#1 · PT-2025-48817 · Meta · React Server Components
Published
2025-12-03
·
Updated
2026-01-22
·
CVE-2025-55182
10
Critical
Base
AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Exploit
Fix
DoS
RCE
Deserialization of Untrusted Data
Related posts · 2104
2025-12-22 05:30:10
https://t.co/TsiYR5VKwW
2025-12-16 08:23:06
2025-12-15 16:19:03
#2 · PT-2026-3709 · Oracle · Oracle Weblogic Server Proxy Plug-In
Published
2026-01-20
·
Updated
2026-01-22
·
CVE-2026-21962
10
Critical
Base
AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
Fix
RCE
Improper Access Control
Related posts · 18
2026-01-21 22:06:16
2026-01-21 20:10:44
2026-01-21 19:48:57
#3 · PT-2025-34177 · Apple · Macos Sonoma
Published
2025-08-20
·
Updated
2026-01-22
·
CVE-2025-43300
10
Critical
Base
AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Exploit
Fix
DoS
RCE
Memory Corruption
Related posts · 684
2026-01-11 03:06:44
-
📝 Windows SMB Client Elevation of Privilege Vulnerability
-
📅 Published: 10/06/2025
-
📈 CVSS: 8.8
-
🛡️ CISA KEV: True
-
🧭 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
-
📣 Mentions: 76
-
⚠️ Priority: 1+
-
📝 Analysis: A Windows SMB Client Elevation of Privilege Vulnerability (CVSS: 8.8) exists, exploitable via network (AV:N). While no known in-the-wild activity has been reported (CISA KEV), the high impact on confidentiality, integrity, and availability (C/I/A:H) warrants a priority 2 status due to its high CVSS score and low Exploitability Estimates Over Time (EPSS).
-
📝 An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Sonoma 14.7.8, macOS Ventura 13.7.8, iPadOS 17.7.10, macOS Sequoia 15.6.1, iOS 18.6.2 and iPadOS 18.6.2. Processing a malicious image file may result in memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.
-
📅 Published: 21/08/2025
-
📈 CVSS: 0
-
🛡️ CISA KEV: True
-
🧭 Vector: n/a
-
📣 Mentions: 23
-
⚠️ Priority: 1+
-
📝 Analysis: A memory corruption issue exists in macOS and iOS versions listed, stemming from processing malicious image files. While not widely exploited, Apple has reported a targeted attack. Given the potential for sophisticated attacks and the high CVSS score, this vulnerability warrants attention as a priority 2 concern.
-
📝 No description available.
-
📅 Published: 05/10/2025
-
📈 CVSS: 9.8
-
🛡️ CISA KEV: True
-
🧭 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
-
📣 Mentions: 38
-
⚠️ Priority: 1+
-
📝 Analysis: A critical (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) vulnerability has been identified, with no description available. As of now, no known in-the-wild activity has been reported (CISA KEV). Due to its high severity and currently low exploitability, it is classified as a priority 2 vulnerability.
-
📝 A memory corruption vulnerability was addressed with improved locking. This issue is fixed in macOS Monterey 12.7.4, macOS Ventura 13.6.5, macOS Sonoma 14.4, visionOS 1.1, iOS 17.4 and iPadOS 17.4, watchOS 10.4, iOS 16.7.6 and iPadOS 16.7.6, tvOS 17.4. An app may be able to cause unexpected system termination or write kernel memory.
-
📅 Published: 08/03/2024
-
📈 CVSS: 9.8
-
🧭 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
-
⚠️ Priority: 2
-
📝 Analysis: A memory corruption vulnerability in multiple Apple OS versions may lead to system termination or kernel memory write. Exploits unknown, but high impact and exploitability warrant a priority 2 status. The fix is available in specified version updates.
-
📝 A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.
-
📅 Published: 03/12/2025
-
📈 CVSS: 10
-
🛡️ CISA KEV: True
-
🧭 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
-
📣 Mentions: 908
-
⚠️ Priority: 1+
-
📝 Analysis: A critical pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0, specifically in packages react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerability stems from unsafely deserializing HTTP request payloads. This is a confirmed exploited issue, designated as priority 1+.
-
📝 A improper verification of cryptographic signature vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0.0 through 7.0.17, FortiProxy 7.6.0 through 7.6.3, FortiProxy 7.4.0 through 7.4.10, FortiProxy 7.2.0 through 7.2.14, FortiProxy 7.0.0 through 7.0.21, FortiSwitchManager 7.2.0 through 7.2.6, FortiSwitchManager 7.0.0 through 7.0.5 allows an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML response message.
