## Updated at UTC 2026-02-14T03:38:06.001009

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-1731 0 4.22% 14 4 template 2026-02-14T01:16:07.740000 BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote
CVE-2026-24853 8.1 0.00% 2 0 2026-02-13T23:16:11.800000 Caido is a web security auditing toolkit. Prior to 0.55.0, Caido blocks non whit
CVE-2026-26273 9.8 0.00% 4 0 2026-02-13T22:16:11.330000 Known is a social publishing platform. Prior to 1.6.3, a Critical Broken Authent
CVE-2026-26269 5.4 0.00% 2 0 2026-02-13T22:16:11.220000 Vim is an open source, command line text editor. Prior to 9.1.2148, a stack buff
CVE-2025-15157 8.8 0.00% 4 0 2026-02-13T22:16:08.427000 The Starfish Review Generation & Marketing for WordPress plugin for WordPress is
CVE-2026-26187 8.1 0.00% 2 0 2026-02-13T22:11:50 ## Summary Two path traversal vulnerabilities in the local block adapter allow
CVE-2026-20615 7.8 0.02% 2 0 2026-02-13T21:43:42.930000 A path handling issue was addressed with improved validation. This issue is fixe
CVE-2026-26335 0 0.00% 2 0 2026-02-13T21:43:11.137000 Calero VeraSMART versions prior to 2022 R1 use static ASP.NET/IIS machineKey val
CVE-2026-26333 0 0.00% 2 0 2026-02-13T21:43:11.137000 Calero VeraSMART versions prior to 2022 R1 expose an unauthenticated .NET Remoti
CVE-2025-70123 7.5 0.00% 6 0 2026-02-13T21:43:11.137000 An improper input validation and protocol compliance vulnerability in free5GC v4
CVE-2025-69770 10.0 0.00% 2 0 2026-02-13T21:43:11.137000 A zip slip vulnerability in the /DesignTools/SkinList.aspx endpoint of MojoPorta
CVE-2026-2441 8.8 0.00% 8 0 2026-02-13T21:31:40 Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote a
CVE-2025-70121 7.5 0.00% 2 0 2026-02-13T21:31:36 An array index out of bounds vulnerability in the AMF component of free5GC v4.0.
CVE-2025-70122 7.5 0.00% 2 0 2026-02-13T21:31:36 A heap buffer overflow vulnerability in the UPF component of free5GC v4.0.1 allo
CVE-2026-20667 8.8 0.01% 2 0 2026-02-13T21:31:36 A logic issue was addressed with improved checks. This issue is fixed in watchOS
CVE-2026-20617 7.0 0.02% 2 0 2026-02-13T21:31:35 A race condition was addressed with improved state handling. This issue is fixed
CVE-2026-25924 8.4 0.04% 1 1 2026-02-13T21:30:01.447000 Kanboard is project management software focused on Kanban methodology. Prior to
CVE-2026-20620 7.7 0.02% 2 0 2026-02-13T21:16:30.177000 An out-of-bounds read issue was addressed with improved input validation. This i
CVE-2026-20614 7.8 0.02% 2 0 2026-02-13T20:22:46.497000 A path handling issue was addressed with improved validation. This issue is fixe
CVE-2026-2314 8.8 0.02% 1 0 2026-02-13T18:31:24 Heap buffer overflow in Codecs in Google Chrome prior to 145.0.7632.45 allowed a
CVE-2026-20660 7.5 0.05% 2 0 2026-02-13T18:16:19.127000 A path handling issue was addressed with improved logic. This issue is fixed in
CVE-2026-20649 7.5 0.02% 2 0 2026-02-13T18:16:18.967000 A logging issue was addressed with improved data redaction. This issue is fixed
CVE-2026-25253 8.8 0.04% 1 4 2026-02-13T17:41:02.987000 OpenClaw (aka clawdbot or Moltbot) before 2026.1.29 obtains a gatewayUrl value f
CVE-2026-2319 7.5 0.02% 1 0 2026-02-13T17:29:10.443000 Race in DevTools in Google Chrome prior to 145.0.7632.45 allowed a remote attack
CVE-2026-26190 9.8 0.00% 2 0 2026-02-13T17:17:13 ## Summary Milvus exposes TCP port 9091 by default with two critical authentica
CVE-2026-26056 8.8 0.04% 2 0 2026-02-13T17:15:44 # Arbitrary WASM Code Execution via AnnotationOverrideFlight Injection in Yoke A
CVE-2026-26055 7.5 0.07% 2 0 2026-02-13T17:15:38 # Unauthenticated Admission Webhook Endpoints in Yoke ATC This vulnerability ex
CVE-2026-20654 5.5 0.02% 2 0 2026-02-13T15:31:29 The issue was addressed with improved memory handling. This issue is fixed in wa
CVE-2025-14349 8.8 0.00% 2 0 2026-02-13T15:30:33 Privilege Defined With Unsafe Actions, Missing Authentication for Critical Funct
CVE-2026-1619 8.3 0.00% 2 0 2026-02-13T15:30:27 Authorization Bypass Through User-Controlled Key vulnerability in Universal Soft
CVE-2025-15556 7.5 11.09% 9 2 2026-02-13T15:30:24 Notepad++ versions prior to 8.8.9, when using the WinGUp updater, contain an upd
CVE-2026-20650 7.5 0.04% 2 0 2026-02-13T14:46:52.993000 A denial-of-service issue was addressed with improved validation. This issue is
CVE-2026-20658 7.8 0.02% 2 0 2026-02-13T14:45:17.953000 A package validation issue was addressed by blocking the vulnerable package. Thi
CVE-2026-25108 8.8 0.25% 4 0 2026-02-13T14:23:48.007000 FileZen contains an OS command injection vulnerability. When FileZen Antivirus C
CVE-2026-1618 8.8 0.00% 2 0 2026-02-13T14:23:48.007000 Authentication Bypass Using an Alternate Path or Channel vulnerability in Univer
CVE-2026-26219 9.1 0.02% 4 0 2026-02-13T14:23:48.007000 newbee-mall stores and verifies user passwords using an unsalted MD5 hashing alg
CVE-2025-70886 7.5 0.10% 2 1 2026-02-13T14:23:48.007000 An issue in halo v.2.22.4 and before allows a remote attacker to cause a denial
CVE-2026-26217 8.6 0.06% 4 0 2026-02-13T14:23:48.007000 Crawl4AI versions prior to 0.8.0 contain a local file inclusion vulnerability in
CVE-2025-54756 8.4 0.01% 2 0 2026-02-13T14:23:48.007000 BrightSign players running BrightSign OS series 4 prior to v8.5.53.1 or series
CVE-2025-70981 9.8 0.03% 2 0 2026-02-13T14:23:48.007000 CordysCRM 1.4.1 is vulnerable to SQL Injection in the employee list query interf
CVE-2026-26218 9.8 0.07% 2 0 2026-02-13T14:23:48.007000 newbee-mall includes pre-seeded administrator accounts in its database initializ
CVE-2026-1358 9.8 0.13% 4 0 2026-02-13T00:33:00 Airleader Master versions 6.381 and prior allow for file uploads without restri
CVE-2026-25949 7.5 0.02% 2 0 2026-02-12T22:08:03 ## Impact There is a potential vulnerability in Traefik managing STARTTLS reque
CVE-2025-61880 8.8 0.42% 2 0 2026-02-12T21:32:31 In Infoblox NIOS through 9.0.7, insecure deserialization can result in remote co
CVE-2025-69807 7.5 0.07% 2 0 2026-02-12T21:32:31 p2r3 Bareiron commit: 8e4d4020d is vulnerable to Buffer Overflow, which allows u
CVE-2026-20652 7.5 0.12% 2 0 2026-02-12T21:32:30 The issue was addressed with improved memory handling. This issue is fixed in ma
CVE-2026-20677 9.1 0.05% 2 0 2026-02-12T21:32:30 A race condition was addressed with improved handling of symbolic links. This is
CVE-2025-61879 7.7 0.03% 2 0 2026-02-12T21:32:30 In Infoblox NIOS through 9.0.7, a High-Privileged User Can Trigger an Arbitrary
CVE-2025-63421 7.8 0.02% 2 0 2026-02-12T21:32:30 An issue in filosoft Comerc.32 Commercial Invoicing v.16.0.0.3 allows a local at
CVE-2025-40536 8.1 76.95% 8 0 2026-02-12T21:32:29 SolarWinds Web Help Desk was found to be susceptible to a security control bypas
CVE-2025-67432 7.5 0.04% 2 0 2026-02-12T21:31:34 A stack overflow in the ZBarcode_Encode function of Monkeybread Software MBS Dyn
CVE-2025-70314 9.8 0.04% 2 0 2026-02-12T21:31:34 webfsd 1.21 is vulnerable to a Buffer Overflow via a crafted request. This is du
CVE-2026-20700 7.8 0.21% 30 0 2026-02-12T21:31:27 A memory corruption issue was addressed with improved state management. This iss
CVE-2024-43468 9.8 86.39% 10 3 2026-02-12T21:31:24 Microsoft Configuration Manager Remote Code Execution Vulnerability
CVE-2026-26216 None 0.20% 4 0 2026-02-12T20:09:30 A critical remote code execution vulnerability exists in the Crawl4AI Docker API
CVE-2025-69872 None 0.08% 2 0 2026-02-12T20:08:45 DiskCache (python-diskcache) through 5.6.3 uses Python pickle for serialization
CVE-2025-70085 9.8 0.04% 2 0 2026-02-12T18:31:25 An issue was discovered in OpenSatKit 2.2.1. The EventErrStr buffer has a fixed
CVE-2026-20626 7.8 0.01% 2 0 2026-02-12T18:31:25 This issue was addressed with improved checks. This issue is fixed in macOS Sequ
CVE-2025-69871 8.1 0.04% 2 0 2026-02-12T18:31:24 A race condition vulnerability exists in MedusaJS Medusa v2.12.2 and earlier in
CVE-2025-46290 7.5 0.14% 2 0 2026-02-12T18:31:24 A logic issue was addressed with improved checks. This issue is fixed in macOS S
CVE-2026-2249 9.8 0.17% 1 1 2026-02-12T18:31:24 METIS DFS devices (versions <= oscore 2.1.234-r18) expose a web-based shell at t
CVE-2026-2248 9.8 0.17% 1 0 2026-02-12T18:31:24 METIS WIC devices (versions <= oscore 2.1.234-r18) expose a web-based shell at t
CVE-2025-69634 9.1 0.05% 2 0 2026-02-12T18:30:23 Cross Site Request Forgery vulnerability in Dolibarr ERP & CRM v.22.0.9 allows a
CVE-2026-2250 7.5 0.07% 1 0 2026-02-12T16:16:18.783000 The /dbviewer/ web endpoint in METIS WIC devices is exposed without authenticati
CVE-2026-26235 7.5 0.07% 4 1 2026-02-12T16:16:17.917000 JUNG Smart Visu Server 1.1.1050 contains a denial of service vulnerability that
CVE-2025-67135 9.8 0.04% 2 0 2026-02-12T16:16:04.620000 Weak Security in the PF-50 1.2 keyfob of PGST PG107 Alarm System 1.25.05.hf allo
CVE-2025-14892 9.8 0.04% 2 0 2026-02-12T15:33:54 The Prime Listing Manager WordPress plugin through 1.1 allows an attacker to gai
CVE-2025-70083 7.8 0.01% 2 0 2026-02-12T15:33:51 An issue was discovered in OpenSatKit 2.2.1. The DirName field in the telecomman
CVE-2026-2004 8.8 0.10% 6 1 2026-02-12T15:32:55 Missing validation of type of input in PostgreSQL intarray extension selectivity
CVE-2025-10969 9.8 0.03% 2 0 2026-02-12T15:32:54 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-2007 8.2 0.04% 2 0 2026-02-12T15:32:54 Heap buffer overflow in PostgreSQL pg_trgm allows a database user to achieve unk
CVE-2025-14014 9.8 0.04% 2 0 2026-02-12T15:32:54 Unrestricted Upload of File with Dangerous Type vulnerability in NTN Information
CVE-2026-1104 8.8 0.04% 2 0 2026-02-12T15:32:54 The FastDup – Fastest WordPress Migration & Duplicator plugin for WordPress is v
CVE-2025-13002 8.2 0.04% 2 0 2026-02-12T15:32:53 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site
CVE-2026-20610 7.8 0.03% 2 0 2026-02-12T15:32:47 This issue was addressed with improved handling of symlinks. This issue is fixed
CVE-2025-70084 7.5 0.24% 2 0 2026-02-12T15:16:05.350000 Directory traversal vulnerability in OpenSatKit 2.2.1 allows attackers to gain a
CVE-2025-70029 7.5 0.02% 2 0 2026-02-12T15:16:04.567000 An issue in Sunbird-Ed SunbirdEd-portal v1.13.4 allows attackers to obtain sensi
