CVE tracker
283 subscribers
3.7K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2026-2320 - Google Chrome File Input UI Spoofing Vulnerability

CVE ID : CVE-2026-2320
Published : Feb. 11, 2026, 6:08 p.m. | 1 hour, 15 minutes ago
Description : Inappropriate implementation in File input in Google Chrome prior to 145.0.7632.45 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-2321 - Google Chrome Ozone Use-After-Free Heap Corruption

CVE ID : CVE-2026-2321
Published : Feb. 11, 2026, 6:08 p.m. | 1 hour, 15 minutes ago
Description : Use after free in Ozone in Google Chrome prior to 145.0.7632.45 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-2322 - Google Chrome UI Spoofing Vulnerability

CVE ID : CVE-2026-2322
Published : Feb. 11, 2026, 6:08 p.m. | 1 hour, 14 minutes ago
Description : Inappropriate implementation in File input in Google Chrome prior to 145.0.7632.45 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-2323 - Google Chrome UI Spoofing Vulnerability

CVE ID : CVE-2026-2323
Published : Feb. 11, 2026, 6:08 p.m. | 1 hour, 14 minutes ago
Description : Inappropriate implementation in Downloads in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-65128 - Shenzhen Zhibotong Electronics ZBT WE2001 Unauthenticated Configuration Modification Vulnerability

CVE ID : CVE-2025-65128
Published : Feb. 11, 2026, 6:16 p.m. | 1 hour, 7 minutes ago
Description : A missing authentication mechanism in the web management API components of Shenzhen Zhibotong Electronics ZBT WE2001 23.09.27 allows unauthenticated attackers on the local network to modify router and network configurations. By invoking operations whose names end with "*_nocommit" and supplying the parameters expected by the invoked function, an attacker can change configuration data, including SSID, Wi-Fi credentials, and administrative passwords, without authentication or an existing session.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-65480 - Pacom Unison Client Remote Code Execution Vulnerability

CVE ID : CVE-2025-65480
Published : Feb. 11, 2026, 6:16 p.m. | 1 hour, 7 minutes ago
Description : An issue was discovered in Pacom Unison Client 5.13.1. Authenticated users can inject malicious scripts in the Report Templates which are executed when certain script conditions are fulfilled, leading to Remote Code Execution.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-69874 - Nanotar Path Traversal Vulnerability

CVE ID : CVE-2025-69874
Published : Feb. 11, 2026, 6:16 p.m. | 1 hour, 7 minutes ago
Description : nanotar through 0.2.0 has a path traversal vulnerability in parseTar() and parseTarGzip() that allows remote attackers to write arbitrary files outside the intended extraction directory via a crafted tar archive containing path traversal sequence.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-70029 - Sunbird-Ed SSL/TLS Certificate Validation Bypass Vulnerability

CVE ID : CVE-2025-70029
Published : Feb. 11, 2026, 6:16 p.m. | 1 hour, 6 minutes ago
Description : An issue in Sunbird-Ed SunbirdEd-portal v1.13.4 allows attackers to obtain sensitive information. The application disables TLS/SSL certificate validation by setting 'rejectUnauthorized': false in HTTP request options
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-70083 - OpenSatKit Stack Buffer Overflow Vulnerability

CVE ID : CVE-2025-70083
Published : Feb. 11, 2026, 6:16 p.m. | 1 hour, 6 minutes ago
Description : An issue was discovered in OpenSatKit 2.2.1. The DirName field in the telecommand is provided by the ground segment and must be treated as untrusted input. The program copies DirName into the local buffer DirWithSep using strcpy. The size of this buffer is OS_MAX_PATH_LEN. If the length of DirName is greater than or equal to OS_MAX_PATH_LEN, a stack buffer overflow occurs, overwriting adjacent stack memory. The path length check (FileUtil_AppendPathSep) is performed after the strcpy operation, meaning the validation occurs too late and cannot prevent the overflow.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-70084 - OpenSatKit Directory Traversal Vulnerability

CVE ID : CVE-2025-70084
Published : Feb. 11, 2026, 6:16 p.m. | 1 hour, 6 minutes ago
Description : Directory traversal vulnerability in OpenSatKit 2.2.1 allows attackers to gain access to sensitive information or delete arbitrary files via crafted value to the FileUtil_GetFileInfo function.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-70085 - OpenSatKit Stack Buffer Overflow

CVE ID : CVE-2025-70085
Published : Feb. 11, 2026, 6:16 p.m. | 1 hour, 6 minutes ago
Description : An issue was discovered in OpenSatKit 2.2.1. The EventErrStr buffer has a fixed size of 256 bytes. The code uses sprintf to format two filenames (Source1Filename and the string returned by FileUtil_FileStateStr) into this buffer without any length checking and without using bounded format specifiers such as %.*s. If the filename length approaches OS_MAX_PATH_LEN (commonly 64-256 bytes), the combined formatted string together with constant text can exceed 256 bytes, resulting in a stack buffer overflow. Such unsafe sprintf calls are scattered across multiple functions in file.c, including FILE_ConcatenateCmd() and ConcatenateFiles(), all of which fail to validate the output length.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-0228 - PAN-OS: Improper Validation of Terminal Server Agent Certificate

