## Updated at UTC 2026-02-03T17:45:43.748975

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-25253 8.8 0.04% 8 1 2026-02-03T16:44:36.630000 OpenClaw (aka clawdbot or Moltbot) before 2026.1.29 obtains a gatewayUrl value f
CVE-2026-20402 7.5 0.21% 2 0 2026-02-03T16:44:36.630000 In Modem, there is a possible system crash due to improper input validation. Thi
CVE-2026-20409 7.8 0.01% 2 0 2026-02-03T16:44:36.630000 In imgsys, there is a possible out of bounds write due to a missing bounds check
CVE-2026-20404 7.5 0.21% 4 0 2026-02-03T16:44:36.630000 In Modem, there is a possible system crash due to improper input validation. Thi
CVE-2026-20422 7.5 0.21% 2 0 2026-02-03T16:44:36.630000 In Modem, there is a possible system crash due to improper input validation. Thi
CVE-2026-24071 7.8 0.01% 4 0 2026-02-03T16:44:36.630000 It was found that the XPC service offered by the privileged helper of Native Acc
CVE-2025-9974 8.0 0.02% 4 0 2026-02-03T16:44:36.630000 The unified WEBUI application of the ONT/Beacon device contains an input handlin
CVE-2025-15030 9.8 0.01% 2 0 2026-02-03T16:44:36.630000 The User Profile Builder WordPress plugin before 3.15.2 does not have a proper
CVE-2025-47358 7.8 0.01% 2 0 2026-02-03T16:44:36.630000 Memory Corruption when user space address is modified and passed to mem_free API
CVE-2025-47399 7.8 0.01% 2 0 2026-02-03T16:44:36.630000 Memory Corruption while processing IOCTL call to update sensor property settings
CVE-2026-20408 8.8 0.02% 2 0 2026-02-03T16:44:36.630000 In wlan, there is a possible out of bounds write due to a heap buffer overflow.
CVE-2026-20419 7.5 0.07% 2 0 2026-02-03T16:44:36.630000 In wlan AP/STA firmware, there is a possible system becoming irresponsive due to
CVE-2026-1117 8.2 0.03% 2 0 2026-02-03T16:44:36.630000 A vulnerability in the `lollms_generation_events.py` component of parisneo/lollm
CVE-2026-1531 8.1 0.02% 2 0 2026-02-03T16:44:36.630000 A flaw was found in foreman_kubevirt. When configuring the connection to OpenShi
CVE-2026-24788 8.8 0.23% 2 0 2026-02-03T16:44:36.630000 RaspAP raspap-webgui versions prior to 3.3.6 contain an OS command injection vul
CVE-2026-25201 8.8 0.07% 2 0 2026-02-03T16:44:36.630000 An unauthenticated user can upload arbitrary files to execute remote code, leadi
CVE-2025-5319 9.8 0.00% 2 1 2026-02-03T16:44:03.343000 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-25022 8.5 0.00% 2 0 2026-02-03T16:44:03.343000 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2025-6397 8.6 0.00% 2 0 2026-02-03T16:44:03.343000 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site
CVE-2025-7760 7.6 0.00% 2 0 2026-02-03T16:44:03.343000 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site
CVE-2025-67848 8.1 0.06% 2 0 2026-02-03T16:44:03.343000 A flaw was found in Moodle. This authentication bypass vulnerability allows susp
CVE-2025-67853 7.5 0.04% 2 0 2026-02-03T16:44:03.343000 A flaw was found in Moodle. A remote attacker could exploit a lack of proper rat
CVE-2025-8461 7.6 0.03% 2 0 2026-02-03T16:44:03.343000 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site
CVE-2026-25142 10.0 0.10% 3 0 2026-02-03T16:44:03.343000 SandboxJS is a JavaScript sandboxing library. Prior to 0.8.27, SanboxJS does not
CVE-2026-24694 7.8 0.02% 2 0 2026-02-03T16:44:03.343000 The installer for Roland Cloud Manager ver.3.1.19 and prior insecurely loads Dyn
CVE-2025-66480 9.8 0.43% 2 0 2026-02-03T16:44:03.343000 Wildfire IM is an instant messaging and real-time audio/video solution. Prior to
CVE-2026-23997 8.0 0.01% 2 0 2026-02-03T16:44:03.343000 FacturaScripts is open-source enterprise resource planning and accounting softwa
CVE-2026-25059 8.8 0.02% 2 0 2026-02-03T16:44:03.343000 OpenList Frontend is a UI component for OpenList. Prior to 4.1.10, the applicati
CVE-2026-25137 9.1 0.03% 3 0 2026-02-03T16:44:03.343000 The NixOs Odoo package is an open source ERP and CRM system. From 21.11 to befor
CVE-2025-64328 0 0.46% 5 1 2026-02-03T16:16:10.400000 FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX
CVE-2021-39935 6.8 28.25% 4 0 2026-02-03T16:16:09.467000 An issue has been discovered in GitLab CE/EE affecting all versions starting fro
CVE-2019-19006 9.8 2.14% 4 0 2026-02-03T16:16:08.457000 Sangoma FreePBX 115.0.16.26 and below, 14.0.13.11 and below, 13.0.197.13 and bel
CVE-2026-25060 8.1 0.01% 2 0 2026-02-03T16:13:27 ### Summary The application disables TLS certificate verification by default for
CVE-2026-24763 8.8 0.07% 4 0 2026-02-03T16:13:07 ### Summary A Command Injection vulnerability existed in Clawdbot’s Docker sandb
CVE-2026-24737 8.1 0.01% 4 0 2026-02-03T16:13:02 ### Impact User control of properties and methods of the Acroform module allows
CVE-2026-23515 10.0 0.91% 2 0 2026-02-03T16:12:17 ### Summary A Command Injection vulnerability allows authenticated users with wr
CVE-2026-22778 9.8 0.06% 2 0 2026-02-03T16:12:13 ## Summary **A chain of vulnerabilities in vLLM allow Remote Code Execution (RC
CVE-2026-1375 8.1 0.04% 2 0 2026-02-03T09:30:34 The Tutor LMS – eLearning and online course solution plugin for WordPress is vul
CVE-2026-24465 9.8 0.02% 2 0 2026-02-03T09:30:34 Stack-based buffer overflow vulnerability exists in ELECOM wireless LAN access p
CVE-2025-8456 7.6 0.03% 2 0 2026-02-03T09:30:28 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site
CVE-2026-1730 8.8 0.22% 3 0 2026-02-03T09:30:28 The OS DataHub Maps plugin for WordPress is vulnerable to arbitrary file uploads
CVE-2025-8590 7.5 0.03% 2 0 2026-02-03T09:30:28 Exposure of Sensitive Information to an Unauthorized Actor vulnerability in AKCE
CVE-2025-8589 7.6 0.03% 2 0 2026-02-03T09:30:28 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site
CVE-2026-20407 8.8 0.01% 2 0 2026-02-03T00:31:23 In wlan STA driver, there is a possible escalation of privilege due to a missing
CVE-2026-20406 7.5 0.21% 2 0 2026-02-03T00:31:23 In Modem, there is a possible system crash due to an uncaught exception. This co
CVE-2026-20421 7.5 0.21% 2 0 2026-02-03T00:31:23 In Modem, there is a possible system crash due to improper input validation. Thi
CVE-2026-20420 7.5 0.21% 2 0 2026-02-03T00:31:23 In Modem, there is a possible system crash due to incorrect error handling. This
CVE-2025-63649 7.5 0.04% 2 0 2026-02-03T00:31:22 An out-of-bounds read in the http_parser_transfer_encoding_chunked function (mk_
CVE-2026-20403 7.5 0.21% 2 0 2026-02-03T00:31:22 In Modem, there is a possible system crash due to a missing bounds check. This c
CVE-2026-20405 7.5 0.21% 2 0 2026-02-03T00:31:22 In Modem, there is a possible system crash due to a missing bounds check. This c
CVE-2025-71007 7.5 0.05% 3 0 2026-02-03T00:30:18 An input validation vulnerability in the oneflow.index_add component of OneFlow
CVE-2026-0599 7.5 0.08% 2 0 2026-02-02T22:07:42 A vulnerability in huggingface/text-generation-inference version 3.3.6 allows un
CVE-2026-20411 7.8 0.01% 2 0 2026-02-02T21:31:27 In cameraisp, there is a possible escalation of privilege due to use after free.
CVE-2026-1530 8.1 0.02% 2 0 2026-02-02T21:02:04 A flaw was found in fog-kubevirt. This vulnerability allows a remote attacker to
CVE-2026-22796 5.3 0.07% 1 0 2026-02-02T18:40:27.467000 Issue summary: A type confusion vulnerability exists in the signature verificati
CVE-2025-11187 6.1 0.01% 1 0 2026-02-02T18:39:21.740000 Issue summary: PBMAC1 parameters in PKCS#12 files are missing validation which c
CVE-2025-15468 5.9 0.05% 1 0 2026-02-02T18:38:00.947000 Issue summary: If an application using the SSL_CIPHER_find() function in a QUIC
CVE-2025-68160 4.7 0.01% 1 0 2026-02-02T18:36:57.727000 Issue summary: Writing large, newline-free data into a BIO chain using the line-
CVE-2025-69418 4.0 0.01% 1 0 2026-02-02T18:36:03.557000 Issue summary: When using the low-level OCB API directly with AES-NI or<br>other
CVE-2026-20412 7.8 0.01% 2 0 2026-02-02T18:32:35 In cameraisp, there is a possible out of bounds write due to a missing bounds ch
CVE-2026-24070 8.8 0.00% 2 0 2026-02-02T18:32:35 During the installation of the Native Access application, a privileged helper `c
CVE-2025-69421 7.5 0.06% 1 0 2026-02-02T18:32:35 Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer de
CVE-2025-47359 7.8 0.01% 2 0 2026-02-02T18:31:39 Memory Corruption when multiple threads simultaneously access a memory free API.
CVE-2025-47398 7.8 0.01% 2 0 2026-02-02T18:31:39 Memory Corruption while deallocating graphics processing unit memory buffers due
CVE-2025-47397 7.8 0.01% 2 0 2026-02-02T18:31:39 Memory Corruption when initiating GPU memory mapping using scatter-gather lists
CVE-2025-14914 7.7 0.04% 2 0 2026-02-02T18:31:38 IBM WebSphere Application Server Liberty 17.0.0.3 through 26.0.0.1 could allow a
CVE-2025-13986 4.2 0.04% 1 0 2026-02-02T18:16:11.883000 Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal
CVE-2026-1637 8.8 0.02% 1 0 2026-02-02T17:16:17.223000 A vulnerability was identified in Tenda AC21 16.03.08.16. The affected element i
CVE-2026-1761 8.6 0.14% 2 0 2026-02-02T15:30:44 A flaw was found in libsoup. This stack-based buffer overflow vulnerability occu
CVE-2026-20418 8.8 0.21% 4 0 2026-02-02T15:30:34 In Thread, there is a possible out of bounds write due to a missing bounds check
CVE-2025-8587 8.6 0.01% 2 0 2026-02-02T15:30:34 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2025-61140 None 0.06% 1 0 2026-02-02T14:09:07 The value function in jsonpath 1.1.1 lib/index.js is vulnerable to Prototype Pol
CVE-2025-46691 7.8 0.01% 1 0 2026-02-02T09:31:33 Dell PremierColor Panel Driver, versions prior to 1.0.0.1 A01, contains an Impro
CVE-2026-25200 9.8 0.07% 2 0 2026-02-02T06:30:53 A vulnerability in MagicInfo9 Server allows authorized users to upload HTML file
CVE-2026-25202 9.8 0.04% 2 0 2026-02-02T06:30:53 The database account and password are hardcoded, allowing login with the account
CVE-2025-69662 8.6 0.03% 1 0 2026-02-01T18:09:11 SQL injection vulnerability in geopandas before v.1.1.2 allows an attacker to ob
CVE-2025-62348 7.8 0.01% 1 0 2026-02-01T18:07:49 Salt's junos execution module contained an unsafe YAML decode/load usage. A spec
CVE-2026-25130 9.7 0.08% 1 0 2026-01-31T03:53:47 ## Summary The CAI (Cybersecurity AI) framework contains multiple argument inje
CVE-2026-25153 7.7 0.05% 1 0 2026-01-30T22:15:56.343000 Backstage is an open framework for building developer portals, and @backstage/pl
CVE-2026-1723 None 1.18% 1 0 2026-01-30T21:30:28 Improper Neutralization of Special Elements used in an OS Command ('OS Command I
CVE-2025-68662 7.6 0.04% 1 0 2026-01-30T20:44:48.133000 Discourse is an open source discussion platform. In versions prior to 3.5.4, 202
CVE-2025-51958 9.8 0.07% 1 0 2026-01-30T19:16:10.557000 aelsantex runcommand 2014-04-01, a plugin for DokuWiki, allows unauthenticated a
CVE-2026-1687 7.3 1.93% 1 0 2026-01-30T18:31:21 A weakness has been identified in Tenda HG10 US_HG7_HG9_HG10re_300001138_en_xpon
CVE-2026-1686 8.8 0.14% 2 0 2026-01-30T18:31:21 A security flaw has been discovered in Totolink A3600R 5.9c.4959. This issue aff
CVE-2026-1689 7.3 1.93% 1 0 2026-01-30T17:16:13.783000 A vulnerability was detected in Tenda HG10 US_HG7_HG9_HG10re_300001138_en_xpon.
CVE-2026-25128 7.5 0.07% 1 0 2026-01-30T16:16:14.123000 fast-xml-parser allows users to validate XML, parse XML to JS object, or build X
CVE-2025-4686 8.6 0.03% 2 1 2026-01-30T16:16:11.007000 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-24061 9.8 29.55% 5 55 template 2026-01-30T13:28:59.293000 telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "
CVE-2026-0709 7.2 0.01% 1 0 2026-01-30T12:31:26 Some Hikvision Wireless Access Points are vulnerable to authenticated command ex
CVE-2026-1699 10.0 0.03% 1 0 2026-01-30T12:31:26 In the Eclipse Theia Website repository, the GitHub Actions workflow .github/wor
CVE-2026-22277 7.8 0.06% 1 0 2026-01-30T09:31:01 Dell UnityVSA, version(s) 5.4 and prior, contain(s) an Improper Neutralization o
CVE-2025-1395 8.2 0.03% 1 0 2026-01-30T09:31:00 Generation of Error Message Containing Sensitive Information vulnerability in Co
CVE-2026-0805 8.2 0.11% 1 0 2026-01-30T09:30:54 An input neutralization vulnerability in the Backup Configuration component of C
CVE-2026-0963 9.9 0.31% 1 0 2026-01-30T09:30:54 An input neutralization vulnerability in the File Operations API Endpoint compon
CVE-2026-21418 7.8 0.06% 1 0 2026-01-30T09:15:50.920000 Dell Unity, version(s) 5.5.2 and prior, contain(s) an Improper Neutralization of
CVE-2026-24714 7.5 0.07% 1 0 2026-01-30T06:30:22 Some end of service NETGEAR products provide "TelnetEnable" functionality, which
CVE-2026-1281 9.8 13.12% 16 0 2026-01-30T00:31:29 A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve
CVE-2026-1340 9.8 0.14% 14 0 2026-01-30T00:31:28 A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve
CVE-2026-25116 7.6 0.20% 1 0 2026-01-29T22:15:56.110000 Runtipi is a personal homeserver orchestrator. Starting in version 4.5.0 and pri
CVE-2025-69516 8.8 0.22% 1 0 2026-01-29T22:15:52.577000 A Server-Side Template Injection (SSTI) vulnerability in the /reporting/template
CVE-2025-69602 9.1 0.04% 1 0 2026-01-29T21:31:33 A session fixation vulnerability exists in 66biolinks v62.0.0 by AltumCode, wher
CVE-2025-71003 7.5 0.05% 1 0 2026-01-29T21:31:32 An input validation vulnerability in the flow.arange() component of OneFlow v0.9
CVE-2025-14472 8.1 0.02% 1 0 2026-01-29T21:31:32 Cross-Site Request Forgery (CSRF) vulnerability in Drupal Acquia Content Hub all
CVE-2026-1601 6.3 3.17% 1 0 2026-01-29T21:30:37 A weakness has been identified in Totolink A7000R 4.1cu.4154. The impacted eleme
CVE-2026-1610 8.1 0.01% 1 0 2026-01-29T21:30:37 A vulnerability was found in Tenda AX12 Pro V2 16.03.49.24_cn. Affected by this
CVE-2026-22795 5.5 0.01% 1 0 2026-01-29T21:30:29 Issue summary: An invalid or NULL pointer dereference can happen in an applicati
CVE-2026-1453 9.8 0.06% 2 0 2026-01-29T19:16:18.987000 A missing authentication for critical function vulnerability in KiloView Encoder
CVE-2025-61726 7.5 0.03% 1 0 2026-01-29T19:16:16.243000 The net/url package does not set a limit on the number of query parameters in a
CVE-2025-13982 8.1 0.02% 1 0 2026-01-29T19:16:10.530000 Cross-Site Request Forgery (CSRF) vulnerability in Drupal Login Time Restriction
CVE-2025-61731 7.8 0.01% 1 0 2026-01-29T18:32:50 Building a malicious file with cmd/go can cause can cause a write to an attacker
CVE-2025-65889 7.5 0.05% 2 0 2026-01-29T18:32:49 A type validation flaw in the flow.dstack() component of OneFlow v0.9.0 allows a
CVE-2025-71000 7.5 0.05% 1 0 2026-01-29T18:32:49 An issue in the flow.cuda.BoolTensor component of OneFlow v0.9.0 allows attacker
CVE-2025-69517 9.8 0.05% 1 0 2026-01-29T18:32:49 An issue in Amidaware Inc Tactical RMM v1.3.1 and before allows a remote attacke
CVE-2025-66199 5.9 0.06% 1 0 2026-01-29T18:32:44 Issue summary: A TLS 1.3 connection using certificate compression can be forced
CVE-2025-69419 7.4 0.06% 1 0 2026-01-29T18:32:43 Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously craft
CVE-2025-14975 8.1 0.01% 1 0 2026-01-29T18:31:44 The Custom Login Page Customizer WordPress plugin before 2.5.4 does not have a p
CVE-2025-65886 7.5 0.05% 2 0 2026-01-29T18:31:42 A shape mismatch vulnerability in OneFlow v0.9.0 allows attackers to cause a Den
CVE-2025-70999 7.5 0.05% 1 0 2026-01-29T17:16:22.420000 A GPU device-ID validation flaw in the flow.cuda.get_device_capability() compone
CVE-2025-65891 7.5 0.06% 1 0 2026-01-29T17:16:20.240000 A GPU device-ID validation flaw in OneFlow v0.9.0 allows attackers to trigger a
CVE-2025-65890 7.5 0.05% 1 0 2026-01-29T17:16:20.053000 A device-ID validation flaw in OneFlow v0.9.0 allows attackers to cause a Denial
CVE-2025-14840 7.5 0.05% 1 0 2026-01-29T17:16:15.243000 Improper Check for Unusual or Exceptional Conditions vulnerability in Drupal HTT
CVE-2025-40551 9.8 1.03% 5 0 2026-01-29T16:31:35.700000 SolarWinds Web Help Desk was found to be susceptible to an untrusted data deseri
CVE-2025-40554 9.8 0.04% 3 2 2026-01-29T16:31:35.700000 SolarWinds Web Help Desk was found to be susceptible to an authentication bypass
CVE-2025-65888 7.5 0.05% 2 0 2026-01-29T16:31:00.867000 A dimension validation flaw in the flow.empty() component of OneFlow 0.9.0 allow
CVE-2025-57283 7.8 0.07% 1 0 2026-01-29T16:31:00.867000 The Node.js package browserstack-local 1.5.8 contains a command injection vulner
CVE-2025-7713 7.5 0.04% 1 0 2026-01-29T16:31:00.867000 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site
CVE-2025-33218 7.8 0.01% 1 0 2026-01-29T16:31:00.867000 NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mod
CVE-2025-33217 7.8 0.01% 1 0 2026-01-29T16:31:00.867000 NVIDIA Display Driver for Windows contains a vulnerability where an attacker cou
CVE-2025-15467 9.8 0.66% 7 4 2026-01-29T15:31:31 Issue summary: Parsing CMS AuthEnvelopedData message with maliciously crafted AE
CVE-2025-15469 5.5 0.01% 1 0 2026-01-29T15:31:31 Issue summary: The 'openssl dgst' command-line tool silently truncates input dat
CVE-2025-7714 7.5 0.05% 1 0 2026-01-29T15:30:35 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-1616 7.5 0.01% 1 0 2026-01-29T15:30:34 The $uri$args concatenation in nginx configuration file present in Open Security
CVE-2026-24429 9.8 0.08% 1 0 2026-01-29T15:30:27 Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) s
CVE-2026-23864 7.5 0.79% 1 0 2026-01-29T15:00:31 ## Impact It was found that the fixes to address DoS in React Server Components
CVE-2026-24428 8.8 0.04% 1 0 2026-01-29T13:02:04.990000 Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) c
CVE-2025-7016 8.0 0.06% 1 0 2026-01-29T12:30:26 Improper Access Control vulnerability in Akın Software Computer Import Export In
CVE-2026-1547 6.3 4.18% 1 0 2026-01-29T00:31:17 A vulnerability was detected in Totolink A7000R 4.1cu.4154. This affects the fun
CVE-2025-57795 10.0 0.26% 1 0 2026-01-28T21:32:26 Explorance Blue versions prior to 8.14.13 contain an authenticated remote file d
CVE-2025-69420 7.5 0.07% 2 0 2026-01-28T21:32:25 Issue summary: A type confusion vulnerability exists in the TimeStamp Response v
CVE-2026-24868 7.5 0.05% 1 0 2026-01-28T21:31:21 Mitigation bypass in the Privacy: Anti-Tracking component. This vulnerability af
CVE-2026-24436 9.8 0.03% 1 0 2026-01-28T21:31:19 Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) d
CVE-2026-24430 7.5 0.04% 1 0 2026-01-28T20:16:51.880000 Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) d
CVE-2026-24440 8.8 0.04% 1 0 2026-01-28T19:20:05.660000 Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) a
CVE-2025-33219 7.8 0.01% 1 0 2026-01-28T18:30:54 NVIDIA Display Driver for Linux contains a vulnerability in the NVIDIA kernel mo
CVE-2026-24477 7.5 0.03% 1 0 2026-01-28T15:59:06.483000 AnythingLLM is an application that turns pieces of content into context that any
CVE-2026-1056 9.8 0.18% 1 1 2026-01-28T15:31:37 The Snow Monkey Forms plugin for WordPress is vulnerable to arbitrary file delet
CVE-2025-40552 9.8 0.06% 3 0 2026-01-28T09:30:35 SolarWinds Web Help Desk was found to be susceptible to an authentication bypass
CVE-2025-40553 9.8 0.78% 3 0 2026-01-28T09:30:35 SolarWinds Web Help Desk was found to be susceptible to an untrusted data deseri
CVE-2026-24858 9.8 3.71% 7 5 2026-01-28T00:31:41 An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-2
CVE-2016-15057 9.9 32.98% 1 0 2026-01-27T20:29:50.263000 ** UNSUPPORTED WHEN ASSIGNED ** Improper Neutralization of Special Elements used
CVE-2026-21509 7.8 2.91% 20 6 2026-01-27T16:19:42.330000 Reliance on untrusted inputs in a security decision in Microsoft Office allows a
CVE-2026-1470 9.9 0.35% 2 0 2026-01-27T16:06:45.160000 n8n contains a critical Remote Code Execution (RCE) vulnerability in its workflo
CVE-2025-52691 10.0 79.97% 1 11 template 2026-01-26T21:31:34 Successful exploitation of the vulnerability could allow an unauthenticated atta
CVE-2026-0863 8.5 0.06% 2 0 2026-01-26T15:05:39.840000 Using string formatting and exception handling, an attacker may bypass n8n's pyt
CVE-2026-0920 9.8 0.03% 1 3 2026-01-26T15:04:59.737000 The LA-Studio Element Kit for Elementor plugin for WordPress is vulnerable to Ad
CVE-2025-15059 7.8 0.06% 1 0 2026-01-26T15:04:14.850000 GIMP PSP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerabi
CVE-2026-0755 9.8 1.27% 1 0 2026-01-23T06:31:32 gemini-mcp-tool execAsync Command Injection Remote Code Execution Vulnerability.
CVE-2026-20045 8.2 1.10% 1 1 2026-01-22T14:28:35.883000 A vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unif
CVE-2025-12383 7.4 0.06% 1 0 2026-01-16T20:09:26.027000 In Eclipse Jersey versions 2.45, 3.0.16, 3.1.9 a race condition can cause ignori
CVE-2026-21858 10.0 5.37% 1 9 template 2026-01-13T15:05:00 ### Impact A vulnerability in n8n allows an attacker to access files on the unde
CVE-2025-61729 7.5 0.02% 1 0 2025-12-03T00:31:35 Within HostnameError.Error(), when constructing an error string, there is no lim
CVE-2025-61795 None 0.12% 1 0 2025-11-21T15:19:20 If an error occurred (including exceeding limits) during the processing of a mul
CVE-2025-11001 7.0 0.37% 1 6 2025-11-20T00:31:21 7-Zip ZIP File Parsing Directory Traversal Remote Code Execution Vulnerability.
CVE-2025-11953 9.8 0.40% 6 4 2025-11-11T17:15:38.977000 The Metro Development Server, which is opened by the React Native Community CLI,
CVE-2024-10460 5.3 0.42% 1 0 2025-11-04T00:31:55 The origin of an external protocol handler prompt could have been obscured using
CVE-2025-31650 None 3.28% 1 7 2025-11-03T22:55:50 Improper Input Validation vulnerability in Apache Tomcat. Incorrect error handli
CVE-2025-48988 7.5 0.12% 1 2 2025-11-03T21:34:01 Allocation of Resources Without Limits or Throttling vulnerability in Apache Tom
CVE-2025-8088 8.8 4.61% 1 26 2025-10-30T15:50:59.680000 A path traversal vulnerability affecting the Windows version of WinRAR allows th
CVE-2025-0282 9.0 94.11% 1 10 template 2025-10-24T13:54:58.783000 A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5,
CVE-2025-10666 8.8 5.09% 1 0 2025-09-19T21:32:20 A security flaw has been discovered in D-Link DIR-825 up to 2.10. Affected by th
CVE-2025-49825 9.8 7.60% 2 0 template 2025-06-18T14:15:12 ### Impact A full technical disclosure and open-source patch will be published
CVE-2022-48986 5.5 0.10% 1 0 2024-11-01T15:32:52 In the Linux kernel, the following vulnerability has been resolved: mm/gup: fix
CVE-2023-38346 8.8 1.23% 2 0 2024-04-04T07:48:27 An issue was discovered in Wind River VxWorks 6.9 and 7. The function ``tarExtra
CVE-2022-37393 7.8 5.12% 1 0 2023-01-30T05:06:18 Zimbra's sudo configuration permits the zimbra user to execute the zmslapd binar
CVE-2019-15006 None 0.67% 2 0 2023-01-29T05:00:49 There was a man-in-the-middle (MITM) vulnerability present in the Confluence Pre
CVE-2026-24513 0 0.00% 2 0 N/A
CVE-2026-24514 0 0.00% 2 0 N/A
CVE-2026-23743 0 0.04% 1 0 N/A
CVE-2026-24854 0 0.03% 1 0 N/A
CVE-2025-63261 0 0.00% 1 0 N/A
CVE-2026-22806 0 0.01% 1 0 N/A
CVE-2025-62514 0 0.03% 1 0 N/A
CVE-2026-2150 0 0.00% 1 4 N/A
CVE-2026-24897 0 0.58% 1 0 N/A
CVE-2026-24856 0 0.02% 1 0 N/A

CVE-2026-25253
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-03T16:44:36.630000

8 posts

OpenClaw (aka clawdbot or Moltbot) before 2026.1.29 obtains a gatewayUrl value from a query string and automatically makes a WebSocket connection without prompting, sending a token value.

1 repos

https://github.com/ethiack/moltbot-1click-rce

benzogaga33@mamot.fr at 2026-02-03T16:40:03.000Z ##

OpenClaw – CVE-2026-25253 : un lien malveillant suffit à exécuter du code à distance en 1-clic it-connect.fr/openclaw-cve-202 #ActuCybersécurité #Cybersécurité #IA

##

hackerworkspace at 2026-02-02T21:27:57.065Z ##

depthfirst | 1-Click RCE To Steal Your Moltbot Data and Keys (CVE-2026-25253)

depthfirst.com/post/1-click-rc

##

youranonnewsirc@nerdculture.de at 2026-02-02T19:45:30.000Z ##

Here's a summary of the latest global, technology, and cybersecurity news from the last 24-48 hours:

**Global:** US-Iran talks on a nuclear deal are progressing, though Iran warned of regional war if attacked (Feb 1-2). A Russian drone strike killed 15 mineworkers in Dnipro, Ukraine (Feb 1).

**Tech/Cybersecurity:** ETSI launched a new, globally applicable cybersecurity standard for AI models (ETSI EN 304 223, Feb 2). A critical remote code execution (RCE) flaw in the OpenClaw AI assistant (CVE-2026-25253) was disclosed (Feb 2). AI-driven cyber threats are escalating, and Microsoft's extensive AI infrastructure spending is raising Wall Street concerns (Jan 30 - Feb 2).

