## Updated at UTC 2026-02-05T14:11:35.143749

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-25614 7.5 0.05% 1 0 2026-02-05T09:31:13 Blesta 3.x through 5.x before 5.13.3 allows object injection, aka CORE-5680.
CVE-2026-1761 8.6 0.14% 1 0 2026-02-05T07:16:17.797000 A flaw was found in libsoup. This stack-based buffer overflow vulnerability occu
CVE-2026-1642 5.9 0.00% 1 0 2026-02-05T06:15:53.893000 A vulnerability exists in NGINX OSS and NGINX Plus when configured to proxy to u
CVE-2025-10314 8.8 0.00% 2 0 2026-02-05T03:30:23 Incorrect Default Permissions vulnerability in Mitsubishi Electric Corporation F
CVE-2025-11730 7.2 0.00% 2 0 2026-02-05T02:15:52.380000 A post‑authentication command injection vulnerability in the Dynamic DNS (DDNS)
CVE-2026-25546 7.8 0.00% 4 1 2026-02-05T00:37:13 ### Impact A Command Injection vulnerability in godot-mcp allows remote code ex
CVE-2026-25539 9.1 0.00% 2 0 2026-02-05T00:36:45 ## Summary The `/api/file/copyFile` endpoint does not validate the `dest` param
CVE-2025-13192 8.2 0.00% 2 0 2026-02-05T00:31:08 The Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, an
CVE-2026-22038 8.1 0.00% 2 0 2026-02-04T23:15:56.057000 AutoGPT is a platform that allows users to create, deploy, and manage continuous
CVE-2026-25583 7.8 0.00% 2 0 2026-02-04T22:16:01.540000 iccDEV provides a set of libraries and tools that allow for the interaction, man
CVE-2026-25526 9.8 0.00% 2 0 2026-02-04T22:15:59.510000 JinJava is a Java-based template engine based on django template syntax, adapted
CVE-2026-24735 7.5 0.02% 1 0 2026-02-04T21:57:36 Exposure of Private Personal Information to an Unauthorized Actor vulnerability
CVE-2026-25161 8.8 0.00% 2 0 2026-02-04T21:56:57 ### Summary The application contains a Path Traversal vulnerability (CWE-22) in
CVE-2026-25160 9.1 0.00% 4 0 2026-02-04T21:56:51 ### Summary The application disables TLS certificate verification by default for
CVE-2026-25121 7.5 0.00% 2 0 2026-02-04T21:55:46 A Path Traversal vulnerability was discovered in apko's dirFS filesystem abstrac
CVE-2026-24884 8.4 0.00% 2 0 2026-02-04T21:55:36 # Arbitrary File Write via Symlink Extraction in `github.com/node-modules/compre
CVE-2026-24844 7.8 0.00% 2 0 2026-02-04T21:55:30 An attacker who can provide build input values, but not modify pipeline definiti
CVE-2026-23897 7.5 0.00% 2 0 2026-02-04T21:55:12 ### Impact The default configuration of `startStandaloneServer` from `@apollo/s
CVE-2025-13375 9.8 0.00% 2 0 2026-02-04T21:30:43 IBM Common Cryptographic Architecture (CCA) 7.5.52 and 8.4.82 could allow an una
CVE-2026-0536 7.8 0.00% 2 0 2026-02-04T21:30:43 A maliciously crafted GIF file, when parsed through Autodesk 3ds Max, can cause
CVE-2025-69875 7.8 0.02% 2 0 2026-02-04T21:30:32 A vulnerability exists in Quick Heal Total Security 23.0.0 in the quarantine man
CVE-2025-70841 10.0 0.03% 1 0 2026-02-04T21:30:32 Dokans Multi-Tenancy Based eCommerce Platform SaaS 3.9.2 allows unauthenticated
CVE-2026-25027 7.5 0.05% 2 0 2026-02-04T21:30:30 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2025-69620 7.5 0.01% 2 0 2026-02-04T21:15:58.150000 A path traversal in Moo Chan Song v4.5.7 allows attackers to cause a Denial of S
CVE-2026-25505 9.8 0.00% 2 0 2026-02-04T20:16:07.707000 Bambuddy is a self-hosted print archive and management system for Bambu Lab 3D p
CVE-2026-25502 7.8 0.01% 2 0 2026-02-04T20:16:07.593000 iccDEV provides a set of libraries and tools that allow for the interaction, man
CVE-2026-25157 7.7 0.00% 5 0 2026-02-04T20:16:06.577000 OpenClaw is a personal AI assistant. Prior to version 2026.1.29, there is an OS
CVE-2026-25143 7.8 0.00% 5 0 2026-02-04T20:16:06.227000 melange allows users to build apk packages using declarative pipelines. From ver
CVE-2026-24843 8.2 0.00% 2 0 2026-02-04T20:16:05.393000 melange allows users to build apk packages using declarative pipelines. In versi
CVE-2026-24514 6.5 0.04% 1 0 2026-02-04T20:05:49 A security issue was discovered in ingress-nginx where the validating admission
CVE-2026-24513 3.1 0.03% 1 0 2026-02-04T20:05:32 A security issue was discovered in ingress-nginx where the protection afforded b
CVE-2026-24512 8.8 0.10% 4 0 2026-02-04T20:04:50 A security issue was discovered in ingress-nginx. Tthe `rules.http.paths.path` I
CVE-2025-64712 9.8 0.00% 2 0 2026-02-04T19:53:06 A Path Traversal vulnerability in the `partition_msg` function allows an attacke
CVE-2025-61917 7.7 0.00% 2 0 2026-02-04T19:53:01 ### Impact The use of `Buffer.allocUnsafe()` and `Buffer.allocUnsafeSlow()` in
CVE-2025-70560 8.4 0.02% 1 0 2026-02-04T19:43:53 Boltz 2.0.0 contains an insecure deserialization vulnerability in its molecule l
CVE-2026-25140 7.5 0.00% 2 0 2026-02-04T19:16:15.117000 apko allows users to build and publish OCI container images built from apk packa
CVE-2025-59439 7.5 0.02% 2 0 2026-02-04T19:16:13.590000 An issue was discovered in Samsung Mobile Processor, Wearable Processor and Mode
CVE-2025-67187 9.8 0.02% 2 0 2026-02-04T18:31:37 A stack-based buffer overflow vulnerability was identified in TOTOLINK A950RG V4
CVE-2025-46651 9.1 0.02% 2 0 2026-02-04T18:31:36 Tiny File Manager through 2.6 contains a server-side request forgery (SSRF) vuln
CVE-2025-60865 7.8 0.01% 2 0 2026-02-04T18:31:36 Insecure Permissions vulnerability in avanquest Driver Updater v.9.1.57803.1174
CVE-2025-67186 9.8 0.07% 2 0 2026-02-04T18:31:36 TOTOLINK A950RG V4.1.2cu.5204_B20210112 contains a buffer overflow vulnerability
CVE-2025-66374 7.8 0.02% 1 0 2026-02-04T18:31:36 CyberArk Endpoint Privilege Manager Agent through 25.10.0 allows a local user to
CVE-2026-0660 7.8 0.00% 2 0 2026-02-04T18:30:51 A maliciously crafted GIF file, when parsed through Autodesk 3ds Max, can cause
CVE-2026-20119 7.5 0.00% 3 0 2026-02-04T18:30:51 A vulnerability in the text rendering subsystem of Cisco TelePresence Collaborat
CVE-2026-0659 7.8 0.00% 2 0 2026-02-04T18:30:51 A maliciously crafted USD file, when loaded or imported into Autodesk Arnold or
CVE-2026-0662 7.8 0.00% 1 0 2026-02-04T18:30:51 A maliciously crafted project directory, when opening a max file in Autodesk 3ds
CVE-2026-0537 7.8 0.00% 4 0 2026-02-04T18:30:50 A maliciously crafted RGB file, when parsed through Autodesk 3ds Max, can force
CVE-2025-59818 10.0 0.08% 1 0 2026-02-04T18:30:39 This vulnerability allows authenticated attackers to execute arbitrary commands
CVE-2025-61506 9.8 0.04% 2 1 2026-02-04T18:30:31 An issue was discovered in MediaCrush thru 1.0.1 allowing remote unauthenticated
CVE-2025-63624 9.8 0.04% 2 0 2026-02-04T18:30:31 SQL Injection vulnerability in Shandong Kede Electronics Co., Ltd IoT smart wate
CVE-2025-63372 7.5 0.06% 2 0 2026-02-04T18:30:31 Articentgroup Zip Rar Extractor Tool 1.345.93.0 is vulnerable to Directory Trave
CVE-2025-65875 8.8 0.06% 1 0 2026-02-04T18:30:31 An arbitrary file upload vulnerability in the AddFont() function of FPDF v1.86 a
CVE-2026-1530 8.1 0.02% 1 0 2026-02-04T17:47:39 A flaw was found in fog-kubevirt. This vulnerability allows a remote attacker to
CVE-2026-1531 8.1 0.02% 1 0 2026-02-04T17:46:55 A flaw was found in foreman_kubevirt. When configuring the connection to OpenShi
CVE-2026-25223 7.5 0.03% 2 0 2026-02-04T17:46:03 ### Impact A validation bypass vulnerability exists in Fastify where request bo
CVE-2026-25510 10.0 0.23% 2 0 2026-02-04T17:46:00 **Summary** A critical vulnerability has been identified in CI4MS that allows a
CVE-2026-25049 0 0.00% 16 0 2026-02-04T17:16:22.833000 n8n is an open source workflow automation platform. Prior to versions 1.123.17 a
CVE-2026-20098 8.8 0.00% 3 0 2026-02-04T17:16:14.107000 A vulnerability in the Certificate Management feature of Cisco Meeting Managemen
CVE-2026-0661 7.8 0.00% 2 0 2026-02-04T17:16:12.947000 A maliciously crafted RGB file, when parsed through Autodesk 3ds Max, can force
CVE-2026-0538 7.8 0.00% 2 0 2026-02-04T17:16:12.403000 A maliciously crafted GIF file, when parsed through Autodesk 3ds Max, can force
CVE-2025-14550 7.5 0.04% 1 0 2026-02-04T17:09:58.100000 An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4
CVE-2026-1340 9.8 0.18% 3 0 2026-02-04T16:34:21.763000 A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve
CVE-2025-57529 9.8 0.02% 1 1 2026-02-04T16:34:21.763000 YouDataSum CPAS Audit Management System <=v4.9 is vulnerable to SQL Injection in
CVE-2025-63649 7.5 0.05% 1 0 2026-02-04T16:34:21.763000 An out-of-bounds read in the http_parser_transfer_encoding_chunked function (mk_
CVE-2026-1580 8.8 0.10% 4 0 2026-02-04T16:33:44.537000 A security issue was discovered in ingress-nginx where the `nginx.ingress.kubern
CVE-2026-1632 9.1 0.13% 3 0 2026-02-04T16:33:44.537000 MOMA Seismic Station Version v2.4.2520 and prior exposes its web management inte
CVE-2026-1341 0 0.02% 1 0 2026-02-04T16:33:44.537000 Avation Light Engine Pro exposes its configuration and control interface without
CVE-2025-15285 7.5 0.08% 1 0 2026-02-04T16:33:44.537000 The SEO Flow by LupsOnline plugin for WordPress is vulnerable to unauthorized mo
CVE-2025-15268 7.5 0.07% 1 0 2026-02-04T16:33:44.537000 The Infility Global plugin for WordPress is vulnerable to unauthenticated SQL In
CVE-2026-25150 9.3 0.02% 1 0 2026-02-04T16:33:44.537000 Qwik is a performance focused javascript framework. Prior to version 1.19.0, a p
CVE-2026-1803 8.1 0.02% 2 0 2026-02-04T16:33:44.537000 A weakness has been identified in Ziroom ZHOME A0101 1.0.1.0. Impacted is an unk
CVE-2026-24773 7.5 0.03% 2 0 2026-02-04T16:33:44.537000 The Open eClass platform (formerly known as GUnet eClass) is a complete course m
CVE-2021-39935 6.8 80.80% 3 0 2026-02-04T15:56:15.730000 An issue has been discovered in GitLab CE/EE affecting all versions starting fro
CVE-2025-15368 8.8 0.00% 1 0 2026-02-04T15:30:35 The SportsPress plugin for WordPress is vulnerable to Local File Inclusion in al
CVE-2025-5329 9.8 0.00% 1 1 2026-02-04T15:30:29 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-20402 7.5 0.21% 1 0 2026-02-04T14:28:00.447000 In Modem, there is a possible system crash due to improper input validation. Thi
CVE-2026-20404 7.5 0.21% 2 0 2026-02-04T14:22:01.120000 In Modem, there is a possible system crash due to improper input validation. Thi
CVE-2026-20406 7.5 0.21% 1 0 2026-02-04T13:52:44.517000 In Modem, there is a possible system crash due to an uncaught exception. This co
CVE-2026-20408 8.8 0.02% 1 0 2026-02-04T13:48:41.430000 In wlan, there is a possible out of bounds write due to a heap buffer overflow.
CVE-2026-0818 4.3 0.02% 1 0 2026-02-04T12:32:27 CSS-based exfiltration of the content from partially encrypted emails when allow
CVE-2026-1819 8.8 0.05% 1 0 2026-02-04T09:30:35 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site
CVE-2026-1756 8.8 0.22% 1 0 2026-02-04T09:30:30 The WP FOFT Loader plugin for WordPress is vulnerable to arbitrary file uploads
CVE-2025-5319 9.8 0.01% 1 1 2026-02-04T08:16:05.393000 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2025-40551 9.8 22.94% 6 0 2026-02-04T02:00:02.030000 SolarWinds Web Help Desk was found to be susceptible to an untrusted data deseri
CVE-2026-1861 8.8 0.03% 1 0 2026-02-04T00:31:33 Heap buffer overflow in libvpx in Google Chrome prior to 144.0.7559.132 allowed
CVE-2026-1633 10.0 0.05% 5 0 2026-02-04T00:30:41 The Synectix LAN 232 TRIO 3-Port serial to ethernet adapter exposes its web mana
CVE-2026-1862 8.8 0.03% 1 0 2026-02-04T00:30:28 Type Confusion in V8 in Google Chrome prior to 144.0.7559.132 allowed a remote a
CVE-2025-10878 10.0 0.18% 1 1 2026-02-03T21:31:59 A SQL injection vulnerability exists in the login functionality of Fikir Odalari
CVE-2026-24149 7.8 0.01% 1 0 2026-02-03T21:31:59 NVIDIA Megatron-LM for all platforms contains a vulnerability in a script, where
CVE-2026-24954 8.8 0.05% 1 0 2026-02-03T21:31:51 Deserialization of Untrusted Data vulnerability in magepeopleteam WpEvently mage
CVE-2026-20419 7.5 0.07% 1 0 2026-02-03T21:27:13.077000 In wlan AP/STA firmware, there is a possible system becoming irresponsive due to
CVE-2026-20421 7.5 0.21% 1 0 2026-02-03T21:23:50.483000 In Modem, there is a possible system crash due to improper input validation. Thi
CVE-2026-1285 None 0.04% 1 0 2026-02-03T19:31:19 An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4
CVE-2025-67853 7.5 0.02% 1 0 2026-02-03T19:15:23 A flaw was found in Moodle. A remote attacker could exploit a lack of proper rat
CVE-2026-1568 9.6 0.02% 1 0 2026-02-03T18:30:53 Rapid7 InsightVM versions before 8.34.0 contain a signature verification issue o
CVE-2019-19006 9.8 31.70% 3 0 2026-02-03T18:30:27 Sangoma FreePBX 115.0.16.26 and below, 14.0.13.11 and below, 13.0.197.13 and bel
CVE-2026-24071 7.8 0.01% 2 0 2026-02-03T16:44:36.630000 It was found that the XPC service offered by the privileged helper of Native Acc
CVE-2025-9974 8.0 0.03% 2 0 2026-02-03T16:44:36.630000 The unified WEBUI application of the ONT/Beacon device contains an input handlin
CVE-2025-14914 7.6 0.04% 1 0 2026-02-03T16:44:36.630000 IBM WebSphere Application Server Liberty 17.0.0.3 through 26.0.0.1 could allow a
CVE-2025-47398 7.8 0.01% 1 0 2026-02-03T16:44:36.630000 Memory Corruption while deallocating graphics processing unit memory buffers due
CVE-2026-1117 8.2 0.03% 1 0 2026-02-03T16:44:36.630000 A vulnerability in the `lollms_generation_events.py` component of parisneo/lollm
CVE-2026-24788 8.8 0.23% 1 0 2026-02-03T16:44:36.630000 RaspAP raspap-webgui versions prior to 3.3.6 contain an OS command injection vul
CVE-2025-6397 8.6 0.04% 1 0 2026-02-03T16:44:03.343000 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site
CVE-2025-67848 8.1 0.02% 1 0 2026-02-03T16:44:03.343000 A flaw was found in Moodle. This authentication bypass vulnerability allows susp
CVE-2026-1375 8.1 0.04% 1 0 2026-02-03T16:44:03.343000 The Tutor LMS – eLearning and online course solution plugin for WordPress is vul
CVE-2026-1730 8.8 0.22% 1 0 2026-02-03T16:44:03.343000 The OS DataHub Maps plugin for WordPress is vulnerable to arbitrary file uploads
CVE-2026-24694 7.8 0.02% 1 0 2026-02-03T16:44:03.343000 The installer for Roland Cloud Manager ver.3.1.19 and prior insecurely loads Dyn
CVE-2026-24763 8.8 0.07% 2 0 2026-02-03T16:44:03.343000 OpenClaw (formerly Clawdbot) is a personal AI assistant you run on your own dev
CVE-2026-23515 9.9 0.91% 1 0 2026-02-03T16:44:03.343000 Signal K Server is a server application that runs on a central hub in a boat. Pr
CVE-2026-25142 10.0 0.10% 1 0 2026-02-03T16:44:03.343000 SandboxJS is a JavaScript sandboxing library. Prior to 0.8.27, SanboxJS does not
CVE-2026-25060 8.1 0.01% 1 0 2026-02-03T16:13:27 ### Summary The application disables TLS certificate verification by default for
CVE-2026-25059 8.8 0.02% 1 0 2026-02-03T16:13:22 ### Summary The application contains a Path Traversal vulnerability (CWE-22) in
CVE-2026-24737 8.1 0.01% 2 0 2026-02-03T16:13:02 ### Impact User control of properties and methods of the Acroform module allows
CVE-2026-23997 8.0 0.01% 1 0 2026-02-03T16:12:22 ### Summary A Stored Cross-Site Scripting (XSS) vulnerability was discovered in
CVE-2026-22778 9.8 0.06% 1 0 2026-02-03T16:12:13 ## Summary **A chain of vulnerabilities in vLLM allow Remote Code Execution (RC
CVE-2026-25022 8.5 0.03% 1 0 2026-02-03T15:30:38 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2025-7760 7.6 0.01% 1 0 2026-02-03T15:30:33 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site
CVE-2025-8461 7.6 0.03% 1 0 2026-02-03T09:30:34 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site
CVE-2026-24465 9.8 0.02% 1 0 2026-02-03T09:30:34 Stack-based buffer overflow vulnerability exists in ELECOM wireless LAN access p
CVE-2025-8456 7.6 0.03% 1 0 2026-02-03T09:30:28 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site
CVE-2025-8590 7.5 0.03% 1 0 2026-02-03T09:30:28 Exposure of Sensitive Information to an Unauthorized Actor vulnerability in AKCE
CVE-2025-8589 7.6 0.03% 1 0 2026-02-03T09:30:28 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site
CVE-2026-20407 8.8 0.01% 1 0 2026-02-03T00:31:23 In wlan STA driver, there is a possible escalation of privilege due to a missing
CVE-2026-20420 7.5 0.21% 1 0 2026-02-03T00:31:23 In Modem, there is a possible system crash due to incorrect error handling. This
CVE-2026-20403 7.5 0.21% 1 0 2026-02-03T00:31:22 In Modem, there is a possible system crash due to a missing bounds check. This c
CVE-2026-20409 7.8 0.01% 1 0 2026-02-03T00:31:22 In imgsys, there is a possible out of bounds write due to a missing bounds check
CVE-2026-20405 7.5 0.21% 1 0 2026-02-03T00:31:22 In Modem, there is a possible system crash due to a missing bounds check. This c
CVE-2026-20422 7.5 0.21% 1 0 2026-02-03T00:30:18 In Modem, there is a possible system crash due to improper input validation. Thi
CVE-2026-25253 8.8 0.04% 3 2 2026-02-02T23:41:06 ## Summary The Control UI trusts `gatewayUrl` from the query string without val
CVE-2026-0599 7.5 0.08% 1 0 2026-02-02T22:07:42 A vulnerability in huggingface/text-generation-inference version 3.3.6 allows un
CVE-2026-20411 7.8 0.01% 1 0 2026-02-02T21:31:27 In cameraisp, there is a possible escalation of privilege due to use after free.
CVE-2026-20412 7.8 0.01% 1 0 2026-02-02T18:32:35 In cameraisp, there is a possible out of bounds write due to a missing bounds ch
CVE-2026-24070 8.8 0.00% 1 0 2026-02-02T18:32:35 During the installation of the Native Access application, a privileged helper `c
CVE-2025-15030 9.8 0.01% 1 0 2026-02-02T18:32:35 The User Profile Builder WordPress plugin before 3.15.2 does not have a proper
CVE-2025-47359 7.8 0.01% 1 0 2026-02-02T18:31:39 Memory Corruption when multiple threads simultaneously access a memory free API.
CVE-2025-47358 7.8 0.01% 1 0 2026-02-02T18:31:39 Memory Corruption when user space address is modified and passed to mem_free API
CVE-2025-47399 7.8 0.01% 1 0 2026-02-02T18:31:39 Memory Corruption while processing IOCTL call to update sensor property settings
CVE-2025-47397 7.8 0.01% 1 0 2026-02-02T18:31:39 Memory Corruption when initiating GPU memory mapping using scatter-gather lists
CVE-2026-20418 8.8 0.12% 2 0 2026-02-02T15:30:34 In Thread, there is a possible out of bounds write due to a missing bounds check
CVE-2025-8587 8.6 0.01% 1 0 2026-02-02T15:30:34 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-25200 9.8 0.07% 1 0 2026-02-02T06:30:53 A vulnerability in MagicInfo9 Server allows authorized users to upload HTML file
CVE-2026-25201 8.8 0.07% 1 0 2026-02-02T06:30:53 An unauthenticated user can upload arbitrary files to execute remote code, leadi
CVE-2026-24061 9.8 29.55% 2 59 template 2026-01-30T13:28:59.293000 telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "
CVE-2026-1281 9.8 16.41% 5 0 2026-01-30T00:31:29 A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve
CVE-2025-15467 9.8 0.66% 1 4 2026-01-29T15:31:31 Issue summary: Parsing CMS AuthEnvelopedData message with maliciously crafted AE
CVE-2026-24858 9.8 3.71% 1 5 2026-01-28T00:31:41 An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-2
CVE-2026-21509 7.8 2.91% 14 8 2026-01-27T16:19:42.330000 Reliance on untrusted inputs in a security decision in Microsoft Office allows a
CVE-2025-11234 7.5 0.10% 1 0 2026-01-22T21:33:43 A flaw was found in QEMU. If the QIOChannelWebsock object is freed while it is w
CVE-2025-9086 7.5 0.04% 1 0 2026-01-20T14:58:01.347000 1. A cookie is set using the `secure` keyword for `https://target` 2. curl is
CVE-2025-68613 10.0 73.86% 1 30 template 2026-01-09T16:53:16 ### Impact n8n contains a critical Remote Code Execution (RCE) vulnerability in
CVE-2025-61729 7.5 0.02% 1 0 2025-12-03T00:31:35 Within HostnameError.Error(), when constructing an error string, there is no lim
CVE-2025-11953 9.8 0.40% 5 4 2025-11-13T16:25:27 The Metro Development Server, which is opened by the React Native CLI, binds to
CVE-2024-10460 5.3 0.42% 1 0 2025-11-04T00:31:55 The origin of an external protocol handler prompt could have been obscured using
CVE-2025-22224 9.3 57.74% 2 0 2025-10-30T19:52:49.873000 VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulner
CVE-2025-22225 8.2 6.15% 4 0 2025-10-30T19:52:45.300000 VMware ESXi contains an arbitrary write vulnerability. A malicious actor with pr
CVE-2025-22226 7.1 4.11% 2 0 2025-10-30T19:52:41.973000 VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerabi
CVE-2025-8088 8.8 4.61% 4 27 2025-10-30T15:50:59.680000 A path traversal vulnerability affecting the Windows version of WinRAR allows th
CVE-2025-49825 9.8 12.25% 3 0 template 2025-06-18T13:46:52.973000 Teleport provides connectivity, authentication, access controls and audit for in
CVE-2025-46724 9.8 0.06% 1 0 2025-05-20T20:57:00 ### Summary `TableChatAgent` uses [pandas eval()](https://github.com/langroid/la
CVE-2023-38346 8.8 1.23% 1 0 2024-04-04T07:48:27 An issue was discovered in Wind River VxWorks 6.9 and 7. The function ``tarExtra
CVE-2019-15006 None 2.18% 1 0 2023-01-29T05:00:49 There was a man-in-the-middle (MITM) vulnerability present in the Confluence Pre
CVE-2026-25585 0 0.00% 2 0 N/A
CVE-2026-25584 0 0.00% 2 0 N/A
CVE-2026-25582 0 0.00% 2 0 N/A
CVE-2026-25519 0 0.00% 4 0 N/A
CVE-2025-67987 0 0.00% 1 0 N/A
CVE-2025-64328 0 11.03% 3 1 N/A
CVE-2026-24665 0 0.03% 2 0 N/A
CVE-2026-24669 0 0.01% 2 0 N/A
CVE-2025-66480 0 0.43% 1 0 N/A
CVE-2026-25137 0 0.03% 1 0 N/A

