##
Updated at UTC 2026-02-09T20:15:43.535266
| CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
|---|---|---|---|---|---|---|---|
| CVE-2025-69620 | 5.0 | 0.01% | 1 | 0 | 2026-02-09T18:16:05.267000 | A path traversal in Moo Chan Song v4.5.7 allows attackers to cause a Denial of S | |
| CVE-2025-69619 | 5.0 | 0.05% | 1 | 0 | 2026-02-09T18:16:05.077000 | A path traversal in My Text Editor v1.6.2 allows attackers to cause a Denial of | |
| CVE-2026-1731 | 0 | 0.44% | 8 | 0 | 2026-02-09T16:08:55.263000 | BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote | |
| CVE-2026-25803 | 9.8 | 0.04% | 2 | 0 | 2026-02-09T16:08:55.263000 | 3DP-MANAGER is an inbound generator for 3x-ui. In version 2.0.1 and prior, the a | |
| CVE-2026-25644 | 7.5 | 0.03% | 1 | 1 | 2026-02-09T16:08:55.263000 | DataHub is an open-source metadata platform. Prior to version 1.3.1.8, the LDAP | |
| CVE-2026-25732 | 7.5 | 0.12% | 1 | 1 | 2026-02-09T16:08:55.263000 | NiceGUI is a Python-based UI framework. Prior to 3.7.0, NiceGUI's FileUpload.nam | |
| CVE-2025-59023 | 8.2 | 0.00% | 2 | 1 | 2026-02-09T16:08:35.290000 | Crafted delegations or IP fragments can poison cached delegations in Recursor. | |
| CVE-2025-10465 | 8.8 | 0.00% | 2 | 0 | 2026-02-09T16:08:35.290000 | Unrestricted Upload of File with Dangerous Type vulnerability in Birtech Informa | |
| CVE-2026-25848 | 9.1 | 0.00% | 2 | 1 | 2026-02-09T16:08:35.290000 | In JetBrains Hub before 2025.3.119807 authentication bypass allowing administrat | |
| CVE-2026-2236 | 7.5 | 0.05% | 6 | 0 | 2026-02-09T16:08:35.290000 | C&Cm@il developed by HGiga has a SQL Injection vulnerability, allowing unauthen | |
| CVE-2026-1615 | 9.8 | 0.22% | 3 | 0 | 2026-02-09T16:08:35.290000 | All versions of the package jsonpath are vulnerable to Arbitrary Code Injection | |
| CVE-2026-2210 | 7.2 | 0.20% | 1 | 1 | 2026-02-09T16:08:35.290000 | A vulnerability has been found in D-Link DIR-823X 250416. This affects the funct | |
| CVE-2026-2186 | 8.8 | 0.05% | 2 | 1 | 2026-02-09T16:08:35.290000 | A vulnerability has been found in Tenda RX3 16.03.13.11. Impacted is the functio | |
| CVE-2026-2181 | 8.8 | 0.05% | 2 | 0 | 2026-02-09T16:08:35.290000 | A security flaw has been discovered in Tenda RX3 16.03.13.11. Affected by this v | |
| CVE-2026-2155 | 7.2 | 0.20% | 1 | 1 | 2026-02-09T16:08:35.290000 | A security flaw has been discovered in D-Link DIR-823X 250416. The affected elem | |
| CVE-2026-2143 | 7.2 | 0.19% | 2 | 2 | 2026-02-09T16:08:35.290000 | A security vulnerability has been detected in D-Link DIR-823X 250416. This issue | |
| CVE-2026-2139 | 8.8 | 0.09% | 2 | 0 | 2026-02-09T16:08:35.290000 | A vulnerability was determined in Tenda TX9 up to 22.03.02.10_multi. Affected by | |
| CVE-2026-2138 | 8.8 | 0.09% | 2 | 1 | 2026-02-09T16:08:35.290000 | A vulnerability was found in Tenda TX9 up to 22.03.02.10_multi. Affected is the | |
| CVE-2026-25857 | 0 | 0.15% | 1 | 1 | 2026-02-09T16:08:35.290000 | Tenda G300-F router firmware versio 16.01.14.2 and prior contain an OS command i | |
| CVE-2026-2120 | 7.2 | 0.19% | 1 | 0 | 2026-02-09T16:08:35.290000 | A vulnerability was identified in D-Link DIR-823X 250416. This affects an unknow | |
| CVE-2026-25722 | 9.1 | 0.10% | 2 | 0 | 2026-02-09T14:51:42.203000 | Claude Code is an agentic coding tool. Prior to version 2.0.57, Claude Code fail | |
| CVE-2026-25724 | 7.5 | 0.04% | 2 | 1 | 2026-02-09T14:47:41.783000 | Claude Code is an agentic coding tool. Prior to version 2.1.7, Claude Code faile | |
| CVE-2026-25725 | 10.0 | 0.04% | 2 | 1 | 2026-02-09T14:46:12.660000 | Claude Code is an agentic coding tool. Prior to version 2.1.2, Claude Code's bub | |
| CVE-2025-6830 | 9.8 | 0.03% | 2 | 1 | 2026-02-09T12:30:30 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
| CVE-2026-25847 | 8.2 | 0.01% | 2 | 0 | 2026-02-09T12:30:30 | In JetBrains PyCharm before 2025.3.2 a DOM-based XSS on Jupyter viewer page was | |
| CVE-2026-1709 | 9.4 | 0.06% | 1 | 0 | 2026-02-09T10:15:57.377000 | A flaw was found in Keylime. The Keylime registrar, since version 7.12.0, does n | |
| CVE-2026-1761 | 8.6 | 0.54% | 1 | 0 | 2026-02-09T09:31:22 | A flaw was found in libsoup. This stack-based buffer overflow vulnerability occu | |
| CVE-2026-22904 | 9.8 | 0.12% | 4 | 0 | 2026-02-09T09:30:28 | Improper length handling when parsing multiple cookie fields (including TRACKID) | |
| CVE-2025-7799 | 8.6 | 0.04% | 2 | 0 | 2026-02-09T09:30:28 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site | |
| CVE-2026-2234 | 9.1 | 0.05% | 6 | 0 | 2026-02-09T09:30:28 | C&Cm@il developed by HGiga has a Missing Authentication vulnerability, allowing | |
| CVE-2026-22903 | 9.8 | 0.43% | 3 | 0 | 2026-02-09T09:30:28 | An unauthenticated remote attacker can send a crafted HTTP request containing an | |
| CVE-2026-1868 | 10.0 | 0.03% | 3 | 0 | 2026-02-09T09:30:28 | GitLab has remediated a vulnerability in the Duo Workflow Service component of G | |
| CVE-2026-22906 | 9.8 | 0.07% | 4 | 0 | 2026-02-09T09:30:27 | User credentials are stored using AES‑ECB encryption with a hardcoded key. An un | |
| CVE-2026-22905 | 7.5 | 0.10% | 5 | 1 | 2026-02-09T09:30:27 | An unauthenticated remote attacker can bypass authentication by exploiting insuf | |
| CVE-2026-0870 | 7.8 | 0.01% | 2 | 0 | 2026-02-09T09:30:27 | MacroHub developed by GIGABYTE has a Local Privilege Escalation vulnerability. D | |
| CVE-2026-2203 | 8.8 | 0.09% | 3 | 0 | 2026-02-09T03:31:20 | A flaw has been found in Tenda AC8 16.03.33.05. Affected by this vulnerability i | |
| CVE-2026-2191 | 7.2 | 0.04% | 1 | 0 | 2026-02-09T00:30:29 | A weakness has been identified in Tenda AC9 15.03.06.42_multi. Affected is the f | |
| CVE-2026-2192 | 7.2 | 0.04% | 1 | 1 | 2026-02-09T00:30:28 | A security vulnerability has been detected in Tenda AC9 15.03.06.42_multi. Affec | |
| CVE-2026-2180 | 8.8 | 0.05% | 2 | 0 | 2026-02-08T21:30:19 | A vulnerability was identified in Tenda RX3 16.03.13.11. Affected is an unknown | |
| CVE-2026-2157 | 7.2 | 0.19% | 1 | 0 | 2026-02-08T15:31:05 | A security vulnerability has been detected in D-Link DIR-823X 250416. This affec | |
| CVE-2026-2152 | 7.2 | 0.19% | 1 | 0 | 2026-02-08T15:31:05 | A vulnerability was found in D-Link DIR-615 4.10. This vulnerability affects unk | |
| CVE-2026-2151 | 7.2 | 0.19% | 1 | 0 | 2026-02-08T12:30:36 | A vulnerability has been found in D-Link DIR-615 4.10. This affects an unknown p | |
| CVE-2026-2150 | 4.3 | 0.03% | 1 | 7 | 2026-02-08T12:30:36 | A flaw has been found in SourceCodester/Patrick Mvuma Patients Waiting Area Queu | |
| CVE-2026-2140 | 8.8 | 0.09% | 3 | 1 | 2026-02-08T09:30:22 | A vulnerability was identified in Tenda TX9 up to 22.03.02.10_multi. Affected by | |
| CVE-2026-2137 | 8.8 | 0.09% | 2 | 1 | 2026-02-08T06:31:54 | A vulnerability has been found in Tenda TX3 up to 16.03.13.11_multi. This impact | |
| CVE-2025-15027 | 9.8 | 0.07% | 2 | 0 | 2026-02-08T03:30:35 | The JAY Login & Register plugin for WordPress is vulnerable to Privilege Escalat | |
| CVE-2025-15100 | 8.8 | 0.04% | 2 | 0 | 2026-02-08T03:30:29 | The JAY Login & Register plugin for WordPress is vulnerable to Privilege Escalat | |
| CVE-2026-25546 | 7.8 | 0.07% | 2 | 1 | 2026-02-08T03:14:10 | ### Impact A Command Injection vulnerability in godot-mcp allows remote code ex | |
| CVE-2026-25858 | None | 0.15% | 2 | 0 | 2026-02-08T00:30:59 | macrozheng mall version 1.0.3 and prior contains an authentication vulnerability | |
| CVE-2026-2086 | 8.8 | 0.04% | 2 | 0 | 2026-02-07T15:30:14 | A vulnerability was detected in UTT HiPER 810G up to 1.7.7-171114. Affected by t | |
| CVE-2026-2071 | 8.8 | 0.04% | 1 | 1 | 2026-02-07T03:30:18 | A vulnerability was found in UTT 进取 520W 1.7.7-180627. The impacted element is t | |
| CVE-2026-2103 | 7.1 | 0.01% | 4 | 0 | 2026-02-06T21:57:22.450000 | Infor SyteLine ERP uses hard-coded static cryptographic keys to encrypt stored c | |
| CVE-2026-25643 | 9.1 | 0.47% | 3 | 1 | 2026-02-06T21:57:22.450000 | Frigate is a network video recorder (NVR) with realtime local object detection f | |
| CVE-2026-25635 | 8.6 | 0.05% | 3 | 1 | 2026-02-06T21:57:22.450000 | calibre is an e-book manager. Prior to 9.2.0, Calibre's CHM reader contains a pa | |
| CVE-2026-25592 | 9.9 | 0.10% | 1 | 1 | 2026-02-06T21:57:22.450000 | Semantic Kernel is an SDK used to build, orchestrate, and deploy AI agents and m | |
| CVE-2026-25731 | 7.8 | 0.01% | 2 | 1 | 2026-02-06T21:57:22.450000 | calibre is an e-book manager. Prior to 9.2.0, a Server-Side Template Injection ( | |
| CVE-2026-25586 | 10.0 | 0.05% | 1 | 0 | 2026-02-06T21:57:22.450000 | SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, a sandbox escape | |
| CVE-2026-23989 | 8.2 | 0.03% | 1 | 0 | 2026-02-06T21:57:22.450000 | REVA is an interoperability platform. Prior to 2.42.3 and 2.40.3, a bug in the G | |
| CVE-2026-25628 | 8.6 | 0.04% | 2 | 0 | 2026-02-06T21:44:00 | ### Summary It is possible to append to arbitrary files via /logger endpoint. Mi | |
| CVE-2026-25593 | 8.4 | 0.10% | 1 | 0 | 2026-02-06T21:43:42 | ### Summary An unauthenticated local client could use the Gateway WebSocket API | |
| CVE-2026-25641 | 10.0 | 0.04% | 2 | 0 | 2026-02-06T21:42:58 | ### Summary A sandbox escape vulnerabilities due to a mismatch between the key o | |
| CVE-2026-25580 | 8.6 | 0.01% | 1 | 0 | 2026-02-06T21:42:28 | ## Summary A Server-Side Request Forgery (SSRF) vulnerability exists in Pydanti | |
| CVE-2026-25520 | 10.0 | 0.08% | 2 | 0 | 2026-02-06T21:42:24 | ### Summary The return values of functions aren't wrapped. `Object.values`/`Obj | |
| CVE-2025-70963 | None | 0.04% | 1 | 0 | 2026-02-06T21:38:16 | Gophish <= 0.12.1 is vulnerable to Incorrect Access Control. The administrative | |
| CVE-2026-2066 | 8.8 | 0.04% | 1 | 0 | 2026-02-06T21:30:58 | A weakness has been identified in UTT 进取 520W 1.7.7-180627. This affects the fun | |
| CVE-2025-11953 | 9.8 | 6.95% | 5 | 1 | 2026-02-06T19:43:47.703000 | The Metro Development Server, which is opened by the React Native Community CLI, | |
| CVE-2026-25505 | 9.8 | 0.09% | 1 | 0 | 2026-02-06T19:16:09.483000 | Bambuddy is a self-hosted print archive and management system for Bambu Lab 3D p | |
| CVE-2025-70073 | 9.8 | 0.25% | 1 | 0 | 2026-02-06T18:31:38 | An issue in ChestnutCMS v.1.5.8 and before allows a remote attacker to execute a | |
| CVE-2026-24423 | 9.8 | 9.22% | 8 | 1 | 2026-02-06T18:30:29 | SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated | |
| CVE-2025-69906 | 8.8 | 0.21% | 1 | 1 | 2026-02-06T16:16:14.713000 | Monstra CMS v3.0.4 contains an arbitrary file upload vulnerability in the Files | |
| CVE-2026-1499 | 9.8 | 1.23% | 2 | 0 | 2026-02-06T15:14:47.703000 | The WP Duplicate plugin for WordPress is vulnerable to Missing Authorization lea | |
| CVE-2026-21643 | 9.8 | 0.13% | 2 | 1 | 2026-02-06T15:14:47.703000 | An improper neutralization of special elements used in an sql command ('sql inje | |
| CVE-2026-2017 | 9.8 | 0.08% | 1 | 1 | 2026-02-06T15:14:47.703000 | A vulnerability was detected in IP-COM W30AP up to 1.0.0.11(1340). Affected by t | |
| CVE-2026-0106 | 9.3 | 0.00% | 1 | 0 | 2026-02-06T15:14:47.703000 | In vpu_mmap of vpu_ioctl, there is a possible arbitrary address mmap due to a mi | |
| CVE-2025-15080 | None | 0.05% | 1 | 0 | 2026-02-06T09:31:30 | Improper Validation of Specified Quantity in Input vulnerability in Mitsubishi E | |
| CVE-2026-24926 | 8.4 | 0.01% | 1 | 0 | 2026-02-06T09:30:35 | Out-of-bounds write vulnerability in the camera module. Impact: Successful explo | |
| CVE-2025-15566 | 8.8 | 0.03% | 2 | 0 | 2026-02-06T06:30:28 | A security issue was discovered in ingress-nginx where the `nginx.ingress.kubern | |
| CVE-2026-24302 | 8.6 | 0.08% | 1 | 0 | 2026-02-06T00:30:37 | Azure Arc Elevation of Privilege Vulnerability | |
| CVE-2026-0391 | 6.5 | 0.06% | 1 | 0 | 2026-02-06T00:30:32 | User interface (ui) misrepresentation of critical information in Microsoft Edge | |
| CVE-2026-21532 | 8.2 | 0.09% | 1 | 1 | 2026-02-06T00:30:32 | Azure Function Information Disclosure Vulnerability | |
| CVE-2026-20983 | 7.8 | 0.01% | 1 | 0 | 2026-02-05T21:21:13.780000 | Improper export of android application components in Samsung Dialer prior to SMR | |
| CVE-2025-68721 | 9.1 | 0.01% | 2 | 1 | 2026-02-05T21:15:51.963000 | Axigen Mail Server before 10.5.57 contains an improper access control vulnerabil | |
| CVE-2026-20979 | 7.8 | 0.01% | 1 | 0 | 2026-02-05T21:15:46.767000 | Improper privilege management in Settings prior to SMR Feb-2026 Release 1 allows | |
| CVE-2025-15311 | 7.8 | 0.01% | 1 | 0 | 2026-02-05T20:47:37.777000 | Tanium addressed an unauthorized code execution vulnerability in Tanium Applianc | |
| CVE-2026-25056 | 8.8 | 0.13% | 1 | 0 | 2026-02-05T20:42:20.263000 | n8n is an open source workflow automation platform. Prior to versions 1.118.0 an | |
| CVE-2026-25055 | 8.1 | 0.08% | 1 | 0 | 2026-02-05T20:41:47.613000 | n8n is an open source workflow automation platform. Prior to versions 1.123.12 a | |
| CVE-2025-11234 | 7.5 | 0.10% | 1 | 0 | 2026-02-05T20:15:52.003000 | A flaw was found in QEMU. If the QIOChannelWebsock object is freed while it is w | |
| CVE-2026-25539 | 9.1 | 0.27% | 1 | 1 | 2026-02-05T19:15:56.253000 | SiYuan is a personal knowledge management system. Prior to version 3.5.5, the /a | |
| CVE-2020-37125 | 9.8 | 0.43% | 1 | 0 | 2026-02-05T18:30:36 | Edimax EW-7438RPn-v3 Mini 1.27 contains a remote code execution vulnerability th | |
| CVE-2026-25233 | 9.1 | 0.05% | 1 | 0 | 2026-02-05T18:09:05.780000 | PEAR is a framework and distribution system for reusable PHP components. Prior t | |
| CVE-2026-25235 | 7.5 | 0.04% | 1 | 1 | 2026-02-05T18:07:35.470000 | PEAR is a framework and distribution system for reusable PHP components. Prior t | |
| CVE-2026-25236 | 9.8 | 0.04% | 1 | 0 | 2026-02-05T18:06:21.580000 | PEAR is a framework and distribution system for reusable PHP components. Prior t | |
| CVE-2026-25238 | 9.8 | 0.04% | 1 | 1 | 2026-02-05T18:01:30.977000 | PEAR is a framework and distribution system for reusable PHP components. Prior t | |
| CVE-2026-25240 | 9.8 | 0.04% | 1 | 0 | 2026-02-05T17:56:13.807000 | PEAR is a framework and distribution system for reusable PHP components. Prior t | |
| CVE-2026-25241 | 9.8 | 0.11% | 1 | 0 | 2026-02-05T17:55:10.430000 | PEAR is a framework and distribution system for reusable PHP components. Prior t | |
| CVE-2025-46651 | 4.3 | 0.03% | 1 | 1 | 2026-02-05T16:15:50.200000 | Tiny File Manager through 2.6 contains a server-side request forgery (SSRF) vuln | |
| CVE-2025-71031 | 7.5 | 0.04% | 1 | 1 | 2026-02-05T15:32:15 | Water-Melon Melon commit 9df9292 and below is vulnerable to Denial of Service. T | |
| CVE-2025-67188 | 9.8 | 0.14% | 1 | 0 | 2026-02-05T15:32:11 | A buffer overflow vulnerability exists in TOTOLINK A950RG V4.1.2cu.5204_B2021011 | |
| CVE-2025-13379 | 8.6 | 0.09% | 1 | 0 | 2026-02-05T15:31:15 | IBM Aspera Console 3.4.0 through 3.4.8 is vulnerable to SQL injection. A remote | |
| CVE-2025-67189 | 9.8 | 0.20% | 1 | 0 | 2026-02-05T15:16:07.337000 | A buffer overflow vulnerability exists in the setParentalRules interface of TOTO | |
| CVE-2025-61732 | 8.6 | 0.01% | 2 | 0 | 2026-02-05T15:16:06.870000 | A discrepancy between how Go and C/C++ comments were parsed allowed for code smu | |
| CVE-2026-20098 | 8.8 | 0.90% | 1 | 0 | 2026-02-05T14:57:34.297000 | A vulnerability in the Certificate Management feature of Cisco Meeting Managemen | |
| CVE-2025-13192 | 8.2 | 0.08% | 1 | 0 | 2026-02-05T14:57:20.563000 | The Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, an | |
| CVE-2026-25584 | 7.8 | 0.01% | 1 | 0 | 2026-02-05T14:57:20.563000 | iccDEV provides a set of libraries and tools that allow for the interaction, man | |
| CVE-2026-25582 | 7.8 | 0.01% | 1 | 0 | 2026-02-05T14:57:20.563000 | iccDEV provides a set of libraries and tools that allow for the interaction, man | |
| CVE-2026-24844 | 7.9 | 0.02% | 1 | 0 | 2026-02-05T14:57:20.563000 | melange allows users to build apk packages using declarative pipelines. From ver | |
