## Updated at UTC 2026-02-04T11:32:08.386340

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-0818 4.3 0.02% 1 0 2026-02-04T10:16:04.550000 When a user explicitly requested Thunderbird to decrypt an inline OpenPGP messag
CVE-2025-15285 7.5 0.00% 2 0 2026-02-04T09:15:50.863000 The SEO Flow by LupsOnline plugin for WordPress is vulnerable to unauthorized mo
CVE-2025-15268 7.5 0.00% 2 0 2026-02-04T09:15:50.690000 The Infility Global plugin for WordPress is vulnerable to unauthenticated SQL In
CVE-2026-1819 8.8 0.00% 2 0 2026-02-04T08:16:06.820000 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site
CVE-2026-1756 8.8 0.00% 2 0 2026-02-04T07:15:59.267000 The WP FOFT Loader plugin for WordPress is vulnerable to arbitrary file uploads
CVE-2026-1861 8.8 0.00% 2 0 2026-02-04T00:31:33 Heap buffer overflow in libvpx in Google Chrome prior to 144.0.7559.132 allowed
CVE-2026-1632 9.1 0.00% 2 0 2026-02-04T00:30:41 MOMA Seismic Station Version v2.4.2520 and prior exposes its web management inte
CVE-2026-24513 3.1 0.00% 2 0 2026-02-04T00:30:41 A security issue was discovered in ingress-nginx where the protection afforded b
CVE-2026-24514 6.5 0.00% 2 0 2026-02-04T00:30:41 A security issue was discovered in ingress-nginx where the validating admission
CVE-2026-1862 8.8 0.00% 2 0 2026-02-04T00:30:28 Type Confusion in V8 in Google Chrome prior to 144.0.7559.132 allowed a remote a
CVE-2026-1633 10.0 0.00% 4 0 2026-02-04T00:16:08.557000 The Synectix LAN 232 TRIO 3-Port serial to ethernet adapter exposes its web mana
CVE-2026-24512 8.8 0.00% 6 0 2026-02-03T23:16:06.990000 A security issue was discovered in ingress-nginx cthe `rules.http.paths.path` In
CVE-2026-1580 8.8 0.00% 5 0 2026-02-03T23:16:06.290000 A security issue was discovered in ingress-nginx where the `nginx.ingress.kubern
CVE-2026-25614 7.5 0.00% 2 0 2026-02-03T21:31:59 Blesta 3.x through 5.x before 5.13.3 allows object injection, aka CORE-5680.
CVE-2026-24149 7.8 0.00% 2 0 2026-02-03T21:31:59 NVIDIA Megatron-LM for all platforms contains a vulnerability in a script, where
CVE-2026-1803 8.1 0.00% 4 0 2026-02-03T21:31:58 A weakness has been identified in Ziroom ZHOME A0101 1.0.1.0. Impacted is an unk
CVE-2026-24954 8.8 0.00% 2 0 2026-02-03T21:31:51 Deserialization of Untrusted Data vulnerability in magepeopleteam WpEvently mage
CVE-2026-20421 7.5 0.21% 1 0 2026-02-03T21:23:50.483000 In Modem, there is a possible system crash due to improper input validation. Thi
CVE-2025-40551 9.8 1.03% 11 0 2026-02-03T21:13:06.187000 SolarWinds Web Help Desk was found to be susceptible to an untrusted data deseri
CVE-2025-40553 9.8 0.78% 2 0 2026-02-03T21:10:44.253000 SolarWinds Web Help Desk was found to be susceptible to an untrusted data deseri
CVE-2026-25150 9.3 0.00% 2 0 2026-02-03T20:49:23 ### Summary A Prototype Pollution vulnerability exists in the `formToObj()` fun
CVE-2025-10878 10.0 0.00% 2 1 2026-02-03T20:15:55.837000 A SQL injection vulnerability exists in the login functionality of Fikir Odalari
CVE-2026-1285 None 0.00% 2 0 2026-02-03T19:31:19 An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4
CVE-2025-14550 None 0.00% 2 0 2026-02-03T19:29:48 An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4
CVE-2025-67848 8.1 0.06% 2 0 2026-02-03T19:16:27 A flaw was found in Moodle. This authentication bypass vulnerability allows susp
CVE-2025-70841 10.0 0.00% 2 0 2026-02-03T18:30:54 Dokans Multi-Tenancy Based eCommerce Platform SaaS 3.9.2 allows unauthenticated
CVE-2025-65875 8.8 0.00% 2 0 2026-02-03T18:30:53 An arbitrary file upload vulnerability in the AddFont() function of FPDF v1.86 a
CVE-2021-39935 7.5 28.25% 7 0 2026-02-03T18:30:29 An issue has been discovered in GitLab CE/EE affecting all versions starting fro
CVE-2019-19006 9.8 2.14% 7 0 2026-02-03T18:30:27 Sangoma FreePBX 115.0.16.26 and below, 14.0.13.11 and below, 13.0.197.13 and bel
CVE-2026-24773 7.5 0.00% 4 0 2026-02-03T18:16:24.373000 The Open eClass platform (formerly known as GUnet eClass) is a complete course m
CVE-2025-65889 7.5 0.05% 1 0 2026-02-03T17:56:57.603000 A type validation flaw in the flow.dstack() component of OneFlow v0.9.0 allows a
CVE-2026-1568 9.6 0.00% 2 0 2026-02-03T17:15:59.893000 Rapid7 InsightVM versions before 8.34.0 contain a signature verification issue o
CVE-2026-25253 8.8 0.04% 6 1 2026-02-03T16:44:36.630000 OpenClaw (aka clawdbot or Moltbot) before 2026.1.29 obtains a gatewayUrl value f
CVE-2026-20402 7.5 0.21% 2 0 2026-02-03T16:44:36.630000 In Modem, there is a possible system crash due to improper input validation. Thi
CVE-2026-20412 7.8 0.01% 1 0 2026-02-03T16:44:36.630000 In cameraisp, there is a possible out of bounds write due to a missing bounds ch
CVE-2025-15030 9.8 0.01% 1 0 2026-02-03T16:44:36.630000 The User Profile Builder WordPress plugin before 3.15.2 does not have a proper
CVE-2025-47399 7.8 0.01% 1 0 2026-02-03T16:44:36.630000 Memory Corruption while processing IOCTL call to update sensor property settings
CVE-2026-20408 8.8 0.02% 1 0 2026-02-03T16:44:36.630000 In wlan, there is a possible out of bounds write due to a heap buffer overflow.
CVE-2025-8587 8.6 0.01% 1 0 2026-02-03T16:44:36.630000 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-25200 9.8 0.07% 1 0 2026-02-03T16:44:36.630000 A vulnerability in MagicInfo9 Server allows authorized users to upload HTML file
CVE-2026-25142 10.0 0.10% 3 0 2026-02-03T16:44:03.343000 SandboxJS is a JavaScript sandboxing library. Prior to 0.8.27, SanboxJS does not
CVE-2025-6397 8.6 0.00% 2 0 2026-02-03T16:44:03.343000 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site
CVE-2025-67853 7.5 0.04% 2 0 2026-02-03T16:44:03.343000 A flaw was found in Moodle. A remote attacker could exploit a lack of proper rat
CVE-2025-8456 7.6 0.03% 2 0 2026-02-03T16:44:03.343000 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site
CVE-2025-8590 7.5 0.03% 2 0 2026-02-03T16:44:03.343000 Exposure of Sensitive Information to an Unauthorized Actor vulnerability in AKCE
CVE-2026-24465 9.8 0.02% 2 0 2026-02-03T16:44:03.343000 Stack-based buffer overflow vulnerability exists in ELECOM wireless LAN access p
CVE-2026-22778 9.8 0.06% 1 0 2026-02-03T16:44:03.343000 vLLM is an inference and serving engine for large language models (LLMs). From 0
CVE-2026-23515 9.9 0.91% 1 0 2026-02-03T16:44:03.343000 Signal K Server is a server application that runs on a central hub in a boat. Pr
CVE-2025-64328 0 0.46% 7 1 2026-02-03T16:16:10.400000 FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX
CVE-2026-25060 8.1 0.01% 1 0 2026-02-03T16:13:27 ### Summary The application disables TLS certificate verification by default for
CVE-2026-25059 8.8 0.02% 1 0 2026-02-03T16:13:22 ### Summary The application contains a Path Traversal vulnerability (CWE-22) in
CVE-2026-24763 8.8 0.07% 2 0 2026-02-03T16:13:07 ### Summary A Command Injection vulnerability existed in Clawdbot’s Docker sandb
CVE-2026-24737 8.1 0.01% 2 0 2026-02-03T16:13:02 ### Impact User control of properties and methods of the Acroform module allows
CVE-2026-23997 8.0 0.01% 1 0 2026-02-03T16:12:22 ### Summary A Stored Cross-Site Scripting (XSS) vulnerability was discovered in
CVE-2025-71007 7.5 0.05% 3 0 2026-02-03T16:06:35.320000 An input validation vulnerability in the oneflow.index_add component of OneFlow
CVE-2026-25510 10.0 0.00% 4 0 2026-02-03T16:03:26 **Summary** A critical vulnerability has been identified in CI4MS that allows a
CVE-2026-25022 8.5 0.00% 2 0 2026-02-03T15:30:38 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2025-5319 9.8 0.00% 2 1 2026-02-03T15:30:33 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2025-7760 7.6 0.00% 2 0 2026-02-03T15:30:33 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site
CVE-2025-8461 7.6 0.03% 2 0 2026-02-03T09:30:34 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site
CVE-2026-1375 8.1 0.04% 2 0 2026-02-03T09:30:34 The Tutor LMS – eLearning and online course solution plugin for WordPress is vul
CVE-2026-1730 8.8 0.22% 3 0 2026-02-03T09:30:28 The OS DataHub Maps plugin for WordPress is vulnerable to arbitrary file uploads
CVE-2025-8589 7.6 0.03% 2 0 2026-02-03T09:30:28 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site
CVE-2026-24694 7.8 0.02% 2 0 2026-02-03T06:31:10 The installer for Roland Cloud Manager ver.3.1.19 and prior insecurely loads Dyn
CVE-2026-20404 7.5 0.21% 3 0 2026-02-03T00:31:23 In Modem, there is a possible system crash due to improper input validation. Thi
CVE-2026-20407 8.8 0.01% 2 0 2026-02-03T00:31:23 In wlan STA driver, there is a possible escalation of privilege due to a missing
CVE-2026-20406 7.5 0.21% 1 0 2026-02-03T00:31:23 In Modem, there is a possible system crash due to an uncaught exception. This co
CVE-2026-20420 7.5 0.21% 1 0 2026-02-03T00:31:23 In Modem, there is a possible system crash due to incorrect error handling. This
CVE-2025-63649 7.5 0.04% 2 0 2026-02-03T00:31:22 An out-of-bounds read in the http_parser_transfer_encoding_chunked function (mk_
CVE-2026-20403 7.5 0.21% 2 0 2026-02-03T00:31:22 In Modem, there is a possible system crash due to a missing bounds check. This c
CVE-2026-20409 7.8 0.01% 2 0 2026-02-03T00:31:22 In imgsys, there is a possible out of bounds write due to a missing bounds check
CVE-2026-20405 7.5 0.21% 1 0 2026-02-03T00:31:22 In Modem, there is a possible system crash due to a missing bounds check. This c
CVE-2026-20422 7.5 0.21% 1 0 2026-02-03T00:30:18 In Modem, there is a possible system crash due to improper input validation. Thi
CVE-2026-25223 7.5 0.00% 4 0 2026-02-02T22:23:32 ### Impact A validation bypass vulnerability exists in Fastify where request bo
CVE-2026-0599 7.5 0.08% 1 0 2026-02-02T22:07:42 A vulnerability in huggingface/text-generation-inference version 3.3.6 allows un
CVE-2026-1117 8.2 0.03% 1 0 2026-02-02T21:56:53 A vulnerability in the `lollms_generation_events.py` component of parisneo/lollm
CVE-2026-20411 7.8 0.01% 1 0 2026-02-02T21:31:27 In cameraisp, there is a possible escalation of privilege due to use after free.
CVE-2026-1531 8.1 0.02% 1 0 2026-02-02T21:15:40 A flaw was found in foreman_kubevirt. When configuring the connection to OpenShi
CVE-2026-1530 8.1 0.02% 1 0 2026-02-02T21:02:04 A flaw was found in fog-kubevirt. This vulnerability allows a remote attacker to
CVE-2026-24788 8.8 0.23% 1 0 2026-02-02T20:53:03 RaspAP raspap-webgui versions prior to 3.3.6 contain an OS Command Injection vul
CVE-2026-25153 7.7 0.05% 1 0 2026-02-02T20:19:59 ### Impact When TechDocs is configured with `runIn: local`, a malicious actor w
CVE-2026-24071 9.4 0.01% 2 0 2026-02-02T18:32:35 It was found that the XPC service offered by the privileged helper of Native Acc
CVE-2026-24070 8.8 0.00% 1 0 2026-02-02T18:32:35 During the installation of the Native Access application, a privileged helper `c
CVE-2025-9974 8.8 0.02% 2 0 2026-02-02T18:32:35 The unified WEBUI application of the ONT/Beacon device contains an input handlin
CVE-2025-47359 7.8 0.01% 1 0 2026-02-02T18:31:39 Memory Corruption when multiple threads simultaneously access a memory free API.
CVE-2025-47358 7.8 0.01% 1 0 2026-02-02T18:31:39 Memory Corruption when user space address is modified and passed to mem_free API
CVE-2025-47398 7.8 0.01% 1 0 2026-02-02T18:31:39 Memory Corruption while deallocating graphics processing unit memory buffers due
CVE-2025-47397 7.8 0.01% 1 0 2026-02-02T18:31:39 Memory Corruption when initiating GPU memory mapping using scatter-gather lists
CVE-2025-14914 7.7 0.04% 1 0 2026-02-02T18:31:38 IBM WebSphere Application Server Liberty 17.0.0.3 through 26.0.0.1 could allow a
CVE-2025-13986 4.2 0.04% 1 0 2026-02-02T18:16:11.883000 Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal
CVE-2026-1761 8.6 0.14% 1 0 2026-02-02T15:30:44 A flaw was found in libsoup. This stack-based buffer overflow vulnerability occu
CVE-2026-20418 8.8 0.21% 2 0 2026-02-02T15:30:34 In Thread, there is a possible out of bounds write due to a missing bounds check
CVE-2026-20419 7.5 0.07% 1 0 2026-02-02T15:30:34 In wlan AP/STA firmware, there is a possible system becoming irresponsive due to
CVE-2026-25201 8.8 0.07% 1 0 2026-02-02T06:30:53 An unauthenticated user can upload arbitrary files to execute remote code, leadi
CVE-2026-25202 9.8 0.04% 1 0 2026-02-02T06:30:53 The database account and password are hardcoded, allowing login with the account
CVE-2025-69662 8.6 0.03% 1 0 2026-02-01T18:09:11 SQL injection vulnerability in geopandas before v.1.1.2 allows an attacker to ob
CVE-2026-25130 9.7 0.08% 1 1 2026-01-31T03:53:47 ## Summary The CAI (Cybersecurity AI) framework contains multiple argument inje
CVE-2025-51958 9.8 0.07% 1 0 2026-01-30T21:30:28 aelsantex runcommand 2014-04-01, a plugin for DokuWiki, allows unauthenticated a
CVE-2026-25128 7.5 0.07% 1 0 2026-01-30T20:10:15 ### Summary A RangeError vulnerability exists in the numeric entity processing o
CVE-2025-62348 7.8 0.01% 1 0 2026-01-30T19:16:10.860000 Salt's junos execution module contained an unsafe YAML decode/load usage. A spec
CVE-2025-4686 8.6 0.03% 2 1 2026-01-30T18:31:21 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-1686 8.8 0.14% 2 0 2026-01-30T16:16:12.633000 A security flaw has been discovered in Totolink A3600R 5.9c.4959. This issue aff
CVE-2026-0709 7.2 0.01% 1 0 2026-01-30T12:31:26 Some Hikvision Wireless Access Points are vulnerable to authenticated command ex
CVE-2026-1699 10.0 0.03% 1 0 2026-01-30T12:31:26 In the Eclipse Theia Website repository, the GitHub Actions workflow .github/wor
CVE-2025-1395 8.2 0.03% 1 0 2026-01-30T09:31:00 Generation of Error Message Containing Sensitive Information vulnerability in Co
CVE-2026-21418 7.8 0.06% 1 0 2026-01-30T09:31:00 Dell Unity, version(s) 5.5.2 and prior, contain(s) an Improper Neutralization of
CVE-2026-0805 8.2 0.11% 1 0 2026-01-30T09:30:54 An input neutralization vulnerability in the Backup Configuration component of C
CVE-2026-0963 9.9 0.31% 1 0 2026-01-30T09:30:54 An input neutralization vulnerability in the File Operations API Endpoint compon
CVE-2026-22277 7.8 0.06% 1 0 2026-01-30T09:15:51.090000 Dell UnityVSA, version(s) 5.4 and prior, contain(s) an Improper Neutralization o
CVE-2026-24714 7.5 0.07% 1 0 2026-01-30T05:16:33.093000 Some end of service NETGEAR products provide "TelnetEnable" functionality, which
CVE-2025-69516 8.8 0.22% 1 0 2026-01-30T00:32:24 A Server-Side Template Injection (SSTI) vulnerability in the /reporting/template
CVE-2026-1281 9.8 13.12% 12 0 2026-01-30T00:31:29 A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve
CVE-2026-1637 8.8 0.02% 1 0 2026-01-30T00:31:29 A vulnerability was identified in Tenda AC21 16.03.08.16. The affected element i
CVE-2026-25116 7.6 0.20% 1 0 2026-01-29T22:15:56.110000 Runtipi is a personal homeserver orchestrator. Starting in version 4.5.0 and pri
CVE-2026-1340 9.8 0.14% 11 0 2026-01-29T22:15:53.313000 A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve
CVE-2025-61726 7.5 0.03% 1 0 2026-01-29T21:31:33 The net/url package does not set a limit on the number of query parameters in a
CVE-2025-71003 7.5 0.05% 1 0 2026-01-29T21:31:32 An input validation vulnerability in the flow.arange() component of OneFlow v0.9
CVE-2025-13982 8.1 0.02% 1 0 2026-01-29T21:31:32 Cross-Site Request Forgery (CSRF) vulnerability in Drupal Login Time Restriction
CVE-2025-14472 8.1 0.02% 1 0 2026-01-29T21:31:32 Cross-Site Request Forgery (CSRF) vulnerability in Drupal Acquia Content Hub all
CVE-2026-1610 8.1 0.01% 1 0 2026-01-29T21:30:37 A vulnerability was found in Tenda AX12 Pro V2 16.03.49.24_cn. Affected by this
CVE-2026-24061 9.8 29.55% 1 57 template 2026-01-29T21:30:27 telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "
CVE-2025-69602 9.1 0.04% 1 0 2026-01-29T20:16:09.663000 A session fixation vulnerability exists in 66biolinks v62.0.0 by AltumCode, wher
CVE-2026-1453 9.8 0.06% 2 0 2026-01-29T19:16:18.987000 A missing authentication for critical function vulnerability in KiloView Encoder
CVE-2025-61731 7.8 0.01% 1 0 2026-01-29T18:32:50 Building a malicious file with cmd/go can cause can cause a write to an attacker
CVE-2025-65890 7.5 0.05% 1 0 2026-01-29T18:32:49 A device-ID validation flaw in OneFlow v0.9.0 allows attackers to cause a Denial
CVE-2025-65888 7.5 0.05% 1 0 2026-01-29T18:32:49 A dimension validation flaw in the flow.empty() component of OneFlow 0.9.0 allow
CVE-2025-65891 7.5 0.06% 1 0 2026-01-29T18:32:49 A GPU device-ID validation flaw in OneFlow v0.9.0 allows attackers to trigger a
CVE-2025-71000 7.5 0.05% 1 0 2026-01-29T18:32:49 An issue in the flow.cuda.BoolTensor component of OneFlow v0.9.0 allows attacker
CVE-2025-70999 7.5 0.05% 1 0 2026-01-29T18:32:49 A GPU device-ID validation flaw in the flow.cuda.get_device_capability() compone
CVE-2025-65886 7.5 0.05% 1 0 2026-01-29T18:31:42 A shape mismatch vulnerability in OneFlow v0.9.0 allows attackers to cause a Den
CVE-2025-14975 8.1 0.01% 1 0 2026-01-29T17:16:15.460000 The Custom Login Page Customizer WordPress plugin before 2.5.4 does not have a p
CVE-2025-15467 9.8 0.66% 5 4 2026-01-29T15:31:31 Issue summary: Parsing CMS AuthEnvelopedData message with maliciously crafted AE
CVE-2026-1470 10.0 0.35% 1 0 2026-01-29T15:02:29 n8n contains a critical Remote Code Execution (RCE) vulnerability in its workflo
CVE-2026-23864 7.5 0.79% 1 0 2026-01-29T15:00:31 ## Impact It was found that the fixes to address DoS in React Server Components
CVE-2026-24858 9.8 3.71% 3 5 2026-01-29T13:16:51.047000 An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-2
CVE-2025-14840 None 0.05% 1 0 2026-01-28T21:31:30 Improper Check for Unusual or Exceptional Conditions vulnerability in Drupal HTT
CVE-2026-1056 9.8 0.18% 1 1 2026-01-28T15:31:37 The Snow Monkey Forms plugin for WordPress is vulnerable to arbitrary file delet
CVE-2025-40552 9.8 0.06% 2 0 2026-01-28T09:30:35 SolarWinds Web Help Desk was found to be susceptible to an authentication bypass
CVE-2025-40554 9.8 0.04% 2 2 2026-01-28T09:30:35 SolarWinds Web Help Desk was found to be susceptible to an authentication bypass
CVE-2026-21509 7.8 2.91% 19 6 2026-01-27T16:19:42.330000 Reliance on untrusted inputs in a security decision in Microsoft Office allows a
CVE-2026-0920 9.8 0.03% 1 3 2026-01-26T15:04:59.737000 The LA-Studio Element Kit for Elementor plugin for WordPress is vulnerable to Ad
CVE-2026-0863 8.6 0.06% 1 0 2026-01-23T18:32:31 Using string formatting and exception handling, an attacker may bypass n8n's pyt
CVE-2026-0755 9.8 1.27% 1 0 2026-01-23T06:31:32 gemini-mcp-tool execAsync Command Injection Remote Code Execution Vulnerability.
CVE-2026-20045 8.2 1.10% 1 1 2026-01-21T21:31:31 A vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unif
CVE-2025-9086 7.5 0.04% 1 0 2026-01-20T15:31:21 1. A cookie is set using the `secure` keyword for `https://target` 2. curl is re
CVE-2025-61729 7.5 0.02% 1 0 2025-12-19T18:25:28.283000 Within HostnameError.Error(), when constructing an error string, there is no lim
CVE-2025-11001 7.0 0.37% 1 6 2025-11-20T00:31:21 7-Zip ZIP File Parsing Directory Traversal Remote Code Execution Vulnerability.
CVE-2025-11953 9.8 0.40% 8 4 2025-11-13T16:25:27 The Metro Development Server, which is opened by the React Native CLI, binds to
CVE-2024-10460 5.3 0.42% 1 0 2025-11-04T00:31:55 The origin of an external protocol handler prompt could have been obscured using
CVE-2025-8088 8.8 4.61% 1 26 2025-10-22T00:34:26 A path traversal vulnerability affecting the Windows version of WinRAR allows th
CVE-2025-49825 9.8 7.60% 2 0 template 2025-06-18T14:15:12 ### Impact A full technical disclosure and open-source patch will be published
CVE-2023-38346 8.8 1.23% 1 0 2024-11-21T08:13:22.843000 An issue was discovered in Wind River VxWorks 6.9 and 7. The function ``tarExtra
CVE-2022-37393 7.8 5.12% 1 0 2024-11-21T07:14:54.630000 Zimbra's sudo configuration permits the zimbra user to execute the zmslapd binar
CVE-2022-48986 5.5 0.10% 1 0 2024-11-01T15:32:52 In the Linux kernel, the following vulnerability has been resolved: mm/gup: fix
CVE-2019-15006 None 0.67% 1 0 2023-01-29T05:00:49 There was a man-in-the-middle (MITM) vulnerability present in the Confluence Pre
CVE-2026-25502 0 0.00% 4 0 N/A
CVE-2026-24665 0 0.00% 4 0 N/A
CVE-2026-24669 0 0.00% 4 0 N/A
CVE-2026-49144 0 0.00% 3 0 N/A
CVE-2025-66480 0 0.43% 1 0 N/A
CVE-2026-25137 0 0.03% 2 0 N/A
CVE-2026-23743 0 0.04% 1 0 N/A
CVE-2026-24854 0 0.03% 1 1 N/A
CVE-2025-63261 0 0.00% 1 0 N/A
CVE-2026-22806 0 0.01% 1 0 N/A

CVE-2026-0818
(4.3 MEDIUM)

EPSS: 0.02%

updated 2026-02-04T10:16:04.550000

1 posts

When a user explicitly requested Thunderbird to decrypt an inline OpenPGP message that was embedded in a text section of an email that was formatted and styled with HTML and CSS, then the decrypted contents were rendered in a context in which the CSS styles from the outer messages were active. If the user had additionally allowed loading of the remote content referenced by the outer email message,

linux@activitypub.awakari.com at 2026-02-03T19:26:37.000Z ## Debian thunderbird Important Info Disclosure Vuln DSA-6118-1 CVE-2026-0818 A security issue was discovered in Thunderbird, which could result in information disclosure For the oldstable distributio...