CVE-2026-25614
(7.5 HIGH)

EPSS: 0.05%

updated 2026-02-05T09:31:13

1 posts

Blesta 3.x through 5.x before 5.13.3 allows object injection, aka CORE-5680.

thehackerwire@mastodon.social at 2026-02-03T20:20:40.000Z ##

🟠 CVE-2026-25614 - High (7.5)

Blesta 3.x through 5.x before 5.13.3 allows object injection, aka CORE-5680.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1761
(8.6 HIGH)

EPSS: 0.14%

updated 2026-02-05T07:16:17.797000

1 posts

A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart HTTP response, which can lead to memory corruption. This issue may result in application crashes or arbitrary code execution in applications that process

thehackerwire@mastodon.social at 2026-02-02T14:19:03.000Z ##

🟠 CVE-2026-1761 - High (8.6)

A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart H...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1642
(5.9 MEDIUM)

EPSS: 0.00%

updated 2026-02-05T06:15:53.893000

1 posts

A vulnerability exists in NGINX OSS and NGINX Plus when configured to proxy to upstream Transport Layer Security (TLS) servers. An attacker with a man-in-the-middle (MITM) position on the upstream server side—along with conditions beyond the attacker's control—may be able to inject plain text data into the response from an upstream proxied server.  Note: Software versions which have reached End of

zeroplex@social.zeroplex.tw at 2026-02-05T09:06:31.000Z ##

nginx-1.28.2 stable and nginx-1.29.5 mainline versions have been released, with a fix for the SSL upstream injection vulnerability (CVE-2026-1642).
nginx.org/#2026-02-04
#nginx #security

##

CVE-2025-10314
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-05T03:30:23

2 posts

Incorrect Default Permissions vulnerability in Mitsubishi Electric Corporation FREQSHIP-mini for Windows versions 8.0.0 to 8.0.2 allows a local attacker to execute arbitrary code with system privileges by replacing service executable files (EXE) or DLLs in the installation directory with specially crafted files. As a result, the attacker may be able to disclose, tamper with, delete, or destroy inf

thehackerwire@mastodon.social at 2026-02-05T03:17:57.000Z ##

🟠 CVE-2025-10314 - High (8.8)

Incorrect Default Permissions vulnerability in Mitsubishi Electric Corporation FREQSHIP-mini for Windows versions 8.0.0 to 8.0.2 allows a local attacker to execute arbitrary code with system privileges by replacing service executable files (EXE) o...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-05T03:17:57.000Z ##

🟠 CVE-2025-10314 - High (8.8)

Incorrect Default Permissions vulnerability in Mitsubishi Electric Corporation FREQSHIP-mini for Windows versions 8.0.0 to 8.0.2 allows a local attacker to execute arbitrary code with system privileges by replacing service executable files (EXE) o...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-11730
(7.2 HIGH)

EPSS: 0.00%

updated 2026-02-05T02:15:52.380000

2 posts

A post‑authentication command injection vulnerability in the Dynamic DNS (DDNS) configuration CLI command in Zyxel ATP series firmware versions from V5.35 through V5.41, USG FLEX series firmware versions from V5.35 through V5.41, USG FLEX 50(W) series firmware versions from V5.35 through V5.41, and USG20(W)-VPN series firmware versions from V5.35 through V5.41 could allow an authenticated attacker

_r_netsec at 2026-02-05T06:58:06.361Z ##

CVE-2025-11730: Remote Code Execution via DDNS configuration in ZYXEL ATP/USG Series (V5.41) rainpwn.blog/blog/cve-2025-117

##

_r_netsec@infosec.exchange at 2026-02-05T06:58:06.000Z ##

CVE-2025-11730: Remote Code Execution via DDNS configuration in ZYXEL ATP/USG Series (V5.41) rainpwn.blog/blog/cve-2025-117

##

CVE-2026-25546
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-05T00:37:13

4 posts

### Impact A Command Injection vulnerability in godot-mcp allows remote code execution. The `executeOperation` function passed user-controlled input (e.g., `projectPath`) directly to `exec()`, which spawns a shell. An attacker could inject shell metacharacters like `$(command)` or `&calc` to execute arbitrary commands with the privileges of the MCP server process. This affects any tool that acc

1 repos

https://github.com/mbanyamer/CVE-2026-25546-godot-mcp-0.1.1-OS-Command-Injection

thehackerwire@mastodon.social at 2026-02-04T22:26:36.000Z ##

🟠 CVE-2026-25546 - High (7.8)

Godot MCP is a Model Context Protocol (MCP) server for interacting with the Godot game engine. Prior to version 0.1.1, a command injection vulnerability in godot-mcp allows remote code execution. The executeOperation function passed user-controlle...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T22:17:32.000Z ##

🟠 CVE-2026-25546 - High (7.8)

Godot MCP is a Model Context Protocol (MCP) server for interacting with the Godot game engine. Prior to version 0.1.1, a command injection vulnerability in godot-mcp allows remote code execution. The executeOperation function passed user-controlle...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T22:26:36.000Z ##

🟠 CVE-2026-25546 - High (7.8)

Godot MCP is a Model Context Protocol (MCP) server for interacting with the Godot game engine. Prior to version 0.1.1, a command injection vulnerability in godot-mcp allows remote code execution. The executeOperation function passed user-controlle...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T22:17:32.000Z ##

🟠 CVE-2026-25546 - High (7.8)

Godot MCP is a Model Context Protocol (MCP) server for interacting with the Godot game engine. Prior to version 0.1.1, a command injection vulnerability in godot-mcp allows remote code execution. The executeOperation function passed user-controlle...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25539
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-02-05T00:36:45

2 posts

## Summary The `/api/file/copyFile` endpoint does not validate the `dest` parameter, allowing authenticated users to write files to arbitrary locations on the filesystem. This can lead to Remote Code Execution (RCE) by writing to sensitive locations such as cron jobs, SSH authorized_keys, or shell configuration files. - Affected Version: 3.5.3 (and likely all prior versions) ## Details - Type:

thehackerwire@mastodon.social at 2026-02-04T22:17:27.000Z ##

🔴 CVE-2026-25539 - Critical (9.1)

SiYuan is a personal knowledge management system. Prior to version 3.5.5, the /api/file/copyFile endpoint does not validate the dest parameter, allowing authenticated users to write files to arbitrary locations on the filesystem. This can lead to ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T22:17:27.000Z ##

🔴 CVE-2026-25539 - Critical (9.1)

SiYuan is a personal knowledge management system. Prior to version 3.5.5, the /api/file/copyFile endpoint does not validate the dest parameter, allowing authenticated users to write files to arbitrary locations on the filesystem. This can lead to ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-13192
(8.2 HIGH)

EPSS: 0.00%

updated 2026-02-05T00:31:08

2 posts

The Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers plugin for WordPress is vulnerable to generic SQL Injection via the multiple REST API endpoints in all versions up to, and including, 2.2.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthe

thehackerwire@mastodon.social at 2026-02-05T00:22:47.000Z ##

🟠 CVE-2025-13192 - High (8.2)

The Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers plugin for WordPress is vulnerable to generic SQL Injection via the multiple REST API endpoints in all versions up to, and including, 2.2.0 due ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-05T00:22:47.000Z ##

🟠 CVE-2025-13192 - High (8.2)

The Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers plugin for WordPress is vulnerable to generic SQL Injection via the multiple REST API endpoints in all versions up to, and including, 2.2.0 due ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22038
(8.1 HIGH)

EPSS: 0.00%

updated 2026-02-04T23:15:56.057000

2 posts

AutoGPT is a platform that allows users to create, deploy, and manage continuous artificial intelligence agents that automate complex workflows. Prior to autogpt-platform-beta-v0.6.46, the AutoGPT platform's Stagehand integration blocks log API keys and authentication secrets in plaintext using logger.info() statements. This occurs in three separate block implementations (StagehandObserveBlock, St

thehackerwire@mastodon.social at 2026-02-05T00:22:58.000Z ##

🟠 CVE-2026-22038 - High (8.1)

AutoGPT is a platform that allows users to create, deploy, and manage continuous artificial intelligence agents that automate complex workflows. Prior to autogpt-platform-beta-v0.6.46, the AutoGPT platform's Stagehand integration blocks log API ke...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-05T00:22:58.000Z ##

🟠 CVE-2026-22038 - High (8.1)

AutoGPT is a platform that allows users to create, deploy, and manage continuous artificial intelligence agents that automate complex workflows. Prior to autogpt-platform-beta-v0.6.46, the AutoGPT platform's Stagehand integration blocks log API ke...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25583
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-04T22:16:01.540000

2 posts

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.3, there is a heap buffer overflow vulnerability in CIccFileIO::Read8() when processing malformed ICC profile files via unchecked fread operation. This issue has been patched in version 2.3.1.3.

thehackerwire@mastodon.social at 2026-02-04T22:16:54.000Z ##

🟠 CVE-2026-25583 - High (7.8)

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.3, there is a heap buffer overflow vulnerability in CIccFileIO::Read8() when proces...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T22:16:54.000Z ##

🟠 CVE-2026-25583 - High (7.8)

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.3, there is a heap buffer overflow vulnerability in CIccFileIO::Read8() when proces...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25526
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-02-04T22:15:59.510000

2 posts

JinJava is a Java-based template engine based on django template syntax, adapted to render jinja templates. Prior to versions 2.7.6 and 2.8.3, JinJava is vulnerable to arbitrary Java execution via bypass through ForTag. This allows arbitrary Java class instantiation and file access bypassing built-in sandbox restrictions. This issue has been patched in versions 2.7.6 and 2.8.3.

thehackerwire@mastodon.social at 2026-02-04T22:17:37.000Z ##

🔴 CVE-2026-25526 - Critical (9.8)

JinJava is a Java-based template engine based on django template syntax, adapted to render jinja templates. Prior to versions 2.7.6 and 2.8.3, JinJava is vulnerable to arbitrary Java execution via bypass through ForTag. This allows arbitrary Java ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T22:17:37.000Z ##

🔴 CVE-2026-25526 - Critical (9.8)

JinJava is a Java-based template engine based on django template syntax, adapted to render jinja templates. Prior to versions 2.7.6 and 2.8.3, JinJava is vulnerable to arbitrary Java execution via bypass through ForTag. This allows arbitrary Java ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24735
(7.5 HIGH)

EPSS: 0.02%

updated 2026-02-04T21:57:36

1 posts

Exposure of Private Personal Information to an Unauthorized Actor vulnerability in Apache Answer. This issue affects Apache Answer: through 1.7.1. An unauthenticated API endpoint incorrectly exposes full revision history for deleted content. This allows unauthorized users to retrieve restricted or sensitive information. Users are recommended to upgrade to version 2.0.0, which fixes the issue.

thehackerwire@mastodon.social at 2026-02-04T16:36:42.000Z ##

🟠 CVE-2026-24735 - High (7.5)

Exposure of Private Personal Information to an Unauthorized Actor vulnerability in Apache Answer.

This issue affects Apache Answer: through 1.7.1.

An unauthenticated API endpoint incorrectly exposes full revision history for deleted content. Thi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25161
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-04T21:56:57

2 posts

### Summary The application contains a Path Traversal vulnerability (CWE-22) in multiple file operation handlers. An authenticated attacker can bypass directory-level authorisation by injecting traversal sequences into filename components, enabling unauthorised file removal, movement and copying across user boundaries within the same storage mount. ### Details The application contains a Path Trav

thehackerwire@mastodon.social at 2026-02-04T20:21:59.000Z ##

🟠 CVE-2026-25161 - High (8.8)

Alist is a file list program that supports multiple storages, powered by Gin and Solidjs. Prior to version 3.57.0, the application contains path traversal vulnerability in multiple file operation handlers. An authenticated attacker can bypass dire...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T20:21:59.000Z ##

🟠 CVE-2026-25161 - High (8.8)

Alist is a file list program that supports multiple storages, powered by Gin and Solidjs. Prior to version 3.57.0, the application contains path traversal vulnerability in multiple file operation handlers. An authenticated attacker can bypass dire...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25160
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-02-04T21:56:51

4 posts

### Summary The application disables TLS certificate verification by default for all outgoing storage driver communications, making the system vulnerable to Man-in-the-Middle (MitM) attacks. This enables the complete decryption, theft, and manipulation of all data transmitted during storage operations, severely compromising the confidentiality and integrity of user data. ### Details Certificate v

thehackerwire@mastodon.social at 2026-02-04T20:28:43.000Z ##

🔴 CVE-2026-25160 - Critical (9.1)

Alist is a file list program that supports multiple storages, powered by Gin and Solidjs. Prior to version 3.57.0, the application disables TLS certificate verification by default for all outgoing storage driver communications, making the system v...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T20:21:56.000Z ##

🔴 CVE-2026-25160 - Critical (9.1)

Alist is a file list program that supports multiple storages, powered by Gin and Solidjs. Prior to version 3.57.0, the application disables TLS certificate verification by default for all outgoing storage driver communications, making the system v...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T20:28:43.000Z ##

🔴 CVE-2026-25160 - Critical (9.1)

Alist is a file list program that supports multiple storages, powered by Gin and Solidjs. Prior to version 3.57.0, the application disables TLS certificate verification by default for all outgoing storage driver communications, making the system v...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T20:21:56.000Z ##

🔴 CVE-2026-25160 - Critical (9.1)

Alist is a file list program that supports multiple storages, powered by Gin and Solidjs. Prior to version 3.57.0, the application disables TLS certificate verification by default for all outgoing storage driver communications, making the system v...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25121
(7.5 HIGH)

EPSS: 0.00%

updated 2026-02-04T21:55:46

2 posts

A Path Traversal vulnerability was discovered in apko's dirFS filesystem abstraction. An attacker who can supply a malicious APK package (e.g., via a compromised or typosquatted repository) could create directories or symlinks outside the intended installation root. The MkdirAll, Mkdir, and Symlink methods in pkg/apk/fs/rwosfs.go use filepath.Join() without validating that the resulting path stays

thehackerwire@mastodon.social at 2026-02-04T19:16:54.000Z ##

🟠 CVE-2026-25121 - High (7.5)

apko allows users to build and publish OCI container images built from apk packages. From version 0.14.8 to before 1.1.1, a path traversal vulnerability was discovered in apko's dirFS filesystem abstraction. An attacker who can supply a malicious ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T19:16:54.000Z ##

🟠 CVE-2026-25121 - High (7.5)

apko allows users to build and publish OCI container images built from apk packages. From version 0.14.8 to before 1.1.1, a path traversal vulnerability was discovered in apko's dirFS filesystem abstraction. An attacker who can supply a malicious ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24884
(8.4 HIGH)

EPSS: 0.00%

updated 2026-02-04T21:55:36

2 posts

# Arbitrary File Write via Symlink Extraction in `github.com/node-modules/compressing` ## Brief Introduction The `compressing` npm package extracts TAR archives while restoring symbolic links without validating their targets. By embedding symlinks that resolve outside the intended extraction directory, an attacker can cause subsequent file entries to be written to arbitrary locations on the hos

thehackerwire@mastodon.social at 2026-02-04T20:40:41.000Z ##

🟠 CVE-2026-24884 - High (8.4)

Compressing is a compressing and uncompressing lib for node. In version 2.0.0 and 1.10.3 and prior, Compressing extracts TAR archives while restoring symbolic links without validating their targets. By embedding symlinks that resolve outside the i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T20:40:41.000Z ##

🟠 CVE-2026-24884 - High (8.4)

Compressing is a compressing and uncompressing lib for node. In version 2.0.0 and 1.10.3 and prior, Compressing extracts TAR archives while restoring symbolic links without validating their targets. By embedding symlinks that resolve outside the i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24844
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-04T21:55:30

2 posts

An attacker who can provide build input values, but not modify pipeline definitions, could execute arbitrary shell commands if the pipeline uses `${{vars.*}}` or `${{inputs.*}}` substitutions in `working-directory`. The field is embedded into shell scripts without proper quote escaping. **Fix:** Fixed with [e51ca30c](https://github.com/chainguard-dev/melange/commit/e51ca30cfb63178f5a86997d23d3fff

thehackerwire@mastodon.social at 2026-02-04T20:40:31.000Z ##

🟠 CVE-2026-24844 - High (7.9)

melange allows users to build apk packages using declarative pipelines. From version 0.3.0 to before 0.40.3, an attacker who can provide build input values, but not modify pipeline definitions, could execute arbitrary shell commands if the pipelin...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T20:40:31.000Z ##

🟠 CVE-2026-24844 - High (7.9)

melange allows users to build apk packages using declarative pipelines. From version 0.3.0 to before 0.40.3, an attacker who can provide build input values, but not modify pipeline definitions, could execute arbitrary shell commands if the pipelin...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23897
(7.5 HIGH)

EPSS: 0.00%

updated 2026-02-04T21:55:12

2 posts

### Impact The default configuration of `startStandaloneServer` from `@apollo/server/standalone` is vulnerable to Denial of Service (DoS) attacks through specially crafted request bodies with exotic character set encodings. This issue does not affect users that use `@apollo/server` as a dependency for integration packages, like `@as integrations/express5` or `@as-integrations/next`, only direct

thehackerwire@mastodon.social at 2026-02-04T20:22:09.000Z ##

🟠 CVE-2026-23897 - High (7.5)

Apollo Server is an open-source, spec-compliant GraphQL server that's compatible with any GraphQL client, including Apollo Client. In versions from 2.0.0 to 3.13.0, 4.2.0 to before 4.13.0, and 5.0.0 to before 5.4.0, the default configuration of st...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T20:22:09.000Z ##

🟠 CVE-2026-23897 - High (7.5)

Apollo Server is an open-source, spec-compliant GraphQL server that's compatible with any GraphQL client, including Apollo Client. In versions from 2.0.0 to 3.13.0, 4.2.0 to before 4.13.0, and 5.0.0 to before 5.4.0, the default configuration of st...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-13375
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-02-04T21:30:43

2 posts

IBM Common Cryptographic Architecture (CCA) 7.5.52 and 8.4.82 could allow an unauthenticated user to execute arbitrary commands with elevated privileges on the system.

thehackerwire@mastodon.social at 2026-02-04T21:17:33.000Z ##

🔴 CVE-2025-13375 - Critical (9.8)

IBM Common Cryptographic Architecture (CCA) 7.5.52 and 8.4.82 could allow an unauthenticated user to execute arbitrary commands with elevated privileges on the system.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T21:17:33.000Z ##

🔴 CVE-2025-13375 - Critical (9.8)

IBM Common Cryptographic Architecture (CCA) 7.5.52 and 8.4.82 could allow an unauthenticated user to execute arbitrary commands with elevated privileges on the system.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0536
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-04T21:30:43

2 posts

A maliciously crafted GIF file, when parsed through Autodesk 3ds Max, can cause a Stack-Based Buffer Overflow vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

thehackerwire@mastodon.social at 2026-02-04T19:16:43.000Z ##

🟠 CVE-2026-0536 - High (7.8)

A maliciously crafted GIF file, when parsed through Autodesk 3ds Max, can cause a Stack-Based Buffer Overflow vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T19:16:43.000Z ##

🟠 CVE-2026-0536 - High (7.8)

A maliciously crafted GIF file, when parsed through Autodesk 3ds Max, can cause a Stack-Based Buffer Overflow vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69875
(7.8 HIGH)

EPSS: 0.02%

updated 2026-02-04T21:30:32

2 posts

A vulnerability exists in Quick Heal Total Security 23.0.0 in the quarantine management component where insufficient validation of restore paths and improper permission handling allow a low-privileged local user to restore quarantined files into protected system directories. This behavior can be abused by a local attacker to place files in high-privilege locations, potentially leading to privilege

thehackerwire@mastodon.social at 2026-02-04T21:14:55.000Z ##

🟠 CVE-2025-69875 - High (7.8)

A vulnerability exists in Quick Heal Total Security 23.0.0 in the quarantine management component where insufficient validation of restore paths and improper permission handling allow a low-privileged local user to restore quarantined files into p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T21:14:55.000Z ##