CVE-2025-15573 9.4 0.02% 2 0 2026-02-12T15:16:03.043000 The affected devices do not validate the server certificate when connecting to t
CVE-2026-2360 8.0 0.04% 1 0 2026-02-12T15:11:02.290000 PostgreSQL Anonymizer contains a vulnerability that allows a user to gain superu
CVE-2026-2006 8.8 0.06% 2 0 2026-02-12T15:10:37.307000 Missing validation of multibyte character length in PostgreSQL text manipulation
CVE-2026-2005 8.8 0.06% 2 0 2026-02-12T15:10:37.307000 Heap buffer overflow in PostgreSQL pgcrypto allows a ciphertext provider to exec
CVE-2026-1320 7.2 0.03% 2 0 2026-02-12T15:10:37.307000 The Secure Copy Content Protection and Content Locking plugin for WordPress is v
CVE-2026-23857 8.2 0.01% 4 0 2026-02-12T15:10:37.307000 Dell Update Package (DUP) Framework, versions 23.12.00 through 24.12.00, contain
CVE-2026-1729 9.8 0.19% 6 1 2026-02-12T15:10:37.307000 The AdForest theme for WordPress is vulnerable to authentication bypass in all v
CVE-2025-64487 7.6 0.01% 1 0 2026-02-12T15:10:37.307000 Outline is a service that allows for collaborative documentation. Prior to 1.1.0
CVE-2026-25676 7.8 0.01% 4 1 2026-02-12T06:30:21 The installer of M-Track Duo HD version 1.0.0 contains an issue with the DLL sea
CVE-2026-26234 8.8 0.07% 4 0 2026-02-12T06:30:21 JUNG Smart Visu Server 1.1.1050 contains a request header manipulation vulnerabi
CVE-2026-23856 7.8 0.01% 2 0 2026-02-12T03:31:06 Dell iDRAC Service Module (iSM) for Windows, versions prior to 6.0.3.1, and Dell
CVE-2026-0969 8.8 0.07% 4 0 2026-02-12T03:31:01 The serialize function used to compile MDX in next-mdx-remote is vulnerable to a
CVE-2026-26215 None 0.13% 2 1 2026-02-12T00:31:12 manga-image-translator version beta-0.3 and prior in shared API mode contains an
CVE-2026-26010 7.6 0.01% 1 0 2026-02-11T23:14:54 ### Summary Calls issued by the UI against `/api/v1/ingestionPipelines` leak JWT
CVE-2026-25759 8.7 0.01% 1 0 2026-02-11T23:14:17 ### Impact Stored XSS vulnerability in content titles allow authenticated users
CVE-2025-69873 None 0.07% 2 0 2026-02-11T21:30:48 ajv (Another JSON Schema Validator) through version 8.17.1 is vulnerable to Regu
CVE-2026-2315 8.8 0.02% 1 0 2026-02-11T21:30:48 Inappropriate implementation in WebGPU in Google Chrome prior to 145.0.7632.45 a
CVE-2026-2313 8.8 0.02% 1 0 2026-02-11T21:30:48 Use after free in CSS in Google Chrome prior to 145.0.7632.45 allowed a remote a
CVE-2025-52868 8.1 0.10% 2 0 2026-02-11T21:30:40 A buffer overflow vulnerability has been reported to affect Qsync Central. If a
CVE-2025-48725 8.1 0.10% 2 0 2026-02-11T21:30:39 A buffer overflow vulnerability has been reported to affect several QNAP operati
CVE-2025-48724 8.1 0.10% 2 0 2026-02-11T21:30:39 A buffer overflow vulnerability has been reported to affect Qsync Central. If a
CVE-2025-30276 8.8 0.11% 2 0 2026-02-11T21:30:39 An out-of-bounds write vulnerability has been reported to affect Qsync Central.
CVE-2026-21239 7.8 0.03% 2 0 2026-02-11T21:30:37 Heap-based buffer overflow in Windows Kernel allows an authorized attacker to el
CVE-2025-48723 8.1 0.10% 2 0 2026-02-11T21:18:06.230000 A buffer overflow vulnerability has been reported to affect Qsync Central. If a
CVE-2025-30269 8.1 0.04% 2 0 2026-02-11T21:10:50.490000 A use of externally-controlled format string vulnerability has been reported to
CVE-2026-21236 7.8 0.03% 2 0 2026-02-11T21:07:23.287000 Heap-based buffer overflow in Windows Ancillary Function Driver for WinSock allo
CVE-2026-21238 7.8 0.03% 2 0 2026-02-11T21:01:48.670000 Improper access control in Windows Ancillary Function Driver for WinSock allows
CVE-2026-21245 7.8 0.03% 2 0 2026-02-11T20:44:29.940000 Heap-based buffer overflow in Windows Kernel allows an authorized attacker to el
CVE-2026-25084 9.8 0.07% 1 0 2026-02-11T18:31:36 Authentication for ZLAN5143D can be bypassed by directly accessing internal URLs
CVE-2026-24789 9.8 0.07% 1 0 2026-02-11T18:31:36 An unprotected API endpoint allows an attacker to remotely change the device pas
CVE-2026-2361 8.1 0.04% 1 0 2026-02-11T18:31:36 PostgreSQL Anonymizer contains a vulnerability that allows a user to gain superu
CVE-2025-64075 10.0 0.44% 1 0 2026-02-11T18:06:04.010000 A path traversal vulnerability in the check_token function of Shenzhen Zhibotong
CVE-2026-20841 8.8 0.13% 12 9 2026-02-11T15:31:25 Improper neutralization of special elements used in a command ('command injectio
CVE-2025-12059 9.8 0.04% 1 0 2026-02-11T15:30:36 Insertion of Sensitive Information into Externally-Accessible File or Directory
CVE-2025-48503 7.9 0.01% 1 0 2026-02-11T15:30:35 A DLL hijacking vulnerability in the AMD Software Installer could allow an attac
CVE-2026-0910 8.8 0.07% 2 0 2026-02-11T15:30:34 The wpForo Forum plugin for WordPress is vulnerable to PHP Object Injection in a
CVE-2025-8668 9.4 0.04% 2 0 2026-02-11T15:30:34 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site
CVE-2026-1357 9.8 0.40% 4 4 2026-02-11T15:27:26.370000 The Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress
CVE-2026-1560 8.8 0.24% 2 1 2026-02-11T15:27:26.370000 The Custom Block Builder – Lazy Blocks plugin for WordPress is vulnerable to Rem
CVE-2025-8025 9.8 0.05% 2 0 2026-02-11T15:27:26.370000 Missing Authentication for Critical Function, Improper Access Control vulnerabil
CVE-2026-0958 7.5 0.03% 2 0 2026-02-11T12:30:27 GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.4
CVE-2025-8099 7.5 0.04% 2 0 2026-02-11T12:30:27 GitLab has remediated an issue in GitLab CE/EE affecting all versions from 10.8
CVE-2025-7659 8.0 0.01% 2 0 2026-02-11T12:30:27 GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.2
CVE-2025-15096 8.8 0.04% 2 0 2026-02-11T12:30:26 The 'Videospirecore Theme Plugin' plugin for WordPress is vulnerable to privileg
CVE-2025-10174 8.3 0.01% 2 0 2026-02-11T12:30:26 Cleartext Transmission of Sensitive Information vulnerability in Pan Software &
CVE-2025-10913 8.3 0.04% 2 0 2026-02-11T09:30:24 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site
CVE-2025-9986 8.2 0.03% 2 0 2026-02-11T09:30:24 Exposure of Sensitive System Information to an Unauthorized Control Sphere vulne
CVE-2026-21228 8.1 0.04% 2 0 2026-02-10T21:51:48.077000 Improper certificate validation in Azure Local allows an unauthorized attacker t
CVE-2026-21537 8.8 0.04% 1 0 2026-02-10T18:30:54 Improper control of generation of code ('code injection') in Microsoft Defender
CVE-2026-21240 7.8 0.02% 2 0 2026-02-10T18:30:51 Time-of-check time-of-use (toctou) race condition in Windows HTTP.sys allows an
CVE-2026-21243 7.5 0.06% 2 0 2026-02-10T18:30:51 Null pointer dereference in Windows LDAP - Lightweight Directory Access Protocol
CVE-2026-1603 8.6 0.18% 2 0 2026-02-10T18:30:49 An authentication bypass in Ivanti Endpoint Manager before version 2024 SU5 allo
CVE-2026-21229 8.0 0.07% 2 0 2026-02-10T18:30:49 Improper input validation in Power BI allows an authorized attacker to execute c
CVE-2026-1602 6.5 0.05% 2 0 2026-02-10T18:30:38 SQL injection in Ivanti Endpoint Manager before version 2024 SU5 allows a remote
CVE-2026-24061 9.8 83.89% 7 58 template 2026-02-10T18:30:34 telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "
CVE-2025-66630 None 0.01% 2 0 2026-02-09T18:49:19 Fiber v2 contains an internal vendored copy of `gofiber/utils`, and its function
CVE-2026-1868 9.9 0.03% 2 0 2026-02-09T16:08:35.290000 GitLab has remediated a vulnerability in the Duo Workflow Service component of G
CVE-2026-2084 7.2 0.25% 1 9 2026-02-07T12:31:33 A weakness has been identified in D-Link DIR-823X 250416. This impacts an unknow
CVE-2026-21643 9.8 0.17% 3 0 2026-02-06T09:30:35 An improper neutralization of special elements used in an sql command ('sql inje
CVE-2025-64712 9.8 0.08% 4 0 2026-02-04T19:53:06 A Path Traversal vulnerability in the `partition_msg` function allows an attacke
CVE-2026-20119 7.5 0.09% 2 0 2026-02-04T18:30:51 A vulnerability in the text rendering subsystem of Cisco TelePresence Collaborat
CVE-2026-1281 9.8 54.26% 2 1 2026-01-30T00:31:29 A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve
CVE-2026-1340 9.8 40.23% 2 1 2026-01-30T00:31:28 A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve
CVE-2025-14523 8.2 0.06% 1 0 2026-01-29T16:16:07.627000 A flaw in libsoup’s HTTP header handling allows multiple Host: headers in a requ
CVE-2026-23760 9.8 55.52% 2 2 template 2026-01-27T18:33:14 SmarterTools SmarterMail versions prior to build 9511 contain an authentication
CVE-2026-20045 8.2 1.10% 2 1 2026-01-21T21:31:31 A vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unif
CVE-2025-8088 8.8 3.90% 2 29 2025-10-22T00:34:26 A path traversal vulnerability affecting the Windows version of WinRAR allows th
CVE-2025-20360 5.8 0.13% 2 0 2025-10-15T18:31:58 Multiple Cisco products are affected by a vulnerability in the Snort 3 HTTP Deco
CVE-2025-20359 6.5 0.29% 2 0 2025-10-15T18:31:58 Multiple Cisco products are affected by a vulnerability in the Snort 3 HTTP Deco
CVE-2024-6387 8.1 25.87% 2 96 2025-04-24T21:32:54 A signal handler race condition was found in OpenSSH's server (sshd), where a cl
CVE-2016-0777 6.5 67.20% 2 1 2025-04-12T10:46:40.837000 The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x,
CVE-2024-53114 5.5 0.01% 1 0 2024-12-11T21:31:57 In the Linux kernel, the following vulnerability has been resolved: x86/CPU/AMD
CVE-2017-12542 10.0 94.25% 2 3 template 2023-02-02T05:07:08 A authentication bypass and execution of code vulnerability in HPE Integrated Li
CVE-2026-26268 0 0.00% 4 0 N/A
CVE-2026-25991 0 0.00% 2 0 N/A
CVE-2026-21878 0 0.00% 2 0 N/A
CVE-2026-26208 0 0.00% 2 0 N/A
CVE-2026-25227 0 0.03% 7 0 N/A
CVE-2026-25922 0 0.01% 5 0 N/A
CVE-2026-25748 0 0.03% 5 0 N/A
CVE-2026-26012 0 0.02% 2 0 N/A
CVE-2026-24044 0 0.04% 2 0 N/A
CVE-2026-26068 0 0.57% 2 0 N/A
CVE-2026-26011 0 0.06% 2 0 N/A
CVE-2026-26020 0 0.08% 2 0 N/A
CVE-2026-26069 0 0.04% 2 0 N/A
CVE-2026-26080 0 0.00% 2 0 N/A
CVE-2026-26081 0 0.00% 2 0 N/A
CVE-2026-26029 0 0.07% 1 0 N/A

CVE-2026-1731
(0 None)

EPSS: 4.22%

updated 2026-02-14T01:16:07.740000

14 posts

BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user.