| CVE-2026-25143 | 7.8 | 0.02% | 2 | 0 | 2026-02-05T14:57:20.563000 | melange allows users to build apk packages using declarative pipelines. From ver | |
| CVE-2026-25161 | 8.8 | 0.05% | 1 | 0 | 2026-02-05T14:57:20.563000 | Alist is a file list program that supports multiple storages, powered by Gin and | |
| CVE-2025-11730 | 7.2 | 0.20% | 1 | 1 | 2026-02-05T03:30:23 | A post‑authentication command injection vulnerability in the Dynamic DNS (DDNS) | |
| CVE-2025-10314 | 8.8 | 0.01% | 1 | 0 | 2026-02-05T03:30:23 | Incorrect Default Permissions vulnerability in Mitsubishi Electric Corporation F | |
| CVE-2026-25157 | 7.8 | 0.02% | 2 | 0 | 2026-02-04T21:56:26 | Two related vulnerabilities existed in the macOS application's SSH remote connec | |
| CVE-2026-24884 | 8.4 | 0.02% | 1 | 1 | 2026-02-04T21:55:36 | # Arbitrary File Write via Symlink Extraction in `github.com/node-modules/compre | |
| CVE-2026-23897 | 7.5 | 0.04% | 1 | 0 | 2026-02-04T21:55:12 | ### Impact The default configuration of `startStandaloneServer` from `@apollo/s | |
| CVE-2025-13375 | 9.8 | 0.06% | 1 | 0 | 2026-02-04T21:30:43 | IBM Common Cryptographic Architecture (CCA) 7.5.52 and 8.4.82 could allow an una | |
| CVE-2025-59439 | 7.5 | 0.06% | 1 | 0 | 2026-02-04T21:30:32 | An issue was discovered in Samsung Modem Exynos through 2025-08-29. Incorrect ha | |
| CVE-2025-69875 | 7.8 | 0.01% | 1 | 0 | 2026-02-04T21:30:32 | A vulnerability exists in Quick Heal Total Security 23.0.0 in the quarantine man | |
| CVE-2026-25027 | 7.5 | 0.13% | 1 | 1 | 2026-02-04T21:30:30 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP | |
| CVE-2026-25049 | None | 0.02% | 8 | 1 | 2026-02-04T21:09:38 | ### Impact Additional exploits in the expression evaluation of n8n have been id | |
| CVE-2026-25052 | None | 0.01% | 1 | 1 | 2026-02-04T19:53:39 | ## Impact A vulnerability in the file access controls allows authenticated user | |
| CVE-2026-25115 | None | 0.04% | 1 | 0 | 2026-02-04T19:42:05 | ## Impact A vulnerability in the Python Code node allows authenticated users to | |
| CVE-2025-60865 | 7.8 | 0.01% | 1 | 0 | 2026-02-04T18:31:36 | Insecure Permissions vulnerability in avanquest Driver Updater v.9.1.57803.1174 | |
| CVE-2025-63624 | 9.8 | 0.21% | 1 | 0 | 2026-02-04T17:16:09.180000 | SQL Injection vulnerability in Shandong Kede Electronics Co., Ltd IoT smart wate | |
| CVE-2026-1340 | 9.8 | 0.18% | 3 | 1 | 2026-02-04T16:34:21.763000 | A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve | |
| CVE-2020-37088 | 7.5 | 1.18% | 1 | 0 | 2026-02-04T16:33:44.537000 | School ERP Pro 1.0 contains a file disclosure vulnerability that allows unauthen | |
| CVE-2026-1802 | 7.3 | 2.14% | 1 | 1 | 2026-02-04T16:33:44.537000 | A security flaw has been discovered in Ziroom ZHOME A0101 1.0.1.0. This issue af | |
| CVE-2025-40551 | 9.8 | 54.99% | 2 | 0 | template | 2026-02-04T02:00:02.030000 | SolarWinds Web Help Desk was found to be susceptible to an untrusted data deseri |
| CVE-2020-37086 | 6.2 | 1.19% | 1 | 0 | 2026-02-04T00:30:41 | Easy Transfer 1.7 iOS mobile application contains a directory traversal vulnerab | |
| CVE-2026-1633 | 10.0 | 0.06% | 1 | 0 | 2026-02-04T00:30:41 | The Synectix LAN 232 TRIO 3-Port serial to ethernet adapter exposes its web mana | |
| CVE-2026-1207 | None | 0.01% | 1 | 0 | template | 2026-02-03T19:32:57 | An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4 |
| CVE-2025-11598 | 0 | 0.02% | 2 | 1 | 2026-02-03T16:44:03.343000 | In mObywatel iOS application an unauthorized user can use the App Switcher to vi | |
| CVE-2026-23515 | 10.0 | 1.21% | 1 | 0 | 2026-02-03T16:12:17 | ### Summary A Command Injection vulnerability allows authenticated users with wr | |
| CVE-2026-24061 | 9.8 | 32.54% | 1 | 1 | template | 2026-01-30T13:28:59.293000 | telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a " |
| CVE-2026-1281 | 9.8 | 16.41% | 6 | 1 | 2026-01-30T13:28:18.610000 | A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve | |
| CVE-2025-15467 | 9.8 | 0.66% | 3 | 4 | 2026-01-29T15:31:31 | Issue summary: Parsing CMS AuthEnvelopedData message with maliciously crafted AE | |
| CVE-2026-21509 | 7.8 | 2.91% | 7 | 1 | 2026-01-27T16:19:42.330000 | Reliance on untrusted inputs in a security decision in Microsoft Office allows a | |
| CVE-2026-21441 | 7.5 | 0.02% | 1 | 0 | 2026-01-23T09:15:47.823000 | urllib3 is an HTTP client library for Python. urllib3's streaming API is designe | |
| CVE-2026-0989 | 3.7 | 0.06% | 1 | 0 | 2026-01-15T15:31:21 | A flaw was identified in the RelaxNG parser of libxml2 related to how external s | |
| CVE-2025-13607 | 9.4 | 0.08% | 1 | 0 | 2025-12-10T21:31:32 | A malicious actor can access camera configuration information, including account | |
| CVE-2025-66516 | None | 2.61% | 1 | 4 | template | 2025-12-05T02:26:57 | Critical XXE in Apache Tika tika-core (1.13-3.2.1), tika-pdf-module (2.0.0-3.2.1 |
| CVE-2025-26399 | 9.8 | 12.86% | 4 | 1 | 2025-11-14T23:41:16.280000 | SolarWinds Web Help Desk was found to be susceptible to an unauthenticated AjaxP | |
| CVE-2024-3596 | 9.0 | 23.85% | 2 | 1 | 2025-11-04T18:16:31.367000 | RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local atta | |
| CVE-2024-42318 | 5.5 | 0.01% | 1 | 0 | 2025-11-04T00:31:15 | In the Linux kernel, the following vulnerability has been resolved: landlock: D | |
| CVE-2025-22225 | 8.2 | 5.41% | 4 | 0 | 2025-10-30T19:52:45.300000 | VMware ESXi contains an arbitrary write vulnerability. A malicious actor with pr | |
| CVE-2025-8088 | 8.8 | 3.90% | 1 | 27 | 2025-10-30T15:50:59.680000 | A path traversal vulnerability affecting the Windows version of WinRAR allows th | |
| CVE-2025-6978 | 7.2 | 0.24% | 1 | 0 | 2025-10-23T21:31:50 | Diagnostics command injection vulnerability | |
| CVE-2017-12615 | 8.1 | 94.22% | 1 | 18 | template | 2025-10-22T17:31:15 | When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e. |
| CVE-2025-22226 | 7.1 | 6.02% | 1 | 0 | 2025-10-22T00:33:13 | VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerabi | |
| CVE-2017-12617 | 8.1 | 94.36% | 1 | 13 | template | 2025-10-22T00:16:04.407000 | When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC |
| CVE-2025-49825 | 9.8 | 11.53% | 1 | 0 | template | 2025-06-18T13:46:52.973000 | Teleport provides connectivity, authentication, access controls and audit for in |
| CVE-2025-1920 | 8.8 | 0.15% | 1 | 0 | 2025-04-07T18:54:46.053000 | Type Confusion in V8 in Google Chrome prior to 134.0.6998.88 allowed a remote at | |
| CVE-2018-19333 | 9.8 | 0.17% | 1 | 0 | 2023-02-01T05:05:52 | pkg/sentry/kernel/shm/shm.go in Google gVisor before 2018-11-01 allows attackers | |
| CVE-2026-25740 | 0 | 0.00% | 2 | 1 | N/A | ||
| CVE-2026-0992 | 0 | 0.07% | 1 | 0 | N/A | ||
| CVE-2026-2202 | 0 | 0.09% | 2 | 0 | N/A | ||
| CVE-2026-2187 | 0 | 0.05% | 2 | 1 | N/A | ||
| CVE-2026-2185 | 0 | 0.05% | 3 | 1 | N/A | ||
| CVE-2026-2175 | 0 | 0.19% | 1 | 0 | N/A | ||
| CVE-2026-2129 | 0 | 0.19% | 1 | 1 | N/A | ||
| CVE-2026-25762 | 0 | 0.01% | 1 | 0 | N/A | ||
| CVE-2026-2070 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2026-25544 | 0 | 0.05% | 2 | 0 | N/A | ||
| CVE-2026-2068 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2026-25636 | 0 | 0.01% | 3 | 0 | N/A | ||
| CVE-2026-25634 | 0 | 0.01% | 3 | 0 | N/A | ||
| CVE-2026-25632 | 0 | 0.11% | 2 | 0 | N/A | ||
| CVE-2026-2067 | 0 | 0.04% | 2 | 0 | N/A | ||
| CVE-2026-25587 | 0 | 0.05% | 1 | 0 | N/A | ||
| CVE-2025-13523 | 0 | 0.01% | 1 | 1 | N/A | ||
| CVE-2026-24930 | 0 | 0.01% | 1 | 0 | N/A | ||
| CVE-2026-25234 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-25237 | 0 | 0.11% | 1 | 0 | N/A | ||
| CVE-2026-24300 | 0 | 0.09% | 1 | 1 | N/A | ||
| CVE-2026-25053 | 0 | 0.02% | 1 | 0 | N/A | ||
| CVE-2025-68722 | 0 | 0.03% | 1 | 1 | N/A | ||
| CVE-2025-15330 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2026-25239 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2025-69970 | 0 | 0.05% | 1 | 0 | N/A | ||
| CVE-2025-22224 | 0 | 58.95% | 1 | 0 | N/A | ||
| CVE-2025-61506 | 0 | 0.12% | 1 | 1 | N/A | ||
| CVE-2026-25585 | 0 | 0.01% | 1 | 0 | N/A | ||
| CVE-2026-22038 | 0 | 0.08% | 1 | 0 | N/A | ||
| CVE-2026-25526 | 0 | 0.07% | 1 | 0 | N/A | ||
| CVE-2026-25583 | 0 | 0.01% | 1 | 0 | N/A | ||
| CVE-2026-25519 | 0 | 0.04% | 2 | 0 | N/A | ||
| CVE-2026-25160 | 0 | 0.01% | 2 | 0 | N/A | ||
| CVE-2026-24843 | 0 | 0.02% | 1 | 1 | N/A |
updated 2026-02-09T18:16:05.267000
1 posts
🟠 CVE-2025-69620 - High (7.5)
A path traversal in Moo Chan Song v4.5.7 allows attackers to cause a Denial of Service (DoS) via writing files to the internal storage.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-69620/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T18:16:05.077000
1 posts
🟠 CVE-2025-69619 - High (7.5)
A path traversal in My Text Editor v1.6.2 allows attackers to cause a Denial of Service (DoS) via writing files to the internal storage.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-69619/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T16:08:55.263000
8 posts
CVE-2026-1731: Pre-Auth RCE in BeyondTrust Remote Support & PRA
#BeyondTrust #BeyondTrustSecureRemoteAccess #CVE_2026_1731
https://www.hacktron.ai/blog/cve-2026-1731-beyondtrust-remote-support-rce
A single bug in BeyondTrust’s remote access tools lets hackers break in without a password or any help from users. With thousands of companies at risk, how exposed is your organization?
##BeyondTrust fixes easy-to-exploit pre-auth RCE vulnerability in remote access tools (CVE-2026-1731)
https://www.helpnetsecurity.com/2026/02/09/beyondtrust-remote-access-vulnerability-cve-2026-1731/
#RemoteAccess #PrivilegedAccessManagement #Enterprise #Cybersecurity #CVE
##BeyondTrust Zero-Day CVE-2026-1731 Exposes Remote Access Systems to Pre-Auth RCE
Introduction: A Silent Door Into Enterprise Networks BeyondTrust has issued an urgent warning that should immediately capture the attention of enterprise security teams worldwide. A newly disclosed zero-day vulnerability, tracked as CVE-2026-1731, affects core BeyondTrust remote access products used to manage and secure privileged connections. Rated an alarming 9.9 out of 10 on the CVSSv4…
##📈 CVE Published in last 7 days (2026-02-02 - 2026-02-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1178
Severity:
- Critical: 93
- High: 363
- Medium: 498
- Low: 65
- None: 159
Status:
- : 9
- Analyzed: 94
- Awaiting Analysis: 636
- Modified: 2
- Received: 139
- Rejected: 20
- Undergoing Analysis: 278
Top CNAs:
- GitHub, Inc.: 225
- VulnCheck: 149
- VulDB: 134
- kernel.org: 79
- Wordfence: 71
- MITRE: 64
- wikimedia-foundation: 47
- Patchstack: 45
- Tanium: 26
- TPLink: 25
Top Affected Products:
- UNKNOWN: 1071
- Samsung Exynos 850 Firmware: 10
- Tp-link Archer Be230 Firmware: 10
- Samsung Exynos 980 Firmware: 10
- Samsung Exynos W920 Firmware: 10
- Samsung Exynos W1000 Firmware: 10
- Samsung Exynos 1080 Firmware: 10
- Samsung Exynos W930 Firmware: 10
- Samsung Exynos 1480 Firmware: 9
- Mediatek Nr15: 9
Top EPSS Score:
- CVE-2026-1802 - 1.28 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1802)
- CVE-2026-1499 - 1.23 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1499)
- CVE-2026-23515 - 0.91 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-23515)
- CVE-2020-37088 - 0.90 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-37088)
- CVE-2026-20098 - 0.90 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-20098)
- CVE-2020-37086 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-37086)
- CVE-2026-25643 - 0.47 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25643)
- CVE-2026-1761 - 0.46 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1761)
- CVE-2026-1731 - 0.44 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1731)
- CVE-2020-37125 - 0.43 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-37125)
BeyondTrust Patches Critical Pre-Authentication RCE Vulnerability in Remote Access Products
BeyondTrust reports a critical pre-authentication RCE vulnerability (CVE-2026-1731) in its Remote Support and Privileged Remote Access products, allowing unauthenticated attackers to execute OS commands.
**If you use self-hosted BeyondTrust Remote Support or PRA, this is important. Plan a quick update to the BT26-02 patches. Isolation probably won't work since these systems are designed for remote access. SaaS users are already protected, but self-hosted environments require manual action.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/beyondtrust-patches-critical-pre-authentication-rce-vulnerability-in-remote-access-products-1-5-4-d-s/gD2P6Ple2L
BeyondTrust fixes easy-to-exploit pre-auth RCE vulnerability in remote access tools (CVE-2026-1731)
https://www.helpnetsecurity.com/2026/02/09/beyondtrust-remote-access-vulnerability-cve-2026-1731/
#RemoteAccess #PrivilegedAccessManagement #Enterprise #Cybersecurity #CVE
##BeyondTrust Patches Critical Pre-Authentication RCE Vulnerability in Remote Access Products
BeyondTrust reports a critical pre-authentication RCE vulnerability (CVE-2026-1731) in its Remote Support and Privileged Remote Access products, allowing unauthenticated attackers to execute OS commands.
**If you use self-hosted BeyondTrust Remote Support or PRA, this is important. Plan a quick update to the BT26-02 patches. Isolation probably won't work since these systems are designed for remote access. SaaS users are already protected, but self-hosted environments require manual action.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/beyondtrust-patches-critical-pre-authentication-rce-vulnerability-in-remote-access-products-1-5-4-d-s/gD2P6Ple2L
updated 2026-02-09T16:08:55.263000
2 posts
🔴 CVE-2026-25803 - Critical (9.8)
3DP-MANAGER is an inbound generator for 3x-ui. In version 2.0.1 and prior, the application automatically creates an administrative account with known default credentials (admin/admin) upon the first initialization. Attackers with network access to...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25803/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25803 - Critical (9.8)
3DP-MANAGER is an inbound generator for 3x-ui. In version 2.0.1 and prior, the application automatically creates an administrative account with known default credentials (admin/admin) upon the first initialization. Attackers with network access to...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25803/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T16:08:55.263000
1 posts
1 repos
🟠 CVE-2026-25644 - High (7.5)
DataHub is an open-source metadata platform. Prior to version 1.3.1.8, the LDAP ingestion source is vulnerable to MITM attack through TLS downgrade. This issue has been patched in version 1.3.1.8.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25644/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T16:08:55.263000
1 posts
1 repos
🟠 CVE-2026-25732 - High (7.5)
NiceGUI is a Python-based UI framework. Prior to 3.7.0, NiceGUI's FileUpload.name property exposes client-supplied filename metadata without sanitization, enabling path traversal when developers use the pattern UPLOAD_DIR / file.name. Malicious fi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25732/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T16:08:35.290000
2 posts
1 repos
🟠 CVE-2025-59023 - High (8.2)
Crafted delegations or IP fragments can poison cached delegations in Recursor.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-59023/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-59023 - High (8.2)
Crafted delegations or IP fragments can poison cached delegations in Recursor.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-59023/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T16:08:35.290000
2 posts
🟠 CVE-2025-10465 - High (8.8)
Unrestricted Upload of File with Dangerous Type vulnerability in Birtech Information Technologies Industry and Trade Ltd. Co. Sensaway allows Upload a Web Shell to a Web Server.This issue affects Sensaway: through 09022026.
