##
Updated at UTC 2026-02-04T11:32:08.386340
| CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-0818 | 4.3 | 0.02% | 1 | 0 | 2026-02-04T10:16:04.550000 | When a user explicitly requested Thunderbird to decrypt an inline OpenPGP messag | |
| CVE-2025-15285 | 7.5 | 0.00% | 2 | 0 | 2026-02-04T09:15:50.863000 | The SEO Flow by LupsOnline plugin for WordPress is vulnerable to unauthorized mo | |
| CVE-2025-15268 | 7.5 | 0.00% | 2 | 0 | 2026-02-04T09:15:50.690000 | The Infility Global plugin for WordPress is vulnerable to unauthenticated SQL In | |
| CVE-2026-1819 | 8.8 | 0.00% | 2 | 0 | 2026-02-04T08:16:06.820000 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site | |
| CVE-2026-1756 | 8.8 | 0.00% | 2 | 0 | 2026-02-04T07:15:59.267000 | The WP FOFT Loader plugin for WordPress is vulnerable to arbitrary file uploads | |
| CVE-2026-1861 | 8.8 | 0.00% | 2 | 0 | 2026-02-04T00:31:33 | Heap buffer overflow in libvpx in Google Chrome prior to 144.0.7559.132 allowed | |
| CVE-2026-1632 | 9.1 | 0.00% | 2 | 0 | 2026-02-04T00:30:41 | MOMA Seismic Station Version v2.4.2520 and prior exposes its web management inte | |
| CVE-2026-24513 | 3.1 | 0.00% | 2 | 0 | 2026-02-04T00:30:41 | A security issue was discovered in ingress-nginx where the protection afforded b | |
| CVE-2026-24514 | 6.5 | 0.00% | 2 | 0 | 2026-02-04T00:30:41 | A security issue was discovered in ingress-nginx where the validating admission | |
| CVE-2026-1862 | 8.8 | 0.00% | 2 | 0 | 2026-02-04T00:30:28 | Type Confusion in V8 in Google Chrome prior to 144.0.7559.132 allowed a remote a | |
| CVE-2026-1633 | 10.0 | 0.00% | 4 | 0 | 2026-02-04T00:16:08.557000 | The Synectix LAN 232 TRIO 3-Port serial to ethernet adapter exposes its web mana | |
| CVE-2026-24512 | 8.8 | 0.00% | 6 | 0 | 2026-02-03T23:16:06.990000 | A security issue was discovered in ingress-nginx cthe `rules.http.paths.path` In | |
| CVE-2026-1580 | 8.8 | 0.00% | 5 | 0 | 2026-02-03T23:16:06.290000 | A security issue was discovered in ingress-nginx where the `nginx.ingress.kubern | |
| CVE-2026-25614 | 7.5 | 0.00% | 2 | 0 | 2026-02-03T21:31:59 | Blesta 3.x through 5.x before 5.13.3 allows object injection, aka CORE-5680. | |
| CVE-2026-24149 | 7.8 | 0.00% | 2 | 0 | 2026-02-03T21:31:59 | NVIDIA Megatron-LM for all platforms contains a vulnerability in a script, where | |
| CVE-2026-1803 | 8.1 | 0.00% | 4 | 0 | 2026-02-03T21:31:58 | A weakness has been identified in Ziroom ZHOME A0101 1.0.1.0. Impacted is an unk | |
| CVE-2026-24954 | 8.8 | 0.00% | 2 | 0 | 2026-02-03T21:31:51 | Deserialization of Untrusted Data vulnerability in magepeopleteam WpEvently mage | |
| CVE-2026-20421 | 7.5 | 0.21% | 1 | 0 | 2026-02-03T21:23:50.483000 | In Modem, there is a possible system crash due to improper input validation. Thi | |
| CVE-2025-40551 | 9.8 | 1.03% | 11 | 0 | 2026-02-03T21:13:06.187000 | SolarWinds Web Help Desk was found to be susceptible to an untrusted data deseri | |
| CVE-2025-40553 | 9.8 | 0.78% | 2 | 0 | 2026-02-03T21:10:44.253000 | SolarWinds Web Help Desk was found to be susceptible to an untrusted data deseri | |
| CVE-2026-25150 | 9.3 | 0.00% | 2 | 0 | 2026-02-03T20:49:23 | ### Summary A Prototype Pollution vulnerability exists in the `formToObj()` fun | |
| CVE-2025-10878 | 10.0 | 0.00% | 2 | 1 | 2026-02-03T20:15:55.837000 | A SQL injection vulnerability exists in the login functionality of Fikir Odalari | |
| CVE-2026-1285 | None | 0.00% | 2 | 0 | 2026-02-03T19:31:19 | An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4 | |
| CVE-2025-14550 | None | 0.00% | 2 | 0 | 2026-02-03T19:29:48 | An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4 | |
| CVE-2025-67848 | 8.1 | 0.06% | 2 | 0 | 2026-02-03T19:16:27 | A flaw was found in Moodle. This authentication bypass vulnerability allows susp | |
| CVE-2025-70841 | 10.0 | 0.00% | 2 | 0 | 2026-02-03T18:30:54 | Dokans Multi-Tenancy Based eCommerce Platform SaaS 3.9.2 allows unauthenticated | |
| CVE-2025-65875 | 8.8 | 0.00% | 2 | 0 | 2026-02-03T18:30:53 | An arbitrary file upload vulnerability in the AddFont() function of FPDF v1.86 a | |
| CVE-2021-39935 | 7.5 | 28.25% | 7 | 0 | 2026-02-03T18:30:29 | An issue has been discovered in GitLab CE/EE affecting all versions starting fro | |
| CVE-2019-19006 | 9.8 | 2.14% | 7 | 0 | 2026-02-03T18:30:27 | Sangoma FreePBX 115.0.16.26 and below, 14.0.13.11 and below, 13.0.197.13 and bel | |
| CVE-2026-24773 | 7.5 | 0.00% | 4 | 0 | 2026-02-03T18:16:24.373000 | The Open eClass platform (formerly known as GUnet eClass) is a complete course m | |
| CVE-2025-65889 | 7.5 | 0.05% | 1 | 0 | 2026-02-03T17:56:57.603000 | A type validation flaw in the flow.dstack() component of OneFlow v0.9.0 allows a | |
| CVE-2026-1568 | 9.6 | 0.00% | 2 | 0 | 2026-02-03T17:15:59.893000 | Rapid7 InsightVM versions before 8.34.0 contain a signature verification issue o | |
| CVE-2026-25253 | 8.8 | 0.04% | 6 | 1 | 2026-02-03T16:44:36.630000 | OpenClaw (aka clawdbot or Moltbot) before 2026.1.29 obtains a gatewayUrl value f | |
| CVE-2026-20402 | 7.5 | 0.21% | 2 | 0 | 2026-02-03T16:44:36.630000 | In Modem, there is a possible system crash due to improper input validation. Thi | |
| CVE-2026-20412 | 7.8 | 0.01% | 1 | 0 | 2026-02-03T16:44:36.630000 | In cameraisp, there is a possible out of bounds write due to a missing bounds ch | |
| CVE-2025-15030 | 9.8 | 0.01% | 1 | 0 | 2026-02-03T16:44:36.630000 | The User Profile Builder WordPress plugin before 3.15.2 does not have a proper | |
| CVE-2025-47399 | 7.8 | 0.01% | 1 | 0 | 2026-02-03T16:44:36.630000 | Memory Corruption while processing IOCTL call to update sensor property settings | |
| CVE-2026-20408 | 8.8 | 0.02% | 1 | 0 | 2026-02-03T16:44:36.630000 | In wlan, there is a possible out of bounds write due to a heap buffer overflow. | |
| CVE-2025-8587 | 8.6 | 0.01% | 1 | 0 | 2026-02-03T16:44:36.630000 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
| CVE-2026-25200 | 9.8 | 0.07% | 1 | 0 | 2026-02-03T16:44:36.630000 | A vulnerability in MagicInfo9 Server allows authorized users to upload HTML file | |
| CVE-2026-25142 | 10.0 | 0.10% | 3 | 0 | 2026-02-03T16:44:03.343000 | SandboxJS is a JavaScript sandboxing library. Prior to 0.8.27, SanboxJS does not | |
| CVE-2025-6397 | 8.6 | 0.00% | 2 | 0 | 2026-02-03T16:44:03.343000 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site | |
| CVE-2025-67853 | 7.5 | 0.04% | 2 | 0 | 2026-02-03T16:44:03.343000 | A flaw was found in Moodle. A remote attacker could exploit a lack of proper rat | |
| CVE-2025-8456 | 7.6 | 0.03% | 2 | 0 | 2026-02-03T16:44:03.343000 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site | |
| CVE-2025-8590 | 7.5 | 0.03% | 2 | 0 | 2026-02-03T16:44:03.343000 | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in AKCE | |
| CVE-2026-24465 | 9.8 | 0.02% | 2 | 0 | 2026-02-03T16:44:03.343000 | Stack-based buffer overflow vulnerability exists in ELECOM wireless LAN access p | |
| CVE-2026-22778 | 9.8 | 0.06% | 1 | 0 | 2026-02-03T16:44:03.343000 | vLLM is an inference and serving engine for large language models (LLMs). From 0 | |
| CVE-2026-23515 | 9.9 | 0.91% | 1 | 0 | 2026-02-03T16:44:03.343000 | Signal K Server is a server application that runs on a central hub in a boat. Pr | |
| CVE-2025-64328 | 0 | 0.46% | 7 | 1 | 2026-02-03T16:16:10.400000 | FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX | |
| CVE-2026-25060 | 8.1 | 0.01% | 1 | 0 | 2026-02-03T16:13:27 | ### Summary The application disables TLS certificate verification by default for | |
| CVE-2026-25059 | 8.8 | 0.02% | 1 | 0 | 2026-02-03T16:13:22 | ### Summary The application contains a Path Traversal vulnerability (CWE-22) in | |
| CVE-2026-24763 | 8.8 | 0.07% | 2 | 0 | 2026-02-03T16:13:07 | ### Summary A Command Injection vulnerability existed in Clawdbot’s Docker sandb | |
| CVE-2026-24737 | 8.1 | 0.01% | 2 | 0 | 2026-02-03T16:13:02 | ### Impact User control of properties and methods of the Acroform module allows | |
| CVE-2026-23997 | 8.0 | 0.01% | 1 | 0 | 2026-02-03T16:12:22 | ### Summary A Stored Cross-Site Scripting (XSS) vulnerability was discovered in | |
| CVE-2025-71007 | 7.5 | 0.05% | 3 | 0 | 2026-02-03T16:06:35.320000 | An input validation vulnerability in the oneflow.index_add component of OneFlow | |
| CVE-2026-25510 | 10.0 | 0.00% | 4 | 0 | 2026-02-03T16:03:26 | **Summary** A critical vulnerability has been identified in CI4MS that allows a | |
| CVE-2026-25022 | 8.5 | 0.00% | 2 | 0 | 2026-02-03T15:30:38 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
| CVE-2025-5319 | 9.8 | 0.00% | 2 | 1 | 2026-02-03T15:30:33 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
| CVE-2025-7760 | 7.6 | 0.00% | 2 | 0 | 2026-02-03T15:30:33 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site | |
| CVE-2025-8461 | 7.6 | 0.03% | 2 | 0 | 2026-02-03T09:30:34 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site | |
| CVE-2026-1375 | 8.1 | 0.04% | 2 | 0 | 2026-02-03T09:30:34 | The Tutor LMS – eLearning and online course solution plugin for WordPress is vul | |
| CVE-2026-1730 | 8.8 | 0.22% | 3 | 0 | 2026-02-03T09:30:28 | The OS DataHub Maps plugin for WordPress is vulnerable to arbitrary file uploads | |
| CVE-2025-8589 | 7.6 | 0.03% | 2 | 0 | 2026-02-03T09:30:28 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site | |
| CVE-2026-24694 | 7.8 | 0.02% | 2 | 0 | 2026-02-03T06:31:10 | The installer for Roland Cloud Manager ver.3.1.19 and prior insecurely loads Dyn | |
| CVE-2026-20404 | 7.5 | 0.21% | 3 | 0 | 2026-02-03T00:31:23 | In Modem, there is a possible system crash due to improper input validation. Thi | |
| CVE-2026-20407 | 8.8 | 0.01% | 2 | 0 | 2026-02-03T00:31:23 | In wlan STA driver, there is a possible escalation of privilege due to a missing | |
| CVE-2026-20406 | 7.5 | 0.21% | 1 | 0 | 2026-02-03T00:31:23 | In Modem, there is a possible system crash due to an uncaught exception. This co | |
| CVE-2026-20420 | 7.5 | 0.21% | 1 | 0 | 2026-02-03T00:31:23 | In Modem, there is a possible system crash due to incorrect error handling. This | |
| CVE-2025-63649 | 7.5 | 0.04% | 2 | 0 | 2026-02-03T00:31:22 | An out-of-bounds read in the http_parser_transfer_encoding_chunked function (mk_ | |
| CVE-2026-20403 | 7.5 | 0.21% | 2 | 0 | 2026-02-03T00:31:22 | In Modem, there is a possible system crash due to a missing bounds check. This c | |
| CVE-2026-20409 | 7.8 | 0.01% | 2 | 0 | 2026-02-03T00:31:22 | In imgsys, there is a possible out of bounds write due to a missing bounds check | |
| CVE-2026-20405 | 7.5 | 0.21% | 1 | 0 | 2026-02-03T00:31:22 | In Modem, there is a possible system crash due to a missing bounds check. This c | |
| CVE-2026-20422 | 7.5 | 0.21% | 1 | 0 | 2026-02-03T00:30:18 | In Modem, there is a possible system crash due to improper input validation. Thi | |
| CVE-2026-25223 | 7.5 | 0.00% | 4 | 0 | 2026-02-02T22:23:32 | ### Impact A validation bypass vulnerability exists in Fastify where request bo | |
| CVE-2026-0599 | 7.5 | 0.08% | 1 | 0 | 2026-02-02T22:07:42 | A vulnerability in huggingface/text-generation-inference version 3.3.6 allows un | |
| CVE-2026-1117 | 8.2 | 0.03% | 1 | 0 | 2026-02-02T21:56:53 | A vulnerability in the `lollms_generation_events.py` component of parisneo/lollm | |
| CVE-2026-20411 | 7.8 | 0.01% | 1 | 0 | 2026-02-02T21:31:27 | In cameraisp, there is a possible escalation of privilege due to use after free. | |
| CVE-2026-1531 | 8.1 | 0.02% | 1 | 0 | 2026-02-02T21:15:40 | A flaw was found in foreman_kubevirt. When configuring the connection to OpenShi | |
| CVE-2026-1530 | 8.1 | 0.02% | 1 | 0 | 2026-02-02T21:02:04 | A flaw was found in fog-kubevirt. This vulnerability allows a remote attacker to | |
| CVE-2026-24788 | 8.8 | 0.23% | 1 | 0 | 2026-02-02T20:53:03 | RaspAP raspap-webgui versions prior to 3.3.6 contain an OS Command Injection vul | |
| CVE-2026-25153 | 7.7 | 0.05% | 1 | 0 | 2026-02-02T20:19:59 | ### Impact When TechDocs is configured with `runIn: local`, a malicious actor w | |
| CVE-2026-24071 | 9.4 | 0.01% | 2 | 0 | 2026-02-02T18:32:35 | It was found that the XPC service offered by the privileged helper of Native Acc | |
| CVE-2026-24070 | 8.8 | 0.00% | 1 | 0 | 2026-02-02T18:32:35 | During the installation of the Native Access application, a privileged helper `c | |
| CVE-2025-9974 | 8.8 | 0.02% | 2 | 0 | 2026-02-02T18:32:35 | The unified WEBUI application of the ONT/Beacon device contains an input handlin | |
| CVE-2025-47359 | 7.8 | 0.01% | 1 | 0 | 2026-02-02T18:31:39 | Memory Corruption when multiple threads simultaneously access a memory free API. | |
| CVE-2025-47358 | 7.8 | 0.01% | 1 | 0 | 2026-02-02T18:31:39 | Memory Corruption when user space address is modified and passed to mem_free API | |
| CVE-2025-47398 | 7.8 | 0.01% | 1 | 0 | 2026-02-02T18:31:39 | Memory Corruption while deallocating graphics processing unit memory buffers due | |
| CVE-2025-47397 | 7.8 | 0.01% | 1 | 0 | 2026-02-02T18:31:39 | Memory Corruption when initiating GPU memory mapping using scatter-gather lists | |
| CVE-2025-14914 | 7.7 | 0.04% | 1 | 0 | 2026-02-02T18:31:38 | IBM WebSphere Application Server Liberty 17.0.0.3 through 26.0.0.1 could allow a | |
| CVE-2025-13986 | 4.2 | 0.04% | 1 | 0 | 2026-02-02T18:16:11.883000 | Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal | |
| CVE-2026-1761 | 8.6 | 0.14% | 1 | 0 | 2026-02-02T15:30:44 | A flaw was found in libsoup. This stack-based buffer overflow vulnerability occu | |
| CVE-2026-20418 | 8.8 | 0.21% | 2 | 0 | 2026-02-02T15:30:34 | In Thread, there is a possible out of bounds write due to a missing bounds check | |
| CVE-2026-20419 | 7.5 | 0.07% | 1 | 0 | 2026-02-02T15:30:34 | In wlan AP/STA firmware, there is a possible system becoming irresponsive due to | |
| CVE-2026-25201 | 8.8 | 0.07% | 1 | 0 | 2026-02-02T06:30:53 | An unauthenticated user can upload arbitrary files to execute remote code, leadi | |
| CVE-2026-25202 | 9.8 | 0.04% | 1 | 0 | 2026-02-02T06:30:53 | The database account and password are hardcoded, allowing login with the account | |
| CVE-2025-69662 | 8.6 | 0.03% | 1 | 0 | 2026-02-01T18:09:11 | SQL injection vulnerability in geopandas before v.1.1.2 allows an attacker to ob | |
| CVE-2026-25130 | 9.7 | 0.08% | 1 | 1 | 2026-01-31T03:53:47 | ## Summary The CAI (Cybersecurity AI) framework contains multiple argument inje | |
| CVE-2025-51958 | 9.8 | 0.07% | 1 | 0 | 2026-01-30T21:30:28 | aelsantex runcommand 2014-04-01, a plugin for DokuWiki, allows unauthenticated a | |
| CVE-2026-25128 | 7.5 | 0.07% | 1 | 0 | 2026-01-30T20:10:15 | ### Summary A RangeError vulnerability exists in the numeric entity processing o | |
| CVE-2025-62348 | 7.8 | 0.01% | 1 | 0 | 2026-01-30T19:16:10.860000 | Salt's junos execution module contained an unsafe YAML decode/load usage. A spec | |
| CVE-2025-4686 | 8.6 | 0.03% | 2 | 1 | 2026-01-30T18:31:21 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
