24h | 7d | 30d

Overview

  • Google
  • Android

15 Jan 2026
Published
28 Jan 2026
Updated

CVSS
Pending
EPSS
0.00%

KEV

Description

In key-based pairing, there is a possible ID due to a logic error in the code. This could lead to remote (proximal/adjacent) information disclosure of user's conversations and location with no additional execution privileges needed. User interaction is not needed for exploitation.

Statistics

  • 1 Post

Last activity: 22 hours ago

Bluesky

Profile picture
📢 WhisperPair (CVE-2025-36911) : des écouteurs Bluetooth détournés en balises de suivi 📝 Selon Kaspersky, des chercheurs de l’université UCLouvain ont dé… https://cyberveille.ch/posts/2026-01-31-whisperpair-cve-2025-36911-des-ecouteurs-bluetooth-detournes-en-balises-de-suivi/ #Bluetooth #Cyberveille
  • 0
  • 0
  • 0
  • 22h ago

Overview

  • The GNU C Library
  • glibc

14 Jan 2026
Published
16 Jan 2026
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption. Note that the attacker must have control over both, the size as well as the alignment arguments of the memalign function to be able to exploit this. The size parameter must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument. This limits the malicious inputs for the alignment for memalign to the range [1<<62+ 1, 1<<63] and exactly 1<<63 for posix_memalign and aligned_alloc. Typically the alignment argument passed to such functions is a known constrained quantity (e.g. page size, block size, struct sizes) and is not attacker controlled, because of which this may not be easily exploitable in practice. An application bug could potentially result in the input alignment being too large, e.g. due to a different buffer overflow or integer overflow in the application or its dependent libraries, but that is again an uncommon usage pattern given typical sources of alignments.

Statistics

  • 1 Post

Last activity: 23 hours ago

Bluesky

Profile picture
🔒 URGENT SYSTEM ADMIN ALERT: Critical glibc security update for Rocky Linux 10 patches two dangerous vulnerabilities (CVE-2026-0861 & CVE-2026-0915). Read more:👉 tinyurl.com/2p8ycrey #Rocky_Linux #Security
  • 0
  • 0
  • 0
  • 23h ago

Overview

  • Ivanti
  • Endpoint Manager Mobile

29 Jan 2026
Published
30 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.16%

KEV

Description

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

Statistics

  • 1 Post

Last activity: 15 hours ago

Bluesky

Profile picture
Operation Midnight Tether: How Attackers Are Weaponizing Ivanti’s EPMM Zero-Days and Your 5-Step Cyber Triage Plan + Video Introduction: Two critical, unauthenticated remote code execution (RCE) vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2026-1281 and CVE-2026-1340,…
  • 0
  • 0
  • 0
  • 15h ago

Overview

  • n8n

18 Jan 2026
Published
23 Jan 2026
Updated

CVSS v3.1
HIGH (8.5)
EPSS
0.06%

KEV

Description

Using string formatting and exception handling, an attacker may bypass n8n's python-task-executor sandbox restrictions and run arbitrary unrestricted Python code in the underlying operating system. The vulnerability can be exploited via the Code block by an authenticated user with basic permissions and can lead to a full n8n instance takeover on instances operating under "Internal" execution mode. If the instance is operating under the "External" execution mode (ex. n8n's official Docker image) - arbitrary code execution occurs inside a Sidecar container and not the main node, which significantly reduces the vulnerability impact.

Statistics

  • 1 Post

Last activity: 22 hours ago

Bluesky

Profile picture
📌 Critical Vulnerabilities Patched in *n8n* Automation Tool: CVE-2026-1470 and CVE-2026-0863 https://www.cyberhub.blog/article/18863-critical-vulnerabilities-patched-in-n8n-automation-tool-cve-2026-1470-and-cve-2026-0863
  • 0
  • 0
  • 0
  • 22h ago

Overview

  • The GNU C Library
  • glibc

15 Jan 2026
Published
20 Jan 2026
Updated

CVSS
Pending
EPSS
0.04%

KEV

Description

Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.

Statistics

  • 1 Post

Last activity: 23 hours ago

Bluesky

Profile picture
🔒 URGENT SYSTEM ADMIN ALERT: Critical glibc security update for Rocky Linux 10 patches two dangerous vulnerabilities (CVE-2026-0861 & CVE-2026-0915). Read more:👉 tinyurl.com/2p8ycrey #Rocky_Linux #Security
  • 0
  • 0
  • 0
  • 23h ago

Overview

  • n8n

27 Jan 2026
Published
27 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.9)
EPSS
0.31%

KEV

Description

n8n contains a critical Remote Code Execution (RCE) vulnerability in its workflow Expression evaluation system. Expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime. An authenticated attacker could abuse this behavior to execute arbitrary code with the privileges of the n8n process. Successful exploitation may lead to full compromise of the affected instance, including unauthorized access to sensitive data, modification of workflows, and execution of system-level operations.

Statistics

  • 1 Post

Last activity: 22 hours ago

Bluesky

Profile picture
📌 Critical Vulnerabilities Patched in *n8n* Automation Tool: CVE-2026-1470 and CVE-2026-0863 https://www.cyberhub.blog/article/18863-critical-vulnerabilities-patched-in-n8n-automation-tool-cve-2026-1470-and-cve-2026-0863
  • 0
  • 0
  • 0
  • 22h ago
Showing 11 to 16 of 16 CVEs