Trending

Latest Posts by Offensive Sequence

Preview
Hackers Targeting Critical Ninja Forms Bug That Exposes WordPress Sites to Takeo The reported vulnerability in Ninja Forms permits unauthorized file uploads to a WordPress site's server, which can lead to remote code execution. This type of vulnerability can allow attackers to execute arbitrary commands or deploy malici

CRITICAL Ninja Forms bug lets attackers upload files — remote code execution risk for WordPress sites. No patch yet: restrict uploads & monitor activity. radar.offseq.com/threat/hackers-targeting... #OffSeq #WordPress #Security

24 minutes ago 0 0 0 0
Preview
CVE-2026-25776: Code injection in Six Apart Ltd. Movable Type CVE-2026-25776 is a critical code injection vulnerability in Movable Type by Six Apart Ltd., affecting versions 9.1.0 and earlier. The vulnerability permits remote, unauthenticated attackers to execute arbitrary Perl code, potentially leadi

Six Apart Movable Type ≤9.1.0 hit by CRITICAL code injection flaw. Unauthenticated attackers can run Perl scripts. No patch — restrict access & monitor logs. radar.offseq.com/threat/cve-2026-25776-co... #OffSeq #Vulnerability #Cybersecurity

1 hour ago 0 0 0 0
Preview
CVE-2026-3535: CWE-434 Unrestricted Upload of File with Dangerous Type in mlfact CVE-2026-3535 is a critical vulnerability in the mlfactory DSGVO Google Web Fonts GDPR plugin for WordPress. The vulnerability arises from the DSGVOGWPdownloadGoogleFonts() function, which downloads files from user-supplied URLs without val

CRITICAL: DSGVO Google Web Fonts GDPR plugin for WordPress lets unauth attackers upload PHP shells via AJAX. No patch yet — disable plugin or restrict AJAX if using vulnerable themes. More info: radar.offseq.com/threat/cve-2026-3535-cwe... #OffSeq #W...

3 hours ago 0 0 0 0
Preview
Iran-Linked Hackers Disrupt US Critical Infrastructure via PLC Attacks This threat involves Iranian-affiliated hackers conducting attacks on US critical infrastructure by compromising PLC and SCADA systems, which are key components of industrial control systems managing operational technology. The attacks have

CRITICAL: Iran-linked hackers disrupt US infrastructure via PLC & SCADA attacks. OT disruptions ongoing — check vendor advisories & strengthen OT defenses now. radar.offseq.com/threat/iran-linked-hacke... #OffSeq #ICS #OTsecurity

4 hours ago 0 0 0 0
Preview
CVE-2026-4003: CWE-862 Missing Authorization in felixmartinez Users manager – PN CVE-2026-4003 affects the Users manager – PN plugin for WordPress, where the userspn_ajax_nopriv_server() function improperly authorizes requests. The conditional check only blocks unauthenticated users if the user_id parameter is empty, bu

🚨 CRITICAL: Users manager – PN plugin for WordPress lets unauthenticated attackers escalate privileges by updating any user meta. Disable plugin until fixed! radar.offseq.com/threat/cve-2026-4003-cwe... #OffSeq #WordPress #Security

6 hours ago 0 0 0 0
Preview
Iran-Linked Hackers Disrupt US Critical Infrastructure via PLC Attacks This threat involves Iranian-affiliated hackers conducting attacks on US critical infrastructure by compromising PLC and SCADA systems, which are key components of industrial control systems managing operational technology. The attacks have

CRITICAL: Iran-linked actors disrupt US critical infrastructure via PLC & SCADA attacks ⚠️. No CVE yet. Monitor vendor updates, follow federal guidance, and secure OT environments. radar.offseq.com/threat/iran-linked-hacke... #OffSeq #ICS #CyberThreat

7 hours ago 0 0 0 0
Preview
CVE-2026-39846: CWE-79: Improper Neutralization of Input During Web Page Generat SiYuan versions before 3.6.4 contain a stored XSS vulnerability in the handling of table caption content. The content is saved without safe escaping and later injected into the rendered HTML in the Electron desktop client. Because the clien

🚨 SiYuan <3.6.4 has a CRITICAL stored XSS bug — malicious notes can trigger remote code execution in the desktop app. Upgrade to 3.6.4 now. Details: radar.offseq.com/threat/cve-2026-39846-cw... #OffSeq #SiYuan #security

8 hours ago 0 0 0 0
Preview
CVE-2026-1346: CWE-250 Execution with Unnecessary Privileges in IBM Verify Ident This vulnerability (CVE-2026-1346) affects IBM Verify Identity Access Container versions 11.0 through 11.0.2 and IBM Security Verify Access Container versions 10.0 through 10.0.9.1. It stems from execution with unnecessary privileges, allow

IBM Verify Identity Access Container (10.0 – 11.0.2) faces a CRITICAL flaw: local users can escalate to root. No patch yet — restrict access & monitor updates. radar.offseq.com/threat/cve-2026-1346-cwe... #OffSeq #IBMSecurity #Vulnerability

10 hours ago 0 0 0 0
Preview
CVE-2026-39847: CWE-22: Improper Limitation of a Pathname to a Restricted Direct Emmett framework versions from 2.5.0 to before 2.8.1 contain a path traversal vulnerability (CWE-22) in the RSGI static handler serving internal assets under the /__emmett__ path. By crafting requests with ../ sequences (e.g., /__emmett__/.

