24h | 7d | 30d

Overview

  • The Tcpdump Group
  • libpcap

31 Dec 2025
Published
02 Jan 2026
Updated

CVSS v3.1
LOW (1.9)
EPSS
0.02%

KEV

Description

pcap_ether_aton() is an auxiliary function in libpcap, it takes a string argument and returns a fixed-size allocated buffer. The string argument must be a well-formed MAC-48 address in one of the supported formats, but this requirement has been poorly documented. If an application calls the function with an argument that deviates from the expected format, the function can read data beyond the end of the provided string and write data beyond the end of the allocated buffer.

Statistics

  • 1 Post

Last activity: 7 hours ago

Bluesky

Profile picture
๐Ÿšจ THREAD: Critical libpcap vulnerability CVE-2025-11961 threatens network security infrastructure. Read more: ๐Ÿ‘‰ tinyurl.com/wurd46hn #Security #Mageia
  • 0
  • 0
  • 0
  • 7h ago

Overview

  • Google
  • Chrome

06 Jan 2026
Published
08 Jan 2026
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

Insufficient policy enforcement in WebView tag in Google Chrome prior to 143.0.7499.192 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: High)

Statistics

  • 1 Post

Last activity: 12 hours ago

Bluesky

Profile picture
ๅพฎ่ฝฏ็ดงๆ€ฅไฟฎๅค Edge ๆต่งˆๅ™จ้ซ˜ๅฑๅฎ‰ๅ…จๆผๆดž ๐Ÿ‘‰ https://windiscover.com/posts/microsoft-edge-security-fix-cve-2026-0628.html
  • 0
  • 0
  • 0
  • 12h ago

Overview

  • RustCrypto
  • elliptic-curves

10 Jan 2026
Published
10 Jan 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.06%

KEV

Description

RustCrypto: Elliptic Curves is general purpose Elliptic Curve Cryptography (ECC) support, including types and traits for representing various elliptic curve forms, scalars, points, and public/secret keys composed thereof. In versions 0.14.0-pre.0 and 0.14.0-rc.0, a denial-of-service vulnerability exists in the SM2 PKE decryption path where an invalid elliptic-curve point (C1) is decoded and the resulting value is unwrapped without checking. Specifically, AffinePoint::from_encoded_point(&encoded_c1) may return a None/CtOption::None when the supplied coordinates are syntactically valid but do not lie on the SM2 curve. The calling code previously used .unwrap(), causing a panic when presented with such input. This issue has been patched via commit 085b7be.

Statistics

  • 1 Post

Last activity: 13 hours ago

Fediverse

Profile picture

๐ŸŸ  CVE-2026-22699 - High (7.5)

RustCrypto: Elliptic Curves is general purpose Elliptic Curve Cryptography (ECC) support, including types and traits for representing various elliptic curve forms, scalars, points, and public/secret keys composed thereof. In versions 0.14.0-pre.0 ...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

  • 0
  • 0
  • 0
  • 13h ago

Overview

  • libsodium
  • libsodium

31 Dec 2025
Published
07 Jan 2026
Updated

CVSS v3.1
MEDIUM (4.5)
EPSS
0.02%

KEV

Description

libsodium before ad3004e, in atypical use cases involving certain custom cryptography or untrusted data to crypto_core_ed25519_is_valid_point, mishandles checks for whether an elliptic curve point is valid because it sometimes allows points that aren't in the main cryptographic group.

Statistics

  • 1 Post

Last activity: 8 hours ago

Bluesky

Profile picture
๐Ÿšจ CVE-2025-69277 Alert: Critical flaw in libsodium crypto library (MAGEIA-2026-0004). Memory corruption issue affecting Mageia Linux. Patch to v1.0.20-2 immediately. Read more: ๐Ÿ‘‰ tinyurl.com/y9ndyvea #Mageia #Security
  • 0
  • 0
  • 0
  • 8h ago

Overview

  • urllib3
  • urllib3

19 Jun 2025
Published
22 Dec 2025
Updated

CVSS v3.1
MEDIUM (5.3)
EPSS
0.02%

KEV

Description

urllib3 is a user-friendly HTTP client library for Python. Prior to 2.5.0, it is possible to disable redirects for all requests by instantiating a PoolManager and specifying retries in a way that disable redirects. By default, requests and botocore users are not affected. An application attempting to mitigate SSRF or open redirect vulnerabilities by disabling redirects at the PoolManager level will remain vulnerable. This issue has been patched in version 2.5.0.

Statistics

  • 1 Post

Last activity: 16 hours ago

Bluesky

Profile picture
๐Ÿ” Lambda Watchdog detected that CVE-2025-50181 is no longer present in latest AWS Lambda base image scans. https://github.com/aws/aws-lambda-base-images/issues/285 #AWS #Lambda #Security #CVE #DevOps #SecOps
  • 0
  • 0
  • 0
  • 16h ago

Overview

  • DevToys-app
  • DevToys

10 Jan 2026
Published
10 Jan 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.04%

KEV

Description

DevToys is a desktop app for developers. In versions from 2.0.0.0 to before 2.0.9.0, a path traversal vulnerability exists in the DevToys extension installation mechanism. When processing extension packages (NUPKG archives), DevToys does not sufficiently validate file paths contained within the archive. A malicious extension package could include crafted file entries such as ../../โ€ฆ/target-file, causing the extraction process to write files outside the intended extensions directory. This flaw enables an attacker to overwrite arbitrary files on the userโ€™s system with the privileges of the DevToys process. Depending on the environment, this may lead to code execution, configuration tampering, or corruption of application or system files. This issue has been patched in version 2.0.9.0.

