CVE-2025-68493 - Apache Struts, Apache Struts: XXE vulnerability in outdated XWork component
Published: Sun, 11 Jan 2026 13:15:45 +0000
CVE ID : CVE-2025-68493
Published : Jan. 11, 2026, 1:15 p.m. | 3 hours, 29 minutes ago
Description : Missing XML Validation vulnerability in Apache Struts, Apache Struts.
This issue affects Apache Struts: from 2.0.0 before 2.2.1; Apache Struts: from 2.2.1 through 6.1.0.
Users are recommended to upgrade to version 6.1.1, which fixes the issue.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-15506 - AcademySoftwareFoundation OpenColorIO FileRules.cpp ConvertToRegularExpression out-of-bounds
Published: Sun, 11 Jan 2026 11:15:49 +0000
CVE ID : CVE-2025-15506
Published : Jan. 11, 2026, 11:15 a.m. | 5 hours, 29 minutes ago
Description : A vulnerability was found in AcademySoftwareFoundation OpenColorIO up to 2.5.0. This issue affects the function ConvertToRegularExpression of the file src/OpenColorIO/FileRules.cpp. Performing a manipulation results in out-of-bounds read. The attack needs to be approached locally. The exploit has been made public and could be used. The patch is named ebdbb75123c9d5f4643e041314e2bc988a13f20d. To fix this issue, it is recommended to deploy a patch. The fix was added to the 2.5.1 milestone.
Severity: 4.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-0843 - jiujiujia/victor123/wxw850227 jjjfood/jjjshop_food index sql injection
Published: Sun, 11 Jan 2026 09:15:50 +0000
CVE ID : CVE-2026-0843
Published : Jan. 11, 2026, 9:15 a.m. | 7 hours, 29 minutes ago
Description : A vulnerability has been found in jiujiujia/victor123/wxw850227 jjjfood and jjjshop_food up to 20260103. This vulnerability affects unknown code of the file /index.php/api/product.category/index. Such manipulation of the argument latitude leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product is distributed under multiple different names. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-0842 - Flycatcher Toys smART Sketcher Bluetooth Low Energy missing authentication
Published: Sun, 11 Jan 2026 08:16:00 +0000
CVE ID : CVE-2026-0842
Published : Jan. 11, 2026, 8:16 a.m. | 8 hours, 29 minutes ago
Description : A flaw has been found in Flycatcher Toys smART Sketcher up to 2.0. This affects an unknown part of the component Bluetooth Low Energy Interface. This manipulation causes missing authentication. The attack can only be done within the local network. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 6.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-0841 - UTT 进取 520W formPictureUrl strcpy buffer overflow
Published: Sun, 11 Jan 2026 08:15:59 +0000
CVE ID : CVE-2026-0841
Published : Jan. 11, 2026, 8:15 a.m. | 8 hours, 29 minutes ago
Description : A vulnerability was detected in UTT 进取 520W 1.7.7-180627. Affected by this issue is the function strcpy of the file /goform/formPictureUrl. The manipulation of the argument importpictureurl results in buffer overflow. It is possible to launch the attack remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 9.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-0840 - UTT 进取 520W formConfigNoticeConfig strcpy buffer overflow
Published: Sun, 11 Jan 2026 07:15:49 +0000
CVE ID : CVE-2026-0840
Published : Jan. 11, 2026, 7:15 a.m. | 9 hours, 29 minutes ago
Description : A security vulnerability has been detected in UTT 进取 520W 1.7.7-180627. Affected by this vulnerability is the function strcpy of the file /goform/formConfigNoticeConfig. The manipulation of the argument timestart leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 9.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-0839 - UTT 进取 520W APSecurity strcpy buffer overflow
Published: Sun, 11 Jan 2026 06:15:57 +0000
CVE ID : CVE-2026-0839
Published : Jan. 11, 2026, 6:15 a.m. | 10 hours, 29 minutes ago
Description : A weakness has been identified in UTT 进取 520W 1.7.7-180627. Affected is the function strcpy of the file /goform/APSecurity. Executing a manipulation of the argument wepkey1 can lead to buffer overflow. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 9.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-0838 - UTT 进取 520W ConfigWirelessBase strcpy buffer overflow
Published: Sun, 11 Jan 2026 06:15:57 +0000
CVE ID : CVE-2026-0838
Published : Jan. 11, 2026, 6:15 a.m. | 10 hours, 29 minutes ago
Description : A security flaw has been discovered in UTT 进取 520W 1.7.7-180627. This impacts the function strcpy of the file /goform/ConfigWirelessBase. Performing a manipulation of the argument ssid results in buffer overflow. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 9.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-0837 - UTT 进取 520W formFireWall strcpy buffer overflow
Published: Sun, 11 Jan 2026 05:15:58 +0000
CVE ID : CVE-2026-0837
Published : Jan. 11, 2026, 5:15 a.m. | 11 hours, 29 minutes ago
Description : A vulnerability was identified in UTT 进取 520W 1.7.7-180627. This affects the function strcpy of the file /goform/formFireWall. Such manipulation of the argument GroupName leads to buffer overflow. The attack can be executed remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 9.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-0836 - UTT 进取 520W formConfigFastDirectionW strcpy buffer overflow
Published: Sun, 11 Jan 2026 05:15:47 +0000
CVE ID : CVE-2026-0836
Published : Jan. 11, 2026, 5:15 a.m. | 11 hours, 29 minutes ago
Description : A vulnerability was determined in UTT 进取 520W 1.7.7-180627. The impacted element is the function strcpy of the file /goform/formConfigFastDirectionW. This manipulation of the argument ssid causes buffer overflow. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 9.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-15505 - Luxul XWR-600 Web Administration cross site scripting
Published: Sun, 11 Jan 2026 02:15:58 +0000
CVE ID : CVE-2025-15505
Published : Jan. 11, 2026, 2:15 a.m. | 14 hours, 29 minutes ago
Description : A vulnerability was found in Luxul XWR-600 up to 4.0.1. The affected element is an unknown function of the component Web Administration Interface. The manipulation of the argument Guest Network/Wireless Profile SSID results in cross site scripting. The attack may be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond with a technical statement.
