CVE tracker
300 subscribers
4.21K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2026-1419 - D-Link DCS700l Web Form setDayNightMode command injection

CVE ID : CVE-2026-1419
Published : Jan. 26, 2026, 5:16 a.m. | 2 hours, 38 minutes ago
Description : A weakness has been identified in D-Link DCS700l 1.03.09. Affected is an unknown function of the file /setDayNightMode of the component Web Form Handler. Executing a manipulation of the argument LightSensorControl can lead to command injection. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks.
Severity: 5.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-1420 - Tenda AC23 WifiExtraSet buffer overflow

CVE ID : CVE-2026-1420
Published : Jan. 26, 2026, 6:16 a.m. | 1 hour, 38 minutes ago
Description : A flaw has been found in Tenda AC23 16.03.07.52. This impacts an unknown function of the file /goform/WifiExtraSet. This manipulation of the argument wpapsk_crypto causes buffer overflow. Remote exploitation of the attack is possible. The exploit has been published and may be used.
Severity: 9.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-1421 - code-projects Online Examination System Add Pages cross site scripting

CVE ID : CVE-2026-1421
Published : Jan. 26, 2026, 6:16 a.m. | 1 hour, 38 minutes ago
Description : A vulnerability has been found in code-projects Online Examination System 1.0. Affected is an unknown function of the component Add Pages. Such manipulation leads to cross site scripting. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-14316 - AhaChat Messenger Marketing <= 1.1 - Reflected XSS

CVE ID : CVE-2025-14316
Published : Jan. 26, 2026, 7:16 a.m. | 38 minutes ago
Description : The AhaChat Messenger Marketing WordPress plugin through 1.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-14973 - Recipe Card Blocks < 3.4.13 - Contributor+ SQLi

CVE ID : CVE-2025-14973
Published : Jan. 26, 2026, 7:16 a.m. | 38 minutes ago
Description : The Recipe Card Blocks Lite WordPress plugin before 3.4.13 does not sanitize and escape a parameter before using it in a SQL statement, allowing contributors and above to perform SQL injection attacks.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-1422 - code-projects Online Examination System Login Page index.php sql injection

CVE ID : CVE-2026-1422
Published : Jan. 26, 2026, 7:16 a.m. | 38 minutes ago
Description : A vulnerability was found in code-projects Online Examination System 1.0. Affected by this vulnerability is an unknown functionality of the file /index.php of the component Login Page. Performing a manipulation of the argument User results in sql injection. The attack is possible to be carried out remotely. The exploit has been made public and could be used.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-1423 - code-projects Online Examination System admin_pic.php unrestricted upload

CVE ID : CVE-2026-1423
Published : Jan. 26, 2026, 7:16 a.m. | 38 minutes ago
Description : A vulnerability was determined in code-projects Online Examination System 1.0. Affected by this issue is some unknown functionality of the file /admin_pic.php. Executing a manipulation can lead to unrestricted upload. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-1424 - PHPGurukul News Portal Profile Pic unrestricted upload

CVE ID : CVE-2026-1424
Published : Jan. 26, 2026, 7:16 a.m. | 38 minutes ago
Description : A vulnerability was identified in PHPGurukul News Portal 1.0. This affects an unknown part of the component Profile Pic Handler. The manipulation leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.
Severity: 5.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-27821 - HDFS native client: Out of bounds write in URI parser of native HDFS client

CVE ID : CVE-2025-27821
Published : Jan. 26, 2026, 10:16 a.m. | 1 hour, 40 minutes ago
Description : Out-of-bounds Write vulnerability in Apache Hadoop HDFS native client. This issue affects Apache Hadoop: from 3.2.0 before 3.4.2. Users are recommended to upgrade to version 3.4.2, which fixes the issue.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-41082 - HTTP Request/Response Smuggling in Altitude Communication Server

