## Updated at UTC 2026-02-20T03:41:38.853843

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-26990 8.8 0.00% 2 0 2026-02-20T02:16:54.870000 LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Ve
CVE-2026-26980 9.4 0.00% 2 0 2026-02-20T02:16:54.213000 Ghost is a Node.js content management system. Versions 3.24.0 through 6.19.0 all
CVE-2026-26065 0 0.00% 2 0 2026-02-20T02:16:53.730000 calibre is a cross-platform e-book manager for viewing, converting, editing, and
CVE-2026-26975 8.8 0.00% 4 0 2026-02-20T01:16:00.273000 Music Assistant is an open-source media library manager that integrates streamin
CVE-2025-30411 10.0 0.00% 4 0 2026-02-20T01:15:59.493000 Sensitive data disclosure and manipulation due to improper authentication. The f
CVE-2026-23544 8.8 0.02% 2 0 2026-02-20T00:32:59 Deserialization of Untrusted Data vulnerability in codetipi Valenti valenti allo
CVE-2026-23542 9.8 0.02% 2 0 2026-02-20T00:32:59 Deserialization of Untrusted Data vulnerability in ThemeGoods Grand Restaurant g
CVE-2026-21535 8.2 0.00% 2 0 2026-02-20T00:31:59 Improper access control in Microsoft Teams allows an unauthorized attacker to di
CVE-2026-26321 7.5 0.00% 2 0 2026-02-19T23:16:25.180000 OpenClaw is a personal AI assistant. Prior to OpenClaw version 2026.2.14, the Fe
CVE-2026-0573 9.0 0.10% 2 0 2026-02-19T22:49:21.843000 An URL redirection vulnerability was identified in GitHub Enterprise Server that
CVE-2026-23549 9.8 0.02% 2 0 2026-02-19T22:16:41.930000 Deserialization of Untrusted Data vulnerability in magepeopleteam WpEvently mage
CVE-2025-13590 9.1 0.21% 2 0 2026-02-19T22:11:44 A malicious actor with administrative privileges can upload an arbitrary file to
CVE-2026-27013 7.6 0.00% 2 0 2026-02-19T21:57:27 fabric.js applies `escapeXml()` to text content during SVG export (`src/shapes/T
CVE-2026-26280 8.4 0.00% 2 0 2026-02-19T21:57:03 ### Summary A command injection vulnerability in the `wifiNetworks()` function a
CVE-2026-26267 7.5 0.00% 2 0 2026-02-19T21:56:47 ### Impact The `#[contractimpl]` macro contains a bug in how it wires up functi
CVE-2026-27476 9.8 0.00% 2 0 2026-02-19T21:30:57 RustFly 2.0.0 contains a command injection vulnerability in its remote UI contro
CVE-2026-27052 7.5 0.05% 2 0 2026-02-19T21:30:46 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-25378 7.6 0.02% 2 0 2026-02-19T21:30:45 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-26016 None 0.00% 2 0 2026-02-19T21:30:31 ### Summary A missing authorization check in multiple controllers allows any us
CVE-2026-24834 None 0.00% 2 0 2026-02-19T21:30:21 ### Summary An issue in Kata with Cloud Hypervisor allows a user of the contain
CVE-2026-25242 None 0.19% 2 1 2026-02-19T21:23:41 Security Advisory:Unauthenticated File Upload in Gogs Vulnerability Type: Unauth
CVE-2026-25232 None 0.03% 2 0 2026-02-19T21:14:58 ## Summary An access control bypass vulnerability in Gogs web interface allows
CVE-2026-24708 8.2 0.04% 3 0 2026-02-19T20:28:05 An issue was discovered in OpenStack Nova before 30.2.2, 31 before 31.2.1, and 3
CVE-2025-14009 10.0 0.40% 4 0 2026-02-19T20:27:45 A critical vulnerability exists in the NLTK downloader component of nltk/nltk, a
CVE-2026-26318 8.8 0.00% 2 0 2026-02-19T20:25:44.063000 systeminformation is a System and OS information library for node.js. Versions p
CVE-2026-26278 7.5 0.00% 2 0 2026-02-19T20:25:43.717000 fast-xml-parser allows users to validate XML, parse XML to JS object, or build X
CVE-2025-70148 7.5 0.09% 2 0 2026-02-19T20:25:24.843000 Missing authentication and authorization in print_membership_card.php in CodeAst
CVE-2026-25474 7.5 0.02% 2 0 2026-02-19T20:13:13.640000 OpenClaw is a personal AI assistant. In versions 2026.1.30 and below, if channel
CVE-2026-26030 10.0 0.00% 6 0 2026-02-19T19:34:15 ### Impact: An RCE vulnerability has been identified in Microsoft Semantic Kerne
CVE-2026-25940 8.1 0.00% 4 0 2026-02-19T19:32:48 ### Impact User control of properties and methods of the Acroform module allows
CVE-2026-27475 8.1 0.00% 2 0 2026-02-19T19:22:30.720000 SPIP before 4.4.9 allows Insecure Deserialization in the public area through the
CVE-2026-25418 7.6 0.02% 2 0 2026-02-19T19:22:28.717000 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-2648 8.8 0.06% 2 0 2026-02-19T18:35:27.370000 Heap buffer overflow in PDFium in Google Chrome prior to 145.0.7632.109 allowed
CVE-2026-2409 None 0.00% 2 0 2026-02-19T18:32:10 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-1581 7.5 0.00% 2 0 2026-02-19T18:32:09 The wpForo Forum plugin for WordPress is vulnerable to time-based SQL Injection
CVE-2026-2232 7.5 0.00% 2 0 2026-02-19T18:32:09 The Product Table and List Builder for WooCommerce Lite plugin for WordPress is
CVE-2026-26337 8.2 0.00% 2 0 2026-02-19T18:32:08 Hyland Alfresco Transformation Service allows unauthenticated attackers to achie
CVE-2026-26362 8.1 0.04% 6 0 2026-02-19T18:32:08 Dell Unisphere for PowerMax, version(s) 10.2, contain(s) a Relative Path Travers
CVE-2025-71250 8.1 0.00% 4 0 2026-02-19T18:32:08 SPIP before 4.4.9 allows Insecure Deserialization in the public area through the
CVE-2026-26358 8.8 0.05% 10 0 2026-02-19T18:32:07 Dell Unisphere for PowerMax, version(s) 10.2, contain(s) a Missing Authorization
CVE-2025-12107 10.0 0.30% 2 0 2026-02-19T18:32:07 Due to the use of a vulnerable third-party Velocity template engine, a malicious
CVE-2025-8350 9.8 0.07% 2 0 2026-02-19T18:32:07 Execution After Redirect (EAR), Missing Authentication for Critical Function vul
CVE-2026-26359 8.8 0.04% 2 0 2026-02-19T18:32:06 Dell Unisphere for PowerMax, version(s) 10.2, contain(s) an External Control of
CVE-2025-9953 9.8 0.03% 2 0 2026-02-19T18:32:06 Authorization Bypass Through User-Controlled SQL Primary Key vulnerability in DA
CVE-2026-26360 8.1 0.05% 8 0 2026-02-19T18:32:05 Dell Unisphere for PowerMax, version(s) 10.2, contain(s) an External Control of
CVE-2026-1994 9.8 0.05% 4 0 2026-02-19T18:32:03 The s2Member plugin for WordPress is vulnerable to privilege escalation via acco
CVE-2025-4521 8.8 0.04% 2 0 2026-02-19T18:32:02 The IDonate – Blood Donation, Request And Donor Management System plugin for Wor
CVE-2025-4960 7.8 0.01% 2 0 2026-02-19T18:32:02 The com.epson.InstallNavi.helper tool, deployed with the EPSON printer driver in
CVE-2026-0926 9.8 0.19% 4 0 2026-02-19T18:32:02 The Prodigy Commerce plugin for WordPress is vulnerable to Local File Inclusion
CVE-2025-13851 9.8 0.06% 2 0 2026-02-19T18:32:01 The Buyent Classified plugin for WordPress (bundled with Buyent theme) is vulner
CVE-2026-0912 8.8 0.04% 2 0 2026-02-19T18:32:01 The Toret Manager plugin for WordPress is vulnerable to unauthorized modificatio
CVE-2025-12707 7.5 0.07% 2 0 2026-02-19T18:31:53 The Library Management System plugin for WordPress is vulnerable to SQL Injectio
CVE-2025-12882 9.8 0.06% 2 0 2026-02-19T18:31:53 The Clasifico Listing plugin for WordPress is vulnerable to privilege escalation
CVE-2025-12845 8.8 0.05% 2 0 2026-02-19T18:31:52 The Tablesome Table – Contact Form DB – WPForms, CF7, Gravity, Forminator, Fluen
CVE-2025-13563 9.8 0.06% 2 0 2026-02-19T18:31:50 The Lizza LMS Pro plugin for WordPress is vulnerable to Privilege Escalation in
CVE-2026-26339 9.8 0.00% 4 0 2026-02-19T18:25:00.133000 Hyland Alfresco Transformation Service allows unauthenticated attackers to achie
CVE-2026-26336 7.5 0.00% 2 0 2026-02-19T17:24:50.943000 Hyland Alfresco allows unauthenticated attackers to read arbitrary files from pr
CVE-2025-71243 9.8 0.00% 2 1 2026-02-19T16:27:12.303000 The 'Saisies pour formulaire' (Saisies) plugin for SPIP versions 5.4.0 through 5
CVE-2025-65791 9.8 0.27% 2 1 2026-02-19T15:53:43.903000 ZoneMinder v1.36.34 is vulnerable to Command Injection in web/views/image.php. T
CVE-2025-11754 7.5 0.04% 2 0 2026-02-19T15:53:02.850000 The GDPR Cookie Consent plugin for WordPress is vulnerable to unauthorized acces
CVE-2025-12821 8.8 0.05% 2 0 2026-02-19T15:53:02.850000 The NewsBlogger theme for WordPress is vulnerable to Cross-Site Request Forgery
CVE-2025-13603 8.8 0.04% 2 0 2026-02-19T15:53:02.850000 The WP AUDIO GALLERY plugin for WordPress is vulnerable to Unauthorized Arbitrar
CVE-2026-0974 8.8 0.21% 2 0 2026-02-19T15:53:02.850000 The Orderable – WordPress Restaurant Online Ordering System and Food Ordering Pl
CVE-2026-2686 9.8 0.15% 4 0 2026-02-19T15:53:02.850000 A security vulnerability has been detected in SECCN Dingcheng G10 3.1.0.181203.
CVE-2026-27175 9.8 0.49% 4 0 2026-02-19T15:53:02.850000 MajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated OS comman
CVE-2026-27180 9.8 0.09% 4 1 2026-02-19T15:53:02.850000 MajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated remote co
CVE-2026-0874 7.8 0.01% 2 0 2026-02-19T15:53:02.850000 A maliciously crafted CATPART file, when parsed through certain Autodesk product
CVE-2026-1405 9.8 0.15% 2 0 2026-02-19T15:52:39.260000 The Slider Future plugin for WordPress is vulnerable to arbitrary file uploads d
CVE-2026-22267 8.1 0.04% 4 0 2026-02-19T15:52:39.260000 Dell PowerProtect Data Manager, version(s) prior to 19.22, contain(s) an Incorre
CVE-2026-25755 8.1 0.00% 2 0 2026-02-19T15:52:39.260000 jsPDF is a library to generate PDFs in JavaScript. Prior to 4.2.0, user control
CVE-2026-27179 8.2 0.06% 2 0 2026-02-19T00:30:37 MajorDoMo (aka Major Domestic Module) contains an unauthenticated SQL injection
CVE-2026-27182 8.4 0.12% 2 0 2026-02-19T00:30:37 Saturn Remote Mouse Server contains a command injection vulnerability that allow
CVE-2026-27181 7.5 0.02% 2 0 2026-02-19T00:30:37 MajorDoMo (aka Major Domestic Module) allows unauthenticated arbitrary module un
CVE-2026-2649 8.8 0.03% 4 0 2026-02-19T00:30:30 Integer overflow in V8 in Google Chrome prior to 145.0.7632.109 allowed a remote
CVE-2026-2650 8.8 0.03% 4 0 2026-02-19T00:30:30 Heap buffer overflow in Media in Google Chrome prior to 145.0.7632.109 allowed a
CVE-2026-27174 9.8 0.32% 4 0 2026-02-19T00:30:30 MajorDoMo (aka Major Domestic Module) allows unauthenticated remote code executi
CVE-2019-25360 9.8 0.18% 1 0 2026-02-19T00:30:29 Aida64 Engineer 6.10.5200 contains a buffer overflow vulnerability in the CSV lo
CVE-2026-22860 7.5 0.04% 2 0 2026-02-18T23:49:03 ## Summary `Rack::Directory`’s path check used a string prefix match on the exp
CVE-2025-45769 6.5 0.01% 2 0 2026-02-18T22:16:24.073000 php-jwt v6.11.0 was discovered to contain weak encryption. NOTE: this issue has
CVE-2025-70146 9.1 0.25% 2 0 2026-02-18T21:32:26 Missing authentication in multiple administrative action scripts under /admin/ i
CVE-2026-1435 9.8 0.05% 6 0 2026-02-18T21:32:25 Not properly invalidated session vulnerability in Graylog Web Interface, version
CVE-2025-1272 7.8 0.01% 2 2 2026-02-18T21:31:34 The Linux Kernel lockdown mode for kernel versions starting on 6.12 and above fo
CVE-2026-0875 7.8 0.01% 2 0 2026-02-18T21:31:34 A maliciously crafted MODEL file, when parsed through certain Autodesk products,
CVE-2025-70064 8.8 0.08% 2 0 2026-02-18T21:31:23 PHPGurukul Hospital Management System v4.0 contains a Privilege Escalation vulne
CVE-2025-70149 9.8 0.03% 2 0 2026-02-18T21:31:23 CodeAstro Membership Management System 1.0 is vulnerable to SQL Injection in pri
CVE-2025-70147 7.5 0.14% 2 0 2026-02-18T21:31:23 Missing authentication in /admin/student.php and /admin/teacher.php in ProjectWo
CVE-2026-22769 10.0 28.78% 28 0 2026-02-18T20:01:15.983000 Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a
CVE-2026-0714 6.8 0.01% 4 0 2026-02-18T18:31:27 A physical attack vulnerability exists in certain Moxa industrial computers usin
CVE-2021-22175 9.8 74.08% 6 0 template 2026-02-18T18:31:26 When requests to the internal network for webhooks are enabled, a server-side re
CVE-2026-2507 7.5 0.08% 4 0 2026-02-18T18:30:51 When BIG-IP AFM or BIG-IP DDoS is provisioned, undisclosed traffic can cause TMM
CVE-2025-70150 9.8 0.11% 2 0 2026-02-18T18:30:47 CodeAstro Membership Management System 1.0 contains a missing authentication vul
CVE-2025-70998 9.8 0.11% 4 0 2026-02-18T18:30:39 UTT HiPER 810 / nv810v4 router firmware v1.5.0-140603 was discovered to contain
CVE-2025-61982 7.8 0.02% 2 0 2026-02-18T18:30:38 An arbitrary code execution vulnerability exists in the Code Stream directive fu
CVE-2025-65715 7.8 0.02% 4 0 2026-02-18T17:52:22.253000 An issue in the code-runner.executorMap setting of Visual Studio Code Extensions
CVE-2026-2577 10.0 0.06% 1 0 2026-02-18T17:52:22.253000 The WhatsApp bridge component in Nanobot binds the WebSocket server to all netwo
CVE-2026-1670 9.8 0.04% 8 0 2026-02-18T17:51:53.510000 The affected products are vulnerable to an unauthenticated API endpoint exposure
CVE-2026-27099 8.0 0.04% 6 0 2026-02-18T17:51:53.510000 Jenkins 2.483 through 2.550 (both inclusive), LTS 2.492.1 through 2.541.1 (both
CVE-2026-1426 8.8 0.09% 4 0 2026-02-18T17:51:53.510000 The Advanced AJAX Product Filters plugin for WordPress is vulnerable to PHP Obje
CVE-2025-33239 7.8 0.02% 2 0 2026-02-18T17:51:53.510000 NVIDIA Megatron Bridge contains a vulnerability in a data merging tutorial, wher
CVE-2025-33250 7.8 0.07% 2 0 2026-02-18T17:51:53.510000 NVIDIA NeMo Framework contains a vulnerability where an attacker could cause rem
CVE-2025-33243 7.8 0.28% 2 0 2026-02-18T17:51:53.510000 NVIDIA NeMo Framework contains a vulnerability where an attacker could cause rem
CVE-2025-60037 7.8 0.18% 2 0 2026-02-18T17:51:53.510000 A vulnerability has been identified in Rexroth IndraWorks. This flaw allows an a
CVE-2025-33253 7.8 0.27% 2 0 2026-02-18T17:51:53.510000 NVIDIA NeMo Framework contains a vulnerability where an attacker could cause rem
CVE-2026-1714 8.6 0.06% 1 0 2026-02-18T17:51:53.510000 The ShopLentor – WooCommerce Builder for Elementor & Gutenberg +21 Modules – All
CVE-2025-13689 8.8 0.03% 1 0 2026-02-18T17:51:53.510000 IBM DataStage on Cloud Pak for Data could allow an authenticated user to execute
CVE-2026-1368 7.5 0.02% 2 0 2026-02-18T15:32:29 The Video Conferencing with Zoom WordPress plugin before 4.6.6 contains an AJAX
CVE-2026-2329 None 0.09% 7 0 2026-02-18T15:31:35 An unauthenticated stack-based buffer overflow vulnerability exists in the HTTP
CVE-2025-33251 7.8 0.07% 2 0 2026-02-18T15:31:34 NVIDIA NeMo Framework contains a vulnerability where an attacker could cause rem
CVE-2025-33245 8.0 0.23% 2 0 2026-02-18T15:31:34 NVIDIA NeMo Framework contains a vulnerability where malicious data could cause
CVE-2025-33241 7.8 0.28% 2 0 2026-02-18T15:31:33 NVIDIA NeMo Framework contains a vulnerability where an attacker could cause rem
CVE-2025-33240 7.8 0.02% 2 0 2026-02-18T15:31:33 NVIDIA Megatron Bridge contains a vulnerability in a data shuffling tutorial, wh
CVE-2025-33236 7.8 0.02% 2 0 2026-02-18T15:31:33 NVIDIA NeMo Framework contains a vulnerability where malicious data created by a
CVE-2025-33249 7.8 0.02% 2 0 2026-02-18T15:31:33 NVIDIA NeMo Framework for all platforms contains a vulnerability in a voice-prep
CVE-2025-33246 7.8 0.05% 2 0 2026-02-18T15:31:33 NVIDIA NeMo Framework for all platforms contains a vulnerability in the ASR Eval
CVE-2025-60038 7.8 0.18% 2 0 2026-02-18T15:31:33 A vulnerability has been identified in Rexroth IndraWorks. This flaw allows an a
CVE-2025-60036 7.8 0.18% 2 0 2026-02-18T15:31:33 A vulnerability has been identified in the UA.Testclient utility, which is inclu
CVE-2025-60035 7.8 0.18% 2 0 2026-02-18T15:31:33 A vulnerability has been identified in the OPC.Testclient utility, which is incl
CVE-2025-33252 7.8 0.27% 2 0 2026-02-18T15:31:33 NVIDIA NeMo Framework contains a vulnerability where an attacker could cause rem
CVE-2026-22048 7.1 0.04% 1 0 2026-02-18T15:31:25 StorageGRID (formerly StorageGRID Webscale) versions prior to 11.9.0.12 and 12.0
CVE-2026-23599 7.8 0.01% 2 0 2026-02-18T15:31:25 A local privilege-escalation vulnerability has been discovered in the HPE Aruba
CVE-2024-7694 7.2 1.38% 2 0 2026-02-18T13:46:48.840000 ThreatSonar Anti-Ransomware from TeamT5 does not properly validate the content o
CVE-2026-2495 7.5 0.08% 4 0 2026-02-18T09:32:07 The WPNakama – Team and multi-Client Collaboration, Editorial and Project Manage
CVE-2026-1937 9.8 0.04% 3 0 2026-02-18T09:32:06 The YayMail – WooCommerce Email Customizer plugin for WordPress is vulnerable to
CVE-2026-2576 7.5 0.07% 1 0 2026-02-18T06:30:25 The Business Directory Plugin – Easy Listing Directories for WordPress plugin fo
CVE-2026-26119 8.8 0.06% 3 0 2026-02-18T00:30:22 Improper authentication in Windows Admin Center allows an authorized attacker to
CVE-2026-26324 7.5 0.00% 2 0 2026-02-17T21:42:42 ### Summary OpenClaw's SSRF protection could be bypassed using full-form IPv4-m
CVE-2026-26322 7.6 0.00% 2 0 2026-02-17T21:42:17 ## Summary The Gateway tool accepted a tool-supplied `gatewayUrl` without suffic
CVE-2026-26319 7.5 0.00% 2 0 2026-02-17T21:40:47 ## Summary In affected versions, OpenClaw's optional `@openclaw/voice-call` plu
CVE-2026-26316 7.5 0.00% 2 0 2026-02-17T21:33:51 ### Summary In affected versions, the optional BlueBubbles iMessage channel plu
CVE-2026-2441 8.8 0.53% 21 3 2026-02-17T21:32:21 Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote a
CVE-2026-23647 9.8 0.26% 2 0 2026-02-17T21:32:21 Glory RBG-100 recycler systems using the ISPK-08 software component contain hard
CVE-2008-0015 8.8 80.64% 2 0 2026-02-17T21:32:16 Stack-based buffer overflow in the CComVariant::ReadFromStream function in the A
CVE-2020-7796 9.8 93.55% 2 0 template 2026-02-17T21:32:16 Zimbra Collaboration Suite (ZCS) before 8.8.15 Patch 7 allows SSRF when WebEx zi
CVE-2026-26275 7.5 0.00% 2 0 2026-02-17T21:29:37 ### Impact An issue was discovered in `httpsig-hyper` where Digest header verif
CVE-2025-65716 8.8 0.05% 4 0 2026-02-17T15:32:42 An issue in Visual Studio Code Extensions Markdown Preview Enhanced v0.8.18 allo
CVE-2025-65717 9.1 0.03% 2 1 2026-02-17T15:32:42 An issue in Visual Studio Code Extensions Live Server v5.7.9 allows attackers to
CVE-2026-2447 8.8 0.04% 6 0 2026-02-17T15:32:41 Heap buffer overflow in libvpx. This vulnerability affects Firefox < 147.0.4, Fi
CVE-2026-1731 9.8 49.74% 4 3 template 2026-02-17T13:40:10.320000 BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote
CVE-2026-20841 7.8 0.09% 3 10 2026-02-12T20:16:05.143000 Improper neutralization of special elements used in a command ('command injectio
CVE-2026-24061 9.8 76.94% 1 61 template 2026-02-11T15:40:42.937000 telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "
CVE-2026-21509 7.8 9.21% 2 9 2026-02-10T15:30:22 Reliance on untrusted inputs in a security decision in Microsoft Office allows a
CVE-2025-14831 5.3 0.04% 1 0 2026-02-09T15:30:37 A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS)
CVE-2026-24423 9.8 22.65% 1 1 2026-02-06T18:30:29 SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated
CVE-2021-39935 7.5 54.31% 2 0 2026-02-03T18:30:29 An issue has been discovered in GitLab CE/EE affecting all versions starting fro
CVE-2026-1281 9.8 43.87% 6 2 2026-01-30T00:31:29 A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve
CVE-2026-1340 9.8 32.27% 3 2 2026-01-30T00:31:28 A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve
CVE-2025-15467 9.8 0.92% 2 4 2026-01-29T15:31:31 Issue summary: Parsing CMS AuthEnvelopedData message with maliciously crafted AE
CVE-2026-23760 9.8 55.75% 1 2 template 2026-01-27T18:33:14 SmarterTools SmarterMail versions prior to build 9511 contain an authentication
CVE-2025-6571 6.0 0.02% 2 0 2025-11-11T09:30:36 A 3rd-party component exposed its password in process arguments, allowing for lo
CVE-2025-7676 None 0.02% 2 0 2025-07-28T18:31:29 DLL hijacking of all PE32 executables when run on Windows for ARM64 CPU architec
CVE-2025-29969 7.5 0.28% 2 1 2025-05-13T18:31:00 Time-of-check time-of-use (toctou) race condition in Windows Fundamentals allows
CVE-2021-22214 6.8 93.52% 2 4 template 2024-11-21T05:49:43.477000 When requests to the internal network for webhooks are enabled, a server-side re
CVE-2023-51781 7.0 0.02% 1 0 2024-01-27T05:05:43 An issue was discovered in the Linux kernel before 6.6.8. atalk_ioctl in net/app
CVE-2001-0144 None 61.72% 2 0 2023-01-30T05:05:25 CORE SDI SSH1 CRC-32 compensation attack detector allows remote attackers to exe
CVE-2025-30416 0 0.00% 2 0 N/A
CVE-2025-30412 0 0.00% 2 0 N/A
CVE-2025-30410 0 0.00% 2 0 N/A
CVE-2026-26959 0 0.00% 4 0 N/A
CVE-2026-26202 0 0.00% 2 0 N/A
CVE-2026-26200 0 0.00% 2 0 N/A
CVE-2026-25548 0 0.27% 2 0 N/A
CVE-2025-41725 0 0.00% 2 0 N/A
CVE-2026-2239 0 0.00% 1 0 N/A

CVE-2026-26990
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-20T02:16:54.870000

2 posts

LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Versions 25.12.0 and below have a Time-Based Blind SQL Injection vulnerability in address-search.inc.php via the address parameter. When a crafted subnet prefix is supplied, the prefix value is concatenated directly into an SQL query without proper parameter binding, allowing an attacker to manipulate query logic and inf

thehackerwire@mastodon.social at 2026-02-20T02:18:11.000Z ##

🟠 CVE-2026-26990 - High (8.8)

LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Versions 25.12.0 and below have a Time-Based Blind SQL Injection vulnerability in address-search.inc.php via the address parameter. When a crafted subnet prefix is suppl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T02:18:11.000Z ##

🟠 CVE-2026-26990 - High (8.8)

LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Versions 25.12.0 and below have a Time-Based Blind SQL Injection vulnerability in address-search.inc.php via the address parameter. When a crafted subnet prefix is suppl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26980
(9.4 CRITICAL)

EPSS: 0.00%

updated 2026-02-20T02:16:54.213000

2 posts

Ghost is a Node.js content management system. Versions 3.24.0 through 6.19.0 allow unauthenticated attackers to perform arbitrary reads from the database. This issue has been fixed in version 6.19.1.

thehackerwire@mastodon.social at 2026-02-20T02:18:01.000Z ##

🔴 CVE-2026-26980 - Critical (9.4)

Ghost is a Node.js content management system. Versions 3.24.0 through 6.19.0 allow unauthenticated attackers to perform arbitrary reads from the database. This issue has been fixed in version 6.19.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T02:18:01.000Z ##

🔴 CVE-2026-26980 - Critical (9.4)

Ghost is a Node.js content management system. Versions 3.24.0 through 6.19.0 allow unauthenticated attackers to perform arbitrary reads from the database. This issue has been fixed in version 6.19.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26065
(0 None)

EPSS: 0.00%

updated 2026-02-20T02:16:53.730000

2 posts

calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Versions 9.2.1 and below are vulnerable to Path Traversal through PDB readers (both 132-byte and 202-byte header variants) that allow arbitrary file writes with arbitrary extension and arbitrary content anywhere the user has write permissions. Files are written in 'wb' mode, silently overwriting ex

offseq at 2026-02-20T03:00:30.589Z ##

⚠️ CRITICAL vuln: calibre <9.3.0 (CVE-2026-26065) allows arbitrary file writes via path traversal in PDB reader. Risks: code execution, DoS. Patch to 9.3.0+ ASAP! No known exploits yet. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-20T03:00:30.000Z ##

⚠️ CRITICAL vuln: calibre <9.3.0 (CVE-2026-26065) allows arbitrary file writes via path traversal in PDB reader. Risks: code execution, DoS. Patch to 9.3.0+ ASAP! No known exploits yet. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #Calibre #InfoSec

##

CVE-2026-26975
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-20T01:16:00.273000

4 posts

Music Assistant is an open-source media library manager that integrates streaming services with connected speakers. Versions 2.6.3 and below allow unauthenticated network-adjacent attackers to execute arbitrary code on affected installations. The music/playlists/update API allows users to bypass the .m3u extension enforcement and write files anywhere on the filesystem, which is exacerbated by the

offseq at 2026-02-20T01:30:28.762Z ##

🎵 CVE-2026-26975: HIGH severity RCE in Music Assistant server <2.7.0. Unauthenticated attackers can write arbitrary files via playlist update API — root compromise possible if running as root. Upgrade to 2.7.0+ now! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-20T01:17:30.000Z ##