#News #Anonymous #AnonNews_irc

##

thehackerwire@mastodon.social at 2026-02-01T23:20:05.000Z ##

🟠 CVE-2026-25253 - High (8.8)

OpenClaw (aka clawdbot or Moltbot) before 2026.1.29 obtains a gatewayUrl value from a query string and automatically makes a WebSocket connection without prompting, sending a token value.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

benzogaga33@mamot.fr at 2026-02-03T16:40:03.000Z ##

OpenClaw – CVE-2026-25253 : un lien malveillant suffit à exécuter du code à distance en 1-clic it-connect.fr/openclaw-cve-202 #ActuCybersécurité #Cybersécurité #IA

##

hackerworkspace@infosec.exchange at 2026-02-02T21:27:57.000Z ##

depthfirst | 1-Click RCE To Steal Your Moltbot Data and Keys (CVE-2026-25253)

depthfirst.com/post/1-click-rc

#databreach #vulnerability #exploit #openclaw #moltbot

##

youranonnewsirc@nerdculture.de at 2026-02-02T19:45:30.000Z ##

Here's a summary of the latest global, technology, and cybersecurity news from the last 24-48 hours:

**Global:** US-Iran talks on a nuclear deal are progressing, though Iran warned of regional war if attacked (Feb 1-2). A Russian drone strike killed 15 mineworkers in Dnipro, Ukraine (Feb 1).

**Tech/Cybersecurity:** ETSI launched a new, globally applicable cybersecurity standard for AI models (ETSI EN 304 223, Feb 2). A critical remote code execution (RCE) flaw in the OpenClaw AI assistant (CVE-2026-25253) was disclosed (Feb 2). AI-driven cyber threats are escalating, and Microsoft's extensive AI infrastructure spending is raising Wall Street concerns (Jan 30 - Feb 2).

#News #Anonymous #AnonNews_irc

##

thehackerwire@mastodon.social at 2026-02-01T23:20:05.000Z ##

🟠 CVE-2026-25253 - High (8.8)

OpenClaw (aka clawdbot or Moltbot) before 2026.1.29 obtains a gatewayUrl value from a query string and automatically makes a WebSocket connection without prompting, sending a token value.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20402
(7.5 HIGH)

EPSS: 0.21%

updated 2026-02-03T16:44:36.630000

2 posts

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00693083; Issue ID: MSV-5928.

thehackerwire@mastodon.social at 2026-02-02T23:52:42.000Z ##

🟠 CVE-2026-20402 - High (7.5)

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. Use...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T23:52:42.000Z ##

🟠 CVE-2026-20402 - High (7.5)

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. Use...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20409
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-03T16:44:36.630000

2 posts

In imgsys, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10363246; Issue ID: MSV-5779.

thehackerwire@mastodon.social at 2026-02-02T23:52:33.000Z ##

🟠 CVE-2026-20409 - High (7.8)

In imgsys, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Pat...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T23:52:33.000Z ##

🟠 CVE-2026-20409 - High (7.8)

In imgsys, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Pat...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20404
(7.5 HIGH)

EPSS: 0.21%

updated 2026-02-03T16:44:36.630000

4 posts

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01689248; Issue ID: MSV-4837.

thehackerwire@mastodon.social at 2026-02-02T23:52:22.000Z ##

🟠 CVE-2026-20404 - High (7.5)

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. Use...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T23:29:08.000Z ##

🟠 CVE-2026-20404 - High (7.5)

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. Use...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T23:52:22.000Z ##

🟠 CVE-2026-20404 - High (7.5)

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. Use...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T23:29:08.000Z ##

🟠 CVE-2026-20404 - High (7.5)

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. Use...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20422
(7.5 HIGH)

EPSS: 0.21%

updated 2026-02-03T16:44:36.630000

2 posts

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00827332; Issue ID: MSV-5919.

thehackerwire@mastodon.social at 2026-02-02T23:28:59.000Z ##

🟠 CVE-2026-20422 - High (7.5)

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. Use...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T23:28:59.000Z ##

🟠 CVE-2026-20422 - High (7.5)

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. Use...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24071
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-03T16:44:36.630000

4 posts

It was found that the XPC service offered by the privileged helper of Native Access uses the PID of the connecting client to verify its code signature. This is considered insecure and can be exploited by PID reuse attacks. The connection handler function uses _xpc_connection_get_pid(arg2) as argument for the hasValidSignature function. This value can not be trusted since it is vulnerable to PID r

thehackerwire@mastodon.social at 2026-02-02T19:09:38.000Z ##

🔴 CVE-2026-24071 - Critical (9.3)

It was found that the XPC service offered by the privileged helper of Native Access uses the PID of the connecting client to verify its code signature. This is considered insecure and can be exploited by PID reuse attacks. The connection handler...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T18:18:24.000Z ##

🔴 CVE-2026-24071 - Critical (9.3)

It was found that the XPC service offered by the privileged helper of Native Access uses the PID of the connecting client to verify its code signature. This is considered insecure and can be exploited by PID reuse attacks. The connection handler...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T19:09:38.000Z ##

🔴 CVE-2026-24071 - Critical (9.3)

It was found that the XPC service offered by the privileged helper of Native Access uses the PID of the connecting client to verify its code signature. This is considered insecure and can be exploited by PID reuse attacks. The connection handler...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T18:18:24.000Z ##

🔴 CVE-2026-24071 - Critical (9.3)

It was found that the XPC service offered by the privileged helper of Native Access uses the PID of the connecting client to verify its code signature. This is considered insecure and can be exploited by PID reuse attacks. The connection handler...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-9974
(8.0 HIGH)

EPSS: 0.02%

updated 2026-02-03T16:44:36.630000

4 posts

The unified WEBUI application of the ONT/Beacon device contains an input handling flaw that allows authenticated users to trigger unintended system-level command execution. Due to insufficient validation of user-supplied data, a low-privileged authenticated attacker may be able to execute arbitrary commands on the underlying ONT/Beacon operating system, potentially impacting the confidentiality, i

thehackerwire@mastodon.social at 2026-02-02T18:11:36.000Z ##

🟠 CVE-2025-9974 - High (8.8)

The unified WEBUI application of the ONT/Beacon device contains an input handling flaw that allows authenticated users to trigger unintended system-level command execution. Due to insufficient validation of user-supplied data, a low-privileged aut...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T17:14:55.000Z ##

🟠 CVE-2025-9974 - High (8.8)

The unified WEBUI application of the ONT/Beacon device contains an input handling flaw that allows authenticated users to trigger unintended system-level command execution. Due to insufficient validation of user-supplied data, a low-privileged aut...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T18:11:36.000Z ##

🟠 CVE-2025-9974 - High (8.8)

The unified WEBUI application of the ONT/Beacon device contains an input handling flaw that allows authenticated users to trigger unintended system-level command execution. Due to insufficient validation of user-supplied data, a low-privileged aut...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T17:14:55.000Z ##

🟠 CVE-2025-9974 - High (8.8)

The unified WEBUI application of the ONT/Beacon device contains an input handling flaw that allows authenticated users to trigger unintended system-level command execution. Due to insufficient validation of user-supplied data, a low-privileged aut...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-15030
(9.8 CRITICAL)

EPSS: 0.01%

updated 2026-02-03T16:44:36.630000

2 posts

The User Profile Builder WordPress plugin before 3.15.2 does not have a proper password reset process, allowing a few unauthenticated requests to reset the password of any user by knowing their username, such as administrator ones, and therefore gain access to their account

thehackerwire@mastodon.social at 2026-02-02T17:14:56.000Z ##

🔴 CVE-2025-15030 - Critical (9.8)

The User Profile Builder WordPress plugin before 3.15.2 does not have a proper password reset process, allowing a few unauthenticated requests to reset the password of any user by knowing their username, such as administrator ones, and therefore ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T17:14:56.000Z ##

🔴 CVE-2025-15030 - Critical (9.8)

The User Profile Builder WordPress plugin before 3.15.2 does not have a proper password reset process, allowing a few unauthenticated requests to reset the password of any user by knowing their username, such as administrator ones, and therefore ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-47358
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-03T16:44:36.630000

2 posts

Memory Corruption when user space address is modified and passed to mem_free API, causing kernel memory to be freed inadvertently.

thehackerwire@mastodon.social at 2026-02-02T16:59:42.000Z ##

🟠 CVE-2025-47358 - High (7.8)

Memory Corruption when user space address is modified and passed to mem_free API, causing kernel memory to be freed inadvertently.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T16:59:42.000Z ##

🟠 CVE-2025-47358 - High (7.8)

Memory Corruption when user space address is modified and passed to mem_free API, causing kernel memory to be freed inadvertently.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-47399
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-03T16:44:36.630000

2 posts

Memory Corruption while processing IOCTL call to update sensor property settings with invalid input parameters.

thehackerwire@mastodon.social at 2026-02-02T16:18:38.000Z ##

🟠 CVE-2025-47399 - High (7.8)

Memory Corruption while processing IOCTL call to update sensor property settings with invalid input parameters.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T16:18:38.000Z ##

🟠 CVE-2025-47399 - High (7.8)

Memory Corruption while processing IOCTL call to update sensor property settings with invalid input parameters.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20408
(8.8 HIGH)

EPSS: 0.02%

updated 2026-02-03T16:44:36.630000

2 posts

In wlan, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00461651; Issue ID: MSV-4758.

thehackerwire@mastodon.social at 2026-02-02T15:19:37.000Z ##

🟠 CVE-2026-20408 - High (8)

In wlan, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T15:19:37.000Z ##

🟠 CVE-2026-20408 - High (8)

In wlan, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20419
(7.5 HIGH)

EPSS: 0.07%

updated 2026-02-03T16:44:36.630000

2 posts

In wlan AP/STA firmware, there is a possible system becoming irresponsive due to an uncaught exception. This could lead to remote (proximal/adjacent) denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00461663 / WCNCR00463309; Issue ID: MSV-4852.

thehackerwire@mastodon.social at 2026-02-02T14:19:13.000Z ##

🟠 CVE-2026-20419 - High (7.5)

In wlan AP/STA firmware, there is a possible system becoming irresponsive due to an uncaught exception. This could lead to remote (proximal/adjacent) denial of service with no additional execution privileges needed. User interaction is not needed ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T14:19:13.000Z ##

🟠 CVE-2026-20419 - High (7.5)

In wlan AP/STA firmware, there is a possible system becoming irresponsive due to an uncaught exception. This could lead to remote (proximal/adjacent) denial of service with no additional execution privileges needed. User interaction is not needed ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1117
(8.2 HIGH)

EPSS: 0.03%

updated 2026-02-03T16:44:36.630000

2 posts

A vulnerability in the `lollms_generation_events.py` component of parisneo/lollms version 5.9.0 allows unauthenticated access to sensitive Socket.IO events. The `add_events` function registers event handlers such as `generate_text`, `cancel_generation`, `generate_msg`, and `generate_msg_from` without implementing authentication or authorization checks. This allows unauthenticated clients to execut

thehackerwire@mastodon.social at 2026-02-02T10:18:28.000Z ##

🟠 CVE-2026-1117 - High (8.2)

A vulnerability in the `lollms_generation_events.py` component of parisneo/lollms version 5.9.0 allows unauthenticated access to sensitive Socket.IO events. The `add_events` function registers event handlers such as `generate_text`, `cancel_genera...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T10:18:28.000Z ##

🟠 CVE-2026-1117 - High (8.2)

A vulnerability in the `lollms_generation_events.py` component of parisneo/lollms version 5.9.0 allows unauthenticated access to sensitive Socket.IO events. The `add_events` function registers event handlers such as `generate_text`, `cancel_genera...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1531
(8.1 HIGH)

EPSS: 0.02%

updated 2026-02-03T16:44:36.630000

2 posts

A flaw was found in foreman_kubevirt. When configuring the connection to OpenShift, the system disables SSL verification if a Certificate Authority (CA) certificate is not explicitly set. This insecure default allows a remote attacker, capable of intercepting network traffic between Satellite and OpenShift, to perform a Man-in-the-Middle (MITM) attack. Such an attack could lead to the disclosure o

thehackerwire@mastodon.social at 2026-02-02T06:21:19.000Z ##

🟠 CVE-2026-1531 - High (8.1)

A flaw was found in foreman_kubevirt. When configuring the connection to OpenShift, the system disables SSL verification if a Certificate Authority (CA) certificate is not explicitly set. This insecure default allows a remote attacker, capable of ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T06:21:19.000Z ##

🟠 CVE-2026-1531 - High (8.1)

A flaw was found in foreman_kubevirt. When configuring the connection to OpenShift, the system disables SSL verification if a Certificate Authority (CA) certificate is not explicitly set. This insecure default allows a remote attacker, capable of ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24788
(8.8 HIGH)

EPSS: 0.23%

updated 2026-02-03T16:44:36.630000

2 posts

RaspAP raspap-webgui versions prior to 3.3.6 contain an OS command injection vulnerability. If exploited, an arbitrary OS command may be executed by a user who can log in to the product.

thehackerwire@mastodon.social at 2026-02-02T05:24:34.000Z ##

🟠 CVE-2026-24788 - High (8.8)

RaspAP raspap-webgui versions prior to 3.3.6 contain an OS command injection vulnerability. If exploited, an arbitrary OS command may be executed by a user who can log in to the product.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T05:24:34.000Z ##

🟠 CVE-2026-24788 - High (8.8)

RaspAP raspap-webgui versions prior to 3.3.6 contain an OS command injection vulnerability. If exploited, an arbitrary OS command may be executed by a user who can log in to the product.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25201
(8.8 HIGH)

EPSS: 0.07%

updated 2026-02-03T16:44:36.630000

2 posts

An unauthenticated user can upload arbitrary files to execute remote code, leading to privilege escalation in MagicInfo9 Server. This issue affects MagicINFO 9 Server: less than 21.1090.1.

thehackerwire@mastodon.social at 2026-02-02T05:23:36.000Z ##

🟠 CVE-2026-25201 - High (8.8)

An unauthenticated user can upload arbitrary files to execute remote code, leading to privilege escalation in MagicInfo9 Server.
This issue affects MagicINFO 9 Server: less than 21.1090.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T05:23:36.000Z ##

🟠 CVE-2026-25201 - High (8.8)

An unauthenticated user can upload arbitrary files to execute remote code, leading to privilege escalation in MagicInfo9 Server.
This issue affects MagicINFO 9 Server: less than 21.1090.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-5319
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-02-03T16:44:03.343000

2 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Emit Information and Communication Technologies Industry and Trade Ltd. Co. Efficiency Management System allows SQL Injection.This issue affects Efficiency Management System: through 03022026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

1 repos

https://github.com/sahici/CVE-2025-5319

thehackerwire@mastodon.social at 2026-02-03T15:20:21.000Z ##

🔴 CVE-2025-5319 - Critical (9.8)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Emit Information and Communication Technologies Industry and Trade Ltd. Co. Efficiency Management System allows SQL Injection.This issue affects ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T15:20:21.000Z ##

🔴 CVE-2025-5319 - Critical (9.8)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Emit Information and Communication Technologies Industry and Trade Ltd. Co. Efficiency Management System allows SQL Injection.This issue affects ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25022
(8.5 HIGH)

EPSS: 0.00%

updated 2026-02-03T16:44:03.343000

2 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Iqonic Design KiviCare kivicare-clinic-management-system allows Blind SQL Injection.This issue affects KiviCare: from n/a through <= 3.6.16.

thehackerwire@mastodon.social at 2026-02-03T15:19:27.000Z ##

🟠 CVE-2026-25022 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Iqonic Design KiviCare kivicare-clinic-management-system allows Blind SQL Injection.This issue affects KiviCare: from n/a through &lt;= 3.6.16.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T15:19:27.000Z ##

🟠 CVE-2026-25022 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Iqonic Design KiviCare kivicare-clinic-management-system allows Blind SQL Injection.This issue affects KiviCare: from n/a through &lt;= 3.6.16.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-6397
(8.6 HIGH)

EPSS: 0.00%

updated 2026-02-03T16:44:03.343000

2 posts

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Ankara Hosting Website Design Website Software allows Reflected XSS.This issue affects Website Software: through 03022026.  NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

thehackerwire@mastodon.social at 2026-02-03T13:17:54.000Z ##

🟠 CVE-2025-6397 - High (8.6)

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Ankara Hosting Website Design Website Software allows Reflected XSS.This issue affects Website Software: through 03022026. 

NOTE: The ve...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T13:17:54.000Z ##

🟠 CVE-2025-6397 - High (8.6)

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Ankara Hosting Website Design Website Software allows Reflected XSS.This issue affects Website Software: through 03022026. 

NOTE: The ve...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-7760
(7.6 HIGH)

EPSS: 0.00%

updated 2026-02-03T16:44:03.343000

2 posts

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Ofisimo Web-Based Software Technologies Association Web Package Flora allows XSS Through HTTP Headers.This issue affects Association Web Package Flora: from v3.0 through 03022026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

thehackerwire@mastodon.social at 2026-02-03T13:17:44.000Z ##

🟠 CVE-2025-7760 - High (7.6)

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Ofisimo Web-Based Software Technologies Association Web Package Flora allows XSS Through HTTP Headers.This issue affects Association Web P...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T13:17:44.000Z ##

🟠 CVE-2025-7760 - High (7.6)

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Ofisimo Web-Based Software Technologies Association Web Package Flora allows XSS Through HTTP Headers.This issue affects Association Web P...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-67848
(8.1 HIGH)

EPSS: 0.06%

updated 2026-02-03T16:44:03.343000

2 posts

A flaw was found in Moodle. This authentication bypass vulnerability allows suspended users to authenticate through the Learning Tools Interoperability (LTI) Provider. The issue arises from the LTI authentication handlers failing to enforce the user's suspension status, enabling unauthorized access to the system. This can lead to information disclosure or other unauthorized actions by users who sh

thehackerwire@mastodon.social at 2026-02-03T11:22:54.000Z ##

🟠 CVE-2025-67848 - High (8.1)

A flaw was found in Moodle. This authentication bypass vulnerability allows suspended users to authenticate through the Learning Tools Interoperability (LTI) Provider. The issue arises from the LTI authentication handlers failing to enforce the us...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T11:22:54.000Z ##

🟠 CVE-2025-67848 - High (8.1)

A flaw was found in Moodle. This authentication bypass vulnerability allows suspended users to authenticate through the Learning Tools Interoperability (LTI) Provider. The issue arises from the LTI authentication handlers failing to enforce the us...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-67853
(7.5 HIGH)

EPSS: 0.04%

updated 2026-02-03T16:44:03.343000

2 posts

A flaw was found in Moodle. A remote attacker could exploit a lack of proper rate limiting in the confirmation email service. This vulnerability allows attackers to more easily enumerate or guess user credentials, facilitating brute-force attacks against user accounts.

thehackerwire@mastodon.social at 2026-02-03T11:22:44.000Z ##

🟠 CVE-2025-67853 - High (7.5)

A flaw was found in Moodle. A remote attacker could exploit a lack of proper rate limiting in the confirmation email service. This vulnerability allows attackers to more easily enumerate or guess user credentials, facilitating brute-force attacks ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T11:22:44.000Z ##

🟠 CVE-2025-67853 - High (7.5)

A flaw was found in Moodle. A remote attacker could exploit a lack of proper rate limiting in the confirmation email service. This vulnerability allows attackers to more easily enumerate or guess user credentials, facilitating brute-force attacks ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-8461
(7.6 HIGH)

EPSS: 0.03%

updated 2026-02-03T16:44:03.343000

2 posts

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Seres Software syWEB allows Reflected XSS.This issue affects syWEB: through 03022026.  NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

thehackerwire@mastodon.social at 2026-02-03T10:00:01.000Z ##

🟠 CVE-2025-8461 - High (7.6)

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Seres Software syWEB allows Reflected XSS.This issue affects syWEB: through 03022026. 

NOTE: The vendor was contacted early about this d...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T10:00:01.000Z ##

🟠 CVE-2025-8461 - High (7.6)

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Seres Software syWEB allows Reflected XSS.This issue affects syWEB: through 03022026. 

NOTE: The vendor was contacted early about this d...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25142
(10.0 CRITICAL)

EPSS: 0.10%

updated 2026-02-03T16:44:03.343000

3 posts

SandboxJS is a JavaScript sandboxing library. Prior to 0.8.27, SanboxJS does not properly restrict __lookupGetter__ which can be used to obtain prototypes, which can be used for escaping the sandbox / remote code execution. This vulnerability is fixed in 0.8.27.

mastokukei@social.josko.org at 2026-02-03T09:02:37.000Z ##

Blip blop, I'm a #mastobot.
Here is a summary (in beta) of the latest posts in #programmingAtKukei masto.kukei.eu/browse/programm category:
- Claude Code at Microsoft and the rise of AI coding assistants; OpenAI Codex app for macOS.
- OpenClaw/Moltbot vulnerabilities and security concerns around AI agents.
- Ingress-Nginx deprecation and multiple Kubernetes security exploits.
- CVE-2026-25142: SandboxJS JavaScript sandboxing library high-severity flaw.
- CVE-2026-1730: [1/2]

##

thehackerwire@mastodon.social at 2026-02-02T23:18:39.000Z ##

🔴 CVE-2026-25142 - Critical (10)

SandboxJS is a JavaScript sandboxing library. Prior to 0.8.27, SanboxJS does not properly restrict __lookupGetter__ which can be used to obtain prototypes, which can be used for escaping the sandbox / remote code execution. This vulnerability is f...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T23:18:39.000Z ##

🔴 CVE-2026-25142 - Critical (10)

SandboxJS is a JavaScript sandboxing library. Prior to 0.8.27, SanboxJS does not properly restrict __lookupGetter__ which can be used to obtain prototypes, which can be used for escaping the sandbox / remote code execution. This vulnerability is f...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24694
(7.8 HIGH)

EPSS: 0.02%

updated 2026-02-03T16:44:03.343000

2 posts

The installer for Roland Cloud Manager ver.3.1.19 and prior insecurely loads Dynamic Link Libraries (DLLs), which could allow an attacker to execute arbitrary code with the privileges of the application.

thehackerwire@mastodon.social at 2026-02-03T06:16:31.000Z ##

🟠 CVE-2026-24694 - High (7.8)

The installer for Roland Cloud Manager ver.3.1.19 and prior insecurely loads Dynamic Link Libraries (DLLs), which could allow an attacker to execute arbitrary code with the privileges of the application.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T06:16:31.000Z ##

🟠 CVE-2026-24694 - High (7.8)

The installer for Roland Cloud Manager ver.3.1.19 and prior insecurely loads Dynamic Link Libraries (DLLs), which could allow an attacker to execute arbitrary code with the privileges of the application.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-66480
(9.8 CRITICAL)

EPSS: 0.43%

updated 2026-02-03T16:44:03.343000

2 posts

Wildfire IM is an instant messaging and real-time audio/video solution. Prior to 1.4.3, a critical vulnerability exists in the im-server component related to the file upload functionality found in com.xiaoleilu.loServer.action.UploadFileAction. The application exposes an endpoint (/fs) that handles multipart file uploads but fails to properly sanitize the filename provided by the user. Specificall

thehackerwire@mastodon.social at 2026-02-02T23:21:26.000Z ##

🔴 CVE-2025-66480 - Critical (9.8)

Wildfire IM is an instant messaging and real-time audio/video solution. Prior to 1.4.3, a critical vulnerability exists in the im-server component related to the file upload functionality found in com.xiaoleilu.loServer.action.UploadFileAction. Th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T23:21:26.000Z ##

🔴 CVE-2025-66480 - Critical (9.8)

Wildfire IM is an instant messaging and real-time audio/video solution. Prior to 1.4.3, a critical vulnerability exists in the im-server component related to the file upload functionality found in com.xiaoleilu.loServer.action.UploadFileAction. Th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23997
(8.0 HIGH)

EPSS: 0.01%

updated 2026-02-03T16:44:03.343000

2 posts

FacturaScripts is open-source enterprise resource planning and accounting software. In 2025.71 and earlier, a Stored Cross-Site Scripting (XSS) vulnerability was discovered in the Observations field. The flaw occurs in the History view, where historical data is rendered without proper HTML entity encoding. This allows an attacker to execute arbitrary JavaScript in the browser of viewing the histor

thehackerwire@mastodon.social at 2026-02-02T23:20:05.000Z ##

🟠 CVE-2026-23997 - High (8)

FacturaScripts is open-source enterprise resource planning and accounting software. In 2025.71 and earlier, a Stored Cross-Site Scripting (XSS) vulnerability was discovered in the Observations field. The flaw occurs in the History view, where hist...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T23:20:05.000Z ##

🟠 CVE-2026-23997 - High (8)

FacturaScripts is open-source enterprise resource planning and accounting software. In 2025.71 and earlier, a Stored Cross-Site Scripting (XSS) vulnerability was discovered in the Observations field. The flaw occurs in the History view, where hist...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25059
(8.8 HIGH)

EPSS: 0.02%

updated 2026-02-03T16:44:03.343000

2 posts

OpenList Frontend is a UI component for OpenList. Prior to 4.1.10, the application contains path traversal vulnerability in multiple file operation handlers in server/handles/fsmanage.go. Filename components in req.Names are directly concatenated with validated directories using stdpath.Join. This allows ".." sequences to bypass path restrictions, enabling users to access other users' files within

thehackerwire@mastodon.social at 2026-02-02T23:19:45.000Z ##

🟠 CVE-2026-25059 - High (8.8)

OpenList Frontend is a UI component for OpenList. Prior to 4.1.10, the application contains path traversal vulnerability in multiple file operation handlers in server/handles/fsmanage.go. Filename components in req.Names are directly concatenated ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T23:19:45.000Z ##

🟠 CVE-2026-25059 - High (8.8)

OpenList Frontend is a UI component for OpenList. Prior to 4.1.10, the application contains path traversal vulnerability in multiple file operation handlers in server/handles/fsmanage.go. Filename components in req.Names are directly concatenated ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25137
(9.1 CRITICAL)

EPSS: 0.03%

updated 2026-02-03T16:44:03.343000

3 posts

The NixOs Odoo package is an open source ERP and CRM system. From 21.11 to before 25.11 and 26.05, every NixOS based Odoo setup publicly exposes the database manager without any authentication. This allows unauthorized actors to delete and download the entire database, including Odoos file store. Unauthorized access is evident from http requests. If kept, searching access logs and/or Odoos log for

thehackerwire@mastodon.social at 2026-02-02T23:18:29.000Z ##

🔴 CVE-2026-25137 - Critical (9.1)

The NixOs Odoo package is an open source ERP and CRM system. From 21.11 to before 25.11 and 26.05, every NixOS based Odoo setup publicly exposes the database manager without any authentication. This allows unauthorized actors to delete and downloa...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T23:18:29.000Z ##

🔴 CVE-2026-25137 - Critical (9.1)

The NixOs Odoo package is an open source ERP and CRM system. From 21.11 to before 25.11 and 26.05, every NixOS based Odoo setup publicly exposes the database manager without any authentication. This allows unauthorized actors to delete and downloa...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

nixpkgssecuritychanges@social.gerbet.me at 2026-01-31T17:39:01.000Z ##

Security Advisory: Database and filestore publicly accessible with default Odoo configuration (CVE-2026-25137)

discourse.nixos.org/t/security

#security #nixpkgs #nixos

##

CVE-2025-64328
(0 None)

EPSS: 0.46%

updated 2026-02-03T16:16:10.400000

5 posts

FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. In versions 17.0.2.36 and above before 17.0.3, the filestore module within the Administrative interface is vulnerable to a post-authentication command injection by an authenticated known user via the testconnection -> check_ssh_connect() function. An attacker can leverage this vulnerability to obtain remote a

1 repos

https://github.com/mcorybillington/CVE-2025-64328_FreePBX-framework-Command-Injection

AAKL at 2026-02-03T16:25:06.971Z ##

CISA has updated the KEV catalogue.

- CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability cve.org/CVERecord?id=CVE-2019-

- CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability cve.org/CVERecord?id=CVE-2021-

##

cisakevtracker@mastodon.social at 2026-02-03T16:01:25.000Z ##

CVE ID: CVE-2025-64328
Vendor: Sangoma
Product: FreePBX
Date Added: 2026-02-03
Notes: github.com/FreePBX/security-re ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-02-03T16:25:06.000Z ##

CISA has updated the KEV catalogue.

- CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability cve.org/CVERecord?id=CVE-2019-

- CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability cve.org/CVERecord?id=CVE-2021- #CISA #infosec #GitLab #vulnerability

##

cisakevtracker@mastodon.social at 2026-02-03T16:01:25.000Z ##

CVE ID: CVE-2025-64328
Vendor: Sangoma
Product: FreePBX
Date Added: 2026-02-03
Notes: github.com/FreePBX/security-re ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

VirusBulletin@infosec.exchange at 2026-01-29T10:34:54.000Z ##

FortiGuard Labs analyses EncystPHP, a weaponized web shell delivering remote command execution, persistence and further web shell deployment. It spreads by exploiting FreePBX vulnerability CVE-2025-64328 and is linked to the INJ3CTOR3 actor. fortinet.com/blog/threat-resea

##

CVE-2021-39935
(6.8 MEDIUM)

EPSS: 28.25%

updated 2026-02-03T16:16:09.467000

4 posts

An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.5 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. Unauthorized external users could perform Server Side Requests via the CI Lint API

AAKL at 2026-02-03T16:25:06.971Z ##

CISA has updated the KEV catalogue.

- CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability cve.org/CVERecord?id=CVE-2019-

- CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability cve.org/CVERecord?id=CVE-2021-

##

cisakevtracker@mastodon.social at 2026-02-03T16:01:09.000Z ##

CVE ID: CVE-2021-39935
Vendor: GitLab
Product: Community and Enterprise Editions
Date Added: 2026-02-03
Notes: about.gitlab.com/releases/2021 ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-02-03T16:25:06.000Z ##

CISA has updated the KEV catalogue.

- CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability cve.org/CVERecord?id=CVE-2019-

- CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability cve.org/CVERecord?id=CVE-2021- #CISA #infosec #GitLab #vulnerability

##

cisakevtracker@mastodon.social at 2026-02-03T16:01:09.000Z ##

CVE ID: CVE-2021-39935
Vendor: GitLab
Product: Community and Enterprise Editions
Date Added: 2026-02-03
Notes: about.gitlab.com/releases/2021 ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2019-19006
(9.8 CRITICAL)

EPSS: 2.14%

updated 2026-02-03T16:16:08.457000

4 posts

Sangoma FreePBX 115.0.16.26 and below, 14.0.13.11 and below, 13.0.197.13 and below have Incorrect Access Control.

AAKL at 2026-02-03T16:25:06.971Z ##

CISA has updated the KEV catalogue.

- CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability cve.org/CVERecord?id=CVE-2019-

- CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability cve.org/CVERecord?id=CVE-2021-

##

cisakevtracker@mastodon.social at 2026-02-03T16:01:41.000Z ##

CVE ID: CVE-2019-19006
Vendor: Sangoma
Product: FreePBX
Date Added: 2026-02-03
Notes: wiki.freepbx.org/display/FOP/2 ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-02-03T16:25:06.000Z ##

CISA has updated the KEV catalogue.

- CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability cve.org/CVERecord?id=CVE-2019-

- CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability cve.org/CVERecord?id=CVE-2021- #CISA #infosec #GitLab #vulnerability

##

cisakevtracker@mastodon.social at 2026-02-03T16:01:41.000Z ##

CVE ID: CVE-2019-19006
Vendor: Sangoma
Product: FreePBX
Date Added: 2026-02-03
Notes: wiki.freepbx.org/display/FOP/2 ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-25060
(8.1 HIGH)

EPSS: 0.01%

updated 2026-02-03T16:13:27

2 posts

### Summary The application disables TLS certificate verification by default for all outgoing storage driver communications, making the system vulnerable to Man-in-the-Middle (MitM) attacks. This enables the complete decryption, theft, and manipulation of all data transmitted during storage operations, severely compromising the confidentiality and integrity of user data. ### Details Certificate v

thehackerwire@mastodon.social at 2026-02-02T23:19:46.000Z ##

🟠 CVE-2026-25060 - High (8.1)

OpenList Frontend is a UI component for OpenList. Prior to 4.1.10, certificate verification is disabled by default for all storage driver communications. The TlsInsecureSkipVerify setting is default to true in the DefaultConfig() function in inter...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T23:19:46.000Z ##

🟠 CVE-2026-25060 - High (8.1)

OpenList Frontend is a UI component for OpenList. Prior to 4.1.10, certificate verification is disabled by default for all storage driver communications. The TlsInsecureSkipVerify setting is default to true in the DefaultConfig() function in inter...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24763
(8.8 HIGH)

EPSS: 0.07%

updated 2026-02-03T16:13:07

4 posts

### Summary A Command Injection vulnerability existed in Clawdbot’s Docker sandbox execution mechanism due to unsafe handling of the PATH environment variable when constructing shell commands. An authenticated user able to control environment variables could influence command execution within the container context. This issue has been fixed and regression tests have been added to prevent reintrod

thehackerwire@mastodon.social at 2026-02-02T23:20:59.000Z ##

🟠 CVE-2026-24763 - High (8.8)

OpenClaw (formerly Clawdbot) is a personal AI assistant you run on your own devices. Prior to 2026.1.29, a command injection vulnerability existed in OpenClaw’s Docker sandbox execution mechanism due to unsafe handling of the PATH environment v...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T23:19:35.000Z ##

🟠 CVE-2026-24763 - High (8.8)

OpenClaw (formerly Clawdbot) is a personal AI assistant you run on your own devices. Prior to 2026.1.29, a command injection vulnerability existed in OpenClaw’s Docker sandbox execution mechanism due to unsafe handling of the PATH environment v...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T23:20:59.000Z ##

🟠 CVE-2026-24763 - High (8.8)

OpenClaw (formerly Clawdbot) is a personal AI assistant you run on your own devices. Prior to 2026.1.29, a command injection vulnerability existed in OpenClaw’s Docker sandbox execution mechanism due to unsafe handling of the PATH environment v...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T23:19:35.000Z ##

🟠 CVE-2026-24763 - High (8.8)

OpenClaw (formerly Clawdbot) is a personal AI assistant you run on your own devices. Prior to 2026.1.29, a command injection vulnerability existed in OpenClaw’s Docker sandbox execution mechanism due to unsafe handling of the PATH environment v...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24737
(8.1 HIGH)

EPSS: 0.01%

updated 2026-02-03T16:13:02

4 posts

### Impact User control of properties and methods of the Acroform module allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsanitized input to one of the following methods or properties, a user can inject arbitrary PDF objects, such as JavaScript actions, which are executed when the victim opens the document. The vulnerable API members ar

thehackerwire@mastodon.social at 2026-02-02T23:20:49.000Z ##

🟠 CVE-2026-24737 - High (8.1)

jsPDF is a library to generate PDFs in JavaScript. Prior to 4.1.0, user control of properties and methods of the Acroform module allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsanitized...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T23:19:26.000Z ##

🟠 CVE-2026-24737 - High (8.1)

jsPDF is a library to generate PDFs in JavaScript. Prior to 4.1.0, user control of properties and methods of the Acroform module allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsanitized...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T23:20:49.000Z ##

🟠 CVE-2026-24737 - High (8.1)

jsPDF is a library to generate PDFs in JavaScript. Prior to 4.1.0, user control of properties and methods of the Acroform module allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsanitized...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T23:19:26.000Z ##

🟠 CVE-2026-24737 - High (8.1)

jsPDF is a library to generate PDFs in JavaScript. Prior to 4.1.0, user control of properties and methods of the Acroform module allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsanitized...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23515
(10.0 CRITICAL)

EPSS: 0.91%

updated 2026-02-03T16:12:17

2 posts

### Summary A Command Injection vulnerability allows authenticated users with write permissions to execute arbitrary shell commands on the Signal K server when the set-system-time plugin is enabled. Unauthenticated users can also exploit this vulnerability if security is disabled on the Signal K server. This occurs due to unsafe construction of shell commands when processing `navigation.datetime`

thehackerwire@mastodon.social at 2026-02-02T23:19:55.000Z ##

🔴 CVE-2026-23515 - Critical (9.9)

Signal K Server is a server application that runs on a central hub in a boat. Prior to 1.5.0, a command injection vulnerability allows authenticated users with write permissions to execute arbitrary shell commands on the Signal K server when the s...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T23:19:55.000Z ##

🔴 CVE-2026-23515 - Critical (9.9)

Signal K Server is a server application that runs on a central hub in a boat. Prior to 1.5.0, a command injection vulnerability allows authenticated users with write permissions to execute arbitrary shell commands on the Signal K server when the s...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22778
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-02-03T16:12:13

2 posts

## Summary **A chain of vulnerabilities in vLLM allow Remote Code Execution (RCE):** 1. **Info Leak** - PIL error messages expose memory addresses, bypassing ASLR 2. **Heap Overflow** - JPEG2000 decoder in OpenCV/FFmpeg has a heap overflow that lets us hijack code execution **Result:** Send a malicious video URL to vLLM Completions or Invocations **for a video model** -> Execute arbitrary comma

thehackerwire@mastodon.social at 2026-02-02T23:21:16.000Z ##

🔴 CVE-2026-22778 - Critical (9.8)

vLLM is an inference and serving engine for large language models (LLMs). From 0.8.3 to before 0.14.1, when an invalid image is sent to vLLM's multimodal endpoint, PIL throws an error. vLLM returns this error to the client, leaking a heap address....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T23:21:16.000Z ##

🔴 CVE-2026-22778 - Critical (9.8)

vLLM is an inference and serving engine for large language models (LLMs). From 0.8.3 to before 0.14.1, when an invalid image is sent to vLLM's multimodal endpoint, PIL throws an error. vLLM returns this error to the client, leaking a heap address....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1375
(8.1 HIGH)

EPSS: 0.04%

updated 2026-02-03T09:30:34

2 posts

The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to Insecure Direct Object References (IDOR) in all versions up to, and including, 3.9.5. This is due to missing object-level authorization checks in the `course_list_bulk_action()`, `bulk_delete_course()`, and `update_course_status()` functions. This makes it possible for authenticated attackers, with Tutor Ins

thehackerwire@mastodon.social at 2026-02-03T08:22:04.000Z ##

🟠 CVE-2026-1375 - High (8.1)

The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to Insecure Direct Object References (IDOR) in all versions up to, and including, 3.9.5. This is due to missing object-level authorization checks in the `cou...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T08:22:04.000Z ##

🟠 CVE-2026-1375 - High (8.1)

The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to Insecure Direct Object References (IDOR) in all versions up to, and including, 3.9.5. This is due to missing object-level authorization checks in the `cou...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24465
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-02-03T09:30:34

2 posts

Stack-based buffer overflow vulnerability exists in ELECOM wireless LAN access point devices. A crafted packet may lead to arbitrary code execution.

thehackerwire@mastodon.social at 2026-02-03T07:18:50.000Z ##

🔴 CVE-2026-24465 - Critical (9.8)

Stack-based buffer overflow vulnerability exists in ELECOM wireless LAN access point devices. A crafted packet may lead to arbitrary code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T07:18:50.000Z ##

🔴 CVE-2026-24465 - Critical (9.8)

Stack-based buffer overflow vulnerability exists in ELECOM wireless LAN access point devices. A crafted packet may lead to arbitrary code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-8456
(7.6 HIGH)

EPSS: 0.03%

updated 2026-02-03T09:30:28

2 posts

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Kod8 Software Technologies Trade Ltd. Co. Kod8 Individual and SME Website allows Reflected XSS.This issue affects Kod8 Individual and SME Website: through 03022026.  NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

thehackerwire@mastodon.social at 2026-02-03T09:59:50.000Z ##

🟠 CVE-2025-8456 - High (7.6)

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Kod8 Software Technologies Trade Ltd. Co. Kod8 Individual and SME Website allows Reflected XSS.This issue affects Kod8 Individual and SME ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T09:59:50.000Z ##

🟠 CVE-2025-8456 - High (7.6)

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Kod8 Software Technologies Trade Ltd. Co. Kod8 Individual and SME Website allows Reflected XSS.This issue affects Kod8 Individual and SME ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1730
(8.8 HIGH)

EPSS: 0.22%

updated 2026-02-03T09:30:28

3 posts

The OS DataHub Maps plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the 'OS_DataHub_Maps_Admin::add_file_and_ext' function in all versions up to, and including, 1.8.3. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code executi

mastokukei@social.josko.org at 2026-02-03T09:02:37.000Z ##

Blip blop, I'm a #mastobot.
Here is a summary (in beta) of the latest posts in #programmingAtKukei masto.kukei.eu/browse/programm category:
- Claude Code at Microsoft and the rise of AI coding assistants; OpenAI Codex app for macOS.
- OpenClaw/Moltbot vulnerabilities and security concerns around AI agents.
- Ingress-Nginx deprecation and multiple Kubernetes security exploits.
- CVE-2026-25142: SandboxJS JavaScript sandboxing library high-severity flaw.
- CVE-2026-1730: [1/2]

##

thehackerwire@mastodon.social at 2026-02-03T08:17:43.000Z ##

🟠 CVE-2026-1730 - High (8.8)

The OS DataHub Maps plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the 'OS_DataHub_Maps_Admin::add_file_and_ext' function in all versions up to, and including, 1.8.3. This makes it possible fo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T08:17:43.000Z ##

🟠 CVE-2026-1730 - High (8.8)

The OS DataHub Maps plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the 'OS_DataHub_Maps_Admin::add_file_and_ext' function in all versions up to, and including, 1.8.3. This makes it possible fo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-8590
(7.5 HIGH)

EPSS: 0.03%

updated 2026-02-03T09:30:28

2 posts

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in AKCE Software Technology R&D Industry and Trade Inc. SKSPro allows Directory Indexing.This issue affects SKSPro: through 07012026.

thehackerwire@mastodon.social at 2026-02-03T08:18:02.000Z ##

🟠 CVE-2025-8590 - High (7.5)

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in AKCE Software Technology R&D Industry and Trade Inc. SKSPro allows Directory Indexing.This issue affects SKSPro: through 07012026.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T08:18:02.000Z ##

🟠 CVE-2025-8590 - High (7.5)

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in AKCE Software Technology R&D Industry and Trade Inc. SKSPro allows Directory Indexing.This issue affects SKSPro: through 07012026.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-8589
(7.6 HIGH)

EPSS: 0.03%

updated 2026-02-03T09:30:28

2 posts

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in AKCE Software Technology R&D Industry and Trade Inc. SKSPro allows Reflected XSS.This issue affects SKSPro: through 07012026.

thehackerwire@mastodon.social at 2026-02-03T08:17:53.000Z ##

🟠 CVE-2025-8589 - High (7.6)

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in AKCE Software Technology R&D Industry and Trade Inc. SKSPro allows Reflected XSS.This issue affects SKSPro: through 07012026.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T08:17:53.000Z ##

🟠 CVE-2025-8589 - High (7.6)

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in AKCE Software Technology R&D Industry and Trade Inc. SKSPro allows Reflected XSS.This issue affects SKSPro: through 07012026.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20407
(8.8 HIGH)

EPSS: 0.01%

updated 2026-02-03T00:31:23

2 posts

In wlan STA driver, there is a possible escalation of privilege due to a missing bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00464377; Issue ID: MSV-4905.

thehackerwire@mastodon.social at 2026-02-02T23:29:44.000Z ##

🟠 CVE-2026-20407 - High (8.8)

In wlan STA driver, there is a possible escalation of privilege due to a missing bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T23:29:44.000Z ##

🟠 CVE-2026-20407 - High (8.8)

In wlan STA driver, there is a possible escalation of privilege due to a missing bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20406
(7.5 HIGH)

EPSS: 0.21%

updated 2026-02-03T00:31:23

2 posts

In Modem, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01726634; Issue ID: MSV-5728.

thehackerwire@mastodon.social at 2026-02-02T23:29:35.000Z ##

🟠 CVE-2026-20406 - High (7.5)

In Modem, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User in...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T23:29:35.000Z ##

🟠 CVE-2026-20406 - High (7.5)

In Modem, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User in...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20421
(7.5 HIGH)

EPSS: 0.21%

updated 2026-02-03T00:31:23

2 posts

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01738293; Issue ID: MSV-5922.

thehackerwire@mastodon.social at 2026-02-02T23:28:48.000Z ##

🟠 CVE-2026-20421 - High (7.5)

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. Use...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T23:28:48.000Z ##

🟠 CVE-2026-20421 - High (7.5)

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. Use...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20420
(7.5 HIGH)

EPSS: 0.21%

updated 2026-02-03T00:31:23

2 posts

In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01738313; Issue ID: MSV-5935.

thehackerwire@mastodon.social at 2026-02-02T23:21:36.000Z ##

🟠 CVE-2026-20420 - High (7.5)

In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T23:21:36.000Z ##

🟠 CVE-2026-20420 - High (7.5)

In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-63649
(7.5 HIGH)

EPSS: 0.04%

updated 2026-02-03T00:31:22

2 posts

An out-of-bounds read in the http_parser_transfer_encoding_chunked function (mk_server/mk_http_parser.c) of monkey commit f37e984 allows attackers to cause a Denial of Service (DoS) via sending a crafted POST request to the server.

thehackerwire@mastodon.social at 2026-02-03T00:28:54.000Z ##

🟠 CVE-2025-63649 - High (7.5)

An out-of-bounds read in the http_parser_transfer_encoding_chunked function (mk_server/mk_http_parser.c) of monkey commit f37e984 allows attackers to cause a Denial of Service (DoS) via sending a crafted POST request to the server.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T00:28:54.000Z ##

🟠 CVE-2025-63649 - High (7.5)

An out-of-bounds read in the http_parser_transfer_encoding_chunked function (mk_server/mk_http_parser.c) of monkey commit f37e984 allows attackers to cause a Denial of Service (DoS) via sending a crafted POST request to the server.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20403
(7.5 HIGH)

EPSS: 0.21%

updated 2026-02-03T00:31:22

2 posts

In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01689254 (Note: For N15 and NR16) / MOLY01689259 (Note: For NR17 and NR17R); Issue ID: MSV-4843.

thehackerwire@mastodon.social at 2026-02-03T00:09:34.000Z ##

🟠 CVE-2026-20403 - High (7.5)

In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T00:09:34.000Z ##

🟠 CVE-2026-20403 - High (7.5)

In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20405
(7.5 HIGH)

EPSS: 0.21%

updated 2026-02-03T00:31:22

2 posts

In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01688495; Issue ID: MSV-4818.

thehackerwire@mastodon.social at 2026-02-02T23:29:25.000Z ##

🟠 CVE-2026-20405 - High (7.5)

In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T23:29:25.000Z ##

🟠 CVE-2026-20405 - High (7.5)

In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-71007
(7.5 HIGH)

EPSS: 0.05%

updated 2026-02-03T00:30:18

3 posts

An input validation vulnerability in the oneflow.index_add component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

thehackerwire@mastodon.social at 2026-01-29T20:03:03.000Z ##

🟠 CVE-2025-71007 - High (7.5)

An input validation vulnerability in the oneflow.index_add component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T19:48:09.000Z ##

🟠 CVE-2025-71007 - High (7.5)

An input validation vulnerability in the oneflow.index_add component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T19:47:35.000Z ##

🟠 CVE-2025-71007 - High (7.5)

An input validation vulnerability in the oneflow.index_add component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0599
(7.5 HIGH)

EPSS: 0.08%

updated 2026-02-02T22:07:42

2 posts

A vulnerability in huggingface/text-generation-inference version 3.3.6 allows unauthenticated remote attackers to exploit unbounded external image fetching during input validation in VLM mode. The issue arises when the router scans inputs for Markdown image links and performs a blocking HTTP GET request, reading the entire response body into memory and cloning it before decoding. This behavior can

thehackerwire@mastodon.social at 2026-02-02T11:19:30.000Z ##

🟠 CVE-2026-0599 - High (7.5)

A vulnerability in huggingface/text-generation-inference version 3.3.6 allows unauthenticated remote attackers to exploit unbounded external image fetching during input validation in VLM mode. The issue arises when the router scans inputs for Mark...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T11:19:30.000Z ##

🟠 CVE-2026-0599 - High (7.5)

A vulnerability in huggingface/text-generation-inference version 3.3.6 allows unauthenticated remote attackers to exploit unbounded external image fetching during input validation in VLM mode. The issue arises when the router scans inputs for Mark...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20411
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-02T21:31:27

2 posts

In cameraisp, there is a possible escalation of privilege due to use after free. This could lead to local denial of service if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10351676; Issue ID: MSV-5737.

thehackerwire@mastodon.social at 2026-02-02T19:18:53.000Z ##

🟠 CVE-2026-20411 - High (7.8)

In cameraisp, there is a possible escalation of privilege due to use after free. This could lead to local denial of service if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T19:18:53.000Z ##

🟠 CVE-2026-20411 - High (7.8)

In cameraisp, there is a possible escalation of privilege due to use after free. This could lead to local denial of service if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1530
(8.1 HIGH)

EPSS: 0.02%

updated 2026-02-02T21:02:04

2 posts

A flaw was found in fog-kubevirt. This vulnerability allows a remote attacker to perform a Man-in-the-Middle (MITM) attack due to disabled certificate validation. This enables the attacker to intercept and potentially alter sensitive communications between Satellite and OpenShift, resulting in information disclosure and data integrity compromise.

thehackerwire@mastodon.social at 2026-02-02T06:21:10.000Z ##

🟠 CVE-2026-1530 - High (8.1)

A flaw was found in fog-kubevirt. This vulnerability allows a remote attacker to perform a Man-in-the-Middle (MITM) attack due to disabled certificate validation. This enables the attacker to intercept and potentially alter sensitive communication...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T06:21:10.000Z ##

🟠 CVE-2026-1530 - High (8.1)

A flaw was found in fog-kubevirt. This vulnerability allows a remote attacker to perform a Man-in-the-Middle (MITM) attack due to disabled certificate validation. This enables the attacker to intercept and potentially alter sensitive communication...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22796
(5.3 MEDIUM)

EPSS: 0.07%

updated 2026-02-02T18:40:27.467000

1 posts

Issue summary: A type confusion vulnerability exists in the signature verification of signed PKCS#7 data where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing malformed PKCS#7 data. Impact summary: An application performing signature verification of PKCS#7 data or calling directly the PKCS7_digest_from_attribu

DarkWebInformer@infosec.exchange at 2026-01-29T00:50:43.000Z ##

‼️AISLE Goes 12-for-12 on OpenSSL Vulnerability Detection

CVEs Published: January 27th, 2026

High and Moderate Severity Flaws:

▪️CVE-2025-15467: Stack Buffer Overflow in CMS AuthEnvelopedData Parsing (High): A vulnerability with the potential to enable remote code execution under specific conditions

▪️CVE-2025-11187: PBMAC1 Parameter Validation in PKCS#12 (Moderate): Missing validation that could trigger a stack-based buffer overflow

Low Severity Flaws:

▪️CVE-2025-15468: Crash in QUIC protocol cipher handling
▪️CVE-2025-15469: Silent truncation bug affecting post-quantum signature algorithms (ML-DSA)
▪️CVE-2025-66199: Memory exhaustion via TLS 1.3 certificate compression
▪️CVE-2025-68160: Memory corruption in line-buffering (affects code back to OpenSSL 1.0.2)
▪️CVE-2025-69418: Encryption flaw in OCB mode on hardware-accelerated paths
▪️CVE-2025-69419: Memory corruption in PKCS#12 character encoding
▪️CVE-2025-69420: Crash in TimeStamp Response verification
▪️CVE-2025-69421: Crash in PKCS#12 decryption
▪️CVE-2026-22795: Crash in PKCS#12 parsing
▪️CVE-2026-22796: Crash in PKCS#7 signature verification (affects code back to OpenSSL 1.0.2)

"When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs.

Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."

Writeup: aisle.com/blog/aisle-discovere

##

CVE-2025-11187
(6.1 MEDIUM)

EPSS: 0.01%

updated 2026-02-02T18:39:21.740000

1 posts

Issue summary: PBMAC1 parameters in PKCS#12 files are missing validation which can trigger a stack-based buffer overflow, invalid pointer or NULL pointer dereference during MAC verification. Impact summary: The stack buffer overflow or NULL pointer dereference may cause a crash leading to Denial of Service for an application that parses untrusted PKCS#12 files. The buffer overflow may also potent

DarkWebInformer@infosec.exchange at 2026-01-29T00:50:43.000Z ##

‼️AISLE Goes 12-for-12 on OpenSSL Vulnerability Detection

CVEs Published: January 27th, 2026

High and Moderate Severity Flaws:

▪️CVE-2025-15467: Stack Buffer Overflow in CMS AuthEnvelopedData Parsing (High): A vulnerability with the potential to enable remote code execution under specific conditions

▪️CVE-2025-11187: PBMAC1 Parameter Validation in PKCS#12 (Moderate): Missing validation that could trigger a stack-based buffer overflow

Low Severity Flaws:

▪️CVE-2025-15468: Crash in QUIC protocol cipher handling
▪️CVE-2025-15469: Silent truncation bug affecting post-quantum signature algorithms (ML-DSA)
▪️CVE-2025-66199: Memory exhaustion via TLS 1.3 certificate compression
▪️CVE-2025-68160: Memory corruption in line-buffering (affects code back to OpenSSL 1.0.2)
▪️CVE-2025-69418: Encryption flaw in OCB mode on hardware-accelerated paths
▪️CVE-2025-69419: Memory corruption in PKCS#12 character encoding
▪️CVE-2025-69420: Crash in TimeStamp Response verification
▪️CVE-2025-69421: Crash in PKCS#12 decryption
▪️CVE-2026-22795: Crash in PKCS#12 parsing
▪️CVE-2026-22796: Crash in PKCS#7 signature verification (affects code back to OpenSSL 1.0.2)

"When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs.

Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."

Writeup: aisle.com/blog/aisle-discovere

##

CVE-2025-15468
(5.9 MEDIUM)

EPSS: 0.05%

updated 2026-02-02T18:38:00.947000

1 posts

Issue summary: If an application using the SSL_CIPHER_find() function in a QUIC protocol client or server receives an unknown cipher suite from the peer, a NULL dereference occurs. Impact summary: A NULL pointer dereference leads to abnormal termination of the running process causing Denial of Service. Some applications call SSL_CIPHER_find() from the client_hello_cb callback on the cipher ID re

DarkWebInformer@infosec.exchange at 2026-01-29T00:50:43.000Z ##

‼️AISLE Goes 12-for-12 on OpenSSL Vulnerability Detection

CVEs Published: January 27th, 2026

High and Moderate Severity Flaws:

▪️CVE-2025-15467: Stack Buffer Overflow in CMS AuthEnvelopedData Parsing (High): A vulnerability with the potential to enable remote code execution under specific conditions

▪️CVE-2025-11187: PBMAC1 Parameter Validation in PKCS#12 (Moderate): Missing validation that could trigger a stack-based buffer overflow

Low Severity Flaws:

▪️CVE-2025-15468: Crash in QUIC protocol cipher handling
▪️CVE-2025-15469: Silent truncation bug affecting post-quantum signature algorithms (ML-DSA)
▪️CVE-2025-66199: Memory exhaustion via TLS 1.3 certificate compression
▪️CVE-2025-68160: Memory corruption in line-buffering (affects code back to OpenSSL 1.0.2)
▪️CVE-2025-69418: Encryption flaw in OCB mode on hardware-accelerated paths
▪️CVE-2025-69419: Memory corruption in PKCS#12 character encoding
▪️CVE-2025-69420: Crash in TimeStamp Response verification
▪️CVE-2025-69421: Crash in PKCS#12 decryption
▪️CVE-2026-22795: Crash in PKCS#12 parsing
▪️CVE-2026-22796: Crash in PKCS#7 signature verification (affects code back to OpenSSL 1.0.2)

"When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs.

Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."

Writeup: aisle.com/blog/aisle-discovere

##

CVE-2025-68160
(4.7 MEDIUM)

EPSS: 0.01%

updated 2026-02-02T18:36:57.727000

1 posts

Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write. Impact summary: This out-of-bounds write can cause memory corruption which typically results in a crash, leading to Denial of Service for an application. The line-buffering BIO filter (BIO_f_linebuffer) is not used

DarkWebInformer@infosec.exchange at 2026-01-29T00:50:43.000Z ##

‼️AISLE Goes 12-for-12 on OpenSSL Vulnerability Detection

CVEs Published: January 27th, 2026

High and Moderate Severity Flaws:

▪️CVE-2025-15467: Stack Buffer Overflow in CMS AuthEnvelopedData Parsing (High): A vulnerability with the potential to enable remote code execution under specific conditions

▪️CVE-2025-11187: PBMAC1 Parameter Validation in PKCS#12 (Moderate): Missing validation that could trigger a stack-based buffer overflow

Low Severity Flaws:

▪️CVE-2025-15468: Crash in QUIC protocol cipher handling
▪️CVE-2025-15469: Silent truncation bug affecting post-quantum signature algorithms (ML-DSA)
▪️CVE-2025-66199: Memory exhaustion via TLS 1.3 certificate compression
▪️CVE-2025-68160: Memory corruption in line-buffering (affects code back to OpenSSL 1.0.2)
▪️CVE-2025-69418: Encryption flaw in OCB mode on hardware-accelerated paths
▪️CVE-2025-69419: Memory corruption in PKCS#12 character encoding
▪️CVE-2025-69420: Crash in TimeStamp Response verification
▪️CVE-2025-69421: Crash in PKCS#12 decryption
▪️CVE-2026-22795: Crash in PKCS#12 parsing
▪️CVE-2026-22796: Crash in PKCS#7 signature verification (affects code back to OpenSSL 1.0.2)

"When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs.

Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."

Writeup: aisle.com/blog/aisle-discovere

##

CVE-2025-69418
(4.0 MEDIUM)

EPSS: 0.01%

updated 2026-02-02T18:36:03.557000

1 posts

Issue summary: When using the low-level OCB API directly with AES-NI or<br>other hardware-accelerated code paths, inputs whose length is not a multiple<br>of 16 bytes can leave the final partial block unencrypted and unauthenticated.<br><br>Impact summary: The trailing 1-15 bytes of a message may be exposed in<br>cleartext on encryption and are not covered by the authentication tag,<br>allowing an

DarkWebInformer@infosec.exchange at 2026-01-29T00:50:43.000Z ##

‼️AISLE Goes 12-for-12 on OpenSSL Vulnerability Detection

CVEs Published: January 27th, 2026

High and Moderate Severity Flaws:

▪️CVE-2025-15467: Stack Buffer Overflow in CMS AuthEnvelopedData Parsing (High): A vulnerability with the potential to enable remote code execution under specific conditions

▪️CVE-2025-11187: PBMAC1 Parameter Validation in PKCS#12 (Moderate): Missing validation that could trigger a stack-based buffer overflow

Low Severity Flaws:

▪️CVE-2025-15468: Crash in QUIC protocol cipher handling
▪️CVE-2025-15469: Silent truncation bug affecting post-quantum signature algorithms (ML-DSA)
▪️CVE-2025-66199: Memory exhaustion via TLS 1.3 certificate compression
▪️CVE-2025-68160: Memory corruption in line-buffering (affects code back to OpenSSL 1.0.2)
▪️CVE-2025-69418: Encryption flaw in OCB mode on hardware-accelerated paths
▪️CVE-2025-69419: Memory corruption in PKCS#12 character encoding
▪️CVE-2025-69420: Crash in TimeStamp Response verification
▪️CVE-2025-69421: Crash in PKCS#12 decryption
▪️CVE-2026-22795: Crash in PKCS#12 parsing
▪️CVE-2026-22796: Crash in PKCS#7 signature verification (affects code back to OpenSSL 1.0.2)

"When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs.

Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."

Writeup: aisle.com/blog/aisle-discovere

##

CVE-2026-20412
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-02T18:32:35

2 posts

In cameraisp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10351676; Issue ID: MSV-5733.

thehackerwire@mastodon.social at 2026-02-02T18:18:27.000Z ##

🟠 CVE-2026-20412 - High (7.8)

In cameraisp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T18:18:27.000Z ##

🟠 CVE-2026-20412 - High (7.8)

In cameraisp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24070
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-02T18:32:35

2 posts

During the installation of the Native Access application, a privileged helper `com.native-instruments.NativeAccess.Helper2`, which is used by Native Access to trigger functions via XPC communication like copy-file, remove or set-permissions, is deployed as well. The communication with the XPC service of the privileged helper is only allowed if the client process is signed with the corresponding ce

thehackerwire@mastodon.social at 2026-02-02T18:18:18.000Z ##

🟠 CVE-2026-24070 - High (8.8)

During the installation of the Native Access application, a privileged helper `com.native-instruments.NativeAccess.Helper2`, which is used by Native Access to trigger functions via XPC communication like copy-file, remove or set-permissions, is de...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T18:18:18.000Z ##

🟠 CVE-2026-24070 - High (8.8)

During the installation of the Native Access application, a privileged helper `com.native-instruments.NativeAccess.Helper2`, which is used by Native Access to trigger functions via XPC communication like copy-file, remove or set-permissions, is de...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69421
(7.5 HIGH)

EPSS: 0.06%

updated 2026-02-02T18:32:35

1 posts

Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function. Impact summary: A NULL pointer dereference can trigger a crash which leads to Denial of Service for an application processing PKCS#12 files. The PKCS12_item_decrypt_d2i_ex() function does not check whether the oct parameter is NULL before dereferencing it. When

DarkWebInformer@infosec.exchange at 2026-01-29T00:50:43.000Z ##

‼️AISLE Goes 12-for-12 on OpenSSL Vulnerability Detection

CVEs Published: January 27th, 2026

High and Moderate Severity Flaws:

▪️CVE-2025-15467: Stack Buffer Overflow in CMS AuthEnvelopedData Parsing (High): A vulnerability with the potential to enable remote code execution under specific conditions

▪️CVE-2025-11187: PBMAC1 Parameter Validation in PKCS#12 (Moderate): Missing validation that could trigger a stack-based buffer overflow

Low Severity Flaws:

▪️CVE-2025-15468: Crash in QUIC protocol cipher handling
▪️CVE-2025-15469: Silent truncation bug affecting post-quantum signature algorithms (ML-DSA)
▪️CVE-2025-66199: Memory exhaustion via TLS 1.3 certificate compression
▪️CVE-2025-68160: Memory corruption in line-buffering (affects code back to OpenSSL 1.0.2)
▪️CVE-2025-69418: Encryption flaw in OCB mode on hardware-accelerated paths
▪️CVE-2025-69419: Memory corruption in PKCS#12 character encoding
▪️CVE-2025-69420: Crash in TimeStamp Response verification
▪️CVE-2025-69421: Crash in PKCS#12 decryption
▪️CVE-2026-22795: Crash in PKCS#12 parsing
▪️CVE-2026-22796: Crash in PKCS#7 signature verification (affects code back to OpenSSL 1.0.2)

"When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs.

Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."

Writeup: aisle.com/blog/aisle-discovere

##

CVE-2025-47359
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-02T18:31:39

2 posts

Memory Corruption when multiple threads simultaneously access a memory free API.

thehackerwire@mastodon.social at 2026-02-02T16:59:53.000Z ##

🟠 CVE-2025-47359 - High (7.8)

Memory Corruption when multiple threads simultaneously access a memory free API.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T16:59:53.000Z ##

🟠 CVE-2025-47359 - High (7.8)

Memory Corruption when multiple threads simultaneously access a memory free API.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-47398
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-02T18:31:39

2 posts

Memory Corruption while deallocating graphics processing unit memory buffers due to improper handling of memory pointers.

thehackerwire@mastodon.social at 2026-02-02T16:18:29.000Z ##

🟠 CVE-2025-47398 - High (7.8)

Memory Corruption while deallocating graphics processing unit memory buffers due to improper handling of memory pointers.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T16:18:29.000Z ##

🟠 CVE-2025-47398 - High (7.8)

Memory Corruption while deallocating graphics processing unit memory buffers due to improper handling of memory pointers.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-47397
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-02T18:31:39

2 posts

Memory Corruption when initiating GPU memory mapping using scatter-gather lists due to unchecked IOMMU mapping errors.

thehackerwire@mastodon.social at 2026-02-02T16:18:21.000Z ##

🟠 CVE-2025-47397 - High (7.8)

Memory Corruption when initiating GPU memory mapping using scatter-gather lists due to unchecked IOMMU mapping errors.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T16:18:21.000Z ##

🟠 CVE-2025-47397 - High (7.8)

Memory Corruption when initiating GPU memory mapping using scatter-gather lists due to unchecked IOMMU mapping errors.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-14914
(7.7 HIGH)

EPSS: 0.04%

updated 2026-02-02T18:31:38

2 posts

IBM WebSphere Application Server Liberty 17.0.0.3 through 26.0.0.1 could allow a privileged user to upload a zip archive containing path traversal sequences resulting in an overwrite of files leading to arbitrary code execution.

thehackerwire@mastodon.social at 2026-02-02T17:00:02.000Z ##

🟠 CVE-2025-14914 - High (7.6)

IBM WebSphere Application Server Liberty 17.0.0.3 through 26.0.0.1 could allow a privileged user to upload a zip archive containing path traversal sequences resulting in an overwrite of files leading to arbitrary code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T17:00:02.000Z ##

🟠 CVE-2025-14914 - High (7.6)

IBM WebSphere Application Server Liberty 17.0.0.3 through 26.0.0.1 could allow a privileged user to upload a zip archive containing path traversal sequences resulting in an overwrite of files leading to arbitrary code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-13986
(4.2 MEDIUM)

EPSS: 0.04%

updated 2026-02-02T18:16:11.883000

1 posts

Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal Disable Login Page allows Functionality Bypass.This issue affects Disable Login Page: from 0.0.0 before 1.1.3.

thehackerwire@mastodon.social at 2026-01-29T19:48:27.000Z ##

🟠 CVE-2025-13986 - High (7.5)

Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal Disable Login Page allows Functionality Bypass.This issue affects Disable Login Page: from 0.0.0 before 1.1.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1637
(8.8 HIGH)

EPSS: 0.02%

updated 2026-02-02T17:16:17.223000

1 posts

A vulnerability was identified in Tenda AC21 16.03.08.16. The affected element is the function fromAdvSetMacMtuWan of the file /goform/AdvSetMacMtuWan. The manipulation leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

thehackerwire@mastodon.social at 2026-01-29T23:52:08.000Z ##

🟠 CVE-2026-1637 - High (8.8)

A vulnerability was identified in Tenda AC21 16.03.08.16. The affected element is the function fromAdvSetMacMtuWan of the file /goform/AdvSetMacMtuWan. The manipulation leads to stack-based buffer overflow. Remote exploitation of the attack is pos...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1761
(8.6 HIGH)

EPSS: 0.14%

updated 2026-02-02T15:30:44

2 posts

A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart HTTP response, which can lead to memory corruption. This issue may result in application crashes or arbitrary code execution in applications that process

thehackerwire@mastodon.social at 2026-02-02T14:19:03.000Z ##

🟠 CVE-2026-1761 - High (8.6)

A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart H...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T14:19:03.000Z ##

🟠 CVE-2026-1761 - High (8.6)

A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart H...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20418
(8.8 HIGH)

EPSS: 0.21%

updated 2026-02-02T15:30:34

4 posts

In Thread, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00465153; Issue ID: MSV-4927.

thehackerwire@mastodon.social at 2026-02-02T15:19:26.000Z ##

🟠 CVE-2026-20418 - High (8.8)

In Thread, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR004...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T14:19:13.000Z ##

🟠 CVE-2026-20418 - High (8.8)

In Thread, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR004...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T15:19:26.000Z ##

🟠 CVE-2026-20418 - High (8.8)

In Thread, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR004...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T14:19:13.000Z ##

🟠 CVE-2026-20418 - High (8.8)

In Thread, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR004...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-8587
(8.6 HIGH)

EPSS: 0.01%

updated 2026-02-02T15:30:34

2 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in AKCE Software Technology R&D Industry and Trade Inc. SKSPro allows SQL Injection.This issue affects SKSPro: through 07012026.

thehackerwire@mastodon.social at 2026-02-02T13:17:37.000Z ##

🟠 CVE-2025-8587 - High (8.6)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in AKCE Software Technology R&D Industry and Trade Inc. SKSPro allows SQL Injection.This issue affects SKSPro: through 07012026.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T13:17:37.000Z ##

🟠 CVE-2025-8587 - High (8.6)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in AKCE Software Technology R&D Industry and Trade Inc. SKSPro allows SQL Injection.This issue affects SKSPro: through 07012026.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-61140(CVSS UNKNOWN)

EPSS: 0.06%

updated 2026-02-02T14:09:07

1 posts

The value function in jsonpath 1.1.1 lib/index.js is vulnerable to Prototype Pollution.

thehackerwire@mastodon.social at 2026-01-29T17:02:39.000Z ##

🔴 CVE-2025-61140 - Critical (9.8)

The value function in jsonpath 1.1.1 lib/index.js is vulnerable to Prototype Pollution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-46691
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-02T09:31:33

1 posts

Dell PremierColor Panel Driver, versions prior to 1.0.0.1 A01, contains an Improper Access Control vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.

thehackerwire@mastodon.social at 2026-01-28T20:58:33.000Z ##

🟠 CVE-2025-46691 - High (7.8)

Dell PremierColor Panel Driver, versions prior to 1.0.0.1 A01, contains an Improper Access Control vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25200
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-02-02T06:30:53

2 posts

A vulnerability in MagicInfo9 Server allows authorized users to upload HTML files without authentication, leading to Stored XSS, which can result in account takeover This issue affects MagicINFO 9 Server: less than 21.1090.1.

thehackerwire@mastodon.social at 2026-02-02T05:23:46.000Z ##

🔴 CVE-2026-25200 - Critical (9.8)

A vulnerability in MagicInfo9 Server allows authorized users to upload HTML files without authentication, leading to Stored XSS, which can result in account takeover

This issue affects MagicINFO 9 Server: less than 21.1090.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T05:23:46.000Z ##

🔴 CVE-2026-25200 - Critical (9.8)

A vulnerability in MagicInfo9 Server allows authorized users to upload HTML files without authentication, leading to Stored XSS, which can result in account takeover

This issue affects MagicINFO 9 Server: less than 21.1090.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25202
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-02-02T06:30:53

2 posts

The database account and password are hardcoded, allowing login with the account to manipulate the database in MagicInfo9 Server.This issue affects MagicINFO 9 Server: less than 21.1090.1.

thehackerwire@mastodon.social at 2026-02-02T05:23:26.000Z ##

🔴 CVE-2026-25202 - Critical (9.8)

The database account and password are hardcoded, allowing login with the account to manipulate the database in MagicInfo9 Server.This issue affects MagicINFO 9 Server: less than 21.1090.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T05:23:26.000Z ##

🔴 CVE-2026-25202 - Critical (9.8)

The database account and password are hardcoded, allowing login with the account to manipulate the database in MagicInfo9 Server.This issue affects MagicINFO 9 Server: less than 21.1090.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69662
(8.6 HIGH)

EPSS: 0.03%

updated 2026-02-01T18:09:11

1 posts

SQL injection vulnerability in geopandas before v.1.1.2 allows an attacker to obtain sensitive information via the to_postgis()` function being used to write GeoDataFrames to a PostgreSQL database.

thehackerwire@mastodon.social at 2026-01-30T20:19:18.000Z ##

🟠 CVE-2025-69662 - High (8.6)

SQL injection vulnerability in geopandas before v.1.1.2 allows an attacker to obtain sensitive information via the to_postgis()` function being used to write GeoDataFrames to a PostgreSQL database.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-62348
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-01T18:07:49

1 posts

Salt's junos execution module contained an unsafe YAML decode/load usage. A specially crafted YAML payload processed by the junos module could lead to unintended code execution under the context of the Salt process.

thehackerwire@mastodon.social at 2026-01-30T19:17:48.000Z ##

🟠 CVE-2025-62348 - High (7.8)

Salt's junos execution module contained an unsafe YAML decode/load usage. A specially crafted YAML payload processed by the junos module could lead to unintended code execution under the context of the Salt process.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25130
(9.7 CRITICAL)

EPSS: 0.08%

updated 2026-01-31T03:53:47

1 posts

## Summary The CAI (Cybersecurity AI) framework contains multiple argument injection vulnerabilities in its function tools. User-controlled input is passed directly to shell commands via `subprocess.Popen()` with `shell=True`, allowing attackers to execute arbitrary commands on the host system. ## Vulnerable Component **Function:** `find_file()` in `src/cai/tools/reconnaissance/filesystem.py`

thehackerwire@mastodon.social at 2026-01-30T21:18:26.000Z ##

🔴 CVE-2026-25130 - Critical (9.6)

Cybersecurity AI (CAI) is a framework for AI Security. In versions up to and including 0.5.10, the CAI (Cybersecurity AI) framework contains multiple argument injection vulnerabilities in its function tools. User-controlled input is passed directl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25153
(7.7 HIGH)

EPSS: 0.05%

updated 2026-01-30T22:15:56.343000

1 posts

Backstage is an open framework for building developer portals, and @backstage/plugin-techdocs-node provides common node.js functionalities for TechDocs. In versions of @backstage/plugin-techdocs-node prior to 1.13.11 and 1.14.1, when TechDocs is configured with `runIn: local`, a malicious actor who can submit or modify a repository's `mkdocs.yml` file can execute arbitrary Python code on the TechD

thehackerwire@mastodon.social at 2026-01-30T22:22:29.000Z ##

🟠 CVE-2026-25153 - High (7.7)

Backstage is an open framework for building developer portals, and @backstage/plugin-techdocs-node provides common node.js functionalities for TechDocs. In versions of @backstage/plugin-techdocs-node prior to 1.13.11 and 1.14.1, when TechDocs is c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1723(CVSS UNKNOWN)

EPSS: 1.18%

updated 2026-01-30T21:30:28

1 posts

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in TOTOLINK X6000R allows OS Command Injection.This issue affects X6000R: through V9.4.0cu.1498_B20250826.

secdb at 2026-02-02T00:00:51.856Z ##

📈 CVE Published in last 7 days (2026-01-26 - 2026-02-02)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 860

Severity:
- Critical: 96
- High: 295
- Medium: 375
- Low: 18
- None: 76

Status:
- : 6
- Analyzed: 70
- Awaiting Analysis: 299
- Modified: 1
- Received: 245
- Rejected: 18
- Undergoing Analysis: 221

Top CNAs:
- VulnCheck: 171
- GitHub, Inc.: 128
- VulDB: 74
- MITRE: 61
- Government Technology Agency of Singapore Cyber Security Group (GovTech CSG): 48
- Wordfence: 43
- kernel.org: 38
- Spanish National Cybersecurity Institute, S.A. (INCIBE): 28
- SEC Consult Vulnerability Lab: 20
- IBM Corporation: 18

Top Affected Products:
- UNKNOWN: 771
- Discourse: 13
- Flexense Disk Pulse Enterprise: 11
- Flexense Sync Breeze Enterprise Server: 11
- Tenda W30e Firmware: 10
- Oisf Suricata: 7
- Pnpm: 5
- Gpac: 4
- Fabian Online Examination System: 3
- Sangfor Operation And Maintenance Security Management System: 3

Top EPSS Score:
- CVE-2016-15057 - 32.46 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1281 - 14.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24858 - 3.14 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21509 - 2.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1547 - 2.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1601 - 2.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1687 - 1.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1689 - 1.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1723 - 0.94 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-40551 - 0.87 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2025-68662
(7.6 HIGH)

EPSS: 0.04%

updated 2026-01-30T20:44:48.133000

1 posts

Discourse is an open source discussion platform. In versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0, a hostname validation issue in FinalDestination could allow bypassing SSRF protections under certain conditions. This issue is patched in versions 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0. No known workarounds are available.

thehackerwire@mastodon.social at 2026-01-28T20:58:24.000Z ##

🟠 CVE-2025-68662 - High (7.6)

Discourse is an open source discussion platform. In versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0, a hostname validation issue in FinalDestination could allow bypassing SSRF protections under certain conditions. This issue is patched...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-51958
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-01-30T19:16:10.557000

1 posts

aelsantex runcommand 2014-04-01, a plugin for DokuWiki, allows unauthenticated attackers to execute arbitrary system commands via lib/plugins/runcommand/postaction.php.

thehackerwire@mastodon.social at 2026-01-30T19:17:38.000Z ##

🔴 CVE-2025-51958 - Critical (9.8)

aelsantex runcommand 2014-04-01, a plugin for DokuWiki, allows unauthenticated attackers to execute arbitrary system commands via lib/plugins/runcommand/postaction.php.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1687
(7.3 HIGH)

EPSS: 1.93%

updated 2026-01-30T18:31:21

1 posts

A weakness has been identified in Tenda HG10 US_HG7_HG9_HG10re_300001138_en_xpon. Impacted is an unknown function of the file /boaform/formSamba of the component Boa Webserver. Executing a manipulation of the argument serverString can lead to command injection. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks.

secdb at 2026-02-02T00:00:51.856Z ##

📈 CVE Published in last 7 days (2026-01-26 - 2026-02-02)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 860

Severity:
- Critical: 96
- High: 295
- Medium: 375
- Low: 18
- None: 76

Status:
- : 6
- Analyzed: 70
- Awaiting Analysis: 299
- Modified: 1
- Received: 245
- Rejected: 18
- Undergoing Analysis: 221

Top CNAs:
- VulnCheck: 171
- GitHub, Inc.: 128
- VulDB: 74
- MITRE: 61
- Government Technology Agency of Singapore Cyber Security Group (GovTech CSG): 48
- Wordfence: 43
- kernel.org: 38
- Spanish National Cybersecurity Institute, S.A. (INCIBE): 28
- SEC Consult Vulnerability Lab: 20
- IBM Corporation: 18

Top Affected Products:
- UNKNOWN: 771
- Discourse: 13
- Flexense Disk Pulse Enterprise: 11
- Flexense Sync Breeze Enterprise Server: 11
- Tenda W30e Firmware: 10
- Oisf Suricata: 7
- Pnpm: 5
- Gpac: 4
- Fabian Online Examination System: 3
- Sangfor Operation And Maintenance Security Management System: 3

Top EPSS Score:
- CVE-2016-15057 - 32.46 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1281 - 14.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24858 - 3.14 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21509 - 2.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1547 - 2.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1601 - 2.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1687 - 1.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1689 - 1.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1723 - 0.94 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-40551 - 0.87 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-1686
(8.8 HIGH)

EPSS: 0.14%

updated 2026-01-30T18:31:21

2 posts

A security flaw has been discovered in Totolink A3600R 5.9c.4959. This issue affects the function setAppEasyWizardConfig in the library /lib/cste_modules/app.so. Performing a manipulation of the argument apcliSsid results in buffer overflow. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks.

thehackerwire@mastodon.social at 2026-01-30T16:22:15.000Z ##

🟠 CVE-2026-1686 - High (8.8)

A security flaw has been discovered in Totolink A3600R 5.9c.4959. This issue affects the function setAppEasyWizardConfig in the library /lib/cste_modules/app.so. Performing a manipulation of the argument apcliSsid results in buffer overflow. It is...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-30T16:17:22.000Z ##

🟠 CVE-2026-1686 - High (8.8)

A security flaw has been discovered in Totolink A3600R 5.9c.4959. This issue affects the function setAppEasyWizardConfig in the library /lib/cste_modules/app.so. Performing a manipulation of the argument apcliSsid results in buffer overflow. It is...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1689
(7.3 HIGH)

EPSS: 1.93%

updated 2026-01-30T17:16:13.783000

1 posts

A vulnerability was detected in Tenda HG10 US_HG7_HG9_HG10re_300001138_en_xpon. The impacted element is the function checkUserFromLanOrWan of the file /boaform/admin/formLogin of the component Login Interface. The manipulation of the argument Host results in command injection. The attack can be launched remotely. The exploit is now public and may be used.

secdb at 2026-02-02T00:00:51.856Z ##

📈 CVE Published in last 7 days (2026-01-26 - 2026-02-02)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 860

Severity:
- Critical: 96
- High: 295
- Medium: 375
- Low: 18
- None: 76

Status:
- : 6
- Analyzed: 70
- Awaiting Analysis: 299
- Modified: 1
- Received: 245
- Rejected: 18
- Undergoing Analysis: 221

Top CNAs:
- VulnCheck: 171
- GitHub, Inc.: 128
- VulDB: 74
- MITRE: 61
- Government Technology Agency of Singapore Cyber Security Group (GovTech CSG): 48
- Wordfence: 43
- kernel.org: 38
- Spanish National Cybersecurity Institute, S.A. (INCIBE): 28
- SEC Consult Vulnerability Lab: 20
- IBM Corporation: 18

Top Affected Products:
- UNKNOWN: 771
- Discourse: 13
- Flexense Disk Pulse Enterprise: 11
- Flexense Sync Breeze Enterprise Server: 11
- Tenda W30e Firmware: 10
- Oisf Suricata: 7
- Pnpm: 5
- Gpac: 4
- Fabian Online Examination System: 3
- Sangfor Operation And Maintenance Security Management System: 3

Top EPSS Score:
- CVE-2016-15057 - 32.46 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1281 - 14.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24858 - 3.14 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21509 - 2.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1547 - 2.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1601 - 2.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1687 - 1.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1689 - 1.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1723 - 0.94 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-40551 - 0.87 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-25128
(7.5 HIGH)

EPSS: 0.07%

updated 2026-01-30T16:16:14.123000

1 posts

fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. In versions 4.3.6 through 5.3.3, a RangeError vulnerability exists in the numeric entity processing of fast-xml-parser when parsing XML with out-of-range entity code points (e.g., `&#9999999;` or `&#xFFFFFF;`). This causes the parser to throw an uncaught

thehackerwire@mastodon.social at 2026-01-30T16:17:08.000Z ##

🟠 CVE-2026-25128 - High (7.5)

fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. In versions 4.3.6 through 5.3.3, a RangeError vulnerability exists in the numeric entity processing of...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-4686
(8.6 HIGH)

EPSS: 0.03%

updated 2026-01-30T16:16:11.007000

2 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Kodmatic Computer Software Tourism Construction Industry and Trade Ltd. Co. Online Exam and Assessment allows SQL Injection.This issue affects Online Exam and Assessment: through 30012026.  NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

1 repos

https://github.com/sahici/CVE-2025-4686

thehackerwire@mastodon.social at 2026-01-30T16:17:28.000Z ##

🟠 CVE-2025-4686 - High (8.6)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Kodmatic Computer Software Tourism Construction Industry and Trade Ltd. Co. Online Exam and Assessment allows SQL Injection.This issue affects On...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-30T16:16:48.000Z ##

🟠 CVE-2025-4686 - High (8.6)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Kodmatic Computer Software Tourism Construction Industry and Trade Ltd. Co. Online Exam and Assessment allows SQL Injection.This issue affects On...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24061
(9.8 CRITICAL)

EPSS: 29.55%

updated 2026-01-30T13:28:59.293000

5 posts

telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable.

Nuclei template

55 repos

https://github.com/Lingzesec/CVE-2026-24061-GUI

https://github.com/monstertsl/CVE-2026-24061

https://github.com/Good123321-bot/CVE-2026-24061-POC

https://github.com/leonjza/inetutils-telnetd-auth-bypass

https://github.com/TryA9ain/CVE-2026-24061

https://github.com/franckferman/CVE_2026_24061_PoC

https://github.com/yanxinwu946/CVE-2026-24061--telnetd

https://github.com/BrainBob/CVE-2026-24061

https://github.com/balgan/CVE-2026-24061

https://github.com/xuemian168/CVE-2026-24061

https://github.com/dotelpenguin/telnetd_CVE-2026-24061_tester

https://github.com/cyberpoul/CVE-2026-24061-POC

https://github.com/cumakurt/tscan

https://github.com/JayGLXR/CVE-2026-24061-POC

https://github.com/androidteacher/CVE-2026-24061-PoC-Telnetd

https://github.com/Mefhika120/Ashwesker-CVE-2026-24061

https://github.com/SeptembersEND/CVE--2026-24061

https://github.com/punitdarji/telnetd-cve-2026-24061

https://github.com/ms0x08-dev/CVE-2026-24061-POC

https://github.com/infat0x/CVE-2026-24061

https://github.com/Moxxic1/Tell-Me-Root

https://github.com/Chocapikk/CVE-2026-24061

https://github.com/midox008/CVE-2026-24061

https://github.com/FurkanKAYAPINAR/CVE-2026-24061-telnet2root

https://github.com/0xXyc/telnet-inetutils-auth-bypass-CVE-2026-24061

https://github.com/Gabs-hub/CVE-2026-24061_Lab

https://github.com/novitahk/Exploit-CVE-2026-24061

https://github.com/duy-31/CVE-2026-24061---telnetd

https://github.com/z3n70/CVE-2026-24061

https://github.com/hackingyseguridad/root

https://github.com/Good123321-bot/good123321-bot.github.io

https://github.com/DeadlyHollows/CVE-2026-24061-setup

https://github.com/Mr-Zapi/CVE-2026-24061

https://github.com/0x7556/CVE-2026-24061

https://github.com/Alter-N0X/CVE-2026-24061-POC

https://github.com/Parad0x7e/CVE-2026-24061

https://github.com/X-croot/CVE-2026-24061_POC

https://github.com/Moxxic1/moxxic1.github.io

https://github.com/ridpath/Terrminus-CVE-2026-2406

https://github.com/h3athen/CVE-2026-24061

https://github.com/SystemVll/CVE-2026-24061

https://github.com/hilwa24/CVE-2026-24061

https://github.com/m3ngx1ng/cve_2026_24061_cli

https://github.com/typeconfused/CVE-2026-24061

https://github.com/madfxr/Twenty-Three-Scanner

https://github.com/XsanFlip/CVE-2026-24061-Scanner

https://github.com/SafeBreach-Labs/CVE-2026-24061

https://github.com/ibrahmsql/CVE-2026-24061-PoC

https://github.com/LucasPDiniz/CVE-2026-24061

https://github.com/BrainBob/Telnet-TestVuln-CVE-2026-24061

https://github.com/Ali-brarou/telnest

https://github.com/MY0723/GNU-Inetutils-telnet-CVE-2026-24061-

https://github.com/r00tuser111/CVE-2026-24061

https://github.com/buzz075/CVE-2026-24061

https://github.com/parameciumzhang/Tell-Me-Root

const_data@mastodon.social at 2026-02-02T19:16:33.000Z ##

#infosec #linux #vulnerability

Un fallo de seguridad (exploit) encontrado recientemente expuso casi 800.000 servicios a Telnet a nivel mundial.

Según la Base de Datos de Vulnerabilidad Nacional (NVD) el exploit CVE-2026-24061 afecta a las versiones 1.9.3 a 2.7.

Estás versiones permiten al cliente pasar un valor de la variable de entorno USER al servidor e iniciar sesión como usuario root omitiendo la autenticación.

1/2

##

blackvoid@mastodon.social at 2026-01-30T09:05:59.000Z ##

New #synology #DSM Version: 7.3.2-86009 Update 1 is out.

This is a security patch:

Fixed Issues
- Fixed a security vulnerability regarding telnetd (CVE-2026-24061).

synology.com/en-global/release

#selfhosting #selfhosted #homelab

##

benzogaga33@mamot.fr at 2026-01-29T16:40:03.000Z ##

Un accès root en une seule commande : cette faille dans GNU InetUtils menace les accès Telnet it-connect.fr/faille-cve-2026- #ActuCybersécurité #Cybersécurité #Vulnérabilité

##

hackmag@infosec.exchange at 2026-01-29T05:00:10.000Z ##

⚪ 800,000 Telnet servers are vulnerable to remote attacks

🗨️ Shadowserver Foundation analysts are tracking nearly 800,000 IP addresses amid the active exploitation of a critical vulnerability, CVE-2026-24061, in the GNU InetUtils telnetd server component.