-
📅 Published: 09/12/2025
-
📈 CVSS: 9.1
-
🛡️ CISA KEV: True
-
🧭 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
-
📣 Mentions: 11
-
⚠️ Priority: 1+
-
📝 Analysis: Unauthenticated attacker can bypass FortiCloud SSO login authentication via a crafted SAML response message in affected versions of Fortinet FortiOS and related modules. No known exploits detected, but given high CVSS score, it is a priority 2 vulnerability.
-
📝 Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 143.0.7499.110 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
-
📅 Published: 12/12/2025
-
📈 CVSS: 8.8
-
🛡️ CISA KEV: True
-
🧭 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
-
📣 Mentions: 32
-
⚠️ Priority: 1+
-
📝 Analysis: A memory access flaw in ANGLE component of Google Chrome on Mac (versions prior to 143.0.7499.110) permits remote attackers to perform out-of-bounds attacks via a crafted HTML page, confirmed exploited in the wild. Priority 1+.
-
📝 Remote command injection vulnerability in heap profiler builtin service in Apache bRPC ((all versions < 1.15.0)) on all platforms allows attacker to inject remote command. Root Cause: The bRPC heap profiler built-in service (/pprof/heap) does not validate the user-provided extra_options parameter and executes it as a command-line argument. Attackers can execute remote commands using the extra_options parameter.. Affected scenarios:Use the built-in bRPC heap profiler service to perform jemalloc memory profiling. How to Fix: we provide two methods, you can choose one of them: 1. Upgrade bRPC to version 1.15.0. 2. Apply this patch ( https://github.com/apache/brpc/pull/3101 ) manually.
-
📅 Published: 16/01/2026
-
📈 CVSS: 9.8
-
🧭 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
-
📣 Mentions: 14
-
⚠️ Priority: 4
-
📝 Analysis: A critical command injection vulnerability has been identified in Apache bRPC (<1.15.0) heap profiler builtin service, affecting scenarios using its built-in bRPC heap profiler service for jemalloc memory profiling. Attackers can execute remote commands through the unvalidated extra_options parameter. Prioritization score is 4, indicating a low CVSS & low EPSS. Upgrade to version 1.15.0 or apply the provided patch (https://github.com/apache/brpc/pull/3101) for mitigation.
-
📝 A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 26.2, Safari 26.2, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, visionOS 26.2, tvOS 26.2. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-14174 was also issued in response to this report.
-
📅 Published: 17/12/2025
-
📈 CVSS: 8.8
-
🛡️ CISA KEV: True
-
🧭 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
-
📣 Mentions: 26
-
⚠️ Priority: 1+
-
📝 Analysis: A use-after-free issue in web content processing, potentially leading to arbitrary code execution, has been addressed across multiple Apple platforms. The vulnerability is known to have been exploited in targeted attacks on versions of iOS prior to 26. Given the high CVSS score and confirmed exploitation, this is a priority 1+ issue, requiring immediate action on affected systems matching the specified versions.
-
📝 Windows NTLM Elevation of Privilege Vulnerability
-
📅 Published: 09/09/2025
-
📈 CVSS: 8.8
-
🧭 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
-
📣 Mentions: 50
-
⚠️ Priority: 2
-
📝 Analysis: A critical NTLM elevation of privilege vulnerability (Windows) has been identified, scoring 8.8 on CVSS. The attack vector is local access (AV:L). Although no known exploits are in the wild, given its high impact and severity, it is classified as a priority 2 vulnerability.
2025-10-14 10:04:46
-
Исследователи Cisco обнаружили «сквозные» уязвимости в восьми моделях с открытым кодом LLM, доступных на рынке от таких компаний, как OpenAI, Alibaba, Mistral, Google и др. Неудвительно, ведь после публикации исходного кода эти модели редко обновляются.
-
Cyderes обнаружила уязвимость в Advanced Installer, фреймворке для создания установщиков Windows, которая позволяет злоумышленникам перехватывать механизмы обновления приложений и запускать вредоносный внешний код, если пакеты обновлений не имеют цифровой подписи.
-
Исследователи Tenable выявили семь уязвимостей и методов атаки на пользователей ChatGPT. Недостатки позволяют злоумышленникам похищать конфиденциальную информацию из памяти и истории чатов пользователей.
-
Исследователи Zscaler обнаружили уязвимость произвольного доступа к файлам и SSRF (CVE-2025-12058) в платформе искусственного интеллекта Keras.
-
Группа исследователей, связанная с Массачусетским технологическим институтом (MIT), представила достаточно спорный отчет, который вызвал широкие осуждения в инфосеке.
- В свою очередь, Google выкатила свой отчёт в отношении штаммов вредоносного ПО, задействующих ИИ.
