0 2026-01-08T12:30:37 When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer p
CVE-2025-37164 10.0 84.25% 3 3 template 2026-01-08T00:32:16 A remote code execution issue exists in HPE OneView.
CVE-2025-62224 5.5 0.06% 2 0 2026-01-08T00:31:21 User interface (ui) misrepresentation of critical information in Microsoft Edge
CVE-2017-20214 7.5 0.03% 1 0 2026-01-08T00:31:21 FLIR Thermal Camera F/FC/PT/D firmware version 8.0.0.64 contains hard-coded SSH
CVE-2017-20213 7.5 0.10% 1 0 2026-01-08T00:31:21 FLIR Thermal Camera F/FC/PT/D Stream firmware version 8.0.0.64 contains an unaut
CVE-2017-20212 6.2 0.19% 1 0 2026-01-08T00:31:21 FLIR Thermal Camera F/FC/PT/D firmware version 8.0.0.64 contains an information
CVE-2009-0556 8.8 76.76% 5 0 2026-01-07T21:32:42 Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3, and PowerPoint in
CVE-2026-22184 None 0.08% 2 0 2026-01-07T21:32:07 zlib versions up to and including 1.3.1.2 contain a global buffer overflow in th
CVE-2026-20029 4.9 0.03% 2 0 2026-01-07T18:30:33 A vulnerability in the licensing features of Cisco Identity Services Engine
CVE-2026-22536 None 0.01% 1 0 2026-01-07T18:30:33 The absence of permissions control for the user XXX allows the current configura
CVE-2026-20027 5.3 0.03% 1 0 2026-01-07T18:30:33 Multiple Cisco products are affected by a vulnerability in the processing of DCE
CVE-2026-22542 None 0.04% 1 0 2026-01-07T18:30:33 An attacker with access to the system's internal network can cause a denial of s
CVE-2026-22541 None 0.04% 1 0 2026-01-07T18:30:33 The massive sending of ICMP requests causes a denial of service on one of the bo
CVE-2026-21635 5.3 0.01% 1 0 2026-01-07T18:30:25 An Improper Access Control could allow a malicious actor in Wi-Fi range to the E
CVE-2025-69277 4.5 0.02% 1 0 2026-01-07T18:30:24 libsodium before ad3004e, in atypical use cases involving certain custom cryptog
CVE-2025-13947 7.4 0.05% 1 0 2026-01-07T16:15:48.950000 A flaw was found in WebKitGTK. This vulnerability allows remote, user-assisted i
CVE-2026-0628 8.8 0.02% 2 1 2026-01-07T15:31:20 Insufficient policy enforcement in WebView tag in Google Chrome prior to 143.0.7
CVE-2025-0980 6.4 0.01% 1 0 2026-01-07T15:31:20 Nokia SR Linux is vulnerable to an authentication vulnerability allowing unautho
CVE-2026-22540 None 0.04% 1 0 2026-01-07T15:30:25 The massive sending of ARP requests causes a denial of service on one board of t
CVE-2025-38352 7.4 0.19% 5 3 2026-01-07T15:30:14 In the Linux kernel, the following vulnerability has been resolved: posix-cpu-t
CVE-2025-68926 9.8 3.14% 4 2 template 2026-01-07T15:22:22 ## Vulnerability Overview ### Description RustFS implements gRPC authenticatio
CVE-2025-14631 None 0.02% 1 0 2026-01-07T12:31:27 A NULL Pointer Dereference vulnerability in TP-Link Archer BE400 V1(802.11 modul
CVE-2025-15471 9.8 0.15% 3 0 2026-01-07T03:30:32 A vulnerability was detected in TRENDnet TEW-713RE 1.02. The impacted element is
CVE-2020-36913 5.3 0.09% 1 0 2026-01-06T21:31:40 All-Dynamics Software enlogic:show 2.0.2 contains a session fixation vulnerabili
CVE-2026-0641 6.3 2.54% 1 0 2026-01-06T21:30:45 A security vulnerability has been detected in TOTOLINK WA300 5.2cu.7112_B2019022
CVE-2025-63525 9.6 0.03% 1 0 2026-01-06T21:15:43.240000 An issue was discovered in Blood Bank Management System 1.0 allowing authenticat
CVE-2026-0640 8.8 0.09% 1 0 2026-01-06T18:31:44 A weakness has been identified in Tenda AC23 16.03.07.52. This affects the funct
CVE-2025-14942 None 0.07% 1 0 2026-01-06T18:31:43 wolfSSH’s key exchange state machine can be manipulated to leak the client’s pas
CVE-2025-39477 9.8 0.04% 1 0 2026-01-06T18:31:43 Missing Authorization vulnerability in Sfwebservice InWave Jobs allows Exploitin
CVE-2020-36924 7.5 0.06% 1 0 2026-01-06T18:31:43 Sony BRAVIA Digital Signage 1.7.8 contains a remote file inclusion vulnerability
CVE-2025-60262 9.8 0.11% 1 0 2026-01-06T18:31:43 An issue in H3C M102G HM1A0V200R010 wireless controller and BA1500L SWBA1A0V100R
CVE-2020-36920 8.8 0.05% 1 0 2026-01-06T18:31:42 iDS6 DSSPro Digital Signage System 6.2 contains an improper access control vulne
CVE-2020-36916 8.8 0.02% 1 0 2026-01-06T18:31:42 TDM Digital Signage PC Player 4.1.0.4 contains an elevation of privileges vulner
CVE-2020-36906 4.3 0.02% 1 0 2026-01-06T18:31:42 P5 FNIP-8x16A FNIP-4xSH 1.0.20 contains a cross-site request forgery vulnerabili
CVE-2020-36917 7.5 0.06% 1 0 2026-01-06T18:31:42 iDS6 DSSPro Digital Signage System 6.2 contains a sensitive information disclosu
CVE-2020-36909 6.5 0.03% 1 0 2026-01-06T18:31:42 SnapGear Management Console SG560 3.1.5 contains a file manipulation vulnerabili
CVE-2020-36921 7.5 0.19% 1 0 2026-01-06T18:31:42 RED-V Super Digital Signage System 5.1.1 contains an information disclosure vuln
CVE-2020-36922 7.5 0.08% 1 0 2026-01-06T18:31:42 Sony BRAVIA Digital Signage 1.7.8 contains an information disclosure vulnerabili
CVE-2020-36907 7.5 0.38% 1 0 2026-01-06T18:31:42 Aerohive HiveOS contains a denial of service vulnerability in the NetConfig UI t
CVE-2020-36914 7.5 0.04% 1 0 2026-01-06T18:31:35 QiHang Media Web Digital Signage 3.0.9 contains a sensitive information disclosu
CVE-2020-36908 5.3 0.02% 1 0 2026-01-06T18:31:34 SnapGear Management Console SG560 version 3.1.5 contains a cross-site request fo
CVE-2020-36905 7.5 0.05% 1 0 2026-01-06T18:31:33 FIBARO System Home Center 5.021 contains a remote file inclusion vulnerability i
CVE-2026-21877 10.0 0.05% 5 1 2026-01-06T17:48:25 ### Impact n8n is affected by an authenticated Remote Code Execution (RCE) vulne
CVE-2025-54957 5.4 0.05% 3 1 2026-01-06T17:15:44.213000 An issue was discovered in Dolby UDC 4.5 through 4.13. A crash of the DD+ decode
CVE-2025-68428 None 0.06% 1 0 2026-01-06T15:51:59 ### Impact User control of the first argument of the loadFile method in the node
CVE-2025-48769 8.1 0.06% 1 0 2026-01-06T14:35:26.893000 Use After Free vulnerability was discovered in fs/vfs/fs_rename code of the Apac
CVE-2026-21634 6.5 0.02% 1 0 2026-01-05T21:31:38 A malicious actor with access to the adjacent network could overflow the UniFi P
CVE-2026-21633 8.8 0.02% 2 0 2026-01-05T21:31:37 A malicious actor with access to the adjacent network could obtain unauthorized
CVE-2025-68668 9.9 0.10% 2 0 2026-01-05T19:06:07 ### Impact A sandbox bypass vulnerability exists in the Python Code Node that us
CVE-2025-14346 9.8 0.09% 4 0 2026-01-05T18:30:29 WHILL Model C2 Electric Wheelchairs and Model F Power Chairs do not enforce auth
CVE-2025-12514 7.2 0.02% 1 0 2026-01-05T12:31:32 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2025-54890 6.8 0.02% 1 0 2026-01-05T12:31:32 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site
CVE-2025-8460 6.8 0.02% 1 0 2026-01-05T10:15:58.160000 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site
CVE-2025-15215 8.8 0.05% 1 0 2026-01-02T21:28:56.470000 A vulnerability was determined in Tenda AC10U 15.03.06.48/15.03.06.49. This affe
CVE-2025-66848 9.8 0.40% 1 0 2026-01-02T18:31:27 JD Cloud NAS routers AX1800 (4.3.1.r4308 and earlier), AX3000 (4.3.1.r4318 and e
CVE-2025-47411 None 0.07% 1 0 2026-01-02T16:29:42 A user with a legitimate non-administrator account can exploit a vulnerability i
CVE-2021-47741 7.5 0.04% 1 0 2025-12-31T21:31:05 ZBL EPON ONU Broadband Router V100R001 contains a privilege escalation vulnerabi
CVE-2021-47726 7.5 0.08% 1 0 2025-12-31T21:31:05 NuCom 11N Wireless Router 5.07.90 contains a privilege escalation vulnerability
CVE-2025-15217 8.8 0.08% 1 0 2025-12-30T21:30:32 A security flaw has been discovered in Tenda AC23 16.03.07.52. Affected is the f
CVE-2025-15255 9.8 0.18% 1 0 2025-12-30T18:30:21 A vulnerability was determined in Tenda W6-S 1.0.0.4(510). This impacts an unkno
CVE-2025-15218 8.8 0.08% 1 0 2025-12-30T06:30:25 A weakness has been identified in Tenda AC10U 15.03.06.48/15.03.06.49. Affected
CVE-2025-15216 8.8 0.08% 1 0 2025-12-30T03:30:17 A vulnerability was identified in Tenda AC23 16.03.07.52. This impacts the funct
CVE-2025-14847 7.5 68.33% 22 28 template 2025-12-30T00:32:58 Mismatched length fields in Zlib compressed protocol headers may allow a read of
CVE-2019-25236 9.8 0.11% 1 0 2025-12-29T15:58:13.147000 iSeeQ Hybrid DVR WH-H4 1.03R contains an unauthenticated vulnerability in the ge
CVE-2018-25140 7.5 0.08% 1 0 2025-12-29T15:58:13.147000 FLIR thermal traffic cameras contain an unauthenticated device manipulation vuln
CVE-2025-13915 9.8 0.37% 3 0 2025-12-26T15:30:23 IBM API Connect 10.0.8.0 through 10.0.8.5, and 10.0.11.0 could allow a remote at
CVE-2019-25248 7.5 0.14% 1 0 2025-12-24T21:30:40 Beward N100 M2.1.6.04C014 contains an unauthenticated vulnerability that allows
CVE-2019-25251 5.3 0.03% 1 0 2025-12-24T21:30:35 Teradek VidiU Pro 3.0.3 contains a server-side request forgery vulnerability in
CVE-2018-25139 7.5 0.12% 1 0 2025-12-24T21:30:35 FLIR AX8 Thermal Camera 1.32.16 contains an unauthenticated vulnerability that a
CVE-2018-25138 7.5 0.13% 1 0 2025-12-24T21:30:35 FLIR AX8 Thermal Camera 1.32.16 contains hard-coded SSH and web panel credential
CVE-2019-25247 5.3 0.02% 1 0 2025-12-24T21:30:34 Beward N100 H.264 VGA IP Camera M2.1.6 contains a cross-site request forgery vul
CVE-2019-25246 8.8 0.03% 1 0 2025-12-24T21:30:34 Beward N100 H.264 VGA IP Camera M2.1.6 contains an authenticated file disclosure
CVE-2018-25141 7.5 0.11% 1 0 2025-12-24T21:30:34 FLIR thermal traffic cameras contain an unauthenticated vulnerability that allow
CVE-2025-14704 7.3 0.23% 1 0 2025-12-23T17:10:50.713000 A vulnerability was found in Shiguangwu sgwbox N3 2.0.25. The impacted element i
CVE-2025-68613 10.0 8.42% 3 28 template 2025-12-22T16:19:13 ### Impact n8n contains a critical Remote Code Execution (RCE) vulnerability in
CVE-2024-12087 6.5 2.36% 1 0 2025-12-22T15:30:20 A path traversal vulnerability exists in rsync. It stems from behavior enabled b
CVE-2025-2486 8.8 0.02% 1 0 2025-12-19T18:31:07 The Ubuntu edk2 UEFI firmware packages accidentally allowed the UEFI Shell to be
CVE-2019-6110 6.8 51.29% 1 1 2025-12-18T15:15:47.940000 In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the
CVE-2025-55182 10.0 53.46% 2 100 template 2025-12-09T16:53:25 ### Impact There is an unauthenticated remote code execution vulnerability in R
CVE-2025-1910 None 0.02% 1 1 2025-12-05T00:31:05 The WatchGuard Mobile VPN with SSL Client on Windows allows a locally authentic
CVE-2025-43300 8.8 1.08% 1 8 2025-11-26T15:35:16 An out-of-bounds write issue was addressed with improved bounds checking. This i
CVE-2025-13601 7.7 0.02% 1 0 2025-11-26T15:34:20 A heap-based buffer overflow problem was found in glib through an incorrect calc
CVE-2025-6389 9.8 0.37% 1 3 2025-11-25T03:30:26 The Sneeit Framework plugin for WordPress is vulnerable to Remote Code Execution
CVE-2025-64432 4.7 0.01% 1 0 2025-11-17T21:44:47 ### Summary _Short summary of the problem. Make the impact and severity as clear
CVE-2025-47812 10.0 92.40% 1 10 template 2025-11-05T19:26:31.650000 In Wing FTP Server before 7.4.4. the user and admin web interfaces mishandle '\0
CVE-2025-31161 9.8 82.33% 1 15 template 2025-10-31T22:04:34.230000 CrushFTP 10 before 10.8.4 and 11 before 11.3.1 allows authentication bypass and
CVE-2021-44228 10.0 94.36% 1 100 template 2025-10-27T17:40:33.680000 Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
CVE-2020-12812 9.8 46.01% 1 0 2025-10-22T00:32:58 An improper authentication vulnerability in SSL VPN in FortiOS 6.4.0, 6.2.0 to 6
CVE-2025-10492 9.8 0.33% 2 1 2025-10-14T15:31:20 A Java deserialisation vulnerability has been discovered in Jaspersoft Library.
CVE-2025-11155 None 0.02% 1 0 2025-09-29T18:33:13 The credentials required to access the device's web server are sent in base64 wi
CVE-2025-47987 7.8 0.08% 5 1 2025-07-14T17:38:41.223000 Heap-based buffer overflow in Windows Cred SSProvider Protocol allows an authori
CVE-2025-4330 7.5 0.16% 1 6 2025-06-03T21:30:37 Allows the extraction filter to be ignored, allowing symlink targets to point ou
CVE-2025-47934 None 0.03% 1 0 2025-05-19T21:54:44 ### Impact A maliciously modified message can be passed to either `openpgp.verif
CVE-2025-26529 8.4 0.12% 1 2 2025-02-24T22:02:54 Description information displayed in the site administration live log required a
CVE-2024-32019 8.8 0.48% 1 12 2024-11-21T09:14:20.453000 Netdata is an open source observability tool. In affected versions the `ndsudo`
CVE-2024-38063 9.8 90.06% 1 29 2024-08-16T20:54:12.043000 Windows TCP/IP Remote Code Execution Vulnerability
CVE-2024-2537 4.4 0.06% 1 1 2024-03-15T18:30:45 Improper Control of Dynamically-Managed Code Resources vulnerability in Logitech
CVE-2019-6109 6.8 9.74% 1 0 2023-01-29T05:03:50 An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the
CVE-2026-21876 0 0.00% 5 1 N/A
CVE-2025-69222 0 0.09% 1 0 N/A
CVE-2025-67859 0 0.00% 1 0 N/A
CVE-2025-69139 0 0.00% 1 0 N/A
CVE-2025-14558 0 0.00% 1 2 N/A
CVE-2025-65606 0 0.00% 2 0 N/A
CVE-2025-68615 0 0.05% 1 1 N/A
CVE-2025-59157 0 0.21% 1 0 N/A
CVE-2025-69194 0 0.00% 1 1 N/A
CVE-1973-0001 0 0.00% 1 0 N/A

CVE-2025-15464
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-08T22:16:01.950000

1 posts

Exported Activity allows external applications to gain application context and directly launch Gmail with inbox access, bypassing security controls.

thehackerwire@mastodon.social at 2026-01-08T22:23:17.000Z ##

🟠 CVE-2025-15464 - High (7.5)

Exported Activity allows external applications to gain application context and directly launch Gmail with inbox access, bypassing security controls.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

CVE-2025-50334
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-08T21:31:39

2 posts

An issue in Technitium DNS Server v.13.5 allows a remote attacker to cause a denial of service via the rate-limiting component

thehackerwire@mastodon.social at 2026-01-08T20:01:46.000Z ##

🟠 CVE-2025-50334 - High (7.5)

An issue in Technitium DNS Server v.13.5 allows a remote attacker to cause a denial of service via the rate-limiting component

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

cR0w@infosec.exchange at 2026-01-08T16:42:05.000Z ##

DoS in Technitium DNS server.

github.com/FPokerFace/Security

##

CVE-2025-59468
(9.0 None)

EPSS: 0.00%

updated 2026-01-08T21:31:39

2 posts

This vulnerability allows a Backup Administrator to perform remote code execution (RCE) as the postgres user by sending a malicious password parameter.

cR0w@infosec.exchange at 2026-01-08T16:43:57.000Z ##

CVEs are now published for this.

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

##

DarkWebInformer@infosec.exchange at 2026-01-07T16:07:10.000Z ##

🚨 Multiple Veeam CVEs Identified: Critical Flaws Allow RCE and High-Privilege Actions

CVE-2025-55125:

A flaw that allows a Backup or Tape Operator to achieve remote code execution (RCE) as root by crafting a malicious backup configuration file.

▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing

CVE-2025-59468:

A vulnerability enabling a Backup Administrator to execute remote code as the postgres user by supplying a malicious password parameter.

▪️Severity: Medium
▪️CVSS v3.1: 6.7
▪️Source: Discovered during internal testing

CVE-2025-59469

A security issue that allows a Backup or Tape Operator to write arbitrary files with root privileges.

▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing

CVE-2025-59470

A vulnerability that permits a Backup or Tape Operator to achieve remote code execution (RCE) as the postgres user by sending a malicious interval or order parameter.

▪️CVSS Severity: Critical
▪️CVSS v3.1: 9.0
▪️Source: Discovered during internal testing

Veeam: veeam.com/kb4738
Blog format: darkwebinformer.com/multiple-v

##

CVE-2025-14025
(8.6 HIGH)

EPSS: 0.00%

updated 2026-01-08T21:31:39

1 posts

A flaw was found in Ansible Automation Platform (AAP). Read-only scoped OAuth2 API Tokens in AAP, are enforced at the Gateway level for Gateway-specific operations. However, this vulnerability allows read-only tokens to perform write operations on backend services (e.g., Controller, Hub, EDA). If this flaw were exploited, an attacker‘s capabilities would only be limited by role based access contro

cR0w@infosec.exchange at 2026-01-08T15:16:38.000Z ##

A flaw was found in Ansible Automation Platform (AAP). Read-only scoped OAuth2 API Tokens in AAP, are enforced at the Gateway level for Gateway-specific operations. However, this vulnerability allows read-only tokens to perform write operations on backend services (e.g., Controller, Hub, EDA). If this flaw were exploited, an attacker‘s capabilities would only be limited by role based access controls (RBAC).

access.redhat.com/security/cve

##

_r_netsec@infosec.exchange at 2026-01-08T18:43:06.000Z ##

Do Smart People Ever Say They’re Smart? (SmarterTools SmarterMail Pre-Auth RCE CVE-2025-52691) - watchTowr Labs labs.watchtowr.com/do-smart-pe

##

AAKL@infosec.exchange at 2026-01-08T18:39:17.000Z ##

New.

WatchTower: Do Smart People Ever Say They’re Smart? (SmarterTools SmarterMail Pre-Auth RCE CVE-2025-52691) labs.watchtowr.com/do-smart-pe #infosec #threatresearch #vulnerability

##

cR0w@infosec.exchange at 2026-01-08T18:37:45.000Z ##

Get your popcorn, it's time for another watchTowr Labs post. This one is a pre-auth RCE in SmarterMail. :blobcatpopcorn:

labs.watchtowr.com/do-smart-pe

##

technadu@infosec.exchange at 2025-12-31T15:25:38.000Z ##

CSA has published guidance on CVE-2025-52691, a critical SmarterMail vulnerability enabling potential unauthenticated remote code execution through arbitrary file uploads.

Although exploitation has not been observed, the advisory highlights the continued exposure of mail server infrastructure and the importance of timely upgrades to fixed builds.

Engage in the discussion and follow TechNadu for sober, research-driven security reporting.

#InfoSec #VulnerabilityResearch #EmailInfrastructure #RCE #PatchManagement #CyberDefense #TechNadu

##

beyondmachines1@infosec.exchange at 2025-12-30T15:01:39.000Z ##

Critical SmarterMail flaw allows unauthenticated remote code execution

SmarterTools released a critical update for SmarterMail to fix CVE-2025-52691 that allows unauthenticated remote code execution. Attackers can exploit this flaw to upload malicious files and gain full control over email servers.