Severity: 4.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-0824 - questdb ui Web Console cross site scripting
Published: Sat, 10 Jan 2026 15:15:50 +0000
CVE ID : CVE-2026-0824
Published : Jan. 10, 2026, 3:15 p.m. | 1 day, 1 hour ago
Description : A security flaw has been discovered in questdb ui up to 1.11.9. Impacted is an unknown function of the component Web Console. The manipulation results in cross site scripting. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks. Upgrading to version 1.1.10 is recommended to address this issue. The patch is identified as b42fd9f18476d844ae181a10a249e003dafb823d. You should upgrade the affected component. The vendor confirmed early that the fix "is going to be released as a part of QuestDB 9.3.0" as well.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-0822 - quickjs-ng quickjs quickjs.c js_typed_array_sort heap-based overflow
Published: Sat, 10 Jan 2026 14:15:50 +0000
CVE ID : CVE-2026-0822
Published : Jan. 10, 2026, 2:15 p.m. | 1 day, 2 hours ago
Description : A vulnerability was identified in quickjs-ng quickjs up to 0.11.0. This issue affects the function js_typed_array_sort of the file quickjs.c. The manipulation leads to heap-based buffer overflow. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The identifier of the patch is 53eefbcd695165a3bd8c584813b472cb4a69fbf5. To fix this issue, it is recommended to deploy a patch.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-13393 - Featured Image from URL (FIFU) <= 5.3.1 - Authenticated (Contributor+) Server-Side Request Forgery via 'fifu_input_url'
Published: Sat, 10 Jan 2026 14:15:49 +0000
CVE ID : CVE-2025-13393
Published : Jan. 10, 2026, 2:15 p.m. | 1 day, 2 hours ago
Description : The Featured Image from URL (FIFU) plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 5.3.1. This is due to insufficient validation of user-supplied URLs before passing them to the getimagesize() function in the Elementor widget integration. This makes it possible for authenticated attackers, with Contributor-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services via the fifu_input_url parameter in the FIFU Elementor widget granted they have permissions to use Elementor.
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-12379 - Shortcodes and extra features for Phlox theme <= 2.17.13 - Authenticated (Contributor+) Stored Cross-Site Scripting via Modern Heading Widget
Published: Sat, 10 Jan 2026 14:15:49 +0000
CVE ID : CVE-2025-12379
Published : Jan. 10, 2026, 2:15 p.m. | 1 day, 2 hours ago
Description : The Shortcodes and extra features for Phlox theme plugin for WordPress is vulnerable to Stored Cross-Site Scripting via a combination of the 'tag' and ‘title_tag’ parameters in all versions up to, and including, 2.17.13 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity: 6.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-0821 - quickjs-ng quickjs quickjs.c js_typed_array_constructor heap-based overflow
Published: Sat, 10 Jan 2026 13:15:49 +0000
CVE ID : CVE-2026-0821
Published : Jan. 10, 2026, 1:15 p.m. | 1 day, 3 hours ago
Description : A vulnerability was determined in quickjs-ng quickjs up to 0.11.0. This vulnerability affects the function js_typed_array_constructor of the file quickjs.c. Executing a manipulation can lead to heap-based buffer overflow. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. This patch is called c5d80831e51e48a83eab16ea867be87f091783c5. A patch should be applied to remediate this issue.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-14555 - Countdown Timer - Widget Countdown <= 2.7.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
Published: Sat, 10 Jan 2026 13:15:48 +0000
CVE ID : CVE-2025-14555
Published : Jan. 10, 2026, 1:15 p.m. | 1 day, 3 hours ago
Description : The Countdown Timer – Widget Countdown plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wpdevart_countdown' shortcode in all versions up to, and including, 2.7.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity: 6.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-15504 - lief-project LIEF ELF Binary Parser.tcc parse_binary null pointer dereference
Published: Sat, 10 Jan 2026 12:15:49 +0000
CVE ID : CVE-2025-15504
Published : Jan. 10, 2026, 12:15 p.m. | 1 day, 4 hours ago
Description : A security flaw has been discovered in lief-project LIEF up to 0.17.1. Affected by this issue is the function Parser::parse_binary of the file src/ELF/Parser.tcc of the component ELF Binary Parser. The manipulation results in null pointer dereference. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. Upgrading to version 0.17.2 can resolve this issue. The patch is identified as 81bd5d7ea0c390563f1c4c017c9019d154802978. It is recommended to upgrade the affected component.