🔗 hackmag.com/news/telnetd?utm_s

#news

##

stux@mstdn.social at 2026-01-28T20:25:37.000Z ##

Nearly 800,000 #Telnet servers exposed to remote attacks

The security flaw (CVE-2026-24061) already has a proof-of-concept exploit, impacts GNU InetUtils versions 1.9.3 (released in 2015) through 2.7, and was patched in version 2.8 (released on January 20).

bleepingcomputer.com/news/secu

##

CVE-2026-0709
(7.2 HIGH)

EPSS: 0.01%

updated 2026-01-30T12:31:26

1 posts

Some Hikvision Wireless Access Points are vulnerable to authenticated command execution due to insufficient input validation. Attackers with valid credentials can exploit this flaw by sending crafted packets containing malicious commands to affected devices, leading to arbitrary command execution.

undercodenews@mastodon.social at 2026-02-03T11:07:10.000Z ##

Hikvision Wireless Access Points Vulnerability Exposes Networks to Remote Command Execution

Hikvision has recently revealed a critical security flaw affecting several models of its wireless access points, putting organizations at risk of remote command execution attacks. The vulnerability, officially tracked as CVE-2026-0709, allows authenticated attackers to send malicious commands to compromised devices, potentially gaining full control over the network…

undercodenews.com/hikvision-wi

##

CVE-2026-1699
(10.0 CRITICAL)

EPSS: 0.03%

updated 2026-01-30T12:31:26

1 posts

In the Eclipse Theia Website repository, the GitHub Actions workflow .github/workflows/preview.yml used pull_request_target trigger while checking out and executing untrusted pull request code. This allowed any GitHub user to execute arbitrary code in the repository's CI environment with access to repository secrets and a GITHUB_TOKEN with extensive write permissions (contents:write, packages:writ

thehackerwire@mastodon.social at 2026-01-30T10:35:40.000Z ##

🔴 CVE-2026-1699 - Critical (10)

In the Eclipse Theia Website repository, the GitHub Actions workflow .github/workflows/preview.yml used pull_request_target trigger while checking out and executing untrusted pull request code. This allowed any GitHub user to execute arbitrary cod...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22277
(7.8 HIGH)

EPSS: 0.06%

updated 2026-01-30T09:31:01

1 posts

Dell UnityVSA, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary command execution with root privileges.

thehackerwire@mastodon.social at 2026-01-30T10:00:24.000Z ##

🟠 CVE-2026-22277 - High (7.8)

Dell UnityVSA, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerabili...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-1395
(8.2 HIGH)

EPSS: 0.03%

updated 2026-01-30T09:31:00

1 posts

Generation of Error Message Containing Sensitive Information vulnerability in Codriapp Innovation and Software Technologies Inc. HeyGarson allows Fuzzing for application mapping.This issue affects HeyGarson: through 30012026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

thehackerwire@mastodon.social at 2026-01-30T10:00:46.000Z ##

🟠 CVE-2025-1395 - High (8.2)

Generation of Error Message Containing Sensitive Information vulnerability in Codriapp Innovation and Software Technologies Inc. HeyGarson allows Fuzzing for application mapping.This issue affects HeyGarson: through 30012026.

NOTE: The vendor was...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0805
(8.2 HIGH)

EPSS: 0.11%

updated 2026-01-30T09:30:54

1 posts

An input neutralization vulnerability in the Backup Configuration component of Crafty Controller allows a remote, authenticated attacker to perform file tampering and remote code execution via path traversal.

thehackerwire@mastodon.social at 2026-01-30T07:24:37.000Z ##

🟠 CVE-2026-0805 - High (8.2)

An input neutralization vulnerability in the Backup Configuration component of Crafty Controller allows a remote, authenticated attacker to perform file tampering and remote code execution via path traversal.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0963
(9.9 CRITICAL)

EPSS: 0.31%

updated 2026-01-30T09:30:54

1 posts

An input neutralization vulnerability in the File Operations API Endpoint component of Crafty Controller allows a remote, authenticated attacker to perform file tampering and remote code execution via path traversal.

thehackerwire@mastodon.social at 2026-01-30T07:24:26.000Z ##

🔴 CVE-2026-0963 - Critical (9.9)

An input neutralization vulnerability in the File Operations API Endpoint component of Crafty Controller allows a remote, authenticated attacker to perform file tampering and remote code execution via path traversal.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21418
(7.8 HIGH)

EPSS: 0.06%

updated 2026-01-30T09:15:50.920000

1 posts

Dell Unity, version(s) 5.5.2 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary command execution with root privileges.

thehackerwire@mastodon.social at 2026-01-30T10:00:36.000Z ##

🟠 CVE-2026-21418 - High (7.8)

Dell Unity, version(s) 5.5.2 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerabilit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24714
(7.5 HIGH)

EPSS: 0.07%

updated 2026-01-30T06:30:22

1 posts

Some end of service NETGEAR products provide "TelnetEnable" functionality, which allows a magic packet to activate telnet service on the box.

thehackerwire@mastodon.social at 2026-01-30T05:59:55.000Z ##

🟠 CVE-2026-24714 - High (7.5)

Some end of service NETGEAR products provide "TelnetEnable" functionality, which allows a magic packet to activate telnet service on the box.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1281
(9.8 CRITICAL)

EPSS: 13.12%

updated 2026-01-30T00:31:29

16 posts

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

PC_Fluesterer@social.tchncs.de at 2026-02-02T15:09:22.000Z ##

Ivanti: Notfall-Update gegen Zero-Days

Wieder einmal fällt der US-Hersteller Ivanti mit gefährlichen (9,8 von 10) Sicherheitslücken auf, die zum Zeitpunkt der Updates bereits angegriffen werden. Sagte ich wieder einmal? Ja, einige vergangene Meldungen: hier, hier, hier oder hier. Die beiden Sicherheitslücken CVE-2026-1281 und CVE-2026-1340 wurden mit Notfall-Updates geschlossen. Angeblich kann der Hersteller nicht sagen, welche Schwäche genau angegriffen wird, da zu wenige bekannte Angriffe vorlägen. Ach ja, aber flicken konnte man die unbekannten Schwächen? Glaubwürdigkeit gleich null. Da drängt

pc-fluesterer.info/wordpress/2

#Allgemein #Empfehlung #Hintergrund #Warnung #0day #closedsource #cybercrime #exploits #foss #hintertür #politik #UnplugTrump #usa #vorbeugen #vorfälle #wissen #zeroday

##

571906@ap.podcastindex.org at 2026-02-02T02:00:02.000Z ##

New Episode: SANS Stormcast Monday, February 2nd, 2026: Google Presentation Abuse; Ivanti Vuln Exploited; Microsoft NTLM Strategy

Shownotes:

Google Presentation Abuse
https://isc.sans.edu/diary/Google+Presentations+Abused+for+Phishing/32668/
Security Advisory Ivanti Endpoint Manager Mobile (EPMM) (CVE-2026-1281 & CVE-2026-1340)
https://forums.ivanti.com/s/article/Security-A

Transcript

AntennaPod | Anytime Player | Apple Podcasts | Castamatic | CurioCaster | Fountain | gPodder | Overcast | Pocket Casts | Podcast Addict | Podcast Guru | Podnews | Podverse | Truefans

Or Listen right here.

##

youranonnewsirc@nerdculture.de at 2026-02-02T01:45:30.000Z ##

Critical cybersecurity updates from February 1-2, 2026: Microsoft patched an actively exploited Office zero-day (CVE-2026-21509), and Fortinet fixed a critical FortiCloud SSO flaw (CVE-2026-24858). Ivanti released fixes for two exploited EPMM zero-days (CVE-2026-1281, CVE-2026-1340) by February 1, and Bitdefender reported Android RAT malware distributed via Hugging Face (February 2).

In technology, Apple overhauled its online Mac store for a "build-it-yourself" experience (February 1), and Google extended the Fitbit data migration deadline to Google accounts until May 2026.

#News #Anonymous #AnonNews_irc

##

secdb at 2026-02-02T00:00:51.856Z ##

📈 CVE Published in last 7 days (2026-01-26 - 2026-02-02)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 860

Severity:
- Critical: 96
- High: 295
- Medium: 375
- Low: 18
- None: 76

Status:
- : 6
- Analyzed: 70
- Awaiting Analysis: 299
- Modified: 1
- Received: 245
- Rejected: 18
- Undergoing Analysis: 221

Top CNAs:
- VulnCheck: 171
- GitHub, Inc.: 128
- VulDB: 74
- MITRE: 61
- Government Technology Agency of Singapore Cyber Security Group (GovTech CSG): 48
- Wordfence: 43
- kernel.org: 38
- Spanish National Cybersecurity Institute, S.A. (INCIBE): 28
- SEC Consult Vulnerability Lab: 20
- IBM Corporation: 18

Top Affected Products:
- UNKNOWN: 771
- Discourse: 13
- Flexense Disk Pulse Enterprise: 11
- Flexense Sync Breeze Enterprise Server: 11
- Tenda W30e Firmware: 10
- Oisf Suricata: 7
- Pnpm: 5
- Gpac: 4
- Fabian Online Examination System: 3
- Sangfor Operation And Maintenance Security Management System: 3

Top EPSS Score:
- CVE-2016-15057 - 32.46 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1281 - 14.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24858 - 3.14 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21509 - 2.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1547 - 2.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1601 - 2.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1687 - 1.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1689 - 1.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1723 - 0.94 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-40551 - 0.87 % (secdb.nttzen.cloud/cve/detail/)

##

youranonnewsirc@nerdculture.de at 2026-02-02T01:45:30.000Z ##

Critical cybersecurity updates from February 1-2, 2026: Microsoft patched an actively exploited Office zero-day (CVE-2026-21509), and Fortinet fixed a critical FortiCloud SSO flaw (CVE-2026-24858). Ivanti released fixes for two exploited EPMM zero-days (CVE-2026-1281, CVE-2026-1340) by February 1, and Bitdefender reported Android RAT malware distributed via Hugging Face (February 2).

In technology, Apple overhauled its online Mac store for a "build-it-yourself" experience (February 1), and Google extended the Fitbit data migration deadline to Google accounts until May 2026.

#News #Anonymous #AnonNews_irc

##

DarkWebInformer@infosec.exchange at 2026-02-01T21:13:45.000Z ##

‼️ CVE-2026-1281: Safe indicator check for Ivanti EPMM & CVE-2026-1340 related paths

GitHub: github.com/Ashwesker/Ashwesker

##

youranonnewsirc@nerdculture.de at 2026-01-30T19:45:29.000Z ##

Latest News (Jan 29-30, 2026):

Tech: Apple plans "Apple Intelligence" with Google Gemini integration, coinciding with Google's Chrome "auto browse" launch. China approved Nvidia H200 chip sales to its tech giants.

Cybersecurity: The FBI launched "Operation Winter SHIELD" to protect critical infrastructure. A major ShinyHunters phishing campaign targets Okta SSO accounts, and Ivanti EPMM (CVE-2026-1281) is a newly exploited vulnerability.

#News #Anonymous #AnonNews_irc

##

DarkWebInformer@infosec.exchange at 2026-01-30T19:15:10.000Z ##

‼️ CVE-2026-1281 & CVE-2026-1340: A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

Zero-Day: Yes
CVSS: Both 9.8
CVE Published: January 29th, 2026
KEV Catalog: January 29th, 2026

Affected Vendor: Ivanti
Vulnerability Type: Remote Code Execution (RCE)

Advisory: forums.ivanti.com/s/article/Se

##

AAKL@infosec.exchange at 2026-01-30T19:02:55.000Z ##

New. No escape for Ivanti (which issued patches yesterday.)

WatchTower: Someone Knows Bash Far Too Well, And We Love It (Ivanti EPMM Pre-Auth RCEs CVE-2026-1281 & CVE-2026-1340) labs.watchtowr.com/someone-kno #Ivanti #vulnerability #infosec

##

AAKL@infosec.exchange at 2026-01-30T17:03:48.000Z ##

@cR0w Didn't you wish for Ivanti?

Ivanti, posted yesterday: Security Advisory Ivanti Endpoint Manager Mobile (EPMM) (CVE-2026-1281 & CVE-2026-1340) forums.ivanti.com/s/article/Se

Analysis Guidance Ivanti Endpoint Manager Mobile (EPMM) CVE-2026-1281 & CVE-2026-1340 forums.ivanti.com/s/article/An

Security Week: Ivanti Patches Exploited EPMM Zero-Days securityweek.com/ivanti-patche @SecurityWeek #Ivanti #infosec #vulnerability #zeroday

##

_r_netsec@infosec.exchange at 2026-01-30T16:28:06.000Z ##

Someone Knows Bash Far Too Well, And We Love It (Ivanti EPMM Pre-Auth RCEs CVE-2026-1281 & CVE-2026-1340) - watchTowr Labs labs.watchtowr.com/someone-kno

##

technadu@infosec.exchange at 2026-01-30T13:01:53.000Z ##

Ivanti confirms active exploitation of EPMM zero-day RCE flaws (CVE-2026-1281, CVE-2026-1340).
Emergency patches released—apply immediately.

🔗 technadu.com/ivanti-epmm-zero-

#ZeroDay #RCE #Ivanti #Infosec

##

beyondmachines1@infosec.exchange at 2026-01-30T12:01:05.000Z ##

Ivanti Patches Critical Zero-Day RCE Flaws in EPMM

Ivanti released emergency patches for two critical zero-day vulnerabilities in Endpoint Manager Mobile (EPMM) (CVE-2026-1281 and CVE-2026-1340) that allow unauthenticated remote code execution. Attackers are actively exploiting these flaws to gain full system control and access sensitive mobile device management data.

**If you are using Ivanti Endpoint Manager Mobile on premises, this is an URGENT advisory. Update your EPMM because it's already actively hacked. Apply the RPM patches immediately and remember to re-apply them if you upgrade the software version before the permanent fix in version 12.8.0.0 is released. And make sure to check the logs, because your EPMM may have already been compromised.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

cert_fr@social.numerique.gouv.fr at 2026-01-30T11:01:59.000Z ##

⚠️ Alerte CERT-FR ⚠️

Les vulnérabilités critiques CVE-2026-1281 et CVE-2026-1340 affectant Ivanti Endpoint Manager Mobile sont activement exploitées dans le cadre d'attaques ciblées.
cert.ssi.gouv.fr/alerte/CERTFR

##

thehackerwire@mastodon.social at 2026-01-29T22:21:25.000Z ##

🔴 CVE-2026-1281 - Critical (9.8)

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

oversecurity@mastodon.social at 2026-01-29T22:20:07.000Z ##

Ivanti warns of two EPMM flaws exploited in zero-day attacks

Ivanti has disclosed two critical vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2026-1281 and CVE-2026-1340, that were...

🔗️ [Bleepingcomputer] link.is.it/teik2H

##

CVE-2026-1340
(9.8 CRITICAL)

EPSS: 0.14%

updated 2026-01-30T00:31:28

14 posts

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

PC_Fluesterer@social.tchncs.de at 2026-02-02T15:09:22.000Z ##

Ivanti: Notfall-Update gegen Zero-Days

Wieder einmal fällt der US-Hersteller Ivanti mit gefährlichen (9,8 von 10) Sicherheitslücken auf, die zum Zeitpunkt der Updates bereits angegriffen werden. Sagte ich wieder einmal? Ja, einige vergangene Meldungen: hier, hier, hier oder hier. Die beiden Sicherheitslücken CVE-2026-1281 und CVE-2026-1340 wurden mit Notfall-Updates geschlossen. Angeblich kann der Hersteller nicht sagen, welche Schwäche genau angegriffen wird, da zu wenige bekannte Angriffe vorlägen. Ach ja, aber flicken konnte man die unbekannten Schwächen? Glaubwürdigkeit gleich null. Da drängt

pc-fluesterer.info/wordpress/2

#Allgemein #Empfehlung #Hintergrund #Warnung #0day #closedsource #cybercrime #exploits #foss #hintertür #politik #UnplugTrump #usa #vorbeugen #vorfälle #wissen #zeroday

##

571906@ap.podcastindex.org at 2026-02-02T02:00:02.000Z ##

New Episode: SANS Stormcast Monday, February 2nd, 2026: Google Presentation Abuse; Ivanti Vuln Exploited; Microsoft NTLM Strategy

Shownotes:

Google Presentation Abuse
https://isc.sans.edu/diary/Google+Presentations+Abused+for+Phishing/32668/
Security Advisory Ivanti Endpoint Manager Mobile (EPMM) (CVE-2026-1281 & CVE-2026-1340)
https://forums.ivanti.com/s/article/Security-A

Transcript

AntennaPod | Anytime Player | Apple Podcasts | Castamatic | CurioCaster | Fountain | gPodder | Overcast | Pocket Casts | Podcast Addict | Podcast Guru | Podnews | Podverse | Truefans

Or Listen right here.

##

youranonnewsirc@nerdculture.de at 2026-02-02T01:45:30.000Z ##

Critical cybersecurity updates from February 1-2, 2026: Microsoft patched an actively exploited Office zero-day (CVE-2026-21509), and Fortinet fixed a critical FortiCloud SSO flaw (CVE-2026-24858). Ivanti released fixes for two exploited EPMM zero-days (CVE-2026-1281, CVE-2026-1340) by February 1, and Bitdefender reported Android RAT malware distributed via Hugging Face (February 2).

In technology, Apple overhauled its online Mac store for a "build-it-yourself" experience (February 1), and Google extended the Fitbit data migration deadline to Google accounts until May 2026.

#News #Anonymous #AnonNews_irc

##

youranonnewsirc@nerdculture.de at 2026-02-02T01:45:30.000Z ##

Critical cybersecurity updates from February 1-2, 2026: Microsoft patched an actively exploited Office zero-day (CVE-2026-21509), and Fortinet fixed a critical FortiCloud SSO flaw (CVE-2026-24858). Ivanti released fixes for two exploited EPMM zero-days (CVE-2026-1281, CVE-2026-1340) by February 1, and Bitdefender reported Android RAT malware distributed via Hugging Face (February 2).

In technology, Apple overhauled its online Mac store for a "build-it-yourself" experience (February 1), and Google extended the Fitbit data migration deadline to Google accounts until May 2026.

#News #Anonymous #AnonNews_irc

##

DarkWebInformer@infosec.exchange at 2026-02-01T21:13:45.000Z ##

‼️ CVE-2026-1281: Safe indicator check for Ivanti EPMM & CVE-2026-1340 related paths

GitHub: github.com/Ashwesker/Ashwesker

##

DarkWebInformer@infosec.exchange at 2026-01-30T19:15:10.000Z ##

‼️ CVE-2026-1281 & CVE-2026-1340: A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

Zero-Day: Yes
CVSS: Both 9.8
CVE Published: January 29th, 2026
KEV Catalog: January 29th, 2026

Affected Vendor: Ivanti
Vulnerability Type: Remote Code Execution (RCE)

Advisory: forums.ivanti.com/s/article/Se

##

AAKL@infosec.exchange at 2026-01-30T19:02:55.000Z ##

New. No escape for Ivanti (which issued patches yesterday.)

WatchTower: Someone Knows Bash Far Too Well, And We Love It (Ivanti EPMM Pre-Auth RCEs CVE-2026-1281 & CVE-2026-1340) labs.watchtowr.com/someone-kno #Ivanti #vulnerability #infosec

##

AAKL@infosec.exchange at 2026-01-30T17:03:48.000Z ##

@cR0w Didn't you wish for Ivanti?

Ivanti, posted yesterday: Security Advisory Ivanti Endpoint Manager Mobile (EPMM) (CVE-2026-1281 & CVE-2026-1340) forums.ivanti.com/s/article/Se

Analysis Guidance Ivanti Endpoint Manager Mobile (EPMM) CVE-2026-1281 & CVE-2026-1340 forums.ivanti.com/s/article/An

Security Week: Ivanti Patches Exploited EPMM Zero-Days securityweek.com/ivanti-patche @SecurityWeek #Ivanti #infosec #vulnerability #zeroday

##

_r_netsec@infosec.exchange at 2026-01-30T16:28:06.000Z ##

Someone Knows Bash Far Too Well, And We Love It (Ivanti EPMM Pre-Auth RCEs CVE-2026-1281 & CVE-2026-1340) - watchTowr Labs labs.watchtowr.com/someone-kno

##

technadu@infosec.exchange at 2026-01-30T13:01:53.000Z ##

Ivanti confirms active exploitation of EPMM zero-day RCE flaws (CVE-2026-1281, CVE-2026-1340).
Emergency patches released—apply immediately.

🔗 technadu.com/ivanti-epmm-zero-

#ZeroDay #RCE #Ivanti #Infosec

##

beyondmachines1@infosec.exchange at 2026-01-30T12:01:05.000Z ##

Ivanti Patches Critical Zero-Day RCE Flaws in EPMM

Ivanti released emergency patches for two critical zero-day vulnerabilities in Endpoint Manager Mobile (EPMM) (CVE-2026-1281 and CVE-2026-1340) that allow unauthenticated remote code execution. Attackers are actively exploiting these flaws to gain full system control and access sensitive mobile device management data.

**If you are using Ivanti Endpoint Manager Mobile on premises, this is an URGENT advisory. Update your EPMM because it's already actively hacked. Apply the RPM patches immediately and remember to re-apply them if you upgrade the software version before the permanent fix in version 12.8.0.0 is released. And make sure to check the logs, because your EPMM may have already been compromised.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

cert_fr@social.numerique.gouv.fr at 2026-01-30T11:01:59.000Z ##

⚠️ Alerte CERT-FR ⚠️

Les vulnérabilités critiques CVE-2026-1281 et CVE-2026-1340 affectant Ivanti Endpoint Manager Mobile sont activement exploitées dans le cadre d'attaques ciblées.
cert.ssi.gouv.fr/alerte/CERTFR

##

thehackerwire@mastodon.social at 2026-01-29T22:21:35.000Z ##

🔴 CVE-2026-1340 - Critical (9.8)

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

oversecurity@mastodon.social at 2026-01-29T22:20:07.000Z ##

Ivanti warns of two EPMM flaws exploited in zero-day attacks

Ivanti has disclosed two critical vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2026-1281 and CVE-2026-1340, that were...

🔗️ [Bleepingcomputer] link.is.it/teik2H

##

CVE-2026-25116
(7.6 HIGH)

EPSS: 0.20%

updated 2026-01-29T22:15:56.110000

1 posts

Runtipi is a personal homeserver orchestrator. Starting in version 4.5.0 and prior to version 4.7.2, an unauthenticated Path Traversal vulnerability in the `UserConfigController` allows any remote user to overwrite the system's `docker-compose.yml` configuration file. By exploiting insecure URN parsing, an attacker can replace the primary stack configuration with a malicious one, resulting in full

thehackerwire@mastodon.social at 2026-01-29T22:21:15.000Z ##

🟠 CVE-2026-25116 - High (7.6)

Runtipi is a personal homeserver orchestrator. Starting in version 4.5.0 and prior to version 4.7.2, an unauthenticated Path Traversal vulnerability in the `UserConfigController` allows any remote user to overwrite the system's `docker-compose.yml...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69516
(8.8 HIGH)

EPSS: 0.22%

updated 2026-01-29T22:15:52.577000

1 posts

A Server-Side Template Injection (SSTI) vulnerability in the /reporting/templates/preview/ endpoint of Amidaware Tactical RMM, affecting versions equal to or earlier than v1.3.1, allows low-privileged users with Report Viewer or Report Manager permissions to achieve remote command execution on the server. This occurs due to improper sanitization of the template_md parameter, enabling direct inject

thehackerwire@mastodon.social at 2026-01-29T22:23:12.000Z ##

🟠 CVE-2025-69516 - High (8.8)

A Server-Side Template Injection (SSTI) vulnerability in the /reporting/templates/preview/ endpoint of Amidaware Tactical RMM, affecting versions equal to or earlier than v1.3.1, allows low-privileged users with Report Viewer or Report Manager per...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69602
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-01-29T21:31:33

1 posts

A session fixation vulnerability exists in 66biolinks v62.0.0 by AltumCode, where the application does not regenerate the session identifier after successful authentication. As a result, the same session cookie value is reused for users logging in from the same browser, allowing an attacker who can set or predict a session ID to potentially hijack an authenticated session.

thehackerwire@mastodon.social at 2026-01-29T20:19:43.000Z ##

🔴 CVE-2025-69602 - Critical (9.1)

A session fixation vulnerability exists in 66biolinks v62.0.0 by AltumCode, where the application does not regenerate the session identifier after successful authentication. As a result, the same session cookie value is reused for users logging in...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-71003
(7.5 HIGH)

EPSS: 0.05%

updated 2026-01-29T21:31:32

1 posts

An input validation vulnerability in the flow.arange() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

thehackerwire@mastodon.social at 2026-01-29T21:33:54.000Z ##

🟠 CVE-2025-71003 - High (7.5)

An input validation vulnerability in the flow.arange() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-14472
(8.1 HIGH)

EPSS: 0.02%

updated 2026-01-29T21:31:32

1 posts

Cross-Site Request Forgery (CSRF) vulnerability in Drupal Acquia Content Hub allows Cross Site Request Forgery.This issue affects Acquia Content Hub: from 0.0.0 before 3.6.4, from 3.7.0 before 3.7.3.

thehackerwire@mastodon.social at 2026-01-29T20:03:13.000Z ##

🟠 CVE-2025-14472 - High (8.1)

Cross-Site Request Forgery (CSRF) vulnerability in Drupal Acquia Content Hub allows Cross Site Request Forgery.This issue affects Acquia Content Hub: from 0.0.0 before 3.6.4, from 3.7.0 before 3.7.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1601
(6.3 MEDIUM)

EPSS: 3.17%

updated 2026-01-29T21:30:37

1 posts

A weakness has been identified in Totolink A7000R 4.1cu.4154. The impacted element is the function setUploadUserData of the file /cgi-bin/cstecgi.cgi. Executing a manipulation of the argument FileName can lead to command injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.

secdb at 2026-02-02T00:00:51.856Z ##

📈 CVE Published in last 7 days (2026-01-26 - 2026-02-02)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 860

Severity:
- Critical: 96
- High: 295
- Medium: 375
- Low: 18
- None: 76

Status:
- : 6
- Analyzed: 70
- Awaiting Analysis: 299
- Modified: 1
- Received: 245
- Rejected: 18
- Undergoing Analysis: 221

Top CNAs:
- VulnCheck: 171
- GitHub, Inc.: 128
- VulDB: 74
- MITRE: 61
- Government Technology Agency of Singapore Cyber Security Group (GovTech CSG): 48
- Wordfence: 43
- kernel.org: 38
- Spanish National Cybersecurity Institute, S.A. (INCIBE): 28
- SEC Consult Vulnerability Lab: 20
- IBM Corporation: 18

Top Affected Products:
- UNKNOWN: 771
- Discourse: 13
- Flexense Disk Pulse Enterprise: 11
- Flexense Sync Breeze Enterprise Server: 11
- Tenda W30e Firmware: 10
- Oisf Suricata: 7
- Pnpm: 5
- Gpac: 4
- Fabian Online Examination System: 3
- Sangfor Operation And Maintenance Security Management System: 3

Top EPSS Score:
- CVE-2016-15057 - 32.46 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1281 - 14.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24858 - 3.14 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21509 - 2.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1547 - 2.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1601 - 2.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1687 - 1.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1689 - 1.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1723 - 0.94 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-40551 - 0.87 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-1610
(8.1 HIGH)

EPSS: 0.01%

updated 2026-01-29T21:30:37

1 posts

A vulnerability was found in Tenda AX12 Pro V2 16.03.49.24_cn. Affected by this issue is some unknown functionality of the component Telnet Service. Performing a manipulation results in hard-coded credentials. The attack is possible to be carried out remotely. A high degree of complexity is needed for the attack. The exploitation is known to be difficult. The exploit has been made public and could

thehackerwire@mastodon.social at 2026-01-29T19:47:15.000Z ##

🟠 CVE-2026-1610 - High (8.1)

A vulnerability was found in Tenda AX12 Pro V2 16.03.49.24_cn. Affected by this issue is some unknown functionality of the component Telnet Service. Performing a manipulation results in hard-coded credentials. The attack is possible to be carried ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22795
(5.5 MEDIUM)

EPSS: 0.01%

updated 2026-01-29T21:30:29

1 posts

Issue summary: An invalid or NULL pointer dereference can happen in an application processing a malformed PKCS#12 file. Impact summary: An application processing a malformed PKCS#12 file can be caused to dereference an invalid or NULL pointer on memory read, resulting in a Denial of Service. A type confusion vulnerability exists in PKCS#12 parsing code where an ASN1_TYPE union member is accessed

DarkWebInformer@infosec.exchange at 2026-01-29T00:50:43.000Z ##

‼️AISLE Goes 12-for-12 on OpenSSL Vulnerability Detection

CVEs Published: January 27th, 2026

High and Moderate Severity Flaws:

▪️CVE-2025-15467: Stack Buffer Overflow in CMS AuthEnvelopedData Parsing (High): A vulnerability with the potential to enable remote code execution under specific conditions

▪️CVE-2025-11187: PBMAC1 Parameter Validation in PKCS#12 (Moderate): Missing validation that could trigger a stack-based buffer overflow

Low Severity Flaws:

▪️CVE-2025-15468: Crash in QUIC protocol cipher handling
▪️CVE-2025-15469: Silent truncation bug affecting post-quantum signature algorithms (ML-DSA)
▪️CVE-2025-66199: Memory exhaustion via TLS 1.3 certificate compression
▪️CVE-2025-68160: Memory corruption in line-buffering (affects code back to OpenSSL 1.0.2)
▪️CVE-2025-69418: Encryption flaw in OCB mode on hardware-accelerated paths
▪️CVE-2025-69419: Memory corruption in PKCS#12 character encoding
▪️CVE-2025-69420: Crash in TimeStamp Response verification
▪️CVE-2025-69421: Crash in PKCS#12 decryption
▪️CVE-2026-22795: Crash in PKCS#12 parsing
▪️CVE-2026-22796: Crash in PKCS#7 signature verification (affects code back to OpenSSL 1.0.2)

"When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs.

Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."