- В отчёте «Threat Labs: Производство 2025» от Netskope подробно описываются новейшие угрозы в сфере ИБ, затрагивающие организации производственной отрасли.
- По данным Palo Alto Networks, злоумышленники использовали уязвимость CVE-2025-21042 для доставки пользователям на Ближнем Востоке шпионского ПО Landfall для Android с помощью специально созданные DNG-изображения и WhatsApp.
2025-09-12 13:20:02
#4 · PT-2025-50118 · Fortinet · Fortiproxy
Published
2025-12-09
·
Updated
2026-01-22
·
CVE-2025-59718
9.8
Critical
Base
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Fix
LPE
RCE
Improper Verification of Cryptographic Signature
Related posts · 142
2026-01-08 00:20:30
2025-12-22 07:18:18
- Over 25,000 IP addresses of FortiCloud SSO devices are exposed online.
- Threat actors are exploiting a critical vulnerability (CVE-2025-59718/CVE-2025-59719) to gain unauthorized admin access.
- The vulnerability allows attackers to download sensitive system configuration files.
- U.S. government agencies have been ordered to patch this vulnerability by December 23rd.
- Previous Fortinet vulnerabilities have been exploited by advanced threat actors.
2025-12-20 00:51:20
#5 · PT-2025-24857 · Microsoft · Windows Smb
James Forshaw
+2
·
Published
2025-01-30
·
Updated
2026-01-22
·
CVE-2025-33073
8.8
High
Base
AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Exploit
Fix
LPE
RCE
Improper Access Control
Related posts · 222
2025-10-21 18:11:58
2025-10-21 12:56:53
2025-09-29 20:28:40
#6 · PT-2026-3785 · Cisco · Cisco Unified Communications Manager Session Management Edition
Published
2026-01-21
·
Updated
2026-01-22
·
CVE-2026-20045
8.2
High
Base
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
RCE
Code Injection
Related posts · 49
2026-01-22 05:52:13
2026-01-22 05:26:12
2026-01-22 05:22:13
#7 · PT-2025-26225 · Winrar · Winrar
Marcin Bobryk
·
Published
2025-06-19
·
Updated
2026-01-22
·
CVE-2025-6218
7.8
High
Base
AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Exploit
Fix
RCE
Path traversal
Related posts · 172
2026-01-14 12:08:30
2026-01-06 14:26:35
2025-12-22 07:55:16
#8 · PT-2026-2484 · Fortinet · Fortisiem
Published
2026-01-13
·
Updated
2026-01-21
·
CVE-2025-64155
9.8
Critical
Base
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploit
Fix
LPE
RCE
DoS
OS Command Injection
Related posts · 103
2026-01-21 12:06:17
2026-01-18 06:01:04
2026-01-16 16:56:23
#9 · PT-2026-2658 · Microsoft · Windows
Published
2026-01-13
·
Updated
2026-01-22
·
CVE-2026-20805
5.5
Medium
Base
AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Exploit
Fix
LPE
RCE
Information Disclosure
Related posts · 95
2026-01-21 15:57:06
2026-01-21 15:57:06
2026-01-21 01:24:15
#10 · PT-2026-3270 · Vigi Camera
Arko Dhar
+1
·
Published
2026-01-16
·
Updated
2026-01-21
·
CVE-2026-0629
None
Improper Authentication
Related posts · 13
2026-01-21 17:04:18
2026-01-21 15:16:38
2026-01-21 09:10:05
#11 · PT-2025-49099 · Apache · Apache Tika
Tim Allison
·
Published
2025-10-26
·
Updated
2026-01-22
·
CVE-2025-66516
8.4
High
Base
AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploit
Fix
DoS
RCE
XXE
Related posts · 107
2026-01-21 14:24:31
2025-12-30 16:26:53
2025-12-18 14:56:53
#12 · PT-2025-36882 · Microsoft · Windows
Bryan De Houwer
·
Published
2025-09-09
·
Updated
2026-01-22
·
CVE-2025-54918
8.8
High
Base
AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Fix
LPE
Improper Authentication
Related posts · 16
-
📝 Windows SMB Client Elevation of Privilege Vulnerability
-
📅 Published: 10/06/2025
-
📈 CVSS: 8.8
-
🛡️ CISA KEV: True
-
🧭 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
-
📣 Mentions: 76
-
⚠️ Priority: 1+
-
📝 Analysis: A Windows SMB Client Elevation of Privilege Vulnerability (CVSS: 8.8) exists, exploitable via network (AV:N). While no known in-the-wild activity has been reported (CISA KEV), the high impact on confidentiality, integrity, and availability (C/I/A:H) warrants a priority 2 status due to its high CVSS score and low Exploitability Estimates Over Time (EPSS).
-
📝 An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Sonoma 14.7.8, macOS Ventura 13.7.8, iPadOS 17.7.10, macOS Sequoia 15.6.1, iOS 18.6.2 and iPadOS 18.6.2. Processing a malicious image file may result in memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.
-
📅 Published: 21/08/2025
-
📈 CVSS: 0
-
🛡️ CISA KEV: True
-
🧭 Vector: n/a
-
📣 Mentions: 23
-
⚠️ Priority: 1+
-
📝 Analysis: A memory corruption issue exists in macOS and iOS versions listed, stemming from processing malicious image files. While not widely exploited, Apple has reported a targeted attack. Given the potential for sophisticated attacks and the high CVSS score, this vulnerability warrants attention as a priority 2 concern.
-
📝 No description available.
-
📅 Published: 05/10/2025
-
📈 CVSS: 9.8
-
🛡️ CISA KEV: True
-
🧭 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
-
📣 Mentions: 38
-
⚠️ Priority: 1+
-
📝 Analysis: A critical (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) vulnerability has been identified, with no description available. As of now, no known in-the-wild activity has been reported (CISA KEV). Due to its high severity and currently low exploitability, it is classified as a priority 2 vulnerability.
-
📝 A memory corruption vulnerability was addressed with improved locking. This issue is fixed in macOS Monterey 12.7.4, macOS Ventura 13.6.5, macOS Sonoma 14.4, visionOS 1.1, iOS 17.4 and iPadOS 17.4, watchOS 10.4, iOS 16.7.6 and iPadOS 16.7.6, tvOS 17.4. An app may be able to cause unexpected system termination or write kernel memory.
-
📅 Published: 08/03/2024
-
📈 CVSS: 9.8
-
🧭 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
-
⚠️ Priority: 2
-
📝 Analysis: A memory corruption vulnerability in multiple Apple OS versions may lead to system termination or kernel memory write. Exploits unknown, but high impact and exploitability warrant a priority 2 status. The fix is available in specified version updates.
-
📝 A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.
-
📅 Published: 03/12/2025
-
📈 CVSS: 10
-
🛡️ CISA KEV: True
-
🧭 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
-
📣 Mentions: 908
-
⚠️ Priority: 1+
-
📝 Analysis: A critical pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0, specifically in packages react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerability stems from unsafely deserializing HTTP request payloads. This is a confirmed exploited issue, designated as priority 1+.
-
📝 A improper verification of cryptographic signature vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0.0 through 7.0.17, FortiProxy 7.6.0 through 7.6.3, FortiProxy 7.4.0 through 7.4.10, FortiProxy 7.2.0 through 7.2.14, FortiProxy 7.0.0 through 7.0.21, FortiSwitchManager 7.2.0 through 7.2.6, FortiSwitchManager 7.0.0 through 7.0.5 allows an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML response message.
-
📅 Published: 09/12/2025
-
📈 CVSS: 9.1
-
🛡️ CISA KEV: True
-
🧭 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
-
📣 Mentions: 11
-
⚠️ Priority: 1+
-
📝 Analysis: Unauthenticated attacker can bypass FortiCloud SSO login authentication via a crafted SAML response message in affected versions of Fortinet FortiOS and related modules. No known exploits detected, but given high CVSS score, it is a priority 2 vulnerability.
-
📝 Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 143.0.7499.110 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
-
📅 Published: 12/12/2025
-
📈 CVSS: 8.8
-
🛡️ CISA KEV: True
-
🧭 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
-
📣 Mentions: 32
-
⚠️ Priority: 1+
-
📝 Analysis: A memory access flaw in ANGLE component of Google Chrome on Mac (versions prior to 143.0.7499.110) permits remote attackers to perform out-of-bounds attacks via a crafted HTML page, confirmed exploited in the wild. Priority 1+.
-
📝 Remote command injection vulnerability in heap profiler builtin service in Apache bRPC ((all versions < 1.15.0)) on all platforms allows attacker to inject remote command. Root Cause: The bRPC heap profiler built-in service (/pprof/heap) does not validate the user-provided extra_options parameter and executes it as a command-line argument. Attackers can execute remote commands using the extra_options parameter.. Affected scenarios:Use the built-in bRPC heap profiler service to perform jemalloc memory profiling. How to Fix: we provide two methods, you can choose one of them: 1. Upgrade bRPC to version 1.15.0. 2. Apply this patch ( https://github.com/apache/brpc/pull/3101 ) manually.