🟠 CVE-2025-69875 - High (7.8)

A vulnerability exists in Quick Heal Total Security 23.0.0 in the quarantine management component where insufficient validation of restore paths and improper permission handling allow a low-privileged local user to restore quarantined files into p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70841
(10.0 CRITICAL)

EPSS: 0.03%

updated 2026-02-04T21:30:32

1 posts

Dokans Multi-Tenancy Based eCommerce Platform SaaS 3.9.2 allows unauthenticated remote attackers to obtain sensitive application configuration data via direct request to /script/.env file. The exposed file contains Laravel application encryption key (APP_KEY), database credentials, SMTP/SendGrid API credentials, and internal configuration parameters, enabling complete system compromise including a

thehackerwire@mastodon.social at 2026-02-03T18:21:51.000Z ##

🔴 CVE-2025-70841 - Critical (10)

Dokans Multi-Tenancy Based eCommerce Platform SaaS 3.9.2 allows unauthenticated remote attackers to obtain sensitive application configuration data via direct request to /script/.env file. The exposed file contains Laravel application encryption k...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25027
(7.5 HIGH)

EPSS: 0.05%

updated 2026-02-04T21:30:30

2 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeMove Unicamp unicamp allows PHP Local File Inclusion.This issue affects Unicamp: from n/a through <= 2.7.1.

thehackerwire@mastodon.social at 2026-02-05T00:31:53.000Z ##

🟠 CVE-2026-25027 - High (7.5)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeMove Unicamp unicamp allows PHP Local File Inclusion.This issue affects Unicamp: from n/a through &lt;= 2.7.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-05T00:31:53.000Z ##

🟠 CVE-2026-25027 - High (7.5)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeMove Unicamp unicamp allows PHP Local File Inclusion.This issue affects Unicamp: from n/a through &lt;= 2.7.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69620
(7.5 HIGH)

EPSS: 0.01%

updated 2026-02-04T21:15:58.150000

2 posts

A path traversal in Moo Chan Song v4.5.7 allows attackers to cause a Denial of Service (DoS) via writing files to the internal storage.

thehackerwire@mastodon.social at 2026-02-04T21:23:46.000Z ##

🟠 CVE-2025-69620 - High (7.5)

A path traversal in Moo Chan Song v4.5.7 allows attackers to cause a Denial of Service (DoS) via writing files to the internal storage.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T21:23:46.000Z ##

🟠 CVE-2025-69620 - High (7.5)

A path traversal in Moo Chan Song v4.5.7 allows attackers to cause a Denial of Service (DoS) via writing files to the internal storage.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25505
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-02-04T20:16:07.707000

2 posts

Bambuddy is a self-hosted print archive and management system for Bambu Lab 3D printers. Prior to version 0.1.7, a hardcoded secret key used for signing JWTs is checked into source code and ManyAPI routes do not check authentication. This issue has been patched in version 0.1.7.

thehackerwire@mastodon.social at 2026-02-04T20:20:52.000Z ##

🔴 CVE-2026-25505 - Critical (9.8)

Bambuddy is a self-hosted print archive and management system for Bambu Lab 3D printers. Prior to version 0.1.7, a hardcoded secret key used for signing JWTs is checked into source code and ManyAPI routes do not check authentication. This issue ha...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T20:20:52.000Z ##

🔴 CVE-2026-25505 - Critical (9.8)

Bambuddy is a self-hosted print archive and management system for Bambu Lab 3D printers. Prior to version 0.1.7, a hardcoded secret key used for signing JWTs is checked into source code and ManyAPI routes do not check authentication. This issue ha...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25502
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-04T20:16:07.593000

2 posts

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.2, stack-based buffer overflow in icFixXml() function when processing malformed ICC profiles, allows potential arbitrary code execution through crafted NamedColor2 tags. This issue has been patched in version 2.3.1.2.

thehackerwire@mastodon.social at 2026-02-03T19:24:42.000Z ##

🟠 CVE-2026-25502 - High (7.8)

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.2, stack-based buffer overflow in icFixXml() function when processing malformed ICC...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T19:20:33.000Z ##

🟠 CVE-2026-25502 - High (7.8)

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.2, stack-based buffer overflow in icFixXml() function when processing malformed ICC...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25157
(7.7 HIGH)

EPSS: 0.00%

updated 2026-02-04T20:16:06.577000

5 posts

OpenClaw is a personal AI assistant. Prior to version 2026.1.29, there is an OS command injection vulnerability via the Project Root Path in sshNodeCommand. The sshNodeCommand function constructed a shell script without properly escaping the user-supplied project path in an error message. When the cd command failed, the unescaped path was interpolated directly into an echo statement, allowing arbi

mastokukei@social.josko.org at 2026-02-05T09:02:09.000Z ##

Blip blop, I'm a #mastobot.
Here is a summary (in beta) of the latest posts in #technologyAtKukei masto.kukei.eu/browse/technolo category:
- Agentic AI and multi-agent systems: OpenClaw, Moltbook, and Claude enabling autonomous planning and action.
- Moltbook security breach: exposure of 1.5M API keys and related risk.
- European AI sovereignty: Germany’s Munich KI Factory and the move toward sovereign, EU-led AI infrastructure.
- AI security and CVEs: OpenClaw CVE-2026-25157; [1/2]

##

thehackerwire@mastodon.social at 2026-02-04T20:28:34.000Z ##

🟠 CVE-2026-25157 - High (7.7)

OpenClaw is a personal AI assistant. Prior to version 2026.1.29, there is an OS command injection vulnerability via the Project Root Path in sshNodeCommand. The sshNodeCommand function constructed a shell script without properly escaping the user-...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T20:21:46.000Z ##

🟠 CVE-2026-25157 - High (7.7)

OpenClaw is a personal AI assistant. Prior to version 2026.1.29, there is an OS command injection vulnerability via the Project Root Path in sshNodeCommand. The sshNodeCommand function constructed a shell script without properly escaping the user-...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T20:28:34.000Z ##

🟠 CVE-2026-25157 - High (7.7)

OpenClaw is a personal AI assistant. Prior to version 2026.1.29, there is an OS command injection vulnerability via the Project Root Path in sshNodeCommand. The sshNodeCommand function constructed a shell script without properly escaping the user-...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T20:21:46.000Z ##

🟠 CVE-2026-25157 - High (7.7)

OpenClaw is a personal AI assistant. Prior to version 2026.1.29, there is an OS command injection vulnerability via the Project Root Path in sshNodeCommand. The sshNodeCommand function constructed a shell script without properly escaping the user-...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25143
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-04T20:16:06.227000

5 posts

melange allows users to build apk packages using declarative pipelines. From version 0.10.0 to before 0.40.3, an attacker who can influence inputs to the patch pipeline could execute arbitrary shell commands on the build host. The patch pipeline in pkg/build/pipelines/patch.yaml embeds input-derived values (series paths, patch filenames, and numeric parameters) into shell scripts without proper qu

mastokukei@social.josko.org at 2026-02-05T09:02:10.000Z ##

Melange CVE-2026-25143 and related patch/defense concerns.
- Google Gemini growth: Gemini app surpassing 750M monthly active users; Pixel 10a launch teased.
- Artemis II launch update: NASA targets March for Artemis II lunar mission, with new windows. [2/2]

##

thehackerwire@mastodon.social at 2026-02-04T20:28:24.000Z ##

🟠 CVE-2026-25143 - High (7.8)

melange allows users to build apk packages using declarative pipelines. From version 0.10.0 to before 0.40.3, an attacker who can influence inputs to the patch pipeline could execute arbitrary shell commands on the build host. The patch pipeline i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T20:21:35.000Z ##

🟠 CVE-2026-25143 - High (7.8)

melange allows users to build apk packages using declarative pipelines. From version 0.10.0 to before 0.40.3, an attacker who can influence inputs to the patch pipeline could execute arbitrary shell commands on the build host. The patch pipeline i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T20:28:24.000Z ##

🟠 CVE-2026-25143 - High (7.8)

melange allows users to build apk packages using declarative pipelines. From version 0.10.0 to before 0.40.3, an attacker who can influence inputs to the patch pipeline could execute arbitrary shell commands on the build host. The patch pipeline i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T20:21:35.000Z ##

🟠 CVE-2026-25143 - High (7.8)

melange allows users to build apk packages using declarative pipelines. From version 0.10.0 to before 0.40.3, an attacker who can influence inputs to the patch pipeline could execute arbitrary shell commands on the build host. The patch pipeline i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24843
(8.2 HIGH)

EPSS: 0.00%

updated 2026-02-04T20:16:05.393000

2 posts

melange allows users to build apk packages using declarative pipelines. In version 0.11.3 to before 0.40.3, an attacker who can influence the tar stream from a QEMU guest VM could write files outside the intended workspace directory on the host. The retrieveWorkspace function extracts tar entries without validating that paths stay within the workspace, allowing path traversal via ../ sequences. Th

thehackerwire@mastodon.social at 2026-02-04T20:22:19.000Z ##

🟠 CVE-2026-24843 - High (8.2)

melange allows users to build apk packages using declarative pipelines. In version 0.11.3 to before 0.40.3, an attacker who can influence the tar stream from a QEMU guest VM could write files outside the intended workspace directory on the host. T...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T20:22:19.000Z ##

🟠 CVE-2026-24843 - High (8.2)

melange allows users to build apk packages using declarative pipelines. In version 0.11.3 to before 0.40.3, an attacker who can influence the tar stream from a QEMU guest VM could write files outside the intended workspace directory on the host. T...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24514
(6.5 MEDIUM)

EPSS: 0.04%

updated 2026-02-04T20:05:49

1 posts

A security issue was discovered in ingress-nginx where the validating admission controller feature is subject to a denial of service condition. By sending large requests to the validating admission controller, an attacker can cause memory consumption, which may result in the ingress-nginx controller pod being killed or the node running out of memory.

CVE-2026-24513
(3.1 LOW)

EPSS: 0.03%

updated 2026-02-04T20:05:32

1 posts

A security issue was discovered in ingress-nginx where the protection afforded by the `auth-url` Ingress annotation may not be effective in the presence of a specific misconfiguration. If the ingress-nginx controller is configured with a default custom-errors configuration that includes HTTP errors 401 or 403, and if the configured default custom-errors backend is defective and fails to respect t

CVE-2026-24512
(8.8 HIGH)

EPSS: 0.10%

updated 2026-02-04T20:04:50

4 posts

A security issue was discovered in ingress-nginx. Tthe `rules.http.paths.path` Ingress field can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)

gomoot@mastodon.uno at 2026-02-04T17:42:43.000Z ##

💡 CVE-2026-24512: la vulnerabilità di ingress-NGINX che minaccia i cluster Kubernetes

gomoot.com/cve-2026-24512-la-v

#news #sicurezza #tech

##

gomoot@mastodon.uno at 2026-02-04T17:42:43.000Z ##

💡 CVE-2026-24512: la vulnerabilità di ingress-NGINX che minaccia i cluster Kubernetes

gomoot.com/cve-2026-24512-la-v

#news #sicurezza #tech

##

thehackerwire@mastodon.social at 2026-02-03T23:19:01.000Z ##

🟠 CVE-2026-24512 - High (8.8)

A security issue was discovered in ingress-nginx cthe `rules.http.paths.path` Ingress field can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

ChrisShort@hachyderm.io at 2026-02-03T18:11:42.000Z ##

CVE-2026-24512 #devopsish #kubernetes #cve github.com/kubernetes/kubernet

##

CVE-2025-64712
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-02-04T19:53:06

2 posts

A Path Traversal vulnerability in the `partition_msg` function allows an attacker to write or overwrite arbitrary files on the filesystem when processing malicious MSG files with attachments. ## Impact An attacker can craft a malicious .msg file with attachment filenames containing path traversal sequences (e.g., `../../../etc/cron.d/malicious`). When processed with `process_attachments=Tru

thehackerwire@mastodon.social at 2026-02-04T18:27:38.000Z ##

🔴 CVE-2025-64712 - Critical (9.8)

The unstructured library provides open-source components for ingesting and pre-processing images and text documents, such as PDFs, HTML, Word docs, and many more. Prior to version 0.18.18, a path traversal vulnerability in the partition_msg functi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T18:27:38.000Z ##

🔴 CVE-2025-64712 - Critical (9.8)

The unstructured library provides open-source components for ingesting and pre-processing images and text documents, such as PDFs, HTML, Word docs, and many more. Prior to version 0.18.18, a path traversal vulnerability in the partition_msg functi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-61917
(7.7 HIGH)

EPSS: 0.00%

updated 2026-02-04T19:53:01

2 posts

### Impact The use of `Buffer.allocUnsafe()` and `Buffer.allocUnsafeSlow()` in the task runner allowed untrusted code to allocate uninitialized memory. Such uninitialized buffers could contain residual data from within the same Node.js process (for example, data from prior requests, tasks, secrets, or tokens), resulting in potential information disclosure. Only authenticated users are able to

thehackerwire@mastodon.social at 2026-02-04T18:15:20.000Z ##

🟠 CVE-2025-61917 - High (7.7)

n8n is an open source workflow automation platform. From version 1.65.0 to before 1.114.3, the use of Buffer.allocUnsafe() and Buffer.allocUnsafeSlow() in the task runner allowed untrusted code to allocate uninitialized memory. Such uninitialized ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T18:15:20.000Z ##

🟠 CVE-2025-61917 - High (7.7)

n8n is an open source workflow automation platform. From version 1.65.0 to before 1.114.3, the use of Buffer.allocUnsafe() and Buffer.allocUnsafeSlow() in the task runner allowed untrusted code to allocate uninitialized memory. Such uninitialized ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70560
(8.4 HIGH)

EPSS: 0.02%

updated 2026-02-04T19:43:53

1 posts

Boltz 2.0.0 contains an insecure deserialization vulnerability in its molecule loading functionality. The application uses Python pickle to deserialize molecule data files without validation. An attacker with the ability to place a malicious pickle file in a directory processed by boltz can achieve arbitrary code execution when the file is loaded.

thehackerwire@mastodon.social at 2026-02-04T16:57:01.000Z ##

🟠 CVE-2025-70560 - High (8.4)

Boltz 2.0.0 contains an insecure deserialization vulnerability in its molecule loading functionality. The application uses Python pickle to deserialize molecule data files without validation. An attacker with the ability to place a malicious pickl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25140
(7.5 HIGH)

EPSS: 0.00%

updated 2026-02-04T19:16:15.117000

2 posts

apko allows users to build and publish OCI container images built from apk packages. From version 0.14.8 to before 1.1.1, an attacker who controls or compromises an APK repository used by apko could cause resource exhaustion on the build host. The ExpandApk function in pkg/apk/expandapk/expandapk.go expands .apk streams without enforcing decompression limits, allowing a malicious repository to ser

thehackerwire@mastodon.social at 2026-02-04T19:16:33.000Z ##

🟠 CVE-2026-25140 - High (7.5)

apko allows users to build and publish OCI container images built from apk packages. From version 0.14.8 to before 1.1.1, an attacker who controls or compromises an APK repository used by apko could cause resource exhaustion on the build host. The...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T19:16:33.000Z ##

🟠 CVE-2026-25140 - High (7.5)

apko allows users to build and publish OCI container images built from apk packages. From version 0.14.8 to before 1.1.1, an attacker who controls or compromises an APK repository used by apko could cause resource exhaustion on the build host. The...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-59439
(7.5 HIGH)

EPSS: 0.02%

updated 2026-02-04T19:16:13.590000

2 posts

An issue was discovered in Samsung Mobile Processor, Wearable Processor and Modem Exynos 980, 990, 850, 1080, 9110, W920, W930, W1000 and Modem 5123. Incorrect handling of NAS Registration messages leads to a Denial of Service because of Improper Handling of Exceptional Conditions.

thehackerwire@mastodon.social at 2026-02-04T21:15:14.000Z ##

🟠 CVE-2025-59439 - High (7.5)

An issue was discovered in Samsung Mobile Processor, Wearable Processor and Modem Exynos 980, 990, 850, 1080, 9110, W920, W930, W1000 and Modem 5123. Incorrect handling of NAS Registration messages leads to a Denial of Service because of Improper ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T21:15:14.000Z ##

🟠 CVE-2025-59439 - High (7.5)

An issue was discovered in Samsung Mobile Processor, Wearable Processor and Modem Exynos 980, 990, 850, 1080, 9110, W920, W930, W1000 and Modem 5123. Incorrect handling of NAS Registration messages leads to a Denial of Service because of Improper ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-67187
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-02-04T18:31:37

2 posts

A stack-based buffer overflow vulnerability was identified in TOTOLINK A950RG V4.1.2cu.5204_B20210112. The flaw exists in the setIpQosRules interface of /lib/cste_modules/firewall.so where the comment parameter is not properly validated for length.

thehackerwire@mastodon.social at 2026-02-04T19:05:26.000Z ##

🔴 CVE-2025-67187 - Critical (9.8)

A stack-based buffer overflow vulnerability was identified in TOTOLINK A950RG V4.1.2cu.5204_B20210112. The flaw exists in the setIpQosRules interface of /lib/cste_modules/firewall.so where the comment parameter is not properly validated for length.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T19:05:26.000Z ##

🔴 CVE-2025-67187 - Critical (9.8)

A stack-based buffer overflow vulnerability was identified in TOTOLINK A950RG V4.1.2cu.5204_B20210112. The flaw exists in the setIpQosRules interface of /lib/cste_modules/firewall.so where the comment parameter is not properly validated for length.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-46651
(9.1 CRITICAL)

EPSS: 0.02%

updated 2026-02-04T18:31:36

2 posts

Tiny File Manager through 2.6 contains a server-side request forgery (SSRF) vulnerability in the URL upload feature. Due to insufficient validation of user-supplied URLs, an attacker can send crafted requests to localhost by using http://www.127.0.0.1.example.com/ or a similarly constructed domain name. This may lead to unauthorized port scanning or access to internal-only services.

thehackerwire@mastodon.social at 2026-02-05T00:31:43.000Z ##

🔴 CVE-2025-46651 - Critical (9.1)

Tiny File Manager through 2.6 contains a server-side request forgery (SSRF) vulnerability in the URL upload feature. Due to insufficient validation of user-supplied URLs, an attacker can send crafted requests to localhost by using http://www.127.0...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-05T00:31:43.000Z ##

🔴 CVE-2025-46651 - Critical (9.1)

Tiny File Manager through 2.6 contains a server-side request forgery (SSRF) vulnerability in the URL upload feature. Due to insufficient validation of user-supplied URLs, an attacker can send crafted requests to localhost by using http://www.127.0...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-60865
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-04T18:31:36

2 posts

Insecure Permissions vulnerability in avanquest Driver Updater v.9.1.57803.1174 allows a local attacker to escalate privileges via the Driver Updater Service windows component.

thehackerwire@mastodon.social at 2026-02-04T21:24:03.000Z ##

🟠 CVE-2025-60865 - High (7.8)

Insecure Permissions vulnerability in avanquest Driver Updater v.9.1.57803.1174 allows a local attacker to escalate privileges via the Driver Updater Service windows component.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T21:24:03.000Z ##

🟠 CVE-2025-60865 - High (7.8)

Insecure Permissions vulnerability in avanquest Driver Updater v.9.1.57803.1174 allows a local attacker to escalate privileges via the Driver Updater Service windows component.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-67186
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-02-04T18:31:36

2 posts

TOTOLINK A950RG V4.1.2cu.5204_B20210112 contains a buffer overflow vulnerability in the setUrlFilterRules interface of /lib/cste_modules/firewall.so. The vulnerability occurs because the `url` parameter is not properly validated for length, allowing remote attackers to trigger a buffer overflow, potentially leading to arbitrary code execution or denial of service.

thehackerwire@mastodon.social at 2026-02-04T19:05:16.000Z ##

🔴 CVE-2025-67186 - Critical (9.8)

TOTOLINK A950RG V4.1.2cu.5204_B20210112 contains a buffer overflow vulnerability in the setUrlFilterRules interface of /lib/cste_modules/firewall.so. The vulnerability occurs because the `url` parameter is not properly validated for length, allowi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T19:05:16.000Z ##

🔴 CVE-2025-67186 - Critical (9.8)

TOTOLINK A950RG V4.1.2cu.5204_B20210112 contains a buffer overflow vulnerability in the setUrlFilterRules interface of /lib/cste_modules/firewall.so. The vulnerability occurs because the `url` parameter is not properly validated for length, allowi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-66374
(7.8 HIGH)

EPSS: 0.02%

updated 2026-02-04T18:31:36

1 posts

CyberArk Endpoint Privilege Manager Agent through 25.10.0 allows a local user to achieve privilege escalation through policy elevation of an Administration task.

thehackerwire@mastodon.social at 2026-02-04T16:57:11.000Z ##

🟠 CVE-2025-66374 - High (7.8)

CyberArk Endpoint Privilege Manager Agent through 25.10.0 allows a local user to achieve privilege escalation through policy elevation of an Administration task.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0660
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-04T18:30:51

2 posts

A maliciously crafted GIF file, when parsed through Autodesk 3ds Max, can cause a Stack-Based Buffer Overflow vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

thehackerwire@mastodon.social at 2026-02-04T18:15:00.000Z ##

🟠 CVE-2026-0660 - High (7.8)

A maliciously crafted GIF file, when parsed through Autodesk 3ds Max, can cause a Stack-Based Buffer Overflow vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T18:15:00.000Z ##

🟠 CVE-2026-0660 - High (7.8)

A maliciously crafted GIF file, when parsed through Autodesk 3ds Max, can cause a Stack-Based Buffer Overflow vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20119
(7.5 HIGH)

EPSS: 0.00%

updated 2026-02-04T18:30:51

3 posts

A vulnerability in the text rendering subsystem of Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of input received by an affected device. An attacker could exploit this vulnerability by getting

thehackerwire@mastodon.social at 2026-02-04T18:13:28.000Z ##

🟠 CVE-2026-20119 - High (7.5)

A vulnerability in the text rendering subsystem of Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T18:13:28.000Z ##

🟠 CVE-2026-20119 - High (7.5)

A vulnerability in the text rendering subsystem of Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T17:17:18.000Z ##

🟠 CVE-2026-20119 - High (7.5)

A vulnerability in the text rendering subsystem of Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0659
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-04T18:30:51

2 posts

A maliciously crafted USD file, when loaded or imported into Autodesk Arnold or Autodesk 3ds Max, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

thehackerwire@mastodon.social at 2026-02-04T17:17:39.000Z ##

🟠 CVE-2026-0659 - High (7.8)

A maliciously crafted USD file, when loaded or imported into Autodesk Arnold or Autodesk 3ds Max, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the cur...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T17:17:39.000Z ##

🟠 CVE-2026-0659 - High (7.8)

A maliciously crafted USD file, when loaded or imported into Autodesk Arnold or Autodesk 3ds Max, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the cur...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0662
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-04T18:30:51

1 posts

A maliciously crafted project directory, when opening a max file in Autodesk 3ds Max, could lead to execution of arbitrary code in the context of the current process due to an Untrusted Search Path being utilized.

thehackerwire@mastodon.social at 2026-02-04T17:17:20.000Z ##

🟠 CVE-2026-0662 - High (7.8)

A maliciously crafted project directory, when opening a max file in Autodesk 3ds Max, could lead to execution of arbitrary code in the context of the current process due to an Untrusted Search Path being utilized.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0537
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-04T18:30:50

4 posts

A maliciously crafted RGB file, when parsed through Autodesk 3ds Max, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

thehackerwire@mastodon.social at 2026-02-04T18:13:39.000Z ##

🟠 CVE-2026-0537 - High (7.8)

A maliciously crafted RGB file, when parsed through Autodesk 3ds Max, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T17:17:28.000Z ##

🟠 CVE-2026-0537 - High (7.8)

A maliciously crafted RGB file, when parsed through Autodesk 3ds Max, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T18:13:39.000Z ##

🟠 CVE-2026-0537 - High (7.8)

A maliciously crafted RGB file, when parsed through Autodesk 3ds Max, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T17:17:28.000Z ##

🟠 CVE-2026-0537 - High (7.8)

A maliciously crafted RGB file, when parsed through Autodesk 3ds Max, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-59818
(10.0 CRITICAL)

EPSS: 0.08%

updated 2026-02-04T18:30:39

1 posts

This vulnerability allows authenticated attackers to execute arbitrary commands on the underlying system using the file name of an uploaded file.

thehackerwire@mastodon.social at 2026-02-04T11:18:33.000Z ##

🔴 CVE-2025-59818 - Critical (10)

This vulnerability allows authenticated attackers to execute arbitrary commands on the underlying system using the file name of an uploaded file.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-61506
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-02-04T18:30:31

2 posts

An issue was discovered in MediaCrush thru 1.0.1 allowing remote unauthenticated attackers to upload arbitrary files of any size to the /upload endpoint.

