Offensive Sequence's Avatar

Offensive Sequence

@offseq

OffSeq is a cutting-edge European cybersecurity company helping organizations build digital resilience through tailored, proactive security solutions. #CyberSecurity https://www.offseq.com/ https://radar.offseq.com/ https://guard.offseq.com/

28
Followers
0
Following
1,488
Posts
29.07.2025
Joined
Posts Following

Latest posts by Offensive Sequence @offseq

Preview
CVE-2026-1261: CWE-79 Improper Neutralization of Input During Web Page Generatio CVE-2026-1261 is a stored Cross-Site Scripting (XSS) vulnerability identified in the MetForm Pro plugin for WordPress, specifically affecting the Quiz feature in all versions up to 3.9.6. The root cause is insufficient sanitization of user

MetForm Pro for WordPress hit by HIGH-severity stored XSS (all versions, Quiz feature). Unauthenticated attackers can inject scripts. Disable Quiz & monitor for patches now. https://radar.offseq.com/threat/cve-2026-1261-cwe-79-improper-neutralization-of-in-3b7ad624 #OffSeq #WordPress #XSS

10.03.2026 10:30 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
CVE-2026-2364: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in CODE CVE-2026-2364 is a Time-of-check to Time-of-use (TOCTOU) race condition vulnerability classified under CWE-367, found in the CODESYS Installer component of the CODESYS Development System. The vulnerability arises during the installation or

CVE-2026-2364: HIGH severity TOCTOU bug in CODESYS Installer enables local privilege escalation if a user confirms updates. Restrict access, monitor, and await patch. https://radar.offseq.com/threat/cve-2026-2364-cwe-367-time-of-check-time-of-use-to-5eb858d5 #OffSeq #CODESYS #ICS

10.03.2026 09:00 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
CVE-2026-1508: CWE-352 Cross-Site Request Forgery (CSRF) in Court Reservation CVE-2026-1508 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Court Reservation WordPress plugin prior to version 1.10.9. The vulnerability stems from the absence of CSRF token validation when processing event deletion r

Court Reservation WP plugin <1.10.9 has a HIGH severity CSRF bug β€” admins can be tricked into deleting events. Update promptly or add CSRF protections! πŸ›‘οΈ https://radar.offseq.com/threat/cve-2026-1508-cwe-352-cross-site-request-forgery-c-cd03c8c6 #OffSeq #WordPress #CSRF

10.03.2026 07:30 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
CVE-2026-0953: CWE-287 Improper Authentication in themeum Tutor LMS Pro The Tutor LMS Pro plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 3.9.5 via the Social Login addon. This is due to the plugin failing to verify that the email provided in the authentication

CRITICAL: themeum Tutor LMS Pro (all versions) has an auth bypass bug via Social Login. Attackers can log in as any user β€” including admins! Disable Social Login & watch for updates. https://radar.offseq.com/threat/cve-2026-0953-cwe-287-improper-authentication-in-t-965fa126 #OffSeq #WordPress #Se...

10.03.2026 06:02 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
CVE-2026-3585: CWE-22 Improper Limitation of a Pathname to a Restricted Director CVE-2026-3585 is a path traversal vulnerability classified under CWE-22 found in the popular WordPress plugin The Events Calendar by stellarwp. This vulnerability exists in all versions up to and including 6.15.17 and is triggered via the '

The Events Calendar plugin (WordPress) faces a HIGH-severity flaw: Author+ users can read sensitive files via path traversal. Update or restrict roles now. More: https://radar.offseq.com/threat/cve-2026-3585-cwe-22-improper-limitation-of-a-path-57fec669 #OffSeq #WordPress #Security

10.03.2026 04:30 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
CVE-2026-30862: CWE-79: Improper Neutralization of Input During Web Page Generat CVE-2026-30862 is a critical stored Cross-Site Scripting (XSS) vulnerability identified in the Appsmith platform, a tool used for building admin panels, internal tools, and dashboards. The vulnerability exists in the Table Widget (TableWidg

CRITICAL: Appsmith <1.96 has a stored XSS flaw (CVE-2026-30862) in TableWidgetV2. Admin account takeover possible via 'Invite Users'. Upgrade to 1.96+ now! https://radar.offseq.com/threat/cve-2026-30862-cwe-79-improper-neutralization-of-i-d918c60a #OffSeq #XSS #Appsmith