#Debian #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-15285
(7.5 HIGH)

EPSS: 0.00%

updated 2026-02-04T09:15:50.863000

2 posts

The SEO Flow by LupsOnline plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the checkBlogAuthentication() and checkCategoryAuthentication() functions in all versions up to, and including, 2.2.1. These authorization functions only implement basic API key authentication but fail to implement WordPress capability checks. This makes it possib

thehackerwire@mastodon.social at 2026-02-04T09:17:18.000Z ##

🟠 CVE-2025-15285 - High (7.5)

The SEO Flow by LupsOnline plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the checkBlogAuthentication() and checkCategoryAuthentication() functions in all versions up to, and including,...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T09:17:18.000Z ##

🟠 CVE-2025-15285 - High (7.5)

The SEO Flow by LupsOnline plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the checkBlogAuthentication() and checkCategoryAuthentication() functions in all versions up to, and including,...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-15268
(7.5 HIGH)

EPSS: 0.00%

updated 2026-02-04T09:15:50.690000

2 posts

The Infility Global plugin for WordPress is vulnerable to unauthenticated SQL Injection via the 'infility_get_data' API action in all versions up to, and including, 2.14.46. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append - with certain server configurati

thehackerwire@mastodon.social at 2026-02-04T09:17:08.000Z ##

🟠 CVE-2025-15268 - High (7.5)

The Infility Global plugin for WordPress is vulnerable to unauthenticated SQL Injection via the 'infility_get_data' API action in all versions up to, and including, 2.14.46. This is due to insufficient escaping on the user supplied parameter and l...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T09:17:08.000Z ##

🟠 CVE-2025-15268 - High (7.5)

The Infility Global plugin for WordPress is vulnerable to unauthenticated SQL Injection via the 'infility_get_data' API action in all versions up to, and including, 2.14.46. This is due to insufficient escaping on the user supplied parameter and l...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1819
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-04T08:16:06.820000

2 posts

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Karel Electronics Industry and Trade Inc. ViPort allows Stored XSS.This issue affects ViPort: through 23012026.

thehackerwire@mastodon.social at 2026-02-04T08:17:23.000Z ##

🟠 CVE-2026-1819 - High (8.8)

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Karel Electronics Industry and Trade Inc. ViPort allows Stored XSS.This issue affects ViPort: through 23012026.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T08:17:23.000Z ##

🟠 CVE-2026-1819 - High (8.8)

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Karel Electronics Industry and Trade Inc. ViPort allows Stored XSS.This issue affects ViPort: through 23012026.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1756
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-04T07:15:59.267000

2 posts

The WP FOFT Loader plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the 'WP_FOFT_Loader_Mimes::file_and_ext' function in all versions up to, and including, 2.1.39. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution po

thehackerwire@mastodon.social at 2026-02-04T07:22:29.000Z ##

🟠 CVE-2026-1756 - High (8.8)

The WP FOFT Loader plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the 'WP_FOFT_Loader_Mimes::file_and_ext' function in all versions up to, and including, 2.1.39. This makes it possible for aut...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-04T07:22:29.000Z ##

🟠 CVE-2026-1756 - High (8.8)

The WP FOFT Loader plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the 'WP_FOFT_Loader_Mimes::file_and_ext' function in all versions up to, and including, 2.1.39. This makes it possible for aut...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1861
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-04T00:31:33

2 posts

Heap buffer overflow in libvpx in Google Chrome prior to 144.0.7559.132 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-02-03T23:01:48.000Z ##

🟠 CVE-2026-1861 - High (8.8)

Heap buffer overflow in libvpx in Google Chrome prior to 144.0.7559.132 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T23:01:48.000Z ##

🟠 CVE-2026-1861 - High (8.8)

Heap buffer overflow in libvpx in Google Chrome prior to 144.0.7559.132 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1632
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-02-04T00:30:41

2 posts

MOMA Seismic Station Version v2.4.2520 and prior exposes its web management interface without requiring authentication, which could allow an unauthenticated attacker to modify configuration settings, acquire device data or remotely reset the device.

thehackerwire@mastodon.social at 2026-02-03T23:18:43.000Z ##

🔴 CVE-2026-1632 - Critical (9.1)

MOMA Seismic Station Version v2.4.2520 and prior exposes its web management interface without requiring authentication, which could allow an unauthenticated attacker to modify configuration settings, acquire device data or remotely reset the device.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T23:18:43.000Z ##

🔴 CVE-2026-1632 - Critical (9.1)

MOMA Seismic Station Version v2.4.2520 and prior exposes its web management interface without requiring authentication, which could allow an unauthenticated attacker to modify configuration settings, acquire device data or remotely reset the device.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24513
(3.1 LOW)

EPSS: 0.00%

updated 2026-02-04T00:30:41

2 posts

A security issue was discovered in ingress-nginx where the protection afforded by the `auth-url` Ingress annotation may not be effective in the presence of a specific misconfiguration. If the ingress-nginx controller is configured with a default custom-errors configuration that includes HTTP errors 401 or 403, and if the configured default custom-errors backend is defective and fails to respect t

CVE-2026-24514
(6.5 MEDIUM)

EPSS: 0.00%

updated 2026-02-04T00:30:41

2 posts

A security issue was discovered in ingress-nginx where the validating admission controller feature is subject to a denial of service condition. By sending large requests to the validating admission controller, an attacker can cause memory consumption, which may result in the ingress-nginx controller pod being killed or the node running out of memory.

CVE-2026-1862
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-04T00:30:28

2 posts

Type Confusion in V8 in Google Chrome prior to 144.0.7559.132 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-02-03T23:01:58.000Z ##

🟠 CVE-2026-1862 - High (8.8)

Type Confusion in V8 in Google Chrome prior to 144.0.7559.132 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T23:01:58.000Z ##

🟠 CVE-2026-1862 - High (8.8)

Type Confusion in V8 in Google Chrome prior to 144.0.7559.132 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1633
(10.0 CRITICAL)

EPSS: 0.00%

updated 2026-02-04T00:16:08.557000

4 posts

The Synectix LAN 232 TRIO 3-Port serial to ethernet adapter exposes its web management interface without requiring authentication, allowing unauthenticated users to modify critical device settings or factory reset the device.

beyondmachines1 at 2026-02-04T09:01:02.192Z ##

Critical Authentication Bypass in End-of-Life Synectix LAN 232 TRIO Adapters

Synectix LAN 232 TRIO adapters contain a critical vulnerability (CVE-2026-1633) that allows unauthenticated remote attackers to take full control of the device. Because the manufacturer is out of business, no patches will be released.

**If you use these Synectix adapters, isolate them from the internet immediately because they have no password protection and will never be patched. Since the company is out of business, plan a replacement of the devices.**

beyondmachines.net/event_detai

##

thehackerwire@mastodon.social at 2026-02-04T00:20:01.000Z ##

🔴 CVE-2026-1633 - Critical (10)

The Synectix LAN 232 TRIO 3-Port serial to ethernet adapter exposes its web management interface without requiring authentication, allowing unauthenticated users to modify critical device settings or factory reset the device.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

beyondmachines1@infosec.exchange at 2026-02-04T09:01:02.000Z ##

Critical Authentication Bypass in End-of-Life Synectix LAN 232 TRIO Adapters

Synectix LAN 232 TRIO adapters contain a critical vulnerability (CVE-2026-1633) that allows unauthenticated remote attackers to take full control of the device. Because the manufacturer is out of business, no patches will be released.

**If you use these Synectix adapters, isolate them from the internet immediately because they have no password protection and will never be patched. Since the company is out of business, plan a replacement of the devices.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

thehackerwire@mastodon.social at 2026-02-04T00:20:01.000Z ##

🔴 CVE-2026-1633 - Critical (10)

The Synectix LAN 232 TRIO 3-Port serial to ethernet adapter exposes its web management interface without requiring authentication, allowing unauthenticated users to modify critical device settings or factory reset the device.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24512
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-03T23:16:06.990000

6 posts

A security issue was discovered in ingress-nginx cthe `rules.http.paths.path` Ingress field can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)

undercodenews@mastodon.social at 2026-02-04T10:29:24.000Z ##

Critical Kubernetes Ingress-NGINX Flaw Enables Remote Code Execution Across Clusters

Introduction A newly disclosed high-severity security flaw in Kubernetes’ widely deployed ingress-nginx controller has triggered serious concern across the cloud security ecosystem. Identified as CVE-2026-24512, the vulnerability allows remote attackers to execute arbitrary code by abusing how ingress-nginx processes inbound traffic rules. In real-world terms, this means a single…

undercodenews.com/critical-kub

##

thehackerwire@mastodon.social at 2026-02-03T23:19:01.000Z ##

🟠 CVE-2026-24512 - High (8.8)

A security issue was discovered in ingress-nginx cthe `rules.http.paths.path` Ingress field can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

ChrisShort@hachyderm.io at 2026-02-03T18:11:42.000Z ##

CVE-2026-24512 #devopsish #kubernetes #cve github.com/kubernetes/kubernet

##

mastokukei@social.josko.org at 2026-02-03T18:03:52.000Z ##

deprecation alongside CVEs (e.g., CVE-2026-24512, CVE-25142) and related cloud-native risks.
- Open‑source sustainability and funding: ongoing concerns about funding, burnout, and long‑term project health (CHAOSScon, OFE Summit, FOSDEM discussions).
- CI/CD reliability and tooling: GitHub Actions UI/status issues and deployment pipeline fragility.
- The rise of “vibe coding” and its impact on open source ecosystems and maintainership. [2/2]

##

thehackerwire@mastodon.social at 2026-02-03T23:19:01.000Z ##

🟠 CVE-2026-24512 - High (8.8)

A security issue was discovered in ingress-nginx cthe `rules.http.paths.path` Ingress field can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

ChrisShort@hachyderm.io at 2026-02-03T18:11:42.000Z ##

CVE-2026-24512 #devopsish #kubernetes #cve github.com/kubernetes/kubernet

##

CVE-2026-1580
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-03T23:16:06.290000

5 posts

A security issue was discovered in ingress-nginx where the `nginx.ingress.kubernetes.io/auth-method` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-

mastokukei@social.josko.org at 2026-02-04T09:02:36.000Z ##

(CVE-2026-1580); SandboxJS-related issues (CVE-2026-25142); broader security risks.

- Open-source sustainability and funding: CHAOSScon, OFE Summit, FOSDEM discussions; funding as a tool, maintainer burnout.

- The rise and critique of vibe coding: discussions titled How Vibe Coding Is Killing Open Source and concerns over its impact on maintainers and quality.

- Notebooks as governed data UX: shift from personal notebooks to team-governed data notebooks (LangChain/ADBC [2/3]

##

thehackerwire@mastodon.social at 2026-02-03T23:18:34.000Z ##

🟠 CVE-2026-1580 - High (8.8)

A security issue was discovered in ingress-nginx where the `nginx.ingress.kubernetes.io/auth-method` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

ChrisShort@hachyderm.io at 2026-02-03T19:51:48.000Z ##

CVE-2026-1580 #devopsish #kubernetes #cve github.com/kubernetes/kubernet

##

thehackerwire@mastodon.social at 2026-02-03T23:18:34.000Z ##

🟠 CVE-2026-1580 - High (8.8)

A security issue was discovered in ingress-nginx where the `nginx.ingress.kubernetes.io/auth-method` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

ChrisShort@hachyderm.io at 2026-02-03T19:51:48.000Z ##

CVE-2026-1580 #devopsish #kubernetes #cve github.com/kubernetes/kubernet

##

CVE-2026-25614
(7.5 HIGH)

EPSS: 0.00%

updated 2026-02-03T21:31:59

2 posts

Blesta 3.x through 5.x before 5.13.3 allows object injection, aka CORE-5680.

thehackerwire@mastodon.social at 2026-02-03T20:20:40.000Z ##

🟠 CVE-2026-25614 - High (7.5)

Blesta 3.x through 5.x before 5.13.3 allows object injection, aka CORE-5680.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T20:20:40.000Z ##

🟠 CVE-2026-25614 - High (7.5)

Blesta 3.x through 5.x before 5.13.3 allows object injection, aka CORE-5680.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24149
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-03T21:31:59

2 posts

NVIDIA Megatron-LM for all platforms contains a vulnerability in a script, where malicious data created by an attacker may cause a code injection issue. A successful exploit of this vulnerability may lead to code execution, escalation of privileges, information disclosure, data tampering.

thehackerwire@mastodon.social at 2026-02-03T20:20:31.000Z ##

🟠 CVE-2026-24149 - High (7.8)

NVIDIA Megatron-LM for all platforms contains a vulnerability in a script, where malicious data created by an attacker may cause a code injection issue. A successful exploit of this vulnerability may lead to code execution, escalation of privilege...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T20:20:31.000Z ##

🟠 CVE-2026-24149 - High (7.8)

NVIDIA Megatron-LM for all platforms contains a vulnerability in a script, where malicious data created by an attacker may cause a code injection issue. A successful exploit of this vulnerability may lead to code execution, escalation of privilege...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1803
(8.1 HIGH)

EPSS: 0.00%

updated 2026-02-03T21:31:58

4 posts

A weakness has been identified in Ziroom ZHOME A0101 1.0.1.0. Impacted is an unknown function of the component Dropbear SSH Service. This manipulation causes use of default credentials. Remote exploitation of the attack is possible. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit has been made available to the public and could be used for attacks

thehackerwire@mastodon.social at 2026-02-03T20:21:20.000Z ##

🟠 CVE-2026-1803 - High (8.1)

A weakness has been identified in Ziroom ZHOME A0101 1.0.1.0. Impacted is an unknown function of the component Dropbear SSH Service. This manipulation causes use of default credentials. Remote exploitation of the attack is possible. The complexity...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T20:20:46.000Z ##

🟠 CVE-2026-1803 - High (8.1)

A weakness has been identified in Ziroom ZHOME A0101 1.0.1.0. Impacted is an unknown function of the component Dropbear SSH Service. This manipulation causes use of default credentials. Remote exploitation of the attack is possible. The complexity...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T20:21:20.000Z ##

🟠 CVE-2026-1803 - High (8.1)

A weakness has been identified in Ziroom ZHOME A0101 1.0.1.0. Impacted is an unknown function of the component Dropbear SSH Service. This manipulation causes use of default credentials. Remote exploitation of the attack is possible. The complexity...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T20:20:46.000Z ##

🟠 CVE-2026-1803 - High (8.1)

A weakness has been identified in Ziroom ZHOME A0101 1.0.1.0. Impacted is an unknown function of the component Dropbear SSH Service. This manipulation causes use of default credentials. Remote exploitation of the attack is possible. The complexity...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24954
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-03T21:31:51

2 posts

Deserialization of Untrusted Data vulnerability in magepeopleteam WpEvently mage-eventpress allows Object Injection.This issue affects WpEvently: from n/a through <= 5.0.8.

thehackerwire@mastodon.social at 2026-02-03T19:20:38.000Z ##

🟠 CVE-2026-24954 - High (8.8)

Deserialization of Untrusted Data vulnerability in magepeopleteam WpEvently mage-eventpress allows Object Injection.This issue affects WpEvently: from n/a through &lt;= 5.0.8.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T19:20:38.000Z ##

🟠 CVE-2026-24954 - High (8.8)

Deserialization of Untrusted Data vulnerability in magepeopleteam WpEvently mage-eventpress allows Object Injection.This issue affects WpEvently: from n/a through &lt;= 5.0.8.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20421
(7.5 HIGH)

EPSS: 0.21%

updated 2026-02-03T21:23:50.483000

1 posts

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01738293; Issue ID: MSV-5922.

thehackerwire@mastodon.social at 2026-02-02T23:28:48.000Z ##

🟠 CVE-2026-20421 - High (7.5)

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. Use...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-40551
(9.8 CRITICAL)

EPSS: 1.03%

updated 2026-02-03T21:13:06.187000

11 posts

SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

undercodenews@mastodon.social at 2026-02-04T06:41:14.000Z ##

Critical SolarWinds WHD Vulnerability Added to CISA’s Exploited Vulnerabilities Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has sounded the alarm on a newly discovered critical flaw in SolarWinds Web Help Desk (WHD), underscoring the ever-present danger posed by rapidly exploited software vulnerabilities. The vulnerability, CVE-2025-40551, carries a high CVSS score of 9.8, signaling extreme severity, and could allow attackers to execute…

undercodenews.com/critical-sol

##

oversecurity@mastodon.social at 2026-02-03T21:10:05.000Z ##

CISA orders federal agencies to patch exploited SolarWinds bug by Friday

CVE-2025-40551 carries a critical severity score of 9.8 out of 10 and impacts SolarWinds Web Help Desk (WHD) — an IT service management platform...

🔗️ [Therecord] link.is.it/Ir7OlU

##

defendopsdiaries at 2026-02-03T19:50:02.329Z ##

A single flaw in SolarWinds Web Help Desk is letting hackers break in without even needing a password and over 300,000 organizations are at risk right now. How safe is your IT backbone?

thedefendopsdiaries.com/solarw

##

DarkWebInformer at 2026-02-03T19:40:05.488Z ##

‼️ CISA has added 4 vulnerabilities to the KEV Catalog

darkwebinformer.com/cisa-kev-c

CVE-2025-40551: SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability

CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability

CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability

CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability

##

cisakevtracker@mastodon.social at 2026-02-03T19:01:00.000Z ##

CVE ID: CVE-2025-40551
Vendor: SolarWinds
Product: Web Help Desk
Date Added: 2026-02-03
Notes: solarwinds.com/trust-center/se ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

oversecurity@mastodon.social at 2026-02-03T21:10:05.000Z ##

CISA orders federal agencies to patch exploited SolarWinds bug by Friday

CVE-2025-40551 carries a critical severity score of 9.8 out of 10 and impacts SolarWinds Web Help Desk (WHD) — an IT service management platform...

🔗️ [Therecord] link.is.it/Ir7OlU

##

DarkWebInformer@infosec.exchange at 2026-02-03T19:40:05.000Z ##

‼️ CISA has added 4 vulnerabilities to the KEV Catalog

darkwebinformer.com/cisa-kev-c

CVE-2025-40551: SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability

CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability

CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability

CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability

##

cisakevtracker@mastodon.social at 2026-02-03T19:01:00.000Z ##

CVE ID: CVE-2025-40551
Vendor: SolarWinds
Product: Web Help Desk
Date Added: 2026-02-03
Notes: solarwinds.com/trust-center/se ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

jbz@indieweb.social at 2026-01-29T23:19:00.000Z ##

⚠️ Critical Solarwinds Web Vulnerability Allows Remote Code Execution and Security Bypass

「 Multiple critical vulnerabilities in SolarWinds Web Help Desk (WHD), culminating in unauthenticated remote code execution (RCE) via Java deserialization in CVE-2025-40551, were uncovered by Horizon3.ai researchers.
These flaws chain static credentials, security bypasses, and deserialization weaknesses, affecting versions prior to 2026.1 」

##

DarkWebInformer@infosec.exchange at 2026-01-29T18:10:38.000Z ##

‼️ SolarWinds Web Help Desk RCE Hit by Multiple Critical Security Flaws; CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, CVE-2025-40554

CVSS: All 9.8
CVEs Published: January 28th, 2026

CVE-2025-40551: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

CVE-2025-40552: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.

CVE-2025-40553: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

CVE-2025-40554: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.

Advisories:

nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2

##

Andy_Thompson@infosec.exchange at 2026-01-29T17:54:31.000Z ##

📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.

Sources:
- bleepingcomputer.com/news/secu
- cloud.google.com/blog/topics/t
- nvd.nist.gov/vuln/detail/CVE-2
- helpnetsecurity.com/2026/01/28

---

🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀

CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.

Sources:
- nvd.nist.gov/vuln/detail/CVE-2
infosecurity-magazine.com/news
- openssl-library.org/news/vulne
- twitter.com/IntCyberDigest/sta

---

🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡

SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.

Sources:
- bleepingcomputer.com/news/secu
- helpnetsecurity.com/2026/01/29
- rapid7.com/blog/post/etr-multi
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-40553
(9.8 CRITICAL)

EPSS: 0.78%

updated 2026-02-03T21:10:44.253000

2 posts

SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

DarkWebInformer@infosec.exchange at 2026-01-29T18:10:38.000Z ##

‼️ SolarWinds Web Help Desk RCE Hit by Multiple Critical Security Flaws; CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, CVE-2025-40554

CVSS: All 9.8
CVEs Published: January 28th, 2026

CVE-2025-40551: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

CVE-2025-40552: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.

CVE-2025-40553: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

CVE-2025-40554: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.

Advisories:

nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2

##

Andy_Thompson@infosec.exchange at 2026-01-29T17:54:31.000Z ##

📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.

Sources:
- bleepingcomputer.com/news/secu
- cloud.google.com/blog/topics/t
- nvd.nist.gov/vuln/detail/CVE-2
- helpnetsecurity.com/2026/01/28

---

🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀

CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.

Sources:
- nvd.nist.gov/vuln/detail/CVE-2
infosecurity-magazine.com/news
- openssl-library.org/news/vulne
- twitter.com/IntCyberDigest/sta

---

🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡

SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.

Sources:
- bleepingcomputer.com/news/secu
- helpnetsecurity.com/2026/01/29
- rapid7.com/blog/post/etr-multi
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-25150
(9.3 CRITICAL)

EPSS: 0.00%

updated 2026-02-03T20:49:23

2 posts

### Summary A Prototype Pollution vulnerability exists in the `formToObj()` function within `@builder.io/qwik-city` middleware. The function processes form field names with dot notation (e.g., `user.name`) to create nested objects, but fails to sanitize dangerous property names like `__proto__`, `constructor`, and `prototype`. This allows unauthenticated attackers to pollute `Object.prototype` by

thehackerwire@mastodon.social at 2026-02-03T22:20:16.000Z ##

🔴 CVE-2026-25150 - Critical (9.3)

Qwik is a performance focused javascript framework. Prior to version 1.19.0, a prototype pollution vulnerability exists in the formToObj() function within @builder.io/qwik-city middleware. The function processes form field names with dot notation ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T22:20:16.000Z ##

🔴 CVE-2026-25150 - Critical (9.3)

Qwik is a performance focused javascript framework. Prior to version 1.19.0, a prototype pollution vulnerability exists in the formToObj() function within @builder.io/qwik-city middleware. The function processes form field names with dot notation ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-10878
(10.0 CRITICAL)

EPSS: 0.00%

updated 2026-02-03T20:15:55.837000

2 posts

A SQL injection vulnerability exists in the login functionality of Fikir Odalari AdminPando 1.0.1 before 2026-01-26. The username and password parameters are vulnerable to SQL injection, allowing unauthenticated attackers to bypass authentication completely. Successful exploitation grants full administrative access to the application, including the ability to manipulate the public-facing website c

1 repos

https://github.com/onurcangnc/CVE-2025-10878-AdminPandov1.0.1-SQLi

thehackerwire@mastodon.social at 2026-02-03T20:20:50.000Z ##

🔴 CVE-2025-10878 - Critical (10)

A SQL injection vulnerability exists in the login functionality of Fikir Odalari AdminPando 1.0.1 before 2026-01-26. The username and password parameters are vulnerable to SQL injection, allowing unauthenticated attackers to bypass authentication ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T20:20:50.000Z ##

🔴 CVE-2025-10878 - Critical (10)

A SQL injection vulnerability exists in the login functionality of Fikir Odalari AdminPando 1.0.1 before 2026-01-26. The username and password parameters are vulnerable to SQL injection, allowing unauthenticated attackers to bypass authentication ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1285(CVSS UNKNOWN)

EPSS: 0.00%

updated 2026-02-03T19:31:19

2 posts

An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28. `django.utils.text.Truncator.chars()` and `Truncator.words()` methods (with `html=True`) and the `truncatechars_html` and `truncatewords_html` template filters allow a remote attacker to cause a potential denial-of-service via crafted inputs containing a large number of unmatched HTML end tags. Earlier, unsuppo

thehackerwire@mastodon.social at 2026-02-03T17:23:11.000Z ##

🟠 CVE-2026-1285 - High (7.5)

An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.
`django.utils.text.Truncator.chars()` and `Truncator.words()` methods (with `html=True`) and the `truncatechars_html` and `truncatewords_html` template filters ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T17:23:11.000Z ##

🟠 CVE-2026-1285 - High (7.5)

An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.
`django.utils.text.Truncator.chars()` and `Truncator.words()` methods (with `html=True`) and the `truncatechars_html` and `truncatewords_html` template filters ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-14550(CVSS UNKNOWN)

EPSS: 0.00%

updated 2026-02-03T19:29:48

2 posts

An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28. `ASGIRequest` allows a remote attacker to cause a potential denial-of-service via a crafted request with multiple duplicate headers. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Jiyong Yang for reporting this issue.

thehackerwire@mastodon.social at 2026-02-03T17:23:21.000Z ##

🟠 CVE-2025-14550 - High (7.5)

An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.
`ASGIRequest` allows a remote attacker to cause a potential denial-of-service via a crafted request with multiple duplicate headers.
Earlier, unsupported Django...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T17:23:21.000Z ##

🟠 CVE-2025-14550 - High (7.5)

An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.
`ASGIRequest` allows a remote attacker to cause a potential denial-of-service via a crafted request with multiple duplicate headers.
Earlier, unsupported Django...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-67848
(8.1 HIGH)

EPSS: 0.06%

updated 2026-02-03T19:16:27

2 posts

A flaw was found in Moodle. This authentication bypass vulnerability allows suspended users to authenticate through the Learning Tools Interoperability (LTI) Provider. The issue arises from the LTI authentication handlers failing to enforce the user's suspension status, enabling unauthorized access to the system. This can lead to information disclosure or other unauthorized actions by users who sh

thehackerwire@mastodon.social at 2026-02-03T11:22:54.000Z ##

🟠 CVE-2025-67848 - High (8.1)

A flaw was found in Moodle. This authentication bypass vulnerability allows suspended users to authenticate through the Learning Tools Interoperability (LTI) Provider. The issue arises from the LTI authentication handlers failing to enforce the us...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T11:22:54.000Z ##

🟠 CVE-2025-67848 - High (8.1)

A flaw was found in Moodle. This authentication bypass vulnerability allows suspended users to authenticate through the Learning Tools Interoperability (LTI) Provider. The issue arises from the LTI authentication handlers failing to enforce the us...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70841
(10.0 CRITICAL)

EPSS: 0.00%

updated 2026-02-03T18:30:54

2 posts

Dokans Multi-Tenancy Based eCommerce Platform SaaS 3.9.2 allows unauthenticated remote attackers to obtain sensitive application configuration data via direct request to /script/.env file. The exposed file contains Laravel application encryption key (APP_KEY), database credentials, SMTP/SendGrid API credentials, and internal configuration parameters, enabling complete system compromise including a

thehackerwire@mastodon.social at 2026-02-03T18:21:51.000Z ##

🔴 CVE-2025-70841 - Critical (10)

Dokans Multi-Tenancy Based eCommerce Platform SaaS 3.9.2 allows unauthenticated remote attackers to obtain sensitive application configuration data via direct request to /script/.env file. The exposed file contains Laravel application encryption k...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T18:21:51.000Z ##

🔴 CVE-2025-70841 - Critical (10)

Dokans Multi-Tenancy Based eCommerce Platform SaaS 3.9.2 allows unauthenticated remote attackers to obtain sensitive application configuration data via direct request to /script/.env file. The exposed file contains Laravel application encryption k...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-65875
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-03T18:30:53

2 posts

An arbitrary file upload vulnerability in the AddFont() function of FPDF v1.86 and earlier allows attackers to execute arbitrary code via uploading a crafted PHP file.

thehackerwire@mastodon.social at 2026-02-03T18:22:00.000Z ##

🟠 CVE-2025-65875 - High (8.8)

An arbitrary file upload vulnerability in the AddFont() function of FPDF v1.86 and earlier allows attackers to execute arbitrary code via uploading a crafted PHP file.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T18:22:00.000Z ##

🟠 CVE-2025-65875 - High (8.8)

An arbitrary file upload vulnerability in the AddFont() function of FPDF v1.86 and earlier allows attackers to execute arbitrary code via uploading a crafted PHP file.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2021-39935
(7.5 HIGH)

EPSS: 28.25%

updated 2026-02-03T18:30:29

7 posts

An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.5 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. Unauthorized external users could perform Server Side Requests via the CI Lint API

DarkWebInformer at 2026-02-03T19:40:05.488Z ##

‼️ CISA has added 4 vulnerabilities to the KEV Catalog

darkwebinformer.com/cisa-kev-c

CVE-2025-40551: SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability

CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability

CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability

CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability

##

secdb at 2026-02-03T18:00:13.937Z ##

🚨 [CISA-2026:0203] CISA Adds 3 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 3 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2019-19006 (secdb.nttzen.cloud/cve/detail/)
- Name: Sangoma FreePBX Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Sangoma
- Product: FreePBX
- Notes: wiki.freepbx.org/display/FOP/2 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2021-39935 (secdb.nttzen.cloud/cve/detail/)
- Name: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: GitLab
- Product: Community and Enterprise Editions
- Notes: about.gitlab.com/releases/2021 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-64328 (secdb.nttzen.cloud/cve/detail/)
- Name: Sangoma FreePBX OS Command Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Sangoma
- Product: FreePBX
- Notes: github.com/FreePBX/security-re ; nvd.nist.gov/vuln/detail/CVE-2

##

AAKL at 2026-02-03T16:25:06.971Z ##

CISA has updated the KEV catalogue.

- CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability cve.org/CVERecord?id=CVE-2019-

- CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability cve.org/CVERecord?id=CVE-2021-

##

cisakevtracker@mastodon.social at 2026-02-03T16:01:09.000Z ##

CVE ID: CVE-2021-39935
Vendor: GitLab
Product: Community and Enterprise Editions
Date Added: 2026-02-03
Notes: about.gitlab.com/releases/2021 ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

DarkWebInformer@infosec.exchange at 2026-02-03T19:40:05.000Z ##

‼️ CISA has added 4 vulnerabilities to the KEV Catalog

darkwebinformer.com/cisa-kev-c

CVE-2025-40551: SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability

CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability

CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability

CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability

##

AAKL@infosec.exchange at 2026-02-03T16:25:06.000Z ##

CISA has updated the KEV catalogue.

- CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability cve.org/CVERecord?id=CVE-2019-

- CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability cve.org/CVERecord?id=CVE-2021- #CISA #infosec #GitLab #vulnerability

##

cisakevtracker@mastodon.social at 2026-02-03T16:01:09.000Z ##

CVE ID: CVE-2021-39935
Vendor: GitLab
Product: Community and Enterprise Editions
Date Added: 2026-02-03
Notes: about.gitlab.com/releases/2021 ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2019-19006
(9.8 CRITICAL)

EPSS: 2.14%

updated 2026-02-03T18:30:27

7 posts

Sangoma FreePBX 115.0.16.26 and below, 14.0.13.11 and below, 13.0.197.13 and below have Incorrect Access Control.

DarkWebInformer at 2026-02-03T19:40:05.488Z ##

‼️ CISA has added 4 vulnerabilities to the KEV Catalog

darkwebinformer.com/cisa-kev-c

CVE-2025-40551: SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability

CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability

CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability

CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability

##

secdb at 2026-02-03T18:00:13.937Z ##

🚨 [CISA-2026:0203] CISA Adds 3 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 3 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2019-19006 (secdb.nttzen.cloud/cve/detail/)
- Name: Sangoma FreePBX Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Sangoma
- Product: FreePBX
- Notes: wiki.freepbx.org/display/FOP/2 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2021-39935 (secdb.nttzen.cloud/cve/detail/)
- Name: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: GitLab
- Product: Community and Enterprise Editions
- Notes: about.gitlab.com/releases/2021 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-64328 (secdb.nttzen.cloud/cve/detail/)
- Name: Sangoma FreePBX OS Command Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Sangoma
- Product: FreePBX
- Notes: github.com/FreePBX/security-re ; nvd.nist.gov/vuln/detail/CVE-2

##

AAKL at 2026-02-03T16:25:06.971Z ##

CISA has updated the KEV catalogue.

- CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability cve.org/CVERecord?id=CVE-2019-

- CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability cve.org/CVERecord?id=CVE-2021-

##

cisakevtracker@mastodon.social at 2026-02-03T16:01:41.000Z ##

CVE ID: CVE-2019-19006
Vendor: Sangoma
Product: FreePBX
Date Added: 2026-02-03
Notes: wiki.freepbx.org/display/FOP/2 ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

DarkWebInformer@infosec.exchange at 2026-02-03T19:40:05.000Z ##

‼️ CISA has added 4 vulnerabilities to the KEV Catalog

darkwebinformer.com/cisa-kev-c

CVE-2025-40551: SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability

CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability

CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability

CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability

##

AAKL@infosec.exchange at 2026-02-03T16:25:06.000Z ##

CISA has updated the KEV catalogue.

- CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability cve.org/CVERecord?id=CVE-2019-

- CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability cve.org/CVERecord?id=CVE-2021- #CISA #infosec #GitLab #vulnerability

##

cisakevtracker@mastodon.social at 2026-02-03T16:01:41.000Z ##

CVE ID: CVE-2019-19006
Vendor: Sangoma
Product: FreePBX
Date Added: 2026-02-03
Notes: wiki.freepbx.org/display/FOP/2 ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-24773
(7.5 HIGH)

EPSS: 0.00%

updated 2026-02-03T18:16:24.373000

4 posts

The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, an Insecure Direct Object Reference (IDOR) vulnerability allows unauthenticated remote attackers to access personal files of other users by directly requesting predictable user identifiers. This issue has been patched in version 4.2.

thehackerwire@mastodon.social at 2026-02-03T18:22:21.000Z ##

🟠 CVE-2026-24773 - High (7.5)

The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, an Insecure Direct Object Reference (IDOR) vulnerability allows unauthenticated remote attackers to access personal files of ot...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T18:21:23.000Z ##

🟠 CVE-2026-24773 - High (7.5)

The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, an Insecure Direct Object Reference (IDOR) vulnerability allows unauthenticated remote attackers to access personal files of ot...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T18:22:21.000Z ##

🟠 CVE-2026-24773 - High (7.5)

The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, an Insecure Direct Object Reference (IDOR) vulnerability allows unauthenticated remote attackers to access personal files of ot...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T18:21:23.000Z ##

🟠 CVE-2026-24773 - High (7.5)

The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, an Insecure Direct Object Reference (IDOR) vulnerability allows unauthenticated remote attackers to access personal files of ot...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-65889
(7.5 HIGH)

EPSS: 0.05%

updated 2026-02-03T17:56:57.603000

1 posts

A type validation flaw in the flow.dstack() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

thehackerwire@mastodon.social at 2026-01-30T06:21:43.000Z ##

🟠 CVE-2025-65889 - High (7.5)

A type validation flaw in the flow.dstack() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1568
(9.6 CRITICAL)

EPSS: 0.00%

updated 2026-02-03T17:15:59.893000

2 posts

Rapid7 InsightVM versions before 8.34.0 contain a signature verification issue on the Assertion Consumer Service (ACS) cloud endpoint that could allow an attacker to gain unauthorized access to InsightVM accounts setup via "Security Console" installations, resulting in full account takeover. The issue occurs due to the application processing these unsigned assertions and issuing session cookies th

thehackerwire@mastodon.social at 2026-02-03T17:23:02.000Z ##

🔴 CVE-2026-1568 - Critical (9.6)

Rapid7 InsightVM versions before 8.34.0 contain a signature verification issue on the Assertion Consumer Service (ACS) cloud endpoint that could allow an attacker to gain unauthorized access to InsightVM accounts setup
via "Security Console" ins...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T17:23:02.000Z ##

🔴 CVE-2026-1568 - Critical (9.6)

Rapid7 InsightVM versions before 8.34.0 contain a signature verification issue on the Assertion Consumer Service (ACS) cloud endpoint that could allow an attacker to gain unauthorized access to InsightVM accounts setup
via "Security Console" ins...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25253
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-03T16:44:36.630000

6 posts

OpenClaw (aka clawdbot or Moltbot) before 2026.1.29 obtains a gatewayUrl value from a query string and automatically makes a WebSocket connection without prompting, sending a token value.

1 repos

https://github.com/ethiack/moltbot-1click-rce

threatcodex at 2026-02-03T18:56:14.206Z ##

Hunting OpenClaw Exposures: CVE-2026-25253 in Internet-Facing AI Agent Gateways

hunt.io/blog/cve-2026-25253-op

##

benzogaga33@mamot.fr at 2026-02-03T16:40:03.000Z ##

OpenClaw – CVE-2026-25253 : un lien malveillant suffit à exécuter du code à distance en 1-clic it-connect.fr/openclaw-cve-202 #ActuCybersécurité #Cybersécurité #IA

##

benzogaga33@mamot.fr at 2026-02-03T16:40:03.000Z ##

OpenClaw – CVE-2026-25253 : un lien malveillant suffit à exécuter du code à distance en 1-clic it-connect.fr/openclaw-cve-202 #ActuCybersécurité #Cybersécurité #IA

##

hackerworkspace@infosec.exchange at 2026-02-02T21:27:57.000Z ##

depthfirst | 1-Click RCE To Steal Your Moltbot Data and Keys (CVE-2026-25253)

depthfirst.com/post/1-click-rc

#databreach #vulnerability #exploit #openclaw #moltbot

##

youranonnewsirc@nerdculture.de at 2026-02-02T19:45:30.000Z ##

Here's a summary of the latest global, technology, and cybersecurity news from the last 24-48 hours:

**Global:** US-Iran talks on a nuclear deal are progressing, though Iran warned of regional war if attacked (Feb 1-2). A Russian drone strike killed 15 mineworkers in Dnipro, Ukraine (Feb 1).

**Tech/Cybersecurity:** ETSI launched a new, globally applicable cybersecurity standard for AI models (ETSI EN 304 223, Feb 2). A critical remote code execution (RCE) flaw in the OpenClaw AI assistant (CVE-2026-25253) was disclosed (Feb 2). AI-driven cyber threats are escalating, and Microsoft's extensive AI infrastructure spending is raising Wall Street concerns (Jan 30 - Feb 2).

#News #Anonymous #AnonNews_irc

##

thehackerwire@mastodon.social at 2026-02-01T23:20:05.000Z ##

🟠 CVE-2026-25253 - High (8.8)

OpenClaw (aka clawdbot or Moltbot) before 2026.1.29 obtains a gatewayUrl value from a query string and automatically makes a WebSocket connection without prompting, sending a token value.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20402
(7.5 HIGH)

EPSS: 0.21%

updated 2026-02-03T16:44:36.630000

2 posts

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00693083; Issue ID: MSV-5928.

thehackerwire@mastodon.social at 2026-02-02T23:52:42.000Z ##

🟠 CVE-2026-20402 - High (7.5)

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. Use...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T23:52:42.000Z ##

🟠 CVE-2026-20402 - High (7.5)

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. Use...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20412
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-03T16:44:36.630000

1 posts

In cameraisp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10351676; Issue ID: MSV-5733.

thehackerwire@mastodon.social at 2026-02-02T18:18:27.000Z ##

🟠 CVE-2026-20412 - High (7.8)

In cameraisp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-15030
(9.8 CRITICAL)

EPSS: 0.01%

updated 2026-02-03T16:44:36.630000

1 posts

The User Profile Builder WordPress plugin before 3.15.2 does not have a proper password reset process, allowing a few unauthenticated requests to reset the password of any user by knowing their username, such as administrator ones, and therefore gain access to their account

thehackerwire@mastodon.social at 2026-02-02T17:14:56.000Z ##

🔴 CVE-2025-15030 - Critical (9.8)

The User Profile Builder WordPress plugin before 3.15.2 does not have a proper password reset process, allowing a few unauthenticated requests to reset the password of any user by knowing their username, such as administrator ones, and therefore ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-47399
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-03T16:44:36.630000

1 posts

Memory Corruption while processing IOCTL call to update sensor property settings with invalid input parameters.

thehackerwire@mastodon.social at 2026-02-02T16:18:38.000Z ##

🟠 CVE-2025-47399 - High (7.8)

Memory Corruption while processing IOCTL call to update sensor property settings with invalid input parameters.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20408
(8.8 HIGH)

EPSS: 0.02%

updated 2026-02-03T16:44:36.630000

1 posts

In wlan, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00461651; Issue ID: MSV-4758.

thehackerwire@mastodon.social at 2026-02-02T15:19:37.000Z ##

🟠 CVE-2026-20408 - High (8)

In wlan, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-8587
(8.6 HIGH)

EPSS: 0.01%

updated 2026-02-03T16:44:36.630000

1 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in AKCE Software Technology R&D Industry and Trade Inc. SKSPro allows SQL Injection.This issue affects SKSPro: through 07012026.

thehackerwire@mastodon.social at 2026-02-02T13:17:37.000Z ##

🟠 CVE-2025-8587 - High (8.6)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in AKCE Software Technology R&D Industry and Trade Inc. SKSPro allows SQL Injection.This issue affects SKSPro: through 07012026.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25200
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-02-03T16:44:36.630000

1 posts

A vulnerability in MagicInfo9 Server allows authorized users to upload HTML files without authentication, leading to Stored XSS, which can result in account takeover This issue affects MagicINFO 9 Server: less than 21.1090.1.

thehackerwire@mastodon.social at 2026-02-02T05:23:46.000Z ##

🔴 CVE-2026-25200 - Critical (9.8)

A vulnerability in MagicInfo9 Server allows authorized users to upload HTML files without authentication, leading to Stored XSS, which can result in account takeover

This issue affects MagicINFO 9 Server: less than 21.1090.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25142
(10.0 CRITICAL)

EPSS: 0.10%

updated 2026-02-03T16:44:03.343000

3 posts

SandboxJS is a JavaScript sandboxing library. Prior to 0.8.27, SanboxJS does not properly restrict __lookupGetter__ which can be used to obtain prototypes, which can be used for escaping the sandbox / remote code execution. This vulnerability is fixed in 0.8.27.

mastokukei@social.josko.org at 2026-02-04T09:02:36.000Z ##

(CVE-2026-1580); SandboxJS-related issues (CVE-2026-25142); broader security risks.

- Open-source sustainability and funding: CHAOSScon, OFE Summit, FOSDEM discussions; funding as a tool, maintainer burnout.

- The rise and critique of vibe coding: discussions titled How Vibe Coding Is Killing Open Source and concerns over its impact on maintainers and quality.

- Notebooks as governed data UX: shift from personal notebooks to team-governed data notebooks (LangChain/ADBC [2/3]

##

mastokukei@social.josko.org at 2026-02-03T09:02:37.000Z ##

Blip blop, I'm a #mastobot.
Here is a summary (in beta) of the latest posts in #programmingAtKukei masto.kukei.eu/browse/programm category:
- Claude Code at Microsoft and the rise of AI coding assistants; OpenAI Codex app for macOS.
- OpenClaw/Moltbot vulnerabilities and security concerns around AI agents.
- Ingress-Nginx deprecation and multiple Kubernetes security exploits.
- CVE-2026-25142: SandboxJS JavaScript sandboxing library high-severity flaw.
- CVE-2026-1730: [1/2]

##

thehackerwire@mastodon.social at 2026-02-02T23:18:39.000Z ##

🔴 CVE-2026-25142 - Critical (10)

SandboxJS is a JavaScript sandboxing library. Prior to 0.8.27, SanboxJS does not properly restrict __lookupGetter__ which can be used to obtain prototypes, which can be used for escaping the sandbox / remote code execution. This vulnerability is f...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-6397
(8.6 HIGH)

EPSS: 0.00%

updated 2026-02-03T16:44:03.343000

2 posts

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Ankara Hosting Website Design Website Software allows Reflected XSS.This issue affects Website Software: through 03022026.  NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

thehackerwire@mastodon.social at 2026-02-03T13:17:54.000Z ##

🟠 CVE-2025-6397 - High (8.6)

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Ankara Hosting Website Design Website Software allows Reflected XSS.This issue affects Website Software: through 03022026. 

NOTE: The ve...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T13:17:54.000Z ##

🟠 CVE-2025-6397 - High (8.6)

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Ankara Hosting Website Design Website Software allows Reflected XSS.This issue affects Website Software: through 03022026. 

NOTE: The ve...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-67853
(7.5 HIGH)

EPSS: 0.04%

updated 2026-02-03T16:44:03.343000

2 posts

A flaw was found in Moodle. A remote attacker could exploit a lack of proper rate limiting in the confirmation email service. This vulnerability allows attackers to more easily enumerate or guess user credentials, facilitating brute-force attacks against user accounts.

thehackerwire@mastodon.social at 2026-02-03T11:22:44.000Z ##

🟠 CVE-2025-67853 - High (7.5)

A flaw was found in Moodle. A remote attacker could exploit a lack of proper rate limiting in the confirmation email service. This vulnerability allows attackers to more easily enumerate or guess user credentials, facilitating brute-force attacks ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T11:22:44.000Z ##

🟠 CVE-2025-67853 - High (7.5)

A flaw was found in Moodle. A remote attacker could exploit a lack of proper rate limiting in the confirmation email service. This vulnerability allows attackers to more easily enumerate or guess user credentials, facilitating brute-force attacks ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-8456
(7.6 HIGH)

EPSS: 0.03%

updated 2026-02-03T16:44:03.343000

2 posts

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Kod8 Software Technologies Trade Ltd. Co. Kod8 Individual and SME Website allows Reflected XSS.This issue affects Kod8 Individual and SME Website: through 03022026.  NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

thehackerwire@mastodon.social at 2026-02-03T09:59:50.000Z ##

🟠 CVE-2025-8456 - High (7.6)

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Kod8 Software Technologies Trade Ltd. Co. Kod8 Individual and SME Website allows Reflected XSS.This issue affects Kod8 Individual and SME ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T09:59:50.000Z ##

🟠 CVE-2025-8456 - High (7.6)

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Kod8 Software Technologies Trade Ltd. Co. Kod8 Individual and SME Website allows Reflected XSS.This issue affects Kod8 Individual and SME ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-8590
(7.5 HIGH)

EPSS: 0.03%

updated 2026-02-03T16:44:03.343000

2 posts

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in AKCE Software Technology R&D Industry and Trade Inc. SKSPro allows Directory Indexing.This issue affects SKSPro: through 07012026.

thehackerwire@mastodon.social at 2026-02-03T08:18:02.000Z ##

🟠 CVE-2025-8590 - High (7.5)

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in AKCE Software Technology R&D Industry and Trade Inc. SKSPro allows Directory Indexing.This issue affects SKSPro: through 07012026.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T08:18:02.000Z ##

🟠 CVE-2025-8590 - High (7.5)

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in AKCE Software Technology R&D Industry and Trade Inc. SKSPro allows Directory Indexing.This issue affects SKSPro: through 07012026.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24465
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-02-03T16:44:03.343000

2 posts

Stack-based buffer overflow vulnerability exists in ELECOM wireless LAN access point devices. A crafted packet may lead to arbitrary code execution.

thehackerwire@mastodon.social at 2026-02-03T07:18:50.000Z ##

🔴 CVE-2026-24465 - Critical (9.8)

Stack-based buffer overflow vulnerability exists in ELECOM wireless LAN access point devices. A crafted packet may lead to arbitrary code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T07:18:50.000Z ##

🔴 CVE-2026-24465 - Critical (9.8)

Stack-based buffer overflow vulnerability exists in ELECOM wireless LAN access point devices. A crafted packet may lead to arbitrary code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22778
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-02-03T16:44:03.343000

1 posts

vLLM is an inference and serving engine for large language models (LLMs). From 0.8.3 to before 0.14.1, when an invalid image is sent to vLLM's multimodal endpoint, PIL throws an error. vLLM returns this error to the client, leaking a heap address. With this leak, we reduce ASLR from 4 billion guesses to ~8 guesses. This vulnerability can be chained a heap overflow with JPEG2000 decoder in OpenCV/F

thehackerwire@mastodon.social at 2026-02-02T23:21:16.000Z ##

🔴 CVE-2026-22778 - Critical (9.8)

vLLM is an inference and serving engine for large language models (LLMs). From 0.8.3 to before 0.14.1, when an invalid image is sent to vLLM's multimodal endpoint, PIL throws an error. vLLM returns this error to the client, leaking a heap address....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23515
(9.9 CRITICAL)

EPSS: 0.91%

updated 2026-02-03T16:44:03.343000

1 posts

Signal K Server is a server application that runs on a central hub in a boat. Prior to 1.5.0, a command injection vulnerability allows authenticated users with write permissions to execute arbitrary shell commands on the Signal K server when the set-system-time plugin is enabled. Unauthenticated users can also exploit this vulnerability if security is disabled on the Signal K server. This occurs d

thehackerwire@mastodon.social at 2026-02-02T23:19:55.000Z ##

🔴 CVE-2026-23515 - Critical (9.9)

Signal K Server is a server application that runs on a central hub in a boat. Prior to 1.5.0, a command injection vulnerability allows authenticated users with write permissions to execute arbitrary shell commands on the Signal K server when the s...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-64328
(0 None)

EPSS: 0.46%

updated 2026-02-03T16:16:10.400000

7 posts

FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. In versions 17.0.2.36 and above before 17.0.3, the filestore module within the Administrative interface is vulnerable to a post-authentication command injection by an authenticated known user via the testconnection -> check_ssh_connect() function. An attacker can leverage this vulnerability to obtain remote a

1 repos

https://github.com/mcorybillington/CVE-2025-64328_FreePBX-framework-Command-Injection

DarkWebInformer at 2026-02-03T19:40:05.488Z ##

‼️ CISA has added 4 vulnerabilities to the KEV Catalog

darkwebinformer.com/cisa-kev-c

CVE-2025-40551: SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability

CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability

CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability

CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability

##

secdb at 2026-02-03T18:00:13.937Z ##

🚨 [CISA-2026:0203] CISA Adds 3 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 3 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2019-19006 (secdb.nttzen.cloud/cve/detail/)
- Name: Sangoma FreePBX Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Sangoma
- Product: FreePBX
- Notes: wiki.freepbx.org/display/FOP/2 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2021-39935 (secdb.nttzen.cloud/cve/detail/)
- Name: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: GitLab
- Product: Community and Enterprise Editions
- Notes: about.gitlab.com/releases/2021 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-64328 (secdb.nttzen.cloud/cve/detail/)
- Name: Sangoma FreePBX OS Command Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Sangoma
- Product: FreePBX
- Notes: github.com/FreePBX/security-re ; nvd.nist.gov/vuln/detail/CVE-2

##

AAKL at 2026-02-03T16:25:06.971Z ##

CISA has updated the KEV catalogue.

- CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability cve.org/CVERecord?id=CVE-2019-

- CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability cve.org/CVERecord?id=CVE-2021-

##

cisakevtracker@mastodon.social at 2026-02-03T16:01:25.000Z ##

CVE ID: CVE-2025-64328
Vendor: Sangoma
Product: FreePBX
Date Added: 2026-02-03
Notes: github.com/FreePBX/security-re ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

DarkWebInformer@infosec.exchange at 2026-02-03T19:40:05.000Z ##

‼️ CISA has added 4 vulnerabilities to the KEV Catalog

darkwebinformer.com/cisa-kev-c

CVE-2025-40551: SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability

CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability

CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability

CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability

##

AAKL@infosec.exchange at 2026-02-03T16:25:06.000Z ##

CISA has updated the KEV catalogue.

- CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability cve.org/CVERecord?id=CVE-2019-

- CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability cve.org/CVERecord?id=CVE-2021- #CISA #infosec #GitLab #vulnerability

##

cisakevtracker@mastodon.social at 2026-02-03T16:01:25.000Z ##

CVE ID: CVE-2025-64328
Vendor: Sangoma
Product: FreePBX
Date Added: 2026-02-03
Notes: github.com/FreePBX/security-re ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-25060
(8.1 HIGH)

EPSS: 0.01%

updated 2026-02-03T16:13:27

1 posts

### Summary The application disables TLS certificate verification by default for all outgoing storage driver communications, making the system vulnerable to Man-in-the-Middle (MitM) attacks. This enables the complete decryption, theft, and manipulation of all data transmitted during storage operations, severely compromising the confidentiality and integrity of user data. ### Details Certificate v

thehackerwire@mastodon.social at 2026-02-02T23:19:46.000Z ##

🟠 CVE-2026-25060 - High (8.1)

OpenList Frontend is a UI component for OpenList. Prior to 4.1.10, certificate verification is disabled by default for all storage driver communications. The TlsInsecureSkipVerify setting is default to true in the DefaultConfig() function in inter...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25059
(8.8 HIGH)

EPSS: 0.02%

updated 2026-02-03T16:13:22

1 posts

### Summary The application contains a Path Traversal vulnerability (CWE-22) in multiple file operation handlers. An authenticated attacker can bypass directory-level authorisation by injecting traversal sequences into filename components, enabling unauthorised file removal and copying across user boundaries within the same storage mount. ### Details The application contains a Path Traversal vuln

thehackerwire@mastodon.social at 2026-02-02T23:19:45.000Z ##

🟠 CVE-2026-25059 - High (8.8)

OpenList Frontend is a UI component for OpenList. Prior to 4.1.10, the application contains path traversal vulnerability in multiple file operation handlers in server/handles/fsmanage.go. Filename components in req.Names are directly concatenated ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24763
(8.8 HIGH)

EPSS: 0.07%

updated 2026-02-03T16:13:07

2 posts

### Summary A Command Injection vulnerability existed in Clawdbot’s Docker sandbox execution mechanism due to unsafe handling of the PATH environment variable when constructing shell commands. An authenticated user able to control environment variables could influence command execution within the container context. This issue has been fixed and regression tests have been added to prevent reintrod

thehackerwire@mastodon.social at 2026-02-02T23:20:59.000Z ##

🟠 CVE-2026-24763 - High (8.8)

OpenClaw (formerly Clawdbot) is a personal AI assistant you run on your own devices. Prior to 2026.1.29, a command injection vulnerability existed in OpenClaw’s Docker sandbox execution mechanism due to unsafe handling of the PATH environment v...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T23:19:35.000Z ##

🟠 CVE-2026-24763 - High (8.8)

OpenClaw (formerly Clawdbot) is a personal AI assistant you run on your own devices. Prior to 2026.1.29, a command injection vulnerability existed in OpenClaw’s Docker sandbox execution mechanism due to unsafe handling of the PATH environment v...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24737
(8.1 HIGH)

EPSS: 0.01%

updated 2026-02-03T16:13:02

2 posts

### Impact User control of properties and methods of the Acroform module allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsanitized input to one of the following methods or properties, a user can inject arbitrary PDF objects, such as JavaScript actions, which are executed when the victim opens the document. The vulnerable API members ar

thehackerwire@mastodon.social at 2026-02-02T23:20:49.000Z ##

🟠 CVE-2026-24737 - High (8.1)

jsPDF is a library to generate PDFs in JavaScript. Prior to 4.1.0, user control of properties and methods of the Acroform module allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsanitized...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T23:19:26.000Z ##

🟠 CVE-2026-24737 - High (8.1)

jsPDF is a library to generate PDFs in JavaScript. Prior to 4.1.0, user control of properties and methods of the Acroform module allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsanitized...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23997
(8.0 HIGH)

EPSS: 0.01%

updated 2026-02-03T16:12:22

1 posts

### Summary A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the Observations field. The flaw occurs in the History view, where historical data is rendered without proper HTML entity encoding. This allows an attacker to execute arbitrary JavaScript in the browser of viewing the history by administrators. ### Details When an administrator views the History tab of that specific

thehackerwire@mastodon.social at 2026-02-02T23:20:05.000Z ##

🟠 CVE-2026-23997 - High (8)

FacturaScripts is open-source enterprise resource planning and accounting software. In 2025.71 and earlier, a Stored Cross-Site Scripting (XSS) vulnerability was discovered in the Observations field. The flaw occurs in the History view, where hist...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-71007
(7.5 HIGH)

EPSS: 0.05%

updated 2026-02-03T16:06:35.320000

3 posts

An input validation vulnerability in the oneflow.index_add component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

thehackerwire@mastodon.social at 2026-01-29T20:03:03.000Z ##

🟠 CVE-2025-71007 - High (7.5)

An input validation vulnerability in the oneflow.index_add component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T19:48:09.000Z ##

🟠 CVE-2025-71007 - High (7.5)

An input validation vulnerability in the oneflow.index_add component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-29T19:47:35.000Z ##

🟠 CVE-2025-71007 - High (7.5)

An input validation vulnerability in the oneflow.index_add component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25510
(10.0 CRITICAL)

EPSS: 0.00%

updated 2026-02-03T16:03:26

4 posts

**Summary** A critical vulnerability has been identified in CI4MS that allows an authenticated user with file editor permissions to achieve Remote Code Execution (RCE). By leveraging the file creation and save endpoints, an attacker can upload and execute arbitrary PHP code on the server. **Vulnerability Details** The vulnerability exists in the /backend/fileeditor/createFile and /backend/filee

thehackerwire@mastodon.social at 2026-02-03T22:20:06.000Z ##

🔴 CVE-2026-25510 - Critical (9.9)

CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.28.5.0, an authenticated user with file editor permissions can achieve Remote Code Exe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T22:19:27.000Z ##

🔴 CVE-2026-25510 - Critical (9.9)

CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.28.5.0, an authenticated user with file editor permissions can achieve Remote Code Exe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T22:20:06.000Z ##

🔴 CVE-2026-25510 - Critical (9.9)

CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.28.5.0, an authenticated user with file editor permissions can achieve Remote Code Exe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T22:19:27.000Z ##

🔴 CVE-2026-25510 - Critical (9.9)

CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.28.5.0, an authenticated user with file editor permissions can achieve Remote Code Exe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25022
(8.5 HIGH)

EPSS: 0.00%

updated 2026-02-03T15:30:38

2 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Iqonic Design KiviCare kivicare-clinic-management-system allows Blind SQL Injection.This issue affects KiviCare: from n/a through <= 3.6.16.

thehackerwire@mastodon.social at 2026-02-03T15:19:27.000Z ##

🟠 CVE-2026-25022 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Iqonic Design KiviCare kivicare-clinic-management-system allows Blind SQL Injection.This issue affects KiviCare: from n/a through &lt;= 3.6.16.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T15:19:27.000Z ##

🟠 CVE-2026-25022 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Iqonic Design KiviCare kivicare-clinic-management-system allows Blind SQL Injection.This issue affects KiviCare: from n/a through &lt;= 3.6.16.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-5319
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-02-03T15:30:33

2 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Emit Information and Communication Technologies Industry and Trade Ltd. Co. Efficiency Management System allows SQL Injection.This issue affects Efficiency Management System: through 03022026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

1 repos

https://github.com/sahici/CVE-2025-5319

thehackerwire@mastodon.social at 2026-02-03T15:20:21.000Z ##

🔴 CVE-2025-5319 - Critical (9.8)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Emit Information and Communication Technologies Industry and Trade Ltd. Co. Efficiency Management System allows SQL Injection.This issue affects ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T15:20:21.000Z ##

🔴 CVE-2025-5319 - Critical (9.8)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Emit Information and Communication Technologies Industry and Trade Ltd. Co. Efficiency Management System allows SQL Injection.This issue affects ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-7760
(7.6 HIGH)

EPSS: 0.00%

updated 2026-02-03T15:30:33

2 posts

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Ofisimo Web-Based Software Technologies Association Web Package Flora allows XSS Through HTTP Headers.This issue affects Association Web Package Flora: from v3.0 through 03022026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

thehackerwire@mastodon.social at 2026-02-03T13:17:44.000Z ##

🟠 CVE-2025-7760 - High (7.6)

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Ofisimo Web-Based Software Technologies Association Web Package Flora allows XSS Through HTTP Headers.This issue affects Association Web P...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T13:17:44.000Z ##

🟠 CVE-2025-7760 - High (7.6)

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Ofisimo Web-Based Software Technologies Association Web Package Flora allows XSS Through HTTP Headers.This issue affects Association Web P...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-8461
(7.6 HIGH)

EPSS: 0.03%

updated 2026-02-03T09:30:34

2 posts

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Seres Software syWEB allows Reflected XSS.This issue affects syWEB: through 03022026.  NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

thehackerwire@mastodon.social at 2026-02-03T10:00:01.000Z ##

🟠 CVE-2025-8461 - High (7.6)

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Seres Software syWEB allows Reflected XSS.This issue affects syWEB: through 03022026. 

NOTE: The vendor was contacted early about this d...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T10:00:01.000Z ##

🟠 CVE-2025-8461 - High (7.6)

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Seres Software syWEB allows Reflected XSS.This issue affects syWEB: through 03022026. 

NOTE: The vendor was contacted early about this d...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1375
(8.1 HIGH)

EPSS: 0.04%

updated 2026-02-03T09:30:34

2 posts

The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to Insecure Direct Object References (IDOR) in all versions up to, and including, 3.9.5. This is due to missing object-level authorization checks in the `course_list_bulk_action()`, `bulk_delete_course()`, and `update_course_status()` functions. This makes it possible for authenticated attackers, with Tutor Ins

thehackerwire@mastodon.social at 2026-02-03T08:22:04.000Z ##

🟠 CVE-2026-1375 - High (8.1)

The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to Insecure Direct Object References (IDOR) in all versions up to, and including, 3.9.5. This is due to missing object-level authorization checks in the `cou...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T08:22:04.000Z ##

🟠 CVE-2026-1375 - High (8.1)

The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to Insecure Direct Object References (IDOR) in all versions up to, and including, 3.9.5. This is due to missing object-level authorization checks in the `cou...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1730
(8.8 HIGH)

EPSS: 0.22%

updated 2026-02-03T09:30:28

3 posts

The OS DataHub Maps plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the 'OS_DataHub_Maps_Admin::add_file_and_ext' function in all versions up to, and including, 1.8.3. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code executi

mastokukei@social.josko.org at 2026-02-03T09:02:37.000Z ##

Blip blop, I'm a #mastobot.
Here is a summary (in beta) of the latest posts in #programmingAtKukei masto.kukei.eu/browse/programm category:
- Claude Code at Microsoft and the rise of AI coding assistants; OpenAI Codex app for macOS.
- OpenClaw/Moltbot vulnerabilities and security concerns around AI agents.
- Ingress-Nginx deprecation and multiple Kubernetes security exploits.
- CVE-2026-25142: SandboxJS JavaScript sandboxing library high-severity flaw.
- CVE-2026-1730: [1/2]

##

thehackerwire@mastodon.social at 2026-02-03T08:17:43.000Z ##

🟠 CVE-2026-1730 - High (8.8)

The OS DataHub Maps plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the 'OS_DataHub_Maps_Admin::add_file_and_ext' function in all versions up to, and including, 1.8.3. This makes it possible fo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T08:17:43.000Z ##

🟠 CVE-2026-1730 - High (8.8)

The OS DataHub Maps plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the 'OS_DataHub_Maps_Admin::add_file_and_ext' function in all versions up to, and including, 1.8.3. This makes it possible fo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-8589
(7.6 HIGH)

EPSS: 0.03%

updated 2026-02-03T09:30:28

2 posts

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in AKCE Software Technology R&D Industry and Trade Inc. SKSPro allows Reflected XSS.This issue affects SKSPro: through 07012026.

thehackerwire@mastodon.social at 2026-02-03T08:17:53.000Z ##

🟠 CVE-2025-8589 - High (7.6)

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in AKCE Software Technology R&D Industry and Trade Inc. SKSPro allows Reflected XSS.This issue affects SKSPro: through 07012026.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T08:17:53.000Z ##

🟠 CVE-2025-8589 - High (7.6)

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in AKCE Software Technology R&D Industry and Trade Inc. SKSPro allows Reflected XSS.This issue affects SKSPro: through 07012026.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24694
(7.8 HIGH)

EPSS: 0.02%

updated 2026-02-03T06:31:10

2 posts

The installer for Roland Cloud Manager ver.3.1.19 and prior insecurely loads Dynamic Link Libraries (DLLs), which could allow an attacker to execute arbitrary code with the privileges of the application.

thehackerwire@mastodon.social at 2026-02-03T06:16:31.000Z ##

🟠 CVE-2026-24694 - High (7.8)

The installer for Roland Cloud Manager ver.3.1.19 and prior insecurely loads Dynamic Link Libraries (DLLs), which could allow an attacker to execute arbitrary code with the privileges of the application.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T06:16:31.000Z ##

🟠 CVE-2026-24694 - High (7.8)

The installer for Roland Cloud Manager ver.3.1.19 and prior insecurely loads Dynamic Link Libraries (DLLs), which could allow an attacker to execute arbitrary code with the privileges of the application.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20404
(7.5 HIGH)

EPSS: 0.21%

updated 2026-02-03T00:31:23

3 posts

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01689248; Issue ID: MSV-4837.

thehackerwire@mastodon.social at 2026-02-02T23:52:22.000Z ##

🟠 CVE-2026-20404 - High (7.5)

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. Use...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T23:52:22.000Z ##

🟠 CVE-2026-20404 - High (7.5)

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. Use...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T23:29:08.000Z ##

🟠 CVE-2026-20404 - High (7.5)

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. Use...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20407
(8.8 HIGH)

EPSS: 0.01%

updated 2026-02-03T00:31:23

2 posts

In wlan STA driver, there is a possible escalation of privilege due to a missing bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00464377; Issue ID: MSV-4905.

thehackerwire@mastodon.social at 2026-02-02T23:29:44.000Z ##

🟠 CVE-2026-20407 - High (8.8)

In wlan STA driver, there is a possible escalation of privilege due to a missing bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T23:29:44.000Z ##

🟠 CVE-2026-20407 - High (8.8)

In wlan STA driver, there is a possible escalation of privilege due to a missing bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20406
(7.5 HIGH)

EPSS: 0.21%

updated 2026-02-03T00:31:23

1 posts

In Modem, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01726634; Issue ID: MSV-5728.

thehackerwire@mastodon.social at 2026-02-02T23:29:35.000Z ##

🟠 CVE-2026-20406 - High (7.5)

In Modem, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User in...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20420
(7.5 HIGH)

EPSS: 0.21%

updated 2026-02-03T00:31:23

1 posts

In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01738313; Issue ID: MSV-5935.

thehackerwire@mastodon.social at 2026-02-02T23:21:36.000Z ##

🟠 CVE-2026-20420 - High (7.5)

In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-63649
(7.5 HIGH)

EPSS: 0.04%

updated 2026-02-03T00:31:22

2 posts

An out-of-bounds read in the http_parser_transfer_encoding_chunked function (mk_server/mk_http_parser.c) of monkey commit f37e984 allows attackers to cause a Denial of Service (DoS) via sending a crafted POST request to the server.

thehackerwire@mastodon.social at 2026-02-03T00:28:54.000Z ##

🟠 CVE-2025-63649 - High (7.5)

An out-of-bounds read in the http_parser_transfer_encoding_chunked function (mk_server/mk_http_parser.c) of monkey commit f37e984 allows attackers to cause a Denial of Service (DoS) via sending a crafted POST request to the server.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T00:28:54.000Z ##

🟠 CVE-2025-63649 - High (7.5)

An out-of-bounds read in the http_parser_transfer_encoding_chunked function (mk_server/mk_http_parser.c) of monkey commit f37e984 allows attackers to cause a Denial of Service (DoS) via sending a crafted POST request to the server.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20403
(7.5 HIGH)

EPSS: 0.21%

updated 2026-02-03T00:31:22

2 posts

In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01689254 (Note: For N15 and NR16) / MOLY01689259 (Note: For NR17 and NR17R); Issue ID: MSV-4843.

thehackerwire@mastodon.social at 2026-02-03T00:09:34.000Z ##

🟠 CVE-2026-20403 - High (7.5)

In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T00:09:34.000Z ##

🟠 CVE-2026-20403 - High (7.5)

In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20409
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-03T00:31:22

2 posts

In imgsys, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10363246; Issue ID: MSV-5779.

thehackerwire@mastodon.social at 2026-02-02T23:52:33.000Z ##

🟠 CVE-2026-20409 - High (7.8)

In imgsys, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Pat...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T23:52:33.000Z ##

🟠 CVE-2026-20409 - High (7.8)

In imgsys, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Pat...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20405
(7.5 HIGH)

EPSS: 0.21%

updated 2026-02-03T00:31:22

1 posts

In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01688495; Issue ID: MSV-4818.

thehackerwire@mastodon.social at 2026-02-02T23:29:25.000Z ##

🟠 CVE-2026-20405 - High (7.5)

In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20422
(7.5 HIGH)

EPSS: 0.21%

updated 2026-02-03T00:30:18

1 posts

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00827332; Issue ID: MSV-5919.

thehackerwire@mastodon.social at 2026-02-02T23:28:59.000Z ##

🟠 CVE-2026-20422 - High (7.5)

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. Use...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25223
(7.5 HIGH)

EPSS: 0.00%

updated 2026-02-02T22:23:32

4 posts

### Impact A validation bypass vulnerability exists in Fastify where request body validation schemas specified by Content-Type can be completely circumvented. By appending a tab character (`\t`) followed by arbitrary content to the Content-Type header, attackers can bypass body validation while the server still processes the body as the original content type. For example, a request with `Content

thehackerwire@mastodon.social at 2026-02-03T22:19:56.000Z ##

🟠 CVE-2026-25223 - High (7.5)

Fastify is a fast and low overhead web framework, for Node.js. Prior to version 5.7.2, a validation bypass vulnerability exists in Fastify where request body validation schemas specified by Content-Type can be completely circumvented. By appending...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T22:19:18.000Z ##

🟠 CVE-2026-25223 - High (7.5)

Fastify is a fast and low overhead web framework, for Node.js. Prior to version 5.7.2, a validation bypass vulnerability exists in Fastify where request body validation schemas specified by Content-Type can be completely circumvented. By appending...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T22:19:56.000Z ##

🟠 CVE-2026-25223 - High (7.5)

Fastify is a fast and low overhead web framework, for Node.js. Prior to version 5.7.2, a validation bypass vulnerability exists in Fastify where request body validation schemas specified by Content-Type can be completely circumvented. By appending...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T22:19:18.000Z ##

🟠 CVE-2026-25223 - High (7.5)

Fastify is a fast and low overhead web framework, for Node.js. Prior to version 5.7.2, a validation bypass vulnerability exists in Fastify where request body validation schemas specified by Content-Type can be completely circumvented. By appending...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0599
(7.5 HIGH)

EPSS: 0.08%

updated 2026-02-02T22:07:42

1 posts

A vulnerability in huggingface/text-generation-inference version 3.3.6 allows unauthenticated remote attackers to exploit unbounded external image fetching during input validation in VLM mode. The issue arises when the router scans inputs for Markdown image links and performs a blocking HTTP GET request, reading the entire response body into memory and cloning it before decoding. This behavior can

thehackerwire@mastodon.social at 2026-02-02T11:19:30.000Z ##

🟠 CVE-2026-0599 - High (7.5)

A vulnerability in huggingface/text-generation-inference version 3.3.6 allows unauthenticated remote attackers to exploit unbounded external image fetching during input validation in VLM mode. The issue arises when the router scans inputs for Mark...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1117
(8.2 HIGH)

EPSS: 0.03%

updated 2026-02-02T21:56:53

1 posts

A vulnerability in the `lollms_generation_events.py` component of parisneo/lollms version 5.9.0 allows unauthenticated access to sensitive Socket.IO events. The `add_events` function registers event handlers such as `generate_text`, `cancel_generation`, `generate_msg`, and `generate_msg_from` without implementing authentication or authorization checks. This allows unauthenticated clients to execut

thehackerwire@mastodon.social at 2026-02-02T10:18:28.000Z ##

🟠 CVE-2026-1117 - High (8.2)

A vulnerability in the `lollms_generation_events.py` component of parisneo/lollms version 5.9.0 allows unauthenticated access to sensitive Socket.IO events. The `add_events` function registers event handlers such as `generate_text`, `cancel_genera...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20411
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-02T21:31:27

1 posts

In cameraisp, there is a possible escalation of privilege due to use after free. This could lead to local denial of service if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10351676; Issue ID: MSV-5737.

thehackerwire@mastodon.social at 2026-02-02T19:18:53.000Z ##

🟠 CVE-2026-20411 - High (7.8)

In cameraisp, there is a possible escalation of privilege due to use after free. This could lead to local denial of service if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1531
(8.1 HIGH)

EPSS: 0.02%

updated 2026-02-02T21:15:40

1 posts

A flaw was found in foreman_kubevirt. When configuring the connection to OpenShift, the system disables SSL verification if a Certificate Authority (CA) certificate is not explicitly set. This insecure default allows a remote attacker, capable of intercepting network traffic between Satellite and OpenShift, to perform a Man-in-the-Middle (MITM) attack. Such an attack could lead to the disclosure o

thehackerwire@mastodon.social at 2026-02-02T06:21:19.000Z ##

🟠 CVE-2026-1531 - High (8.1)

A flaw was found in foreman_kubevirt. When configuring the connection to OpenShift, the system disables SSL verification if a Certificate Authority (CA) certificate is not explicitly set. This insecure default allows a remote attacker, capable of ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1530
(8.1 HIGH)

EPSS: 0.02%

updated 2026-02-02T21:02:04

1 posts

A flaw was found in fog-kubevirt. This vulnerability allows a remote attacker to perform a Man-in-the-Middle (MITM) attack due to disabled certificate validation. This enables the attacker to intercept and potentially alter sensitive communications between Satellite and OpenShift, resulting in information disclosure and data integrity compromise.

thehackerwire@mastodon.social at 2026-02-02T06:21:10.000Z ##

🟠 CVE-2026-1530 - High (8.1)

A flaw was found in fog-kubevirt. This vulnerability allows a remote attacker to perform a Man-in-the-Middle (MITM) attack due to disabled certificate validation. This enables the attacker to intercept and potentially alter sensitive communication...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24788
(8.8 HIGH)

EPSS: 0.23%

updated 2026-02-02T20:53:03

1 posts

RaspAP raspap-webgui versions prior to 3.3.6 contain an OS Command Injection vulnerability. If exploited, an arbitrary OS command may be executed by a user who can log in to the product.

thehackerwire@mastodon.social at 2026-02-02T05:24:34.000Z ##

🟠 CVE-2026-24788 - High (8.8)

RaspAP raspap-webgui versions prior to 3.3.6 contain an OS command injection vulnerability. If exploited, an arbitrary OS command may be executed by a user who can log in to the product.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25153
(7.7 HIGH)

EPSS: 0.05%

updated 2026-02-02T20:19:59

1 posts

### Impact When TechDocs is configured with `runIn: local`, a malicious actor who can submit or modify a repository's `mkdocs.yml` file can execute arbitrary Python code on the TechDocs build server via MkDocs hooks configuration. ### Patches Upgrade to `@backstage/plugin-techdocs-node` version 1.13.11, 1.14.1 or later. The fix introduces an allowlist of supported MkDocs configuration keys. Uns

thehackerwire@mastodon.social at 2026-01-30T22:22:29.000Z ##

🟠 CVE-2026-25153 - High (7.7)

Backstage is an open framework for building developer portals, and @backstage/plugin-techdocs-node provides common node.js functionalities for TechDocs. In versions of @backstage/plugin-techdocs-node prior to 1.13.11 and 1.14.1, when TechDocs is c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24071
(9.4 CRITICAL)

EPSS: 0.01%

updated 2026-02-02T18:32:35

2 posts

It was found that the XPC service offered by the privileged helper of Native Access uses the PID of the connecting client to verify its code signature. This is considered insecure and can be exploited by PID reuse attacks. The connection handler function uses _xpc_connection_get_pid(arg2) as argument for the hasValidSignature function. This value can not be trusted since it is vulnerable to PID r

thehackerwire@mastodon.social at 2026-02-02T19:09:38.000Z ##

🔴 CVE-2026-24071 - Critical (9.3)

It was found that the XPC service offered by the privileged helper of Native Access uses the PID of the connecting client to verify its code signature. This is considered insecure and can be exploited by PID reuse attacks. The connection handler...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T18:18:24.000Z ##

🔴 CVE-2026-24071 - Critical (9.3)

It was found that the XPC service offered by the privileged helper of Native Access uses the PID of the connecting client to verify its code signature. This is considered insecure and can be exploited by PID reuse attacks. The connection handler...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24070
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-02T18:32:35

1 posts

During the installation of the Native Access application, a privileged helper `com.native-instruments.NativeAccess.Helper2`, which is used by Native Access to trigger functions via XPC communication like copy-file, remove or set-permissions, is deployed as well. The communication with the XPC service of the privileged helper is only allowed if the client process is signed with the corresponding ce

thehackerwire@mastodon.social at 2026-02-02T18:18:18.000Z ##

🟠 CVE-2026-24070 - High (8.8)

During the installation of the Native Access application, a privileged helper `com.native-instruments.NativeAccess.Helper2`, which is used by Native Access to trigger functions via XPC communication like copy-file, remove or set-permissions, is de...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-9974
(8.8 HIGH)

EPSS: 0.02%

updated 2026-02-02T18:32:35

2 posts

The unified WEBUI application of the ONT/Beacon device contains an input handling flaw that allows authenticated users to trigger unintended system-level command execution. Due to insufficient validation of user-supplied data, a low-privileged authenticated attacker may be able to execute arbitrary commands on the underlying ONT/Beacon operating system, potentially impacting the confidentiality, i

thehackerwire@mastodon.social at 2026-02-02T18:11:36.000Z ##

🟠 CVE-2025-9974 - High (8.8)

The unified WEBUI application of the ONT/Beacon device contains an input handling flaw that allows authenticated users to trigger unintended system-level command execution. Due to insufficient validation of user-supplied data, a low-privileged aut...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T17:14:55.000Z ##

🟠 CVE-2025-9974 - High (8.8)

The unified WEBUI application of the ONT/Beacon device contains an input handling flaw that allows authenticated users to trigger unintended system-level command execution. Due to insufficient validation of user-supplied data, a low-privileged aut...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-47359
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-02T18:31:39

1 posts

Memory Corruption when multiple threads simultaneously access a memory free API.

thehackerwire@mastodon.social at 2026-02-02T16:59:53.000Z ##

🟠 CVE-2025-47359 - High (7.8)

Memory Corruption when multiple threads simultaneously access a memory free API.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-47358
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-02T18:31:39

1 posts

Memory Corruption when user space address is modified and passed to mem_free API, causing kernel memory to be freed inadvertently.

thehackerwire@mastodon.social at 2026-02-02T16:59:42.000Z ##

🟠 CVE-2025-47358 - High (7.8)

Memory Corruption when user space address is modified and passed to mem_free API, causing kernel memory to be freed inadvertently.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-47398
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-02T18:31:39

1 posts

Memory Corruption while deallocating graphics processing unit memory buffers due to improper handling of memory pointers.

thehackerwire@mastodon.social at 2026-02-02T16:18:29.000Z ##

🟠 CVE-2025-47398 - High (7.8)

Memory Corruption while deallocating graphics processing unit memory buffers due to improper handling of memory pointers.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-47397
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-02T18:31:39

1 posts

Memory Corruption when initiating GPU memory mapping using scatter-gather lists due to unchecked IOMMU mapping errors.

thehackerwire@mastodon.social at 2026-02-02T16:18:21.000Z ##

🟠 CVE-2025-47397 - High (7.8)

Memory Corruption when initiating GPU memory mapping using scatter-gather lists due to unchecked IOMMU mapping errors.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-14914
(7.7 HIGH)

EPSS: 0.04%

updated 2026-02-02T18:31:38

1 posts

IBM WebSphere Application Server Liberty 17.0.0.3 through 26.0.0.1 could allow a privileged user to upload a zip archive containing path traversal sequences resulting in an overwrite of files leading to arbitrary code execution.

thehackerwire@mastodon.social at 2026-02-02T17:00:02.000Z ##

🟠 CVE-2025-14914 - High (7.6)

IBM WebSphere Application Server Liberty 17.0.0.3 through 26.0.0.1 could allow a privileged user to upload a zip archive containing path traversal sequences resulting in an overwrite of files leading to arbitrary code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-13986
(4.2 MEDIUM)

EPSS: 0.04%

updated 2026-02-02T18:16:11.883000

1 posts

Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal Disable Login Page allows Functionality Bypass.This issue affects Disable Login Page: from 0.0.0 before 1.1.3.

thehackerwire@mastodon.social at 2026-01-29T19:48:27.000Z ##

🟠 CVE-2025-13986 - High (7.5)

Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal Disable Login Page allows Functionality Bypass.This issue affects Disable Login Page: from 0.0.0 before 1.1.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1761
(8.6 HIGH)

EPSS: 0.14%

updated 2026-02-02T15:30:44

1 posts

A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart HTTP response, which can lead to memory corruption. This issue may result in application crashes or arbitrary code execution in applications that process

thehackerwire@mastodon.social at 2026-02-02T14:19:03.000Z ##

🟠 CVE-2026-1761 - High (8.6)

A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart H...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20418
(8.8 HIGH)

EPSS: 0.21%

updated 2026-02-02T15:30:34

2 posts

In Thread, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00465153; Issue ID: MSV-4927.

thehackerwire@mastodon.social at 2026-02-02T15:19:26.000Z ##

🟠 CVE-2026-20418 - High (8.8)

In Thread, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR004...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-02T14:19:13.000Z ##

🟠 CVE-2026-20418 - High (8.8)

In Thread, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR004...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20419
(7.5 HIGH)

EPSS: 0.07%

updated 2026-02-02T15:30:34

1 posts

In wlan AP/STA firmware, there is a possible system becoming irresponsive due to an uncaught exception. This could lead to remote (proximal/adjacent) denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00461663 / WCNCR00463309; Issue ID: MSV-4852.

thehackerwire@mastodon.social at 2026-02-02T14:19:13.000Z ##

🟠 CVE-2026-20419 - High (7.5)

In wlan AP/STA firmware, there is a possible system becoming irresponsive due to an uncaught exception. This could lead to remote (proximal/adjacent) denial of service with no additional execution privileges needed. User interaction is not needed ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25201
(8.8 HIGH)

EPSS: 0.07%

updated 2026-02-02T06:30:53

1 posts

An unauthenticated user can upload arbitrary files to execute remote code, leading to privilege escalation in MagicInfo9 Server. This issue affects MagicINFO 9 Server: less than 21.1090.1.

thehackerwire@mastodon.social at 2026-02-02T05:23:36.000Z ##

🟠 CVE-2026-25201 - High (8.8)

An unauthenticated user can upload arbitrary files to execute remote code, leading to privilege escalation in MagicInfo9 Server.
This issue affects MagicINFO 9 Server: less than 21.1090.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25202
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-02-02T06:30:53

1 posts

The database account and password are hardcoded, allowing login with the account to manipulate the database in MagicInfo9 Server.This issue affects MagicINFO 9 Server: less than 21.1090.1.

thehackerwire@mastodon.social at 2026-02-02T05:23:26.000Z ##

🔴 CVE-2026-25202 - Critical (9.8)

The database account and password are hardcoded, allowing login with the account to manipulate the database in MagicInfo9 Server.This issue affects MagicINFO 9 Server: less than 21.1090.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69662
(8.6 HIGH)

EPSS: 0.03%

updated 2026-02-01T18:09:11

1 posts

SQL injection vulnerability in geopandas before v.1.1.2 allows an attacker to obtain sensitive information via the to_postgis()` function being used to write GeoDataFrames to a PostgreSQL database.

thehackerwire@mastodon.social at 2026-01-30T20:19:18.000Z ##

🟠 CVE-2025-69662 - High (8.6)

SQL injection vulnerability in geopandas before v.1.1.2 allows an attacker to obtain sensitive information via the to_postgis()` function being used to write GeoDataFrames to a PostgreSQL database.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25130
(9.7 CRITICAL)

EPSS: 0.08%

updated 2026-01-31T03:53:47

1 posts

## Summary The CAI (Cybersecurity AI) framework contains multiple argument injection vulnerabilities in its function tools. User-controlled input is passed directly to shell commands via `subprocess.Popen()` with `shell=True`, allowing attackers to execute arbitrary commands on the host system. ## Vulnerable Component **Function:** `find_file()` in `src/cai/tools/reconnaissance/filesystem.py`

1 repos

https://github.com/mbanyamer/CVE-2026-25130-Cybersecurity-AI-CAI-Framework-0.5.10

thehackerwire@mastodon.social at 2026-01-30T21:18:26.000Z ##

🔴 CVE-2026-25130 - Critical (9.6)

Cybersecurity AI (CAI) is a framework for AI Security. In versions up to and including 0.5.10, the CAI (Cybersecurity AI) framework contains multiple argument injection vulnerabilities in its function tools. User-controlled input is passed directl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-51958
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-01-30T21:30:28

1 posts

aelsantex runcommand 2014-04-01, a plugin for DokuWiki, allows unauthenticated attackers to execute arbitrary system commands via lib/plugins/runcommand/postaction.php.

thehackerwire@mastodon.social at 2026-01-30T19:17:38.000Z ##

🔴 CVE-2025-51958 - Critical (9.8)

aelsantex runcommand 2014-04-01, a plugin for DokuWiki, allows unauthenticated attackers to execute arbitrary system commands via lib/plugins/runcommand/postaction.php.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25128
(7.5 HIGH)

EPSS: 0.07%

updated 2026-01-30T20:10:15

1 posts

### Summary A RangeError vulnerability exists in the numeric entity processing of fast-xml-parser when parsing XML with out-of-range entity code points (e.g., `&#9999999;` or `&#xFFFFFF;`). This causes the parser to throw an uncaught exception, crashing any application that processes untrusted XML input. ### Details The vulnerability exists in `/src/xmlparser/OrderedObjParser.js` at lines 44-45:

thehackerwire@mastodon.social at 2026-01-30T16:17:08.000Z ##

🟠 CVE-2026-25128 - High (7.5)

fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. In versions 4.3.6 through 5.3.3, a RangeError vulnerability exists in the numeric entity processing of...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-62348
(7.8 HIGH)

EPSS: 0.01%

updated 2026-01-30T19:16:10.860000

1 posts

Salt's junos execution module contained an unsafe YAML decode/load usage. A specially crafted YAML payload processed by the junos module could lead to unintended code execution under the context of the Salt process.

thehackerwire@mastodon.social at 2026-01-30T19:17:48.000Z ##

🟠 CVE-2025-62348 - High (7.8)

Salt's junos execution module contained an unsafe YAML decode/load usage. A specially crafted YAML payload processed by the junos module could lead to unintended code execution under the context of the Salt process.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-4686
(8.6 HIGH)

EPSS: 0.03%

updated 2026-01-30T18:31:21

2 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Kodmatic Computer Software Tourism Construction Industry and Trade Ltd. Co. Online Exam and Assessment allows SQL Injection.This issue affects Online Exam and Assessment: through 30012026.  NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

1 repos

https://github.com/sahici/CVE-2025-4686

thehackerwire@mastodon.social at 2026-01-30T16:17:28.000Z ##

🟠 CVE-2025-4686 - High (8.6)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Kodmatic Computer Software Tourism Construction Industry and Trade Ltd. Co. Online Exam and Assessment allows SQL Injection.This issue affects On...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-30T16:16:48.000Z ##

🟠 CVE-2025-4686 - High (8.6)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Kodmatic Computer Software Tourism Construction Industry and Trade Ltd. Co. Online Exam and Assessment allows SQL Injection.This issue affects On...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1686
(8.8 HIGH)

EPSS: 0.14%

updated 2026-01-30T16:16:12.633000

2 posts

A security flaw has been discovered in Totolink A3600R 5.9c.4959. This issue affects the function setAppEasyWizardConfig in the library /lib/cste_modules/app.so. Performing a manipulation of the argument apcliSsid results in buffer overflow. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks.

thehackerwire@mastodon.social at 2026-01-30T16:22:15.000Z ##

🟠 CVE-2026-1686 - High (8.8)

A security flaw has been discovered in Totolink A3600R 5.9c.4959. This issue affects the function setAppEasyWizardConfig in the library /lib/cste_modules/app.so. Performing a manipulation of the argument apcliSsid results in buffer overflow. It is...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-30T16:17:22.000Z ##

🟠 CVE-2026-1686 - High (8.8)

A security flaw has been discovered in Totolink A3600R 5.9c.4959. This issue affects the function setAppEasyWizardConfig in the library /lib/cste_modules/app.so. Performing a manipulation of the argument apcliSsid results in buffer overflow. It is...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0709
(7.2 HIGH)

EPSS: 0.01%

updated 2026-01-30T12:31:26

1 posts

Some Hikvision Wireless Access Points are vulnerable to authenticated command execution due to insufficient input validation. Attackers with valid credentials can exploit this flaw by sending crafted packets containing malicious commands to affected devices, leading to arbitrary command execution.

undercodenews@mastodon.social at 2026-02-03T11:07:10.000Z ##

Hikvision Wireless Access Points Vulnerability Exposes Networks to Remote Command Execution

Hikvision has recently revealed a critical security flaw affecting several models of its wireless access points, putting organizations at risk of remote command execution attacks. The vulnerability, officially tracked as CVE-2026-0709, allows authenticated attackers to send malicious commands to compromised devices, potentially gaining full control over the network…

undercodenews.com/hikvision-wi

##

CVE-2026-1699
(10.0 CRITICAL)

EPSS: 0.03%

updated 2026-01-30T12:31:26

1 posts

In the Eclipse Theia Website repository, the GitHub Actions workflow .github/workflows/preview.yml used pull_request_target trigger while checking out and executing untrusted pull request code. This allowed any GitHub user to execute arbitrary code in the repository's CI environment with access to repository secrets and a GITHUB_TOKEN with extensive write permissions (contents:write, packages:writ

thehackerwire@mastodon.social at 2026-01-30T10:35:40.000Z ##

🔴 CVE-2026-1699 - Critical (10)

In the Eclipse Theia Website repository, the GitHub Actions workflow .github/workflows/preview.yml used pull_request_target trigger while checking out and executing untrusted pull request code. This allowed any GitHub user to execute arbitrary cod...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-1395
(8.2 HIGH)

EPSS: 0.03%

updated 2026-01-30T09:31:00

1 posts

Generation of Error Message Containing Sensitive Information vulnerability in Codriapp Innovation and Software Technologies Inc. HeyGarson allows Fuzzing for application mapping.This issue affects HeyGarson: through 30012026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

thehackerwire@mastodon.social at 2026-01-30T10:00:46.000Z ##

🟠 CVE-2025-1395 - High (8.2)

Generation of Error Message Containing Sensitive Information vulnerability in Codriapp Innovation and Software Technologies Inc. HeyGarson allows Fuzzing for application mapping.This issue affects HeyGarson: through 30012026.

NOTE: The vendor was...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21418
(7.8 HIGH)

EPSS: 0.06%

updated 2026-01-30T09:31:00

1 posts

Dell Unity, version(s) 5.5.2 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary command execution with root privileges.

thehackerwire@mastodon.social at 2026-01-30T10:00:36.000Z ##

🟠 CVE-2026-21418 - High (7.8)

Dell Unity, version(s) 5.5.2 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerabilit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0805
(8.2 HIGH)

EPSS: 0.11%

updated 2026-01-30T09:30:54

1 posts

An input neutralization vulnerability in the Backup Configuration component of Crafty Controller allows a remote, authenticated attacker to perform file tampering and remote code execution via path traversal.

thehackerwire@mastodon.social at 2026-01-30T07:24:37.000Z ##

🟠 CVE-2026-0805 - High (8.2)

An input neutralization vulnerability in the Backup Configuration component of Crafty Controller allows a remote, authenticated attacker to perform file tampering and remote code execution via path traversal.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0963
(9.9 CRITICAL)

EPSS: 0.31%

updated 2026-01-30T09:30:54

1 posts

An input neutralization vulnerability in the File Operations API Endpoint component of Crafty Controller allows a remote, authenticated attacker to perform file tampering and remote code execution via path traversal.

thehackerwire@mastodon.social at 2026-01-30T07:24:26.000Z ##

🔴 CVE-2026-0963 - Critical (9.9)

An input neutralization vulnerability in the File Operations API Endpoint component of Crafty Controller allows a remote, authenticated attacker to perform file tampering and remote code execution via path traversal.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22277
(7.8 HIGH)

EPSS: 0.06%

updated 2026-01-30T09:15:51.090000

1 posts

Dell UnityVSA, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary command execution with root privileges.

thehackerwire@mastodon.social at 2026-01-30T10:00:24.000Z ##

🟠 CVE-2026-22277 - High (7.8)

Dell UnityVSA, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerabili...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24714
(7.5 HIGH)

EPSS: 0.07%

updated 2026-01-30T05:16:33.093000

1 posts

Some end of service NETGEAR products provide "TelnetEnable" functionality, which allows a magic packet to activate telnet service on the box.

thehackerwire@mastodon.social at 2026-01-30T05:59:55.000Z ##

🟠 CVE-2026-24714 - High (7.5)

Some end of service NETGEAR products provide "TelnetEnable" functionality, which allows a magic packet to activate telnet service on the box.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69516
(8.8 HIGH)

EPSS: 0.22%

updated 2026-01-30T00:32:24

1 posts

A Server-Side Template Injection (SSTI) vulnerability in the /reporting/templates/preview/ endpoint of Amidaware Tactical RMM, affecting versions equal to or earlier than v1.3.1, allows low-privileged users with Report Viewer or Report Manager permissions to achieve remote command execution on the server. This occurs due to improper sanitization of the template_md parameter, enabling direct inject

thehackerwire@mastodon.social at 2026-01-29T22:23:12.000Z ##

🟠 CVE-2025-69516 - High (8.8)

A Server-Side Template Injection (SSTI) vulnerability in the /reporting/templates/preview/ endpoint of Amidaware Tactical RMM, affecting versions equal to or earlier than v1.3.1, allows low-privileged users with Report Viewer or Report Manager per...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1281
(9.8 CRITICAL)

EPSS: 13.12%

updated 2026-01-30T00:31:29

12 posts

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

youranonnewsirc@nerdculture.de at 2026-02-02T01:45:30.000Z ##

Critical cybersecurity updates from February 1-2, 2026: Microsoft patched an actively exploited Office zero-day (CVE-2026-21509), and Fortinet fixed a critical FortiCloud SSO flaw (CVE-2026-24858). Ivanti released fixes for two exploited EPMM zero-days (CVE-2026-1281, CVE-2026-1340) by February 1, and Bitdefender reported Android RAT malware distributed via Hugging Face (February 2).

In technology, Apple overhauled its online Mac store for a "build-it-yourself" experience (February 1), and Google extended the Fitbit data migration deadline to Google accounts until May 2026.

#News #Anonymous #AnonNews_irc

##

DarkWebInformer@infosec.exchange at 2026-02-01T21:13:45.000Z ##

‼️ CVE-2026-1281: Safe indicator check for Ivanti EPMM & CVE-2026-1340 related paths

GitHub: github.com/Ashwesker/Ashwesker

##

youranonnewsirc@nerdculture.de at 2026-01-30T19:45:29.000Z ##

Latest News (Jan 29-30, 2026):

Tech: Apple plans "Apple Intelligence" with Google Gemini integration, coinciding with Google's Chrome "auto browse" launch. China approved Nvidia H200 chip sales to its tech giants.

Cybersecurity: The FBI launched "Operation Winter SHIELD" to protect critical infrastructure. A major ShinyHunters phishing campaign targets Okta SSO accounts, and Ivanti EPMM (CVE-2026-1281) is a newly exploited vulnerability.

#News #Anonymous #AnonNews_irc

##

DarkWebInformer@infosec.exchange at 2026-01-30T19:15:10.000Z ##

‼️ CVE-2026-1281 & CVE-2026-1340: A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

Zero-Day: Yes
CVSS: Both 9.8
CVE Published: January 29th, 2026
KEV Catalog: January 29th, 2026

Affected Vendor: Ivanti
Vulnerability Type: Remote Code Execution (RCE)

Advisory: forums.ivanti.com/s/article/Se

##

AAKL@infosec.exchange at 2026-01-30T19:02:55.000Z ##

New. No escape for Ivanti (which issued patches yesterday.)

WatchTower: Someone Knows Bash Far Too Well, And We Love It (Ivanti EPMM Pre-Auth RCEs CVE-2026-1281 & CVE-2026-1340) labs.watchtowr.com/someone-kno #Ivanti #vulnerability #infosec

##

AAKL@infosec.exchange at 2026-01-30T17:03:48.000Z ##

@cR0w Didn't you wish for Ivanti?

Ivanti, posted yesterday: Security Advisory Ivanti Endpoint Manager Mobile (EPMM) (CVE-2026-1281 & CVE-2026-1340) forums.ivanti.com/s/article/Se

Analysis Guidance Ivanti Endpoint Manager Mobile (EPMM) CVE-2026-1281 & CVE-2026-1340 forums.ivanti.com/s/article/An

Security Week: Ivanti Patches Exploited EPMM Zero-Days securityweek.com/ivanti-patche @SecurityWeek #Ivanti #infosec #vulnerability #zeroday

##

_r_netsec@infosec.exchange at 2026-01-30T16:28:06.000Z ##

Someone Knows Bash Far Too Well, And We Love It (Ivanti EPMM Pre-Auth RCEs CVE-2026-1281 & CVE-2026-1340) - watchTowr Labs labs.watchtowr.com/someone-kno

##

technadu@infosec.exchange at 2026-01-30T13:01:53.000Z ##

Ivanti confirms active exploitation of EPMM zero-day RCE flaws (CVE-2026-1281, CVE-2026-1340).
Emergency patches released—apply immediately.

🔗 technadu.com/ivanti-epmm-zero-

#ZeroDay #RCE #Ivanti #Infosec

##

beyondmachines1@infosec.exchange at 2026-01-30T12:01:05.000Z ##

Ivanti Patches Critical Zero-Day RCE Flaws in EPMM

Ivanti released emergency patches for two critical zero-day vulnerabilities in Endpoint Manager Mobile (EPMM) (CVE-2026-1281 and CVE-2026-1340) that allow unauthenticated remote code execution. Attackers are actively exploiting these flaws to gain full system control and access sensitive mobile device management data.

**If you are using Ivanti Endpoint Manager Mobile on premises, this is an URGENT advisory. Update your EPMM because it's already actively hacked. Apply the RPM patches immediately and remember to re-apply them if you upgrade the software version before the permanent fix in version 12.8.0.0 is released. And make sure to check the logs, because your EPMM may have already been compromised.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

cert_fr@social.numerique.gouv.fr at 2026-01-30T11:01:59.000Z ##

⚠️ Alerte CERT-FR ⚠️

Les vulnérabilités critiques CVE-2026-1281 et CVE-2026-1340 affectant Ivanti Endpoint Manager Mobile sont activement exploitées dans le cadre d'attaques ciblées.
cert.ssi.gouv.fr/alerte/CERTFR

##

thehackerwire@mastodon.social at 2026-01-29T22:21:25.000Z ##

🔴 CVE-2026-1281 - Critical (9.8)

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

oversecurity@mastodon.social at 2026-01-29T22:20:07.000Z ##

Ivanti warns of two EPMM flaws exploited in zero-day attacks

Ivanti has disclosed two critical vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2026-1281 and CVE-2026-1340, that were...

🔗️ [Bleepingcomputer] link.is.it/teik2H

##

CVE-2026-1637
(8.8 HIGH)

EPSS: 0.02%

updated 2026-01-30T00:31:29

1 posts

A vulnerability was identified in Tenda AC21 16.03.08.16. The affected element is the function fromAdvSetMacMtuWan of the file /goform/AdvSetMacMtuWan. The manipulation leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

thehackerwire@mastodon.social at 2026-01-29T23:52:08.000Z ##

🟠 CVE-2026-1637 - High (8.8)

A vulnerability was identified in Tenda AC21 16.03.08.16. The affected element is the function fromAdvSetMacMtuWan of the file /goform/AdvSetMacMtuWan. The manipulation leads to stack-based buffer overflow. Remote exploitation of the attack is pos...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25116
(7.6 HIGH)

EPSS: 0.20%

updated 2026-01-29T22:15:56.110000

1 posts

Runtipi is a personal homeserver orchestrator. Starting in version 4.5.0 and prior to version 4.7.2, an unauthenticated Path Traversal vulnerability in the `UserConfigController` allows any remote user to overwrite the system's `docker-compose.yml` configuration file. By exploiting insecure URN parsing, an attacker can replace the primary stack configuration with a malicious one, resulting in full

thehackerwire@mastodon.social at 2026-01-29T22:21:15.000Z ##

🟠 CVE-2026-25116 - High (7.6)

Runtipi is a personal homeserver orchestrator. Starting in version 4.5.0 and prior to version 4.7.2, an unauthenticated Path Traversal vulnerability in the `UserConfigController` allows any remote user to overwrite the system's `docker-compose.yml...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1340
(9.8 CRITICAL)

EPSS: 0.14%

updated 2026-01-29T22:15:53.313000

11 posts

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

youranonnewsirc@nerdculture.de at 2026-02-02T01:45:30.000Z ##

Critical cybersecurity updates from February 1-2, 2026: Microsoft patched an actively exploited Office zero-day (CVE-2026-21509), and Fortinet fixed a critical FortiCloud SSO flaw (CVE-2026-24858). Ivanti released fixes for two exploited EPMM zero-days (CVE-2026-1281, CVE-2026-1340) by February 1, and Bitdefender reported Android RAT malware distributed via Hugging Face (February 2).

In technology, Apple overhauled its online Mac store for a "build-it-yourself" experience (February 1), and Google extended the Fitbit data migration deadline to Google accounts until May 2026.

#News #Anonymous #AnonNews_irc

##

DarkWebInformer@infosec.exchange at 2026-02-01T21:13:45.000Z ##

‼️ CVE-2026-1281: Safe indicator check for Ivanti EPMM & CVE-2026-1340 related paths

GitHub: github.com/Ashwesker/Ashwesker

##

DarkWebInformer@infosec.exchange at 2026-01-30T19:15:10.000Z ##

‼️ CVE-2026-1281 & CVE-2026-1340: A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

Zero-Day: Yes
CVSS: Both 9.8
CVE Published: January 29th, 2026
KEV Catalog: January 29th, 2026

Affected Vendor: Ivanti
Vulnerability Type: Remote Code Execution (RCE)

Advisory: forums.ivanti.com/s/article/Se

##

AAKL@infosec.exchange at 2026-01-30T19:02:55.000Z ##

New. No escape for Ivanti (which issued patches yesterday.)

WatchTower: Someone Knows Bash Far Too Well, And We Love It (Ivanti EPMM Pre-Auth RCEs CVE-2026-1281 & CVE-2026-1340) labs.watchtowr.com/someone-kno #Ivanti #vulnerability #infosec

##

AAKL@infosec.exchange at 2026-01-30T17:03:48.000Z ##

@cR0w Didn't you wish for Ivanti?

Ivanti, posted yesterday: Security Advisory Ivanti Endpoint Manager Mobile (EPMM) (CVE-2026-1281 & CVE-2026-1340) forums.ivanti.com/s/article/Se

Analysis Guidance Ivanti Endpoint Manager Mobile (EPMM) CVE-2026-1281 & CVE-2026-1340 forums.ivanti.com/s/article/An

Security Week: Ivanti Patches Exploited EPMM Zero-Days securityweek.com/ivanti-patche @SecurityWeek #Ivanti #infosec #vulnerability #zeroday

##

_r_netsec@infosec.exchange at 2026-01-30T16:28:06.000Z ##

Someone Knows Bash Far Too Well, And We Love It (Ivanti EPMM Pre-Auth RCEs CVE-2026-1281 & CVE-2026-1340) - watchTowr Labs labs.watchtowr.com/someone-kno

##

technadu@infosec.exchange at 2026-01-30T13:01:53.000Z ##

Ivanti confirms active exploitation of EPMM zero-day RCE flaws (CVE-2026-1281, CVE-2026-1340).
Emergency patches released—apply immediately.

🔗 technadu.com/ivanti-epmm-zero-

#ZeroDay #RCE #Ivanti #Infosec

##

beyondmachines1@infosec.exchange at 2026-01-30T12:01:05.000Z ##

Ivanti Patches Critical Zero-Day RCE Flaws in EPMM

Ivanti released emergency patches for two critical zero-day vulnerabilities in Endpoint Manager Mobile (EPMM) (CVE-2026-1281 and CVE-2026-1340) that allow unauthenticated remote code execution. Attackers are actively exploiting these flaws to gain full system control and access sensitive mobile device management data.

**If you are using Ivanti Endpoint Manager Mobile on premises, this is an URGENT advisory. Update your EPMM because it's already actively hacked. Apply the RPM patches immediately and remember to re-apply them if you upgrade the software version before the permanent fix in version 12.8.0.0 is released. And make sure to check the logs, because your EPMM may have already been compromised.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

cert_fr@social.numerique.gouv.fr at 2026-01-30T11:01:59.000Z ##

⚠️ Alerte CERT-FR ⚠️

Les vulnérabilités critiques CVE-2026-1281 et CVE-2026-1340 affectant Ivanti Endpoint Manager Mobile sont activement exploitées dans le cadre d'attaques ciblées.
cert.ssi.gouv.fr/alerte/CERTFR

##

thehackerwire@mastodon.social at 2026-01-29T22:21:35.000Z ##

🔴 CVE-2026-1340 - Critical (9.8)

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

oversecurity@mastodon.social at 2026-01-29T22:20:07.000Z ##

Ivanti warns of two EPMM flaws exploited in zero-day attacks

Ivanti has disclosed two critical vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2026-1281 and CVE-2026-1340, that were...

🔗️ [Bleepingcomputer] link.is.it/teik2H

##

CVE-2025-61726
(7.5 HIGH)

EPSS: 0.03%

updated 2026-01-29T21:31:33

1 posts

The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.

thehackerwire@mastodon.social at 2026-01-29T19:48:18.000Z ##

🟠 CVE-2025-61726 - High (7.5)

The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse larg...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-71003
(7.5 HIGH)

EPSS: 0.05%

updated 2026-01-29T21:31:32

1 posts

An input validation vulnerability in the flow.arange() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

thehackerwire@mastodon.social at 2026-01-29T21:33:54.000Z ##

🟠 CVE-2025-71003 - High (7.5)

An input validation vulnerability in the flow.arange() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-13982
(8.1 HIGH)

EPSS: 0.02%

updated 2026-01-29T21:31:32

1 posts

Cross-Site Request Forgery (CSRF) vulnerability in Drupal Login Time Restriction allows Cross Site Request Forgery.This issue affects Login Time Restriction: from 0.0.0 before 1.0.3.

thehackerwire@mastodon.social at 2026-01-29T20:03:23.000Z ##

🟠 CVE-2025-13982 - High (8.1)

Cross-Site Request Forgery (CSRF) vulnerability in Drupal Login Time Restriction allows Cross Site Request Forgery.This issue affects Login Time Restriction: from 0.0.0 before 1.0.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-14472
(8.1 HIGH)

EPSS: 0.02%

updated 2026-01-29T21:31:32

1 posts

Cross-Site Request Forgery (CSRF) vulnerability in Drupal Acquia Content Hub allows Cross Site Request Forgery.This issue affects Acquia Content Hub: from 0.0.0 before 3.6.4, from 3.7.0 before 3.7.3.

thehackerwire@mastodon.social at 2026-01-29T20:03:13.000Z ##

🟠 CVE-2025-14472 - High (8.1)

Cross-Site Request Forgery (CSRF) vulnerability in Drupal Acquia Content Hub allows Cross Site Request Forgery.This issue affects Acquia Content Hub: from 0.0.0 before 3.6.4, from 3.7.0 before 3.7.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1610
(8.1 HIGH)

EPSS: 0.01%

updated 2026-01-29T21:30:37

1 posts

A vulnerability was found in Tenda AX12 Pro V2 16.03.49.24_cn. Affected by this issue is some unknown functionality of the component Telnet Service. Performing a manipulation results in hard-coded credentials. The attack is possible to be carried out remotely. A high degree of complexity is needed for the attack. The exploitation is known to be difficult. The exploit has been made public and could

thehackerwire@mastodon.social at 2026-01-29T19:47:15.000Z ##

🟠 CVE-2026-1610 - High (8.1)

A vulnerability was found in Tenda AX12 Pro V2 16.03.49.24_cn. Affected by this issue is some unknown functionality of the component Telnet Service. Performing a manipulation results in hard-coded credentials. The attack is possible to be carried ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24061
(9.8 CRITICAL)

EPSS: 29.55%

updated 2026-01-29T21:30:27

1 posts

telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable.

Nuclei template

57 repos

https://github.com/JayGLXR/CVE-2026-24061-POC

https://github.com/r00tuser111/CVE-2026-24061

https://github.com/xuemian168/CVE-2026-24061

https://github.com/obrunolima1910/CVE-2026-24061

https://github.com/cumakurt/tscan

https://github.com/Chocapikk/CVE-2026-24061

https://github.com/ibrahmsql/CVE-2026-24061-PoC

https://github.com/Moxxic1/Tell-Me-Root

https://github.com/h3athen/CVE-2026-24061

https://github.com/monstertsl/CVE-2026-24061

https://github.com/XsanFlip/CVE-2026-24061-Scanner

https://github.com/Moxxic1/moxxic1.github.io

https://github.com/SeptembersEND/CVE--2026-24061

https://github.com/DeadlyHollows/CVE-2026-24061-setup

https://github.com/duy-31/CVE-2026-24061---telnetd

https://github.com/BrainBob/CVE-2026-24061

https://github.com/z3n70/CVE-2026-24061

https://github.com/obrunolima1910/obrunolima1910.github.io

https://github.com/ms0x08-dev/CVE-2026-24061-POC

https://github.com/infat0x/CVE-2026-24061

https://github.com/midox008/CVE-2026-24061

https://github.com/buzz075/CVE-2026-24061

https://github.com/TryA9ain/CVE-2026-24061

https://github.com/parameciumzhang/Tell-Me-Root

https://github.com/Mefhika120/Ashwesker-CVE-2026-24061

https://github.com/LucasPDiniz/CVE-2026-24061

https://github.com/Gabs-hub/CVE-2026-24061_Lab

https://github.com/MY0723/GNU-Inetutils-telnet-CVE-2026-24061-

https://github.com/Good123321-bot/CVE-2026-24061-POC

https://github.com/X-croot/CVE-2026-24061_POC

https://github.com/Ali-brarou/telnest

https://github.com/m3ngx1ng/cve_2026_24061_cli

https://github.com/Parad0x7e/CVE-2026-24061

https://github.com/dotelpenguin/telnetd_CVE-2026-24061_tester

https://github.com/hilwa24/CVE-2026-24061

https://github.com/Lingzesec/CVE-2026-24061-GUI

https://github.com/balgan/CVE-2026-24061

https://github.com/Alter-N0X/CVE-2026-24061-POC

https://github.com/SystemVll/CVE-2026-24061

https://github.com/0xXyc/telnet-inetutils-auth-bypass-CVE-2026-24061

https://github.com/hackingyseguridad/root

https://github.com/cyberpoul/CVE-2026-24061-POC

https://github.com/SafeBreach-Labs/CVE-2026-24061

https://github.com/punitdarji/telnetd-cve-2026-24061

https://github.com/Mr-Zapi/CVE-2026-24061

https://github.com/yanxinwu946/CVE-2026-24061--telnetd

https://github.com/novitahk/Exploit-CVE-2026-24061

https://github.com/franckferman/CVE_2026_24061_PoC

https://github.com/androidteacher/CVE-2026-24061-PoC-Telnetd

https://github.com/FurkanKAYAPINAR/CVE-2026-24061-telnet2root

https://github.com/leonjza/inetutils-telnetd-auth-bypass

https://github.com/BrainBob/Telnet-TestVuln-CVE-2026-24061

https://github.com/typeconfused/CVE-2026-24061

https://github.com/madfxr/Twenty-Three-Scanner

https://github.com/Good123321-bot/good123321-bot.github.io

https://github.com/0x7556/CVE-2026-24061

https://github.com/ridpath/Terrminus-CVE-2026-2406

blackvoid@mastodon.social at 2026-01-30T09:05:59.000Z ##

New #synology #DSM Version: 7.3.2-86009 Update 1 is out.

This is a security patch:

Fixed Issues
- Fixed a security vulnerability regarding telnetd (CVE-2026-24061).

synology.com/en-global/release

#selfhosting #selfhosted #homelab

##

CVE-2025-69602
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-01-29T20:16:09.663000

1 posts

A session fixation vulnerability exists in 66biolinks v62.0.0 by AltumCode, where the application does not regenerate the session identifier after successful authentication. As a result, the same session cookie value is reused for users logging in from the same browser, allowing an attacker who can set or predict a session ID to potentially hijack an authenticated session.

thehackerwire@mastodon.social at 2026-01-29T20:19:43.000Z ##

🔴 CVE-2025-69602 - Critical (9.1)

A session fixation vulnerability exists in 66biolinks v62.0.0 by AltumCode, where the application does not regenerate the session identifier after successful authentication. As a result, the same session cookie value is reused for users logging in...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1453
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-01-29T19:16:18.987000

2 posts

A missing authentication for critical function vulnerability in KiloView Encoder Series could allow an unauthenticated attacker to create or delete administrator accounts. This vulnerability can grant the attacker full administrative control over the product.

beyondmachines1@infosec.exchange at 2026-01-30T08:01:05.000Z ##

KiloView Encoder Account Takeover Vulnerability

KiloView video encoders contain a critical vulnerability (CVE-2026-1453) that allows unauthenticated attackers to create administrator accounts and take full control of the devices. The vendor has not yet released a public patch.