CRITICAL: Emmett (2.5.0 – <2.8.1) has a path traversal flaw — attackers can read server files remotely. Upgrade to 2.8.1+ now to secure your systems! radar.offseq.com/threat/cve-2026-39847-cw... #OffSeq #Emmett #Vulnerability

11 hours ago 1 0 0 0
Preview
CVE-2026-39933: CWE-79 Improper neutralization of input during web page generati Improper neutralization of input during web page generation ('cross-site scripting') vulnerability in The Wikimedia Foundation Mediawiki - GlobalWatchlist Extension allows Cross-Site Scripting (XSS).This issue affects non release branches.

🚨 CRITICAL XSS in Mediawiki - GlobalWatchlist Extension (non-release branches). Severity: CRITICAL. Review non-release deployments now. radar.offseq.com/threat/cve-2026-39933-cw... #OffSeq #XSS #Mediawiki

13 hours ago 0 0 0 0
Advertisement
Preview
Critical Flowise Vulnerability in Attacker Crosshairs The vulnerability in Flowise arises from inadequate validation of JavaScript code supplied by users. This weakness permits attackers to execute arbitrary code, which may lead to unauthorized access to the file system. The lack of detailed v

Critical Flowise bug: improper JavaScript validation can let attackers run arbitrary code & access the file system. No patch yet — restrict who can access your Flowise instance! Details: radar.offseq.com/threat/critical-flowise-... #OffSeq #Flowise #...

19 hours ago 0 0 0 0
Preview
CVE-2026-5627: CWE-29 Path Traversal: '\..\filename' in mintplex-labs mintplex-l This vulnerability arises from improper input handling in the AgentFlows component of mintplex-labs/anything-llm (<=1.9.1). The combination of path.join and normalizePath functions in server/utils/agentFlows/index.js fails to prevent path t

CRITICAL path traversal in mintplex-labs/anything-llm (<=1.9.1) lets high-priv attackers read or delete .json files. Upgrade to 1.12.1 & restrict access. radar.offseq.com/threat/cve-2026-5627-cwe... #OffSeq #Security #PatchNow

21 hours ago 0 0 0 0
Preview
CVE-2026-34989: CWE-79: Improper Neutralization of Input During Web Page Generat CI4MS versions before 31.0.0.0 fail to neutralize user input properly when users update their profile names, leading to stored cross-site scripting (CWE-79). Malicious JavaScript injected into profile names is stored on the server and later

ci4-cms-erp ci4ms <31.0.0.0 faces CRITICAL stored XSS (CVSS 9.4)! Attackers can run JS via profile name fields. Upgrade to 31.0.0.0+ for protection. radar.offseq.com/threat/cve-2026-34989-cw... #OffSeq #XSS #WebSecurity

22 hours ago 0 0 0 0
Preview
CVE-2026-35393: CWE-22: Improper Limitation of a Pathname to a Restricted Direct The vulnerability in goshs (prior to version 2.0.0-beta.3) involves improper limitation of a pathname to a restricted directory (CWE-22). Specifically, the POST multipart upload directory is not sanitized, which can allow an attacker to per

goshs <2.0.0-beta.3 hit by CRITICAL path traversal bug. Attackers can write files anywhere — patch to 2.0.0-beta.3 ASAP! Details: radar.offseq.com/threat/cve-2026-35393-cw... #OffSeq #Security #Vulnerability

1 day ago 1 0 0 0
Preview
White House Seeks to Slash CISA Funding by $707 Million This report details a significant budget cut proposed for CISA, reducing its funding by $707 million in FY2027. The intent is to narrow CISA's focus to its primary responsibilities of safeguarding federal agencies and critical infrastructur

⚠️ CRITICAL: White House seeks $707M cut to CISA funding. No direct exploit, but federal cyber defense may be impacted. Monitor CISA updates for changes. radar.offseq.com/threat/white-house-seeks... #OffSeq #CISA #security

1 day ago 0 0 0 0
Preview
CVE-2026-35471: CWE-22: Improper Limitation of a Pathname to a Restricted Direct The vulnerability in goshs arises from improper limitation of a pathname to a restricted directory (CWE-22). Specifically, prior to version 2.0.0-beta.3, the tdeleteFile() function fails to return immediately after detecting a path traversa