NOTE: The vendor was c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-10465/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-10465 - High (8.8)
Unrestricted Upload of File with Dangerous Type vulnerability in Birtech Information Technologies Industry and Trade Ltd. Co. Sensaway allows Upload a Web Shell to a Web Server.This issue affects Sensaway: through 09022026.
NOTE: The vendor was c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-10465/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T16:08:35.290000
2 posts
1 repos
🔴 CVE-2026-25848 - Critical (9.1)
In JetBrains Hub before 2025.3.119807 authentication bypass allowing administrative actions was possible
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25848/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25848 - Critical (9.1)
In JetBrains Hub before 2025.3.119807 authentication bypass allowing administrative actions was possible
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25848/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T16:08:35.290000
6 posts
🟠 CVE-2026-2236 - High (7.5)
C&Cm@il developed by HGiga has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read database contents.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2236/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2236 - High (7.5)
C&Cm@il developed by HGiga has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read database contents.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2236/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2236 - High (7.5)
C&Cm@il developed by HGiga has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read database contents.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2236/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2236 - High (7.5)
C&Cm@il developed by HGiga has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read database contents.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2236/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2236 - High (7.5)
C&Cm@il developed by HGiga has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read database contents.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2236/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2236 - High (7.5)
C&Cm@il developed by HGiga has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read database contents.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2236/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T16:08:35.290000
3 posts
🚨 CVE-2026-1615: CRITICAL code injection in all jsonpath versions — RCE in Node.js, XSS in browsers. No patch yet. Audit dependencies, block untrusted JSON Path input, monitor for attacks. Details: https://radar.offseq.com/threat/cve-2026-1615-arbitrary-code-injection-in-jsonpath-a64ac077 #OffSeq #Vulnerability #NodeJS #Security
##🔴 CVE-2026-1615 - Critical (9.8)
All versions of the package jsonpath are vulnerable to Arbitrary Code Injection via unsafe evaluation of user-supplied JSON Path expressions. The library relies on the static-eval module to process JSON Path input, which is not designed to handle ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1615/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-1615 - Critical (9.8)
All versions of the package jsonpath are vulnerable to Arbitrary Code Injection via unsafe evaluation of user-supplied JSON Path expressions. The library relies on the static-eval module to process JSON Path input, which is not designed to handle ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1615/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T16:08:35.290000
1 posts
1 repos
⚠️ HIGH-severity OS command injection (CVE-2026-2210) in D-Link DIR-823X v250416 — remote, unauthenticated code execution possible. Patch firmware or restrict admin access now. European orgs: prioritize response! https://radar.offseq.com/threat/cve-2026-2210-os-command-injection-in-d-link-dir-8-a510703e #OffSeq #Vuln #DLink
##updated 2026-02-09T16:08:35.290000
2 posts
1 repos
🟠 CVE-2026-2186 - High (8.8)
A vulnerability has been found in Tenda RX3 16.03.13.11. Impacted is the function fromSetIpMacBind of the file /goform/SetIpMacBind. Such manipulation of the argument list leads to stack-based buffer overflow. The attack may be performed from remo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2186/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2186 - High (8.8)
A vulnerability has been found in Tenda RX3 16.03.13.11. Impacted is the function fromSetIpMacBind of the file /goform/SetIpMacBind. Such manipulation of the argument list leads to stack-based buffer overflow. The attack may be performed from remo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2186/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T16:08:35.290000
2 posts
🟠 CVE-2026-2181 - High (8.8)
A security flaw has been discovered in Tenda RX3 16.03.13.11. Affected by this vulnerability is an unknown functionality of the file /goform/openSchedWifi. Performing a manipulation of the argument schedStartTime/schedEndTime results in stack-base...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2181/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2181 - High (8.8)
A security flaw has been discovered in Tenda RX3 16.03.13.11. Affected by this vulnerability is an unknown functionality of the file /goform/openSchedWifi. Performing a manipulation of the argument schedStartTime/schedEndTime results in stack-base...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2181/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T16:08:35.290000
1 posts
1 repos
🚨 HIGH severity (CVSS 8.6): CVE-2026-2155 affects D-Link DIR-823X (v250416). Remote OS command injection via /goform/set_dmz — public exploit out! Restrict management access, monitor traffic, patch ASAP. https://radar.offseq.com/threat/cve-2026-2155-os-command-injection-in-d-link-dir-8-3a93a385 #OffSeq #DLink #Vuln #Infosec
##updated 2026-02-09T16:08:35.290000
2 posts
2 repos
🔥 CVE-2026-2143 (HIGH, CVSS 8.6): D-Link DIR-823X v250416 allows OS command injection via DDNS endpoint (/goform/set_ddns). Remote attackers with privileges can fully compromise affected routers. Mitigate now — restrict remote mgmt, monitor traffic. https://radar.offseq.com/threat/cve-2026-2143-os-command-injection-in-d-link-dir-8-43a9e1df #OffSeq #CVE20262143 #DLink #infosec
##🛡️ HIGH severity OS command injection (CVE-2026-2143) in D-Link DIR-823X (fw 250416): Exploitable via /goform/set_ddns by privileged users. No patch yet — disable remote management, monitor traffic, and check for updates. https://radar.offseq.com/threat/cve-2026-2143-os-command-injection-in-d-link-dir-8-43a9e1df #OffSeq #DLink #Security
##updated 2026-02-09T16:08:35.290000
2 posts
🟠 CVE-2026-2139 - High (8.8)
A vulnerability was determined in Tenda TX9 up to 22.03.02.10_multi. Affected by this vulnerability is the function sub_432580 of the file /goform/fast_setting_wifi_set. This manipulation of the argument ssid causes buffer overflow. The attack may...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2139/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2139 - High (8.8)
A vulnerability was determined in Tenda TX9 up to 22.03.02.10_multi. Affected by this vulnerability is the function sub_432580 of the file /goform/fast_setting_wifi_set. This manipulation of the argument ssid causes buffer overflow. The attack may...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2139/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T16:08:35.290000
2 posts
1 repos
🟠 CVE-2026-2138 - High (8.8)
A vulnerability was found in Tenda TX9 up to 22.03.02.10_multi. Affected is the function sub_42D03C of the file /goform/SetStaticRouteCfg. The manipulation of the argument list results in buffer overflow. The attack can be launched remotely. The e...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2138/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2138 - High (8.8)
A vulnerability was found in Tenda TX9 up to 22.03.02.10_multi. Affected is the function sub_42D03C of the file /goform/SetStaticRouteCfg. The manipulation of the argument list results in buffer overflow. The attack can be launched remotely. The e...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2138/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T16:08:35.290000
1 posts
1 repos
⚠️ CVE-2026-25857: HIGH-severity OS command injection in Tenda G300-F routers (≤16.01.14.2). No patch yet — exposure of management interface risks full device compromise. Restrict access, monitor WAN diagnostics. Details: https://radar.offseq.com/threat/cve-2026-25857-cwe-78-improper-neutralization-of-s-97d5f696 #OffSeq #Infosec #Vuln
##updated 2026-02-09T16:08:35.290000
1 posts
🛡️ CVE-2026-2120: HIGH severity OS command injection in D-Link DIR-823X (v250416) via /goform/set_server_settings. Remote, unauthenticated — public exploit released. Patch or restrict access immediately. https://radar.offseq.com/threat/cve-2026-2120-os-command-injection-in-d-link-dir-8-eb87b902 #OffSeq #DLink #Vuln #CVE20262120
##updated 2026-02-09T14:51:42.203000
2 posts
🔴 CVE-2026-25722 - Critical (9.1)
Claude Code is an agentic coding tool. Prior to version 2.0.57, Claude Code failed to properly validate directory changes when combined with write operations to protected folders. By using the cd command to navigate into sensitive directories like...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25722/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25722 - Critical (9.1)
Claude Code is an agentic coding tool. Prior to version 2.0.57, Claude Code failed to properly validate directory changes when combined with write operations to protected folders. By using the cd command to navigate into sensitive directories like...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25722/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T14:47:41.783000
2 posts
1 repos
🟠 CVE-2026-25724 - High (7.5)
Claude Code is an agentic coding tool. Prior to version 2.1.7, Claude Code failed to strictly enforce deny rules configured in settings.json when accessing files through symbolic links. If a user explicitly denied Claude Code access to a file (suc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25724/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25724 - High (7.5)
Claude Code is an agentic coding tool. Prior to version 2.1.7, Claude Code failed to strictly enforce deny rules configured in settings.json when accessing files through symbolic links. If a user explicitly denied Claude Code access to a file (suc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25724/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T14:46:12.660000
2 posts
1 repos
🔴 CVE-2026-25725 - Critical (10)
Claude Code is an agentic coding tool. Prior to version 2.1.2, Claude Code's bubblewrap sandboxing mechanism failed to properly protect the .claude/settings.json configuration file when it did not exist at startup. While the parent directory was m...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25725/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25725 - Critical (10)
Claude Code is an agentic coding tool. Prior to version 2.1.2, Claude Code's bubblewrap sandboxing mechanism failed to properly protect the .claude/settings.json configuration file when it did not exist at startup. While the parent directory was m...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25725/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T12:30:30
2 posts
1 repos
🔴 CVE-2025-6830 - Critical (9.8)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Xpoda Türkiye Information Technology Inc. Xpoda Studio allows SQL Injection.This issue affects Xpoda Studio: through 09022026. NOTE: The vendor...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-6830/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-6830 - Critical (9.8)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Xpoda Türkiye Information Technology Inc. Xpoda Studio allows SQL Injection.This issue affects Xpoda Studio: through 09022026. NOTE: The vendor...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-6830/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T12:30:30
2 posts
🟠 CVE-2026-25847 - High (8.2)
In JetBrains PyCharm before 2025.3.2 a DOM-based XSS on Jupyter viewer page was possible
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25847/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25847 - High (8.2)
In JetBrains PyCharm before 2025.3.2 a DOM-based XSS on Jupyter viewer page was possible
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25847/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T10:15:57.377000
1 posts
🔴 CVE-2026-1709 - Critical (9.4)
A flaw was found in Keylime. The Keylime registrar, since version 7.12.0, does not enforce client-side Transport Layer Security (TLS) authentication. This authentication bypass vulnerability allows unauthenticated clients with network access to pe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1709/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T09:31:22
1 posts
📈 CVE Published in last 7 days (2026-02-02 - 2026-02-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1178
Severity:
- Critical: 93
- High: 363
- Medium: 498
- Low: 65
- None: 159
Status:
- : 9
- Analyzed: 94
- Awaiting Analysis: 636
- Modified: 2
- Received: 139
- Rejected: 20
- Undergoing Analysis: 278
Top CNAs:
- GitHub, Inc.: 225
- VulnCheck: 149
- VulDB: 134
- kernel.org: 79
- Wordfence: 71
- MITRE: 64
- wikimedia-foundation: 47
- Patchstack: 45
- Tanium: 26
- TPLink: 25
Top Affected Products:
- UNKNOWN: 1071
- Samsung Exynos 850 Firmware: 10
- Tp-link Archer Be230 Firmware: 10
- Samsung Exynos 980 Firmware: 10
- Samsung Exynos W920 Firmware: 10
- Samsung Exynos W1000 Firmware: 10
- Samsung Exynos 1080 Firmware: 10
- Samsung Exynos W930 Firmware: 10
- Samsung Exynos 1480 Firmware: 9
- Mediatek Nr15: 9
Top EPSS Score:
- CVE-2026-1802 - 1.28 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1802)
- CVE-2026-1499 - 1.23 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1499)
- CVE-2026-23515 - 0.91 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-23515)
- CVE-2020-37088 - 0.90 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-37088)
- CVE-2026-20098 - 0.90 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-20098)
- CVE-2020-37086 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-37086)
- CVE-2026-25643 - 0.47 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25643)
- CVE-2026-1761 - 0.46 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1761)
- CVE-2026-1731 - 0.44 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1731)
- CVE-2020-37125 - 0.43 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-37125)
updated 2026-02-09T09:30:28
4 posts
🚨 CVE-2026-22904 (CRITICAL, CVSS 9.8): WAGO 0852-1322 vulnerable to stack-based buffer overflow via oversized HTTP cookies. RCE & DoS possible. Isolate devices, monitor traffic, deploy WAF/IPS. No patch yet. https://radar.offseq.com/threat/cve-2026-22904-cwe-121-stack-based-buffer-overflow-f7b2d93e #OffSeq #ICS #Vuln
##🔴 CVE-2026-22904 - Critical (9.8)
Improper length handling when parsing multiple cookie fields (including TRACKID) allows an unauthenticated remote attacker to send oversized cookie values and trigger a stack buffer overflow, resulting in a denial‑of‑service condition and poss...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22904/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
###OT #Advisory VDE-2026-004
WAGO: Vulnerabilities in Managed Switch
Several vulnerabilities have been identified in the WAGO 852‑1328 device's web‑based management interface, which is implemented using a modified lighttpd server and custom CGI binaries. These issues include multiple stack buffer overflows, an authentication bypass, and insecure credential storage.
#CVE CVE-2026-22906, CVE-2026-22904, CVE-2026-22903, CVE-2026-22905
https://certvde.com/en/advisories/vde-2026-004/
#CSAF https://wago.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2026-004.json
##🔴 CVE-2026-22904 - Critical (9.8)
Improper length handling when parsing multiple cookie fields (including TRACKID) allows an unauthenticated remote attacker to send oversized cookie values and trigger a stack buffer overflow, resulting in a denial‑of‑service condition and poss...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22904/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T09:30:28
2 posts
🟠 CVE-2025-7799 - High (8.6)
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Zirve Information Technologies Inc. E-Taxpayer Accounting Website allows Reflected XSS.This issue affects e-Taxpayer Accounting Website: t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-7799/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-7799 - High (8.6)
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Zirve Information Technologies Inc. E-Taxpayer Accounting Website allows Reflected XSS.This issue affects e-Taxpayer Accounting Website: t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-7799/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T09:30:28
6 posts
🔴 CVE-2026-2234 - Critical (9.1)
C&Cm@il developed by HGiga has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to read and modify any user's mail content.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2234/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-2234 - Critical (9.1)
C&Cm@il developed by HGiga has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to read and modify any user's mail content.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2234/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-2234 - Critical (9.1)
C&Cm@il developed by HGiga has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to read and modify any user's mail content.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2234/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-2234 - Critical (9.1)
C&Cm@il developed by HGiga has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to read and modify any user's mail content.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2234/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-2234 - Critical (9.1)
C&Cm@il developed by HGiga has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to read and modify any user's mail content.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2234/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-2234 - Critical (9.1)
C&Cm@il developed by HGiga has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to read and modify any user's mail content.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2234/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T09:30:28
3 posts
🔴 CVE-2026-22903 - Critical (9.8)
An unauthenticated remote attacker can send a crafted HTTP request containing an overly long SESSIONID cookie. This can trigger a stack buffer overflow in the modified lighttpd server, causing it to crash and potentially enabling remote code execu...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22903/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
###OT #Advisory VDE-2026-004
WAGO: Vulnerabilities in Managed Switch
Several vulnerabilities have been identified in the WAGO 852‑1328 device's web‑based management interface, which is implemented using a modified lighttpd server and custom CGI binaries. These issues include multiple stack buffer overflows, an authentication bypass, and insecure credential storage.
#CVE CVE-2026-22906, CVE-2026-22904, CVE-2026-22903, CVE-2026-22905
https://certvde.com/en/advisories/vde-2026-004/
#CSAF https://wago.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2026-004.json
##🔴 CVE-2026-22903 - Critical (9.8)
An unauthenticated remote attacker can send a crafted HTTP request containing an overly long SESSIONID cookie. This can trigger a stack buffer overflow in the modified lighttpd server, causing it to crash and potentially enabling remote code execu...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22903/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T09:30:28
3 posts
🚨 CRITICAL: CVE-2026-1868 in GitLab AI Gateway (18.1.6 – 18.8.0) allows remote code execution or DoS via Duo Workflow Service. Patch to 18.6.2, 18.7.1, or 18.8.1. Restrict workflow access & monitor for abuse! https://radar.offseq.com/threat/cve-2026-1868-cwe-1336-improper-neutralization-of--f5bf4abe #OffSeq #GitLab #Vuln #CVE20261868
##🔴 CVE-2026-1868 - Critical (9.9)
GitLab has remediated a vulnerability in the Duo Workflow Service component of GitLab AI Gateway affecting all versions of the AI Gateway from 18.1.6, 18.2.6, 18.3.1 to 18.6.1, 18.7.0, and 18.8.0 in which AI Gateway was vulnerable to insecure temp...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1868/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-1868 - Critical (9.9)
GitLab has remediated a vulnerability in the Duo Workflow Service component of GitLab AI Gateway affecting all versions of the AI Gateway from 18.1.6, 18.2.6, 18.3.1 to 18.6.1, 18.7.0, and 18.8.0 in which AI Gateway was vulnerable to insecure temp...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1868/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T09:30:27
4 posts
🚨 CVE-2026-22906 (CRITICAL, CVSS 9.8): WAGO 0852-1322 uses a hardcoded AES key, letting unauthenticated attackers decrypt credentials from config files. No patch yet. Restrict access, segment networks, monitor closely! https://radar.offseq.com/threat/cve-2026-22906-cwe-321-use-of-hard-coded-cryptogra-e9045210 #OffSeq #ICS #OTSecurity
##🔴 CVE-2026-22906 - Critical (9.8)
User credentials are stored using AES‑ECB encryption with a hardcoded key. An unauthenticated remote attacker obtaining the configuration file can decrypt and recover plaintext usernames and passwords, especially when combined with the authentic...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22906/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
###OT #Advisory VDE-2026-004
WAGO: Vulnerabilities in Managed Switch
Several vulnerabilities have been identified in the WAGO 852‑1328 device's web‑based management interface, which is implemented using a modified lighttpd server and custom CGI binaries. These issues include multiple stack buffer overflows, an authentication bypass, and insecure credential storage.
