#1 · PT-2025-48817 · Meta · React Server Components

Published

2025-12-03

·

Updated

2026-01-22

·

CVE-2025-55182

10

Critical

Base

AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions React versions 19.0.0 through 19.2.1 Next.js versions 15.x and 16.x
Description React Server Components (RSC) is affected by a critical remote code execution (RCE) vulnerability (CVE-2025-55182) with a CVSS score of 10.0. This vulnerability stems from unsafe deserialization of HTTP request payloads within Server Function endpoints. Exploitation allows unauthenticated attacke...
More

Exploit

Fix

DoS

RCE

Deserialization of Untrusted Data

1.7 K Posts
8.6 KReposts
9.7 M Audience

#2 · PT-2026-3709 · Oracle · Oracle Weblogic Server Proxy Plug-In

Published

2026-01-20

·

Updated

2026-01-22

·

CVE-2026-21962

10

Critical

Base

AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N

Name of the Vulnerable Software and Affected Versions Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in versions 12.2.1.4.0, 14.1.1.0.0 through 14.1.2.0.0
Description A critical issue exists in Oracle HTTP Server and Oracle Weblogic Server Proxy Plug-in for Apache HTTP Server and Microsoft IIS, allowing unauthenticated attackers to compromise the system via HTTP. Successful exploitation can lead to unauthorized creation,...
More

Fix

RCE

Improper Access Control

17 Posts
130Reposts
59.5 K Audience

#3 · PT-2025-34177 · Apple · Macos Sonoma

Published

2025-08-20

·

Updated

2026-01-22

·

CVE-2025-43300

10

Critical

Base

AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions Apple iOS/iPadOS versions prior to 18.6.2 and 17.7.10 Apple macOS versions prior to Sequoia 15.6.1, Sonoma 14.7.8, and Ventura 13.7.8
Description Apple addressed a zero-day vulnerability (CVE-2025-43300) in the ImageIO framework, which could allow attackers to achieve remote code execution (RCE) via a maliciously crafted image file. This vulnerability has been actively explo...
More

Exploit

Fix

DoS

RCE

Memory Corruption

561 Posts
1.8 KReposts
502.5 M Audience

#4 · PT-2025-50118 · Fortinet · Fortiproxy

Published

2025-12-09

·

Updated

2026-01-22

·

CVE-2025-59718

9.8

Critical

Base

AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions Fortinet FortiOS versions 7.0.0 through 7.6.3 Fortinet FortiProxy versions 7.0.0 through 7.6.3 Fortinet FortiSwitchManager versions 7.0.0 through 7.2.6 Fortinet FortiWeb (affected versions not specified)
Description An improper verification of cryptographic signature flaw exists in Fortinet products, allowing an unauthenticated attacker to bypass FortiCloud SSO login authent...
More

Fix

LPE

RCE

Improper Verification of Cryptographic Signature

109 Posts
388Reposts
212.2 K Audience

#5 · PT-2025-24857 · Microsoft · Windows Smb

James Forshaw

+2

·

Published

2025-01-30

·

Updated

2026-01-22

·

CVE-2025-33073

8.8

High

Base

AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions Microsoft Windows versions prior to the June 2025 security updates
Description A critical improper access control issue exists in the Windows SMB client. This flaw allows an authenticated attacker to elevate privileges to the SYSTEM level on a network. The vulnerability stems from a weakness in Kerberos authentication relay, enabling attackers to coerce authentication and re...
More

Exploit

Fix

LPE

RCE

Improper Access Control

158 Posts
2.1 KReposts
13.9 M Audience

#6 · PT-2026-3785 · Cisco · Cisco Unified Communications Manager Session Management Edition

Published

2026-01-21

·

Updated

2026-01-22

·

CVE-2026-20045

8.2

High

Base

AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

Name of the Vulnerable Software and Affected Versions Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), Cisco Unity Connection, and Cisco Webex Calling Dedicated Instance (affected versions not specified)
Description A flaw exists in Cisco Unified Communications...
More