Statistics

  • 1 Post

Last activity: 13 hours ago

Fediverse

Profile picture

๐ŸŸ  CVE-2026-22685 - High (8.8)

DevToys is a desktop app for developers. In versions from 2.0.0.0 to before 2.0.9.0, a path traversal vulnerability exists in the DevToys extension installation mechanism. When processing extension packages (NUPKG archives), DevToys does not suffi...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

  • 0
  • 0
  • 0
  • 13h ago

Overview

  • haxtheweb
  • issues

10 Jan 2026
Published
10 Jan 2026
Updated

CVSS v3.1
HIGH (8.1)
EPSS
0.04%

KEV

Description

HAX CMS helps manage microsite universe with PHP or NodeJs backends. In versions 11.0.6 to before 25.0.0, HAX CMS is vulnerable to stored XSS, which could lead to account takeover. This issue has been patched in version 25.0.0.

Statistics

  • 1 Post

Last activity: 13 hours ago

Fediverse

Profile picture

๐ŸŸ  CVE-2026-22704 - High (8)

HAX CMS helps manage microsite universe with PHP or NodeJs backends. In versions 11.0.6 to before 25.0.0, HAX CMS is vulnerable to stored XSS, which could lead to account takeover. This issue has been patched in version 25.0.0.

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

  • 0
  • 0
  • 0
  • 13h ago

Overview

  • curl
  • curl

08 Jan 2026
Published
08 Jan 2026
Updated

CVSS
Pending
EPSS
0.03%

KEV

Description

When doing TLS related transfers with reused easy or multi handles and altering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally reuse a CA store cached in memory for which the partial chain option was reversed. Contrary to the user's wishes and expectations. This could make libcurl find and accept a trust chain that it otherwise would not.

Statistics

  • 1 Post

Last activity: 8 hours ago

Bluesky

Profile picture
๐Ÿšจ CRITICAL: #Mageia 9 cURL security patches address 4 CVEs including OpenSSL bypass (CVE-2025-14819) and bearer token leaks. Read more: ๐Ÿ‘‰ tinyurl.com/347psaa3 #Security
  • 0
  • 0
  • 0
  • 8h ago

Overview

  • xwiki-contrib
  • macro-fullcalendar

10 Jan 2026
Published
10 Jan 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
0.03%

KEV

Description

XWiki Full Calendar Macro displays objects from the wiki on the calendar. Prior to version 2.4.5, users with the right to view the Calendar.JSONService page (including guest users) can exploit a SQL injection vulnerability by accessing database info or starting a DoS attack. This issue has been patched in version 2.4.5.

Statistics

  • 1 Post

Last activity: 23 hours ago

Fediverse

Profile picture

๐Ÿ”ด CVE-2025-65091 - Critical (10)

XWiki Full Calendar Macro displays objects from the wiki on the calendar. Prior to version 2.4.5, users with the right to view the Calendar.JSONService page (including guest users) can exploit a SQL injection vulnerability by accessing database in...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

  • 0
  • 0
  • 0
  • 23h ago

Overview

  • expr-lang
  • expr

16 Dec 2025
Published
16 Dec 2025
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.07%

KEV

Description

Expr is an expression language and expression evaluation for Go. Prior to version 1.17.7, several builtin functions in Expr, including `flatten`, `min`, `max`, `mean`, and `median`, perform recursive traversal over user-provided data structures without enforcing a maximum recursion depth. If the evaluation environment contains deeply nested or cyclic data structures, these functions may recurse indefinitely until exceed the Go runtime stack limit. This results in a stack overflow panic, causing the host application to crash. While exploitability depends on whether an attacker can influence or inject cyclic or pathologically deep data into the evaluation environment, this behavior represents a denial-of-service (DoS) risk and affects overall library robustness. Instead of returning a recoverable evaluation error, the process may terminate unexpectedly. In affected versions, evaluation of expressions that invoke certain builtin functions on untrusted or insufficiently validated data structures can lead to a process-level crash due to stack exhaustion. This issue is most relevant in scenarios where Expr is used to evaluate expressions against externally supplied or dynamically constructed environments; cyclic references (directly or indirectly) can be introduced into arrays, maps, or structs; and there are no application-level safeguards preventing deeply nested input data. In typical use cases with controlled, acyclic data, the issue may not manifest. However, when present, the resulting panic can be used to reliably crash the application, constituting a denial of service. The issue has been fixed in the v1.17.7 versions of Expr. The patch introduces a maximum recursion depth limit for affected builtin functions. When this limit is exceeded, evaluation aborts gracefully and returns a descriptive error instead of panicking. Additionally, the maximum depth can be customized by users via `builtin.MaxDepth`, allowing applications with legitimate deep structures to raise the limit in a controlled manner. Users are strongly encouraged to upgrade to the patched release, which includes both the recursion guard and comprehensive test coverage to prevent regressions. For users who cannot immediately upgrade, some mitigations are recommended. Ensure that evaluation environments cannot contain cyclic references, validate or sanitize externally supplied data structures before passing them to Expr, and/or wrap expression evaluation with panic recovery to prevent a full process crash (as a last-resort defensive measure). These workarounds reduce risk but do not fully eliminate the issue without the patch.

Statistics

  • 1 Post

Last activity: 6 hours ago

Bluesky

Profile picture
๐Ÿšจ Security Advisory: openSUSE Tumbleweed has released a patch for CoreDNS (CVE-2025-68156). Rated MODERATE. Read more: ๐Ÿ‘‰ tinyurl.com/3vmrajpr #Security #OpenSUSE
  • 0
  • 0
  • 0
  • 6h ago
Showing 11 to 20 of 30 CVEs