24h | 7d | 30d

Overview

  • Google
  • Chrome

13 Feb 2026
Published
14 Feb 2026
Updated

CVSS
Pending
EPSS
0.04%

KEV

Description

Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

Statistics

  • 1 Post

Last activity: 1 hour ago

Bluesky

Profile picture fallback
Google、Chrome へ緊急アップデート、CSSのUse-after-freeの脆弱性を修正(CVE-2026-2441)既に悪用確認 rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #セキュリティ #Security #CybersecurityNews
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • Micca Auto Electronics Co., Ltd.
  • Car Alarm System KE700

15 Feb 2026
Published
15 Feb 2026
Updated

CVSS v4.0
HIGH (8.4)
EPSS
0.02%

KEV

Description

The Micca KE700 system contains flawed resynchronization logic and is vulnerable to replay attacks. This attack requires sending two previously captured codes in a specific sequence. As a result, the system can be forced to accept previously used (stale) rolling codes and execute a command. Successful exploitation allows an attacker to clone the alarm key. This grants the attacker unauthorized access to the vehicle to unlock or lock the doors.

Statistics

  • 1 Post

Last activity: 17 hours ago

Fediverse

Profile picture fallback

🚨 CVE-2026-2540 (HIGH, CVSS 8.4): Micca KE700 car alarms are vulnerable to replay attacks via flawed resynchronization. Attackers can clone keys to lock/unlock vehicles. No patch available — review mitigations. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 17h ago

Overview

  • kovidgoyal
  • calibre

06 Feb 2026
Published
06 Feb 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.01%

KEV

Description

calibre is an e-book manager. Prior to 9.2.0, a Server-Side Template Injection (SSTI) vulnerability in Calibre's Templite templating engine allows arbitrary code execution when a user converts an ebook using a malicious custom template file via the --template-html or --template-html-index command-line options. This vulnerability is fixed in 9.2.0.

Statistics

  • 1 Post

Last activity: 12 hours ago

Bluesky

Profile picture fallback
calibre: apply fix for CVE-2026-25731 and CVE-2026-25635 https://github.com/NixOS/nixpkgs/pull/490066 #security
  • 0
  • 0
  • 0
  • 12h ago

Overview

  • kovidgoyal
  • calibre

06 Feb 2026
Published
11 Feb 2026
Updated

CVSS v3.1
HIGH (8.6)
EPSS
0.06%

KEV

Description

calibre is an e-book manager. Prior to 9.2.0, Calibre's CHM reader contains a path traversal vulnerability that allows arbitrary file writes anywhere the user has write permissions. On Windows (haven't tested on other OS's), this can lead to Remote Code Execution by writing a payload to the Startup folder, which executes on next login. This vulnerability is fixed in 9.2.0.

Statistics

  • 1 Post

Last activity: 12 hours ago

Bluesky

Profile picture fallback
calibre: apply fix for CVE-2026-25731 and CVE-2026-25635 https://github.com/NixOS/nixpkgs/pull/490066 #security
  • 0
  • 0
  • 0
  • 12h ago

Overview

  • TP-Link
  • Omada ER605

23 May 2024
Published
01 Aug 2024
Updated

CVSS v3.0
HIGH (7.5)
EPSS
1.74%

KEV

Description

TP-Link Omada ER605 Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Omada ER605 routers. Authentication is not required to exploit this vulnerability. However, devices are vulnerable only if configured to use the Comexe DDNS service. The specific flaw exists within the handling of DDNS error codes. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-22522.

Statistics

  • 1 Post

Last activity: 20 hours ago

Bluesky

Profile picture fallback
TP-Link ER605 DDNS Pre-Auth RCE: Chaining CVE-2024-5242, CVE-2024-5243, CVE-2024-5244 :: Out of Bounds
  • 0
  • 0
  • 0
  • 20h ago

Overview

  • TP-Link
  • Omada ER605

23 May 2024
Published
01 Aug 2024
Updated

CVSS v3.0
HIGH (7.5)
EPSS
1.74%

KEV

Description

TP-Link Omada ER605 Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Omada ER605 routers. Authentication is not required to exploit this vulnerability. However, devices are vulnerable only if configured to use the Comexe DDNS service. The specific flaw exists within the handling of DNS names. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-22523.

Statistics

  • 1 Post

Last activity: 20 hours ago

Bluesky

Profile picture fallback
TP-Link ER605 DDNS Pre-Auth RCE: Chaining CVE-2024-5242, CVE-2024-5243, CVE-2024-5244 :: Out of Bounds
  • 0
  • 0
  • 0
  • 20h ago

Overview

  • TP-Link
  • Omada ER605

23 May 2024
Published
01 Aug 2024
Updated

CVSS v3.0
MEDIUM (5.0)
EPSS
0.08%

KEV

Description

TP-Link Omada ER605 Reliance on Security Through Obscurity Vulnerability. This vulnerability allows network-adjacent attackers to access or spoof DDNS messages on affected installations of TP-Link Omada ER605 routers. Authentication is not required to exploit this vulnerability. However, devices are vulnerable only if configured to use the Comexe DDNS service. The specific flaw exists within the cmxddnsd executable. The issue results from reliance on obscurity to secure network data. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-22439.

Statistics

  • 1 Post

Last activity: 20 hours ago

Bluesky

Profile picture fallback
TP-Link ER605 DDNS Pre-Auth RCE: Chaining CVE-2024-5242, CVE-2024-5243, CVE-2024-5244 :: Out of Bounds
  • 0
  • 0
  • 0
  • 20h ago
Showing 21 to 27 of 27 CVEs