24h | 7d | 30d

Overview

  • Oracle Corporation
  • Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in

20 Jan 2026
Published
28 Jan 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
0.04%

KEV

Description

Vulnerability in the Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in product of Oracle Fusion Middleware (component: Weblogic Server Proxy Plug-in for Apache HTTP Server, Weblogic Server Proxy Plug-in for IIS). Supported versions that are affected are 12.2.1.4.0, 14.1.1.0.0 and 14.1.2.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in. While the vulnerability is in Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in accessible data as well as unauthorized access to critical data or complete access to all Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in accessible data. Note: Affected version for Weblogic Server Proxy Plug-in for IIS is 12.2.1.4.0 only. CVSS 3.1 Base Score 10.0 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N).

Statistics

  • 2 Posts

Last activity: 14 hours ago

Fediverse

Profile picture

Odd WebLogic Request. Possible CVE-2026-21962 Exploit Attempt or AI Slop? isc.sans.edu/diary/rss/32662

  • 0
  • 0
  • 0
  • 14h ago

Bluesky

Profile picture
Odd WebLogic Request. Possible CVE-2026-21962 Exploit Attempt or AI Slop? https://isc.sans.edu/diary/32662
  • 0
  • 0
  • 0
  • 19h ago

Overview

  • SolarWinds
  • Web Help Desk

28 Jan 2026
Published
29 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.05%

KEV

Description

SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.

Statistics

  • 3 Posts

Last activity: 3 hours ago

Fediverse

Profile picture

🚹 2 critical authentication bypass and remote command execution vulnerabilities in Solarwinds WHD have been disclosed.

Vulnerability detection scripts can be found below:
CVE-2025-40552:
github.com/rxerium/rxerium-tem

CVE-2025-40554:
github.com/rxerium/rxerium-tem

At the time of writing there are no signs of active exploitation in the wild but it is strongly recommended that you patch as per Solarwind's security advisory:
documentation.solarwinds.com/e

  • 0
  • 0
  • 0
  • 3h ago
Profile picture

SolarWinds has just announced four high-severity vulnerabilities in its Web Help Desk (WHD) software that could lead to full system takeover.

These flaws include unauthenticated Remote Code Execution (RCE) via insecure deserialization and multiple Authentication Bypasses, allowing attackers to execute protected methods without any credentials.

CVE-2025-40551 & CVE-2025-40553 (Unauthenticated RCE)
CVE-2025-40552 & CVE-2025-40554 (Auth Bypass)

thehackerwire.com/solarwinds-p

  • 0
  • 0
  • 0
  • 12h ago

Bluesky

Profile picture
SolarWinds Web Help Desk Authentication Bypass Vulnerability (CVE-2025-40552) URL: www.solarwinds.com/trust-center... Classification: Critical, Solution: Official Fix, Exploit Maturity: Not Defined, CVSSv3.1: 9.8
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • SolarWinds
  • Web Help Desk

28 Jan 2026
Published
29 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.03%

KEV

Description

SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.

Statistics

  • 3 Posts

Last activity: 3 hours ago

Fediverse

Profile picture

🚹 2 critical authentication bypass and remote command execution vulnerabilities in Solarwinds WHD have been disclosed.

Vulnerability detection scripts can be found below:
CVE-2025-40552:
github.com/rxerium/rxerium-tem

CVE-2025-40554:
github.com/rxerium/rxerium-tem

At the time of writing there are no signs of active exploitation in the wild but it is strongly recommended that you patch as per Solarwind's security advisory:
documentation.solarwinds.com/e

  • 0
  • 0
  • 0
  • 3h ago
Profile picture

SolarWinds has just announced four high-severity vulnerabilities in its Web Help Desk (WHD) software that could lead to full system takeover.

These flaws include unauthenticated Remote Code Execution (RCE) via insecure deserialization and multiple Authentication Bypasses, allowing attackers to execute protected methods without any credentials.

CVE-2025-40551 & CVE-2025-40553 (Unauthenticated RCE)
CVE-2025-40552 & CVE-2025-40554 (Auth Bypass)

thehackerwire.com/solarwinds-p

  • 0
  • 0
  • 0
  • 12h ago

Bluesky

Profile picture
SolarWinds Web Help Desk Authentication Bypass Vulnerability (CVE-2025-40554) Download PDF URL: www.solarwinds.com/trust-center... Classification: Critical, Solution: Official Fix, Exploit Maturity: Not Defined, CVSSv3.1: 9.8
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • Xen
  • Xen

28 Jan 2026
Published
28 Jan 2026
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

Shadow mode tracing code uses a set of per-CPU variables to avoid cumbersome parameter passing. Some of these variables are written to with guest controlled data, of guest controllable size. That size can be larger than the variable, and bounding of the writes was missing.