#CVE CVE-2026-22906, CVE-2026-22904, CVE-2026-22903, CVE-2026-22905
https://certvde.com/en/advisories/vde-2026-004/
#CSAF https://wago.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2026-004.json
##🔴 CVE-2026-22906 - Critical (9.8)
User credentials are stored using AES‑ECB encryption with a hardcoded key. An unauthenticated remote attacker obtaining the configuration file can decrypt and recover plaintext usernames and passwords, especially when combined with the authentic...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22906/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T09:30:27
5 posts
1 repos
🟠 CVE-2026-22905 - High (7.5)
An unauthenticated remote attacker can bypass authentication by exploiting insufficient URI validation and using path traversal sequences (e.g., /js/../cgi-bin/post.cgi), gaining unauthorized access to protected CGI endpoints and configuration dow...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22905/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-22905 - High (7.5)
An unauthenticated remote attacker can bypass authentication by exploiting insufficient URI validation and using path traversal sequences (e.g., /js/../cgi-bin/post.cgi), gaining unauthorized access to protected CGI endpoints and configuration dow...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22905/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
###OT #Advisory VDE-2026-004
WAGO: Vulnerabilities in Managed Switch
Several vulnerabilities have been identified in the WAGO 852‑1328 device's web‑based management interface, which is implemented using a modified lighttpd server and custom CGI binaries. These issues include multiple stack buffer overflows, an authentication bypass, and insecure credential storage.
#CVE CVE-2026-22906, CVE-2026-22904, CVE-2026-22903, CVE-2026-22905
https://certvde.com/en/advisories/vde-2026-004/
#CSAF https://wago.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2026-004.json
##🟠 CVE-2026-22905 - High (7.5)
An unauthenticated remote attacker can bypass authentication by exploiting insufficient URI validation and using path traversal sequences (e.g., /js/../cgi-bin/post.cgi), gaining unauthorized access to protected CGI endpoints and configuration dow...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22905/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-22905 - High (7.5)
An unauthenticated remote attacker can bypass authentication by exploiting insufficient URI validation and using path traversal sequences (e.g., /js/../cgi-bin/post.cgi), gaining unauthorized access to protected CGI endpoints and configuration dow...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22905/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T09:30:27
2 posts
🟠 CVE-2026-0870 - High (7.8)
MacroHub developed by GIGABYTE has a Local Privilege Escalation vulnerability. Due to the MacroHub application launching external applications with improper privileges, allowing authenticated local attackers to execute arbitrary code with SYSTEM p...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0870/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-0870 - High (7.8)
MacroHub developed by GIGABYTE has a Local Privilege Escalation vulnerability. Due to the MacroHub application launching external applications with improper privileges, allowing authenticated local attackers to execute arbitrary code with SYSTEM p...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0870/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T03:31:20
3 posts
⚠️ CVE-2026-2203 (HIGH, CVSS 8.7): Tenda AC8 (16.03.33.05) buffer overflow in /goform/fast_setting_wifi_set lets remote attackers execute code w/o auth. Public exploit exists — update firmware, segment networks, monitor HTTP! https://radar.offseq.com/threat/cve-2026-2203-buffer-overflow-in-tenda-ac8-23b5fa92 #OffSeq #Vuln #Router
##🟠 CVE-2026-2203 - High (8.8)
A flaw has been found in Tenda AC8 16.03.33.05. Affected by this vulnerability is an unknown functionality of the file /goform/fast_setting_wifi_set of the component Embedded Httpd Service. This manipulation of the argument timeZone causes buffer ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2203/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2203 - High (8.8)
A flaw has been found in Tenda AC8 16.03.33.05. Affected by this vulnerability is an unknown functionality of the file /goform/fast_setting_wifi_set of the component Embedded Httpd Service. This manipulation of the argument timeZone causes buffer ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2203/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T00:30:29
1 posts
🔥 HIGH-severity: CVE-2026-2191 in Tenda AC9 (v15.03.06.42_multi) enables remote, unauthenticated code execution via stack overflow. Public exploit out — segment networks & disable remote admin. No patch yet. https://radar.offseq.com/threat/cve-2026-2191-stack-based-buffer-overflow-in-tenda-65760e1b #OffSeq #CVE20262191 #netsec #routers
##updated 2026-02-09T00:30:28
1 posts
1 repos
🚩 CVE-2026-2192 (HIGH): Stack-based buffer overflow in Tenda AC9 (15.03.06.42_multi). Remote, privileged attackers can fully compromise routers. Disable remote mgmt, restrict admin access, and monitor for patches. More: https://radar.offseq.com/threat/cve-2026-2192-stack-based-buffer-overflow-in-tenda-017bd58d #OffSeq #CVE #RouterSecurity
##updated 2026-02-08T21:30:19
2 posts
🟠 CVE-2026-2180 - High (8.8)
A vulnerability was identified in Tenda RX3 16.03.13.11. Affected is an unknown function of the file /goform/fast_setting_wifi_set. Such manipulation of the argument ssid_5g leads to stack-based buffer overflow. The attack can be launched remotely...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2180/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2180 - High (8.8)
A vulnerability was identified in Tenda RX3 16.03.13.11. Affected is an unknown function of the file /goform/fast_setting_wifi_set. Such manipulation of the argument ssid_5g leads to stack-based buffer overflow. The attack can be launched remotely...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2180/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-08T15:31:05
1 posts
🚨 CVE-2026-2157: HIGH severity OS command injection in D-Link DIR-823X (fw 250416) via /goform/set_static_route_table. Remote, no auth needed. Update firmware, segment networks, and restrict access! https://radar.offseq.com/threat/cve-2026-2157-os-command-injection-in-d-link-dir-8-f7732c6f #OffSeq #DLink #Vuln #Cybersecurity
##updated 2026-02-08T15:31:05
1 posts
🔥 CVE-2026-2152: HIGH-severity OS command injection in D-Link DIR-615 (v4.10, adv_routing.php). Remote, unauthenticated RCE possible; public exploits out. No patch — replace or isolate now! https://radar.offseq.com/threat/cve-2026-2152-os-command-injection-in-d-link-dir-6-1ad93e00 #OffSeq #Vulnerability #RouterSecurity #CVE20262152
##updated 2026-02-08T12:30:36
1 posts
⚠️ CVE-2026-2151: HIGH severity OS command injection in D-Link DIR-615 v4.10 (DMZ Host/adv_firewall.php) enables unauthenticated remote code execution. No patch — replace or isolate affected routers ASAP. https://radar.offseq.com/threat/cve-2026-2151-os-command-injection-in-d-link-dir-6-3276f328 #OffSeq #DLink #CVE20262151 #Infosec
##updated 2026-02-08T12:30:36
1 posts
7 repos
https://github.com/decalage2/detect_CVE-2026-21509
https://github.com/gavz/CVE-2026-21509-PoC
https://github.com/kimstars/Ashwesker-CVE-2026-21509
https://github.com/kaizensecurity/CVE-2026-21509
https://github.com/SimoesCTT/CTT-MICROSOFT-OFFICE-OLE-MANIFOLD-BYPASS-CVE-2026-21509
https://github.com/ksk-itdk/KSK-ITDK-CVE-2026-21509-Mitigation
⚪ APT28 group exploits new vulnerability in Microsoft Office
🗨️ Just three days after Microsoft released an out-of-band patch for Office, the APT28 group began exploiting the CVE-2026-21509 vulnerability in attacks against Ukrainian and European organizations.
##updated 2026-02-08T09:30:22
3 posts
1 repos
⚠️ CVE-2026-2140: High-severity buffer overflow in Tenda TX9 (≤22.03.02.10_multi) via /goform/setMacFilterCfg. Public exploit available; risks RCE & DoS. Restrict remote access & monitor traffic. Patch ASAP when available. https://radar.offseq.com/threat/cve-2026-2140-buffer-overflow-in-tenda-tx9-09ab607e #OffSeq #Vulnerability #Tenda #CVE20262140
##🟠 CVE-2026-2140 - High (8.8)
A vulnerability was identified in Tenda TX9 up to 22.03.02.10_multi. Affected by this issue is the function sub_4223E0 of the file /goform/setMacFilterCfg. Such manipulation of the argument deviceList leads to buffer overflow. The attack may be la...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2140/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2140 - High (8.8)
A vulnerability was identified in Tenda TX9 up to 22.03.02.10_multi. Affected by this issue is the function sub_4223E0 of the file /goform/setMacFilterCfg. Such manipulation of the argument deviceList leads to buffer overflow. The attack may be la...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2140/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-08T06:31:54
2 posts
1 repos
🟠 CVE-2026-2137 - High (8.8)
A vulnerability has been found in Tenda TX3 up to 16.03.13.11_multi. This impacts an unknown function of the file /goform/SetIpMacBind. The manipulation of the argument list leads to buffer overflow. The attack can be initiated remotely. The explo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2137/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2137 - High (8.8)
A vulnerability has been found in Tenda TX3 up to 16.03.13.11_multi. This impacts an unknown function of the file /goform/SetIpMacBind. The manipulation of the argument list leads to buffer overflow. The attack can be initiated remotely. The explo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2137/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-08T03:30:35
2 posts
🔴 CVE-2025-15027 - Critical (9.8)
The JAY Login & Register plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.6.03. This is due to the plugin allowing a user to update arbitrary user meta through the 'jay_login_register_ajax_create_f...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15027/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-15027 - Critical (9.8)
The JAY Login & Register plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.6.03. This is due to the plugin allowing a user to update arbitrary user meta through the 'jay_login_register_ajax_create_f...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15027/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-08T03:30:29
2 posts
🟠 CVE-2025-15100 - High (8.8)
The JAY Login & Register plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.6.03. This is due to the plugin allowing a user to update arbitrary user meta through the 'jay_panel_ajax_update_profile' f...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15100/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-15100 - High (8.8)
The JAY Login & Register plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.6.03. This is due to the plugin allowing a user to update arbitrary user meta through the 'jay_panel_ajax_update_profile' f...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15100/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-08T03:14:10
2 posts
1 repos
https://github.com/mbanyamer/CVE-2026-25546-godot-mcp-0.1.1-OS-Command-Injection
🟠 CVE-2026-25546 - High (7.8)
Godot MCP is a Model Context Protocol (MCP) server for interacting with the Godot game engine. Prior to version 0.1.1, a command injection vulnerability in godot-mcp allows remote code execution. The executeOperation function passed user-controlle...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25546/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25546 - High (7.8)
Godot MCP is a Model Context Protocol (MCP) server for interacting with the Godot game engine. Prior to version 0.1.1, a command injection vulnerability in godot-mcp allows remote code execution. The executeOperation function passed user-controlle...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25546/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-08T00:30:59
2 posts
⚠️ CVE-2026-25858 (CRITICAL): macrozheng mall ≤1.0.3 exposes OTP in API, letting attackers reset any user password with just a phone number. Disable reset flow & apply MFA now! https://radar.offseq.com/threat/cve-2026-25858-cwe-640-weak-password-recovery-mech-3ff06a38 #OffSeq #CVE202625858 #vuln
##⚠️ CRITICAL: CVE-2026-25858 in macrozheng mall ≤1.0.3 lets attackers reset any user’s password by exploiting a weak OTP process tied only to phone numbers. Disable reset, require MFA, and patch ASAP. https://radar.offseq.com/threat/cve-2026-25858-cwe-640-weak-password-recovery-mech-3ff06a38 #OffSeq #macrozhenmall #CVE202625858 #infosec
##updated 2026-02-07T15:30:14
2 posts
⚠️ CVE-2026-2086: HIGH-severity buffer overflow in UTT HiPER 810G (≤1.7.7-171114). Remote code execution possible, public exploit exists, no patch. Segment networks, disable remote mgmt, monitor for attacks. https://radar.offseq.com/threat/cve-2026-2086-buffer-overflow-in-utt-hiper-810g-43cb38da #OffSeq #UTT #Infosec #BufferOverflow
##🟠 CVE-2026-2086 - High (8.8)
A vulnerability was detected in UTT HiPER 810G up to 1.7.7-171114. Affected by this vulnerability is the function strcpy of the file /goform/formFireWall of the component Management Interface. The manipulation of the argument GroupName results in ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2086/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-07T03:30:18
1 posts
1 repos
🟠 CVE-2026-2071 - High (8.8)
A vulnerability was found in UTT 进取 520W 1.7.7-180627. The impacted element is the function strcpy of the file /goform/formP2PLimitConfig. Performing a manipulation of the argument except results in buffer overflow. The attack is possible to b...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2071/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T21:57:22.450000
4 posts
CVE-2026-2103 - Infor Syteline ERP
https://blog.blacklanternsecurity.com/p/cve-2026-2103-infor-syteline-erp
##CVE-2026-2103 - Infor Syteline ERP - Keys Included: No Assembly Required https://blog.blacklanternsecurity.com/p/cve-2026-2103-infor-syteline-erp
##CVE-2026-2103 - Infor Syteline ERP
https://blog.blacklanternsecurity.com/p/cve-2026-2103-infor-syteline-erp
##CVE-2026-2103 - Infor Syteline ERP - Keys Included: No Assembly Required https://blog.blacklanternsecurity.com/p/cve-2026-2103-infor-syteline-erp
##updated 2026-02-06T21:57:22.450000
3 posts
1 repos
📈 CVE Published in last 7 days (2026-02-02 - 2026-02-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1178
Severity:
- Critical: 93
- High: 363
- Medium: 498
- Low: 65
- None: 159
Status:
- : 9
- Analyzed: 94
- Awaiting Analysis: 636
- Modified: 2
- Received: 139
- Rejected: 20
- Undergoing Analysis: 278
Top CNAs:
- GitHub, Inc.: 225
- VulnCheck: 149
- VulDB: 134
- kernel.org: 79
- Wordfence: 71
- MITRE: 64
- wikimedia-foundation: 47
- Patchstack: 45
- Tanium: 26
- TPLink: 25
Top Affected Products:
- UNKNOWN: 1071
- Samsung Exynos 850 Firmware: 10
- Tp-link Archer Be230 Firmware: 10
- Samsung Exynos 980 Firmware: 10
- Samsung Exynos W920 Firmware: 10
- Samsung Exynos W1000 Firmware: 10
- Samsung Exynos 1080 Firmware: 10
- Samsung Exynos W930 Firmware: 10
- Samsung Exynos 1480 Firmware: 9
- Mediatek Nr15: 9
Top EPSS Score:
- CVE-2026-1802 - 1.28 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1802)
- CVE-2026-1499 - 1.23 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1499)
- CVE-2026-23515 - 0.91 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-23515)
- CVE-2020-37088 - 0.90 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-37088)
- CVE-2026-20098 - 0.90 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-20098)
- CVE-2020-37086 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-37086)
- CVE-2026-25643 - 0.47 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25643)
- CVE-2026-1761 - 0.46 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1761)
- CVE-2026-1731 - 0.44 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1731)
- CVE-2020-37125 - 0.43 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-37125)
🔴 CVE-2026-25643 - Critical (9.1)
Frigate is a network video recorder (NVR) with realtime local object detection for IP cameras. Prior to 0.16.4, a critical Remote Command Execution (RCE) vulnerability has been identified in the Frigate integration with go2rtc. The application doe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25643/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25643 - Critical (9.1)
Frigate is a network video recorder (NVR) with realtime local object detection for IP cameras. Prior to 0.16.4, a critical Remote Command Execution (RCE) vulnerability has been identified in the Frigate integration with go2rtc. The application doe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25643/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T21:57:22.450000
3 posts
1 repos
🟠 CVE-2026-25635 - High (8.6)
calibre is an e-book manager. Prior to 9.2.0, Calibre's CHM reader contains a path traversal vulnerability that allows arbitrary file writes anywhere the user has write permissions. On Windows (haven't tested on other OS's), this can lead to Remot...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25635/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25635 - High (8.6)
calibre is an e-book manager. Prior to 9.2.0, Calibre's CHM reader contains a path traversal vulnerability that allows arbitrary file writes anywhere the user has write permissions. On Windows (haven't tested on other OS's), this can lead to Remot...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25635/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25635 - High (8.6)
calibre is an e-book manager. Prior to 9.2.0, Calibre's CHM reader contains a path traversal vulnerability that allows arbitrary file writes anywhere the user has write permissions. On Windows (haven't tested on other OS's), this can lead to Remot...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25635/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T21:57:22.450000
1 posts
1 repos
🔴 CVE-2026-25592 - Critical (9.9)
Semantic Kernel is an SDK used to build, orchestrate, and deploy AI agents and multi-agent systems. Prior to 1.70.0, an Arbitrary File Write vulnerability has been identified in Microsoft's Semantic Kernel .NET SDK, specifically within the Ses...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25592/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T21:57:22.450000
2 posts
1 repos
🟠 CVE-2026-25731 - High (7.8)
calibre is an e-book manager. Prior to 9.2.0, a Server-Side Template Injection (SSTI) vulnerability in Calibre's Templite templating engine allows arbitrary code execution when a user converts an ebook using a malicious custom template file via th...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25731/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25731 - High (7.8)
calibre is an e-book manager. Prior to 9.2.0, a Server-Side Template Injection (SSTI) vulnerability in Calibre's Templite templating engine allows arbitrary code execution when a user converts an ebook using a malicious custom template file via th...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25731/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T21:57:22.450000
1 posts
🔴 CVE-2026-25586 - Critical (10)
SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, a sandbox escape is possible by shadowing hasOwnProperty on a sandbox object, which disables prototype whitelist enforcement in the property-access path. This permits direct access to ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25586/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T21:57:22.450000
1 posts
🟠 CVE-2026-23989 - High (8.2)
REVA is an interoperability platform. Prior to 2.42.3 and 2.40.3, a bug in the GRPC authorization middleware of the "Reva" component of OpenCloud allows a malicious user to bypass the scope verification of a public link. By exploiting this via the...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23989/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T21:44:00
2 posts
🟠 CVE-2026-25628 - High (8.5)
Qdrant is a vector similarity search engine and vector database. From 1.9.3 to before 1.16.0, it is possible to append to arbitrary files via /logger endpoint using an attacker-controlled on_disk.log_file path. Minimal privileges are required (rea...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25628/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25628 - High (8.5)
Qdrant is a vector similarity search engine and vector database. From 1.9.3 to before 1.16.0, it is possible to append to arbitrary files via /logger endpoint using an attacker-controlled on_disk.log_file path. Minimal privileges are required (rea...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25628/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T21:43:42
1 posts
🟠 CVE-2026-25593 - High (8.4)
OpenClaw is a personal AI assistant. Prior to 2026.1.20, an unauthenticated local client could use the Gateway WebSocket API to write config via config.apply and set unsafe cliPath values that were later used for command discovery, enabling comman...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25593/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T21:42:58
2 posts
🔴 CVE-2026-25641 - Critical (10)
SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, there is a sandbox escape vulnerability due to a mismatch between the key on which the validation is performed and the key used for accessing properties. Even though the key used in pr...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25641/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25641 - Critical (10)
SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, there is a sandbox escape vulnerability due to a mismatch between the key on which the validation is performed and the key used for accessing properties. Even though the key used in pr...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25641/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T21:42:28
1 posts
🟠 CVE-2026-25580 - High (8.6)
Pydantic AI is a Python agent framework for building applications and workflows with Generative AI. From 0.0.26 to before 1.56.0, aServer-Side Request Forgery (SSRF) vulnerability exists in Pydantic AI's URL download functionality. When applicatio...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25580/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T21:42:24
2 posts
🔴 CVE-2026-25520 - Critical (10)
SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, The return values of functions aren't wrapped. Object.values/Object.entries can be used to get an Array containing the host's Function constructor, by using Array.prototype.at you can ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25520/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25520 - Critical (10)
SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, The return values of functions aren't wrapped. Object.values/Object.entries can be used to get an Array containing the host's Function constructor, by using Array.prototype.at you can ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25520/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T21:38:16
1 posts
🟠 CVE-2025-70963 - High (7.6)
Gophish <=0.12.1 is vulnerable to Incorrect Access Control. The administrative dashboard exposes each user’s long-lived API key directly inside the rendered HTML/JavaScript of the page on every login. This makes permanent API credentials acce...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70963/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T21:30:58
1 posts
🟠 CVE-2026-2066 - High (8.8)
A weakness has been identified in UTT 进取 520W 1.7.7-180627. This affects the function strcpy of the file /goform/formIpGroupConfig. Executing a manipulation of the argument groupName can lead to buffer overflow. The attack can be launched remo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2066/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T19:43:47.703000
5 posts
1 repos
🚨 CVE-2025-11953 (Metro4Shell)
React Native Community CLI OS Command Injection Vulnerability
The Metro Development Server, which is opened by the React Native Community CLI, binds to external interfaces by default. The server exposes an endpoint that is vulnerable to OS command injection. This allows unauthenticated network attackers to send a POST request to the server and run arbitrary executables. On Windows, the attackers can also execute arbitrary shell commands with fully controlled arguments.