Severity: 4.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-14506 - ConvertForce Popup Builder <= 0.0.7 - Stored Cross-Site Scripting via entrance_animation
Published: Sat, 10 Jan 2026 12:15:48 +0000
CVE ID : CVE-2025-14506
Published : Jan. 10, 2026, 12:15 p.m. | 1 day, 4 hours ago
Description : The ConvertForce Popup Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Gutenberg block's `entrance_animation` attribute in all versions up to, and including, 0.0.7. This is due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity: 6.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-0831 - Templately <= 3.4.8 - Unauthenticated Limited Arbitrary JSON File Write
Published: Sat, 10 Jan 2026 10:15:50 +0000
CVE ID : CVE-2026-0831
Published : Jan. 10, 2026, 10:15 a.m. | 1 day, 6 hours ago
Description : The Templately plugin for WordPress is vulnerable to Arbitrary File Write in all versions up to, and including, 3.4.8. This is due to inadequate input validation in the `save_template_to_file()` function where user-controlled parameters like `session_id`, `content_id`, and `ai_page_ids` are used to construct file paths without proper sanitization. This makes it possible for unauthenticated attackers to write arbitrary `.ai.json` files to locations within the uploads directory.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-62235 - Apache Mynewt NimBLE: Incorrect handling of SMP Security Request could lead to undesirable pairing
Published: Sat, 10 Jan 2026 10:15:50 +0000
CVE ID : CVE-2025-62235
Published : Jan. 10, 2026, 10:15 a.m. | 1 day, 6 hours ago
Description : Authentication Bypass by Spoofing vulnerability in Apache NimBLE.
Receiving specially crafted Security Request could lead to removal of original bond and re-bond with impostor.
This issue affects Apache NimBLE: through 1.8.0.
Users are recommended to upgrade to version 1.9.0, which fixes the issue.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-53477 - Apache Mynewt NimBLE: NULL Pointer Dereference in NimBLE host HCI layer
Published: Sat, 10 Jan 2026 10:15:50 +0000
CVE ID : CVE-2025-53477
Published : Jan. 10, 2026, 10:15 a.m. | 1 day, 6 hours ago
Description : NULL Pointer Dereference vulnerability in Apache Nimble.
Missing validation of HCI connection complete or HCI command TX buffer could lead to NULL pointer dereference.
This issue requires disabled asserts and broken or bogus Bluetooth controller and thus severity is considered low.
This issue affects Apache NimBLE: through 1.8.0.
Users are recommended to upgrade to version 1.9.0, which fixes the issue.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-53470 - Apache Mynewt NimBLE: Out-of-Bounds Write Vulnerability in NimBLE HCI H4 driver
Published: Sat, 10 Jan 2026 10:15:50 +0000
CVE ID : CVE-2025-53470
Published : Jan. 10, 2026, 10:15 a.m. | 1 day, 6 hours ago
Description : Out-of-bounds Read vulnerability in Apache NimBLE HCI H4 driver. Specially crafted HCI event could lead to invalid memory read in H4 driver.
This issue affects Apache NimBLE: through 1.8.
This issue requires a broken or bogus Bluetooth controller and thus severity is considered low.
Users are recommended to upgrade to version 1.9, which fixes the issue.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-52435 - Apache Mynewt NimBLE: Invalid error handling in pause encryption procedure in NimBLE controller
Published: Sat, 10 Jan 2026 10:15:50 +0000
CVE ID : CVE-2025-52435
Published : Jan. 10, 2026, 10:15 a.m. | 1 day, 6 hours ago
Description : J2EE Misconfiguration: Data Transmission Without Encryption vulnerability in Apache NimBLE.
Improper handling of Pause Encryption procedure on Link Layer results in a previously encrypted connection being left in un-encrypted state allowing an eavesdropper to observe the remainder of the exchange.
This issue affects Apache NimBLE: through <= 1.8.0.
Users are recommended to upgrade to version 1.9.0, which fixes the issue.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-15503 - Sangfor Operation and Maintenance Management System common.jsp unrestricted upload
Published: Sat, 10 Jan 2026 09:15:49 +0000
CVE ID : CVE-2025-15503
Published : Jan. 10, 2026, 9:15 a.m. | 1 day, 7 hours ago
Description : A security flaw has been discovered in Sangfor Operation and Maintenance Management System up to 3.0.8. The impacted element is an unknown function of the file /fort/trust/version/common/common.jsp. Performing a manipulation of the argument File results in unrestricted upload. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