-
📅 Published: 16/01/2026
-
📈 CVSS: 9.8
-
🧭 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
-
📣 Mentions: 14
-
⚠️ Priority: 4
-
📝 Analysis: A critical command injection vulnerability has been identified in Apache bRPC (<1.15.0) heap profiler builtin service, affecting scenarios using its built-in bRPC heap profiler service for jemalloc memory profiling. Attackers can execute remote commands through the unvalidated extra_options parameter. Prioritization score is 4, indicating a low CVSS & low EPSS. Upgrade to version 1.15.0 or apply the provided patch (https://github.com/apache/brpc/pull/3101) for mitigation.
-
📝 A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 26.2, Safari 26.2, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, visionOS 26.2, tvOS 26.2. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-14174 was also issued in response to this report.
-
📅 Published: 17/12/2025
-
📈 CVSS: 8.8
-
🛡️ CISA KEV: True
-
🧭 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
-
📣 Mentions: 26
-
⚠️ Priority: 1+
-
📝 Analysis: A use-after-free issue in web content processing, potentially leading to arbitrary code execution, has been addressed across multiple Apple platforms. The vulnerability is known to have been exploited in targeted attacks on versions of iOS prior to 26. Given the high CVSS score and confirmed exploitation, this is a priority 1+ issue, requiring immediate action on affected systems matching the specified versions.
-
📝 Windows NTLM Elevation of Privilege Vulnerability
-
📅 Published: 09/09/2025
-
📈 CVSS: 8.8
-
🧭 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
-
📣 Mentions: 50
-
⚠️ Priority: 2
-
📝 Analysis: A critical NTLM elevation of privilege vulnerability (Windows) has been identified, scoring 8.8 on CVSS. The attack vector is local access (AV:L). Although no known exploits are in the wild, given its high impact and severity, it is classified as a priority 2 vulnerability.
2026-01-22 11:01:49
2025-11-13 14:07:49
2025-10-30 11:06:24
#13 · PT-2024-19759 · Apple · Macos Sonoma
Xinru Chi
·
Published
2024-03-07
·
Updated
2026-01-22
·
CVE-2024-23265
9.8
Critical
Base
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Fix
LPE
Memory Corruption
Resource Exhaustion
Related posts · 11
-
📝 Windows SMB Client Elevation of Privilege Vulnerability
-
📅 Published: 10/06/2025
-
📈 CVSS: 8.8
-
🛡️ CISA KEV: True
-
🧭 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
-
📣 Mentions: 76
-
⚠️ Priority: 1+
-
📝 Analysis: A Windows SMB Client Elevation of Privilege Vulnerability (CVSS: 8.8) exists, exploitable via network (AV:N). While no known in-the-wild activity has been reported (CISA KEV), the high impact on confidentiality, integrity, and availability (C/I/A:H) warrants a priority 2 status due to its high CVSS score and low Exploitability Estimates Over Time (EPSS).
-
📝 An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Sonoma 14.7.8, macOS Ventura 13.7.8, iPadOS 17.7.10, macOS Sequoia 15.6.1, iOS 18.6.2 and iPadOS 18.6.2. Processing a malicious image file may result in memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.
-
📅 Published: 21/08/2025
-
📈 CVSS: 0
-
🛡️ CISA KEV: True
-
🧭 Vector: n/a
-
📣 Mentions: 23
-
⚠️ Priority: 1+
-
📝 Analysis: A memory corruption issue exists in macOS and iOS versions listed, stemming from processing malicious image files. While not widely exploited, Apple has reported a targeted attack. Given the potential for sophisticated attacks and the high CVSS score, this vulnerability warrants attention as a priority 2 concern.
-
📝 No description available.
-
📅 Published: 05/10/2025
-
📈 CVSS: 9.8
-
🛡️ CISA KEV: True
-
🧭 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
-
📣 Mentions: 38
-
⚠️ Priority: 1+
-
📝 Analysis: A critical (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) vulnerability has been identified, with no description available. As of now, no known in-the-wild activity has been reported (CISA KEV). Due to its high severity and currently low exploitability, it is classified as a priority 2 vulnerability.
-
📝 A memory corruption vulnerability was addressed with improved locking. This issue is fixed in macOS Monterey 12.7.4, macOS Ventura 13.6.5, macOS Sonoma 14.4, visionOS 1.1, iOS 17.4 and iPadOS 17.4, watchOS 10.4, iOS 16.7.6 and iPadOS 16.7.6, tvOS 17.4. An app may be able to cause unexpected system termination or write kernel memory.
