Offensive Sequence

OffSeq is a cybersecurity company enhancing organizational digital resilience through comprehensive protection against evolving cyber threats. We offer specialized services for businesses of all sizes, with particular expertise in Baltic, Scandinavian, Belgian markets and EU regulatory compliance.

Offensive Sequenceoffseq@infosec.exchange
2026-01-01

Happy 2026 from OffSeq 🥂
Wishing everyone a strong, successful & secure year.

📡 Threat Radar (radar.offseq.com) has moved to a larger server after significant growth — 100k users and ~500k events last month. Timeline updates will resume shortly.

🔐 In the meantime, meet Veil — a local-only steganography studio.

Veil encrypts text or files in your browser and embeds them into PNG images using LSB techniques.
No servers. No uploads. No tracking.
The image looks normal — the contents stay encrypted unless the password is correct.

👉 veil.offseq.com

#privacy #cryptography #steganography #cybersecurity

Offensive Sequenceoffseq@infosec.exchange
2025-12-27

🔍 HIGH severity: MongoDB flaw (CVE-2025-14847) lets unauthenticated users read uninitialized memory via zlib. Affects v3.6–8.2.3. Patch now or disable zlib compression for mitigation. Full details: radar.offseq.com/threat/new-mo #OffSeq #MongoDB #Infosec #Vulnerability

High threat: New MongoDB Flaw Lets Unauthenticated Attackers Read Uninitialized Memory
Offensive Sequenceoffseq@infosec.exchange
2025-12-27

🚨 CRITICAL: LangChain Core (<1.2.5, <0.3.81) hit by serialization injection (no CVE yet). Exploit steals secrets & manipulates LLM outputs via prompt injection. Upgrade, disable secrets_from_env, restrict deserialization! radar.offseq.com/threat/critic #OffSeq #LangChain #AIsecurity

Critical threat: Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection
Offensive Sequenceoffseq@infosec.exchange
2025-12-27

🚨 CRITICAL: LangChain Core serialization injection flaw can leak sensitive secrets in AI workflows. No patch or CVE yet. Validate/sanitize serialized inputs & monitor deserialization events. High risk for EU orgs. Details: radar.offseq.com/threat/critic #OffSeq #LangChain #AIsecurity

Critical threat: Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection
Offensive Sequenceoffseq@infosec.exchange
2025-12-27

🚨 CRITICAL: CVE-2025-13915 in IBM API Connect (10.0.8.0–10.0.8.5, 10.0.11.0) enables remote auth bypass (CWE-305)! No patch yet. Restrict access, monitor logs, and prep for updates. More: radar.offseq.com/threat/cve-20 #OffSeq #IBM #Infosec #APIsecurity #CVE202513915

Critical threat: CVE-2025-13915: CWE-305 Authentication Bypass by Primary Weakness in IBM API Connect
Offensive Sequenceoffseq@infosec.exchange
2025-12-27

CRITICAL: CVE-2025-68952 in eigent-ai Eigent v0.0.60 enables unauthenticated RCE over the network. Patch to 0.0.61 now! Impact: full system compromise, data loss. 🛡️ radar.offseq.com/threat/cve-20 #OffSeq #CVE202568952 #infosec #vulnerability

Critical threat: CVE-2025-68952: CWE-94: Improper Control of Generation of Code ('Code Injection') in eigent-ai eigen
Offensive Sequenceoffseq@infosec.exchange
2025-12-27

🔥 CRITICAL: CVE-2025-13158 in apidoc-core (0.2.0+) enables remote prototype pollution via malformed input. Risks: DoS & unpredictable JS app behavior. Audit, sanitize, and isolate now — no patch yet! radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #JavaScript #SupplyChain

Critical threat: CVE-2025-13158: CWE-1321 Improperly Controlled Modification of Object Prototype Attributes ('Prototy
Offensive Sequenceoffseq@infosec.exchange
2025-12-27

⚠️ CRITICAL: CVE-2025-68668 in n8n-io n8n (v1.0.0–<2.0.0) allows authenticated users to bypass the Python Code Node sandbox & run arbitrary commands. Patch to 2.0.0+ or disable the node for mitigation. Full details: radar.offseq.com/threat/cve-20 #OffSeq #n8n #CVE202568668 #infosec

Critical threat: CVE-2025-68668: CWE-693: Protection Mechanism Failure in n8n-io n8n
Offensive Sequenceoffseq@infosec.exchange
2025-12-27

🚨 CRITICAL: CVE-2025-66203 in lemon8866 StreamVault (<251126). RCE possible via OS command injection in /admin/api/saveConfig. Patch to 251126 ASAP! Details: radar.offseq.com/threat/cve-20 #OffSeq #CVE202566203 #infosec #vulnerability

Critical threat: CVE-2025-66203: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Comma
Offensive Sequenceoffseq@infosec.exchange
2025-12-26

🚨 HIGH severity (CVSS 8.6) in Eaton UPS Companion Software: CVE-2025-59887 allows local arbitrary code execution via insecure search path. Patch ASAP & restrict install rights. Details: radar.offseq.com/threat/cve-20 #OffSeq #Vuln #Eaton #Cybersecurity