1 repos

https://github.com/pescada-dev/CVE-2025-61506

thehackerwire@mastodon.social at 2026-02-05T00:31:33.000Z ##

🔴 CVE-2025-61506 - Critical (9.8)

An issue was discovered in MediaCrush thru 1.0.1 allowing remote unauthenticated attackers to upload arbitrary files of any size to the /upload endpoint.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-05T00:31:33.000Z ##

🔴 CVE-2025-61506 - Critical (9.8)

An issue was discovered in MediaCrush thru 1.0.1 allowing remote unauthenticated attackers to upload arbitrary files of any size to the /upload endpoint.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-63624
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-02-04T18:30:31

2 posts

SQL Injection vulnerability in Shandong Kede Electronics Co., Ltd IoT smart water meter monitoring platform v.1.0 allows a remote attacker to execute arbitrary code via the imei_list.aspx file.

thehackerwire@mastodon.social at 2026-02-04T21:15:05.000Z ##

🔴 CVE-2025-63624 - Critical (9.8)

SQL Injection vulnerability in Shandong Kede Electronics Co., Ltd IoT smart water meter monitoring platform v.1.0 allows a remote attacker to execute arbitrary code via the imei_list.aspx file.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T21:15:05.000Z ##

🔴 CVE-2025-63624 - Critical (9.8)

SQL Injection vulnerability in Shandong Kede Electronics Co., Ltd IoT smart water meter monitoring platform v.1.0 allows a remote attacker to execute arbitrary code via the imei_list.aspx file.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-63372
(7.5 HIGH)

EPSS: 0.06%

updated 2026-02-04T18:30:31

2 posts

Articentgroup Zip Rar Extractor Tool 1.345.93.0 is vulnerable to Directory Traversal. The vulnerability resides in the ZIP file processing component, specifically in the functionality responsible for extracting and handling ZIP archive contents.

thehackerwire@mastodon.social at 2026-02-04T19:05:35.000Z ##

🟠 CVE-2025-63372 - High (7.5)

Articentgroup Zip Rar Extractor Tool 1.345.93.0 is vulnerable to Directory Traversal. The vulnerability resides in the ZIP file processing component, specifically in the functionality responsible for extracting and handling ZIP archive contents.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T19:05:35.000Z ##

🟠 CVE-2025-63372 - High (7.5)

Articentgroup Zip Rar Extractor Tool 1.345.93.0 is vulnerable to Directory Traversal. The vulnerability resides in the ZIP file processing component, specifically in the functionality responsible for extracting and handling ZIP archive contents.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-65875
(8.8 HIGH)

EPSS: 0.06%

updated 2026-02-04T18:30:31

1 posts

An arbitrary file upload vulnerability in the AddFont() function of FPDF v1.86 and earlier allows attackers to execute arbitrary code via uploading a crafted PHP file.

thehackerwire@mastodon.social at 2026-02-03T18:22:00.000Z ##

🟠 CVE-2025-65875 - High (8.8)

An arbitrary file upload vulnerability in the AddFont() function of FPDF v1.86 and earlier allows attackers to execute arbitrary code via uploading a crafted PHP file.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1530
(8.1 HIGH)

EPSS: 0.02%

updated 2026-02-04T17:47:39

1 posts

A flaw was found in fog-kubevirt. This vulnerability allows a remote attacker to perform a Man-in-the-Middle (MITM) attack due to disabled certificate validation. This enables the attacker to intercept and potentially alter sensitive communications between Satellite and OpenShift, resulting in information disclosure and data integrity compromise.

thehackerwire@mastodon.social at 2026-02-02T06:21:10.000Z ##

🟠 CVE-2026-1530 - High (8.1)

A flaw was found in fog-kubevirt. This vulnerability allows a remote attacker to perform a Man-in-the-Middle (MITM) attack due to disabled certificate validation. This enables the attacker to intercept and potentially alter sensitive communication...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1531
(8.1 HIGH)

EPSS: 0.02%

updated 2026-02-04T17:46:55

1 posts

A flaw was found in foreman_kubevirt. When configuring the connection to OpenShift, the system disables SSL verification if a Certificate Authority (CA) certificate is not explicitly set. This insecure default allows a remote attacker, capable of intercepting network traffic between Satellite and OpenShift, to perform a Man-in-the-Middle (MITM) attack. Such an attack could lead to the disclosure o

thehackerwire@mastodon.social at 2026-02-02T06:21:19.000Z ##

🟠 CVE-2026-1531 - High (8.1)

A flaw was found in foreman_kubevirt. When configuring the connection to OpenShift, the system disables SSL verification if a Certificate Authority (CA) certificate is not explicitly set. This insecure default allows a remote attacker, capable of ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25223
(7.5 HIGH)

EPSS: 0.03%

updated 2026-02-04T17:46:03

2 posts

### Impact A validation bypass vulnerability exists in Fastify where request body validation schemas specified by Content-Type can be completely circumvented. By appending a tab character (`\t`) followed by arbitrary content to the Content-Type header, attackers can bypass body validation while the server still processes the body as the original content type. For example, a request with `Content

thehackerwire@mastodon.social at 2026-02-03T22:19:56.000Z ##

🟠 CVE-2026-25223 - High (7.5)

Fastify is a fast and low overhead web framework, for Node.js. Prior to version 5.7.2, a validation bypass vulnerability exists in Fastify where request body validation schemas specified by Content-Type can be completely circumvented. By appending...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T22:19:18.000Z ##

🟠 CVE-2026-25223 - High (7.5)

Fastify is a fast and low overhead web framework, for Node.js. Prior to version 5.7.2, a validation bypass vulnerability exists in Fastify where request body validation schemas specified by Content-Type can be completely circumvented. By appending...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25510
(10.0 CRITICAL)

EPSS: 0.23%

updated 2026-02-04T17:46:00

2 posts

**Summary** A critical vulnerability has been identified in CI4MS that allows an authenticated user with file editor permissions to achieve Remote Code Execution (RCE). By leveraging the file creation and save endpoints, an attacker can upload and execute arbitrary PHP code on the server. **Vulnerability Details** The vulnerability exists in the /backend/fileeditor/createFile and /backend/filee

thehackerwire@mastodon.social at 2026-02-03T22:20:06.000Z ##

🔴 CVE-2026-25510 - Critical (9.9)

CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.28.5.0, an authenticated user with file editor permissions can achieve Remote Code Exe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T22:19:27.000Z ##

🔴 CVE-2026-25510 - Critical (9.9)

CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.28.5.0, an authenticated user with file editor permissions can achieve Remote Code Exe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25049
(0 None)

EPSS: 0.00%

updated 2026-02-04T17:16:22.833000

16 posts

n8n is an open source workflow automation platform. Prior to versions 1.123.17 and 2.5.2, an authenticated user with permission to create or modify workflows could abuse crafted expressions in workflow parameters to trigger unintended system command execution on the host running n8n. This issue has been patched in versions 1.123.17 and 2.5.2.

undercodenews@mastodon.social at 2026-02-05T13:36:49.000Z ##

Critical n8n Flaw Exposes Automation Platforms to Remote Code Execution

Introduction: Why This n8n Vulnerability Matters Workflow automation tools like n8n sit at the heart of modern DevOps, data pipelines, and business automation. They connect APIs, move sensitive data, and execute logic with elevated trust inside organizations. A newly disclosed critical vulnerability in n8n, tracked as CVE-2026-25049, shows how dangerous even “authenticated-only” flaws can be when…

undercodenews.com/critical-n8n

##

technadu at 2026-02-05T11:35:21.872Z ##

CVE-2026-25049 highlights weaknesses in sandboxing user-defined JavaScript expressions within n8n workflows.

Multiple research teams demonstrated authenticated sandbox escape leading to unrestricted RCE, credential exposure, filesystem access, cloud pivoting, and AI workflow manipulation. The issue stems from incomplete AST-based sandboxing and runtime enforcement gaps.

Fixes have been released, and mitigation guidance includes updating, rotating secrets, and restricting workflow permissions.

Source: bleepingcomputer.com/news/secu

💬 What lessons does this case offer for securing automation platforms?

➕ Follow TechNadu for accurate, vendor-neutral infosec reporting.

##

benzogaga33@mamot.fr at 2026-02-05T10:40:03.000Z ##

n8n : la faille critique CVE-2026-25049 réactive une précédente vulnérabilité it-connect.fr/n8n-cve-2026-250 #ActuCybersécurité #Cybersécurité #Vulnérabilité

##

christopherkunz@chaos.social at 2026-02-05T10:24:09.000Z ##

It seems that the recent #n8n CVE-2026-25049 is (EDIT: or was? My e-mail got answered with a generic response by an AI assistant) not only exploitable on self-hosted instances, but also in the n8n cloud. At least this is what the URL briefly visible in this video indicates. youtube.com/watch?v=QLrm7jx8kew (skip to 0:15 for a clear shot).

##

beyondmachines1 at 2026-02-05T08:01:02.444Z ##

Critical Sandbox Escapes in n8n AI Platform Enable Full Server Takeover

n8n patched another critical sandbox escape vulnerabilities (CVE-2026-25049) that allow authenticated users to execute arbitrary code and steal sensitive AI and cloud credentials.

**This is another important and urgent flaw in n8n. Update your n8n instances to the latest version ASAP and rotate all stored API keys and encryption secrets. Since these flaws allow full server takeover, you must assume any credentials stored in an unpatched instance are already compromised.**

beyondmachines.net/event_detai

##

rxerium at 2026-02-05T07:09:10.468Z ##

Yet another critical vulnerability in n8n - CVE-2026-25049 (CVSS 9.4).

Vulnerability detection script here:
github.com/rxerium/rxerium-tem

Patched versions are 1.123.17 / 2.5.2 as per:
github.com/n8n-io/n8n/security

##

undercodenews@mastodon.social at 2026-02-05T06:32:54.000Z ##

Critical RCE Alert: n8n Workflow Automation Hit by Severe Vulnerability Allowing System Takeover

The popular workflow automation platform n8n has been rocked by a critical security flaw that could let attackers execute arbitrary system commands on affected servers. Tracked as CVE-2026-25049 with a high CVSS score of 9.4, the vulnerability stems from insufficient input sanitization—despite previous fixes for CVE-2025-68613, a similar high-severity flaw patched in…

undercodenews.com/critical-rce

##

_r_netsec at 2026-02-04T22:13:06.090Z ##

2026: New N8N RCE Deep Dive into CVE-2026-25049 blog.securelayer7.net/cve-2026

##

defendopsdiaries at 2026-02-04T21:27:56.857Z ##

Imagine thinking your workflow tool is safe, only to find out a single coding flaw let hackers grab everything from system access to secret credentials. How did n8n’s sandbox fail so badly? The details are wild

thedefendopsdiaries.com/how-n8

##

DarkWebInformer at 2026-02-04T21:23:57.808Z ##

‼️CVE-2026-25049: N8n AI Workflow Remote Code Execution

"This vulnerability allows an attacker to execute arbitrary system commands through misconfigured or insecure AI workflow execution paths. When chained correctly, it can lead to full server compromise depending on deployment configuration."

Video Credit: youtube.com/@SecureLayer7

##

technadu@infosec.exchange at 2026-02-05T11:35:21.000Z ##

CVE-2026-25049 highlights weaknesses in sandboxing user-defined JavaScript expressions within n8n workflows.

Multiple research teams demonstrated authenticated sandbox escape leading to unrestricted RCE, credential exposure, filesystem access, cloud pivoting, and AI workflow manipulation. The issue stems from incomplete AST-based sandboxing and runtime enforcement gaps.

Fixes have been released, and mitigation guidance includes updating, rotating secrets, and restricting workflow permissions.

Source: bleepingcomputer.com/news/secu

💬 What lessons does this case offer for securing automation platforms?

➕ Follow TechNadu for accurate, vendor-neutral infosec reporting.

#Infosec #CVE #n8n #SandboxEscape #RCE #CloudSecurity #DevSecOps

##

benzogaga33@mamot.fr at 2026-02-05T10:40:03.000Z ##

n8n : la faille critique CVE-2026-25049 réactive une précédente vulnérabilité it-connect.fr/n8n-cve-2026-250 #ActuCybersécurité #Cybersécurité #Vulnérabilité

##

christopherkunz@chaos.social at 2026-02-05T10:24:09.000Z ##

It seems that the recent #n8n CVE-2026-25049 is (EDIT: or was? My e-mail got answered with a generic response by an AI assistant) not only exploitable on self-hosted instances, but also in the n8n cloud. At least this is what the URL briefly visible in this video indicates. youtube.com/watch?v=QLrm7jx8kew (skip to 0:15 for a clear shot).

##

beyondmachines1@infosec.exchange at 2026-02-05T08:01:02.000Z ##

Critical Sandbox Escapes in n8n AI Platform Enable Full Server Takeover

n8n patched another critical sandbox escape vulnerabilities (CVE-2026-25049) that allow authenticated users to execute arbitrary code and steal sensitive AI and cloud credentials.

**This is another important and urgent flaw in n8n. Update your n8n instances to the latest version ASAP and rotate all stored API keys and encryption secrets. Since these flaws allow full server takeover, you must assume any credentials stored in an unpatched instance are already compromised.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

_r_netsec@infosec.exchange at 2026-02-04T22:13:06.000Z ##

2026: New N8N RCE Deep Dive into CVE-2026-25049 blog.securelayer7.net/cve-2026

##

DarkWebInformer@infosec.exchange at 2026-02-04T21:23:57.000Z ##

‼️CVE-2026-25049: N8n AI Workflow Remote Code Execution

"This vulnerability allows an attacker to execute arbitrary system commands through misconfigured or insecure AI workflow execution paths. When chained correctly, it can lead to full server compromise depending on deployment configuration."

Video Credit: youtube.com/@SecureLayer7

##

CVE-2026-20098
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-04T17:16:14.107000

3 posts

A vulnerability in the Certificate Management feature of Cisco Meeting Management could allow an authenticated, remote attacker to upload arbitrary files, execute arbitrary commands, and elevate privileges to root on an affected system. This vulnerability is due to improper input validation in certain sections of the web-based management interface. An attacker could exploit this vulnerability&n

thehackerwire@mastodon.social at 2026-02-04T18:13:18.000Z ##

🟠 CVE-2026-20098 - High (8.8)

A vulnerability in the Certificate Management feature of Cisco Meeting Management could allow an authenticated, remote attacker to upload arbitrary files, execute arbitrary commands, and elevate privileges to root on an affected system.

This vu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T18:13:18.000Z ##

🟠 CVE-2026-20098 - High (8.8)

A vulnerability in the Certificate Management feature of Cisco Meeting Management could allow an authenticated, remote attacker to upload arbitrary files, execute arbitrary commands, and elevate privileges to root on an affected system.

This vu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T17:17:08.000Z ##

🟠 CVE-2026-20098 - High (8.8)

A vulnerability in the Certificate Management feature of Cisco Meeting Management could allow an authenticated, remote attacker to upload arbitrary files, execute arbitrary commands, and elevate privileges to root on an affected system.

This vu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0661
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-04T17:16:12.947000

2 posts

A maliciously crafted RGB file, when parsed through Autodesk 3ds Max, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

thehackerwire@mastodon.social at 2026-02-04T18:15:10.000Z ##

🟠 CVE-2026-0661 - High (7.8)

A maliciously crafted RGB file, when parsed through Autodesk 3ds Max, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T18:15:10.000Z ##

🟠 CVE-2026-0661 - High (7.8)

A maliciously crafted RGB file, when parsed through Autodesk 3ds Max, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0538
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-04T17:16:12.403000

2 posts

A maliciously crafted GIF file, when parsed through Autodesk 3ds Max, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

thehackerwire@mastodon.social at 2026-02-04T17:17:29.000Z ##

🟠 CVE-2026-0538 - High (7.8)

A maliciously crafted GIF file, when parsed through Autodesk 3ds Max, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T17:17:29.000Z ##

🟠 CVE-2026-0538 - High (7.8)

A maliciously crafted GIF file, when parsed through Autodesk 3ds Max, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-14550
(7.5 HIGH)

EPSS: 0.04%

updated 2026-02-04T17:09:58.100000

1 posts

An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28. `ASGIRequest` allows a remote attacker to cause a potential denial-of-service via a crafted request with multiple duplicate headers. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Jiyong Yang for reporting this issue.

thehackerwire@mastodon.social at 2026-02-03T17:23:21.000Z ##

🟠 CVE-2025-14550 - High (7.5)

An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.
`ASGIRequest` allows a remote attacker to cause a potential denial-of-service via a crafted request with multiple duplicate headers.
Earlier, unsupported Django...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1340
(9.8 CRITICAL)

EPSS: 0.18%

updated 2026-02-04T16:34:21.763000

3 posts

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

CVE-2025-57529
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-02-04T16:34:21.763000

1 posts

YouDataSum CPAS Audit Management System <=v4.9 is vulnerable to SQL Injection in /cpasList/findArchiveReportByDah due to insufficient input validation. This allows remote unauthenticated attackers to execute arbitrary SQL commands via crafted input to the parameter. Successful exploitation could lead to unauthorized data access

1 repos

https://github.com/songqb-xx/CVE-2025-57529

thehackerwire@mastodon.social at 2026-02-04T16:57:20.000Z ##

🔴 CVE-2025-57529 - Critical (9.8)

YouDataSum CPAS Audit Management System &lt;=v4.9 is vulnerable to SQL Injection in /cpasList/findArchiveReportByDah due to insufficient input validation. This allows remote unauthenticated attackers to execute arbitrary SQL commands via crafted i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-63649
(7.5 HIGH)

EPSS: 0.05%

updated 2026-02-04T16:34:21.763000

1 posts

An out-of-bounds read in the http_parser_transfer_encoding_chunked function (mk_server/mk_http_parser.c) of monkey commit f37e984 allows attackers to cause a Denial of Service (DoS) via sending a crafted POST request to the server.

thehackerwire@mastodon.social at 2026-02-03T00:28:54.000Z ##

🟠 CVE-2025-63649 - High (7.5)

An out-of-bounds read in the http_parser_transfer_encoding_chunked function (mk_server/mk_http_parser.c) of monkey commit f37e984 allows attackers to cause a Denial of Service (DoS) via sending a crafted POST request to the server.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1580
(8.8 HIGH)

EPSS: 0.10%

updated 2026-02-04T16:33:44.537000

4 posts

A security issue was discovered in ingress-nginx where the `nginx.ingress.kubernetes.io/auth-method` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-

mastokukei@social.josko.org at 2026-02-05T09:02:35.000Z ##

Blip blop, I'm a #mastobot.
Here is a summary (in beta) of the latest posts in #programmingAtKukei masto.kukei.eu/browse/programm category:
- Xcode 26.3 adds agentic coding with Claude/Codex via MCP in the IDE
- AI agents security: OpenClaw and Moltbot/MCP ecosystems risk; need guardrails
- GnuPG/Gpg4win vulnerabilities enabling code execution and DoS (WID-SEC-2026-0231)
- Ingress-Nginx auth-url bypass vulnerability CVE-2026-1580 (Kubernetes)
- ZetaSQL renamed to GoogleSQL for public [1/2]

##

mastokukei@social.josko.org at 2026-02-04T18:02:24.000Z ##

Blip blop, I'm a #mastobot.
Here is a summary (in beta) of the latest posts in #programmingAtKukei masto.kukei.eu/browse/programm category:
- Wagtail CMS autosave feature rollout
- Xcode 26.3 adds agentic coding with Claude/Codex (MCP server)
- Ingress-NGINX auth-url protection bypass CVE-2026-1580
- Calamine Rust crate v0.33.0 release
- Ghidra MCP Server released (production-grade, 132 endpoints)
- AI-assisted coding reduces developer mastery (Anthropic study)

##

thehackerwire@mastodon.social at 2026-02-03T23:18:34.000Z ##

🟠 CVE-2026-1580 - High (8.8)

A security issue was discovered in ingress-nginx where the `nginx.ingress.kubernetes.io/auth-method` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

ChrisShort@hachyderm.io at 2026-02-03T19:51:48.000Z ##

CVE-2026-1580 #devopsish #kubernetes #cve github.com/kubernetes/kubernet

##

CVE-2026-1632
(9.1 CRITICAL)

EPSS: 0.13%

updated 2026-02-04T16:33:44.537000

3 posts

MOMA Seismic Station Version v2.4.2520 and prior exposes its web management interface without requiring authentication, which could allow an unauthenticated attacker to modify configuration settings, acquire device data or remotely reset the device.

beyondmachines1 at 2026-02-04T19:01:03.603Z ##

Critical Authentication Bypass Reported in RISS SRL MOMA Seismic Stations

RISS SRL MOMA Seismic Station versions <=v2.4.2520 contain a critical vulnerability (CVE-2026-1632) that allows unauthenticated attackers to take full control of the device via its web interface.