-
📅 Published: 08/03/2024
-
📈 CVSS: 9.8
-
🧭 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
-
⚠️ Priority: 2
-
📝 Analysis: A memory corruption vulnerability in multiple Apple OS versions may lead to system termination or kernel memory write. Exploits unknown, but high impact and exploitability warrant a priority 2 status. The fix is available in specified version updates.
-
📝 A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.
-
📅 Published: 03/12/2025
-
📈 CVSS: 10
-
🛡️ CISA KEV: True
-
🧭 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
-
📣 Mentions: 908
-
⚠️ Priority: 1+
-
📝 Analysis: A critical pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0, specifically in packages react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerability stems from unsafely deserializing HTTP request payloads. This is a confirmed exploited issue, designated as priority 1+.
-
📝 A improper verification of cryptographic signature vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0.0 through 7.0.17, FortiProxy 7.6.0 through 7.6.3, FortiProxy 7.4.0 through 7.4.10, FortiProxy 7.2.0 through 7.2.14, FortiProxy 7.0.0 through 7.0.21, FortiSwitchManager 7.2.0 through 7.2.6, FortiSwitchManager 7.0.0 through 7.0.5 allows an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML response message.
-
📅 Published: 09/12/2025
-
📈 CVSS: 9.1
-
🛡️ CISA KEV: True
-
🧭 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
-
📣 Mentions: 11
-
⚠️ Priority: 1+
-
📝 Analysis: Unauthenticated attacker can bypass FortiCloud SSO login authentication via a crafted SAML response message in affected versions of Fortinet FortiOS and related modules. No known exploits detected, but given high CVSS score, it is a priority 2 vulnerability.
-
📝 Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 143.0.7499.110 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
-
📅 Published: 12/12/2025
-
📈 CVSS: 8.8
-
🛡️ CISA KEV: True
-
🧭 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
-
📣 Mentions: 32
-
⚠️ Priority: 1+
-
📝 Analysis: A memory access flaw in ANGLE component of Google Chrome on Mac (versions prior to 143.0.7499.110) permits remote attackers to perform out-of-bounds attacks via a crafted HTML page, confirmed exploited in the wild. Priority 1+.
-
📝 Remote command injection vulnerability in heap profiler builtin service in Apache bRPC ((all versions < 1.15.0)) on all platforms allows attacker to inject remote command. Root Cause: The bRPC heap profiler built-in service (/pprof/heap) does not validate the user-provided extra_options parameter and executes it as a command-line argument. Attackers can execute remote commands using the extra_options parameter.. Affected scenarios:Use the built-in bRPC heap profiler service to perform jemalloc memory profiling. How to Fix: we provide two methods, you can choose one of them: 1. Upgrade bRPC to version 1.15.0. 2. Apply this patch ( https://github.com/apache/brpc/pull/3101 ) manually.
-
📅 Published: 16/01/2026
-
📈 CVSS: 9.8
-
🧭 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
-
📣 Mentions: 14
-
⚠️ Priority: 4
-
📝 Analysis: A critical command injection vulnerability has been identified in Apache bRPC (<1.15.0) heap profiler builtin service, affecting scenarios using its built-in bRPC heap profiler service for jemalloc memory profiling. Attackers can execute remote commands through the unvalidated extra_options parameter. Prioritization score is 4, indicating a low CVSS & low EPSS. Upgrade to version 1.15.0 or apply the provided patch (https://github.com/apache/brpc/pull/3101) for mitigation.
-
📝 A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 26.2, Safari 26.2, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, visionOS 26.2, tvOS 26.2. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-14174 was also issued in response to this report.
-
📅 Published: 17/12/2025
-
📈 CVSS: 8.8
-
🛡️ CISA KEV: True
-
🧭 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
-
📣 Mentions: 26
-
⚠️ Priority: 1+
-
📝 Analysis: A use-after-free issue in web content processing, potentially leading to arbitrary code execution, has been addressed across multiple Apple platforms. The vulnerability is known to have been exploited in targeted attacks on versions of iOS prior to 26. Given the high CVSS score and confirmed exploitation, this is a priority 1+ issue, requiring immediate action on affected systems matching the specified versions.
-
📝 Windows NTLM Elevation of Privilege Vulnerability
-
📅 Published: 09/09/2025
-
📈 CVSS: 8.8
-
🧭 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
-
📣 Mentions: 50
-
⚠️ Priority: 2
-
📝 Analysis: A critical NTLM elevation of privilege vulnerability (Windows) has been identified, scoring 8.8 on CVSS. The attack vector is local access (AV:L). Although no known exploits are in the wild, given its high impact and severity, it is classified as a priority 2 vulnerability.