High threat: CVE-2025-59887: CWE-427 Uncontrolled Search Path Element in Eaton Eaton UPS Companion Software
Offensive Sequenceoffseq@infosec.exchange
2025-12-26

⚠️ CVE-2025-67450 (HIGH): Eaton UPS Companion software vulnerable to insecure library loading (CWE-427), enabling local arbitrary code execution. Patch urgently via Eaton’s download center. radar.offseq.com/threat/cve-20 #OffSeq #Eaton #Vuln #SysAdmin

High threat: CVE-2025-67450: CWE-427 Uncontrolled Search Path Element in Eaton UPS Companion software
Offensive Sequenceoffseq@infosec.exchange
2025-12-26

🔒 CVE-2025-62578 (HIGH): Delta Electronics DVP-12SE PLCs transmit Modbus/TCP data in cleartext—risking MITM & command manipulation. No patch yet. Segment networks, restrict Modbus traffic, and monitor closely! radar.offseq.com/threat/cve-20 #OffSeq #ICS #PLC #CyberSecurity

High threat: CVE-2025-62578: CWE-319 Cleartext Transmission of Sensitive Information in Delta Electronics DVP-12S
Offensive Sequenceoffseq@infosec.exchange
2025-12-26

⚠️ CVE-2025-15089: HIGH severity buffer overflow in UTT 进取 512W (≤1.7.7-171114). Remote attackers can exploit wepkey1 in /goform/APSecurity for code execution. Public exploit code is out! Patch or segment devices immediately. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #UTT #Security

High threat: CVE-2025-15089: Buffer Overflow in UTT 进取 512W
Offensive Sequenceoffseq@infosec.exchange
2025-12-26

🔎 CVE-2025-15090: HIGH-severity buffer overflow in UTT 进取 512W (v1.7.7-171114) enables remote code execution—no user interaction needed. PoC exploit code is available. Isolate, monitor, and patch! radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #CyberAlert

High threat: CVE-2025-15090: Buffer Overflow in UTT 进取 512W
Offensive Sequenceoffseq@infosec.exchange
2025-12-26

🛡️ CVE-2025-15091: HIGH severity buffer overflow in UTT 进取 512W (≤1.7.7-171114). Remote, unauthenticated RCE possible via /goform/formPictureUrl. Public exploit disclosed, no patch yet—segment, monitor, deploy IDS/IPS! radar.offseq.com/threat/cve-20 #OffSeq #Vuln #IoTSecurity

High threat: CVE-2025-15091: Buffer Overflow in UTT 进取 512W
Offensive Sequenceoffseq@infosec.exchange
2025-12-26

⚠️ HIGH risk: CVE-2025-15092 in UTT 进取 512W (≤1.7.7-171114) — buffer overflow in /goform/ConfigExceptMSN allows remote code execution. Public exploit exists. Isolate devices & monitor traffic! radar.offseq.com/threat/cve-20 #OffSeq #Infosec #UTT #CVE202515092

High threat: CVE-2025-15092: Buffer Overflow in UTT 进取 512W
Offensive Sequenceoffseq@infosec.exchange
2025-12-26

🛑 Critical RCE in FreeBSD rtsold 15.x: Improper DNSSL handling lets attackers exploit IPv6 router ads for full system compromise. No patch yet—disable rtsold if not needed, segment networks, and monitor traffic. radar.offseq.com/threat/freebs #OffSeq #FreeBSD #Security

Critical threat: FreeBSD rtsold 15.x - Remote Code Execution via DNSSL
Offensive Sequenceoffseq@infosec.exchange
2025-12-25

🚨 Critical RCE in Digiever DS-2105 Pro NVRs (CVE-2023-52163) is actively exploited for Mirai/ShadowV2 botnets. No patch—remove from internet, update creds, segment networks. End-of-life device. Details: radar.offseq.com/threat/cisa-f #OffSeq #IoT #RCE #Infosec #CISA

Critical threat: CISA Flags Actively Exploited Digiever NVR Vulnerability Allowing Remote Code Execution
Offensive Sequenceoffseq@infosec.exchange
2025-12-25

🔒 CVE-2025-68565: CRITICAL missing authorization in JayBee Twitch Player (<=2.1.3) lets attackers bypass access controls on embedded Twitch streams. Audit usage, restrict access, and monitor for patches. No active exploits yet. radar.offseq.com/threat/cve-20 #OffSeq #CVE202568565 #Infosec

Critical threat: CVE-2025-68565: Missing Authorization in JayBee Twitch Player
Offensive Sequenceoffseq@infosec.exchange
2025-12-25

🛑 CRITICAL: CVE-2025-68570 in Captivate Sync (≤3.2.2)—blind SQL Injection with no auth needed. Risk of data theft or loss. Audit, validate inputs, restrict DB rights, monitor for patches. Details: radar.offseq.com/threat/cve-20 #OffSeq #SQLi #Vulnerability #CVE202568570

Critical threat: CVE-2025-68570: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst