Overview
- Red Hat
- Red Hat Enterprise Linux 10
- bootc
27 Jan 2026
Published
03 Feb 2026
Updated
CVSS
Pending
EPSS
0.04%
KEV
Description
A flaw was found in the GLib Base64 encoding routine when processing very large input data. Due to incorrect use of integer types during length calculation, the library may miscalculate buffer boundaries. This can cause memory writes outside the allocated buffer. Applications that process untrusted or extremely large Base64 input using GLib may crash or behave unpredictably.
Statistics
- 1 Post
Last activity: 9 hours ago
Overview
- Unstructured-IO
- unstructured
04 Feb 2026
Published
04 Feb 2026
Updated
CVSS v3.1
CRITICAL (9.8)
EPSS
0.06%
KEV
Description
The unstructured library provides open-source components for ingesting and pre-processing images and text documents, such as PDFs, HTML, Word docs, and many more. Prior to version 0.18.18, a path traversal vulnerability in the partition_msg function allows an attacker to write or overwrite arbitrary files on the filesystem when processing malicious MSG files with attachments. This issue has been patched in version 0.18.18.
Statistics
- 1 Post
Last activity: Last hour
Overview
- Go toolchain
- cmd/go
- cmd/go
28 Jan 2026
Published
29 Jan 2026
Updated
CVSS
Pending
EPSS
0.01%
KEV
Description
Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The "#cgo pkg-config:" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a "--log-file" argument to this directive, causing pkg-config to write to an attacker-controlled location.
Statistics
- 1 Post
Last activity: 12 hours ago
Overview
Description
Heap buffer overflow in libvpx in Google Chrome prior to 144.0.7559.132 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Statistics
- 1 Post
Last activity: 7 hours ago
Overview
Description
Type Confusion in V8 in Google Chrome prior to 144.0.7559.132 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Statistics
- 1 Post
Last activity: 7 hours ago
Overview
- TP-Link
- Omada ER605
23 May 2024
Published
01 Aug 2024
Updated
CVSS v3.0
MEDIUM (5.0)
EPSS
0.08%
KEV
Description
TP-Link Omada ER605 Reliance on Security Through Obscurity Vulnerability. This vulnerability allows network-adjacent attackers to access or spoof DDNS messages on affected installations of TP-Link Omada ER605 routers. Authentication is not required to exploit this vulnerability. However, devices are vulnerable only if configured to use the Comexe DDNS service.
The specific flaw exists within the cmxddnsd executable. The issue results from reliance on obscurity to secure network data. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-22439.
Statistics
- 2 Posts
- 3 Interactions
Last activity: 11 hours ago
Fediverse
TP-Link ER605 DDNS Pre-Auth RCE: Chaining CVE-2024-5242, CVE-2024-5243, CVE-2024-5244:
https://oobs.io/posts/er605-1day-exploit/
#exploit #vulnerability #rce #informationsecurity #cybersecurity #infosec
Overview
- TP-Link
- Omada ER605
23 May 2024
Published
01 Aug 2024
Updated
CVSS v3.0
HIGH (7.5)
EPSS
1.74%
KEV
Description
TP-Link Omada ER605 Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Omada ER605 routers. Authentication is not required to exploit this vulnerability. However, devices are vulnerable only if configured to use the Comexe DDNS service.
The specific flaw exists within the handling of DDNS error codes. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-22522.
Statistics
- 2 Posts
- 3 Interactions
Last activity: 11 hours ago
Fediverse
TP-Link ER605 DDNS Pre-Auth RCE: Chaining CVE-2024-5242, CVE-2024-5243, CVE-2024-5244:
https://oobs.io/posts/er605-1day-exploit/
#exploit #vulnerability #rce #informationsecurity #cybersecurity #infosec
Overview
- TP-Link
- Omada ER605
23 May 2024
Published
01 Aug 2024
Updated
CVSS v3.0
HIGH (7.5)
EPSS
1.74%
KEV
Description
TP-Link Omada ER605 Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Omada ER605 routers. Authentication is not required to exploit this vulnerability. However, devices are vulnerable only if configured to use the Comexe DDNS service.
The specific flaw exists within the handling of DNS names. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-22523.
Statistics
- 2 Posts
- 3 Interactions
Last activity: 11 hours ago
Fediverse
TP-Link ER605 DDNS Pre-Auth RCE: Chaining CVE-2024-5242, CVE-2024-5243, CVE-2024-5244:
https://oobs.io/posts/er605-1day-exploit/
#exploit #vulnerability #rce #informationsecurity #cybersecurity #infosec