RCE

Code Injection

46 Posts
19Reposts
9.5 K Audience

#7 · PT-2025-26225 · Winrar · Winrar

Marcin Bobryk

·

Published

2025-06-19

·

Updated

2026-01-22

·

CVE-2025-6218

7.8

High

Base

AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions WinRAR versions prior to 7.12
Description WinRAR contains a directory traversal vulnerability (CVE-2025-6218) that allows remote attackers to execute arbitrary code. This is achieved by crafting a malicious archive that, when opened, can write files outside of intended directories, potentially leading to code execution in the context of the current user. Multiple threat acto...
More

Exploit

Fix

RCE

Path traversal

122 Posts
312Reposts
453.5 K Audience

#8 · PT-2026-2484 · Fortinet · Fortisiem

Published

2026-01-13

·

Updated

2026-01-21

·

CVE-2025-64155

9.8

Critical

Base

AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions Fortinet FortiSIEM versions 6.7.0 through 7.4.0
Description An improper neutralization of special elements used in an OS command injection vulnerability exists in Fortinet FortiSIEM. This flaw allows unauthenticated attackers to execute unauthorized code or commands via crafted TCP requests. The vulnerability affects the phMonitor service and can lead to remote code executio...
More

Exploit

Fix

LPE

RCE

DoS

OS Command Injection

94 Posts
396Reposts
207.4 K Audience

#9 · PT-2026-2658 · Microsoft · Windows

Published

2026-01-13

·

Updated

2026-01-22

·

CVE-2026-20805

5.5

Medium

Base

AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Name of the Vulnerable Software and Affected Versions Microsoft Windows versions prior to February 2026 Description A vulnerability exists in the Desktop Windows Manager component of Windows that allows an attacker to disclose sensitive information locally. This vulnerability, actively exploited in the wild, can leak memory addresses, potentially bypassing Address Space Layout Randomization (ASLR) and strengthening exploit chain...
More

Exploit

Fix

LPE

RCE

Information Disclosure

88 Posts
83Reposts
93.3 K Audience

#10 · PT-2026-3270 · Vigi Camera

Arko Dhar

+1

·

Published

2026-01-16

·

Updated

2026-01-21

·

CVE-2026-0629

None

Name of the Vulnerable Software and Affected Versions TP-Link VIGI Cameras (affected versions not specified)
Description An authentication bypass issue exists in the password recovery feature of the local web interface of TP-Link VIGI cameras. This allows an attacker on the Local Area Network (LAN) to reset the administrator password without verification by manipulating client-side state. Successful exploitation grants the atta...
More

Improper Authentication

12 Posts
37Reposts
8.8 K Audience

#11 · PT-2025-49099 · Apache · Apache Tika

Tim Allison

·

Published

2025-10-26

·

Updated

2026-01-22

·

CVE-2025-66516

8.4

High

Base

AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions Apache Tika versions 1.13 through 3.2.1 Apache Tika tika-core versions 1.13 through 3.2.1 Apache Tika tika-pdf-module versions 2.0.0 through 3.2.1 Apache Tika tika-parsers versions 1.13 through 1.28.5
Description Apache Tika contains a critical XML External Entity (XXE) vulnerability (CVE-2025-66516) with a CVSS score of 10.0. This flaw allows attackers to carry out XXE inje...
More

Exploit

Fix

DoS

RCE

XXE

73 Posts
124Reposts
63.1 K Audience

#12 · PT-2025-36882 · Microsoft · Windows

Bryan De Houwer

·

Published

2025-09-09

·

Updated

2026-01-22

·

CVE-2025-54918

8.8

High

Base

AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions Windows NTLM versions prior to the fix included in CVE-2025-54918
Description An improper authentication issue exists within Windows NTLM. This flaw allows an authorized attacker to elevate privileges over a network. The vulnerability relates to deficiencies in the authentication procedure of the NTLM protocol. Exploitation may allow a remote attacker to elevate their privil...
More

Fix

LPE

Improper Authentication

11 Posts
154Reposts
50.7 K Audience

#13 · PT-2024-19759 · Apple · Macos Sonoma

Xinru Chi

·

Published

2024-03-07

·

Updated

2026-01-22

·

CVE-2024-23265

9.8

Critical

Base

AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions macOS versions 12.7.4 through 14.4 visionOS version 1.1 iOS versions 16.7.6, 17.4 iPadOS versions 16.7.6, 17.4 watchOS version 10.4 tvOS version 17.4
Description A memory corruption issue was addressed through improved locking mechanisms. The issue may allow a malicious application to cause unexpected system termination or to write to kernel memory, potentially leading to ke...
More

Fix

LPE

Memory Corruption

Resource Exhaustion

6 Posts
80Reposts
77.4 K Audience

#14 · PT-2026-3321 · Mcpjam Inspector

C2An1

·

Published

2026-01-16

·

Updated

2026-01-22

·

CVE-2026-23744

9.8

Critical

Base

AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions MCPJam inspector versions 1.4.2 and earlier
Description MCPJam inspector, a local-first development platform for MCP servers, contains a remote code execution (RCE) issue. An attacker can send a crafted HTTP request to trigger the installation of an MCP server, leading to RCE. The application, by default, listens on all interfaces (0.0.0.0) instead of localhost, enabling rem...
More

Exploit

Fix

RCE

Missing Authentication

9 Posts
19Reposts
6.8 K Audience

#15 · PT-2026-3756 · Gnu · Inetutils

Carlos Cortes Alvarez

+1

·

Published

2026-01-21

·

Updated

2026-01-22

·

CVE-2026-24061

9.8

Critical

Base

AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions GNU Inetutils versions through 2.7
Description The
telnetd
service within GNU Inetutils is susceptible to a remote authentication bypass. This occurs because the service incorrectly interprets the
USER
environment variable when a value of "-f root" is provided. Specifically, the
telnetd
service supports a "-f " trust flag, and providing
USER="-f root"
leads to...
More

Fix

Argument Injection

10 Posts
5Reposts
3.2 K Audience

#16 · PT-2025-12769 · Zhijiantianya · Ruoyi-Vue-Pro

Uglory

·

Published

2025-03-25

·

Updated

2026-01-21

·

CVE-2025-2742

8.1

High

Base

AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

Name of the Vulnerable Software and Affected Versions zhijiantianya ruoyi-vue-pro version 2.4.1
Description A critical issue exists in zhijiantianya ruoyi-vue-pro 2.4.1 related to path traversal. The issue resides in the file
/admin-api/mp/material/upload-permanent
within the Material Upload Interface component. Manipulation of the
File
argument allows for remote exploitation. The exploit for this issue has been publicly di...
More

Exploit

LPE

RCE

Path traversal

2 Posts
0Reposts
55.2 K Audience

#17 · PT-2026-3865 · Vllm · Vllm

Arthurgervais

+1

·

Published

2026-01-21

·

Updated

2026-01-22

·

CVE-2026-22807

8.8

High

Base

AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions vLLM versions 0.10.1 through 0.13.x
Description vLLM is an inference and serving engine for large language models (LLMs). Versions starting from 0.10.1 and prior to 0.14.0 load Hugging Face
auto map
dynamic modules during model resolution without verifying
trust remote code
. This allows attacker-controlled Python code within a model repository or path to be executed when...
More

Exploit

Fix

RCE

Code Injection

7 Posts
0Reposts
644 Audience

#18 · PT-2026-3570 · Zoom · Zoom Node Multimedia Routers

Published

2026-01-20

·

Updated

2026-01-21

·

CVE-2026-22844

9.9

Critical

Base

AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions Zoom Node Multimedia Routers (MMRs) versions prior to 5.2.1716.0
Description A command injection flaw exists in Zoom Node Multimedia Routers (MMRs). This allows a meeting participant with network access to execute arbitrary code remotely on the MMR without user interaction. Compromised MMR infrastructure could lead to data theft, service disruption, and full control of on-pr...
More

Fix

RCE

OS Command Injection

14 Posts
0Reposts
1.2 K Audience

#19 · PT-2026-3792 · Laravel · Laravel Reverb

M0H4Mmad

·

Published

2026-01-21

·

Updated

2026-01-22

·

CVE-2026-23524

9.8

Critical

Base

AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions Laravel Reverb versions 1.6.3 and below
Description Laravel Reverb, a real-time WebSocket communication backend for Laravel applications, is susceptible to Remote Code Execution (RCE). This occurs because the software passes data from the Redis channel directly into PHP’s
unserialize()
function without restricting which classes can be instantiated. The issue is present whe...
More

Exploit

Fix

RCE

Deserialization of Untrusted Data

6 Posts
0Reposts
312 Audience

#20 · PT-2026-3759 · Imagemagick

Published

2026-01-01

·

Updated

2026-01-22

·

CVE-2026-23952

6.5

Medium

Base

AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Name of the Vulnerable Software and Affected Versions ImageMagick versions 7.x through 14.10.1
Description ImageMagick is software used for editing and manipulating digital images. A flaw exists in the MSL (Magick Scripting Language) parser when processing
<comment>
tags before images are loaded, leading to a denial-of-service (DoS) condition. This can manifest as an assertion failure in debug builds or a NULL pointer derefer...
More

Exploit

Fix

DoS

RCE

NULL Pointer Dereference

3 Posts
0Reposts
204 Audience

#21 · PT-2026-3863 · 5Ire · 5Ire

C2An1

·

Published

2026-01-21

·

Updated

2026-01-21

·

CVE-2026-22792

9.6

Critical

Base

AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions 5ire versions prior to 0.15.3
Description 5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. Prior to version 0.15.3, unsafe HTML rendering allows untrusted HTML, including on* event attributes, to execute within the renderer context. An attacker can inject an
<img onerror=...>
payload to execute arbitrary JavaScript in th...
More

Exploit

Fix

RCE

Improper Encoding or Escaping of Output

4 Posts
0Reposts
223 Audience

#22 · PT-2026-3887 · Sumatrapdf

Published

2026-01-22

·

Updated

2026-01-22

·

CVE-2026-23951

5.5

Medium

Base

AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Name of the Vulnerable Software and Affected Versions SumatraPDF (affected versions not specified)
Description SumatraPDF, a multi-format reader for Windows, contains an off-by-one error in the validation code that triggers with exactly two records. This error causes an integer underflow in the size calculation within the
PalmDbReader::GetRecord
function when opening a crafted Mobi file. This results in an out-of-bounds heap...
More

Exploit

RCE

Out of bounds Read

Integer Underflow

3 Posts
0Reposts
211 Audience

#23 · PT-2026-3548 · WordPress · Advanced Custom Fields: Extended

Andrea Bocchetti

·

Published

2026-01-20

·

Updated

2026-01-21

·

CVE-2025-14533

9.8

Critical

Base

AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions Advanced Custom Fields: Extended versions up to and including 0.9.2.1
Description The Advanced Custom Fields: Extended plugin for WordPress contains a privilege escalation issue. The
insert user
function does not adequately restrict user roles during registration, allowing unauthenticated attackers to assign themselves the 'administrator' role. This can be achieved by supp...
More

Fix

LPE

Improper Privilege Management

14 Posts
0Reposts
1.1 K Audience

#24 · PT-2026-3515 · Chainlit · Chainlit

Gal Zaban

+1

·

Published

2026-01-19

·

Updated

2026-01-22

·

CVE-2026-22218

None

Name of the Vulnerable Software and Affected Versions Chainlit versions prior to 2.9.4
Description Chainlit versions prior to 2.9.4 have an arbitrary file read issue in the
/project/element
update process. An authenticated client can submit a custom Element with a user-defined path, which causes the server to copy the specified file into the attacker’s session. The resulting element identifier (
chainlitKey
) can then be used...
More