🟠 CVE-2026-26975 - High (8.8)

Music Assistant is an open-source media library manager that integrates streaming services with connected speakers. Versions 2.6.3 and below allow unauthenticated network-adjacent attackers to execute arbitrary code on affected installations. The ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-20T01:30:28.000Z ##

🎵 CVE-2026-26975: HIGH severity RCE in Music Assistant server <2.7.0. Unauthenticated attackers can write arbitrary files via playlist update API — root compromise possible if running as root. Upgrade to 2.7.0+ now! radar.offseq.com/threat/cve-20 #OffSeq #Vuln #RCE #MusicAssistant

##

thehackerwire@mastodon.social at 2026-02-20T01:17:30.000Z ##

🟠 CVE-2026-26975 - High (8.8)

Music Assistant is an open-source media library manager that integrates streaming services with connected speakers. Versions 2.6.3 and below allow unauthenticated network-adjacent attackers to execute arbitrary code on affected installations. The ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-30411
(10.0 CRITICAL)

EPSS: 0.00%

updated 2026-02-20T01:15:59.493000

4 posts

Sensitive data disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39938, Acronis Cyber Protect 15 (Linux, Windows) before build 41800.

thehackerwire@mastodon.social at 2026-02-20T01:18:46.000Z ##

🔴 CVE-2025-30411 - Critical (10)

Sensitive data disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39938, Acronis Cyber Protect 15 (Linux, Windows) before build 41800.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T01:17:50.000Z ##

🔴 CVE-2025-30411 - Critical (10)

Sensitive data disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39938, Acronis Cyber Protect 15 (Linux, Windows) before build 41800.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T01:18:46.000Z ##

🔴 CVE-2025-30411 - Critical (10)

Sensitive data disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39938, Acronis Cyber Protect 15 (Linux, Windows) before build 41800.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T01:17:50.000Z ##

🔴 CVE-2025-30411 - Critical (10)

Sensitive data disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39938, Acronis Cyber Protect 15 (Linux, Windows) before build 41800.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23544
(8.8 HIGH)

EPSS: 0.02%

updated 2026-02-20T00:32:59

2 posts

Deserialization of Untrusted Data vulnerability in codetipi Valenti valenti allows Object Injection.This issue affects Valenti: from n/a through <= 5.6.3.5.

thehackerwire@mastodon.social at 2026-02-20T00:50:45.000Z ##

🟠 CVE-2026-23544 - High (8.8)

Deserialization of Untrusted Data vulnerability in codetipi Valenti valenti allows Object Injection.This issue affects Valenti: from n/a through &lt;= 5.6.3.5.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T00:50:45.000Z ##

🟠 CVE-2026-23544 - High (8.8)

Deserialization of Untrusted Data vulnerability in codetipi Valenti valenti allows Object Injection.This issue affects Valenti: from n/a through &lt;= 5.6.3.5.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23542
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-02-20T00:32:59

2 posts

Deserialization of Untrusted Data vulnerability in ThemeGoods Grand Restaurant grandrestaurant allows Object Injection.This issue affects Grand Restaurant: from n/a through <= 7.0.10.

thehackerwire@mastodon.social at 2026-02-20T00:50:35.000Z ##

🔴 CVE-2026-23542 - Critical (9.8)

Deserialization of Untrusted Data vulnerability in ThemeGoods Grand Restaurant grandrestaurant allows Object Injection.This issue affects Grand Restaurant: from n/a through &lt;= 7.0.10.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T00:50:35.000Z ##

🔴 CVE-2026-23542 - Critical (9.8)

Deserialization of Untrusted Data vulnerability in ThemeGoods Grand Restaurant grandrestaurant allows Object Injection.This issue affects Grand Restaurant: from n/a through &lt;= 7.0.10.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21535
(8.2 HIGH)

EPSS: 0.00%

updated 2026-02-20T00:31:59

2 posts

Improper access control in Microsoft Teams allows an unauthorized attacker to disclose information over a network.

thehackerwire@mastodon.social at 2026-02-20T00:05:04.000Z ##

🟠 CVE-2026-21535 - High (8.2)

Improper access control in Microsoft Teams allows an unauthorized attacker to disclose information over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T00:05:04.000Z ##

🟠 CVE-2026-21535 - High (8.2)

Improper access control in Microsoft Teams allows an unauthorized attacker to disclose information over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26321
(7.5 HIGH)

EPSS: 0.00%

updated 2026-02-19T23:16:25.180000

2 posts

OpenClaw is a personal AI assistant. Prior to OpenClaw version 2026.2.14, the Feishu extension previously allowed `sendMediaFeishu` to treat attacker-controlled `mediaUrl` values as local filesystem paths and read them directly. If an attacker can influence tool calls (directly or via prompt injection), they may be able to exfiltrate local files by supplying paths such as `/etc/passwd` as `mediaUr

thehackerwire@mastodon.social at 2026-02-19T23:59:48.000Z ##

🟠 CVE-2026-26321 - High (7.5)

OpenClaw is a personal AI assistant. Prior to OpenClaw version 2026.2.14, the Feishu extension previously allowed `sendMediaFeishu` to treat attacker-controlled `mediaUrl` values as local filesystem paths and read them directly. If an attacker can...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T23:59:48.000Z ##

🟠 CVE-2026-26321 - High (7.5)

OpenClaw is a personal AI assistant. Prior to OpenClaw version 2026.2.14, the Feishu extension previously allowed `sendMediaFeishu` to treat attacker-controlled `mediaUrl` values as local filesystem paths and read them directly. If an attacker can...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0573
(9.0 CRITICAL)

EPSS: 0.10%

updated 2026-02-19T22:49:21.843000

2 posts

An URL redirection vulnerability was identified in GitHub Enterprise Server that allowed attacker-controlled redirects to leak sensitive authorization tokens. The repository_pages API insecurely followed HTTP redirects when fetching artifact URLs, preserving the authorization header containing a privileged JWT. An authenticated user could redirect these requests to an attacker-controlled domain, e

thehackerwire@mastodon.social at 2026-02-20T01:31:48.000Z ##

🔴 CVE-2026-0573 - Critical (9)

An URL redirection vulnerability was identified in GitHub Enterprise Server that allowed attacker-controlled redirects to leak sensitive authorization tokens. The repository_pages API insecurely followed HTTP redirects when fetching artifact URLs,...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T01:31:48.000Z ##

🔴 CVE-2026-0573 - Critical (9)

An URL redirection vulnerability was identified in GitHub Enterprise Server that allowed attacker-controlled redirects to leak sensitive authorization tokens. The repository_pages API insecurely followed HTTP redirects when fetching artifact URLs,...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23549
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-02-19T22:16:41.930000

2 posts

Deserialization of Untrusted Data vulnerability in magepeopleteam WpEvently mage-eventpress allows Object Injection.This issue affects WpEvently: from n/a through <= 5.1.1.

thehackerwire@mastodon.social at 2026-02-20T01:28:18.000Z ##

🔴 CVE-2026-23549 - Critical (9.8)

Deserialization of Untrusted Data vulnerability in magepeopleteam WpEvently mage-eventpress allows Object Injection.This issue affects WpEvently: from n/a through &lt;= 5.1.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T01:28:18.000Z ##

🔴 CVE-2026-23549 - Critical (9.8)

Deserialization of Untrusted Data vulnerability in magepeopleteam WpEvently mage-eventpress allows Object Injection.This issue affects WpEvently: from n/a through &lt;= 5.1.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-13590
(9.1 CRITICAL)

EPSS: 0.21%

updated 2026-02-19T22:11:44

2 posts

A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location within the deployment via a system REST API. Successful uploads may lead to remote code execution. By leveraging the vulnerability, a malicious actor may perform Remote Code Execution by uploading a specially crafted payload.

thehackerwire@mastodon.social at 2026-02-19T15:44:34.000Z ##

🔴 CVE-2025-13590 - Critical (9.1)

A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location within the deployment via a system REST API. Successful uploads may lead to remote code execution.

By leveraging the vulnerability, a ma...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T15:44:34.000Z ##

🔴 CVE-2025-13590 - Critical (9.1)

A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location within the deployment via a system REST API. Successful uploads may lead to remote code execution.

By leveraging the vulnerability, a ma...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27013
(7.6 HIGH)

EPSS: 0.00%

updated 2026-02-19T21:57:27

2 posts

fabric.js applies `escapeXml()` to text content during SVG export (`src/shapes/Text/TextSVGExportMixin.ts:186`) but fails to apply it to other user-controlled string values that are interpolated into SVG attribute markup. When attacker-controlled JSON is loaded via `loadFromJSON()` and later exported via `toSVG()`, the unescaped values break out of XML attributes and inject arbitrary SVG elements

thehackerwire@mastodon.social at 2026-02-19T21:00:20.000Z ##

🟠 CVE-2026-27013 - High (7.6)

Fabric.js is a Javascript HTML5 canvas library. Prior to version 7.2.0, Fabric.js applies `escapeXml()` to text content during SVG export (`src/shapes/Text/TextSVGExportMixin.ts:186`) but fails to apply it to other user-controlled string values th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T21:00:20.000Z ##

🟠 CVE-2026-27013 - High (7.6)

Fabric.js is a Javascript HTML5 canvas library. Prior to version 7.2.0, Fabric.js applies `escapeXml()` to text content during SVG export (`src/shapes/Text/TextSVGExportMixin.ts:186`) but fails to apply it to other user-controlled string values th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26280
(8.4 HIGH)

EPSS: 0.00%

updated 2026-02-19T21:57:03

2 posts

### Summary A command injection vulnerability in the `wifiNetworks()` function allows an attacker to execute arbitrary OS commands via an unsanitized network interface parameter in the retry code path. ### Details In `lib/wifi.js`, the `wifiNetworks()` function sanitizes the `iface` parameter on the initial call (line 437). However, when the initial scan returns empty results, a `setTimeout` retr

thehackerwire@mastodon.social at 2026-02-19T21:01:29.000Z ##

🟠 CVE-2026-26280 - High (8.4)

systeminformation is a System and OS information library for node.js. In versions prior to 5.30.8, a command injection vulnerability in the `wifiNetworks()` function allows an attacker to execute arbitrary OS commands via an unsanitized network in...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T21:01:29.000Z ##

🟠 CVE-2026-26280 - High (8.4)

systeminformation is a System and OS information library for node.js. In versions prior to 5.30.8, a command injection vulnerability in the `wifiNetworks()` function allows an attacker to execute arbitrary OS commands via an unsanitized network in...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26267
(7.5 HIGH)

EPSS: 0.00%

updated 2026-02-19T21:56:47

2 posts

### Impact The `#[contractimpl]` macro contains a bug in how it wires up function calls. In Rust, you can define functions on a type in two ways: - Directly on the type as an inherent function: ```rust impl MyContract { fn value() { ... } } ``` - Through a trait ```rust impl Trait for MyContract { fn value() { ... } } ``` These are two separate functions that happen

thehackerwire@mastodon.social at 2026-02-19T21:00:29.000Z ##

🟠 CVE-2026-26267 - High (7.5)

soroban-sdk is a Rust SDK for Soroban contracts. Prior to versions 22.0.10, 23.5.2, and 25.1.1, the `#[contractimpl]` macro contains a bug in how it wires up function calls. `#[contractimpl]` generates code that uses `MyContract::value()` style ca...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T21:00:29.000Z ##

🟠 CVE-2026-26267 - High (7.5)

soroban-sdk is a Rust SDK for Soroban contracts. Prior to versions 22.0.10, 23.5.2, and 25.1.1, the `#[contractimpl]` macro contains a bug in how it wires up function calls. `#[contractimpl]` generates code that uses `MyContract::value()` style ca...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27476
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-02-19T21:30:57

2 posts

RustFly 2.0.0 contains a command injection vulnerability in its remote UI control mechanism that accepts hex-encoded instructions over UDP port 5005 without proper sanitization. Attackers can send crafted hex-encoded payloads containing system commands to execute arbitrary operations on the target system, including reverse shell establishment and command execution.

thehackerwire@mastodon.social at 2026-02-20T00:20:03.000Z ##

🔴 CVE-2026-27476 - Critical (9.8)

RustFly 2.0.0 contains a command injection vulnerability in its remote UI control mechanism that accepts hex-encoded instructions over UDP port 5005 without proper sanitization. Attackers can send crafted hex-encoded payloads containing system com...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T00:20:03.000Z ##

🔴 CVE-2026-27476 - Critical (9.8)

RustFly 2.0.0 contains a command injection vulnerability in its remote UI control mechanism that accepts hex-encoded instructions over UDP port 5005 without proper sanitization. Attackers can send crafted hex-encoded payloads containing system com...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27052
(7.5 HIGH)

EPSS: 0.05%

updated 2026-02-19T21:30:46

2 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in villatheme Sales Countdown Timer for WooCommerce and WordPress sctv-sales-countdown-timer allows PHP Local File Inclusion.This issue affects Sales Countdown Timer for WooCommerce and WordPress: from n/a through <= 1.1.8.1.

thehackerwire@mastodon.social at 2026-02-19T20:15:49.000Z ##

🟠 CVE-2026-27052 - High (7.5)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in villatheme Sales Countdown Timer for WooCommerce and WordPress sctv-sales-countdown-timer allows PHP Local File Inclusion.This...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T20:15:49.000Z ##

🟠 CVE-2026-27052 - High (7.5)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in villatheme Sales Countdown Timer for WooCommerce and WordPress sctv-sales-countdown-timer allows PHP Local File Inclusion.This...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25378
(7.6 HIGH)

EPSS: 0.02%

updated 2026-02-19T21:30:45

2 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Nelio Software Nelio AB Testing nelio-ab-testing allows Blind SQL Injection.This issue affects Nelio AB Testing: from n/a through <= 8.2.4.

thehackerwire@mastodon.social at 2026-02-20T00:50:25.000Z ##

🟠 CVE-2026-25378 - High (7.6)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Nelio Software Nelio AB Testing nelio-ab-testing allows Blind SQL Injection.This issue affects Nelio AB Testing: from n/a through &lt;= 8.2.4.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T00:50:25.000Z ##

🟠 CVE-2026-25378 - High (7.6)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Nelio Software Nelio AB Testing nelio-ab-testing allows Blind SQL Injection.This issue affects Nelio AB Testing: from n/a through &lt;= 8.2.4.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26016(CVSS UNKNOWN)

EPSS: 0.00%

updated 2026-02-19T21:30:31

2 posts

### Summary A missing authorization check in multiple controllers allows any user with access to a node secret token to fetch information about any server on a Pterodactyl instance, even if that server is associated with a different node. This issue stems from missing logic to verify that the node requesting server data is the same node that the server is associated with. Any authenticated Wings

offseq at 2026-02-19T22:30:13.542Z ##

⚠️ CRITICAL: Pterodactyl Panel <1.12.1 has an auth bypass (CVE-2026-26016). Wings node token = full access to all servers, data loss risk. Upgrade to 1.12.1 ASAP & secure tokens! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-19T22:30:13.000Z ##

⚠️ CRITICAL: Pterodactyl Panel <1.12.1 has an auth bypass (CVE-2026-26016). Wings node token = full access to all servers, data loss risk. Upgrade to 1.12.1 ASAP & secure tokens! radar.offseq.com/threat/cve-20 #OffSeq #Pterodactyl #CVE202626016 #Vulnerability

##

CVE-2026-24834(CVSS UNKNOWN)

EPSS: 0.00%

updated 2026-02-19T21:30:21

2 posts

### Summary An issue in Kata with Cloud Hypervisor allows a user of the container to modify the file system used by the Guest micro VM ultimately achieving arbitrary code execution as root in said VM. The current understinding is this doesn’t impact the security of the Host or of other containers / VMs running on that Host (note that arm64 QEMU lacks NVDIMM read-only support: It is believed that

thehackerwire@mastodon.social at 2026-02-19T18:02:02.000Z ##

🔴 CVE-2026-24834 - Critical (9.3)

Kata Containers is an open source project focusing on a standard implementation of lightweight Virtual Machines (VMs) that perform like containers. In versions prior to 3.27.0, an issue in Kata with Cloud Hypervisor allows a user of the container ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T18:02:02.000Z ##

🔴 CVE-2026-24834 - Critical (9.3)

Kata Containers is an open source project focusing on a standard implementation of lightweight Virtual Machines (VMs) that perform like containers. In versions prior to 3.27.0, an issue in Kata with Cloud Hypervisor allows a user of the container ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25242(CVSS UNKNOWN)

EPSS: 0.19%

updated 2026-02-19T21:23:41

2 posts

Security Advisory:Unauthenticated File Upload in Gogs Vulnerability Type: Unauthenticated File Upload Date: Aug 5, 2025 Discoverer: OpenAI Security Research ## Summary Gogs exposes unauthenticated file upload endpoints by default. When the global RequireSigninView setting is disabled (default), any remote user can upload arbitrary files to the server via /releases/attachments and /issues/attachme

1 repos

https://github.com/mindkernel/CVE-2026-25242

thehackerwire@mastodon.social at 2026-02-19T20:20:47.000Z ##

🔴 CVE-2026-25242 - Critical (9.8)

Gogs is an open source self-hosted Git service. Versions 0.13.4 and below expose unauthenticated file upload endpoints by default. When the global RequireSigninView setting is disabled (default), any remote user can upload arbitrary files to the s...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T20:20:47.000Z ##

🔴 CVE-2026-25242 - Critical (9.8)

Gogs is an open source self-hosted Git service. Versions 0.13.4 and below expose unauthenticated file upload endpoints by default. When the global RequireSigninView setting is disabled (default), any remote user can upload arbitrary files to the s...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25232(CVSS UNKNOWN)

EPSS: 0.03%

updated 2026-02-19T21:14:58

2 posts

## Summary An access control bypass vulnerability in Gogs web interface allows any repository collaborator with Write permissions to delete protected branches (including the default branch) by sending a direct POST request, completely bypassing the branch protection mechanism. This vulnerability enables privilege escalation from Write to Admin level, allowing low-privilege users to perform danger

thehackerwire@mastodon.social at 2026-02-19T20:20:38.000Z ##

🟠 CVE-2026-25232 - High (8.8)

Gogs is an open source self-hosted Git service. Versions 0.13.4 and below have an access control bypass vulnerability which allows any repository collaborator with Write permissions to delete protected branches (including the default branch) by se...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T20:20:38.000Z ##

🟠 CVE-2026-25232 - High (8.8)

Gogs is an open source self-hosted Git service. Versions 0.13.4 and below have an access control bypass vulnerability which allows any repository collaborator with Write permissions to delete protected branches (including the default branch) by se...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24708
(8.2 HIGH)

EPSS: 0.04%

updated 2026-02-19T20:28:05

3 posts

An issue was discovered in OpenStack Nova before 30.2.2, 31 before 31.2.1, and 32 before 32.1.1. By writing a malicious QCOW header to a root or ephemeral disk and then triggering a resize, a user may convince Nova's Flat image backend to call qemu-img without a format restriction, resulting in an unsafe image resize operation that could destroy data on the host system. Only compute nodes using th

thehackerwire@mastodon.social at 2026-02-18T18:59:07.000Z ##

🟠 CVE-2026-24708 - High (8.2)

An issue was discovered in OpenStack Nova before 30.2.2, 31 before 31.2.1, and 32 before 32.1.1. By writing a malicious QCOW header to a root or ephemeral disk and then triggering a resize, a user may convince Nova's Flat image backend to call qem...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

linux@activitypub.awakari.com at 2026-02-19T20:53:28.000Z ## Debian DSA-6145-1 Nova Image Resize Issue CVE-2026-24708 Dan Smith discovered that nova, a cloud computing fabric controller, calls qemu-img without format restrictions for resize, which may result...

#Debian #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

thehackerwire@mastodon.social at 2026-02-18T18:59:07.000Z ##

🟠 CVE-2026-24708 - High (8.2)

An issue was discovered in OpenStack Nova before 30.2.2, 31 before 31.2.1, and 32 before 32.1.1. By writing a malicious QCOW header to a root or ephemeral disk and then triggering a resize, a user may convince Nova's Flat image backend to call qem...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-14009
(10.0 CRITICAL)

EPSS: 0.40%

updated 2026-02-19T20:27:45

4 posts

A critical vulnerability exists in the NLTK downloader component of nltk/nltk, affecting all versions. The _unzip_iter function in nltk/downloader.py uses zipfile.extractall() without performing path validation or security checks. This allows attackers to craft malicious zip packages that, when downloaded and extracted by NLTK, can execute arbitrary code. The vulnerability arises because NLTK assu

thehackerwire@mastodon.social at 2026-02-18T19:02:11.000Z ##

🔴 CVE-2025-14009 - Critical (10)

A critical vulnerability exists in the NLTK downloader component of nltk/nltk, affecting all versions. The _unzip_iter function in nltk/downloader.py uses zipfile.extractall() without performing path validation or security checks. This allows atta...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T19:00:01.000Z ##

🔴 CVE-2025-14009 - Critical (10)

A critical vulnerability exists in the NLTK downloader component of nltk/nltk, affecting all versions. The _unzip_iter function in nltk/downloader.py uses zipfile.extractall() without performing path validation or security checks. This allows atta...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T19:02:11.000Z ##

🔴 CVE-2025-14009 - Critical (10)

A critical vulnerability exists in the NLTK downloader component of nltk/nltk, affecting all versions. The _unzip_iter function in nltk/downloader.py uses zipfile.extractall() without performing path validation or security checks. This allows atta...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T19:00:01.000Z ##

🔴 CVE-2025-14009 - Critical (10)

A critical vulnerability exists in the NLTK downloader component of nltk/nltk, affecting all versions. The _unzip_iter function in nltk/downloader.py uses zipfile.extractall() without performing path validation or security checks. This allows atta...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26318
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-19T20:25:44.063000

2 posts

systeminformation is a System and OS information library for node.js. Versions prior to 5.31.0 are vulnerable to command injection via unsanitized `locate` output in `versions()`. Version 5.31.0 fixes the issue.

thehackerwire@mastodon.social at 2026-02-19T21:00:11.000Z ##

🟠 CVE-2026-26318 - High (8.8)

systeminformation is a System and OS information library for node.js. Versions prior to 5.31.0 are vulnerable to command injection via unsanitized `locate` output in `versions()`. Version 5.31.0 fixes the issue.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T21:00:11.000Z ##

🟠 CVE-2026-26318 - High (8.8)

systeminformation is a System and OS information library for node.js. Versions prior to 5.31.0 are vulnerable to command injection via unsanitized `locate` output in `versions()`. Version 5.31.0 fixes the issue.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26278
(7.5 HIGH)

EPSS: 0.00%

updated 2026-02-19T20:25:43.717000

2 posts

fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. In versions 4.1.3 through 5.3.5, the XML parser can be forced to do an unlimited amount of entity expansion. With a very small XML input, it’s possible to make the parser spend seconds or even minutes processing a single request, effectively freezing the

thehackerwire@mastodon.social at 2026-02-19T21:01:19.000Z ##

🟠 CVE-2026-26278 - High (7.5)

fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. In versions 4.1.3 through 5.3.5, the XML parser can be forced to do an unlimited amount of entity expa...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T21:01:19.000Z ##

🟠 CVE-2026-26278 - High (7.5)

fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. In versions 4.1.3 through 5.3.5, the XML parser can be forced to do an unlimited amount of entity expa...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70148
(7.5 HIGH)

EPSS: 0.09%

updated 2026-02-19T20:25:24.843000

2 posts

Missing authentication and authorization in print_membership_card.php in CodeAstro Membership Management System 1.0 allows unauthenticated attackers to access membership card data of arbitrary users via direct requests with a manipulated id parameter, resulting in insecure direct object reference (IDOR).

thehackerwire@mastodon.social at 2026-02-18T19:00:05.000Z ##

🟠 CVE-2025-70148 - High (7.5)

Missing authentication and authorization in print_membership_card.php in CodeAstro Membership Management System 1.0 allows unauthenticated attackers to access membership card data of arbitrary users via direct requests with a manipulated id parame...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T19:00:05.000Z ##

🟠 CVE-2025-70148 - High (7.5)

Missing authentication and authorization in print_membership_card.php in CodeAstro Membership Management System 1.0 allows unauthenticated attackers to access membership card data of arbitrary users via direct requests with a manipulated id parame...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25474
(7.5 HIGH)

EPSS: 0.02%

updated 2026-02-19T20:13:13.640000

2 posts

OpenClaw is a personal AI assistant. In versions 2026.1.30 and below, if channels.telegram.webhookSecret is not set when in Telegram webhook mode, OpenClaw may accept webhook HTTP requests without verifying Telegram’s secret token header. In deployments where the webhook endpoint is reachable by an attacker, this can allow forged Telegram updates (for example spoofing message.from.id). If an attac

thehackerwire@mastodon.social at 2026-02-19T16:04:31.000Z ##

🟠 CVE-2026-25474 - High (7.5)

OpenClaw is a personal AI assistant. In versions 2026.1.30 and below, if channels.telegram.webhookSecret is not set when in Telegram webhook mode, OpenClaw may accept webhook HTTP requests without verifying Telegram’s secret token header. In dep...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T16:04:31.000Z ##

🟠 CVE-2026-25474 - High (7.5)

OpenClaw is a personal AI assistant. In versions 2026.1.30 and below, if channels.telegram.webhookSecret is not set when in Telegram webhook mode, OpenClaw may accept webhook HTTP requests without verifying Telegram’s secret token header. In dep...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26030
(10.0 CRITICAL)

EPSS: 0.00%

updated 2026-02-19T19:34:15

6 posts

### Impact: An RCE vulnerability has been identified in Microsoft Semantic Kernel Python SDK, specifically within the `InMemoryVectorStore` filter functionality. ### Patches: The problem has been fixed in [python-1.39.4](https://github.com/microsoft/semantic-kernel/releases/tag/python-1.39.4). Users should upgrade this version or higher. ### Workarounds: Avoid using `InMemoryVectorStore` for pro

cerebrix at 2026-02-20T01:18:15.274Z ##

Unbelievable.... digg.com/cybersecurity/yCL5Ang

##

offseq at 2026-02-19T21:00:12.944Z ##

⚠️ CRITICAL RCE: CVE-2026-26030 in Microsoft Semantic Kernel (<1.39.4) lets remote attackers execute code via InMemoryVectorStore filter. Upgrade to 1.39.4+ ASAP or avoid this component in prod. Details: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-19T18:00:48.000Z ##

🔴 CVE-2026-26030 - Critical (9.9)

Semantic Kernel, Microsoft's semantic kernel Python SDK, has a remote code execution vulnerability in versions prior to 1.39.4, specifically within the `InMemoryVectorStore` filter functionality. The problem has been fixed in version `python-1.39....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

cerebrix@infosec.exchange at 2026-02-20T01:18:15.000Z ##

Unbelievable.... digg.com/cybersecurity/yCL5Ang

##

offseq@infosec.exchange at 2026-02-19T21:00:12.000Z ##

⚠️ CRITICAL RCE: CVE-2026-26030 in Microsoft Semantic Kernel (<1.39.4) lets remote attackers execute code via InMemoryVectorStore filter. Upgrade to 1.39.4+ ASAP or avoid this component in prod. Details: radar.offseq.com/threat/cve-20
#OffSeq #CVE #infosec #Python #AIsecurity

##

thehackerwire@mastodon.social at 2026-02-19T18:00:48.000Z ##

🔴 CVE-2026-26030 - Critical (9.9)

Semantic Kernel, Microsoft's semantic kernel Python SDK, has a remote code execution vulnerability in versions prior to 1.39.4, specifically within the `InMemoryVectorStore` filter functionality. The problem has been fixed in version `python-1.39....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25940
(8.1 HIGH)

EPSS: 0.00%

updated 2026-02-19T19:32:48

4 posts

### Impact User control of properties and methods of the Acroform module allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsanitized input to one of the following property, a user can inject arbitrary PDF objects, such as JavaScript actions, which are executed when the victim hovers over the radio option. * `AcroformChildClass.appearanc

thehackerwire@mastodon.social at 2026-02-19T16:31:16.000Z ##

🟠 CVE-2026-25940 - High (8.1)

jsPDF is a library to generate PDFs in JavaScript. Prior to 4.2.0, user control of properties and methods of the Acroform module allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsanitized...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-02-19T16:30:16.811Z ##

⚠️ HIGH severity: CVE-2026-25940 in jsPDF (<4.2.0) allows arbitrary PDF object injection via Acroform, leading to code execution on user interaction. Patch to 4.2.0+ & sanitize inputs now! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-19T16:31:16.000Z ##

🟠 CVE-2026-25940 - High (8.1)

jsPDF is a library to generate PDFs in JavaScript. Prior to 4.2.0, user control of properties and methods of the Acroform module allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsanitized...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-19T16:30:16.000Z ##