CRITICAL: goshs < 2.0.0-beta.3 path traversal bug lets remote attackers access or delete files. Upgrade to 2.0.0-beta.3 now! 🛡️ radar.offseq.com/threat/cve-2026-35471-cw... #OffSeq #infosec #golang

1 day ago 0 0 0 0
Preview
CVE-2026-1114: CWE-284 Improper Access Control in parisneo parisneo/lollms In parisneo/lollms version 2.1.0, the application's session management is vulnerable to improper access control due to the use of a weak secret key for signing JSON Web Tokens (JWT). This vulnerability allows an attacker to perform an offli

CRITICAL vuln in parisneo/lollms v2.1.0: Weak JWT secret lets attackers forge admin tokens & escalate privileges. Patch to v2.2.0 now! 🔒 radar.offseq.com/threat/cve-2026-1114-cwe... #OffSeq #CVE20261114 #AppSec

1 day ago 0 0 0 0
Preview
CVE-2026-0740: CWE-434 Unrestricted Upload of File with Dangerous Type in Saturd CVE-2026-0740 is a critical vulnerability in the Ninja Forms - File Uploads plugin for WordPress, caused by insufficient validation of uploaded file types in the NF_FU_AJAX_Controllers_Uploads::handle_upload function. This allows unauthenti

CRITICAL: Ninja Forms - File Uploads plugin (≤3.3.26) lets unauthenticated attackers upload arbitrary files, risking RCE. Upgrade to 3.3.27+ ASAP! radar.offseq.com/threat/cve-2026-0740-cwe... #OffSeq #WordPress #Security

1 day ago 0 0 0 0
Preview
CVE-2026-35022: CWE-78 Improper Neutralization of Special Elements used in an OS CVE-2026-35022 is an OS command injection vulnerability (CWE-78) in Anthropic Claude Code CLI and Claude Agent SDK. The issue arises because authentication helper configuration values are executed with shell=true without proper input valida

CRITICAL: OS command injection in Anthropic Claude Code CLI & Agent SDK (CVSS 9.3). Arbitrary code exec possible via manipulated auth params. Vendor has patched — check status. radar.offseq.com/threat/cve-2026-35022-cw... #OffSeq #CloudSecurity #Vuln...

1 day ago 0 0 0 0
Preview
CVE-2026-35392: CWE-22: Improper Limitation of a Pathname to a Restricted Direct The goshs SimpleHTTPServer prior to version 2.0.0-beta.3 contains a path traversal vulnerability (CWE-22) in the PUT upload functionality implemented in httpserver/updown.go. The lack of path sanitization allows an attacker to specify arbit

goshs < 2.0.0-beta.3 has a critical path traversal bug (CVSS 9.8) 🛡️. Attackers can write files anywhere on the server. Upgrade to 2.0.0-beta.3 or newer now! radar.offseq.com/threat/cve-2026-35392-cw... #OffSeq #Vulnerability #GoLang

1 day ago 0 0 0 0
Advertisement
Preview
CVE-2026-35393: CWE-22: Improper Limitation of a Pathname to a Restricted Direct The vulnerability in goshs (prior to version 2.0.0-beta.3) involves improper limitation of a pathname to a restricted directory (CWE-22). Specifically, the POST multipart upload directory is not sanitized, which can allow an attacker to per

CRITICAL: goshs (<2.0.0-beta.3) has a path traversal flaw. Attackers can write files outside intended dirs. Upgrade to 2.0.0-beta.3 ASAP! 🔒 radar.offseq.com/threat/cve-2026-35393-cw... #OffSeq #Vulnerability #GoLang

1 day ago 0 0 0 0
Preview
CVE-2026-35471: CWE-22: Improper Limitation of a Pathname to a Restricted Direct The vulnerability in goshs arises from improper limitation of a pathname to a restricted directory (CWE-22). Specifically, prior to version 2.0.0-beta.3, the tdeleteFile() function fails to return immediately after detecting a path traversa

CRITICAL: patrickhener goshs (<2.0.0-beta.3) vulnerable to path traversal, letting attackers access or delete files outside intended dirs. Upgrade to 2.0.0-beta.3+ immediately! radar.offseq.com/threat/cve-2026-35471-cw... #OffSeq #CVE202635471 #Security

1 day ago 0 0 0 0
Preview
CVE-2026-5612: Stack-based Buffer Overflow in Belkin F9K1015 This vulnerability involves a stack-based buffer overflow in the formWlEncrypt function of the Belkin F9K1015 router firmware version 1.00.10. Specifically, the overflow occurs when the 'webpage' argument passed to the /goform/formWlEncrypt

Belkin F9K1015 (v1.00.10) faces a HIGH severity stack buffer overflow — remote attackers could gain code execution. No patch from vendor. Limit remote access and watch for updates. radar.offseq.com/threat/cve-2026-5612-sta... #OffSeq #Vulnerability #...