10.03.2026 03:00 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
CVE-2026-27685: CWE-502: Deserialization of Untrusted Data in SAP_SE SAP NetWeav CVE-2026-27685 is a critical security vulnerability classified under CWE-502 (Deserialization of Untrusted Data) affecting SAP NetWeaver Enterprise Portal Administration, specifically version EP-RUNTIME 7.50. The vulnerability occurs when a

CRITICAL: SAP NetWeaver EP-RUNTIME 7.50 hit by CVE-2026-27685. Privileged users can upload malicious serialized data β€” risking total compromise. Restrict uploads & monitor activities. Patch ASAP. https://radar.offseq.com/threat/cve-2026-27685-cwe-502-deserialization-of-untruste-36704129 #OffSeq #...

10.03.2026 01:30 πŸ‘ 0 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
CVE-2026-30869: CWE-22: Improper Limitation of a Pathname to a Restricted Direct CVE-2026-30869 is a path traversal vulnerability categorized under CWE-22 affecting the SiYuan knowledge management system before version 3.5.10. The flaw resides in the /export endpoint, where insufficient validation of pathname inputs all

🚨 SiYuan < 3.5.10 hit by CRITICAL path traversal bug β€” attackers can read secrets via /export, no auth needed. Upgrade to 3.5.10+ ASAP & restrict endpoint access! https://radar.offseq.com/threat/cve-2026-30869-cwe-22-improper-limitation-of-a-pat-98459c9d #OffSeq #CVE202630869 #patchnow

10.03.2026 00:00 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
CVE-2026-28431: CWE-285: Improper Authorization in misskey-dev misskey CVE-2026-28431 is an improper authorization vulnerability classified under CWE-285 affecting the Misskey platform, versions 8.45.0 through prior to 2026.3.1. Misskey is a federated social media platform that allows decentralized hosting of

CRITICAL: Misskey servers (8.45.0 – <2026.3.1) hit by CVE-2026-28431. Attackers can bypass auth & access private data. Patch to 2026.3.1 now! https://radar.offseq.com/threat/cve-2026-28431-cwe-285-improper-authorization-in-m-e4688f7e #OffSeq #Misskey #Vulnerability

09.03.2026 22:30 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
CVE-2026-0846: CWE-36 Absolute Path Traversal in nltk nltk/nltk CVE-2026-0846 identifies a critical security flaw in the Natural Language Toolkit (nltk) library, specifically in the filestring() function within the nltk.util module of version 3.9.2. The vulnerability is classified as CWE-36, an absolute

nltk v3.9.2 hit by HIGH severity path traversal flaw β€” attackers can read any file if input isn’t validated. Patch when available, restrict access, & sanitize input! Details: https://radar.offseq.com/threat/cve-2026-0846-cwe-36-absolute-path-traversal-in-nl-799595df #OffSeq #nltk #security

09.03.2026 21:00 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
CVE-2026-3638: CWE-862: Missing Authorization in Devolutions Server CVE-2026-3638 is a vulnerability classified under CWE-862 (Missing Authorization) affecting Devolutions Server, a privileged access management solution widely used for managing credentials and access rights. The issue resides in the user an

HIGH severity: Devolutions Server vuln lets low-priv users restore deleted accounts β€” potential for privilege escalation. Restrict API access, monitor restores, patch when available. https://radar.offseq.com/threat/cve-2026-3638-cwe-862-missing-authorization-in-dev-87162fbb #OffSeq #Devolutions #...