**If you are using SmarterMail update ASAP. There is a trivial flaw to upload files and take over your system. You can't hide this behind a firewall, it's designed to be exposed to the internet. After patching, check your server logs for any new or strange files that appeared before you patched.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-66916
(9.4 CRITICAL)

EPSS: 0.00%

updated 2026-01-08T21:30:40

1 posts

The snailjob component in RuoYi-Vue-Plus versions 5.5.1 and earlier, interface /snail-job/workflow/check-node-expression can execute QLExpress expressions, but it does not filter user input, allowing attackers to use the File class to perform arbitrary file reading and writing.

thehackerwire@mastodon.social at 2026-01-08T20:31:18.000Z ##

🔴 CVE-2025-66916 - Critical (9.4)

The snailjob component in RuoYi-Vue-Plus versions 5.5.1 and earlier, interface /snail-job/workflow/check-node-expression can execute QLExpress expressions, but it does not filter user input, allowing attackers to use the File class to perform arbi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

CVE-2025-66913
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-01-08T21:30:40

1 posts

JimuReport thru version 2.1.3 is vulnerable to remote code execution when processing user-controlled H2 JDBC URLs. The application passes the attacker-supplied JDBC URL directly to the H2 driver, allowing the use of certain directives to execute arbitrary Java code. A different vulnerability than CVE-2025-10770.

thehackerwire@mastodon.social at 2026-01-08T20:31:08.000Z ##

🔴 CVE-2025-66913 - Critical (9.8)

JimuReport thru version 2.1.3 is vulnerable to remote code execution when processing user-controlled H2 JDBC URLs. The application passes the attacker-supplied JDBC URL directly to the H2 driver, allowing the use of certain directives to execute a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

CVE-2025-65518
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-08T21:30:40

2 posts

Plesk Obsidian versions 8.0.1 through 18.0.73 are vulnerable to a Denial of Service (DoS) condition. The vulnerability exists in the get_password.php endpoint, where a crafted request containing a malicious payload can cause the affected web interface to continuously reload, rendering the service unavailable to legitimate users. An attacker can exploit this issue remotely without authentication, r

1 repos

https://github.com/Jainil-89/CVE-2025-65518

thehackerwire@mastodon.social at 2026-01-08T19:40:54.000Z ##

🟠 CVE-2025-65518 - High (7.5)

Plesk Obsidian versions 8.0.1 through 18.0.73 are vulnerable to a Denial of Service (DoS) condition. The vulnerability exists in the get_password.php endpoint, where a crafted request containing a malicious payload can cause the affected web inter...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

cR0w@infosec.exchange at 2026-01-08T18:58:46.000Z ##

DoS in Plesk.

github.com/Jainil-89/CVE-2025-

##

CVE-2025-65731(CVSS UNKNOWN)

EPSS: 0.00%

updated 2026-01-08T21:30:40

1 posts

An issue was discovered in D-Link Router DIR-605L (Hardware version F1; Firmware version: V6.02CN02) allowing an attacker with physical access to the UART pins to execute arbitrary commands due to presence of root terminal access on a serial interface without proper access control.

1 repos

https://github.com/whitej3rry/CVE-2025-65731

CVE-2025-68719
(8.8 HIGH)

EPSS: 0.00%

updated 2026-01-08T21:15:43.603000

1 posts

KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 mishandle configuration management. Once any user is logged in and maintains an active session, an attacker can directly query the backup endpoint and download a full configuration archive. This archive contains sensitive files such as /etc/shadow, enabling credential recovery and potential full compromise of the device.

thehackerwire@mastodon.social at 2026-01-08T22:01:13.000Z ##

🟠 CVE-2025-68719 - High (8.8)

KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 mishandle configuration management. Once any user is logged in and maintains an active session, an attacker can directly query the backup endpoint and download a full configuration archive. This arc...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

CVE-2025-68717
(9.4 CRITICAL)

EPSS: 0.00%

updated 2026-01-08T21:15:43.353000

3 posts

KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 allow authentication bypass during session validation. If any user is logged in, endpoints such as /cgi-bin/system-tool accept unauthenticated requests with empty or invalid session values. This design flaw lets attackers piggyback on another user's active session to retrieve sensitive configuration data or execute privileged actions without authent

thehackerwire@mastodon.social at 2026-01-08T22:23:08.000Z ##

🔴 CVE-2025-68717 - Critical (9.4)

KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 allow authentication bypass during session validation. If any user is logged in, endpoints such as /cgi-bin/system-tool accept unauthenticated requests with empty or invalid session values. This des...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

thehackerwire@mastodon.social at 2026-01-08T22:01:03.000Z ##

🔴 CVE-2025-68717 - Critical (9.4)

KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 allow authentication bypass during session validation. If any user is logged in, endpoints such as /cgi-bin/system-tool accept unauthenticated requests with empty or invalid session values. This des...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

thehackerwire@mastodon.social at 2026-01-08T22:00:36.000Z ##

🔴 CVE-2025-68717 - Critical (9.4)

KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 allow authentication bypass during session validation. If any user is logged in, endpoints such as /cgi-bin/system-tool accept unauthenticated requests with empty or invalid session values. This des...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

CVE-2025-68716
(8.4 HIGH)

EPSS: 0.00%

updated 2026-01-08T21:15:43.187000

1 posts

KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 enable the SSH service enabled by default on the LAN interface. The root account is configured with no password, and administrators cannot disable SSH or enforce authentication via the CLI or web GUI. This allows any LAN-adjacent attacker to trivially gain root shell access and execute arbitrary commands with full privileges.

thehackerwire@mastodon.social at 2026-01-08T22:00:26.000Z ##

🟠 CVE-2025-68716 - High (8.4)

KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 enable the SSH service enabled by default on the LAN interface. The root account is configured with no password, and administrators cannot disable SSH or enforce authentication via the CLI or web GU...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

CVE-2025-15346(CVSS UNKNOWN)

EPSS: 0.06%

updated 2026-01-08T20:57:58

1 posts

A vulnerability in the handling of verify_mode = CERT_REQUIRED in the wolfssl Python package (wolfssl-py) causes client certificate requirements to not be fully enforced.  Because the WOLFSSL_VERIFY_FAIL_IF_NO_PEER_CERT flag was not included, the behavior effectively matched CERT_OPTIONAL: a peer certificate was verified if presented, but connections were incorrectly authenticated when no client

cR0w@infosec.exchange at 2026-01-08T15:31:23.000Z ##

No awoo for you.

cve.org/CVERecord?id=CVE-2025-

A vulnerability in the handling of verify_mode = CERT_REQUIRED in the wolfssl Python package (wolfssl-py) causes client certificate requirements to not be fully enforced. Because the WOLFSSL_VERIFY_FAIL_IF_NO_PEER_CERT flag was not included, the behavior effectively matched CERT_OPTIONAL: a peer certificate was verified if presented, but connections were incorrectly authenticated when no client certificate was provided. This results in improper authentication, allowing attackers to bypass mutual TLS (mTLS) client authentication by omitting a client certificate during the TLS handshake. The issue affects versions up to and including 5.8.2.

##

CVE-2026-21858
(10.0 CRITICAL)

EPSS: 0.03%

updated 2026-01-08T20:15:45.453000

10 posts

n8n is an open source workflow automation platform. Versions starting with 1.65.0 and below 1.121.0 enable an attacker to access files on the underlying server through execution of certain form-based workflows. A vulnerable workflow could grant access to an unauthenticated remote attacker, resulting in exposure of sensitive information stored on the system and may enable further compromise dependi

3 repos

https://github.com/eduardorossi84/CVE-2026-21858-POC

https://github.com/Chocapikk/CVE-2026-21858

https://github.com/Ashwesker/Ashwesker-CVE-2026-21858

SerferTroyan@mastodon.social at 2026-01-08T22:09:16.000Z ##

📰 Ni8mare: критична вразливість у n8n дозволяє віддалене виконання коду без автентифікації

CyberCalm Ni8mare: критична вразливість у n8n дозволяє віддалене виконання коду без автентифікації Дослідники виявили критичну вразливість (CVE-2026-21858, CVSS 10.0) у платформі автоматизації n8n, яка дозволяє зловмисникам повністю захопити...

🔗 cybercalm.org/ni8mare-krytychn

##

secdb at 2026-01-08T21:36:45.064Z ##

🚨 CVE-2026-21858 - Ni8mare

n8n is an open source workflow automation platform. Versions below 1.121.0 enable an attacker to access files on the underlying server through execution of certain form-based workflows. A vulnerable workflow could grant access to an unauthenticated remote attacker, resulting in exposure of sensitive information stored on the system and may enable further compromise depending on deployment configuration and workflow usage. This issue is fixed in version 1.121.0.

secdb.nttzen.cloud/cve/detail/

##

AAKL@infosec.exchange at 2026-01-08T17:33:15.000Z ##

New.

Picus: Ni8mare: n8n CVE-2026-21858 Remote Code Execution Vulnerability Explained picussecurity.com/resource/blo #threatresearch #infosec

##

jbhall56@infosec.exchange at 2026-01-08T13:41:46.000Z ##

Tracked as CVE-2026-21858 (CVSS score 10), the bug enables remote code execution without authentication. securityweek.com/critical-vuln

##

benzogaga33@mamot.fr at 2026-01-08T10:40:02.000Z ##

Ni8mare – CVE-2026-21858 : cette faille critique permet de pirater les serveurs n8n it-connect.fr/ni8mare-cve-2026 #ActuCybersécurité #Cybersécurité #Vulnérabilité #n8n

##

Dam_ned@mamot.fr at 2026-01-08T09:08:16.000Z ##

qui c'est qui se servait de #n8n ici ? on a un petit #CVE à niveau 10 là github.com/Chocapikk/CVE-2026- #iagenIsHell

##

beyondmachines1@infosec.exchange at 2026-01-08T08:01:43.000Z ##

Critical Ni8mare flaw in n8n allows unauthenticated remote takeover

n8n patched a critical vulnerability (CVE-2026-21858) that allows unauthenticated attackers to steal server files and gain full remote code execution. The flaw exploits a logic error in webhook and file upload handling to bypass authentication and compromise sensitive automation credentials.

**If you are using n8n, this is urgent. If possible, try to isolate all n8n instances from the internet and accessible from trusted networks only. Then update to version 1.121.0 ASAP. If you can't patch, block webhooks and file uploads from any access from untrusted networks and the internet.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

r3pek@r3pek.org at 2026-01-07T21:33:12.000Z ##

Say hello to #Ni8mare, the first named vulnerability of 2026.

cyera.com/research-labs/ni8mar

#cve-2026-21858

##

cR0w@infosec.exchange at 2026-01-07T16:00:06.000Z ##

RE: infosec.exchange/@cR0w/1158494

LMFAO another one. 🥳

github.com/n8n-io/n8n/security

cyera.com/research-labs/ni8mar

cve.org/CVERecord?id=CVE-2026- ( not yet published )

##

_r_netsec@infosec.exchange at 2026-01-07T15:58:07.000Z ##

Ni8mare  -  Unauthenticated Remote Code Execution in n8n (CVE-2026-21858) cyera.com/research-labs/ni8mar

##

CVE-2025-61548
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-01-08T20:15:44.070000

1 posts

SQL Injection is present on the hfInventoryDistFormID parameter in the /PSP/appNET/Store/CartV12.aspx/GetUnitPrice endpoint in edu Business Solutions Print Shop Pro WebDesk version 18.34. Unsanitized user input is incorporated directly into SQL queries without proper parameterization or escaping. This vulnerability allows remote attackers to execute arbitrary SQL commands

thehackerwire@mastodon.social at 2026-01-08T22:23:27.000Z ##

🔴 CVE-2025-61548 - Critical (9.8)

SQL Injection is present on the hfInventoryDistFormID parameter in the /PSP/appNET/Store/CartV12.aspx/GetUnitPrice endpoint in edu Business Solutions Print Shop Pro WebDesk version 18.34. Unsanitized user input is incorporated directly into SQL qu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

CVE-2025-61246
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-01-08T20:15:43.923000

1 posts

indieka900 online-shopping-system-php 1.0 is vulnerable to SQL Injection in master/review_action.php via the proId parameter.

1 repos

https://github.com/hackergovind/CVE-2025-61246

thehackerwire@mastodon.social at 2026-01-08T22:01:23.000Z ##

🔴 CVE-2025-61246 - Critical (9.8)

indieka900 online-shopping-system-php 1.0 is vulnerable to SQL Injection in master/review_action.php via the proId parameter.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

CVE-2025-56424
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-08T20:15:43.677000

1 posts

An issue in Insiders Technologies GmbH e-invoice pro before release 1 Service Pack 2 allows a remote attacker to cause a denial of service via a crafted script

thehackerwire@mastodon.social at 2026-01-08T22:24:23.000Z ##

🟠 CVE-2025-56424 - High (7.5)

An issue in Insiders Technologies GmbH e-invoice pro before release 1 Service Pack 2 allows a remote attacker to cause a denial of service via a crafted script

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

CVE-2025-13151
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-08T19:15:55.983000

1 posts

Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string.

cR0w@infosec.exchange at 2026-01-07T21:34:43.000Z ##

Reset the "Days since ASN1 vuln" sign to 0.

cve.org/CVERecord?id=CVE-2025-

Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string.

##

CVE-2017-20216
(9.8 CRITICAL)

EPSS: 0.31%

updated 2026-01-08T19:15:54.793000

1 posts

FLIR Thermal Camera PT-Series firmware version 8.0.0.64 contains multiple unauthenticated remote command injection vulnerabilities in the controllerFlirSystem.php script. Attackers can execute arbitrary system commands as root by exploiting unsanitized POST parameters in the execFlirSystem() function through shell_exec() calls. Exploitation evidence was observed by the Shadowserver Foundation on 2

CVE-2017-20215
(8.8 HIGH)

EPSS: 0.26%

updated 2026-01-08T19:15:54.677000

1 posts

FLIR Thermal Camera FC-S/PT firmware version 8.0.0.64 contains an authenticated OS command injection vulnerability that allows attackers to execute shell commands with root privileges. Authenticated attackers can inject arbitrary shell commands through unvalidated input parameters to gain complete control of the thermal camera system.

CVE-2025-12543
(9.6 CRITICAL)

EPSS: 0.10%

updated 2026-01-08T18:31:46

1 posts

A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBoss EAP, and other Java applications. The Undertow library fails to properly validate the Host header in incoming HTTP requests. As a result, requests containing malformed or malicious Host headers are processed without rejection, enabling attackers to poison caches, perform internal network scans, or hijack user sessio

cR0w@infosec.exchange at 2026-01-07T16:56:51.000Z ##

access.redhat.com/security/cve

A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBoss EAP, and other Java applications. The Undertow library fails to properly validate the Host header in incoming HTTP requests.As a result, requests containing malformed or malicious Host headers are processed without rejection, enabling attackers to poison caches, perform internal network scans, or hijack user sessions.

##

CVE-2025-15026
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-01-08T18:31:36

1 posts

Missing Authentication for Critical Function vulnerability in Centreon Infra Monitoring centreon-awie (Awie import module) allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Infra Monitoring: from 25.10.0 before 25.10.2, from 24.10.0 before 24.10.3, from 24.04.0 before 24.04.3.

CVE-2025-15029
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-01-08T18:31:36

1 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Centreon Infra Monitoring (Awie export modules) allows SQL Injection to unauthenticated user. This issue affects Infra Monitoring: from 25.10.0 before 25.10.2, from 24.10.0 before 24.10.3, from 24.04.0 before 24.04.3.

CVE-2025-12513
(6.8 MEDIUM)

EPSS: 0.01%

updated 2026-01-08T18:31:36

1 posts

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Centreon Infra Monitoring (Hosts configuration form modules) allows Stored XSS to users with high privileges. This issue affects Infra Monitoring: from 25.10.0 before 25.10.2, from 24.10.0 before 24.10.15, from 24.04.0 before 24.04.19.

CVE-2025-5965
(7.2 HIGH)

EPSS: 0.10%

updated 2026-01-08T18:31:36

1 posts

In the backup parameters, a user with high privilege is able to concatenate custom instructions to the backup setup. Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Centreon Infra Monitoring (Backup configuration in the administration setup modules) allows OS Command Injection.This issue affects Infra Monitoring: from 25.10.0 before 25.10

CVE-2025-12519
(5.3 MEDIUM)

EPSS: 0.01%

updated 2026-01-08T18:31:36

1 posts

Missing Authorization vulnerability in Centreon Infra Monitoring (Administration parameters API endpoint modules) allows Accessing Functionality Not Properly Constrained by ACLs, resulting in Information Disclosure like downtime or acknowledgement configurations. This issue affects Infra Monitoring: from 25.10.0 before 25.10.2, from 24.10.0 before 24.10.15, from 24.04.0 before 24.04.19.

CVE-2026-22230
(7.6 HIGH)

EPSS: 0.00%

updated 2026-01-08T18:30:57

1 posts

OPEXUS eCASE Audit allows an authenticated attacker to modify client-side JavaScript or craft HTTP requests to access functions or buttons that have been disabled or blocked by an administrator. Fixed in eCASE Platform 11.14.1.0.

thehackerwire@mastodon.social at 2026-01-08T18:59:56.000Z ##

🟠 CVE-2026-22230 - High (7.6)

OPEXUS eCASE Audit allows an authenticated attacker to modify client-side JavaScript or craft HTTP requests to access functions or buttons that have been disabled or blocked by an administrator. Fixed in eCASE Platform 11.14.1.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

CVE-2026-22235
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-08T18:30:57

1 posts

OPEXUS eComplaint before version 9.0.45.0 allows an attacker to visit the the 'DocumentOpen.aspx' endpoint, iterate through predictable values of 'chargeNumber', and download any uploaded files.

thehackerwire@mastodon.social at 2026-01-08T18:59:55.000Z ##

🟠 CVE-2026-22235 - High (7.5)

OPEXUS eComplaint before version 9.0.45.0 allows an attacker to visit the the 'DocumentOpen.aspx' endpoint, iterate through predictable values of 'chargeNumber', and download any uploaded files.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

CVE-2025-55125
(7.8 HIGH)

EPSS: 0.00%

updated 2026-01-08T18:30:56

3 posts

This vulnerability allows a Backup or Tape Operator to perform remote code execution (RCE) as root by creating a malicious backup configuration file.

thehackerwire@mastodon.social at 2026-01-08T20:01:57.000Z ##

🟠 CVE-2025-55125 - High (7.8)

This vulnerability allows a Backup or Tape Operator to perform remote code execution (RCE) as root by creating a malicious
backup configuration file.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

cR0w@infosec.exchange at 2026-01-08T16:43:57.000Z ##

CVEs are now published for this.

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

##

DarkWebInformer@infosec.exchange at 2026-01-07T16:07:10.000Z ##

🚨 Multiple Veeam CVEs Identified: Critical Flaws Allow RCE and High-Privilege Actions

CVE-2025-55125:

A flaw that allows a Backup or Tape Operator to achieve remote code execution (RCE) as root by crafting a malicious backup configuration file.

▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing

CVE-2025-59468:

A vulnerability enabling a Backup Administrator to execute remote code as the postgres user by supplying a malicious password parameter.

▪️Severity: Medium
▪️CVSS v3.1: 6.7
▪️Source: Discovered during internal testing

CVE-2025-59469

A security issue that allows a Backup or Tape Operator to write arbitrary files with root privileges.

▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing

CVE-2025-59470

A vulnerability that permits a Backup or Tape Operator to achieve remote code execution (RCE) as the postgres user by sending a malicious interval or order parameter.

▪️CVSS Severity: Critical
▪️CVSS v3.1: 9.0
▪️Source: Discovered during internal testing

Veeam: veeam.com/kb4738
Blog format: darkwebinformer.com/multiple-v

##

CVE-2025-59470
(9.0 None)

EPSS: 0.00%

updated 2026-01-08T18:30:56

7 posts

This vulnerability allows a Backup Operator to perform remote code execution (RCE) as the postgres user by sending a malicious interval or order parameter.

1 repos

https://github.com/b1gchoi/CVE-2025-59470

thehackerwire@mastodon.social at 2026-01-08T20:01:37.000Z ##

🔴 CVE-2025-59470 - Critical (9)

This vulnerability allows a Backup Operator to perform remote code execution (RCE) as the postgres user by sending a malicious interval or order parameter.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

cR0w@infosec.exchange at 2026-01-08T16:43:57.000Z ##

CVEs are now published for this.

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

##

beyondmachines1@infosec.exchange at 2026-01-08T09:01:43.000Z ##

Veeam Patches Critical Remote Code Execution Flaw in Backup & Replication v13

Veeam patched multiple vulnerabilities in Backup & Replication version 13, including a critical RCE flaw (CVE-2025-59470) that allows privileged operators to execute commands as the database user. These flaws are high-value targets for ransomware groups seeking to disable recovery options during attacks.

**If you are using Veeam Backup & Replication version 13, make sure all backup systems are isolated from the internet and accessible from trusted networks only. Limit the number of users with Backup or Tape Operator roles and update to version 13.0.1.1071 as soon as possible.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

DarkWebInformer@infosec.exchange at 2026-01-07T16:07:10.000Z ##

🚨 Multiple Veeam CVEs Identified: Critical Flaws Allow RCE and High-Privilege Actions

CVE-2025-55125:

A flaw that allows a Backup or Tape Operator to achieve remote code execution (RCE) as root by crafting a malicious backup configuration file.

▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing

CVE-2025-59468:

A vulnerability enabling a Backup Administrator to execute remote code as the postgres user by supplying a malicious password parameter.

▪️Severity: Medium
▪️CVSS v3.1: 6.7
▪️Source: Discovered during internal testing

CVE-2025-59469

A security issue that allows a Backup or Tape Operator to write arbitrary files with root privileges.

▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing

CVE-2025-59470

A vulnerability that permits a Backup or Tape Operator to achieve remote code execution (RCE) as the postgres user by sending a malicious interval or order parameter.

▪️CVSS Severity: Critical
▪️CVSS v3.1: 9.0
▪️Source: Discovered during internal testing

Veeam: veeam.com/kb4738
Blog format: darkwebinformer.com/multiple-v

##

jbhall56@infosec.exchange at 2026-01-07T13:58:39.000Z ##

Tracked as CVE-2025-59470, this RCE security flaw affects Veeam Backup & Replication 13.0.1.180 and all earlier version 13 builds. bleepingcomputer.com/news/secu

##

PostgreSQL@activitypub.awakari.com at 2026-01-07T11:31:04.000Z ## Veeam resolves CVSS 9.0 RCE flaw and other security issues Veeam patched a critical RCE flaw in Backup & Replication, CVE-2025-59470, rated CVSS 9.0, along with other vulnerabilities. Veeam rel...

#Breaking #News #Security #Hacking #hacking #news #information #security #news #IT #Information

Origin | Interest | Match ##

PostgreSQL@activitypub.awakari.com at 2026-01-07T10:46:41.000Z ## ⚠️ Veeam fixed a critical Backup & Replication flaw enabling remote code execution as the postgres user. CVE-2025-59470 can be abused by authenticated Backup or Tape Operators via crafted p...


