CVE tracker
274 subscribers
3.49K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2021-47886 - Pingzapper 2.3.1 - 'PingzapperSvc' Unquoted Service Path

CVE ID : CVE-2021-47886
Published : Jan. 21, 2026, 6:16 p.m. | 45 minutes ago
Description : Pingzapper 2.3.1 contains an unquoted service path vulnerability in the PingzapperSvc service that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted path in 'C:\Program Files (x86)\Pingzapper\PZService.exe' to inject malicious executables and escalate privileges.
Severity: 8.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2021-47887 - Print Job Accounting 4.4.10 - 'OkiJaSvc' Unquoted Service Path

CVE ID : CVE-2021-47887
Published : Jan. 21, 2026, 6:16 p.m. | 45 minutes ago
Description : OKI Print Job Accounting 4.4.10 contains an unquoted service path vulnerability in the OkiJaSvc service that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted path in 'C:\Program Files\Okidata\Print Job Accounting\' to inject malicious executables and escalate privileges.
Severity: 8.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-66959 - Ollama Denial of Service Vulnerability

CVE ID : CVE-2025-66959
Published : Jan. 21, 2026, 6:16 p.m. | 45 minutes ago
Description : An issue in ollama v.0.12.10 allows a remote attacker to cause a denial of service via the GGUF decoder
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-66960 - Ollama GGUF Denial of Service

CVE ID : CVE-2025-66960
Published : Jan. 21, 2026, 6:16 p.m. | 45 minutes ago
Description : An issue in ollama v.0.12.10 allows a remote attacker to cause a denial of service via the fs/ggml/gguf.go, function readGGUFV1String reads a string length from untrusted GGUF metadata
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-69762 - Tenda AX3 Remote Code Execution Vulnerability

CVE ID : CVE-2025-69762
Published : Jan. 21, 2026, 6:16 p.m. | 45 minutes ago
Description : Tenda AX3 firmware v16.03.12.11 contains a stack overflow in formSetIptv via the list parameter, which can cause memory corruption and enable remote code execution.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-69763 - Tenda AX3 Stack Overflow Vulnerability

CVE ID : CVE-2025-69763
Published : Jan. 21, 2026, 6:16 p.m. | 45 minutes ago
Description : Tenda AX3 firmware v16.03.12.11 contains a stack overflow in formSetIptv via the vlanId parameter, which can cause memory corruption and enable remote code execution.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-69766 - Tenda AX3 Stack-Based Buffer Overflow Vulnerability

CVE ID : CVE-2025-69766
Published : Jan. 21, 2026, 6:16 p.m. | 45 minutes ago
Description : Tenda AX3 firmware v16.03.12.11 contains a stack-based buffer overflow in the formGetIptv function due to improper handling of the citytag stack buffer, which may result in memory corruption and remote code execution.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-0834 - Logic Vulnerability on TP-Link Archer C20 and Archer AX53

CVE ID : CVE-2026-0834
Published : Jan. 21, 2026, 6:16 p.m. | 45 minutes ago
Description : Logic vulnerability in TP-Link Archer C20 v6.0 and Archer AX53 v1.0 (TDDP module) allows unauthenticated adjacent attackers to execute administrative commands including factory reset and device reboot without credentials. Attackers on the adjacent network can remotely trigger factory resets and reboots without credentials, causing configuration loss and interruption of device availability.This issue affects Archer C20 v6.0 < V6_251031. Archer AX53 v1.0 < V1_251215
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-23754 - D-Link D-View 8 IDOR Allows Credential Disclosure and Account Takeover

CVE ID : CVE-2026-23754
Published : Jan. 21, 2026, 6:16 p.m. | 45 minutes ago
Description : D-Link D-View 8 versions 2.0.1.107 and below contain an improper access control vulnerability in backend API endpoints. Any authenticated user can supply an arbitrary user_id value to retrieve sensitive credential data belonging to other users, including super administrators. The exposed credential material can be reused directly as a valid authentication secret, allowing full impersonation of the targeted account. This results in complete account takeover and full administrative control over the D-View system.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-23755 - D-Link D-View 8 Installer DLL Preloading via Uncontrolled Search Path

CVE ID : CVE-2026-23755
Published : Jan. 21, 2026, 6:16 p.m. | 45 minutes ago
Description : D-Link D-View 8 versions 2.0.1.107 and below contain an uncontrolled search path vulnerability in the installer. When executed with elevated privileges via UAC, the installer attempts to load version.dll from its execution directory, allowing DLL preloading. An attacker can supply a malicious version.dll alongside the legitimate installer so that, when a victim runs the installer and approves the UAC prompt, attacker-controlled code executes with administrator privileges. This can lead to full system compromise.
Severity: 8.4 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-68132 - EVerest has out-of-bounds read in DZG_GSH01 SLIP CRC parser that can crash powermeter driver

CVE ID : CVE-2025-68132
Published : Jan. 21, 2026, 6:28 p.m. | 33 minutes ago
Description : EVerest is an EV charging software stack. Prior to version 2025.12.0, `is_message_crc_correct` in the DZG_GSH01 powermeter SLIP parser reads `vec[vec.size()-1]` and `vec[vec.size()-2]` without checking that at least two bytes are present. Malformed SLIP frames on the serial link can reach `is_message_crc_correct` with `vec.size() < 2` (only via the multi-message path), causing an out-of-bounds read before CRC verification and `pop_back` underflow. Therefore, an attacker controlling the serial input can reliably crash the process. Version 2025.12.0 fixes the issue.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-68134 - EVerest's use of assert functions can potentially lead to denial of service

CVE ID : CVE-2025-68134
Published : Jan. 21, 2026, 6:32 p.m. | 29 minutes ago
Description : EVerest is an EV charging software stack. Prior to version 2025.12.0, Prior to version 2025.10.0, the use of the `assert` function to handle errors frequently causes the module to crash. This is particularly critical because the manager shuts down all other modules and exits when any one of them terminates, leading to a denial of service. In a context where a manager handles multiple EVSE, this would also impact other users. Version 2025.10.0 fixes the issue.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-23955 - EVerest vulnerable to concatenation of strings literal and integers

CVE ID : CVE-2026-23955
Published : Jan. 21, 2026, 8:16 p.m. | 2 hours, 46 minutes ago
Description : EVerest is an EV charging software stack. Prior to version 2025.9.0, in several places, integer values are concatenated to literal strings when throwing errors. This results in pointers arithmetic instead of printing the integer value as expected, like most of interpreted languages. This can be used by malicious operator to read unintended memory regions, including the heap and the stack. Version 2025.9.0 fixes the issue.
Severity: 4.2 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-69285 - SQLBot uploadExcel Endpoint has Unauthenticated Arbitrary File Upload vulnerability

CVE ID : CVE-2025-69285
Published : Jan. 21, 2026, 9:16 p.m. | 1 hour, 46 minutes ago
Description : SQLBot is an intelligent data query system based on a large language model and RAG. Versions prior to 1.5.0 contain a missing authentication vulnerability in the /api/v1/datasource/uploadExcel endpoint, allowing a remote unauthenticated attacker to upload arbitrary Excel/CSV files and inject data directly into the PostgreSQL database. The endpoint is explicitly added to the authentication whitelist, causing the TokenMiddleware to bypass all token validation. Uploaded files are parsed by pandas and inserted into the database via to_sql() with if_exists='replace' mode. The vulnerability has been fixed in v1.5.0. No known workarounds are available.
Severity: 7.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-21852 - Claude Code Leaks Data via Malicious Environment Configuration Before Trust Confirmation

CVE ID : CVE-2026-21852
Published : Jan. 21, 2026, 9:16 p.m. | 1 hour, 46 minutes ago
Description : Claude Code is an agentic coding tool. Prior to version 2.0.65, vulnerability in Claude Code's project-load flow allowed malicious repositories to exfiltrate data including Anthropic API keys before users confirmed trust. An attacker-controlled repository could include a settings file that sets ANTHROPIC_BASE_URL to an attacker-controlled endpoint and when the repository was opened, Claude Code would read the configuration and immediately issue API requests before showing the trust prompt, potentially leaking the user's API keys. Users on standard Claude Code auto-update have received this fix already. Users performing manual updates are advised to update to version 2.0.65, which contains a patch, or to the latest version.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-22598 - ManageIQ vulnerable to DoS Attack when creating TimeProfiles

CVE ID : CVE-2026-22598
Published : Jan. 21, 2026, 9:16 p.m. | 1 hour, 46 minutes ago
Description : ManageIQ is an open-source management platform. A flaw was found in the ManageIQ API prior to version radjabov-2 where a malformed TimeProfile could be created causing later UI and API requests to timeout leading to a Denial of Service. Version radjabov-2 contains a patch. One may also apply the patch manually.
Severity: 7.1 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-22792 - 5ire vulnerable to Remote Code Execution (RCE)

CVE ID : CVE-2026-22792
Published : Jan. 21, 2026, 9:16 p.m. | 1 hour, 46 minutes ago
Description : 5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. Prior to version 0.15.3, an unsafe HTML rendering permits untrusted HTML (including on* event attributes) to execute in the renderer context. An attacker can inject an `` payload to run arbitrary JavaScript in the renderer, which can call exposed bridge APIs such as `window.bridge.mcpServersManager.createServer`. This enables unauthorized creation of MCP servers and lead to remote command execution. Version 0.15.3 fixes the issue.
Severity: 9.6 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-22793 - 5ire vulnerable to Remote Code Execution (RCE) via ECharts

CVE ID : CVE-2026-22793
Published : Jan. 21, 2026, 9:16 p.m. | 1 hour, 46 minutes ago
Description : 5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. Prior to version 0.15.3, an unsafe option parsing vulnerability in the ECharts Markdown plugin allows any user able to submit ECharts code blocks to execute arbitrary JavaScript code in the renderer context. This can lead to Remote Code Execution (RCE) in environments where privileged APIs (such as Electron’s electron.mcp) are exposed, resulting in full compromise of the host system. Version 0.15.3 patches the issue.
Severity: 9.6 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-23968 - Copier safe template has arbitrary filesystem read access via symlinks when _preserve_symlinks: false

CVE ID : CVE-2026-23968
Published : Jan. 21, 2026, 10:13 p.m. | 49 minutes ago
Description : Copier is a library and CLI app for rendering project templates. Prior to version 9.11.2, Copier suggests that it's safe to generate a project from a safe template, i.e. one that doesn't use unsafe features like custom Jinja extensions which would require passing the `--UNSAFE,--trust` flag. As it turns out, a safe template can currently include arbitrary files/directories outside the local template clone location by using symlinks along with `_preserve_symlinks: false` (which is Copier's default setting). Version 9.11.2 patches the issue.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-22807 - vLLM affected by RCE via auto_map dynamic module loading during model initialization

CVE ID : CVE-2026-22807
Published : Jan. 21, 2026, 10:15 p.m. | 46 minutes ago
Description : vLLM is an inference and serving engine for large language models (LLMs). Starting in version 0.10.1 and prior to version 0.14.0, vLLM loads Hugging Face `auto_map` dynamic modules during model resolution without gating on `trust_remote_code`, allowing attacker-controlled Python code in a model repo/path to execute at server startup. An attacker who can influence the model repo/path (local directory or remote Hugging Face repo) can achieve arbitrary code execution on the vLLM host during model load. This happens before any request handling and does not require API access. Version 0.14.0 fixes the issue.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-22808 - Fleet Windows MDM endpoint has a Cross-site Scripting vulnerability

CVE ID : CVE-2026-22808
Published : Jan. 21, 2026, 10:15 p.m. | 46 minutes ago
Description : fleetdm/fleet is open source device management software. Prior to versions 4.78.2, 4.77.1, 4.76.2, 4.75.2, and 4.53.3, if Windows MDM is enabled, an unauthenticated attacker can exploit this XSS vulnerability to steal a Fleet administrator's authentication token (FLEET::auth_token) from localStorage. This could allow unauthorized access to Fleet, including administrative access, visibility into device data, and modification of configuration. Versions 4.78.2, 4.77.1, 4.76.2, 4.75.2, and 4.53.3 fix the issue. If an immediate upgrade is not possible, affected Fleet users should temporarily disable Windows MDM.
Severity: 5.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...