Nuclei template

4 repos

https://github.com/bytehazard/CVE-2026-1731

https://github.com/win3zz/CVE-2026-1731

https://github.com/z3r0h3ro/CVE-2026-1731-exp

https://github.com/cybrdude/cve-2026-1731-scanner

secdb at 2026-02-14T02:00:13.947Z ##

🚨 [CISA-2026:0213] CISA Adds One Known Exploited Vulnerability to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2026-1731 (secdb.nttzen.cloud/cve/detail/)
- Name: BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) OS Command Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: BeyondTrust
- Product: Remote Support (RS) and Privileged Remote Access (PRA)
- Notes: Please adhere to the vendor&#39;s guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible BeyondTrust products affected by this vulnerability. For more information please: see: beyondtrust.com/trust-center/s ; nvd.nist.gov/vuln/detail/CVE-2

##

cisakevtracker@mastodon.social at 2026-02-14T01:00:54.000Z ##

CVE ID: CVE-2026-1731
Vendor: BeyondTrust
Product: Remote Support (RS) and Privileged Remote Access (PRA)
Date Added: 2026-02-13
Notes: Please adhere to the vendor's guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible BeyondTrust products affected by this vulnerability. For more information please: see: beyondtrust.com/trust-center/s ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

jbhall56 at 2026-02-13T14:54:14.220Z ##

Exploitation attempts target CVE-2026-1731, a critical unauthenticated remote code execution flaw in BeyondTrust Remote Support. securityweek.com/beyondtrust-v

##

youranonnewsirc@nerdculture.de at 2026-02-13T11:47:57.000Z ##

Here's a summary of the latest critical news in technology and cybersecurity:

State-backed hackers are reportedly leveraging Google's Gemini AI for reconnaissance and attack support. A critical BeyondTrust Remote Code Execution vulnerability (CVE-2026-1731) is being actively exploited in the wild. CISA has added four new exploited vulnerabilities to its Known Exploited Vulnerabilities Catalog. In technology, Samsung commenced shipping of industry-first HBM4 memory for AI computing, and HKUST announced a major advance in calcium-ion battery technology.

#AnonNews_irc #Cybersecurity #Anonymous #News

##

defendopsdiaries at 2026-02-12T21:47:24.311Z ##

Hackers are breaking into BeyondTrust systems worldwide without even needing a password, and attacks started just hours after the flaw went public. Is your organization already compromised?

thedefendopsdiaries.com/how-at

##

AAKL at 2026-02-12T18:15:38.155Z ##

New.

GreyNoise: Reconnaissance Has Begun for the New BeyondTrust RCE (CVE-2026-1731): Here's What We See So Far greynoise.io/blog/reconnaissan @greynoise

##

threatcodex at 2026-02-12T18:06:38.073Z ##

Reconnaissance Has Begun for the New BeyondTrust RCE (CVE-2026-1731): Here's What We See So Far

greynoise.io/blog/reconnaissan

##

secdb@infosec.exchange at 2026-02-14T02:00:13.000Z ##

🚨 [CISA-2026:0213] CISA Adds One Known Exploited Vulnerability to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2026-1731 (secdb.nttzen.cloud/cve/detail/)
- Name: BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) OS Command Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: BeyondTrust
- Product: Remote Support (RS) and Privileged Remote Access (PRA)
- Notes: Please adhere to the vendor&#39;s guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible BeyondTrust products affected by this vulnerability. For more information please: see: beyondtrust.com/trust-center/s ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260213 #cisa20260213 #cve_2026_1731 #cve20261731

##

cisakevtracker@mastodon.social at 2026-02-14T01:00:54.000Z ##

CVE ID: CVE-2026-1731
Vendor: BeyondTrust
Product: Remote Support (RS) and Privileged Remote Access (PRA)
Date Added: 2026-02-13
Notes: Please adhere to the vendor's guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible BeyondTrust products affected by this vulnerability. For more information please: see: beyondtrust.com/trust-center/s ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

jbhall56@infosec.exchange at 2026-02-13T14:54:14.000Z ##

Exploitation attempts target CVE-2026-1731, a critical unauthenticated remote code execution flaw in BeyondTrust Remote Support. securityweek.com/beyondtrust-v

##

youranonnewsirc@nerdculture.de at 2026-02-13T11:47:57.000Z ##

Here's a summary of the latest critical news in technology and cybersecurity:

State-backed hackers are reportedly leveraging Google's Gemini AI for reconnaissance and attack support. A critical BeyondTrust Remote Code Execution vulnerability (CVE-2026-1731) is being actively exploited in the wild. CISA has added four new exploited vulnerabilities to its Known Exploited Vulnerabilities Catalog. In technology, Samsung commenced shipping of industry-first HBM4 memory for AI computing, and HKUST announced a major advance in calcium-ion battery technology.

#AnonNews_irc #Cybersecurity #Anonymous #News

##

defendopsdiaries@infosec.exchange at 2026-02-12T21:47:24.000Z ##

Hackers are breaking into BeyondTrust systems worldwide without even needing a password, and attacks started just hours after the flaw went public. Is your organization already compromised?

thedefendopsdiaries.com/how-at

##

AAKL@infosec.exchange at 2026-02-12T18:15:38.000Z ##

New.

GreyNoise: Reconnaissance Has Begun for the New BeyondTrust RCE (CVE-2026-1731): Here's What We See So Far greynoise.io/blog/reconnaissan @greynoise #infosec #vulnerability

##

threatcodex@infosec.exchange at 2026-02-12T18:06:38.000Z ##

Reconnaissance Has Begun for the New BeyondTrust RCE (CVE-2026-1731): Here's What We See So Far
#CVE_2026_1731
greynoise.io/blog/reconnaissan

##

CVE-2026-24853
(8.1 HIGH)

EPSS: 0.00%

updated 2026-02-13T23:16:11.800000

2 posts

Caido is a web security auditing toolkit. Prior to 0.55.0, Caido blocks non whitelisted domains to reach out through the 8080 port, and shows Host/IP is not allowed to connect to Caido on all endpoints. But this is bypassable by injecting a X-Forwarded-Host: 127.0.0.1:8080 header. This vulnerability is fixed in 0.55.0.

thehackerwire@mastodon.social at 2026-02-13T23:29:25.000Z ##

🟠 CVE-2026-24853 - High (8.1)

Caido is a web security auditing toolkit. Prior to 0.55.0, Caido blocks non whitelisted domains to reach out through the 8080 port, and shows Host/IP is not allowed to connect to Caido on all endpoints. But this is bypassable by injecting a X-Forw...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T23:29:25.000Z ##

🟠 CVE-2026-24853 - High (8.1)

Caido is a web security auditing toolkit. Prior to 0.55.0, Caido blocks non whitelisted domains to reach out through the 8080 port, and shows Host/IP is not allowed to connect to Caido on all endpoints. But this is bypassable by injecting a X-Forw...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26273
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-02-13T22:16:11.330000

4 posts

Known is a social publishing platform. Prior to 1.6.3, a Critical Broken Authentication vulnerability exists in Known 1.6.2 and earlier. The application leaks the password reset token within a hidden HTML input field on the password reset page. This allows any unauthenticated attacker to retrieve the reset token for any user by simply querying the user's email, leading to full Account Takeover (AT

offseq at 2026-02-14T00:00:42.608Z ##

🔴 CRITICAL: CVE-2026-26273 in Known <1.6.3 leaks password reset tokens in HTML — full account takeover possible without email access. Upgrade to 1.6.3+ & audit reset flows. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-13T22:17:09.000Z ##

🔴 CVE-2026-26273 - Critical (9.8)

Known is a social publishing platform. Prior to 1.6.3, a Critical Broken Authentication vulnerability exists in Known 1.6.2 and earlier. The application leaks the password reset token within a hidden HTML input field on the password reset page. Th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-14T00:00:42.000Z ##

🔴 CRITICAL: CVE-2026-26273 in Known <1.6.3 leaks password reset tokens in HTML — full account takeover possible without email access. Upgrade to 1.6.3+ & audit reset flows. radar.offseq.com/threat/cve-20 #OffSeq #CVE202626273 #Vuln #Security

##

thehackerwire@mastodon.social at 2026-02-13T22:17:09.000Z ##

🔴 CVE-2026-26273 - Critical (9.8)

Known is a social publishing platform. Prior to 1.6.3, a Critical Broken Authentication vulnerability exists in Known 1.6.2 and earlier. The application leaks the password reset token within a hidden HTML input field on the password reset page. Th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26269
(5.4 MEDIUM)

EPSS: 0.00%

updated 2026-02-13T22:16:11.220000

2 posts

Vim is an open source, command line text editor. Prior to 9.1.2148, a stack buffer overflow vulnerability exists in Vim's NetBeans integration when processing the specialKeys command, affecting Vim builds that enable and use the NetBeans feature. The Stack buffer overflow exists in special_keys() (in src/netbeans.c). The while (*tok) loop writes two bytes per iteration into a 64-byte stack buffer

CVE-2025-15157
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-13T22:16:08.427000

4 posts

The Starfish Review Generation & Marketing for WordPress plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the 'srm_restore_options_defaults' function in all versions up to, and including, 3.1.19. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbi

thehackerwire@mastodon.social at 2026-02-13T22:18:13.000Z ##

🟠 CVE-2025-15157 - High (8.8)

The Starfish Review Generation & Marketing for WordPress plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the 'srm_restore_options_defaults' function...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T22:17:17.000Z ##

🟠 CVE-2025-15157 - High (8.8)

The Starfish Review Generation & Marketing for WordPress plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the 'srm_restore_options_defaults' function...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T22:18:13.000Z ##

🟠 CVE-2025-15157 - High (8.8)

The Starfish Review Generation & Marketing for WordPress plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the 'srm_restore_options_defaults' function...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T22:17:17.000Z ##

🟠 CVE-2025-15157 - High (8.8)

The Starfish Review Generation & Marketing for WordPress plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the 'srm_restore_options_defaults' function...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26187
(8.1 HIGH)

EPSS: 0.00%

updated 2026-02-13T22:11:50

2 posts

## Summary Two path traversal vulnerabilities in the local block adapter allow authenticated users to read and write files outside their designated storage boundaries. ## Details The local block adapter in `pkg/block/local/adapter.go` had two path traversal vulnerabilities: ### 1. Prefix Bypass Vulnerability The `verifyRelPath` function used `strings.HasPrefix()` to verify that requested path

thehackerwire@mastodon.social at 2026-02-13T21:06:56.000Z ##

🟠 CVE-2026-26187 - High (8.1)

lakeFS is an open-source tool that transforms object storage into a Git-like repositories. Prior to 1.77.0, the local block adapter (pkg/block/local/adapter.go) allows authenticated users to read and write files outside their designated storage bo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T21:06:56.000Z ##