Exploit

Fix

Path traversal

10 Posts
0Reposts
669 Audience

#25 · PT-2026-3516 · Chainlit · Chainlit

Gal Zaban

+1

·

Published

2026-01-19

·

Updated

2026-01-22

·

CVE-2026-22219

None

Name of the Vulnerable Software and Affected Versions Chainlit versions prior to 2.9.4
Description Chainlit versions prior to 2.9.4 have a server-side request forgery (SSRF) issue in the
/project/element
update flow when using the SQLAlchemy data layer backend. An authenticated client can control the
url
value within an Element, which is then fetched using an HTTP GET request by the SQLAlchemy element creation logic. This a...
More

Exploit

Fix

SSRF

9 Posts
0Reposts
615 Audience

#26 · PT-2026-3766 · Gitlab · Gitlab Ce/Ee

Published

2026-01-21

·

Updated

2026-01-22

·

CVE-2026-0723

None

Name of the Vulnerable Software and Affected Versions GitLab versions prior to 18.6.4 GitLab versions prior to 18.7.2 GitLab versions prior to 18.8.2
Description A security issue exists in GitLab’s authentication services that allows attackers with knowledge of a target’s account ID to bypass two-factor authentication. This bypass is due to an unchecked return value. The vulnerability also includes two denial-of-service flaws....
More
8 Posts
6Reposts
1.4 K Audience

#27 · PT-2026-2761 · Microsoft · Windows Admin Center

Ben Zamir

+2

·

Published

2026-01-13

·

Updated

2026-01-21

·

CVE-2026-20965

7.5

High

Base

AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions Windows Admin Center versions prior to 0.70.00
Description An improper verification of cryptographic signatures in Windows Admin Center can allow an attacker with local administrator access to elevate privileges. The issue involves a token validation flaw that could lead to tenant-wide remote code execution (RCE) in Azure Windows Admin Center. An attacker can bypass authenti...
More

Fix

RCE

Improper Verification of Cryptographic Signature

7 Posts
4Reposts
2.4 K Audience

#28 · PT-2026-3885 · Opencryptoki

Published

2026-01-22

·

Updated

2026-01-22

·

CVE-2026-23893

6.8

Medium

Base

AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L

Name of the Vulnerable Software and Affected Versions openCryptoki versions 2.3.2 and above
Description openCryptoki is a PKCS#11 library for Linux and AIX. Versions 2.3.2 and above are susceptible to symlink-following when operating in privileged contexts. A user belonging to the token-group can redirect file operations to arbitrary filesystem locations by creating symlinks in group-writable token directories, potentially lead...
More

Exploit

LPE

Link Following

3 Posts
0Reposts
283 Audience

#29 · PT-2025-51936 · Git-Mcp-Server

Yardenporat

·

Published

2025-12-17

·

Updated

2026-01-21

·

CVE-2025-68143

None

Name of the Vulnerable Software and Affected Versions mcp-server-git versions prior to 2025.9.25 mcp-server-git versions prior to 2025.12.18
Description The Model Context Protocol Servers, a collection of reference implementations for the model context protocol (MCP), contains a flaw in the
git init
tool. Prior to versions 2025.9.25 and 2025.12.18, this tool permitted the creation of Git repositories at arbitrary filesystem l...
More

Fix

RCE

Path traversal

8 Posts
0Reposts
631 Audience

#30 · PT-2025-44224 · Smci · X12Stw-F

Binarly Inc

·

Published

2025-10-28

·

Updated

2026-01-21

·

CVE-2025-12006

7.2

High

Base

AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions Supermicro BMC firmware on Supermicro MBD-X12STW-F (affected versions not specified)
Description An issue exists in the firmware validation logic of Supermicro BMC firmware. An attacker can potentially update the system firmware using a specially crafted image.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vuln...
More

Improper Verification of Cryptographic Signature

6 Posts
12Reposts
9.8 K Audience