09.03.2026 19:30 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
CVE-2026-3630: cwe-121 Stack-based Buffer Overflow in DeltaWW COMMGR2 CVE-2026-3630 identifies a stack-based buffer overflow vulnerability (CWE-121) in Delta Electronics' COMMGR2 software, a product likely used in industrial control or communication management contexts. The vulnerability arises from improper

CRITICAL: DeltaWW COMMGR2 hit by stack buffer overflow (CVE-2026-3630, CVSS 9.8). Remote RCE possible, no patch yet. Segment networks & monitor now! https://radar.offseq.com/threat/cve-2026-3630-cwe-121-stack-based-buffer-overflow--c00e7f15 #OffSeq #ICS #Vuln

09.03.2026 18:00 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
CVE-2026-3823: CWE-121 Stack-based buffer overflow in Atop Technologies EHG2408 CVE-2026-3823 identifies a stack-based buffer overflow vulnerability in the EHG2408 series network switch developed by Atop Technologies. This vulnerability arises from improper handling of input data that allows an attacker to overwrite th

Atop EHG2408 switches face CRITICAL risk (CVE-2026-3823): unauthenticated remote code exec via buffer overflow. No patch yet β€” segment and restrict access ASAP. https://radar.offseq.com/threat/cve-2026-3823-cwe-121-stack-based-buffer-overflow--68d582bc #OffSeq #ICS #SecurityAlert

09.03.2026 16:30 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
CVE-2026-3814: Buffer Overflow in UTT HiPER 810G A security flaw has been discovered in UTT HiPER 810G up to 1.7.7-1711. Affected by this issue is the function strcpy of the file /goform/getOneApConfTempEntry. Performing a manipulation results in buffer overflow. It is possible to initiat

UTT HiPER 810G (≀1.7.7-1711) hit by HIGH severity buffer overflow β€” public exploit out now. Review exposure & apply network controls while awaiting patch. https://radar.offseq.com/threat/cve-2026-3814-buffer-overflow-in-utt-hiper-810g-7866271a #OffSeq #Vulnerability #UTT

09.03.2026 10:32 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
CVE-2026-3811: Stack-based Buffer Overflow in Tenda FH1202 A vulnerability was found in Tenda FH1202 1.2.0.14(408). This impacts the function fromP2pListFilter of the file /goform/P2pListFilter. The manipulation of the argument page results in stack-based buffer overflow. The attack can be executed

Tenda FH1202 (v1.2.0.14) faces a HIGH severity stack buffer overflow (CVE-2026-3811). Public exploit enables remote attack. Isolate devices and monitor for updates. https://radar.offseq.com/threat/cve-2026-3811-stack-based-buffer-overflow-in-tenda-076e8a7e #OffSeq #Vulnerability #IoTSecurity

09.03.2026 09:00 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
CVE-2026-3823: CWE-121 Stack-based buffer overflow in Atop Technologies EHG2408 CVE-2026-3823 identifies a stack-based buffer overflow vulnerability in the EHG2408 series network switch developed by Atop Technologies. This vulnerability arises from improper handling of input data that allows an attacker to overwrite th

Atop EHG2408 switches face CRITICAL stack buffer overflow (CVE-2026-3823). Remote, unauthenticated code execution possible. Segment & monitor now β€” patch pending. https://radar.offseq.com/threat/cve-2026-3823-cwe-121-stack-based-buffer-overflow--68d582bc #OffSeq #CVE20263823 #NetworkSecurity

09.03.2026 07:30 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
CVE-2026-3804: Stack-based Buffer Overflow in Tenda i3 A security flaw has been discovered in Tenda i3 1.0.0.6(2204). This vulnerability affects the function formWifiMacFilterSet of the file /goform/WifiMacFilterSet. The manipulation of the argument index results in stack-based buffer overflow.

Tenda i3 v1.0.0.6(2204) faces a HIGH severity stack overflow (CVE-2026-3804). Remote exploit is public β€” limit exposure or mitigate ASAP. https://radar.offseq.com/threat/cve-2026-3804-stack-based-buffer-overflow-in-tenda-c824133f #OffSeq #Vulnerability #NetworkSecurity

09.03.2026 06:00 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
CVE-2026-3630: cwe-121 Stack-based Buffer Overflow in DeltaWW COMMGR2 CVE-2026-3630 identifies a stack-based buffer overflow vulnerability (CWE-121) in Delta Electronics' COMMGR2 software, a product likely used in industrial control or communication management contexts. The vulnerability arises from improper

CRITICAL: DeltaWW COMMGR2 hit by CVE-2026-3630 (CVSS 9.8) β€” unauthenticated RCE, no patch yet. Segment networks & monitor for threats ASAP. Details: https://radar.offseq.com/threat/cve-2026-3630-cwe-121-stack-based-buffer-overflow--c00e7f15 #OffSeq #ICS #Vulnerability