Origin | Interest | Match ##

CVE-2025-59469
(9.0 None)

EPSS: 0.00%

updated 2026-01-08T18:30:56

3 posts

This vulnerability allows a Backup or Tape Operator to write files as root.

thehackerwire@mastodon.social at 2026-01-08T19:41:27.000Z ##

🔴 CVE-2025-59469 - Critical (9)

This vulnerability allows a Backup or Tape Operator to write files as root.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

cR0w@infosec.exchange at 2026-01-08T16:43:57.000Z ##

CVEs are now published for this.

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

##

DarkWebInformer@infosec.exchange at 2026-01-07T16:07:10.000Z ##

🚨 Multiple Veeam CVEs Identified: Critical Flaws Allow RCE and High-Privilege Actions

CVE-2025-55125:

A flaw that allows a Backup or Tape Operator to achieve remote code execution (RCE) as root by crafting a malicious backup configuration file.

▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing

CVE-2025-59468:

A vulnerability enabling a Backup Administrator to execute remote code as the postgres user by supplying a malicious password parameter.

▪️Severity: Medium
▪️CVSS v3.1: 6.7
▪️Source: Discovered during internal testing

CVE-2025-59469

A security issue that allows a Backup or Tape Operator to write arbitrary files with root privileges.

▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing

CVE-2025-59470

A vulnerability that permits a Backup or Tape Operator to achieve remote code execution (RCE) as the postgres user by sending a malicious interval or order parameter.

▪️CVSS Severity: Critical
▪️CVSS v3.1: 9.0
▪️Source: Discovered during internal testing

Veeam: veeam.com/kb4738
Blog format: darkwebinformer.com/multiple-v

##

CVE-2025-67090
(5.1 MEDIUM)

EPSS: 0.00%

updated 2026-01-08T18:30:56

1 posts

The LuCI web interface on Gl Inet GL.Inet AX1800 Version 4.6.4 & 4.6.8 are vulnerable. Fix available in version 4.8.2 GL.Inet AX1800 Version 4.6.4 & 4.6.8 lacks rate limiting or account lockout mechanisms on the authentication endpoint (`/cgi-bin/luci`). An unauthenticated attacker on the local network can perform unlimited password attempts against the admin interface.

CVE-2025-67091
(6.5 MEDIUM)

EPSS: 0.00%

updated 2026-01-08T18:30:56

1 posts

An issue in GL Inet GL.Inet AX1800 Version 4.6.4 & 4.6.8 are vulnerable. GL.Inet AX1800 Version 4.6.4 & 4.6.8 in the GL.iNet custom opkg wrapper script located at /usr/libexec/opkg-call. The script is executed with root privileges when triggered via the LuCI web interface or authenticated API calls to manage packages. The vulnerable code uses shell redirection to create a lock file in the world-wr

CVE-2025-67089
(8.1 HIGH)

EPSS: 0.00%

updated 2026-01-08T18:30:56

1 posts

A command injection vulnerability exists in the GL-iNet GL-AXT1800 router firmware v4.6.8. The vulnerability is present in the `plugins.install_package` RPC method, which fails to properly sanitize user input in package names. Authenticated attackers can exploit this to execute arbitrary commands with root privileges

CVE-2026-0625(CVSS UNKNOWN)

EPSS: 1.38%

updated 2026-01-08T18:30:33

3 posts

Multiple D-Link DSL gateway devices contain a command injection vulnerability in the dnscfg.cgi endpoint due to improper sanitization of user-supplied DNS configuration parameters. An unauthenticated remote attacker can inject and execute arbitrary shell commands, resulting in remote code execution. The affected endpoint is also associated with unauthenticated DNS modification (“DNSChanger”) behav

jbhall56@infosec.exchange at 2026-01-07T13:50:08.000Z ##

Tracked as CVE-2026-0625 (CVSS score of 9.3), the security defect exists because the dnscfg.cgi library does not properly sanitize user-supplied DNS configuration parameters. securityweek.com/hackers-explo

##

beyondmachines1@infosec.exchange at 2026-01-07T10:01:16.000Z ##

Critical RCE Vulnerability Exploited in Legacy D-Link DSL Routers

D-Link legacy DSL are actively exploited using a vulnerability, CVE-2026-0625, which allows unauthenticated remote code execution and DNS hijacking.

**If you are using D-Link routers, check this advisory whether you are using any of the vulnerable devices. If yes, make sure the devices are isolated from the internet, reset to complex password and force trusted upstream DNS servers. Plan a very quick replacement for these devices, they are exploitable and won't be getting patches.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

cR0w@infosec.exchange at 2026-01-05T21:28:34.000Z ##

First D-Link of 2026 :dumpster_fire_gif:

cve.org/CVERecord?id=CVE-2026-

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2026-21440
(0 None)

EPSS: 0.32%

updated 2026-01-08T18:09:49.800000

1 posts

AdonisJS is a TypeScript-first web framework. A Path Traversal vulnerability in AdonisJS multipart file handling may allow a remote attacker to write arbitrary files to arbitrary locations on the server filesystem. This impacts @adonisjs/bodyparser through version 10.1.1 and 11.x prerelease versions prior to 11.0.0-next.6. This issue has been patched in @adonisjs/bodyparser versions 10.1.2 and 11.

3 repos

https://github.com/you-ssef9/CVE-2026-21440

https://github.com/k0nnect/cve-2026-21440-writeup

https://github.com/Ashwesker/Ashwesker-CVE-2026-21440

beyondmachines1@infosec.exchange at 2026-01-06T20:01:16.000Z ##

Critical path traversal flaw in AdonisJS enable server takeover

AdonisJS patched a critical path traversal vulnerabilities (CVE-2026-21440) that allow attackers to write or read arbitrary files on servers.

**Update your AdonisJS dependencies immediately to prevent attackers from overwriting your application code or stealing local files. Always sanitize user-provided filenames and use the Node.js permission flag to limit file system access.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-67303
(7.5 HIGH)

EPSS: 0.03%

updated 2026-01-08T18:09:49.800000

1 posts

An issue in ComfyUI-Manager prior to version 3.38 allowed remote attackers to potentially manipulate its configuration and critical data. This was due to the application storing its files in an insufficiently protected location that was accessible via the web interface

cR0w@infosec.exchange at 2026-01-05T16:04:12.000Z ##

This might be one to keep an eye on.

cve.org/CVERecord?id=CVE-2025-

An issue in ComfyUI-Manager prior to version 3.38 allowed remote attackers to potentially manipulate its configuration and critical data. This was due to the application storing its files in an insufficiently protected location that was accessible via the web interface

##

CVE-2025-13056
(6.8 MEDIUM)

EPSS: 0.01%

updated 2026-01-08T18:09:49.800000

1 posts

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Centreon Infra Monitoring (Administration ACL menu configuration modules) allows Stored XSS to users with high privileges. This issue affects Infra Monitoring: from 25.10.0 before 25.10.2, from 24.10.0 before 24.10.15, from 24.04.0 before 24.04.19.

CVE-2025-12511
(6.8 MEDIUM)

EPSS: 0.01%

updated 2026-01-08T18:09:49.800000

1 posts

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Centreon Infra Monitoring (DSM extenstio configuration modules) allows Stored XSS to user with elevated privileges. This issue affects Infra Monitoring: from 25.10.0 before 25.10.1, from 24.10.0 before 24.10.4, from 24.04.0 before 24.04.8.

CVE-2025-12793
(0 None)

EPSS: 0.01%

updated 2026-01-08T18:09:23.230000

1 posts

An uncontrolled DLL loading path vulnerability exists in AsusSoftwareManagerAgent. A local attacker may influence the application to load a DLL from an attacker-controlled location, potentially resulting in arbitrary code execution. Refer to the ' Security Update for MyASUS' section on the ASUS Security Advisory for more information.

AAKL@infosec.exchange at 2026-01-07T17:52:27.000Z ##

ASUS released a patch yesterday for CVE-2025-12793.

Security Update for MyASUS asus.com/security-advisory/#bu #ASUS #infosec

##

CVE-2020-36918
(4.3 MEDIUM)

EPSS: 0.02%

updated 2026-01-08T18:09:23.230000

1 posts

iDS6 DSSPro Digital Signage System 6.2 contains a cross-site request forgery vulnerability that allows attackers to perform administrative actions without request validation. Attackers can craft malicious web pages to trick logged-in administrators into adding unauthorized users by exploiting the lack of CSRF protections.

CVE-2020-36925
(9.8 CRITICAL)

EPSS: 0.52%

updated 2026-01-08T18:09:23.230000

1 posts

Arteco Web Client DVR/NVR contains a session hijacking vulnerability with insufficient session ID complexity that allows remote attackers to bypass authentication. Attackers can brute force session IDs within a specific numeric range to obtain valid sessions and access live camera streams without authorization.

CVE-2020-36923
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-01-08T18:09:23.230000

1 posts

Sony BRAVIA Digital Signage 1.7.8 contains an insecure direct object reference vulnerability that allows attackers to bypass authorization controls. Attackers can access hidden system resources like '/#/content-creation' by manipulating client-side access restrictions.

CVE-2020-36910
(8.8 HIGH)

EPSS: 0.33%

updated 2026-01-08T18:09:23.230000

1 posts

Cayin Signage Media Player 3.0 contains an authenticated remote command injection vulnerability in system.cgi and wizard_system.cgi pages. Attackers can exploit the 'NTP_Server_IP' parameter with default credentials to execute arbitrary shell commands as root.

CVE-2020-36912
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-01-08T18:09:23.230000

1 posts

Plexus anblick Digital Signage Management 3.1.13 contains an open redirect vulnerability in the 'PantallaLogin' script that allows attackers to manipulate the 'pagina' GET parameter. Attackers can craft malicious links that redirect users to arbitrary websites by exploiting improper input validation in the parameter.

CVE-2020-36915
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-08T18:09:23.230000

1 posts

Adtec Digital SignEdje Digital Signage Player v2.08.28 contains multiple hardcoded default credentials that allow unauthenticated remote access to web, telnet, and SSH interfaces. Attackers can exploit these credentials to gain root-level access and execute system commands across multiple Adtec Digital product versions.

CVE-2026-20026
(5.8 MEDIUM)

EPSS: 0.09%

updated 2026-01-08T18:08:54.147000

1 posts

Multiple Cisco products are affected by a vulnerability in the processing of DCE/RPC requests that could allow an unauthenticated, remote attacker to cause the Snort 3 Detection Engine to leak sensitive information or to restart, resulting in an interruption of packet inspection. This vulnerability is due to an error in buffer handling logic when processing DCE/RPC requests, which can resu

AAKL@infosec.exchange at 2026-01-07T16:25:43.000Z ##

Cisco has two new advisories:

CVE-2026-20026 and CVE-2026-20027: Multiple Cisco Products Snort 3 Distributed Computing Environment/Remote Procedure Call Vulnerabilities sec.cloudapps.cisco.com/securi

CVE-2026-20029: Cisco Identity Services Engine XML External Entity Processing Information Disclosure Vulnerability sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco #vulnerability #infosec

##

CVE-2025-6225
(0 None)

EPSS: 0.71%

updated 2026-01-08T18:08:54.147000

1 posts

Kieback&Peter Neutrino-GLT product is used for building management. It's web component "SM70 PHWEB" is vulnerable to shell command injection via login form. The injected commands would execute with low privileges. The vulnerability has been fixed in version 9.40.02

CVE-2025-15472
(7.2 HIGH)

EPSS: 0.12%

updated 2026-01-08T18:08:54.147000

1 posts

A flaw has been found in TRENDnet TEW-811DRU 1.0.2.0. This affects the function setDeviceURL  of the file uapply.cgi of the component httpd . This manipulation of the argument DeviceURL causes os command injection. The attack can be initiated remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2025-63611
(8.7 HIGH)

EPSS: 0.00%

updated 2026-01-08T18:08:18.457000

1 posts

Cross-Site Scripting in phpgurukul Hostel Management System v2.1 user-provided complaint fields (Explain the Complaint) submitted via /register-complaint.php are stored and rendered unescaped in the admin viewer (/admin/complaint-details.php?cid=<id>). When an administrator opens the complaint, injected HTML/JavaScript executes in the admin's browser.

thehackerwire@mastodon.social at 2026-01-08T22:24:44.000Z ##

🟠 CVE-2025-63611 - High (8.7)

Cross-Site Scripting in phpgurukul Hostel Management System v2.1 user-provided complaint fields (Explain the Complaint) submitted via /register-complaint.php are stored and rendered unescaped in the admin viewer (/admin/complaint-details.php?cid=)...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

CVE-2025-15224
(3.1 LOW)

EPSS: 0.03%

updated 2026-01-08T18:08:18.457000

2 posts

When doing SSH-based transfers using either SCP or SFTP, and asked to do public key authentication, curl would wrongly still ask and authenticate using a locally running SSH agent.

cR0w@infosec.exchange at 2026-01-08T15:22:45.000Z ##

ZOMG curl CVEs.

curl.se/docs/CVE-2025-14017.ht

curl.se/docs/CVE-2025-14524.ht

curl.se/docs/CVE-2025-14819.ht

curl.se/docs/CVE-2025-15079.ht

curl.se/docs/CVE-2025-15224.ht

curl.se/docs/CVE-2025-13034.ht

##

harrysintonen@infosec.exchange at 2026-01-07T07:51:27.000Z ##

#curl 8.18.0 has been released. This release fixes 2 medium and 4 low level vulnerabilities:
- CVE-2025-13034: No QUIC certificate pinning with GnuTLS curl.se/docs/CVE-2025-13034.ht
- CVE-2025-14017: broken TLS options for threaded LDAPS curl.se/docs/CVE-2025-14017.ht
- CVE-2025-14524: bearer token leak on cross-protocol redirect curl.se/docs/CVE-2025-14524.ht
- CVE-2025-14819: OpenSSL partial chain store policy bypass curl.se/docs/CVE-2025-14819.ht
- CVE-2025-15079: libssh global knownhost override curl.se/docs/CVE-2025-15079.ht
- CVE-2025-15224: libssh key passphrase bypass without agent set curl.se/docs/CVE-2025-15224.ht

I discovered the last 2 vulnerabilities.

Download curl 8.18.0 from curl.se/download.html

#vulnerabilityresearch #vulnerability #cybersecurity #infosec

##

CVE-2025-14819
(5.3 MEDIUM)

EPSS: 0.01%

updated 2026-01-08T18:08:18.457000

2 posts

When doing TLS related transfers with reused easy or multi handles and altering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally reuse a CA store cached in memory for which the partial chain option was reversed. Contrary to the user's wishes and expectations. This could make libcurl find and accept a trust chain that it otherwise would not.

cR0w@infosec.exchange at 2026-01-08T15:22:45.000Z ##

ZOMG curl CVEs.

curl.se/docs/CVE-2025-14017.ht

curl.se/docs/CVE-2025-14524.ht

curl.se/docs/CVE-2025-14819.ht

curl.se/docs/CVE-2025-15079.ht

curl.se/docs/CVE-2025-15224.ht

curl.se/docs/CVE-2025-13034.ht

##

harrysintonen@infosec.exchange at 2026-01-07T07:51:27.000Z ##

#curl 8.18.0 has been released. This release fixes 2 medium and 4 low level vulnerabilities:
- CVE-2025-13034: No QUIC certificate pinning with GnuTLS curl.se/docs/CVE-2025-13034.ht
- CVE-2025-14017: broken TLS options for threaded LDAPS curl.se/docs/CVE-2025-14017.ht
- CVE-2025-14524: bearer token leak on cross-protocol redirect curl.se/docs/CVE-2025-14524.ht
- CVE-2025-14819: OpenSSL partial chain store policy bypass curl.se/docs/CVE-2025-14819.ht
- CVE-2025-15079: libssh global knownhost override curl.se/docs/CVE-2025-15079.ht
- CVE-2025-15224: libssh key passphrase bypass without agent set curl.se/docs/CVE-2025-15224.ht

I discovered the last 2 vulnerabilities.

Download curl 8.18.0 from curl.se/download.html

#vulnerabilityresearch #vulnerability #cybersecurity #infosec

##

CVE-2025-69259
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-08T18:08:18.457000

1 posts

A message unchecked NULL return value vulnerability in Trend Micro Apex Central could allow a remote attacker to create a denial-of-service condition on affected installations. Please note: authentication is not required in order to exploit this vulnerability..

AAKL@infosec.exchange at 2026-01-07T16:58:30.000Z ##

Tenable Research Advisories have a new entry:

Critical: CVE-2025-69258; CVE-2025-69259 and CVE-2025-69260: Trend Micro Apex Central Multiple Vulnerabilities tenable.com/security/research/ @tenable #vulnerability #infosec

##

CVE-2025-15079
(5.3 MEDIUM)

EPSS: 0.02%

updated 2026-01-08T15:32:30

2 posts

When doing SSH-based transfers using either SCP or SFTP, and setting the known_hosts file, libcurl could still mistakenly accept connecting to hosts *not present* in the specified file if they were added as recognized in the libssh *global* known_hosts file.

cR0w@infosec.exchange at 2026-01-08T15:22:45.000Z ##

ZOMG curl CVEs.

curl.se/docs/CVE-2025-14017.ht

curl.se/docs/CVE-2025-14524.ht

curl.se/docs/CVE-2025-14819.ht

curl.se/docs/CVE-2025-15079.ht

curl.se/docs/CVE-2025-15224.ht

curl.se/docs/CVE-2025-13034.ht

##

harrysintonen@infosec.exchange at 2026-01-07T07:51:27.000Z ##

#curl 8.18.0 has been released. This release fixes 2 medium and 4 low level vulnerabilities:
- CVE-2025-13034: No QUIC certificate pinning with GnuTLS curl.se/docs/CVE-2025-13034.ht
- CVE-2025-14017: broken TLS options for threaded LDAPS curl.se/docs/CVE-2025-14017.ht
- CVE-2025-14524: bearer token leak on cross-protocol redirect curl.se/docs/CVE-2025-14524.ht
- CVE-2025-14819: OpenSSL partial chain store policy bypass curl.se/docs/CVE-2025-14819.ht
- CVE-2025-15079: libssh global knownhost override curl.se/docs/CVE-2025-15079.ht
- CVE-2025-15224: libssh key passphrase bypass without agent set curl.se/docs/CVE-2025-15224.ht

I discovered the last 2 vulnerabilities.

Download curl 8.18.0 from curl.se/download.html

#vulnerabilityresearch #vulnerability #cybersecurity #infosec

##

CVE-2025-13034
(5.9 MEDIUM)

EPSS: 0.01%

updated 2026-01-08T15:32:29

2 posts

When using `CURLOPT_PINNEDPUBLICKEY` option with libcurl or `--pinnedpubkey` with the curl tool,curl should check the public key of the server certificate to verify the peer. This check was skipped in a certain condition that would then make curl allow the connection without performing the proper check, thus not noticing a possible impostor. To skip this check, the connection had to be done with

cR0w@infosec.exchange at 2026-01-08T15:22:45.000Z ##

ZOMG curl CVEs.

curl.se/docs/CVE-2025-14017.ht

curl.se/docs/CVE-2025-14524.ht

curl.se/docs/CVE-2025-14819.ht

curl.se/docs/CVE-2025-15079.ht

curl.se/docs/CVE-2025-15224.ht

curl.se/docs/CVE-2025-13034.ht

##

harrysintonen@infosec.exchange at 2026-01-07T07:51:27.000Z ##

#curl 8.18.0 has been released. This release fixes 2 medium and 4 low level vulnerabilities:
- CVE-2025-13034: No QUIC certificate pinning with GnuTLS curl.se/docs/CVE-2025-13034.ht
- CVE-2025-14017: broken TLS options for threaded LDAPS curl.se/docs/CVE-2025-14017.ht
- CVE-2025-14524: bearer token leak on cross-protocol redirect curl.se/docs/CVE-2025-14524.ht
- CVE-2025-14819: OpenSSL partial chain store policy bypass curl.se/docs/CVE-2025-14819.ht
- CVE-2025-15079: libssh global knownhost override curl.se/docs/CVE-2025-15079.ht
- CVE-2025-15224: libssh key passphrase bypass without agent set curl.se/docs/CVE-2025-15224.ht

I discovered the last 2 vulnerabilities.

Download curl 8.18.0 from curl.se/download.html

#vulnerabilityresearch #vulnerability #cybersecurity #infosec

##

CVE-2025-69260
(7.5 HIGH)

EPSS: 0.00%

updated 2026-01-08T15:31:29

1 posts

A message out-of-bounds read vulnerability in Trend Micro Apex Central could allow a remote attacker to create a denial-of-service condition on affected installations. Please note: authentication is not required in order to exploit this vulnerability.

AAKL@infosec.exchange at 2026-01-07T16:58:30.000Z ##

Tenable Research Advisories have a new entry:

Critical: CVE-2025-69258; CVE-2025-69259 and CVE-2025-69260: Trend Micro Apex Central Multiple Vulnerabilities tenable.com/security/research/ @tenable #vulnerability #infosec

##

CVE-2025-69258
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-01-08T15:31:28

1 posts

A LoadLibraryEX vulnerability in Trend Micro Apex Central could allow an unauthenticated remote attacker to load an attacker-controlled DLL into a key executable, leading to execution of attacker-supplied code under the context of SYSTEM on affected installations.

AAKL@infosec.exchange at 2026-01-07T16:58:30.000Z ##

Tenable Research Advisories have a new entry:

Critical: CVE-2025-69258; CVE-2025-69259 and CVE-2025-69260: Trend Micro Apex Central Multiple Vulnerabilities tenable.com/security/research/ @tenable #vulnerability #infosec

##

CVE-2025-14017(CVSS UNKNOWN)

EPSS: 0.01%

updated 2026-01-08T12:30:38

2 posts

When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl, changing TLS options in one thread would inadvertently change them globally and therefore possibly also affect other concurrently setup transfers. Disabling certificate verification for a specific transfer could unintentionally disable the feature for other threads as well.

cR0w@infosec.exchange at 2026-01-08T15:22:45.000Z ##

ZOMG curl CVEs.

curl.se/docs/CVE-2025-14017.ht

curl.se/docs/CVE-2025-14524.ht

curl.se/docs/CVE-2025-14819.ht

curl.se/docs/CVE-2025-15079.ht

curl.se/docs/CVE-2025-15224.ht

curl.se/docs/CVE-2025-13034.ht

##

harrysintonen@infosec.exchange at 2026-01-07T07:51:27.000Z ##

#curl 8.18.0 has been released. This release fixes 2 medium and 4 low level vulnerabilities:
- CVE-2025-13034: No QUIC certificate pinning with GnuTLS curl.se/docs/CVE-2025-13034.ht
- CVE-2025-14017: broken TLS options for threaded LDAPS curl.se/docs/CVE-2025-14017.ht
- CVE-2025-14524: bearer token leak on cross-protocol redirect curl.se/docs/CVE-2025-14524.ht
- CVE-2025-14819: OpenSSL partial chain store policy bypass curl.se/docs/CVE-2025-14819.ht
- CVE-2025-15079: libssh global knownhost override curl.se/docs/CVE-2025-15079.ht
- CVE-2025-15224: libssh key passphrase bypass without agent set curl.se/docs/CVE-2025-15224.ht

I discovered the last 2 vulnerabilities.