Writeup: aisle.com/blog/aisle-discovere

##

CVE-2026-1453
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-01-29T19:16:18.987000

2 posts

A missing authentication for critical function vulnerability in KiloView Encoder Series could allow an unauthenticated attacker to create or delete administrator accounts. This vulnerability can grant the attacker full administrative control over the product.

beyondmachines1@infosec.exchange at 2026-01-30T08:01:05.000Z ##

KiloView Encoder Account Takeover Vulnerability

KiloView video encoders contain a critical vulnerability (CVE-2026-1453) that allows unauthenticated attackers to create administrator accounts and take full control of the devices. The vendor has not yet released a public patch.

**Make sure all KiloView devices are isolated from the internet and accessible from trusted networks only. Then reach out to the vendor to get information of any upcoming patches. At the moment, there is no patch available.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

thehackerwire@mastodon.social at 2026-01-29T19:47:24.000Z ##

🔴 CVE-2026-1453 - Critical (9.8)

A missing authentication for critical function vulnerability in KiloView Encoder Series could allow an unauthenticated attacker to create or delete administrator accounts. This vulnerability can grant the attacker full administrative control over ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-61726
(7.5 HIGH)

EPSS: 0.03%

updated 2026-01-29T19:16:16.243000

1 posts

The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.

thehackerwire@mastodon.social at 2026-01-29T19:48:18.000Z ##

🟠 CVE-2025-61726 - High (7.5)

The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse larg...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-13982
(8.1 HIGH)

EPSS: 0.02%

updated 2026-01-29T19:16:10.530000

1 posts

Cross-Site Request Forgery (CSRF) vulnerability in Drupal Login Time Restriction allows Cross Site Request Forgery.This issue affects Login Time Restriction: from 0.0.0 before 1.0.3.

thehackerwire@mastodon.social at 2026-01-29T20:03:23.000Z ##

🟠 CVE-2025-13982 - High (8.1)

Cross-Site Request Forgery (CSRF) vulnerability in Drupal Login Time Restriction allows Cross Site Request Forgery.This issue affects Login Time Restriction: from 0.0.0 before 1.0.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-61731
(7.8 HIGH)

EPSS: 0.01%

updated 2026-01-29T18:32:50

1 posts

Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The "#cgo pkg-config:" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a "--log-file" argument to this directive, causing pkg-config to write to an attacker-controlled location.

thehackerwire@mastodon.social at 2026-01-29T18:01:42.000Z ##

🟠 CVE-2025-61731 - High (7.8)

Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The "#cgo pkg-config:" directive in a Go source file provides command-line arguments to provide to the Go pk...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-65889
(7.5 HIGH)

EPSS: 0.05%

updated 2026-01-29T18:32:49

2 posts

A type validation flaw in the flow.dstack() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

thehackerwire@mastodon.social at 2026-01-30T06:21:43.000Z ##

🟠 CVE-2025-65889 - High (7.5)

A type validation flaw in the flow.dstack() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T17:02:16.000Z ##

🟠 CVE-2025-65889 - High (7.5)

A type validation flaw in the flow.dstack() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-71000
(7.5 HIGH)

EPSS: 0.05%

updated 2026-01-29T18:32:49

1 posts

An issue in the flow.cuda.BoolTensor component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

thehackerwire@mastodon.social at 2026-01-29T20:20:01.000Z ##

🟠 CVE-2025-71000 - High (7.5)

An issue in the flow.cuda.BoolTensor component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69517
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-01-29T18:32:49

1 posts

An issue in Amidaware Inc Tactical RMM v1.3.1 and before allows a remote attacker to execute arbitrary code via the /api/tacticalrmm/apiv3/views.py component

thehackerwire@mastodon.social at 2026-01-29T17:02:29.000Z ##

🔴 CVE-2025-69517 - Critical (9.8)

An issue in Amidaware Inc Tactical RMM v1.3.1 and before allows a remote attacker to execute arbitrary code via the /api/tacticalrmm/apiv3/views.py component

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-66199
(5.9 MEDIUM)

EPSS: 0.06%

updated 2026-01-29T18:32:44

1 posts

Issue summary: A TLS 1.3 connection using certificate compression can be forced to allocate a large buffer before decompression without checking against the configured certificate size limit. Impact summary: An attacker can cause per-connection memory allocations of up to approximately 22 MiB and extra CPU work, potentially leading to service degradation or resource exhaustion (Denial of Service)

DarkWebInformer@infosec.exchange at 2026-01-29T00:50:43.000Z ##

‼️AISLE Goes 12-for-12 on OpenSSL Vulnerability Detection

CVEs Published: January 27th, 2026

High and Moderate Severity Flaws:

▪️CVE-2025-15467: Stack Buffer Overflow in CMS AuthEnvelopedData Parsing (High): A vulnerability with the potential to enable remote code execution under specific conditions

▪️CVE-2025-11187: PBMAC1 Parameter Validation in PKCS#12 (Moderate): Missing validation that could trigger a stack-based buffer overflow

Low Severity Flaws:

▪️CVE-2025-15468: Crash in QUIC protocol cipher handling
▪️CVE-2025-15469: Silent truncation bug affecting post-quantum signature algorithms (ML-DSA)
▪️CVE-2025-66199: Memory exhaustion via TLS 1.3 certificate compression
▪️CVE-2025-68160: Memory corruption in line-buffering (affects code back to OpenSSL 1.0.2)
▪️CVE-2025-69418: Encryption flaw in OCB mode on hardware-accelerated paths
▪️CVE-2025-69419: Memory corruption in PKCS#12 character encoding
▪️CVE-2025-69420: Crash in TimeStamp Response verification
▪️CVE-2025-69421: Crash in PKCS#12 decryption
▪️CVE-2026-22795: Crash in PKCS#12 parsing
▪️CVE-2026-22796: Crash in PKCS#7 signature verification (affects code back to OpenSSL 1.0.2)

"When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs.

Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."

Writeup: aisle.com/blog/aisle-discovere

##

CVE-2025-69419
(7.4 HIGH)

EPSS: 0.06%

updated 2026-01-29T18:32:43

1 posts

Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously crafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing non-ASCII BMP code point can trigger a one byte write before the allocated buffer. Impact summary: The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service. The OPENSSL_uni2utf8() functi

DarkWebInformer@infosec.exchange at 2026-01-29T00:50:43.000Z ##

‼️AISLE Goes 12-for-12 on OpenSSL Vulnerability Detection

CVEs Published: January 27th, 2026

High and Moderate Severity Flaws:

▪️CVE-2025-15467: Stack Buffer Overflow in CMS AuthEnvelopedData Parsing (High): A vulnerability with the potential to enable remote code execution under specific conditions

▪️CVE-2025-11187: PBMAC1 Parameter Validation in PKCS#12 (Moderate): Missing validation that could trigger a stack-based buffer overflow

Low Severity Flaws:

▪️CVE-2025-15468: Crash in QUIC protocol cipher handling
▪️CVE-2025-15469: Silent truncation bug affecting post-quantum signature algorithms (ML-DSA)
▪️CVE-2025-66199: Memory exhaustion via TLS 1.3 certificate compression
▪️CVE-2025-68160: Memory corruption in line-buffering (affects code back to OpenSSL 1.0.2)
▪️CVE-2025-69418: Encryption flaw in OCB mode on hardware-accelerated paths
▪️CVE-2025-69419: Memory corruption in PKCS#12 character encoding
▪️CVE-2025-69420: Crash in TimeStamp Response verification
▪️CVE-2025-69421: Crash in PKCS#12 decryption
▪️CVE-2026-22795: Crash in PKCS#12 parsing
▪️CVE-2026-22796: Crash in PKCS#7 signature verification (affects code back to OpenSSL 1.0.2)

"When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs.

Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."

Writeup: aisle.com/blog/aisle-discovere

##

CVE-2025-14975
(8.1 HIGH)

EPSS: 0.01%

updated 2026-01-29T18:31:44

1 posts

The Custom Login Page Customizer WordPress plugin before 2.5.4 does not have a proper password reset process, allowing a few unauthenticated requests to reset the password of any user by knowing their username, such as administrator ones, and therefore gain access to their account

thehackerwire@mastodon.social at 2026-01-29T18:01:32.000Z ##

🟠 CVE-2025-14975 - High (8.1)

The Custom Login Page Customizer WordPress plugin before 2.5.4 does not have a proper password reset process, allowing a few unauthenticated requests to reset the password of any user by knowing their username, such as administrator ones, and ther...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-65886
(7.5 HIGH)

EPSS: 0.05%

updated 2026-01-29T18:31:42

2 posts

A shape mismatch vulnerability in OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via supplying crafted tensor shapes.

thehackerwire@mastodon.social at 2026-01-30T06:21:21.000Z ##

🟠 CVE-2025-65886 - High (7.5)

A shape mismatch vulnerability in OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via supplying crafted tensor shapes.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T17:01:58.000Z ##

🟠 CVE-2025-65886 - High (7.5)

A shape mismatch vulnerability in OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via supplying crafted tensor shapes.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70999
(7.5 HIGH)

EPSS: 0.05%

updated 2026-01-29T17:16:22.420000

1 posts

A GPU device-ID validation flaw in the flow.cuda.get_device_capability() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted device ID.

thehackerwire@mastodon.social at 2026-01-29T20:19:53.000Z ##

🟠 CVE-2025-70999 - High (7.5)

A GPU device-ID validation flaw in the flow.cuda.get_device_capability() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted device ID.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-65891
(7.5 HIGH)

EPSS: 0.06%

updated 2026-01-29T17:16:20.240000

1 posts

A GPU device-ID validation flaw in OneFlow v0.9.0 allows attackers to trigger a Denial of Dervice (DoS) by invoking flow.cuda.get_device_properties() with an invalid or negative device index.

thehackerwire@mastodon.social at 2026-01-29T21:34:05.000Z ##

🟠 CVE-2025-65891 - High (7.5)

A GPU device-ID validation flaw in OneFlow v0.9.0 allows attackers to trigger a Denial of Dervice (DoS) by invoking flow.cuda.get_device_properties() with an invalid or negative device index.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-65890
(7.5 HIGH)

EPSS: 0.05%

updated 2026-01-29T17:16:20.053000

1 posts

A device-ID validation flaw in OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) by calling flow.cuda.synchronize() with an invalid or out-of-range GPU device index.

thehackerwire@mastodon.social at 2026-01-30T07:54:32.000Z ##

🟠 CVE-2025-65890 - High (7.5)

A device-ID validation flaw in OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) by calling flow.cuda.synchronize() with an invalid or out-of-range GPU device index.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-14840
(7.5 HIGH)

EPSS: 0.05%

updated 2026-01-29T17:16:15.243000

1 posts

Improper Check for Unusual or Exceptional Conditions vulnerability in Drupal HTTP Client Manager allows Forceful Browsing.This issue affects HTTP Client Manager: from 0.0.0 before 9.3.13, from 10.0.0 before 10.0.2, from 11.0.0 before 11.0.1.

thehackerwire@mastodon.social at 2026-01-29T18:01:53.000Z ##

🟠 CVE-2025-14840 - High (7.5)

Improper Check for Unusual or Exceptional Conditions vulnerability in Drupal HTTP Client Manager allows Forceful Browsing.This issue affects HTTP Client Manager: from 0.0.0 before 9.3.13, from 10.0.0 before 10.0.2, from 11.0.0 before 11.0.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-40551
(9.8 CRITICAL)

EPSS: 1.03%

updated 2026-01-29T16:31:35.700000

5 posts

SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

secdb at 2026-02-02T00:00:51.856Z ##

📈 CVE Published in last 7 days (2026-01-26 - 2026-02-02)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 860

Severity:
- Critical: 96
- High: 295
- Medium: 375
- Low: 18
- None: 76

Status:
- : 6
- Analyzed: 70
- Awaiting Analysis: 299
- Modified: 1
- Received: 245
- Rejected: 18
- Undergoing Analysis: 221

Top CNAs:
- VulnCheck: 171
- GitHub, Inc.: 128
- VulDB: 74
- MITRE: 61
- Government Technology Agency of Singapore Cyber Security Group (GovTech CSG): 48
- Wordfence: 43
- kernel.org: 38
- Spanish National Cybersecurity Institute, S.A. (INCIBE): 28
- SEC Consult Vulnerability Lab: 20
- IBM Corporation: 18

Top Affected Products:
- UNKNOWN: 771
- Discourse: 13
- Flexense Disk Pulse Enterprise: 11
- Flexense Sync Breeze Enterprise Server: 11
- Tenda W30e Firmware: 10
- Oisf Suricata: 7
- Pnpm: 5
- Gpac: 4
- Fabian Online Examination System: 3
- Sangfor Operation And Maintenance Security Management System: 3

Top EPSS Score:
- CVE-2016-15057 - 32.46 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1281 - 14.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24858 - 3.14 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21509 - 2.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1547 - 2.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1601 - 2.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1687 - 1.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1689 - 1.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1723 - 0.94 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-40551 - 0.87 % (secdb.nttzen.cloud/cve/detail/)

##

jbz@indieweb.social at 2026-01-29T23:19:00.000Z ##

⚠️ Critical Solarwinds Web Vulnerability Allows Remote Code Execution and Security Bypass

「 Multiple critical vulnerabilities in SolarWinds Web Help Desk (WHD), culminating in unauthenticated remote code execution (RCE) via Java deserialization in CVE-2025-40551, were uncovered by Horizon3.ai researchers.
These flaws chain static credentials, security bypasses, and deserialization weaknesses, affecting versions prior to 2026.1 」

##

DarkWebInformer@infosec.exchange at 2026-01-29T18:10:38.000Z ##

‼️ SolarWinds Web Help Desk RCE Hit by Multiple Critical Security Flaws; CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, CVE-2025-40554

CVSS: All 9.8
CVEs Published: January 28th, 2026

CVE-2025-40551: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

CVE-2025-40552: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.

CVE-2025-40553: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

CVE-2025-40554: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.

Advisories:

nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2

##

Andy_Thompson@infosec.exchange at 2026-01-29T17:54:31.000Z ##

📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.

Sources:
- bleepingcomputer.com/news/secu
- cloud.google.com/blog/topics/t
- nvd.nist.gov/vuln/detail/CVE-2
- helpnetsecurity.com/2026/01/28

---

🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀

CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.

Sources:
- nvd.nist.gov/vuln/detail/CVE-2
infosecurity-magazine.com/news
- openssl-library.org/news/vulne
- twitter.com/IntCyberDigest/sta

---

🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡

SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.

Sources:
- bleepingcomputer.com/news/secu
- helpnetsecurity.com/2026/01/29
- rapid7.com/blog/post/etr-multi
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2

##

thehackerwire@mastodon.social at 2026-01-28T22:44:56.000Z ##

SolarWinds has just announced four high-severity vulnerabilities in its Web Help Desk (WHD) software that could lead to full system takeover.

These flaws include unauthenticated Remote Code Execution (RCE) via insecure deserialization and multiple Authentication Bypasses, allowing attackers to execute protected methods without any credentials.

CVE-2025-40551 & CVE-2025-40553 (Unauthenticated RCE)
CVE-2025-40552 & CVE-2025-40554 (Auth Bypass)

thehackerwire.com/solarwinds-p

##

CVE-2025-40554
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-01-29T16:31:35.700000

3 posts

SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.

2 repos

https://github.com/Skynoxk/CVE-2025-40554

https://github.com/imbas007/auth-bypass-CVE-2025-40554

DarkWebInformer@infosec.exchange at 2026-01-29T18:10:38.000Z ##

‼️ SolarWinds Web Help Desk RCE Hit by Multiple Critical Security Flaws; CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, CVE-2025-40554

CVSS: All 9.8
CVEs Published: January 28th, 2026

CVE-2025-40551: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

CVE-2025-40552: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.

CVE-2025-40553: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

CVE-2025-40554: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.

Advisories:

nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2

##

Andy_Thompson@infosec.exchange at 2026-01-29T17:54:31.000Z ##

📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.

Sources:
- bleepingcomputer.com/news/secu
- cloud.google.com/blog/topics/t
- nvd.nist.gov/vuln/detail/CVE-2
- helpnetsecurity.com/2026/01/28

---

🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀

CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.

Sources:
- nvd.nist.gov/vuln/detail/CVE-2
infosecurity-magazine.com/news
- openssl-library.org/news/vulne
- twitter.com/IntCyberDigest/sta

---

🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡

SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.

Sources:
- bleepingcomputer.com/news/secu
- helpnetsecurity.com/2026/01/29
- rapid7.com/blog/post/etr-multi
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2

##

thehackerwire@mastodon.social at 2026-01-28T22:44:56.000Z ##

SolarWinds has just announced four high-severity vulnerabilities in its Web Help Desk (WHD) software that could lead to full system takeover.

These flaws include unauthenticated Remote Code Execution (RCE) via insecure deserialization and multiple Authentication Bypasses, allowing attackers to execute protected methods without any credentials.

CVE-2025-40551 & CVE-2025-40553 (Unauthenticated RCE)
CVE-2025-40552 & CVE-2025-40554 (Auth Bypass)

thehackerwire.com/solarwinds-p

##

CVE-2025-65888
(7.5 HIGH)

EPSS: 0.05%

updated 2026-01-29T16:31:00.867000

2 posts

A dimension validation flaw in the flow.empty() component of OneFlow 0.9.0 allows attackers to cause a Denial of Service (DoS) via a negative or excessively large dimension value.

thehackerwire@mastodon.social at 2026-01-30T06:21:31.000Z ##

🟠 CVE-2025-65888 - High (7.5)

A dimension validation flaw in the flow.empty() component of OneFlow 0.9.0 allows attackers to cause a Denial of Service (DoS) via a negative or excessively large dimension value.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T17:02:07.000Z ##

🟠 CVE-2025-65888 - High (7.5)

A dimension validation flaw in the flow.empty() component of OneFlow 0.9.0 allows attackers to cause a Denial of Service (DoS) via a negative or excessively large dimension value.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-57283
(7.8 HIGH)

EPSS: 0.07%

updated 2026-01-29T16:31:00.867000

1 posts

The Node.js package browserstack-local 1.5.8 contains a command injection vulnerability. This occurs because the logfile variable is not properly sanitized in lib/Local.js.

thehackerwire@mastodon.social at 2026-01-29T17:02:49.000Z ##

🟠 CVE-2025-57283 - High (7.8)

The Node.js package browserstack-local 1.5.8 contains a command injection vulnerability. This occurs because the logfile variable is not properly sanitized in lib/Local.js.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-7713
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-29T16:31:00.867000

1 posts

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Global Interactive Design Media Software Inc. Content Management System (CMS) allows XSS Through HTTP Headers.This issue affects Content Management System (CMS): through 21072025.

thehackerwire@mastodon.social at 2026-01-29T16:00:11.000Z ##

🟠 CVE-2025-7713 - High (7.5)

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Global Interactive Design Media Software Inc. Content Management System (CMS) allows XSS Through HTTP Headers.This issue affects Content M...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33218
(7.8 HIGH)

EPSS: 0.01%

updated 2026-01-29T16:31:00.867000

1 posts

NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys), where an attacker could cause an integer overflow. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, or information disclosure.

AAKL@infosec.exchange at 2026-01-28T21:08:51.000Z ##

New.

NVIDIA GPU Display Drivers - January 2026 vulnerabilities: CVE-2025-33217, CVE-2025-33218, and CVE-2025-33219 nvidia.custhelp.com/app/answer #Nvidia #infosec #vulnerability

##

CVE-2025-33217
(7.8 HIGH)

EPSS: 0.01%

updated 2026-01-29T16:31:00.867000

1 posts

NVIDIA Display Driver for Windows contains a vulnerability where an attacker could trigger a use after free. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, and information disclosure.

AAKL@infosec.exchange at 2026-01-28T21:08:51.000Z ##

New.

NVIDIA GPU Display Drivers - January 2026 vulnerabilities: CVE-2025-33217, CVE-2025-33218, and CVE-2025-33219 nvidia.custhelp.com/app/answer #Nvidia #infosec #vulnerability

##

CVE-2025-15467
(9.8 CRITICAL)

EPSS: 0.66%

updated 2026-01-29T15:31:31

7 posts

Issue summary: Parsing CMS AuthEnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution. When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 para

4 repos

https://github.com/balgan/CVE-2025-15467

https://github.com/mr-r3b00t/CVE-2025-15467

https://github.com/MAXI8594/CVE-2025-15467_Scan

https://github.com/guiimoraes/CVE-2025-15467

beyondmachines1 at 2026-02-03T08:01:02.900Z ##

OpenSSL Patches 12 Vulnerabilities Including One Critical RCE

OpenSSL has patched 12 vulnerabilities, including a critical stack buffer overflow (CVE-2025-15467) that allows unauthenticated remote code execution via crafted CMS messages.

**Review your OpenSSL libraries, and start planning a patch. Prioritize 3.x versions since they are exposed to the critical flaw.**

beyondmachines.net/event_detai

##

cyberveille@mastobot.ping.moi at 2026-02-02T15:00:04.000Z ##

📢 OpenSSL: débordement de pile CVE-2025-15467 exposant à une exécution de code (RCE)
📝 Selon JFrog Security Research (research.jfrog.com), une nouvelle vulnérabilité OpenSSL, **CVE-2025-15467**, a été d...
📖 cyberveille : cyberveille.ch/posts/2026-02-0
🌐 source : research.jfrog.com/post/potent
#CMS_PKCS_7 #CVE_2025_15467 #Cyberveille

##

beyondmachines1@infosec.exchange at 2026-02-03T08:01:02.000Z ##

OpenSSL Patches 12 Vulnerabilities Including One Critical RCE

OpenSSL has patched 12 vulnerabilities, including a critical stack buffer overflow (CVE-2025-15467) that allows unauthenticated remote code execution via crafted CMS messages.

**Review your OpenSSL libraries, and start planning a patch. Prioritize 3.x versions since they are exposed to the critical flaw.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

ycombinator@rss-mstdn.studiofreesia.com at 2026-01-30T13:42:46.000Z ##

Potentially Critical RCE Vulnerability in OpenSSL
research.jfrog.com/post/potent
#ycombinator

##

thehackerwire@mastodon.social at 2026-01-30T07:54:43.000Z ##

🔴 CVE-2025-15467 - Critical (9.8)

Issue summary: Parsing CMS AuthEnvelopedData message with maliciously
crafted AEAD parameters can trigger a stack buffer overflow.

Impact summary: A stack buffer overflow may lead to a crash, causing Denial
of Service, or potentially remote code ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

Andy_Thompson@infosec.exchange at 2026-01-29T17:54:31.000Z ##

📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.

Sources:
- bleepingcomputer.com/news/secu
- cloud.google.com/blog/topics/t
- nvd.nist.gov/vuln/detail/CVE-2
- helpnetsecurity.com/2026/01/28

---

🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀

CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.

Sources:
- nvd.nist.gov/vuln/detail/CVE-2
infosecurity-magazine.com/news
- openssl-library.org/news/vulne
- twitter.com/IntCyberDigest/sta

---

🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡

SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.

Sources:
- bleepingcomputer.com/news/secu
- helpnetsecurity.com/2026/01/29
- rapid7.com/blog/post/etr-multi
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2

##

DarkWebInformer@infosec.exchange at 2026-01-29T00:50:43.000Z ##

‼️AISLE Goes 12-for-12 on OpenSSL Vulnerability Detection

CVEs Published: January 27th, 2026

High and Moderate Severity Flaws:

▪️CVE-2025-15467: Stack Buffer Overflow in CMS AuthEnvelopedData Parsing (High): A vulnerability with the potential to enable remote code execution under specific conditions

▪️CVE-2025-11187: PBMAC1 Parameter Validation in PKCS#12 (Moderate): Missing validation that could trigger a stack-based buffer overflow

Low Severity Flaws:

▪️CVE-2025-15468: Crash in QUIC protocol cipher handling
▪️CVE-2025-15469: Silent truncation bug affecting post-quantum signature algorithms (ML-DSA)
▪️CVE-2025-66199: Memory exhaustion via TLS 1.3 certificate compression
▪️CVE-2025-68160: Memory corruption in line-buffering (affects code back to OpenSSL 1.0.2)
▪️CVE-2025-69418: Encryption flaw in OCB mode on hardware-accelerated paths
▪️CVE-2025-69419: Memory corruption in PKCS#12 character encoding
▪️CVE-2025-69420: Crash in TimeStamp Response verification
▪️CVE-2025-69421: Crash in PKCS#12 decryption
▪️CVE-2026-22795: Crash in PKCS#12 parsing
▪️CVE-2026-22796: Crash in PKCS#7 signature verification (affects code back to OpenSSL 1.0.2)

"When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs.

Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."

Writeup: aisle.com/blog/aisle-discovere

##

CVE-2025-15469
(5.5 MEDIUM)

EPSS: 0.01%

updated 2026-01-29T15:31:31

1 posts

Issue summary: The 'openssl dgst' command-line tool silently truncates input data to 16MB when using one-shot signing algorithms and reports success instead of an error. Impact summary: A user signing or verifying files larger than 16MB with one-shot algorithms (such as Ed25519, Ed448, or ML-DSA) may believe the entire file is authenticated while trailing data beyond 16MB remains unauthenticated.

DarkWebInformer@infosec.exchange at 2026-01-29T00:50:43.000Z ##

‼️AISLE Goes 12-for-12 on OpenSSL Vulnerability Detection

CVEs Published: January 27th, 2026

High and Moderate Severity Flaws:

▪️CVE-2025-15467: Stack Buffer Overflow in CMS AuthEnvelopedData Parsing (High): A vulnerability with the potential to enable remote code execution under specific conditions

▪️CVE-2025-11187: PBMAC1 Parameter Validation in PKCS#12 (Moderate): Missing validation that could trigger a stack-based buffer overflow

Low Severity Flaws:

▪️CVE-2025-15468: Crash in QUIC protocol cipher handling
▪️CVE-2025-15469: Silent truncation bug affecting post-quantum signature algorithms (ML-DSA)
▪️CVE-2025-66199: Memory exhaustion via TLS 1.3 certificate compression
▪️CVE-2025-68160: Memory corruption in line-buffering (affects code back to OpenSSL 1.0.2)
▪️CVE-2025-69418: Encryption flaw in OCB mode on hardware-accelerated paths
▪️CVE-2025-69419: Memory corruption in PKCS#12 character encoding
▪️CVE-2025-69420: Crash in TimeStamp Response verification
▪️CVE-2025-69421: Crash in PKCS#12 decryption
▪️CVE-2026-22795: Crash in PKCS#12 parsing
▪️CVE-2026-22796: Crash in PKCS#7 signature verification (affects code back to OpenSSL 1.0.2)

"When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs.

Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."

Writeup: aisle.com/blog/aisle-discovere

##

CVE-2025-7714
(7.5 HIGH)

EPSS: 0.05%

updated 2026-01-29T15:30:35

1 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Global Interactive Design Media Software Inc. Content Management System (CMS) allows Command Line Execution through SQL Injection.This issue affects Content Management System (CMS): through 21072025.

thehackerwire@mastodon.social at 2026-01-29T16:00:22.000Z ##

🟠 CVE-2025-7714 - High (7.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Global Interactive Design Media Software Inc. Content Management System (CMS) allows Command Line Execution through SQL Injection.This issue affe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1616
(7.5 HIGH)

EPSS: 0.01%

updated 2026-01-29T15:30:34

1 posts

The $uri$args concatenation in nginx configuration file present in Open Security Issue Management (OSIM) prior v2025.9.0 allows path traversal attacks via query parameters.

thehackerwire@mastodon.social at 2026-01-29T14:27:04.000Z ##

🟠 CVE-2026-1616 - High (7.5)

The $uri$args concatenation in nginx configuration file present in Open Security Issue Management (OSIM) prior v2025.9.0 allows path traversal attacks via query parameters.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24429
(9.8 CRITICAL)

EPSS: 0.08%

updated 2026-01-29T15:30:27

1 posts

Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) ship with a predefined default password for a built-in authentication account that is not required to be changed during initial configuration. An attacker can leverage these default credentials to gain authenticated access to the management interface.

thehackerwire@mastodon.social at 2026-01-29T13:10:08.000Z ##

🔴 CVE-2026-24429 - Critical (9.8)

Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) ship with a predefined default password for a built-in authentication account that is not required to be changed during initial configuration. An attacker can leverage ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23864
(7.5 HIGH)

EPSS: 0.79%

updated 2026-01-29T15:00:31

1 posts

## Impact It was found that the fixes to address DoS in React Server Components were incomplete and we found multiple denial of service vulnerabilities still exist in React Server Components. We recommend updating immediately. The vulnerability exists in versions 19.0.0, 19.0.1, 19.0.2, 19.0.3, 19.1.0, 19.1.1, 19.1.2, 19.1.3, 19.1.4, 19.2.0, 19.2.1, 19.2.2, 19.2.3 of: - [react-server-dom-webpa

AAKL@infosec.exchange at 2026-01-29T17:28:21.000Z ##

New.

