24h | 7d | 30d

Overview

  • Enhancesoft
  • osTicket

12 Jan 2026
Published
22 Jan 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.23%

KEV

Description

Enhancesoft osTicket versions 1.18.x prior to 1.18.3 and 1.17.x prior to 1.17.7 contain an arbitrary file read vulnerability in the ticket PDF export functionality. A remote attacker can submit a ticket containing crafted rich-text HTML that includes PHP filter expressions which are insufficiently sanitized before being processed by the mPDF PDF generator during export. When the attacker exports the ticket to PDF, the generated PDF can embed the contents of attacker-selected files from the server filesystem as bitmap images, allowing disclosure of sensitive local files in the context of the osTicket application user. This issue is exploitable in default configurations where guests may create tickets and access ticket status, or where self-registration is enabled.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 14 hours ago

Bluesky

Profile picture
πŸ“Œ Critical osTicket Vulnerability (CVE-2026-22200) Enables Remote Code Execution via PHP Filters https://www.cyberhub.blog/article/18409-critical-osticket-vulnerability-cve-2026-22200-enables-remote-code-execution-via-php-filters
  • 0
  • 1
  • 0
  • 14h ago

Overview

  • MCP Manager for Claude Desktop
  • MCP Manager for Claude Desktop

23 Jan 2026
Published
23 Jan 2026
Updated

CVSS v3.0
HIGH (8.8)
EPSS
0.07%

KEV

Description

MCP Manager for Claude Desktop execute-command Command Injection Sandbox Escape Vulnerability. This vulnerability allows remote attackers to bypass the sandbox on affected installations of MCP Manager for Claude Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of MCP config objects. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to escape the sandbox and execute arbitrary code in the context of the current process at medium integrity. Was ZDI-CAN-27810.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 12 hours ago

Fediverse

Profile picture

🟠 CVE-2026-0757 - High (8.8)

MCP Manager for Claude Desktop execute-command Command Injection Sandbox Escape Vulnerability. This vulnerability allows remote attackers to bypass the sandbox on affected installations of MCP Manager for Claude Desktop. User interaction is requir...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

  • 0
  • 1
  • 1
  • 12h ago

Overview

  • moodle

23 Jan 2026
Published
23 Jan 2026
Updated

CVSS
Pending
EPSS
0.07%

KEV

Description

A flaw was found in Moodle. An attacker with access to the restore interface could trigger server-side execution of arbitrary code. This is due to insufficient validation of restore input, which leads to unintended interpretation by core restore routines. Successful exploitation could result in a full compromise of the Moodle application.

Statistics

  • 1 Post

Last activity: 17 hours ago

Fediverse

Profile picture

🟠 CVE-2025-67847 - High (8.8)

A flaw was found in Moodle. An attacker with access to the restore interface could trigger server-side execution of arbitrary code. This is due to insufficient validation of restore input, which leads to unintended interpretation by core restore r...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

  • 0
  • 0
  • 0
  • 17h ago

Overview

  • Apache Software Foundation
  • Apache Log4j Core
  • org.apache.logging.log4j:log4j-core

18 Dec 2025
Published
20 Jan 2026
Updated

CVSS
Pending
EPSS
0.24%

KEV

Description

The Socket Appender in Apache Log4j Core versions 2.0-beta9 through 2.25.2 does not perform TLS hostname verification of the peer certificate, even when the verifyHostName https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName configuration attribute or the log4j2.sslVerifyHostName https://logging.apache.org/log4j/2.x/manual/systemproperties.html#log4j2.sslVerifyHostName system property is set to true. This issue may allow a man-in-the-middle attacker to intercept or redirect log traffic under the following conditions: * The attacker is able to intercept or redirect network traffic between the client and the log receiver. * The attacker can present a server certificate issued by a certification authority trusted by the Socket Appender’s configured trust store (or by the default Java trust store if no custom trust store is configured). Users are advised to upgrade to Apache Log4j Core version 2.25.3, which addresses this issue. As an alternative mitigation, the Socket Appender may be configured to use a private or restricted trust root to limit the set of trusted certificates.

Statistics

  • 1 Post

Last activity: 11 hours ago

Bluesky

Profile picture
🚨 SECURITY UPDATE: #openSUSE has released a critical patch for Apache #Log4j. Advisory SUSE-SU-2026:0254-1 addresses CVE-2025-68161, a TLS hostname verification flaw rated MODERATE (CVSS 6.3). Read more: πŸ‘‰ tinyurl.com/4h6hwah9 #Security
  • 0
  • 0
  • 0
  • 11h ago

Overview

  • libxml2

08 Aug 2025
Published
08 Aug 2025
Updated

CVSS v4.0
MEDIUM (4.8)
EPSS
0.01%

KEV

Description

A vulnerability was found in libxml2 up to 2.14.5. It has been declared as problematic. This vulnerability affects the function xmlParseSGMLCatalog of the component xmlcatalog. The manipulation leads to uncontrolled recursion. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The code maintainer explains, that "[t]he issue can only be triggered with untrusted SGML catalogs and it makes absolutely no sense to use untrusted catalogs. I also doubt that anyone is still using SGML catalogs at all."