Statistics

  • 2 Posts

Last activity: 17 hours ago

Fediverse

Profile picture

🟠 CVE-2025-58150 - High (8.8)

Shadow mode tracing code uses a set of per-CPU variables to avoid
cumbersome parameter passing. Some of these variables are written to
with guest controlled data, of guest controllable size. That size can
be larger than the variable, and boundin...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

  • 0
  • 0
  • 0
  • 17h ago

Bluesky

Profile picture
URGENT: #openSUSE Leap 15.6 users must patch Xen hypervisor vulnerabilities CVE-2025-58150 (buffer overrun) and CVE-2026-23553 (incomplete IBPB). Read more: 👉 tinyurl.com/3yvpza8s #Security
  • 0
  • 0
  • 0
  • 17h ago

Overview

  • n8n

18 Jan 2026
Published
23 Jan 2026
Updated

CVSS v3.1
HIGH (8.5)
EPSS
0.06%

KEV

Description

Using string formatting and exception handling, an attacker may bypass n8n's python-task-executor sandbox restrictions and run arbitrary unrestricted Python code in the underlying operating system. The vulnerability can be exploited via the Code block by an authenticated user with basic permissions and can lead to a full n8n instance takeover on instances operating under "Internal" execution mode. If the instance is operating under the "External" execution mode (ex. n8n's official Docker image) - arbitrary code execution occurs inside a Sidecar container and not the main node, which significantly reduces the vulnerability impact.

Statistics

  • 3 Posts

Last activity: Last hour

Fediverse

Profile picture

🚹 2 new vulnerability scripts created for the n8n vulnerabilities disclosed today:

CVE-2026-1470:
github.com/rxerium/rxerium-tem

CVE-2026-0863:
github.com/rxerium/rxerium-tem

Happy hunting.

  • 0
  • 0
  • 0
  • 3h ago
Profile picture

n8n – CVE-2026-1470 et CVE-2026-0863 : deux nouvelles failles patchĂ©es, comment se protĂ©ger ? it-connect.fr/n8n-cve-2026-147 #ActuCybersĂ©curitĂ© #CybersĂ©curitĂ© #VulnĂ©rabilitĂ©

  • 0
  • 0
  • 0
  • Last hour

Bluesky

Profile picture
n8n - CVE-2026-1470 et CVE-2026-0863 : deux nouvelles failles patchĂ©es, comment se protĂ©ger ? 👇 Les dĂ©tails dans l'article de Florian : - www.it-connect.fr/n8n-cve-2026... #n8n #infosec #cybersecurite
  • 0
  • 0
  • 0
  • 4h ago

Overview

  • SolarWinds
  • Web Help Desk

28 Jan 2026
Published
29 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.65%

KEV

Description

SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

Statistics

  • 2 Posts

Last activity: 3 hours ago

Fediverse

Profile picture

SolarWinds has just announced four high-severity vulnerabilities in its Web Help Desk (WHD) software that could lead to full system takeover.

These flaws include unauthenticated Remote Code Execution (RCE) via insecure deserialization and multiple Authentication Bypasses, allowing attackers to execute protected methods without any credentials.

CVE-2025-40551 & CVE-2025-40553 (Unauthenticated RCE)
CVE-2025-40552 & CVE-2025-40554 (Auth Bypass)

thehackerwire.com/solarwinds-p

  • 0
  • 0
  • 0
  • 12h ago

Bluesky

Profile picture
SolarWinds Web Help Desk Deserialization of Untrusted Data Remote Code Execution Vulnerability (CVE-2025-40553) URL: www.solarwinds.com/trust-center... Classification: Critical, Solution: Official Fix, Exploit Maturity: Not Defined, CVSSv3.1: 9.8
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • symfony
  • symfony

28 Jan 2026
Published
28 Jan 2026
Updated

CVSS v3.1
MEDIUM (6.3)
EPSS
Pending

KEV

Description

Symfony is a PHP framework for web and console applications and a set of reusable PHP components. Prior to versions 5.4.51, 6.4.33, 7.3.11, 7.4.5, and 8.0.5, the Symfony Process component did not correctly treat some characters (notably `=`) as “special” when escaping arguments on Windows. When PHP is executed from an MSYS2-based environment (e.g. Git Bash) and Symfony Process spawns native Windows executables, MSYS2’s argument/path conversion can mis-handle unquoted arguments containing these characters. This can cause the spawned process to receive corrupted/truncated arguments compared to what Symfony intended. If an application (or tooling such as Composer scripts) uses Symfony Process to invoke file-management commands (e.g. `rmdir`, `del`, etc.) with a path argument containing `=`, the MSYS2 conversion layer may alter the argument at runtime. In affected setups this can result in operations being performed on an unintended path, up to and including deletion of the contents of a broader directory or drive. The issue is particularly relevant when untrusted input can influence process arguments (directly or indirectly, e.g. via repository paths, extracted archive paths, temporary directories, or user-controlled configuration). Versions 5.4.51, 6.4.33, 7.3.11, 7.4.5, and 8.0.5 contains a patch for the issue. Some workarounds are available. Avoid running PHP/one's own tooling from MSYS2-based shells on Windows; prefer cmd.exe or PowerShell for workflows that spawn native executables. Avoid passing paths containing `=` (and similar MSYS2-sensitive characters) to Symfony Process when operating under Git Bash/MSYS2. Where applicable, configure MSYS2 to disable or restrict argument conversion (e.g. via `MSYS2_ARG_CONV_EXCL`), understanding this may affect other tooling behavior.