⚠️ HIGH severity: CVE-2026-25940 in jsPDF (<4.2.0) allows arbitrary PDF object injection via Acroform, leading to code execution on user interaction. Patch to 4.2.0+ & sanitize inputs now! radar.offseq.com/threat/cve-20 #OffSeq #jsPDF #vuln #AppSec

##

CVE-2026-27475
(8.1 HIGH)

EPSS: 0.00%

updated 2026-02-19T19:22:30.720000

2 posts

SPIP before 4.4.9 allows Insecure Deserialization in the public area through the table_valeur filter and the DATA iterator, which accept serialized data. An attacker who can place malicious serialized content (a pre-condition requiring prior access or another vulnerability) can trigger arbitrary object instantiation and potentially achieve code execution. The use of serialized data in these compon

thehackerwire@mastodon.social at 2026-02-19T19:34:45.000Z ##

🟠 CVE-2026-27475 - High (8.1)

SPIP before 4.4.9 allows Insecure Deserialization in the public area through the table_valeur filter and the DATA iterator, which accept serialized data. An attacker who can place malicious serialized content (a pre-condition requiring prior acces...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T19:34:45.000Z ##

🟠 CVE-2026-27475 - High (8.1)

SPIP before 4.4.9 allows Insecure Deserialization in the public area through the table_valeur filter and the DATA iterator, which accept serialized data. An attacker who can place malicious serialized content (a pre-condition requiring prior acces...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25418
(7.6 HIGH)

EPSS: 0.02%

updated 2026-02-19T19:22:28.717000

2 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in bitpressadmin Bit Form bit-form allows SQL Injection.This issue affects Bit Form: from n/a through <= 2.21.10.

thehackerwire@mastodon.social at 2026-02-19T20:15:58.000Z ##

🟠 CVE-2026-25418 - High (7.6)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in bitpressadmin Bit Form bit-form allows SQL Injection.This issue affects Bit Form: from n/a through &lt;= 2.21.10.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T20:15:58.000Z ##

🟠 CVE-2026-25418 - High (7.6)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in bitpressadmin Bit Form bit-form allows SQL Injection.This issue affects Bit Form: from n/a through &lt;= 2.21.10.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2648
(8.8 HIGH)

EPSS: 0.06%

updated 2026-02-19T18:35:27.370000

2 posts

Heap buffer overflow in PDFium in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to perform an out of bounds memory write via a crafted PDF file. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-02-20T01:28:38.000Z ##

🟠 CVE-2026-2648 - High (8.8)

Heap buffer overflow in PDFium in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to perform an out of bounds memory write via a crafted PDF file. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T01:28:38.000Z ##

🟠 CVE-2026-2648 - High (8.8)

Heap buffer overflow in PDFium in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to perform an out of bounds memory write via a crafted PDF file. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2409(CVSS UNKNOWN)

EPSS: 0.00%

updated 2026-02-19T18:32:10

2 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Delinea Cloud Suite allows Argument Injection.This issue affects Cloud Suite: before 25.2 HF1.

offseq at 2026-02-19T19:30:17.787Z ##

🚨 CRITICAL: CVE-2026-2409 in Delinea Cloud Suite (<25.2 HF1) enables remote SQL Injection by low-priv users — risking sensitive data. Patch urgently, validate inputs, and monitor DB activity! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-19T19:30:17.000Z ##

🚨 CRITICAL: CVE-2026-2409 in Delinea Cloud Suite (<25.2 HF1) enables remote SQL Injection by low-priv users — risking sensitive data. Patch urgently, validate inputs, and monitor DB activity! radar.offseq.com/threat/cve-20 #OffSeq #SQLInjection #Delinea #Vuln

##

CVE-2026-1581
(7.5 HIGH)

EPSS: 0.00%

updated 2026-02-19T18:32:09

2 posts

The wpForo Forum plugin for WordPress is vulnerable to time-based SQL Injection via the 'wpfob' parameter in all versions up to, and including, 2.4.14 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be

thehackerwire@mastodon.social at 2026-02-19T18:02:11.000Z ##

🟠 CVE-2026-1581 - High (7.5)

The wpForo Forum plugin for WordPress is vulnerable to time-based SQL Injection via the 'wpfob' parameter in all versions up to, and including, 2.4.14 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation o...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T18:02:11.000Z ##

🟠 CVE-2026-1581 - High (7.5)

The wpForo Forum plugin for WordPress is vulnerable to time-based SQL Injection via the 'wpfob' parameter in all versions up to, and including, 2.4.14 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation o...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2232
(7.5 HIGH)

EPSS: 0.00%

updated 2026-02-19T18:32:09

2 posts

The Product Table and List Builder for WooCommerce Lite plugin for WordPress is vulnerable to time-based SQL Injection via the 'search' parameter in all versions up to, and including, 4.6.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries in

thehackerwire@mastodon.social at 2026-02-19T18:00:39.000Z ##

🟠 CVE-2026-2232 - High (7.5)

The Product Table and List Builder for WooCommerce Lite plugin for WordPress is vulnerable to time-based SQL Injection via the 'search' parameter in all versions up to, and including, 4.6.2 due to insufficient escaping on the user supplied paramet...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T18:00:39.000Z ##

🟠 CVE-2026-2232 - High (7.5)

The Product Table and List Builder for WooCommerce Lite plugin for WordPress is vulnerable to time-based SQL Injection via the 'search' parameter in all versions up to, and including, 4.6.2 due to insufficient escaping on the user supplied paramet...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26337
(8.2 HIGH)

EPSS: 0.00%

updated 2026-02-19T18:32:08

2 posts

Hyland Alfresco Transformation Service allows unauthenticated attackers to achieve both arbitrary file read and server-side request forgery through the absolute path traversal.

thehackerwire@mastodon.social at 2026-02-19T19:00:10.000Z ##

🟠 CVE-2026-26337 - High (8.2)

Hyland Alfresco Transformation Service allows unauthenticated attackers to achieve both arbitrary file read and server-side request forgery through the absolute path traversal.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T19:00:10.000Z ##

🟠 CVE-2026-26337 - High (8.2)

Hyland Alfresco Transformation Service allows unauthenticated attackers to achieve both arbitrary file read and server-side request forgery through the absolute path traversal.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26362
(8.1 HIGH)

EPSS: 0.04%

updated 2026-02-19T18:32:08

6 posts

Dell Unisphere for PowerMax, version(s) 10.2, contain(s) a Relative Path Traversal vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to unauthorized modification of critical system files.

thehackerwire@mastodon.social at 2026-02-19T16:32:15.000Z ##

🟠 CVE-2026-26362 - High (8.1)

Dell Unisphere for PowerMax, version(s) 10.2, contain(s) a Relative Path Traversal vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to unauthorized modification of critical system fi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T16:20:42.000Z ##

🟠 CVE-2026-26362 - High (8.1)

Dell Unisphere for PowerMax, version(s) 10.2, contain(s) a Relative Path Traversal vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to unauthorized modification of critical system fi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T16:04:06.000Z ##

🟠 CVE-2026-26362 - High (8.1)

Dell Unisphere for PowerMax, version(s) 10.2, contain(s) a Relative Path Traversal vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to unauthorized modification of critical system fi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T16:32:15.000Z ##

🟠 CVE-2026-26362 - High (8.1)

Dell Unisphere for PowerMax, version(s) 10.2, contain(s) a Relative Path Traversal vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to unauthorized modification of critical system fi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T16:20:42.000Z ##

🟠 CVE-2026-26362 - High (8.1)

Dell Unisphere for PowerMax, version(s) 10.2, contain(s) a Relative Path Traversal vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to unauthorized modification of critical system fi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T16:04:06.000Z ##

🟠 CVE-2026-26362 - High (8.1)

Dell Unisphere for PowerMax, version(s) 10.2, contain(s) a Relative Path Traversal vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to unauthorized modification of critical system fi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-71250
(8.1 HIGH)

EPSS: 0.00%

updated 2026-02-19T18:32:08

4 posts

SPIP before 4.4.9 allows Insecure Deserialization in the public area through the table_valeur filter and the DATA iterator, which accept serialized data. An attacker who can place malicious serialized content (a pre-condition requiring prior access or another vulnerability) can trigger arbitrary object instantiation and potentially achieve code execution. The use of serialized data in these compon

thehackerwire@mastodon.social at 2026-02-19T16:32:05.000Z ##

🟠 CVE-2025-71250 - High (8.1)

SPIP before 4.4.9 allows Insecure Deserialization in the public area through the table_valeur filter and the DATA iterator, which accept serialized data. An attacker who can place malicious serialized content (a pre-condition requiring prior acces...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T16:31:16.000Z ##

🟠 CVE-2025-71250 - High (8.1)

SPIP before 4.4.9 allows Insecure Deserialization in the public area through the table_valeur filter and the DATA iterator, which accept serialized data. An attacker who can place malicious serialized content (a pre-condition requiring prior acces...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T16:32:05.000Z ##

🟠 CVE-2025-71250 - High (8.1)

SPIP before 4.4.9 allows Insecure Deserialization in the public area through the table_valeur filter and the DATA iterator, which accept serialized data. An attacker who can place malicious serialized content (a pre-condition requiring prior acces...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T16:31:16.000Z ##

🟠 CVE-2025-71250 - High (8.1)

SPIP before 4.4.9 allows Insecure Deserialization in the public area through the table_valeur filter and the DATA iterator, which accept serialized data. An attacker who can place malicious serialized content (a pre-condition requiring prior acces...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26358
(8.8 HIGH)

EPSS: 0.05%

updated 2026-02-19T18:32:07

10 posts

Dell Unisphere for PowerMax, version(s) 10.2, contain(s) a Missing Authorization vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access.

thehackerwire@mastodon.social at 2026-02-19T16:32:25.000Z ##

🟠 CVE-2026-26358 - High (8.8)

Dell Unisphere for PowerMax, version(s) 10.2, contain(s) a Missing Authorization vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T16:20:51.000Z ##

🟠 CVE-2026-26358 - High (8.8)

Dell Unisphere for PowerMax, version(s) 10.2, contain(s) a Missing Authorization vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T16:04:15.000Z ##

🟠 CVE-2026-26358 - High (8.8)

Dell Unisphere for PowerMax, version(s) 10.2, contain(s) a Missing Authorization vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-02-19T12:00:33.232Z ##

🚩 CVE-2026-26358 (HIGH): Dell Unisphere for PowerMax 10.2 has a missing auth check. Remote low-priv users can access restricted storage functions. Restrict access, enforce MFA, and monitor logs. No patch yet. radar.offseq.com/threat/cve-20

##

offseq at 2026-02-19T10:30:30.906Z ##

🔒 CVE-2026-26358: HIGH severity flaw in Dell Unisphere for PowerMax v10.2 allows remote low-priv attackers to bypass authorization — potential access to sensitive storage functions. Restrict access & monitor systems. Patch ASAP when available. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-19T16:32:25.000Z ##

🟠 CVE-2026-26358 - High (8.8)

Dell Unisphere for PowerMax, version(s) 10.2, contain(s) a Missing Authorization vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T16:20:51.000Z ##

🟠 CVE-2026-26358 - High (8.8)

Dell Unisphere for PowerMax, version(s) 10.2, contain(s) a Missing Authorization vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T16:04:15.000Z ##

🟠 CVE-2026-26358 - High (8.8)

Dell Unisphere for PowerMax, version(s) 10.2, contain(s) a Missing Authorization vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-19T12:00:33.000Z ##

🚩 CVE-2026-26358 (HIGH): Dell Unisphere for PowerMax 10.2 has a missing auth check. Remote low-priv users can access restricted storage functions. Restrict access, enforce MFA, and monitor logs. No patch yet. radar.offseq.com/threat/cve-20 #OffSeq #Dell #Vuln #InfoSec

##

offseq@infosec.exchange at 2026-02-19T10:30:30.000Z ##

🔒 CVE-2026-26358: HIGH severity flaw in Dell Unisphere for PowerMax v10.2 allows remote low-priv attackers to bypass authorization — potential access to sensitive storage functions. Restrict access & monitor systems. Patch ASAP when available. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #Dell

##

CVE-2025-12107
(10.0 CRITICAL)

EPSS: 0.30%

updated 2026-02-19T18:32:07

2 posts

Due to the use of a vulnerable third-party Velocity template engine, a malicious actor with admin privilege may inject and execute arbitrary template syntax within server-side templates. Successful exploitation of this vulnerability could allow a malicious actor with admin privilege to inject and execute arbitrary template code on the server, potentially leading to remote code execution, data m

thehackerwire@mastodon.social at 2026-02-19T15:44:55.000Z ##

🔴 CVE-2025-12107 - Critical (10)

Due to the use of a vulnerable third-party Velocity template engine, a malicious actor with admin privilege may inject and execute arbitrary template syntax within server-side templates.

Successful exploitation of this vulnerability could allow...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T15:44:55.000Z ##

🔴 CVE-2025-12107 - Critical (10)

Due to the use of a vulnerable third-party Velocity template engine, a malicious actor with admin privilege may inject and execute arbitrary template syntax within server-side templates.

Successful exploitation of this vulnerability could allow...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-8350
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-02-19T18:32:07

2 posts

Execution After Redirect (EAR), Missing Authentication for Critical Function vulnerability in Inrove Software and Internet Services BiEticaret CMS allows Authentication Bypass, HTTP Response Splitting.This issue affects BiEticaret CMS: from 2.1.13 through 19022026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

thehackerwire@mastodon.social at 2026-02-19T15:42:55.000Z ##

🔴 CVE-2025-8350 - Critical (9.8)

Execution After Redirect (EAR), Missing Authentication for Critical Function vulnerability in Inrove Software and Internet Services BiEticaret CMS allows Authentication Bypass, HTTP Response Splitting.This issue affects BiEticaret CMS: from 2.1.13...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T15:42:55.000Z ##

🔴 CVE-2025-8350 - Critical (9.8)

Execution After Redirect (EAR), Missing Authentication for Critical Function vulnerability in Inrove Software and Internet Services BiEticaret CMS allows Authentication Bypass, HTTP Response Splitting.This issue affects BiEticaret CMS: from 2.1.13...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26359
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-19T18:32:06

2 posts

Dell Unisphere for PowerMax, version(s) 10.2, contain(s) an External Control of File Name or Path vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to the ability to overwrite arbitrary files.

thehackerwire@mastodon.social at 2026-02-19T16:04:22.000Z ##

🟠 CVE-2026-26359 - High (8.8)

Dell Unisphere for PowerMax, version(s) 10.2, contain(s) an External Control of File Name or Path vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to the ability to overwrite arbitra...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T16:04:22.000Z ##

🟠 CVE-2026-26359 - High (8.8)

Dell Unisphere for PowerMax, version(s) 10.2, contain(s) an External Control of File Name or Path vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to the ability to overwrite arbitra...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-9953
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-02-19T18:32:06

2 posts

Authorization Bypass Through User-Controlled SQL Primary Key vulnerability in DATABASE Software Training Consulting Ltd. Databank Accreditation Software allows SQL Injection.This issue affects Databank Accreditation Software: through 19022026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

thehackerwire@mastodon.social at 2026-02-19T15:42:46.000Z ##

🔴 CVE-2025-9953 - Critical (9.8)

Authorization Bypass Through User-Controlled SQL Primary Key vulnerability in DATABASE Software Training Consulting Ltd. Databank Accreditation Software allows SQL Injection.This issue affects Databank Accreditation Software: through 19022026.

NO...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T15:42:46.000Z ##

🔴 CVE-2025-9953 - Critical (9.8)

Authorization Bypass Through User-Controlled SQL Primary Key vulnerability in DATABASE Software Training Consulting Ltd. Databank Accreditation Software allows SQL Injection.This issue affects Databank Accreditation Software: through 19022026.

NO...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26360
(8.1 HIGH)

EPSS: 0.05%

updated 2026-02-19T18:32:05

8 posts

Dell Unisphere for PowerMax, version(s) 10.2, contain(s) an External Control of File Name or Path vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability to delete arbitrary files.

thehackerwire@mastodon.social at 2026-02-19T16:20:53.000Z ##

🟠 CVE-2026-26360 - High (8.1)

Dell Unisphere for PowerMax, version(s) 10.2, contain(s) an External Control of File Name or Path vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability to delete arbitrary files.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T16:04:25.000Z ##

🟠 CVE-2026-26360 - High (8.1)

Dell Unisphere for PowerMax, version(s) 10.2, contain(s) an External Control of File Name or Path vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability to delete arbitrary files.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-02-19T15:00:15.450Z ##

🛑 HIGH severity: Dell Unisphere for PowerMax v10.2 (CVE-2026-26360) has a network-based vulnerability — low-priv attackers can remotely delete files, risking data & availability. Restrict access, monitor logs, back up configs. radar.offseq.com/threat/cve-20

##

offseq at 2026-02-19T09:00:32.200Z ##

🔒 HIGH severity: Dell Unisphere for PowerMax 10.2 is vulnerable (CVE-2026-26360) to external control of file name/path. Remote, low privilege attackers could delete arbitrary files. Watch for patches! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-19T16:20:53.000Z ##

🟠 CVE-2026-26360 - High (8.1)

Dell Unisphere for PowerMax, version(s) 10.2, contain(s) an External Control of File Name or Path vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability to delete arbitrary files.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T16:04:25.000Z ##

🟠 CVE-2026-26360 - High (8.1)

Dell Unisphere for PowerMax, version(s) 10.2, contain(s) an External Control of File Name or Path vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability to delete arbitrary files.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-19T15:00:15.000Z ##

🛑 HIGH severity: Dell Unisphere for PowerMax v10.2 (CVE-2026-26360) has a network-based vulnerability — low-priv attackers can remotely delete files, risking data & availability. Restrict access, monitor logs, back up configs. radar.offseq.com/threat/cve-20 #OffSeq #Dell #Vuln #StorageSecurity

##

offseq@infosec.exchange at 2026-02-19T09:00:32.000Z ##

🔒 HIGH severity: Dell Unisphere for PowerMax 10.2 is vulnerable (CVE-2026-26360) to external control of file name/path. Remote, low privilege attackers could delete arbitrary files. Watch for patches! radar.offseq.com/threat/cve-20 #OffSeq #Dell #Vuln #Infosec

##

CVE-2026-1994
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-02-19T18:32:03

4 posts

The s2Member plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 260127. This is due to the plugin not properly validating a user's identity prior to updating their password. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their

thehackerwire@mastodon.social at 2026-02-19T16:04:40.000Z ##

🔴 CVE-2026-1994 - Critical (9.8)

The s2Member plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 260127. This is due to the plugin not properly validating a user's identity prior to updating their password. This m...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-02-19T07:30:31.253Z ##

🚨 CVE-2026-1994 (CRITICAL, CVSS 9.8): All s2Member WordPress plugin versions up to 260127 allow unauthenticated password resets — admin takeover possible! Disable plugin, enforce MFA, audit accounts. No patch yet. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-19T16:04:40.000Z ##

🔴 CVE-2026-1994 - Critical (9.8)

The s2Member plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 260127. This is due to the plugin not properly validating a user's identity prior to updating their password. This m...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-19T07:30:31.000Z ##

🚨 CVE-2026-1994 (CRITICAL, CVSS 9.8): All s2Member WordPress plugin versions up to 260127 allow unauthenticated password resets — admin takeover possible! Disable plugin, enforce MFA, audit accounts. No patch yet. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln

##

CVE-2025-4521
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-19T18:32:02

2 posts

The IDonate – Blood Donation, Request And Donor Management System plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the idonate_donor_profile() function in versions 2.1.5 to 2.1.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to hijack any account by reassigning its email address (via the donor_id they sup

thehackerwire@mastodon.social at 2026-02-19T17:16:16.000Z ##

🟠 CVE-2025-4521 - High (8.8)

The IDonate – Blood Donation, Request And Donor Management System plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the idonate_donor_profile() function in versions 2.1.5 to 2.1.9. This makes it poss...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T17:16:16.000Z ##

🟠 CVE-2025-4521 - High (8.8)

The IDonate – Blood Donation, Request And Donor Management System plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the idonate_donor_profile() function in versions 2.1.5 to 2.1.9. This makes it poss...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-4960
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-19T18:32:02

2 posts

The com.epson.InstallNavi.helper tool, deployed with the EPSON printer driver installer, contains a local privilege escalation vulnerability due to multiple flaws in its implementation. It fails to properly authenticate clients over the XPC protocol and does not correctly enforce macOS’s authorization model, exposing privileged functionality to untrusted users. Although it invokes the Authorizatio

thehackerwire@mastodon.social at 2026-02-19T17:16:07.000Z ##

🟠 CVE-2025-4960 - High (7.8)

The com.epson.InstallNavi.helper tool, deployed with the EPSON printer driver installer, contains a local privilege escalation vulnerability due to multiple flaws in its implementation. It fails to properly authenticate clients over the XPC protoc...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T17:16:07.000Z ##

🟠 CVE-2025-4960 - High (7.8)

The com.epson.InstallNavi.helper tool, deployed with the EPSON printer driver installer, contains a local privilege escalation vulnerability due to multiple flaws in its implementation. It fails to properly authenticate clients over the XPC protoc...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0926
(9.8 CRITICAL)

EPSS: 0.19%

updated 2026-02-19T18:32:02

4 posts

The Prodigy Commerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.2.9 via the 'parameters[template_name]' parameter. This makes it possible for unauthenticated attackers to include and read arbitrary files or execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls,

thehackerwire@mastodon.social at 2026-02-19T17:06:51.000Z ##

🔴 CVE-2026-0926 - Critical (9.8)

The Prodigy Commerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.2.9 via the 'parameters[template_name]' parameter. This makes it possible for unauthenticated attackers to include and read arb...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-02-19T06:00:31.863Z ##

⚠️ CVE-2026-0926 (CRITICAL): Prodigy Commerce plugin for WordPress allows unauth LFI & RCE via 'parameters[template_name]'. All versions affected, no patch yet. Disable plugin, monitor file uploads, and audit systems. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-19T17:06:51.000Z ##

🔴 CVE-2026-0926 - Critical (9.8)

The Prodigy Commerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.2.9 via the 'parameters[template_name]' parameter. This makes it possible for unauthenticated attackers to include and read arb...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-19T06:00:31.000Z ##

⚠️ CVE-2026-0926 (CRITICAL): Prodigy Commerce plugin for WordPress allows unauth LFI & RCE via 'parameters[template_name]'. All versions affected, no patch yet. Disable plugin, monitor file uploads, and audit systems. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln

##

CVE-2025-13851
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-02-19T18:32:01

2 posts

The Buyent Classified plugin for WordPress (bundled with Buyent theme) is vulnerable to privilege escalation via user registration in all versions up to, and including, 1.0.7. This is due to the plugin not validating or restricting the user role during registration via the REST API endpoint. This makes it possible for unauthenticated attackers to register accounts with arbitrary roles, including a

thehackerwire@mastodon.social at 2026-02-19T18:17:24.000Z ##

🔴 CVE-2025-13851 - Critical (9.8)

The Buyent Classified plugin for WordPress (bundled with Buyent theme) is vulnerable to privilege escalation via user registration in all versions up to, and including, 1.0.7. This is due to the plugin not validating or restricting the user role d...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T18:17:24.000Z ##

🔴 CVE-2025-13851 - Critical (9.8)

The Buyent Classified plugin for WordPress (bundled with Buyent theme) is vulnerable to privilege escalation via user registration in all versions up to, and including, 1.0.7. This is due to the plugin not validating or restricting the user role d...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0912
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-19T18:32:01

2 posts

The Toret Manager plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the 'trman_save_option' function and on the 'trman_save_option_items' in all versions up to, and including, 1.2.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options

thehackerwire@mastodon.social at 2026-02-19T17:06:42.000Z ##

🟠 CVE-2026-0912 - High (8.8)

The Toret Manager plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the 'trman_save_option' function and on the 'trman_save_option_items' in all versi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T17:06:42.000Z ##

🟠 CVE-2026-0912 - High (8.8)

The Toret Manager plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the 'trman_save_option' function and on the 'trman_save_option_items' in all versi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-12707
(7.5 HIGH)

EPSS: 0.07%

updated 2026-02-19T18:31:53

2 posts

The Library Management System plugin for WordPress is vulnerable to SQL Injection via the 'bid' parameter in all versions up to, and including, 3.2.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be

thehackerwire@mastodon.social at 2026-02-19T19:00:54.000Z ##

🟠 CVE-2025-12707 - High (7.5)

The Library Management System plugin for WordPress is vulnerable to SQL Injection via the 'bid' parameter in all versions up to, and including, 3.2.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T19:00:54.000Z ##

🟠 CVE-2025-12707 - High (7.5)

The Library Management System plugin for WordPress is vulnerable to SQL Injection via the 'bid' parameter in all versions up to, and including, 3.2.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-12882
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-02-19T18:31:53

2 posts

The Clasifico Listing plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 2.0. This is due to the plugin allowing users who are registering new accounts to set their own role by supplying the 'listing_user_role' parameter. This makes it possible for unauthenticated attackers to gain elevated privileges by registering an account with the administrator role.

thehackerwire@mastodon.social at 2026-02-19T19:00:44.000Z ##

🔴 CVE-2025-12882 - Critical (9.8)

The Clasifico Listing plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 2.0. This is due to the plugin allowing users who are registering new accounts to set their own role by supplying the 'listing_user_...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T19:00:44.000Z ##

🔴 CVE-2025-12882 - Critical (9.8)

The Clasifico Listing plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 2.0. This is due to the plugin allowing users who are registering new accounts to set their own role by supplying the 'listing_user_...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-12845
(8.8 HIGH)

EPSS: 0.05%

updated 2026-02-19T18:31:52

2 posts

The Tablesome Table – Contact Form DB – WPForms, CF7, Gravity, Forminator, Fluent plugin for WordPress is vulnerable to unauthorized access of data that leads to privilege escalation due to a missing capability check on the get_table_data() function in versions 0.5.4 to 1.2.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve plugin table data

thehackerwire@mastodon.social at 2026-02-19T20:20:56.000Z ##

🟠 CVE-2025-12845 - High (8.8)

The Tablesome Table – Contact Form DB – WPForms, CF7, Gravity, Forminator, Fluent plugin for WordPress is vulnerable to unauthorized access of data that leads to privilege escalation due to a missing capability check on the get_table_data() fu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T20:20:56.000Z ##

🟠 CVE-2025-12845 - High (8.8)

The Tablesome Table – Contact Form DB – WPForms, CF7, Gravity, Forminator, Fluent plugin for WordPress is vulnerable to unauthorized access of data that leads to privilege escalation due to a missing capability check on the get_table_data() fu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-13563
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-02-19T18:31:50

2 posts

The Lizza LMS Pro plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.0.3. This is due to the 'lizza_lms_pro_register_user_front_end' function not restricting what user roles a user can register with. This makes it possible for unauthenticated attackers to supply the 'administrator' role during registration and gain administrator access to the site.

thehackerwire@mastodon.social at 2026-02-19T18:17:44.000Z ##

🔴 CVE-2025-13563 - Critical (9.8)

The Lizza LMS Pro plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.0.3. This is due to the 'lizza_lms_pro_register_user_front_end' function not restricting what user roles a user can register with....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T18:17:44.000Z ##

🔴 CVE-2025-13563 - Critical (9.8)

The Lizza LMS Pro plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.0.3. This is due to the 'lizza_lms_pro_register_user_front_end' function not restricting what user roles a user can register with....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26339
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-02-19T18:25:00.133000

4 posts

Hyland Alfresco Transformation Service allows unauthenticated attackers to achieve remote code execution through the argument injection vulnerability, which exists in the document processing functionality.

thehackerwire@mastodon.social at 2026-02-19T19:00:00.000Z ##

🔴 CVE-2026-26339 - Critical (9.8)

Hyland Alfresco Transformation Service allows unauthenticated attackers to achieve remote code execution through the argument injection vulnerability, which exists in the document processing functionality.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-02-19T18:00:22.175Z ##

🔎 CRITICAL: CVE-2026-26339 in Hyland Alfresco Transformation Service (Enterprise) enables unauthenticated SSRF → RCE. Restrict access, monitor for abuse, patch ASAP. All versions at risk. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-19T19:00:00.000Z ##

🔴 CVE-2026-26339 - Critical (9.8)

Hyland Alfresco Transformation Service allows unauthenticated attackers to achieve remote code execution through the argument injection vulnerability, which exists in the document processing functionality.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-19T18:00:22.000Z ##

🔎 CRITICAL: CVE-2026-26339 in Hyland Alfresco Transformation Service (Enterprise) enables unauthenticated SSRF → RCE. Restrict access, monitor for abuse, patch ASAP. All versions at risk. radar.offseq.com/threat/cve-20 #OffSeq #CVE202626339 #SSRF #RCE #Alfresco

##

CVE-2026-26336
(7.5 HIGH)

EPSS: 0.00%

updated 2026-02-19T17:24:50.943000

2 posts

Hyland Alfresco allows unauthenticated attackers to read arbitrary files from protected directories (like WEB-INF) via the "/share/page/resource/" endpoint, thus leading to the disclosure of sensitive configuration files.

thehackerwire@mastodon.social at 2026-02-19T18:00:57.000Z ##

🟠 CVE-2026-26336 - High (7.5)

Hyland Alfresco allows unauthenticated attackers to read arbitrary files from protected directories (like WEB-INF) via the "/share/page/resource/" endpoint, thus leading to the disclosure of sensitive configuration files.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T18:00:57.000Z ##

🟠 CVE-2026-26336 - High (7.5)

Hyland Alfresco allows unauthenticated attackers to read arbitrary files from protected directories (like WEB-INF) via the "/share/page/resource/" endpoint, thus leading to the disclosure of sensitive configuration files.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-71243
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-02-19T16:27:12.303000

2 posts

The 'Saisies pour formulaire' (Saisies) plugin for SPIP versions 5.4.0 through 5.11.0 contains a critical Remote Code Execution (RCE) vulnerability. An attacker can exploit this vulnerability to execute arbitrary code on the server. Users should immediately update to version 5.11.1 or later.

1 repos

https://github.com/Chocapikk/CVE-2025-71243

thehackerwire@mastodon.social at 2026-02-19T16:31:25.000Z ##

🔴 CVE-2025-71243 - Critical (9.8)

The 'Saisies pour formulaire' (Saisies) plugin for SPIP versions 5.4.0 through 5.11.0 contains a critical Remote Code Execution (RCE) vulnerability. An attacker can exploit this vulnerability to execute arbitrary code on the server. Users should i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T16:31:25.000Z ##

🔴 CVE-2025-71243 - Critical (9.8)

The 'Saisies pour formulaire' (Saisies) plugin for SPIP versions 5.4.0 through 5.11.0 contains a critical Remote Code Execution (RCE) vulnerability. An attacker can exploit this vulnerability to execute arbitrary code on the server. Users should i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-65791
(9.8 CRITICAL)

EPSS: 0.27%

updated 2026-02-19T15:53:43.903000

2 posts

ZoneMinder v1.36.34 is vulnerable to Command Injection in web/views/image.php. The application passes unsanitized user input directly to the exec() function.

1 repos

https://github.com/rishavand1/CVE-2025-65791

thehackerwire@mastodon.social at 2026-02-18T17:23:28.000Z ##

🔴 CVE-2025-65791 - Critical (9.8)

ZoneMinder v1.36.34 is vulnerable to Command Injection in web/views/image.php. The application passes unsanitized user input directly to the exec() function.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T17:23:28.000Z ##

🔴 CVE-2025-65791 - Critical (9.8)

ZoneMinder v1.36.34 is vulnerable to Command Injection in web/views/image.php. The application passes unsanitized user input directly to the exec() function.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-11754
(7.5 HIGH)

EPSS: 0.04%

updated 2026-02-19T15:53:02.850000

2 posts

The GDPR Cookie Consent plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'gdpr/v1/settings' REST API endpoint in all versions up to, and including, 4.1.2. This makes it possible for unauthenticated attackers to retrieve sensitive plugin settings including API tokens, email addresses, account IDs, and site keys.

thehackerwire@mastodon.social at 2026-02-20T01:28:28.000Z ##

🟠 CVE-2025-11754 - High (7.5)

The GDPR Cookie Consent plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'gdpr/v1/settings' REST API endpoint in all versions up to, and including, 4.1.2. This makes it possible for unauthe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T01:28:28.000Z ##

🟠 CVE-2025-11754 - High (7.5)

The GDPR Cookie Consent plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'gdpr/v1/settings' REST API endpoint in all versions up to, and including, 4.1.2. This makes it possible for unauthe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-12821
(8.8 HIGH)

EPSS: 0.05%

updated 2026-02-19T15:53:02.850000

2 posts

The NewsBlogger theme for WordPress is vulnerable to Cross-Site Request Forgery in versions 0.2.5.6 to 0.2.6.1. This is due to missing or incorrect nonce validation on the newsblogger_install_and_activate_plugin() function. This makes it possible for unauthenticated attackers to upload arbitrary files and achieve remote code execution via a forged request granted they can trick a site administrat

thehackerwire@mastodon.social at 2026-02-19T19:01:03.000Z ##

🟠 CVE-2025-12821 - High (8.8)

The NewsBlogger theme for WordPress is vulnerable to Cross-Site Request Forgery in versions 0.2.5.6 to 0.2.6.1. This is due to missing or incorrect nonce validation on the newsblogger_install_and_activate_plugin() function. This makes it possible...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T19:01:03.000Z ##

🟠 CVE-2025-12821 - High (8.8)

The NewsBlogger theme for WordPress is vulnerable to Cross-Site Request Forgery in versions 0.2.5.6 to 0.2.6.1. This is due to missing or incorrect nonce validation on the newsblogger_install_and_activate_plugin() function. This makes it possible...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-13603
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-19T15:53:02.850000

2 posts

The WP AUDIO GALLERY plugin for WordPress is vulnerable to Unauthorized Arbitrary File Read in all versions up to, and including, 2.0. This is due to insufficient capability checks and lack of nonce verification on the "wpag_htaccess_callback" function This makes it possible for authenticated attackers, with subscriber-level access and above, to overwrite the site's .htaccess file with arbitrary c

thehackerwire@mastodon.social at 2026-02-19T18:17:33.000Z ##

🟠 CVE-2025-13603 - High (8.8)

The WP AUDIO GALLERY plugin for WordPress is vulnerable to Unauthorized Arbitrary File Read in all versions up to, and including, 2.0. This is due to insufficient capability checks and lack of nonce verification on the "wpag_htaccess_callback" fun...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T18:17:33.000Z ##

🟠 CVE-2025-13603 - High (8.8)

The WP AUDIO GALLERY plugin for WordPress is vulnerable to Unauthorized Arbitrary File Read in all versions up to, and including, 2.0. This is due to insufficient capability checks and lack of nonce verification on the "wpag_htaccess_callback" fun...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0974
(8.8 HIGH)

EPSS: 0.21%

updated 2026-02-19T15:53:02.850000

2 posts

The Orderable – WordPress Restaurant Online Ordering System and Food Ordering Plugin plugin for WordPress is vulnerable to unauthorized plugin installation due to a missing capability check on the 'install_plugin' function in all versions up to, and including, 1.20.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install arbitrary plugins, which can

thehackerwire@mastodon.social at 2026-02-19T17:15:58.000Z ##

🟠 CVE-2026-0974 - High (8.8)

The Orderable – WordPress Restaurant Online Ordering System and Food Ordering Plugin plugin for WordPress is vulnerable to unauthorized plugin installation due to a missing capability check on the 'install_plugin' function in all versions up to,...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T17:15:58.000Z ##

🟠 CVE-2026-0974 - High (8.8)

The Orderable – WordPress Restaurant Online Ordering System and Food Ordering Plugin plugin for WordPress is vulnerable to unauthorized plugin installation due to a missing capability check on the 'install_plugin' function in all versions up to,...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2686
(9.8 CRITICAL)

EPSS: 0.15%

updated 2026-02-19T15:53:02.850000

4 posts

A security vulnerability has been detected in SECCN Dingcheng G10 3.1.0.181203. This impacts the function qq of the file /cgi-bin/session_login.cgi. The manipulation of the argument User leads to os command injection. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used.

offseq at 2026-02-19T01:30:31.609Z ##

🚨 CRITICAL: CVE-2026-2686 in SECCN Dingcheng G10 (v3.1.0.181203) enables unauthenticated remote OS command injection via the 'User' param in /cgi-bin/session_login.cgi. Exploit code is public. Restrict access & monitor! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-19T00:19:26.000Z ##

🔴 CVE-2026-2686 - Critical (9.8)

A security vulnerability has been detected in SECCN Dingcheng G10 3.1.0.181203. This impacts the function qq of the file /cgi-bin/session_login.cgi. The manipulation of the argument User leads to os command injection. The attack is possible to be ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-19T01:30:31.000Z ##

🚨 CRITICAL: CVE-2026-2686 in SECCN Dingcheng G10 (v3.1.0.181203) enables unauthenticated remote OS command injection via the 'User' param in /cgi-bin/session_login.cgi. Exploit code is public. Restrict access & monitor! radar.offseq.com/threat/cve-20 #OffSeq #CVE20262686 #IoTSec

##

thehackerwire@mastodon.social at 2026-02-19T00:19:26.000Z ##

🔴 CVE-2026-2686 - Critical (9.8)

A security vulnerability has been detected in SECCN Dingcheng G10 3.1.0.181203. This impacts the function qq of the file /cgi-bin/session_login.cgi. The manipulation of the argument User leads to os command injection. The attack is possible to be ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27175
(9.8 CRITICAL)

EPSS: 0.49%

updated 2026-02-19T15:53:02.850000

4 posts

MajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated OS command injection via rc/index.php. The $param variable from user input is interpolated into a command string within double quotes without sanitization via escapeshellarg(). The command is inserted into a database queue by safe_exec(), which performs no sanitization. The cycle_execs.php script, which is web-accessible withou

offseq at 2026-02-18T23:00:13.970Z ##

MajorDoMo (all versions) faces a CRITICAL OS command injection (CVE-2026-27175, CVSS 9.2). Unauthenticated RCE via rc/index.php & cycle_execs.php. No patch yet — restrict endpoints, sanitize input, and monitor activity! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-18T22:19:42.000Z ##

🔴 CVE-2026-27175 - Critical (9.8)

MajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated OS command injection via rc/index.php. The $param variable from user input is interpolated into a command string within double quotes without sanitization via escapeshellarg()....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-18T23:00:13.000Z ##

MajorDoMo (all versions) faces a CRITICAL OS command injection (CVE-2026-27175, CVSS 9.2). Unauthenticated RCE via rc/index.php & cycle_execs.php. No patch yet — restrict endpoints, sanitize input, and monitor activity! radar.offseq.com/threat/cve-20 #OffSeq #CVE202627175 #Infosec

##

thehackerwire@mastodon.social at 2026-02-18T22:19:42.000Z ##

🔴 CVE-2026-27175 - Critical (9.8)

MajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated OS command injection via rc/index.php. The $param variable from user input is interpolated into a command string within double quotes without sanitization via escapeshellarg()....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27180
(9.8 CRITICAL)

EPSS: 0.09%

updated 2026-02-19T15:53:02.850000

4 posts

MajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated remote code execution through supply chain compromise via update URL poisoning. The saverestore module exposes its admin() method through the /objects/?module=saverestore endpoint without authentication because it uses gr('mode') (which reads directly from $_REQUEST) instead of the framework's $this->mode. An attacker can poiso

1 repos

https://github.com/mbanyamer/CVE-2026-27180-MajorDoMo-unauthenticated-RCE

thehackerwire@mastodon.social at 2026-02-18T22:18:15.000Z ##

🔴 CVE-2026-27180 - Critical (9.8)

MajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated remote code execution through supply chain compromise via update URL poisoning. The saverestore module exposes its admin() method through the /objects/?module=saverestore endpo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-02-18T21:30:13.389Z ##

🚨 CRITICAL: CVE-2026-27180 in sergejey MajorDoMo allows unauthenticated RCE via poisoned update URLs. Attackers can deploy arbitrary PHP files to webroot with 2 GETs. Patch urgently! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-18T22:18:15.000Z ##

🔴 CVE-2026-27180 - Critical (9.8)

MajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated remote code execution through supply chain compromise via update URL poisoning. The saverestore module exposes its admin() method through the /objects/?module=saverestore endpo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-18T21:30:13.000Z ##

🚨 CRITICAL: CVE-2026-27180 in sergejey MajorDoMo allows unauthenticated RCE via poisoned update URLs. Attackers can deploy arbitrary PHP files to webroot with 2 GETs. Patch urgently! radar.offseq.com/threat/cve-20 #OffSeq #CVE #infosec #remotecodeexecution

##

CVE-2026-0874
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-19T15:53:02.850000

2 posts

A maliciously crafted CATPART file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.

thehackerwire@mastodon.social at 2026-02-18T20:23:43.000Z ##

🟠 CVE-2026-0874 - High (7.8)

A maliciously crafted CATPART file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T20:23:43.000Z ##

🟠 CVE-2026-0874 - High (7.8)

A maliciously crafted CATPART file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1405
(9.8 CRITICAL)

EPSS: 0.15%

updated 2026-02-19T15:52:39.260000

2 posts

The Slider Future plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'slider_future_handle_image_upload' function in all versions up to, and including, 1.0.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

thehackerwire@mastodon.social at 2026-02-19T17:06:32.000Z ##

🔴 CVE-2026-1405 - Critical (9.8)

The Slider Future plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'slider_future_handle_image_upload' function in all versions up to, and including, 1.0.5. This makes it possible for unauthen...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T17:06:32.000Z ##

🔴 CVE-2026-1405 - Critical (9.8)

The Slider Future plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'slider_future_handle_image_upload' function in all versions up to, and including, 1.0.5. This makes it possible for unauthen...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22267
(8.1 HIGH)

EPSS: 0.04%

updated 2026-02-19T15:52:39.260000

4 posts

Dell PowerProtect Data Manager, version(s) prior to 19.22, contain(s) an Incorrect Privilege Assignment vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Elevation of privileges.

thehackerwire@mastodon.social at 2026-02-19T15:44:45.000Z ##

🟠 CVE-2026-22267 - High (8.1)

Dell PowerProtect Data Manager, version(s) prior to 19.22, contain(s) an Incorrect Privilege Assignment vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Elevation of privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-02-19T13:30:31.715Z ##

🔔 CVE-2026-22267 (HIGH): Dell PowerProtect Data Manager <19.22 lets remote low-priv users escalate privileges. Urgently restrict remote access, enforce least privilege, and monitor logs. No patch yet. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-19T15:44:45.000Z ##

🟠 CVE-2026-22267 - High (8.1)

Dell PowerProtect Data Manager, version(s) prior to 19.22, contain(s) an Incorrect Privilege Assignment vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Elevation of privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-19T13:30:31.000Z ##

🔔 CVE-2026-22267 (HIGH): Dell PowerProtect Data Manager <19.22 lets remote low-priv users escalate privileges. Urgently restrict remote access, enforce least privilege, and monitor logs. No patch yet. radar.offseq.com/threat/cve-20 #OffSeq #CyberSecurity #Vuln #Dell

##

CVE-2026-25755
(8.1 HIGH)

EPSS: 0.00%

updated 2026-02-19T15:52:39.260000

2 posts

jsPDF is a library to generate PDFs in JavaScript. Prior to 4.2.0, user control of the argument of the `addJS` method allows an attacker to inject arbitrary PDF objects into the generated document. By crafting a payload that escapes the JavaScript string delimiter, an attacker can execute malicious actions or alter the document structure, impacting any user who opens the generated PDF. The vulnera

thehackerwire@mastodon.social at 2026-02-19T15:42:35.000Z ##

🟠 CVE-2026-25755 - High (8.1)

jsPDF is a library to generate PDFs in JavaScript. Prior to 4.2.0, user control of the argument of the `addJS` method allows an attacker to inject arbitrary PDF objects into the generated document. By crafting a payload that escapes the JavaScript...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T15:42:35.000Z ##

🟠 CVE-2026-25755 - High (8.1)

jsPDF is a library to generate PDFs in JavaScript. Prior to 4.2.0, user control of the argument of the `addJS` method allows an attacker to inject arbitrary PDF objects into the generated document. By crafting a payload that escapes the JavaScript...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27179
(8.2 HIGH)

EPSS: 0.06%

updated 2026-02-19T00:30:37

2 posts

MajorDoMo (aka Major Domestic Module) contains an unauthenticated SQL injection vulnerability in the commands module. The commands_search.inc.php file directly interpolates the $_GET['parent'] parameter into multiple SQL queries without sanitization or parameterized queries. The commands module is loadable without authentication via the /objects/?module=commands endpoint, which includes arbitrary

thehackerwire@mastodon.social at 2026-02-18T22:34:40.000Z ##

🟠 CVE-2026-27179 - High (8.2)

MajorDoMo (aka Major Domestic Module) contains an unauthenticated SQL injection vulnerability in the commands module. The commands_search.inc.php file directly interpolates the $_GET['parent'] parameter into multiple SQL queries without sanitizati...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T22:34:40.000Z ##

🟠 CVE-2026-27179 - High (8.2)

MajorDoMo (aka Major Domestic Module) contains an unauthenticated SQL injection vulnerability in the commands module. The commands_search.inc.php file directly interpolates the $_GET['parent'] parameter into multiple SQL queries without sanitizati...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27182
(8.4 HIGH)

EPSS: 0.12%

updated 2026-02-19T00:30:37

2 posts

Saturn Remote Mouse Server contains a command injection vulnerability that allows unauthenticated attackers to execute arbitrary commands by sending specially crafted UDP JSON frames to port 27000. Attackers on the local network can send malformed packets with unsanitized command data that the service forwards directly to OS execution functions, enabling remote code execution under the service acc

thehackerwire@mastodon.social at 2026-02-18T22:19:23.000Z ##

🟠 CVE-2026-27182 - High (8.4)

Saturn Remote Mouse Server contains a command injection vulnerability that allows unauthenticated attackers to execute arbitrary commands by sending specially crafted UDP JSON frames to port 27000. Attackers on the local network can send malformed...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T22:19:23.000Z ##

🟠 CVE-2026-27182 - High (8.4)

Saturn Remote Mouse Server contains a command injection vulnerability that allows unauthenticated attackers to execute arbitrary commands by sending specially crafted UDP JSON frames to port 27000. Attackers on the local network can send malformed...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27181
(7.5 HIGH)

EPSS: 0.02%

updated 2026-02-19T00:30:37

2 posts

MajorDoMo (aka Major Domestic Module) allows unauthenticated arbitrary module uninstallation through the market module. The market module's admin() method reads gr('mode') from $_REQUEST and assigns it to $this->mode at the start of execution, making all mode-gated code paths reachable without authentication via the /objects/?module=market endpoint. The uninstall mode handler calls uninstallPlugin

thehackerwire@mastodon.social at 2026-02-18T22:18:25.000Z ##

🟠 CVE-2026-27181 - High (7.5)

MajorDoMo (aka Major Domestic Module) allows unauthenticated arbitrary module uninstallation through the market module. The market module's admin() method reads gr('mode') from $_REQUEST and assigns it to $this->mode at the start of execution, mak...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T22:18:25.000Z ##

🟠 CVE-2026-27181 - High (7.5)

MajorDoMo (aka Major Domestic Module) allows unauthenticated arbitrary module uninstallation through the market module. The market module's admin() method reads gr('mode') from $_REQUEST and assigns it to $this->mode at the start of execution, mak...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2649
(8.8 HIGH)

EPSS: 0.03%

updated 2026-02-19T00:30:30

4 posts

Integer overflow in V8 in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

offseq at 2026-02-19T04:30:31.469Z ##

🛑 CVE-2026-2649: HIGH severity integer overflow in Chrome V8 pre-145.0.7632.109 lets remote attackers trigger heap corruption via crafted HTML. Update ASAP to patch! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-18T23:26:41.000Z ##

🟠 CVE-2026-2649 - High (8.8)

Integer overflow in V8 in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-19T04:30:31.000Z ##

🛑 CVE-2026-2649: HIGH severity integer overflow in Chrome V8 pre-145.0.7632.109 lets remote attackers trigger heap corruption via crafted HTML. Update ASAP to patch! radar.offseq.com/threat/cve-20 #OffSeq #Chrome #Vuln #Security

##

thehackerwire@mastodon.social at 2026-02-18T23:26:41.000Z ##

🟠 CVE-2026-2649 - High (8.8)

Integer overflow in V8 in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2650
(8.8 HIGH)

EPSS: 0.03%

updated 2026-02-19T00:30:30

4 posts

Heap buffer overflow in Media in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)

offseq at 2026-02-19T03:00:31.105Z ##

⚠️ CVE-2026-2650: HIGH severity heap buffer overflow in Google Chrome before 145.0.7632.109. Remote attackers can exploit via malicious HTML for code execution. Patch ASAP! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-18T23:26:51.000Z ##

🟠 CVE-2026-2650 - High (8.8)

Heap buffer overflow in Media in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-19T03:00:31.000Z ##

⚠️ CVE-2026-2650: HIGH severity heap buffer overflow in Google Chrome before 145.0.7632.109. Remote attackers can exploit via malicious HTML for code execution. Patch ASAP! radar.offseq.com/threat/cve-20 #OffSeq #Chrome #Vuln #CVE20262650

##

thehackerwire@mastodon.social at 2026-02-18T23:26:51.000Z ##

🟠 CVE-2026-2650 - High (8.8)

Heap buffer overflow in Media in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27174
(9.8 CRITICAL)

EPSS: 0.32%

updated 2026-02-19T00:30:30

4 posts

MajorDoMo (aka Major Domestic Module) allows unauthenticated remote code execution via the admin panel's PHP console feature. An include order bug in modules/panel.class.php causes execution to continue past a redirect() call that lacks an exit statement, allowing unauthenticated requests to reach the ajax handler in inc_panel_ajax.php. The console handler within that file passes user-supplied inp

offseq at 2026-02-19T00:00:40.787Z ##

🔴 CRITICAL: CVE-2026-27174 in MajorDoMo enables unauth RCE via vulnerable PHP handler — no user interaction needed. Full system compromise possible. Restrict panel access, patch, & monitor logs. Details: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-18T22:19:33.000Z ##

🔴 CVE-2026-27174 - Critical (9.8)

MajorDoMo (aka Major Domestic Module) allows unauthenticated remote code execution via the admin panel's PHP console feature. An include order bug in modules/panel.class.php causes execution to continue past a redirect() call that lacks an exit st...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-19T00:00:40.000Z ##

🔴 CRITICAL: CVE-2026-27174 in MajorDoMo enables unauth RCE via vulnerable PHP handler — no user interaction needed. Full system compromise possible. Restrict panel access, patch, & monitor logs. Details: radar.offseq.com/threat/cve-20 #OffSeq #CVE202627174 #RCE #HomeAutomation #Infosec

##

thehackerwire@mastodon.social at 2026-02-18T22:19:33.000Z ##

🔴 CVE-2026-27174 - Critical (9.8)

MajorDoMo (aka Major Domestic Module) allows unauthenticated remote code execution via the admin panel's PHP console feature. An include order bug in modules/panel.class.php causes execution to continue past a redirect() call that lacks an exit st...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2019-25360
(9.8 CRITICAL)

EPSS: 0.18%

updated 2026-02-19T00:30:29

1 posts

Aida64 Engineer 6.10.5200 contains a buffer overflow vulnerability in the CSV logging configuration that allows attackers to execute malicious code by crafting a specially designed payload. Attackers can exploit the vulnerability by creating a malformed log file with carefully constructed SEH (Structured Exception Handler) overwrite techniques to achieve remote code execution.

Matchbook3469@mastodon.social at 2026-02-19T09:08:32.000Z ##

⛔ New security advisory:

CVE-2019-25360 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #SecurityPatching #HackerNews

##

CVE-2026-22860
(7.5 HIGH)

EPSS: 0.04%

updated 2026-02-18T23:49:03

2 posts

## Summary `Rack::Directory`’s path check used a string prefix match on the expanded path. A request like `/../root_example/` can escape the configured root if the target path starts with the root string, allowing directory listing outside the intended root. ## Details In `directory.rb`, `File.expand_path(File.join(root, path_info)).start_with?(root)` does not enforce a path boundary. If the se

thehackerwire@mastodon.social at 2026-02-18T19:25:15.000Z ##

🟠 CVE-2026-22860 - High (7.5)

Rack is a modular Ruby web server interface. Prior to versions 2.2.22, 3.1.20, and 3.2.5, `Rack::Directory`’s path check used a string prefix match on the expanded path. A request like `/../root_example/` can escape the configured root if the ta...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T19:25:15.000Z ##

🟠 CVE-2026-22860 - High (7.5)

Rack is a modular Ruby web server interface. Prior to versions 2.2.22, 3.1.20, and 3.2.5, `Rack::Directory`’s path check used a string prefix match on the expanded path. A request like `/../root_example/` can escape the configured root if the ta...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-45769
(6.5 MEDIUM)

EPSS: 0.01%

updated 2026-02-18T22:16:24.073000

2 posts

php-jwt v6.11.0 was discovered to contain weak encryption. NOTE: this issue has been disputed on the basis that key lengths are expected to be set by an application, not by this library. This dispute is subject to review under CNA rules 4.1.4, 4.1.14, and other rules; the dispute tagging is not meant to recommend an outcome for this CVE Record.

shawnhooper@fosstodon.org at 2026-02-19T04:07:14.000Z ##

If you're using firebase/php-jwt v6, surprise!

GitHub Advisory GHSA for CVE-2025-45769 ignores NVD "Disputed" status, blocks all php-jwt v6 users.

Details here:

github.com/firebase/php-jwt/is

#PHP #CVE

##

shawnhooper@fosstodon.org at 2026-02-19T04:07:14.000Z ##

If you're using firebase/php-jwt v6, surprise!

GitHub Advisory GHSA for CVE-2025-45769 ignores NVD "Disputed" status, blocks all php-jwt v6 users.

Details here:

github.com/firebase/php-jwt/is

#PHP #CVE

##

CVE-2025-70146
(9.1 CRITICAL)

EPSS: 0.25%

updated 2026-02-18T21:32:26

2 posts

Missing authentication in multiple administrative action scripts under /admin/ in ProjectWorlds Online Time Table Generator 1.0 allows remote attackers to perform unauthorized administrative operations (e.g.,adding records, deleting records) via direct HTTP requests to affected endpoints without a valid session.

thehackerwire@mastodon.social at 2026-02-18T19:37:42.000Z ##

🔴 CVE-2025-70146 - Critical (9.1)

Missing authentication in multiple administrative action scripts under /admin/ in ProjectWorlds Online Time Table Generator 1.0 allows remote attackers to perform unauthorized administrative operations (e.g.,adding records, deleting records) via d...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T19:37:42.000Z ##

🔴 CVE-2025-70146 - Critical (9.1)

Missing authentication in multiple administrative action scripts under /admin/ in ProjectWorlds Online Time Table Generator 1.0 allows remote attackers to perform unauthorized administrative operations (e.g.,adding records, deleting records) via d...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1435
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-02-18T21:32:25

6 posts

Not properly invalidated session vulnerability in Graylog Web Interface, version 2.2.3, due to incorrect management of session invalidation after new logins. The application generates a new 'sessionId' each time a user authenticates, but does not invalidate previously issued session identifiers, which remain valid even after multiple consecutive logins by the same user. As a result, a stolen or le

Matchbook3469@mastodon.social at 2026-02-19T15:25:50.000Z ##

⛔ New security advisory:

CVE-2026-1435 affects Graylog Graylog.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #PatchNow #InfoSecCommunity

##

thehackerwire@mastodon.social at 2026-02-18T20:24:17.000Z ##

🔴 CVE-2026-1435 - Critical (9.8)

Not properly invalidated session vulnerability in Graylog Web Interface, version 2.2.3, due to incorrect management of session invalidation after new logins. The application generates a new 'sessionId' each time a user authenticates, but does not ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-02-18T17:00:30.030Z ##

⚠️ CVE-2026-1435 (CRITICAL): Graylog Web Interface 2.2.3 fails to expire old sessions, enabling token reuse & unauthorized access. Restrict access, enable MFA, and monitor sessions until patch is released. Details: radar.offseq.com/threat/cve-20

##

Matchbook3469@mastodon.social at 2026-02-19T15:25:50.000Z ##

⛔ New security advisory:

CVE-2026-1435 affects Graylog Graylog.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #PatchNow #InfoSecCommunity

##

thehackerwire@mastodon.social at 2026-02-18T20:24:17.000Z ##

🔴 CVE-2026-1435 - Critical (9.8)

Not properly invalidated session vulnerability in Graylog Web Interface, version 2.2.3, due to incorrect management of session invalidation after new logins. The application generates a new 'sessionId' each time a user authenticates, but does not ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-18T17:00:30.000Z ##

⚠️ CVE-2026-1435 (CRITICAL): Graylog Web Interface 2.2.3 fails to expire old sessions, enabling token reuse & unauthorized access. Restrict access, enable MFA, and monitor sessions until patch is released. Details: radar.offseq.com/threat/cve-20 #OffSeq #Graylog #Vuln #Security

##

CVE-2025-1272
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-18T21:31:34

2 posts

The Linux Kernel lockdown mode for kernel versions starting on 6.12 and above for Fedora Linux has the lockdown mode disabled without any warning. This may allow an attacker to gain access to sensitive information such kernel memory mappings, I/O ports, BPF and kprobes. Additionally unsigned modules can be loaded, leading to execution of untrusted code breaking breaking any Secure Boot protection.

2 repos

https://github.com/d0n601/CVE-2025-12721

https://github.com/d0n601/CVE-2025-12720

thehackerwire@mastodon.social at 2026-02-18T21:59:46.000Z ##

🟠 CVE-2025-1272 - High (7.7)

The Linux Kernel lockdown mode for kernel versions starting on 6.12 and above for Fedora Linux has the lockdown mode disabled without any warning. This may allow an attacker to gain access to sensitive information such kernel memory mappings, I/O ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T21:59:46.000Z ##

🟠 CVE-2025-1272 - High (7.7)

The Linux Kernel lockdown mode for kernel versions starting on 6.12 and above for Fedora Linux has the lockdown mode disabled without any warning. This may allow an attacker to gain access to sensitive information such kernel memory mappings, I/O ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0875
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-18T21:31:34

2 posts

A maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.

thehackerwire@mastodon.social at 2026-02-18T20:23:53.000Z ##

🟠 CVE-2026-0875 - High (7.8)

A maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T20:23:53.000Z ##

🟠 CVE-2026-0875 - High (7.8)

A maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70064
(8.8 HIGH)

EPSS: 0.08%

updated 2026-02-18T21:31:23

2 posts

PHPGurukul Hospital Management System v4.0 contains a Privilege Escalation vulnerability. A low-privileged user (Patient) can directly access the Administrator Dashboard and all sub-modules (e.g., User Logs, Doctor Management) by manually browsing to the /admin/ directory after authentication. This allows any self-registered user to takeover the application, view confidential logs, and modify syst

thehackerwire@mastodon.social at 2026-02-18T20:24:02.000Z ##

🟠 CVE-2025-70064 - High (8.8)

PHPGurukul Hospital Management System v4.0 contains a Privilege Escalation vulnerability. A low-privileged user (Patient) can directly access the Administrator Dashboard and all sub-modules (e.g., User Logs, Doctor Management) by manually browsing...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T20:24:02.000Z ##

🟠 CVE-2025-70064 - High (8.8)

PHPGurukul Hospital Management System v4.0 contains a Privilege Escalation vulnerability. A low-privileged user (Patient) can directly access the Administrator Dashboard and all sub-modules (e.g., User Logs, Doctor Management) by manually browsing...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70149
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-02-18T21:31:23

2 posts

CodeAstro Membership Management System 1.0 is vulnerable to SQL Injection in print_membership_card.php via the ID parameter.

thehackerwire@mastodon.social at 2026-02-18T19:37:12.000Z ##

🔴 CVE-2025-70149 - Critical (9.8)

CodeAstro Membership Management System 1.0 is vulnerable to SQL Injection in print_membership_card.php via the ID parameter.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T19:37:12.000Z ##

🔴 CVE-2025-70149 - Critical (9.8)

CodeAstro Membership Management System 1.0 is vulnerable to SQL Injection in print_membership_card.php via the ID parameter.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70147
(7.5 HIGH)

EPSS: 0.14%

updated 2026-02-18T21:31:23

2 posts

Missing authentication in /admin/student.php and /admin/teacher.php in ProjectWorlds Online Time Table Generator 1.0 allows remote attackers to obtain sensitive information (including plaintext password field values) via direct HTTP GET requests to these endpoints without a valid session.

thehackerwire@mastodon.social at 2026-02-18T19:37:03.000Z ##

🟠 CVE-2025-70147 - High (7.5)

Missing authentication in /admin/student.php and /admin/teacher.php in ProjectWorlds Online Time Table Generator 1.0 allows remote attackers to obtain sensitive information (including plaintext password field values) via direct HTTP GET requests t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T19:37:03.000Z ##

🟠 CVE-2025-70147 - High (7.5)

Missing authentication in /admin/student.php and /admin/teacher.php in ProjectWorlds Online Time Table Generator 1.0 allows remote attackers to obtain sensitive information (including plaintext password field values) via direct HTTP GET requests t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22769
(10.0 CRITICAL)

EPSS: 28.78%

updated 2026-02-18T20:01:15.983000

28 posts

Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a hardcoded credential vulnerability. This is considered critical as an unauthenticated remote attacker with knowledge of the hardcoded credential could potentially exploit this vulnerability leading to unauthorized access to the underlying operating system and root-level persistence. Dell recommends that customers upgr

secdb at 2026-02-20T00:00:19.764Z ##

🚨 [CISA-2026:0218] CISA Adds 2 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 2 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2021-22175 (secdb.nttzen.cloud/cve/detail/)
- Name: GitLab Server-Side Request Forgery (SSRF) Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: GitLab
- Product: GitLab
- Notes: gitlab.com/gitlab-org/cves/-/b ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-22769 (secdb.nttzen.cloud/cve/detail/)
- Name: Dell RecoverPoint for Virtual Machines (RP4VMs) Use of Hard-coded Credentials Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Dell
- Product: RecoverPoint for Virtual Machines (RP4VMs)
- Notes: dell.com/support/kbdoc/en-us/0 ; dell.com/support/kbdoc/en-us/0 ; cloud.google.com/blog/topics/t ; nvd.nist.gov/vuln/detail/CVE-2

##

StringsVsAtoms@mastodon.social at 2026-02-19T18:40:00.000Z ##

The issue, officially named CVE-2026-22769, involves hardcoded credentials. This means the software came with a built-in username and password that could not be easily changed.
5/10

##

defendopsdiaries at 2026-02-19T15:44:05.094Z ##

One overlooked line of code let hackers waltz into critical federal systems, forcing a rare emergency patch order. How did hardcoded passwords cause such chaos?

thedefendopsdiaries.com/the-de

##

technadu at 2026-02-19T15:09:13.485Z ##

CVE-2026-22769 (CVSS 10.0) in Dell RecoverPoint for VMs is under confirmed exploitation.

Attribution: UNC6201 (linked to Silk Typhoon)
Malware: BRICKSTORM (evolving) → GRIMBOLT
Vector: Hard-coded credentials
Impact Layer: VMware-integrated DR appliances

This is a high-leverage target:
- Elevated privileges
- Direct integration with hypervisors & storage
- Influence over replicated datasets
- Potential long-term espionage dwell time

CISA has mandated immediate patching for federal agencies.

Key takeaway: Recovery infrastructure is now an active battlefield.
How are you validating integrity of replicated VM copies?
Comment below.

Source: therecord.media/fed-agencies-o

Follow TechNadu for threat intelligence updates.
Share within your security teams.

##

benzogaga33@mamot.fr at 2026-02-19T10:40:04.000Z ##

Cette faille critique dans Dell RecoverPoint est exploitée depuis mi-2024 it-connect.fr/dell-recoverpoin #ActuCybersécurité #Cybersécurité #Dell

##

niztal@mastodon.social at 2026-02-18T23:39:58.000Z ##

⚠️ Dell RecoverPoint for VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024

thehackernews.com/2026/02/dell

#CyberSecurity #InfoSec

##

nemo@mas.to at 2026-02-18T22:10:58.000Z ##

Dell warns of a max-severity flaw (CVE-2026-22769) in RecoverPoint for VMs, already exploited for root access in the wild. 🔓💻 Security teams are urged to patch or apply mitigations immediately. Details: cyberinsider.com/dell-warns-of #cybersecurity #infosec #Dell #Newz

##

oversecurity@mastodon.social at 2026-02-18T21:20:05.000Z ##

Fed agencies ordered to patch Dell bug by Saturday after exploitation warning

Dell and Google released notices on Tuesday about CVE-2026-22769, warning that a sophisticated Chinese actor has been targeting the bug since at...

🔗️ [Therecord] link.is.it/stSZK0

##

thefinancialstandard@mastodon.social at 2026-02-18T19:00:07.000Z ##

Critical Dell RecoverPoint Exploit Exposed Since 2024

A zero-day Dell RecoverPoint exploit, CVE-2026-22769, has been actively exploited since mid-2024. Patch immediately to avoid data breaches.

Read more: thefinancialstandard.com/dell-

#finance #cybersecurity #fintech #news

##

beyondmachines1 at 2026-02-18T18:01:24.344Z ##

Hackers Exploit Dell RecoverPoint Zero-Day to Deploy Stealthy Backdoor

A critical flaw in Dell RecoverPoint for Virtual Machines (CVE-2026-22769) is actively exploited by threat actor using hard-coded credentials to deploy backdoors.

**If you are using Dell RecoverPoint, this is important! Check your Dell RecoverPoint versions and plan a very quick update to 6.0.3.1 HF1 patch to remove the hard-coded admin credentials. Ensure these appliances are isolated from the internet.**

beyondmachines.net/event_detai

##

cisakevtracker@mastodon.social at 2026-02-18T17:01:12.000Z ##

CVE ID: CVE-2026-22769
Vendor: Dell
Product: RecoverPoint for Virtual Machines (RP4VMs)
Date Added: 2026-02-18
Notes: dell.com/support/kbdoc/en-us/0 ; dell.com/support/kbdoc/en-us/0 ; cloud.google.com/blog/topics/t ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

rxerium at 2026-02-18T13:41:47.655Z ##

🚨 Mandiant have identified zero-day exploitation of a high-risk vulnerability in Dell RecoverPoint for Virtual Machines, tracked as CVE-2026-22769.

RecoverPoint can be detected using this Nuclei template:
github.com/projectdiscovery/nu

Very limited exposure to the internet.

Dell recommends upgrading to version 6.0.3.1 HF1 or later. Mitigations are also available.

Mandiant report:
cloud.google.com/blog/topics/t

##

undercodenews@mastodon.social at 2026-02-18T13:31:49.000Z ##

China-Linked APT Exploits Critical Dell RecoverPoint Zero-Day for Over a Year + Video

Introduction In a stark warning to enterprise security teams, researchers from Mandiant and Google’s Threat Intelligence Group (GTIG) have revealed that a China-linked advanced persistent threat (APT) group quietly exploited a severe zero-day vulnerability in Dell RecoverPoint for Virtual Machines since mid-2024. The flaw, now tracked as CVE-2026-22769, carries the highest severity…

undercodenews.com/china-linked

##

jbhall56 at 2026-02-18T13:17:28.416Z ##

The activity involves the exploitation of CVE-2026-22769 (CVSS score: 10.0), a case of hard-coded credentials affecting versions prior to 6.0.3.1 HF1. Other products, including RecoverPoint Classic, are not vulnerable to the flaw. thehackernews.com/2026/02/dell

##

secdb@infosec.exchange at 2026-02-20T00:00:19.000Z ##

🚨 [CISA-2026:0218] CISA Adds 2 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 2 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2021-22175 (secdb.nttzen.cloud/cve/detail/)
- Name: GitLab Server-Side Request Forgery (SSRF) Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: GitLab
- Product: GitLab
- Notes: gitlab.com/gitlab-org/cves/-/b ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-22769 (secdb.nttzen.cloud/cve/detail/)
- Name: Dell RecoverPoint for Virtual Machines (RP4VMs) Use of Hard-coded Credentials Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Dell
- Product: RecoverPoint for Virtual Machines (RP4VMs)
- Notes: dell.com/support/kbdoc/en-us/0 ; dell.com/support/kbdoc/en-us/0 ; cloud.google.com/blog/topics/t ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260218 #cisa20260218 #cve_2021_22175 #cve_2026_22769 #cve202122175 #cve202622769

##

defendopsdiaries@infosec.exchange at 2026-02-19T15:44:05.000Z ##

One overlooked line of code let hackers waltz into critical federal systems, forcing a rare emergency patch order. How did hardcoded passwords cause such chaos?

thedefendopsdiaries.com/the-de

##

technadu@infosec.exchange at 2026-02-19T15:09:13.000Z ##

CVE-2026-22769 (CVSS 10.0) in Dell RecoverPoint for VMs is under confirmed exploitation.

Attribution: UNC6201 (linked to Silk Typhoon)
Malware: BRICKSTORM (evolving) → GRIMBOLT
Vector: Hard-coded credentials
Impact Layer: VMware-integrated DR appliances

This is a high-leverage target:
- Elevated privileges
- Direct integration with hypervisors & storage
- Influence over replicated datasets
- Potential long-term espionage dwell time

CISA has mandated immediate patching for federal agencies.

Key takeaway: Recovery infrastructure is now an active battlefield.
How are you validating integrity of replicated VM copies?
Comment below.

Source: therecord.media/fed-agencies-o

Follow TechNadu for threat intelligence updates.
Share within your security teams.
#Infosec #ThreatIntelligence #ZeroDay #CISAAlert #VMwareSecurity #CyberEspionage #BlueTeam #RedTeam #APT #SecurityOperations #DigitalForensics

##

benzogaga33@mamot.fr at 2026-02-19T10:40:04.000Z ##

Cette faille critique dans Dell RecoverPoint est exploitée depuis mi-2024 it-connect.fr/dell-recoverpoin #ActuCybersécurité #Cybersécurité #Dell

##

nemo@mas.to at 2026-02-18T22:10:58.000Z ##

Dell warns of a max-severity flaw (CVE-2026-22769) in RecoverPoint for VMs, already exploited for root access in the wild. 🔓💻 Security teams are urged to patch or apply mitigations immediately. Details: cyberinsider.com/dell-warns-of #cybersecurity #infosec #Dell #Newz

##

oversecurity@mastodon.social at 2026-02-18T21:20:05.000Z ##

Fed agencies ordered to patch Dell bug by Saturday after exploitation warning

Dell and Google released notices on Tuesday about CVE-2026-22769, warning that a sophisticated Chinese actor has been targeting the bug since at...

🔗️ [Therecord] link.is.it/stSZK0

##

thefinancialstandard@mastodon.social at 2026-02-18T19:00:07.000Z ##

Critical Dell RecoverPoint Exploit Exposed Since 2024

A zero-day Dell RecoverPoint exploit, CVE-2026-22769, has been actively exploited since mid-2024. Patch immediately to avoid data breaches.

Read more: thefinancialstandard.com/dell-

#finance #cybersecurity #fintech #news

##

beyondmachines1@infosec.exchange at 2026-02-18T18:01:24.000Z ##

Hackers Exploit Dell RecoverPoint Zero-Day to Deploy Stealthy Backdoor

A critical flaw in Dell RecoverPoint for Virtual Machines (CVE-2026-22769) is actively exploited by threat actor using hard-coded credentials to deploy backdoors.

**If you are using Dell RecoverPoint, this is important! Check your Dell RecoverPoint versions and plan a very quick update to 6.0.3.1 HF1 patch to remove the hard-coded admin credentials. Ensure these appliances are isolated from the internet.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

cisakevtracker@mastodon.social at 2026-02-18T17:01:12.000Z ##

CVE ID: CVE-2026-22769
Vendor: Dell
Product: RecoverPoint for Virtual Machines (RP4VMs)
Date Added: 2026-02-18
Notes: dell.com/support/kbdoc/en-us/0 ; dell.com/support/kbdoc/en-us/0 ; cloud.google.com/blog/topics/t ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

rxerium@infosec.exchange at 2026-02-18T13:41:47.000Z ##

🚨 Mandiant have identified zero-day exploitation of a high-risk vulnerability in Dell RecoverPoint for Virtual Machines, tracked as CVE-2026-22769.

RecoverPoint can be detected using this Nuclei template:
github.com/projectdiscovery/nu

Very limited exposure to the internet.

Dell recommends upgrading to version 6.0.3.1 HF1 or later. Mitigations are also available.

Mandiant report:
cloud.google.com/blog/topics/t

##

jbhall56@infosec.exchange at 2026-02-18T13:17:28.000Z ##

The activity involves the exploitation of CVE-2026-22769 (CVSS score: 10.0), a case of hard-coded credentials affecting versions prior to 6.0.3.1 HF1. Other products, including RecoverPoint Classic, are not vulnerable to the flaw. thehackernews.com/2026/02/dell

##

cyberveille@mastobot.ping.moi at 2026-02-18T07:30:07.000Z ##

📢 Zero‑day critique sur Dell RecoverPoint for VMs (CVE-2026-22769) exploitée par UNC6201 avec le backdoor GRIMBOLT
📝 Sel...
📖 cyberveille : cyberveille.ch/posts/2026-02-1
🌐 source : cloud.google.com/blog/topics/t
#CVE_2026_22769 #Dell_RecoverPoint_for_Virtual_Machines #Cyberveille

##

oversecurity@mastodon.social at 2026-02-18T07:10:09.000Z ##

Zero-Day in Dell RecoverPoint Exploited by Chinese Hacker Group

A critical zero-day vulnerability, tracked as CVE-2026-22769, is being actively exploited in Dell Technologies’ RecoverPoint for Virtual Machines....

🔗️ [Thecyberexpress] link.is.it/FOr0Id

##

offseq@infosec.exchange at 2026-02-18T06:00:27.000Z ##

CRITICAL: CVE-2026-22769 in Dell RecoverPoint for VMs (≤5.3 SP4 P1) lets unauthenticated attackers gain root via hardcoded creds. Patch or mitigate ASAP! 🛡️ radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Dell #InfoSec

##

CVE-2026-0714
(6.8 MEDIUM)

EPSS: 0.01%

updated 2026-02-18T18:31:27

4 posts

A physical attack vulnerability exists in certain Moxa industrial computers using TPM-backed LUKS full-disk encryption on Moxa Industrial Linux 3, where the discrete TPM is connected to the CPU via an SPI bus. Exploitation requires invasive physical access, including opening the device and attaching external equipment to the SPI bus to capture TPM communications. If successful, the captured data m

CVE-2021-22175
(9.8 CRITICAL)

EPSS: 74.08%

updated 2026-02-18T18:31:26

6 posts

When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is disabled

Nuclei template

secdb at 2026-02-20T00:00:19.764Z ##

🚨 [CISA-2026:0218] CISA Adds 2 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 2 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2021-22175 (secdb.nttzen.cloud/cve/detail/)
- Name: GitLab Server-Side Request Forgery (SSRF) Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: GitLab
- Product: GitLab
- Notes: gitlab.com/gitlab-org/cves/-/b ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-22769 (secdb.nttzen.cloud/cve/detail/)
- Name: Dell RecoverPoint for Virtual Machines (RP4VMs) Use of Hard-coded Credentials Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Dell
- Product: RecoverPoint for Virtual Machines (RP4VMs)
- Notes: dell.com/support/kbdoc/en-us/0 ; dell.com/support/kbdoc/en-us/0 ; cloud.google.com/blog/topics/t ; nvd.nist.gov/vuln/detail/CVE-2

##

darses@mastodon.nl at 2026-02-18T19:35:54.000Z ##

Gitlab vulnerability CVE-2021-22175 got added to the CISA KEV. But this vuln is just a more complete patch to CVE-2021-22214. Likewise CVE-2021-39935 covers even more case where the CI Lint function could be used without authentication. In fact, the exploit code identical for all vulnerabilites. CVE-2021-39935 was already on the list, CVE-2021-22175 got added today and CVE-2021-22214 is still missing.

#cybersecurity #vulnerability #circus

##

cisakevtracker@mastodon.social at 2026-02-18T17:00:56.000Z ##

CVE ID: CVE-2021-22175
Vendor: GitLab
Product: GitLab
Date Added: 2026-02-18
Notes: gitlab.com/gitlab-org/cves/-/b ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

secdb@infosec.exchange at 2026-02-20T00:00:19.000Z ##

🚨 [CISA-2026:0218] CISA Adds 2 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 2 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2021-22175 (secdb.nttzen.cloud/cve/detail/)
- Name: GitLab Server-Side Request Forgery (SSRF) Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: GitLab
- Product: GitLab
- Notes: gitlab.com/gitlab-org/cves/-/b ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-22769 (secdb.nttzen.cloud/cve/detail/)
- Name: Dell RecoverPoint for Virtual Machines (RP4VMs) Use of Hard-coded Credentials Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Dell
- Product: RecoverPoint for Virtual Machines (RP4VMs)
- Notes: dell.com/support/kbdoc/en-us/0 ; dell.com/support/kbdoc/en-us/0 ; cloud.google.com/blog/topics/t ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260218 #cisa20260218 #cve_2021_22175 #cve_2026_22769 #cve202122175 #cve202622769

##

darses@mastodon.nl at 2026-02-18T19:35:54.000Z ##

Gitlab vulnerability CVE-2021-22175 got added to the CISA KEV. But this vuln is just a more complete patch to CVE-2021-22214. Likewise CVE-2021-39935 covers even more case where the CI Lint function could be used without authentication. In fact, the exploit code identical for all vulnerabilites. CVE-2021-39935 was already on the list, CVE-2021-22175 got added today and CVE-2021-22214 is still missing.

#cybersecurity #vulnerability #circus

##

cisakevtracker@mastodon.social at 2026-02-18T17:00:56.000Z ##

CVE ID: CVE-2021-22175
Vendor: GitLab
Product: GitLab
Date Added: 2026-02-18
Notes: gitlab.com/gitlab-org/cves/-/b ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-2507
(7.5 HIGH)

EPSS: 0.08%

updated 2026-02-18T18:30:51

4 posts

When BIG-IP AFM or BIG-IP DDoS is provisioned, undisclosed traffic can cause TMM to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

thehackerwire@mastodon.social at 2026-02-18T17:24:09.000Z ##

🟠 CVE-2026-2507 - High (7.5)

When BIG-IP AFM or BIG-IP DDoS is provisioned, undisclosed traffic can cause TMM to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T17:23:17.000Z ##

🟠 CVE-2026-2507 - High (7.5)

When BIG-IP AFM or BIG-IP DDoS is provisioned, undisclosed traffic can cause TMM to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T17:24:09.000Z ##

🟠 CVE-2026-2507 - High (7.5)

When BIG-IP AFM or BIG-IP DDoS is provisioned, undisclosed traffic can cause TMM to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T17:23:17.000Z ##

🟠 CVE-2026-2507 - High (7.5)

When BIG-IP AFM or BIG-IP DDoS is provisioned, undisclosed traffic can cause TMM to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70150
(9.8 CRITICAL)

EPSS: 0.11%

updated 2026-02-18T18:30:47

2 posts

CodeAstro Membership Management System 1.0 contains a missing authentication vulnerability in delete_members.php that allows unauthenticated attackers to delete arbitrary member records via the id parameter.

thehackerwire@mastodon.social at 2026-02-18T18:59:55.000Z ##

🔴 CVE-2025-70150 - Critical (9.8)

CodeAstro Membership Management System 1.0 contains a missing authentication vulnerability in delete_members.php that allows unauthenticated attackers to delete arbitrary member records via the id parameter.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T18:59:55.000Z ##

🔴 CVE-2025-70150 - Critical (9.8)

CodeAstro Membership Management System 1.0 contains a missing authentication vulnerability in delete_members.php that allows unauthenticated attackers to delete arbitrary member records via the id parameter.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70998
(9.8 CRITICAL)

EPSS: 0.11%

updated 2026-02-18T18:30:39

4 posts

UTT HiPER 810 / nv810v4 router firmware v1.5.0-140603 was discovered to contain insecure default credentials for the telnet service, possibly allowing a remote attacker to gain root access via a crafted script.

thehackerwire@mastodon.social at 2026-02-18T16:27:40.000Z ##

🔴 CVE-2025-70998 - Critical (9.8)

UTT HiPER 810 / nv810v4 router firmware v1.5.0-140603 was discovered to contain insecure default credentials for the telnet service, possibly allowing a remote attacker to gain root access via a crafted script.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T16:27:07.000Z ##

🔴 CVE-2025-70998 - Critical (9.8)

UTT HiPER 810 / nv810v4 router firmware v1.5.0-140603 was discovered to contain insecure default credentials for the telnet service, possibly allowing a remote attacker to gain root access via a crafted script.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T16:27:40.000Z ##

🔴 CVE-2025-70998 - Critical (9.8)

UTT HiPER 810 / nv810v4 router firmware v1.5.0-140603 was discovered to contain insecure default credentials for the telnet service, possibly allowing a remote attacker to gain root access via a crafted script.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T16:27:07.000Z ##

🔴 CVE-2025-70998 - Critical (9.8)

UTT HiPER 810 / nv810v4 router firmware v1.5.0-140603 was discovered to contain insecure default credentials for the telnet service, possibly allowing a remote attacker to gain root access via a crafted script.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-61982
(7.8 HIGH)

EPSS: 0.02%

updated 2026-02-18T18:30:38

2 posts

An arbitrary code execution vulnerability exists in the Code Stream directive functionality of OpenCFD OpenFOAM 2506. A specially crafted OpenFOAM simulation file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

thehackerwire@mastodon.social at 2026-02-18T15:32:38.000Z ##

🟠 CVE-2025-61982 - High (7.8)

An arbitrary code execution vulnerability exists in the Code Stream directive functionality of OpenCFD OpenFOAM 2506. A specially crafted OpenFOAM simulation file can lead to arbitrary code execution. An attacker can provide a malicious file to tr...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T15:32:38.000Z ##

🟠 CVE-2025-61982 - High (7.8)

An arbitrary code execution vulnerability exists in the Code Stream directive functionality of OpenCFD OpenFOAM 2506. A specially crafted OpenFOAM simulation file can lead to arbitrary code execution. An attacker can provide a malicious file to tr...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-65715
(7.8 HIGH)

EPSS: 0.02%

updated 2026-02-18T17:52:22.253000

4 posts

An issue in the code-runner.executorMap setting of Visual Studio Code Extensions Code Runner v0.12.2 allows attackers to execute arbitrary code when opening a crafted workspace.

thehackerwire@mastodon.social at 2026-02-18T16:27:18.000Z ##

🟠 CVE-2025-65715 - High (7.8)

An issue in the code-runner.executorMap setting of Visual Studio Code Extensions Code Runner v0.12.2 allows attackers to execute arbitrary code when opening a crafted workspace.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

jbhall56 at 2026-02-18T13:43:08.593Z ##

The security issues impact Code Runner (CVE-2025-65715), Markdown Preview Enhanced (CVE-2025-65716), Markdown Preview Enhanced (CVE-2025-65717), and Microsoft Live Preview (no identifier assigned). bleepingcomputer.com/news/secu

##

thehackerwire@mastodon.social at 2026-02-18T16:27:18.000Z ##

🟠 CVE-2025-65715 - High (7.8)

An issue in the code-runner.executorMap setting of Visual Studio Code Extensions Code Runner v0.12.2 allows attackers to execute arbitrary code when opening a crafted workspace.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

jbhall56@infosec.exchange at 2026-02-18T13:43:08.000Z ##

The security issues impact Code Runner (CVE-2025-65715), Markdown Preview Enhanced (CVE-2025-65716), Markdown Preview Enhanced (CVE-2025-65717), and Microsoft Live Preview (no identifier assigned). bleepingcomputer.com/news/secu

##

CVE-2026-2577
(10.0 CRITICAL)

EPSS: 0.06%

updated 2026-02-18T17:52:22.253000

1 posts

The WhatsApp bridge component in Nanobot binds the WebSocket server to all network interfaces (0.0.0.0) on port 3001 by default and does not require authentication for incoming connections. An unauthenticated remote attacker with network access to the bridge can connect to the WebSocket server to hijack the WhatsApp session. This allows the attacker to send messages on behalf of the user, intercep

Matchbook3469@mastodon.social at 2026-02-18T10:06:10.000Z ##

🔴 New security advisory:

CVE-2026-2577 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
advisory.yazoul.net/cve/cve-20

#Cybersecurity #SecurityPatching #HackerNews

##

CVE-2026-1670
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-02-18T17:51:53.510000

8 posts

The affected products are vulnerable to an unauthenticated API endpoint exposure, which may allow an attacker to remotely change the "forgot password" recovery email address.

undercodenews@mastodon.social at 2026-02-19T12:54:19.000Z ##

Critical Authentication Bypass in Honeywell CCTVs Poses Severe Security Risk + Video

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical warning regarding a recently discovered vulnerability affecting Honeywell CCTV devices. This flaw, tracked as CVE-2026-1670, carries a CVSS score of 9.8, indicating its extreme severity. Experts caution that it could allow attackers to hijack accounts, access live camera feeds, and potentially…

undercodenews.com/critical-aut

##

defendopsdiaries at 2026-02-18T21:11:25.258Z ##

A single overlooked API flaw lets hackers hijack Honeywell CCTV cameras without even logging in—just how easy is it to take over a surveillance system? The answer is unsettling

thedefendopsdiaries.com/cve-20

##

beyondmachines1 at 2026-02-18T10:01:23.483Z ##

Critical Authentication Bypass in Honeywell CCTV Products Allows Remote Account Takeover

Honeywell reports a critical vulnerability (CVE-2026-1670) in several CCTV models that allows unauthenticated attackers to take over accounts by changing the password recovery email via an exposed API.

**Make sure your CCTV cameras are isolated from the internet and accessible from trusted networks only. Then check your Honeywell CCTV firmware versions and contact their support for patches.**

beyondmachines.net/event_detai

##

defendopsdiaries@infosec.exchange at 2026-02-18T21:11:25.000Z ##

A single overlooked API flaw lets hackers hijack Honeywell CCTV cameras without even logging in—just how easy is it to take over a surveillance system? The answer is unsettling

thedefendopsdiaries.com/cve-20

##

beyondmachines1@infosec.exchange at 2026-02-18T10:01:23.000Z ##

Critical Authentication Bypass in Honeywell CCTV Products Allows Remote Account Takeover

Honeywell reports a critical vulnerability (CVE-2026-1670) in several CCTV models that allows unauthenticated attackers to take over accounts by changing the password recovery email via an exposed API.

**Make sure your CCTV cameras are isolated from the internet and accessible from trusted networks only. Then check your Honeywell CCTV firmware versions and contact their support for patches.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

offseq@infosec.exchange at 2026-02-18T00:00:43.000Z ##

⚠️ CRITICAL: Honeywell I-HIB2PI-UL 2MP IP (6.1.22.1216) has CVE-2026-1670 (CWE-306) — missing auth on API enables remote attackers to change recovery emails and take over accounts. Patch or segment now! radar.offseq.com/threat/cve-20 #OffSeq #Honeywell #Vuln #OTSecurity

##

thehackerwire@mastodon.social at 2026-02-17T23:20:12.000Z ##

🔴 CVE-2026-1670 - Critical (9.8)

The affected products are vulnerable to an unauthenticated API endpoint exposure, which may allow an attacker to remotely change the "forgot password" recovery email address.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T23:19:24.000Z ##

🔴 CVE-2026-1670 - Critical (9.8)

The affected products are vulnerable to an unauthenticated API endpoint exposure, which may allow an attacker to remotely change the "forgot password" recovery email address.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27099
(8.0 HIGH)

EPSS: 0.04%

updated 2026-02-18T17:51:53.510000

6 posts

Jenkins 2.483 through 2.550 (both inclusive), LTS 2.492.1 through 2.541.1 (both inclusive) does not escape the user-provided description of the "Mark temporarily offline" offline cause, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Agent/Configure or Agent/Disconnect permission.

offseq at 2026-02-18T20:00:14.518Z ##

⚠️ HIGH severity: Jenkins 2.483-2.550 & LTS 2.492.1-2.541.1 hit by CVE-2026-27099 (stored XSS). Requires Agent/Configure or Agent/Disconnect permissions. Patch, restrict privileges, and review logs! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-18T16:27:49.000Z ##

🟠 CVE-2026-27099 - High (8)

Jenkins 2.483 through 2.550 (both inclusive), LTS 2.492.1 through 2.541.1 (both inclusive) does not escape the user-provided description of the "Mark temporarily offline" offline cause, resulting in a stored cross-site scripting (XSS) vulnerabilit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T16:27:16.000Z ##

🟠 CVE-2026-27099 - High (8)

Jenkins 2.483 through 2.550 (both inclusive), LTS 2.492.1 through 2.541.1 (both inclusive) does not escape the user-provided description of the "Mark temporarily offline" offline cause, resulting in a stored cross-site scripting (XSS) vulnerabilit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-18T20:00:14.000Z ##

⚠️ HIGH severity: Jenkins 2.483-2.550 & LTS 2.492.1-2.541.1 hit by CVE-2026-27099 (stored XSS). Requires Agent/Configure or Agent/Disconnect permissions. Patch, restrict privileges, and review logs! radar.offseq.com/threat/cve-20 #OffSeq #Jenkins #XSS #Security

##

thehackerwire@mastodon.social at 2026-02-18T16:27:49.000Z ##

🟠 CVE-2026-27099 - High (8)

Jenkins 2.483 through 2.550 (both inclusive), LTS 2.492.1 through 2.541.1 (both inclusive) does not escape the user-provided description of the "Mark temporarily offline" offline cause, resulting in a stored cross-site scripting (XSS) vulnerabilit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T16:27:16.000Z ##

🟠 CVE-2026-27099 - High (8)

Jenkins 2.483 through 2.550 (both inclusive), LTS 2.492.1 through 2.541.1 (both inclusive) does not escape the user-provided description of the "Mark temporarily offline" offline cause, resulting in a stored cross-site scripting (XSS) vulnerabilit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1426
(8.8 HIGH)

EPSS: 0.09%

updated 2026-02-18T17:51:53.510000

4 posts

The Advanced AJAX Product Filters plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.1.9.6 via deserialization of untrusted input in the shortcode_check function within the Live Composer compatibility layer. This makes it possible for authenticated attackers, with Author-level access and above, to inject a PHP Object. No known POP chain is present in

offseq at 2026-02-18T18:30:15.067Z ##

🔒 CVE-2026-1426: HIGH severity PHP Object Injection in berocket Advanced AJAX Product Filters (WordPress, <=3.1.9.6). Requires Author access + Live Composer, and a gadget chain in another plugin/theme. Update or audit now! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-18T15:32:28.000Z ##

🟠 CVE-2026-1426 - High (8.8)

The Advanced AJAX Product Filters plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.1.9.6 via deserialization of untrusted input in the shortcode_check function within the Live Composer compatibilit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-18T18:30:15.000Z ##

🔒 CVE-2026-1426: HIGH severity PHP Object Injection in berocket Advanced AJAX Product Filters (WordPress, <=3.1.9.6). Requires Author access + Live Composer, and a gadget chain in another plugin/theme. Update or audit now! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #PHP

##

thehackerwire@mastodon.social at 2026-02-18T15:32:28.000Z ##

🟠 CVE-2026-1426 - High (8.8)

The Advanced AJAX Product Filters plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.1.9.6 via deserialization of untrusted input in the shortcode_check function within the Live Composer compatibilit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33239
(7.8 HIGH)

EPSS: 0.02%

updated 2026-02-18T17:51:53.510000

2 posts

NVIDIA Megatron Bridge contains a vulnerability in a data merging tutorial, where malicious input could cause a code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.

thehackerwire@mastodon.social at 2026-02-18T15:18:23.000Z ##

🟠 CVE-2025-33239 - High (7.8)

NVIDIA Megatron Bridge contains a vulnerability in a data merging tutorial, where malicious input could cause a code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T15:18:23.000Z ##

🟠 CVE-2025-33239 - High (7.8)

NVIDIA Megatron Bridge contains a vulnerability in a data merging tutorial, where malicious input could cause a code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33250
(7.8 HIGH)

EPSS: 0.07%

updated 2026-02-18T17:51:53.510000

2 posts

NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.

thehackerwire@mastodon.social at 2026-02-18T15:05:16.000Z ##

🟠 CVE-2025-33250 - High (7.8)

NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T15:05:16.000Z ##

🟠 CVE-2025-33250 - High (7.8)

NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33243
(7.8 HIGH)

EPSS: 0.28%

updated 2026-02-18T17:51:53.510000

2 posts

NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution in distributed environments. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.

thehackerwire@mastodon.social at 2026-02-18T15:01:35.000Z ##

🟠 CVE-2025-33243 - High (7.8)

NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution in distributed environments. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T15:01:35.000Z ##

🟠 CVE-2025-33243 - High (7.8)

NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution in distributed environments. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-60037
(7.8 HIGH)

EPSS: 0.18%

updated 2026-02-18T17:51:53.510000

2 posts

A vulnerability has been identified in Rexroth IndraWorks. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulated file containing malicious serialized data. Exploitation requires user interaction, specifically opening a specially crafted file, which then causes the application to deserialize the malicious data, enabling Remote Code Execution (RCE). Thi

thehackerwire@mastodon.social at 2026-02-18T14:32:12.000Z ##

🟠 CVE-2025-60037 - High (7.8)

A vulnerability has been identified in Rexroth IndraWorks. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulated file containing malicious serialized data. Exploitation requires user interaction, spe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T14:32:12.000Z ##

🟠 CVE-2025-60037 - High (7.8)

A vulnerability has been identified in Rexroth IndraWorks. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulated file containing malicious serialized data. Exploitation requires user interaction, spe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33253
(7.8 HIGH)

EPSS: 0.27%

updated 2026-02-18T17:51:53.510000

2 posts

NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution by convincing a user to load a maliciously crafted file. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.

thehackerwire@mastodon.social at 2026-02-18T14:18:20.000Z ##

🟠 CVE-2025-33253 - High (7.8)

NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution by convincing a user to load a maliciously crafted file. A successful exploit of this vulnerability might lead to code execution, denial of service,...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T14:18:20.000Z ##

🟠 CVE-2025-33253 - High (7.8)

NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution by convincing a user to load a maliciously crafted file. A successful exploit of this vulnerability might lead to code execution, denial of service,...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1714
(8.6 HIGH)

EPSS: 0.06%

updated 2026-02-18T17:51:53.510000

1 posts

The ShopLentor – WooCommerce Builder for Elementor & Gutenberg +21 Modules – All in One Solution plugin for WordPress is vulnerable to Email Relay Abuse in all versions up to, and including, 3.3.2. This is due to the lack of validation on the 'send_to', 'product_title', 'wlmessage', and 'wlemail' parameters in the 'woolentor_suggest_price_action' AJAX endpoint. This makes it possible for unauthent

thehackerwire@mastodon.social at 2026-02-18T05:20:24.000Z ##

🟠 CVE-2026-1714 - High (8.6)

The ShopLentor – WooCommerce Builder for Elementor & Gutenberg +21 Modules – All in One Solution plugin for WordPress is vulnerable to Email Relay Abuse in all versions up to, and including, 3.3.2. This is due to the lack of validation on the ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-13689
(8.8 HIGH)

EPSS: 0.03%

updated 2026-02-18T17:51:53.510000

1 posts

IBM DataStage on Cloud Pak for Data could allow an authenticated user to execute arbitrary commands and gain access to sensitive information due to unrestricted file uploads.

thehackerwire@mastodon.social at 2026-02-17T23:19:33.000Z ##

🟠 CVE-2025-13689 - High (8.8)

IBM DataStage on Cloud Pak for Data could allow an authenticated user to execute arbitrary commands and gain access to sensitive information due to unrestricted file uploads.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1368
(7.5 HIGH)

EPSS: 0.02%

updated 2026-02-18T15:32:29

2 posts

The Video Conferencing with Zoom WordPress plugin before 4.6.6 contains an AJAX handler that has its nonce verification commented out, allowing unauthenticated attackers to generate valid Zoom SDK signatures for any meeting ID and retrieve the site's Zoom SDK key.

thehackerwire@mastodon.social at 2026-02-18T16:01:49.000Z ##

🟠 CVE-2026-1368 - High (7.5)

The Video Conferencing with Zoom WordPress plugin before 4.6.6 contains an AJAX handler that has its nonce verification commented out, allowing unauthenticated attackers to generate valid Zoom SDK signatures for any meeting ID and retrieve the sit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T16:01:49.000Z ##

🟠 CVE-2026-1368 - High (7.5)

The Video Conferencing with Zoom WordPress plugin before 4.6.6 contains an AJAX handler that has its nonce verification commented out, allowing unauthenticated attackers to generate valid Zoom SDK signatures for any meeting ID and retrieve the sit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2329(CVSS UNKNOWN)

EPSS: 0.09%

updated 2026-02-18T15:31:35

7 posts

An unauthenticated stack-based buffer overflow vulnerability exists in the HTTP API endpoint /cgi-bin/api.values.get. A remote attacker can leverage this vulnerability to achieve unauthenticated remote code execution (RCE) with root privileges on a target device. The vulnerability affects all six device models in the series: GXP1610, GXP1615, GXP1620, GXP1625, GXP1628, and GXP1630.

tierrasapiens@mastodon.social at 2026-02-19T18:54:10.000Z ##

🖲️ #Cybersecurity #Ciberseguridad #Ciberseguranca #Security #Seguridad #Seguranca #News #Noticia #Noticias #Tecnologia #Technology
⚫ Critical Grandstream VoIP Bug Highlights SMB Security Blind Spot
🔗 darkreading.com/threat-intelli

CVE-2026-2329 allows unauthenticated root-level access to SMB phone infrastructure, so attackers can intercept calls, commit toll fraud, and impersonate users.

##

undercodenews@mastodon.social at 2026-02-19T01:15:28.000Z ##

Critical Vulnerability in Grandstream GXP1600 VoIP Phones Exposes Users to Remote Code Execution

A severe cybersecurity vulnerability has been discovered in Grandstream GXP1600 VoIP phones that could allow attackers to remotely execute malicious code with root privileges. This flaw, identified as CVE-2026-2329, is caused by an unauthenticated stack-based buffer overflow in the device's firmware. It is critical as it allows remote access via the /cgi-bin/api.values.get…

undercodenews.com/critical-vul

##

hackerworkspace at 2026-02-18T20:30:00.091Z ##

CVE-2026-2329: Critical Unauthenticated Stack Buffer Overflow in Grandstream GXP1600 VoIP Phones (FIXED)

rapid7.com/blog/post/ve-cve-20

##

undercodenews@mastodon.social at 2026-02-18T18:10:20.000Z ##

Critical Vulnerability Found in Grandstream GXP1600 Series VoIP Phones: Remote Code Execution Threat

A major cybersecurity flaw has been discovered in the Grandstream GXP1600 series of VoIP phones, exposing users to the potential risk of remote code execution. The vulnerability, identified as CVE-2026-2329, has been assigned a dangerously high CVSS score of 9.3 out of 10, highlighting its severity. This issue could allow attackers to take control of affected devices,…

undercodenews.com/critical-vul

##

offseq at 2026-02-18T15:30:34.640Z ##

🚨 CVE-2026-2329: CRITICAL stack buffer overflow in Grandstream GXP1610 series (all models) via /cgi-bin/api.values.get. Unauth RCE possible — restrict HTTP API access, segment devices, and monitor traffic. Patch ASAP when available. radar.offseq.com/threat/cve-20

##

hackerworkspace@infosec.exchange at 2026-02-18T20:30:00.000Z ##

CVE-2026-2329: Critical Unauthenticated Stack Buffer Overflow in Grandstream GXP1600 VoIP Phones (FIXED)

rapid7.com/blog/post/ve-cve-20

#cybersecurity #vulnerability #exploit

##

offseq@infosec.exchange at 2026-02-18T15:30:34.000Z ##

🚨 CVE-2026-2329: CRITICAL stack buffer overflow in Grandstream GXP1610 series (all models) via /cgi-bin/api.values.get. Unauth RCE possible — restrict HTTP API access, segment devices, and monitor traffic. Patch ASAP when available. radar.offseq.com/threat/cve-20 #OffSeq #VoIP #RCE #Security

##

CVE-2025-33251
(7.8 HIGH)

EPSS: 0.07%

updated 2026-02-18T15:31:34

2 posts

NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.

thehackerwire@mastodon.social at 2026-02-18T15:18:02.000Z ##

🟠 CVE-2025-33251 - High (7.8)

NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T15:18:02.000Z ##

🟠 CVE-2025-33251 - High (7.8)

NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33245
(8.0 HIGH)

EPSS: 0.23%

updated 2026-02-18T15:31:34

2 posts

NVIDIA NeMo Framework contains a vulnerability where malicious data could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.

thehackerwire@mastodon.social at 2026-02-18T15:01:44.000Z ##

🟠 CVE-2025-33245 - High (8)

NVIDIA NeMo Framework contains a vulnerability where malicious data could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T15:01:44.000Z ##

🟠 CVE-2025-33245 - High (8)

NVIDIA NeMo Framework contains a vulnerability where malicious data could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33241
(7.8 HIGH)

EPSS: 0.28%

updated 2026-02-18T15:31:33

2 posts

NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution by loading a maliciously crafted file. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.

thehackerwire@mastodon.social at 2026-02-18T16:01:40.000Z ##

🟠 CVE-2025-33241 - High (7.8)

NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution by loading a maliciously crafted file. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, informatio...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T16:01:40.000Z ##

🟠 CVE-2025-33241 - High (7.8)

NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution by loading a maliciously crafted file. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, informatio...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33240
(7.8 HIGH)

EPSS: 0.02%

updated 2026-02-18T15:31:33

2 posts

NVIDIA Megatron Bridge contains a vulnerability in a data shuffling tutorial, where malicious input could cause a code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.

thehackerwire@mastodon.social at 2026-02-18T16:01:30.000Z ##

🟠 CVE-2025-33240 - High (7.8)

NVIDIA Megatron Bridge contains a vulnerability in a data shuffling tutorial, where malicious input could cause a code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T16:01:30.000Z ##

🟠 CVE-2025-33240 - High (7.8)

NVIDIA Megatron Bridge contains a vulnerability in a data shuffling tutorial, where malicious input could cause a code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33236
(7.8 HIGH)

EPSS: 0.02%

updated 2026-02-18T15:31:33

2 posts

NVIDIA NeMo Framework contains a vulnerability where malicious data created by an attacker could cause code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.

thehackerwire@mastodon.social at 2026-02-18T15:18:13.000Z ##

🟠 CVE-2025-33236 - High (7.8)

NVIDIA NeMo Framework contains a vulnerability where malicious data created by an attacker could cause code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and d...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T15:18:13.000Z ##

🟠 CVE-2025-33236 - High (7.8)

NVIDIA NeMo Framework contains a vulnerability where malicious data created by an attacker could cause code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and d...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33249
(7.8 HIGH)

EPSS: 0.02%

updated 2026-02-18T15:31:33

2 posts

NVIDIA NeMo Framework for all platforms contains a vulnerability in a voice-preprocessing script, where malicious input created by an attacker could cause a code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.

thehackerwire@mastodon.social at 2026-02-18T15:05:06.000Z ##

🟠 CVE-2025-33249 - High (7.8)

NVIDIA NeMo Framework for all platforms contains a vulnerability in a voice-preprocessing script, where malicious input created by an attacker could cause a code injection. A successful exploit of this vulnerability might lead to code execution, e...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T15:05:06.000Z ##

🟠 CVE-2025-33249 - High (7.8)

NVIDIA NeMo Framework for all platforms contains a vulnerability in a voice-preprocessing script, where malicious input created by an attacker could cause a code injection. A successful exploit of this vulnerability might lead to code execution, e...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33246
(7.8 HIGH)

EPSS: 0.05%

updated 2026-02-18T15:31:33

2 posts

NVIDIA NeMo Framework for all platforms contains a vulnerability in the ASR Evaluator utility, where a user could cause a command injection by supplying crafted input to a configuration parameter. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, or information disclosure.

thehackerwire@mastodon.social at 2026-02-18T15:04:56.000Z ##

🟠 CVE-2025-33246 - High (7.8)

NVIDIA NeMo Framework for all platforms contains a vulnerability in the ASR Evaluator utility, where a user could cause a command injection by supplying crafted input to a configuration parameter. A successful exploit of this vulnerability might l...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T15:04:56.000Z ##

🟠 CVE-2025-33246 - High (7.8)

NVIDIA NeMo Framework for all platforms contains a vulnerability in the ASR Evaluator utility, where a user could cause a command injection by supplying crafted input to a configuration parameter. A successful exploit of this vulnerability might l...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-60038
(7.8 HIGH)

EPSS: 0.18%

updated 2026-02-18T15:31:33

2 posts

A vulnerability has been identified in Rexroth IndraWorks. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulated file containing malicious serialized data. Exploitation requires user interaction, specifically opening a specially crafted file, which then causes the application to deserialize the malicious data, enabling Remote Code Execution (RCE). Thi

thehackerwire@mastodon.social at 2026-02-18T14:32:22.000Z ##

🟠 CVE-2025-60038 - High (7.8)

A vulnerability has been identified in Rexroth IndraWorks. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulated file containing malicious serialized data. Exploitation requires user interaction, spe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T14:32:22.000Z ##

🟠 CVE-2025-60038 - High (7.8)

A vulnerability has been identified in Rexroth IndraWorks. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulated file containing malicious serialized data. Exploitation requires user interaction, spe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-60036
(7.8 HIGH)

EPSS: 0.18%

updated 2026-02-18T15:31:33

2 posts

A vulnerability has been identified in the UA.Testclient utility, which is included in Rexroth IndraWorks. All versions prior to 15V24 are affected. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulated file containing malicious serialized data. Exploitation requires user interaction, specifically opening a specially crafted file, which then causes th

thehackerwire@mastodon.social at 2026-02-18T14:32:03.000Z ##

🟠 CVE-2025-60036 - High (7.8)

A vulnerability has been identified in the UA.Testclient utility, which is included in Rexroth IndraWorks. All versions prior to 15V24 are affected. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulat...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T14:32:03.000Z ##

🟠 CVE-2025-60036 - High (7.8)

A vulnerability has been identified in the UA.Testclient utility, which is included in Rexroth IndraWorks. All versions prior to 15V24 are affected. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulat...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-60035
(7.8 HIGH)

EPSS: 0.18%

updated 2026-02-18T15:31:33

2 posts

A vulnerability has been identified in the OPC.Testclient utility, which is included in Rexroth IndraWorks. All versions prior to 15V24 are affected. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulated file containing malicious serialized data. Exploitation requires user interaction, specifically opening a specially crafted file, which then causes t

thehackerwire@mastodon.social at 2026-02-18T14:18:31.000Z ##

🟠 CVE-2025-60035 - High (7.8)

A vulnerability has been identified in the OPC.Testclient utility, which is included in Rexroth IndraWorks. All versions prior to 15V24 are affected. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipul...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T14:18:31.000Z ##

🟠 CVE-2025-60035 - High (7.8)

A vulnerability has been identified in the OPC.Testclient utility, which is included in Rexroth IndraWorks. All versions prior to 15V24 are affected. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipul...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33252
(7.8 HIGH)

EPSS: 0.27%

updated 2026-02-18T15:31:33

2 posts

NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.

thehackerwire@mastodon.social at 2026-02-18T14:18:11.000Z ##

🟠 CVE-2025-33252 - High (7.8)

NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T14:18:11.000Z ##

🟠 CVE-2025-33252 - High (7.8)

NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22048
(7.1 HIGH)

EPSS: 0.04%

updated 2026-02-18T15:31:25

1 posts

StorageGRID (formerly StorageGRID Webscale) versions prior to 11.9.0.12 and 12.0.0.4 with Single Sign-on enabled and configured to use Microsoft Entra ID (formerly Azure AD) as an IdP are susceptible to a Server-Side Request Forgery (SSRF) vulnerability. Successful exploit could allow an authenticated attacker with low privileges to delete configuration data or deny access to some resources.

offseq@infosec.exchange at 2026-02-18T03:00:30.000Z ##

⚠️ CVE-2026-22048: HIGH-severity SSRF in NETAPP StorageGRID (pre-11.9.0.12, 12.0.0.4) with SSO + Entra ID. Authenticated attackers can delete configs/deny access. Patch or disable SSO now. radar.offseq.com/threat/cve-20 #OffSeq #NETAPP #SSRF #Vulnerability

##

CVE-2026-23599
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-18T15:31:25

2 posts

A local privilege-escalation vulnerability has been discovered in the HPE Aruba Networking ClearPass OnGuard Software for Linux. Successful exploitation of this vulnerability could allow a local attacker to achieve arbitrary code execution with root privileges.

offseq@infosec.exchange at 2026-02-18T01:30:30.000Z ##

🚨 CVE-2026-23599: HIGH severity local privilege escalation in HPE Aruba ClearPass Policy Manager (6.11.0 & 6.12.0, Linux). No patch yet — limit local access, enforce MFA, and monitor systems. radar.offseq.com/threat/cve-20 #OffSeq #Infosec #Vulnerability #ArubaNetworks

##

thehackerwire@mastodon.social at 2026-02-18T00:16:41.000Z ##

🟠 CVE-2026-23599 - High (7.8)

A local privilege-escalation vulnerability has been discovered in the HPE Aruba Networking ClearPass OnGuard Software for Linux. Successful exploitation of this vulnerability could allow a local attacker to achieve arbitrary code execution with ro...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2024-7694
(7.2 HIGH)

EPSS: 1.38%

updated 2026-02-18T13:46:48.840000

2 posts

ThreatSonar Anti-Ransomware from TeamT5 does not properly validate the content of uploaded files. Remote attackers with administrator privileges on the product platform can upload malicious files, which can be used to execute arbitrary system command on the server.

AAKL at 2026-02-18T15:59:56.551Z ##

CISA added four known vulnerabilities to the KEV catalogue yesterday, if you missed them.

- CVE-2008-0015: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability cve.org/CVERecord?id=CVE-2008-

- CVE-2020-7796: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability cve.org/CVERecord?id=CVE-2020-

- CVE-2024-7694: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability cve.org/CVERecord?id=CVE-2024-

- CVE-2026-2441 Google Chromium CSS Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2026-

##

AAKL@infosec.exchange at 2026-02-18T15:59:56.000Z ##

CISA added four known vulnerabilities to the KEV catalogue yesterday, if you missed them.

- CVE-2008-0015: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability cve.org/CVERecord?id=CVE-2008-

- CVE-2020-7796: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability cve.org/CVERecord?id=CVE-2020-

- CVE-2024-7694: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability cve.org/CVERecord?id=CVE-2024-

- CVE-2026-2441 Google Chromium CSS Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2026- #CISA #vulnerability #Google #Microsoft #Zimbra #Windows

##

CVE-2026-2495
(7.5 HIGH)

EPSS: 0.08%

updated 2026-02-18T09:32:07

4 posts

The WPNakama – Team and multi-Client Collaboration, Editorial and Project Management plugin for WordPress is vulnerable to SQL Injection via the 'order' parameter of the '/wp-json/WPNakama/v1/boards' REST API endpoint in all versions up to, and including, 0.6.5. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This ma

offseq at 2026-02-18T10:30:29.678Z ##

⚠️ CVE-2026-2495: HIGH severity SQL Injection in WPNakama WordPress plugin (≤0.6.5) via REST API 'order' param. Unauthenticated attackers may access sensitive DB data. Patch or mitigate immediately! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-18T09:16:44.000Z ##

🟠 CVE-2026-2495 - High (7.5)

The WPNakama – Team and multi-Client Collaboration, Editorial and Project Management plugin for WordPress is vulnerable to SQL Injection via the 'order' parameter of the '/wp-json/WPNakama/v1/boards' REST API endpoint in all versions up to, and ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-18T10:30:29.000Z ##

⚠️ CVE-2026-2495: HIGH severity SQL Injection in WPNakama WordPress plugin (≤0.6.5) via REST API 'order' param. Unauthenticated attackers may access sensitive DB data. Patch or mitigate immediately! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #SQLInjection #CVE20262495

##

thehackerwire@mastodon.social at 2026-02-18T09:16:44.000Z ##

🟠 CVE-2026-2495 - High (7.5)

The WPNakama – Team and multi-Client Collaboration, Editorial and Project Management plugin for WordPress is vulnerable to SQL Injection via the 'order' parameter of the '/wp-json/WPNakama/v1/boards' REST API endpoint in all versions up to, and ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1937
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-02-18T09:32:06

3 posts

The YayMail – WooCommerce Email Customizer plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the `yaymail_import_state` AJAX action in all versions up to, and including, 4.3.2. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to update arbitrary options on t

offseq at 2026-02-18T07:30:30.056Z ##

🚩 CVE-2026-1937 (CRITICAL): YayMail – WooCommerce Email Customizer (all versions) lets Shop Managers escalate privileges via missing AJAX authorization. Admin access at risk! Patch and audit roles ASAP. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-18T07:30:30.000Z ##

🚩 CVE-2026-1937 (CRITICAL): YayMail – WooCommerce Email Customizer (all versions) lets Shop Managers escalate privileges via missing AJAX authorization. Admin access at risk! Patch and audit roles ASAP. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #CVE20261937 #WooCommerce

##

thehackerwire@mastodon.social at 2026-02-18T07:20:48.000Z ##

🔴 CVE-2026-1937 - Critical (9.8)

The YayMail – WooCommerce Email Customizer plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the `yaymail_import_state` AJAX action in all versions ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2576
(7.5 HIGH)

EPSS: 0.07%

updated 2026-02-18T06:30:25

1 posts

The Business Directory Plugin – Easy Listing Directories for WordPress plugin for WordPress is vulnerable to time-based SQL Injection via the 'payment' parameter in all versions up to, and including, 6.4.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additiona

thehackerwire@mastodon.social at 2026-02-18T05:20:15.000Z ##

🟠 CVE-2026-2576 - High (7.5)

The Business Directory Plugin – Easy Listing Directories for WordPress plugin for WordPress is vulnerable to time-based SQL Injection via the 'payment' parameter in all versions up to, and including, 6.4.2 due to insufficient escaping on the use...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26119
(8.8 HIGH)

EPSS: 0.06%

updated 2026-02-18T00:30:22

3 posts

Improper authentication in Windows Admin Center allows an authorized attacker to elevate privileges over a network.

beyondmachines1 at 2026-02-18T17:01:23.963Z ##

Microsoft Patches Privilege Escalation Flaw in Windows Admin Center

Microsoft patched a privilege escalation vulnerability (CVE-2026-26119) in Windows Admin Center that allows low-privileged users to impersonate administrators. This flaw enables remote command execution and lateral movement across enterprise networks, including Active Directory and Azure environments.