CVE ID : CVE-2026-0228
Published : Feb. 11, 2026, 6:16 p.m. | 1 hour, 6 minutes ago
Description : An improper certificate validation vulnerability in PAN-OS allows users to connect Terminal Server Agents on Windows to PAN-OS using expired certificates even if the PAN-OS configuration would not normally permit them to do so.
Severity: 1.3 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-0229 - PAN-OS: Denial of Service in Advanced DNS Security Feature

CVE ID : CVE-2026-0229
Published : Feb. 11, 2026, 6:16 p.m. | 1 hour, 6 minutes ago
Description : A denial-of-service (DoS) vulnerability in the Advanced DNS Security (ADNS) feature of Palo Alto Networks PAN-OS® software enables an unauthenticated attacker to initiate system reboots using a maliciously crafted packet. Repeated attempts to initiate a reboot causes the firewall to enter maintenance mode. Cloud NGFW and Prisma Access® are not impacted by this vulnerability.
Severity: 6.6 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-2360 - Improper search_path protection in PostgreSQL Anonymizer 2.5 allows any user to gain superuser privileges in PostgreSQL 14

CVE ID : CVE-2026-2360
Published : Feb. 11, 2026, 6:16 p.m. | 1 hour, 6 minutes ago
Description : PostgreSQL Anonymizer contains a vulnerability that allows a user to gain superuser privileges by creating a custom operator in the public schema and place malicious code in that operator. This operator will later be executed with superuser privileges when the extension is created. The risk is higher with PostgreSQL 14 or with instances upgraded from PostgreSQL 14 or a prior version. With PostgreSQL 15 and later, the creation permission on the public schema is revoked by default and this exploit can only be achieved if a superuser adds a new schema in her/his own search_path and grants the CREATE privilege on that schema to untrusted users, both actions being clearly discouraged by the PostgreSQL documentation. The problem is resolved in PostgreSQL Anonymizer 3.0.1 and further versions
Severity: 8.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-2361 - Improper search_path protection in PostgreSQL Anonymizer 2.5 allows any user with create privilege to gain superuser privileges

CVE ID : CVE-2026-2361
Published : Feb. 11, 2026, 6:16 p.m. | 1 hour, 6 minutes ago
Description : PostgreSQL Anonymizer contains a vulnerability that allows a user to gain superuser privileges by creating a temporary view based on a function containing malicious code. When the anon.get_tablesample_ratio function is then called, the malicious code is executed with superuser privileges. This privilege elevation can be exploited by users having the CREATE privilege in PostgreSQL 15 and later. The risk is higher with PostgreSQL 14 or with instances upgraded from PostgreSQL 14 or a prior version because the creation permission on the public schema is granted by default. The problem is resolved in PostgreSQL Anonymizer 3.0.1 and further versions
Severity: 8.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-20658 - macOS Tahoe Root Privilege Escalation

CVE ID : CVE-2026-20658
Published : Feb. 11, 2026, 10:58 p.m. | 26 minutes ago
Description : A package validation issue was addressed by blocking the vulnerable package. This issue is fixed in macOS Tahoe 26.3. An app may be able to gain root privileges.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-20619 - Apple macOS Data Exposure Vulnerability

CVE ID : CVE-2026-20619
Published : Feb. 11, 2026, 10:58 p.m. | 26 minutes ago
Description : A logging issue was addressed with improved data redaction. This issue is fixed in macOS Sequoia 15.7.4, macOS Tahoe 26.3. An app may be able to access sensitive user data.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-46301 - "Apple HID Device Crash Vulnerability"

CVE ID : CVE-2025-46301
Published : Feb. 11, 2026, 10:58 p.m. | 26 minutes ago
Description : The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, macOS Sonoma 14.8.4. A malicious HID device may cause an unexpected process crash.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-20662 - Apple macOS Lock Screen Information Disclosure Vulnerability

CVE ID : CVE-2026-20662
Published : Feb. 11, 2026, 10:58 p.m. | 26 minutes ago
Description : An authorization issue was addressed with improved state management. This issue is fixed in macOS Sequoia 15.7.4, macOS Tahoe 26.3. An attacker with physical access to a locked device may be able to view sensitive user information.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-20635 - Apple Safari Web Content Crash

CVE ID : CVE-2026-20635
Published : Feb. 11, 2026, 10:58 p.m. | 26 minutes ago
Description : The issue was addressed with improved memory handling. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3, Safari 26.3. Processing maliciously crafted web content may lead to an unexpected process crash.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-20623 - MacOS Tahoe Kernel Privilege Escalation

CVE ID : CVE-2026-20623
Published : Feb. 11, 2026, 10:58 p.m. | 26 minutes ago
Description : A permissions issue was addressed by removing the vulnerable code. This issue is fixed in macOS Tahoe 26.3. An app may be able to access protected user data.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...