Statistics

  • 2 Posts
  • 4 Interactions

Last activity: 23 hours ago

Fediverse

Profile picture

🔐 CVE-2026-24739: Incorrect argument escaping under MSYS2/Git Bash on Windows can lead to destructive file operations
âžĄïž symfony.com/blog/cve-2026-2473

  • 1
  • 3
  • 1
  • 23h ago

Overview

  • nmedia
  • Frontend File Manager Plugin

28 Jan 2026
Published
28 Jan 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.04%

KEV

Description

The Frontend File Manager Plugin for WordPress is vulnerable to unauthorized file sharing due to a missing capability check on the 'wpfm_send_file_in_email' AJAX action in all versions up to, and including, 23.5. This makes it possible for unauthenticated attackers to share arbitrary uploaded files via email by supplying a file ID. Since file IDs are sequential integers, attackers can enumerate all uploaded files on the site and exfiltrate sensitive data that was intended to be restricted to administrators only.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 22 hours ago

Fediverse

Profile picture

🟠 CVE-2026-1280 - High (7.5)

The Frontend File Manager Plugin for WordPress is vulnerable to unauthorized file sharing due to a missing capability check on the 'wpfm_send_file_in_email' AJAX action in all versions up to, and including, 23.5. This makes it possible for unauthe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

  • 1
  • 0
  • 0
  • 22h ago

Overview

  • OpenSSL
  • OpenSSL

27 Jan 2026
Published
28 Jan 2026
Updated

CVSS
Pending
EPSS
0.03%

KEV

Description

Issue summary: A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file. Impact summary: An application calling TS_RESP_verify_response() with a malformed TimeStamp Response can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service. The functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2() access the signing cert attribute value without validating its type. When the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash. Exploiting this vulnerability requires an attacker to provide a malformed TimeStamp Response to an application that verifies timestamp responses. The TimeStamp protocol (RFC 3161) is not widely used and the impact of the exploit is just a Denial of Service. For these reasons the issue was assessed as Low severity. The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the TimeStamp Response implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue. OpenSSL 1.0.2 is not affected by this issue.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 8 hours ago

Fediverse

Profile picture

🟠 CVE-2025-69420 - High (7.5)

Issue summary: A type confusion vulnerability exists in the TimeStamp Response
verification code where an ASN1_TYPE union member is accessed without first
validating the type, causing an invalid or NULL pointer dereference when
processing a malfor...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

  • 0
  • 0
  • 0
  • 8h ago
Profile picture

‌AISLE Goes 12-for-12 on OpenSSL Vulnerability Detection

CVEs Published: January 27th, 2026

High and Moderate Severity Flaws:

â–ȘCVE-2025-15467: Stack Buffer Overflow in CMS AuthEnvelopedData Parsing (High): A vulnerability with the potential to enable remote code execution under specific conditions

â–ȘCVE-2025-11187: PBMAC1 Parameter Validation in PKCS#12 (Moderate): Missing validation that could trigger a stack-based buffer overflow

Low Severity Flaws:

â–ȘCVE-2025-15468: Crash in QUIC protocol cipher handling
â–ȘCVE-2025-15469: Silent truncation bug affecting post-quantum signature algorithms (ML-DSA)
â–ȘCVE-2025-66199: Memory exhaustion via TLS 1.3 certificate compression
â–ȘCVE-2025-68160: Memory corruption in line-buffering (affects code back to OpenSSL 1.0.2)
â–ȘCVE-2025-69418: Encryption flaw in OCB mode on hardware-accelerated paths
â–ȘCVE-2025-69419: Memory corruption in PKCS#12 character encoding
â–ȘCVE-2025-69420: Crash in TimeStamp Response verification
â–ȘCVE-2025-69421: Crash in PKCS#12 decryption
â–ȘCVE-2026-22795: Crash in PKCS#12 parsing
â–ȘCVE-2026-22796: Crash in PKCS#7 signature verification (affects code back to OpenSSL 1.0.2)

"When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs.

Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."

Writeup: aisle.com/blog/aisle-discovere

  • 0
  • 1
  • 0
  • 10h ago

Overview

  • VMware vCenter Server

18 Jun 2024
Published
24 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
79.02%

Description

vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 18 hours ago

Bluesky

Profile picture
VMware vCenter Server ciblé par CVE-2024-37079, la CISA confirme une exploitation active - IT SOCIAL itsocial.fr/cybersecurit...
  • 0
  • 3
  • 0
  • 18h ago
Showing 11 to 20 of 78 CVEs