**If you use Windows Admin Center, apply the February 17 security update immediately — this flaw can let an attacker with minimal access take over your entire domain. While you're at it, review who has access to your Admin Center and restrict it to only those who truly need it.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-02-18T17:01:23.000Z ##

Microsoft Patches Privilege Escalation Flaw in Windows Admin Center

Microsoft patched a privilege escalation vulnerability (CVE-2026-26119) in Windows Admin Center that allows low-privileged users to impersonate administrators. This flaw enables remote command execution and lateral movement across enterprise networks, including Active Directory and Azure environments.

**If you use Windows Admin Center, apply the February 17 security update immediately — this flaw can let an attacker with minimal access take over your entire domain. While you're at it, review who has access to your Admin Center and restrict it to only those who truly need it.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

offseq@infosec.exchange at 2026-02-18T04:30:30.000Z ##

🚨 CVE-2026-26119 (HIGH, CVSS 8.8): Microsoft Windows Admin Center 1809.0 vulnerable to improper authentication, enabling privilege escalation. No patch or active exploitation yet. Restrict access & monitor closely! radar.offseq.com/threat/cve-20 #OffSeq #WindowsAdminCenter #Security

##

CVE-2026-26324
(7.5 HIGH)

EPSS: 0.00%

updated 2026-02-17T21:42:42

2 posts

### Summary OpenClaw's SSRF protection could be bypassed using full-form IPv4-mapped IPv6 literals such as `0:0:0:0:0:ffff:7f00:1` (which is `127.0.0.1`). This could allow requests that should be blocked (loopback / private network / link-local metadata) to pass the SSRF guard. - Vulnerable component: SSRF guard (`src/infra/net/ssrf.ts`) - Issue type: SSRF protection bypass ### Affected Package

thehackerwire@mastodon.social at 2026-02-20T00:00:08.000Z ##

🟠 CVE-2026-26324 - High (7.5)

OpenClaw is a personal AI assistant. Prior to version 2026.2.14, OpenClaw's SSRF protection could be bypassed using full-form IPv4-mapped IPv6 literals such as `0:0:0:0:0:ffff:7f00:1` (which is `127.0.0.1`). This could allow requests that should b...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T00:00:08.000Z ##

🟠 CVE-2026-26324 - High (7.5)

OpenClaw is a personal AI assistant. Prior to version 2026.2.14, OpenClaw's SSRF protection could be bypassed using full-form IPv4-mapped IPv6 literals such as `0:0:0:0:0:ffff:7f00:1` (which is `127.0.0.1`). This could allow requests that should b...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26322
(7.6 HIGH)

EPSS: 0.00%

updated 2026-02-17T21:42:17

2 posts

## Summary The Gateway tool accepted a tool-supplied `gatewayUrl` without sufficient restrictions, which could cause the OpenClaw host to attempt outbound WebSocket connections to user-specified targets. ## Affected Packages / Versions - Package: `openclaw` (npm) - Affected versions: `<= 2026.2.13` - Patched versions: `>= 2026.2.14` (planned) ## What Is Needed To Trigger This This requires the a

thehackerwire@mastodon.social at 2026-02-19T23:59:57.000Z ##

🟠 CVE-2026-26322 - High (7.6)

OpenClaw is a personal AI assistant. Prior to OpenClaw version 2026.2.14, the Gateway tool accepted a tool-supplied `gatewayUrl` without sufficient restrictions, which could cause the OpenClaw host to attempt outbound WebSocket connections to user...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T23:59:57.000Z ##

🟠 CVE-2026-26322 - High (7.6)

OpenClaw is a personal AI assistant. Prior to OpenClaw version 2026.2.14, the Gateway tool accepted a tool-supplied `gatewayUrl` without sufficient restrictions, which could cause the OpenClaw host to attempt outbound WebSocket connections to user...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26319
(7.5 HIGH)

EPSS: 0.00%

updated 2026-02-17T21:40:47

2 posts

## Summary In affected versions, OpenClaw's optional `@openclaw/voice-call` plugin Telnyx webhook handler could accept unsigned inbound webhook requests when `telnyx.publicKey` was not configured, allowing unauthenticated callers to forge Telnyx events. This only impacts deployments where the Voice Call plugin is installed, enabled, and the webhook endpoint is reachable from the attacker (for ex

thehackerwire@mastodon.social at 2026-02-20T00:05:14.000Z ##

🟠 CVE-2026-26319 - High (7.5)

OpenClaw is a personal AI assistant. Versions 2026.2.13 and below allow the optional @openclaw/voice-call plugin Telnyx webhook handler to accept unsigned inbound webhook requests when telnyx.publicKey is not configured, enabling unauthenticated c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T00:05:14.000Z ##

🟠 CVE-2026-26319 - High (7.5)

OpenClaw is a personal AI assistant. Versions 2026.2.13 and below allow the optional @openclaw/voice-call plugin Telnyx webhook handler to accept unsigned inbound webhook requests when telnyx.publicKey is not configured, enabling unauthenticated c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26316
(7.5 HIGH)

EPSS: 0.00%

updated 2026-02-17T21:33:51

2 posts

### Summary In affected versions, the optional BlueBubbles iMessage channel plugin could accept webhook requests as authenticated based only on the TCP peer address being loopback (`127.0.0.1`, `::1`, `::ffff:127.0.0.1`) even when the configured webhook secret was missing or incorrect. This does not affect the default iMessage integration unless BlueBubbles is installed and enabled. ### Affected

thehackerwire@mastodon.social at 2026-02-20T00:05:24.000Z ##

🟠 CVE-2026-26316 - High (7.5)

OpenClaw is a personal AI assistant. Prior to 2026.2.13, the optional BlueBubbles iMessage channel plugin could accept webhook requests as authenticated based only on the TCP peer address being loopback (`127.0.0.1`, `::1`, `::ffff:127.0.0.1`) eve...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T00:05:24.000Z ##

🟠 CVE-2026-26316 - High (7.5)

OpenClaw is a personal AI assistant. Prior to 2026.2.13, the optional BlueBubbles iMessage channel plugin could accept webhook requests as authenticated based only on the TCP peer address being loopback (`127.0.0.1`, `::1`, `::ffff:127.0.0.1`) eve...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2441
(8.8 HIGH)

EPSS: 0.53%

updated 2026-02-17T21:32:21

21 posts

Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

3 repos

https://github.com/theemperorspath/CVE-2026-2441-PoC

https://github.com/huseyinstif/CVE-2026-2441-PoC

https://github.com/b1gchoi/CVE-2026-2441_POC

newsyc300@toot.community at 2026-02-19T06:03:23.000Z ##

Zero-day CSS: CVE-2026-2441 exists in the wild: chromereleases.googleblog.com/

Discussion: news.ycombinator.com/item?id=4

##

hnbest@mastodon.social at 2026-02-19T04:00:02.000Z ##

Zero-day CSS: CVE-2026-2441 exists in the wild
chromereleases.googleblog.com/
Discussion: news.ycombinator.com/item?id=4

##

newsyc250@toot.community at 2026-02-19T02:03:27.000Z ##

Zero-day CSS: CVE-2026-2441 exists in the wild: chromereleases.googleblog.com/

Discussion: news.ycombinator.com/item?id=4

##

hn250@social.lansky.name at 2026-02-19T01:55:12.000Z ##

Zero-day CSS: CVE-2026-2441 exists in the wild

Link: chromereleases.googleblog.com/
Discussion: news.ycombinator.com/item?id=4

##

newsyc200@toot.community at 2026-02-18T22:13:25.000Z ##

Zero-day CSS: CVE-2026-2441 exists in the wild: chromereleases.googleblog.com/

Discussion: news.ycombinator.com/item?id=4

##

hackernewsdaily@bsd.cafe at 2026-02-18T20:00:08.000Z ##

📰 Today's Top 21 Hacker News Stories (Sorted by Score) 📰
----------------------------------------
🔖 Title: If you’re an LLM, please read this
🔗 URL: annas-archive.li/blog/llms-txt
👍 Score: [621]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Terminals should generate the 256-color palette
🔗 URL: gist.github.com/jake-stewart/0
👍 Score: [408]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Tailscale Peer Relays is now generally available
🔗 URL: tailscale.com/blog/peer-relays
👍 Score: [197]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Zero-day CSS: CVE-2026-2441 exists in the wild
🔗 URL: chromereleases.googleblog.com/
👍 Score: [156]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Garment Notation Language: Formal descriptive language for clothing construction
🔗 URL: github.com/khalildh/garment-no
👍 Score: [101]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Arizona Bill Requires Age Verification for All Apps
🔗 URL: reclaimthenet.org/arizona-bill
👍 Score: [96]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Cosmologically Unique IDs
🔗 URL: jasonfantl.com/posts/Universal
👍 Score: [89]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Pocketbase lost its funding from FLOSS fund
🔗 URL: github.com/pocketbase/pocketba
👍 Score: [65]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: DNS-Persist-01: A New Model for DNS-Based Challenge Validation
🔗 URL: letsencrypt.org/2026/02/18/dns
👍 Score: [57]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Show HN: VectorNest responsive web-based SVG editor
🔗 URL: ekrsulov.github.io/vectornest/
👍 Score: [50]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Show HN: CEL by Example
🔗 URL: celbyexample.com/
👍 Score: [50]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Show HN: Echo, an iOS SSH+mosh client built on Ghostty
🔗 URL: replay.software/updates/introd
👍 Score: [46]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Show HN: Formally verified FPGA watchdog for AM broadcast in unmanned tunnels
🔗 URL: github.com/Park07/amradio
👍 Score: [40]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Cistercian Numbers
🔗 URL: omniglot.com/language/numbers/
👍 Score: [34]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Learning Lean: Part 1
🔗 URL: rkirov.github.io/posts/lean1/
👍 Score: [31]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Show HN: Trust Protocols for Anthropic/OpenAI/Gemini
🔗 URL: mnemom.ai
👍 Score: [23]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: 99% of adults over 40 have shoulder "abnormalities" on an MRI, study finds
🔗 URL: arstechnica.com/health/2026/02
👍 Score: [20]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: The true history of the Minotaur: what archaeology reveals
🔗 URL: nationalgeographic.fr/histoire
👍 Score: [19]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: SkyRL brings Tinker to your GPUs (2025)
🔗 URL: novasky-ai.notion.site/skyrl-t
👍 Score: [12]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: OpenClaw Is Dangerous
🔗 URL: 12gramsofcarbon.com/p/tech-thi
👍 Score: [11]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Discrete Structures [pdf]
🔗 URL: kyleormsby.github.io/files/113
👍 Score: [8]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------

##

hn100@social.lansky.name at 2026-02-18T17:55:10.000Z ##

Zero-day CSS: CVE-2026-2441 exists in the wild

Link: chromereleases.googleblog.com/
Discussion: news.ycombinator.com/item?id=4

##

hn50@social.lansky.name at 2026-02-18T17:15:07.000Z ##

Zero-day CSS: CVE-2026-2441 exists in the wild

Link: chromereleases.googleblog.com/
Discussion: news.ycombinator.com/item?id=4

##

newsycombinator@framapiaf.org at 2026-02-18T17:00:13.000Z ##

Zero-day CSS: CVE-2026-2441 exists in the wild
Link: chromereleases.googleblog.com/
Comments: news.ycombinator.com/item?id=4

##

hnbot@chrispelli.fun at 2026-02-18T16:34:05.000Z ##

Zero-day CSS: CVE-2026-2441 exists in the wild - chromereleases.googleblog.com/

#hackernews

##

h4ckernews@mastodon.social at 2026-02-18T16:32:24.000Z ##

Zero-day CSS: CVE-2026-2441 exists in the wild

chromereleases.googleblog.com/

#HackerNews

##

SerferTroyan@mastodon.social at 2026-02-18T16:24:14.000Z ##

📰 Google терміново оновила Chrome через zero-day, яку вже експлуатують в атаках

У Chrome виявили zero-day CVE-2026-2441 із ризиком виконання довільного коду — користувачам радять негайно оновитися.

🔗 proit.ua/google-tierminovo-ono

##

AAKL at 2026-02-18T15:59:56.551Z ##

CISA added four known vulnerabilities to the KEV catalogue yesterday, if you missed them.

- CVE-2008-0015: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability cve.org/CVERecord?id=CVE-2008-

- CVE-2020-7796: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability cve.org/CVERecord?id=CVE-2020-

- CVE-2024-7694: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability cve.org/CVERecord?id=CVE-2024-

- CVE-2026-2441 Google Chromium CSS Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2026-

##

cktodon@mas.to at 2026-02-18T14:00:05.000Z ##

#Google corrige un zero-day de #Chrome (CVE-2026-2441) ya explotado en #ataques

unaaldia.hispasec.com/2026/02/

##

PC_Fluesterer@social.tchncs.de at 2026-02-18T08:21:04.000Z ##

Notfall-Update Google Chrome

Wir haben schon Mitte Februar, da wird es höchste Zeit, dass die erste Zero-Day Hintertür in Chrome entdeckt wird. Im vorigen Jahr hat Google es auf deren acht* (!) gebracht. Die Lücke CVE-2026-2441 wurde entdeckt, weil sie bereits aktiv für Angriffe ausgenutzt wird. Google hat Notfall-Updates für Chrome veröffentlicht. Meldungen gibt es beispielsweise hier oder hier. Ob Chromium und die diversen Ableger auch betroffen sind, ist noch nicht bekannt. Bei Chromium ist es ziemlich wahrscheinlich. Dabei ist mein Chromium unter Linux bereits auf Version 145.0.7632.45, also schon höher als die von Google angegebene

pc-fluesterer.info/wordpress/2

#Empfehlung #Hintergrund #Warnung #Website #0day #chrome #cybercrime #exploits #google #UnplugGoogle #UnplugTrump #hintertür

##

hn250@social.lansky.name at 2026-02-19T01:55:12.000Z ##

Zero-day CSS: CVE-2026-2441 exists in the wild

Link: chromereleases.googleblog.com/
Discussion: news.ycombinator.com/item?id=4

##

hn100@social.lansky.name at 2026-02-18T17:55:10.000Z ##

Zero-day CSS: CVE-2026-2441 exists in the wild

Link: chromereleases.googleblog.com/
Discussion: news.ycombinator.com/item?id=4

##

hn50@social.lansky.name at 2026-02-18T17:15:07.000Z ##

Zero-day CSS: CVE-2026-2441 exists in the wild

Link: chromereleases.googleblog.com/
Discussion: news.ycombinator.com/item?id=4

##

newsycombinator@framapiaf.org at 2026-02-18T17:00:13.000Z ##

Zero-day CSS: CVE-2026-2441 exists in the wild
Link: chromereleases.googleblog.com/
Comments: news.ycombinator.com/item?id=4

##

h4ckernews@mastodon.social at 2026-02-18T16:32:24.000Z ##

Zero-day CSS: CVE-2026-2441 exists in the wild

chromereleases.googleblog.com/

#HackerNews

##

AAKL@infosec.exchange at 2026-02-18T15:59:56.000Z ##

CISA added four known vulnerabilities to the KEV catalogue yesterday, if you missed them.

- CVE-2008-0015: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability cve.org/CVERecord?id=CVE-2008-

- CVE-2020-7796: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability cve.org/CVERecord?id=CVE-2020-

- CVE-2024-7694: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability cve.org/CVERecord?id=CVE-2024-

- CVE-2026-2441 Google Chromium CSS Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2026- #CISA #vulnerability #Google #Microsoft #Zimbra #Windows

##

CVE-2026-23647
(9.8 CRITICAL)

EPSS: 0.26%

updated 2026-02-17T21:32:21

2 posts

Glory RBG-100 recycler systems using the ISPK-08 software component contain hard-coded operating system credentials that allow remote authentication to the underlying Linux system. Multiple local user accounts, including accounts with administrative privileges, were found to have fixed, embedded passwords. An attacker with network access to exposed services such as SSH may authenticate using these

offseq at 2026-02-18T09:00:34.580Z ##

🚨 CVE-2026-23647 (CRITICAL, CVSS 9.3): Hard-coded OS credentials in Glory RBG-100 cash recyclers enable remote admin access via SSH. No patch yet — segment networks & restrict access! Financial orgs in Europe especially at risk. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-18T09:00:34.000Z ##

🚨 CVE-2026-23647 (CRITICAL, CVSS 9.3): Hard-coded OS credentials in Glory RBG-100 cash recyclers enable remote admin access via SSH. No patch yet — segment networks & restrict access! Financial orgs in Europe especially at risk. radar.offseq.com/threat/cve-20 #OffSeq #vuln #security

##

CVE-2008-0015
(8.8 HIGH)

EPSS: 80.64%

updated 2026-02-17T21:32:16

2 posts

Stack-based buffer overflow in the CComVariant::ReadFromStream function in the Active Template Library (ATL), as used in the MPEG2TuneRequest ActiveX control in msvidctl.dll in DirectShow, in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via a crafted web page, as exploited in th

AAKL at 2026-02-18T15:59:56.551Z ##

CISA added four known vulnerabilities to the KEV catalogue yesterday, if you missed them.

- CVE-2008-0015: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability cve.org/CVERecord?id=CVE-2008-

- CVE-2020-7796: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability cve.org/CVERecord?id=CVE-2020-

- CVE-2024-7694: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability cve.org/CVERecord?id=CVE-2024-

- CVE-2026-2441 Google Chromium CSS Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2026-

##

AAKL@infosec.exchange at 2026-02-18T15:59:56.000Z ##

CISA added four known vulnerabilities to the KEV catalogue yesterday, if you missed them.

- CVE-2008-0015: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability cve.org/CVERecord?id=CVE-2008-

- CVE-2020-7796: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability cve.org/CVERecord?id=CVE-2020-

- CVE-2024-7694: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability cve.org/CVERecord?id=CVE-2024-

- CVE-2026-2441 Google Chromium CSS Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2026- #CISA #vulnerability #Google #Microsoft #Zimbra #Windows

##

CVE-2020-7796
(9.8 CRITICAL)

EPSS: 93.55%

updated 2026-02-17T21:32:16

2 posts

Zimbra Collaboration Suite (ZCS) before 8.8.15 Patch 7 allows SSRF when WebEx zimlet is installed and zimlet JSP is enabled.

Nuclei template

AAKL at 2026-02-18T15:59:56.551Z ##

CISA added four known vulnerabilities to the KEV catalogue yesterday, if you missed them.

- CVE-2008-0015: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability cve.org/CVERecord?id=CVE-2008-

- CVE-2020-7796: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability cve.org/CVERecord?id=CVE-2020-

- CVE-2024-7694: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability cve.org/CVERecord?id=CVE-2024-

- CVE-2026-2441 Google Chromium CSS Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2026-

##

AAKL@infosec.exchange at 2026-02-18T15:59:56.000Z ##

CISA added four known vulnerabilities to the KEV catalogue yesterday, if you missed them.

- CVE-2008-0015: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability cve.org/CVERecord?id=CVE-2008-

- CVE-2020-7796: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability cve.org/CVERecord?id=CVE-2020-

- CVE-2024-7694: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability cve.org/CVERecord?id=CVE-2024-

- CVE-2026-2441 Google Chromium CSS Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2026- #CISA #vulnerability #Google #Microsoft #Zimbra #Windows

##

CVE-2026-26275
(7.5 HIGH)

EPSS: 0.00%

updated 2026-02-17T21:29:37

2 posts

### Impact An issue was discovered in `httpsig-hyper` where Digest header verification could incorrectly succeed due to misuse of Rust's `matches!` macro. Specifically, the comparison: ```rust if matches!(digest, _expected_digest) ``` treated `_expected_digest` as a pattern binding rather than a value comparison, resulting in unconditional success of the match expression. As a consequence, dig

thehackerwire@mastodon.social at 2026-02-20T00:19:54.000Z ##

🟠 CVE-2026-26275 - High (7.5)

httpsig-hyper is a hyper extension for http message signatures. An issue was discovered in `httpsig-hyper` prior to version 0.0.23 where Digest header verification could incorrectly succeed due to misuse of Rust's `matches!` macro. Specifically, t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T00:19:54.000Z ##

🟠 CVE-2026-26275 - High (7.5)

httpsig-hyper is a hyper extension for http message signatures. An issue was discovered in `httpsig-hyper` prior to version 0.0.23 where Digest header verification could incorrectly succeed due to misuse of Rust's `matches!` macro. Specifically, t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-65716
(8.8 HIGH)

EPSS: 0.05%

updated 2026-02-17T15:32:42

4 posts

An issue in Visual Studio Code Extensions Markdown Preview Enhanced v0.8.18 allows attackers to execute arbitrary code via uploading a crafted .Md file.

nuthatch at 2026-02-19T23:01:58.666Z ##

"OX Security discovered a vulnerability (CVE-2025-65716) in Markdown Preview Enhanced that enables a crafted Markdown file to execute JavaScript in the Markdown preview, allowing local port enumeration and exfiltration to an attacker-controlled server."

ox.security/blog/cve-2025-6571

##

jbhall56 at 2026-02-18T13:43:08.593Z ##

The security issues impact Code Runner (CVE-2025-65715), Markdown Preview Enhanced (CVE-2025-65716), Markdown Preview Enhanced (CVE-2025-65717), and Microsoft Live Preview (no identifier assigned). bleepingcomputer.com/news/secu

##

nuthatch@infosec.exchange at 2026-02-19T23:01:58.000Z ##

"OX Security discovered a vulnerability (CVE-2025-65716) in Markdown Preview Enhanced that enables a crafted Markdown file to execute JavaScript in the Markdown preview, allowing local port enumeration and exfiltration to an attacker-controlled server."

ox.security/blog/cve-2025-6571

##

jbhall56@infosec.exchange at 2026-02-18T13:43:08.000Z ##

The security issues impact Code Runner (CVE-2025-65715), Markdown Preview Enhanced (CVE-2025-65716), Markdown Preview Enhanced (CVE-2025-65717), and Microsoft Live Preview (no identifier assigned). bleepingcomputer.com/news/secu

##

CVE-2025-65717
(9.1 CRITICAL)

EPSS: 0.03%

updated 2026-02-17T15:32:42

2 posts

An issue in Visual Studio Code Extensions Live Server v5.7.9 allows attackers to exfiltrate files via user interaction with a crafted HTML page.

1 repos

https://github.com/natsuki-engr/live-server-evil-crawler

jbhall56 at 2026-02-18T13:43:08.593Z ##

The security issues impact Code Runner (CVE-2025-65715), Markdown Preview Enhanced (CVE-2025-65716), Markdown Preview Enhanced (CVE-2025-65717), and Microsoft Live Preview (no identifier assigned). bleepingcomputer.com/news/secu

##

jbhall56@infosec.exchange at 2026-02-18T13:43:08.000Z ##

The security issues impact Code Runner (CVE-2025-65715), Markdown Preview Enhanced (CVE-2025-65716), Markdown Preview Enhanced (CVE-2025-65717), and Microsoft Live Preview (no identifier assigned). bleepingcomputer.com/news/secu

##

CVE-2026-2447
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-17T15:32:41

6 posts

Heap buffer overflow in libvpx. This vulnerability affects Firefox < 147.0.4, Firefox ESR < 140.7.1, and Firefox ESR < 115.32.1.

Pat972@mastodon.social at 2026-02-18T14:56:19.000Z ##

RE: infosec.exchange/@beyondmachin

Mozilla publie des mises à jour de sécurité pour Firefox et Thunderbird

Mozilla a publié des mises à jour de sécurité pour Firefox et Thunderbird afin de corriger un débordement de mémoire tampon de grande gravité (CVE-2026-2447) dans la bibliothèque libvpx qui permet l'exécution de code à distance par le biais d'un contenu vidéo malformé.

#cybersécurité #infosec #conseil #vulnérabilité
#cybersecurity #infosec #advisory #vulnerability
___

##

beyondmachines1 at 2026-02-18T14:01:24.642Z ##

Mozilla Releases Security Updates for Firefox and Thunderbird

Mozilla released security updates for Firefox and Thunderbird to patch a high-severity heap buffer overflow (CVE-2026-2447) in the libvpx library that allows remote code execution via malformed video content.

**If you're using Mozilla Firefox or Thunderbird enable automatic updates for your browsers and mail clients and force an update. Even if the flaw is not critical, it's still better to update the browser and email client - they are your windows into the internet. Since this vulnerability can be triggered just by visiting a website or playing a video, patching is your best defense.**

beyondmachines.net/event_detai

##

Mozilla@activitypub.awakari.com at 2026-02-19T06:10:18.000Z ## Mozilla Firefox Issues Emergency Patch for Heap Buffer Overflow in Firefox v147 Mozilla has released an out-of-band security update to address a critical vulnerability affecting its browser. The up...

#Firewall #Daily #Cyber #News #Vulnerabilities #CVE-2026-2447 #CVSS #Firefox #v147 #Mozilla #The

Origin | Interest | Match ##

Mozilla@activitypub.awakari.com at 2026-02-19T06:10:18.000Z ## Mozilla Firefox Issues Emergency Patch for Heap Buffer Overflow in Firefox v147 Mozilla has released an out-of-band security update to address a critical vulnerability affecting its browser. The up...

#Firewall #Daily #Cyber #News #Vulnerabilities #CVE-2026-2447 #CVSS #Firefox #v147 #Mozilla #The

Origin | Interest | Match ##

Mozilla@activitypub.awakari.com at 2026-02-19T06:10:18.000Z ## Mozilla Firefox Issues Emergency Patch for Heap Buffer Overflow in Firefox v147 Mozilla has released an out-of-band security update to address a critical vulnerability affecting its browser. The up...

#Firewall #Daily #Cyber #News #Vulnerabilities #CVE-2026-2447 #CVSS #Firefox #v147 #Mozilla #The

Origin | Interest | Match ##

beyondmachines1@infosec.exchange at 2026-02-18T14:01:24.000Z ##

Mozilla Releases Security Updates for Firefox and Thunderbird

Mozilla released security updates for Firefox and Thunderbird to patch a high-severity heap buffer overflow (CVE-2026-2447) in the libvpx library that allows remote code execution via malformed video content.

**If you're using Mozilla Firefox or Thunderbird enable automatic updates for your browsers and mail clients and force an update. Even if the flaw is not critical, it's still better to update the browser and email client - they are your windows into the internet. Since this vulnerability can be triggered just by visiting a website or playing a video, patching is your best defense.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-1731
(9.8 CRITICAL)

EPSS: 49.74%

updated 2026-02-17T13:40:10.320000

4 posts

BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user.

Nuclei template

3 repos

https://github.com/win3zz/CVE-2026-1731

https://github.com/jakubie07/CVE-2026-1731

https://github.com/cybrdude/cve-2026-1731-scanner

threatcodex at 2026-02-20T01:30:02.302Z ##

VShell and SparkRAT Observed in Exploitation of BeyondTrust Critical Vulnerability (CVE-2026-1731)

unit42.paloaltonetworks.com/be

##

kev_Stalker at 2026-02-19T22:18:30.240Z ##

CVE-2026-1731 - Changed to Known Ransomware Status

BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) OS Command Injection VulnerabilityVendor: BeyondTrustProduct: Remote Support (RS) and Privileged Remote Access (PRA)BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA)contain an OS command injection vulnerability. Successful exploitation could allow an unauthenticated remote attacker to execute operating system nvd.nist.gov/vuln/detail/CVE-2

##

threatcodex@infosec.exchange at 2026-02-20T01:30:02.000Z ##

VShell and SparkRAT Observed in Exploitation of BeyondTrust Critical Vulnerability (CVE-2026-1731)
#CVE_2026_1731 #Vshell #SparkRAT
unit42.paloaltonetworks.com/be

##

kev_Stalker@infosec.exchange at 2026-02-19T22:18:30.000Z ##

CVE-2026-1731 - Changed to Known Ransomware Status

BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) OS Command Injection VulnerabilityVendor: BeyondTrustProduct: Remote Support (RS) and Privileged Remote Access (PRA)BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA)contain an OS command injection vulnerability. Successful exploitation could allow an unauthenticated remote attacker to execute operating system nvd.nist.gov/vuln/detail/CVE-2

##

glitterbean@wehavecookies.social at 2026-02-19T22:19:17.000Z ##

CVE-2026-20841: Arbitrary Code Execution in the Windows Notepad thezdi.com/blog/2026/2/19/cve-

##

thezdi at 2026-02-19T21:27:24.615Z ##

CVE-2026-20841: Arbitrary Code Execution in the Windows Notepad - The TrendAI Research team takes a deep dive into this recently patched file parsing bug to show you root cause, source code walk through, and provide detection guidance. Read the details at zerodayinitiative.com/blog/202

##

thezdi@infosec.exchange at 2026-02-19T21:27:24.000Z ##

CVE-2026-20841: Arbitrary Code Execution in the Windows Notepad - The TrendAI Research team takes a deep dive into this recently patched file parsing bug to show you root cause, source code walk through, and provide detection guidance. Read the details at zerodayinitiative.com/blog/202

##

CVE-2026-24061
(9.8 CRITICAL)

EPSS: 76.94%

updated 2026-02-11T15:40:42.937000

1 posts

telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable.