| CVE-2026-1686 | 8.8 | 0.14% | 2 | 0 | 2026-01-30T16:16:12.633000 | A security flaw has been discovered in Totolink A3600R 5.9c.4959. This issue aff | |
| CVE-2026-0709 | 7.2 | 0.01% | 1 | 0 | 2026-01-30T12:31:26 | Some Hikvision Wireless Access Points are vulnerable to authenticated command ex | |
| CVE-2026-1699 | 10.0 | 0.03% | 1 | 0 | 2026-01-30T12:31:26 | In the Eclipse Theia Website repository, the GitHub Actions workflow .github/wor | |
| CVE-2025-1395 | 8.2 | 0.03% | 1 | 0 | 2026-01-30T09:31:00 | Generation of Error Message Containing Sensitive Information vulnerability in Co | |
| CVE-2026-21418 | 7.8 | 0.06% | 1 | 0 | 2026-01-30T09:31:00 | Dell Unity, version(s) 5.5.2 and prior, contain(s) an Improper Neutralization of | |
| CVE-2026-0805 | 8.2 | 0.11% | 1 | 0 | 2026-01-30T09:30:54 | An input neutralization vulnerability in the Backup Configuration component of C | |
| CVE-2026-0963 | 9.9 | 0.31% | 1 | 0 | 2026-01-30T09:30:54 | An input neutralization vulnerability in the File Operations API Endpoint compon | |
| CVE-2026-22277 | 7.8 | 0.06% | 1 | 0 | 2026-01-30T09:15:51.090000 | Dell UnityVSA, version(s) 5.4 and prior, contain(s) an Improper Neutralization o | |
| CVE-2026-24714 | 7.5 | 0.07% | 1 | 0 | 2026-01-30T05:16:33.093000 | Some end of service NETGEAR products provide "TelnetEnable" functionality, which | |
| CVE-2025-69516 | 8.8 | 0.22% | 1 | 0 | 2026-01-30T00:32:24 | A Server-Side Template Injection (SSTI) vulnerability in the /reporting/template | |
| CVE-2026-1281 | 9.8 | 13.12% | 12 | 0 | 2026-01-30T00:31:29 | A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve | |
| CVE-2026-1637 | 8.8 | 0.02% | 1 | 0 | 2026-01-30T00:31:29 | A vulnerability was identified in Tenda AC21 16.03.08.16. The affected element i | |
| CVE-2026-25116 | 7.6 | 0.20% | 1 | 0 | 2026-01-29T22:15:56.110000 | Runtipi is a personal homeserver orchestrator. Starting in version 4.5.0 and pri | |
| CVE-2026-1340 | 9.8 | 0.14% | 11 | 0 | 2026-01-29T22:15:53.313000 | A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve | |
| CVE-2025-61726 | 7.5 | 0.03% | 1 | 0 | 2026-01-29T21:31:33 | The net/url package does not set a limit on the number of query parameters in a | |
| CVE-2025-71003 | 7.5 | 0.05% | 1 | 0 | 2026-01-29T21:31:32 | An input validation vulnerability in the flow.arange() component of OneFlow v0.9 | |
| CVE-2025-13982 | 8.1 | 0.02% | 1 | 0 | 2026-01-29T21:31:32 | Cross-Site Request Forgery (CSRF) vulnerability in Drupal Login Time Restriction | |
| CVE-2025-14472 | 8.1 | 0.02% | 1 | 0 | 2026-01-29T21:31:32 | Cross-Site Request Forgery (CSRF) vulnerability in Drupal Acquia Content Hub all | |
| CVE-2026-1610 | 8.1 | 0.01% | 1 | 0 | 2026-01-29T21:30:37 | A vulnerability was found in Tenda AX12 Pro V2 16.03.49.24_cn. Affected by this | |
| CVE-2026-24061 | 9.8 | 29.55% | 1 | 57 | template | 2026-01-29T21:30:27 | telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a " |
| CVE-2025-69602 | 9.1 | 0.04% | 1 | 0 | 2026-01-29T20:16:09.663000 | A session fixation vulnerability exists in 66biolinks v62.0.0 by AltumCode, wher | |
| CVE-2026-1453 | 9.8 | 0.06% | 2 | 0 | 2026-01-29T19:16:18.987000 | A missing authentication for critical function vulnerability in KiloView Encoder | |
| CVE-2025-61731 | 7.8 | 0.01% | 1 | 0 | 2026-01-29T18:32:50 | Building a malicious file with cmd/go can cause can cause a write to an attacker | |
| CVE-2025-65890 | 7.5 | 0.05% | 1 | 0 | 2026-01-29T18:32:49 | A device-ID validation flaw in OneFlow v0.9.0 allows attackers to cause a Denial | |
| CVE-2025-65888 | 7.5 | 0.05% | 1 | 0 | 2026-01-29T18:32:49 | A dimension validation flaw in the flow.empty() component of OneFlow 0.9.0 allow | |
| CVE-2025-65891 | 7.5 | 0.06% | 1 | 0 | 2026-01-29T18:32:49 | A GPU device-ID validation flaw in OneFlow v0.9.0 allows attackers to trigger a | |
| CVE-2025-71000 | 7.5 | 0.05% | 1 | 0 | 2026-01-29T18:32:49 | An issue in the flow.cuda.BoolTensor component of OneFlow v0.9.0 allows attacker | |
| CVE-2025-70999 | 7.5 | 0.05% | 1 | 0 | 2026-01-29T18:32:49 | A GPU device-ID validation flaw in the flow.cuda.get_device_capability() compone | |
| CVE-2025-65886 | 7.5 | 0.05% | 1 | 0 | 2026-01-29T18:31:42 | A shape mismatch vulnerability in OneFlow v0.9.0 allows attackers to cause a Den | |
| CVE-2025-14975 | 8.1 | 0.01% | 1 | 0 | 2026-01-29T17:16:15.460000 | The Custom Login Page Customizer WordPress plugin before 2.5.4 does not have a p | |
| CVE-2025-15467 | 9.8 | 0.66% | 5 | 4 | 2026-01-29T15:31:31 | Issue summary: Parsing CMS AuthEnvelopedData message with maliciously crafted AE | |
| CVE-2026-1470 | 10.0 | 0.35% | 1 | 0 | 2026-01-29T15:02:29 | n8n contains a critical Remote Code Execution (RCE) vulnerability in its workflo | |
| CVE-2026-23864 | 7.5 | 0.79% | 1 | 0 | 2026-01-29T15:00:31 | ## Impact It was found that the fixes to address DoS in React Server Components | |
| CVE-2026-24858 | 9.8 | 3.71% | 3 | 5 | 2026-01-29T13:16:51.047000 | An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-2 | |
| CVE-2025-14840 | None | 0.05% | 1 | 0 | 2026-01-28T21:31:30 | Improper Check for Unusual or Exceptional Conditions vulnerability in Drupal HTT | |
| CVE-2026-1056 | 9.8 | 0.18% | 1 | 1 | 2026-01-28T15:31:37 | The Snow Monkey Forms plugin for WordPress is vulnerable to arbitrary file delet | |
| CVE-2025-40552 | 9.8 | 0.06% | 2 | 0 | 2026-01-28T09:30:35 | SolarWinds Web Help Desk was found to be susceptible to an authentication bypass | |
| CVE-2025-40554 | 9.8 | 0.04% | 2 | 2 | 2026-01-28T09:30:35 | SolarWinds Web Help Desk was found to be susceptible to an authentication bypass | |
| CVE-2026-21509 | 7.8 | 2.91% | 19 | 6 | 2026-01-27T16:19:42.330000 | Reliance on untrusted inputs in a security decision in Microsoft Office allows a | |
| CVE-2026-0920 | 9.8 | 0.03% | 1 | 3 | 2026-01-26T15:04:59.737000 | The LA-Studio Element Kit for Elementor plugin for WordPress is vulnerable to Ad | |
| CVE-2026-0863 | 8.6 | 0.06% | 1 | 0 | 2026-01-23T18:32:31 | Using string formatting and exception handling, an attacker may bypass n8n's pyt | |
| CVE-2026-0755 | 9.8 | 1.27% | 1 | 0 | 2026-01-23T06:31:32 | gemini-mcp-tool execAsync Command Injection Remote Code Execution Vulnerability. | |
| CVE-2026-20045 | 8.2 | 1.10% | 1 | 1 | 2026-01-21T21:31:31 | A vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unif | |
| CVE-2025-9086 | 7.5 | 0.04% | 1 | 0 | 2026-01-20T15:31:21 | 1. A cookie is set using the `secure` keyword for `https://target` 2. curl is re | |
| CVE-2025-61729 | 7.5 | 0.02% | 1 | 0 | 2025-12-19T18:25:28.283000 | Within HostnameError.Error(), when constructing an error string, there is no lim | |
| CVE-2025-11001 | 7.0 | 0.37% | 1 | 6 | 2025-11-20T00:31:21 | 7-Zip ZIP File Parsing Directory Traversal Remote Code Execution Vulnerability. | |
| CVE-2025-11953 | 9.8 | 0.40% | 8 | 4 | 2025-11-13T16:25:27 | The Metro Development Server, which is opened by the React Native CLI, binds to | |
| CVE-2024-10460 | 5.3 | 0.42% | 1 | 0 | 2025-11-04T00:31:55 | The origin of an external protocol handler prompt could have been obscured using | |
| CVE-2025-8088 | 8.8 | 4.61% | 1 | 26 | 2025-10-22T00:34:26 | A path traversal vulnerability affecting the Windows version of WinRAR allows th | |
| CVE-2025-49825 | 9.8 | 7.60% | 2 | 0 | template | 2025-06-18T14:15:12 | ### Impact A full technical disclosure and open-source patch will be published |
| CVE-2023-38346 | 8.8 | 1.23% | 1 | 0 | 2024-11-21T08:13:22.843000 | An issue was discovered in Wind River VxWorks 6.9 and 7. The function ``tarExtra | |
| CVE-2022-37393 | 7.8 | 5.12% | 1 | 0 | 2024-11-21T07:14:54.630000 | Zimbra's sudo configuration permits the zimbra user to execute the zmslapd binar | |
| CVE-2022-48986 | 5.5 | 0.10% | 1 | 0 | 2024-11-01T15:32:52 | In the Linux kernel, the following vulnerability has been resolved: mm/gup: fix | |
| CVE-2019-15006 | None | 0.67% | 1 | 0 | 2023-01-29T05:00:49 | There was a man-in-the-middle (MITM) vulnerability present in the Confluence Pre | |
| CVE-2026-25502 | 0 | 0.00% | 4 | 0 | N/A | ||
| CVE-2026-24665 | 0 | 0.00% | 4 | 0 | N/A | ||
| CVE-2026-24669 | 0 | 0.00% | 4 | 0 | N/A | ||
| CVE-2026-49144 | 0 | 0.00% | 3 | 0 | N/A | ||
| CVE-2025-66480 | 0 | 0.43% | 1 | 0 | N/A | ||
| CVE-2026-25137 | 0 | 0.03% | 2 | 0 | N/A | ||
| CVE-2026-23743 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2026-24854 | 0 | 0.03% | 1 | 1 | N/A | ||
| CVE-2025-63261 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2026-22806 | 0 | 0.01% | 1 | 0 | N/A |
updated 2026-02-04T10:16:04.550000
1 posts
updated 2026-02-04T09:15:50.863000
2 posts
🟠 CVE-2025-15285 - High (7.5)
The SEO Flow by LupsOnline plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the checkBlogAuthentication() and checkCategoryAuthentication() functions in all versions up to, and including,...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15285/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-15285 - High (7.5)
The SEO Flow by LupsOnline plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the checkBlogAuthentication() and checkCategoryAuthentication() functions in all versions up to, and including,...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15285/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-04T09:15:50.690000
2 posts
🟠 CVE-2025-15268 - High (7.5)
The Infility Global plugin for WordPress is vulnerable to unauthenticated SQL Injection via the 'infility_get_data' API action in all versions up to, and including, 2.14.46. This is due to insufficient escaping on the user supplied parameter and l...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15268/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-15268 - High (7.5)
The Infility Global plugin for WordPress is vulnerable to unauthenticated SQL Injection via the 'infility_get_data' API action in all versions up to, and including, 2.14.46. This is due to insufficient escaping on the user supplied parameter and l...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15268/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-04T08:16:06.820000
2 posts
🟠 CVE-2026-1819 - High (8.8)
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Karel Electronics Industry and Trade Inc. ViPort allows Stored XSS.This issue affects ViPort: through 23012026.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1819/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-1819 - High (8.8)
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Karel Electronics Industry and Trade Inc. ViPort allows Stored XSS.This issue affects ViPort: through 23012026.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1819/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-04T07:15:59.267000
2 posts
🟠 CVE-2026-1756 - High (8.8)
The WP FOFT Loader plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the 'WP_FOFT_Loader_Mimes::file_and_ext' function in all versions up to, and including, 2.1.39. This makes it possible for aut...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1756/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-1756 - High (8.8)
The WP FOFT Loader plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the 'WP_FOFT_Loader_Mimes::file_and_ext' function in all versions up to, and including, 2.1.39. This makes it possible for aut...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1756/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-04T00:31:33
2 posts
🟠 CVE-2026-1861 - High (8.8)
Heap buffer overflow in libvpx in Google Chrome prior to 144.0.7559.132 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1861/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-1861 - High (8.8)
Heap buffer overflow in libvpx in Google Chrome prior to 144.0.7559.132 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1861/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-04T00:30:41
2 posts
🔴 CVE-2026-1632 - Critical (9.1)
MOMA Seismic Station Version v2.4.2520 and prior exposes its web management interface without requiring authentication, which could allow an unauthenticated attacker to modify configuration settings, acquire device data or remotely reset the device.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1632/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-1632 - Critical (9.1)
MOMA Seismic Station Version v2.4.2520 and prior exposes its web management interface without requiring authentication, which could allow an unauthenticated attacker to modify configuration settings, acquire device data or remotely reset the device.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1632/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-04T00:30:41
2 posts
CVE-2026-24513 #devopsish #kubernetes #cve https://github.com/kubernetes/kubernetes/issues/136679
##CVE-2026-24513 #devopsish #kubernetes #cve https://github.com/kubernetes/kubernetes/issues/136679
##updated 2026-02-04T00:30:41
2 posts
CVE-2026-24514 #devopsish #kubernetes #cve https://github.com/kubernetes/kubernetes/issues/136680
##CVE-2026-24514 #devopsish #kubernetes #cve https://github.com/kubernetes/kubernetes/issues/136680
##updated 2026-02-04T00:30:28
2 posts
🟠 CVE-2026-1862 - High (8.8)
Type Confusion in V8 in Google Chrome prior to 144.0.7559.132 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1862/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-1862 - High (8.8)
Type Confusion in V8 in Google Chrome prior to 144.0.7559.132 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1862/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-04T00:16:08.557000
4 posts
Critical Authentication Bypass in End-of-Life Synectix LAN 232 TRIO Adapters
Synectix LAN 232 TRIO adapters contain a critical vulnerability (CVE-2026-1633) that allows unauthenticated remote attackers to take full control of the device. Because the manufacturer is out of business, no patches will be released.
**If you use these Synectix adapters, isolate them from the internet immediately because they have no password protection and will never be patched. Since the company is out of business, plan a replacement of the devices.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-authentication-bypass-in-end-of-life-synectix-lan-232-trio-adapters-j-r-d-l-z/gD2P6Ple2L
🔴 CVE-2026-1633 - Critical (10)
The Synectix LAN 232 TRIO 3-Port serial to ethernet adapter exposes its web management interface without requiring authentication, allowing unauthenticated users to modify critical device settings or factory reset the device.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1633/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Critical Authentication Bypass in End-of-Life Synectix LAN 232 TRIO Adapters
Synectix LAN 232 TRIO adapters contain a critical vulnerability (CVE-2026-1633) that allows unauthenticated remote attackers to take full control of the device. Because the manufacturer is out of business, no patches will be released.
**If you use these Synectix adapters, isolate them from the internet immediately because they have no password protection and will never be patched. Since the company is out of business, plan a replacement of the devices.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-authentication-bypass-in-end-of-life-synectix-lan-232-trio-adapters-j-r-d-l-z/gD2P6Ple2L
🔴 CVE-2026-1633 - Critical (10)
The Synectix LAN 232 TRIO 3-Port serial to ethernet adapter exposes its web management interface without requiring authentication, allowing unauthenticated users to modify critical device settings or factory reset the device.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1633/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T23:16:06.990000
6 posts
Critical Kubernetes Ingress-NGINX Flaw Enables Remote Code Execution Across Clusters
Introduction A newly disclosed high-severity security flaw in Kubernetes’ widely deployed ingress-nginx controller has triggered serious concern across the cloud security ecosystem. Identified as CVE-2026-24512, the vulnerability allows remote attackers to execute arbitrary code by abusing how ingress-nginx processes inbound traffic rules. In real-world terms, this means a single…
##🟠 CVE-2026-24512 - High (8.8)
A security issue was discovered in ingress-nginx cthe `rules.http.paths.path` Ingress field can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24512/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##CVE-2026-24512 #devopsish #kubernetes #cve https://github.com/kubernetes/kubernetes/issues/136678
##deprecation alongside CVEs (e.g., CVE-2026-24512, CVE-25142) and related cloud-native risks.
- Open‑source sustainability and funding: ongoing concerns about funding, burnout, and long‑term project health (CHAOSScon, OFE Summit, FOSDEM discussions).
- CI/CD reliability and tooling: GitHub Actions UI/status issues and deployment pipeline fragility.
- The rise of “vibe coding” and its impact on open source ecosystems and maintainership. [2/2]
🟠 CVE-2026-24512 - High (8.8)
A security issue was discovered in ingress-nginx cthe `rules.http.paths.path` Ingress field can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24512/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##CVE-2026-24512 #devopsish #kubernetes #cve https://github.com/kubernetes/kubernetes/issues/136678
##updated 2026-02-03T23:16:06.290000
5 posts
(CVE-2026-1580); SandboxJS-related issues (CVE-2026-25142); broader security risks.
- Open-source sustainability and funding: CHAOSScon, OFE Summit, FOSDEM discussions; funding as a tool, maintainer burnout.
- The rise and critique of vibe coding: discussions titled How Vibe Coding Is Killing Open Source and concerns over its impact on maintainers and quality.
- Notebooks as governed data UX: shift from personal notebooks to team-governed data notebooks (LangChain/ADBC [2/3]
##🟠 CVE-2026-1580 - High (8.8)
A security issue was discovered in ingress-nginx where the `nginx.ingress.kubernetes.io/auth-method` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1580/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##CVE-2026-1580 #devopsish #kubernetes #cve https://github.com/kubernetes/kubernetes/issues/136677
##🟠 CVE-2026-1580 - High (8.8)
A security issue was discovered in ingress-nginx where the `nginx.ingress.kubernetes.io/auth-method` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1580/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##CVE-2026-1580 #devopsish #kubernetes #cve https://github.com/kubernetes/kubernetes/issues/136677
##updated 2026-02-03T21:31:59
2 posts
🟠 CVE-2026-25614 - High (7.5)
Blesta 3.x through 5.x before 5.13.3 allows object injection, aka CORE-5680.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25614/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25614 - High (7.5)
Blesta 3.x through 5.x before 5.13.3 allows object injection, aka CORE-5680.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25614/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T21:31:59
2 posts
🟠 CVE-2026-24149 - High (7.8)
NVIDIA Megatron-LM for all platforms contains a vulnerability in a script, where malicious data created by an attacker may cause a code injection issue. A successful exploit of this vulnerability may lead to code execution, escalation of privilege...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24149/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24149 - High (7.8)
NVIDIA Megatron-LM for all platforms contains a vulnerability in a script, where malicious data created by an attacker may cause a code injection issue. A successful exploit of this vulnerability may lead to code execution, escalation of privilege...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24149/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T21:31:58
4 posts
🟠 CVE-2026-1803 - High (8.1)
A weakness has been identified in Ziroom ZHOME A0101 1.0.1.0. Impacted is an unknown function of the component Dropbear SSH Service. This manipulation causes use of default credentials. Remote exploitation of the attack is possible. The complexity...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1803/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-1803 - High (8.1)
A weakness has been identified in Ziroom ZHOME A0101 1.0.1.0. Impacted is an unknown function of the component Dropbear SSH Service. This manipulation causes use of default credentials. Remote exploitation of the attack is possible. The complexity...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1803/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-1803 - High (8.1)
A weakness has been identified in Ziroom ZHOME A0101 1.0.1.0. Impacted is an unknown function of the component Dropbear SSH Service. This manipulation causes use of default credentials. Remote exploitation of the attack is possible. The complexity...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1803/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-1803 - High (8.1)
A weakness has been identified in Ziroom ZHOME A0101 1.0.1.0. Impacted is an unknown function of the component Dropbear SSH Service. This manipulation causes use of default credentials. Remote exploitation of the attack is possible. The complexity...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1803/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T21:31:51
2 posts
🟠 CVE-2026-24954 - High (8.8)
Deserialization of Untrusted Data vulnerability in magepeopleteam WpEvently mage-eventpress allows Object Injection.This issue affects WpEvently: from n/a through <= 5.0.8.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24954/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24954 - High (8.8)
Deserialization of Untrusted Data vulnerability in magepeopleteam WpEvently mage-eventpress allows Object Injection.This issue affects WpEvently: from n/a through <= 5.0.8.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24954/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T21:23:50.483000
1 posts
🟠 CVE-2026-20421 - High (7.5)
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. Use...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20421/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T21:13:06.187000
11 posts
Critical SolarWinds WHD Vulnerability Added to CISA’s Exploited Vulnerabilities Catalog
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has sounded the alarm on a newly discovered critical flaw in SolarWinds Web Help Desk (WHD), underscoring the ever-present danger posed by rapidly exploited software vulnerabilities. The vulnerability, CVE-2025-40551, carries a high CVSS score of 9.8, signaling extreme severity, and could allow attackers to execute…
##CISA orders federal agencies to patch exploited SolarWinds bug by Friday
CVE-2025-40551 carries a critical severity score of 9.8 out of 10 and impacts SolarWinds Web Help Desk (WHD) — an IT service management platform...
🔗️ [Therecord] https://link.is.it/Ir7OlU
##A single flaw in SolarWinds Web Help Desk is letting hackers break in without even needing a password and over 300,000 organizations are at risk right now. How safe is your IT backbone?
##‼️ CISA has added 4 vulnerabilities to the KEV Catalog
https://darkwebinformer.com/cisa-kev-catalog/
CVE-2025-40551: SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability
CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability
CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability
CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability
##CVE ID: CVE-2025-40551
Vendor: SolarWinds
Product: Web Help Desk
Date Added: 2026-02-03
Notes: https://www.solarwinds.com/trust-center/security-advisories/cve-2025-40551 ; https://nvd.nist.gov/vuln/detail/CVE-2025-40551
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-40551
CISA orders federal agencies to patch exploited SolarWinds bug by Friday
CVE-2025-40551 carries a critical severity score of 9.8 out of 10 and impacts SolarWinds Web Help Desk (WHD) — an IT service management platform...
🔗️ [Therecord] https://link.is.it/Ir7OlU
##‼️ CISA has added 4 vulnerabilities to the KEV Catalog
https://darkwebinformer.com/cisa-kev-catalog/
CVE-2025-40551: SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability
CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability
CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability
CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability
##CVE ID: CVE-2025-40551
Vendor: SolarWinds
Product: Web Help Desk
Date Added: 2026-02-03
Notes: https://www.solarwinds.com/trust-center/security-advisories/cve-2025-40551 ; https://nvd.nist.gov/vuln/detail/CVE-2025-40551
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-40551
⚠️ Critical Solarwinds Web Vulnerability Allows Remote Code Execution and Security Bypass
「 Multiple critical vulnerabilities in SolarWinds Web Help Desk (WHD), culminating in unauthenticated remote code execution (RCE) via Java deserialization in CVE-2025-40551, were uncovered by https://Horizon3.ai researchers.
These flaws chain static credentials, security bypasses, and deserialization weaknesses, affecting versions prior to 2026.1 」
‼️ SolarWinds Web Help Desk RCE Hit by Multiple Critical Security Flaws; CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, CVE-2025-40554
CVSS: All 9.8
CVEs Published: January 28th, 2026
CVE-2025-40551: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.
CVE-2025-40552: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.
CVE-2025-40553: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.
CVE-2025-40554: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.
Advisories:
https://nvd.nist.gov/vuln/detail/CVE-2025-40551
https://nvd.nist.gov/vuln/detail/CVE-2025-40552
https://nvd.nist.gov/vuln/detail/CVE-2025-40553
https://nvd.nist.gov/vuln/detail/CVE-2025-40554
📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.
Sources:
- https://www.bleepingcomputer.com/news/security/winrar-path-traversal-flaw-still-exploited-by-numerous-hackers/
- https://cloud.google.com/blog/topics/threat-intelligence/exploiting-critical-winrar-vulnerability
- https://nvd.nist.gov/vuln/detail/CVE-2025-8088
- https://www.helpnetsecurity.com/2026/01/28/winrar-vulnerability-exploited-cve-2025-8088/
---
🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀
CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.
Sources:
- https://nvd.nist.gov/vuln/detail/CVE-2025-15467
https://www.infosecurity-magazine.com/news/12-openssl-flaws/
- https://openssl-library.org/news/vulnerabilities/
- https://twitter.com/IntCyberDigest/status/2016288593547833778
---
🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡
SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.
Sources:
- https://www.bleepingcomputer.com/news/security/solarwinds-warns-of-critical-web-help-desk-rce-auth-bypass-flaws/
- https://www.helpnetsecurity.com/2026/01/29/solarwinds-web-help-desk-rce-vulnerabilities/
- https://www.rapid7.com/blog/post/etr-multiple-critical-solarwinds-web-help-desk-vulnerabilities-cve-2025-40551-40552-40553-40554/
- https://nvd.nist.gov/vuln/detail/CVE-2025-40552
- https://nvd.nist.gov/vuln/detail/CVE-2025-40553
- https://nvd.nist.gov/vuln/detail/CVE-2025-40554
- https://nvd.nist.gov/vuln/detail/CVE-2025-40551
updated 2026-02-03T21:10:44.253000
2 posts
‼️ SolarWinds Web Help Desk RCE Hit by Multiple Critical Security Flaws; CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, CVE-2025-40554
CVSS: All 9.8
CVEs Published: January 28th, 2026
CVE-2025-40551: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.
CVE-2025-40552: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.
CVE-2025-40553: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.
CVE-2025-40554: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.
Advisories:
https://nvd.nist.gov/vuln/detail/CVE-2025-40551
https://nvd.nist.gov/vuln/detail/CVE-2025-40552
https://nvd.nist.gov/vuln/detail/CVE-2025-40553
https://nvd.nist.gov/vuln/detail/CVE-2025-40554
📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.
Sources:
- https://www.bleepingcomputer.com/news/security/winrar-path-traversal-flaw-still-exploited-by-numerous-hackers/
- https://cloud.google.com/blog/topics/threat-intelligence/exploiting-critical-winrar-vulnerability
- https://nvd.nist.gov/vuln/detail/CVE-2025-8088
- https://www.helpnetsecurity.com/2026/01/28/winrar-vulnerability-exploited-cve-2025-8088/
---
🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀
CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.
Sources:
- https://nvd.nist.gov/vuln/detail/CVE-2025-15467
https://www.infosecurity-magazine.com/news/12-openssl-flaws/
- https://openssl-library.org/news/vulnerabilities/
- https://twitter.com/IntCyberDigest/status/2016288593547833778
---
🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡
SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.
Sources:
- https://www.bleepingcomputer.com/news/security/solarwinds-warns-of-critical-web-help-desk-rce-auth-bypass-flaws/
- https://www.helpnetsecurity.com/2026/01/29/solarwinds-web-help-desk-rce-vulnerabilities/
- https://www.rapid7.com/blog/post/etr-multiple-critical-solarwinds-web-help-desk-vulnerabilities-cve-2025-40551-40552-40553-40554/
- https://nvd.nist.gov/vuln/detail/CVE-2025-40552
- https://nvd.nist.gov/vuln/detail/CVE-2025-40553
- https://nvd.nist.gov/vuln/detail/CVE-2025-40554
- https://nvd.nist.gov/vuln/detail/CVE-2025-40551
updated 2026-02-03T20:49:23
2 posts
🔴 CVE-2026-25150 - Critical (9.3)
Qwik is a performance focused javascript framework. Prior to version 1.19.0, a prototype pollution vulnerability exists in the formToObj() function within @builder.io/qwik-city middleware. The function processes form field names with dot notation ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25150/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25150 - Critical (9.3)
Qwik is a performance focused javascript framework. Prior to version 1.19.0, a prototype pollution vulnerability exists in the formToObj() function within @builder.io/qwik-city middleware. The function processes form field names with dot notation ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25150/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T20:15:55.837000
2 posts
1 repos
https://github.com/onurcangnc/CVE-2025-10878-AdminPandov1.0.1-SQLi
🔴 CVE-2025-10878 - Critical (10)
A SQL injection vulnerability exists in the login functionality of Fikir Odalari AdminPando 1.0.1 before 2026-01-26. The username and password parameters are vulnerable to SQL injection, allowing unauthenticated attackers to bypass authentication ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-10878/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-10878 - Critical (10)
A SQL injection vulnerability exists in the login functionality of Fikir Odalari AdminPando 1.0.1 before 2026-01-26. The username and password parameters are vulnerable to SQL injection, allowing unauthenticated attackers to bypass authentication ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-10878/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T19:31:19
2 posts
🟠 CVE-2026-1285 - High (7.5)
An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.
`django.utils.text.Truncator.chars()` and `Truncator.words()` methods (with `html=True`) and the `truncatechars_html` and `truncatewords_html` template filters ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1285/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-1285 - High (7.5)
An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.
`django.utils.text.Truncator.chars()` and `Truncator.words()` methods (with `html=True`) and the `truncatechars_html` and `truncatewords_html` template filters ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1285/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T19:29:48
2 posts
🟠 CVE-2025-14550 - High (7.5)
An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.
`ASGIRequest` allows a remote attacker to cause a potential denial-of-service via a crafted request with multiple duplicate headers.
Earlier, unsupported Django...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-14550/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-14550 - High (7.5)
An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.
`ASGIRequest` allows a remote attacker to cause a potential denial-of-service via a crafted request with multiple duplicate headers.
Earlier, unsupported Django...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-14550/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T19:16:27
2 posts
🟠 CVE-2025-67848 - High (8.1)
A flaw was found in Moodle. This authentication bypass vulnerability allows suspended users to authenticate through the Learning Tools Interoperability (LTI) Provider. The issue arises from the LTI authentication handlers failing to enforce the us...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-67848/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-67848 - High (8.1)
A flaw was found in Moodle. This authentication bypass vulnerability allows suspended users to authenticate through the Learning Tools Interoperability (LTI) Provider. The issue arises from the LTI authentication handlers failing to enforce the us...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-67848/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T18:30:54
2 posts
🔴 CVE-2025-70841 - Critical (10)
Dokans Multi-Tenancy Based eCommerce Platform SaaS 3.9.2 allows unauthenticated remote attackers to obtain sensitive application configuration data via direct request to /script/.env file. The exposed file contains Laravel application encryption k...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70841/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-70841 - Critical (10)
Dokans Multi-Tenancy Based eCommerce Platform SaaS 3.9.2 allows unauthenticated remote attackers to obtain sensitive application configuration data via direct request to /script/.env file. The exposed file contains Laravel application encryption k...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70841/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T18:30:53
2 posts
🟠 CVE-2025-65875 - High (8.8)
An arbitrary file upload vulnerability in the AddFont() function of FPDF v1.86 and earlier allows attackers to execute arbitrary code via uploading a crafted PHP file.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65875/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-65875 - High (8.8)
An arbitrary file upload vulnerability in the AddFont() function of FPDF v1.86 and earlier allows attackers to execute arbitrary code via uploading a crafted PHP file.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65875/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T18:30:29
7 posts
‼️ CISA has added 4 vulnerabilities to the KEV Catalog
https://darkwebinformer.com/cisa-kev-catalog/
CVE-2025-40551: SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability
CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability
CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability
CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability
##🚨 [CISA-2026:0203] CISA Adds 3 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0203)
CISA has added 3 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2019-19006 (https://secdb.nttzen.cloud/cve/detail/CVE-2019-19006)
- Name: Sangoma FreePBX Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Sangoma
- Product: FreePBX
- Notes: https://wiki.freepbx.org/display/FOP/2019-11-20%2BRemote%2BAdmin%2BAuthentication%2BBypass ; https://nvd.nist.gov/vuln/detail/CVE-2019-19006
⚠️ CVE-2021-39935 (https://secdb.nttzen.cloud/cve/detail/CVE-2021-39935)
- Name: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: GitLab
- Product: Community and Enterprise Editions
- Notes: https://about.gitlab.com/releases/2021/12/06/security-release-gitlab-14-5-2-released/ ; https://nvd.nist.gov/vuln/detail/CVE-2021-39935
⚠️ CVE-2025-64328 (https://secdb.nttzen.cloud/cve/detail/CVE-2025-64328)
- Name: Sangoma FreePBX OS Command Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Sangoma
- Product: FreePBX
- Notes: https://github.com/FreePBX/security-reporting/security/advisories/GHSA-vm9p-46mv-5xvw ; https://nvd.nist.gov/vuln/detail/CVE-2025-64328
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260203 #cisa20260203 #cve_2019_19006 #cve_2021_39935 #cve_2025_64328 #cve201919006 #cve202139935 #cve202564328
##CISA has updated the KEV catalogue.
- CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability https://www.cve.org/CVERecord?id=CVE-2019-19006
- CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-64328
- CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability https://www.cve.org/CVERecord?id=CVE-2021-39935 #CISA #infosec #GitLab #vulnerability
##CVE ID: CVE-2021-39935
Vendor: GitLab
Product: Community and Enterprise Editions
Date Added: 2026-02-03
Notes: https://about.gitlab.com/releases/2021/12/06/security-release-gitlab-14-5-2-released/ ; https://nvd.nist.gov/vuln/detail/CVE-2021-39935
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2021-39935
‼️ CISA has added 4 vulnerabilities to the KEV Catalog
https://darkwebinformer.com/cisa-kev-catalog/
CVE-2025-40551: SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability
CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability
CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability
CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability
##CISA has updated the KEV catalogue.
- CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability https://www.cve.org/CVERecord?id=CVE-2019-19006
- CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-64328
- CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability https://www.cve.org/CVERecord?id=CVE-2021-39935 #CISA #infosec #GitLab #vulnerability
##CVE ID: CVE-2021-39935
Vendor: GitLab
Product: Community and Enterprise Editions
Date Added: 2026-02-03
Notes: https://about.gitlab.com/releases/2021/12/06/security-release-gitlab-14-5-2-released/ ; https://nvd.nist.gov/vuln/detail/CVE-2021-39935
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2021-39935
updated 2026-02-03T18:30:27
7 posts
‼️ CISA has added 4 vulnerabilities to the KEV Catalog
https://darkwebinformer.com/cisa-kev-catalog/
CVE-2025-40551: SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability
CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability
CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability
CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability
##🚨 [CISA-2026:0203] CISA Adds 3 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0203)
CISA has added 3 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2019-19006 (https://secdb.nttzen.cloud/cve/detail/CVE-2019-19006)
- Name: Sangoma FreePBX Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Sangoma
- Product: FreePBX
- Notes: https://wiki.freepbx.org/display/FOP/2019-11-20%2BRemote%2BAdmin%2BAuthentication%2BBypass ; https://nvd.nist.gov/vuln/detail/CVE-2019-19006
⚠️ CVE-2021-39935 (https://secdb.nttzen.cloud/cve/detail/CVE-2021-39935)
- Name: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: GitLab
- Product: Community and Enterprise Editions
- Notes: https://about.gitlab.com/releases/2021/12/06/security-release-gitlab-14-5-2-released/ ; https://nvd.nist.gov/vuln/detail/CVE-2021-39935
⚠️ CVE-2025-64328 (https://secdb.nttzen.cloud/cve/detail/CVE-2025-64328)
- Name: Sangoma FreePBX OS Command Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Sangoma
- Product: FreePBX
- Notes: https://github.com/FreePBX/security-reporting/security/advisories/GHSA-vm9p-46mv-5xvw ; https://nvd.nist.gov/vuln/detail/CVE-2025-64328
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260203 #cisa20260203 #cve_2019_19006 #cve_2021_39935 #cve_2025_64328 #cve201919006 #cve202139935 #cve202564328
##CISA has updated the KEV catalogue.
- CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability https://www.cve.org/CVERecord?id=CVE-2019-19006
- CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-64328
- CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability https://www.cve.org/CVERecord?id=CVE-2021-39935 #CISA #infosec #GitLab #vulnerability
##CVE ID: CVE-2019-19006
Vendor: Sangoma
Product: FreePBX
Date Added: 2026-02-03
Notes: https://wiki.freepbx.org/display/FOP/2019-11-20%2BRemote%2BAdmin%2BAuthentication%2BBypass ; https://nvd.nist.gov/vuln/detail/CVE-2019-19006
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2019-19006
‼️ CISA has added 4 vulnerabilities to the KEV Catalog
https://darkwebinformer.com/cisa-kev-catalog/
CVE-2025-40551: SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability
CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability
CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability
CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability
##CISA has updated the KEV catalogue.
- CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability https://www.cve.org/CVERecord?id=CVE-2019-19006
- CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-64328
- CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability https://www.cve.org/CVERecord?id=CVE-2021-39935 #CISA #infosec #GitLab #vulnerability
##CVE ID: CVE-2019-19006
Vendor: Sangoma
Product: FreePBX
Date Added: 2026-02-03
Notes: https://wiki.freepbx.org/display/FOP/2019-11-20%2BRemote%2BAdmin%2BAuthentication%2BBypass ; https://nvd.nist.gov/vuln/detail/CVE-2019-19006
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2019-19006
updated 2026-02-03T18:16:24.373000
4 posts
🟠 CVE-2026-24773 - High (7.5)
The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, an Insecure Direct Object Reference (IDOR) vulnerability allows unauthenticated remote attackers to access personal files of ot...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24773/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24773 - High (7.5)
The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, an Insecure Direct Object Reference (IDOR) vulnerability allows unauthenticated remote attackers to access personal files of ot...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24773/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24773 - High (7.5)
The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, an Insecure Direct Object Reference (IDOR) vulnerability allows unauthenticated remote attackers to access personal files of ot...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24773/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24773 - High (7.5)
The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, an Insecure Direct Object Reference (IDOR) vulnerability allows unauthenticated remote attackers to access personal files of ot...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24773/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T17:56:57.603000
1 posts
🟠 CVE-2025-65889 - High (7.5)
A type validation flaw in the flow.dstack() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65889/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T17:15:59.893000
2 posts
🔴 CVE-2026-1568 - Critical (9.6)
Rapid7 InsightVM versions before 8.34.0 contain a signature verification issue on the Assertion Consumer Service (ACS) cloud endpoint that could allow an attacker to gain unauthorized access to InsightVM accounts setup
via "Security Console" ins...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1568/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-1568 - Critical (9.6)
Rapid7 InsightVM versions before 8.34.0 contain a signature verification issue on the Assertion Consumer Service (ACS) cloud endpoint that could allow an attacker to gain unauthorized access to InsightVM accounts setup
via "Security Console" ins...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1568/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T16:44:36.630000
6 posts
1 repos
Hunting OpenClaw Exposures: CVE-2026-25253 in Internet-Facing AI Agent Gateways
#CVE_2026_25253
https://hunt.io/blog/cve-2026-25253-openclaw-ai-agent-exposure
OpenClaw – CVE-2026-25253 : un lien malveillant suffit à exécuter du code à distance en 1-clic https://www.it-connect.fr/openclaw-cve-2026-25253-un-lien-malveillant-suffit-a-executer-du-code-a-distance-en-1-clic/ #ActuCybersécurité #Cybersécurité #IA
##OpenClaw – CVE-2026-25253 : un lien malveillant suffit à exécuter du code à distance en 1-clic https://www.it-connect.fr/openclaw-cve-2026-25253-un-lien-malveillant-suffit-a-executer-du-code-a-distance-en-1-clic/ #ActuCybersécurité #Cybersécurité #IA
##depthfirst | 1-Click RCE To Steal Your Moltbot Data and Keys (CVE-2026-25253)
https://depthfirst.com/post/1-click-rce-to-steal-your-moltbot-data-and-keys
##Here's a summary of the latest global, technology, and cybersecurity news from the last 24-48 hours:
**Global:** US-Iran talks on a nuclear deal are progressing, though Iran warned of regional war if attacked (Feb 1-2). A Russian drone strike killed 15 mineworkers in Dnipro, Ukraine (Feb 1).
**Tech/Cybersecurity:** ETSI launched a new, globally applicable cybersecurity standard for AI models (ETSI EN 304 223, Feb 2). A critical remote code execution (RCE) flaw in the OpenClaw AI assistant (CVE-2026-25253) was disclosed (Feb 2). AI-driven cyber threats are escalating, and Microsoft's extensive AI infrastructure spending is raising Wall Street concerns (Jan 30 - Feb 2).
##🟠 CVE-2026-25253 - High (8.8)
OpenClaw (aka clawdbot or Moltbot) before 2026.1.29 obtains a gatewayUrl value from a query string and automatically makes a WebSocket connection without prompting, sending a token value.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25253/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T16:44:36.630000
2 posts
🟠 CVE-2026-20402 - High (7.5)
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. Use...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20402/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-20402 - High (7.5)
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. Use...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20402/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T16:44:36.630000
1 posts
🟠 CVE-2026-20412 - High (7.8)
In cameraisp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20412/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T16:44:36.630000
1 posts
🔴 CVE-2025-15030 - Critical (9.8)
The User Profile Builder WordPress plugin before 3.15.2 does not have a proper password reset process, allowing a few unauthenticated requests to reset the password of any user by knowing their username, such as administrator ones, and therefore ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15030/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T16:44:36.630000
1 posts
🟠 CVE-2025-47399 - High (7.8)
Memory Corruption while processing IOCTL call to update sensor property settings with invalid input parameters.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-47399/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T16:44:36.630000
1 posts
🟠 CVE-2026-20408 - High (8)
In wlan, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20408/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T16:44:36.630000
1 posts
🟠 CVE-2025-8587 - High (8.6)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in AKCE Software Technology R&D Industry and Trade Inc. SKSPro allows SQL Injection.This issue affects SKSPro: through 07012026.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-8587/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T16:44:36.630000
1 posts
🔴 CVE-2026-25200 - Critical (9.8)
A vulnerability in MagicInfo9 Server allows authorized users to upload HTML files without authentication, leading to Stored XSS, which can result in account takeover
This issue affects MagicINFO 9 Server: less than 21.1090.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25200/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T16:44:03.343000
3 posts
(CVE-2026-1580); SandboxJS-related issues (CVE-2026-25142); broader security risks.
- Open-source sustainability and funding: CHAOSScon, OFE Summit, FOSDEM discussions; funding as a tool, maintainer burnout.
- The rise and critique of vibe coding: discussions titled How Vibe Coding Is Killing Open Source and concerns over its impact on maintainers and quality.
- Notebooks as governed data UX: shift from personal notebooks to team-governed data notebooks (LangChain/ADBC [2/3]
##Blip blop, I'm a #mastobot.
Here is a summary (in beta) of the latest posts in #programmingAtKukei https://masto.kukei.eu/browse/programming category:
- Claude Code at Microsoft and the rise of AI coding assistants; OpenAI Codex app for macOS.
- OpenClaw/Moltbot vulnerabilities and security concerns around AI agents.
- Ingress-Nginx deprecation and multiple Kubernetes security exploits.
- CVE-2026-25142: SandboxJS JavaScript sandboxing library high-severity flaw.
- CVE-2026-1730: [1/2]
🔴 CVE-2026-25142 - Critical (10)
SandboxJS is a JavaScript sandboxing library. Prior to 0.8.27, SanboxJS does not properly restrict __lookupGetter__ which can be used to obtain prototypes, which can be used for escaping the sandbox / remote code execution. This vulnerability is f...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25142/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T16:44:03.343000
2 posts
🟠 CVE-2025-6397 - High (8.6)
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Ankara Hosting Website Design Website Software allows Reflected XSS.This issue affects Website Software: through 03022026.
NOTE: The ve...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-6397/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-6397 - High (8.6)
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Ankara Hosting Website Design Website Software allows Reflected XSS.This issue affects Website Software: through 03022026.
NOTE: The ve...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-6397/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T16:44:03.343000
2 posts
🟠 CVE-2025-67853 - High (7.5)
A flaw was found in Moodle. A remote attacker could exploit a lack of proper rate limiting in the confirmation email service. This vulnerability allows attackers to more easily enumerate or guess user credentials, facilitating brute-force attacks ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-67853/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-67853 - High (7.5)
A flaw was found in Moodle. A remote attacker could exploit a lack of proper rate limiting in the confirmation email service. This vulnerability allows attackers to more easily enumerate or guess user credentials, facilitating brute-force attacks ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-67853/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T16:44:03.343000
2 posts
🟠 CVE-2025-8456 - High (7.6)
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Kod8 Software Technologies Trade Ltd. Co. Kod8 Individual and SME Website allows Reflected XSS.This issue affects Kod8 Individual and SME ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-8456/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-8456 - High (7.6)
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Kod8 Software Technologies Trade Ltd. Co. Kod8 Individual and SME Website allows Reflected XSS.This issue affects Kod8 Individual and SME ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-8456/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T16:44:03.343000
2 posts
🟠 CVE-2025-8590 - High (7.5)
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in AKCE Software Technology R&D Industry and Trade Inc. SKSPro allows Directory Indexing.This issue affects SKSPro: through 07012026.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-8590/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-8590 - High (7.5)
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in AKCE Software Technology R&D Industry and Trade Inc. SKSPro allows Directory Indexing.This issue affects SKSPro: through 07012026.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-8590/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T16:44:03.343000
2 posts
🔴 CVE-2026-24465 - Critical (9.8)
Stack-based buffer overflow vulnerability exists in ELECOM wireless LAN access point devices. A crafted packet may lead to arbitrary code execution.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24465/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-24465 - Critical (9.8)
Stack-based buffer overflow vulnerability exists in ELECOM wireless LAN access point devices. A crafted packet may lead to arbitrary code execution.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24465/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T16:44:03.343000
1 posts
🔴 CVE-2026-22778 - Critical (9.8)
vLLM is an inference and serving engine for large language models (LLMs). From 0.8.3 to before 0.14.1, when an invalid image is sent to vLLM's multimodal endpoint, PIL throws an error. vLLM returns this error to the client, leaking a heap address....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22778/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T16:44:03.343000
1 posts
🔴 CVE-2026-23515 - Critical (9.9)
Signal K Server is a server application that runs on a central hub in a boat. Prior to 1.5.0, a command injection vulnerability allows authenticated users with write permissions to execute arbitrary shell commands on the Signal K server when the s...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23515/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T16:16:10.400000
7 posts
1 repos
https://github.com/mcorybillington/CVE-2025-64328_FreePBX-framework-Command-Injection
‼️ CISA has added 4 vulnerabilities to the KEV Catalog
https://darkwebinformer.com/cisa-kev-catalog/
CVE-2025-40551: SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability
CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability
CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability
CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability
##🚨 [CISA-2026:0203] CISA Adds 3 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0203)
CISA has added 3 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2019-19006 (https://secdb.nttzen.cloud/cve/detail/CVE-2019-19006)
- Name: Sangoma FreePBX Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Sangoma
- Product: FreePBX
- Notes: https://wiki.freepbx.org/display/FOP/2019-11-20%2BRemote%2BAdmin%2BAuthentication%2BBypass ; https://nvd.nist.gov/vuln/detail/CVE-2019-19006
⚠️ CVE-2021-39935 (https://secdb.nttzen.cloud/cve/detail/CVE-2021-39935)
- Name: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: GitLab
- Product: Community and Enterprise Editions
- Notes: https://about.gitlab.com/releases/2021/12/06/security-release-gitlab-14-5-2-released/ ; https://nvd.nist.gov/vuln/detail/CVE-2021-39935
⚠️ CVE-2025-64328 (https://secdb.nttzen.cloud/cve/detail/CVE-2025-64328)
- Name: Sangoma FreePBX OS Command Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Sangoma
- Product: FreePBX
- Notes: https://github.com/FreePBX/security-reporting/security/advisories/GHSA-vm9p-46mv-5xvw ; https://nvd.nist.gov/vuln/detail/CVE-2025-64328
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260203 #cisa20260203 #cve_2019_19006 #cve_2021_39935 #cve_2025_64328 #cve201919006 #cve202139935 #cve202564328
##CISA has updated the KEV catalogue.
- CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability https://www.cve.org/CVERecord?id=CVE-2019-19006
- CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-64328
- CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability https://www.cve.org/CVERecord?id=CVE-2021-39935 #CISA #infosec #GitLab #vulnerability
##CVE ID: CVE-2025-64328
Vendor: Sangoma
Product: FreePBX
Date Added: 2026-02-03
Notes: https://github.com/FreePBX/security-reporting/security/advisories/GHSA-vm9p-46mv-5xvw ; https://nvd.nist.gov/vuln/detail/CVE-2025-64328
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-64328
‼️ CISA has added 4 vulnerabilities to the KEV Catalog
https://darkwebinformer.com/cisa-kev-catalog/
CVE-2025-40551: SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability
CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability
CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability
CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability
##CISA has updated the KEV catalogue.
- CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability https://www.cve.org/CVERecord?id=CVE-2019-19006
- CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-64328
- CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability https://www.cve.org/CVERecord?id=CVE-2021-39935 #CISA #infosec #GitLab #vulnerability
##CVE ID: CVE-2025-64328
Vendor: Sangoma
Product: FreePBX
Date Added: 2026-02-03
Notes: https://github.com/FreePBX/security-reporting/security/advisories/GHSA-vm9p-46mv-5xvw ; https://nvd.nist.gov/vuln/detail/CVE-2025-64328
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-64328
updated 2026-02-03T16:13:27
1 posts
🟠 CVE-2026-25060 - High (8.1)
OpenList Frontend is a UI component for OpenList. Prior to 4.1.10, certificate verification is disabled by default for all storage driver communications. The TlsInsecureSkipVerify setting is default to true in the DefaultConfig() function in inter...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25060/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T16:13:22
1 posts
🟠 CVE-2026-25059 - High (8.8)
OpenList Frontend is a UI component for OpenList. Prior to 4.1.10, the application contains path traversal vulnerability in multiple file operation handlers in server/handles/fsmanage.go. Filename components in req.Names are directly concatenated ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25059/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T16:13:07
2 posts
🟠 CVE-2026-24763 - High (8.8)
OpenClaw (formerly Clawdbot) is a personal AI assistant you run on your own devices. Prior to 2026.1.29, a command injection vulnerability existed in OpenClaw’s Docker sandbox execution mechanism due to unsafe handling of the PATH environment v...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24763/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24763 - High (8.8)
OpenClaw (formerly Clawdbot) is a personal AI assistant you run on your own devices. Prior to 2026.1.29, a command injection vulnerability existed in OpenClaw’s Docker sandbox execution mechanism due to unsafe handling of the PATH environment v...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24763/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T16:13:02
2 posts
🟠 CVE-2026-24737 - High (8.1)
jsPDF is a library to generate PDFs in JavaScript. Prior to 4.1.0, user control of properties and methods of the Acroform module allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsanitized...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24737/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24737 - High (8.1)
jsPDF is a library to generate PDFs in JavaScript. Prior to 4.1.0, user control of properties and methods of the Acroform module allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsanitized...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24737/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T16:12:22
1 posts
🟠 CVE-2026-23997 - High (8)
FacturaScripts is open-source enterprise resource planning and accounting software. In 2025.71 and earlier, a Stored Cross-Site Scripting (XSS) vulnerability was discovered in the Observations field. The flaw occurs in the History view, where hist...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23997/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T16:06:35.320000
3 posts
🟠 CVE-2025-71007 - High (7.5)
An input validation vulnerability in the oneflow.index_add component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-71007/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-71007 - High (7.5)
An input validation vulnerability in the oneflow.index_add component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-71007/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-71007 - High (7.5)
An input validation vulnerability in the oneflow.index_add component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-71007/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T16:03:26
4 posts
🔴 CVE-2026-25510 - Critical (9.9)
CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.28.5.0, an authenticated user with file editor permissions can achieve Remote Code Exe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25510/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25510 - Critical (9.9)
CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.28.5.0, an authenticated user with file editor permissions can achieve Remote Code Exe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25510/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25510 - Critical (9.9)
CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.28.5.0, an authenticated user with file editor permissions can achieve Remote Code Exe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25510/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25510 - Critical (9.9)
CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.28.5.0, an authenticated user with file editor permissions can achieve Remote Code Exe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25510/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T15:30:38
2 posts
🟠 CVE-2026-25022 - High (8.5)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Iqonic Design KiviCare kivicare-clinic-management-system allows Blind SQL Injection.This issue affects KiviCare: from n/a through <= 3.6.16.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25022/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25022 - High (8.5)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Iqonic Design KiviCare kivicare-clinic-management-system allows Blind SQL Injection.This issue affects KiviCare: from n/a through <= 3.6.16.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25022/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T15:30:33
2 posts
1 repos
🔴 CVE-2025-5319 - Critical (9.8)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Emit Information and Communication Technologies Industry and Trade Ltd. Co. Efficiency Management System allows SQL Injection.This issue affects ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-5319/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-5319 - Critical (9.8)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Emit Information and Communication Technologies Industry and Trade Ltd. Co. Efficiency Management System allows SQL Injection.This issue affects ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-5319/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T15:30:33
2 posts
🟠 CVE-2025-7760 - High (7.6)
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Ofisimo Web-Based Software Technologies Association Web Package Flora allows XSS Through HTTP Headers.This issue affects Association Web P...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-7760/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-7760 - High (7.6)
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Ofisimo Web-Based Software Technologies Association Web Package Flora allows XSS Through HTTP Headers.This issue affects Association Web P...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-7760/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T09:30:34
2 posts
🟠 CVE-2025-8461 - High (7.6)
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Seres Software syWEB allows Reflected XSS.This issue affects syWEB: through 03022026.
NOTE: The vendor was contacted early about this d...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-8461/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-8461 - High (7.6)
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Seres Software syWEB allows Reflected XSS.This issue affects syWEB: through 03022026.
NOTE: The vendor was contacted early about this d...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-8461/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T09:30:34
2 posts
🟠 CVE-2026-1375 - High (8.1)
The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to Insecure Direct Object References (IDOR) in all versions up to, and including, 3.9.5. This is due to missing object-level authorization checks in the `cou...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1375/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-1375 - High (8.1)
The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to Insecure Direct Object References (IDOR) in all versions up to, and including, 3.9.5. This is due to missing object-level authorization checks in the `cou...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1375/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T09:30:28
3 posts
Blip blop, I'm a #mastobot.
Here is a summary (in beta) of the latest posts in #programmingAtKukei https://masto.kukei.eu/browse/programming category:
- Claude Code at Microsoft and the rise of AI coding assistants; OpenAI Codex app for macOS.
- OpenClaw/Moltbot vulnerabilities and security concerns around AI agents.
- Ingress-Nginx deprecation and multiple Kubernetes security exploits.
- CVE-2026-25142: SandboxJS JavaScript sandboxing library high-severity flaw.
- CVE-2026-1730: [1/2]
🟠 CVE-2026-1730 - High (8.8)
The OS DataHub Maps plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the 'OS_DataHub_Maps_Admin::add_file_and_ext' function in all versions up to, and including, 1.8.3. This makes it possible fo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1730/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-1730 - High (8.8)
The OS DataHub Maps plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the 'OS_DataHub_Maps_Admin::add_file_and_ext' function in all versions up to, and including, 1.8.3. This makes it possible fo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1730/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T09:30:28
2 posts
🟠 CVE-2025-8589 - High (7.6)
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in AKCE Software Technology R&D Industry and Trade Inc. SKSPro allows Reflected XSS.This issue affects SKSPro: through 07012026.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-8589/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-8589 - High (7.6)
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in AKCE Software Technology R&D Industry and Trade Inc. SKSPro allows Reflected XSS.This issue affects SKSPro: through 07012026.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-8589/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T06:31:10
2 posts
🟠 CVE-2026-24694 - High (7.8)
The installer for Roland Cloud Manager ver.3.1.19 and prior insecurely loads Dynamic Link Libraries (DLLs), which could allow an attacker to execute arbitrary code with the privileges of the application.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24694/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24694 - High (7.8)
The installer for Roland Cloud Manager ver.3.1.19 and prior insecurely loads Dynamic Link Libraries (DLLs), which could allow an attacker to execute arbitrary code with the privileges of the application.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24694/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T00:31:23
3 posts
🟠 CVE-2026-20404 - High (7.5)
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. Use...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20404/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-20404 - High (7.5)
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. Use...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20404/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-20404 - High (7.5)
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. Use...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20404/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T00:31:23
2 posts
🟠 CVE-2026-20407 - High (8.8)
In wlan STA driver, there is a possible escalation of privilege due to a missing bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20407/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-20407 - High (8.8)
In wlan STA driver, there is a possible escalation of privilege due to a missing bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20407/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T00:31:23
1 posts
🟠 CVE-2026-20406 - High (7.5)
In Modem, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User in...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20406/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T00:31:23
1 posts
🟠 CVE-2026-20420 - High (7.5)
In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20420/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T00:31:22
2 posts
🟠 CVE-2025-63649 - High (7.5)
An out-of-bounds read in the http_parser_transfer_encoding_chunked function (mk_server/mk_http_parser.c) of monkey commit f37e984 allows attackers to cause a Denial of Service (DoS) via sending a crafted POST request to the server.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-63649/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-63649 - High (7.5)
An out-of-bounds read in the http_parser_transfer_encoding_chunked function (mk_server/mk_http_parser.c) of monkey commit f37e984 allows attackers to cause a Denial of Service (DoS) via sending a crafted POST request to the server.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-63649/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T00:31:22
2 posts
🟠 CVE-2026-20403 - High (7.5)
In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20403/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-20403 - High (7.5)
In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20403/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T00:31:22
2 posts
🟠 CVE-2026-20409 - High (7.8)
In imgsys, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Pat...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20409/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-20409 - High (7.8)
In imgsys, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Pat...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20409/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T00:31:22
1 posts
🟠 CVE-2026-20405 - High (7.5)
In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20405/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-03T00:30:18
1 posts
🟠 CVE-2026-20422 - High (7.5)
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. Use...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20422/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-02T22:23:32
4 posts
🟠 CVE-2026-25223 - High (7.5)
Fastify is a fast and low overhead web framework, for Node.js. Prior to version 5.7.2, a validation bypass vulnerability exists in Fastify where request body validation schemas specified by Content-Type can be completely circumvented. By appending...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25223/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25223 - High (7.5)
Fastify is a fast and low overhead web framework, for Node.js. Prior to version 5.7.2, a validation bypass vulnerability exists in Fastify where request body validation schemas specified by Content-Type can be completely circumvented. By appending...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25223/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25223 - High (7.5)
Fastify is a fast and low overhead web framework, for Node.js. Prior to version 5.7.2, a validation bypass vulnerability exists in Fastify where request body validation schemas specified by Content-Type can be completely circumvented. By appending...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25223/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25223 - High (7.5)
Fastify is a fast and low overhead web framework, for Node.js. Prior to version 5.7.2, a validation bypass vulnerability exists in Fastify where request body validation schemas specified by Content-Type can be completely circumvented. By appending...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25223/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-02T22:07:42
1 posts
🟠 CVE-2026-0599 - High (7.5)
A vulnerability in huggingface/text-generation-inference version 3.3.6 allows unauthenticated remote attackers to exploit unbounded external image fetching during input validation in VLM mode. The issue arises when the router scans inputs for Mark...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0599/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-02T21:56:53
1 posts
🟠 CVE-2026-1117 - High (8.2)
A vulnerability in the `lollms_generation_events.py` component of parisneo/lollms version 5.9.0 allows unauthenticated access to sensitive Socket.IO events. The `add_events` function registers event handlers such as `generate_text`, `cancel_genera...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1117/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-02T21:31:27
1 posts
🟠 CVE-2026-20411 - High (7.8)
In cameraisp, there is a possible escalation of privilege due to use after free. This could lead to local denial of service if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20411/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-02T21:15:40
1 posts
🟠 CVE-2026-1531 - High (8.1)
A flaw was found in foreman_kubevirt. When configuring the connection to OpenShift, the system disables SSL verification if a Certificate Authority (CA) certificate is not explicitly set. This insecure default allows a remote attacker, capable of ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1531/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-02T21:02:04
1 posts
🟠 CVE-2026-1530 - High (8.1)
A flaw was found in fog-kubevirt. This vulnerability allows a remote attacker to perform a Man-in-the-Middle (MITM) attack due to disabled certificate validation. This enables the attacker to intercept and potentially alter sensitive communication...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1530/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-02T20:53:03
1 posts
🟠 CVE-2026-24788 - High (8.8)
RaspAP raspap-webgui versions prior to 3.3.6 contain an OS command injection vulnerability. If exploited, an arbitrary OS command may be executed by a user who can log in to the product.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24788/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-02T20:19:59
1 posts
🟠 CVE-2026-25153 - High (7.7)
Backstage is an open framework for building developer portals, and @backstage/plugin-techdocs-node provides common node.js functionalities for TechDocs. In versions of @backstage/plugin-techdocs-node prior to 1.13.11 and 1.14.1, when TechDocs is c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25153/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-02T18:32:35
2 posts
🔴 CVE-2026-24071 - Critical (9.3)
It was found that the XPC service offered by the privileged helper of Native Access uses the PID of the connecting client to verify its code signature. This is considered insecure and can be exploited by PID reuse attacks. The connection handler...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24071/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-24071 - Critical (9.3)
It was found that the XPC service offered by the privileged helper of Native Access uses the PID of the connecting client to verify its code signature. This is considered insecure and can be exploited by PID reuse attacks. The connection handler...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24071/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-02T18:32:35
1 posts
🟠 CVE-2026-24070 - High (8.8)
During the installation of the Native Access application, a privileged helper `com.native-instruments.NativeAccess.Helper2`, which is used by Native Access to trigger functions via XPC communication like copy-file, remove or set-permissions, is de...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24070/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-02T18:32:35
2 posts
🟠 CVE-2025-9974 - High (8.8)
The unified WEBUI application of the ONT/Beacon device contains an input handling flaw that allows authenticated users to trigger unintended system-level command execution. Due to insufficient validation of user-supplied data, a low-privileged aut...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-9974/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-9974 - High (8.8)
The unified WEBUI application of the ONT/Beacon device contains an input handling flaw that allows authenticated users to trigger unintended system-level command execution. Due to insufficient validation of user-supplied data, a low-privileged aut...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-9974/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-02T18:31:39
1 posts
🟠 CVE-2025-47359 - High (7.8)
Memory Corruption when multiple threads simultaneously access a memory free API.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-47359/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-02T18:31:39
1 posts
🟠 CVE-2025-47358 - High (7.8)
Memory Corruption when user space address is modified and passed to mem_free API, causing kernel memory to be freed inadvertently.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-47358/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-02T18:31:39
1 posts
🟠 CVE-2025-47398 - High (7.8)
Memory Corruption while deallocating graphics processing unit memory buffers due to improper handling of memory pointers.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-47398/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-02T18:31:39
1 posts
🟠 CVE-2025-47397 - High (7.8)
Memory Corruption when initiating GPU memory mapping using scatter-gather lists due to unchecked IOMMU mapping errors.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-47397/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-02T18:31:38
1 posts
🟠 CVE-2025-14914 - High (7.6)
IBM WebSphere Application Server Liberty 17.0.0.3 through 26.0.0.1 could allow a privileged user to upload a zip archive containing path traversal sequences resulting in an overwrite of files leading to arbitrary code execution.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-14914/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-02T18:16:11.883000
1 posts
🟠 CVE-2025-13986 - High (7.5)
Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal Disable Login Page allows Functionality Bypass.This issue affects Disable Login Page: from 0.0.0 before 1.1.3.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-13986/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-02T15:30:44
1 posts
🟠 CVE-2026-1761 - High (8.6)
A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart H...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1761/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-02T15:30:34
2 posts
🟠 CVE-2026-20418 - High (8.8)
In Thread, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR004...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20418/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-20418 - High (8.8)
In Thread, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR004...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20418/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-02T15:30:34
1 posts
🟠 CVE-2026-20419 - High (7.5)
In wlan AP/STA firmware, there is a possible system becoming irresponsive due to an uncaught exception. This could lead to remote (proximal/adjacent) denial of service with no additional execution privileges needed. User interaction is not needed ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20419/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-02T06:30:53
1 posts
🟠 CVE-2026-25201 - High (8.8)
An unauthenticated user can upload arbitrary files to execute remote code, leading to privilege escalation in MagicInfo9 Server.
This issue affects MagicINFO 9 Server: less than 21.1090.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25201/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-02T06:30:53
1 posts
🔴 CVE-2026-25202 - Critical (9.8)
The database account and password are hardcoded, allowing login with the account to manipulate the database in MagicInfo9 Server.This issue affects MagicINFO 9 Server: less than 21.1090.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25202/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-01T18:09:11
1 posts
🟠 CVE-2025-69662 - High (8.6)
SQL injection vulnerability in geopandas before v.1.1.2 allows an attacker to obtain sensitive information via the to_postgis()` function being used to write GeoDataFrames to a PostgreSQL database.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-69662/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-31T03:53:47
1 posts
1 repos
https://github.com/mbanyamer/CVE-2026-25130-Cybersecurity-AI-CAI-Framework-0.5.10
🔴 CVE-2026-25130 - Critical (9.6)
Cybersecurity AI (CAI) is a framework for AI Security. In versions up to and including 0.5.10, the CAI (Cybersecurity AI) framework contains multiple argument injection vulnerabilities in its function tools. User-controlled input is passed directl...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25130/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-30T21:30:28
1 posts
🔴 CVE-2025-51958 - Critical (9.8)
aelsantex runcommand 2014-04-01, a plugin for DokuWiki, allows unauthenticated attackers to execute arbitrary system commands via lib/plugins/runcommand/postaction.php.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-51958/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-30T20:10:15
1 posts
🟠 CVE-2026-25128 - High (7.5)
fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. In versions 4.3.6 through 5.3.3, a RangeError vulnerability exists in the numeric entity processing of...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25128/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-30T19:16:10.860000
1 posts
🟠 CVE-2025-62348 - High (7.8)
Salt's junos execution module contained an unsafe YAML decode/load usage. A specially crafted YAML payload processed by the junos module could lead to unintended code execution under the context of the Salt process.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-62348/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-30T18:31:21
2 posts
1 repos
🟠 CVE-2025-4686 - High (8.6)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Kodmatic Computer Software Tourism Construction Industry and Trade Ltd. Co. Online Exam and Assessment allows SQL Injection.This issue affects On...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-4686/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-4686 - High (8.6)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Kodmatic Computer Software Tourism Construction Industry and Trade Ltd. Co. Online Exam and Assessment allows SQL Injection.This issue affects On...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-4686/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-30T16:16:12.633000
2 posts
🟠 CVE-2026-1686 - High (8.8)
A security flaw has been discovered in Totolink A3600R 5.9c.4959. This issue affects the function setAppEasyWizardConfig in the library /lib/cste_modules/app.so. Performing a manipulation of the argument apcliSsid results in buffer overflow. It is...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1686/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-1686 - High (8.8)
A security flaw has been discovered in Totolink A3600R 5.9c.4959. This issue affects the function setAppEasyWizardConfig in the library /lib/cste_modules/app.so. Performing a manipulation of the argument apcliSsid results in buffer overflow. It is...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1686/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-30T12:31:26
1 posts
Hikvision Wireless Access Points Vulnerability Exposes Networks to Remote Command Execution
Hikvision has recently revealed a critical security flaw affecting several models of its wireless access points, putting organizations at risk of remote command execution attacks. The vulnerability, officially tracked as CVE-2026-0709, allows authenticated attackers to send malicious commands to compromised devices, potentially gaining full control over the network…
##updated 2026-01-30T12:31:26
1 posts
🔴 CVE-2026-1699 - Critical (10)
In the Eclipse Theia Website repository, the GitHub Actions workflow .github/workflows/preview.yml used pull_request_target trigger while checking out and executing untrusted pull request code. This allowed any GitHub user to execute arbitrary cod...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1699/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-30T09:31:00
1 posts
🟠 CVE-2025-1395 - High (8.2)
Generation of Error Message Containing Sensitive Information vulnerability in Codriapp Innovation and Software Technologies Inc. HeyGarson allows Fuzzing for application mapping.This issue affects HeyGarson: through 30012026.