##⚪ Critical Metro4Shell Vulnerability Exploited to Breach Development Systems
🗨️ Attackers are actively exploiting the critical CVE-2025-11953 vulnerability in the React Native Metro server to infect developers’ systems with malware for Windows and Linux.
##CVE ID: CVE-2025-11953
Vendor: React Native Community
Product: CLI
Date Added: 2026-02-05
Notes: This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: ; https://github.com/react-native-community/cli/commit/15089907d1f1301b22c72d7f68846a2ef20df547;https://github.com/react-native-community/cli/pull/2735 ; https://nvd.nist.gov/vuln/detail/CVE-2025-11953
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-11953
New:
CISA Orders Federal Agencies to Strengthen Edge Device Security Amid Rising Cyber Threats https://www.cisa.gov/news-events/news/cisa-orders-federal-agencies-strengthen-edge-device-security-amid-rising-cyber-threats
CISA has also updated the KEV catalogue.
- CVE-2026-24423: SmarterTools SmarterMail Missing Authentication for Critical Function Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-24423
- CVE-2025-11953: React Native Community CLI OS Command Injection Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-11953
Five industrial vulnerabilities have also been added: https://www.cisa.gov/ #CISA #infosec #vulnerabilities
##‼️ CISA has added two vulnerabilities to the KEV Catalog
https://darkwebinformer.com/cisa-kev-catalog/
CVE-2026-24423: SmarterTools SmarterMail Missing Authentication for Critical Function Vulnerability:
SmarterTools SmarterMail contains a missing authentication for critical function vulnerability in the ConnectToHub API method. This could allow the attacker to point the SmarterMail instance to a malicious HTTP server which serves the malicious OS command and could lead to command execution.
CVE-2025-11953: React Native Community CLI OS Command Injection Vulnerability:
React Native Community CLI contains an OS command injection vulnerability which could allow unauthenticated network attackers to send POST requests to the Metro Development Server and run arbitrary executables via a vulnerable endpoint exposed by the server. On Windows, attackers can also execute arbitrary shell commands with fully controlled arguments.
##updated 2026-02-06T19:16:09.483000
1 posts
🔴 CVE-2026-25505 - Critical (9.8)
Bambuddy is a self-hosted print archive and management system for Bambu Lab 3D printers. Prior to version 0.1.7, a hardcoded secret key used for signing JWTs is checked into source code and ManyAPI routes do not check authentication. This issue ha...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25505/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T18:31:38
1 posts
🔴 CVE-2025-70073 - Critical (9.8)
An issue in ChestnutCMS v.1.5.8 and before allows a remote attacker to execute arbitrary code via the template creation function
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70073/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T18:30:29
8 posts
1 repos
Global news highlights include the kickoff of the 2026 Winter Olympics in Italy (Feb 7). In technology, OpenAI launched its Frontier enterprise AI agent platform. Apple acquired AI startup Q.AI for $2B, while Google reported significant AI-driven profit gains. Intel and AMD warned of server CPU shortages impacting China due to AI demand. The EU is also scrutinizing TikTok's "addictive design".
Cybersecurity saw CISA warn of a critical SmarterMail vulnerability (CVE-2026-24423) actively exploited in ransomware campaigns (Feb 7). Italian authorities thwarted Russian cyberattacks targeting government and Olympic-related websites. A rise in AI-driven phishing attacks was also reported.
##Global news highlights include the kickoff of the 2026 Winter Olympics in Italy (Feb 7). In technology, OpenAI launched its Frontier enterprise AI agent platform. Apple acquired AI startup Q.AI for $2B, while Google reported significant AI-driven profit gains. Intel and AMD warned of server CPU shortages impacting China due to AI demand. The EU is also scrutinizing TikTok's "addictive design".
Cybersecurity saw CISA warn of a critical SmarterMail vulnerability (CVE-2026-24423) actively exploited in ransomware campaigns (Feb 7). Italian authorities thwarted Russian cyberattacks targeting government and Olympic-related websites. A rise in AI-driven phishing attacks was also reported.
##"CISA warns of SmarterMail RCE flaw used in ransomware attacks"
"[...] has issued a warning about CVE-2026-24423, an unauthenticated remote code execution (RCE) flaw in SmarterMail that is used in ransomware attacks. The Cybersecurity & Infrastructure Security Agency (CISA) in the U.S."
##CISA warns of SmarterMail RCE flaw used in ransomware attacks
The Cybersecurity & Infrastructure Security Agency (CISA) in the U.S. has issued a warning about CVE-2026-24423, an unauthenticated remote code...
🔗️ [Bleepingcomputer] https://link.is.it/Kkych1
##CVE-2026-24423 - Changed to Known Ransomware Status
SmarterTools SmarterMail Missing Authentication for Critical Function VulnerabilityVendor: SmarterToolsProduct: SmarterMailSmarterTools SmarterMail contains a missing authentication for critical function vulnerability in the ConnectToHub API method. This could allow the attacker to point the SmarterMail instance to a malicious HTTP server which serves the malicious OS command and could lead https://nvd.nist.gov/vuln/detail/CVE-2026-24423
##CVE ID: CVE-2026-24423
Vendor: SmarterTools
Product: SmarterMail
Date Added: 2026-02-05
Notes: https://www.smartertools.com/smartermail/release-notes/current ; https://www.cve.org/CVERecord?id=CVE-2026-24423 ; https://nvd.nist.gov/vuln/detail/CVE-2026-24423
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-24423
New:
CISA Orders Federal Agencies to Strengthen Edge Device Security Amid Rising Cyber Threats https://www.cisa.gov/news-events/news/cisa-orders-federal-agencies-strengthen-edge-device-security-amid-rising-cyber-threats
CISA has also updated the KEV catalogue.
- CVE-2026-24423: SmarterTools SmarterMail Missing Authentication for Critical Function Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-24423
- CVE-2025-11953: React Native Community CLI OS Command Injection Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-11953
Five industrial vulnerabilities have also been added: https://www.cisa.gov/ #CISA #infosec #vulnerabilities
##‼️ CISA has added two vulnerabilities to the KEV Catalog
https://darkwebinformer.com/cisa-kev-catalog/
CVE-2026-24423: SmarterTools SmarterMail Missing Authentication for Critical Function Vulnerability:
SmarterTools SmarterMail contains a missing authentication for critical function vulnerability in the ConnectToHub API method. This could allow the attacker to point the SmarterMail instance to a malicious HTTP server which serves the malicious OS command and could lead to command execution.
CVE-2025-11953: React Native Community CLI OS Command Injection Vulnerability:
React Native Community CLI contains an OS command injection vulnerability which could allow unauthenticated network attackers to send POST requests to the Metro Development Server and run arbitrary executables via a vulnerable endpoint exposed by the server. On Windows, attackers can also execute arbitrary shell commands with fully controlled arguments.
##updated 2026-02-06T16:16:14.713000
1 posts
1 repos
🟠 CVE-2025-69906 - High (8.8)
Monstra CMS v3.0.4 contains an arbitrary file upload vulnerability in the Files Manager plugin. The application relies on blacklist-based file extension validation and stores uploaded files directly in a web-accessible directory. Under typical ser...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-69906/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T15:14:47.703000
2 posts
📈 CVE Published in last 7 days (2026-02-02 - 2026-02-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1178
Severity:
- Critical: 93
- High: 363
- Medium: 498
- Low: 65
- None: 159
Status:
- : 9
- Analyzed: 94
- Awaiting Analysis: 636
- Modified: 2
- Received: 139
- Rejected: 20
- Undergoing Analysis: 278
Top CNAs:
- GitHub, Inc.: 225
- VulnCheck: 149
- VulDB: 134
- kernel.org: 79
- Wordfence: 71
- MITRE: 64
- wikimedia-foundation: 47
- Patchstack: 45
- Tanium: 26
- TPLink: 25
Top Affected Products:
- UNKNOWN: 1071
- Samsung Exynos 850 Firmware: 10
- Tp-link Archer Be230 Firmware: 10
- Samsung Exynos 980 Firmware: 10
- Samsung Exynos W920 Firmware: 10
- Samsung Exynos W1000 Firmware: 10
- Samsung Exynos 1080 Firmware: 10
- Samsung Exynos W930 Firmware: 10
- Samsung Exynos 1480 Firmware: 9
- Mediatek Nr15: 9
Top EPSS Score:
- CVE-2026-1802 - 1.28 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1802)
- CVE-2026-1499 - 1.23 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1499)
- CVE-2026-23515 - 0.91 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-23515)
- CVE-2020-37088 - 0.90 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-37088)
- CVE-2026-20098 - 0.90 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-20098)
- CVE-2020-37086 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-37086)
- CVE-2026-25643 - 0.47 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25643)
- CVE-2026-1761 - 0.46 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1761)
- CVE-2026-1731 - 0.44 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1731)
- CVE-2020-37125 - 0.43 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-37125)
🔴 CVE-2026-1499 - Critical (9.8)
The WP Duplicate plugin for WordPress is vulnerable to Missing Authorization leading to Arbitrary File Upload in all versions up to and including 1.1.8. This is due to a missing capability check on the `process_add_site()` AJAX action combined wit...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1499/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T15:14:47.703000
2 posts
1 repos
ahhh… la bonne vuln critique du vendredi qui sent le café ☕️
🕵️♂️ CVE-2026-21643
D’après la fiche : SQL Injection (improper neutralization of special elements used in an SQL command) dans Fortinet FortiClientEMS 7.4.4
➡️ pourrait permettre à un attaquant non authentifié d’exécuter du code/commandes via des requêtes HTTP spécialement forgées.
RCE “unauth” sur un produit exposé, quelle surprise… 🙃
il me manque un traversal path dans l'histoire pour être définitivement comblé
may or may not, qui sait…
attendons l’advisory officiel avant de sortir les fourches (ou les patchs).
👇
https://cve.circl.lu/vuln/CVE-2026-21643 👀
🔴 CVE-2026-21643 - Critical (9.8)
An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiClientEMS 7.4.4 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP req...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21643/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T15:14:47.703000
1 posts
1 repos
🔴 CVE-2026-2017 - Critical (9.8)
A vulnerability was detected in IP-COM W30AP up to 1.0.0.11(1340). Affected by this issue is the function R7WebsSecurityHandler of the file /goform/wx3auth of the component POST Request Handler. The manipulation of the argument data results in sta...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2017/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T15:14:47.703000
1 posts
🔴 CVE-2026-0106 - Critical (9.3)
In vpu_mmap of vpu_ioctl, there is a possible arbitrary address mmap due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0106/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T09:31:30
1 posts
Mitsubishi Electric Patches Critical Remote Takeover Flaw in MELSEC iQ-R Series PLCs
Mitsubishi Electric patched a critical vulnerability (CVE-2025-15080) in MELSEC iQ-R Series PLCs that allows unauthenticated remote attackers to read or tamper with control data and cause system outages.
**Make sure all MELSEC iQ-R Series PLCs are isolated from the public internet and accessible only from trusted networks. Then plan an update to firmware version 49.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/mitsubishi-electric-patches-critical-remote-takeover-flaw-in-melsec-iq-r-series-plcs-y-b-o-n-n/gD2P6Ple2L
updated 2026-02-06T09:30:35
1 posts
🟠 CVE-2026-24926 - High (8.4)
Out-of-bounds write vulnerability in the camera module.
Impact: Successful exploitation of this vulnerability may affect availability.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24926/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T06:30:28
2 posts
CVE-2025-15566 #devopsish #kubernetes #cve https://github.com/kubernetes/kubernetes/issues/136789
##🟠 CVE-2025-15566 - High (8.8)
A security issue was discovered in ingress-nginx where the `nginx.ingress.kubernetes.io/auth-proxy-set-headers` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ing...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15566/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T00:30:37
1 posts
🟠 CVE-2026-24302 - High (8.6)
Azure Arc Elevation of Privilege Vulnerability
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24302/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T00:30:32
1 posts
https://winbuzzer.com/2026/02/06/cve-2026-0391-microsoft-edge-android-ui-spoofing-xcxwbn/
CVE-2026-0391: Edge Android Flaw Enables Spoofing Attacks
#MicrosoftEdge #Security #Cybersecurity #Microsoft #Android #WebBrowsers #Phishing #CredentialTheft #ZeroDayVulnerabilities #Chromium
##updated 2026-02-06T00:30:32
1 posts
1 repos
🟠 CVE-2026-21532 - High (8.2)
Azure Function Information Disclosure Vulnerability
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21532/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-05T21:21:13.780000
1 posts
🟠 CVE-2026-20983 - High (7.8)
Improper export of android application components in Samsung Dialer prior to SMR Feb-2026 Release 1 allows local attackers to launch arbitrary activity with Samsung Dialer privilege.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20983/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-05T21:15:51.963000
2 posts
1 repos
🔴 CVE-2025-68721 - Critical (9.1)
Axigen Mail Server before 10.5.57 contains an improper access control vulnerability in the WebAdmin interface. A delegated admin account with zero permissions can bypass access control checks and gain unauthorized access to the SSL Certificates ma...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-68721/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-68721 - Critical (9.1)
Axigen Mail Server before 10.5.57 contains an improper access control vulnerability in the WebAdmin interface. A delegated admin account with zero permissions can bypass access control checks and gain unauthorized access to the SSL Certificates ma...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-68721/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-05T21:15:46.767000
1 posts
🟠 CVE-2026-20979 - High (7.8)
Improper privilege management in Settings prior to SMR Feb-2026 Release 1 allows local attackers to launch arbitrary activity with Settings privilege.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20979/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-05T20:47:37.777000
1 posts
🟠 CVE-2025-15311 - High (7.8)
Tanium addressed an unauthorized code execution vulnerability in Tanium Appliance.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15311/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-05T20:42:20.263000
1 posts
🟠 CVE-2026-25056 - High (8.8)
n8n is an open source workflow automation platform. Prior to versions 1.118.0 and 2.4.0, a vulnerability in the Merge node's SQL Query mode allowed authenticated users with permission to create or modify workflows to write arbitrary files to the n...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25056/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-05T20:41:47.613000
1 posts
🟠 CVE-2026-25055 - High (8.1)
n8n is an open source workflow automation platform. Prior to versions 1.123.12 and 2.4.0, when workflows process uploaded files and transfer them to remote servers via the SSH node without validating their metadata the vulnerability can lead to fi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25055/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-05T20:15:52.003000
1 posts
updated 2026-02-05T19:15:56.253000
1 posts
1 repos
🔴 CVE-2026-25539 - Critical (9.1)
SiYuan is a personal knowledge management system. Prior to version 3.5.5, the /api/file/copyFile endpoint does not validate the dest parameter, allowing authenticated users to write files to arbitrary locations on the filesystem. This can lead to ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25539/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-05T18:30:36
1 posts
📈 CVE Published in last 7 days (2026-02-02 - 2026-02-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1178
Severity:
- Critical: 93
- High: 363
- Medium: 498
- Low: 65
- None: 159
Status:
- : 9
- Analyzed: 94
- Awaiting Analysis: 636
- Modified: 2
- Received: 139
- Rejected: 20
- Undergoing Analysis: 278
Top CNAs:
- GitHub, Inc.: 225
- VulnCheck: 149
- VulDB: 134
- kernel.org: 79
- Wordfence: 71
- MITRE: 64
- wikimedia-foundation: 47
- Patchstack: 45
- Tanium: 26
- TPLink: 25
Top Affected Products:
- UNKNOWN: 1071
- Samsung Exynos 850 Firmware: 10
- Tp-link Archer Be230 Firmware: 10
- Samsung Exynos 980 Firmware: 10
- Samsung Exynos W920 Firmware: 10
- Samsung Exynos W1000 Firmware: 10
- Samsung Exynos 1080 Firmware: 10
- Samsung Exynos W930 Firmware: 10
- Samsung Exynos 1480 Firmware: 9
- Mediatek Nr15: 9
Top EPSS Score:
- CVE-2026-1802 - 1.28 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1802)
- CVE-2026-1499 - 1.23 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1499)
- CVE-2026-23515 - 0.91 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-23515)
- CVE-2020-37088 - 0.90 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-37088)
- CVE-2026-20098 - 0.90 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-20098)
- CVE-2020-37086 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-37086)
- CVE-2026-25643 - 0.47 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25643)
- CVE-2026-1761 - 0.46 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1761)
- CVE-2026-1731 - 0.44 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1731)
- CVE-2020-37125 - 0.43 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-37125)
updated 2026-02-05T18:09:05.780000
1 posts
🔴 CVE-2026-25233 - Critical (9.1)
PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, logic bug in the roadmap role check allows non-lead maintainers to create, update, or delete roadmaps. This issue has been patched in version 1.33.0.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25233/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-05T18:07:35.470000
1 posts
1 repos
🟠 CVE-2026-25235 - High (7.5)
PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, predictable verification hashes may allow attackers to guess verification tokens and potentially verify election account requests without authorizati...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25235/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-05T18:06:21.580000
1 posts
🔴 CVE-2026-25236 - Critical (9.8)
PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, a SQL injection risk exists in karma queries due to unsafe literal substitution for an IN (...) list. This issue has been patched in version 1.33.0.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25236/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-05T18:01:30.977000
1 posts
1 repos
🔴 CVE-2026-25238 - Critical (9.8)
PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, a SQL injection vulnerability in bug subscription deletion may allow attackers to inject SQL via a crafted email value. This issue has been patched i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25238/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-05T17:56:13.807000
1 posts
🔴 CVE-2026-25240 - Critical (9.8)
PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, a SQL injection vulnerability can occur in user::maintains() when role filters are provided as an array and interpolated into an IN (...) clause. Thi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25240/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-05T17:55:10.430000
1 posts
🔴 CVE-2026-25241 - Critical (9.8)
PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, an unauthenticated SQL injection in the /get// endpoint allows remote attackers to execute arbitrary SQL via a crafted package version. This issue ha...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25241/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-05T16:15:50.200000
1 posts
1 repos
🔴 CVE-2025-46651 - Critical (9.1)
Tiny File Manager through 2.6 contains a server-side request forgery (SSRF) vulnerability in the URL upload feature. Due to insufficient validation of user-supplied URLs, an attacker can send crafted requests to localhost by using http://www.127.0...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-46651/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-05T15:32:15
1 posts
1 repos
🟠 CVE-2025-71031 - High (7.5)
Water-Melon Melon commit 9df9292 and below is vulnerable to Denial of Service. The HTTP component doesn't have any maximum length. As a result, an excessive request header could cause a denial of service by consuming RAM memory.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-71031/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-05T15:32:11
1 posts
🔴 CVE-2025-67188 - Critical (9.8)
A buffer overflow vulnerability exists in TOTOLINK A950RG V4.1.2cu.5204_B20210112. The issue resides in the setRadvdCfg interface of the /lib/cste_modules/ipv6.so module. The function fails to properly validate the length of the user-controlled ra...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-67188/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-05T15:31:15
1 posts
🟠 CVE-2025-13379 - High (8.6)
IBM Aspera Console 3.4.0 through 3.4.8 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify, or delete information in the back-end database.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-13379/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-05T15:16:07.337000
1 posts
🔴 CVE-2025-67189 - Critical (9.8)
A buffer overflow vulnerability exists in the setParentalRules interface of TOTOLINK A950RG V4.1.2cu.5204_B20210112. The urlKeyword parameter is not properly validated, and the function concatenates multiple user-controlled fields into a fixed-siz...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-67189/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-05T15:16:06.870000
2 posts
🟠 CVE-2025-61732 - High (8.6)
A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-61732/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-61732 - High (8.6)
A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-61732/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-05T14:57:34.297000
1 posts
📈 CVE Published in last 7 days (2026-02-02 - 2026-02-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1178
Severity:
- Critical: 93
- High: 363
- Medium: 498
- Low: 65
- None: 159
Status:
- : 9
- Analyzed: 94
- Awaiting Analysis: 636
- Modified: 2
- Received: 139
- Rejected: 20
- Undergoing Analysis: 278
Top CNAs:
- GitHub, Inc.: 225
- VulnCheck: 149
- VulDB: 134
- kernel.org: 79
- Wordfence: 71
- MITRE: 64
- wikimedia-foundation: 47
- Patchstack: 45
- Tanium: 26
- TPLink: 25
Top Affected Products:
- UNKNOWN: 1071
- Samsung Exynos 850 Firmware: 10
- Tp-link Archer Be230 Firmware: 10
- Samsung Exynos 980 Firmware: 10
- Samsung Exynos W920 Firmware: 10
- Samsung Exynos W1000 Firmware: 10
- Samsung Exynos 1080 Firmware: 10
- Samsung Exynos W930 Firmware: 10
- Samsung Exynos 1480 Firmware: 9
- Mediatek Nr15: 9
Top EPSS Score:
- CVE-2026-1802 - 1.28 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1802)
- CVE-2026-1499 - 1.23 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1499)
- CVE-2026-23515 - 0.91 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-23515)
- CVE-2020-37088 - 0.90 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-37088)
- CVE-2026-20098 - 0.90 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-20098)
- CVE-2020-37086 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-37086)
- CVE-2026-25643 - 0.47 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25643)
- CVE-2026-1761 - 0.46 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1761)
- CVE-2026-1731 - 0.44 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1731)
- CVE-2020-37125 - 0.43 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-37125)
updated 2026-02-05T14:57:20.563000
1 posts
🟠 CVE-2025-13192 - High (8.2)
The Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers plugin for WordPress is vulnerable to generic SQL Injection via the multiple REST API endpoints in all versions up to, and including, 2.2.0 due ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-13192/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-05T14:57:20.563000
1 posts
🟠 CVE-2026-25584 - High (7.8)
iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.3, there is a stack-buffer-overflow vulnerability in CIccTagFloatNum::GetValues(). ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25584/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-05T14:57:20.563000
1 posts
🟠 CVE-2026-25582 - High (7.8)
iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.3, there is a heap buffer overflow (read) vulnerability in CIccIO::WriteUInt16Float...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25582/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-05T14:57:20.563000
1 posts
🟠 CVE-2026-24844 - High (7.9)
melange allows users to build apk packages using declarative pipelines. From version 0.3.0 to before 0.40.3, an attacker who can provide build input values, but not modify pipeline definitions, could execute arbitrary shell commands if the pipelin...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24844/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-05T14:57:20.563000
2 posts
🟠 CVE-2026-25143 - High (7.8)
melange allows users to build apk packages using declarative pipelines. From version 0.10.0 to before 0.40.3, an attacker who can influence inputs to the patch pipeline could execute arbitrary shell commands on the build host. The patch pipeline i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25143/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25143 - High (7.8)
melange allows users to build apk packages using declarative pipelines. From version 0.10.0 to before 0.40.3, an attacker who can influence inputs to the patch pipeline could execute arbitrary shell commands on the build host. The patch pipeline i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25143/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-05T14:57:20.563000
1 posts
🟠 CVE-2026-25161 - High (8.8)
Alist is a file list program that supports multiple storages, powered by Gin and Solidjs. Prior to version 3.57.0, the application contains path traversal vulnerability in multiple file operation handlers. An authenticated attacker can bypass dire...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25161/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-05T03:30:23
1 posts
1 repos
CVE-2025-11730: Remote Code Execution via DDNS configuration in ZYXEL ATP/USG Series (V5.41) https://rainpwn.blog/blog/cve-2025-11730/
##updated 2026-02-05T03:30:23
1 posts
🟠 CVE-2025-10314 - High (8.8)
Incorrect Default Permissions vulnerability in Mitsubishi Electric Corporation FREQSHIP-mini for Windows versions 8.0.0 to 8.0.2 allows a local attacker to execute arbitrary code with system privileges by replacing service executable files (EXE) o...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-10314/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-04T21:56:26
2 posts
🟠 CVE-2026-25157 - High (7.7)
OpenClaw is a personal AI assistant. Prior to version 2026.1.29, there is an OS command injection vulnerability via the Project Root Path in sshNodeCommand. The sshNodeCommand function constructed a shell script without properly escaping the user-...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25157/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25157 - High (7.7)
OpenClaw is a personal AI assistant. Prior to version 2026.1.29, there is an OS command injection vulnerability via the Project Root Path in sshNodeCommand. The sshNodeCommand function constructed a shell script without properly escaping the user-...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25157/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-04T21:55:36
1 posts
1 repos
🟠 CVE-2026-24884 - High (8.4)
Compressing is a compressing and uncompressing lib for node. In version 2.0.0 and 1.10.3 and prior, Compressing extracts TAR archives while restoring symbolic links without validating their targets. By embedding symlinks that resolve outside the i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24884/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-04T21:55:12
1 posts
🟠 CVE-2026-23897 - High (7.5)
Apollo Server is an open-source, spec-compliant GraphQL server that's compatible with any GraphQL client, including Apollo Client. In versions from 2.0.0 to 3.13.0, 4.2.0 to before 4.13.0, and 5.0.0 to before 5.4.0, the default configuration of st...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23897/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-04T21:30:43
1 posts
🔴 CVE-2025-13375 - Critical (9.8)
IBM Common Cryptographic Architecture (CCA) 7.5.52 and 8.4.82 could allow an unauthenticated user to execute arbitrary commands with elevated privileges on the system.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-13375/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-04T21:30:32
1 posts
🟠 CVE-2025-59439 - High (7.5)
An issue was discovered in Samsung Mobile Processor, Wearable Processor and Modem Exynos 980, 990, 850, 1080, 9110, W920, W930, W1000 and Modem 5123. Incorrect handling of NAS Registration messages leads to a Denial of Service because of Improper ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-59439/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-04T21:30:32
1 posts
🟠 CVE-2025-69875 - High (7.8)
A vulnerability exists in Quick Heal Total Security 23.0.0 in the quarantine management component where insufficient validation of restore paths and improper permission handling allow a low-privileged local user to restore quarantined files into p...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-69875/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-04T21:30:30
1 posts
1 repos
🟠 CVE-2026-25027 - High (7.5)
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeMove Unicamp unicamp allows PHP Local File Inclusion.This issue affects Unicamp: from n/a through <= 2.7.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25027/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-04T21:09:38
8 posts
1 repos
🔴 CVE-2026-25049 - Critical (9.9)
n8n is an open source workflow automation platform. Prior to versions 1.123.17 and 2.5.2, an authenticated user with permission to create or modify workflows could abuse crafted expressions in workflow parameters to trigger unintended system comma...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25049/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Collectively tracked as CVE-2026-25049, the issues can be exploited by any authenticated user who can create or edit workflows on the platform to perform unrestricted remote code execution on the n8n server. https://www.bleepingcomputer.com/news/security/critical-n8n-flaws-disclosed-along-with-public-exploits/
##CVE-2026-25049 highlights weaknesses in sandboxing user-defined JavaScript expressions within n8n workflows.
Multiple research teams demonstrated authenticated sandbox escape leading to unrestricted RCE, credential exposure, filesystem access, cloud pivoting, and AI workflow manipulation. The issue stems from incomplete AST-based sandboxing and runtime enforcement gaps.
Fixes have been released, and mitigation guidance includes updating, rotating secrets, and restricting workflow permissions.
💬 What lessons does this case offer for securing automation platforms?
➕ Follow TechNadu for accurate, vendor-neutral infosec reporting.
#Infosec #CVE #n8n #SandboxEscape #RCE #CloudSecurity #DevSecOps
##n8n : la faille critique CVE-2026-25049 réactive une précédente vulnérabilité https://www.it-connect.fr/n8n-cve-2026-25049-execution-code-a-distance/ #ActuCybersécurité #Cybersécurité #Vulnérabilité
##It seems that the recent #n8n CVE-2026-25049 is (EDIT: or was? My e-mail got answered with a generic response by an AI assistant) not only exploitable on self-hosted instances, but also in the n8n cloud. At least this is what the URL briefly visible in this video indicates. https://www.youtube.com/watch?v=QLrm7jx8kew (skip to 0:15 for a clear shot).
##Critical Sandbox Escapes in n8n AI Platform Enable Full Server Takeover
n8n patched another critical sandbox escape vulnerabilities (CVE-2026-25049) that allow authenticated users to execute arbitrary code and steal sensitive AI and cloud credentials.
**This is another important and urgent flaw in n8n. Update your n8n instances to the latest version ASAP and rotate all stored API keys and encryption secrets. Since these flaws allow full server takeover, you must assume any credentials stored in an unpatched instance are already compromised.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-sandbox-escapes-in-n8n-ai-platform-enable-full-server-takeover-h-k-y-o-v/gD2P6Ple2L
2026: New N8N RCE Deep Dive into CVE-2026-25049 https://blog.securelayer7.net/cve-2026-25049/
##‼️CVE-2026-25049: N8n AI Workflow Remote Code Execution
"This vulnerability allows an attacker to execute arbitrary system commands through misconfigured or insecure AI workflow execution paths. When chained correctly, it can lead to full server compromise depending on deployment configuration."
Video Credit: youtube.com/@SecureLayer7
##updated 2026-02-04T19:53:39
1 posts
1 repos
🔴 CVE-2026-25052 - Critical (9.9)
n8n is an open source workflow automation platform. Prior to versions 1.123.18 and 2.5.0, a vulnerability in the file access controls allows authenticated users with permission to create or modify workflows to read sensitive files from the n8n hos...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25052/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-04T19:42:05
1 posts
🔴 CVE-2026-25115 - Critical (9.9)
n8n is an open source workflow automation platform. Prior to version 2.4.8, a vulnerability in the Python Code node allows authenticated users to break out of the Python sandbox environment and execute code outside the intended security boundary. ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25115/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-04T18:31:36
1 posts
🟠 CVE-2025-60865 - High (7.8)
Insecure Permissions vulnerability in avanquest Driver Updater v.9.1.57803.1174 allows a local attacker to escalate privileges via the Driver Updater Service windows component.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-60865/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-04T17:16:09.180000
1 posts
🔴 CVE-2025-63624 - Critical (9.8)
SQL Injection vulnerability in Shandong Kede Electronics Co., Ltd IoT smart water meter monitoring platform v.1.0 allows a remote attacker to execute arbitrary code via the imei_list.aspx file.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-63624/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-04T16:34:21.763000
3 posts
1 repos
If you have Ivanti EPMM, please follow these instructions.
“Technical Analysis updated with reliable Indicators of Compromise (IoC’s). Both in partnership with NCSC-NL.”
The Dutchies are at it again!🤘🇳🇱
#EPMM #CVE20261281 #CVE20261340 #Ivanti #Cybersecurity #infosec #ioc
##This Ivanti Endpoint Manager Mobile (IPMM) security advisory seems to fit the timeline of the incident: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US
##Someone Knows Bash Far Too Well, And We Love It (Ivanti EPMM Pre-Auth RCEs CVE-2026-1281 and CVE-2026-1340) https://labs.watchtowr.com/someone-knows-bash-far-too-well-and-we-love-it-ivanti-epmm-pre-auth-rces-cve-2026-1281-cve-2026-1340/
##updated 2026-02-04T16:33:44.537000
1 posts
📈 CVE Published in last 7 days (2026-02-02 - 2026-02-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1178
Severity:
- Critical: 93
- High: 363
- Medium: 498
- Low: 65
- None: 159
Status:
- : 9
- Analyzed: 94
- Awaiting Analysis: 636
- Modified: 2
- Received: 139
- Rejected: 20
- Undergoing Analysis: 278
Top CNAs:
- GitHub, Inc.: 225
- VulnCheck: 149
- VulDB: 134
- kernel.org: 79
- Wordfence: 71
- MITRE: 64
- wikimedia-foundation: 47
- Patchstack: 45
- Tanium: 26
- TPLink: 25
Top Affected Products:
- UNKNOWN: 1071
- Samsung Exynos 850 Firmware: 10
- Tp-link Archer Be230 Firmware: 10
- Samsung Exynos 980 Firmware: 10
- Samsung Exynos W920 Firmware: 10
- Samsung Exynos W1000 Firmware: 10
- Samsung Exynos 1080 Firmware: 10
- Samsung Exynos W930 Firmware: 10
- Samsung Exynos 1480 Firmware: 9
- Mediatek Nr15: 9
Top EPSS Score:
- CVE-2026-1802 - 1.28 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1802)
- CVE-2026-1499 - 1.23 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1499)
- CVE-2026-23515 - 0.91 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-23515)
- CVE-2020-37088 - 0.90 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-37088)
- CVE-2026-20098 - 0.90 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-20098)
- CVE-2020-37086 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-37086)
- CVE-2026-25643 - 0.47 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25643)
- CVE-2026-1761 - 0.46 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1761)
- CVE-2026-1731 - 0.44 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1731)
- CVE-2020-37125 - 0.43 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-37125)
updated 2026-02-04T16:33:44.537000
1 posts
1 repos
📈 CVE Published in last 7 days (2026-02-02 - 2026-02-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1178
Severity:
- Critical: 93
- High: 363
- Medium: 498
- Low: 65
- None: 159
Status:
- : 9
- Analyzed: 94
- Awaiting Analysis: 636
- Modified: 2
- Received: 139
- Rejected: 20
- Undergoing Analysis: 278
Top CNAs:
- GitHub, Inc.: 225
- VulnCheck: 149
- VulDB: 134
- kernel.org: 79
- Wordfence: 71
- MITRE: 64
- wikimedia-foundation: 47
- Patchstack: 45
- Tanium: 26
- TPLink: 25
Top Affected Products:
- UNKNOWN: 1071
- Samsung Exynos 850 Firmware: 10
- Tp-link Archer Be230 Firmware: 10
- Samsung Exynos 980 Firmware: 10
- Samsung Exynos W920 Firmware: 10
- Samsung Exynos W1000 Firmware: 10
- Samsung Exynos 1080 Firmware: 10
- Samsung Exynos W930 Firmware: 10
- Samsung Exynos 1480 Firmware: 9
- Mediatek Nr15: 9
Top EPSS Score:
- CVE-2026-1802 - 1.28 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1802)
- CVE-2026-1499 - 1.23 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1499)
- CVE-2026-23515 - 0.91 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-23515)
- CVE-2020-37088 - 0.90 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-37088)
- CVE-2026-20098 - 0.90 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-20098)
- CVE-2020-37086 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-37086)
- CVE-2026-25643 - 0.47 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25643)
- CVE-2026-1761 - 0.46 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1761)
- CVE-2026-1731 - 0.44 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1731)
- CVE-2020-37125 - 0.43 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-37125)
updated 2026-02-04T02:00:02.030000
2 posts
Here's a summary of the latest important global, technology, and cybersecurity news from the last 24 hours:
**Global:** The US and Russia's New START treaty expired February 5, raising nuclear stability concerns. Israeli airstrikes killed at least 21 Palestinians in Gaza on February 4.
**Technology:** Intel launched new AI chips to challenge Nvidia, and Microsoft/Apple expanded AI tools. SpaceX acquired xAI to advance orbital data centers on February 5. AI is now central to business, drawing half of global startup funding.
**Cybersecurity:** A ransomware group allegedly hit a US airport on February 4. CISA added an actively exploited SolarWinds RCE vulnerability (CVE-2025-40551) to its KEV catalog. Gartner outlined top 2026 cyber trends, including Agentic AI oversight and post-quantum computing.