AhnLab: React Server Component Security Update Advisory (CVE-2026-23864) asec.ahnlab.com/en/92377/ #vulnerability #infosec

##

CVE-2026-24428
(8.8 HIGH)

EPSS: 0.04%

updated 2026-01-29T13:02:04.990000

1 posts

Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) contain an authorization flaw in the user management API that allows a low-privileged authenticated user to change the administrator account password. By sending a crafted request directly to the backend endpoint, an attacker can bypass role-based restrictions enforced by the web interface and obtain full administrative

thehackerwire@mastodon.social at 2026-01-29T13:09:58.000Z ##

🟠 CVE-2026-24428 - High (8.8)

Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) contain an authorization flaw in the user management API that allows a low-privileged authenticated user to change the administrator account password. By sending a craf...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-7016
(8.0 HIGH)

EPSS: 0.06%

updated 2026-01-29T12:30:26

1 posts

Improper Access Control vulnerability in Akın Software Computer Import Export Industry and Trade Ltd. QR Menu allows Authentication Abuse.This issue affects QR Menu: before s1.05.12.

thehackerwire@mastodon.social at 2026-01-29T12:22:53.000Z ##

🟠 CVE-2025-7016 - High (8)

Improper Access Control vulnerability in Akın Software Computer Import Export Industry and Trade Ltd. QR Menu allows Authentication Abuse.This issue affects QR Menu: before s1.05.12.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1547
(6.3 MEDIUM)

EPSS: 4.18%

updated 2026-01-29T00:31:17

1 posts

A vulnerability was detected in Totolink A7000R 4.1cu.4154. This affects the function setUnloadUserData of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument plugin_name results in command injection. It is possible to launch the attack remotely. The exploit is now public and may be used.

secdb at 2026-02-02T00:00:51.856Z ##

📈 CVE Published in last 7 days (2026-01-26 - 2026-02-02)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 860

Severity:
- Critical: 96
- High: 295
- Medium: 375
- Low: 18
- None: 76

Status:
- : 6
- Analyzed: 70
- Awaiting Analysis: 299
- Modified: 1
- Received: 245
- Rejected: 18
- Undergoing Analysis: 221

Top CNAs:
- VulnCheck: 171
- GitHub, Inc.: 128
- VulDB: 74
- MITRE: 61
- Government Technology Agency of Singapore Cyber Security Group (GovTech CSG): 48
- Wordfence: 43
- kernel.org: 38
- Spanish National Cybersecurity Institute, S.A. (INCIBE): 28
- SEC Consult Vulnerability Lab: 20
- IBM Corporation: 18

Top Affected Products:
- UNKNOWN: 771
- Discourse: 13
- Flexense Disk Pulse Enterprise: 11
- Flexense Sync Breeze Enterprise Server: 11
- Tenda W30e Firmware: 10
- Oisf Suricata: 7
- Pnpm: 5
- Gpac: 4
- Fabian Online Examination System: 3
- Sangfor Operation And Maintenance Security Management System: 3

Top EPSS Score:
- CVE-2016-15057 - 32.46 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1281 - 14.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24858 - 3.14 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21509 - 2.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1547 - 2.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1601 - 2.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1687 - 1.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1689 - 1.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1723 - 0.94 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-40551 - 0.87 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2025-57795
(10.0 CRITICAL)

EPSS: 0.26%

updated 2026-01-28T21:32:26

1 posts

Explorance Blue versions prior to 8.14.13 contain an authenticated remote file download vulnerability in a web service component. In default configurations, this flaw can be leveraged to achieve remote code execution.

thehackerwire@mastodon.social at 2026-01-28T20:07:26.000Z ##

🔴 CVE-2025-57795 - Critical (9.9)

Explorance Blue versions prior to 8.14.13 contain an authenticated remote file download vulnerability in a web service component. In default configurations, this flaw can be leveraged to achieve remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69420
(7.5 HIGH)

EPSS: 0.07%

updated 2026-01-28T21:32:25

2 posts

Issue summary: A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file. Impact summary: An application calling TS_RESP_verify_response() with a malformed TimeStamp Response can be caused to deref

thehackerwire@mastodon.social at 2026-01-29T02:12:08.000Z ##

🟠 CVE-2025-69420 - High (7.5)

Issue summary: A type confusion vulnerability exists in the TimeStamp Response
verification code where an ASN1_TYPE union member is accessed without first
validating the type, causing an invalid or NULL pointer dereference when
processing a malfor...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

DarkWebInformer@infosec.exchange at 2026-01-29T00:50:43.000Z ##

‼️AISLE Goes 12-for-12 on OpenSSL Vulnerability Detection

CVEs Published: January 27th, 2026

High and Moderate Severity Flaws:

▪️CVE-2025-15467: Stack Buffer Overflow in CMS AuthEnvelopedData Parsing (High): A vulnerability with the potential to enable remote code execution under specific conditions

▪️CVE-2025-11187: PBMAC1 Parameter Validation in PKCS#12 (Moderate): Missing validation that could trigger a stack-based buffer overflow

Low Severity Flaws:

▪️CVE-2025-15468: Crash in QUIC protocol cipher handling
▪️CVE-2025-15469: Silent truncation bug affecting post-quantum signature algorithms (ML-DSA)
▪️CVE-2025-66199: Memory exhaustion via TLS 1.3 certificate compression
▪️CVE-2025-68160: Memory corruption in line-buffering (affects code back to OpenSSL 1.0.2)
▪️CVE-2025-69418: Encryption flaw in OCB mode on hardware-accelerated paths
▪️CVE-2025-69419: Memory corruption in PKCS#12 character encoding
▪️CVE-2025-69420: Crash in TimeStamp Response verification
▪️CVE-2025-69421: Crash in PKCS#12 decryption
▪️CVE-2026-22795: Crash in PKCS#12 parsing
▪️CVE-2026-22796: Crash in PKCS#7 signature verification (affects code back to OpenSSL 1.0.2)

"When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs.

Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."

Writeup: aisle.com/blog/aisle-discovere

##

CVE-2026-24868
(7.5 HIGH)

EPSS: 0.05%

updated 2026-01-28T21:31:21

1 posts

Mitigation bypass in the Privacy: Anti-Tracking component. This vulnerability affects Firefox < 147.0.2.

thehackerwire@mastodon.social at 2026-01-29T02:11:59.000Z ##

🟠 CVE-2026-24868 - High (7.5)

Mitigation bypass in the Privacy: Anti-Tracking component. This vulnerability affects Firefox &lt; 147.0.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24436
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-01-28T21:31:19

1 posts

Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) do not enforce rate limiting or account lockout mechanisms on authentication endpoints. This allows attackers to perform unrestricted brute-force attempts against administrative credentials.

thehackerwire@mastodon.social at 2026-01-29T05:20:04.000Z ##

🔴 CVE-2026-24436 - Critical (9.8)

Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) do not enforce rate limiting or account lockout mechanisms on authentication endpoints. This allows attackers to perform unrestricted brute-force attempts against admin...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24430
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-28T20:16:51.880000

1 posts

Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) disclose sensitive account credentials in cleartext within HTTP responses generated by the maintenance interface. Because the management interface is accessible over unencrypted HTTP by default, credentials may be exposed to network-based interception.

thehackerwire@mastodon.social at 2026-01-29T05:20:24.000Z ##

🟠 CVE-2026-24430 - High (7.5)

Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) disclose sensitive account credentials in cleartext within HTTP responses generated by the maintenance interface. Because the management interface is accessible over un...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24440
(8.8 HIGH)

EPSS: 0.04%

updated 2026-01-28T19:20:05.660000

1 posts

Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) allow account passwords to be changed through the maintenance interface without requiring verification of the existing password. This enables unauthorized password changes when access to the affected endpoint is obtained.

thehackerwire@mastodon.social at 2026-01-29T05:20:14.000Z ##

🟠 CVE-2026-24440 - High (8.8)

Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) allow account passwords to be changed through the maintenance interface without requiring verification of the existing password. This enables unauthorized password chan...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33219
(7.8 HIGH)

EPSS: 0.01%

updated 2026-01-28T18:30:54

1 posts

NVIDIA Display Driver for Linux contains a vulnerability in the NVIDIA kernel module where an attacker could cause an integer overflow or wraparound. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, or information disclosure.

AAKL@infosec.exchange at 2026-01-28T21:08:51.000Z ##

New.

NVIDIA GPU Display Drivers - January 2026 vulnerabilities: CVE-2025-33217, CVE-2025-33218, and CVE-2025-33219 nvidia.custhelp.com/app/answer #Nvidia #infosec #vulnerability

##

CVE-2026-24477
(7.5 HIGH)

EPSS: 0.03%

updated 2026-01-28T15:59:06.483000

1 posts

AnythingLLM is an application that turns pieces of content into context that any LLM can use as references during chatting. If AnythingLLM prior to version 1.10.0 is configured to use Qdrant as the vector database with an API key, this QdrantApiKey could be exposed in plain text to unauthenticated users via the `/api/setup-complete` endpoint. Leakage of QdrantApiKey allows an unauthenticated attac

thehackerwire@mastodon.social at 2026-01-29T02:12:19.000Z ##

🟠 CVE-2026-24477 - High (7.5)

AnythingLLM is an application that turns pieces of content into context that any LLM can use as references during chatting. If AnythingLLM prior to version 1.10.0 is configured to use Qdrant as the vector database with an API key, this QdrantApiKe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1056
(9.8 CRITICAL)

EPSS: 0.18%

updated 2026-01-28T15:31:37

1 posts

The Snow Monkey Forms plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'generate_user_dirpath' function in all versions up to, and including, 12.0.3. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-confi

1 repos

https://github.com/ch4r0nn/CVE-2026-1056-POC

DarkWebInformer@infosec.exchange at 2026-01-29T21:15:24.000Z ##

‼️ CVE-2026-1056: Snow Monkey Forms <= 12.0.3 - Unauthenticated Arbitrary File Deletion via Path Traversal

PoC/Exploit: github.com/ch4r0nn/CVE-2026-10

CVSS: 9.8
CVE Published: January 28th, 2026

Advisory: github.com/advisories/GHSA-g5p

Details: The Snow Monkey Forms plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'generate_user_dirpath' function in all versions up to, and including, 12.0.3. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

##

CVE-2025-40552
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-01-28T09:30:35

3 posts

SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.

DarkWebInformer@infosec.exchange at 2026-01-29T18:10:38.000Z ##

‼️ SolarWinds Web Help Desk RCE Hit by Multiple Critical Security Flaws; CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, CVE-2025-40554

CVSS: All 9.8
CVEs Published: January 28th, 2026

CVE-2025-40551: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

CVE-2025-40552: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.

CVE-2025-40553: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

CVE-2025-40554: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.

Advisories:

nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2

##

Andy_Thompson@infosec.exchange at 2026-01-29T17:54:31.000Z ##

📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.

Sources:
- bleepingcomputer.com/news/secu
- cloud.google.com/blog/topics/t
- nvd.nist.gov/vuln/detail/CVE-2
- helpnetsecurity.com/2026/01/28

---

🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀

CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.

Sources:
- nvd.nist.gov/vuln/detail/CVE-2
infosecurity-magazine.com/news
- openssl-library.org/news/vulne
- twitter.com/IntCyberDigest/sta

---

🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡

SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.

Sources:
- bleepingcomputer.com/news/secu
- helpnetsecurity.com/2026/01/29
- rapid7.com/blog/post/etr-multi
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2

##

thehackerwire@mastodon.social at 2026-01-28T22:44:56.000Z ##

SolarWinds has just announced four high-severity vulnerabilities in its Web Help Desk (WHD) software that could lead to full system takeover.

These flaws include unauthenticated Remote Code Execution (RCE) via insecure deserialization and multiple Authentication Bypasses, allowing attackers to execute protected methods without any credentials.

CVE-2025-40551 & CVE-2025-40553 (Unauthenticated RCE)
CVE-2025-40552 & CVE-2025-40554 (Auth Bypass)

thehackerwire.com/solarwinds-p

##

CVE-2025-40553
(9.8 CRITICAL)

EPSS: 0.78%

updated 2026-01-28T09:30:35

3 posts

SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

DarkWebInformer@infosec.exchange at 2026-01-29T18:10:38.000Z ##

‼️ SolarWinds Web Help Desk RCE Hit by Multiple Critical Security Flaws; CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, CVE-2025-40554

CVSS: All 9.8
CVEs Published: January 28th, 2026

CVE-2025-40551: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

CVE-2025-40552: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.

CVE-2025-40553: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

CVE-2025-40554: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.

Advisories:

nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2

##

Andy_Thompson@infosec.exchange at 2026-01-29T17:54:31.000Z ##

📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.

Sources:
- bleepingcomputer.com/news/secu
- cloud.google.com/blog/topics/t
- nvd.nist.gov/vuln/detail/CVE-2
- helpnetsecurity.com/2026/01/28

---

🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀

CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.

Sources:
- nvd.nist.gov/vuln/detail/CVE-2
infosecurity-magazine.com/news
- openssl-library.org/news/vulne
- twitter.com/IntCyberDigest/sta

---

🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡

SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.

Sources:
- bleepingcomputer.com/news/secu
- helpnetsecurity.com/2026/01/29
- rapid7.com/blog/post/etr-multi
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2

##

thehackerwire@mastodon.social at 2026-01-28T22:44:56.000Z ##

SolarWinds has just announced four high-severity vulnerabilities in its Web Help Desk (WHD) software that could lead to full system takeover.

These flaws include unauthenticated Remote Code Execution (RCE) via insecure deserialization and multiple Authentication Bypasses, allowing attackers to execute protected methods without any credentials.

CVE-2025-40551 & CVE-2025-40553 (Unauthenticated RCE)
CVE-2025-40552 & CVE-2025-40554 (Auth Bypass)

thehackerwire.com/solarwinds-p

##

CVE-2026-24858
(9.8 CRITICAL)

EPSS: 3.71%

updated 2026-01-28T00:31:41

7 posts

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0.15, FortiManager 7.6.0 through 7.6.5, FortiManager 7.4.0 through 7.4.9, FortiManager 7.2.0 through 7.2.11, FortiManager 7.0.0 through 7.0.15, FortiOS 7.

5 repos

https://github.com/SimoesCTT/SCTT-2026-33-0004-FortiCloud-SSO-Identity-Singularity

https://github.com/b1gchoi/CVE-2026-24858

https://github.com/m0d0ri205/CVE-2026-24858

https://github.com/SimoesCTT/-CTT-NSP-Convergent-Time-Theory---Network-Stack-Projection-CVE-2026-24858-

https://github.com/absholi7ly/CVE-2026-24858-FortiCloud-SSO-Authentication-Bypass

youranonnewsirc@nerdculture.de at 2026-02-02T01:45:30.000Z ##

Critical cybersecurity updates from February 1-2, 2026: Microsoft patched an actively exploited Office zero-day (CVE-2026-21509), and Fortinet fixed a critical FortiCloud SSO flaw (CVE-2026-24858). Ivanti released fixes for two exploited EPMM zero-days (CVE-2026-1281, CVE-2026-1340) by February 1, and Bitdefender reported Android RAT malware distributed via Hugging Face (February 2).

In technology, Apple overhauled its online Mac store for a "build-it-yourself" experience (February 1), and Google extended the Fitbit data migration deadline to Google accounts until May 2026.

#News #Anonymous #AnonNews_irc

##

secdb at 2026-02-02T00:00:51.856Z ##

📈 CVE Published in last 7 days (2026-01-26 - 2026-02-02)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 860

Severity:
- Critical: 96
- High: 295
- Medium: 375
- Low: 18
- None: 76

Status:
- : 6
- Analyzed: 70
- Awaiting Analysis: 299
- Modified: 1
- Received: 245
- Rejected: 18
- Undergoing Analysis: 221

Top CNAs:
- VulnCheck: 171
- GitHub, Inc.: 128
- VulDB: 74
- MITRE: 61
- Government Technology Agency of Singapore Cyber Security Group (GovTech CSG): 48
- Wordfence: 43
- kernel.org: 38
- Spanish National Cybersecurity Institute, S.A. (INCIBE): 28
- SEC Consult Vulnerability Lab: 20
- IBM Corporation: 18

Top Affected Products:
- UNKNOWN: 771
- Discourse: 13
- Flexense Disk Pulse Enterprise: 11
- Flexense Sync Breeze Enterprise Server: 11
- Tenda W30e Firmware: 10
- Oisf Suricata: 7
- Pnpm: 5
- Gpac: 4
- Fabian Online Examination System: 3
- Sangfor Operation And Maintenance Security Management System: 3

Top EPSS Score:
- CVE-2016-15057 - 32.46 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1281 - 14.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24858 - 3.14 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21509 - 2.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1547 - 2.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1601 - 2.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1687 - 1.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1689 - 1.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1723 - 0.94 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-40551 - 0.87 % (secdb.nttzen.cloud/cve/detail/)

##

LLMs@activitypub.awakari.com at 2026-02-02T09:04:36.000Z ## Vulnerabilidad crítica de bypass de autenticación en Fortinet FortiCloud SSO El CVE-2026-24858 es una vulnerabilidad de bypass de autenticación (SSO) en múltiples productos de Fortinet. Un atac...

#Seguridad

Origin | Interest | Match ##

youranonnewsirc@nerdculture.de at 2026-02-02T01:45:30.000Z ##

Critical cybersecurity updates from February 1-2, 2026: Microsoft patched an actively exploited Office zero-day (CVE-2026-21509), and Fortinet fixed a critical FortiCloud SSO flaw (CVE-2026-24858). Ivanti released fixes for two exploited EPMM zero-days (CVE-2026-1281, CVE-2026-1340) by February 1, and Bitdefender reported Android RAT malware distributed via Hugging Face (February 2).

In technology, Apple overhauled its online Mac store for a "build-it-yourself" experience (February 1), and Google extended the Fitbit data migration deadline to Google accounts until May 2026.

#News #Anonymous #AnonNews_irc

##

cjust@infosec.exchange at 2026-01-29T20:39:25.000Z ##

Another day and, well . . .

#Fortinet #FortinetSSO #CVE #CVE202624858

esecurityplanet.com/threats/fo

##

termsofsurrender@mastodon.social at 2026-01-29T10:20:48.000Z ##

Fortinet SSO Is A Burning Trash Fire While Prague Bureaucrats Wait For Their Morning Fax
PANIC 88% | Lag 18.75h | Fortinet has released an emergency patch for CVE-2026-24858, a critical vulnerability in FortiOS Sin
#AfterShockIndex

Read: hodl.cz/as-102352

##

youranonnewsirc@nerdculture.de at 2026-01-29T09:24:20.000Z ##

Here's a summary of the latest in global technology and cybersecurity from the last 24 hours:

Global tech giants are streamlining: Amazon announced 16,000 job cuts (Jan 28, 2026). Meanwhile, AI investment surges, with SoftBank nearing a $30B OpenAI investment (Jan 28, 2026). In cybersecurity, Fortinet addressed active exploitation of CVE-2026-24858 (Jan 28, 2026), and OpenSSL patched 12 flaws, including RCE (Jan 29, 2026). The Illinois Department of Human Services suffered a data breach impacting ~700,000 individuals (Jan 28, 2026).

#News #Anonymous #AnonNews_irc

##

CVE-2016-15057
(9.9 CRITICAL)

EPSS: 32.98%

updated 2026-01-27T20:29:50.263000

1 posts

** UNSUPPORTED WHEN ASSIGNED ** Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Apache Continuum. This issue affects Apache Continuum: all versions. Attackers with access to the installations REST API can use this to invoke arbitrary commands on the server. As this project is retired, we do not plan to release a version that fixes this issue.

secdb at 2026-02-02T00:00:51.856Z ##

📈 CVE Published in last 7 days (2026-01-26 - 2026-02-02)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 860

Severity:
- Critical: 96
- High: 295
- Medium: 375
- Low: 18
- None: 76

Status:
- : 6
- Analyzed: 70
- Awaiting Analysis: 299
- Modified: 1
- Received: 245
- Rejected: 18
- Undergoing Analysis: 221

Top CNAs:
- VulnCheck: 171
- GitHub, Inc.: 128
- VulDB: 74
- MITRE: 61
- Government Technology Agency of Singapore Cyber Security Group (GovTech CSG): 48
- Wordfence: 43
- kernel.org: 38
- Spanish National Cybersecurity Institute, S.A. (INCIBE): 28
- SEC Consult Vulnerability Lab: 20
- IBM Corporation: 18

Top Affected Products:
- UNKNOWN: 771
- Discourse: 13
- Flexense Disk Pulse Enterprise: 11
- Flexense Sync Breeze Enterprise Server: 11
- Tenda W30e Firmware: 10
- Oisf Suricata: 7
- Pnpm: 5
- Gpac: 4
- Fabian Online Examination System: 3
- Sangfor Operation And Maintenance Security Management System: 3

Top EPSS Score:
- CVE-2016-15057 - 32.46 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1281 - 14.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24858 - 3.14 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21509 - 2.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1547 - 2.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1601 - 2.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1687 - 1.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1689 - 1.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1723 - 0.94 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-40551 - 0.87 % (secdb.nttzen.cloud/cve/detail/)

##

oversecurity@mastodon.social at 2026-02-03T16:40:25.000Z ##

Russian state hackers exploit new Microsoft Office flaw in attacks on Ukraine, EU

Ukraine’s computer emergency response team, CERT-UA, said attackers began abusing the flaw — tracked as CVE-2026-21509 — shortly after Microsoft...

🔗️ [Therecord] link.is.it/ZQMXsZ

##

undercodenews@mastodon.social at 2026-02-03T14:12:51.000Z ##

Russian APT28 Exploits Microsoft Office Vulnerability to Target EU COREPER Discussions

In a recent escalation of cyber espionage activity, the Russian-linked Advanced Persistent Threat group APT28 has been observed exploiting a critical Microsoft Office vulnerability, CVE-2026-21509, to target sensitive EU operations. Security researchers report that the group is distributing malicious DOC files disguised as documents related to EU COREPER (Committee of Permanent…

undercodenews.com/russian-apt2

##

campuscodi@mastodon.social at 2026-02-03T14:01:39.000Z ##

RE: mastodon.social/@campuscodi/11

More on this campaign from Zscaler: zscaler.com/blogs/security-res

Other targets also include Romania and Slovakia

##

youranonnewsirc@nerdculture.de at 2026-02-03T13:45:54.000Z ##

Latest News (Feb 2-3, 2026):

Global: India and the US have finalized a trade deal. Pakistani forces killed 145 militants in Balochistan after coordinated attacks.

Tech: SpaceX merged with xAI, announcing plans for space-based AI data centers. Oracle plans a $50B expansion for AI cloud infrastructure.

Cybersecurity: A Russian hacker alliance, "Russian Legion," threatens a major cyberattack on Denmark. Russia-linked APT28 exploits a new Microsoft Office flaw (CVE-2026-21509) in attacks across Ukraine and the EU.

#News #Anonymous #AnonNews_irc

##

VirusBulletin at 2026-02-03T13:35:53.417Z ##

Zscaler ThreatLabz reports on Operation Neusploit, a January 2026 campaign targeting Central and Eastern Europe. Weaponised Microsoft RTF files exploit CVE-2026-21509 to deliver multi-stage backdoors. The campaign is attributed to APT28 with high confidence. zscaler.com/blogs/security-res

##

joho@mastodon.online at 2026-02-03T01:23:40.000Z ##

"Microsoft Office zero-day actively exploited" 🕵️ 🙄

(CVSS 7.8)

hackingpassion.com/office-zero

#cve202621509 #cybersec #cybersecurity #infosec #microsoft #office #microsoftoffice #ole

##

oversecurity@mastodon.social at 2026-02-02T21:10:06.000Z ##

Russian hackers exploit recently patched Microsoft Office bug in attacks

Ukraine's Computer Emergency Response Team (CERT) says that Russian hackers are exploiting CVE-2026-21509, a recently patched vulnerability in...

🔗️ [Bleepingcomputer] link.is.it/iMsHDY

##

threatcodex at 2026-02-02T17:52:10.493Z ##

UAC-0001 (APT28) Attack Detection: russia-Backed Actor Actively Exploits CVE-2026-21509 Targeting Ukraine and the EU

socprime.com/blog/detect-uac-0

##

youranonnewsirc@nerdculture.de at 2026-02-02T01:45:30.000Z ##

Critical cybersecurity updates from February 1-2, 2026: Microsoft patched an actively exploited Office zero-day (CVE-2026-21509), and Fortinet fixed a critical FortiCloud SSO flaw (CVE-2026-24858). Ivanti released fixes for two exploited EPMM zero-days (CVE-2026-1281, CVE-2026-1340) by February 1, and Bitdefender reported Android RAT malware distributed via Hugging Face (February 2).

In technology, Apple overhauled its online Mac store for a "build-it-yourself" experience (February 1), and Google extended the Fitbit data migration deadline to Google accounts until May 2026.

#News #Anonymous #AnonNews_irc

##

secdb at 2026-02-02T00:00:51.856Z ##

📈 CVE Published in last 7 days (2026-01-26 - 2026-02-02)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 860

Severity:
- Critical: 96
- High: 295
- Medium: 375
- Low: 18
- None: 76

Status:
- : 6
- Analyzed: 70
- Awaiting Analysis: 299
- Modified: 1
- Received: 245
- Rejected: 18
- Undergoing Analysis: 221

Top CNAs:
- VulnCheck: 171
- GitHub, Inc.: 128
- VulDB: 74
- MITRE: 61
- Government Technology Agency of Singapore Cyber Security Group (GovTech CSG): 48
- Wordfence: 43
- kernel.org: 38
- Spanish National Cybersecurity Institute, S.A. (INCIBE): 28
- SEC Consult Vulnerability Lab: 20
- IBM Corporation: 18

Top Affected Products:
- UNKNOWN: 771
- Discourse: 13
- Flexense Disk Pulse Enterprise: 11
- Flexense Sync Breeze Enterprise Server: 11
- Tenda W30e Firmware: 10
- Oisf Suricata: 7
- Pnpm: 5
- Gpac: 4
- Fabian Online Examination System: 3
- Sangfor Operation And Maintenance Security Management System: 3

Top EPSS Score:
- CVE-2016-15057 - 32.46 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1281 - 14.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24858 - 3.14 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21509 - 2.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1547 - 2.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1601 - 2.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1687 - 1.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1689 - 1.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1723 - 0.94 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-40551 - 0.87 % (secdb.nttzen.cloud/cve/detail/)

##

oversecurity@mastodon.social at 2026-02-03T16:40:25.000Z ##

Russian state hackers exploit new Microsoft Office flaw in attacks on Ukraine, EU

Ukraine’s computer emergency response team, CERT-UA, said attackers began abusing the flaw — tracked as CVE-2026-21509 — shortly after Microsoft...

🔗️ [Therecord] link.is.it/ZQMXsZ

##

LLMs@activitypub.awakari.com at 2026-02-03T14:21:18.000Z ## InfoSec News Nuggets 02/03/2026 APT28 Leverages CVE-2026-21509 in Operation Neusploit A ThreatLabz writeup on a campaign attributed to APT28 using weaponized RTF files to exploit CVE-2026-21509 and...

#InfoSec #News #Nuggets #AboutDFIR #fcc #Ivanti #news #nuggets

Origin | Interest | Match ##

campuscodi@mastodon.social at 2026-02-03T14:01:39.000Z ##

RE: mastodon.social/@campuscodi/11

More on this campaign from Zscaler: zscaler.com/blogs/security-res

Other targets also include Romania and Slovakia

##

youranonnewsirc@nerdculture.de at 2026-02-03T13:45:54.000Z ##

Latest News (Feb 2-3, 2026):

Global: India and the US have finalized a trade deal. Pakistani forces killed 145 militants in Balochistan after coordinated attacks.

Tech: SpaceX merged with xAI, announcing plans for space-based AI data centers. Oracle plans a $50B expansion for AI cloud infrastructure.

Cybersecurity: A Russian hacker alliance, "Russian Legion," threatens a major cyberattack on Denmark. Russia-linked APT28 exploits a new Microsoft Office flaw (CVE-2026-21509) in attacks across Ukraine and the EU.

#News #Anonymous #AnonNews_irc

##

VirusBulletin@infosec.exchange at 2026-02-03T13:35:53.000Z ##

Zscaler ThreatLabz reports on Operation Neusploit, a January 2026 campaign targeting Central and Eastern Europe. Weaponised Microsoft RTF files exploit CVE-2026-21509 to deliver multi-stage backdoors. The campaign is attributed to APT28 with high confidence. zscaler.com/blogs/security-res

##

us@newsbeep.org at 2026-02-03T05:20:07.000Z ##

Russian hackers exploit recently patched Microsoft Office bug in attacks

Ukraine’s Computer Emergency Response Team (CERT) says that Russian hackers are exploiting CVE-2026-21509, a recently patched vulnerability in multiple…
#NewsBeep #News #US #USA #UnitedStates #UnitedStatesOfAmerica #Technology
newsbeep.com/us/445936/

##

joho@mastodon.online at 2026-02-03T01:23:40.000Z ##

"Microsoft Office zero-day actively exploited" 🕵️ 🙄

(CVSS 7.8)

hackingpassion.com/office-zero

#cve202621509 #cybersec #cybersecurity #infosec #microsoft #office #microsoftoffice #ole

##

oversecurity@mastodon.social at 2026-02-02T21:10:06.000Z ##

Russian hackers exploit recently patched Microsoft Office bug in attacks

Ukraine's Computer Emergency Response Team (CERT) says that Russian hackers are exploiting CVE-2026-21509, a recently patched vulnerability in...

🔗️ [Bleepingcomputer] link.is.it/iMsHDY

##

youranonnewsirc@nerdculture.de at 2026-02-02T01:45:30.000Z ##

Critical cybersecurity updates from February 1-2, 2026: Microsoft patched an actively exploited Office zero-day (CVE-2026-21509), and Fortinet fixed a critical FortiCloud SSO flaw (CVE-2026-24858). Ivanti released fixes for two exploited EPMM zero-days (CVE-2026-1281, CVE-2026-1340) by February 1, and Bitdefender reported Android RAT malware distributed via Hugging Face (February 2).

In technology, Apple overhauled its online Mac store for a "build-it-yourself" experience (February 1), and Google extended the Fitbit data migration deadline to Google accounts until May 2026.