**If you use MOMA Seismic Station seismic stations, isolate them off the public internet immediately and put them behind a firewall or VPN. Since the vendor hasn't responded with a patch, your only real defense is strict network isolation. And consider if it's feasible to replace these devices, especially if they are networked or connected to public systems.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-02-04T19:01:03.000Z ##

Critical Authentication Bypass Reported in RISS SRL MOMA Seismic Stations

RISS SRL MOMA Seismic Station versions <=v2.4.2520 contain a critical vulnerability (CVE-2026-1632) that allows unauthenticated attackers to take full control of the device via its web interface.

**If you use MOMA Seismic Station seismic stations, isolate them off the public internet immediately and put them behind a firewall or VPN. Since the vendor hasn't responded with a patch, your only real defense is strict network isolation. And consider if it's feasible to replace these devices, especially if they are networked or connected to public systems.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

thehackerwire@mastodon.social at 2026-02-03T23:18:43.000Z ##

🔴 CVE-2026-1632 - Critical (9.1)

MOMA Seismic Station Version v2.4.2520 and prior exposes its web management interface without requiring authentication, which could allow an unauthenticated attacker to modify configuration settings, acquire device data or remotely reset the device.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1341
(0 None)

EPSS: 0.02%

updated 2026-02-04T16:33:44.537000

1 posts

Avation Light Engine Pro exposes its configuration and control interface without any authentication or access control.

beyondmachines1@infosec.exchange at 2026-02-04T14:01:03.000Z ##

Critical Authentication Bypass in Avation Light Engine Pro Allows Full Device Takeover

Avation Light Engine Pro contains a critical vulnerability (CVE-2026-1341) that allows unauthenticated remote attackers to take full control of the device due to a complete lack of authentication.

**Isolate your Avation Light Engine Pro from the internet and make them accessible only from trusted networks. There is no patch, and the vendor is unresponsive. Use a VPN and firewalls to ensure only authorized internal staff can reach the control interface, and start planning for a replacement.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-15285
(7.5 HIGH)

EPSS: 0.08%

updated 2026-02-04T16:33:44.537000

1 posts

The SEO Flow by LupsOnline plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the checkBlogAuthentication() and checkCategoryAuthentication() functions in all versions up to, and including, 2.2.1. These authorization functions only implement basic API key authentication but fail to implement WordPress capability checks. This makes it possib

thehackerwire@mastodon.social at 2026-02-04T09:17:18.000Z ##

🟠 CVE-2025-15285 - High (7.5)

The SEO Flow by LupsOnline plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the checkBlogAuthentication() and checkCategoryAuthentication() functions in all versions up to, and including,...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-15268
(7.5 HIGH)

EPSS: 0.07%

updated 2026-02-04T16:33:44.537000

1 posts

The Infility Global plugin for WordPress is vulnerable to unauthenticated SQL Injection via the 'infility_get_data' API action in all versions up to, and including, 2.14.46. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append - with certain server configurati

thehackerwire@mastodon.social at 2026-02-04T09:17:08.000Z ##

🟠 CVE-2025-15268 - High (7.5)

The Infility Global plugin for WordPress is vulnerable to unauthenticated SQL Injection via the 'infility_get_data' API action in all versions up to, and including, 2.14.46. This is due to insufficient escaping on the user supplied parameter and l...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25150
(9.3 CRITICAL)

EPSS: 0.02%

updated 2026-02-04T16:33:44.537000

1 posts

Qwik is a performance focused javascript framework. Prior to version 1.19.0, a prototype pollution vulnerability exists in the formToObj() function within @builder.io/qwik-city middleware. The function processes form field names with dot notation (e.g., user.name) to create nested objects, but fails to sanitize dangerous property names like __proto__, constructor, and prototype. This allows unauth

thehackerwire@mastodon.social at 2026-02-03T22:20:16.000Z ##

🔴 CVE-2026-25150 - Critical (9.3)

Qwik is a performance focused javascript framework. Prior to version 1.19.0, a prototype pollution vulnerability exists in the formToObj() function within @builder.io/qwik-city middleware. The function processes form field names with dot notation ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1803
(8.1 HIGH)

EPSS: 0.02%

updated 2026-02-04T16:33:44.537000

2 posts

A weakness has been identified in Ziroom ZHOME A0101 1.0.1.0. Impacted is an unknown function of the component Dropbear SSH Service. This manipulation causes use of default credentials. Remote exploitation of the attack is possible. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit has been made available to the public and could be used for attacks

thehackerwire@mastodon.social at 2026-02-03T20:21:20.000Z ##

🟠 CVE-2026-1803 - High (8.1)

A weakness has been identified in Ziroom ZHOME A0101 1.0.1.0. Impacted is an unknown function of the component Dropbear SSH Service. This manipulation causes use of default credentials. Remote exploitation of the attack is possible. The complexity...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T20:20:46.000Z ##

🟠 CVE-2026-1803 - High (8.1)

A weakness has been identified in Ziroom ZHOME A0101 1.0.1.0. Impacted is an unknown function of the component Dropbear SSH Service. This manipulation causes use of default credentials. Remote exploitation of the attack is possible. The complexity...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24773
(7.5 HIGH)

EPSS: 0.03%

updated 2026-02-04T16:33:44.537000

2 posts

The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, an Insecure Direct Object Reference (IDOR) vulnerability allows unauthenticated remote attackers to access personal files of other users by directly requesting predictable user identifiers. This issue has been patched in version 4.2.

thehackerwire@mastodon.social at 2026-02-03T18:22:21.000Z ##

🟠 CVE-2026-24773 - High (7.5)

The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, an Insecure Direct Object Reference (IDOR) vulnerability allows unauthenticated remote attackers to access personal files of ot...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T18:21:23.000Z ##

🟠 CVE-2026-24773 - High (7.5)

The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, an Insecure Direct Object Reference (IDOR) vulnerability allows unauthenticated remote attackers to access personal files of ot...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2021-39935
(6.8 MEDIUM)

EPSS: 80.80%

updated 2026-02-04T15:56:15.730000

3 posts

An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.5 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. Unauthorized external users could perform Server Side Requests via the CI Lint API

DarkWebInformer@infosec.exchange at 2026-02-03T19:40:05.000Z ##

‼️ CISA has added 4 vulnerabilities to the KEV Catalog

darkwebinformer.com/cisa-kev-c

CVE-2025-40551: SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability

CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability

CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability

CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability

##

AAKL@infosec.exchange at 2026-02-03T16:25:06.000Z ##

CISA has updated the KEV catalogue.

- CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability cve.org/CVERecord?id=CVE-2019-

- CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability cve.org/CVERecord?id=CVE-2021- #CISA #infosec #GitLab #vulnerability

##

cisakevtracker@mastodon.social at 2026-02-03T16:01:09.000Z ##

CVE ID: CVE-2021-39935
Vendor: GitLab
Product: Community and Enterprise Editions
Date Added: 2026-02-03
Notes: about.gitlab.com/releases/2021 ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-15368
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-04T15:30:35

1 posts

The SportsPress plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.7.26 via shortcodes 'template_name' attribute. This makes it possible for authenticated attackers, with contributor-level and above permissions, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass acce

thehackerwire@mastodon.social at 2026-02-04T14:24:02.000Z ##

🟠 CVE-2025-15368 - High (8.8)

The SportsPress plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.7.26 via shortcodes 'template_name' attribute. This makes it possible for authenticated attackers, with contributor-level and above ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-5329
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-02-04T15:30:29

1 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Martcode Software Inc. Delta Course Automation allows SQL Injection.This issue affects Delta Course Automation: through 04022026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

1 repos

https://github.com/sahici/CVE-2025-5329

thehackerwire@mastodon.social at 2026-02-04T14:24:12.000Z ##

🔴 CVE-2025-5329 - Critical (9.8)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Martcode Software Inc. Delta Course Automation allows SQL Injection.This issue affects Delta Course Automation: through 04022026.

NOTE: The vend...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20402
(7.5 HIGH)

EPSS: 0.21%

updated 2026-02-04T14:28:00.447000

1 posts

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00693083; Issue ID: MSV-5928.

thehackerwire@mastodon.social at 2026-02-02T23:52:42.000Z ##

🟠 CVE-2026-20402 - High (7.5)

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. Use...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20404
(7.5 HIGH)

EPSS: 0.21%

updated 2026-02-04T14:22:01.120000

2 posts

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01689248; Issue ID: MSV-4837.

thehackerwire@mastodon.social at 2026-02-02T23:52:22.000Z ##

🟠 CVE-2026-20404 - High (7.5)

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. Use...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T23:29:08.000Z ##

🟠 CVE-2026-20404 - High (7.5)

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. Use...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20406
(7.5 HIGH)

EPSS: 0.21%

updated 2026-02-04T13:52:44.517000

1 posts

In Modem, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01726634; Issue ID: MSV-5728.

thehackerwire@mastodon.social at 2026-02-02T23:29:35.000Z ##

🟠 CVE-2026-20406 - High (7.5)

In Modem, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User in...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20408
(8.8 HIGH)

EPSS: 0.02%

updated 2026-02-04T13:48:41.430000

1 posts

In wlan, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00461651; Issue ID: MSV-4758.

thehackerwire@mastodon.social at 2026-02-02T15:19:37.000Z ##

🟠 CVE-2026-20408 - High (8)

In wlan, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0818
(4.3 MEDIUM)

EPSS: 0.02%

updated 2026-02-04T12:32:27

1 posts

CSS-based exfiltration of the content from partially encrypted emails when allowing remote content. This vulnerability affects Thunderbird < 147.0.1 and Thunderbird < 140.7.1.

linux@activitypub.awakari.com at 2026-02-03T19:26:37.000Z ## Debian thunderbird Important Info Disclosure Vuln DSA-6118-1 CVE-2026-0818 A security issue was discovered in Thunderbird, which could result in information disclosure For the oldstable distributio...

#Debian #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2026-1819
(8.8 HIGH)

EPSS: 0.05%

updated 2026-02-04T09:30:35

1 posts

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Karel Electronics Industry and Trade Inc. ViPort allows Stored XSS.This issue affects ViPort: through 23012026.

thehackerwire@mastodon.social at 2026-02-04T08:17:23.000Z ##

🟠 CVE-2026-1819 - High (8.8)

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Karel Electronics Industry and Trade Inc. ViPort allows Stored XSS.This issue affects ViPort: through 23012026.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1756
(8.8 HIGH)

EPSS: 0.22%

updated 2026-02-04T09:30:30

1 posts

The WP FOFT Loader plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the 'WP_FOFT_Loader_Mimes::file_and_ext' function in all versions up to, and including, 2.1.39. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution po

thehackerwire@mastodon.social at 2026-02-04T07:22:29.000Z ##

🟠 CVE-2026-1756 - High (8.8)

The WP FOFT Loader plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the 'WP_FOFT_Loader_Mimes::file_and_ext' function in all versions up to, and including, 2.1.39. This makes it possible for aut...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-5319
(9.8 CRITICAL)

EPSS: 0.01%

updated 2026-02-04T08:16:05.393000

1 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Emit Informatics and Communication Technologies Industry and Trade Ltd. Co. DIGITA Efficiency Management System allows SQL Injection.This issue affects DIGITA Efficiency Management System: through 03022026.  NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

1 repos

https://github.com/sahici/CVE-2025-5319

thehackerwire@mastodon.social at 2026-02-03T15:20:21.000Z ##

🔴 CVE-2025-5319 - Critical (9.8)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Emit Information and Communication Technologies Industry and Trade Ltd. Co. Efficiency Management System allows SQL Injection.This issue affects ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-40551
(9.8 CRITICAL)

EPSS: 22.94%

updated 2026-02-04T02:00:02.030000

6 posts

SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

AAKL@infosec.exchange at 2026-02-04T15:40:54.000Z ##

Looks like CISA added SolarWinds to the KEV catalogue yesterday:

Critical: CVE-2025-40551: SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability #infosec #CISA #SolarWinds #vulnerability

##

beyondmachines1@infosec.exchange at 2026-02-04T15:01:02.000Z ##

CISA Mandates Immediate Patching for Actively Exploited SolarWinds Web Help Desk RCE Flaw

CISA reports active exploitation of a critical flaw in SolarWinds Web Help Desk software (CVE-2025-40551). CISA has mandated that federal agencies apply the update within three days.

**If you are using Web Help Desk, this is urgent and important. Your Solar Web Help Desk is under attack. If your process allows for it, isolate Web Help Desk from the internet, then plan a quick update. If you can't isolate from the internet, patch now!**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

technadu@infosec.exchange at 2026-02-04T12:24:41.000Z ##

CISA has added CVE-2025-40551, a critical SolarWinds Web Help Desk deserialization vulnerability, to the KEV catalog after confirming active exploitation.

The flaw enables unauthenticated remote code execution and has already been patched, though exploitation details remain undisclosed. Additional KEV inclusions span Sangoma FreePBX and GitLab, reflecting continued abuse of both enterprise and open-source platforms.

This reinforces the importance of KEV-driven prioritization and continuous monitoring beyond initial disclosure.

Source: thehackernews.com/2026/02/cisa

Community insight welcome.
Follow TechNadu for ongoing vulnerability and threat intelligence updates.

#Infosec #KEV #CISA #VulnerabilityResearch #SolarWinds #ThreatLandscape #CyberDefense

##

oversecurity@mastodon.social at 2026-02-03T21:10:05.000Z ##

CISA orders federal agencies to patch exploited SolarWinds bug by Friday

CVE-2025-40551 carries a critical severity score of 9.8 out of 10 and impacts SolarWinds Web Help Desk (WHD) — an IT service management platform...

🔗️ [Therecord] link.is.it/Ir7OlU

##

DarkWebInformer@infosec.exchange at 2026-02-03T19:40:05.000Z ##

‼️ CISA has added 4 vulnerabilities to the KEV Catalog

darkwebinformer.com/cisa-kev-c

CVE-2025-40551: SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability

CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability

CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability

CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability

##

cisakevtracker@mastodon.social at 2026-02-03T19:01:00.000Z ##

CVE ID: CVE-2025-40551
Vendor: SolarWinds
Product: Web Help Desk
Date Added: 2026-02-03
Notes: solarwinds.com/trust-center/se ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-1861
(8.8 HIGH)

EPSS: 0.03%

updated 2026-02-04T00:31:33

1 posts

Heap buffer overflow in libvpx in Google Chrome prior to 144.0.7559.132 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-02-03T23:01:48.000Z ##

🟠 CVE-2026-1861 - High (8.8)

Heap buffer overflow in libvpx in Google Chrome prior to 144.0.7559.132 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1633
(10.0 CRITICAL)

EPSS: 0.05%

updated 2026-02-04T00:30:41

5 posts

The Synectix LAN 232 TRIO 3-Port serial to ethernet adapter exposes its web management interface without requiring authentication, allowing unauthenticated users to modify critical device settings or factory reset the device.

571906@ap.podcastindex.org at 2026-02-05T02:10:11.000Z ##

New Episode: SANS Stormcast Thursday, February 5th, 2026: Malicious Scripts; Synectix Vuln; Google Chrome; Google Looker;

Shownotes:

Malicious Script Delivering More Maliciousness
https://isc.sans.edu/diary/Malicious+Script+Delivering+More+Maliciousness/32682
Synectix LAN 232 TRIO Unauthenticated Web Admin CVE-2026-1633
https://www.cisa.gov/news-events/ics-advisorie

Transcript

AntennaPod | Anytime Player | Apple Podcasts | Castamatic | CurioCaster | Fountain | gPodder | Overcast | Pocket Casts | Podcast Addict | Podcast Guru | Podnews | Podverse | Truefans

Or Listen right here.

##

sambowne at 2026-02-04T20:50:34.545Z ##

CVE-2026-1633 Missing Authentication for Critical Function (CWE-306) feedly.com/cve/CVE-2026-1633

##

sambowne@infosec.exchange at 2026-02-04T20:50:34.000Z ##

CVE-2026-1633 Missing Authentication for Critical Function (CWE-306) feedly.com/cve/CVE-2026-1633

##

beyondmachines1@infosec.exchange at 2026-02-04T09:01:02.000Z ##

Critical Authentication Bypass in End-of-Life Synectix LAN 232 TRIO Adapters

Synectix LAN 232 TRIO adapters contain a critical vulnerability (CVE-2026-1633) that allows unauthenticated remote attackers to take full control of the device. Because the manufacturer is out of business, no patches will be released.

**If you use these Synectix adapters, isolate them from the internet immediately because they have no password protection and will never be patched. Since the company is out of business, plan a replacement of the devices.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

thehackerwire@mastodon.social at 2026-02-04T00:20:01.000Z ##

🔴 CVE-2026-1633 - Critical (10)

The Synectix LAN 232 TRIO 3-Port serial to ethernet adapter exposes its web management interface without requiring authentication, allowing unauthenticated users to modify critical device settings or factory reset the device.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1862
(8.8 HIGH)

EPSS: 0.03%

updated 2026-02-04T00:30:28

1 posts

Type Confusion in V8 in Google Chrome prior to 144.0.7559.132 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-02-03T23:01:58.000Z ##

🟠 CVE-2026-1862 - High (8.8)

Type Confusion in V8 in Google Chrome prior to 144.0.7559.132 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-10878
(10.0 CRITICAL)

EPSS: 0.18%

updated 2026-02-03T21:31:59

1 posts

A SQL injection vulnerability exists in the login functionality of Fikir Odalari AdminPando 1.0.1 before 2026-01-26. The username and password parameters are vulnerable to SQL injection, allowing unauthenticated attackers to bypass authentication completely. Successful exploitation grants full administrative access to the application, including the ability to manipulate the public-facing website c

1 repos

https://github.com/onurcangnc/CVE-2025-10878-AdminPandov1.0.1-SQLi

thehackerwire@mastodon.social at 2026-02-03T20:20:50.000Z ##

🔴 CVE-2025-10878 - Critical (10)

A SQL injection vulnerability exists in the login functionality of Fikir Odalari AdminPando 1.0.1 before 2026-01-26. The username and password parameters are vulnerable to SQL injection, allowing unauthenticated attackers to bypass authentication ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24149
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-03T21:31:59

1 posts

NVIDIA Megatron-LM for all platforms contains a vulnerability in a script, where malicious data created by an attacker may cause a code injection issue. A successful exploit of this vulnerability may lead to code execution, escalation of privileges, information disclosure, data tampering.

thehackerwire@mastodon.social at 2026-02-03T20:20:31.000Z ##

🟠 CVE-2026-24149 - High (7.8)

NVIDIA Megatron-LM for all platforms contains a vulnerability in a script, where malicious data created by an attacker may cause a code injection issue. A successful exploit of this vulnerability may lead to code execution, escalation of privilege...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24954
(8.8 HIGH)

EPSS: 0.05%

updated 2026-02-03T21:31:51

1 posts

Deserialization of Untrusted Data vulnerability in magepeopleteam WpEvently mage-eventpress allows Object Injection.This issue affects WpEvently: from n/a through <= 5.0.8.

thehackerwire@mastodon.social at 2026-02-03T19:20:38.000Z ##

🟠 CVE-2026-24954 - High (8.8)

Deserialization of Untrusted Data vulnerability in magepeopleteam WpEvently mage-eventpress allows Object Injection.This issue affects WpEvently: from n/a through &lt;= 5.0.8.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20419
(7.5 HIGH)

EPSS: 0.07%

updated 2026-02-03T21:27:13.077000

1 posts

In wlan AP/STA firmware, there is a possible system becoming irresponsive due to an uncaught exception. This could lead to remote (proximal/adjacent) denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00461663 / WCNCR00463309; Issue ID: MSV-4852.

thehackerwire@mastodon.social at 2026-02-02T14:19:13.000Z ##

🟠 CVE-2026-20419 - High (7.5)

In wlan AP/STA firmware, there is a possible system becoming irresponsive due to an uncaught exception. This could lead to remote (proximal/adjacent) denial of service with no additional execution privileges needed. User interaction is not needed ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20421
(7.5 HIGH)

EPSS: 0.21%

updated 2026-02-03T21:23:50.483000

1 posts

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01738293; Issue ID: MSV-5922.

thehackerwire@mastodon.social at 2026-02-02T23:28:48.000Z ##

🟠 CVE-2026-20421 - High (7.5)

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. Use...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1285(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-02-03T19:31:19

1 posts

An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28. `django.utils.text.Truncator.chars()` and `Truncator.words()` methods (with `html=True`) and the `truncatechars_html` and `truncatewords_html` template filters allow a remote attacker to cause a potential denial-of-service via crafted inputs containing a large number of unmatched HTML end tags. Earlier, unsuppo

thehackerwire@mastodon.social at 2026-02-03T17:23:11.000Z ##

🟠 CVE-2026-1285 - High (7.5)

An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.
`django.utils.text.Truncator.chars()` and `Truncator.words()` methods (with `html=True`) and the `truncatechars_html` and `truncatewords_html` template filters ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-67853
(7.5 HIGH)

EPSS: 0.02%

updated 2026-02-03T19:15:23

1 posts

A flaw was found in Moodle. A remote attacker could exploit a lack of proper rate limiting in the confirmation email service. This vulnerability allows attackers to more easily enumerate or guess user credentials, facilitating brute-force attacks against user accounts.

thehackerwire@mastodon.social at 2026-02-03T11:22:44.000Z ##

🟠 CVE-2025-67853 - High (7.5)

A flaw was found in Moodle. A remote attacker could exploit a lack of proper rate limiting in the confirmation email service. This vulnerability allows attackers to more easily enumerate or guess user credentials, facilitating brute-force attacks ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1568
(9.6 CRITICAL)

EPSS: 0.02%

updated 2026-02-03T18:30:53

1 posts

Rapid7 InsightVM versions before 8.34.0 contain a signature verification issue on the Assertion Consumer Service (ACS) cloud endpoint that could allow an attacker to gain unauthorized access to InsightVM accounts setup via "Security Console" installations, resulting in full account takeover. The issue occurs due to the application processing these unsigned assertions and issuing session cookies th

thehackerwire@mastodon.social at 2026-02-03T17:23:02.000Z ##

🔴 CVE-2026-1568 - Critical (9.6)

Rapid7 InsightVM versions before 8.34.0 contain a signature verification issue on the Assertion Consumer Service (ACS) cloud endpoint that could allow an attacker to gain unauthorized access to InsightVM accounts setup
via "Security Console" ins...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2019-19006
(9.8 CRITICAL)

EPSS: 31.70%

updated 2026-02-03T18:30:27

3 posts

Sangoma FreePBX 115.0.16.26 and below, 14.0.13.11 and below, 13.0.197.13 and below have Incorrect Access Control.

DarkWebInformer@infosec.exchange at 2026-02-03T19:40:05.000Z ##

‼️ CISA has added 4 vulnerabilities to the KEV Catalog

darkwebinformer.com/cisa-kev-c

CVE-2025-40551: SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability

CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability

CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability

CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability

##

AAKL@infosec.exchange at 2026-02-03T16:25:06.000Z ##

CISA has updated the KEV catalogue.

- CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability cve.org/CVERecord?id=CVE-2019-

- CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability cve.org/CVERecord?id=CVE-2021- #CISA #infosec #GitLab #vulnerability

##

cisakevtracker@mastodon.social at 2026-02-03T16:01:41.000Z ##

CVE ID: CVE-2019-19006
Vendor: Sangoma
Product: FreePBX
Date Added: 2026-02-03
Notes: wiki.freepbx.org/display/FOP/2 ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-24071
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-03T16:44:36.630000

2 posts

It was found that the XPC service offered by the privileged helper of Native Access uses the PID of the connecting client to verify its code signature. This is considered insecure and can be exploited by PID reuse attacks. The connection handler function uses _xpc_connection_get_pid(arg2) as argument for the hasValidSignature function. This value can not be trusted since it is vulnerable to PID r

thehackerwire@mastodon.social at 2026-02-02T19:09:38.000Z ##

🔴 CVE-2026-24071 - Critical (9.3)

It was found that the XPC service offered by the privileged helper of Native Access uses the PID of the connecting client to verify its code signature. This is considered insecure and can be exploited by PID reuse attacks. The connection handler...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T18:18:24.000Z ##

🔴 CVE-2026-24071 - Critical (9.3)

It was found that the XPC service offered by the privileged helper of Native Access uses the PID of the connecting client to verify its code signature. This is considered insecure and can be exploited by PID reuse attacks. The connection handler...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-9974
(8.0 HIGH)

EPSS: 0.03%

updated 2026-02-03T16:44:36.630000

2 posts

The unified WEBUI application of the ONT/Beacon device contains an input handling flaw that allows authenticated users to trigger unintended system-level command execution. Due to insufficient validation of user-supplied data, a low-privileged authenticated attacker may be able to execute arbitrary commands on the underlying ONT/Beacon operating system, potentially impacting the confidentiality, i

thehackerwire@mastodon.social at 2026-02-02T18:11:36.000Z ##

🟠 CVE-2025-9974 - High (8.8)

The unified WEBUI application of the ONT/Beacon device contains an input handling flaw that allows authenticated users to trigger unintended system-level command execution. Due to insufficient validation of user-supplied data, a low-privileged aut...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T17:14:55.000Z ##

🟠 CVE-2025-9974 - High (8.8)

The unified WEBUI application of the ONT/Beacon device contains an input handling flaw that allows authenticated users to trigger unintended system-level command execution. Due to insufficient validation of user-supplied data, a low-privileged aut...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-14914
(7.6 HIGH)

EPSS: 0.04%

updated 2026-02-03T16:44:36.630000

1 posts

IBM WebSphere Application Server Liberty 17.0.0.3 through 26.0.0.1 could allow a privileged user to upload a zip archive containing path traversal sequences resulting in an overwrite of files leading to arbitrary code execution.

thehackerwire@mastodon.social at 2026-02-02T17:00:02.000Z ##

🟠 CVE-2025-14914 - High (7.6)

IBM WebSphere Application Server Liberty 17.0.0.3 through 26.0.0.1 could allow a privileged user to upload a zip archive containing path traversal sequences resulting in an overwrite of files leading to arbitrary code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-47398
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-03T16:44:36.630000

1 posts

Memory Corruption while deallocating graphics processing unit memory buffers due to improper handling of memory pointers.

thehackerwire@mastodon.social at 2026-02-02T16:18:29.000Z ##

🟠 CVE-2025-47398 - High (7.8)

Memory Corruption while deallocating graphics processing unit memory buffers due to improper handling of memory pointers.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1117
(8.2 HIGH)

EPSS: 0.03%

updated 2026-02-03T16:44:36.630000

1 posts

A vulnerability in the `lollms_generation_events.py` component of parisneo/lollms version 5.9.0 allows unauthenticated access to sensitive Socket.IO events. The `add_events` function registers event handlers such as `generate_text`, `cancel_generation`, `generate_msg`, and `generate_msg_from` without implementing authentication or authorization checks. This allows unauthenticated clients to execut

thehackerwire@mastodon.social at 2026-02-02T10:18:28.000Z ##

🟠 CVE-2026-1117 - High (8.2)

A vulnerability in the `lollms_generation_events.py` component of parisneo/lollms version 5.9.0 allows unauthenticated access to sensitive Socket.IO events. The `add_events` function registers event handlers such as `generate_text`, `cancel_genera...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24788
(8.8 HIGH)

EPSS: 0.23%

updated 2026-02-03T16:44:36.630000

1 posts

RaspAP raspap-webgui versions prior to 3.3.6 contain an OS command injection vulnerability. If exploited, an arbitrary OS command may be executed by a user who can log in to the product.

thehackerwire@mastodon.social at 2026-02-02T05:24:34.000Z ##

🟠 CVE-2026-24788 - High (8.8)

RaspAP raspap-webgui versions prior to 3.3.6 contain an OS command injection vulnerability. If exploited, an arbitrary OS command may be executed by a user who can log in to the product.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-6397
(8.6 HIGH)

EPSS: 0.04%

updated 2026-02-03T16:44:03.343000

1 posts

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Ankara Hosting Website Design Website Software allows Reflected XSS.This issue affects Website Software: through 03022026.  NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

thehackerwire@mastodon.social at 2026-02-03T13:17:54.000Z ##

🟠 CVE-2025-6397 - High (8.6)

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Ankara Hosting Website Design Website Software allows Reflected XSS.This issue affects Website Software: through 03022026. 

NOTE: The ve...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-67848
(8.1 HIGH)

EPSS: 0.02%

updated 2026-02-03T16:44:03.343000

1 posts

A flaw was found in Moodle. This authentication bypass vulnerability allows suspended users to authenticate through the Learning Tools Interoperability (LTI) Provider. The issue arises from the LTI authentication handlers failing to enforce the user's suspension status, enabling unauthorized access to the system. This can lead to information disclosure or other unauthorized actions by users who sh

thehackerwire@mastodon.social at 2026-02-03T11:22:54.000Z ##

🟠 CVE-2025-67848 - High (8.1)

A flaw was found in Moodle. This authentication bypass vulnerability allows suspended users to authenticate through the Learning Tools Interoperability (LTI) Provider. The issue arises from the LTI authentication handlers failing to enforce the us...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1375
(8.1 HIGH)

EPSS: 0.04%

updated 2026-02-03T16:44:03.343000

1 posts

The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to Insecure Direct Object References (IDOR) in all versions up to, and including, 3.9.5. This is due to missing object-level authorization checks in the `course_list_bulk_action()`, `bulk_delete_course()`, and `update_course_status()` functions. This makes it possible for authenticated attackers, with Tutor Ins

thehackerwire@mastodon.social at 2026-02-03T08:22:04.000Z ##

🟠 CVE-2026-1375 - High (8.1)

The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to Insecure Direct Object References (IDOR) in all versions up to, and including, 3.9.5. This is due to missing object-level authorization checks in the `cou...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1730
(8.8 HIGH)

EPSS: 0.22%

updated 2026-02-03T16:44:03.343000

1 posts

The OS DataHub Maps plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the 'OS_DataHub_Maps_Admin::add_file_and_ext' function in all versions up to, and including, 1.8.3. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code executi

thehackerwire@mastodon.social at 2026-02-03T08:17:43.000Z ##

🟠 CVE-2026-1730 - High (8.8)

The OS DataHub Maps plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the 'OS_DataHub_Maps_Admin::add_file_and_ext' function in all versions up to, and including, 1.8.3. This makes it possible fo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24694
(7.8 HIGH)

EPSS: 0.02%

updated 2026-02-03T16:44:03.343000

1 posts

The installer for Roland Cloud Manager ver.3.1.19 and prior insecurely loads Dynamic Link Libraries (DLLs), which could allow an attacker to execute arbitrary code with the privileges of the application.

thehackerwire@mastodon.social at 2026-02-03T06:16:31.000Z ##

🟠 CVE-2026-24694 - High (7.8)

The installer for Roland Cloud Manager ver.3.1.19 and prior insecurely loads Dynamic Link Libraries (DLLs), which could allow an attacker to execute arbitrary code with the privileges of the application.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24763
(8.8 HIGH)

EPSS: 0.07%

updated 2026-02-03T16:44:03.343000

2 posts

OpenClaw (formerly Clawdbot) is a personal AI assistant you run on your own devices. Prior to 2026.1.29, a command injection vulnerability existed in OpenClaw’s Docker sandbox execution mechanism due to unsafe handling of the PATH environment variable when constructing shell commands. An authenticated user able to control environment variables could influence command execution within the containe

thehackerwire@mastodon.social at 2026-02-02T23:20:59.000Z ##

🟠 CVE-2026-24763 - High (8.8)

OpenClaw (formerly Clawdbot) is a personal AI assistant you run on your own devices. Prior to 2026.1.29, a command injection vulnerability existed in OpenClaw’s Docker sandbox execution mechanism due to unsafe handling of the PATH environment v...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T23:19:35.000Z ##

🟠 CVE-2026-24763 - High (8.8)

OpenClaw (formerly Clawdbot) is a personal AI assistant you run on your own devices. Prior to 2026.1.29, a command injection vulnerability existed in OpenClaw’s Docker sandbox execution mechanism due to unsafe handling of the PATH environment v...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23515
(9.9 CRITICAL)

EPSS: 0.91%

updated 2026-02-03T16:44:03.343000

1 posts

Signal K Server is a server application that runs on a central hub in a boat. Prior to 1.5.0, a command injection vulnerability allows authenticated users with write permissions to execute arbitrary shell commands on the Signal K server when the set-system-time plugin is enabled. Unauthenticated users can also exploit this vulnerability if security is disabled on the Signal K server. This occurs d

thehackerwire@mastodon.social at 2026-02-02T23:19:55.000Z ##

🔴 CVE-2026-23515 - Critical (9.9)

Signal K Server is a server application that runs on a central hub in a boat. Prior to 1.5.0, a command injection vulnerability allows authenticated users with write permissions to execute arbitrary shell commands on the Signal K server when the s...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25142
(10.0 CRITICAL)

EPSS: 0.10%

updated 2026-02-03T16:44:03.343000

1 posts

SandboxJS is a JavaScript sandboxing library. Prior to 0.8.27, SanboxJS does not properly restrict __lookupGetter__ which can be used to obtain prototypes, which can be used for escaping the sandbox / remote code execution. This vulnerability is fixed in 0.8.27.

thehackerwire@mastodon.social at 2026-02-02T23:18:39.000Z ##

🔴 CVE-2026-25142 - Critical (10)

SandboxJS is a JavaScript sandboxing library. Prior to 0.8.27, SanboxJS does not properly restrict __lookupGetter__ which can be used to obtain prototypes, which can be used for escaping the sandbox / remote code execution. This vulnerability is f...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25060
(8.1 HIGH)

EPSS: 0.01%

updated 2026-02-03T16:13:27

1 posts

### Summary The application disables TLS certificate verification by default for all outgoing storage driver communications, making the system vulnerable to Man-in-the-Middle (MitM) attacks. This enables the complete decryption, theft, and manipulation of all data transmitted during storage operations, severely compromising the confidentiality and integrity of user data. ### Details Certificate v

thehackerwire@mastodon.social at 2026-02-02T23:19:46.000Z ##

🟠 CVE-2026-25060 - High (8.1)

OpenList Frontend is a UI component for OpenList. Prior to 4.1.10, certificate verification is disabled by default for all storage driver communications. The TlsInsecureSkipVerify setting is default to true in the DefaultConfig() function in inter...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25059
(8.8 HIGH)

EPSS: 0.02%

updated 2026-02-03T16:13:22

1 posts

### Summary The application contains a Path Traversal vulnerability (CWE-22) in multiple file operation handlers. An authenticated attacker can bypass directory-level authorisation by injecting traversal sequences into filename components, enabling unauthorised file removal and copying across user boundaries within the same storage mount. ### Details The application contains a Path Traversal vuln

thehackerwire@mastodon.social at 2026-02-02T23:19:45.000Z ##

🟠 CVE-2026-25059 - High (8.8)

OpenList Frontend is a UI component for OpenList. Prior to 4.1.10, the application contains path traversal vulnerability in multiple file operation handlers in server/handles/fsmanage.go. Filename components in req.Names are directly concatenated ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24737
(8.1 HIGH)

EPSS: 0.01%

updated 2026-02-03T16:13:02

2 posts

### Impact User control of properties and methods of the Acroform module allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsanitized input to one of the following methods or properties, a user can inject arbitrary PDF objects, such as JavaScript actions, which are executed when the victim opens the document. The vulnerable API members ar

thehackerwire@mastodon.social at 2026-02-02T23:20:49.000Z ##

🟠 CVE-2026-24737 - High (8.1)

jsPDF is a library to generate PDFs in JavaScript. Prior to 4.1.0, user control of properties and methods of the Acroform module allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsanitized...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T23:19:26.000Z ##

🟠 CVE-2026-24737 - High (8.1)

jsPDF is a library to generate PDFs in JavaScript. Prior to 4.1.0, user control of properties and methods of the Acroform module allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsanitized...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23997
(8.0 HIGH)

EPSS: 0.01%

updated 2026-02-03T16:12:22

1 posts

### Summary A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the Observations field. The flaw occurs in the History view, where historical data is rendered without proper HTML entity encoding. This allows an attacker to execute arbitrary JavaScript in the browser of viewing the history by administrators. ### Details When an administrator views the History tab of that specific

thehackerwire@mastodon.social at 2026-02-02T23:20:05.000Z ##

🟠 CVE-2026-23997 - High (8)

FacturaScripts is open-source enterprise resource planning and accounting software. In 2025.71 and earlier, a Stored Cross-Site Scripting (XSS) vulnerability was discovered in the Observations field. The flaw occurs in the History view, where hist...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22778
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-02-03T16:12:13

1 posts

## Summary **A chain of vulnerabilities in vLLM allow Remote Code Execution (RCE):** 1. **Info Leak** - PIL error messages expose memory addresses, bypassing ASLR 2. **Heap Overflow** - JPEG2000 decoder in OpenCV/FFmpeg has a heap overflow that lets us hijack code execution **Result:** Send a malicious video URL to vLLM Completions or Invocations **for a video model** -> Execute arbitrary comma

thehackerwire@mastodon.social at 2026-02-02T23:21:16.000Z ##

🔴 CVE-2026-22778 - Critical (9.8)

vLLM is an inference and serving engine for large language models (LLMs). From 0.8.3 to before 0.14.1, when an invalid image is sent to vLLM's multimodal endpoint, PIL throws an error. vLLM returns this error to the client, leaking a heap address....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25022
(8.5 HIGH)

EPSS: 0.03%

updated 2026-02-03T15:30:38

1 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Iqonic Design KiviCare kivicare-clinic-management-system allows Blind SQL Injection.This issue affects KiviCare: from n/a through <= 3.6.16.

thehackerwire@mastodon.social at 2026-02-03T15:19:27.000Z ##

🟠 CVE-2026-25022 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Iqonic Design KiviCare kivicare-clinic-management-system allows Blind SQL Injection.This issue affects KiviCare: from n/a through &lt;= 3.6.16.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-7760
(7.6 HIGH)

EPSS: 0.01%

updated 2026-02-03T15:30:33

1 posts

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Ofisimo Web-Based Software Technologies Association Web Package Flora allows XSS Through HTTP Headers.This issue affects Association Web Package Flora: from v3.0 through 03022026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

thehackerwire@mastodon.social at 2026-02-03T13:17:44.000Z ##

🟠 CVE-2025-7760 - High (7.6)

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Ofisimo Web-Based Software Technologies Association Web Package Flora allows XSS Through HTTP Headers.This issue affects Association Web P...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-8461
(7.6 HIGH)

EPSS: 0.03%

updated 2026-02-03T09:30:34

1 posts

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Seres Software syWEB allows Reflected XSS.This issue affects syWEB: through 03022026.  NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

thehackerwire@mastodon.social at 2026-02-03T10:00:01.000Z ##

🟠 CVE-2025-8461 - High (7.6)

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Seres Software syWEB allows Reflected XSS.This issue affects syWEB: through 03022026. 

NOTE: The vendor was contacted early about this d...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24465
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-02-03T09:30:34

1 posts

Stack-based buffer overflow vulnerability exists in ELECOM wireless LAN access point devices. A crafted packet may lead to arbitrary code execution.

thehackerwire@mastodon.social at 2026-02-03T07:18:50.000Z ##

🔴 CVE-2026-24465 - Critical (9.8)

Stack-based buffer overflow vulnerability exists in ELECOM wireless LAN access point devices. A crafted packet may lead to arbitrary code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-8456
(7.6 HIGH)

EPSS: 0.03%

updated 2026-02-03T09:30:28

1 posts

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Kod8 Software Technologies Trade Ltd. Co. Kod8 Individual and SME Website allows Reflected XSS.This issue affects Kod8 Individual and SME Website: through 03022026.  NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

thehackerwire@mastodon.social at 2026-02-03T09:59:50.000Z ##

🟠 CVE-2025-8456 - High (7.6)

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Kod8 Software Technologies Trade Ltd. Co. Kod8 Individual and SME Website allows Reflected XSS.This issue affects Kod8 Individual and SME ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-8590
(7.5 HIGH)

EPSS: 0.03%

updated 2026-02-03T09:30:28

1 posts

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in AKCE Software Technology R&D Industry and Trade Inc. SKSPro allows Directory Indexing.This issue affects SKSPro: through 07012026.

thehackerwire@mastodon.social at 2026-02-03T08:18:02.000Z ##

🟠 CVE-2025-8590 - High (7.5)

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in AKCE Software Technology R&D Industry and Trade Inc. SKSPro allows Directory Indexing.This issue affects SKSPro: through 07012026.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-8589
(7.6 HIGH)

EPSS: 0.03%

updated 2026-02-03T09:30:28

1 posts

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in AKCE Software Technology R&D Industry and Trade Inc. SKSPro allows Reflected XSS.This issue affects SKSPro: through 07012026.

thehackerwire@mastodon.social at 2026-02-03T08:17:53.000Z ##

🟠 CVE-2025-8589 - High (7.6)

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in AKCE Software Technology R&D Industry and Trade Inc. SKSPro allows Reflected XSS.This issue affects SKSPro: through 07012026.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20407
(8.8 HIGH)

EPSS: 0.01%

updated 2026-02-03T00:31:23

1 posts

In wlan STA driver, there is a possible escalation of privilege due to a missing bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00464377; Issue ID: MSV-4905.

thehackerwire@mastodon.social at 2026-02-02T23:29:44.000Z ##

🟠 CVE-2026-20407 - High (8.8)

In wlan STA driver, there is a possible escalation of privilege due to a missing bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20420
(7.5 HIGH)

EPSS: 0.21%

updated 2026-02-03T00:31:23

1 posts

In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01738313; Issue ID: MSV-5935.

thehackerwire@mastodon.social at 2026-02-02T23:21:36.000Z ##

🟠 CVE-2026-20420 - High (7.5)

In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20403
(7.5 HIGH)

EPSS: 0.21%

updated 2026-02-03T00:31:22

1 posts

In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01689254 (Note: For N15 and NR16) / MOLY01689259 (Note: For NR17 and NR17R); Issue ID: MSV-4843.

thehackerwire@mastodon.social at 2026-02-03T00:09:34.000Z ##

🟠 CVE-2026-20403 - High (7.5)

In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20409
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-03T00:31:22

1 posts

In imgsys, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10363246; Issue ID: MSV-5779.

thehackerwire@mastodon.social at 2026-02-02T23:52:33.000Z ##

🟠 CVE-2026-20409 - High (7.8)

In imgsys, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Pat...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20405
(7.5 HIGH)

EPSS: 0.21%

updated 2026-02-03T00:31:22

1 posts

In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01688495; Issue ID: MSV-4818.

thehackerwire@mastodon.social at 2026-02-02T23:29:25.000Z ##

🟠 CVE-2026-20405 - High (7.5)

In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20422
(7.5 HIGH)

EPSS: 0.21%

updated 2026-02-03T00:30:18

1 posts

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00827332; Issue ID: MSV-5919.

thehackerwire@mastodon.social at 2026-02-02T23:28:59.000Z ##

🟠 CVE-2026-20422 - High (7.5)

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. Use...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25253
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-02T23:41:06

3 posts

## Summary The Control UI trusts `gatewayUrl` from the query string without validation and auto-connects on load, sending the stored gateway token in the WebSocket connect payload. Clicking a crafted link or visiting a malicious site can send the token to an attacker-controlled server. The attacker can then connect to the victim's local gateway, modify config (sandbox, tool policies), and invoke

2 repos

https://github.com/ethiack/moltbot-1click-rce

https://github.com/adibirzu/openclaw-security-monitor

benzogaga33@mamot.fr at 2026-02-03T16:40:03.000Z ##

OpenClaw – CVE-2026-25253 : un lien malveillant suffit à exécuter du code à distance en 1-clic it-connect.fr/openclaw-cve-202 #ActuCybersécurité #Cybersécurité #IA

##

hackerworkspace@infosec.exchange at 2026-02-02T21:27:57.000Z ##

depthfirst | 1-Click RCE To Steal Your Moltbot Data and Keys (CVE-2026-25253)

depthfirst.com/post/1-click-rc

#databreach #vulnerability #exploit #openclaw #moltbot

##

youranonnewsirc@nerdculture.de at 2026-02-02T19:45:30.000Z ##

Here's a summary of the latest global, technology, and cybersecurity news from the last 24-48 hours:

**Global:** US-Iran talks on a nuclear deal are progressing, though Iran warned of regional war if attacked (Feb 1-2). A Russian drone strike killed 15 mineworkers in Dnipro, Ukraine (Feb 1).

**Tech/Cybersecurity:** ETSI launched a new, globally applicable cybersecurity standard for AI models (ETSI EN 304 223, Feb 2). A critical remote code execution (RCE) flaw in the OpenClaw AI assistant (CVE-2026-25253) was disclosed (Feb 2). AI-driven cyber threats are escalating, and Microsoft's extensive AI infrastructure spending is raising Wall Street concerns (Jan 30 - Feb 2).