09.03.2026 04:30 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
CVE-2026-3768: Stack-based Buffer Overflow in Tenda F453 CVE-2026-3768 is a stack-based buffer overflow vulnerability identified in the Tenda F453 router firmware version 1.0.0.3. The vulnerability resides in the formWrlExtraSet function, specifically in the /goform/WrlExtraSet endpoint, where th

Tenda F453 (v1.0.0.3) HIGH severity stack buffer overflow β€” remote exploit possible, public PoC released. Update firmware or limit remote access now. https://radar.offseq.com/threat/cve-2026-3768-stack-based-buffer-overflow-in-tenda-9b634f69 #OffSeq #Vulnerability #IoTSecurity

09.03.2026 03:00 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
CVE-2026-3769: Stack-based Buffer Overflow in Tenda F453 CVE-2026-3769 identifies a critical stack-based buffer overflow vulnerability in the Tenda F453 router firmware version 1.0.0.3. The vulnerability resides in the WrlclientSet function, specifically in the handling of the GO argument within

Tenda F453 (v1.0.0.3) faces a HIGH severity stack buffer overflow (CVE-2026-3769). Remote code exec possible β€” public exploit out. Restrict remote access & monitor endpoints ASAP. https://radar.offseq.com/threat/cve-2026-3769-stack-based-buffer-overflow-in-tenda-7dc11ff5 #OffSeq #Vulnerability #R...

09.03.2026 01:30 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
CVE-2026-3787: Uncontrolled Search Path in UltraVNC CVE-2026-3787 identifies a vulnerability in UltraVNC version 1.6.4.0, specifically related to an uncontrolled search path issue within the cryptbase.dll library, a component of the Windows Service. This vulnerability arises when the softwar

UltraVNC 1.6.4.0 faces a HIGH-severity vuln: uncontrolled DLL search path (CVE-2026-3787). Local attackers can escalate privileges. No patch β€” limit access, monitor endpoints now. https://radar.offseq.com/threat/cve-2026-3787-uncontrolled-search-path-in-ultravnc-8f16fda8 #OffSeq #UltraVNC #Vulner...

09.03.2026 00:00 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
CVE-2026-3732: Stack-based Buffer Overflow in Tenda F453 CVE-2026-3732 is a critical stack-based buffer overflow vulnerability identified in the Tenda F453 router firmware version 1.0.0.3. The vulnerability arises from unsafe use of the strcpy function in the /goform/exeCommand endpoint, where th

Tenda F453 (v1.0.0.3) hit by HIGH severity stack buffer overflow β€” remote code execution possible (CVE-2026-3732). No patch: restrict remote access & monitor endpoints. Details: https://radar.offseq.com/threat/cve-2026-3732-stack-based-buffer-overflow-in-tenda-41443da2 #OffSeq #Vulnerability #Rou...

08.03.2026 11:32 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
CVE-2026-3726: Stack-based Buffer Overflow in Tenda F453 CVE-2026-3726 is a stack-based buffer overflow vulnerability identified in the Tenda F453 router firmware version 1.0.0.3. The vulnerability exists in the fromwebExcptypemanFilter function, specifically in the handling of the 'page' argumen

Tenda F453 routers (v1.0.0.3) face HIGH severity buffer overflow (CVE-2026-3726). Remote code exec possible β€” exploit code is public. Restrict access & monitor traffic while awaiting patch. https://radar.offseq.com/threat/cve-2026-3726-stack-based-buffer-overflow-in-tenda-6f0be4bc #OffSeq #Router...

08.03.2026 10:00 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
CVE-2026-3715: Stack-based Buffer Overflow in Wavlink WL-WN579X3-C CVE-2026-3715 is a stack-based buffer overflow vulnerability identified in the Wavlink WL-WN579X3-C router firmware version 231124. The vulnerability resides in the sub_40139C function within the /cgi-bin/firewall.cgi script, which processe

Wavlink WL-WN579X3-C routers (v231124) face a HIGH-severity stack overflow (CVE-2026-3715). Public exploit code β€” update to 20260226 firmware ASAP to stay secure. https://radar.offseq.com/threat/cve-2026-3715-stack-based-buffer-overflow-in-wavli-504a0f36 #OffSeq #Vulnerability #IoTSecurity