NOTE: The vendor was...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-1395/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-30T09:31:00
1 posts
🟠 CVE-2026-21418 - High (7.8)
Dell Unity, version(s) 5.5.2 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerabilit...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21418/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-30T09:30:54
1 posts
🟠 CVE-2026-0805 - High (8.2)
An input neutralization vulnerability in the Backup Configuration component of Crafty Controller allows a remote, authenticated attacker to perform file tampering and remote code execution via path traversal.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0805/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-30T09:30:54
1 posts
🔴 CVE-2026-0963 - Critical (9.9)
An input neutralization vulnerability in the File Operations API Endpoint component of Crafty Controller allows a remote, authenticated attacker to perform file tampering and remote code execution via path traversal.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0963/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-30T09:15:51.090000
1 posts
🟠 CVE-2026-22277 - High (7.8)
Dell UnityVSA, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerabili...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22277/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-30T05:16:33.093000
1 posts
🟠 CVE-2026-24714 - High (7.5)
Some end of service NETGEAR products provide "TelnetEnable" functionality, which allows a magic packet to activate telnet service on the box.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24714/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-30T00:32:24
1 posts
🟠 CVE-2025-69516 - High (8.8)
A Server-Side Template Injection (SSTI) vulnerability in the /reporting/templates/preview/ endpoint of Amidaware Tactical RMM, affecting versions equal to or earlier than v1.3.1, allows low-privileged users with Report Viewer or Report Manager per...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-69516/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-30T00:31:29
12 posts
Critical cybersecurity updates from February 1-2, 2026: Microsoft patched an actively exploited Office zero-day (CVE-2026-21509), and Fortinet fixed a critical FortiCloud SSO flaw (CVE-2026-24858). Ivanti released fixes for two exploited EPMM zero-days (CVE-2026-1281, CVE-2026-1340) by February 1, and Bitdefender reported Android RAT malware distributed via Hugging Face (February 2).
In technology, Apple overhauled its online Mac store for a "build-it-yourself" experience (February 1), and Google extended the Fitbit data migration deadline to Google accounts until May 2026.
##‼️ CVE-2026-1281: Safe indicator check for Ivanti EPMM & CVE-2026-1340 related paths
GitHub: https://github.com/Ashwesker/Ashwesker-CVE-2026-1281
##Latest News (Jan 29-30, 2026):
Tech: Apple plans "Apple Intelligence" with Google Gemini integration, coinciding with Google's Chrome "auto browse" launch. China approved Nvidia H200 chip sales to its tech giants.
Cybersecurity: The FBI launched "Operation Winter SHIELD" to protect critical infrastructure. A major ShinyHunters phishing campaign targets Okta SSO accounts, and Ivanti EPMM (CVE-2026-1281) is a newly exploited vulnerability.
##‼️ CVE-2026-1281 & CVE-2026-1340: A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.
Zero-Day: Yes
CVSS: Both 9.8
CVE Published: January 29th, 2026
KEV Catalog: January 29th, 2026
Affected Vendor: Ivanti
Vulnerability Type: Remote Code Execution (RCE)
New. No escape for Ivanti (which issued patches yesterday.)
WatchTower: Someone Knows Bash Far Too Well, And We Love It (Ivanti EPMM Pre-Auth RCEs CVE-2026-1281 & CVE-2026-1340) https://labs.watchtowr.com/someone-knows-bash-far-too-well-and-we-love-it-ivanti-epmm-pre-auth-rces-cve-2026-1281-cve-2026-1340/ #Ivanti #vulnerability #infosec
##@cR0w Didn't you wish for Ivanti?
Ivanti, posted yesterday: Security Advisory Ivanti Endpoint Manager Mobile (EPMM) (CVE-2026-1281 & CVE-2026-1340) https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US
Analysis Guidance Ivanti Endpoint Manager Mobile (EPMM) CVE-2026-1281 & CVE-2026-1340 https://forums.ivanti.com/s/article/Analysis-Guidance-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US
Security Week: Ivanti Patches Exploited EPMM Zero-Days https://www.securityweek.com/ivanti-patches-exploited-epmm-zero-days/ @SecurityWeek #Ivanti #infosec #vulnerability #zeroday
##Someone Knows Bash Far Too Well, And We Love It (Ivanti EPMM Pre-Auth RCEs CVE-2026-1281 & CVE-2026-1340) - watchTowr Labs https://labs.watchtowr.com/someone-knows-bash-far-too-well-and-we-love-it-ivanti-epmm-pre-auth-rces-cve-2026-1281-cve-2026-1340/
##Ivanti confirms active exploitation of EPMM zero-day RCE flaws (CVE-2026-1281, CVE-2026-1340).
Emergency patches released—apply immediately.
Ivanti Patches Critical Zero-Day RCE Flaws in EPMM
Ivanti released emergency patches for two critical zero-day vulnerabilities in Endpoint Manager Mobile (EPMM) (CVE-2026-1281 and CVE-2026-1340) that allow unauthenticated remote code execution. Attackers are actively exploiting these flaws to gain full system control and access sensitive mobile device management data.
**If you are using Ivanti Endpoint Manager Mobile on premises, this is an URGENT advisory. Update your EPMM because it's already actively hacked. Apply the RPM patches immediately and remember to re-apply them if you upgrade the software version before the permanent fix in version 12.8.0.0 is released. And make sure to check the logs, because your EPMM may have already been compromised.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/ivanti-patches-critical-zero-day-rce-flaws-in-epmm-g-y-i-b-j/gD2P6Ple2L
⚠️ Alerte CERT-FR ⚠️
Les vulnérabilités critiques CVE-2026-1281 et CVE-2026-1340 affectant Ivanti Endpoint Manager Mobile sont activement exploitées dans le cadre d'attaques ciblées.
https://www.cert.ssi.gouv.fr/alerte/CERTFR-2026-ALE-001/
🔴 CVE-2026-1281 - Critical (9.8)
A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1281/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Ivanti warns of two EPMM flaws exploited in zero-day attacks
Ivanti has disclosed two critical vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2026-1281 and CVE-2026-1340, that were...
🔗️ [Bleepingcomputer] https://link.is.it/teik2H
##updated 2026-01-30T00:31:29
1 posts
🟠 CVE-2026-1637 - High (8.8)
A vulnerability was identified in Tenda AC21 16.03.08.16. The affected element is the function fromAdvSetMacMtuWan of the file /goform/AdvSetMacMtuWan. The manipulation leads to stack-based buffer overflow. Remote exploitation of the attack is pos...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1637/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T22:15:56.110000
1 posts
🟠 CVE-2026-25116 - High (7.6)
Runtipi is a personal homeserver orchestrator. Starting in version 4.5.0 and prior to version 4.7.2, an unauthenticated Path Traversal vulnerability in the `UserConfigController` allows any remote user to overwrite the system's `docker-compose.yml...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25116/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T22:15:53.313000
11 posts
Critical cybersecurity updates from February 1-2, 2026: Microsoft patched an actively exploited Office zero-day (CVE-2026-21509), and Fortinet fixed a critical FortiCloud SSO flaw (CVE-2026-24858). Ivanti released fixes for two exploited EPMM zero-days (CVE-2026-1281, CVE-2026-1340) by February 1, and Bitdefender reported Android RAT malware distributed via Hugging Face (February 2).
In technology, Apple overhauled its online Mac store for a "build-it-yourself" experience (February 1), and Google extended the Fitbit data migration deadline to Google accounts until May 2026.
##‼️ CVE-2026-1281: Safe indicator check for Ivanti EPMM & CVE-2026-1340 related paths
GitHub: https://github.com/Ashwesker/Ashwesker-CVE-2026-1281
##‼️ CVE-2026-1281 & CVE-2026-1340: A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.
Zero-Day: Yes
CVSS: Both 9.8
CVE Published: January 29th, 2026
KEV Catalog: January 29th, 2026
Affected Vendor: Ivanti
Vulnerability Type: Remote Code Execution (RCE)
New. No escape for Ivanti (which issued patches yesterday.)
WatchTower: Someone Knows Bash Far Too Well, And We Love It (Ivanti EPMM Pre-Auth RCEs CVE-2026-1281 & CVE-2026-1340) https://labs.watchtowr.com/someone-knows-bash-far-too-well-and-we-love-it-ivanti-epmm-pre-auth-rces-cve-2026-1281-cve-2026-1340/ #Ivanti #vulnerability #infosec
##@cR0w Didn't you wish for Ivanti?
Ivanti, posted yesterday: Security Advisory Ivanti Endpoint Manager Mobile (EPMM) (CVE-2026-1281 & CVE-2026-1340) https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US
Analysis Guidance Ivanti Endpoint Manager Mobile (EPMM) CVE-2026-1281 & CVE-2026-1340 https://forums.ivanti.com/s/article/Analysis-Guidance-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US
Security Week: Ivanti Patches Exploited EPMM Zero-Days https://www.securityweek.com/ivanti-patches-exploited-epmm-zero-days/ @SecurityWeek #Ivanti #infosec #vulnerability #zeroday
##Someone Knows Bash Far Too Well, And We Love It (Ivanti EPMM Pre-Auth RCEs CVE-2026-1281 & CVE-2026-1340) - watchTowr Labs https://labs.watchtowr.com/someone-knows-bash-far-too-well-and-we-love-it-ivanti-epmm-pre-auth-rces-cve-2026-1281-cve-2026-1340/
##Ivanti confirms active exploitation of EPMM zero-day RCE flaws (CVE-2026-1281, CVE-2026-1340).
Emergency patches released—apply immediately.
Ivanti Patches Critical Zero-Day RCE Flaws in EPMM
Ivanti released emergency patches for two critical zero-day vulnerabilities in Endpoint Manager Mobile (EPMM) (CVE-2026-1281 and CVE-2026-1340) that allow unauthenticated remote code execution. Attackers are actively exploiting these flaws to gain full system control and access sensitive mobile device management data.
**If you are using Ivanti Endpoint Manager Mobile on premises, this is an URGENT advisory. Update your EPMM because it's already actively hacked. Apply the RPM patches immediately and remember to re-apply them if you upgrade the software version before the permanent fix in version 12.8.0.0 is released. And make sure to check the logs, because your EPMM may have already been compromised.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/ivanti-patches-critical-zero-day-rce-flaws-in-epmm-g-y-i-b-j/gD2P6Ple2L
⚠️ Alerte CERT-FR ⚠️
Les vulnérabilités critiques CVE-2026-1281 et CVE-2026-1340 affectant Ivanti Endpoint Manager Mobile sont activement exploitées dans le cadre d'attaques ciblées.
https://www.cert.ssi.gouv.fr/alerte/CERTFR-2026-ALE-001/
🔴 CVE-2026-1340 - Critical (9.8)
A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1340/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Ivanti warns of two EPMM flaws exploited in zero-day attacks
Ivanti has disclosed two critical vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2026-1281 and CVE-2026-1340, that were...
🔗️ [Bleepingcomputer] https://link.is.it/teik2H
##updated 2026-01-29T21:31:33
1 posts
🟠 CVE-2025-61726 - High (7.5)
The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse larg...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-61726/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T21:31:32
1 posts
🟠 CVE-2025-71003 - High (7.5)
An input validation vulnerability in the flow.arange() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-71003/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T21:31:32
1 posts
🟠 CVE-2025-13982 - High (8.1)
Cross-Site Request Forgery (CSRF) vulnerability in Drupal Login Time Restriction allows Cross Site Request Forgery.This issue affects Login Time Restriction: from 0.0.0 before 1.0.3.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-13982/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T21:31:32
1 posts
🟠 CVE-2025-14472 - High (8.1)
Cross-Site Request Forgery (CSRF) vulnerability in Drupal Acquia Content Hub allows Cross Site Request Forgery.This issue affects Acquia Content Hub: from 0.0.0 before 3.6.4, from 3.7.0 before 3.7.3.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-14472/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T21:30:37
1 posts
🟠 CVE-2026-1610 - High (8.1)
A vulnerability was found in Tenda AX12 Pro V2 16.03.49.24_cn. Affected by this issue is some unknown functionality of the component Telnet Service. Performing a manipulation results in hard-coded credentials. The attack is possible to be carried ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1610/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T21:30:27
1 posts
57 repos
https://github.com/JayGLXR/CVE-2026-24061-POC
https://github.com/r00tuser111/CVE-2026-24061
https://github.com/xuemian168/CVE-2026-24061
https://github.com/obrunolima1910/CVE-2026-24061
https://github.com/cumakurt/tscan
https://github.com/Chocapikk/CVE-2026-24061
https://github.com/ibrahmsql/CVE-2026-24061-PoC
https://github.com/Moxxic1/Tell-Me-Root
https://github.com/h3athen/CVE-2026-24061
https://github.com/monstertsl/CVE-2026-24061
https://github.com/XsanFlip/CVE-2026-24061-Scanner
https://github.com/Moxxic1/moxxic1.github.io
https://github.com/SeptembersEND/CVE--2026-24061
https://github.com/DeadlyHollows/CVE-2026-24061-setup
https://github.com/duy-31/CVE-2026-24061---telnetd
https://github.com/BrainBob/CVE-2026-24061
https://github.com/z3n70/CVE-2026-24061
https://github.com/obrunolima1910/obrunolima1910.github.io
https://github.com/ms0x08-dev/CVE-2026-24061-POC
https://github.com/infat0x/CVE-2026-24061
https://github.com/midox008/CVE-2026-24061
https://github.com/buzz075/CVE-2026-24061
https://github.com/TryA9ain/CVE-2026-24061
https://github.com/parameciumzhang/Tell-Me-Root
https://github.com/Mefhika120/Ashwesker-CVE-2026-24061
https://github.com/LucasPDiniz/CVE-2026-24061
https://github.com/Gabs-hub/CVE-2026-24061_Lab
https://github.com/MY0723/GNU-Inetutils-telnet-CVE-2026-24061-
https://github.com/Good123321-bot/CVE-2026-24061-POC
https://github.com/X-croot/CVE-2026-24061_POC
https://github.com/Ali-brarou/telnest
https://github.com/m3ngx1ng/cve_2026_24061_cli
https://github.com/Parad0x7e/CVE-2026-24061
https://github.com/dotelpenguin/telnetd_CVE-2026-24061_tester
https://github.com/hilwa24/CVE-2026-24061
https://github.com/Lingzesec/CVE-2026-24061-GUI
https://github.com/balgan/CVE-2026-24061
https://github.com/Alter-N0X/CVE-2026-24061-POC
https://github.com/SystemVll/CVE-2026-24061
https://github.com/0xXyc/telnet-inetutils-auth-bypass-CVE-2026-24061
https://github.com/hackingyseguridad/root
https://github.com/cyberpoul/CVE-2026-24061-POC
https://github.com/SafeBreach-Labs/CVE-2026-24061
https://github.com/punitdarji/telnetd-cve-2026-24061
https://github.com/Mr-Zapi/CVE-2026-24061
https://github.com/yanxinwu946/CVE-2026-24061--telnetd
https://github.com/novitahk/Exploit-CVE-2026-24061
https://github.com/franckferman/CVE_2026_24061_PoC
https://github.com/androidteacher/CVE-2026-24061-PoC-Telnetd
https://github.com/FurkanKAYAPINAR/CVE-2026-24061-telnet2root
https://github.com/leonjza/inetutils-telnetd-auth-bypass
https://github.com/BrainBob/Telnet-TestVuln-CVE-2026-24061
https://github.com/typeconfused/CVE-2026-24061
https://github.com/madfxr/Twenty-Three-Scanner
https://github.com/Good123321-bot/good123321-bot.github.io
New #synology #DSM Version: 7.3.2-86009 Update 1 is out.
This is a security patch:
Fixed Issues
- Fixed a security vulnerability regarding telnetd (CVE-2026-24061).
updated 2026-01-29T20:16:09.663000
1 posts
🔴 CVE-2025-69602 - Critical (9.1)
A session fixation vulnerability exists in 66biolinks v62.0.0 by AltumCode, where the application does not regenerate the session identifier after successful authentication. As a result, the same session cookie value is reused for users logging in...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-69602/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T19:16:18.987000
2 posts
KiloView Encoder Account Takeover Vulnerability
KiloView video encoders contain a critical vulnerability (CVE-2026-1453) that allows unauthenticated attackers to create administrator accounts and take full control of the devices. The vendor has not yet released a public patch.