🟠 CVE-2026-26187 - High (8.1)

lakeFS is an open-source tool that transforms object storage into a Git-like repositories. Prior to 1.77.0, the local block adapter (pkg/block/local/adapter.go) allows authenticated users to read and write files outside their designated storage bo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20615
(7.8 HIGH)

EPSS: 0.02%

updated 2026-02-13T21:43:42.930000

2 posts

A path handling issue was addressed with improved validation. This issue is fixed in iOS 26.3 and iPadOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, visionOS 26.3. An app may be able to gain root privileges.

thehackerwire@mastodon.social at 2026-02-14T02:34:39.000Z ##

🟠 CVE-2026-20615 - High (7.8)

A path handling issue was addressed with improved validation. This issue is fixed in iOS 26.3 and iPadOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, visionOS 26.3. An app may be able to gain root privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-14T02:34:39.000Z ##

🟠 CVE-2026-20615 - High (7.8)

A path handling issue was addressed with improved validation. This issue is fixed in iOS 26.3 and iPadOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, visionOS 26.3. An app may be able to gain root privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26335
(0 None)

EPSS: 0.00%

updated 2026-02-13T21:43:11.137000

2 posts

Calero VeraSMART versions prior to 2022 R1 use static ASP.NET/IIS machineKey values configured for the VeraSMART web application and stored in C:\\Program Files (x86)\\Veramark\\VeraSMART\\WebRoot\\web.config. An attacker who obtains these keys can craft a valid ASP.NET ViewState payload that passes integrity validation and is accepted by the application, resulting in server-side deserialization a

offseq at 2026-02-14T03:00:30.689Z ##

CVE-2026-26335 (CRITICAL, CVSS 9.3): Calero VeraSMART <2022 R1 uses hard-coded crypto keys, enabling unauth RCE via crafted ViewState in ASP.NET. No exploits yet, but immediate upgrade or key rotation essential! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-14T03:00:30.000Z ##

CVE-2026-26335 (CRITICAL, CVSS 9.3): Calero VeraSMART <2022 R1 uses hard-coded crypto keys, enabling unauth RCE via crafted ViewState in ASP.NET. No exploits yet, but immediate upgrade or key rotation essential! radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Calero #RCE

##

CVE-2026-26333
(0 None)

EPSS: 0.00%

updated 2026-02-13T21:43:11.137000

2 posts

Calero VeraSMART versions prior to 2022 R1 expose an unauthenticated .NET Remoting HTTP service on TCP port 8001. The service publishes default ObjectURIs (including EndeavorServer.rem and RemoteFileReceiver.rem) and permits the use of SOAP and binary formatters with TypeFilterLevel set to Full. An unauthenticated remote attacker can invoke the exposed remoting endpoints to perform arbitrary file

offseq at 2026-02-14T01:30:29.310Z ##

🚨 CRITICAL: CVE-2026-26333 in Calero VeraSMART (pre-2022 R1) allows unauth RCE via exposed .NET Remoting on port 8001. Attackers can read configs, steal machineKeys, and capture NTLMv2 hashes. Restrict access & patch! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-14T01:30:29.000Z ##

🚨 CRITICAL: CVE-2026-26333 in Calero VeraSMART (pre-2022 R1) allows unauth RCE via exposed .NET Remoting on port 8001. Attackers can read configs, steal machineKeys, and capture NTLMv2 hashes. Restrict access & patch! radar.offseq.com/threat/cve-20 #OffSeq #CVE202626333 #BlueTeam

##

CVE-2025-70123
(7.5 HIGH)

EPSS: 0.00%

updated 2026-02-13T21:43:11.137000

6 posts

An improper input validation and protocol compliance vulnerability in free5GC v4.0.1 allows remote attackers to cause a denial of service. The UPF incorrectly accepts a malformed PFCP Association Setup Request, violating 3GPP TS 29.244. This places the UPF in an inconsistent state where a subsequent valid PFCP Session Establishment Request triggers a cascading failure, disrupting the SMF connectio

thehackerwire@mastodon.social at 2026-02-13T23:29:33.000Z ##

🟠 CVE-2025-70123 - High (7.5)

An improper input validation and protocol compliance vulnerability in free5GC v4.0.1 allows remote attackers to cause a denial of service. The UPF incorrectly accepts a malformed PFCP Association Setup Request, violating 3GPP TS 29.244. This place...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T22:18:21.000Z ##

🟠 CVE-2025-70123 - High (7.5)

An improper input validation and protocol compliance vulnerability in free5GC v4.0.1 allows remote attackers to cause a denial of service. The UPF incorrectly accepts a malformed PFCP Association Setup Request, violating 3GPP TS 29.244. This place...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T22:17:35.000Z ##

🟠 CVE-2025-70123 - High (7.5)

An improper input validation and protocol compliance vulnerability in free5GC v4.0.1 allows remote attackers to cause a denial of service. The UPF incorrectly accepts a malformed PFCP Association Setup Request, violating 3GPP TS 29.244. This place...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T23:29:33.000Z ##

🟠 CVE-2025-70123 - High (7.5)

An improper input validation and protocol compliance vulnerability in free5GC v4.0.1 allows remote attackers to cause a denial of service. The UPF incorrectly accepts a malformed PFCP Association Setup Request, violating 3GPP TS 29.244. This place...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T22:18:21.000Z ##

🟠 CVE-2025-70123 - High (7.5)

An improper input validation and protocol compliance vulnerability in free5GC v4.0.1 allows remote attackers to cause a denial of service. The UPF incorrectly accepts a malformed PFCP Association Setup Request, violating 3GPP TS 29.244. This place...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T22:17:35.000Z ##

🟠 CVE-2025-70123 - High (7.5)

An improper input validation and protocol compliance vulnerability in free5GC v4.0.1 allows remote attackers to cause a denial of service. The UPF incorrectly accepts a malformed PFCP Association Setup Request, violating 3GPP TS 29.244. This place...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69770
(10.0 CRITICAL)

EPSS: 0.00%

updated 2026-02-13T21:43:11.137000

2 posts

A zip slip vulnerability in the /DesignTools/SkinList.aspx endpoint of MojoPortal CMS v2.9.0.1 allows attackers to execute arbitrary commands via uploading a crafted zip file.

thehackerwire@mastodon.social at 2026-02-13T22:17:19.000Z ##

🔴 CVE-2025-69770 - Critical (10)

A zip slip vulnerability in the /DesignTools/SkinList.aspx endpoint of MojoPortal CMS v2.9.0.1 allows attackers to execute arbitrary commands via uploading a crafted zip file.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T22:17:19.000Z ##

🔴 CVE-2025-69770 - Critical (10)

A zip slip vulnerability in the /DesignTools/SkinList.aspx endpoint of MojoPortal CMS v2.9.0.1 allows attackers to execute arbitrary commands via uploading a crafted zip file.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2441
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-13T21:31:40

8 posts

Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

ruario@vivaldi.net at 2026-02-13T21:40:02.000Z ##

This build has a fix for CVE-2026-2441 (Use after free in CSS), which has a known exploit in the wild.

##

ruario@vivaldi.net at 2026-02-13T21:39:51.000Z ##

@secbox @vivaldiversiontracker

It might seem strange but this build has a fix for CVE-2026-2441 (Use after free in CSS), which has a known exploit in the wild. 🤷

@Vivaldi

##

ruario@vivaldi.net at 2026-02-13T21:38:49.000Z ##

This build has a fix for CVE-2026-2441 (Use after free in CSS), which has a known exploit in the wild.

Note: Vivaldi 7.8.3925.66 also has that fix.

##

thehackerwire@mastodon.social at 2026-02-13T21:06:47.000Z ##

🟠 CVE-2026-2441 - High (8.8)

Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

ruario@vivaldi.net at 2026-02-13T21:40:02.000Z ##

This build has a fix for CVE-2026-2441 (Use after free in CSS), which has a known exploit in the wild.

##

ruario@vivaldi.net at 2026-02-13T21:39:51.000Z ##

@secbox @vivaldiversiontracker

It might seem strange but this build has a fix for CVE-2026-2441 (Use after free in CSS), which has a known exploit in the wild. 🤷

@Vivaldi

##

ruario@vivaldi.net at 2026-02-13T21:38:49.000Z ##

This build has a fix for CVE-2026-2441 (Use after free in CSS), which has a known exploit in the wild.

Note: Vivaldi 7.8.3925.66 also has that fix.

##

thehackerwire@mastodon.social at 2026-02-13T21:06:47.000Z ##

🟠 CVE-2026-2441 - High (8.8)

Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70121
(7.5 HIGH)

EPSS: 0.00%

updated 2026-02-13T21:31:36

2 posts

An array index out of bounds vulnerability in the AMF component of free5GC v4.0.1 allows remote attackers to cause a denial of service via a crafted 5GS Mobile Identity in a NAS Registration Request message. The issue occurs in the GetSUCI method (NAS_MobileIdentity5GS.go) when accessing index 5 of a 5-element array, leading to a runtime panic and AMF crash.

thehackerwire@mastodon.social at 2026-02-13T22:17:41.000Z ##

🟠 CVE-2025-70121 - High (7.5)

An array index out of bounds vulnerability in the AMF component of free5GC v4.0.1 allows remote attackers to cause a denial of service via a crafted 5GS Mobile Identity in a NAS Registration Request message. The issue occurs in the GetSUCI method ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T22:17:41.000Z ##

🟠 CVE-2025-70121 - High (7.5)

An array index out of bounds vulnerability in the AMF component of free5GC v4.0.1 allows remote attackers to cause a denial of service via a crafted 5GS Mobile Identity in a NAS Registration Request message. The issue occurs in the GetSUCI method ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70122
(7.5 HIGH)

EPSS: 0.00%

updated 2026-02-13T21:31:36

2 posts

A heap buffer overflow vulnerability in the UPF component of free5GC v4.0.1 allows remote attackers to cause a denial of service via a crafted PFCP Session Modification Request. The issue occurs in the SDFFilterFields.UnmarshalBinary function (sdf-filter.go) when processing a declared length that exceeds the actual buffer capacity, leading to a runtime panic and UPF crash.

thehackerwire@mastodon.social at 2026-02-13T22:17:28.000Z ##

🟠 CVE-2025-70122 - High (7.5)

A heap buffer overflow vulnerability in the UPF component of free5GC v4.0.1 allows remote attackers to cause a denial of service via a crafted PFCP Session Modification Request. The issue occurs in the SDFFilterFields.UnmarshalBinary function (sdf...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T22:17:28.000Z ##

🟠 CVE-2025-70122 - High (7.5)

A heap buffer overflow vulnerability in the UPF component of free5GC v4.0.1 allows remote attackers to cause a denial of service via a crafted PFCP Session Modification Request. The issue occurs in the SDFFilterFields.UnmarshalBinary function (sdf...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20667
(8.8 HIGH)

EPSS: 0.01%

updated 2026-02-13T21:31:36

2 posts

A logic issue was addressed with improved checks. This issue is fixed in watchOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 26.3 and iPadOS 26.3. An app may be able to break out of its sandbox.

thehackerwire@mastodon.social at 2026-02-13T00:44:49.000Z ##

🟠 CVE-2026-20667 - High (8.8)

A logic issue was addressed with improved checks. This issue is fixed in watchOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 26.3 and iPadOS 26.3. An app may be able to break out of its sandbox.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T00:44:49.000Z ##

🟠 CVE-2026-20667 - High (8.8)

A logic issue was addressed with improved checks. This issue is fixed in watchOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 26.3 and iPadOS 26.3. An app may be able to break out of its sandbox.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20617
(7.0 None)