CVE ID : CVE-2025-41082
Published : Jan. 26, 2026, 10:16 a.m. | 1 hour, 40 minutes ago
Description : Illegal HTTP request traffic vulnerability (CL.0) in Altitude Communication Server, caused by inconsistent analysis of multiple HTTP requests over a single Keep-Alive connection using Content-Length headers. This can cause a desynchronization of requests between frontend and backend servers, which could allow request hiding, cache poisoning or security bypass.
Severity: 6.9 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-41083 - Improper Neutralization in Altitude Communication Server

CVE ID : CVE-2025-41083
Published : Jan. 26, 2026, 10:16 a.m. | 1 hour, 40 minutes ago
Description : Vulnerability in Altitude Authentication Service and Altitude Communication Server v8.5.3290.0 by Altitude, where manipulation of Host header in HTTP requests allows redirection to an arbitrary URL or modification of the base URL to trick the victim into sending login credentials to a malicious website. This behavior can be used to redirect clients to endpoints controlled by the attacker.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-59090 - Unauthenticated SOAP API in dormakaba Kaba exos 9300

CVE ID : CVE-2025-59090
Published : Jan. 26, 2026, 10:16 a.m. | 1 hour, 40 minutes ago
Description : On the exos 9300 server, a SOAP API is reachable on port 8002. This API does not require any authentication prior to sending requests. Therefore, network access to the exos server allows e.g. the creation of arbitrary access log events as well as querying the 2FA PINs associated with the enrolled chip cards.
Severity: 9.3 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-59091 - Hardcoded Legacy Accounts Allowing Control Over Access Managers in dormakaba Kaba exos 9300

CVE ID : CVE-2025-59091
Published : Jan. 26, 2026, 10:16 a.m. | 1 hour, 40 minutes ago
Description : Multiple hardcoded credentials have been identified, which are allowed to sign-in to the exos 9300 datapoint server running on port 1004 and 1005. This server is used for relaying status information from and to the Access Managers. This information, among other things, is used to graphically visualize open doors and alerts. However, controlling the Access Managers via this interface is also possible. To send and receive status information, authentication is necessary. The Kaba exos 9300 application contains hard-coded credentials for four different users, which are allowed to login to the datapoint server and receive as well as send information, including commands to open arbitrary doors.
Severity: 9.3 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-59092 - Unauthenticated RPC Service in dormakaba Kaba exos 9300

CVE ID : CVE-2025-59092
Published : Jan. 26, 2026, 10:16 a.m. | 1 hour, 40 minutes ago
Description : An RPC service, which is part of exos 9300, is reachable on port 4000, run by the process FSMobilePhoneInterface.exe. This service is used for interprocess communication between services and the Kaba exos 9300 GUI, containing status information about the Access Managers. Interacting with the service does not require any authentication. Therefore, it is possible to send arbitrary status information about door contacts etc. without prior authentication.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-59093 - Insecure Password Derivation Function for Database Administrator in dormakaba Kaba exos 9300

CVE ID : CVE-2025-59093
Published : Jan. 26, 2026, 10:16 a.m. | 1 hour, 40 minutes ago
Description : Exos 9300 instances are using a randomly generated database password to connect to the configured MSSQL server. The password is derived from static random values, which are concatenated to the hostname and a random string that can be read by every user from the registry. This allows an attacker to derive the database password and get authenticated access to the central exos 9300 database as the user Exos9300Common. The user has the roles ExosDialog and ExosDialogDotNet assigned, which are able to read most tables of the database as well as update and insert into many tables.
Severity: 8.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-59094 - Local Privilege Escalation in dormakaba Kaba exos 9300 System management

CVE ID : CVE-2025-59094
Published : Jan. 26, 2026, 10:16 a.m. | 1 hour, 40 minutes ago
Description : A local privilege escalation vulnerability has been identified in the Kaba exos 9300 System management application (d9sysdef.exe). Within this application it is possible to specify an arbitrary executable as well as the weekday and start time, when the specified executable should be run with SYSTEM privileges.
Severity: 8.4 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-59095 - Hard-coded Key for PIN Encryption in dormakaba Kaba exos 9300