**Make sure all KiloView devices are isolated from the internet and accessible from trusted networks only. Then reach out to the vendor to get information of any upcoming patches. At the moment, there is no patch available.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/kiloview-encoder-account-takeover-vulnerability-g-t-5-9-l/gD2P6Ple2L
🔴 CVE-2026-1453 - Critical (9.8)
A missing authentication for critical function vulnerability in KiloView Encoder Series could allow an unauthenticated attacker to create or delete administrator accounts. This vulnerability can grant the attacker full administrative control over ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1453/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T18:32:50
1 posts
🟠 CVE-2025-61731 - High (7.8)
Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The "#cgo pkg-config:" directive in a Go source file provides command-line arguments to provide to the Go pk...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-61731/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T18:32:49
1 posts
🟠 CVE-2025-65890 - High (7.5)
A device-ID validation flaw in OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) by calling flow.cuda.synchronize() with an invalid or out-of-range GPU device index.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65890/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T18:32:49
1 posts
🟠 CVE-2025-65888 - High (7.5)
A dimension validation flaw in the flow.empty() component of OneFlow 0.9.0 allows attackers to cause a Denial of Service (DoS) via a negative or excessively large dimension value.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65888/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T18:32:49
1 posts
🟠 CVE-2025-65891 - High (7.5)
A GPU device-ID validation flaw in OneFlow v0.9.0 allows attackers to trigger a Denial of Dervice (DoS) by invoking flow.cuda.get_device_properties() with an invalid or negative device index.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65891/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T18:32:49
1 posts
🟠 CVE-2025-71000 - High (7.5)
An issue in the flow.cuda.BoolTensor component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-71000/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T18:32:49
1 posts
🟠 CVE-2025-70999 - High (7.5)
A GPU device-ID validation flaw in the flow.cuda.get_device_capability() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted device ID.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70999/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T18:31:42
1 posts
🟠 CVE-2025-65886 - High (7.5)
A shape mismatch vulnerability in OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via supplying crafted tensor shapes.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65886/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T17:16:15.460000
1 posts
🟠 CVE-2025-14975 - High (8.1)
The Custom Login Page Customizer WordPress plugin before 2.5.4 does not have a proper password reset process, allowing a few unauthenticated requests to reset the password of any user by knowing their username, such as administrator ones, and ther...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-14975/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T15:31:31
5 posts
4 repos
https://github.com/guiimoraes/CVE-2025-15467
https://github.com/balgan/CVE-2025-15467
OpenSSL Patches 12 Vulnerabilities Including One Critical RCE
OpenSSL has patched 12 vulnerabilities, including a critical stack buffer overflow (CVE-2025-15467) that allows unauthenticated remote code execution via crafted CMS messages.
**Review your OpenSSL libraries, and start planning a patch. Prioritize 3.x versions since they are exposed to the critical flaw.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/openssl-patches-12-vulnerabilities-including-one-critical-rce-m-6-5-1-y/gD2P6Ple2L
OpenSSL Patches 12 Vulnerabilities Including One Critical RCE
OpenSSL has patched 12 vulnerabilities, including a critical stack buffer overflow (CVE-2025-15467) that allows unauthenticated remote code execution via crafted CMS messages.
**Review your OpenSSL libraries, and start planning a patch. Prioritize 3.x versions since they are exposed to the critical flaw.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/openssl-patches-12-vulnerabilities-including-one-critical-rce-m-6-5-1-y/gD2P6Ple2L
Potentially Critical RCE Vulnerability in OpenSSL
https://research.jfrog.com/post/potential-rce-vulnerabilityin-openssl-cve-2025-15467/
#ycombinator
🔴 CVE-2025-15467 - Critical (9.8)
Issue summary: Parsing CMS AuthEnvelopedData message with maliciously
crafted AEAD parameters can trigger a stack buffer overflow.
Impact summary: A stack buffer overflow may lead to a crash, causing Denial
of Service, or potentially remote code ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15467/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.
Sources:
- https://www.bleepingcomputer.com/news/security/winrar-path-traversal-flaw-still-exploited-by-numerous-hackers/
- https://cloud.google.com/blog/topics/threat-intelligence/exploiting-critical-winrar-vulnerability
- https://nvd.nist.gov/vuln/detail/CVE-2025-8088
- https://www.helpnetsecurity.com/2026/01/28/winrar-vulnerability-exploited-cve-2025-8088/
---
🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀
CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.
Sources:
- https://nvd.nist.gov/vuln/detail/CVE-2025-15467
https://www.infosecurity-magazine.com/news/12-openssl-flaws/
- https://openssl-library.org/news/vulnerabilities/
- https://twitter.com/IntCyberDigest/status/2016288593547833778
---
🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡
SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.
Sources:
- https://www.bleepingcomputer.com/news/security/solarwinds-warns-of-critical-web-help-desk-rce-auth-bypass-flaws/
- https://www.helpnetsecurity.com/2026/01/29/solarwinds-web-help-desk-rce-vulnerabilities/
- https://www.rapid7.com/blog/post/etr-multiple-critical-solarwinds-web-help-desk-vulnerabilities-cve-2025-40551-40552-40553-40554/
- https://nvd.nist.gov/vuln/detail/CVE-2025-40552
- https://nvd.nist.gov/vuln/detail/CVE-2025-40553
- https://nvd.nist.gov/vuln/detail/CVE-2025-40554
- https://nvd.nist.gov/vuln/detail/CVE-2025-40551
updated 2026-01-29T15:02:29
1 posts
Critical n8n Sandbox Escapes Enable Remote Code Execution
n8n reports two sandbox escape vulnerabilities, CVE-2026-1470 and CVE-2026-0863, that allow authenticated users to execute arbitrary code and take over self-hosted servers. These flaws bypass JavaScript and Python security filters by exploiting deprecated language features and specific interpreter behaviors.
**If you are using n8n, make sure it's isolated from the internet and accessible from trusted users only. Then patch n8n to version 1.123.17, 2.4.5 for CVE-2026-1470, and 1.123.14, 2.3.5 for CVE-2026-0863 or later. The CVE-2026-1470 patch is higher priority. Also configure Python nodes to run in 'External' mode for better process isolation.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-n8n-sandbox-escapes-enable-remote-code-execution-7-0-w-q-b/gD2P6Ple2L
updated 2026-01-29T15:00:31
1 posts
New.
AhnLab: React Server Component Security Update Advisory (CVE-2026-23864) https://asec.ahnlab.com/en/92377/ #vulnerability #infosec
##updated 2026-01-29T13:16:51.047000
3 posts
5 repos
https://github.com/absholi7ly/CVE-2026-24858-FortiCloud-SSO-Authentication-Bypass
https://github.com/m0d0ri205/CVE-2026-24858
https://github.com/SimoesCTT/SCTT-2026-33-0004-FortiCloud-SSO-Identity-Singularity
Critical cybersecurity updates from February 1-2, 2026: Microsoft patched an actively exploited Office zero-day (CVE-2026-21509), and Fortinet fixed a critical FortiCloud SSO flaw (CVE-2026-24858). Ivanti released fixes for two exploited EPMM zero-days (CVE-2026-1281, CVE-2026-1340) by February 1, and Bitdefender reported Android RAT malware distributed via Hugging Face (February 2).
In technology, Apple overhauled its online Mac store for a "build-it-yourself" experience (February 1), and Google extended the Fitbit data migration deadline to Google accounts until May 2026.
##Another day and, well . . .
##updated 2026-01-28T21:31:30
1 posts
🟠 CVE-2025-14840 - High (7.5)
Improper Check for Unusual or Exceptional Conditions vulnerability in Drupal HTTP Client Manager allows Forceful Browsing.This issue affects HTTP Client Manager: from 0.0.0 before 9.3.13, from 10.0.0 before 10.0.2, from 11.0.0 before 11.0.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-14840/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-28T15:31:37
1 posts
1 repos
‼️ CVE-2026-1056: Snow Monkey Forms <= 12.0.3 - Unauthenticated Arbitrary File Deletion via Path Traversal
PoC/Exploit: https://github.com/ch4r0nn/CVE-2026-1056-POC
CVSS: 9.8
CVE Published: January 28th, 2026
Advisory: https://github.com/advisories/GHSA-g5p3-f4cq-94v5
Details: The Snow Monkey Forms plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'generate_user_dirpath' function in all versions up to, and including, 12.0.3. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
##updated 2026-01-28T09:30:35
2 posts
‼️ SolarWinds Web Help Desk RCE Hit by Multiple Critical Security Flaws; CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, CVE-2025-40554
CVSS: All 9.8
CVEs Published: January 28th, 2026
CVE-2025-40551: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.
CVE-2025-40552: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.
CVE-2025-40553: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.
CVE-2025-40554: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.
Advisories:
https://nvd.nist.gov/vuln/detail/CVE-2025-40551
https://nvd.nist.gov/vuln/detail/CVE-2025-40552
https://nvd.nist.gov/vuln/detail/CVE-2025-40553
https://nvd.nist.gov/vuln/detail/CVE-2025-40554
📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.
Sources:
- https://www.bleepingcomputer.com/news/security/winrar-path-traversal-flaw-still-exploited-by-numerous-hackers/
- https://cloud.google.com/blog/topics/threat-intelligence/exploiting-critical-winrar-vulnerability
- https://nvd.nist.gov/vuln/detail/CVE-2025-8088
- https://www.helpnetsecurity.com/2026/01/28/winrar-vulnerability-exploited-cve-2025-8088/
---
🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀
CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.
Sources:
- https://nvd.nist.gov/vuln/detail/CVE-2025-15467
https://www.infosecurity-magazine.com/news/12-openssl-flaws/
- https://openssl-library.org/news/vulnerabilities/
- https://twitter.com/IntCyberDigest/status/2016288593547833778
---
🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡
SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.
Sources:
- https://www.bleepingcomputer.com/news/security/solarwinds-warns-of-critical-web-help-desk-rce-auth-bypass-flaws/
- https://www.helpnetsecurity.com/2026/01/29/solarwinds-web-help-desk-rce-vulnerabilities/
- https://www.rapid7.com/blog/post/etr-multiple-critical-solarwinds-web-help-desk-vulnerabilities-cve-2025-40551-40552-40553-40554/
- https://nvd.nist.gov/vuln/detail/CVE-2025-40552
- https://nvd.nist.gov/vuln/detail/CVE-2025-40553
- https://nvd.nist.gov/vuln/detail/CVE-2025-40554
- https://nvd.nist.gov/vuln/detail/CVE-2025-40551
updated 2026-01-28T09:30:35
2 posts
2 repos
‼️ SolarWinds Web Help Desk RCE Hit by Multiple Critical Security Flaws; CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, CVE-2025-40554
CVSS: All 9.8
CVEs Published: January 28th, 2026
CVE-2025-40551: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.
CVE-2025-40552: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.
CVE-2025-40553: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.
CVE-2025-40554: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.
Advisories:
https://nvd.nist.gov/vuln/detail/CVE-2025-40551
https://nvd.nist.gov/vuln/detail/CVE-2025-40552
https://nvd.nist.gov/vuln/detail/CVE-2025-40553
https://nvd.nist.gov/vuln/detail/CVE-2025-40554
📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.
Sources:
- https://www.bleepingcomputer.com/news/security/winrar-path-traversal-flaw-still-exploited-by-numerous-hackers/
- https://cloud.google.com/blog/topics/threat-intelligence/exploiting-critical-winrar-vulnerability
- https://nvd.nist.gov/vuln/detail/CVE-2025-8088
- https://www.helpnetsecurity.com/2026/01/28/winrar-vulnerability-exploited-cve-2025-8088/
---
🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀
CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.
Sources:
- https://nvd.nist.gov/vuln/detail/CVE-2025-15467
https://www.infosecurity-magazine.com/news/12-openssl-flaws/
- https://openssl-library.org/news/vulnerabilities/
- https://twitter.com/IntCyberDigest/status/2016288593547833778
---
🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡
SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.
Sources:
- https://www.bleepingcomputer.com/news/security/solarwinds-warns-of-critical-web-help-desk-rce-auth-bypass-flaws/
- https://www.helpnetsecurity.com/2026/01/29/solarwinds-web-help-desk-rce-vulnerabilities/
- https://www.rapid7.com/blog/post/etr-multiple-critical-solarwinds-web-help-desk-vulnerabilities-cve-2025-40551-40552-40553-40554/
- https://nvd.nist.gov/vuln/detail/CVE-2025-40552
- https://nvd.nist.gov/vuln/detail/CVE-2025-40553
- https://nvd.nist.gov/vuln/detail/CVE-2025-40554
- https://nvd.nist.gov/vuln/detail/CVE-2025-40551
updated 2026-01-27T16:19:42.330000
19 posts
6 repos
https://github.com/gavz/CVE-2026-21509-PoC
https://github.com/SimoesCTT/CTT-NFS-Vortex-RCE
https://github.com/SimoesCTT/CTT-MICROSOFT-OFFICE-OLE-MANIFOLD-BYPASS-CVE-2026-21509
https://github.com/ksk-itdk/KSK-ITDK-CVE-2026-21509-Mitigation
https://github.com/kimstars/Ashwesker-CVE-2026-21509
https://github.com/SimoesCTT/SCTT-2026-33-0007-The-OLE-Vortex-Laminar-Bypass-
Robin Dost details how APT28 uses CVE-2026-21509 in practice, relying on crafted RTF files that trigger OLE parsing without macros. The blog post walks through efficient IOC extraction from weaponised documents. https://blog.synapticsystems.de/apt28-geofencing-as-a-targeting-signal-cve-2026-21509/
##This is from yesterday.
Zscaler: APT28 Leverages CVE-2026-21509 in Operation Neusploit https://www.zscaler.com/blogs/security-research/apt28-leverages-cve-2026-21509-operation-neusploit #infosec #vulnerability #threatresearch
##Russian state hackers exploit new Microsoft Office flaw in attacks on Ukraine, EU
Ukraine’s computer emergency response team, CERT-UA, said attackers began abusing the flaw — tracked as CVE-2026-21509 — shortly after Microsoft...
🔗️ [Therecord] https://link.is.it/ZQMXsZ
##Russian APT28 Exploits Microsoft Office Vulnerability to Target EU COREPER Discussions
In a recent escalation of cyber espionage activity, the Russian-linked Advanced Persistent Threat group APT28 has been observed exploiting a critical Microsoft Office vulnerability, CVE-2026-21509, to target sensitive EU operations. Security researchers report that the group is distributing malicious DOC files disguised as documents related to EU COREPER (Committee of Permanent…
##RE: https://mastodon.social/@campuscodi/116006284031729445
More on this campaign from Zscaler: https://www.zscaler.com/blogs/security-research/apt28-leverages-cve-2026-21509-operation-neusploit
Other targets also include Romania and Slovakia
##Latest News (Feb 2-3, 2026):
Global: India and the US have finalized a trade deal. Pakistani forces killed 145 militants in Balochistan after coordinated attacks.
Tech: SpaceX merged with xAI, announcing plans for space-based AI data centers. Oracle plans a $50B expansion for AI cloud infrastructure.
Cybersecurity: A Russian hacker alliance, "Russian Legion," threatens a major cyberattack on Denmark. Russia-linked APT28 exploits a new Microsoft Office flaw (CVE-2026-21509) in attacks across Ukraine and the EU.
##Zscaler ThreatLabz reports on Operation Neusploit, a January 2026 campaign targeting Central and Eastern Europe. Weaponised Microsoft RTF files exploit CVE-2026-21509 to deliver multi-stage backdoors. The campaign is attributed to APT28 with high confidence. https://www.zscaler.com/blogs/security-research/apt28-leverages-cve-2026-21509-operation-neusploit
##"Microsoft Office zero-day actively exploited" 🕵️ 🙄
(CVSS 7.8)
https://hackingpassion.com/office-zero-day-cve-2026-21509
#cve202621509 #cybersec #cybersecurity #infosec #microsoft #office #microsoftoffice #ole
##Robin Dost details how APT28 uses CVE-2026-21509 in practice, relying on crafted RTF files that trigger OLE parsing without macros. The blog post walks through efficient IOC extraction from weaponised documents. https://blog.synapticsystems.de/apt28-geofencing-as-a-targeting-signal-cve-2026-21509/
##This is from yesterday.
Zscaler: APT28 Leverages CVE-2026-21509 in Operation Neusploit https://www.zscaler.com/blogs/security-research/apt28-leverages-cve-2026-21509-operation-neusploit #infosec #vulnerability #threatresearch
##Russian state hackers exploit new Microsoft Office flaw in attacks on Ukraine, EU
Ukraine’s computer emergency response team, CERT-UA, said attackers began abusing the flaw — tracked as CVE-2026-21509 — shortly after Microsoft...
🔗️ [Therecord] https://link.is.it/ZQMXsZ
##RE: https://mastodon.social/@campuscodi/116006284031729445
More on this campaign from Zscaler: https://www.zscaler.com/blogs/security-research/apt28-leverages-cve-2026-21509-operation-neusploit
Other targets also include Romania and Slovakia
##Latest News (Feb 2-3, 2026):
Global: India and the US have finalized a trade deal. Pakistani forces killed 145 militants in Balochistan after coordinated attacks.
Tech: SpaceX merged with xAI, announcing plans for space-based AI data centers. Oracle plans a $50B expansion for AI cloud infrastructure.