Download curl 8.18.0 from curl.se/download.html

#vulnerabilityresearch #vulnerability #cybersecurity #infosec

##

CVE-2025-14524(CVSS UNKNOWN)

EPSS: 0.02%

updated 2026-01-08T12:30:37

2 posts

When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP, POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new target host.

cR0w@infosec.exchange at 2026-01-08T15:22:45.000Z ##

ZOMG curl CVEs.

curl.se/docs/CVE-2025-14017.ht

curl.se/docs/CVE-2025-14524.ht

curl.se/docs/CVE-2025-14819.ht

curl.se/docs/CVE-2025-15079.ht

curl.se/docs/CVE-2025-15224.ht

curl.se/docs/CVE-2025-13034.ht

##

harrysintonen@infosec.exchange at 2026-01-07T07:51:27.000Z ##

#curl 8.18.0 has been released. This release fixes 2 medium and 4 low level vulnerabilities:
- CVE-2025-13034: No QUIC certificate pinning with GnuTLS curl.se/docs/CVE-2025-13034.ht
- CVE-2025-14017: broken TLS options for threaded LDAPS curl.se/docs/CVE-2025-14017.ht
- CVE-2025-14524: bearer token leak on cross-protocol redirect curl.se/docs/CVE-2025-14524.ht
- CVE-2025-14819: OpenSSL partial chain store policy bypass curl.se/docs/CVE-2025-14819.ht
- CVE-2025-15079: libssh global knownhost override curl.se/docs/CVE-2025-15079.ht
- CVE-2025-15224: libssh key passphrase bypass without agent set curl.se/docs/CVE-2025-15224.ht

I discovered the last 2 vulnerabilities.

Download curl 8.18.0 from curl.se/download.html

#vulnerabilityresearch #vulnerability #cybersecurity #infosec

##

CVE-2025-37164
(10.0 CRITICAL)

EPSS: 84.25%

updated 2026-01-08T00:32:16

3 posts

A remote code execution issue exists in HPE OneView.

Nuclei template

3 repos

https://github.com/g0vguy/CVE-2025-37164-PoC

https://github.com/rxerium/CVE-2025-37164

https://github.com/LACHHAB-Anas/Exploit_CVE-2025-37164

DarkWebInformer@infosec.exchange at 2026-01-08T15:33:41.000Z ##

🚨 CISA adds two vulnerabilities to the KEV Catalog

darkwebinformer.com/cisa-kev-c

CVE-2009-0556: Microsoft Office PowerPoint Code Injection Vulnerability

CVSS: 9.3

CVE-2025-37164: Hewlett Packard Enterprise OneView Code Injection Vulnerability

CVSS: 10

##

AAKL@infosec.exchange at 2026-01-07T19:41:11.000Z ##

CISA has updated the KEV catalogue.

CVE-2025-37164: Hewlett Packard Enterprise OneView Code Injection Vulnerability cve.org/CVERecord?id=CVE-2025-

CVE-2009-0556: Microsoft Office PowerPoint Code Injection Vulnerability cve.org/CVERecord?id=CVE-2009- #infosec #CISA #Microsoft #HP

##

cisakevtracker@mastodon.social at 2026-01-07T19:01:14.000Z ##

CVE ID: CVE-2025-37164
Vendor: Hewlett Packard (HP)
Product: OneView
Date Added: 2026-01-07
Notes: support.hpe.com/hpesc/public/d ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-62224
(5.5 MEDIUM)

EPSS: 0.06%

updated 2026-01-08T00:31:21

2 posts

User interface (ui) misrepresentation of critical information in Microsoft Edge for Android allows an authorized attacker to perform spoofing over a network.

AAKL@infosec.exchange at 2026-01-08T17:31:11.000Z ##

Microsoft posted an update to its security guide yesterday:

Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability msrc.microsoft.com/update-guid #Microsoft #vulnerability #Android #Chromium #Edge

##

Android@activitypub.awakari.com at 2026-01-07T08:00:00.000Z ## CVE-2025-62224 Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability User interface (ui) misrepresentation of critical information in Microsoft Edge for Android allows an authorized at...

#CVE

Origin | Interest | Match ##

CVE-2017-20214
(7.5 HIGH)

EPSS: 0.03%

updated 2026-01-08T00:31:21

1 posts

FLIR Thermal Camera F/FC/PT/D firmware version 8.0.0.64 contains hard-coded SSH credentials that cannot be changed through normal camera operations. Attackers can leverage these persistent, unmodifiable credentials to gain unauthorized remote access to the thermal camera system.

CVE-2017-20213
(7.5 HIGH)

EPSS: 0.10%

updated 2026-01-08T00:31:21

1 posts

FLIR Thermal Camera F/FC/PT/D Stream firmware version 8.0.0.64 contains an unauthenticated vulnerability that allows remote attackers to access live camera streams without credentials. Attackers can exploit the vulnerability to view unauthorized thermal camera video feeds across multiple camera series without requiring any authentication.

CVE-2017-20212
(6.2 MEDIUM)

EPSS: 0.19%

updated 2026-01-08T00:31:21

1 posts

FLIR Thermal Camera F/FC/PT/D firmware version 8.0.0.64 contains an information disclosure vulnerability that allows unauthenticated attackers to read arbitrary files through unverified input parameters. Attackers can exploit the /var/www/data/controllers/api/xml.php readFile() function to access local system files without authentication.

CVE-2009-0556
(8.8 HIGH)

EPSS: 76.76%

updated 2026-01-07T21:32:42

5 posts

Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3, and PowerPoint in Microsoft Office 2004 for Mac, allows remote attackers to execute arbitrary code via a PowerPoint file with an OutlineTextRefAtom containing an an invalid index value that triggers memory corruption, as exploited in the wild in April 2009 by Exploit:Win32/Apptom.gen, aka "Memory Corruption Vulnerability."

DarkWebInformer@infosec.exchange at 2026-01-08T15:33:41.000Z ##

🚨 CISA adds two vulnerabilities to the KEV Catalog

darkwebinformer.com/cisa-kev-c

CVE-2009-0556: Microsoft Office PowerPoint Code Injection Vulnerability

CVSS: 9.3

CVE-2025-37164: Hewlett Packard Enterprise OneView Code Injection Vulnerability

CVSS: 10

##

hexmasteen@chaos.social at 2026-01-08T08:55:01.000Z ##

Yesterday (2026-01-07) CISA added a new entry to it's catalog of known exploited vulnerabilities. It's about CVE-2009-0556, a vulnerability in PowerPoint 2003 which is EOL since 2014.

#InfoSec is a lost cause if we keep using unmaintained software.

##

AAKL@infosec.exchange at 2026-01-07T19:41:11.000Z ##

CISA has updated the KEV catalogue.

CVE-2025-37164: Hewlett Packard Enterprise OneView Code Injection Vulnerability cve.org/CVERecord?id=CVE-2025-

CVE-2009-0556: Microsoft Office PowerPoint Code Injection Vulnerability cve.org/CVERecord?id=CVE-2009- #infosec #CISA #Microsoft #HP

##

j91321@infosec.exchange at 2026-01-07T19:26:42.000Z ##

Huh, CVE-2009-0556 added to KEV? :blobcateyes: cisa.gov/news-events/alerts/20

##

cisakevtracker@mastodon.social at 2026-01-07T19:00:58.000Z ##

CVE ID: CVE-2009-0556
Vendor: Microsoft
Product: Office
Date Added: 2026-01-07
Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-22184(CVSS UNKNOWN)

EPSS: 0.08%

updated 2026-01-07T21:32:07

2 posts

zlib versions up to and including 1.3.1.2 contain a global buffer overflow in the untgz utility. The TGZfname() function copies an attacker-supplied archive name from argv[] into a fixed-size 1024-byte static global buffer using an unbounded strcpy() call without length validation. Supplying an archive name longer than 1024 bytes results in an out-of-bounds write that can lead to memory corruption

veit@mastodon.social at 2026-01-08T08:32:49.000Z ##

There is a critical security vulnerability in zlib that allows code smuggling. Currently, there does not appear to be an update available.
seclists.org/fulldisclosure/20
nvd.nist.gov/vuln/detail/CVE-2
#Security #zlib #Vulnerability

##

cR0w@infosec.exchange at 2026-01-07T20:45:14.000Z ##

sev:CRIT BoF in zlib.

zlib versions up to and including 1.3.1.2 contain a global buffer overflow in the untgz utility. The TGZfname() function copies an attacker-supplied archive name from argv[] into a fixed-size 1024-byte static global buffer using an unbounded strcpy() call without length validation. Supplying an archive name longer than 1024 bytes results in an out-of-bounds write that can lead to memory corruption, denial of service, and potentially code execution depending on compiler, build flags, architecture, and memory layout. The overflow occurs prior to any archive parsing or validation.

cve.org/CVERecord?id=CVE-2026-

##

CVE-2026-20029
(4.9 MEDIUM)

EPSS: 0.03%

updated 2026-01-07T18:30:33

2 posts

A vulnerability in the licensing features of&nbsp;Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an authenticated, remote attacker with administrative privileges to gain access to sensitive information.&nbsp; This vulnerability is due to improper parsing of XML that is processed by the web-based management interface of Cisco ISE and Cisco ISE-P

jbhall56@infosec.exchange at 2026-01-08T13:20:22.000Z ##

The vulnerability, tracked as CVE-2026-20029 (CVSS score: 4.9), resides in the licensing feature and could allow an authenticated, remote attacker with administrative privileges to gain access to sensitive information. thehackernews.com/2026/01/cisc

##

AAKL@infosec.exchange at 2026-01-07T16:25:43.000Z ##

Cisco has two new advisories:

CVE-2026-20026 and CVE-2026-20027: Multiple Cisco Products Snort 3 Distributed Computing Environment/Remote Procedure Call Vulnerabilities sec.cloudapps.cisco.com/securi

CVE-2026-20029: Cisco Identity Services Engine XML External Entity Processing Information Disclosure Vulnerability sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco #vulnerability #infosec

##

CVE-2026-22536(CVSS UNKNOWN)

EPSS: 0.01%

updated 2026-01-07T18:30:33

1 posts

The absence of permissions control for the user XXX allows the current configuration in the sudoers file to escalate privileges without any restrictions

cR0w@infosec.exchange at 2026-01-07T18:40:05.000Z ##

WTF kind of CVE is this? It doesn't even say what product is vulnerable.

nvd.nist.gov/vuln/detail/CVE-2

All it says is:

The absence of permissions control for the user XXX allows the current configuration in the sudoers file to escalate privileges without any restrictions

Slow clap for S21sec.

##

CVE-2026-20027
(5.3 MEDIUM)

EPSS: 0.03%

updated 2026-01-07T18:30:33

1 posts

Multiple Cisco products are affected by a vulnerability in the processing of DCE/RPC requests that could allow an unauthenticated, remote attacker to cause the Snort 3 Detection Engine to leak sensitive information or to restart, resulting in an interruption of packet inspection. This vulnerability is due to an error in buffer handling logic when processing DCE/RPC requests, which can result in a

AAKL@infosec.exchange at 2026-01-07T16:25:43.000Z ##

Cisco has two new advisories:

CVE-2026-20026 and CVE-2026-20027: Multiple Cisco Products Snort 3 Distributed Computing Environment/Remote Procedure Call Vulnerabilities sec.cloudapps.cisco.com/securi

CVE-2026-20029: Cisco Identity Services Engine XML External Entity Processing Information Disclosure Vulnerability sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco #vulnerability #infosec

##

CVE-2026-22542(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-01-07T18:30:33

1 posts

An attacker with access to the system's internal network can cause a denial of service on the system by making two concurrent connections through the Telnet service.

cR0w@infosec.exchange at 2026-01-07T15:47:58.000Z ##

RE: infosec.exchange/@cR0w/1158545

This one is even better. 🤣

An attacker with access to the system's internal network can cause a denial of service on the system by making two concurrent connections through the Telnet service.

Good luck with your Nessus scans.

cve.org/CVERecord?id=CVE-2026-

##

CVE-2026-22541(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-01-07T18:30:33

1 posts

The massive sending of ICMP requests causes a denial of service on one of the boards from the EVCharger that allows control the EV interfaces. Since the board must be operating correctly for the charger to also function correctly.

cR0w@infosec.exchange at 2026-01-07T15:43:14.000Z ##

RE: infosec.exchange/@cR0w/1158543

Ooh, this one only requires L3 access to DoS.

The massive sending of ICMP requests causes a denial of service on one of the boards from the EVCharger that allows control the EV interfaces. Since the board must be operating correctly for the charger to also function correctly.

cve.org/CVERecord?id=CVE-2026-

Edit to correct the link.

##

CVE-2026-21635
(5.3 MEDIUM)

EPSS: 0.01%

updated 2026-01-07T18:30:25

1 posts

An Improper Access Control could allow a malicious actor in Wi-Fi range to the EV Station Lite (v1.5.2 and earlier) to use WiFi AutoLink feature on a device that was only adopted via Ethernet.

CVE-2025-69277
(4.5 MEDIUM)

EPSS: 0.02%

updated 2026-01-07T18:30:24

1 posts

libsodium before ad3004e, in atypical use cases involving certain custom cryptography or untrusted data to crypto_core_ed25519_is_valid_point, mishandles checks for whether an elliptic curve point is valid because it sometimes allows points that aren't in the main cryptographic group. This advisoory lists packages in the GitHub Advisory Database's [supported ecosystems](https://github.com/github/

Ubuntu@activitypub.awakari.com at 2026-01-08T16:59:39.000Z ## Ubuntu 22.04 LTS: Critical Info Exposure in libsodium CVE-2025-69277 Sodium could be made to expose sensitive information.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-13947
(7.4 HIGH)

EPSS: 0.05%

updated 2026-01-07T16:15:48.950000

1 posts

A flaw was found in WebKitGTK. This vulnerability allows remote, user-assisted information disclosure that can reveal any file the user is permitted to read via abusing the file drag-and-drop mechanism where WebKitGTK does not verify that drag operations originate from outside the browser.

Ubuntu@activitypub.awakari.com at 2026-01-05T14:23:36.000Z ## Ubuntu 25.10: Critical WebKitGTK Security Updates USN-7941-1 CVE-2025-13947 Several security issues were fixed in WebKitGTK.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2026-0628
(8.8 HIGH)

EPSS: 0.02%

updated 2026-01-07T15:31:20

2 posts

Insufficient policy enforcement in WebView tag in Google Chrome prior to 143.0.7499.192 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: High)

1 repos

https://github.com/fevar54/CVE-2026-0628-POC

beyondmachines1@infosec.exchange at 2026-01-08T12:01:43.000Z ##

Google patches high-risk WebView flaw in first 2026 Chrome update

Google released Chrome 143.0.7499.192/193 to fix a high-risk vulnerability (CVE-2026-0628) in the WebView component that could allow malicious extensions to inject scripts into privileged pages.

**If you are using Google Chrome or other Chromium-based browsers (Edge, Brave, Vivaldi, Opera...) patch your browser ASAP. No critical flaws in this update, but don't wait for the flaw to become actively exploited. Update now, it's trivial and all your tabs reopen after the update.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

technadu@infosec.exchange at 2026-01-07T11:42:45.000Z ##

Google has patched a high-severity Chrome WebView vulnerability tracked as CVE-2026-0628, caused by insufficient policy enforcement in the tag component.

The flaw could allow attackers to bypass security controls in applications embedding WebView, increasing risk across desktop and mobile ecosystems.

Full Article :
technadu.com/google-patches-hi

#ChromeSecurity #WebView #CVE2026 #Infosec #ApplicationSecurity

##

CVE-2025-0980
(6.4 MEDIUM)

EPSS: 0.01%

updated 2026-01-07T15:31:20

1 posts

Nokia SR Linux is vulnerable to an authentication vulnerability allowing unauthorized access to the JSON-RPC service. When exploited, an invalid validation allows JSON RPC access without providing valid authentication credentials.

cR0w@infosec.exchange at 2026-01-07T14:17:58.000Z ##

No PoC but this one could be interesting to watch.

nokia.com/we-are-nokia/securit

Nokia SR Linux is vulnerable to an authentication vulnerability allowing unauthorized access to the JSON-RPC service. When exploited, an invalid validation allows JSON RPC access without providing valid authentication credentials.

##

CVE-2026-22540(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-01-07T15:30:25

1 posts

The massive sending of ARP requests causes a denial of service on one board of the charger that allows control of the EV interfaces. Since the board must be operating correctly for the charger to also function correctly.

cR0w@infosec.exchange at 2026-01-07T14:33:11.000Z ##

DoS via ARP flood. In 2026. And this is the kind of shit people are putting on the Internet and connecting to home and industrial networks.

The massive sending of ARP requests causes a denial of service on one board of the charger that allows control of the EV interfaces. Since the board must be operating correctly for the charger to also function correctly, the denial of service (DoS) results in a restart of the charger functionalities.

cve.org/CVERecord?id=CVE-2026-

##

CVE-2025-38352
(7.4 HIGH)

EPSS: 0.19%

updated 2026-01-07T15:30:14

5 posts

In the Linux kernel, the following vulnerability has been resolved: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand(). If a concurrent posix_cpu_timer_del() runs at that

3 repos

https://github.com/farazsth98/poc-CVE-2025-38352

https://github.com/Crime2/poc-CVE-2025-38352

https://github.com/farazsth98/chronomaly

Android@activitypub.awakari.com at 2026-01-07T14:40:40.000Z ## Chronomaly — PoC Exploit Released for Android/Linux Kernel Vulnerability CVE-2025-38352 https://cybersecuritynews.com/chronomaly-exploit/ Commentaires : voir le flux Atom ouvrir dans le navigateur

#kernel #noyau_linux #android #faille #programmation_concurrente #exploit

Origin | Interest | Match ##

Android@activitypub.awakari.com at 2026-01-07T14:40:40.000Z ## Chronomaly — PoC Exploit Released for Android/Linux Kernel Vulnerability CVE-2025-38352 https://cybersecuritynews.com/chronomaly-exploit/ Commentaires : voir le flux Atom ouvrir dans le navigateur

#exploit #kernel #noyau_linux #android #faille #programmation_concurrente

Origin | Interest | Match ##

linux@activitypub.awakari.com at 2026-01-07T14:40:40.000Z ## Chronomaly — PoC Exploit Released for Android/Linux Kernel Vulnerability CVE-2025-38352 https://cybersecuritynews.com/chronomaly-exploit/ Commentaires : voir le flux Atom ouvrir dans le navigateur

#android #faille #programmation_concurrente #exploit #kernel #noyau_linux

Origin | Interest | Match ##

Android@activitypub.awakari.com at 2026-01-07T14:09:29.000Z ## PoC Exploit Released for Android/Linux Kernel Vulnerability CVE-2025-38352 A proof-of-concept (PoC) exploit for CVE-2025-38352, a critical race condition vulnerability in the Linux kernel, has been...

#Cyber #Security #News #Vulnerability #News #cyber #security #cyber #security #news #vulnerability

Origin | Interest | Match ##

Android@activitypub.awakari.com at 2026-01-07T13:47:51.000Z ## PoC Exploit Released for Android and Linux Kernel Vulnerability CVE-2025-38352 A fully functional exploit has been released for CVE-2025-38352, a critical use-after-free vulnerability in the Linux ...

#Cyber #Security #News #Cybersecurity #Linux #Vulnerabilities #Cyber #Security #Cyber #security #news

Origin | Interest | Match ##

CVE-2025-68926
(9.8 CRITICAL)

EPSS: 3.14%

updated 2026-01-07T15:22:22

4 posts

## Vulnerability Overview ### Description RustFS implements gRPC authentication using a hardcoded static token `"rustfs rpc"` that is: 1. **Publicly exposed** in the source code repository 2. **Hardcoded** on both client and server sides 3. **Non-configurable** with no mechanism for token rotation 4. **Universally valid** across all RustFS deployments Any attacker with network access to the gRP

Nuclei template

2 repos

https://github.com/Chocapikk/CVE-2025-68926

https://github.com/Arcueld/CVE-2025-68926

hackmag@infosec.exchange at 2026-01-06T10:00:32.000Z ##

⚪ A pre-defined access token was found in the open-source project RustFS

🗨️ In the source code of the open-source project RustFS (which develops an S3-compatible distributed object storage solution), experts identified a critical vulnerability (CVE-2025-68926). The issue arises due to the presence of a hardcoded access token in the code, allowing connection to the network s…

🔗 hackmag.com/news/a-pre-defined

#news

##

levieva@mastodon.social at 2026-01-05T20:34:27.000Z ##

В исходном коде открытого проекта RustFS выявлена критическая уязвимость (CVE-2025-68926) 🚨. Проблема вызвана наличием жёстко прошитого в коде токена доступа, позволяющего подключиться к сетевому сервису по протоколу gRPC, указав в заголовке authorization значение rustfs rpc 🔑. Токен присутствовал в коде сервера и клиента 💻. Проблеме присвоен критический уровень опасности (9.8 из 10) ☢️.

github.com/rustfs/rustfs/secur

#RustFS #CVE202568926 #InfoSec #CyberSecurity #HardcodedSecrets #gRPC #OpenSource

##

privateger@plasmatrap.com at 2026-01-05T12:05:23.842Z ##

CVE-2025-68926, or GHSA-h956-rh7x-ppgj

##

zrail@hachyderm.io at 2026-01-05T03:13:53.000Z ##

RustFS, a distributed object storage system written by LLMs, but in rust so it's fine everything is fine, hardcoded a fully privileged API token, apparently from Alpha.13 through Alpha.77.