#News #Anonymous #AnonNews_irc

##

hackmag@infosec.exchange at 2026-01-29T10:00:03.000Z ##

⚪ Microsoft rushes to fix Office 0-day vulnerability actively exploited by hackers

🗨️ Microsoft developers have released out-of-band patches for a critical Office vulnerability that is already being actively exploited in attacks. The issue affects almost all versions of the product—from Office 2016 to Microsoft 365 Apps for Enterprise.

🔗 hackmag.com/news/cve-2026-2150

#news

##

CVE-2026-1470
(9.9 CRITICAL)

EPSS: 0.35%

updated 2026-01-27T16:06:45.160000

2 posts

n8n contains a critical Remote Code Execution (RCE) vulnerability in its workflow Expression evaluation system. Expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime. An authenticated attacker could abuse this behavior to execute arbitrary code with the privileges of the n8n

beyondmachines1@infosec.exchange at 2026-01-29T20:01:05.000Z ##

Critical n8n Sandbox Escapes Enable Remote Code Execution

n8n reports two sandbox escape vulnerabilities, CVE-2026-1470 and CVE-2026-0863, that allow authenticated users to execute arbitrary code and take over self-hosted servers. These flaws bypass JavaScript and Python security filters by exploiting deprecated language features and specific interpreter behaviors.

**If you are using n8n, make sure it's isolated from the internet and accessible from trusted users only. Then patch n8n to version 1.123.17, 2.4.5 for CVE-2026-1470, and 1.123.14, 2.3.5 for CVE-2026-0863 or later. The CVE-2026-1470 patch is higher priority. Also configure Python nodes to run in 'External' mode for better process isolation.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

benzogaga33@mamot.fr at 2026-01-29T10:40:04.000Z ##

n8n – CVE-2026-1470 et CVE-2026-0863 : deux nouvelles failles patchées, comment se protéger ? it-connect.fr/n8n-cve-2026-147 #ActuCybersécurité #Cybersécurité #Vulnérabilité

##

CVE-2026-0863
(8.5 HIGH)

EPSS: 0.06%

updated 2026-01-26T15:05:39.840000

2 posts

Using string formatting and exception handling, an attacker may bypass n8n's python-task-executor sandbox restrictions and run arbitrary unrestricted Python code in the underlying operating system. The vulnerability can be exploited via the Code block by an authenticated user with basic permissions and can lead to a full n8n instance takeover on instances operating under "Internal" execution mode

beyondmachines1@infosec.exchange at 2026-01-29T20:01:05.000Z ##

Critical n8n Sandbox Escapes Enable Remote Code Execution

n8n reports two sandbox escape vulnerabilities, CVE-2026-1470 and CVE-2026-0863, that allow authenticated users to execute arbitrary code and take over self-hosted servers. These flaws bypass JavaScript and Python security filters by exploiting deprecated language features and specific interpreter behaviors.

**If you are using n8n, make sure it's isolated from the internet and accessible from trusted users only. Then patch n8n to version 1.123.17, 2.4.5 for CVE-2026-1470, and 1.123.14, 2.3.5 for CVE-2026-0863 or later. The CVE-2026-1470 patch is higher priority. Also configure Python nodes to run in 'External' mode for better process isolation.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

benzogaga33@mamot.fr at 2026-01-29T10:40:04.000Z ##

n8n – CVE-2026-1470 et CVE-2026-0863 : deux nouvelles failles patchées, comment se protéger ? it-connect.fr/n8n-cve-2026-147 #ActuCybersécurité #Cybersécurité #Vulnérabilité

##

CVE-2026-0920
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-01-26T15:04:59.737000

1 posts

The LA-Studio Element Kit for Elementor plugin for WordPress is vulnerable to Administrative User Creation in all versions up to, and including, 1.5.6.3. This is due to the 'ajax_register_handle' function not restricting what user roles a user can register with. This makes it possible for unauthenticated attackers to supply the 'lakit_bkrole' parameter during registration and gain administrator ac

3 repos

https://github.com/John-doe-code-a11/CVE-2026-0920

https://github.com/Galaxy-sc/CVE-2026-0920-WordPress-LA-Studio-Exploit

https://github.com/O99099O/By-Poloss..-..CVE-2026-0920

DarkWebInformer@infosec.exchange at 2026-01-29T20:49:11.000Z ##

‼️ CVE-2026-0920: Explanation and payload of the recent vulnerability in the LA-Studio Element WordPress plugin.

PoC/Exploit: github.com/John-doe-code-a11/C

CVSS: 9.8
CVE Published: January 22nd, 2026

Advisory: github.com/advisories/GHSA-m3h

Technical Analysis: wordfence.com/blog/2026/01/200

##

CVE-2025-15059
(7.8 HIGH)

EPSS: 0.06%

updated 2026-01-26T15:04:14.850000

1 posts

GIMP PSP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PSP files. The issue results f

linux@activitypub.awakari.com at 2026-01-28T23:26:22.000Z ## Debian DSA-6115-1 GIMP Important Buffer Overflow DoS CVE-2025-15059 A buffer overflow was discovered in GIMP, the GNU Image Manipulation Program, which could result in denial of service or potentia...

#Debian #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2026-0755
(9.8 CRITICAL)

EPSS: 1.27%

updated 2026-01-23T06:31:32

1 posts

gemini-mcp-tool execAsync Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of gemini-mcp-tool. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the execAsync method. The issue results from the lack of proper validation of a user-su

DarkWebInformer@infosec.exchange at 2026-01-30T19:05:01.000Z ##

‼️ CVE-2026-0755: Reported Zero-Day in Gemini MCP Tool Could Allow Remote Code Execution

Zero-Day: Yes
CVSS: 9.8
CVE Published: January 23rd, 2026

Affected Vendor: Gemini MCP Tool
Vulnerability Type: Remote Code Execution (RCE)

Advisory: github.com/advisories/GHSA-28q

##

CVE-2026-20045
(8.2 HIGH)

EPSS: 1.10%

updated 2026-01-22T14:28:35.883000

1 posts

A vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM &amp; Presence Service (Unified CM IM&amp;P), Cisco Unity Connection, and Cisco Webex Calling Dedicated Instance could allow an unauthenticated, remote attacker&nbsp;to execute arbitrary commands on the under

1 repos

https://github.com/dkstar11q/Ashwesker-CVE-2026-20045

ntkramer@infosec.exchange at 2026-01-31T16:52:04.000Z ##

🍩 & #threatintel - Since its disclosure 11 days ago, 95% of the exploitation attempts of CVE-2026-20045, a critical vulnerability in Cisco Unified Communications Manager, have used a distinctive user-agent: Mozilla/5.0 (compatible; CiscoExploit/1.0) and are heavily targeted against our Cisco Unified Communications Manager (UCM) sensors.

We're tracking it here: viz.greynoise.io/tags/cisco-un

Appears to be from github.com/Ashwesker/Ashwesker

##

CVE-2025-12383
(7.4 HIGH)

EPSS: 0.06%

updated 2026-01-16T20:09:26.027000

1 posts

In Eclipse Jersey versions 2.45, 3.0.16, 3.1.9 a race condition can cause ignoring of critical SSL configurations - such as mutual authentication, custom key/trust stores, and other security settings. This issue may result in SSLHandshakeException under normal circumstances, but under certain conditions, it could lead to unauthorized trust in insecure servers (see PoC)

certvde at 2026-02-02T07:55:49.749Z ##

VDE-2026-006
Pilz: Multiple Vulnerabilities affecting the PIT User Authentication Service

The PIT User Authentication Service is affected by multiple vulnerabilities in included third-party components.
CVE-2025-31650, CVE-2025-48988, CVE-2025-12383, CVE-2025-61795

certvde.com/en/advisories/vde-

pilz.csaf-tp.certvde.com/.well

##

CVE-2026-21858
(10.0 CRITICAL)

EPSS: 5.37%

updated 2026-01-13T15:05:00

1 posts

### Impact A vulnerability in n8n allows an attacker to access files on the underlying server through execution of certain form-based workflows. A vulnerable workflow could grant access to an unauthenticated remote attacker. This could result in exposure of sensitive information stored on the system and may enable further compromise depending on deployment configuration and workflow usage. ### Pa

Nuclei template

9 repos

https://github.com/SystemVll/CVE-2026-21858

https://github.com/Chocapikk/CVE-2026-21858

https://github.com/Alhakim88/CVE-2026-21858

https://github.com/MOGMUNI/CVE-2026-21858

https://github.com/sec-dojo-com/CVE-2026-21858

https://github.com/cropnet/ni8mare-scanner

https://github.com/sastraadiwiguna-purpleeliteteaming/SASTRA-ADI-WIGUNA-CVE-2026-21858-Holistic-Audit

https://github.com/MOGMUNI/mogmuni.github.io

https://github.com/bgarz929/Ashwesker-CVE-2026-21858

cvedatabase@techhub.social at 2026-02-02T10:05:25.000Z ##

RCE Threat in Workflow Automation
⚠️ CVE-2026-21858 — Critical unauthenticated remote code execution in n8n self-hosted instances can allow complete takeover if left unpatched.
Check remediation guidance here:
👉 cvedatabase.com/cve/CVE-2026-2 #CyberSecurity #DevOps

##

CVE-2025-61729
(7.5 HIGH)

EPSS: 0.02%

updated 2025-12-03T00:31:35

1 posts

Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.

linux@activitypub.awakari.com at 2026-02-02T09:31:46.000Z ## Oracle Linux 10 ELSA-2026-1715 Important Fix for CVE-2025-61729 The following updated rpms for Oracle Linux 10 have been uploaded to the Unbreakable Linux Network:

#Oracle #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-61795(CVSS UNKNOWN)

EPSS: 0.12%

updated 2025-11-21T15:19:20

1 posts

If an error occurred (including exceeding limits) during the processing of a multipart upload, temporary copies of the uploaded parts written to disc were not cleaned up immediately but left for the garbage collection process to delete. Depending on JVM settings, application memory usage and application load, it was possible that space for the temporary copies of uploaded parts would be filled fas

certvde at 2026-02-02T07:55:49.749Z ##

VDE-2026-006
Pilz: Multiple Vulnerabilities affecting the PIT User Authentication Service

The PIT User Authentication Service is affected by multiple vulnerabilities in included third-party components.
CVE-2025-31650, CVE-2025-48988, CVE-2025-12383, CVE-2025-61795

certvde.com/en/advisories/vde-

pilz.csaf-tp.certvde.com/.well

##

CVE-2025-11001
(7.0 None)

EPSS: 0.37%

updated 2025-11-20T00:31:21

1 posts

7-Zip ZIP File Parsing Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of 7-Zip. Interaction with this product is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the handling of symbolic links in ZIP files. Craf

6 repos

https://github.com/lastvocher/7zip-CVE-2025-11001

https://github.com/I3r1h0n/7Ziprowler

https://github.com/mbanyamer/CVE-2025-11001---7-Zip

https://github.com/ranasen-rat/CVE-2025-11001

https://github.com/pacbypass/CVE-2025-11001

https://github.com/shalevo13/Se7enSlip

ruario@vivaldi.net at 2026-01-30T09:34:10.000Z ##

@TeddyTheBest Yes it is open source but it is a little tough to claim the moral high ground here when 7-Zip also frequently has security issues and like WinRAR offers no autoupdate

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-11953
(9.8 CRITICAL)

EPSS: 0.40%

updated 2025-11-11T17:15:38.977000

6 posts

The Metro Development Server, which is opened by the React Native Community CLI, binds to external interfaces by default. The server exposes an endpoint that is vulnerable to OS command injection. This allows unauthenticated network attackers to send a POST request to the server and run arbitrary executables. On Windows, the attackers can also execute arbitrary shell commands with fully controlled

4 repos

https://github.com/N3k0t-dev/PoC-CVE-collection

https://github.com/SaidBenaissa/cve-2025-11953-vulnerability-demo

https://github.com/Mr-In4inci3le/CVE-2025-11953-POC-

https://github.com/boroeurnprach/CVE-2025-11953-PoC

undercodenews@mastodon.social at 2026-02-03T16:44:01.000Z ##

Metro4Shell Exploit Targets React Native Developers, Delivering Cross-Platform Malware

A critical vulnerability in the Metro server for React Native, tracked as CVE-2025-11953, is actively being exploited by hackers to deliver malicious payloads to both Windows and Linux systems. This flaw exposes developers and organizations relying on React Native to severe risk, especially during the application development phase. Metro, the default JavaScript bundler for React…

undercodenews.com/metro4shell-

##

oversecurity@mastodon.social at 2026-02-03T14:50:06.000Z ##

Hackers exploit critical React Native Metro bug to breach dev systems

Hackers are targeting developers by exploiting the critical vulnerability CVE-2025-11953 in the Metro server for React Native to deliver malicious...

🔗️ [Bleepingcomputer] link.is.it/9a1Dng

##

defendopsdiaries at 2026-02-03T14:20:15.652Z ##

A single overlooked feature in a popular React Native tool let hackers run code on thousands of developer machines worldwide. Curious how one tiny flaw exposed the whole supply chain?

thedefendopsdiaries.com/metro4

##

oversecurity@mastodon.social at 2026-02-03T14:20:07.000Z ##

Hackers exploit critical React Native Metro bug to breach dev systems

Hackers are targeting developers by exploiting the critical vulnerability CVE-2025-11953 in the Metro server for React Native to deliver malicious...

🔗️ [Bleepingcomputer] link.is.it/w9Y7HI

##

oversecurity@mastodon.social at 2026-02-03T14:50:06.000Z ##

Hackers exploit critical React Native Metro bug to breach dev systems

Hackers are targeting developers by exploiting the critical vulnerability CVE-2025-11953 in the Metro server for React Native to deliver malicious...

🔗️ [Bleepingcomputer] link.is.it/9a1Dng

##

oversecurity@mastodon.social at 2026-02-03T14:20:07.000Z ##

Hackers exploit critical React Native Metro bug to breach dev systems

Hackers are targeting developers by exploiting the critical vulnerability CVE-2025-11953 in the Metro server for React Native to deliver malicious...

🔗️ [Bleepingcomputer] link.is.it/w9Y7HI

##

CVE-2024-10460
(5.3 MEDIUM)

EPSS: 0.42%

updated 2025-11-04T00:31:55

1 posts

The origin of an external protocol handler prompt could have been obscured using a data: URL within an `iframe`. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132.

linux@activitypub.awakari.com at 2026-02-03T02:45:54.000Z ## Ubuntu 22.04 LTS Thunderbird Security Advisory USN-7991-1 CVE-2024-10460 Several security issues were fixed in Thunderbird.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-31650(CVSS UNKNOWN)

EPSS: 3.28%

updated 2025-11-03T22:55:50

1 posts

Improper Input Validation vulnerability in Apache Tomcat. Incorrect error handling for some invalid HTTP priority headers resulted in incomplete clean-up of the failed request which created a memory leak. A large number of such requests could trigger an OutOfMemoryException resulting in a denial of service. This issue affects Apache Tomcat: from 9.0.76 through 9.0.102, from 10.1.10 through 10.1.3

7 repos

https://github.com/sattarbug/Analysis-of-TomcatKiller---CVE-2025-31650-Exploit-Tool

https://github.com/B1gN0Se/Tomcat-CVE-2025-31650

https://github.com/assad12341/Dos-exploit-

https://github.com/tunahantekeoglu/CVE-2025-31650

https://github.com/absholi7ly/TomcatKiller-CVE-2025-31650

https://github.com/assad12341/DOS-exploit

https://github.com/obscura-cert/CVE-2025-31650

certvde at 2026-02-02T07:55:49.749Z ##

VDE-2026-006
Pilz: Multiple Vulnerabilities affecting the PIT User Authentication Service

The PIT User Authentication Service is affected by multiple vulnerabilities in included third-party components.
CVE-2025-31650, CVE-2025-48988, CVE-2025-12383, CVE-2025-61795

certvde.com/en/advisories/vde-

pilz.csaf-tp.certvde.com/.well

##

CVE-2025-48988
(7.5 HIGH)

EPSS: 0.12%

updated 2025-11-03T21:34:01

1 posts

Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommende

2 repos

https://github.com/Samb102/POC-CVE-2025-48988-CVE-2025-48976

https://github.com/nankuo/CVE-2025-48976_CVE-2025-48988

certvde at 2026-02-02T07:55:49.749Z ##

VDE-2026-006
Pilz: Multiple Vulnerabilities affecting the PIT User Authentication Service

The PIT User Authentication Service is affected by multiple vulnerabilities in included third-party components.
CVE-2025-31650, CVE-2025-48988, CVE-2025-12383, CVE-2025-61795

certvde.com/en/advisories/vde-

pilz.csaf-tp.certvde.com/.well

##

CVE-2025-8088
(8.8 HIGH)

EPSS: 4.61%

updated 2025-10-30T15:50:59.680000

1 posts

A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET.

26 repos

https://github.com/jordan922/CVE-2025-8088

https://github.com/Shinkirou789/Cve-2025-8088-WinRar-vulnerability

https://github.com/techcorp/CVE-2025-8088-Exploit

https://github.com/papcaii2004/CVE-2025-8088-WinRAR-builder

https://github.com/pexlexity/WinRAR-CVE-2025-8088-Path-Traversal-PoC

https://github.com/0xAbolfazl/CVE-2025-8088-WinRAR-PathTraversal-PoC

https://github.com/ilhamrzr/RAR-Anomaly-Inspector

https://github.com/hexsecteam/CVE-2025-8088-Winrar-Tool

https://github.com/AdityaBhatt3010/CVE-2025-8088-WinRAR-Zero-Day-Path-Traversal

https://github.com/knight0x07/WinRAR-CVE-2025-8088-PoC-RAR

https://github.com/travisbgreen/cve-2025-8088

https://github.com/pentestfunctions/best-CVE-2025-8088

https://github.com/nhattanhh/CVE-2025-8088

https://github.com/xi0onamdev/WinRAR-CVE-2025-8088-Exploitation-Toolkit

https://github.com/pescada-dev/-CVE-2025-8088

https://github.com/lucyna77/winrar-exploit

https://github.com/ghostn4444/CVE-2025-8088

https://github.com/hbesljx/CVE-2025-8088-EXP

https://github.com/onlytoxi/CVE-2025-8088-Winrar-Tool

https://github.com/pentestfunctions/CVE-2025-8088-Multi-Document

https://github.com/kitsuneshade/WinRAR-Exploit-Tool---Rust-Edition

https://github.com/walidpyh/CVE-2025-8088

https://github.com/DeepBlue-dot/CVE-2025-8088-WinRAR-Startup-PoC

https://github.com/sxyrxyy/CVE-2025-8088-WinRAR-Proof-of-Concept-PoC-Exploit-

https://github.com/nuky-alt/CVE-2025-8088

https://github.com/Markusino488/cve-2025-8088

Andy_Thompson@infosec.exchange at 2026-01-29T17:54:31.000Z ##

📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.

Sources:
- bleepingcomputer.com/news/secu
- cloud.google.com/blog/topics/t
- nvd.nist.gov/vuln/detail/CVE-2
- helpnetsecurity.com/2026/01/28

---

🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀

CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.

Sources:
- nvd.nist.gov/vuln/detail/CVE-2
infosecurity-magazine.com/news
- openssl-library.org/news/vulne
- twitter.com/IntCyberDigest/sta

---

🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡

SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.

Sources:
- bleepingcomputer.com/news/secu
- helpnetsecurity.com/2026/01/29
- rapid7.com/blog/post/etr-multi
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-0282
(9.0 CRITICAL)

EPSS: 94.11%

updated 2025-10-24T13:54:58.783000

1 posts

A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a remote unauthenticated attacker to achieve remote code execution.

Nuclei template

10 repos

https://github.com/Hexastrike/Ivanti-Connect-Secure-Logs-Parser

https://github.com/gmh5225/Blackash-CVE-2025-0282

https://github.com/sfewer-r7/CVE-2025-0282

https://github.com/AdaniKamal/CVE-2025-0282

https://github.com/watchtowrlabs/CVE-2025-0282

https://github.com/punitdarji/Ivanti-CVE-2025-0282

https://github.com/absholi7ly/CVE-2025-0282-Ivanti-exploit

https://github.com/rxwx/pulse-meter

https://github.com/AnonStorks/CVE-2025-0282-Full-version

https://github.com/almanatra/CVE-2025-0282

ntkramer@infosec.exchange at 2026-01-29T17:20:10.000Z ##

☕ & #threatintel - Two campaigns (100x spike!) are hitting Ivanti Connect Secure; one loud (34K sessions from Romania/Moldova), one stealthy (~6K distributed IPs). Both target a pre-exploitation endpoint for CVE-2025-0282. labs.greynoise.io/grimoire/202

##

CVE-2025-10666
(8.8 HIGH)

EPSS: 5.09%

updated 2025-09-19T21:32:20

1 posts

A security flaw has been discovered in D-Link DIR-825 up to 2.10. Affected by this vulnerability is the function sub_4106d4 of the file apply.cgi. The manipulation of the argument countdown_time results in buffer overflow. The attack can be executed remotely. The exploit has been released to the public and may be exploited. This vulnerability only affects products that are no longer supported by t

exploitdb_bot@mastodon.social at 2026-02-02T09:16:05.000Z ##

🚨 New Exploit: D-Link DIR-825 Rev.B 2.10 - Stack Buffer Overflow (DoS)
📋 CVE: CVE-2025-10666
👤 Author: Beatriz Fresno Naumova

🔗 exploit-db.com/exploits/52469

#ExploitDB #InfoSec #CyberSecurity #CVE-2025-10666

##

CVE-2025-49825
(9.8 CRITICAL)

EPSS: 7.60%

updated 2025-06-18T14:15:12

2 posts

### Impact A full technical disclosure and open-source patch will be published after the embargo period, ending on June 30th, to allow all users to upgrade. Teleport security engineers identified a critical security vulnerability that could allow remote authentication bypass of Teleport. Teleport Cloud Infrastructure and CI/CD build, test, and release infrastructure aren’t affected. For the

Nuclei template

_r_netsec at 2026-02-03T08:28:06.514Z ##

Exploiting CVE-2025-49825 (authentication bypass vulnerability in Teleport) blog.offensive.af/posts/exploi

##

_r_netsec@infosec.exchange at 2026-02-03T08:28:06.000Z ##

Exploiting CVE-2025-49825 (authentication bypass vulnerability in Teleport) blog.offensive.af/posts/exploi

##

CVE-2022-48986
(5.5 MEDIUM)

EPSS: 0.10%

updated 2024-11-01T15:32:52

1 posts

In the Linux kernel, the following vulnerability has been resolved: mm/gup: fix gup_pud_range() for dax For dax pud, pud_huge() returns true on x86. So the function works as long as hugetlb is configured. However, dax doesn't depend on hugetlb. Commit 414fd080d125 ("mm/gup: fix gup_pmd_range() for dax") fixed devmap-backed huge PMDs, but missed devmap-backed huge PUDs. Fix this as well. This fi

linux@activitypub.awakari.com at 2026-01-29T20:27:23.000Z ## Ubuntu 18.04 Kernel Critical Security Flaws USN-7988-1 CVE-2022-48986 Several security issues were fixed in the Linux kernel.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2023-38346
(8.8 HIGH)

EPSS: 1.23%

updated 2024-04-04T07:48:27

2 posts

An issue was discovered in Wind River VxWorks 6.9 and 7. The function ``tarExtract`` implements TAR file extraction and thereby also processes files within an archive that have relative or absolute file paths. A developer using the "tarExtract" function may expect that the function will strip leading slashes from absolute paths or stop processing when encountering relative paths that are outside o

floyd@chaos.social at 2026-02-02T20:51:00.000Z ##

RE: mastodon.social/@bagder/116001

My CVEs are still at 0 medals, but thanks to VxWorks I was able to achieve a CVE on Mars (#Curiosity rover, CVE-2023-38346) 😉

Btw. if anyone from #NASA could confirm curiosity was/is really affected (but probably without attack vector so no impact I guess), that would mean a lot to me

##

floyd@chaos.social at 2026-02-02T20:51:00.000Z ##

RE: mastodon.social/@bagder/116001

My CVEs are still at 0 medals, but thanks to VxWorks I was able to achieve a CVE on Mars (#Curiosity rover, CVE-2023-38346) 😉

Btw. if anyone from #NASA could confirm curiosity was/is really affected (but probably without attack vector so no impact I guess), that would mean a lot to me

##

CVE-2022-37393
(7.8 HIGH)

EPSS: 5.12%

updated 2023-01-30T05:06:18

1 posts

Zimbra's sudo configuration permits the zimbra user to execute the zmslapd binary as root with arbitrary parameters. As part of its intended functionality, zmslapd can load a user-defined configuration file, which includes plugins in the form of .so files, which also execute as root.

iagox86@infosec.exchange at 2026-01-30T22:01:27.000Z ##

@Weld When I was at Rapid7, we were firm that we wouldn't sign anything preventing us from disclosing. Sometimes that made it real difficult to talk to the company

Sadly the link to the disclosure is dead now, but this was my favourite: attackerkb.com/topics/92AeLOE1

##

CVE-2019-15006(CVSS UNKNOWN)

EPSS: 0.67%

updated 2023-01-29T05:00:49

2 posts

There was a man-in-the-middle (MITM) vulnerability present in the Confluence Previews plugin in Confluence Server and Confluence Data Center. This plugin was used to facilitate communication with the Atlassian Companion application. The Confluence Previews plugin in Confluence Server and Confluence Data Center communicated with the Companion application via the atlassian-domain-for-localhost-conne

FritzAdalis at 2026-02-02T17:51:29.544Z ##

@rk @hrbrmstr
Are you forgetting CVE-2019-15006 by Taylor Swift on Security?

##

FritzAdalis@infosec.exchange at 2026-02-02T17:51:29.000Z ##

@rk @hrbrmstr
Are you forgetting CVE-2019-15006 by Taylor Swift on Security?

##

CVE-2026-24513
(0 None)

EPSS: 0.00%

2 posts

N/A

CVE-2026-24514
(0 None)

EPSS: 0.00%

2 posts

N/A

CVE-2026-23743
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-01-30T21:33:55.000Z ##

🟠 CVE-2026-23743 - High (7.5)

Discourse is an open source discussion platform. In versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0, permalinks pointing to access-restricted resources (private topics, categories, posts, or hidden tags) were redirecting users to URLs ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24854
(0 None)

EPSS: 0.03%

1 posts

N/A

thehackerwire@mastodon.social at 2026-01-30T16:17:18.000Z ##

🟠 CVE-2026-24854 - High (8.8)

ChurchCRM is an open-source church management system. A SQL Injection vulnerability exists in endpoint `/PaddleNumEditor.php` in ChurchCRM prior to version 6.7.2. Any authenticated user, including one with zero assigned permissions, can exploit SQ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-63261
(0 None)

EPSS: 0.00%

1 posts

N/A

pentesttools@infosec.exchange at 2026-01-30T13:05:42.000Z ##

🔥 A vulnerability in AWStats sitting in a cPanel tree... H I D I N G?

We discovered it.

CVE-2025-63261 (or as we call it: PTT-2025-021) is what happens when "legacy meets lazy":

A single "|" in an HTTP GET param leads straight to RCE via Perl’s unsafe open() call.

And yes, this was sitting in AWStats.

Why it matters:

🔹 It’s already 2026, and we’re still finding bugs from 2000s-era web tools
🔹 Attack surface doesn’t disappear, it just ages quietly
🔹 RCE doesn’t need zero-days when it has zero hygiene

📝 We have a very comprehensive Part 1 article, written by Matei Badanoiu, who walks us through:

✅ How we found the bug
✅ How we turned it into a working exploit
✅ Why these “boring” vulns still matter

Read the article here: pentest-tools.com/blog/cpanel-

##

CVE-2026-22806
(0 None)

EPSS: 0.01%

1 posts

N/A

thehackerwire@mastodon.social at 2026-01-29T20:18:44.000Z ##

🔴 CVE-2026-22806 - Critical (9.1)

vCluster Platform provides a Kubernetes platform for managing virtual clusters, multi-tenancy, and cluster sharing. Prior to versions 4.6.0, 4.5.4, 4.4.2, and 4.3.10, when an access key is created with a limited scope, the scope can be bypassed to...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-62514
(0 None)

EPSS: 0.03%

1 posts

N/A

thehackerwire@mastodon.social at 2026-01-29T17:00:13.000Z ##

🟠 CVE-2025-62514 - High (8.3)

Parsec is a cloud-based application for cryptographically secure file sharing. In versions on the 3.x branch prior to 3.6.0, `libparsec_crypto`, a component of the Parsec application, does not check for weak order point of Curve25519 when compiled...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

hackmag@infosec.exchange at 2026-01-29T10:00:03.000Z ##

⚪ Microsoft rushes to fix Office 0-day vulnerability actively exploited by hackers

🗨️ Microsoft developers have released out-of-band patches for a critical Office vulnerability that is already being actively exploited in attacks. The issue affects almost all versions of the product—from Office 2016 to Microsoft 365 Apps for Enterprise.

🔗 hackmag.com/news/cve-2026-2150

#news

##

CVE-2026-24897
(0 None)

EPSS: 0.58%

1 posts

N/A

thehackerwire@mastodon.social at 2026-01-28T23:58:27.000Z ##

🔴 CVE-2026-24897 - Critical (10)

Erugo is a self-hosted file-sharing platform. In versions up to and including 0.2.14, an authenticated low-privileged user can upload arbitrary files to any specified location due to insufficient validation of user‑supplied paths when creating s...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24856
(0 None)

EPSS: 0.02%

1 posts

N/A

thehackerwire@mastodon.social at 2026-01-28T21:59:58.000Z ##

🟠 CVE-2026-24856 - High (7.8)

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Versions prior to 2.3.1.2 have an undefined behavior issue when floating-point NaN values are converted to...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

Visit counter For Websites