Cybersecurity: A Russian hacker alliance, "Russian Legion," threatens a major cyberattack on Denmark. Russia-linked APT28 exploits a new Microsoft Office flaw (CVE-2026-21509) in attacks across Ukraine and the EU.
##Zscaler ThreatLabz reports on Operation Neusploit, a January 2026 campaign targeting Central and Eastern Europe. Weaponised Microsoft RTF files exploit CVE-2026-21509 to deliver multi-stage backdoors. The campaign is attributed to APT28 with high confidence. https://www.zscaler.com/blogs/security-research/apt28-leverages-cve-2026-21509-operation-neusploit
##Russian hackers exploit recently patched Microsoft Office bug in attacks
Ukraine’s Computer Emergency Response Team (CERT) says that Russian hackers are exploiting CVE-2026-21509, a recently patched vulnerability in multiple…
#NewsBeep #News #US #USA #UnitedStates #UnitedStatesOfAmerica #Technology
https://www.newsbeep.com/us/445936/
"Microsoft Office zero-day actively exploited" 🕵️ 🙄
(CVSS 7.8)
https://hackingpassion.com/office-zero-day-cve-2026-21509
#cve202621509 #cybersec #cybersecurity #infosec #microsoft #office #microsoftoffice #ole
##Russian hackers exploit recently patched Microsoft Office bug in attacks
Ukraine's Computer Emergency Response Team (CERT) says that Russian hackers are exploiting CVE-2026-21509, a recently patched vulnerability in...
🔗️ [Bleepingcomputer] https://link.is.it/iMsHDY
##Critical cybersecurity updates from February 1-2, 2026: Microsoft patched an actively exploited Office zero-day (CVE-2026-21509), and Fortinet fixed a critical FortiCloud SSO flaw (CVE-2026-24858). Ivanti released fixes for two exploited EPMM zero-days (CVE-2026-1281, CVE-2026-1340) by February 1, and Bitdefender reported Android RAT malware distributed via Hugging Face (February 2).
In technology, Apple overhauled its online Mac store for a "build-it-yourself" experience (February 1), and Google extended the Fitbit data migration deadline to Google accounts until May 2026.
##updated 2026-01-26T15:04:59.737000
1 posts
3 repos
https://github.com/Galaxy-sc/CVE-2026-0920-WordPress-LA-Studio-Exploit
‼️ CVE-2026-0920: Explanation and payload of the recent vulnerability in the LA-Studio Element WordPress plugin.
PoC/Exploit: https://github.com/John-doe-code-a11/CVE-2026-0920
CVSS: 9.8
CVE Published: January 22nd, 2026
Advisory: https://github.com/advisories/GHSA-m3h4-65j5-6j8c
Technical Analysis: https://www.wordfence.com/blog/2026/01/20000-wordpress-sites-affected-by-backdoor-vulnerability-in-la-studio-element-kit-for-elementor-wordpress-plugin/
##updated 2026-01-23T18:32:31
1 posts
Critical n8n Sandbox Escapes Enable Remote Code Execution
n8n reports two sandbox escape vulnerabilities, CVE-2026-1470 and CVE-2026-0863, that allow authenticated users to execute arbitrary code and take over self-hosted servers. These flaws bypass JavaScript and Python security filters by exploiting deprecated language features and specific interpreter behaviors.
**If you are using n8n, make sure it's isolated from the internet and accessible from trusted users only. Then patch n8n to version 1.123.17, 2.4.5 for CVE-2026-1470, and 1.123.14, 2.3.5 for CVE-2026-0863 or later. The CVE-2026-1470 patch is higher priority. Also configure Python nodes to run in 'External' mode for better process isolation.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-n8n-sandbox-escapes-enable-remote-code-execution-7-0-w-q-b/gD2P6Ple2L
updated 2026-01-23T06:31:32
1 posts
‼️ CVE-2026-0755: Reported Zero-Day in Gemini MCP Tool Could Allow Remote Code Execution
Zero-Day: Yes
CVSS: 9.8
CVE Published: January 23rd, 2026
Affected Vendor: Gemini MCP Tool
Vulnerability Type: Remote Code Execution (RCE)
updated 2026-01-21T21:31:31
1 posts
1 repos
🍩 & #threatintel - Since its disclosure 11 days ago, 95% of the exploitation attempts of CVE-2026-20045, a critical vulnerability in Cisco Unified Communications Manager, have used a distinctive user-agent: Mozilla/5.0 (compatible; CiscoExploit/1.0) and are heavily targeted against our Cisco Unified Communications Manager (UCM) sensors.
We're tracking it here: https://viz.greynoise.io/tags/cisco-unified-communications-manager-input-validation-cve-2026-20045-rce-attempt?days=10
Appears to be from https://github.com/Ashwesker/Ashwesker-CVE-2026-20045
##updated 2026-01-20T15:31:21
1 posts
updated 2025-12-19T18:25:28.283000
1 posts
updated 2025-11-20T00:31:21
1 posts
6 repos
https://github.com/mbanyamer/CVE-2025-11001---7-Zip
https://github.com/ranasen-rat/CVE-2025-11001
https://github.com/shalevo13/Se7enSlip
https://github.com/lastvocher/7zip-CVE-2025-11001
@TeddyTheBest Yes it is open source but it is a little tough to claim the moral high ground here when 7-Zip also frequently has security issues and like WinRAR offers no autoupdate
##updated 2025-11-13T16:25:27
8 posts
4 repos
https://github.com/N3k0t-dev/PoC-CVE-collection
https://github.com/boroeurnprach/CVE-2025-11953-PoC
https://github.com/Mr-In4inci3le/CVE-2025-11953-POC-
https://github.com/SaidBenaissa/cve-2025-11953-vulnerability-demo
Our team wrote about in-the-wild exploitation of React Metro Server CVE-2025-11953, which VulnCheck's Canary Intelligence network detected for the first time in December 2025.
##Metro4Shell Exploit Targets React Native Developers, Delivering Cross-Platform Malware
A critical vulnerability in the Metro server for React Native, tracked as CVE-2025-11953, is actively being exploited by hackers to deliver malicious payloads to both Windows and Linux systems. This flaw exposes developers and organizations relying on React Native to severe risk, especially during the application development phase. Metro, the default JavaScript bundler for React…
##Hackers exploit critical React Native Metro bug to breach dev systems
Hackers are targeting developers by exploiting the critical vulnerability CVE-2025-11953 in the Metro server for React Native to deliver malicious...
🔗️ [Bleepingcomputer] https://link.is.it/9a1Dng
##A single overlooked feature in a popular React Native tool let hackers run code on thousands of developer machines worldwide. Curious how one tiny flaw exposed the whole supply chain?
##Hackers exploit critical React Native Metro bug to breach dev systems
Hackers are targeting developers by exploiting the critical vulnerability CVE-2025-11953 in the Metro server for React Native to deliver malicious...
🔗️ [Bleepingcomputer] https://link.is.it/w9Y7HI
##Our team wrote about in-the-wild exploitation of React Metro Server CVE-2025-11953, which VulnCheck's Canary Intelligence network detected for the first time in December 2025.
##Hackers exploit critical React Native Metro bug to breach dev systems
Hackers are targeting developers by exploiting the critical vulnerability CVE-2025-11953 in the Metro server for React Native to deliver malicious...
🔗️ [Bleepingcomputer] https://link.is.it/9a1Dng
##Hackers exploit critical React Native Metro bug to breach dev systems
Hackers are targeting developers by exploiting the critical vulnerability CVE-2025-11953 in the Metro server for React Native to deliver malicious...
🔗️ [Bleepingcomputer] https://link.is.it/w9Y7HI
##updated 2025-11-04T00:31:55
1 posts
updated 2025-10-22T00:34:26
1 posts
26 repos
https://github.com/pescada-dev/-CVE-2025-8088
https://github.com/Shinkirou789/Cve-2025-8088-WinRar-vulnerability
https://github.com/0xAbolfazl/CVE-2025-8088-WinRAR-PathTraversal-PoC
https://github.com/nuky-alt/CVE-2025-8088
https://github.com/nhattanhh/CVE-2025-8088
https://github.com/Markusino488/cve-2025-8088
https://github.com/AdityaBhatt3010/CVE-2025-8088-WinRAR-Zero-Day-Path-Traversal
https://github.com/jordan922/CVE-2025-8088
https://github.com/xi0onamdev/WinRAR-CVE-2025-8088-Exploitation-Toolkit
https://github.com/lucyna77/winrar-exploit
https://github.com/knight0x07/WinRAR-CVE-2025-8088-PoC-RAR
https://github.com/hexsecteam/CVE-2025-8088-Winrar-Tool
https://github.com/papcaii2004/CVE-2025-8088-WinRAR-builder
https://github.com/kitsuneshade/WinRAR-Exploit-Tool---Rust-Edition
https://github.com/DeepBlue-dot/CVE-2025-8088-WinRAR-Startup-PoC
https://github.com/pentestfunctions/best-CVE-2025-8088
https://github.com/pexlexity/WinRAR-CVE-2025-8088-Path-Traversal-PoC
https://github.com/pentestfunctions/CVE-2025-8088-Multi-Document
https://github.com/sxyrxyy/CVE-2025-8088-WinRAR-Proof-of-Concept-PoC-Exploit-
https://github.com/walidpyh/CVE-2025-8088
https://github.com/travisbgreen/cve-2025-8088
https://github.com/techcorp/CVE-2025-8088-Exploit
https://github.com/ghostn4444/CVE-2025-8088
https://github.com/hbesljx/CVE-2025-8088-EXP
📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.
Sources:
- https://www.bleepingcomputer.com/news/security/winrar-path-traversal-flaw-still-exploited-by-numerous-hackers/
- https://cloud.google.com/blog/topics/threat-intelligence/exploiting-critical-winrar-vulnerability
- https://nvd.nist.gov/vuln/detail/CVE-2025-8088
- https://www.helpnetsecurity.com/2026/01/28/winrar-vulnerability-exploited-cve-2025-8088/
---
🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀
CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.
Sources:
- https://nvd.nist.gov/vuln/detail/CVE-2025-15467
https://www.infosecurity-magazine.com/news/12-openssl-flaws/
- https://openssl-library.org/news/vulnerabilities/
- https://twitter.com/IntCyberDigest/status/2016288593547833778
---
🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡
SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.
Sources:
- https://www.bleepingcomputer.com/news/security/solarwinds-warns-of-critical-web-help-desk-rce-auth-bypass-flaws/
- https://www.helpnetsecurity.com/2026/01/29/solarwinds-web-help-desk-rce-vulnerabilities/
- https://www.rapid7.com/blog/post/etr-multiple-critical-solarwinds-web-help-desk-vulnerabilities-cve-2025-40551-40552-40553-40554/
- https://nvd.nist.gov/vuln/detail/CVE-2025-40552
- https://nvd.nist.gov/vuln/detail/CVE-2025-40553
- https://nvd.nist.gov/vuln/detail/CVE-2025-40554
- https://nvd.nist.gov/vuln/detail/CVE-2025-40551
updated 2025-06-18T14:15:12
2 posts
Exploiting CVE-2025-49825 (authentication bypass vulnerability in Teleport) https://blog.offensive.af/posts/exploiting-cve-2025-49825/
##Exploiting CVE-2025-49825 (authentication bypass vulnerability in Teleport) https://blog.offensive.af/posts/exploiting-cve-2025-49825/
##updated 2024-11-21T08:13:22.843000
1 posts
RE: https://mastodon.social/@bagder/116001950411560304
My CVEs are still at 0 medals, but thanks to VxWorks I was able to achieve a CVE on Mars (#Curiosity rover, CVE-2023-38346) 😉
Btw. if anyone from #NASA could confirm curiosity was/is really affected (but probably without attack vector so no impact I guess), that would mean a lot to me
##updated 2024-11-21T07:14:54.630000
1 posts
@Weld When I was at Rapid7, we were firm that we wouldn't sign anything preventing us from disclosing. Sometimes that made it real difficult to talk to the company
Sadly the link to the disclosure is dead now, but this was my favourite: https://attackerkb.com/topics/92AeLOE1M1/cve-2022-37393/rapid7-analysis
##updated 2024-11-01T15:32:52
1 posts
updated 2023-01-29T05:00:49
1 posts
@rk @hrbrmstr
Are you forgetting CVE-2019-15006 by Taylor Swift on Security?
🟠 CVE-2026-25502 - High (7.8)
iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.2, stack-based buffer overflow in icFixXml() function when processing malformed ICC...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25502/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25502 - High (7.8)
iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.2, stack-based buffer overflow in icFixXml() function when processing malformed ICC...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25502/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25502 - High (7.8)
iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.2, stack-based buffer overflow in icFixXml() function when processing malformed ICC...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25502/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25502 - High (7.8)
iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.2, stack-based buffer overflow in icFixXml() function when processing malformed ICC...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25502/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24665 - High (8.7)
The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, a stored Cross-Site Scripting (XSS) vulnerability allows authenticated students to inject malicious JavaScript into uploaded as...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24665/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24665 - High (8.7)
The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, a stored Cross-Site Scripting (XSS) vulnerability allows authenticated students to inject malicious JavaScript into uploaded as...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24665/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24665 - High (8.7)
The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, a stored Cross-Site Scripting (XSS) vulnerability allows authenticated students to inject malicious JavaScript into uploaded as...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24665/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24665 - High (8.7)
The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, a stored Cross-Site Scripting (XSS) vulnerability allows authenticated students to inject malicious JavaScript into uploaded as...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24665/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24669 - High (7.8)
The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, an insecure password reset mechanism allows local attackers to reuse a valid password reset token after it has already been use...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24669/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24669 - High (7.8)
The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, an insecure password reset mechanism allows local attackers to reuse a valid password reset token after it has already been use...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24669/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24669 - High (7.8)
The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, an insecure password reset mechanism allows local attackers to reuse a valid password reset token after it has already been use...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24669/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24669 - High (7.8)
The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, an insecure password reset mechanism allows local attackers to reuse a valid password reset token after it has already been use...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24669/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
###infosec #Microsoft #vulnerability
CVE-2026-49144
Al ejecutar el instalador, el ataque se ejecuta automáticamente con privilegios de SYSTEM.
El problema se ha solucionado y estará en la versión 8.8.2.
Actualice sus dispositivos lo antes posible.
Que tenga un lindo día.😁
3/3
###infosec #Microsoft #vulnerability
CVE-2026-49144
Un atacante podría usar ingeniería social o clickjacking para engañar a los usuarios para que descarguen el instalador legítimo y un ejecutable malicioso en el mismo directorio.
2/3
###infosec #Microsoft #vulnerability
CVE-2026-49144
Notepad++ es un editor de código fuente gratuito y de código abierto. En las versiones 8.8.1 y anteriores, el instalador permite que usuarios sin privilegios obtengan privilegios de nivel SISTEMA a través de rutas de búsqueda de ejecutables inseguras.
https://nvd.nist.org/vuln/detail/CVE-2026-49144
1/3
##🔴 CVE-2025-66480 - Critical (9.8)
Wildfire IM is an instant messaging and real-time audio/video solution. Prior to 1.4.3, a critical vulnerability exists in the im-server component related to the file upload functionality found in com.xiaoleilu.loServer.action.UploadFileAction. Th...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-66480/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25137 - Critical (9.1)
The NixOs Odoo package is an open source ERP and CRM system. From 21.11 to before 25.11 and 26.05, every NixOS based Odoo setup publicly exposes the database manager without any authentication. This allows unauthorized actors to delete and downloa...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25137/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Security Advisory: Database and filestore publicly accessible with default Odoo configuration (CVE-2026-25137)
##🟠 CVE-2026-23743 - High (7.5)
Discourse is an open source discussion platform. In versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0, permalinks pointing to access-restricted resources (private topics, categories, posts, or hidden tags) were redirecting users to URLs ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23743/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##1 posts
1 repos
https://github.com/mbanyamer/CVE-2026-24854-ChurchCRM-6.7.2-Authenticated-Numeric-SQL-Injection
🟠 CVE-2026-24854 - High (8.8)
ChurchCRM is an open-source church management system. A SQL Injection vulnerability exists in endpoint `/PaddleNumEditor.php` in ChurchCRM prior to version 6.7.2. Any authenticated user, including one with zero assigned permissions, can exploit SQ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24854/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔥 A vulnerability in AWStats sitting in a cPanel tree... H I D I N G?
We discovered it.
CVE-2025-63261 (or as we call it: PTT-2025-021) is what happens when "legacy meets lazy":
A single "|" in an HTTP GET param leads straight to RCE via Perl’s unsafe open() call.
And yes, this was sitting in AWStats.
Why it matters:
🔹 It’s already 2026, and we’re still finding bugs from 2000s-era web tools
🔹 Attack surface doesn’t disappear, it just ages quietly
🔹 RCE doesn’t need zero-days when it has zero hygiene
📝 We have a very comprehensive Part 1 article, written by Matei Badanoiu, who walks us through:
✅ How we found the bug
✅ How we turned it into a working exploit
✅ Why these “boring” vulns still matter
Read the article here: https://pentest-tools.com/blog/cpanel-cve-ptt-2025-021-part-1
##🔴 CVE-2026-22806 - Critical (9.1)
vCluster Platform provides a Kubernetes platform for managing virtual clusters, multi-tenancy, and cluster sharing. Prior to versions 4.6.0, 4.5.4, 4.4.2, and 4.3.10, when an access key is created with a limited scope, the scope can be bypassed to...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22806/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##