Statistics

  • 1 Post

Last activity: 10 hours ago

Bluesky

Profile picture
🚨 New LOW CVE detected in AWS Lambda 🚨 CVE-2025-8732 impacts libxml2 in 27 Lambda base images. Details: https://github.com/aws/aws-lambda-base-images/issues/382 More: https://lambdawatchdog.com/ #AWS #Lambda #CVE #CloudSecurity #Serverless
  • 0
  • 0
  • 0
  • 10h ago

Overview

  • GPT Academic
  • GPT Academic

23 Jan 2026
Published
23 Jan 2026
Updated

CVSS v3.0
CRITICAL (9.8)
EPSS
1.30%

KEV

Description

GPT Academic run_in_subprocess_wrapper_func Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GPT Academic. Authentication is not required to exploit this vulnerability. The specific flaw exists within the run_in_subprocess_wrapper_func function. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-27958.

Statistics

  • 2 Posts

Last activity: 16 hours ago

Fediverse

Profile picture

πŸ”΄ CVE-2026-0763 - Critical (9.8)

GPT Academic run_in_subprocess_wrapper_func Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GPT Academic. Authentication is no...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

  • 0
  • 0
  • 1
  • 16h ago

Overview

  • Ollama MCP Server
  • Ollama MCP Server

23 Jan 2026
Published
23 Jan 2026
Updated

CVSS v3.0
CRITICAL (9.8)
EPSS
1.00%

KEV

Description

Ollama MCP Server execAsync Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ollama MCP Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the execAsync method. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-27683.

Statistics

  • 1 Post

Last activity: 9 hours ago

Fediverse

Profile picture

πŸ”΄ CVE-2025-15063 - Critical (9.8)

Ollama MCP Server execAsync Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ollama MCP Server. Authentication is not required to exploit this ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

  • 0
  • 0
  • 0
  • 9h ago

Overview

  • Dell
  • ObjectScale

23 Jan 2026
Published
23 Jan 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.02%

KEV

Description

Dell ECS, versions 3.8.1.0 through 3.8.1.7, and Dell ObjectScale versions prior to 4.2.0.0, contains a Cleartext Transmission of Sensitive Information vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to information exposure.

Statistics

  • 1 Post

Last activity: 12 hours ago

Fediverse

Profile picture

🟠 CVE-2026-22271 - High (7.5)

Dell ECS, versions 3.8.1.0 through 3.8.1.7, and Dell ObjectScale versions prior to 4.2.0.0, contains a Cleartext Transmission of Sensitive Information vulnerability. An unauthenticated attacker with remote access could potentially exploit this vul...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

  • 0
  • 0
  • 0
  • 12h ago

Overview

  • Pending

23 Jan 2026
Published
23 Jan 2026
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

Null pointer dereference in free5gc pcf 1.4.0 in file internal/sbi/processor/ampolicy.go in function HandleDeletePoliciesPolAssoId.

Statistics

  • 1 Post

Last activity: 2 hours ago

Fediverse

Profile picture

🟠 CVE-2025-66720 - High (7.5)

Null pointer dereference in free5gc pcf 1.4.0 in file internal/sbi/processor/ampolicy.go in function HandleDeletePoliciesPolAssoId.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

  • 0
  • 0
  • 0
  • 2h ago

Overview

  • lxc
  • incus

22 Jan 2026
Published
22 Jan 2026
Updated

CVSS v3.1
HIGH (8.7)
EPSS
0.09%

KEV

Description

Incus is a system container and virtual machine manager. Versions 6.21.0 and below allow a user with the ability to launch a container with a custom image (e.g a member of the β€˜incus’ group) to use directory traversal or symbolic links in the templating functionality to achieve host arbitrary file read, and host arbitrary file write. This ultimately results in arbitrary command execution on the host. When using an image with a metadata.yaml containing templates, both the source and target paths are not checked for symbolic links or directory traversal. This can also be exploited in IncusOS. A fix is planned for versions 6.0.6 and 6.21.0, but they have not been released at the time of publication.

Statistics

  • 1 Post

Last activity: 23 hours ago

Fediverse

Profile picture

🟠 CVE-2026-23954 - High (8.7)

Incus is a system container and virtual machine manager. Versions 6.21.0 and below allow a user with the ability to launch a container with a custom image (e.g a member of the β€˜incus’ group) to use directory traversal or symbolic links in the ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

  • 0
  • 0
  • 0
  • 23h ago
Showing 11 to 20 of 102 CVEs