If you're running any of those versions, probably you want to upgrade asap.

nvd.nist.gov/vuln/detail/CVE-2

#rustfs #selfhosted #selfhosting #homelab

##

CVE-2025-14631(CVSS UNKNOWN)

EPSS: 0.02%

updated 2026-01-07T12:31:27

1 posts

A NULL Pointer Dereference vulnerability in TP-Link Archer BE400 V1(802.11 modules) allows  an adjacent attacker to cause a denial-of-service (DoS) by triggering a device reboot. This issue affects Archer BE400: xi 1.1.0 Build 20250710 rel.14914.

CVE-2025-15471
(9.8 CRITICAL)

EPSS: 0.15%

updated 2026-01-07T03:30:32

3 posts

A vulnerability was detected in TRENDnet TEW-713RE 1.02. The impacted element is an unknown function of the file /goformX/formFSrvX. The manipulation of the argument SZCMD results in os command injection. It is possible to launch the attack remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

beyondmachines1@infosec.exchange at 2026-01-08T10:01:43.000Z ##

Unpatched command Injection flaw reported in Trendnet TEW-713RE extenders

Trendnet TEW-713RE range extenders are reportd to have a critical command injection flaw (CVE-2025-15471) that allows unauthenticated attackers to gain root access. The flaw is not patched and the company has not responded to disclosure attempts.

**If you are using TEW-713RE range extenders, make sure they are isolated from the internet and accessible from trusted networks only. Since Trendnet has not released a fix, plan a replacement with supported hardware.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

AAKL@infosec.exchange at 2026-01-07T17:15:33.000Z ##

This was updated yesterday.

EUVD: Critical TRENDnet vulnerability, also known as CVE-2025-15471 euvd.enisa.europa.eu/vulnerabi

New:

Critical: Blood Bank Management System 1.0 vulnerability CVE-2025-63525 euvd.enisa.europa.eu/vulnerabi #infosec

##

cR0w@infosec.exchange at 2026-01-06T21:54:37.000Z ##

TRENDnet

cve.org/CVERecord?id=CVE-2025-

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2020-36913
(5.3 MEDIUM)

EPSS: 0.09%

updated 2026-01-06T21:31:40

1 posts

All-Dynamics Software enlogic:show 2.0.2 contains a session fixation vulnerability that allows attackers to set a predefined PHP session identifier during the login process. Attackers can forge HTTP GET requests to welcome.php with a manipulated session token to bypass authentication and potentially execute cross-site request forgery attacks.

CVE-2026-0641
(6.3 MEDIUM)

EPSS: 2.54%

updated 2026-01-06T21:30:45

1 posts

A security vulnerability has been detected in TOTOLINK WA300 5.2cu.7112_B20190227. This vulnerability affects the function sub_401510 of the file cstecgi.cgi. The manipulation of the argument UPLOAD_FILENAME leads to command injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.

CVE-2025-63525
(9.6 CRITICAL)

EPSS: 0.03%

updated 2026-01-06T21:15:43.240000

1 posts

An issue was discovered in Blood Bank Management System 1.0 allowing authenticated attackers to perform actions with escalated privileges via crafted request to delete.php.

AAKL@infosec.exchange at 2026-01-07T17:15:33.000Z ##

This was updated yesterday.

EUVD: Critical TRENDnet vulnerability, also known as CVE-2025-15471 euvd.enisa.europa.eu/vulnerabi

New:

Critical: Blood Bank Management System 1.0 vulnerability CVE-2025-63525 euvd.enisa.europa.eu/vulnerabi #infosec

##

CVE-2026-0640
(8.8 HIGH)

EPSS: 0.09%

updated 2026-01-06T18:31:44

1 posts

A weakness has been identified in Tenda AC23 16.03.07.52. This affects the function sscanf of the file /goform/PowerSaveSet. Executing a manipulation of the argument Time can lead to buffer overflow. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.

CVE-2025-14942(CVSS UNKNOWN)

EPSS: 0.07%

updated 2026-01-06T18:31:43

1 posts

wolfSSH’s key exchange state machine can be manipulated to leak the client’s password in the clear, trick the client to send a bogus signature, or trick the client into skipping user authentication. This affects client applications with wolfSSH version 1.4.21 and earlier. Users of wolfSSH must update or apply the fix patch and it’s recommended to update credentials used. This fix is also recommend

cR0w@infosec.exchange at 2026-01-06T17:30:20.000Z ##

Oops.

wolfSSH’s key exchange state machine can be manipulated to leak the client’s password in the clear, trick the client to send a bogus signature, or trick the client into skipping user authentication. This affects client applications with wolfSSH version 1.4.21 and earlier. Users of wolfSSH must update or apply the fix patch and it’s recommended to update credentials used. This fix is also recommended for wolfSSH server applications. While there aren’t any specific attacks on server applications, the same defect is present. Thanks to Aina Toky Rasoamanana of Valeo and Olivier Levillain of Telecom SudParis for the report.

sev:CRIT 9.4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/U:Red

cve.org/CVERecord?id=CVE-2025-

##

CVE-2025-39477
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-01-06T18:31:43

1 posts

Missing Authorization vulnerability in Sfwebservice InWave Jobs allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects InWave Jobs: from n/a through 3.5.8.

thehackerwire@mastodon.social at 2026-01-06T17:22:52.000Z ##

🔴 CVE-2025-39477 - Critical (9.8)

Missing Authorization vulnerability in Sfwebservice InWave Jobs allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects InWave Jobs: from n/a through 3.5.8.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

CVE-2020-36924
(7.5 HIGH)

EPSS: 0.06%

updated 2026-01-06T18:31:43

1 posts

Sony BRAVIA Digital Signage 1.7.8 contains a remote file inclusion vulnerability that allows attackers to inject arbitrary client-side scripts through the content material URL parameter. Attackers can exploit this vulnerability to hijack user sessions, execute cross-site scripting code, and modify display content by manipulating the input material type.

CVE-2025-60262
(9.8 CRITICAL)

EPSS: 0.11%

updated 2026-01-06T18:31:43

1 posts

An issue in H3C M102G HM1A0V200R010 wireless controller and BA1500L SWBA1A0V100R006 wireless access point, there is a misconfiguration vulnerability about vsftpd. Through this vulnerability, all files uploaded anonymously via the FTP protocol is automatically owned by the root user and remote attackers could gain root-level control over the devices.

CVE-2020-36920
(8.8 HIGH)

EPSS: 0.05%

updated 2026-01-06T18:31:42

1 posts

iDS6 DSSPro Digital Signage System 6.2 contains an improper access control vulnerability that allows authenticated users to elevate privileges through console JavaScript functions. Attackers can create users, modify roles and permissions, and potentially achieve full application takeover by exploiting insecure direct object references.

CVE-2020-36916
(8.8 HIGH)

EPSS: 0.02%

updated 2026-01-06T18:31:42

1 posts

TDM Digital Signage PC Player 4.1.0.4 contains an elevation of privileges vulnerability that allows authenticated users to modify executable files. Attackers can leverage the 'Modify' permissions for authenticated users to replace executable files with malicious binaries and gain elevated system access.

CVE-2020-36906
(4.3 MEDIUM)

EPSS: 0.02%

updated 2026-01-06T18:31:42

1 posts

P5 FNIP-8x16A FNIP-4xSH 1.0.20 contains a cross-site request forgery vulnerability that allows attackers to perform administrative actions without user consent. Attackers can craft malicious web pages to add new admin users, change passwords, and modify system configurations by tricking authenticated users into loading a specially crafted form.

CVE-2020-36917
(7.5 HIGH)

EPSS: 0.06%

updated 2026-01-06T18:31:42

1 posts

iDS6 DSSPro Digital Signage System 6.2 contains a sensitive information disclosure vulnerability that allows remote attackers to intercept authentication credentials through cleartext cookie transmission. Attackers can exploit the autoSave feature to capture user passwords during man-in-the-middle attacks on HTTP communications.

CVE-2020-36909
(6.5 MEDIUM)

EPSS: 0.03%

updated 2026-01-06T18:31:42

1 posts

SnapGear Management Console SG560 3.1.5 contains a file manipulation vulnerability that allows authenticated users to read, write, and delete files using the edit_config_files CGI script. Attackers can manipulate POST request parameters in /cgi-bin/cgix/edit_config_files to access and modify files outside the intended /etc/config/ directory.

CVE-2020-36921
(7.5 HIGH)

EPSS: 0.19%

updated 2026-01-06T18:31:42

1 posts

RED-V Super Digital Signage System 5.1.1 contains an information disclosure vulnerability that allows unauthenticated attackers to access sensitive webserver log files. Attackers can visit multiple endpoints to retrieve system resources and debug log information without authentication.

CVE-2020-36922
(7.5 HIGH)

EPSS: 0.08%

updated 2026-01-06T18:31:42

1 posts

Sony BRAVIA Digital Signage 1.7.8 contains an information disclosure vulnerability that allows unauthenticated attackers to access sensitive system details through API endpoints. Attackers can retrieve network interface information, server configurations, and system metadata by sending requests to the exposed system API.

CVE-2020-36907
(7.5 HIGH)

EPSS: 0.38%

updated 2026-01-06T18:31:42

1 posts

Aerohive HiveOS contains a denial of service vulnerability in the NetConfig UI that allows unauthenticated attackers to render the web interface unusable. Attackers can send a crafted HTTP request to the action.php5 script with specific parameters to trigger a 5-minute service disruption.

CVE-2020-36914
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-06T18:31:35

1 posts

QiHang Media Web Digital Signage 3.0.9 contains a sensitive information disclosure vulnerability that allows remote attackers to intercept user authentication credentials through cleartext cookie transmission. Attackers can perform man-in-the-middle attacks to capture and potentially misuse stored authentication credentials transmitted in an insecure manner.

CVE-2020-36908
(5.3 MEDIUM)

EPSS: 0.02%

updated 2026-01-06T18:31:34

1 posts

SnapGear Management Console SG560 version 3.1.5 contains a cross-site request forgery vulnerability that allows attackers to perform administrative actions without user consent. Attackers can craft a malicious web page that automatically submits a form to create a new super user account with full administrative privileges when a logged-in user visits the page.

CVE-2020-36905
(7.5 HIGH)

EPSS: 0.05%

updated 2026-01-06T18:31:33

1 posts

FIBARO System Home Center 5.021 contains a remote file inclusion vulnerability in the undocumented proxy API that allows attackers to include arbitrary client-side scripts. Attackers can exploit the 'url' GET parameter to inject malicious JavaScript and potentially hijack user sessions or manipulate page content.

CVE-2026-21877
(10.0 CRITICAL)

EPSS: 0.05%

updated 2026-01-06T17:48:25

5 posts

### Impact n8n is affected by an authenticated Remote Code Execution (RCE) vulnerability. Under certain conditions, an authenticated user may be able to cause untrusted code to be executed by the n8n service. This could result in full compromise of the affected instance. Both self-hosted and n8n Cloud instances are impacted. ### Patches The issue has been resolved in n8n version 1.121.3. Users

1 repos

https://github.com/Ashwesker/Ashwesker-CVE-2026-21877

Hackread@mstdn.social at 2026-01-08T20:09:35.000Z ##

n8n users need to update immediately after a CVSS 10.0 (CVE-2026-21877) authenticated remote code execution flaw was found that could let an attacker take over the system. Update to version 1.121.3 or higher and restrict privileges now.

Read: hackread.com/n8n-users-patch-f

#n8n #Cybersecurity #Vulnerability #Infosec

##

Hackread@mstdn.social at 2026-01-08T20:09:35.000Z ##

n8n users need to update immediately after a CVSS 10.0 (CVE-2026-21877) authenticated remote code execution flaw was found that could let an attacker take over the system. Update to version 1.121.3 or higher and restrict privileges now.

Read: hackread.com/n8n-users-patch-f

#n8n #Cybersecurity #Vulnerability #Infosec

##

decio@infosec.exchange at 2026-01-08T11:29:24.000Z ##

"Une seconde faille critique RCE affecte n8n – CVE-2026-21877 : comment se protéger ?"
👇
it-connect.fr/n8n-cve-2026-218

Pas mal d'instances pas à jour et exposées aussi sur les réseaux EU et CH selon Onyphe
👇
bsky.app/profile/onyphe.io/pos

Infos
👇
cve.circl.lu/vuln/CVE-2026-218

💬
⬇️
infosec.pub/post/40204482

#CyberVeille #n8n

##

benzogaga33@mamot.fr at 2026-01-07T16:40:02.000Z ##

Une seconde faille critique RCE affecte n8n – CVE-2026-21877 : comment se protéger ? it-connect.fr/n8n-cve-2026-218 #ActuCybersécurité #Cybersécurité #Vulnérabilité #n8n

##

cR0w@infosec.exchange at 2026-01-06T17:54:53.000Z ##

Another perfect 10 in n8n? LMFAO. 🥳

github.com/n8n-io/n8n/security

Edit to add the link to the CVE. It's not published at this time though.

cve.org/CVERecord?id=CVE-2026-

##

CVE-2025-54957
(5.4 MEDIUM)

EPSS: 0.05%

updated 2026-01-06T17:15:44.213000

3 posts

An issue was discovered in Dolby UDC 4.5 through 4.13. A crash of the DD+ decoder process can occur when a malformed DD+ bitstream is processed. When Evolution data is processed by evo_priv.c from the DD+ bitstream, the decoder writes that data into a buffer. The length calculation for a write can overflow due to an integer wraparound. This can lead to the allocated buffer being too small, and the

1 repos

https://github.com/AlphabugX/CVE-2025-54957

jbhall56@infosec.exchange at 2026-01-08T13:10:58.000Z ##

The flaw is tracked as CVE-2025-54957 and its existence came to light in October 2025 after it was discovered by Google researchers. securityweek.com/critical-dolb

##

Android@activitypub.awakari.com at 2026-01-06T18:54:22.000Z ## Google fixes critical Dolby Decoder bug in Android January update Android’s January 2026 update fixes CVE-2025-54957, a critical Dolby audio decoder flaw discovered by Google researchers in Octob...

#Breaking #News #Mobile #Security #Android #CVE-2025-54957 #Google #Hacking #hacking #news #information

Origin | Interest | Match ##

Android@activitypub.awakari.com at 2026-01-06T13:50:36.000Z ## Critical Dolby Vulnerability Patched in Android The flaw is tracked as CVE-2025-54957 and its existence came to light in October 2025 after it was discovered by Google researchers. The post Critica...

#Vulnerabilities #Android #Dolby #vulnerability

Origin | Interest | Match ##

CVE-2025-68428(CVSS UNKNOWN)

EPSS: 0.06%

updated 2026-01-06T15:51:59

1 posts

### Impact User control of the first argument of the loadFile method in the node.js build allows local file inclusion/path traversal. If given the possibility to pass unsanitized paths to the loadFile method, a user can retrieve file contents of arbitrary files in the local file system the node process is running in. The file contents are included verbatim in the generated PDFs. Other affected m

beyondmachines1@infosec.exchange at 2026-01-07T09:01:17.000Z ##

Critical path traversal flaw reported in jsPDF library

jsPDF version 4.0.0 patches a critical path traversal vulnerability (CVE-2025-68428) that allows attackers to extract sensitive server files by embedding them into generated PDFs. The flaw affects Node.js environments where user-supplied paths are passed to methods like loadFile or addImage.

**If you are using jsPDF, review this advisory and your use case. Ideally, update to version 4.0.0 and use the Node.js --permission flag to limit which files the process can read. Also, as a normal best practice, always sanitize and validate user input before passing it to libraries.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-48769
(8.1 HIGH)

EPSS: 0.06%

updated 2026-01-06T14:35:26.893000

1 posts

Use After Free vulnerability was discovered in fs/vfs/fs_rename code of the Apache NuttX RTOS, that due recursive implementation and single buffer use by two different pointer variables allowed arbitrary user provided size buffer reallocation and write to the previously freed heap chunk, that in specific cases could cause unintended virtual filesystem rename/move operation results. This issue aff

beyondmachines1@infosec.exchange at 2026-01-03T12:01:46.000Z ##

Apache NuttX RTOS memory flaw exposes IoT devices to remote crashes

Apache NuttX RTOS contains a critical Use After Free vulnerability (CVE-2025-48769) that allows remote attackers to crash embedded devices or manipulate files via network services like FTP.

**If you are using devices with NuttX, make sure all devices are isolated from the internet and accessible from trusted networks only. Update any hardware running Apache NuttX to version 12.11.0, especially if the device uses network file services with write permissions. In the meantime, disable file upload/sharing where possible.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-21634
(6.5 MEDIUM)

EPSS: 0.02%

updated 2026-01-05T21:31:38

1 posts

A malicious actor with access to the adjacent network could overflow the UniFi Protect Application (Version 6.1.79 and earlier) discovery protocol causing it to restart. Affected Products: UniFi Protect Application (Version 6.1.79 and earlier). Mitigation: Update your UniFi Protect Application to Version 6.2.72 or later.

CVE-2026-21633
(8.8 HIGH)

EPSS: 0.02%

updated 2026-01-05T21:31:37

2 posts

A malicious actor with access to the adjacent network could obtain unauthorized access to a UniFi Protect Camera by exploiting a discovery protocol vulnerability in the Unifi Protect Application (Version 6.1.79 and earlier). Affected Products: UniFi Protect Application (Version 6.1.79 and earlier). Mitigation: Update your UniFi Protect Application to Version 6.2.72 or later.

beyondmachines1@infosec.exchange at 2026-01-07T08:01:17.000Z ##

Ubiquiti patches security flaws in UniFi Protect camera software

Ubiquiti patched two vulnerabilities in the UniFi Protect Application, including CVE-2026-21633 which allows attackers on the local network to access camera feeds without authorization.

**If you are using UniFi Protect Application, plan a quick update. And as usual, make sure all cameras and camera controllers are isolated from the internet and accessible from trusted networks only. Use VLANs to separate your security cameras from guest or general-purpose networks.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

cR0w@infosec.exchange at 2026-01-05T15:22:30.000Z ##

Go hack more Ubiquiti shit.

community.ui.com/releases/Secu

cve.org/CVERecord?id=CVE-2026-

cve.org/CVERecord?id=CVE-2026-

##

CVE-2025-68668
(9.9 CRITICAL)

EPSS: 0.10%

updated 2026-01-05T19:06:07

2 posts

### Impact A sandbox bypass vulnerability exists in the Python Code Node that uses Pyodide. An authenticated user with permission to create or modify workflows can exploit this vulnerability to execute arbitrary commands on the host system running n8n, using the same privileges as the n8n process. ### Patches In n8n version 1.111.0, a task-runner-based native Python implementation was introduced

beyondmachines1@infosec.exchange at 2026-01-06T19:01:17.000Z ##

Critical sandbox bypass reported in n8n automation platform

n8n patched a critical sandbox bypass vulnerability (CVE-2025-68668) that allows authenticated users to run arbitrary system commands on the host server.

**If you are using n8n, make sure it's isolated from the internet and accessible from trusted users only. Then patch n8n to version 2.0.0 ASAP. Until you can patch, either disable the Python or the entire Code Node.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

technadu@infosec.exchange at 2026-01-06T14:06:22.000Z ##

Critical n8n vulnerability (CVE-2025-68668, CVSS 9.9) enables authenticated arbitrary command execution via the Code Node.

Patch released: mitigations include disabling the node or using the task-runner Python sandbox.

technadu.com/critical-new-vuln

Are automation platforms getting enough security scrutiny?

#InfoSec #CVE #n8n #DevSecOps #AutomationSecurity

##

CVE-2025-14346
(9.8 CRITICAL)

EPSS: 0.09%

updated 2026-01-05T18:30:29

4 posts

WHILL Model C2 Electric Wheelchairs and Model F Power Chairs do not enforce authentication for Bluetooth connections. An attacker within range can pair with the device and issue movement commands, override speed restrictions, and manipulate configuration profiles without any credentials or user interaction.

encthenet@flyovercountry.social at 2026-01-05T22:32:06.000Z ##

@mwl

This seems perfect fodder for a plot device.

> cve.org/CVERecord?id=CVE-2025-

(Edit: original post is gone, but this is the CVE mentioned in it.)

##

thehackerwire@mastodon.social at 2026-01-05T16:51:46.000Z ##

🔴 CVE-2025-14346 - Critical (9.8)

WHILL Model C2 Electric Wheelchairs and Model F Power Chairs do not enforce authentication for Bluetooth connections. An attacker within range can pair with the device and issue movement commands, override speed restrictions, and manipulate config...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

adulau@infosec.exchange at 2026-01-05T16:21:44.000Z ##

"WHILL Model C2 Electric Wheelchairs and Model F Power Chairs do not enforce authentication for Bluetooth connections. An attacker within range can pair with the device and issue movement commands, override speed restrictions, and manipulate configuration profiles without any credentials or user interaction."

No comments...

🔗 vulnerability.circl.lu/vuln/cv

#wheelchair #cybersecurity #vulnerability #hybridthreats

##

beyondmachines1@infosec.exchange at 2025-12-30T20:01:39.000Z ##

WHILL electric wheelchairs vulnerable to remote bluetooth hijacking

WHILL Inc. reported a critical vulnerability (CVE-2025-14346) in its electric wheelchairs that allows attackers within Bluetooth range to take control of the device. The flaw enables unauthorized movement and configuration changes because the system does not require authentication for pairing.

**If you are using WHILL wheelchairs, they may be vulnerable to hijacking. Review the advisory and contact WHILL Inc. to confirm your wheelchair has the December 29, 2025 firmware update installed.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-12514
(7.2 HIGH)

EPSS: 0.02%

updated 2026-01-05T12:31:32

1 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Centreon Infra Monitoring - Open-tickets (Notification rules configuration parameters, Open tickets modules) allows SQL Injection to user with elevated privileges.This issue affects Infra Monitoring - Open-tickets: from 24.10.0 before 24.10.5, from 24.04.0 before 24.04.5, from 23.10.0 before 23.

CVE-2025-54890
(6.8 MEDIUM)

EPSS: 0.02%

updated 2026-01-05T12:31:32

1 posts

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Centreon Infra Monitoring (Hostgroup configuration page) allows Stored XSS by users with elevated privileges.This issue affects Infra Monitoring: from 24.10.0 before 24.10.15, from 24.04.0 before 24.04.19, from 23.10.0 before 23.10.29.