##The vulnerability under attack, CVE-2025-40551, is an untrusted deserialization flaw that can lead to remote code execution, allowing a remote, unauthenticated attacker to execute OS commands on the affected system. https://www.theregister.com/2026/02/04/critical_solarwinds_web_help_desk/
##updated 2026-02-04T00:30:41
1 posts
📈 CVE Published in last 7 days (2026-02-02 - 2026-02-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1178
Severity:
- Critical: 93
- High: 363
- Medium: 498
- Low: 65
- None: 159
Status:
- : 9
- Analyzed: 94
- Awaiting Analysis: 636
- Modified: 2
- Received: 139
- Rejected: 20
- Undergoing Analysis: 278
Top CNAs:
- GitHub, Inc.: 225
- VulnCheck: 149
- VulDB: 134
- kernel.org: 79
- Wordfence: 71
- MITRE: 64
- wikimedia-foundation: 47
- Patchstack: 45
- Tanium: 26
- TPLink: 25
Top Affected Products:
- UNKNOWN: 1071
- Samsung Exynos 850 Firmware: 10
- Tp-link Archer Be230 Firmware: 10
- Samsung Exynos 980 Firmware: 10
- Samsung Exynos W920 Firmware: 10
- Samsung Exynos W1000 Firmware: 10
- Samsung Exynos 1080 Firmware: 10
- Samsung Exynos W930 Firmware: 10
- Samsung Exynos 1480 Firmware: 9
- Mediatek Nr15: 9
Top EPSS Score:
- CVE-2026-1802 - 1.28 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1802)
- CVE-2026-1499 - 1.23 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1499)
- CVE-2026-23515 - 0.91 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-23515)
- CVE-2020-37088 - 0.90 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-37088)
- CVE-2026-20098 - 0.90 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-20098)
- CVE-2020-37086 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-37086)
- CVE-2026-25643 - 0.47 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25643)
- CVE-2026-1761 - 0.46 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1761)
- CVE-2026-1731 - 0.44 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1731)
- CVE-2020-37125 - 0.43 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-37125)
updated 2026-02-04T00:30:41
1 posts
CVE-2026-1633 Missing Authentication for Critical Function (CWE-306) https://feedly.com/cve/CVE-2026-1633
##updated 2026-02-03T19:32:57
1 posts
Django SQL Injection in RasterField lookup (CVE-2026-1207) https://vulnerabletarget.com/VT-2026-1207
##updated 2026-02-03T16:44:03.343000
2 posts
1 repos
To drobiazg, ale kluczowy dla prywatności. CERT Polska potwierdził podatność w rządowej aplikacji mObywatel na iOS. Jeśli nie zaktualizowałeś jej w ostatnich dniach, Twój PESEL może świecić z ekranu nawet po wyjściu z aplikacji.
Błąd oznaczony jako CVE-2025-11598 dotyczy mechanizmu App Switcher (przełączania aplikacji). Gdy minimalizujesz aplikację na iPhone (przesuwając palcem od dołu), system robi jej „zrzut ekranu”, by wyświetlić go na karcie podglądu. Dobre aplikacje bankowe (i rządowe) powinny w tym momencie automatycznie zamazywać ekran (blur), by nikt, kto weźmie Twój telefon do ręki i wejdzie w listę otwartych apek, nie zobaczył stanu konta czy danych dowodu.
Wersje mObywatela poniżej 4.71.0 tego nie robiły. Efekt? Nieuprawniona osoba mogła podejrzeć Twoje dane bez logowania, po prostu przeglądając otwarte w tle aplikacje. Oczywiście wymagało to i tak fizycznego dostępu do Twojego iPhone’a i odblokowanego ekranu, ale niemniej problem z bezpieczeństwem istniał.
Sprawa jest prosta: wejdź do App Store i upewnij się, że masz wersję 4.71.0 lub nowszą. Poprawka już tam jest. Ten błąd w starszej wersji mObywatela wykrył i przesłał ekipie CERT.pl Maciej Krakowiak z DSecure.me.
#aktualizacjaMObywatel #bezpieczeństwoIPhone #błądMObywatel #CERTPolska #CVE202511598 #mObywatelIOS ##
To drobiazg, ale kluczowy dla prywatności. CERT Polska potwierdził podatność w rządowej aplikacji mObywatel na iOS. Jeśli nie zaktualizowałeś jej w ostatnich dniach, Twój PESEL może świecić z ekranu nawet po wyjściu z aplikacji.
Błąd oznaczony jako CVE-2025-11598 dotyczy mechanizmu App Switcher (przełączania aplikacji). Gdy minimalizujesz aplikację na iPhone (przesuwając palcem od dołu), system robi jej „zrzut ekranu”, by wyświetlić go na karcie podglądu. Dobre aplikacje bankowe (i rządowe) powinny w tym momencie automatycznie zamazywać ekran (blur), by nikt, kto weźmie Twój telefon do ręki i wejdzie w listę otwartych apek, nie zobaczył stanu konta czy danych dowodu.
Wersje mObywatela poniżej 4.71.0 tego nie robiły. Efekt? Nieuprawniona osoba mogła podejrzeć Twoje dane bez logowania, po prostu przeglądając otwarte w tle aplikacje. Oczywiście wymagało to i tak fizycznego dostępu do Twojego iPhone’a i odblokowanego ekranu, ale niemniej problem z bezpieczeństwem istniał.
Sprawa jest prosta: wejdź do App Store i upewnij się, że masz wersję 4.71.0 lub nowszą. Poprawka już tam jest. Ten błąd w starszej wersji mObywatela wykrył i przesłał ekipie CERT.pl Maciej Krakowiak z DSecure.me.
#aktualizacjaMObywatel #bezpieczeństwoIPhone #błądMObywatel #CERTPolska #CVE202511598 #mObywatelIOS ##
updated 2026-02-03T16:12:17
1 posts
📈 CVE Published in last 7 days (2026-02-02 - 2026-02-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1178
Severity:
- Critical: 93
- High: 363
- Medium: 498
- Low: 65
- None: 159
Status:
- : 9
- Analyzed: 94
- Awaiting Analysis: 636
- Modified: 2
- Received: 139
- Rejected: 20
- Undergoing Analysis: 278
Top CNAs:
- GitHub, Inc.: 225
- VulnCheck: 149
- VulDB: 134
- kernel.org: 79
- Wordfence: 71
- MITRE: 64
- wikimedia-foundation: 47
- Patchstack: 45
- Tanium: 26
- TPLink: 25
Top Affected Products:
- UNKNOWN: 1071
- Samsung Exynos 850 Firmware: 10
- Tp-link Archer Be230 Firmware: 10
- Samsung Exynos 980 Firmware: 10
- Samsung Exynos W920 Firmware: 10
- Samsung Exynos W1000 Firmware: 10
- Samsung Exynos 1080 Firmware: 10
- Samsung Exynos W930 Firmware: 10
- Samsung Exynos 1480 Firmware: 9
- Mediatek Nr15: 9
Top EPSS Score:
- CVE-2026-1802 - 1.28 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1802)
- CVE-2026-1499 - 1.23 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1499)
- CVE-2026-23515 - 0.91 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-23515)
- CVE-2020-37088 - 0.90 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-37088)
- CVE-2026-20098 - 0.90 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-20098)
- CVE-2020-37086 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-37086)
- CVE-2026-25643 - 0.47 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25643)
- CVE-2026-1761 - 0.46 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1761)
- CVE-2026-1731 - 0.44 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1731)
- CVE-2020-37125 - 0.43 % (https://secdb.nttzen.cloud/cve/detail/CVE-2020-37125)
updated 2026-01-30T13:28:59.293000
1 posts
1 repos
Here are the release notes from Synology, the CVE and some lay reporting on just how incredibly bad this bug is and how long it has lingered providing backdoor root level access to a really long list of devices running Telnet. So many routing/networking devices have Telnet access at least as an option which can be enabled to this day, despite this being an absolutely terrible idea.
https://www.synology.com/en-us/releaseNote/DSM?model=DS1821%2B#ver_86009-1
##updated 2026-01-30T13:28:18.610000
6 posts
1 repos
https://github.com/MehdiLeDeaut/CVE-2026-1281-Ivanti-EPMM-RCE
Orgs that still daftly run Ivanti kit and didn't patch for CVE-2026-1281 (which is likely most b/c if you're still running Ivanti you have no idea how to do cyber or IT) are gonna have a really bad day today or later this week once they realize what happened to them over the weekend.
##Orgs that still daftly run Ivanti kit and didn't patch for CVE-2026-1281 (which is likely most b/c if you're still running Ivanti you have no idea how to do cyber or IT) are gonna have a really bad day today or later this week once they realize what happened to them over the weekend.
##If you have Ivanti EPMM, please follow these instructions.
“Technical Analysis updated with reliable Indicators of Compromise (IoC’s). Both in partnership with NCSC-NL.”
The Dutchies are at it again!🤘🇳🇱
#EPMM #CVE20261281 #CVE20261340 #Ivanti #Cybersecurity #infosec #ioc
##This Ivanti Endpoint Manager Mobile (IPMM) security advisory seems to fit the timeline of the incident: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US
##📢 NCSC NL alerte: exploitation active de la zero‑day Ivanti EPMM (CVE‑2026‑1281), assume‑breach requis
📝 Selon le NCSC (Pays-Bas), une mise à jour de son av...
📖 cyberveille : https://cyberveille.ch/posts/2026-02-05-ncsc-nl-alerte-exploitation-active-de-la-zero-day-ivanti-epmm-cve-2026-1281-assume-breach-requis/
🌐 source : https://www.ncsc.nl/waarschuwing/ncsc-roept-organisaties-op-zich-te-melden-bij-gebruik-van-ivanti-endpoint-manager
#CVE_2026_1281 #Ivanti_EPMM #Cyberveille
Someone Knows Bash Far Too Well, And We Love It (Ivanti EPMM Pre-Auth RCEs CVE-2026-1281 and CVE-2026-1340) https://labs.watchtowr.com/someone-knows-bash-far-too-well-and-we-love-it-ivanti-epmm-pre-auth-rces-cve-2026-1281-cve-2026-1340/
##updated 2026-01-29T15:31:31
3 posts
4 repos
https://github.com/MAXI8594/CVE-2025-15467_Scan
https://github.com/balgan/CVE-2025-15467
studies warning vibe coding could threaten maintainer incentives and OSS funding.
- Passwordless/login security on Linux: passkeys/ WebAuthn in Linux; credentials-for-Linux talks.
- CI/CD tooling critique: GitHub Actions is slowly killing engineering teams; tooling UX debates (Xcode, VSCode, JetBrains).
- AWS Lambda base-image CVEs: CVE-2025-15467, CVE-2026-0989, CVE-2026-0992; calls for timely updates and hardened security. [2/2]
@gehrke_test "nginx proxy manager" klingt jetzt nicht danach als würde es CMS überhaupt benutzen, und falls doch, ist CVE-2025-15467 auf Platformen mit Stack Canaries (i.e., alles was nicht ranziges embedded Zeug ist) ein denial of service, kein RCE.
##@gehrke_test "nginx proxy manager" klingt jetzt nicht danach als würde es CMS überhaupt benutzen, und falls doch, ist CVE-2025-15467 auf Platformen mit Stack Canaries (i.e., alles was nicht ranziges embedded Zeug ist) ein denial of service, kein RCE.
##updated 2026-01-27T16:19:42.330000
7 posts
1 repos
APT28’s Stealthy Multi-Stage Campaign Leveraging CVE‑2026‑21509 and Cloud C2 Infrastructure
#APT28 #CVE_2026_21509
https://www.trellix.com/blogs/research/apt28-stealthy-campaign-leveraging-cve-2026-21509-cloud-c2/
Extracting Hidden URLs from Malicious RTF Files: A Quick Guide
Malicious RTF (Rich Text Format) files are making headlines again, as cyber threat group APT28 exploits the newly disclosed CVE-2026-21509 vulnerability. Attackers are leveraging RTF documents disguised as Word files—like BULLETEN_H.doc and Consultation_Topics_Ukraine(Final).doc—to sneak malicious content past unsuspecting users. Despite the .doc extension, these files are genuine RTF documents, a common…
https://undercodenews.com/extracting-hidden-urls-from-malicious-rtf-files-a-quick-guide/
##APT28 Strikes NATO Targets in Lightning-Fast Microsoft Office Exploit Campaign
Introduction: A 24-Hour Window That Changed the Battlefield A familiar threat actor has once again demonstrated how quickly modern cyber-espionage can escalate. APT28, a well-known advanced persistent threat group, moved at exceptional speed to exploit a newly disclosed Microsoft Office vulnerability, CVE-2026-21509, launching a coordinated spear-phishing campaign against NATO-linked…
##How to detect CVE-2026-21509 exploits
#CVE_2026_21509
https://decalage.info/CVE-2026-21509/
How can we detect malicious documents exploiting CVE-2026-21509, the recent 0-day vulnerability in MS Office ?
=> I designed a YARA rule for this, which detects all the malicious files that have been reported.
I also improved oletools to analyze those files and see the suspicious URLs.
You can find the YARA rule and all the explanations about that vulnerability on my website https://decalage.info/CVE-2026-21509/
⚪ APT28 group exploits new vulnerability in Microsoft Office
🗨️ Just three days after Microsoft released an out-of-band patch for Office, the APT28 group began exploiting the CVE-2026-21509 vulnerability in attacks against Ukrainian and European organizations.
##APT28’s Stealthy Multi-Stage Campaign Leveraging CVE‑2026‑21509 and Cloud C2 Infrastructure
Attack exploited a 1-day vuln within 24 hours of the patch release
https://www.trellix.com/blogs/research/apt28-stealthy-campaign-leveraging-cve-2026-21509-cloud-c2/
updated 2026-01-23T09:15:47.823000
1 posts
Aw man, someone had to go and ruin all our fun with https://www.cve.org/CVERecord?id=CVE-2026-21441 😩
##updated 2026-01-15T15:31:21
1 posts
studies warning vibe coding could threaten maintainer incentives and OSS funding.
- Passwordless/login security on Linux: passkeys/ WebAuthn in Linux; credentials-for-Linux talks.
- CI/CD tooling critique: GitHub Actions is slowly killing engineering teams; tooling UX debates (Xcode, VSCode, JetBrains).
- AWS Lambda base-image CVEs: CVE-2025-15467, CVE-2026-0989, CVE-2026-0992; calls for timely updates and hardened security. [2/2]
updated 2025-12-10T21:31:32
1 posts
Critical Authentication Bypass in D-Link, Securus, and Sparsh CCTV Cameras
A critical vulnerability (CVE-2025-13607) in D-Link, Securus, and Sparsh Securitech CCTV cameras allows unauthenticated remote attackers to steal account credentials and configuration data.
**As a general rule, make sure your CCTV cameras are not accessible from the internet. Check your CCTV inventory immediately for these models and apply the available firmware updates from D-Link and Securus. If you use Sparsh cameras or cannot patch, isolate these devices, and place them behind a VPN and consider replacement**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-authentication-bypass-in-d-link-securus-and-sparsh-cctv-cameras-a-g-i-n-p/gD2P6Ple2L
updated 2025-12-05T02:26:57
1 posts
4 repos
https://github.com/yunatamos/Blackash-CVE-2025-66516
https://github.com/intSheep/Tika-CVE-2025-66516-Lab
The #ApacheSling project has published an advisory regarding CVE-2025-66516 https://sling.apache.org/security/CVE-2025-66516.html
##updated 2025-11-14T23:41:16.280000
4 posts
1 repos
From yesterday.
Huntress: Active Exploitation of SolarWinds Web Help Desk https://www.huntress.com/blog/active-exploitation-solarwinds-web-help-desk-cve-2025-26399 @huntress #infosec #SolarWinds #vulnerability #threatresearch
##Hat tip to @JohnHammond @gleeda @russianpanda9xx et al
https://www.huntress.com/blog/active-exploitation-solarwinds-web-help-desk-cve-2025-26399
##From yesterday.
Huntress: Active Exploitation of SolarWinds Web Help Desk https://www.huntress.com/blog/active-exploitation-solarwinds-web-help-desk-cve-2025-26399 @huntress #infosec #SolarWinds #vulnerability #threatresearch
##Hat tip to @JohnHammond @gleeda @russianpanda9xx et al
https://www.huntress.com/blog/active-exploitation-solarwinds-web-help-desk-cve-2025-26399
##updated 2025-11-04T18:16:31.367000
2 posts
1 repos
Hitachi Energy Patches a Blast-RADIUS Flaw in FOX61x
Hitachi Energy patched the Blast-RADIUS vulnerability (CVE-2024-3596) in FOX61x industrial communication devices that allows attackers to bypass RADIUS authentication using MD5 forgery.
**First, make sure your industrial network is isolated from the internet and accessible only from trusted networks. Then plan a patch for your Hitachi FOX61x devices and your RADIUS servers.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/hitachi-energy-patches-a-blast-radius-flaw-in-fox61x-e-l-1-s-p/gD2P6Ple2L
Hitachi Energy Patches Critical Blast-RADIUS Vulnerability in XMC20 Industrial Platforms
Hitachi Energy patched the Blast-RADIUS vulnerability (CVE-2024-3596) in XMC20 industrial communication devices that allows attackers to bypass RADIUS authentication using MD5 forgery.
**First, make sure your industrial network is isolated from the internet and accessible only from trusted networks. Then plan a patch for your Hitachi XMC20 devices and your RADIUS servers.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/hitachi-energy-addresses-critical-blast-radius-vulnerability-in-xmc20-industrial-platforms-p-b-u-t-a/gD2P6Ple2L
updated 2025-11-04T00:31:15
1 posts
To compare #sydbox and #gvisor, take 2 CVEs: CVE-2018-19333, gvisor proc2proc arbitrary-memory-write which wasn't classified as sandbox break. Vuln is there because gvisor uses the seccomp-trap API to run all in a single process ignoring ASLR.. CVE-2024-42318 aka Houdini is a #landlock break where a keyrings(7) call would unlock the sandbox. Syd wasn't affected: 1. keyrings is def disabled 2. open call happens in a syd emulator thread confined by same landlock sandbox. #exherbo #linux #security
##updated 2025-10-30T19:52:45.300000
4 posts
Here's a summary of recent important global, technology, and cybersecurity news:
**Global:**
US-Iran talks continued, with the US demanding nuclear concessions (Feb 7). Italy thwarted suspected Russian cyberattacks targeting government and Olympic-linked websites (Feb 6).
**Technology:**
Big Tech firms (Amazon, Alphabet, Meta, Microsoft) are committing $650B to AI infrastructure in 2026. OpenAI launched Frontier, an enterprise AI agent platform (Feb 6). Intel and AMD warned China of server CPU shortages, citing AI demand and US export rules (Feb 6).
**Cybersecurity:**
CISA ordered US federal agencies to remove unsupported edge network devices to reduce risk (Feb 6). Ransomware groups are actively exploiting a critical VMware ESXi flaw (CVE-2025-22225) (Feb 6). Global cybersecurity laws are tightening, mandating rapid incident reporting (Feb 7).
Here's a summary of recent important global, technology, and cybersecurity news:
**Global:**
US-Iran talks continued, with the US demanding nuclear concessions (Feb 7). Italy thwarted suspected Russian cyberattacks targeting government and Olympic-linked websites (Feb 6).
**Technology:**
Big Tech firms (Amazon, Alphabet, Meta, Microsoft) are committing $650B to AI infrastructure in 2026. OpenAI launched Frontier, an enterprise AI agent platform (Feb 6). Intel and AMD warned China of server CPU shortages, citing AI demand and US export rules (Feb 6).
**Cybersecurity:**
CISA ordered US federal agencies to remove unsupported edge network devices to reduce risk (Feb 6). Ransomware groups are actively exploiting a critical VMware ESXi flaw (CVE-2025-22225) (Feb 6). Global cybersecurity laws are tightening, mandating rapid incident reporting (Feb 7).
CISA Reports Actively Exploited VMware ESXi Flaw in Ransomware Campaigns
CISA reports active exploitation of VMware ESXi flaw (CVE-2025-22225) after reports of ransomware gangs using sandbox escape techniques to compromise hypervisors and encrypt virtual disks.