08.03.2026 08:30 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
CVE-2026-30832: CWE-918: Server-Side Request Forgery (SSRF) in charmbracelet sof The vulnerability CVE-2026-30832 affects charmbracelet's soft-serve, a self-hosted Git server designed for command-line use. Versions from 0.6.0 to before 0.11.4 contain a Server-Side Request Forgery (SSRF) flaw categorized under CWE-918. A

CRITICAL: SSRF in charmbracelet soft-serve (0.6.0 – 0.11.4) lets SSH users access internal services via crafted LFS endpoints. Upgrade to 0.11.4+ now! https://radar.offseq.com/threat/cve-2026-30832-cwe-918-server-side-request-forgery-01aea4d4 #OffSeq #SSRF #GitSecurity

08.03.2026 07:00 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
CVE-2026-3703: Out-of-bounds Write in Wavlink NU516U1 CVE-2026-3703 is a critical security vulnerability identified in the Wavlink NU516U1 router firmware version 251208. The vulnerability is an out-of-bounds write occurring in the function sub_401A10 within the /cgi-bin/login.cgi script. The

Wavlink NU516U1 (v251208) faces a CRITICAL vuln (CVE-2026-3703): remote out-of-bounds write via /cgi-bin/login.cgi. Public exploit out β€” upgrade firmware now! https://radar.offseq.com/threat/cve-2026-3703-out-of-bounds-write-in-wavlink-nu516-a93ca55c #OffSeq #Vulnerability #PatchNow

08.03.2026 05:30 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
CVE-2026-30863: CWE-287: Improper Authentication in parse-community parse-server Parse Server is an open-source backend framework that supports social authentication via adapters for Google, Apple, and Facebook, which rely on JWT (JSON Web Token) verification to validate identity tokens. In versions prior to 8.6.10 and

🚨 CRITICAL: parse-server (<8.6.10, <9.5.0-alpha.11) lets attackers bypass auth via JWTs if audience is unset. Upgrade ASAP or configure audience to secure user accounts! https://radar.offseq.com/threat/cve-2026-30863-cwe-287-improper-authentication-in--0b463399 #OffSeq #ParseServer #CVE202630863

08.03.2026 04:00 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
CVE-2026-30860: CWE-89: Improper Neutralization of Special Elements used in an S Tencent WeKnora, an LLM-powered framework for deep document understanding and semantic retrieval, contains a critical SQL injection vulnerability (CVE-2026-30860) in versions prior to 0.2.12. The vulnerability stems from the application's f

CRITICAL: Tencent WeKnora (<0.2.12) has a severe SQLi flaw (CVE-2026-30860) enabling unauth RCE via PostgreSQL queries. Upgrade to 0.2.12 ASAP! https://radar.offseq.com/threat/cve-2026-30860-cwe-89-improper-neutralization-of-s-90c4d0a6 #OffSeq #SQLInjection #Security

08.03.2026 02:30 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
CVE-2026-30861: CWE-78: Improper Neutralization of Special Elements used in an O Tencent WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Versions from 0.2.5 to before 0.2.10 contain a critical OS command injection vulnerability (CVE-2026-30861) due to improper neutral

Tencent WeKnora (0.2.5 – 0.2.9) has a CRITICAL OS command injection (RCE) flaw. Any attacker can exploit via user registration. Upgrade to 0.2.10 now! https://radar.offseq.com/threat/cve-2026-30861-cwe-78-improper-neutralization-of-s-94bf2228 #OffSeq #Vulnerability #RCE

08.03.2026 01:00 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
CVE-2026-30861: CWE-78: Improper Neutralization of Special Elements used in an O Tencent WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Versions from 0.2.5 to before 0.2.10 contain a critical OS command injection vulnerability (CVE-2026-30861) due to improper neutral

CRITICAL: Tencent WeKnora (0.2.5 – 0.2.9) hit by unauth RCE via OS command injection. Upgrade to 0.2.10 ASAP or restrict access! https://radar.offseq.com/threat/cve-2026-30861-cwe-78-improper-neutralization-of-s-94bf2228 #OffSeq #RCE #CyberAlert

08.03.2026 00:00 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0