24h | 7d | 30d

Overview

  • D-Link
  • DIR-823X

08 Feb 2026
Published
08 Feb 2026
Updated

CVSS v4.0
HIGH (8.6)
EPSS
Pending

KEV

Description

A weakness has been identified in D-Link DIR-823X 250416. This vulnerability affects the function sub_420618 of the file /goform/set_upnp. This manipulation of the argument upnp_enable causes os command injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks.

Statistics

  • 1 Post

Last activity: 9 hours ago

Fediverse

Profile picture fallback

🛡️ CVE-2026-2175: HIGH severity OS command injection in D-Link DIR-823X (v250416) via /goform/set_upnp. No auth needed; public exploit out. Patch ASAP or disable UPnP & segment networks. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 9h ago

Overview

  • Red Hat
  • Red Hat Enterprise Linux 10
  • libxml2

15 Jan 2026
Published
15 Jan 2026
Updated

CVSS
Pending
EPSS
0.06%

KEV

Description

A flaw was identified in the RelaxNG parser of libxml2 related to how external schema inclusions are handled. The parser does not enforce a limit on inclusion depth when resolving nested <include> directives. Specially crafted or overly complex schemas can cause excessive recursion during parsing. This may lead to stack exhaustion and application crashes, creating a denial-of-service risk.

Statistics

  • 1 Post

Last activity: 17 hours ago

Bluesky

Profile picture fallback
🚨 New LOW CVE detected in AWS Lambda 🚨 CVE-2026-0989 impacts libxml2 in 27 Lambda base images. Details: https://github.com/aws/aws-lambda-base-images/issues/405 More: https://lambdawatchdog.com/ #AWS #Lambda #CVE #CloudSecurity #Serverless
  • 0
  • 0
  • 0
  • 17h ago

Overview

  • Go standard library
  • archive/zip
  • archive/zip

28 Jan 2026
Published
29 Jan 2026
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.

Statistics

  • 1 Post

Last activity: 17 hours ago

Bluesky

Profile picture fallback
🚨 New HIGH CVE detected in AWS Lambda 🚨 CVE-2025-61728 impacts libcap in 20 Lambda base images. Details: https://github.com/aws/aws-lambda-base-images/issues/397 More: https://lambdawatchdog.com/ #AWS #Lambda #CVE #CloudSecurity #Serverless
  • 0
  • 0
  • 0
  • 17h ago

Overview

  • Go standard library
  • crypto/tls
  • crypto/tls

05 Feb 2026
Published
06 Feb 2026
Updated

CVSS
Pending
EPSS
0.01%

KEV

Description

During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.

Statistics

  • 1 Post

Last activity: 17 hours ago

Bluesky

Profile picture fallback
🚨 New HIGH CVE detected in AWS Lambda 🚨 CVE-2025-68121 impacts libcap in 47 Lambda base images. Details: https://github.com/aws/aws-lambda-base-images/issues/401 More: https://lambdawatchdog.com/ #AWS #Lambda #CVE #CloudSecurity #Serverless
  • 0
  • 0
  • 0
  • 17h ago

Overview

  • Go standard library
  • net/url
  • net/url

28 Jan 2026
Published
29 Jan 2026
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.

Statistics

  • 1 Post

Last activity: 17 hours ago

Bluesky

Profile picture fallback
🚨 New HIGH CVE detected in AWS Lambda 🚨 CVE-2025-61726 impacts libcap in 20 Lambda base images. Details: https://github.com/aws/aws-lambda-base-images/issues/396 More: https://lambdawatchdog.com/ #AWS #Lambda #CVE #CloudSecurity #Serverless
  • 0
  • 0
  • 0
  • 17h ago

Overview

  • Zabbix
  • Zabbix

12 Sep 2025
Published
08 Feb 2026
Updated

CVSS v4.0
HIGH (7.3)
EPSS
0.08%

KEV

Description

Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. In Zabbix 5.0 this allows for remote code execution.