**Make sure all KiloView devices are isolated from the internet and accessible from trusted networks only. Then reach out to the vendor to get information of any upcoming patches. At the moment, there is no patch available.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

thehackerwire@mastodon.social at 2026-01-29T19:47:24.000Z ##

🔴 CVE-2026-1453 - Critical (9.8)

A missing authentication for critical function vulnerability in KiloView Encoder Series could allow an unauthenticated attacker to create or delete administrator accounts. This vulnerability can grant the attacker full administrative control over ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-61731
(7.8 HIGH)

EPSS: 0.01%

updated 2026-01-29T18:32:50

1 posts

Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The "#cgo pkg-config:" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a "--log-file" argument to this directive, causing pkg-config to write to an attacker-controlled location.

thehackerwire@mastodon.social at 2026-01-29T18:01:42.000Z ##

🟠 CVE-2025-61731 - High (7.8)

Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The "#cgo pkg-config:" directive in a Go source file provides command-line arguments to provide to the Go pk...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-65890
(7.5 HIGH)

EPSS: 0.05%

updated 2026-01-29T18:32:49

1 posts

A device-ID validation flaw in OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) by calling flow.cuda.synchronize() with an invalid or out-of-range GPU device index.

thehackerwire@mastodon.social at 2026-01-30T07:54:32.000Z ##

🟠 CVE-2025-65890 - High (7.5)

A device-ID validation flaw in OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) by calling flow.cuda.synchronize() with an invalid or out-of-range GPU device index.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-65888
(7.5 HIGH)

EPSS: 0.05%

updated 2026-01-29T18:32:49

1 posts

A dimension validation flaw in the flow.empty() component of OneFlow 0.9.0 allows attackers to cause a Denial of Service (DoS) via a negative or excessively large dimension value.

thehackerwire@mastodon.social at 2026-01-30T06:21:31.000Z ##

🟠 CVE-2025-65888 - High (7.5)

A dimension validation flaw in the flow.empty() component of OneFlow 0.9.0 allows attackers to cause a Denial of Service (DoS) via a negative or excessively large dimension value.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-65891
(7.5 HIGH)

EPSS: 0.06%

updated 2026-01-29T18:32:49

1 posts

A GPU device-ID validation flaw in OneFlow v0.9.0 allows attackers to trigger a Denial of Dervice (DoS) by invoking flow.cuda.get_device_properties() with an invalid or negative device index.

thehackerwire@mastodon.social at 2026-01-29T21:34:05.000Z ##

🟠 CVE-2025-65891 - High (7.5)

A GPU device-ID validation flaw in OneFlow v0.9.0 allows attackers to trigger a Denial of Dervice (DoS) by invoking flow.cuda.get_device_properties() with an invalid or negative device index.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-71000
(7.5 HIGH)

EPSS: 0.05%

updated 2026-01-29T18:32:49

1 posts

An issue in the flow.cuda.BoolTensor component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

thehackerwire@mastodon.social at 2026-01-29T20:20:01.000Z ##

🟠 CVE-2025-71000 - High (7.5)

An issue in the flow.cuda.BoolTensor component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70999
(7.5 HIGH)

EPSS: 0.05%

updated 2026-01-29T18:32:49

1 posts

A GPU device-ID validation flaw in the flow.cuda.get_device_capability() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted device ID.

thehackerwire@mastodon.social at 2026-01-29T20:19:53.000Z ##

🟠 CVE-2025-70999 - High (7.5)

A GPU device-ID validation flaw in the flow.cuda.get_device_capability() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted device ID.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-65886
(7.5 HIGH)

EPSS: 0.05%

updated 2026-01-29T18:31:42

1 posts

A shape mismatch vulnerability in OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via supplying crafted tensor shapes.

thehackerwire@mastodon.social at 2026-01-30T06:21:21.000Z ##

🟠 CVE-2025-65886 - High (7.5)

A shape mismatch vulnerability in OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via supplying crafted tensor shapes.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-14975
(8.1 HIGH)

EPSS: 0.01%

updated 2026-01-29T17:16:15.460000

1 posts

The Custom Login Page Customizer WordPress plugin before 2.5.4 does not have a proper password reset process, allowing a few unauthenticated requests to reset the password of any user by knowing their username, such as administrator ones, and therefore gain access to their account

thehackerwire@mastodon.social at 2026-01-29T18:01:32.000Z ##

🟠 CVE-2025-14975 - High (8.1)

The Custom Login Page Customizer WordPress plugin before 2.5.4 does not have a proper password reset process, allowing a few unauthenticated requests to reset the password of any user by knowing their username, such as administrator ones, and ther...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-15467
(9.8 CRITICAL)

EPSS: 0.66%

updated 2026-01-29T15:31:31

5 posts

Issue summary: Parsing CMS AuthEnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution. When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 para

4 repos

https://github.com/guiimoraes/CVE-2025-15467

https://github.com/balgan/CVE-2025-15467

https://github.com/mr-r3b00t/CVE-2025-15467

https://github.com/MAXI8594/CVE-2025-15467_Scan

beyondmachines1 at 2026-02-03T08:01:02.900Z ##

OpenSSL Patches 12 Vulnerabilities Including One Critical RCE

OpenSSL has patched 12 vulnerabilities, including a critical stack buffer overflow (CVE-2025-15467) that allows unauthenticated remote code execution via crafted CMS messages.

**Review your OpenSSL libraries, and start planning a patch. Prioritize 3.x versions since they are exposed to the critical flaw.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-02-03T08:01:02.000Z ##

OpenSSL Patches 12 Vulnerabilities Including One Critical RCE

OpenSSL has patched 12 vulnerabilities, including a critical stack buffer overflow (CVE-2025-15467) that allows unauthenticated remote code execution via crafted CMS messages.

**Review your OpenSSL libraries, and start planning a patch. Prioritize 3.x versions since they are exposed to the critical flaw.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

ycombinator@rss-mstdn.studiofreesia.com at 2026-01-30T13:42:46.000Z ##

Potentially Critical RCE Vulnerability in OpenSSL
research.jfrog.com/post/potent
#ycombinator

##

thehackerwire@mastodon.social at 2026-01-30T07:54:43.000Z ##

🔴 CVE-2025-15467 - Critical (9.8)

Issue summary: Parsing CMS AuthEnvelopedData message with maliciously
crafted AEAD parameters can trigger a stack buffer overflow.

Impact summary: A stack buffer overflow may lead to a crash, causing Denial
of Service, or potentially remote code ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

Andy_Thompson@infosec.exchange at 2026-01-29T17:54:31.000Z ##

📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.

Sources:
- bleepingcomputer.com/news/secu
- cloud.google.com/blog/topics/t
- nvd.nist.gov/vuln/detail/CVE-2
- helpnetsecurity.com/2026/01/28

---

🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀

CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.

Sources:
- nvd.nist.gov/vuln/detail/CVE-2
infosecurity-magazine.com/news
- openssl-library.org/news/vulne
- twitter.com/IntCyberDigest/sta

---

🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡

SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.

Sources:
- bleepingcomputer.com/news/secu
- helpnetsecurity.com/2026/01/29
- rapid7.com/blog/post/etr-multi
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-1470
(10.0 CRITICAL)

EPSS: 0.35%

updated 2026-01-29T15:02:29

1 posts

n8n contains a critical Remote Code Execution (RCE) vulnerability in its workflow Expression evaluation system. Expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime. An authenticated attacker could abuse this behavior to execute arbitrary code with the privileges of the n8n

beyondmachines1@infosec.exchange at 2026-01-29T20:01:05.000Z ##

Critical n8n Sandbox Escapes Enable Remote Code Execution

n8n reports two sandbox escape vulnerabilities, CVE-2026-1470 and CVE-2026-0863, that allow authenticated users to execute arbitrary code and take over self-hosted servers. These flaws bypass JavaScript and Python security filters by exploiting deprecated language features and specific interpreter behaviors.

**If you are using n8n, make sure it's isolated from the internet and accessible from trusted users only. Then patch n8n to version 1.123.17, 2.4.5 for CVE-2026-1470, and 1.123.14, 2.3.5 for CVE-2026-0863 or later. The CVE-2026-1470 patch is higher priority. Also configure Python nodes to run in 'External' mode for better process isolation.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-23864
(7.5 HIGH)

EPSS: 0.79%

updated 2026-01-29T15:00:31

1 posts

## Impact It was found that the fixes to address DoS in React Server Components were incomplete and we found multiple denial of service vulnerabilities still exist in React Server Components. We recommend updating immediately. The vulnerability exists in versions 19.0.0, 19.0.1, 19.0.2, 19.0.3, 19.1.0, 19.1.1, 19.1.2, 19.1.3, 19.1.4, 19.2.0, 19.2.1, 19.2.2, 19.2.3 of: - [react-server-dom-webpa

AAKL@infosec.exchange at 2026-01-29T17:28:21.000Z ##

New.

AhnLab: React Server Component Security Update Advisory (CVE-2026-23864) asec.ahnlab.com/en/92377/ #vulnerability #infosec

##

CVE-2026-24858
(9.8 CRITICAL)

EPSS: 3.71%

updated 2026-01-29T13:16:51.047000

3 posts

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0.15, FortiManager 7.6.0 through 7.6.5, FortiManager 7.4.0 through 7.4.9, FortiManager 7.2.0 through 7.2.11, FortiManager 7.0.0 through 7.0.15, FortiOS 7.

5 repos

https://github.com/SimoesCTT/-CTT-NSP-Convergent-Time-Theory---Network-Stack-Projection-CVE-2026-24858-

https://github.com/absholi7ly/CVE-2026-24858-FortiCloud-SSO-Authentication-Bypass

https://github.com/m0d0ri205/CVE-2026-24858

https://github.com/SimoesCTT/SCTT-2026-33-0004-FortiCloud-SSO-Identity-Singularity

https://github.com/b1gchoi/CVE-2026-24858

LLMs@activitypub.awakari.com at 2026-02-02T09:04:36.000Z ## Vulnerabilidad crítica de bypass de autenticación en Fortinet FortiCloud SSO El CVE-2026-24858 es una vulnerabilidad de bypass de autenticación (SSO) en múltiples productos de Fortinet. Un atac...

#Seguridad

Origin | Interest | Match ##

youranonnewsirc@nerdculture.de at 2026-02-02T01:45:30.000Z ##

Critical cybersecurity updates from February 1-2, 2026: Microsoft patched an actively exploited Office zero-day (CVE-2026-21509), and Fortinet fixed a critical FortiCloud SSO flaw (CVE-2026-24858). Ivanti released fixes for two exploited EPMM zero-days (CVE-2026-1281, CVE-2026-1340) by February 1, and Bitdefender reported Android RAT malware distributed via Hugging Face (February 2).

In technology, Apple overhauled its online Mac store for a "build-it-yourself" experience (February 1), and Google extended the Fitbit data migration deadline to Google accounts until May 2026.

#News #Anonymous #AnonNews_irc

##

cjust@infosec.exchange at 2026-01-29T20:39:25.000Z ##

Another day and, well . . .

#Fortinet #FortinetSSO #CVE #CVE202624858

esecurityplanet.com/threats/fo

##

CVE-2025-14840(CVSS UNKNOWN)

EPSS: 0.05%

updated 2026-01-28T21:31:30

1 posts

Improper Check for Unusual or Exceptional Conditions vulnerability in Drupal HTTP Client Manager allows Forceful Browsing.This issue affects HTTP Client Manager: from 0.0.0 before 9.3.13, from 10.0.0 before 10.0.2, from 11.0.0 before 11.0.1.

thehackerwire@mastodon.social at 2026-01-29T18:01:53.000Z ##

🟠 CVE-2025-14840 - High (7.5)

Improper Check for Unusual or Exceptional Conditions vulnerability in Drupal HTTP Client Manager allows Forceful Browsing.This issue affects HTTP Client Manager: from 0.0.0 before 9.3.13, from 10.0.0 before 10.0.2, from 11.0.0 before 11.0.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1056
(9.8 CRITICAL)

EPSS: 0.18%

updated 2026-01-28T15:31:37

1 posts

The Snow Monkey Forms plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'generate_user_dirpath' function in all versions up to, and including, 12.0.3. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-confi

1 repos

https://github.com/ch4r0nn/CVE-2026-1056-POC

DarkWebInformer@infosec.exchange at 2026-01-29T21:15:24.000Z ##

‼️ CVE-2026-1056: Snow Monkey Forms <= 12.0.3 - Unauthenticated Arbitrary File Deletion via Path Traversal

PoC/Exploit: github.com/ch4r0nn/CVE-2026-10

CVSS: 9.8
CVE Published: January 28th, 2026

Advisory: github.com/advisories/GHSA-g5p

Details: The Snow Monkey Forms plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'generate_user_dirpath' function in all versions up to, and including, 12.0.3. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

##

CVE-2025-40552
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-01-28T09:30:35

2 posts

SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.

DarkWebInformer@infosec.exchange at 2026-01-29T18:10:38.000Z ##

‼️ SolarWinds Web Help Desk RCE Hit by Multiple Critical Security Flaws; CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, CVE-2025-40554

CVSS: All 9.8
CVEs Published: January 28th, 2026

CVE-2025-40551: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

CVE-2025-40552: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.

CVE-2025-40553: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

CVE-2025-40554: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.

Advisories:

nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2

##

Andy_Thompson@infosec.exchange at 2026-01-29T17:54:31.000Z ##

📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.

Sources:
- bleepingcomputer.com/news/secu
- cloud.google.com/blog/topics/t
- nvd.nist.gov/vuln/detail/CVE-2
- helpnetsecurity.com/2026/01/28

---

🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀

CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.

Sources:
- nvd.nist.gov/vuln/detail/CVE-2
infosecurity-magazine.com/news
- openssl-library.org/news/vulne
- twitter.com/IntCyberDigest/sta

---

🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡

SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.

Sources:
- bleepingcomputer.com/news/secu
- helpnetsecurity.com/2026/01/29
- rapid7.com/blog/post/etr-multi
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-40554
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-01-28T09:30:35

2 posts

SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.

2 repos

https://github.com/imbas007/auth-bypass-CVE-2025-40554

https://github.com/Skynoxk/CVE-2025-40554

DarkWebInformer@infosec.exchange at 2026-01-29T18:10:38.000Z ##

‼️ SolarWinds Web Help Desk RCE Hit by Multiple Critical Security Flaws; CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, CVE-2025-40554

CVSS: All 9.8
CVEs Published: January 28th, 2026

CVE-2025-40551: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

CVE-2025-40552: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.

CVE-2025-40553: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

CVE-2025-40554: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.

Advisories:

nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2

##

Andy_Thompson@infosec.exchange at 2026-01-29T17:54:31.000Z ##

📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.

Sources:
- bleepingcomputer.com/news/secu
- cloud.google.com/blog/topics/t
- nvd.nist.gov/vuln/detail/CVE-2
- helpnetsecurity.com/2026/01/28

---

🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀

CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.

Sources:
- nvd.nist.gov/vuln/detail/CVE-2
infosecurity-magazine.com/news
- openssl-library.org/news/vulne
- twitter.com/IntCyberDigest/sta

---

🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡

SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.

Sources:
- bleepingcomputer.com/news/secu
- helpnetsecurity.com/2026/01/29
- rapid7.com/blog/post/etr-multi
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2

##

VirusBulletin at 2026-02-04T09:55:13.915Z ##

Robin Dost details how APT28 uses CVE-2026-21509 in practice, relying on crafted RTF files that trigger OLE parsing without macros. The blog post walks through efficient IOC extraction from weaponised documents. blog.synapticsystems.de/apt28-

##

AAKL at 2026-02-03T17:20:33.444Z ##

This is from yesterday.

Zscaler: APT28 Leverages CVE-2026-21509 in Operation Neusploit zscaler.com/blogs/security-res

##

oversecurity@mastodon.social at 2026-02-03T16:40:25.000Z ##

Russian state hackers exploit new Microsoft Office flaw in attacks on Ukraine, EU

Ukraine’s computer emergency response team, CERT-UA, said attackers began abusing the flaw — tracked as CVE-2026-21509 — shortly after Microsoft...

🔗️ [Therecord] link.is.it/ZQMXsZ

##

undercodenews@mastodon.social at 2026-02-03T14:12:51.000Z ##

Russian APT28 Exploits Microsoft Office Vulnerability to Target EU COREPER Discussions

In a recent escalation of cyber espionage activity, the Russian-linked Advanced Persistent Threat group APT28 has been observed exploiting a critical Microsoft Office vulnerability, CVE-2026-21509, to target sensitive EU operations. Security researchers report that the group is distributing malicious DOC files disguised as documents related to EU COREPER (Committee of Permanent…

undercodenews.com/russian-apt2

##

campuscodi@mastodon.social at 2026-02-03T14:01:39.000Z ##

RE: mastodon.social/@campuscodi/11

More on this campaign from Zscaler: zscaler.com/blogs/security-res

Other targets also include Romania and Slovakia

##

youranonnewsirc@nerdculture.de at 2026-02-03T13:45:54.000Z ##

Latest News (Feb 2-3, 2026):

Global: India and the US have finalized a trade deal. Pakistani forces killed 145 militants in Balochistan after coordinated attacks.

Tech: SpaceX merged with xAI, announcing plans for space-based AI data centers. Oracle plans a $50B expansion for AI cloud infrastructure.

Cybersecurity: A Russian hacker alliance, "Russian Legion," threatens a major cyberattack on Denmark. Russia-linked APT28 exploits a new Microsoft Office flaw (CVE-2026-21509) in attacks across Ukraine and the EU.

#News #Anonymous #AnonNews_irc

##

VirusBulletin at 2026-02-03T13:35:53.417Z ##

Zscaler ThreatLabz reports on Operation Neusploit, a January 2026 campaign targeting Central and Eastern Europe. Weaponised Microsoft RTF files exploit CVE-2026-21509 to deliver multi-stage backdoors. The campaign is attributed to APT28 with high confidence. zscaler.com/blogs/security-res

##

joho@mastodon.online at 2026-02-03T01:23:40.000Z ##

"Microsoft Office zero-day actively exploited" 🕵️ 🙄

(CVSS 7.8)

hackingpassion.com/office-zero

#cve202621509 #cybersec #cybersecurity #infosec #microsoft #office #microsoftoffice #ole

##

VirusBulletin@infosec.exchange at 2026-02-04T09:55:13.000Z ##

Robin Dost details how APT28 uses CVE-2026-21509 in practice, relying on crafted RTF files that trigger OLE parsing without macros. The blog post walks through efficient IOC extraction from weaponised documents. blog.synapticsystems.de/apt28-

##

AAKL@infosec.exchange at 2026-02-03T17:20:33.000Z ##

This is from yesterday.

Zscaler: APT28 Leverages CVE-2026-21509 in Operation Neusploit zscaler.com/blogs/security-res #infosec #vulnerability #threatresearch

##

oversecurity@mastodon.social at 2026-02-03T16:40:25.000Z ##

Russian state hackers exploit new Microsoft Office flaw in attacks on Ukraine, EU

Ukraine’s computer emergency response team, CERT-UA, said attackers began abusing the flaw — tracked as CVE-2026-21509 — shortly after Microsoft...

🔗️ [Therecord] link.is.it/ZQMXsZ

##

LLMs@activitypub.awakari.com at 2026-02-03T14:21:18.000Z ## InfoSec News Nuggets 02/03/2026 APT28 Leverages CVE-2026-21509 in Operation Neusploit A ThreatLabz writeup on a campaign attributed to APT28 using weaponized RTF files to exploit CVE-2026-21509 and...

#InfoSec #News #Nuggets #AboutDFIR #fcc #Ivanti #news #nuggets

Origin | Interest | Match ##

campuscodi@mastodon.social at 2026-02-03T14:01:39.000Z ##

RE: mastodon.social/@campuscodi/11

More on this campaign from Zscaler: zscaler.com/blogs/security-res

Other targets also include Romania and Slovakia

##

youranonnewsirc@nerdculture.de at 2026-02-03T13:45:54.000Z ##

Latest News (Feb 2-3, 2026):

Global: India and the US have finalized a trade deal. Pakistani forces killed 145 militants in Balochistan after coordinated attacks.

Tech: SpaceX merged with xAI, announcing plans for space-based AI data centers. Oracle plans a $50B expansion for AI cloud infrastructure.

Cybersecurity: A Russian hacker alliance, "Russian Legion," threatens a major cyberattack on Denmark. Russia-linked APT28 exploits a new Microsoft Office flaw (CVE-2026-21509) in attacks across Ukraine and the EU.

#News #Anonymous #AnonNews_irc

##

VirusBulletin@infosec.exchange at 2026-02-03T13:35:53.000Z ##

Zscaler ThreatLabz reports on Operation Neusploit, a January 2026 campaign targeting Central and Eastern Europe. Weaponised Microsoft RTF files exploit CVE-2026-21509 to deliver multi-stage backdoors. The campaign is attributed to APT28 with high confidence. zscaler.com/blogs/security-res

##

us@newsbeep.org at 2026-02-03T05:20:07.000Z ##

Russian hackers exploit recently patched Microsoft Office bug in attacks

Ukraine’s Computer Emergency Response Team (CERT) says that Russian hackers are exploiting CVE-2026-21509, a recently patched vulnerability in multiple…
#NewsBeep #News #US #USA #UnitedStates #UnitedStatesOfAmerica #Technology
newsbeep.com/us/445936/

##

joho@mastodon.online at 2026-02-03T01:23:40.000Z ##

"Microsoft Office zero-day actively exploited" 🕵️ 🙄

(CVSS 7.8)

hackingpassion.com/office-zero

#cve202621509 #cybersec #cybersecurity #infosec #microsoft #office #microsoftoffice #ole

##

oversecurity@mastodon.social at 2026-02-02T21:10:06.000Z ##

Russian hackers exploit recently patched Microsoft Office bug in attacks

Ukraine's Computer Emergency Response Team (CERT) says that Russian hackers are exploiting CVE-2026-21509, a recently patched vulnerability in...

🔗️ [Bleepingcomputer] link.is.it/iMsHDY

##

youranonnewsirc@nerdculture.de at 2026-02-02T01:45:30.000Z ##

Critical cybersecurity updates from February 1-2, 2026: Microsoft patched an actively exploited Office zero-day (CVE-2026-21509), and Fortinet fixed a critical FortiCloud SSO flaw (CVE-2026-24858). Ivanti released fixes for two exploited EPMM zero-days (CVE-2026-1281, CVE-2026-1340) by February 1, and Bitdefender reported Android RAT malware distributed via Hugging Face (February 2).

In technology, Apple overhauled its online Mac store for a "build-it-yourself" experience (February 1), and Google extended the Fitbit data migration deadline to Google accounts until May 2026.