CVE-2025-8460
(6.8 MEDIUM)

EPSS: 0.02%

updated 2026-01-05T10:15:58.160000

1 posts

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Centreon Infra Monitoring (Notification rules, Open tickets module) allows Stored XSS by users with elevated privileges.This issue affects Infra Monitoring: from 24.10.0 before 24.10.5, from 24.04.0 before 24.04.5, from 23.10.0 before 23.10.4.

CVE-2025-15215
(8.8 HIGH)

EPSS: 0.05%

updated 2026-01-02T21:28:56.470000

1 posts

A vulnerability was determined in Tenda AC10U 15.03.06.48/15.03.06.49. This affects the function formSetPPTPUserList of the file /goform/setPptpUserList of the component HTTP POST Request Handler. This manipulation of the argument list causes buffer overflow. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.

CVE-2025-66848
(9.8 CRITICAL)

EPSS: 0.40%

updated 2026-01-02T18:31:27

1 posts

JD Cloud NAS routers AX1800 (4.3.1.r4308 and earlier), AX3000 (4.3.1.r4318 and earlier), AX6600 (4.5.1.r4533 and earlier), BE6500 (4.4.1.r4308 and earlier), ER1 (4.5.1.r4518 and earlier), and ER2 (4.5.1.r4518 and earlier) contain an unauthorized remote command execution vulnerability.

CVE-2025-47411(CVSS UNKNOWN)

EPSS: 0.07%

updated 2026-01-02T16:29:42

1 posts

A user with a legitimate non-administrator account can exploit a vulnerability in the user ID creation mechanism in Apache StreamPipes that allows them to swap the username of an existing user with that of an administrator.  This vulnerability allows an attacker to gain administrative control over the application by manipulating JWT tokens, which can lead to data tampering, unauthorized access an

beyondmachines1@infosec.exchange at 2026-01-02T08:01:32.000Z ##

Critical privilege escalation flaw in Apache StreamPipes allows admin takeover

Apache StreamPipes fixed a critical privilege escalation vulnerability (CVE-2025-47411) that allows non-admin users to hijack administrator accounts through JWT manipulation. Attackers can exploit this flaw to gain full system control, tamper with data, and compromise streaming infrastructure.

**If you are using Apache StreamPipes, this is important. First, make sure it's isolated from the internet and accessible from trusted networks and users only. Then plan a very quick update, because the exploit is just changing a value in the JWT token.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2021-47741
(7.5 HIGH)

EPSS: 0.04%

updated 2025-12-31T21:31:05

1 posts

ZBL EPON ONU Broadband Router V100R001 contains a privilege escalation vulnerability that allows limited administrative users to elevate access by sending requests to configuration endpoints. Attackers can exploit the vulnerability by accessing the configuration backup or password page to disclose the super user password and gain additional privileged functionalities.

CVE-2021-47726
(7.5 HIGH)

EPSS: 0.08%

updated 2025-12-31T21:31:05

1 posts

NuCom 11N Wireless Router 5.07.90 contains a privilege escalation vulnerability that allows non-privileged users to access administrative credentials through the configuration backup endpoint. Attackers can send a crafted HTTP GET request to the backup configuration page with a specific cookie to retrieve and decode the admin password in Base64 format.

CVE-2025-15217
(8.8 HIGH)

EPSS: 0.08%

updated 2025-12-30T21:30:32

1 posts

A security flaw has been discovered in Tenda AC23 16.03.07.52. Affected is the function formSetPPTPUserList of the component HTTP POST Request Handler. Performing manipulation of the argument list results in buffer overflow. The attack can be initiated remotely.

CVE-2025-15255
(9.8 CRITICAL)

EPSS: 0.18%

updated 2025-12-30T18:30:21

1 posts

A vulnerability was determined in Tenda W6-S 1.0.0.4(510). This impacts an unknown function of the file /bin/httpd of the component R7websSsecurityHandler. Executing manipulation of the argument Cookie can lead to stack-based buffer overflow. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2025-12-30T16:19:22.000Z ##

🔴 CVE-2025-15255 - Critical (9.8)

A vulnerability was determined in Tenda W6-S 1.0.0.4(510). This impacts an unknown function of the file /bin/httpd of the component R7websSsecurityHandler. Executing manipulation of the argument Cookie can lead to stack-based buffer overflow. The ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

CVE-2025-15218
(8.8 HIGH)

EPSS: 0.08%

updated 2025-12-30T06:30:25

1 posts

A weakness has been identified in Tenda AC10U 15.03.06.48/15.03.06.49. Affected by this vulnerability is the function fromadvsetlanip of the file /goform/AdvSetLanip of the component POST Request Parameter Handler. Executing manipulation of the argument lanMask can lead to buffer overflow. The attack can be launched remotely. The exploit has been made available to the public and could be exploited

CVE-2025-15216
(8.8 HIGH)

EPSS: 0.08%

updated 2025-12-30T03:30:17

1 posts

A vulnerability was identified in Tenda AC23 16.03.07.52. This impacts the function fromSetIpMacBind of the file /goform/SetIpMacBind. Such manipulation of the argument bindnum leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used.

CVE-2025-14847
(7.5 HIGH)

EPSS: 68.33%

updated 2025-12-30T00:32:58

22 posts

Mismatched length fields in Zlib compressed protocol headers may allow a read of uninitialized heap memory by an unauthenticated client. This issue affects all MongoDB Server v7.0 prior to 7.0.28 versions, MongoDB Server v8.0 versions prior to 8.0.17, MongoDB Server v8.2 versions prior to 8.2.3, MongoDB Server v6.0 versions prior to 6.0.27, MongoDB Server v5.0 versions prior to 5.0.32, MongoDB Ser

Nuclei template

28 repos

https://github.com/14mb1v45h/CYBERDUDEBIVASH-MONGODB-DETECTOR-v2026

https://github.com/demetriusford/mongobleed

https://github.com/cybertechajju/CVE-2025-14847_Expolit

https://github.com/vfa-tuannt/CVE-2025-14847

https://github.com/joshuavanderpoll/CVE-2025-14847

https://github.com/NoNameError/MongoBLEED---CVE-2025-14847-POC-

https://github.com/FurkanKAYAPINAR/CVE-2025-14847-MongoBleed-Exploit

https://github.com/Security-Phoenix-demo/mongobleed-exploit-CVE-2025-14847

https://github.com/Ashwesker/Ashwesker-CVE-2025-14847

https://github.com/Rishi-kaul/CVE-2025-14847-MongoBleed

https://github.com/nma-io/mongobleed

https://github.com/chinaxploiter/CVE-2025-14847-PoC

https://github.com/Systemhaus-Schulz/MongoBleed-CVE-2025-14847

https://github.com/KingHacker353/CVE-2025-14847_Expolit

https://github.com/j0lt-github/mongobleedburp

https://github.com/onewinner/CVE-2025-14847

https://github.com/lincemorado97/CVE-2025-14847

https://github.com/CadGoose/MongoBleed-CVE-2025-14847-Fully-Automated-scanner

https://github.com/ProbiusOfficial/CVE-2025-14847

https://github.com/tunahantekeoglu/MongoDeepDive

https://github.com/ElJoamy/MongoBleed-exploit

https://github.com/JemHadar/MongoBleed-DFIR-Triage-Script-CVE-2025-14847

https://github.com/franksec42/mongobleed-exploit-CVE-2025-14847

https://github.com/keraattin/Mongobleed-Detector-CVE-2025-14847

https://github.com/waheeb71/CVE-2025-14847

https://github.com/Black1hp/mongobleed-scanner

https://github.com/saereya/CVE-2025-14847---MongoBleed

https://github.com/kuyrathdaro/cve-2025-14847

MongoDB@activitypub.awakari.com at 2026-01-06T19:36:57.000Z ## Urgent Security Update: Patching “Mongobleed” (CVE-2025-14847) in Percona Server for MongoDB At Percona, our mission has always been to provide the community with truly open-source, enterprise-...

#MongoDB #Percona #Software #mongobleed #percona #server #for #MongoDB

Origin | Interest | Match ##

MongoDB@activitypub.awakari.com at 2026-01-05T15:28:16.000Z ## MongoBleed: unauthenticated memory disclosure in MongoDB (CVE-2025-14847) On December 12, 2025, the MongoDB Security Engineering team disclosed a high-severity vulnerability in MongoDB that allows ...

#Security #Bloggers #Network

Origin | Interest | Match ##

DarkWebInformer@infosec.exchange at 2026-01-03T22:09:00.000Z ##

CVE-2025-14847 (MongoBleed): MongoDB mismatched length fields in Zlib compressed protocol headers may allow a read of uninitialized heap memory by an unauthenticated client

PoC: github.com/joe-desimone/mongob

Credit: youtube.com/@S0n1c-AFK

##

_r_netsec@infosec.exchange at 2026-01-02T17:13:06.000Z ##

Technical Analysis - MongoBleed (CVE-2025-14847): Memory Corruption in MongoDB phoenix.security/mongobleed-vu

##

MongoDB@activitypub.awakari.com at 2025-12-29T13:03:16.000Z ## Critical ‘MongoBleed’ Flaw Exploited in the Wild to Leak Database Secrets The cybersecurity world is facing a "Heartbleed" moment for the NoSQL era. A critical vulnerability in MongoDB,...

#Cyber #Essentials #Cyber #News #Firewall #Daily #Threat #Intelligence #Vulnerability #News #CVE-2025-14847

Origin | Interest | Match ##

MongoDB@activitypub.awakari.com at 2025-12-26T09:42:59.000Z ## Critical Security Alert! MongoDB RCE Flaw Could Allow Complete Server Control A high-severity vulnerability known as MongoBleed (CVE-2025-14847), was recently identified and patched in MongoDB, th...

#Category(Default) #- #Do #Not #Use #This

Origin | Interest | Match ##

MongoDB@activitypub.awakari.com at 2026-01-02T08:38:27.000Z ## Lessons From Mongobleed Vulnerability (CVE-2025-14847) That Actively Exploited In The Wild The cybersecurity community was alarmed in late December 2025 when MongoDB announced a serious vulnerabili...

#Cyber #Security #News #CyberSecurity #Research #Vulnerability #Vulnerability #News #vulnerability

Origin | Interest | Match ##

MongoDB@activitypub.awakari.com at 2025-12-29T13:03:16.000Z ## Critical ‘MongoBleed’ Flaw Exploited in the Wild to Leak Database Secrets The cybersecurity world is facing a "Heartbleed" moment for the NoSQL era. A critical vulnerability in MongoDB,...

#Cyber #Essentials #Cyber #News #Firewall #Daily #Threat #Intelligence #Vulnerability #News #CVE-2025-14847

Origin | Interest | Match ##

MongoDB@activitypub.awakari.com at 2026-01-02T08:38:27.000Z ## Lessons From Mongobleed Vulnerability (CVE-2025-14847) That Actively Exploited In The Wild The cybersecurity community was alarmed in late December 2025 when MongoDB announced a serious vulnerabili...

#Cyber #Security #News #CyberSecurity #Research #Vulnerability #Vulnerability #News #vulnerability

Origin | Interest | Match ##

MongoDB@activitypub.awakari.com at 2025-12-31T15:56:27.000Z ## CVE-2025-14847 (MongoBleed) — A High-Severity Memory Leak in MongoDB A high severity vulnerability, referred to as “mongobleed” (CVE-2025-14847) has been identified in most versions of MongoD...

#MongoDB #mongobleed

Origin | Interest | Match ##

hackmag@infosec.exchange at 2025-12-31T21:00:17.000Z ##

⚪ New MongoDB Zero‑Day Vulnerability Actively Exploited in Attacks

🗨️ The RCE vulnerability CVE-2025-14847 fixed last week, also dubbed MongoBleed, is already being exploited by hackers. Security experts warn that more than 87,000 vulnerable servers are still accessible on the internet.

🔗 hackmag.com/news/mongobleed?ut

#news

##

MongoDB@activitypub.awakari.com at 2025-12-29T13:03:16.000Z ## Critical ‘MongoBleed’ Flaw Exploited in the Wild to Leak Database Secrets The cybersecurity world is facing a "Heartbleed" moment for the NoSQL era. A critical vulnerability in MongoDB,...

#Cyber #Essentials #Cyber #News #Firewall #Daily #Threat #Intelligence #Vulnerability #News #CVE-2025-14847

Origin | Interest | Match ##

pentesttools@infosec.exchange at 2025-12-31T11:20:50.000Z ##

🫤 We know the *last* thing you want to deal with on Dec 31st is a new vulnerability. But #MongoBleed (CVE-2025-14847) isn't waiting for the ball to drop.

Our team already updated the Pentest-Tools.com Network Scanner to detect this information disclosure flaw that's currently letting unauthenticated attackers leak MongoDB server info.

Whether you’re on-call or just checking in, we’ve made it fast to see if your servers are at risk. 🎯 Scan your IPs for CVE-2025-14847, patch it fast, and have a safe New Year.

Deets and detection here: 👉 pentest-tools.com/vulnerabilit

##

beyondmachines1@infosec.exchange at 2025-12-31T10:01:40.000Z ##

Massive Data Exposure as Attackers Exploit MongoBleed Vulnerability

Attackers are actively exploiting CVE-2025-14847 vulnerability in MongoDB dubbed MongoBleed to steal credentials. Over 75,000 internet-exposed databases are reported in security scans.

**Make sure all database servers are isolated from the internet and accessible from trusted networks only. Then patch ASAP! If you can't update your MongoDB instance immediately, disable zlib compression.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

MongoDB@activitypub.awakari.com at 2025-12-31T08:22:01.000Z ## MongoBleed (CVE-2025-14847): the US, China, and the EU are among the top exploited GEOs MongoBleed (CVE-2025-14847) lets attackers remotely leak memory from unpatched MongoDB servers using zlib com...

#Breaking #News #Hacking #Security #CVE-2025-14847 #hacking #news #information #security #news #IT

Origin | Interest | Match ##

MongoDB@activitypub.awakari.com at 2025-12-29T13:03:16.000Z ## Critical ‘MongoBleed’ Flaw Exploited in the Wild to Leak Database Secrets The cybersecurity world is facing a "Heartbleed" moment for the NoSQL era. A critical vulnerability in MongoDB,...

#Cyber #Essentials #Cyber #News #Firewall #Daily #Threat #Intelligence #Vulnerability #News #CVE-2025-14847

Origin | Interest | Match ##

MongoDB@activitypub.awakari.com at 2025-12-29T13:03:16.000Z ## Critical ‘MongoBleed’ Flaw Exploited in the Wild to Leak Database Secrets The cybersecurity world is facing a "Heartbleed" moment for the NoSQL era. A critical vulnerability in MongoDB,...

#Cyber #Essentials #Cyber #News #Firewall #Daily #Threat #Intelligence #Vulnerability #News #CVE-2025-14847

Origin | Interest | Match ##

MongoDB@activitypub.awakari.com at 2025-12-31T04:14:50.000Z ## MongoBleed: Unauthenticated memory-read vulnerability in MongoDB Article URL: https://www.bitsight.com/blog/critical-vulnerability-alert-cve-2025-14847-mongodb-mongobleed Comments URL: https://news...


Origin | Interest | Match ##

MongoDB@activitypub.awakari.com at 2025-12-29T13:57:27.000Z ## MongoBleed (CVE-2025-14847): What MongoDB Users Need to Know About This Memory Leak MongoBleed (CVE-2025-14847): What MongoDB Users Need to Know About This Memory Leak A recently disclosed security...

#Cyber #News

Origin | Interest | Match ##

MongoDB@activitypub.awakari.com at 2025-12-29T13:03:16.000Z ## Critical ‘MongoBleed’ Flaw Exploited in the Wild to Leak Database Secrets The cybersecurity world is facing a "Heartbleed" moment for the NoSQL era. A critical vulnerability in MongoDB,...

#Cyber #Essentials #Cyber #News #Firewall #Daily #Threat #Intelligence #Vulnerability #News #CVE-2025-14847

Origin | Interest | Match ##

MongoDB@activitypub.awakari.com at 2025-12-29T13:03:16.000Z ## Critical ‘MongoBleed’ Flaw Exploited in the Wild to Leak Database Secrets The cybersecurity world is facing a "Heartbleed" moment for the NoSQL era. A critical vulnerability in MongoDB,...

#Cyber #Essentials #Cyber #News #Firewall #Daily #Threat #Intelligence #Vulnerability #News #CVE-2025-14847

Origin | Interest | Match ##

MongoDB@activitypub.awakari.com at 2025-12-30T11:35:06.000Z ## CISA Warns of MongoDB Server Vulnerability(CVE-2025-14847) Exploited in Attacks CISA has added a critical MongoDB Server vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, warning ...

#Cyber #Security #News #Vulnerability #News #cyber #security #cyber #security #news

Origin | Interest | Match ##

CVE-2019-25236
(9.8 CRITICAL)

EPSS: 0.11%

updated 2025-12-29T15:58:13.147000

1 posts

iSeeQ Hybrid DVR WH-H4 1.03R contains an unauthenticated vulnerability in the get_jpeg script that allows unauthorized access to live video streams. Attackers can retrieve video snapshots from specific camera channels by sending requests to the /cgi-bin/get_jpeg endpoint without authentication.

CVE-2018-25140
(7.5 HIGH)

EPSS: 0.08%

updated 2025-12-29T15:58:13.147000

1 posts

FLIR thermal traffic cameras contain an unauthenticated device manipulation vulnerability in their WebSocket implementation that allows attackers to bypass authentication and authorization controls. Attackers can directly modify device configurations, access system information, and potentially initiate denial of service by sending crafted WebSocket messages without authentication.

CVE-2025-13915
(9.8 CRITICAL)

EPSS: 0.37%

updated 2025-12-26T15:30:23

3 posts

IBM API Connect 10.0.8.0 through 10.0.8.5, and 10.0.11.0 could allow a remote attacker to bypass authentication mechanisms and gain unauthorized access to the application.

AAKL@infosec.exchange at 2026-01-06T16:12:27.000Z ##

New.

Cyble: Singapore Cyber Agency Warns of Critical IBM API Connect Vulnerability (CVE-2025-13915) cyble.com/blog/cve-2025-13915- #infosec #vulnerability #IBM

##

oversecurity@mastodon.social at 2026-01-06T08:10:11.000Z ##

Singapore Cyber Agency Warns of Critical IBM API Connect Vulnerability (CVE-2025-13915)

Singapore warns of critical CVE-2025-13915 in IBM API Connect. Authentication bypass flaw scored 9.8 CVSS. Patches and mitigations released.

🔗️ [Cyble] link.is.it/WZmUnX

##

beyondmachines1@infosec.exchange at 2025-12-31T08:01:39.000Z ##

IBM patches critical authentication bypass flaw in API Connect

IBM released urgent fixes for a critical authentication bypass vulnerability (CVE-2025-13915) in API Connect that allows remote attackers to gain full system access without credentials.

**If you are using API Connect, this is an urgent and important patch. Patch the system ASAP. Until you can patch, disable the self-service sign-up feature to block attackers from skipping the login. If possible, isolate the API Connect service from the public internet and make it accessible via trusted networks.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2019-25248
(7.5 HIGH)

EPSS: 0.14%

updated 2025-12-24T21:30:40

1 posts

Beward N100 M2.1.6.04C014 contains an unauthenticated vulnerability that allows remote attackers to access live video streams without credentials. Attackers can directly retrieve the camera's RTSP stream by exploiting the lack of authentication in the video access mechanism.

CVE-2019-25251
(5.3 MEDIUM)

EPSS: 0.03%

updated 2025-12-24T21:30:35

1 posts

Teradek VidiU Pro 3.0.3 contains a server-side request forgery vulnerability in the management interface that allows attackers to manipulate GET parameters 'url' and 'xml_url'. Attackers can exploit this flaw to bypass firewalls, initiate network enumeration, and potentially trigger external HTTP requests to arbitrary destinations.

CVE-2018-25139
(7.5 HIGH)

EPSS: 0.12%

updated 2025-12-24T21:30:35

1 posts

FLIR AX8 Thermal Camera 1.32.16 contains an unauthenticated vulnerability that allows remote attackers to access live video streams without credentials. Attackers can directly connect to the RTSP stream using tools like VLC or FFmpeg to view and record thermal camera footage.

CVE-2018-25138
(7.5 HIGH)

EPSS: 0.13%

updated 2025-12-24T21:30:35

1 posts

FLIR AX8 Thermal Camera 1.32.16 contains hard-coded SSH and web panel credentials that cannot be changed through normal camera operations. Attackers can exploit these persistent credentials to gain unauthorized shell access and login to multiple camera interfaces using predefined username and password combinations.

CVE-2019-25247
(5.3 MEDIUM)

EPSS: 0.02%

updated 2025-12-24T21:30:34

1 posts

Beward N100 H.264 VGA IP Camera M2.1.6 contains a cross-site request forgery vulnerability that allows attackers to perform administrative actions without proper request validation. Attackers can craft a malicious web page with a hidden form to add an admin user by tricking a logged-in user into submitting the form.

CVE-2019-25246
(8.8 HIGH)

EPSS: 0.03%

updated 2025-12-24T21:30:34

1 posts

Beward N100 H.264 VGA IP Camera M2.1.6 contains an authenticated file disclosure vulnerability that allows attackers to read arbitrary system files via the 'READ.filePath' parameter. Attackers can exploit the fileread script or SendCGICMD API to access sensitive files like /etc/passwd and /etc/issue by supplying absolute file paths.

CVE-2018-25141
(7.5 HIGH)

EPSS: 0.11%

updated 2025-12-24T21:30:34

1 posts

FLIR thermal traffic cameras contain an unauthenticated vulnerability that allows remote attackers to access live video streams without credentials. Attackers can directly retrieve video streams by accessing specific endpoints like /live.mjpeg, /snapshot.jpg, and RTSP streaming URLs without authentication.