**If you are using VMware ESXi, Fusion, Workstation, Cloud Foundation or Telco Cloud, and have not patched them since March 2025, this is now URGENT. Not only you are actively hacked, now regulators mandate urgent patching. So start patching.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/cisa-reports-actively-exploited-vmware-esxi-flaw-in-ransomware-campaigns-9-6-2-3-k/gD2P6Ple2L
Broadcom patched this ESXi arbitrary-write vulnerability (tracked as CVE-2025-22225) almost one year ago, in March 2025, alongside a memory leak (CVE-2025-22226) and a TOCTOU flaw (CVE-2025-22224), and tagged them all as actively exploited zero-days. https://www.bleepingcomputer.com/news/security/cisa-vmware-esxi-flaw-now-exploited-in-ransomware-attacks/
##updated 2025-10-30T15:50:59.680000
1 posts
27 repos
https://github.com/pescada-dev/-CVE-2025-8088
https://github.com/hbesljx/CVE-2025-8088-EXP
https://github.com/Shinkirou789/Cve-2025-8088-WinRar-vulnerability
https://github.com/knight0x07/WinRAR-CVE-2025-8088-PoC-RAR
https://github.com/walidpyh/CVE-2025-8088
https://github.com/pentestfunctions/best-CVE-2025-8088
https://github.com/xi0onamdev/WinRAR-CVE-2025-8088-Exploitation-Toolkit
https://github.com/ilhamrzr/RAR-Anomaly-Inspector
https://github.com/pexlexity/WinRAR-CVE-2025-8088-Path-Traversal-PoC
https://github.com/0xAbolfazl/CVE-2025-8088-WinRAR-PathTraversal-PoC
https://github.com/DeepBlue-dot/CVE-2025-8088-WinRAR-Startup-PoC
https://github.com/pentestfunctions/CVE-2025-8088-Multi-Document
https://github.com/onlytoxi/CVE-2025-8088-Winrar-Tool
https://github.com/kitsuneshade/WinRAR-Exploit-Tool---Rust-Edition
https://github.com/Markusino488/cve-2025-8088
https://github.com/sxyrxyy/CVE-2025-8088-WinRAR-Proof-of-Concept-PoC-Exploit-
https://github.com/papcaii2004/CVE-2025-8088-WinRAR-builder
https://github.com/AdityaBhatt3010/CVE-2025-8088-WinRAR-Zero-Day-Path-Traversal
https://github.com/hexsecteam/CVE-2025-8088-Winrar-Tool
https://github.com/Syrins/CVE-2025-8088-Winrar-Tool-Gui
https://github.com/techcorp/CVE-2025-8088-Exploit
https://github.com/lucyna77/winrar-exploit
https://github.com/jordan922/CVE-2025-8088
https://github.com/ghostn4444/CVE-2025-8088
https://github.com/travisbgreen/cve-2025-8088
Amaranth-Dragon: Weaponizing CVE-2025-8088 for Targeted Espionage in the Southeast Asia - Check Point Research
##updated 2025-10-23T21:31:50
1 posts
CVE-2025-6978: Arbitrary Code Execution in the #Arista NG Firewall - our researchers took a deep dive into this recently patched RCE to provide root cause and detection guidance. Read all the details at https://www.zerodayinitiative.com/blog/2026/2/4/cve-2025-6978-arbitrary-code-execution-in-the-arista-ng-firewall
##updated 2025-10-22T17:31:15
1 posts
18 repos
https://github.com/Fa1c0n35/CVE-2017-12615
https://github.com/w0x68y/CVE-2017-12615-EXP
https://github.com/lizhianyuguangming/TomcatScanPro
https://github.com/BeyondCy/CVE-2017-12615
https://github.com/mefulton/cve-2017-12615
https://github.com/tpt11fb/AttackTomcat
https://github.com/xiaokp7/Tomcat_PUT_GUI_EXP
https://github.com/cved-sources/cve-2017-12615
https://github.com/wudidwo/CVE-2017-12615-poc
https://github.com/ianxtianxt/CVE-2017-12615
https://github.com/cyberharsh/Tomcat-CVE-2017-12615
https://github.com/edyekomu/CVE-2017-12615-PoC
https://github.com/Shellkeys/CVE-2017-12615
https://github.com/netw0rk7/CVE-2017-12615-Home-Lab
https://github.com/1337g/CVE-2017-12615
https://github.com/breaktoprotect/CVE-2017-12615
https://github.com/zi0Black/POC-CVE-2017-12615-or-CVE-2017-12717
Apache Tomcat is far and away the most likely intended target given port 8080 and the Java exception body content. The DefaultServlet with readonly=false in web.xml is the textbook case (CVE-2017-12615, CVE-2017-12617). Eclipse Jetty can also expose similar behavior if its DefaultServlet or WebDAV module is configured to allow PUT writes. Apache TomEE, being Tomcat-based with Jakarta EE extensions, inherits all of the same misconfigurations. (5/15)
##updated 2025-10-22T00:33:13
1 posts
Broadcom patched this ESXi arbitrary-write vulnerability (tracked as CVE-2025-22225) almost one year ago, in March 2025, alongside a memory leak (CVE-2025-22226) and a TOCTOU flaw (CVE-2025-22224), and tagged them all as actively exploited zero-days. https://www.bleepingcomputer.com/news/security/cisa-vmware-esxi-flaw-now-exploited-in-ransomware-attacks/
##updated 2025-10-22T00:16:04.407000
1 posts
13 repos
https://github.com/TheRealCiscoo/Tomcat_CVE201712617
https://github.com/K3ysTr0K3R/CVE-2017-12617-EXPLOIT
https://github.com/jptr218/tc_hack
https://github.com/LongWayHomie/CVE-2017-12617
https://github.com/devcoinfet/CVE-2017-12617
https://github.com/qiantu88/CVE-2017-12617
https://github.com/ygouzerh/CVE-2017-12617
https://github.com/scirusvulgaris/CVE-2017-12617
https://github.com/yZee00/CVE-2017-12617
https://github.com/tyranteye666/tomcat-cve-2017-12617
https://github.com/cyberheartmi9/CVE-2017-12617
https://github.com/zi0Black/POC-CVE-2017-12615-or-CVE-2017-12717
Apache Tomcat is far and away the most likely intended target given port 8080 and the Java exception body content. The DefaultServlet with readonly=false in web.xml is the textbook case (CVE-2017-12615, CVE-2017-12617). Eclipse Jetty can also expose similar behavior if its DefaultServlet or WebDAV module is configured to allow PUT writes. Apache TomEE, being Tomcat-based with Jakarta EE extensions, inherits all of the same misconfigurations. (5/15)
##updated 2025-06-18T13:46:52.973000
1 posts
Exploiting CVE-2025-49825 - authentication bypass vulnerability in Teleport https://blog.offensive.af/posts/exploiting-cve-2025-49825/
##updated 2025-04-07T18:54:46.053000
1 posts
updated 2023-02-01T05:05:52
1 posts
To compare #sydbox and #gvisor, take 2 CVEs: CVE-2018-19333, gvisor proc2proc arbitrary-memory-write which wasn't classified as sandbox break. Vuln is there because gvisor uses the seccomp-trap API to run all in a single process ignoring ASLR.. CVE-2024-42318 aka Houdini is a #landlock break where a keyrings(7) call would unlock the sandbox. Syd wasn't affected: 1. keyrings is def disabled 2. open call happens in a syd emulator thread confined by same landlock sandbox. #exherbo #linux #security
##Security Advisory: Privilege escalation to the `CAP_NET_RAW` capability via the `programs.captive-browser` NixOS module (CVE-2026-25740)
##Security Advisory: Privilege escalation to the `CAP_NET_RAW` capability via the `programs.captive-browser` NixOS module (CVE-2026-25740)
##studies warning vibe coding could threaten maintainer incentives and OSS funding.
- Passwordless/login security on Linux: passkeys/ WebAuthn in Linux; credentials-for-Linux talks.
- CI/CD tooling critique: GitHub Actions is slowly killing engineering teams; tooling UX debates (Xcode, VSCode, JetBrains).
- AWS Lambda base-image CVEs: CVE-2025-15467, CVE-2026-0989, CVE-2026-0992; calls for timely updates and hardened security. [2/2]
🟠 CVE-2026-2202 - High (8.8)
A vulnerability was detected in Tenda AC8 16.03.33.05. Affected is the function fromSetWifiGusetBasic of the file /goform/WifiGuestSet of the component httpd. The manipulation of the argument shareSpeed results in buffer overflow. The attack may b...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2202/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2202 - High (8.8)
A vulnerability was detected in Tenda AC8 16.03.33.05. Affected is the function fromSetWifiGusetBasic of the file /goform/WifiGuestSet of the component httpd. The manipulation of the argument shareSpeed results in buffer overflow. The attack may b...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2202/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2187 - High (8.8)
A vulnerability was found in Tenda RX3 16.03.13.11. The affected element is the function set_qosMib_list of the file /goform/formSetQosBand. Performing a manipulation of the argument list results in stack-based buffer overflow. It is possible to i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2187/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2187 - High (8.8)
A vulnerability was found in Tenda RX3 16.03.13.11. The affected element is the function set_qosMib_list of the file /goform/formSetQosBand. Performing a manipulation of the argument list results in stack-based buffer overflow. It is possible to i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2187/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2185 - High (8.8)
A flaw has been found in Tenda RX3 16.03.13.11. This issue affects the function set_device_name of the file /goform/setBlackRule of the component MAC Filtering Configuration Endpoint. This manipulation of the argument devName/mac causes stack-base...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2185/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 HIGH severity: Stack-based buffer overflow in Tenda RX3 (16.03.13.11) — CVE-2026-2185. Remote exploitation possible via MAC Filtering config. Public exploit released. Monitor and segment affected devices! https://radar.offseq.com/threat/cve-2026-2185-stack-based-buffer-overflow-in-tenda-5922d2b2 #OffSeq #Vulnerability #Infosec
##🟠 CVE-2026-2185 - High (8.8)
A flaw has been found in Tenda RX3 16.03.13.11. This issue affects the function set_device_name of the file /goform/setBlackRule of the component MAC Filtering Configuration Endpoint. This manipulation of the argument devName/mac causes stack-base...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2185/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🛡️ CVE-2026-2175: HIGH severity OS command injection in D-Link DIR-823X (v250416) via /goform/set_upnp. No auth needed; public exploit out. Patch ASAP or disable UPnP & segment networks. https://radar.offseq.com/threat/cve-2026-2175-os-command-injection-in-d-link-dir-8-2593454d #OffSeq #DLink #Vuln #RouterAlert
##🚨 HIGH severity: CVE-2026-2129 in D-Link DIR-823X (v250416) enables unauthenticated remote OS command injection via /goform/set_ac_status. Exploit code is public — patch or restrict access now! https://radar.offseq.com/threat/cve-2026-2129-os-command-injection-in-d-link-dir-8-54513fc4 #OffSeq #DLink #RouterSecurity
##🟠 CVE-2026-25762 - High (7.5)
AdonisJS is a TypeScript-first web framework. Prior to versions 10.1.3 and 11.0.0-next.9, a denial of service (DoS) vulnerability exists in the multipart file handling logic of @adonisjs/bodyparser. When processing file uploads, the multipart pars...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25762/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2070 - High (8.8)
A vulnerability has been found in UTT 进取 520W 1.7.7-180627. The affected element is the function strcpy of the file /goform/formPolicyRouteConf. Such manipulation of the argument GroupName leads to buffer overflow. The attack can be executed r...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2070/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25544 - Critical (9.8)
Payload is a free and open source headless content management system. Prior to 3.73.0, when querying JSON or richText fields, user input was directly embedded into SQL without escaping, enabling blind SQL injection attacks. An unauthenticated atta...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25544/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25544 - Critical (9.8)
Payload is a free and open source headless content management system. Prior to 3.73.0, when querying JSON or richText fields, user input was directly embedded into SQL without escaping, enabling blind SQL injection attacks. An unauthenticated atta...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25544/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2068 - High (8.8)
A vulnerability was detected in UTT 进取 520W 1.7.7-180627. This issue affects the function strcpy of the file /goform/formSyslogConf. The manipulation of the argument ServerIp results in buffer overflow. The attack may be launched remotely. The...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2068/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25636 - High (8.2)
calibre is an e-book manager. In 9.1.0 and earlier, a path traversal vulnerability in Calibre's EPUB conversion allows a malicious EPUB file to corrupt arbitrary existing files writable by the Calibre process. During conversion, Calibre resolves C...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25636/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25636 - High (8.2)
calibre is an e-book manager. In 9.1.0 and earlier, a path traversal vulnerability in Calibre's EPUB conversion allows a malicious EPUB file to corrupt arbitrary existing files writable by the Calibre process. During conversion, Calibre resolves C...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25636/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25636 - High (8.2)
calibre is an e-book manager. In 9.1.0 and earlier, a path traversal vulnerability in Calibre's EPUB conversion allows a malicious EPUB file to corrupt arbitrary existing files writable by the Calibre process. During conversion, Calibre resolves C...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25636/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25634 - High (7.8)
iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to 2.3.1.4, SrcPixel and DestPixel stack buffers overlap in CIccTagMultiProcessElement::Apply() int ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25634/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25634 - High (7.8)
iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to 2.3.1.4, SrcPixel and DestPixel stack buffers overlap in CIccTagMultiProcessElement::Apply() int ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25634/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25634 - High (7.8)
iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to 2.3.1.4, SrcPixel and DestPixel stack buffers overlap in CIccTagMultiProcessElement::Apply() int ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25634/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25632 - Critical (10)
EPyT-Flow is a Python package designed for the easy generation of hydraulic and water quality scenario data of water distribution networks. Prior to 0.16.1, EPyT-Flow’s REST API parses attacker-controlled JSON request bodies using a custom deser...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25632/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25632 - Critical (10)
EPyT-Flow is a Python package designed for the easy generation of hydraulic and water quality scenario data of water distribution networks. Prior to 0.16.1, EPyT-Flow’s REST API parses attacker-controlled JSON request bodies using a custom deser...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25632/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2067 - High (8.8)
A security vulnerability has been detected in UTT 进取 520W 1.7.7-180627. This vulnerability affects the function strcpy of the file /goform/formTimeGroupConfig. The manipulation of the argument year1 leads to buffer overflow. The attack may be ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2067/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2067 - High (8.8)
A security vulnerability has been detected in UTT 进取 520W 1.7.7-180627. This vulnerability affects the function strcpy of the file /goform/formTimeGroupConfig. The manipulation of the argument year1 leads to buffer overflow. The attack may be ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2067/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25587 - Critical (10)
SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, as Map is in SAFE_PROTOYPES, it's prototype can be obtained via Map.prototype. By overwriting Map.prototype.has the sandbox can be escaped. This vulnerability is fixed in 0.8.29.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25587/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-13523 - High (7.7)
Mattermost Confluence plugin version <1.7.0 fails to properly escape user-controlled display names in HTML template rendering which allows authenticated Confluence users with malicious display names to execute arbitrary JavaScript in victim bro...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-13523/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24930 - High (8.4)
UAF concurrency vulnerability in the graphics module.
Impact: Successful exploitation of this vulnerability may affect availability.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24930/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25234 - Critical (9.8)
PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, a SQL injection vulnerability in category deletion can allow an attacker with access to the category manager workflow to inject SQL via a category id...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25234/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25237 - Critical (9.8)
PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, use of preg_replace() with the /e modifier in bug update email handling can enable PHP code execution if attacker-controlled content reaches the eval...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25237/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-24300 - Critical (9.8)
Azure Front Door Elevation of Privilege Vulnerability
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24300/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25053 - Critical (9.9)
n8n is an open source workflow automation platform. Prior to versions 1.123.10 and 2.5.0, vulnerabilities in the Git node allowed authenticated users with permission to create or modify workflows to execute arbitrary system commands or read arbitr...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25053/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-68722 - High (8.8)
Axigen Mail Server before 10.5.57 and 10.6.x before 10.6.26 contains a Cross-Site Request Forgery (CSRF) vulnerability in the WebAdmin interface through improper handling of the _s (breadcrumb) parameter. The application accepts state-changing req...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-68722/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-15330 - High (8.8)
Tanium addressed an improper input validation vulnerability in Deploy.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15330/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25239 - High (7.5)
PEAR is a framework and distribution system for reusable PHP components. Prior to version 1.33.0, a SQL injection vulnerability in apidoc queue insertion can allow query manipulation if an attacker can influence the inserted filename value. This i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25239/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-69970 - Critical (9.3)
FUXA v1.2.7 contains an insecure default configuration vulnerability in server/settings.default.js. The 'secureEnabled' flag is commented out by default, causing the application to initialize with authentication disabled. This allows unauthenticat...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-69970/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Broadcom patched this ESXi arbitrary-write vulnerability (tracked as CVE-2025-22225) almost one year ago, in March 2025, alongside a memory leak (CVE-2025-22226) and a TOCTOU flaw (CVE-2025-22224), and tagged them all as actively exploited zero-days. https://www.bleepingcomputer.com/news/security/cisa-vmware-esxi-flaw-now-exploited-in-ransomware-attacks/
##🔴 CVE-2025-61506 - Critical (9.8)
An issue was discovered in MediaCrush thru 1.0.1 allowing remote unauthenticated attackers to upload arbitrary files of any size to the /upload endpoint.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-61506/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25585 - High (7.8)
iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.3, there is a vulnerability IccCmm.cpp:5793 when reading through index during ICC p...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25585/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-22038 - High (8.1)
AutoGPT is a platform that allows users to create, deploy, and manage continuous artificial intelligence agents that automate complex workflows. Prior to autogpt-platform-beta-v0.6.46, the AutoGPT platform's Stagehand integration blocks log API ke...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22038/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25526 - Critical (9.8)
JinJava is a Java-based template engine based on django template syntax, adapted to render jinja templates. Prior to versions 2.7.6 and 2.8.3, JinJava is vulnerable to arbitrary Java execution via bypass through ForTag. This allows arbitrary Java ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25526/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25583 - High (7.8)
iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.3, there is a heap buffer overflow vulnerability in CIccFileIO::Read8() when proces...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25583/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25519 - High (8.1)
OpenSlides is a free, web based presentation and assembly system for managing and projecting agenda, motions and elections of an assembly. Prior to version 4.2.29, OpenSlides supports local logins with username and password or an optionally config...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25519/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25519 - High (8.1)
OpenSlides is a free, web based presentation and assembly system for managing and projecting agenda, motions and elections of an assembly. Prior to version 4.2.29, OpenSlides supports local logins with username and password or an optionally config...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25519/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25160 - Critical (9.1)
Alist is a file list program that supports multiple storages, powered by Gin and Solidjs. Prior to version 3.57.0, the application disables TLS certificate verification by default for all outgoing storage driver communications, making the system v...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25160/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25160 - Critical (9.1)
Alist is a file list program that supports multiple storages, powered by Gin and Solidjs. Prior to version 3.57.0, the application disables TLS certificate verification by default for all outgoing storage driver communications, making the system v...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25160/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24843 - High (8.2)
melange allows users to build apk packages using declarative pipelines. In version 0.11.3 to before 0.40.3, an attacker who can influence the tar stream from a QEMU guest VM could write files outside the intended workspace directory on the host. T...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24843/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##