2026-01-22 11:01:49
2026-01-21 15:03:38
2025-10-23 20:15:41
#14 · PT-2026-3321 · Mcpjam Inspector
C2An1
·
Published
2026-01-16
·
Updated
2026-01-22
·
CVE-2026-23744
9.8
Critical
Base
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploit
Fix
RCE
Missing Authentication
Related posts · 9
2026-01-22 00:50:41
2026-01-19 07:43:56
mcpjam/inspector product has a Remote Code Execution vulnerability (CVE-2026-23744) stemming from an exposed HTTP endpoint. Patching to 1.4.3 or later is advised for #mcpjam users. #infosec #RCE https://t.co/Tc0zNha0ra2026-01-17 14:23:33
#15 · PT-2026-3756 · Gnu · Inetutils
Carlos Cortes Alvarez
+1
·
Published
2026-01-21
·
Updated
2026-01-22
·
CVE-2026-24061
9.8
Critical
Base
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
telnetd service within GNU Inetutils is susceptible to a remote authentication bypass. This occurs because the service incorrectly interprets the USER environment variable when a value of "-f root" is provided. Specifically, the telnetd service supports a "-f " trust flag, and providing USER="-f root" leads to...Fix
Argument Injection
Related posts · 12
- Une faille critique offrant un accès total : La vulnérabilité CVE-2026-24061 (score de gravité 9,8/10) touche le service
(versions GNU InetUtils 1.9.3 à 2.7). Elle permet à un attaquant de contourner l'authentification et de prendre le contrôle du serveur avec les droits administrateur (root), une brèche présente dans le code depuis 2015.telnetd - Une menace active sans correctif officiel : La situation est d'autant plus dangereuse qu'un code d'exploitation est publiquement disponible pour les pirates, alors qu'aucun patch de sécurité n'a encore été publié par les développeurs pour corriger le problème.
- La nécessité d'abandonner Telnet : Le CERT-FR insiste sur le fait que ce protocole obsolète et non chiffré ne doit pas être exposé sur Internet. La recommandation immédiate est de désactiver le service au profit de SSH (port 22) ou, à défaut, de restreindre drastiquement l'accès via une liste blanche d'IP.
2026-01-22 10:08:30
2026-01-22 02:14:35
2026-01-22 00:29:13
#16 · PT-2025-12769 · Zhijiantianya · Ruoyi-Vue-Pro
Uglory
·
Published
2025-03-25
·
Updated
2026-01-21
·
CVE-2025-2742
8.1
High
Base
AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
/admin-api/mp/material/upload-permanent within the Material Upload Interface component. Manipulation of the File argument allows for remote exploitation. The exploit for this issue has been publicly di...Exploit
LPE
RCE
Path traversal
Related posts · 7
2026-01-21 17:30:25
2025-07-15 13:27:02
2025-07-08 18:56:52
#17 · PT-2026-3865 · Vllm · Vllm
Arthurgervais
+1
·
Published
2026-01-21
·
Updated
2026-01-22
·
CVE-2026-22807
8.8
High
Base
AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
auto map dynamic modules during model resolution without verifying trust remote code. This allows attacker-controlled Python code within a model repository or path to be executed when...Exploit
Fix
RCE
Code Injection
Related posts · 7
2026-01-22 00:29:45
2026-01-22 00:09:33
2026-01-21 22:29:04
#18 · PT-2026-3570 · Zoom · Zoom Node Multimedia Routers
Published
2026-01-20
·
Updated
2026-01-21
·
CVE-2026-22844
9.9
Critical
Base
AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Fix
RCE
OS Command Injection
Related posts · 15
2026-01-21 16:59:57
2026-01-21 16:42:13
2026-01-21 16:31:41
#19 · PT-2026-3792 · Laravel · Laravel Reverb
M0H4Mmad
·
Published
2026-01-21
·
Updated
2026-01-22
·
CVE-2026-23524
9.8
Critical
Base
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
unserialize() function without restricting which classes can be instantiated. The issue is present whe...Exploit
Fix
RCE
Deserialization of Untrusted Data
Related posts · 6
2026-01-22 02:42:32
2026-01-22 00:09:23
2026-01-21 23:21:33
#20 · PT-2026-3759 · Imagemagick
Published
2026-01-01
·
Updated
2026-01-22
·
CVE-2026-23952
6.5
Medium
Base
AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
<comment> tags before images are loaded, leading to a denial-of-service (DoS) condition. This can manifest as an assertion failure in debug builds or a NULL pointer derefer...Exploit