#News #Anonymous #AnonNews_irc

##

CVE-2026-0599
(7.5 HIGH)

EPSS: 0.08%

updated 2026-02-02T22:07:42

1 posts

A vulnerability in huggingface/text-generation-inference version 3.3.6 allows unauthenticated remote attackers to exploit unbounded external image fetching during input validation in VLM mode. The issue arises when the router scans inputs for Markdown image links and performs a blocking HTTP GET request, reading the entire response body into memory and cloning it before decoding. This behavior can

thehackerwire@mastodon.social at 2026-02-02T11:19:30.000Z ##

🟠 CVE-2026-0599 - High (7.5)

A vulnerability in huggingface/text-generation-inference version 3.3.6 allows unauthenticated remote attackers to exploit unbounded external image fetching during input validation in VLM mode. The issue arises when the router scans inputs for Mark...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20411
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-02T21:31:27

1 posts

In cameraisp, there is a possible escalation of privilege due to use after free. This could lead to local denial of service if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10351676; Issue ID: MSV-5737.

thehackerwire@mastodon.social at 2026-02-02T19:18:53.000Z ##

🟠 CVE-2026-20411 - High (7.8)

In cameraisp, there is a possible escalation of privilege due to use after free. This could lead to local denial of service if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20412
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-02T18:32:35

1 posts

In cameraisp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10351676; Issue ID: MSV-5733.

thehackerwire@mastodon.social at 2026-02-02T18:18:27.000Z ##

🟠 CVE-2026-20412 - High (7.8)

In cameraisp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24070
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-02T18:32:35

1 posts

During the installation of the Native Access application, a privileged helper `com.native-instruments.NativeAccess.Helper2`, which is used by Native Access to trigger functions via XPC communication like copy-file, remove or set-permissions, is deployed as well. The communication with the XPC service of the privileged helper is only allowed if the client process is signed with the corresponding ce

thehackerwire@mastodon.social at 2026-02-02T18:18:18.000Z ##

🟠 CVE-2026-24070 - High (8.8)

During the installation of the Native Access application, a privileged helper `com.native-instruments.NativeAccess.Helper2`, which is used by Native Access to trigger functions via XPC communication like copy-file, remove or set-permissions, is de...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-15030
(9.8 CRITICAL)

EPSS: 0.01%

updated 2026-02-02T18:32:35

1 posts

The User Profile Builder WordPress plugin before 3.15.2 does not have a proper password reset process, allowing a few unauthenticated requests to reset the password of any user by knowing their username, such as administrator ones, and therefore gain access to their account

thehackerwire@mastodon.social at 2026-02-02T17:14:56.000Z ##

🔴 CVE-2025-15030 - Critical (9.8)

The User Profile Builder WordPress plugin before 3.15.2 does not have a proper password reset process, allowing a few unauthenticated requests to reset the password of any user by knowing their username, such as administrator ones, and therefore ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-47359
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-02T18:31:39

1 posts

Memory Corruption when multiple threads simultaneously access a memory free API.

thehackerwire@mastodon.social at 2026-02-02T16:59:53.000Z ##

🟠 CVE-2025-47359 - High (7.8)

Memory Corruption when multiple threads simultaneously access a memory free API.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-47358
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-02T18:31:39

1 posts

Memory Corruption when user space address is modified and passed to mem_free API, causing kernel memory to be freed inadvertently.

thehackerwire@mastodon.social at 2026-02-02T16:59:42.000Z ##

🟠 CVE-2025-47358 - High (7.8)

Memory Corruption when user space address is modified and passed to mem_free API, causing kernel memory to be freed inadvertently.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-47399
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-02T18:31:39

1 posts

Memory Corruption while processing IOCTL call to update sensor property settings with invalid input parameters.

thehackerwire@mastodon.social at 2026-02-02T16:18:38.000Z ##

🟠 CVE-2025-47399 - High (7.8)

Memory Corruption while processing IOCTL call to update sensor property settings with invalid input parameters.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-47397
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-02T18:31:39

1 posts

Memory Corruption when initiating GPU memory mapping using scatter-gather lists due to unchecked IOMMU mapping errors.

thehackerwire@mastodon.social at 2026-02-02T16:18:21.000Z ##

🟠 CVE-2025-47397 - High (7.8)

Memory Corruption when initiating GPU memory mapping using scatter-gather lists due to unchecked IOMMU mapping errors.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20418
(8.8 HIGH)

EPSS: 0.12%

updated 2026-02-02T15:30:34

2 posts

In Thread, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00465153; Issue ID: MSV-4927.

thehackerwire@mastodon.social at 2026-02-02T15:19:26.000Z ##

🟠 CVE-2026-20418 - High (8.8)

In Thread, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR004...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T14:19:13.000Z ##

🟠 CVE-2026-20418 - High (8.8)

In Thread, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR004...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-8587
(8.6 HIGH)

EPSS: 0.01%

updated 2026-02-02T15:30:34

1 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in AKCE Software Technology R&D Industry and Trade Inc. SKSPro allows SQL Injection.This issue affects SKSPro: through 07012026.

thehackerwire@mastodon.social at 2026-02-02T13:17:37.000Z ##

🟠 CVE-2025-8587 - High (8.6)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in AKCE Software Technology R&D Industry and Trade Inc. SKSPro allows SQL Injection.This issue affects SKSPro: through 07012026.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25200
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-02-02T06:30:53

1 posts

A vulnerability in MagicInfo9 Server allows authorized users to upload HTML files without authentication, leading to Stored XSS, which can result in account takeover This issue affects MagicINFO 9 Server: less than 21.1090.1.

thehackerwire@mastodon.social at 2026-02-02T05:23:46.000Z ##

🔴 CVE-2026-25200 - Critical (9.8)

A vulnerability in MagicInfo9 Server allows authorized users to upload HTML files without authentication, leading to Stored XSS, which can result in account takeover

This issue affects MagicINFO 9 Server: less than 21.1090.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25201
(8.8 HIGH)

EPSS: 0.07%

updated 2026-02-02T06:30:53

1 posts

An unauthenticated user can upload arbitrary files to execute remote code, leading to privilege escalation in MagicInfo9 Server. This issue affects MagicINFO 9 Server: less than 21.1090.1.

thehackerwire@mastodon.social at 2026-02-02T05:23:36.000Z ##

🟠 CVE-2026-25201 - High (8.8)

An unauthenticated user can upload arbitrary files to execute remote code, leading to privilege escalation in MagicInfo9 Server.
This issue affects MagicINFO 9 Server: less than 21.1090.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24061
(9.8 CRITICAL)

EPSS: 29.55%

updated 2026-01-30T13:28:59.293000

2 posts

telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable.

Nuclei template

59 repos

https://github.com/DeadlyHollows/CVE-2026-24061-setup

https://github.com/Mefhika120/Ashwesker-CVE-2026-24061

https://github.com/xuemian168/CVE-2026-24061

https://github.com/Gabs-hub/CVE-2026-24061_Lab

https://github.com/novitahk/Exploit-CVE-2026-24061

https://github.com/balgan/CVE-2026-24061

https://github.com/X-croot/CVE-2026-24061_POC

https://github.com/BrainBob/CVE-2026-24061

https://github.com/Chocapikk/CVE-2026-24061

https://github.com/Alter-N0X/CVE-2026-24061-POC

https://github.com/franckferman/CVE_2026_24061_PoC

https://github.com/androidteacher/CVE-2026-24061-PoC-Telnetd

https://github.com/FurkanKAYAPINAR/CVE-2026-24061-telnet2root

https://github.com/dotelpenguin/telnetd_CVE-2026-24061_tester

https://github.com/LucasPDiniz/CVE-2026-24061

https://github.com/SafeBreach-Labs/CVE-2026-24061

https://github.com/obrunolima1910/CVE-2026-24061

https://github.com/Lingzesec/CVE-2026-24061-GUI

https://github.com/parameciumzhang/Tell-Me-Root

https://github.com/lavabyte/telnet-CVE-2026-24061

https://github.com/punitdarji/telnetd-cve-2026-24061

https://github.com/hilwa24/CVE-2026-24061

https://github.com/cumakurt/tscan

https://github.com/leonjza/inetutils-telnetd-auth-bypass

https://github.com/yanxinwu946/CVE-2026-24061--telnetd

https://github.com/canpilayda/inetutils-telnetd-cve-2026-24061

https://github.com/m3ngx1ng/cve_2026_24061_cli

https://github.com/z3n70/CVE-2026-24061

https://github.com/obrunolima1910/obrunolima1910.github.io

https://github.com/0x7556/CVE-2026-24061

https://github.com/ridpath/Terrminus-CVE-2026-2406

https://github.com/SystemVll/CVE-2026-24061

https://github.com/JayGLXR/CVE-2026-24061-POC

https://github.com/XsanFlip/CVE-2026-24061-Scanner

https://github.com/0xXyc/telnet-inetutils-auth-bypass-CVE-2026-24061

https://github.com/Moxxic1/moxxic1.github.io

https://github.com/Good123321-bot/CVE-2026-24061-POC

https://github.com/Moxxic1/Tell-Me-Root

https://github.com/madfxr/Twenty-Three-Scanner

https://github.com/monstertsl/CVE-2026-24061

https://github.com/MY0723/GNU-Inetutils-telnet-CVE-2026-24061-

https://github.com/TryA9ain/CVE-2026-24061

https://github.com/Good123321-bot/good123321-bot.github.io

https://github.com/hackingyseguridad/root

https://github.com/infat0x/CVE-2026-24061

https://github.com/buzz075/CVE-2026-24061

https://github.com/midox008/CVE-2026-24061

https://github.com/Mr-Zapi/CVE-2026-24061

https://github.com/Ali-brarou/telnest

https://github.com/ibrahmsql/CVE-2026-24061-PoC

https://github.com/SeptembersEND/CVE--2026-24061

https://github.com/ms0x08-dev/CVE-2026-24061-POC

https://github.com/typeconfused/CVE-2026-24061

https://github.com/cyberpoul/CVE-2026-24061-POC

https://github.com/BrainBob/Telnet-TestVuln-CVE-2026-24061

https://github.com/h3athen/CVE-2026-24061

https://github.com/duy-31/CVE-2026-24061---telnetd

https://github.com/Parad0x7e/CVE-2026-24061

https://github.com/r00tuser111/CVE-2026-24061

corgidad@c7.io at 2026-02-04T17:59:39.000Z ##

Whatever your system is you need to patch in the fix for this CVE:

cve.org/CVERecord?id=CVE-2026-

The attack requires no credentials, no prior system access, and no user interaction.

Geez.

##

pentesttools@infosec.exchange at 2026-02-04T15:29:23.000Z ##

🚨 Active exploitation confirmed: CVE-2026-24061.

This isn't just theoretical, it's a massive exposure. With nearly 800,000 Telnet instances exposed globally across legacy IoT and outdated servers, the risk of a root-level compromise is real and immediate.

We have updated Pentest-Tools.com to help you validate your exposure:

📡 Network Scanner - detects exposed Telnet services across your internal and external perimeters, identifying potentially vulnerable GNU Inetutils daemons.

🎯 Sniper Auto-Exploiter - safely executes a proof-of-concept to confirm if the authentication bypass is actually exploitable on your systems, providing the evidence needed to prioritize an immediate fix.

⚠️ Crucial detail: This critical vulnerability exists because telnetd fails to sanitize the USER environment variable. An attacker can simply supply -f root to bypass the login prompt entirely and gain instant, unauthenticated root shell access.

Attacks are happening in real-time. Validate your risk before it becomes a root-level compromise.

#offensivesecurity #ethicalhacking #infosec #cybersecurity

Check out more details about this critical vulnerability: pentest-tools.com/vulnerabilit

Detect with Network Scanner: pentest-tools.com/network-vuln

Validate with Sniper Auto-Exploiter: pentest-tools.com/exploit-help

##

CVE-2026-1281
(9.8 CRITICAL)

EPSS: 16.41%

updated 2026-01-30T00:31:29

5 posts

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

cyberveille@mastobot.ping.moi at 2026-02-05T07:30:07.000Z ##

📢 Ivanti EPMM : deux RCE pré-auth (CVE-2026-1281/1340) activement exploitées — analyse watchTowr
📝 Source: watchTowr Labs publie une analyse technique de...
📖 cyberveille : cyberveille.ch/posts/2026-02-0
🌐 source : labs.watchtowr.com/someone-kno
#Apache_RewriteMap #Bash #Cyberveille

##

cyberveille@mastobot.ping.moi at 2026-02-05T07:30:07.000Z ##

📢 NCSC NL alerte: exploitation active de la zero‑day Ivanti EPMM (CVE‑2026‑1281), assume‑breach requis
📝 Selon le NCSC (Pays-Bas), une mise à jour de son av...
📖 cyberveille : cyberveille.ch/posts/2026-02-0
🌐 source : ncsc.nl/waarschuwing/ncsc-roep
#CVE_2026_1281 #Ivanti_EPMM #Cyberveille

##

sambowne at 2026-02-04T20:47:51.245Z ##

Someone Knows Bash Far Too Well, And We Love It (Ivanti EPMM Pre-Auth RCEs CVE-2026-1281 and CVE-2026-1340) labs.watchtowr.com/someone-kno

##

cyberveille@mastobot.ping.moi at 2026-02-05T07:30:07.000Z ##

📢 NCSC NL alerte: exploitation active de la zero‑day Ivanti EPMM (CVE‑2026‑1281), assume‑breach requis
📝 Selon le NCSC (Pays-Bas), une mise à jour de son av...
📖 cyberveille : cyberveille.ch/posts/2026-02-0
🌐 source : ncsc.nl/waarschuwing/ncsc-roep
#CVE_2026_1281 #Ivanti_EPMM #Cyberveille

##

sambowne@infosec.exchange at 2026-02-04T20:47:51.000Z ##

Someone Knows Bash Far Too Well, And We Love It (Ivanti EPMM Pre-Auth RCEs CVE-2026-1281 and CVE-2026-1340) labs.watchtowr.com/someone-kno

##

CVE-2025-15467
(9.8 CRITICAL)

EPSS: 0.66%

updated 2026-01-29T15:31:31

1 posts

Issue summary: Parsing CMS AuthEnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution. When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 para

4 repos

https://github.com/MAXI8594/CVE-2025-15467_Scan

https://github.com/balgan/CVE-2025-15467

https://github.com/guiimoraes/CVE-2025-15467

https://github.com/mr-r3b00t/CVE-2025-15467

beyondmachines1@infosec.exchange at 2026-02-03T08:01:02.000Z ##

OpenSSL Patches 12 Vulnerabilities Including One Critical RCE

OpenSSL has patched 12 vulnerabilities, including a critical stack buffer overflow (CVE-2025-15467) that allows unauthenticated remote code execution via crafted CMS messages.

**Review your OpenSSL libraries, and start planning a patch. Prioritize 3.x versions since they are exposed to the critical flaw.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-24858
(9.8 CRITICAL)

EPSS: 3.71%

updated 2026-01-28T00:31:41

1 posts

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0.15, FortiManager 7.6.0 through 7.6.5, FortiManager 7.4.0 through 7.4.9, FortiManager 7.2.0 through 7.2.11, FortiManager 7.0.0 through 7.0.15, FortiOS 7.

5 repos

https://github.com/SimoesCTT/SCTT-2026-33-0004-FortiCloud-SSO-Identity-Singularity

https://github.com/absholi7ly/CVE-2026-24858-FortiCloud-SSO-Authentication-Bypass

https://github.com/b1gchoi/CVE-2026-24858

https://github.com/m0d0ri205/CVE-2026-24858

https://github.com/SimoesCTT/-CTT-NSP-Convergent-Time-Theory---Network-Stack-Projection-CVE-2026-24858-

LLMs@activitypub.awakari.com at 2026-02-02T09:04:36.000Z ## Vulnerabilidad crítica de bypass de autenticación en Fortinet FortiCloud SSO El CVE-2026-24858 es una vulnerabilidad de bypass de autenticación (SSO) en múltiples productos de Fortinet. Un atac...

#Seguridad

Origin | Interest | Match ##

undercodenews@mastodon.social at 2026-02-05T12:08:00.000Z ##

Fancy Bear Strikes Fast: How APT28 Exploited CVE-2026-21509 in a Sophisticated European Espionage Campaign

In early 2026, European governments and strategic organizations found themselves targeted by one of the most aggressive cyber-espionage operations of the year. Russian state-sponsored group APT28, also known as Fancy Bear, leveraged a newly disclosed Office vulnerability, CVE-2026-21509, to launch a lightning-fast attack. Within just 24 hours of the flaw’s…

undercodenews.com/fancy-bear-s

##

sambowne at 2026-02-05T00:18:44.913Z ##

APT28’s Stealthy Multi-Stage Campaign Leveraging CVE‑2026‑21509 and Cloud C2 Infrastructure

Attack exploited a 1-day vuln within 24 hours of the patch release
trellix.com/blogs/research/apt

##

sambowne@infosec.exchange at 2026-02-05T00:18:44.000Z ##

APT28’s Stealthy Multi-Stage Campaign Leveraging CVE‑2026‑21509 and Cloud C2 Infrastructure

Attack exploited a 1-day vuln within 24 hours of the patch release
trellix.com/blogs/research/apt

##

AAKL@infosec.exchange at 2026-02-04T16:15:38.000Z ##

New. You'd think it's Tuesday, based on today's prolific output.

Picus: CVE-2026-21509: APT28 Exploits Microsoft Office Zero-day Vulnerability picussecurity.com/resource/blo

Securonix: Analyzing Dead#Vax: Analyzing Multi-Stage VHD Delivery and Self-Parsing Batch Scripts to Deploy In-Memory Shellcode securonix.com/blog/deadvax-thr

Silent Push Identifies More Than 10,000 Infected IPs as Part of SystemBC Botnet Malware Family silentpush.com/blog/systembc/

Sophos: Malicious use of virtual machine infrastructure sophos.com/en-us/blog/maliciou @sophos

Tenable: LookOut: Discovering RCE and Internal Access on Looker (Google Cloud & On-Prem) tenable.com/blog/google-looker @tenable #infosec #Google #Microsoft #threatresearch #zeroday #vulnerability #malware #botnet

##

VirusBulletin@infosec.exchange at 2026-02-04T09:55:13.000Z ##

Robin Dost details how APT28 uses CVE-2026-21509 in practice, relying on crafted RTF files that trigger OLE parsing without macros. The blog post walks through efficient IOC extraction from weaponised documents. blog.synapticsystems.de/apt28-

##

AAKL@infosec.exchange at 2026-02-03T17:20:33.000Z ##

This is from yesterday.

Zscaler: APT28 Leverages CVE-2026-21509 in Operation Neusploit zscaler.com/blogs/security-res #infosec #vulnerability #threatresearch

##

oversecurity@mastodon.social at 2026-02-03T16:40:25.000Z ##

Russian state hackers exploit new Microsoft Office flaw in attacks on Ukraine, EU

Ukraine’s computer emergency response team, CERT-UA, said attackers began abusing the flaw — tracked as CVE-2026-21509 — shortly after Microsoft...

🔗️ [Therecord] link.is.it/ZQMXsZ

##

LLMs@activitypub.awakari.com at 2026-02-03T14:21:18.000Z ## InfoSec News Nuggets 02/03/2026 APT28 Leverages CVE-2026-21509 in Operation Neusploit A ThreatLabz writeup on a campaign attributed to APT28 using weaponized RTF files to exploit CVE-2026-21509 and...

#InfoSec #News #Nuggets #AboutDFIR #fcc #Ivanti #news #nuggets

Origin | Interest | Match ##

campuscodi@mastodon.social at 2026-02-03T14:01:39.000Z ##

RE: mastodon.social/@campuscodi/11

More on this campaign from Zscaler: zscaler.com/blogs/security-res

Other targets also include Romania and Slovakia

##

youranonnewsirc@nerdculture.de at 2026-02-03T13:45:54.000Z ##

Latest News (Feb 2-3, 2026):

Global: India and the US have finalized a trade deal. Pakistani forces killed 145 militants in Balochistan after coordinated attacks.

Tech: SpaceX merged with xAI, announcing plans for space-based AI data centers. Oracle plans a $50B expansion for AI cloud infrastructure.

Cybersecurity: A Russian hacker alliance, "Russian Legion," threatens a major cyberattack on Denmark. Russia-linked APT28 exploits a new Microsoft Office flaw (CVE-2026-21509) in attacks across Ukraine and the EU.

#News #Anonymous #AnonNews_irc

##

VirusBulletin@infosec.exchange at 2026-02-03T13:35:53.000Z ##

Zscaler ThreatLabz reports on Operation Neusploit, a January 2026 campaign targeting Central and Eastern Europe. Weaponised Microsoft RTF files exploit CVE-2026-21509 to deliver multi-stage backdoors. The campaign is attributed to APT28 with high confidence. zscaler.com/blogs/security-res

##

us@newsbeep.org at 2026-02-03T05:20:07.000Z ##

Russian hackers exploit recently patched Microsoft Office bug in attacks

Ukraine’s Computer Emergency Response Team (CERT) says that Russian hackers are exploiting CVE-2026-21509, a recently patched vulnerability in multiple…
#NewsBeep #News #US #USA #UnitedStates #UnitedStatesOfAmerica #Technology
newsbeep.com/us/445936/

##

joho@mastodon.online at 2026-02-03T01:23:40.000Z ##

"Microsoft Office zero-day actively exploited" 🕵️ 🙄

(CVSS 7.8)

hackingpassion.com/office-zero

#cve202621509 #cybersec #cybersecurity #infosec #microsoft #office #microsoftoffice #ole

##

oversecurity@mastodon.social at 2026-02-02T21:10:06.000Z ##

Russian hackers exploit recently patched Microsoft Office bug in attacks

Ukraine's Computer Emergency Response Team (CERT) says that Russian hackers are exploiting CVE-2026-21509, a recently patched vulnerability in...