EPSS: 0.02%

updated 2026-02-13T21:31:35

2 posts

A race condition was addressed with improved state handling. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An app may be able to gain root privileges.

offseq at 2026-02-12T04:30:32.618Z ##

🚨 CVE-2026-20617 (CRITICAL): Race condition lets malicious apps escalate to root on macOS & Apple OS. No exploits in the wild yet — patch to Sonoma 14.8.4, Tahoe 26.3 ASAP! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-12T04:30:32.000Z ##

🚨 CVE-2026-20617 (CRITICAL): Race condition lets malicious apps escalate to root on macOS & Apple OS. No exploits in the wild yet — patch to Sonoma 14.8.4, Tahoe 26.3 ASAP! radar.offseq.com/threat/cve-20 #OffSeq #macOS #Apple #Infosec #CVE202620617

##

CVE-2026-25924
(8.4 HIGH)

EPSS: 0.04%

updated 2026-02-13T21:30:01.447000

1 posts

Kanboard is project management software focused on Kanban methodology. Prior to 1.2.50, a security control bypass vulnerability in Kanboard allows an authenticated administrator to achieve full Remote Code Execution (RCE). Although the application correctly hides the plugin installation interface when the PLUGIN_INSTALLER configuration is set to false, the underlying backend endpoint fails to veri

1 repos

https://github.com/drkim-dev/CVE-2026-25924

thehackerwire@mastodon.social at 2026-02-11T21:17:35.000Z ##

🟠 CVE-2026-25924 - High (8.4)

Kanboard is project management software focused on Kanban methodology. Prior to 1.2.50, a security control bypass vulnerability in Kanboard allows an authenticated administrator to achieve full Remote Code Execution (RCE). Although the application...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20620
(7.7 HIGH)

EPSS: 0.02%

updated 2026-02-13T21:16:30.177000

2 posts

An out-of-bounds read issue was addressed with improved input validation. This issue is fixed in macOS Sequoia 15.7.4, macOS Tahoe 26.3, macOS Sonoma 14.8.4. An attacker may be able to cause unexpected system termination or read kernel memory.

thehackerwire@mastodon.social at 2026-02-14T02:34:49.000Z ##

🟠 CVE-2026-20620 - High (7.7)

An out-of-bounds read issue was addressed with improved input validation. This issue is fixed in macOS Sequoia 15.7.4, macOS Tahoe 26.3, macOS Sonoma 14.8.4. An attacker may be able to cause unexpected system termination or read kernel memory.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-14T02:34:49.000Z ##

🟠 CVE-2026-20620 - High (7.7)

An out-of-bounds read issue was addressed with improved input validation. This issue is fixed in macOS Sequoia 15.7.4, macOS Tahoe 26.3, macOS Sonoma 14.8.4. An attacker may be able to cause unexpected system termination or read kernel memory.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20614
(7.8 HIGH)

EPSS: 0.02%

updated 2026-02-13T20:22:46.497000

2 posts

A path handling issue was addressed with improved validation. This issue is fixed in macOS Sequoia 15.7.4, macOS Tahoe 26.3, macOS Sonoma 14.8.4. An app may be able to gain root privileges.

offseq at 2026-02-12T01:30:30.288Z ##

🚨 CVE-2026-20614 (CRITICAL): Privilege escalation in macOS lets apps gain root with no user interaction. Fixes: Sequoia 15.7.4, Tahoe 26.3, Sonoma 14.8.4. Patch now to block full compromise — esp. in EU orgs! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-12T01:30:30.000Z ##

🚨 CVE-2026-20614 (CRITICAL): Privilege escalation in macOS lets apps gain root with no user interaction. Fixes: Sequoia 15.7.4, Tahoe 26.3, Sonoma 14.8.4. Patch now to block full compromise — esp. in EU orgs! radar.offseq.com/threat/cve-20 #OffSeq #macOS #Vuln #Patch

##

CVE-2026-2314
(8.8 HIGH)

EPSS: 0.02%

updated 2026-02-13T18:31:24

1 posts

Heap buffer overflow in Codecs in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-02-11T21:02:04.000Z ##

🟠 CVE-2026-2314 - High (8.8)

Heap buffer overflow in Codecs in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20660
(7.5 HIGH)

EPSS: 0.05%

updated 2026-02-13T18:16:19.127000

2 posts

A path handling issue was addressed with improved logic. This issue is fixed in macOS Tahoe 26.3, macOS Sonoma 14.8.4, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3, Safari 26.3. A remote user may be able to write arbitrary files.

thehackerwire@mastodon.social at 2026-02-13T00:45:09.000Z ##

🟠 CVE-2026-20660 - High (7.5)

A path handling issue was addressed with improved logic. This issue is fixed in macOS Tahoe 26.3, macOS Sonoma 14.8.4, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3, Safari 26.3. A remote user may be able to write arbitrary...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T00:45:09.000Z ##

🟠 CVE-2026-20660 - High (7.5)

A path handling issue was addressed with improved logic. This issue is fixed in macOS Tahoe 26.3, macOS Sonoma 14.8.4, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3, Safari 26.3. A remote user may be able to write arbitrary...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20649
(7.5 HIGH)

EPSS: 0.02%

updated 2026-02-13T18:16:18.967000

2 posts

A logging issue was addressed with improved data redaction. This issue is fixed in watchOS 26.3, iOS 26.3 and iPadOS 26.3, tvOS 26.3, macOS Tahoe 26.3. A user may be able to view sensitive user information.

thehackerwire@mastodon.social at 2026-02-14T02:34:28.000Z ##

🟠 CVE-2026-20649 - High (7.5)

A logging issue was addressed with improved data redaction. This issue is fixed in watchOS 26.3, iOS 26.3 and iPadOS 26.3, tvOS 26.3, macOS Tahoe 26.3. A user may be able to view sensitive user information.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-14T02:34:28.000Z ##

🟠 CVE-2026-20649 - High (7.5)

A logging issue was addressed with improved data redaction. This issue is fixed in watchOS 26.3, iOS 26.3 and iPadOS 26.3, tvOS 26.3, macOS Tahoe 26.3. A user may be able to view sensitive user information.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25253
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-13T17:41:02.987000

1 posts

OpenClaw (aka clawdbot or Moltbot) before 2026.1.29 obtains a gatewayUrl value from a query string and automatically makes a WebSocket connection without prompting, sending a token value.

4 repos

https://github.com/ethiack/moltbot-1click-rce

https://github.com/al4n4n/CVE-2026-25253-research

https://github.com/adibirzu/openclaw-security-monitor

https://github.com/Joseph19820124/openclaw-vuln-report

SerferTroyan@mastodon.social at 2026-02-12T17:24:06.000Z ##

📰 CVE-2026-25253: How Malicious Links Can Steal Authentication Tokens and Compromise OpenClaw AI Systems

This article examines the CVE-2026-25253 vulnerability in the OpenClaw AI assistant, highlighting how it enables attackers to capture authentication tokens through malicious web pages and compromised WebSocket connections

🔗 hackers-arise.com/cve-2026-252

##

CVE-2026-2319
(7.5 HIGH)

EPSS: 0.02%

updated 2026-02-13T17:29:10.443000

1 posts

Race in DevTools in Google Chrome prior to 145.0.7632.45 allowed a remote attacker who convinced a user to engage in specific UI gestures and install a malicious extension to potentially exploit object corruption via a malicious file. (Chromium security severity: Medium)

thehackerwire@mastodon.social at 2026-02-11T21:01:45.000Z ##

🟠 CVE-2026-2319 - High (7.5)

Race in DevTools in Google Chrome prior to 145.0.7632.45 allowed a remote attacker who convinced a user to engage in specific UI gestures and install a malicious extension to potentially exploit object corruption via a malicious file. (Chromium se...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26190
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-02-13T17:17:13

2 posts

## Summary Milvus exposes TCP port 9091 by default with two critical authentication bypass vulnerabilities: 1. The `/expr` debug endpoint uses a weak, predictable default authentication token derived from `etcd.rootPath` (default: `by-dev`), enabling arbitrary expression evaluation. 2. The full REST API (`/api/v1/*`) is registered on the metrics/management port without any authentication, allowi

thehackerwire@mastodon.social at 2026-02-13T21:07:06.000Z ##

🔴 CVE-2026-26190 - Critical (9.8)

Milvus is an open-source vector database built for generative AI applications. Prior to 2.5.27 and 2.6.10, Milvus exposes TCP port 9091 by default, which enables authentication bypasses. The /expr debug endpoint uses a weak, predictable default au...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T21:07:06.000Z ##

🔴 CVE-2026-26190 - Critical (9.8)

Milvus is an open-source vector database built for generative AI applications. Prior to 2.5.27 and 2.6.10, Milvus exposes TCP port 9091 by default, which enables authentication bypasses. The /expr debug endpoint uses a weak, predictable default au...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26056
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-13T17:15:44

2 posts

# Arbitrary WASM Code Execution via AnnotationOverrideFlight Injection in Yoke ATC This vulnerability exists in the Air Traffic Controller (ATC) component of Yoke, a Kubernetes deployment tool. It allows users with CR create/update permissions to execute arbitrary WASM code in the ATC controller context by injecting a malicious URL through the `overrides.yoke.cd/flight` annotation. The ATC contro

thehackerwire@mastodon.social at 2026-02-12T22:17:07.000Z ##

🟠 CVE-2026-26056 - High (8.8)

Yoke is a Helm-inspired infrastructure-as-code (IaC) package deployer. In 0.19.0 and earlier, a vulnerability exists in the Air Traffic Controller (ATC) component of Yoke. It allows users with CR create/update permissions to execute arbitrary WASM...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T22:17:07.000Z ##

🟠 CVE-2026-26056 - High (8.8)

Yoke is a Helm-inspired infrastructure-as-code (IaC) package deployer. In 0.19.0 and earlier, a vulnerability exists in the Air Traffic Controller (ATC) component of Yoke. It allows users with CR create/update permissions to execute arbitrary WASM...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26055
(7.5 HIGH)

EPSS: 0.07%

updated 2026-02-13T17:15:38

2 posts

# Unauthenticated Admission Webhook Endpoints in Yoke ATC This vulnerability exists in the Air Traffic Controller (ATC) component of Yoke, a Kubernetes deployment tool. The ATC webhook endpoints lack proper authentication mechanisms, allowing any pod within the cluster network to directly send AdmissionReview requests to the webhook, bypassing Kubernetes API Server authentication. This enables at

thehackerwire@mastodon.social at 2026-02-12T22:16:56.000Z ##

🟠 CVE-2026-26055 - High (7.5)

Yoke is a Helm-inspired infrastructure-as-code (IaC) package deployer. In 0.19.0 and earlier, a vulnerability exists in the Air Traffic Controller (ATC) component of Yoke. The ATC webhook endpoints lack proper authentication mechanisms, allowing a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T22:16:56.000Z ##

🟠 CVE-2026-26055 - High (7.5)

Yoke is a Helm-inspired infrastructure-as-code (IaC) package deployer. In 0.19.0 and earlier, a vulnerability exists in the Air Traffic Controller (ATC) component of Yoke. The ATC webhook endpoints lack proper authentication mechanisms, allowing a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20654
(5.5 MEDIUM)

EPSS: 0.02%

updated 2026-02-13T15:31:29

2 posts

The issue was addressed with improved memory handling. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An app may be able to cause unexpected system termination.

speedyfriend67 at 2026-02-12T02:44:32.937Z ##

Got my first Apple CVE!
CVE-2026-20654

At the age of 19, I have finally achieved my goal.

Weird thing is, the 2025 CVE isn't addressed yet haha

More exciting news coming soon!

Thank you everyone for the support 🥹🙏

##

speedyfriend67@infosec.exchange at 2026-02-12T02:44:32.000Z ##

Got my first Apple CVE!
CVE-2026-20654

At the age of 19, I have finally achieved my goal.

Weird thing is, the 2025 CVE isn't addressed yet haha

More exciting news coming soon!

