Overview
Description
Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
Statistics
- 1 Post
Last activity: 1 hour ago
Overview
- Micca Auto Electronics Co., Ltd.
- Car Alarm System KE700
15 Feb 2026
Published
15 Feb 2026
Updated
CVSS v4.0
HIGH (8.4)
EPSS
0.02%
KEV
Description
The Micca KE700 system contains flawed resynchronization logic and is vulnerable to replay attacks. This attack requires sending two previously captured codes in a specific sequence. As a result, the system can be forced to accept previously used (stale) rolling codes and execute a command. Successful exploitation allows an attacker to clone the alarm key. This grants the attacker unauthorized access to the vehicle to unlock or lock the doors.
Statistics
- 1 Post
Last activity: 17 hours ago
Fediverse
🚨 CVE-2026-2540 (HIGH, CVSS 8.4): Micca KE700 car alarms are vulnerable to replay attacks via flawed resynchronization. Attackers can clone keys to lock/unlock vehicles. No patch available — review mitigations. https://radar.offseq.com/threat/cve-2026-2540-cwe-288-authentication-bypass-using--06adb1fa #OffSeq #CarSecurity #Vuln
Overview
- kovidgoyal
- calibre
06 Feb 2026
Published
06 Feb 2026
Updated
CVSS v3.1
HIGH (7.8)
EPSS
0.01%
KEV
Description
calibre is an e-book manager. Prior to 9.2.0, a Server-Side Template Injection (SSTI) vulnerability in Calibre's Templite templating engine allows arbitrary code execution when a user converts an ebook using a malicious custom template file via the --template-html or --template-html-index command-line options. This vulnerability is fixed in 9.2.0.
Statistics
- 1 Post
Last activity: 12 hours ago
Overview
- kovidgoyal
- calibre
06 Feb 2026
Published
11 Feb 2026
Updated
CVSS v3.1
HIGH (8.6)
EPSS
0.06%
KEV
Description
calibre is an e-book manager. Prior to 9.2.0, Calibre's CHM reader contains a path traversal vulnerability that allows arbitrary file writes anywhere the user has write permissions. On Windows (haven't tested on other OS's), this can lead to Remote Code Execution by writing a payload to the Startup folder, which executes on next login. This vulnerability is fixed in 9.2.0.
Statistics
- 1 Post
Last activity: 12 hours ago
Overview
- TP-Link
- Omada ER605
23 May 2024
Published
01 Aug 2024
Updated
CVSS v3.0
HIGH (7.5)
EPSS
1.74%
KEV
Description
TP-Link Omada ER605 Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Omada ER605 routers. Authentication is not required to exploit this vulnerability. However, devices are vulnerable only if configured to use the Comexe DDNS service.
The specific flaw exists within the handling of DDNS error codes. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-22522.
Statistics
- 1 Post
Last activity: 20 hours ago
Overview
- TP-Link
- Omada ER605
23 May 2024
Published
01 Aug 2024
Updated
CVSS v3.0
HIGH (7.5)
EPSS
1.74%
KEV
Description
TP-Link Omada ER605 Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Omada ER605 routers. Authentication is not required to exploit this vulnerability. However, devices are vulnerable only if configured to use the Comexe DDNS service.
The specific flaw exists within the handling of DNS names. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-22523.
Statistics
- 1 Post
Last activity: 20 hours ago
Overview
- TP-Link
- Omada ER605
23 May 2024
Published
01 Aug 2024
Updated
CVSS v3.0
MEDIUM (5.0)
EPSS
0.08%
KEV
Description
TP-Link Omada ER605 Reliance on Security Through Obscurity Vulnerability. This vulnerability allows network-adjacent attackers to access or spoof DDNS messages on affected installations of TP-Link Omada ER605 routers. Authentication is not required to exploit this vulnerability. However, devices are vulnerable only if configured to use the Comexe DDNS service.
The specific flaw exists within the cmxddnsd executable. The issue results from reliance on obscurity to secure network data. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-22439.
Statistics
- 1 Post
Last activity: 20 hours ago