Statistics

  • 1 Post

Last activity: 10 hours ago

Bluesky

Profile picture fallback
Security Advisory: #Debian LTS DLA-4473-1 patches a high-severity RCE in Zabbix (CVE-2025-27234). The smartctl plugin's lack of input sanitization allows argument injection into the underlying command. Read more: 👉 tinyurl.com/4dmk7ayh #Security
  • 0
  • 0
  • 0
  • 10h ago

Overview

  • UTT
  • HiPER 810G

07 Feb 2026
Published
07 Feb 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.04%

KEV

Description

A vulnerability was detected in UTT HiPER 810G up to 1.7.7-171114. Affected by this vulnerability is the function strcpy of the file /goform/formFireWall of the component Management Interface. The manipulation of the argument GroupName results in buffer overflow. The attack can be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Statistics

  • 1 Post

Last activity: 23 hours ago

Fediverse

Profile picture fallback

⚠️ CVE-2026-2086: HIGH-severity buffer overflow in UTT HiPER 810G (≤1.7.7-171114). Remote code execution possible, public exploit exists, no patch. Segment networks, disable remote mgmt, monitor for attacks. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 23h ago

Overview

  • D-Link
  • DIR-823X

08 Feb 2026
Published
08 Feb 2026
Updated

CVSS v4.0
HIGH (8.6)
EPSS
0.19%

KEV

Description

A security vulnerability has been detected in D-Link DIR-823X 250416. This issue affects some unknown processing of the file /goform/set_ddns of the component DDNS Service. The manipulation of the argument ddnsType/ddnsDomainName/ddnsUserName/ddnsPwd leads to os command injection. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used.

Statistics

  • 2 Posts

Last activity: 20 hours ago

Fediverse

Profile picture fallback

🛡️ HIGH severity OS command injection (CVE-2026-2143) in D-Link DIR-823X (fw 250416): Exploitable via /goform/set_ddns by privileged users. No patch yet — disable remote management, monitor traffic, and check for updates. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 1
  • 20h ago

Overview

  • Red Hat
  • Red Hat Enterprise Linux 10
  • libxml2

15 Jan 2026
Published
15 Jan 2026
Updated

CVSS
Pending
EPSS
0.07%

KEV

Description

A flaw was found in the libxml2 library. This uncontrolled resource consumption vulnerability occurs when processing XML catalogs that contain repeated <nextCatalog> elements pointing to the same downstream catalog. A remote attacker can exploit this by supplying crafted catalogs, causing the parser to redundantly traverse catalog chains. This leads to excessive CPU consumption and degrades application availability, resulting in a denial-of-service condition.

Statistics

  • 1 Post

Last activity: 17 hours ago

Bluesky

Profile picture fallback
🚨 New MEDIUM CVE detected in AWS Lambda 🚨 CVE-2026-0992 impacts libxml2 in 27 Lambda base images. Details: https://github.com/aws/aws-lambda-base-images/issues/404 More: https://lambdawatchdog.com/ #AWS #Lambda #CVE #CloudSecurity #Serverless
  • 0
  • 0
  • 0
  • 17h ago

Overview

  • neutrinolabs
  • xrdp

27 Jan 2026
Published
03 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.32%

KEV

Description

xrdp is an open source RDP server. xrdp before v0.10.5 contains an unauthenticated stack-based buffer overflow vulnerability. The issue stems from improper bounds checking when processing user domain information during the connection sequence. If exploited, the vulnerability could allow remote attackers to execute arbitrary code on the target system. The vulnerability allows an attacker to overwrite the stack buffer and the return address, which could theoretically be used to redirect the execution flow. The impact of this vulnerability is lessened if a compiler flag has been used to build the xrdp executable with stack canary protection. If this is the case, a second vulnerability would need to be used to leak the stack canary value. Upgrade to version 0.10.5 to receive a patch. Additionally, do not rely on stack canary protection on production systems.

Statistics

  • 2 Posts

Last activity: 14 hours ago

Bluesky

Profile picture fallback
URGENT: Fedora admins - Patch xorgxrdp now! CVE-2025-68670 = critical RCE via stack buffer overflow. Affects xrdp servers on #Fedora 43. Read more: 👉 tinyurl.com/bhev3hjb #Security
  • 0
  • 0
  • 0
  • 14h ago
Profile picture fallback
🚨 Critical Security Alert for Linux Administrators! 🚨 #Fedora 43 systems using xrdp for remote access contain a severe vulnerability (CVE-2025-68670) allowing unauthenticated remote code execution. Read more: 👉 tinyurl.com/6r4wwunj #Security
  • 0
  • 0
  • 0
  • 14h ago
Showing 11 to 20 of 41 CVEs