Thank you everyone for the support 🥹🙏

##

CVE-2025-14349
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-13T15:30:33

2 posts

Privilege Defined With Unsafe Actions, Missing Authentication for Critical Function vulnerability in Universal Software Inc. FlexCity/Kiosk allows Accessing Functionality Not Properly Constrained by ACLs, Privilege Escalation.This issue affects FlexCity/Kiosk: from 1.0 before 1.0.36.

thehackerwire@mastodon.social at 2026-02-13T22:18:02.000Z ##

🟠 CVE-2025-14349 - High (8.8)

Privilege Defined With Unsafe Actions, Missing Authentication for Critical Function vulnerability in Universal Software Inc. FlexCity/Kiosk allows Accessing Functionality Not Properly Constrained by ACLs, Privilege Escalation.This issue affects Fl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T22:18:02.000Z ##

🟠 CVE-2025-14349 - High (8.8)

Privilege Defined With Unsafe Actions, Missing Authentication for Critical Function vulnerability in Universal Software Inc. FlexCity/Kiosk allows Accessing Functionality Not Properly Constrained by ACLs, Privilege Escalation.This issue affects Fl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1619
(8.3 HIGH)

EPSS: 0.00%

updated 2026-02-13T15:30:27

2 posts

Authorization Bypass Through User-Controlled Key vulnerability in Universal Software Inc. FlexCity/Kiosk allows Exploitation of Trusted Identifiers.This issue affects FlexCity/Kiosk: from 1.0 before 1.0.36.

thehackerwire@mastodon.social at 2026-02-13T22:17:52.000Z ##

🟠 CVE-2026-1619 - High (8.3)

Authorization Bypass Through User-Controlled Key vulnerability in Universal Software Inc. FlexCity/Kiosk allows Exploitation of Trusted Identifiers.This issue affects FlexCity/Kiosk: from 1.0 before 1.0.36.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T22:17:52.000Z ##

🟠 CVE-2026-1619 - High (8.3)

Authorization Bypass Through User-Controlled Key vulnerability in Universal Software Inc. FlexCity/Kiosk allows Exploitation of Trusted Identifiers.This issue affects FlexCity/Kiosk: from 1.0 before 1.0.36.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-15556
(7.5 HIGH)

EPSS: 11.09%

updated 2026-02-13T15:30:24

9 posts

Notepad++ versions prior to 8.8.9, when using the WinGUp updater, contain an update integrity verification vulnerability where downloaded update metadata and installers are not cryptographically verified. An attacker able to intercept or redirect update traffic can cause the updater to download and execute an attacker-controlled installer, resulting in arbitrary code execution with the privileges

2 repos

https://github.com/George0Papasotiriou/CVE-2025-15556-Notepad-WinGUp-Updater-RCE

https://github.com/renat0z3r0/notepadpp-supply-chain-iocs

guardingpearsoftware@mastodon.social at 2026-02-13T10:16:52.000Z ##

CISA has added a critical code execution flaw in Notepad++ to its Known Exploited Vulnerabilities (KEV) catalog.

Notepad++ is a widely used open-source text editor popular among developers and IT teams.

The vulnerability (CVE-2025-15556) allows attackers to intercept or manipulate update traffic, tricking users into installing malicious payloads. The issue has been fixed in version 8.8.9 and all later releases.

##

secdb at 2026-02-12T22:00:16.528Z ##

🚨 [CISA-2026:0212] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2024-43468 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Configuration Manager SQL Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Configuration Manager
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-15556 (secdb.nttzen.cloud/cve/detail/)
- Name: Notepad++ Download of Code Without Integrity Check Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Notepad++
- Product: Notepad++
- Notes: notepad-plus-plus.org/news/cla ; community.notepad-plus-plus.or ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-40536 (secdb.nttzen.cloud/cve/detail/)
- Name: SolarWinds Web Help Desk Security Control Bypass Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: SolarWinds
- Product: Web Help Desk
- Notes: documentation.solarwinds.com/e ; solarwinds.com/trust-center/se ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-20700 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/126346 ; support.apple.com/en-us/126348 ; support.apple.com/en-us/126351 ; support.apple.com/en-us/126352 ; support.apple.com/en-us/126353 ; nvd.nist.gov/vuln/detail/CVE-2

##

AAKL at 2026-02-12T21:02:12.098Z ##

CISA has updated the KEV catalogue. I see Notepad++ has made it to the list.

- CVE-2025-40536: SolarWinds Web Help Desk Security Control Bypass Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-15556: Notepad++ Download of Code Without Integrity Check Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2024-43468: Microsoft Configuration Manager SQL Injection Vulnerability cve.org/CVERecord?id=CVE-2024-

- CVE-2026-20700: Apple Multiple Buffer Overflow Vulnerability cve.org/CVERecord?id=CVE-2026-

There are also several industrial advisories here: cisa.gov/

##

cisakevtracker@mastodon.social at 2026-02-12T19:01:41.000Z ##

CVE ID: CVE-2025-15556
Vendor: Notepad++
Product: Notepad++
Date Added: 2026-02-12
Notes: notepad-plus-plus.org/news/cla ; community.notepad-plus-plus.or ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

DarkWebInformer at 2026-02-12T18:51:53.049Z ##

‼️ CISA has added 3 vulnerabilities to the KEV Catalog

CVE-2025-15556: Notepad++ Download of Code Without Integrity Check Vulnerability: Notepad++ when using the WinGUp updater, contains a download of code without integrity check vulnerability that could allow an attacker to intercept or redirect update traffic to download and execute an attacker-controlled installer. This could lead to arbitrary code execution with the privileges of the user.

CVE-2026-20700: Apple Multiple Buffer Overflow Vulnerability: Apple iOS, macOS, tvOS, watchOS, and visionOS contain an improper restriction of operations within the bounds of a memory buffer vulnerability that could allow an attacker with memory write the capability to execute arbitrary code.

CVE-2024-43468: Microsoft Configuration Manager SQL Injection Vulnerability: Microsoft Configuration Manager contains an SQL injection vulnerability. An unauthenticated attacker could exploit this vulnerability by sending specially crafted requests to the target environment which are processed in an unsafe manner enabling the attacker to execute commands on the server and/or underlying database.

##

secdb@infosec.exchange at 2026-02-12T22:00:16.000Z ##

🚨 [CISA-2026:0212] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2024-43468 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Configuration Manager SQL Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Configuration Manager
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-15556 (secdb.nttzen.cloud/cve/detail/)
- Name: Notepad++ Download of Code Without Integrity Check Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Notepad++
- Product: Notepad++
- Notes: notepad-plus-plus.org/news/cla ; community.notepad-plus-plus.or ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-40536 (secdb.nttzen.cloud/cve/detail/)
- Name: SolarWinds Web Help Desk Security Control Bypass Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: SolarWinds
- Product: Web Help Desk
- Notes: documentation.solarwinds.com/e ; solarwinds.com/trust-center/se ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-20700 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/126346 ; support.apple.com/en-us/126348 ; support.apple.com/en-us/126351 ; support.apple.com/en-us/126352 ; support.apple.com/en-us/126353 ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260212 #cisa20260212 #cve_2024_43468 #cve_2025_15556 #cve_2025_40536 #cve_2026_20700 #cve202443468 #cve202515556 #cve202540536 #cve202620700

##

AAKL@infosec.exchange at 2026-02-12T21:02:12.000Z ##

CISA has updated the KEV catalogue. I see Notepad++ has made it to the list.

- CVE-2025-40536: SolarWinds Web Help Desk Security Control Bypass Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-15556: Notepad++ Download of Code Without Integrity Check Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2024-43468: Microsoft Configuration Manager SQL Injection Vulnerability cve.org/CVERecord?id=CVE-2024-

- CVE-2026-20700: Apple Multiple Buffer Overflow Vulnerability cve.org/CVERecord?id=CVE-2026-

There are also several industrial advisories here: cisa.gov/ #CISA #infosec #vulnerability #Apple #Microsoft #Notepad #SolarWinds

##

cisakevtracker@mastodon.social at 2026-02-12T19:01:41.000Z ##

CVE ID: CVE-2025-15556
Vendor: Notepad++
Product: Notepad++
Date Added: 2026-02-12
Notes: notepad-plus-plus.org/news/cla ; community.notepad-plus-plus.or ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

DarkWebInformer@infosec.exchange at 2026-02-12T18:51:53.000Z ##

‼️ CISA has added 3 vulnerabilities to the KEV Catalog

CVE-2025-15556: Notepad++ Download of Code Without Integrity Check Vulnerability: Notepad++ when using the WinGUp updater, contains a download of code without integrity check vulnerability that could allow an attacker to intercept or redirect update traffic to download and execute an attacker-controlled installer. This could lead to arbitrary code execution with the privileges of the user.

CVE-2026-20700: Apple Multiple Buffer Overflow Vulnerability: Apple iOS, macOS, tvOS, watchOS, and visionOS contain an improper restriction of operations within the bounds of a memory buffer vulnerability that could allow an attacker with memory write the capability to execute arbitrary code.

CVE-2024-43468: Microsoft Configuration Manager SQL Injection Vulnerability: Microsoft Configuration Manager contains an SQL injection vulnerability. An unauthenticated attacker could exploit this vulnerability by sending specially crafted requests to the target environment which are processed in an unsafe manner enabling the attacker to execute commands on the server and/or underlying database.

##

CVE-2026-20650
(7.5 HIGH)

EPSS: 0.04%

updated 2026-02-13T14:46:52.993000

2 posts

A denial-of-service issue was addressed with improved validation. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An attacker in a privileged network position may be able to perform denial-of-service attack using crafted Bluetooth packets.

thehackerwire@mastodon.social at 2026-02-13T01:07:16.000Z ##

🟠 CVE-2026-20650 - High (7.5)

A denial-of-service issue was addressed with improved validation. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An attacker in a privileged network position may be able to perform denial...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T01:07:16.000Z ##

🟠 CVE-2026-20650 - High (7.5)

A denial-of-service issue was addressed with improved validation. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An attacker in a privileged network position may be able to perform denial...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20658
(7.8 HIGH)

EPSS: 0.02%

updated 2026-02-13T14:45:17.953000

2 posts

A package validation issue was addressed by blocking the vulnerable package. This issue is fixed in macOS Tahoe 26.3. An app may be able to gain root privileges.

thehackerwire@mastodon.social at 2026-02-13T22:18:37.000Z ##

🟠 CVE-2026-20658 - High (7.8)

A package validation issue was addressed by blocking the vulnerable package. This issue is fixed in macOS Tahoe 26.3. An app may be able to gain root privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T22:18:37.000Z ##

🟠 CVE-2026-20658 - High (7.8)

A package validation issue was addressed by blocking the vulnerable package. This issue is fixed in macOS Tahoe 26.3. An app may be able to gain root privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25108
(8.8 HIGH)

EPSS: 0.25%

updated 2026-02-13T14:23:48.007000

4 posts

FileZen contains an OS command injection vulnerability. When FileZen Antivirus Check Option is enabled, a logged-in user may send a specially crafted HTTP request to execute an arbitrary OS command.

thehackerwire@mastodon.social at 2026-02-13T23:29:43.000Z ##

🟠 CVE-2026-25108 - High (8.8)

FileZen contains an OS command injection vulnerability. When FileZen Antivirus Check Option is enabled, a logged-in user may send a specially crafted HTTP request to execute an arbitrary OS command.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T22:18:32.000Z ##

🟠 CVE-2026-25108 - High (8.8)

FileZen contains an OS command injection vulnerability. When FileZen Antivirus Check Option is enabled, a logged-in user may send a specially crafted HTTP request to execute an arbitrary OS command.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T23:29:43.000Z ##

🟠 CVE-2026-25108 - High (8.8)

FileZen contains an OS command injection vulnerability. When FileZen Antivirus Check Option is enabled, a logged-in user may send a specially crafted HTTP request to execute an arbitrary OS command.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T22:18:32.000Z ##

🟠 CVE-2026-25108 - High (8.8)