2 days ago 0 0 0 0
Preview
CVE-2026-5628: Stack-based Buffer Overflow in Belkin F9K1015 This vulnerability involves a stack-based buffer overflow in the formSetSystemSettings function of the Belkin F9K1015 router firmware version 1.00.10. Specifically, improper handling of the webpage argument in the /goform/formSetSystemSetti

Belkin F9K1015 routers (v1.00.10) face a HIGH risk stack overflow (CVE-2026-5628). No patch — disable remote mgmt & restrict access now! More at radar.offseq.com/threat/cve-2026-5628-sta... #OffSeq #Security #Belkin

2 days ago 0 0 0 0
Preview
CVE-2026-5629: Stack-based Buffer Overflow in Belkin F9K1015 This vulnerability affects the Belkin F9K1015 router firmware version 1.00.10. The issue is a stack-based buffer overflow in the formSetFirewall function located in the /goform/formSetFirewall endpoint. By manipulating the 'webpage' argumen

Belkin F9K1015 (v1.00.10) faces HIGH-severity buffer overflow (CVE-2026-5629) — remote exploit possible, public code available, no patch yet. Restrict access & monitor updates. radar.offseq.com/threat/cve-2026-5629-sta... #OffSeq #Belkin #VulnAlert

2 days ago 0 0 0 0
Preview
CVE-2026-5613: Stack-based Buffer Overflow in Belkin F9K1015 The vulnerability in Belkin F9K1015 version 1.00.10 involves a stack-based buffer overflow triggered by improper handling of the webpage argument in the formReboot function located in /goform/formReboot. This flaw allows a remote attacker t

Belkin F9K1015 v1.00.10 hit by HIGH severity stack buffer overflow (CVE-2026-5613). Exploit public, no patch yet. Restrict access & disable remote mgmt ASAP. radar.offseq.com/threat/cve-2026-5613-sta... #OffSeq #IoTSecurity #Vuln

2 days ago 0 0 0 0
Preview
CVE-2026-5614: Stack-based Buffer Overflow in Belkin F9K1015 This vulnerability involves a stack-based buffer overflow in the Belkin F9K1015 router firmware 1.00.10, specifically in the formSetPassword function of the /goform/formSetPassword file. By manipulating the 'webpage' argument, an attacker c

Belkin F9K1015 (v1.00.10) faces HIGH-severity stack buffer overflow (public exploit out). No patch — disable remote access, restrict device exposure, and monitor. Stay updated: radar.offseq.com/threat/cve-2026-5614-sta... #OffSeq #RouterSecurity #Vul...

2 days ago 0 0 0 0
Advertisement
Preview
CVE-2026-5610: Stack-based Buffer Overflow in Belkin F9K1015 This vulnerability affects Belkin F9K1015 firmware version 1.00.10. It is a stack-based buffer overflow in the formWISP5G function of the /goform/formWISP5G endpoint. Remote attackers can manipulate the webpage argument to overflow the stac

Belkin F9K1015 v1.00.10: HIGH severity buffer overflow can be exploited remotely — no patch yet. Restrict device access & monitor for threats. Full details: radar.offseq.com/threat/cve-2026-5610-sta... #OffSeq #Vulnerability #IoTSecurity

2 days ago 0 0 0 0
Preview
CVE-2026-5608: Stack-based Buffer Overflow in Belkin F9K1122 This vulnerability involves a stack-based buffer overflow in the formWlanSetup function of the Belkin F9K1122 router firmware version 1.00.33. By manipulating the 'webpage' argument sent to the /goform/formWlanSetup endpoint, an attacker ca

Belkin F9K1122 (v1.00.33) hit by HIGH severity buffer overflow (CVE-2026-5608) — public exploit, no patch. Restrict remote access & monitor for updates. Take action now: radar.offseq.com/threat/cve-2026-5608-sta... #OffSeq #Belkin #Vulnerability

2 days ago 0 0 0 0
Preview
CVE-2026-5605: Stack-based Buffer Overflow in Tenda CH22 CVE-2026-5605 describes a stack-based buffer overflow in Tenda CH22 firmware version 1.0.0.1. The flaw resides in the formWrlExtraSet function of the /goform/WrlExtraSet endpoint, where improper handling of the GO argument allows remote att

Tenda CH22 v1.0.0.1 faces a HIGH severity buffer overflow (CVE-2026-5605). Patch unavailable — limit remote access & monitor your devices. Learn more: radar.offseq.com/threat/cve-2026-5605-sta... #OffSeq #Vulnerability #NetworkSecurity

2 days ago 0 0 0 0