Fix
DoS
RCE
NULL Pointer Dereference
Related posts · 3
2026-01-22 02:42:15
2026-01-22 01:51:08
2026-01-22 01:50:30
#21 · PT-2026-3863 · 5Ire · 5Ire
C2An1
·
Published
2026-01-21
·
Updated
2026-01-21
·
CVE-2026-22792
9.6
Critical
Base
AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
<img onerror=...> payload to execute arbitrary JavaScript in th...Exploit
Fix
RCE
Improper Encoding or Escaping of Output
Related posts · 4
2026-01-21 21:51:04
2026-01-21 21:44:49
2026-01-21 21:39:13
#22 · PT-2026-3887 · Sumatrapdf
Published
2026-01-22
·
Updated
2026-01-22
·
CVE-2026-23951
5.5
Medium
Base
AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
PalmDbReader::GetRecord function when opening a crafted Mobi file. This results in an out-of-bounds heap...Exploit
RCE
Out of bounds Read
Integer Underflow
Related posts · 3
2026-01-22 02:42:12
2026-01-22 02:01:19
2026-01-22 01:50:31
#23 · PT-2026-3548 · WordPress · Advanced Custom Fields: Extended
Andrea Bocchetti
·
Published
2026-01-20
·
Updated
2026-01-21
·
CVE-2025-14533
9.8
Critical
Base
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
insert user function does not adequately restrict user roles during registration, allowing unauthenticated attackers to assign themselves the 'administrator' role. This can be achieved by supp...Fix
LPE
Improper Privilege Management
Related posts · 14
2026-01-21 21:01:50
2026-01-21 14:56:15
2026-01-21 13:18:38
#24 · PT-2026-3515 · Chainlit · Chainlit
Gal Zaban
+1
·
Published
2026-01-19
·
Updated
2026-01-22
·
CVE-2026-22218
None
/project/element update process. An authenticated client can submit a custom Element with a user-defined path, which causes the server to copy the specified file into the attacker’s session. The resulting element identifier (chainlitKey) can then be used...Exploit
Fix
Path traversal
Related posts · 11
2026-01-22 02:30:12
2026-01-21 23:30:12
2026-01-21 21:05:28
#25 · PT-2026-3516 · Chainlit · Chainlit
Gal Zaban
+1
·
Published
2026-01-19
·
Updated
2026-01-22
·
CVE-2026-22219
None
/project/element update flow when using the SQLAlchemy data layer backend. An authenticated client can control the url value within an Element, which is then fetched using an HTTP GET request by the SQLAlchemy element creation logic. This a...Exploit
Fix
SSRF
Related posts · 10
2026-01-22 02:30:12
2026-01-21 23:35:23
2026-01-21 23:30:12
#26 · PT-2026-3766 · Gitlab · Gitlab Ce/Ee
Published
2026-01-21
·
Updated
2026-01-22
·
CVE-2026-0723
None
Related posts · 9
2026-01-22 00:23:18
2026-01-21 16:59:57
- A vulnerability allows attackers to bypass two-factor authentication using known account IDs.
- Two high-severity denial-of-service flaws could allow unauthenticated attackers to disrupt service.
- GitLab has released updated versions of its Community and Enterprise Editions to address these issues.
2026-01-21 16:45:24
#27 · PT-2026-2761 · Microsoft · Windows Admin Center
Ben Zamir
+2
·
Published
2026-01-13
·
Updated
2026-01-21
·
CVE-2026-20965
7.5
High
Base
AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
Fix
RCE
Improper Verification of Cryptographic Signature
Related posts · 9
2026-01-21 21:15:52
2026-01-21 10:32:52
2026-01-18 08:25:34
#28 · PT-2026-3885 · Opencryptoki
Published
2026-01-22
·
Updated
2026-01-22
·
CVE-2026-23893
6.8
Medium
Base
AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L
Exploit
LPE
Link Following
Related posts · 3
2026-01-22 02:42:10
2026-01-22 02:21:39
2026-01-22 01:50:31
#29 · PT-2025-51936 · Git-Mcp-Server
Yardenporat
·
Published
2025-12-17
·
Updated
2026-01-21
·
CVE-2025-68143
None
git init tool. Prior to versions 2025.9.25 and 2025.12.18, this tool permitted the creation of Git repositories at arbitrary filesystem l...Fix
RCE
Path traversal
Related posts · 9
2026-01-21 20:58:57
2026-01-21 12:47:00
2026-01-21 12:46:15
#30 · PT-2025-44224 · Smci · X12Stw-F
Binarly Inc
·
Published
2025-10-28
·
Updated
2026-01-21
·
CVE-2025-12006
7.2
High
Base
AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Improper Verification of Cryptographic Signature
Related posts · 6
2026-01-21 19:37:21
2026-01-16 17:58:16
2026-01-16 11:34:59