FileZen contains an OS command injection vulnerability. When FileZen Antivirus Check Option is enabled, a logged-in user may send a specially crafted HTTP request to execute an arbitrary OS command.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1618
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-13T14:23:48.007000

2 posts

Authentication Bypass Using an Alternate Path or Channel vulnerability in Universal Software Inc. FlexCity/Kiosk allows Privilege Escalation.This issue affects FlexCity/Kiosk: from 1.0 before 1.0.36.

thehackerwire@mastodon.social at 2026-02-13T22:18:27.000Z ##

🟠 CVE-2026-1618 - High (8.8)

Authentication Bypass Using an Alternate Path or Channel vulnerability in Universal Software Inc. FlexCity/Kiosk allows Privilege Escalation.This issue affects FlexCity/Kiosk: from 1.0 before 1.0.36.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T22:18:27.000Z ##

🟠 CVE-2026-1618 - High (8.8)

Authentication Bypass Using an Alternate Path or Channel vulnerability in Universal Software Inc. FlexCity/Kiosk allows Privilege Escalation.This issue affects FlexCity/Kiosk: from 1.0 before 1.0.36.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26219
(9.1 CRITICAL)

EPSS: 0.02%

updated 2026-02-13T14:23:48.007000

4 posts

newbee-mall stores and verifies user passwords using an unsalted MD5 hashing algorithm. The implementation does not incorporate per-user salts or computational cost controls, enabling attackers who obtain password hashes through database exposure, backup leakage, or other compromise vectors to rapidly recover plaintext credentials via offline attacks.

offseq at 2026-02-13T10:30:30.106Z ##

🚨 CVE-2026-26219 (CRITICAL): newbee-mall 1.0.0 uses unsalted MD5 for password storage — enabling fast offline attacks if hashes leak. Upgrade to secure hashing (Argon2, bcrypt, PBKDF2) ASAP! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-12T21:28:50.000Z ##

🔴 CVE-2026-26219 - Critical (9.1)

newbee-mall stores and verifies user passwords using an unsalted MD5 hashing algorithm. The implementation does not incorporate per-user salts or computational cost controls, enabling attackers who obtain password hashes through database exposure,...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-13T10:30:30.000Z ##

🚨 CVE-2026-26219 (CRITICAL): newbee-mall 1.0.0 uses unsalted MD5 for password storage — enabling fast offline attacks if hashes leak. Upgrade to secure hashing (Argon2, bcrypt, PBKDF2) ASAP! radar.offseq.com/threat/cve-20 #OffSeq #infosec #vuln #ecommerce

##

thehackerwire@mastodon.social at 2026-02-12T21:28:50.000Z ##

🔴 CVE-2026-26219 - Critical (9.1)

newbee-mall stores and verifies user passwords using an unsalted MD5 hashing algorithm. The implementation does not incorporate per-user salts or computational cost controls, enabling attackers who obtain password hashes through database exposure,...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70886
(7.5 HIGH)

EPSS: 0.10%

updated 2026-02-13T14:23:48.007000

2 posts

An issue in halo v.2.22.4 and before allows a remote attacker to cause a denial of service via a crafted payload to the public comment submission endpoint

1 repos

https://github.com/HowieHz/CVE-2025-70886

thehackerwire@mastodon.social at 2026-02-12T22:18:26.000Z ##

🟠 CVE-2025-70886 - High (7.5)

An issue in halo v.2.22.4 and before allows a remote attacker to cause a denial of service via a crafted payload to the public comment submission endpoint

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T22:18:26.000Z ##

🟠 CVE-2025-70886 - High (7.5)

An issue in halo v.2.22.4 and before allows a remote attacker to cause a denial of service via a crafted payload to the public comment submission endpoint

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26217
(8.6 HIGH)

EPSS: 0.06%

updated 2026-02-13T14:23:48.007000

4 posts

Crawl4AI versions prior to 0.8.0 contain a local file inclusion vulnerability in the Docker API deployment. The /execute_js, /screenshot, /pdf, and /html endpoints accept file:// URLs, allowing unauthenticated remote attackers to read arbitrary files from the server filesystem. An attacker can access sensitive files such as /etc/passwd, /etc/shadow, application configuration files, and environment

thehackerwire@mastodon.social at 2026-02-12T22:01:36.000Z ##

🟠 CVE-2026-26217 - High (8.6)

Crawl4AI versions prior to 0.8.0 contain a local file inclusion vulnerability in the Docker API deployment. The /execute_js, /screenshot, /pdf, and /html endpoints accept file:// URLs, allowing unauthenticated remote attackers to read arbitrary fi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-02-12T16:00:15.517Z ##

🚨 CRITICAL: CVE-2026-26217 in Crawl4AI (<0.8.0) enables unauthenticated file read via Docker API endpoints. Attackers can access /etc/passwd, configs, and secrets. Upgrade to 0.8.0+! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-12T22:01:36.000Z ##

🟠 CVE-2026-26217 - High (8.6)

Crawl4AI versions prior to 0.8.0 contain a local file inclusion vulnerability in the Docker API deployment. The /execute_js, /screenshot, /pdf, and /html endpoints accept file:// URLs, allowing unauthenticated remote attackers to read arbitrary fi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-12T16:00:15.000Z ##

🚨 CRITICAL: CVE-2026-26217 in Crawl4AI (<0.8.0) enables unauthenticated file read via Docker API endpoints. Attackers can access /etc/passwd, configs, and secrets. Upgrade to 0.8.0+! radar.offseq.com/threat/cve-20 #OffSeq #CVE202626217 #infosec

##

CVE-2025-54756
(8.4 HIGH)

EPSS: 0.01%

updated 2026-02-13T14:23:48.007000

2 posts

BrightSign players running BrightSign OS series 4 prior to v8.5.53.1 or series 5 prior to v9.0.166 use a default password that is guessable with knowledge of the device information. The latest release fixes this issue for new installations; users of old installations are encouraged to change all default passwords.

thehackerwire@mastodon.social at 2026-02-12T21:34:50.000Z ##

🟠 CVE-2025-54756 - High (8.4)

BrightSign players running BrightSign OS series 4 prior to v8.5.53.1 or
series 5 prior to v9.0.166 use a default password that is guessable with
knowledge of the device information. The latest release fixes this
issue for new installations; use...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T21:34:50.000Z ##

🟠 CVE-2025-54756 - High (8.4)

BrightSign players running BrightSign OS series 4 prior to v8.5.53.1 or
series 5 prior to v9.0.166 use a default password that is guessable with
knowledge of the device information. The latest release fixes this
issue for new installations; use...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70981
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-02-13T14:23:48.007000

2 posts

CordysCRM 1.4.1 is vulnerable to SQL Injection in the employee list query interface (/user/list) via the departmentIds parameter.

thehackerwire@mastodon.social at 2026-02-12T21:29:53.000Z ##

🔴 CVE-2025-70981 - Critical (9.8)

CordysCRM 1.4.1 is vulnerable to SQL Injection in the employee list query interface (/user/list) via the departmentIds parameter.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T21:29:53.000Z ##

🔴 CVE-2025-70981 - Critical (9.8)

CordysCRM 1.4.1 is vulnerable to SQL Injection in the employee list query interface (/user/list) via the departmentIds parameter.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26218
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-02-13T14:23:48.007000

2 posts

newbee-mall includes pre-seeded administrator accounts in its database initialization script. These accounts are provisioned with a predictable default password. Deployments that initialize or reset the database using the provided schema and fail to change the default administrative credentials may allow unauthenticated attackers to log in as an administrator and gain full administrative control o

thehackerwire@mastodon.social at 2026-02-12T21:08:55.000Z ##

🔴 CVE-2026-26218 - Critical (9.8)

newbee-mall includes pre-seeded administrator accounts in its database initialization script. These accounts are provisioned with a predictable default password. Deployments that initialize or reset the database using the provided schema and fail ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T21:08:55.000Z ##

🔴 CVE-2026-26218 - Critical (9.8)

newbee-mall includes pre-seeded administrator accounts in its database initialization script. These accounts are provisioned with a predictable default password. Deployments that initialize or reset the database using the provided schema and fail ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1358
(9.8 CRITICAL)

EPSS: 0.13%

updated 2026-02-13T00:33:00

4 posts

Airleader Master versions 6.381 and prior allow for file uploads without restriction to multiple webpages running maximum privileges. This could allow an unauthenticated user to potentially obtain remote code execution on the server.

offseq at 2026-02-13T01:30:31.461Z ##

🚨 CVE-2026-1358 (CRITICAL, CVSS 9.8): Airleader Master (≤6.381) allows unauthenticated file uploads, enabling remote code execution. ICS & building automation in Europe at risk — patch ASAP, restrict uploads, segment networks. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-12T22:18:15.000Z ##

🔴 CVE-2026-1358 - Critical (9.8)

Airleader Master versions 6.381 and prior allow for file uploads without
restriction to multiple webpages running maximum privileges. This could
allow an unauthenticated user to potentially obtain remote code
execution on the server.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-13T01:30:31.000Z ##

🚨 CVE-2026-1358 (CRITICAL, CVSS 9.8): Airleader Master (≤6.381) allows unauthenticated file uploads, enabling remote code execution. ICS & building automation in Europe at risk — patch ASAP, restrict uploads, segment networks. radar.offseq.com/threat/cve-20 #OffSeq #CVE20261358 #ICS #InfoSec

##

thehackerwire@mastodon.social at 2026-02-12T22:18:15.000Z ##

🔴 CVE-2026-1358 - Critical (9.8)

Airleader Master versions 6.381 and prior allow for file uploads without
restriction to multiple webpages running maximum privileges. This could
allow an unauthenticated user to potentially obtain remote code
execution on the server.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25949
(7.5 HIGH)

EPSS: 0.02%

updated 2026-02-12T22:08:03

2 posts

## Impact There is a potential vulnerability in Traefik managing STARTTLS requests. An unauthenticated client can bypass Traefik entrypoint `respondingTimeouts.readTimeout` by sending the 8-byte Postgres SSLRequest (STARTTLS) prelude and then stalling, causing connections to remain open indefinitely, leading to a denial of service. ## Patches - https://github.com/traefik/traefik/releases/tag

thehackerwire@mastodon.social at 2026-02-12T21:02:13.000Z ##

🟠 CVE-2026-25949 - High (7.5)

Traefik is an HTTP reverse proxy and load balancer. Prior to 3.6.8, there is a potential vulnerability in Traefik managing STARTTLS requests. An unauthenticated client can bypass Traefik entrypoint respondingTimeouts.readTimeout by sending the 8-b...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T21:02:13.000Z ##

🟠 CVE-2026-25949 - High (7.5)

Traefik is an HTTP reverse proxy and load balancer. Prior to 3.6.8, there is a potential vulnerability in Traefik managing STARTTLS requests. An unauthenticated client can bypass Traefik entrypoint respondingTimeouts.readTimeout by sending the 8-b...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-61880
(8.8 HIGH)

EPSS: 0.42%

updated 2026-02-12T21:32:31

2 posts

In Infoblox NIOS through 9.0.7, insecure deserialization can result in remote code execution.

thehackerwire@mastodon.social at 2026-02-12T21:34:41.000Z ##

🟠 CVE-2025-61880 - High (8.8)

In Infoblox NIOS through 9.0.7, insecure deserialization can result in remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T21:34:41.000Z ##

🟠 CVE-2025-61880 - High (8.8)

In Infoblox NIOS through 9.0.7, insecure deserialization can result in remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69807
(7.5 HIGH)

EPSS: 0.07%

updated 2026-02-12T21:32:31

2 posts

p2r3 Bareiron commit: 8e4d4020d is vulnerable to Buffer Overflow, which allows unauthenticated remote attackers to cause a denial of service via a packet sent to the server.

thehackerwire@mastodon.social at 2026-02-12T21:29:43.000Z ##

🟠 CVE-2025-69807 - High (7.5)

p2r3 Bareiron commit: 8e4d4020d is vulnerable to Buffer Overflow, which allows unauthenticated remote attackers to cause a denial of service via a packet sent to the server.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T21:29:43.000Z ##