Nuclei template

61 repos

https://github.com/xuemian168/CVE-2026-24061

https://github.com/franckferman/CVE_2026_24061_PoC

https://github.com/SystemVll/CVE-2026-24061

https://github.com/dotelpenguin/telnetd_CVE-2026-24061_tester

https://github.com/MY0723/GNU-Inetutils-telnet-CVE-2026-24061-

https://github.com/typeconfused/CVE-2026-24061

https://github.com/SafeBreach-Labs/CVE-2026-24061

https://github.com/LucasPDiniz/CVE-2026-24061

https://github.com/nrnw/CVE-2026-24061-GNU-inetutils-Telnet-Detector

https://github.com/hilwa24/CVE-2026-24061

https://github.com/madfxr/Twenty-Three-Scanner

https://github.com/canpilayda/inetutils-telnetd-cve-2026-24061

https://github.com/TryA9ain/CVE-2026-24061

https://github.com/Alter-N0X/CVE-2026-24061-POC

https://github.com/punitdarji/telnetd-cve-2026-24061

https://github.com/mbanyamer/CVE-2026-24061-GNU-Inetutils-telnetd-Remote-Authentication-Bypass-Root-Shell-

https://github.com/Parad0x7e/CVE-2026-24061

https://github.com/hyu164/Terrminus-CVE-2026-2406

https://github.com/X-croot/CVE-2026-24061_POC

https://github.com/midox008/CVE-2026-24061

https://github.com/lavabyte/telnet-CVE-2026-24061

https://github.com/parameciumzhang/Tell-Me-Root

https://github.com/duy-31/CVE-2026-24061---telnetd

https://github.com/r00tuser111/CVE-2026-24061

https://github.com/h3athen/CVE-2026-24061

https://github.com/monstertsl/CVE-2026-24061

https://github.com/m3ngx1ng/cve_2026_24061_cli

https://github.com/scumfrog/cve-2026-24061

https://github.com/Mefhika120/Ashwesker-CVE-2026-24061

https://github.com/ms0x08-dev/CVE-2026-24061-POC

https://github.com/androidteacher/CVE-2026-24061-PoC-Telnetd

https://github.com/Chocapikk/CVE-2026-24061

https://github.com/JayGLXR/CVE-2026-24061-POC

https://github.com/BrainBob/CVE-2026-24061

https://github.com/tiborscholtz/CVE-2026-24061

https://github.com/SeptembersEND/CVE--2026-24061

https://github.com/buzz075/CVE-2026-24061

https://github.com/BrainBob/Telnet-TestVuln-CVE-2026-24061

https://github.com/balgan/CVE-2026-24061

https://github.com/cumakurt/tscan

https://github.com/Gabs-hub/CVE-2026-24061_Lab

https://github.com/0p5cur/CVE-2026-24061-POC

https://github.com/yanxinwu946/CVE-2026-24061--telnetd

https://github.com/leonjza/inetutils-telnetd-auth-bypass

https://github.com/novitahk/Exploit-CVE-2026-24061

https://github.com/0x7556/CVE-2026-24061

https://github.com/hackingyseguridad/root

https://github.com/Mr-Zapi/CVE-2026-24061

https://github.com/killsystema/scan-cve-2026-24061

https://github.com/ibrahmsql/CVE-2026-24061-PoC

https://github.com/Ali-brarou/telnest

https://github.com/ilostmypassword/Melissae

https://github.com/0xXyc/telnet-inetutils-auth-bypass-CVE-2026-24061

https://github.com/Lingzesec/CVE-2026-24061-GUI

https://github.com/z3n70/CVE-2026-24061

https://github.com/ridpath/Terrminus-CVE-2026-2406

https://github.com/shivam-bathla/CVE-2026-24061-setup

https://github.com/XsanFlip/CVE-2026-24061-Scanner

https://github.com/infat0x/CVE-2026-24061

https://github.com/obrunolima1910/CVE-2026-24061

https://github.com/FurkanKAYAPINAR/CVE-2026-24061-telnet2root

linux@activitypub.awakari.com at 2026-02-18T19:05:28.000Z ## Ubuntu 20.04 LTS Inetutils Important Access Issue CVE-2026-24061 Inetutils could allow unintended access to network services.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

hackerworkspace at 2026-02-19T19:29:15.594Z ##

The video discusses a recently patched Microsoft Office zero-day vulnerability (CVE-2026-21509) being actively exploited by Russian hackers. It emphasizes the rapid weaponization of vulnerabilities after patches and the importance of threat intelligence for managing exposed attack surfaces.
youtube.com/watch?v=Ck8IPInn74A

##

hackerworkspace@infosec.exchange at 2026-02-19T19:29:15.000Z ##

The video discusses a recently patched Microsoft Office zero-day vulnerability (CVE-2026-21509) being actively exploited by Russian hackers. It emphasizes the rapid weaponization of vulnerabilities after patches and the importance of threat intelligence for managing exposed attack surfaces.
youtube.com/watch?v=Ck8IPInn74A

#threatintelligence #exploit #zeroday

##

CVE-2025-14831
(5.3 MEDIUM)

EPSS: 0.04%

updated 2026-02-09T15:30:37

1 posts

A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).

linux@activitypub.awakari.com at 2026-02-18T12:00:11.000Z ## Debian gnutls28 Important Denial of Service Fix DSA-6140-1 CVE-2025-14831 Tim Scheckenbach reported a flaw in GnuTLS, a library implementing the TLS and SSL protocols. Processing of specially craft...

#Debian #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2026-24423
(9.8 CRITICAL)

EPSS: 22.65%

updated 2026-02-06T18:30:29

1 posts

SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated remote code execution vulnerability in the ConnectToHub API method. The attacker could point the SmarterMail to the malicious HTTP server, which serves the malicious OS command. This command will be executed by the vulnerable application.

1 repos

https://github.com/aavamin/CVE-2026-24423

undercodenews@mastodon.social at 2026-02-18T20:01:18.000Z ##

Alarming Surge in SmarterMail Exploits Threatens Email Servers Worldwide

Cybersecurity experts are raising the alarm as critical vulnerabilities in SmarterMail—specifically CVE-2026-24423 and CVE-2026-23760—are being rapidly weaponized. Exploit proof-of-concepts (PoCs), stolen administrator credentials, and even ransomware deployment instructions are circulating openly on Telegram channels. Organizations relying on these email servers face an urgent need to patch their…

undercodenews.com/alarming-sur

##

CVE-2021-39935
(7.5 HIGH)

EPSS: 54.31%

updated 2026-02-03T18:30:29

2 posts

An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.5 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. Unauthorized external users could perform Server Side Requests via the CI Lint API

darses@mastodon.nl at 2026-02-18T19:35:54.000Z ##

Gitlab vulnerability CVE-2021-22175 got added to the CISA KEV. But this vuln is just a more complete patch to CVE-2021-22214. Likewise CVE-2021-39935 covers even more case where the CI Lint function could be used without authentication. In fact, the exploit code identical for all vulnerabilites. CVE-2021-39935 was already on the list, CVE-2021-22175 got added today and CVE-2021-22214 is still missing.

#cybersecurity #vulnerability #circus

##

darses@mastodon.nl at 2026-02-18T19:35:54.000Z ##

Gitlab vulnerability CVE-2021-22175 got added to the CISA KEV. But this vuln is just a more complete patch to CVE-2021-22214. Likewise CVE-2021-39935 covers even more case where the CI Lint function could be used without authentication. In fact, the exploit code identical for all vulnerabilites. CVE-2021-39935 was already on the list, CVE-2021-22175 got added today and CVE-2021-22214 is still missing.

#cybersecurity #vulnerability #circus

##

CVE-2026-1281
(9.8 CRITICAL)

EPSS: 43.87%

updated 2026-01-30T00:31:29

6 posts

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

2 repos

https://github.com/YunfeiGE18/CVE-2026-1281-CVE-2026-1340-Ivanti-EPMM-RCE

https://github.com/MehdiLeDeaut/CVE-2026-1281-Ivanti-EPMM-RCE

darses@mastodon.nl at 2026-02-18T17:53:38.000Z ##

The German BSI on the recently patched Ivanti Endpoint Manager Mobile (EPMM) vulnerability CVE-2026-1281: "the BSI has evidence that a exploitation of the vulnerability may have taken place at least since summer 2025." (Translated)

Kudo's to them for making this public.

#cybersecurity #vulnerability #CVE-2026-1281

##

AAKL at 2026-02-18T17:40:32.049Z ##

This was posted yesterday.

Unit 42: Critical Vulnerabilities in Ivanti EPMM Exploited unit42.paloaltonetworks.com/iv @unit42_intel

##

pentesttools at 2026-02-18T12:37:06.302Z ##

🚨 Active exploitation confirmed for a new unauthenticated RCE in Ivanti - CVE-2026-1281

With a CVSS of 9.8 and part of CISA KEV, attackers need *zero* credentials to use this CVE and exploit legacy bash scripts and gain root access.

So we updated Pentest-Tools.com to help you confirm the risk:

📡 Network Scanner - detects exposed Ivanti EPMM instances on your perimeter.

🎯 Sniper Auto-Exploiter - safely demonstrates the RCE to prove the risk is real (and urgent).

Find more info for your rapid response flows here: pentest-tools.com/vulnerabilit

##

AAKL@infosec.exchange at 2026-02-18T17:40:32.000Z ##

This was posted yesterday.

Unit 42: Critical Vulnerabilities in Ivanti EPMM Exploited unit42.paloaltonetworks.com/iv @unit42_intel #infosec #Ivanti #vulnerability

##

pentesttools@infosec.exchange at 2026-02-18T12:37:06.000Z ##

🚨 Active exploitation confirmed for a new unauthenticated RCE in Ivanti - CVE-2026-1281

With a CVSS of 9.8 and part of CISA KEV, attackers need *zero* credentials to use this CVE and exploit legacy bash scripts and gain root access.

So we updated Pentest-Tools.com to help you confirm the risk:

📡 Network Scanner - detects exposed Ivanti EPMM instances on your perimeter.

🎯 Sniper Auto-Exploiter - safely demonstrates the RCE to prove the risk is real (and urgent).

Find more info for your rapid response flows here: pentest-tools.com/vulnerabilit

#offensivesecurity #ethicalhacking #infosec #cybersecurity #vulnerabilitymanagement

##

hackerworkspace@infosec.exchange at 2026-02-18T06:10:40.000Z ##

Critical Vulnerabilities in Ivanti EPMM Exploited

unit42.paloaltonetworks.com/iv

#cybersecurity #vulnerability #exploit

##

CVE-2026-1340
(9.8 CRITICAL)

EPSS: 32.27%

updated 2026-01-30T00:31:28

3 posts

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

2 repos

https://github.com/YunfeiGE18/CVE-2026-1281-CVE-2026-1340-Ivanti-EPMM-RCE

https://github.com/MehdiLeDeaut/CVE-2026-1281-Ivanti-EPMM-RCE

CVE-2025-15467
(9.8 CRITICAL)

EPSS: 0.92%

updated 2026-01-29T15:31:31

2 posts

Issue summary: Parsing CMS AuthEnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution. When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 para

4 repos

https://github.com/MAXI8594/CVE-2025-15467_Scan

https://github.com/guiimoraes/CVE-2025-15467

https://github.com/balgan/CVE-2025-15467

https://github.com/mr-r3b00t/CVE-2025-15467

itgrrl at 2026-02-19T02:18:32.104Z ##

this looks like a genuinely good and very impressive use of “AI” in security research – I’m leaving the air quotes in place at the moment since I haven’t been able to find much detail on how the system actually operates. describes it as an “autonomous analyser” and “the world’s first -native Cyber Reasoning System (CRS) for vulnerability management” 🙄

I’m pretty sure it’s not just spicy autocarrot though, possibly a mix of deep learning or other machine learning techniques (things that I think of as part of “traditional” AI research) with a sprinkling of LLM on top for “natural language” capabilities (and it’s possible that they’re leaning into “AI” as a descriptor to assign to the current hype cycle rather than calling it “machine learning” but ¯_(ツ)_/¯ )

What AI Security Research Looks Like When It Works

“In the latest security release on January 27, 2026, twelve new zero-day vulnerabilities (meaning unknown to the maintainers at time of disclosure) were announced. Our AI system is responsible for the original discovery of all twelve, each found and responsibly disclosed to the OpenSSL team during the fall and winter of 2025. Of those, 10 were assigned -2025 identifiers and 2 received CVE-2026 identifiers. Adding the 10 to the three we already found in the Fall 2025 release, AISLE is credited for surfacing 13 of 14 OpenSSL assigned in 2025, and 15 total across both releases. This is a historically unusual concentration for any single research team, let alone an AI-driven one.

These weren't trivial findings either. They included CVE-2025-15467, a stack buffer overflow in CMS message parsing that's potentially remotely exploitable without valid key material, and exploits for which have been quickly developed online. OpenSSL rated it HIGH severity; NIST's CVSS v3 score is 9.8 out of 10 (CRITICAL, an extremely rare severity rating for such projects). Three of the bugs had been present since 1998-2000, for over a quarter century having been missed by intense machine and human effort alike. One predated OpenSSL itself, inherited from 's original implementation in the 1990s. All of this in a codebase that has been fuzzed for millions of CPU-hours and audited extensively for over two decades by teams including Google's.

In five of the twelve cases, our AI system directly proposed the patches that were accepted into the official release.”

aisle.com/blog/what-ai-securit

##

itgrrl@infosec.exchange at 2026-02-19T02:18:32.000Z ##

this looks like a genuinely good and very impressive use of “AI” in security research – I’m leaving the air quotes in place at the moment since I haven’t been able to find much detail on how the system actually operates. #AISLE describes it as an “autonomous analyser” and “the world’s first #AI-native Cyber Reasoning System (CRS) for vulnerability management” 🙄

I’m pretty sure it’s not just spicy autocarrot though, possibly a mix of deep learning or other machine learning techniques (things that I think of as part of “traditional” AI research) with a sprinkling of LLM on top for “natural language” capabilities (and it’s possible that they’re leaning into “AI” as a descriptor to assign to the current hype cycle rather than calling it “machine learning” but ¯_(ツ)_/¯ )

What AI Security Research Looks Like When It Works

“In the latest #OpenSSL security release on January 27, 2026, twelve new zero-day vulnerabilities (meaning unknown to the maintainers at time of disclosure) were announced. Our AI system is responsible for the original discovery of all twelve, each found and responsibly disclosed to the OpenSSL team during the fall and winter of 2025. Of those, 10 were assigned #CVE-2025 identifiers and 2 received CVE-2026 identifiers. Adding the 10 to the three we already found in the Fall 2025 release, AISLE is credited for surfacing 13 of 14 OpenSSL #CVEs assigned in 2025, and 15 total across both releases. This is a historically unusual concentration for any single research team, let alone an AI-driven one.

These weren't trivial findings either. They included CVE-2025-15467, a stack buffer overflow in CMS message parsing that's potentially remotely exploitable without valid key material, and exploits for which have been quickly developed online. OpenSSL rated it HIGH severity; NIST's CVSS v3 score is 9.8 out of 10 (CRITICAL, an extremely rare severity rating for such projects). Three of the bugs had been present since 1998-2000, for over a quarter century having been missed by intense machine and human effort alike. One predated OpenSSL itself, inherited from #EricYoung's original #SSLeay implementation in the 1990s. All of this in a codebase that has been fuzzed for millions of CPU-hours and audited extensively for over two decades by teams including Google's.

In five of the twelve cases, our AI system directly proposed the patches that were accepted into the official release.”

aisle.com/blog/what-ai-securit

##

CVE-2026-23760
(9.8 CRITICAL)

EPSS: 55.75%

updated 2026-01-27T18:33:14

1 posts

SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. An unauthenticated attacker can supply a target administrator username and a new password to reset the acc

Nuclei template

2 repos

https://github.com/MaxMnMl/smartermail-CVE-2026-23760-poc

https://github.com/hilwa24/CVE-2026-23760_SmarterMail-Auth-Bypass-and-RCE

undercodenews@mastodon.social at 2026-02-18T20:01:18.000Z ##

Alarming Surge in SmarterMail Exploits Threatens Email Servers Worldwide

Cybersecurity experts are raising the alarm as critical vulnerabilities in SmarterMail—specifically CVE-2026-24423 and CVE-2026-23760—are being rapidly weaponized. Exploit proof-of-concepts (PoCs), stolen administrator credentials, and even ransomware deployment instructions are circulating openly on Telegram channels. Organizations relying on these email servers face an urgent need to patch their…

undercodenews.com/alarming-sur

##

CVE-2025-6571
(6.0 MEDIUM)

EPSS: 0.02%

updated 2025-11-11T09:30:36

2 posts

A 3rd-party component exposed its password in process arguments, allowing for low-privileged users to access it.

nuthatch at 2026-02-19T23:01:58.666Z ##

"OX Security discovered a vulnerability (CVE-2025-65716) in Markdown Preview Enhanced that enables a crafted Markdown file to execute JavaScript in the Markdown preview, allowing local port enumeration and exfiltration to an attacker-controlled server."

ox.security/blog/cve-2025-6571

##

nuthatch@infosec.exchange at 2026-02-19T23:01:58.000Z ##

"OX Security discovered a vulnerability (CVE-2025-65716) in Markdown Preview Enhanced that enables a crafted Markdown file to execute JavaScript in the Markdown preview, allowing local port enumeration and exfiltration to an attacker-controlled server."

ox.security/blog/cve-2025-6571

##

CVE-2025-7676(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-07-28T18:31:29

2 posts

DLL hijacking of all PE32 executables when run on Windows for ARM64 CPU architecture. This allows an attacker to execute code, if the attacker can plant a DLL in the same directory as the executable. Vulnerable versions of Windows 11 for ARM attempt to load Base DLLs that would ordinarily not be loaded from the application directory. Fixed in release 24H2, but present in all earlier versions of Wi

mayahustle at 2026-02-19T14:30:58.397Z ##

I earned my first CVE credit (CVE-2025-7676) for helping with a Windows ARM vuln. So, to commemorate the credit, @reverseics presented me last week with a Trophy of Perpetual Futility, because there’s always more work to do.

raw.githubusercontent.com/reid

##

mayahustle@infosec.exchange at 2026-02-19T14:30:58.000Z ##

I earned my first CVE credit (CVE-2025-7676) for helping with a Windows ARM vuln. So, to commemorate the credit, @reverseics presented me last week with a Trophy of Perpetual Futility, because there’s always more work to do.

raw.githubusercontent.com/reid

##

CVE-2025-29969
(7.5 HIGH)

EPSS: 0.28%

updated 2025-05-13T18:31:00

2 posts

Time-of-check time-of-use (toctou) race condition in Windows Fundamentals allows an authorized attacker to execute code over a network.

1 repos

https://github.com/SafeBreach-Labs/EventLogin-CVE-2025-29969

threatcodex at 2026-02-19T19:51:29.333Z ##

EventLog-in: Propagating With Weak Credentials Using the Eventlog Service in Microsoft Windows (CVE-2025-29969)

safebreach.com/blog/safebreach

##

threatcodex@infosec.exchange at 2026-02-19T19:51:29.000Z ##

EventLog-in: Propagating With Weak Credentials Using the Eventlog Service in Microsoft Windows (CVE-2025-29969)
#CVE_2025_29969
safebreach.com/blog/safebreach

##

CVE-2021-22214
(6.8 MEDIUM)

EPSS: 93.52%

updated 2024-11-21T05:49:43.477000

2 posts

When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab CE/EE affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is limited

Nuclei template

4 repos

https://github.com/ZZ-SOCMAP/CVE-2021-22214

https://github.com/kh4sh3i/GitLab-SSRF-CVE-2021-22214

https://github.com/Vulnmachines/gitlab-cve-2021-22214

https://github.com/aaminin/CVE-2021-22214

darses@mastodon.nl at 2026-02-18T19:35:54.000Z ##

Gitlab vulnerability CVE-2021-22175 got added to the CISA KEV. But this vuln is just a more complete patch to CVE-2021-22214. Likewise CVE-2021-39935 covers even more case where the CI Lint function could be used without authentication. In fact, the exploit code identical for all vulnerabilites. CVE-2021-39935 was already on the list, CVE-2021-22175 got added today and CVE-2021-22214 is still missing.

#cybersecurity #vulnerability #circus

##

darses@mastodon.nl at 2026-02-18T19:35:54.000Z ##

Gitlab vulnerability CVE-2021-22175 got added to the CISA KEV. But this vuln is just a more complete patch to CVE-2021-22214. Likewise CVE-2021-39935 covers even more case where the CI Lint function could be used without authentication. In fact, the exploit code identical for all vulnerabilites. CVE-2021-39935 was already on the list, CVE-2021-22175 got added today and CVE-2021-22214 is still missing.

#cybersecurity #vulnerability #circus

##

CVE-2023-51781
(7.0 None)

EPSS: 0.02%

updated 2024-01-27T05:05:43

1 posts

An issue was discovered in the Linux kernel before 6.6.8. atalk_ioctl in net/appletalk/ddp.c has a use-after-free because of an atalk_recvmsg race condition.

linux@activitypub.awakari.com at 2026-02-18T10:53:08.000Z ## CVE-2023-51781 An issue was discovered in the Linux kernel before 6.6.8. atalk_ioctl in net/appletalk/ddp.c has a use-after-free because of an atalk_recvmsg race condition. Information published.

#CVE

Origin | Interest | Match ##

CVE-2001-0144(CVSS UNKNOWN)

EPSS: 61.72%

updated 2023-01-30T05:05:25

2 posts

CORE SDI SSH1 CRC-32 compensation attack detector allows remote attackers to execute arbitrary commands on an SSH server or client via an integer overflow.

cjust at 2026-02-19T03:42:47.301Z ##

@TheBreadmonkey Fun fact: In the movie the The Matrix Reloaded - Trinity executes a real world exploit (CVE-2001-0144) against an SSH server using nmap.

Not So Fun Fact: There's probably some system somewhere exposed to Mr. Internet still running that vulnerable version of SSH

##

cjust@infosec.exchange at 2026-02-19T03:42:47.000Z ##

@TheBreadmonkey Fun fact: In the movie the The Matrix Reloaded - Trinity executes a real world exploit (CVE-2001-0144) against an SSH server using nmap.

Not So Fun Fact: There's probably some system somewhere exposed to Mr. Internet still running that vulnerable version of SSH

##

CVE-2025-30416
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-02-20T01:18:20.000Z ##

🔴 CVE-2025-30416 - Critical (10)

Sensitive data disclosure and manipulation due to missing authorization. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39938, Acronis Cyber Protect 15 (Linux, Windows) before build 41800.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T01:18:20.000Z ##

🔴 CVE-2025-30416 - Critical (10)

Sensitive data disclosure and manipulation due to missing authorization. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39938, Acronis Cyber Protect 15 (Linux, Windows) before build 41800.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-30412
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-02-20T01:18:11.000Z ##

🔴 CVE-2025-30412 - Critical (10)

Sensitive data disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39938, Acronis Cyber Protect 15 (Linux, Windows) before build 41800.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T01:18:11.000Z ##

🔴 CVE-2025-30412 - Critical (10)

Sensitive data disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39938, Acronis Cyber Protect 15 (Linux, Windows) before build 41800.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-30410
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-02-20T01:17:41.000Z ##

🔴 CVE-2025-30410 - Critical (9.8)

Sensitive data disclosure and manipulation due to missing authentication. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 39870, Acronis Cyber Protect 16 (Linux, macOS, Windows) before bu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T01:17:41.000Z ##

🔴 CVE-2025-30410 - Critical (9.8)

Sensitive data disclosure and manipulation due to missing authentication. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 39870, Acronis Cyber Protect 16 (Linux, macOS, Windows) before bu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26959
(0 None)

EPSS: 0.00%

4 posts

N/A

thehackerwire@mastodon.social at 2026-02-20T00:19:37.000Z ##

🟠 CVE-2026-26959 - High (7.8)

ADB Explorer is a fluent UI for ADB on Windows. Versions 0.9.26020 and below fail to validate the integrity or authenticity of the ADB binary path specified in the ManualAdbPath setting before executing it, allowing arbitrary code execution with t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-02-20T00:00:43.324Z ##

CVE-2026-26959: HIGH severity vuln in Alex4SSB ADB-Explorer (<0.9.26021). Malicious config (App.txt) can trigger code execution if users launch app with a crafted argument. Upgrade ASAP! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-20T00:19:37.000Z ##

🟠 CVE-2026-26959 - High (7.8)

ADB Explorer is a fluent UI for ADB on Windows. Versions 0.9.26020 and below fail to validate the integrity or authenticity of the ADB binary path specified in the ManualAdbPath setting before executing it, allowing arbitrary code execution with t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-20T00:00:43.000Z ##

CVE-2026-26959: HIGH severity vuln in Alex4SSB ADB-Explorer (<0.9.26021). Malicious config (App.txt) can trigger code execution if users launch app with a crafted argument. Upgrade ASAP! radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Security #CVE202626959

##

CVE-2026-26202
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-02-19T21:01:54.000Z ##

🟠 CVE-2026-26202 - High (7.5)

Penpot is an open-source design tool for design and code collaboration. Prior to version 2.13.2, an authenticated user can read arbitrary files from the server by supplying a local file path (e.g. `/etc/passwd`) as a font data chunk in the `create...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T21:01:54.000Z ##

🟠 CVE-2026-26202 - High (7.5)

Penpot is an open-source design tool for design and code collaboration. Prior to version 2.13.2, an authenticated user can read arbitrary files from the server by supplying a local file path (e.g. `/etc/passwd`) as a font data chunk in the `create...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26200
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-02-19T21:01:39.000Z ##

🟠 CVE-2026-26200 - High (7.8)

HDF5 is software for managing data. Prior to version 1.14.4-2, an attacker who can control an `h5` file parsed by HDF5 can trigger a write-based heap buffer overflow condition. This can lead to a denial-of-service condition, and potentially furthe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T21:01:39.000Z ##

🟠 CVE-2026-26200 - High (7.8)

HDF5 is software for managing data. Prior to version 1.14.4-2, an attacker who can control an `h5` file parsed by HDF5 can trigger a write-based heap buffer overflow condition. This can lead to a denial-of-service condition, and potentially furthe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25548
(0 None)

EPSS: 0.27%

2 posts

N/A

thehackerwire@mastodon.social at 2026-02-18T23:26:31.000Z ##

🔴 CVE-2026-25548 - Critical (9.1)

InvoicePlane is a self-hosted open source application for managing invoices, clients, and payments. A critical Remote Code Execution (RCE) vulnerability exists in InvoicePlane 1.7.0 through a chained Local File Inclusion (LFI) and Log Poisoning at...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-18T23:26:31.000Z ##

🔴 CVE-2026-25548 - Critical (9.1)

InvoicePlane is a self-hosted open source application for managing invoices, clients, and payments. A critical Remote Code Execution (RCE) vulnerability exists in InvoicePlane 1.7.0 through a chained Local File Inclusion (LFI) and Log Poisoning at...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-41725
(0 None)

EPSS: 0.00%

2 posts

N/A

certvde at 2026-02-18T14:42:45.874Z ##

VDE-2026-0001
JBL: DoS vulnerability in Flip 4

Any attacker in radio range can send malicious messages to cause the device to crash.
CVE-2025-41725

certvde.com/en/advisories/vde-

harman.csaf-tp.certvde.com/.we

##

certvde@infosec.exchange at 2026-02-18T14:42:45.000Z ##

#OT #Advisory VDE-2026-0001
JBL: DoS vulnerability in Flip 4

Any attacker in radio range can send malicious messages to cause the device to crash.
#CVE CVE-2025-41725

certvde.com/en/advisories/vde-

#CSAF harman.csaf-tp.certvde.com/.we #oCSAF

##

CVE-2026-2239
(0 None)

EPSS: 0.00%

1 posts

N/A

linux@activitypub.awakari.com at 2026-02-18T11:07:18.000Z ## Debian GIMP High Denial of Service Risk DSA-6139-1 CVE-2026-2239 Several vulnerabilities were discovered in GIMP, the GNU Image Manipulation Program, which could result in denial of service or pote...

#Debian #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

Visit counter For Websites