CVE ID : CVE-2025-59095
Published : Jan. 26, 2026, 10:16 a.m. | 1 hour, 40 minutes ago
Description : The program libraries (DLL) and binaries used by exos 9300 contain multiple hard-coded secrets. One notable example is the function "EncryptAndDecrypt" in the library Kaba.EXOS.common.dll. This algorithm uses a simple XOR encryption technique combined with a cryptographic key (cryptoKey) to transform each character of the input string. However, it's important to note that this implementation does not provide strong encryption and should not be considered secure for sensitive data. It's more of a custom encryption approach rather than a common algorithm used in cryptographic applications. The key itself is static and based on the founder's name of the company. The functionality is for example used to encrypt the user PINs before storing them in the MSSQL database.
Severity: 6.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-59096 - Weak Default Password in dormakaba Kaba exos 9300

CVE ID : CVE-2025-59096
Published : Jan. 26, 2026, 10:16 a.m. | 1 hour, 40 minutes ago
Description : The default password for the extended admin user mode in the application U9ExosAdmin.exe ("Kaba 9300 Administration") is hard-coded in multiple locations as well as documented in the locally stored user documentation.
Severity: 4.6 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-59097 - Unauthenticated SOAP API in dormakaba access manager

CVE ID : CVE-2025-59097
Published : Jan. 26, 2026, 10:16 a.m. | 1 hour, 40 minutes ago
Description : The exos 9300 application can be used to configure Access Managers (e.g. 92xx, 9230 and 9290). The configuration is done in a graphical user interface on the dormakaba exos server. As soon as the save button is clicked in exos 9300, the whole configuration is sent to the selected Access Manager via SOAP. The SOAP request is sent without any prior authentication or authorization by default. Though authentication and authorization can be configured using IPsec for 92xx-K5 devices and mTLS for 92xx-K7 devices, it is not enabled by default and must therefore be activated with additional steps. This insecure default allows an attacker with network level access to completely control the whole environment. An attacker is for example easily able to conduct the following tasks without prior authentication: - Re-configure Access Managers (e.g. remove alarming system requirements) - Freely re-configure the inputs and outputs - Open all connected doors permanently - Open all doors for a defined time interval - Change the admin password - and many more Network level access can be gained due to an insufficient network segmentation as well as missing LAN firewalls. Devices with an insecure configuration have been identified to be directly exposed to the internet.
Severity: 9.3 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-59098 - Trace Functionality Leaking Sensitive Data in dormakaba access manager

CVE ID : CVE-2025-59098
Published : Jan. 26, 2026, 10:16 a.m. | 1 hour, 40 minutes ago
Description : The Access Manager is offering a trace functionality to debug errors and issues with the device. The trace functionality is implemented as a simple TCP socket. A tool called TraceClient.exe, provided by dormakaba via the Access Manager web interface, is used to connect to the socket and receive debug information. The data is permanently broadcasted on the TCP socket. The socket can be accessed without any authentication or encryption. The transmitted data is based on the set verbosity level. The verbosity level can be set using the http(s) endpoint with the service interface password or with the guessable identifier of the device via the SOAP interface. The transmitted data contains sensitive data like the Card ID as well as all button presses on Registration units. This allows an attacker with network level access to retrieve all entered PINs on a registration unit.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-59099 - Unauthenticated Path Traversal in dormakaba access manager

CVE ID : CVE-2025-59099
Published : Jan. 26, 2026, 10:16 a.m. | 1 hour, 40 minutes ago
Description : The Access Manager is using the open source web server CompactWebServer written in C#. This web server is affected by a path traversal vulnerability, which allows an attacker to directly access files via simple GET requests without prior authentication. Hence, it is possible to retrieve all files stored on the file system, including the SQLite database Database.sq3, containing badge information and the corresponding PIN codes. Additionally, when trying to access certain files, the web server crashes and becomes unreachable for about 60 seconds. This can be abused to continuously send the request and cause denial of service.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...