CVE-2025-14704
(7.3 HIGH)

EPSS: 0.23%

updated 2025-12-23T17:10:50.713000

1 posts

A vulnerability was found in Shiguangwu sgwbox N3 2.0.25. The impacted element is an unknown function of the file /eshell of the component API. The manipulation results in path traversal. It is possible to launch the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2025-68613
(10.0 CRITICAL)

EPSS: 8.42%

updated 2025-12-22T16:19:13

3 posts

### Impact n8n contains a critical Remote Code Execution (RCE) vulnerability in its workflow expression evaluation system. Under certain conditions, expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime. An authenticated attacker could abuse this behavior to execute arbitrary

Nuclei template

28 repos

https://github.com/AbdulRKB/n8n-RCE

https://github.com/rxerium/CVE-2025-68613

https://github.com/Dlanang/homelab-CVE-2025-68613

https://github.com/J4ck3LSyN-Gen2/n8n-CVE-2025-68613-TryHackMe

https://github.com/intbjw/CVE-2025-68613-poc-via-copilot

https://github.com/secjoker/CVE-2025-68613

https://github.com/Ashwesker/Ashwesker-CVE-2025-68613

https://github.com/hackersatyamrastogi/n8n-exploit-CVE-2025-68613-n8n-God-Mode-Ultimate

https://github.com/mbanyamer/n8n-Authenticated-Expression-Injection-RCE-CVE-2025-68613

https://github.com/cv-sai-kamesh/n8n-CVE-2025-68613

https://github.com/r4j3sh-com/CVE-2025-68613-n8n-lab

https://github.com/shibaaa204/CVE-2025-68613

https://github.com/TheInterception/n8n_CVE-2025-68613_exploit_payloads

https://github.com/gagaltotal/n8n-cve-2025-68613

https://github.com/JohannesLks/CVE-2025-68613-Python-Exploit

https://github.com/manyaigdtuw/CVE-2025-68613_Scanner

https://github.com/ali-py3/Exploit-CVE-2025-68613

https://github.com/TheStingR/CVE-2025-68613-POC

https://github.com/reem-012/poc_CVE-2025-68613

https://github.com/GnuTLam/POC-CVE-2025-68613

https://github.com/wioui/n8n-CVE-2025-68613-exploit

https://github.com/Ak-cybe/CVE-2025-68613-n8n-rce-analysis

https://github.com/releaseown/analysis-and-poc-n8n-CVE-2025-68613

https://github.com/intelligent-ears/CVE-2025-68613

https://github.com/ahmedshamsddin/n8n-RCE-CVE-2025-68613

https://github.com/Khin-96/n8n-cve-2025-68613-thm

https://github.com/nehkark/CVE-2025-68613

https://github.com/LingerANR/n8n-CVE-2025-68613

DarkWebInformer@infosec.exchange at 2026-01-07T19:28:09.000Z ##

Another video showing how incredibly easy the n8n RCE vulnerability (CVE-2025-68613) is.

Credit: youtube.com/@0xmrsecurity

##

benzogaga33@mamot.fr at 2026-01-05T16:40:02.000Z ##

Une faille critique affecte n8n – CVE-2025-68613 : comment se protéger ? it-connect.fr/n8n-cve-2025-686 #ActuCybersécurité #Cybersécurité #Vulnérabilité #n8n

##

DarkWebInformer@infosec.exchange at 2026-01-02T20:45:41.000Z ##

CVE-2025-68613: n8n RCE Vulnerability

Exploit/PoC: github.com/wioui/n8n-CVE-2025-

n8n has a critical security flaw that lets authenticated users execute arbitrary code through its workflow expression system. When users configure workflows, the expressions they provide can sometimes be evaluated without proper isolation from the underlying runtime environment.

Credit: NexxelSecurity

YouTube: youtube.com/@NexxelSecurity

##

CVE-2024-12087
(6.5 MEDIUM)

EPSS: 2.36%

updated 2025-12-22T15:30:20

1 posts

A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow

linux@activitypub.awakari.com at 2026-01-06T02:18:51.000Z ## Oracle Linux 7: rsync Moderate Risk Advisory ELSA-2025-23415 CVE-2024-12087 The following updated rpms for Oracle Linux 7 have been uploaded to the Unbreakable Linux Network:

#Oracle #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-2486
(8.8 HIGH)

EPSS: 0.02%

updated 2025-12-19T18:31:07

1 posts

The Ubuntu edk2 UEFI firmware packages accidentally allowed the UEFI Shell to be accessed in Secure Boot environments, possibly allowing bypass of Secure Boot constraints. Versions 2024.05-2ubuntu0.3 and 2024.02-2ubuntu0.3 disable the Shell. Some previous versions inserted a secure-boot-based decision to continue running inside the Shell itself, which is believed to be sufficient to enforce Secure

Ubuntu@activitypub.awakari.com at 2026-01-03T01:39:24.000Z ## CVE-2025-2486 UEFI Shell accessible in AAVMF with Secure Boot enabled on Ubuntu Information published.

#CVE

Origin | Interest | Match ##

CVE-2019-6110
(6.8 MEDIUM)

EPSS: 51.29%

updated 2025-12-18T15:15:47.940000

1 posts

In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.

1 repos

https://github.com/mbadanoiu/MAL-008

simontatham@hachyderm.io at 2026-01-02T07:20:30.000Z ##

@hanno this question came up in the SSH world, relating to terminal SCP clients: sintonen.fi/advisories/scp-cli

An SCP client had some missing validation checks in download mode, allowing a malicious server to modify parts of the client's filesystem other than the ones the user authorised it to. As a side effect, the client printed diagnostics which would have given the game away – but the client was also happy to print unsanitised escape sequences sent by the SSH server, which allowed the malicious server to send a well chosen combination of 'move up, clear line of text' escapes to wipe those telltale diagnostics off the screen and allow the attack to go undetected.

In that context, the failure to sanitise escape sequences was assigned a CVE number. (In fact, two: CVE-2019-6109 and CVE-2019-6110.) But that was only because in that particular context it allowed the attacker to hide evidence of a more serious crime.

PuTTY's SCP client was not vulnerable to the 'missing validation check' issue, and didn't allow the server to make unauthorised modifications. It _did_ have the 'failure to sanitise escape sequences' issue, but we didn't regard this as a vulnerability when it _wasn't_ allowing the covering-up of a real attack, and the original researcher agreed.

(We did regard it as a _bug_, and we fixed it. But not, by itself, a vulnerability.)

##

CVE-2025-55182
(10.0 CRITICAL)

EPSS: 53.46%

updated 2025-12-09T16:53:25

2 posts

### Impact There is an unauthenticated remote code execution vulnerability in React Server Components. We recommend upgrading immediately. The vulnerability is present in versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 of: * [react-server-dom-webpack](https://www.npmjs.com/package/react-server-dom-webpack) * [react-server-dom-parcel](https://www.npmjs.com/package/react-server-dom-parcel) * [react-s

Nuclei template

100 repos

https://github.com/Security-Phoenix-demo/react2shell-scanner-rce-react-next-CVE-2025-55182-CVE-2025-66478

https://github.com/surajhacx/react2shellpoc

https://github.com/sumanrox/rschunter

https://github.com/Syrins/CVE-2025-55182-React2Shell-RCE

https://github.com/im-ezboy/CVE-2025-55182-zoomeye

https://github.com/yz9yt/React2Shell-CTF

https://github.com/zr0n/react2shell

https://github.com/keklick1337/CVE-2025-55182-golang-PoC

https://github.com/sickwell/CVE-2025-55182

https://github.com/Rsatan/Next.js-Exploit-Tool

https://github.com/gensecaihq/react2shell-scanner

https://github.com/TrixSec/CVE-2025-55182-Scanner

https://github.com/XiaomingX/CVE-2025-55182-poc

https://github.com/vijay-shirhatti/RSC-Detect-CVE-2025-55182

https://github.com/chrahman/react2shell-CVE-2025-55182-full-rce-script

https://github.com/f0xyx/CVE-2025-55182-Scanner

https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc

https://github.com/aliclub0x00/CVE-2025-55182-POC-NEXTJS

https://github.com/BeichenDream/CVE-2025-55182-GodzillaMemoryShell

https://github.com/Cr4at0r/Next.js-RCE-Scanner-BurpSuite-Extension-

https://github.com/BlackTechX011/React2Shell

https://github.com/techgaun/cve-2025-55182-scanner

https://github.com/whiteov3rflow/CVE-2025-55182-poc

https://github.com/GelukCrab/React-Server-Components-RCE

https://github.com/acheong08/CVE-2025-55182-poc

https://github.com/CirqueiraDev/MassExploit-CVE-2025-55182

https://github.com/xalgord/React2Shell

https://github.com/heiheishushu/rsc_detect_CVE-2025-55182

https://github.com/kavienanj/CVE-2025-55182

https://github.com/songsanggggg/CVE-2025-55182

https://github.com/shyambhanushali/React2Shell

https://github.com/kOaDT/poc-cve-2025-55182

https://github.com/fullhunt/react2shell-test-server

https://github.com/ynsmroztas/NextRce

https://github.com/ZihxS/check-react-rce-cve-2025-55182

https://github.com/Updatelap/CVE-2025-55182

https://github.com/zack0x01/CVE-2025-55182-advanced-scanner-

https://github.com/vrx7men2/RSC-Detect-CVE-2025-55182

https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js

https://github.com/MoLeft/React2Shell-Toolbox

https://github.com/hidden-investigations/react2shell-scanner

https://github.com/freeqaz/react2shell

https://github.com/websecuritylabs/React2Shell-Library

https://github.com/zack0x01/vuln-app-CVE-2025-55182

https://github.com/mrknow001/RSC_Detector

https://github.com/theori-io/reactguard

https://github.com/xkillbit/cve-2025-55182-scanner

https://github.com/M4xSec/CVE-2025-55182-React2Shell-RCE-Shell

https://github.com/ThemeHackers/CVE-2025-55182

https://github.com/kondukto-io/vulnerable-next-js-poc

https://github.com/hualy13/CVE-2025-55182

https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool

https://github.com/VeilVulp/RscScan-cve-2025-55182

https://github.com/sudo-Yangziran/CVE-2025-55182POC

https://github.com/LemonTeatw1/CVE-2025-55182-exploit

https://github.com/Pizz33/CVE-2025-55182-burpscanner

https://github.com/zzhorc/CVE-2025-55182

https://github.com/cybertechajju/R2C-CVE-2025-55182-66478

https://github.com/hoosin/CVE-2025-55182

https://github.com/fatguru/CVE-2025-55182-scanner

https://github.com/jf0x3a/CVE-2025-55182-exploit

https://github.com/ejpir/CVE-2025-55182-research

https://github.com/MrR0b0t19/CVE-2025-55182-shellinteractive

https://github.com/l4rm4nd/CVE-2025-55182

https://github.com/hackersatyamrastogi/react2shell-ultimate

https://github.com/subhdotsol/CVE-2025-55182

https://github.com/Saturate/CVE-2025-55182-Scanner

https://github.com/santihabib/CVE-2025-55182-analysis

https://github.com/assetnote/react2shell-scanner

https://github.com/rix4uni/CVE-2025-55182

https://github.com/SainiONHacks/CVE-2025-55182-Scanner

https://github.com/theman001/CVE-2025-55182

https://github.com/Chocapikk/CVE-2025-55182

https://github.com/nehkark/CVE-2025-55182

https://github.com/momika233/CVE-2025-55182-bypass

https://github.com/msanft/CVE-2025-55182

https://github.com/yanoshercohen/React2Shell_CVE-2025-55182

https://github.com/emredavut/CVE-2025-55182

https://github.com/StealthMoud/CVE-2025-55182-Scanner

https://github.com/c0rydoras/CVE-2025-55182

https://github.com/ejpir/CVE-2025-55182-bypass

https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension

https://github.com/xcanwin/CVE-2025-55182-React-RCE

https://github.com/RuoJi6/CVE-2025-55182-RCE-shell

https://github.com/Spritualkb/CVE-2025-55182-exp

https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script

https://github.com/Dh4v4l8/CVE-2025-55182-poc-tool

https://github.com/CymulateResearch/React2Shell-Scanner

https://github.com/dwisiswant0/CVE-2025-55182

https://github.com/sho-luv/React2Shell

https://github.com/logesh-GIT001/CVE-2025-55182

https://github.com/alfazhossain/CVE-2025-55182-Exploiter

https://github.com/shamo0/react2shell-PoC

https://github.com/AliHzSec/CVE-2025-55182

https://github.com/alsaut1/react2shell-lab

https://github.com/EynaExp/CVE-2025-55182-POC

https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension

https://github.com/onlylovetx/CVE-2025-55182-CVE-2025-66478-Exploit-GUI

https://github.com/Ashwesker/Ashwesker-CVE-2025-55182

https://github.com/timsonner/React2Shell-CVE-2025-55182

SerferTroyan@mastodon.social at 2026-01-08T19:39:53.000Z ##

📰 React2Shell Vulnerability Exploited to Build Massive IoT Botnet

The React2Shell vulnerability, identified as CVE-2025-55182, poses a critical risk by allowing attackers to exploit IoT devices and web servers with a single malicious HTTP request, leveraging flaws in how React Server Components handle data. In...

🔗 hackers-arise.com/react2shell-

##

oversecurity@mastodon.social at 2025-12-31T15:10:07.000Z ##

RondoDox botnet exploits React2Shell flaw to breach Next.js servers

The RondoDox botnet has been observed exploiting the critical React2Shell flaw (CVE-2025-55182) to infect vulnerable Next.js servers with malware...

🔗️ [Bleepingcomputer] link.is.it/MFqNDQ

##

CVE-2025-1910(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-12-05T00:31:05

1 posts

The WatchGuard Mobile VPN with SSL Client on Windows allows a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY/SYSTEM on the Windows machine where the VPN Client is installed.This issue affects the Mobile VPN with SSL Client 12.0 up to and including 12.11.2.

1 repos

https://github.com/lutrasecurity/CVE-2025-1910-WatchGuard-Privilege-Escalation

lutrasecurity@infosec.exchange at 2026-01-07T17:21:17.000Z ##

After coming across an outdated version of WatchGuard's Mobile VPN with SSL last year and being unable to quickly find a public proof of concept for CVE-2025-1910, we took a closer look and created one ourselves: lutrasecurity.com/en/articles/

Thanks to @tomtom of #AKASEC for finding the vulnerability and providing a great write-up!

##

CVE-2025-43300
(8.8 HIGH)

EPSS: 1.08%

updated 2025-11-26T15:35:16

1 posts

An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Sonoma 14.7.8, macOS Ventura 13.7.8, iPadOS 17.7.10, macOS Sequoia 15.6.1, iOS 18.6.2 and iPadOS 18.6.2. Processing a malicious image file may result in memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targ

8 repos

https://github.com/ticofookfook/CVE-2025-43300

https://github.com/JGoyd/Glass-Cage-iOS18-CVE-2025-24085-CVE-2025-24201

https://github.com/PwnToday/CVE-2025-43300

https://github.com/7amzahard/CVE-2025-43300

https://github.com/veniversum/cve-2025-43300

https://github.com/Dark-life944/CVE-2025

https://github.com/XiaomingX/CVE-2025-43300-exp

https://github.com/hunters-sec/CVE-2025-43300

hackmag@infosec.exchange at 2026-01-04T05:35:38.000Z ##

⚪ Apple urgently patches a zero-day vulnerability

🗨️ Apple has released out-of-band patches to fix a zero-day vulnerability. The new issue has reportedly already been exploited as part of an “extremely sophisticated attack.”

🔗 hackmag.com/news/cve-2025-4330

#news

##

CVE-2025-13601
(7.7 HIGH)

EPSS: 0.02%

updated 2025-11-26T15:34:20

1 posts

A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.

linux@activitypub.awakari.com at 2026-01-06T15:38:05.000Z ## Ubuntu 25.10: GLib Critical Vulnerabilities USN-7942-1 CVE-2025-13601 Several security issues were fixed in GLib.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-6389
(9.8 CRITICAL)

EPSS: 0.37%

updated 2025-11-25T03:30:26

1 posts

The Sneeit Framework plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 8.3 via the sneeit_articles_pagination_callback() function. This is due to the function accepting user input and then passing that through call_user_func(). This makes it possible for unauthenticated attackers to execute code on the server which can be leveraged to inject backdoor

3 repos

https://github.com/thorat-shubham/JXL_Infotainment_CVE-2025-63895

https://github.com/itsismarcos/SneeitScanner-CVE-2025-6389

https://github.com/Ashwesker/Ashwesker-CVE-2025-6389

DarkWebInformer@infosec.exchange at 2026-01-06T19:51:11.000Z ##

🚨 CVE-2025-6389: WordPress Sneeit Framework plugin vulnerability currently under active exploitation

PoC: github.com/Ashwesker/Ashwesker

▪️Vulnerability Type: Remote Code Execution (RCE)
▪️CVSS: 9.8
▪️Published: 11/24/2025

Impact:

▪️Full site compromise
▪️Create admin accounts
▪️Install backdoors/malicious files
▪️Redirect visitors or inject malware

Credit: youtube.com/@Nxploited

##

CVE-2025-64432
(4.7 MEDIUM)

EPSS: 0.01%

updated 2025-11-17T21:44:47

1 posts

### Summary _Short summary of the problem. Make the impact and severity as clear as possible. A flawed implementation of the Kubernetes aggregation layer's authentication flow could enable bypassing RBAC controls. ### Details _Give all details on the vulnerability. Pointing to the incriminated source code is very helpful for the maintainer._ It was discovered that the `virt-api` component fails

Kubernetes@activitypub.awakari.com at 2026-01-02T14:39:19.000Z ## CVE-2025-64432 KubeVirt Affected by an Authentication Bypass in Kubernetes Aggregation Layer Information published.

#CVE

Origin | Interest | Match ##

CVE-2025-47812
(10.0 CRITICAL)

EPSS: 92.40%

updated 2025-11-05T19:26:31.650000

1 posts

In Wing FTP Server before 7.4.4. the user and admin web interfaces mishandle '\0' bytes, ultimately allowing injection of arbitrary Lua code into user session files. This can be used to execute arbitrary system commands with the privileges of the FTP service (root or SYSTEM by default). This is thus a remote code execution vulnerability that guarantees a total server compromise. This is also explo

Nuclei template

10 repos

https://github.com/0xcan1337/CVE-2025-47812-poC

https://github.com/r0otk3r/CVE-2025-47812

https://github.com/blindma1den/CVE-2025-47812

https://github.com/0xgh057r3c0n/CVE-2025-47812

https://github.com/pevinkumar10/CVE-2025-47812

https://github.com/CTY-Research-1/CVE-2025-47812_Lab_environment

https://github.com/Ashwesker/Ashwesker-CVE-2025-47812

https://github.com/rxerium/CVE-2025-47812

https://github.com/4m3rr0r/CVE-2025-47812-poc

https://github.com/ill-deed/WingFTP-CVE-2025-47812-illdeed

heinen@infosec.exchange at 2025-12-31T14:26:08.000Z ##

Stubborn AI honeypots give me grey hair.

Attacker sends payload:

"username=anonymous%00]]%0dlocal+h+%3d+io.popen("this is vulnerable to CVE-2025-47812")%0dlocal+r+%3d+h%3aread("*a")%0dh%3aclose()%0dprint(r)%0d--&password=
"

And the AI responsible for handling the response sends the following back to the attacker:

"This system is not affected by CVE-2025-47812.
"

*sigh*

#dfir #infosec #cybersecurity #honeypot

##

CVE-2025-31161
(9.8 CRITICAL)

EPSS: 82.33%

updated 2025-10-31T22:04:34.230000

1 posts

CrushFTP 10 before 10.8.4 and 11 before 11.3.1 allows authentication bypass and takeover of the crushadmin account (unless a DMZ proxy instance is used), as exploited in the wild in March and April 2025, aka "Unauthenticated HTTP(S) port access." A race condition exists in the AWS4-HMAC (compatible with S3) authorization method of the HTTP component of the FTP server. The server first verifies the

Nuclei template

15 repos

https://github.com/acan0007/CVE-2025-31161

https://github.com/f4dee-backup/CVE-2025-31161

https://github.com/TX-One/CVE-2025-31161

https://github.com/Immersive-Labs-Sec/CVE-2025-31161

https://github.com/ghostsec420/ShatteredFTP

https://github.com/cesarbtakeda/CVE-2025-31161

https://github.com/r0otk3r/CVE-2025-31161

https://github.com/Teexo/CVE-2025-31161

https://github.com/SUPRAAA-1337/CVE-2025-31161_exploit

https://github.com/0xgh057r3c0n/CVE-2025-31161

https://github.com/ibrahmsql/CVE-2025-31161

https://github.com/ch3m1cl/CVE-2025-31161

https://github.com/0xDTC/CrushFTP-auth-bypass-CVE-2025-31161

https://github.com/Ashwesker/Ashwesker-CVE-2025-31161

https://github.com/SUPRAAA-1337/Nuclei_CVE-2025-31161_CVE-2025-2825

linux@activitypub.awakari.com at 2026-01-05T13:46:37.000Z ## Soulmate HTB Walkthrough HTB Soulmate Walkthrough Initial Reconnaissance I started the Soulmate HackTheBox challenge by performing an nmap scan to identify active services on the target system. nm...