#News #Anonymous #AnonNews_irc

##

CVE-2026-0920
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-01-26T15:04:59.737000

1 posts

The LA-Studio Element Kit for Elementor plugin for WordPress is vulnerable to Administrative User Creation in all versions up to, and including, 1.5.6.3. This is due to the 'ajax_register_handle' function not restricting what user roles a user can register with. This makes it possible for unauthenticated attackers to supply the 'lakit_bkrole' parameter during registration and gain administrator ac

3 repos

https://github.com/Galaxy-sc/CVE-2026-0920-WordPress-LA-Studio-Exploit

https://github.com/John-doe-code-a11/CVE-2026-0920

https://github.com/O99099O/By-Poloss..-..CVE-2026-0920

DarkWebInformer@infosec.exchange at 2026-01-29T20:49:11.000Z ##

‼️ CVE-2026-0920: Explanation and payload of the recent vulnerability in the LA-Studio Element WordPress plugin.

PoC/Exploit: github.com/John-doe-code-a11/C

CVSS: 9.8
CVE Published: January 22nd, 2026

Advisory: github.com/advisories/GHSA-m3h

Technical Analysis: wordfence.com/blog/2026/01/200

##

CVE-2026-0863
(8.6 HIGH)

EPSS: 0.06%

updated 2026-01-23T18:32:31

1 posts

Using string formatting and exception handling, an attacker may bypass n8n's python-task-executor sandbox restrictions and run arbitrary unrestricted Python code in the underlying operating system. The vulnerability can be exploited via the Code block by an authenticated user with basic permissions and can lead to a full n8n instance takeover on instances operating under "Internal" execution mode

beyondmachines1@infosec.exchange at 2026-01-29T20:01:05.000Z ##

Critical n8n Sandbox Escapes Enable Remote Code Execution

n8n reports two sandbox escape vulnerabilities, CVE-2026-1470 and CVE-2026-0863, that allow authenticated users to execute arbitrary code and take over self-hosted servers. These flaws bypass JavaScript and Python security filters by exploiting deprecated language features and specific interpreter behaviors.

**If you are using n8n, make sure it's isolated from the internet and accessible from trusted users only. Then patch n8n to version 1.123.17, 2.4.5 for CVE-2026-1470, and 1.123.14, 2.3.5 for CVE-2026-0863 or later. The CVE-2026-1470 patch is higher priority. Also configure Python nodes to run in 'External' mode for better process isolation.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-0755
(9.8 CRITICAL)

EPSS: 1.27%

updated 2026-01-23T06:31:32

1 posts

gemini-mcp-tool execAsync Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of gemini-mcp-tool. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the execAsync method. The issue results from the lack of proper validation of a user-su

DarkWebInformer@infosec.exchange at 2026-01-30T19:05:01.000Z ##

‼️ CVE-2026-0755: Reported Zero-Day in Gemini MCP Tool Could Allow Remote Code Execution

Zero-Day: Yes
CVSS: 9.8
CVE Published: January 23rd, 2026

Affected Vendor: Gemini MCP Tool
Vulnerability Type: Remote Code Execution (RCE)

Advisory: github.com/advisories/GHSA-28q

##

CVE-2026-20045
(8.2 HIGH)

EPSS: 1.10%

updated 2026-01-21T21:31:31

1 posts

A vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM &amp; Presence Service (Unified CM IM&amp;P), Cisco Unity Connection, and Cisco Webex Calling Dedicated Instance could allow an unauthenticated, remote attacker&nbsp;to execute arbitrary commands on the under

1 repos

https://github.com/dkstar11q/Ashwesker-CVE-2026-20045

ntkramer@infosec.exchange at 2026-01-31T16:52:04.000Z ##

🍩 & #threatintel - Since its disclosure 11 days ago, 95% of the exploitation attempts of CVE-2026-20045, a critical vulnerability in Cisco Unified Communications Manager, have used a distinctive user-agent: Mozilla/5.0 (compatible; CiscoExploit/1.0) and are heavily targeted against our Cisco Unified Communications Manager (UCM) sensors.

We're tracking it here: viz.greynoise.io/tags/cisco-un

Appears to be from github.com/Ashwesker/Ashwesker

##

CVE-2025-9086
(7.5 HIGH)

EPSS: 0.04%

updated 2026-01-20T15:31:21

1 posts

1. A cookie is set using the `secure` keyword for `https://target` 2. curl is redirected to or otherwise made to speak with `http://target` (same hostname, but using clear text HTTP) using the same cookie set 3. The same cookie name is set - but with just a slash as path (`path='/'`). Since this site is not secure, the cookie *should* just be ignored. 4. A bug in the path comparison logic ma

linux@activitypub.awakari.com at 2026-02-03T14:08:07.000Z ## Oracle Linux 10 curl Moderate Security Update ELSA-2026-1825 CVE-2025-9086 The following updated rpms for Oracle Linux 10 have been uploaded to the Unbreakable Linux Network:

#Oracle #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-61729
(7.5 HIGH)

EPSS: 0.02%

updated 2025-12-19T18:25:28.283000

1 posts

Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.

linux@activitypub.awakari.com at 2026-02-02T09:31:46.000Z ## Oracle Linux 10 ELSA-2026-1715 Important Fix for CVE-2025-61729 The following updated rpms for Oracle Linux 10 have been uploaded to the Unbreakable Linux Network:

#Oracle #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-11001
(7.0 None)

EPSS: 0.37%

updated 2025-11-20T00:31:21

1 posts

7-Zip ZIP File Parsing Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of 7-Zip. Interaction with this product is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the handling of symbolic links in ZIP files. Craf

6 repos

https://github.com/mbanyamer/CVE-2025-11001---7-Zip

https://github.com/ranasen-rat/CVE-2025-11001

https://github.com/shalevo13/Se7enSlip

https://github.com/lastvocher/7zip-CVE-2025-11001

https://github.com/pacbypass/CVE-2025-11001

https://github.com/I3r1h0n/7Ziprowler

ruario@vivaldi.net at 2026-01-30T09:34:10.000Z ##

@TeddyTheBest Yes it is open source but it is a little tough to claim the moral high ground here when 7-Zip also frequently has security issues and like WinRAR offers no autoupdate

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-11953
(9.8 CRITICAL)

EPSS: 0.40%

updated 2025-11-13T16:25:27

8 posts

The Metro Development Server, which is opened by the React Native CLI, binds to external interfaces by default. The server exposes an endpoint that is vulnerable to OS command injection. This allows unauthenticated network attackers to send a POST request to the server and run arbitrary executables. On Windows, the attackers can also execute arbitrary shell commands with fully controlled arguments

4 repos

https://github.com/N3k0t-dev/PoC-CVE-collection

https://github.com/boroeurnprach/CVE-2025-11953-PoC

https://github.com/Mr-In4inci3le/CVE-2025-11953-POC-

https://github.com/SaidBenaissa/cve-2025-11953-vulnerability-demo

catc0n at 2026-02-03T17:41:54.591Z ##

Our team wrote about in-the-wild exploitation of React Metro Server CVE-2025-11953, which VulnCheck's Canary Intelligence network detected for the first time in December 2025.

vulncheck.com/blog/metro4shell

##

undercodenews@mastodon.social at 2026-02-03T16:44:01.000Z ##

Metro4Shell Exploit Targets React Native Developers, Delivering Cross-Platform Malware

A critical vulnerability in the Metro server for React Native, tracked as CVE-2025-11953, is actively being exploited by hackers to deliver malicious payloads to both Windows and Linux systems. This flaw exposes developers and organizations relying on React Native to severe risk, especially during the application development phase. Metro, the default JavaScript bundler for React…

undercodenews.com/metro4shell-

##

oversecurity@mastodon.social at 2026-02-03T14:50:06.000Z ##

Hackers exploit critical React Native Metro bug to breach dev systems

Hackers are targeting developers by exploiting the critical vulnerability CVE-2025-11953 in the Metro server for React Native to deliver malicious...

🔗️ [Bleepingcomputer] link.is.it/9a1Dng

##

defendopsdiaries at 2026-02-03T14:20:15.652Z ##

A single overlooked feature in a popular React Native tool let hackers run code on thousands of developer machines worldwide. Curious how one tiny flaw exposed the whole supply chain?

thedefendopsdiaries.com/metro4

##

oversecurity@mastodon.social at 2026-02-03T14:20:07.000Z ##

Hackers exploit critical React Native Metro bug to breach dev systems

Hackers are targeting developers by exploiting the critical vulnerability CVE-2025-11953 in the Metro server for React Native to deliver malicious...

🔗️ [Bleepingcomputer] link.is.it/w9Y7HI

##

catc0n@infosec.exchange at 2026-02-03T17:41:54.000Z ##

Our team wrote about in-the-wild exploitation of React Metro Server CVE-2025-11953, which VulnCheck's Canary Intelligence network detected for the first time in December 2025.

vulncheck.com/blog/metro4shell

##

oversecurity@mastodon.social at 2026-02-03T14:50:06.000Z ##

Hackers exploit critical React Native Metro bug to breach dev systems

Hackers are targeting developers by exploiting the critical vulnerability CVE-2025-11953 in the Metro server for React Native to deliver malicious...

🔗️ [Bleepingcomputer] link.is.it/9a1Dng

##

oversecurity@mastodon.social at 2026-02-03T14:20:07.000Z ##

Hackers exploit critical React Native Metro bug to breach dev systems

Hackers are targeting developers by exploiting the critical vulnerability CVE-2025-11953 in the Metro server for React Native to deliver malicious...

🔗️ [Bleepingcomputer] link.is.it/w9Y7HI

##

CVE-2024-10460
(5.3 MEDIUM)

EPSS: 0.42%

updated 2025-11-04T00:31:55

1 posts

The origin of an external protocol handler prompt could have been obscured using a data: URL within an `iframe`. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132.

linux@activitypub.awakari.com at 2026-02-03T02:45:54.000Z ## Ubuntu 22.04 LTS Thunderbird Security Advisory USN-7991-1 CVE-2024-10460 Several security issues were fixed in Thunderbird.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-8088
(8.8 HIGH)

EPSS: 4.61%

updated 2025-10-22T00:34:26

1 posts

A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET.

26 repos

https://github.com/pescada-dev/-CVE-2025-8088

https://github.com/Shinkirou789/Cve-2025-8088-WinRar-vulnerability

https://github.com/0xAbolfazl/CVE-2025-8088-WinRAR-PathTraversal-PoC

https://github.com/nuky-alt/CVE-2025-8088

https://github.com/nhattanhh/CVE-2025-8088

https://github.com/Markusino488/cve-2025-8088

https://github.com/AdityaBhatt3010/CVE-2025-8088-WinRAR-Zero-Day-Path-Traversal

https://github.com/jordan922/CVE-2025-8088

https://github.com/xi0onamdev/WinRAR-CVE-2025-8088-Exploitation-Toolkit

https://github.com/lucyna77/winrar-exploit

https://github.com/knight0x07/WinRAR-CVE-2025-8088-PoC-RAR

https://github.com/hexsecteam/CVE-2025-8088-Winrar-Tool

https://github.com/papcaii2004/CVE-2025-8088-WinRAR-builder

https://github.com/kitsuneshade/WinRAR-Exploit-Tool---Rust-Edition

https://github.com/DeepBlue-dot/CVE-2025-8088-WinRAR-Startup-PoC

https://github.com/pentestfunctions/best-CVE-2025-8088

https://github.com/pexlexity/WinRAR-CVE-2025-8088-Path-Traversal-PoC

https://github.com/pentestfunctions/CVE-2025-8088-Multi-Document

https://github.com/sxyrxyy/CVE-2025-8088-WinRAR-Proof-of-Concept-PoC-Exploit-

https://github.com/walidpyh/CVE-2025-8088

https://github.com/travisbgreen/cve-2025-8088

https://github.com/techcorp/CVE-2025-8088-Exploit

https://github.com/ghostn4444/CVE-2025-8088

https://github.com/hbesljx/CVE-2025-8088-EXP

https://github.com/onlytoxi/CVE-2025-8088-Winrar-Tool

https://github.com/ilhamrzr/RAR-Anomaly-Inspector

Andy_Thompson@infosec.exchange at 2026-01-29T17:54:31.000Z ##

📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.

Sources:
- bleepingcomputer.com/news/secu
- cloud.google.com/blog/topics/t
- nvd.nist.gov/vuln/detail/CVE-2
- helpnetsecurity.com/2026/01/28

---

🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀

CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.

Sources:
- nvd.nist.gov/vuln/detail/CVE-2
infosecurity-magazine.com/news
- openssl-library.org/news/vulne
- twitter.com/IntCyberDigest/sta

---

🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡

SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.

Sources:
- bleepingcomputer.com/news/secu
- helpnetsecurity.com/2026/01/29
- rapid7.com/blog/post/etr-multi
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-49825
(9.8 CRITICAL)

EPSS: 7.60%

updated 2025-06-18T14:15:12

2 posts

### Impact A full technical disclosure and open-source patch will be published after the embargo period, ending on June 30th, to allow all users to upgrade. Teleport security engineers identified a critical security vulnerability that could allow remote authentication bypass of Teleport. Teleport Cloud Infrastructure and CI/CD build, test, and release infrastructure aren’t affected. For the

Nuclei template

_r_netsec at 2026-02-03T08:28:06.514Z ##

Exploiting CVE-2025-49825 (authentication bypass vulnerability in Teleport) blog.offensive.af/posts/exploi

##

_r_netsec@infosec.exchange at 2026-02-03T08:28:06.000Z ##

Exploiting CVE-2025-49825 (authentication bypass vulnerability in Teleport) blog.offensive.af/posts/exploi

##

CVE-2023-38346
(8.8 HIGH)

EPSS: 1.23%

updated 2024-11-21T08:13:22.843000

1 posts

An issue was discovered in Wind River VxWorks 6.9 and 7. The function ``tarExtract`` implements TAR file extraction and thereby also processes files within an archive that have relative or absolute file paths. A developer using the "tarExtract" function may expect that the function will strip leading slashes from absolute paths or stop processing when encountering relative paths that are outside o

floyd@chaos.social at 2026-02-02T20:51:00.000Z ##

RE: mastodon.social/@bagder/116001

My CVEs are still at 0 medals, but thanks to VxWorks I was able to achieve a CVE on Mars (#Curiosity rover, CVE-2023-38346) 😉

Btw. if anyone from #NASA could confirm curiosity was/is really affected (but probably without attack vector so no impact I guess), that would mean a lot to me

##

CVE-2022-37393
(7.8 HIGH)

EPSS: 5.12%

updated 2024-11-21T07:14:54.630000

1 posts

Zimbra's sudo configuration permits the zimbra user to execute the zmslapd binary as root with arbitrary parameters. As part of its intended functionality, zmslapd can load a user-defined configuration file, which includes plugins in the form of .so files, which also execute as root.

iagox86@infosec.exchange at 2026-01-30T22:01:27.000Z ##

@Weld When I was at Rapid7, we were firm that we wouldn't sign anything preventing us from disclosing. Sometimes that made it real difficult to talk to the company

Sadly the link to the disclosure is dead now, but this was my favourite: attackerkb.com/topics/92AeLOE1

##

CVE-2022-48986
(5.5 MEDIUM)

EPSS: 0.10%

updated 2024-11-01T15:32:52

1 posts

In the Linux kernel, the following vulnerability has been resolved: mm/gup: fix gup_pud_range() for dax For dax pud, pud_huge() returns true on x86. So the function works as long as hugetlb is configured. However, dax doesn't depend on hugetlb. Commit 414fd080d125 ("mm/gup: fix gup_pmd_range() for dax") fixed devmap-backed huge PMDs, but missed devmap-backed huge PUDs. Fix this as well. This fi

linux@activitypub.awakari.com at 2026-01-29T20:27:23.000Z ## Ubuntu 18.04 Kernel Critical Security Flaws USN-7988-1 CVE-2022-48986 Several security issues were fixed in the Linux kernel.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2019-15006(CVSS UNKNOWN)

EPSS: 0.67%

updated 2023-01-29T05:00:49

1 posts

There was a man-in-the-middle (MITM) vulnerability present in the Confluence Previews plugin in Confluence Server and Confluence Data Center. This plugin was used to facilitate communication with the Atlassian Companion application. The Confluence Previews plugin in Confluence Server and Confluence Data Center communicated with the Companion application via the atlassian-domain-for-localhost-conne

FritzAdalis@infosec.exchange at 2026-02-02T17:51:29.000Z ##

@rk @hrbrmstr
Are you forgetting CVE-2019-15006 by Taylor Swift on Security?

##

CVE-2026-25502
(0 None)

EPSS: 0.00%

4 posts

N/A

thehackerwire@mastodon.social at 2026-02-03T19:24:42.000Z ##

🟠 CVE-2026-25502 - High (7.8)

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.2, stack-based buffer overflow in icFixXml() function when processing malformed ICC...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T19:20:33.000Z ##

🟠 CVE-2026-25502 - High (7.8)

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.2, stack-based buffer overflow in icFixXml() function when processing malformed ICC...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T19:24:42.000Z ##

🟠 CVE-2026-25502 - High (7.8)

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.2, stack-based buffer overflow in icFixXml() function when processing malformed ICC...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T19:20:33.000Z ##

🟠 CVE-2026-25502 - High (7.8)

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.2, stack-based buffer overflow in icFixXml() function when processing malformed ICC...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24665
(0 None)

EPSS: 0.00%

4 posts

N/A

thehackerwire@mastodon.social at 2026-02-03T18:24:20.000Z ##

🟠 CVE-2026-24665 - High (8.7)

The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, a stored Cross-Site Scripting (XSS) vulnerability allows authenticated students to inject malicious JavaScript into uploaded as...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T18:21:42.000Z ##

🟠 CVE-2026-24665 - High (8.7)

The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, a stored Cross-Site Scripting (XSS) vulnerability allows authenticated students to inject malicious JavaScript into uploaded as...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T18:24:20.000Z ##

🟠 CVE-2026-24665 - High (8.7)

The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, a stored Cross-Site Scripting (XSS) vulnerability allows authenticated students to inject malicious JavaScript into uploaded as...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T18:21:42.000Z ##

🟠 CVE-2026-24665 - High (8.7)

The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, a stored Cross-Site Scripting (XSS) vulnerability allows authenticated students to inject malicious JavaScript into uploaded as...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24669
(0 None)

EPSS: 0.00%

4 posts

N/A

thehackerwire@mastodon.social at 2026-02-03T18:24:10.000Z ##

🟠 CVE-2026-24669 - High (7.8)

The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, an insecure password reset mechanism allows local attackers to reuse a valid password reset token after it has already been use...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T18:21:33.000Z ##

🟠 CVE-2026-24669 - High (7.8)

The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, an insecure password reset mechanism allows local attackers to reuse a valid password reset token after it has already been use...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T18:24:10.000Z ##

🟠 CVE-2026-24669 - High (7.8)

The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, an insecure password reset mechanism allows local attackers to reuse a valid password reset token after it has already been use...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-03T18:21:33.000Z ##

🟠 CVE-2026-24669 - High (7.8)

The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, an insecure password reset mechanism allows local attackers to reuse a valid password reset token after it has already been use...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-49144
(0 None)

EPSS: 0.00%

3 posts

N/A

const_data@mastodon.social at 2026-02-03T17:27:21.000Z ##

#infosec #Microsoft #vulnerability

CVE-2026-49144

Al ejecutar el instalador, el ataque se ejecuta automáticamente con privilegios de SYSTEM.

El problema se ha solucionado y estará en la versión 8.8.2.

Actualice sus dispositivos lo antes posible.

Que tenga un lindo día.😁

3/3

##

const_data@mastodon.social at 2026-02-03T17:22:52.000Z ##

#infosec #Microsoft #vulnerability

CVE-2026-49144

Un atacante podría usar ingeniería social o clickjacking para engañar a los usuarios para que descarguen el instalador legítimo y un ejecutable malicioso en el mismo directorio.

2/3

##

const_data@mastodon.social at 2026-02-03T17:19:54.000Z ##

#infosec #Microsoft #vulnerability

CVE-2026-49144

Notepad++ es un editor de código fuente gratuito y de código abierto. En las versiones 8.8.1 y anteriores, el instalador permite que usuarios sin privilegios obtengan privilegios de nivel SISTEMA a través de rutas de búsqueda de ejecutables inseguras.

nvd.nist.org/vuln/detail/CVE-2

1/3

##

CVE-2025-66480
(0 None)

EPSS: 0.43%

1 posts

N/A

thehackerwire@mastodon.social at 2026-02-02T23:21:26.000Z ##

🔴 CVE-2025-66480 - Critical (9.8)

Wildfire IM is an instant messaging and real-time audio/video solution. Prior to 1.4.3, a critical vulnerability exists in the im-server component related to the file upload functionality found in com.xiaoleilu.loServer.action.UploadFileAction. Th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25137
(0 None)

EPSS: 0.03%

2 posts

N/A

thehackerwire@mastodon.social at 2026-02-02T23:18:29.000Z ##

🔴 CVE-2026-25137 - Critical (9.1)

The NixOs Odoo package is an open source ERP and CRM system. From 21.11 to before 25.11 and 26.05, every NixOS based Odoo setup publicly exposes the database manager without any authentication. This allows unauthorized actors to delete and downloa...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

nixpkgssecuritychanges@social.gerbet.me at 2026-01-31T17:39:01.000Z ##

Security Advisory: Database and filestore publicly accessible with default Odoo configuration (CVE-2026-25137)

discourse.nixos.org/t/security

#security #nixpkgs #nixos

##

CVE-2026-23743
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-01-30T21:33:55.000Z ##

🟠 CVE-2026-23743 - High (7.5)

Discourse is an open source discussion platform. In versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0, permalinks pointing to access-restricted resources (private topics, categories, posts, or hidden tags) were redirecting users to URLs ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-01-30T16:17:18.000Z ##

🟠 CVE-2026-24854 - High (8.8)

ChurchCRM is an open-source church management system. A SQL Injection vulnerability exists in endpoint `/PaddleNumEditor.php` in ChurchCRM prior to version 6.7.2. Any authenticated user, including one with zero assigned permissions, can exploit SQ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-63261
(0 None)

EPSS: 0.00%

1 posts

N/A

pentesttools@infosec.exchange at 2026-01-30T13:05:42.000Z ##

🔥 A vulnerability in AWStats sitting in a cPanel tree... H I D I N G?

We discovered it.

CVE-2025-63261 (or as we call it: PTT-2025-021) is what happens when "legacy meets lazy":

A single "|" in an HTTP GET param leads straight to RCE via Perl’s unsafe open() call.

And yes, this was sitting in AWStats.

Why it matters:

🔹 It’s already 2026, and we’re still finding bugs from 2000s-era web tools
🔹 Attack surface doesn’t disappear, it just ages quietly
🔹 RCE doesn’t need zero-days when it has zero hygiene

📝 We have a very comprehensive Part 1 article, written by Matei Badanoiu, who walks us through:

✅ How we found the bug
✅ How we turned it into a working exploit
✅ Why these “boring” vulns still matter

Read the article here: pentest-tools.com/blog/cpanel-

##

CVE-2026-22806
(0 None)

EPSS: 0.01%

1 posts

N/A

thehackerwire@mastodon.social at 2026-01-29T20:18:44.000Z ##

🔴 CVE-2026-22806 - Critical (9.1)

vCluster Platform provides a Kubernetes platform for managing virtual clusters, multi-tenancy, and cluster sharing. Prior to versions 4.6.0, 4.5.4, 4.4.2, and 4.3.10, when an access key is created with a limited scope, the scope can be bypassed to...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

Visit counter For Websites