🔗️ [Bleepingcomputer] link.is.it/iMsHDY

##

CVE-2025-11234
(7.5 HIGH)

EPSS: 0.10%

updated 2026-01-22T21:33:43

1 posts

A flaw was found in QEMU. If the QIOChannelWebsock object is freed while it is waiting to complete a handshake, a GSource is leaked. This can lead to the callback firing later on and triggering a use-after-free in the use of the channel. This can be abused by a malicious client with network access to the VNC WebSocket port to cause a denial of service during the WebSocket handshake prior to the VN

linux@activitypub.awakari.com at 2026-02-04T16:11:58.000Z ## Oracle Linux 10 ELSA-2026-1831 qemu-kvm Moderate DoS CVE-2025-11234 The following updated rpms for Oracle Linux 10 have been uploaded to the Unbreakable Linux Network:

#Oracle #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-9086
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-20T14:58:01.347000

1 posts

1. A cookie is set using the `secure` keyword for `https://target` 2. curl is redirected to or otherwise made to speak with `http://target` (same hostname, but using clear text HTTP) using the same cookie set 3. The same cookie name is set - but with just a slash as path (`path=\"/\",`). Since this site is not secure, the cookie *should* just be ignored. 4. A bug in the path comparison

linux@activitypub.awakari.com at 2026-02-03T14:08:07.000Z ## Oracle Linux 10 curl Moderate Security Update ELSA-2026-1825 CVE-2025-9086 The following updated rpms for Oracle Linux 10 have been uploaded to the Unbreakable Linux Network:

#Oracle #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-68613
(10.0 CRITICAL)

EPSS: 73.86%

updated 2026-01-09T16:53:16

1 posts

### Impact n8n contains a critical Remote Code Execution (RCE) vulnerability in its workflow expression evaluation system. Under certain conditions, expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime. An authenticated attacker could abuse this behavior to execute arbitrary

Nuclei template

30 repos

https://github.com/Khin-96/n8n-cve-2025-68613-thm

https://github.com/nehkark/CVE-2025-68613

https://github.com/hackersatyamrastogi/n8n-exploit-CVE-2025-68613-n8n-God-Mode-Ultimate

https://github.com/sahilccras/Blackash-CVE-2025-68613

https://github.com/intbjw/CVE-2025-68613-poc-via-copilot

https://github.com/manyaigdtuw/CVE-2025-68613_Scanner

https://github.com/gagaltotal/n8n-cve-2025-68613

https://github.com/rxerium/CVE-2025-68613

https://github.com/ahmedshamsddin/n8n-RCE-CVE-2025-68613

https://github.com/secjoker/CVE-2025-68613

https://github.com/ali-py3/Exploit-CVE-2025-68613

https://github.com/GnuTLam/POC-CVE-2025-68613

https://github.com/AbdulRKB/n8n-RCE

https://github.com/Rishi-kaul/n8n-CVE-2025-68613

https://github.com/mbanyamer/n8n-Authenticated-Expression-Injection-RCE-CVE-2025-68613

https://github.com/r4j3sh-com/CVE-2025-68613-n8n-lab

https://github.com/TheStingR/CVE-2025-68613-POC

https://github.com/TheInterception/n8n_CVE-2025-68613_exploit_payloads

https://github.com/J4ck3LSyN-Gen2/n8n-CVE-2025-68613-TryHackMe

https://github.com/JohannesLks/CVE-2025-68613-Python-Exploit

https://github.com/Dlanang/homelab-CVE-2025-68613

https://github.com/shibaaa204/CVE-2025-68613

https://github.com/Ak-cybe/CVE-2025-68613-n8n-rce-analysis

https://github.com/reem-012/poc_CVE-2025-68613

https://github.com/cv-sai-kamesh/n8n-CVE-2025-68613

https://github.com/LingerANR/n8n-CVE-2025-68613

https://github.com/intelligent-ears/CVE-2025-68613

https://github.com/wioui/n8n-CVE-2025-68613-exploit

https://github.com/releaseown/analysis-and-poc-n8n-CVE-2025-68613

https://github.com/Victorhugofariasvieir66/relatorio-n8n.md

undercodenews@mastodon.social at 2026-02-05T06:32:54.000Z ##

Critical RCE Alert: n8n Workflow Automation Hit by Severe Vulnerability Allowing System Takeover

The popular workflow automation platform n8n has been rocked by a critical security flaw that could let attackers execute arbitrary system commands on affected servers. Tracked as CVE-2026-25049 with a high CVSS score of 9.4, the vulnerability stems from insufficient input sanitization—despite previous fixes for CVE-2025-68613, a similar high-severity flaw patched in…

undercodenews.com/critical-rce

##

CVE-2025-61729
(7.5 HIGH)

EPSS: 0.02%

updated 2025-12-03T00:31:35

1 posts

Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.

linux@activitypub.awakari.com at 2026-02-02T09:31:46.000Z ## Oracle Linux 10 ELSA-2026-1715 Important Fix for CVE-2025-61729 The following updated rpms for Oracle Linux 10 have been uploaded to the Unbreakable Linux Network:

#Oracle #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-11953
(9.8 CRITICAL)

EPSS: 0.40%

updated 2025-11-13T16:25:27

5 posts

The Metro Development Server, which is opened by the React Native CLI, binds to external interfaces by default. The server exposes an endpoint that is vulnerable to OS command injection. This allows unauthenticated network attackers to send a POST request to the server and run arbitrary executables. On Windows, the attackers can also execute arbitrary shell commands with fully controlled arguments

4 repos

https://github.com/Mr-In4inci3le/CVE-2025-11953-POC-

https://github.com/N3k0t-dev/PoC-CVE-collection

https://github.com/SaidBenaissa/cve-2025-11953-vulnerability-demo

https://github.com/boroeurnprach/CVE-2025-11953-PoC

cyberveille@mastobot.ping.moi at 2026-02-04T22:00:07.000Z ##

📢 Exploitation active de CVE-2025-11953 (« Metro4Shell ») sur Metro (React Native) observée par VulnCheck
📝 Selon VulnCheck, des exploitations de la vulnérabilité CVE-2025-11953 (« Metro4Shell ») ont été observées dès le 21 décembr...
📖 cyberveille : cyberveille.ch/posts/2026-02-0
🌐 source : vulncheck.com/blog/metro4shell
#CVE_2025_11953 #IOC #Cyberveille

##

beyondmachines1@infosec.exchange at 2026-02-04T13:01:03.000Z ##

Critical React Native Metro Server Bug Under Active Exploitation

Attackers are actively exploiting a critical command injection vulnerability (CVE-2025-11953) in the React Native Metro development server to deploy malware on Windows and Linux systems.

**This is now urgent and important. If you're a React Native developer, update @react-native-community/cli-server-api to version 20.0.0 or higher. Your tools are being actively exploited. If you can't update right away, start your Metro server with the --host 127.0.0.1 flag (like `npx react-native start --host 127.0.0.1`). Make sure to patch all projects on your computer and the globally installed version.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

catc0n@infosec.exchange at 2026-02-03T17:41:54.000Z ##

Our team wrote about in-the-wild exploitation of React Metro Server CVE-2025-11953, which VulnCheck's Canary Intelligence network detected for the first time in December 2025.

vulncheck.com/blog/metro4shell

##

oversecurity@mastodon.social at 2026-02-03T14:50:06.000Z ##

Hackers exploit critical React Native Metro bug to breach dev systems

Hackers are targeting developers by exploiting the critical vulnerability CVE-2025-11953 in the Metro server for React Native to deliver malicious...

🔗️ [Bleepingcomputer] link.is.it/9a1Dng

##

oversecurity@mastodon.social at 2026-02-03T14:20:07.000Z ##

Hackers exploit critical React Native Metro bug to breach dev systems

Hackers are targeting developers by exploiting the critical vulnerability CVE-2025-11953 in the Metro server for React Native to deliver malicious...

🔗️ [Bleepingcomputer] link.is.it/w9Y7HI

##

CVE-2024-10460
(5.3 MEDIUM)

EPSS: 0.42%

updated 2025-11-04T00:31:55

1 posts

The origin of an external protocol handler prompt could have been obscured using a data: URL within an `iframe`. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132.

linux@activitypub.awakari.com at 2026-02-03T02:45:54.000Z ## Ubuntu 22.04 LTS Thunderbird Security Advisory USN-7991-1 CVE-2024-10460 Several security issues were fixed in Thunderbird.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-22224
(9.3 CRITICAL)

EPSS: 57.74%

updated 2025-10-30T19:52:49.873000

2 posts

VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.

jbhall56 at 2026-02-05T13:37:23.352Z ##

Broadcom patched this ESXi arbitrary-write vulnerability (tracked as CVE-2025-22225) almost one year ago, in March 2025, alongside a memory leak (CVE-2025-22226) and a TOCTOU flaw (CVE-2025-22224), and tagged them all as actively exploited zero-days. bleepingcomputer.com/news/secu

##

jbhall56@infosec.exchange at 2026-02-05T13:37:23.000Z ##

Broadcom patched this ESXi arbitrary-write vulnerability (tracked as CVE-2025-22225) almost one year ago, in March 2025, alongside a memory leak (CVE-2025-22226) and a TOCTOU flaw (CVE-2025-22224), and tagged them all as actively exploited zero-days. bleepingcomputer.com/news/secu

##

CVE-2025-22225
(8.2 HIGH)

EPSS: 6.15%

updated 2025-10-30T19:52:45.300000

4 posts

VMware ESXi contains an arbitrary write vulnerability. A malicious actor with privileges within the VMX process may trigger an arbitrary kernel write leading to an escape of the sandbox.

jbhall56 at 2026-02-05T13:37:23.352Z ##

Broadcom patched this ESXi arbitrary-write vulnerability (tracked as CVE-2025-22225) almost one year ago, in March 2025, alongside a memory leak (CVE-2025-22226) and a TOCTOU flaw (CVE-2025-22224), and tagged them all as actively exploited zero-days. bleepingcomputer.com/news/secu

##

undercodenews@mastodon.social at 2026-02-05T04:45:08.000Z ##

CISA Sounds the Alarm: VMware ESXi Zero-Day Actively Exploited in Ransomware Attacks

Introduction: A Critical Threat Hits Virtualized Infrastructure U.S. cybersecurity authorities have issued a stark warning to organizations worldwide after confirming active exploitation of a severe VMware ESXi vulnerability in real-world ransomware attacks. The flaw, tracked as CVE-2025-22225, is no longer theoretical or limited to proof-of-concept exploits—it is now being weaponized…

undercodenews.com/cisa-sounds-

##

defendopsdiaries at 2026-02-04T17:52:28.422Z ##

Ransomware gangs have found a way to break out of virtual machines and take over entire data centers in one move. Here is how a single VMware ESXi flaw is changing the rules of cyberattacks.

thedefendopsdiaries.com/how-ra

##

jbhall56@infosec.exchange at 2026-02-05T13:37:23.000Z ##

Broadcom patched this ESXi arbitrary-write vulnerability (tracked as CVE-2025-22225) almost one year ago, in March 2025, alongside a memory leak (CVE-2025-22226) and a TOCTOU flaw (CVE-2025-22224), and tagged them all as actively exploited zero-days. bleepingcomputer.com/news/secu

##

CVE-2025-22226
(7.1 HIGH)

EPSS: 4.11%

updated 2025-10-30T19:52:41.973000

2 posts

VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability due to an out-of-bounds read in HGFS. A malicious actor with administrative privileges to a virtual machine may be able to exploit this issue to leak memory from the vmx process.

jbhall56 at 2026-02-05T13:37:23.352Z ##

Broadcom patched this ESXi arbitrary-write vulnerability (tracked as CVE-2025-22225) almost one year ago, in March 2025, alongside a memory leak (CVE-2025-22226) and a TOCTOU flaw (CVE-2025-22224), and tagged them all as actively exploited zero-days. bleepingcomputer.com/news/secu

##

jbhall56@infosec.exchange at 2026-02-05T13:37:23.000Z ##

Broadcom patched this ESXi arbitrary-write vulnerability (tracked as CVE-2025-22225) almost one year ago, in March 2025, alongside a memory leak (CVE-2025-22226) and a TOCTOU flaw (CVE-2025-22224), and tagged them all as actively exploited zero-days. bleepingcomputer.com/news/secu

##

CVE-2025-8088
(8.8 HIGH)

EPSS: 4.61%

updated 2025-10-30T15:50:59.680000

4 posts

A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET.

27 repos

https://github.com/ghostn4444/CVE-2025-8088

https://github.com/pexlexity/WinRAR-CVE-2025-8088-Path-Traversal-PoC

https://github.com/pescada-dev/-CVE-2025-8088

https://github.com/AdityaBhatt3010/CVE-2025-8088-WinRAR-Zero-Day-Path-Traversal

https://github.com/nuky-alt/CVE-2025-8088

https://github.com/nhattanhh/CVE-2025-8088

https://github.com/0xAbolfazl/CVE-2025-8088-WinRAR-PathTraversal-PoC

https://github.com/DeepBlue-dot/CVE-2025-8088-WinRAR-Startup-PoC

https://github.com/lucyna77/winrar-exploit

https://github.com/ilhamrzr/RAR-Anomaly-Inspector

https://github.com/kitsuneshade/WinRAR-Exploit-Tool---Rust-Edition

https://github.com/travisbgreen/cve-2025-8088

https://github.com/pentestfunctions/best-CVE-2025-8088

https://github.com/Markusino488/cve-2025-8088

https://github.com/papcaii2004/CVE-2025-8088-WinRAR-builder

https://github.com/sxyrxyy/CVE-2025-8088-WinRAR-Proof-of-Concept-PoC-Exploit-

https://github.com/Shinkirou789/Cve-2025-8088-WinRar-vulnerability

https://github.com/hbesljx/CVE-2025-8088-EXP

https://github.com/pentestfunctions/CVE-2025-8088-Multi-Document

https://github.com/onlytoxi/CVE-2025-8088-Winrar-Tool

https://github.com/jordan922/CVE-2025-8088

https://github.com/Syrins/CVE-2025-8088-Winrar-Tool-Gui

https://github.com/knight0x07/WinRAR-CVE-2025-8088-PoC-RAR

https://github.com/techcorp/CVE-2025-8088-Exploit

https://github.com/xi0onamdev/WinRAR-CVE-2025-8088-Exploitation-Toolkit

https://github.com/walidpyh/CVE-2025-8088

https://github.com/hexsecteam/CVE-2025-8088-Winrar-Tool

hackerworkspace at 2026-02-05T06:26:28.941Z ##

Amaranth-Dragon: Weaponizing CVE-2025-8088 for Targeted Espionage in the Southeast Asia - Check Point Research

research.checkpoint.com/2026/a

##

hackerworkspace@infosec.exchange at 2026-02-05T06:26:28.000Z ##

Amaranth-Dragon: Weaponizing CVE-2025-8088 for Targeted Espionage in the Southeast Asia - Check Point Research

research.checkpoint.com/2026/a

#cybersecurity #vulnerability #espionage

##

AAKL@infosec.exchange at 2026-02-04T15:05:30.000Z ##

New.

Check Point: Amaranth-Dragon: Weaponizing CVE-2025-8088 for Targeted Espionage in the Southeast Asia research.checkpoint.com/2026/a

More:

The Hacker News: China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns thehackernews.com/2026/02/chin #Windows #infosec #vulnerability

##

oversecurity@mastodon.social at 2026-02-04T14:20:08.000Z ##

New Amaranth Dragon cyberespionage group exploits WinRAR flaw

A new threat actor called Amaranth Dragon, linked to APT41 state-sponsored Chinese operations, exploited the CVE-2025-8088 vulnerability in WinRAR...

🔗️ [Bleepingcomputer] link.is.it/vE4Qlj

##

CVE-2025-49825
(9.8 CRITICAL)

EPSS: 12.25%

updated 2025-06-18T13:46:52.973000

3 posts

Teleport provides connectivity, authentication, access controls and audit for infrastructure. Community Edition versions before and including 17.5.1 are vulnerable to remote authentication bypass. At time of posting, there is no available open-source patch.

Nuclei template

sambowne at 2026-02-04T20:41:49.101Z ##

Exploiting CVE-2025-49825 - authentication bypass vulnerability in Teleport blog.offensive.af/posts/exploi

##

sambowne@infosec.exchange at 2026-02-04T20:41:49.000Z ##

Exploiting CVE-2025-49825 - authentication bypass vulnerability in Teleport blog.offensive.af/posts/exploi

##

_r_netsec@infosec.exchange at 2026-02-03T08:28:06.000Z ##

Exploiting CVE-2025-49825 (authentication bypass vulnerability in Teleport) blog.offensive.af/posts/exploi

##

CVE-2025-46724
(9.8 CRITICAL)

EPSS: 0.06%

updated 2025-05-20T20:57:00

1 posts

### Summary `TableChatAgent` uses [pandas eval()](https://github.com/langroid/langroid/blob/main/langroid/agent/special/table_chat_agent.py#L216). If fed by untrusted user input, like the case of a public-facing LLM application, it may be vulnerable to code injection. ### PoC For example, one could prompt the Agent: Evaluate the following pandas expression on the data provided and print outp

EUVD_Bot@mastodon.social at 2026-02-04T22:44:07.000Z ##

🚨 EUVD-2026-5347

📊 Score: 9.4/10 (CVSS v3.1)
📦 Product: langroid
🏢 Vendor: langroid
📅 Updated: 2026-02-04

📝 Langroid is a framework for building large-language-model-powered applications. Prior to version 0.59.32, there is a bypass to the fix for CVE-2025-46724. TableChatAgent can call pandas_eval tool to evaluate the expression. There is a WAF in langroid/utils/p...

🔗 euvd.enisa.europa.eu/vulnerabi

#cybersecurity #infosec #euvd #cve #vulnerability

##

CVE-2023-38346
(8.8 HIGH)

EPSS: 1.23%

updated 2024-04-04T07:48:27

1 posts

An issue was discovered in Wind River VxWorks 6.9 and 7. The function ``tarExtract`` implements TAR file extraction and thereby also processes files within an archive that have relative or absolute file paths. A developer using the "tarExtract" function may expect that the function will strip leading slashes from absolute paths or stop processing when encountering relative paths that are outside o

floyd@chaos.social at 2026-02-02T20:51:00.000Z ##

RE: mastodon.social/@bagder/116001

My CVEs are still at 0 medals, but thanks to VxWorks I was able to achieve a CVE on Mars (#Curiosity rover, CVE-2023-38346) 😉

Btw. if anyone from #NASA could confirm curiosity was/is really affected (but probably without attack vector so no impact I guess), that would mean a lot to me

##

CVE-2019-15006(CVSS UNKNOWN)

EPSS: 2.18%

updated 2023-01-29T05:00:49

1 posts

There was a man-in-the-middle (MITM) vulnerability present in the Confluence Previews plugin in Confluence Server and Confluence Data Center. This plugin was used to facilitate communication with the Atlassian Companion application. The Confluence Previews plugin in Confluence Server and Confluence Data Center communicated with the Companion application via the atlassian-domain-for-localhost-conne

FritzAdalis@infosec.exchange at 2026-02-02T17:51:29.000Z ##

@rk @hrbrmstr
Are you forgetting CVE-2019-15006 by Taylor Swift on Security?

##

CVE-2026-25585
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-02-05T00:23:08.000Z ##

🟠 CVE-2026-25585 - High (7.8)

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.3, there is a vulnerability IccCmm.cpp:5793 when reading through index during ICC p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-05T00:23:08.000Z ##

🟠 CVE-2026-25585 - High (7.8)

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.3, there is a vulnerability IccCmm.cpp:5793 when reading through index during ICC p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25584
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-02-04T22:17:04.000Z ##

🟠 CVE-2026-25584 - High (7.8)

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.3, there is a stack-buffer-overflow vulnerability in CIccTagFloatNum::GetValues(). ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T22:17:04.000Z ##

🟠 CVE-2026-25584 - High (7.8)

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.3, there is a stack-buffer-overflow vulnerability in CIccTagFloatNum::GetValues(). ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25582
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-02-04T22:16:43.000Z ##

🟠 CVE-2026-25582 - High (7.8)

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.3, there is a heap buffer overflow (read) vulnerability in CIccIO::WriteUInt16Float...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T22:16:43.000Z ##

🟠 CVE-2026-25582 - High (7.8)

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.3, there is a heap buffer overflow (read) vulnerability in CIccIO::WriteUInt16Float...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25519
(0 None)

EPSS: 0.00%

4 posts

N/A

thehackerwire@mastodon.social at 2026-02-04T21:23:32.000Z ##

🟠 CVE-2026-25519 - High (8.1)

OpenSlides is a free, web based presentation and assembly system for managing and projecting agenda, motions and elections of an assembly. Prior to version 4.2.29, OpenSlides supports local logins with username and password or an optionally config...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T21:16:37.000Z ##

🟠 CVE-2026-25519 - High (8.1)

OpenSlides is a free, web based presentation and assembly system for managing and projecting agenda, motions and elections of an assembly. Prior to version 4.2.29, OpenSlides supports local logins with username and password or an optionally config...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T21:23:32.000Z ##

🟠 CVE-2026-25519 - High (8.1)

OpenSlides is a free, web based presentation and assembly system for managing and projecting agenda, motions and elections of an assembly. Prior to version 4.2.29, OpenSlides supports local logins with username and password or an optionally config...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T21:16:37.000Z ##

🟠 CVE-2026-25519 - High (8.1)

OpenSlides is a free, web based presentation and assembly system for managing and projecting agenda, motions and elections of an assembly. Prior to version 4.2.29, OpenSlides supports local logins with username and password or an optionally config...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-67987
(0 None)

EPSS: 0.00%

1 posts

N/A

beyondmachines1@infosec.exchange at 2026-02-04T11:01:02.000Z ##

SQL Injection Vulnerability Reported in Quiz and Survey Master WordPress Plugin

A SQL injection vulnerability (CVE-2025-67987) in the Quiz and Survey Master WordPress plugin affects over 40,000 sites, allowing authenticated users with Subscriber-level access to extract sensitive database information.

**If you are using the Quiz and Survey Master plugin, plan a quick update to version 10.3.2. Even low-level user accounts can exploit this flaw, so do not assume your site is safe just because you trust your registered users.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

DarkWebInformer@infosec.exchange at 2026-02-03T19:40:05.000Z ##

‼️ CISA has added 4 vulnerabilities to the KEV Catalog

darkwebinformer.com/cisa-kev-c

CVE-2025-40551: SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability

CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability

CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability

CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability

##

AAKL@infosec.exchange at 2026-02-03T16:25:06.000Z ##

CISA has updated the KEV catalogue.

- CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability cve.org/CVERecord?id=CVE-2019-

- CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability cve.org/CVERecord?id=CVE-2021- #CISA #infosec #GitLab #vulnerability

##

cisakevtracker@mastodon.social at 2026-02-03T16:01:25.000Z ##

CVE ID: CVE-2025-64328
Vendor: Sangoma
Product: FreePBX
Date Added: 2026-02-03
Notes: github.com/FreePBX/security-re ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-24665
(0 None)

EPSS: 0.03%

2 posts

N/A

thehackerwire@mastodon.social at 2026-02-03T18:24:20.000Z ##

🟠 CVE-2026-24665 - High (8.7)

The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, a stored Cross-Site Scripting (XSS) vulnerability allows authenticated students to inject malicious JavaScript into uploaded as...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T18:21:42.000Z ##

🟠 CVE-2026-24665 - High (8.7)

The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, a stored Cross-Site Scripting (XSS) vulnerability allows authenticated students to inject malicious JavaScript into uploaded as...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24669
(0 None)

EPSS: 0.01%

2 posts

N/A

thehackerwire@mastodon.social at 2026-02-03T18:24:10.000Z ##

🟠 CVE-2026-24669 - High (7.8)

The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, an insecure password reset mechanism allows local attackers to reuse a valid password reset token after it has already been use...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T18:21:33.000Z ##

🟠 CVE-2026-24669 - High (7.8)

The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, an insecure password reset mechanism allows local attackers to reuse a valid password reset token after it has already been use...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-66480
(0 None)

EPSS: 0.43%

1 posts

N/A

thehackerwire@mastodon.social at 2026-02-02T23:21:26.000Z ##

🔴 CVE-2025-66480 - Critical (9.8)

Wildfire IM is an instant messaging and real-time audio/video solution. Prior to 1.4.3, a critical vulnerability exists in the im-server component related to the file upload functionality found in com.xiaoleilu.loServer.action.UploadFileAction. Th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25137
(0 None)

EPSS: 0.03%

1 posts

N/A

thehackerwire@mastodon.social at 2026-02-02T23:18:29.000Z ##

🔴 CVE-2026-25137 - Critical (9.1)

The NixOs Odoo package is an open source ERP and CRM system. From 21.11 to before 25.11 and 26.05, every NixOS based Odoo setup publicly exposes the database manager without any authentication. This allows unauthorized actors to delete and downloa...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

Visit counter For Websites