#hackthebox #soulmate-writeup #hackthebox-writeup #soulmate-htb #cve-2025-31161

Origin | Interest | Match ##

CVE-2021-44228
(10.0 CRITICAL)

EPSS: 94.36%

updated 2025-10-27T17:40:33.680000

1 posts

Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is en

Nuclei template

100 repos

https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce

https://github.com/cyberxml/log4j-poc

https://github.com/puzzlepeaches/Log4jUnifi

https://github.com/faisalfs10x/Log4j2-CVE-2021-44228-revshell

https://github.com/DragonSurvivalEU/RCE

https://github.com/fullhunt/log4j-scan

https://github.com/justakazh/Log4j-CVE-2021-44228

https://github.com/1lann/log4shelldetect

https://github.com/Nanitor/log4fix

https://github.com/CodeShield-Security/Log4JShell-Bytecode-Detector

https://github.com/wortell/log4j

https://github.com/puzzlepeaches/Log4jCenter

https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words

https://github.com/mr-vill4in/log4j-fuzzer

https://github.com/darkarnium/Log4j-CVE-Detect

https://github.com/nccgroup/log4j-jndi-be-gone

https://github.com/bigsizeme/Log4j-check

https://github.com/kubearmor/log4j-CVE-2021-44228

https://github.com/Azeemering/CVE-2021-44228-DFIR-Notes

https://github.com/MalwareTech/Log4jTools

https://github.com/lfama/log4j_checker

https://github.com/logpresso/CVE-2021-44228-Scanner

https://github.com/qingtengyun/cve-2021-44228-qingteng-online-patch

https://github.com/infiniroot/nginx-mitigate-log4shell

https://github.com/twseptian/spring-boot-log4j-cve-2021-44228-docker-lab

https://github.com/momos1337/Log4j-RCE

https://github.com/sec13b/CVE-2021-44228-POC

https://github.com/Malwar3Ninja/Exploitation-of-Log4j2-CVE-2021-44228

https://github.com/christophetd/log4shell-vulnerable-app

https://github.com/hackinghippo/log4shell_ioc_ips

https://github.com/claranet/ansible-role-log4shell

https://github.com/future-client/CVE-2021-44228

https://github.com/Kadantte/CVE-2021-44228-poc

https://github.com/CERTCC/CVE-2021-44228_scanner

https://github.com/thecyberneh/Log4j-RCE-Exploiter

https://github.com/CrackerCat/CVE-2021-44228-Log4j-Payloads

https://github.com/cisagov/log4j-scanner

https://github.com/back2root/log4shell-rex

https://github.com/puzzlepeaches/Log4jHorizon

https://github.com/boundaryx/cloudrasp-log4j2

https://github.com/alexbakker/log4shell-tools

https://github.com/shamo0/CVE-2021-44228

https://github.com/julian911015/Log4j-Scanner-Exploit

https://github.com/TaroballzChen/CVE-2021-44228-log4jVulnScanner-metasploit

https://github.com/HynekPetrak/log4shell-finder

https://github.com/leonjza/log4jpwn

https://github.com/greymd/CVE-2021-44228

https://github.com/ssl/scan4log4j

https://github.com/qingtengyun/cve-2021-44228-qingteng-patch

https://github.com/LiveOverflow/log4shell

https://github.com/NCSC-NL/log4shell

https://github.com/mufeedvh/log4jail

https://github.com/irgoncalves/f5-waf-quick-patch-cve-2021-44228

https://github.com/aws-samples/kubernetes-log4j-cve-2021-44228-node-agent

https://github.com/fox-it/log4j-finder

https://github.com/blake-fm/vcenter-log4j

https://github.com/f0ng/log4j2burpscanner

https://github.com/mergebase/log4j-detector

https://github.com/takito1812/log4j-detect

https://github.com/r3kind1e/Log4Shell-obfuscated-payloads-generator

https://github.com/NorthwaveSecurity/log4jcheck

https://github.com/pedrohavay/exploit-CVE-2021-44228

https://github.com/sunnyvale-it/CVE-2021-44228-PoC

https://github.com/0xDexter0us/Log4J-Scanner

https://github.com/rubo77/log4j_checker_beta

https://github.com/tippexs/nginx-njs-waf-cve2021-44228

https://github.com/kozmer/log4j-shell-poc

https://github.com/Jeromeyoung/log4j2burpscanner

https://github.com/mubix/CVE-2021-44228-Log4Shell-Hashes

https://github.com/alexandre-lavoie/python-log4rce

https://github.com/redhuntlabs/Log4JHunt

https://github.com/Diverto/nse-log4shell

https://github.com/sassoftware/loguccino

https://github.com/simonis/Log4jPatch

https://github.com/korteke/log4shell-demo

https://github.com/marcourbano/CVE-2021-44228

https://github.com/irgoncalves/f5-waf-enforce-sig-CVE-2021-44228

https://github.com/dwisiswant0/look4jar

https://github.com/toramanemre/apache-solr-log4j-CVE-2021-44228

https://github.com/roxas-tan/CVE-2021-44228

https://github.com/HyCraftHD/Log4J-RCE-Proof-Of-Concept

https://github.com/mzlogin/CVE-2021-44228-Demo

https://github.com/giterlizzi/nmap-log4shell

https://github.com/fireeye/CVE-2021-44228

https://github.com/lucab85/log4j-cve-2021-44228

https://github.com/mr-r3b00t/CVE-2021-44228

https://github.com/corelight/cve-2021-44228

https://github.com/BinaryDefense/log4j-honeypot-flask

https://github.com/corretto/hotpatch-for-apache-log4j2

https://github.com/toramanemre/log4j-rce-detect-waf-bypass

https://github.com/thomaspatzke/Log4Pot

https://github.com/AlexandreHeroux/Fix-CVE-2021-44228

https://github.com/RedDrip7/Log4Shell_CVE-2021-44228_related_attacks_IOCs

https://github.com/jas502n/Log4j2-CVE-2021-44228

https://github.com/NS-Sp4ce/Vm4J

https://github.com/KosmX/CVE-2021-44228-example

https://github.com/0xInfection/LogMePwn

https://github.com/stripe/log4j-remediation-tools

https://github.com/yahoo/check-log4j

https://github.com/Adikso/minecraft-log4j-honeypot

nono@toot.paris at 2026-01-08T21:46:36.000Z ##

Cloudflare has even bragged on their blog¹ about how they run data analytics on all of the web requests going through their system. This data may be collected for government surveillance purposes as well.

1: blog.cloudflare.com/exploitati

##

CVE-2020-12812
(9.8 CRITICAL)

EPSS: 46.01%

updated 2025-10-22T00:32:58

1 posts

An improper authentication vulnerability in SSL VPN in FortiOS 6.4.0, 6.2.0 to 6.2.3, 6.0.9 and below may result in a user being able to log in successfully without being prompted for the second factor of authentication (FortiToken) if they changed the case of their username.

knoppix95@mastodon.social at 2026-01-02T22:31:10.000Z ##

Over 10K Fortinet firewalls remain exposed to a five-year-old 2FA bypass (CVE-2020-12812), letting attackers skip authentication with simple username changes. 🛡️

Admins are urged to patch or adjust settings as active exploitation continues. ⚠️

🔗 bleepingcomputer.com/news/secu

#TechNews #CyberSecurity #DataBreach #Infosec #Vulnerability #ZeroDay #NetworkSecurity #ThreatIntel #Ransomware #Privacy #Security #Firewall #CISA #Fortinet #ExposedSystems #Network #Infrastructure #CVE #2FA #MFA #Hacking

##

CVE-2025-10492
(9.8 CRITICAL)

EPSS: 0.33%

updated 2025-10-14T15:31:20

2 posts

A Java deserialisation vulnerability has been discovered in Jaspersoft Library. Improper handling of externally supplied data may allow attackers to execute arbitrary code remotely on systems that use the affected library

1 repos

https://github.com/dovezp/CVE-2025-10492-POC

AAKL at 2026-01-08T19:29:24.876Z ##

CISA ICS advisory: Hitachi Energy Asset Suite vulnerability CVE-2025-10492 cisa.gov/news-events/ics-advis

##

AAKL@infosec.exchange at 2026-01-08T19:29:24.000Z ##

CISA ICS advisory: Hitachi Energy Asset Suite vulnerability CVE-2025-10492 cisa.gov/news-events/ics-advis #CISA #infosec #Java #JavaScript

##

CVE-2025-11155(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-09-29T18:33:13

1 posts

The credentials required to access the device's web server are sent in base64 within the HTTP headers. Since base64 is not considered a strong cipher, an attacker could intercept the web request handling the login and obtain the credentials.

CVE-2025-47987
(7.8 HIGH)

EPSS: 0.08%

updated 2025-07-14T17:38:41.223000

5 posts

Heap-based buffer overflow in Windows Cred SSProvider Protocol allows an authorized attacker to elevate privileges locally.

1 repos

https://github.com/Kryptoenix/CVE-2025-47987_PoC

Reverse-Engineering@activitypub.awakari.com at 2026-01-06T14:11:00.000Z ## Micropatches Released for Credential Security Support Provider Protocol (CredSSP) Elevation of Privilege Vulnerability (CVE-2025-47987)   July 2025 Windows Updates brought a patch for  CVE-2025-4...


Origin | Interest | Match ##

Reverse-Engineering@activitypub.awakari.com at 2026-01-06T14:15:37.000Z ## Micropatches Released for Credential Security Support Provider Protocol (CredSSP) Elevation of Privilege Vulnerability (CVE-2025-47987)   July 2025 Windows Updates brought a patch for  CVE-2025-4...

#Malware #News

Origin | Interest | Match ##

Reverse-Engineering@activitypub.awakari.com at 2026-01-06T14:11:00.000Z ## Micropatches Released for Credential Security Support Provider Protocol (CredSSP) Elevation of Privilege Vulnerability (CVE-2025-47987)   July 2025 Windows Updates brought a patch for  CVE-2025-4...


Origin | Interest | Match ##

Reverse-Engineering@activitypub.awakari.com at 2026-01-06T14:11:00.000Z ## Micropatches Released for Credential Security Support Provider Protocol (CredSSP) Elevation of Privilege Vulnerability (CVE-2025-47987)   July 2025 Windows Updates brought a patch for  CVE-2025-4...


Origin | Interest | Match ##

Reverse-Engineering@activitypub.awakari.com at 2026-01-06T14:11:00.000Z ## Micropatches Released for Credential Security Support Provider Protocol (CredSSP) Elevation of Privilege Vulnerability (CVE-2025-47987)   July 2025 Windows Updates brought a patch for  CVE-2025-4...


Origin | Interest | Match ##

CVE-2025-4330
(7.5 HIGH)

EPSS: 0.16%

updated 2025-06-03T21:30:37

1 posts

Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction fil

6 repos

https://github.com/ticofookfook/CVE-2025-43300

https://github.com/PwnToday/CVE-2025-43300

https://github.com/veniversum/cve-2025-43300

https://github.com/hunters-sec/CVE-2025-43300

https://github.com/XiaomingX/CVE-2025-43300-exp

https://github.com/7amzahard/CVE-2025-43300

hackmag@infosec.exchange at 2026-01-04T05:35:38.000Z ##

⚪ Apple urgently patches a zero-day vulnerability

🗨️ Apple has released out-of-band patches to fix a zero-day vulnerability. The new issue has reportedly already been exploited as part of an “extremely sophisticated attack.”

🔗 hackmag.com/news/cve-2025-4330

#news

##

CVE-2025-47934(CVSS UNKNOWN)

EPSS: 0.03%

updated 2025-05-19T21:54:44

1 posts

### Impact A maliciously modified message can be passed to either `openpgp.verify` or `openpgp.decrypt`, causing these functions to return a valid signature verification result while returning data that was not actually signed. This flaw allows signature verifications of inline (non-detached) signed messages (using `openpgp.verify`) and signed-and-encrypted messages (using `openpgp.decrypt` with

CVE-2025-26529
(8.4 HIGH)

EPSS: 0.12%

updated 2025-02-24T22:02:54

1 posts

Description information displayed in the site administration live log required additional sanitizing to prevent a stored XSS risk.

2 repos

https://github.com/hxuu/moodle-cve

https://github.com/Astroo18/PoC-CVE-2025-26529

DarkWebInformer@infosec.exchange at 2026-01-02T21:26:34.000Z ##

🚨CVE-2025-26529: Moodle XSS to RCE Exploit

Description information displayed in the site administration live log required additional sanitizing to prevent a stored XSS risk.

Credit: QXN0cm8
YouTube: youtube.com/@A5troRo0t

##

CVE-2024-32019
(8.8 HIGH)

EPSS: 0.48%

updated 2024-11-21T09:14:20.453000

1 posts

Netdata is an open source observability tool. In affected versions the `ndsudo` tool shipped with affected versions of the Netdata Agent allows an attacker to run arbitrary programs with root permissions. The `ndsudo` tool is packaged as a `root`-owned executable with the SUID bit set. It only runs a restricted set of external commands, but its search paths are supplied by the `PATH` environment v

12 repos

https://github.com/dollarboysushil/CVE-2024-32019-Netdata-ndsudo-PATH-Vulnerability-Privilege-Escalation

https://github.com/juanbelin/CVE-2024-32019-POC

https://github.com/julichaan/CVE-2024-32019-ndsudo-local-privilege-escalation-NetData

https://github.com/AzureADTrent/CVE-2024-32019-POC

https://github.com/C0deInBlack/CVE-2024-32019-poc

https://github.com/AliElKhatteb/CVE-2024-32019-POC

https://github.com/x0da6h/POC-for-CVE-2024-32019

https://github.com/hexared/CVE-2024-32019_poc

https://github.com/80Ottanta80/CVE-2024-32019-PoC

https://github.com/sPhyos/cve-2024-32019-PoC

https://github.com/justjoeyking/CVE-2024-32019-ndsudo

https://github.com/T1erno/CVE-2024-32019-Netdata-ndsudo-Privilege-Escalation-PoC

linux@activitypub.awakari.com at 2026-01-02T16:18:53.000Z ## Editor — HTB Walkthrough Editor HackTheBoxWalkthrough Introduction This walkthrough covers the Editor machine on Hack The Box , an Easy Linux box. I gained initial access by exploiting CVE-20...

#hackthebox-writeup #xwiki #hackthebox #editor-htb-writeup #cve-2024-32019

Origin | Interest | Match ##

CVE-2024-38063
(9.8 CRITICAL)

EPSS: 90.06%

updated 2024-08-16T20:54:12.043000

1 posts

Windows TCP/IP Remote Code Execution Vulnerability

29 repos

https://github.com/ThemeHackers/CVE-2024-38063

https://github.com/PumpkinBridge/Windows-CVE-2024-38063

https://github.com/ps-interactive/cve-2024-38063

https://github.com/Dragkob/CVE-2024-38063

https://github.com/jip-0-0-0-0-0/CVE-2024-38063-scanner

https://github.com/haroonawanofficial/AI-CVE-2024-38063-0-DAY

https://github.com/fredagsguf/Windows-CVE-2024-38063

https://github.com/becrevex/CVE-2024-38063

https://github.com/Skac44/CVE-2024-38063

https://github.com/thanawee321/CVE-2024-38063

https://github.com/almogopp/Disable-IPv6-CVE-2024-38063-Fix

https://github.com/patchpoint/CVE-2024-38063

https://github.com/Sachinart/CVE-2024-38063-poc

https://github.com/brownpanda29/Cve-2024-38063

https://github.com/zenzue/CVE-2024-38063-POC

https://github.com/KernelKraze/CVE-2024-38063_PoC

https://github.com/idkwastaken/CVE-2024-38063

https://github.com/ArenaldyP/CVE-2024-38063-Medium

https://github.com/akozsentre/CVE-2024-38063

https://github.com/Faizan-Khanx/CVE-2024-38063

https://github.com/p33d/cve-2024-38063

https://github.com/Th3Tr1ckst3r/CVE-2024-38063

https://github.com/dweger-scripts/CVE-2024-38063-Remediation

https://github.com/AdminPentester/CVE-2024-38063-

https://github.com/ynwarcs/CVE-2024-38063

https://github.com/diegoalbuquerque/CVE-2024-38063

https://github.com/Th3Tr1ckst3r/Exip6

https://github.com/AliHj98/cve-2024-38063-Anonyvader

https://github.com/FrancescoDiSalesGithub/quick-fix-cve-2024-38063

CVE-2024-2537
(4.4 MEDIUM)

EPSS: 0.06%

updated 2024-03-15T18:30:45

1 posts

Improper Control of Dynamically-Managed Code Resources vulnerability in Logitech Logi Tune on MacOS allows Local Code Inclusion.

1 repos

https://github.com/ewilded/CVE-2024-25376-POC

glyph@mastodon.social at 2026-01-07T17:25:14.000Z ##

@0xabad1dea @mkj @emaksovalec okay _actually_ the last one now, re: that footnote

Logitech has also messed up their code signing security several times so that even such a screw-up would actually not crash their app on macOS in particular, which is bad in its own right: nvd.nist.gov/vuln/detail/CVE-2

tl;dr: avoid logitech's drivers if you can, they are routinely stepping on security & reliability rakes completely unprompted

##

CVE-2019-6109
(6.8 MEDIUM)

EPSS: 9.74%

updated 2023-01-29T05:03:50

1 posts

An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.

simontatham@hachyderm.io at 2026-01-02T07:20:30.000Z ##

@hanno this question came up in the SSH world, relating to terminal SCP clients: sintonen.fi/advisories/scp-cli

An SCP client had some missing validation checks in download mode, allowing a malicious server to modify parts of the client's filesystem other than the ones the user authorised it to. As a side effect, the client printed diagnostics which would have given the game away – but the client was also happy to print unsanitised escape sequences sent by the SSH server, which allowed the malicious server to send a well chosen combination of 'move up, clear line of text' escapes to wipe those telltale diagnostics off the screen and allow the attack to go undetected.

In that context, the failure to sanitise escape sequences was assigned a CVE number. (In fact, two: CVE-2019-6109 and CVE-2019-6110.) But that was only because in that particular context it allowed the attacker to hide evidence of a more serious crime.

PuTTY's SCP client was not vulnerable to the 'missing validation check' issue, and didn't allow the server to make unauthorised modifications. It _did_ have the 'failure to sanitise escape sequences' issue, but we didn't regard this as a vulnerability when it _wasn't_ allowing the covering-up of a real attack, and the original researcher agreed.

(We did regard it as a _bug_, and we fixed it. But not, by itself, a vulnerability.)

##

CVE-2026-21876
(0 None)

EPSS: 0.00%

5 posts

N/A

1 repos

https://github.com/daytriftnewgen/CVE-2026-21876

_r_netsec at 2026-01-08T20:28:06.410Z ##

CVE-2026-21876: OWASP Modsecurity CRS WAF bypass blogpost is out! coreruleset.org/20260106/cve-2

##

_r_netsec at 2026-01-08T19:58:06.271Z ##

Critical (9.3 CVSS) OWASP ModSecurity CRS WAF bypass advisory and walkthrough is out! coreruleset.org/20260106/cve-2

##

_r_netsec@infosec.exchange at 2026-01-08T20:28:06.000Z ##

CVE-2026-21876: OWASP Modsecurity CRS WAF bypass blogpost is out! coreruleset.org/20260106/cve-2

##

_r_netsec@infosec.exchange at 2026-01-08T19:58:06.000Z ##

Critical (9.3 CVSS) OWASP ModSecurity CRS WAF bypass advisory and walkthrough is out! coreruleset.org/20260106/cve-2

##

cR0w@infosec.exchange at 2026-01-07T21:09:45.000Z ##

Docker WAF doesn't filter on username, apparently. Seems weird. The CVE isn't published yet but they are claiming a number for it in the repo. Either way, if you have Docker WAF logs, maybe look for interesting payloads in the username parameter. Or don't.

github.com/daytriftnewgen/CVE-

##

CVE-2025-69222
(0 None)

EPSS: 0.09%

1 posts

N/A

LLMs@activitypub.awakari.com at 2026-01-07T22:54:23.000Z ## CVE-2025-69222 - LibreChat is vulnerable to Server-Side Request Forgery due to missing restrictions CVE ID : CVE-2025-69222 Published : Jan. 7, 2026, 9:17 p.m. | 1 hour, 10 minutes ago Descriptio...


Origin | Interest | Match ##

CVE-2025-67859
(0 None)

EPSS: 0.00%

1 posts

N/A

andersonc0d3@infosec.exchange at 2026-01-07T23:12:24.000Z ##

TLP: Polkit Authentication Bypass in Profiles Daemon in Version 1.9.0 (CVE-2025-67859)

security.opensuse.org/2026/01/

##

CVE-2025-69139
(0 None)

EPSS: 0.00%

1 posts

N/A

cR0w@infosec.exchange at 2026-01-07T20:05:48.000Z ##

That's a weird thing to do intentionally.

An unused function in MicroServer can start a reverse SSH connection to a vendor registered domain, without mutual authentication. An attacker on the local network with admin access to the web server, and the ability to manipulate DNS responses, can redirect the SSH connection to an attacker controlled device.

cve.org/CVERecord?id=CVE-2025-

##

securityland@mastodon.social at 2026-01-07T13:39:58.000Z ##

CVE-2025-14558 is a 9.8-severity vulnerability in FreeBSD's IPv6 auto-configuration that lets attackers execute arbitrary code with a single crafted network packet. FreeBSD released patches on December 16, 2024, but the threat escalated when multiple proof-of-concept exploits hit GitHub about two weeks ago.

Read More: security.land/freebsd-ipv6-fla

#SecurityLand #CyberWatch #FreeBSD #Cybersecurity #VulnerabilityManagement #IPv6 #CVE

##

CVE-2025-65606
(0 None)

EPSS: 0.00%

2 posts

N/A

beyondmachines1@infosec.exchange at 2026-01-07T13:01:17.000Z ##

Unpatched root backdoor found in EoL TOTOLINK EX200 extenders

CERT/CC warned of an unpatched vulnerability (CVE-2025-65606) in the end-of-life TOTOLINK EX200 range extender that allows authenticated attackers to open a root-level telnet backdoor. Because the device is no longer supported, no official fix is available.

**If you are using TOTOLINK EX200, be aware that it can be exploited trivially by anyone with minimal access. Ideally, replace it with another device. If that's not possible, limit the number of authenticated users on the web management, with strong passwords and never expose the management interface to the internet.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

cR0w@infosec.exchange at 2026-01-06T15:10:41.000Z ##

TOTOLINK

cve.org/CVERecord?id=CVE-2025- ( not yet published )

kb.cert.org/vuls/id/295169

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-68615
(0 None)

EPSS: 0.05%

1 posts

N/A

1 repos

https://github.com/yt2w/CVE-2025-68615

hackmag@infosec.exchange at 2026-01-07T10:00:23.000Z ##

⚪ Critical RCE vulnerability has been discovered in Net-SNMP

🗨️ A critical remote code execution vulnerability (CVE-2025-68615) has been identified in the open-source networking package Net-SNMP, which implements SNMP protocols versions 1, 2c, and 3. This flaw allows attackers to execute arbitrary code remotely on any server where the snmptrapd service is used t…

🔗 hackmag.com/news/critical-rce-

#news

##

CVE-2025-59157
(0 None)

EPSS: 0.21%

1 posts

N/A

thehackerwire@mastodon.social at 2026-01-05T18:21:36.000Z ##

🔴 CVE-2025-59157 - Critical (9.9)

Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.420.7, the Git Repository field during project creation is vulnerable to command injection. User input is not properly ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

CVE-2025-69194
(0 None)

EPSS: 0.00%

1 posts

N/A

1 repos

https://github.com/secdongle/POC_CVE-2025-69194

beyondmachines1@infosec.exchange at 2026-01-03T13:01:46.000Z ##

Critical GNU Wget2 flaw allows attackers to overwrite sensitive files

GNU Wget2 contains a path traversal vulnerability (CVE-2025-69194) that allows remote attackers to overwrite arbitrary system files via malicious Metalink documents.

**Update GNU Wget2 to the latest version to fix the path traversal flaw. Until you patch, do not process Metalink files from untrusted sources and run the tool in a restricted sandbox.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-1973-0001
(0 None)

EPSS: 0.00%

1 posts

N/A

Visit counter For Websites