🟠 CVE-2025-69807 - High (7.5)

p2r3 Bareiron commit: 8e4d4020d is vulnerable to Buffer Overflow, which allows unauthenticated remote attackers to cause a denial of service via a packet sent to the server.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20652
(7.5 HIGH)

EPSS: 0.12%

updated 2026-02-12T21:32:30

2 posts

The issue was addressed with improved memory handling. This issue is fixed in macOS Tahoe 26.3, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3, Safari 26.3. A remote attacker may be able to cause a denial-of-service.

thehackerwire@mastodon.social at 2026-02-13T00:44:58.000Z ##

🟠 CVE-2026-20652 - High (7.5)

The issue was addressed with improved memory handling. This issue is fixed in macOS Tahoe 26.3, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3, Safari 26.3. A remote attacker may be able to cause a denial-of-service.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T00:44:58.000Z ##

🟠 CVE-2026-20652 - High (7.5)

The issue was addressed with improved memory handling. This issue is fixed in macOS Tahoe 26.3, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3, Safari 26.3. A remote attacker may be able to cause a denial-of-service.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20677
(9.1 CRITICAL)

EPSS: 0.05%

updated 2026-02-12T21:32:30

2 posts

A race condition was addressed with improved handling of symbolic links. This issue is fixed in macOS Tahoe 26.3, macOS Sonoma 14.8.4, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3. A shortcut may be able to bypass sandbox restrictions.

thehackerwire@mastodon.social at 2026-02-13T00:04:29.000Z ##

🔴 CVE-2026-20677 - Critical (9)

A race condition was addressed with improved handling of symbolic links. This issue is fixed in macOS Tahoe 26.3, macOS Sonoma 14.8.4, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3. A shortcut may be able to bypass sandbox ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T00:04:29.000Z ##

🔴 CVE-2026-20677 - Critical (9)

A race condition was addressed with improved handling of symbolic links. This issue is fixed in macOS Tahoe 26.3, macOS Sonoma 14.8.4, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3. A shortcut may be able to bypass sandbox ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-61879
(7.7 HIGH)

EPSS: 0.03%

updated 2026-02-12T21:32:30

2 posts

In Infoblox NIOS through 9.0.7, a High-Privileged User Can Trigger an Arbitrary File Write via the Account Creation Mechanism.

thehackerwire@mastodon.social at 2026-02-12T21:30:03.000Z ##

🟠 CVE-2025-61879 - High (7.7)

In Infoblox NIOS through 9.0.7, a High-Privileged User Can Trigger an Arbitrary File Write via the Account Creation Mechanism.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T21:30:03.000Z ##

🟠 CVE-2025-61879 - High (7.7)

In Infoblox NIOS through 9.0.7, a High-Privileged User Can Trigger an Arbitrary File Write via the Account Creation Mechanism.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-63421
(7.8 HIGH)

EPSS: 0.02%

updated 2026-02-12T21:32:30

2 posts

An issue in filosoft Comerc.32 Commercial Invoicing v.16.0.0.3 allows a local attacker to execute arbitrary code via the comeinst.exe file

thehackerwire@mastodon.social at 2026-02-12T21:29:00.000Z ##

🟠 CVE-2025-63421 - High (7.8)

An issue in filosoft Comerc.32 Commercial Invoicing v.16.0.0.3 allows a local attacker to execute arbitrary code via the comeinst.exe file

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T21:29:00.000Z ##

🟠 CVE-2025-63421 - High (7.8)

An issue in filosoft Comerc.32 Commercial Invoicing v.16.0.0.3 allows a local attacker to execute arbitrary code via the comeinst.exe file

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-40536
(8.1 HIGH)

EPSS: 76.95%

updated 2026-02-12T21:32:29

8 posts

SolarWinds Web Help Desk was found to be susceptible to a security control bypass vulnerability that if exploited, could allow an unauthenticated attacker to gain access to certain restricted functionality.

secdb at 2026-02-12T22:00:16.528Z ##

🚨 [CISA-2026:0212] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2024-43468 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Configuration Manager SQL Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Configuration Manager
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-15556 (secdb.nttzen.cloud/cve/detail/)
- Name: Notepad++ Download of Code Without Integrity Check Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Notepad++
- Product: Notepad++
- Notes: notepad-plus-plus.org/news/cla ; community.notepad-plus-plus.or ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-40536 (secdb.nttzen.cloud/cve/detail/)
- Name: SolarWinds Web Help Desk Security Control Bypass Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: SolarWinds
- Product: Web Help Desk
- Notes: documentation.solarwinds.com/e ; solarwinds.com/trust-center/se ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-20700 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/126346 ; support.apple.com/en-us/126348 ; support.apple.com/en-us/126351 ; support.apple.com/en-us/126352 ; support.apple.com/en-us/126353 ; nvd.nist.gov/vuln/detail/CVE-2

##

AAKL at 2026-02-12T21:02:12.098Z ##

CISA has updated the KEV catalogue. I see Notepad++ has made it to the list.

- CVE-2025-40536: SolarWinds Web Help Desk Security Control Bypass Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-15556: Notepad++ Download of Code Without Integrity Check Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2024-43468: Microsoft Configuration Manager SQL Injection Vulnerability cve.org/CVERecord?id=CVE-2024-

- CVE-2026-20700: Apple Multiple Buffer Overflow Vulnerability cve.org/CVERecord?id=CVE-2026-

There are also several industrial advisories here: cisa.gov/

##

cisakevtracker@mastodon.social at 2026-02-12T21:00:54.000Z ##

CVE ID: CVE-2025-40536
Vendor: SolarWinds
Product: Web Help Desk
Date Added: 2026-02-12
Notes: documentation.solarwinds.com/e ; solarwinds.com/trust-center/se ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

DarkWebInformer at 2026-02-12T20:40:42.193Z ##

‼️ CISA added one more vulnerability to the KEV Catalog today...

CVE-2025-40536: SolarWinds Web Help Desk Security Control Bypass Vulnerability: SolarWinds Web Help Desk contains a security control bypass vulnerability that could allow an unauthenticated attacker to gain access to certain restricted functionality.

##

secdb@infosec.exchange at 2026-02-12T22:00:16.000Z ##

🚨 [CISA-2026:0212] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2024-43468 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Configuration Manager SQL Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Configuration Manager
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-15556 (secdb.nttzen.cloud/cve/detail/)
- Name: Notepad++ Download of Code Without Integrity Check Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Notepad++
- Product: Notepad++
- Notes: notepad-plus-plus.org/news/cla ; community.notepad-plus-plus.or ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-40536 (secdb.nttzen.cloud/cve/detail/)
- Name: SolarWinds Web Help Desk Security Control Bypass Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: SolarWinds
- Product: Web Help Desk
- Notes: documentation.solarwinds.com/e ; solarwinds.com/trust-center/se ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-20700 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/126346 ; support.apple.com/en-us/126348 ; support.apple.com/en-us/126351 ; support.apple.com/en-us/126352 ; support.apple.com/en-us/126353 ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260212 #cisa20260212 #cve_2024_43468 #cve_2025_15556 #cve_2025_40536 #cve_2026_20700 #cve202443468 #cve202515556 #cve202540536 #cve202620700

##

AAKL@infosec.exchange at 2026-02-12T21:02:12.000Z ##

CISA has updated the KEV catalogue. I see Notepad++ has made it to the list.

- CVE-2025-40536: SolarWinds Web Help Desk Security Control Bypass Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-15556: Notepad++ Download of Code Without Integrity Check Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2024-43468: Microsoft Configuration Manager SQL Injection Vulnerability cve.org/CVERecord?id=CVE-2024-

- CVE-2026-20700: Apple Multiple Buffer Overflow Vulnerability cve.org/CVERecord?id=CVE-2026-

There are also several industrial advisories here: cisa.gov/ #CISA #infosec #vulnerability #Apple #Microsoft #Notepad #SolarWinds

##

cisakevtracker@mastodon.social at 2026-02-12T21:00:54.000Z ##

CVE ID: CVE-2025-40536
Vendor: SolarWinds
Product: Web Help Desk
Date Added: 2026-02-12
Notes: documentation.solarwinds.com/e ; solarwinds.com/trust-center/se ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

DarkWebInformer@infosec.exchange at 2026-02-12T20:40:42.000Z ##

‼️ CISA added one more vulnerability to the KEV Catalog today...

CVE-2025-40536: SolarWinds Web Help Desk Security Control Bypass Vulnerability: SolarWinds Web Help Desk contains a security control bypass vulnerability that could allow an unauthenticated attacker to gain access to certain restricted functionality.

##

CVE-2025-67432
(7.5 HIGH)

EPSS: 0.04%

updated 2026-02-12T21:31:34

2 posts

A stack overflow in the ZBarcode_Encode function of Monkeybread Software MBS DynaPDF Plugin v21.3.1.1 allows attackers to cause a Denial of Service (DoS) via a crafted input.

thehackerwire@mastodon.social at 2026-02-12T21:28:40.000Z ##

🟠 CVE-2025-67432 - High (7.5)

A stack overflow in the ZBarcode_Encode function of Monkeybread Software MBS DynaPDF Plugin v21.3.1.1 allows attackers to cause a Denial of Service (DoS) via a crafted input.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T21:28:40.000Z ##

🟠 CVE-2025-67432 - High (7.5)

A stack overflow in the ZBarcode_Encode function of Monkeybread Software MBS DynaPDF Plugin v21.3.1.1 allows attackers to cause a Denial of Service (DoS) via a crafted input.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70314
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-02-12T21:31:34

2 posts

webfsd 1.21 is vulnerable to a Buffer Overflow via a crafted request. This is due to the filename variable

thehackerwire@mastodon.social at 2026-02-12T21:08:45.000Z ##

🔴 CVE-2025-70314 - Critical (9.8)

webfsd 1.21 is vulnerable to a Buffer Overflow via a crafted request. This is due to the filename variable

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T21:08:45.000Z ##

🔴 CVE-2025-70314 - Critical (9.8)

webfsd 1.21 is vulnerable to a Buffer Overflow via a crafted request. This is due to the filename variable

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20700
(7.8 HIGH)

EPSS: 0.21%

updated 2026-02-12T21:31:27

30 posts

A memory corruption issue was addressed with improved state management. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An attacker with memory write capability may be able to execute arbitrary code. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals

youranonnewsirc@nerdculture.de at 2026-02-13T13:45:46.000Z ##

Global cybersecurity remains critical: Threat actors are actively exploiting Google's Gemini AI for varied attack stages, from reconnaissance to phishing. Apple has patched a critical zero-day vulnerability (CVE-2026-20700) exploited in sophisticated attacks. CISA updated its KEV Catalog with four new vulnerabilities, urging immediate remediation. Furthermore, the EU launched a new ICT Supply Chain Security Toolbox to enhance risk mitigation. (Feb 12-13, 2026)

#Cybersecurity #AnonNews_irc #News

##

beyondmachines1 at 2026-02-13T11:01:33.395Z ##

Apple Patches Actively Exploited Flaw, Over 90 Vulnerabilities in macOS, iOS, and iPadOS in February 2026 Security Updates

Apple released security updates on February 11, 2026, patching over 90 vulnerabilities across macOS, iOS, and iPadOS, including an actively exploited zero-day (CVE-2026-20700) — a memory corruption flaw in dyld enabling arbitrary code execution, likely used by nation-state actors or commercial spyware vendors against targeted individuals.

**Time to update your Apple devices. Prioritize iOS 26 devices, especially if you are a journalist or active in economy and policy - those are the first ones targeted by state actors to take control of mobile phones. Then all the rest of devices. Even if you are not a high profile target, update because hackers will learn to exploit the same flaws, so it will be open season on every vulnerable device.**

beyondmachines.net/event_detai

##

benzogaga33@mamot.fr at 2026-02-13T10:40:03.000Z ##

CVE-2026-20700 – Apple corrige sa première faille zero-day de 2026 : patchez ! it-connect.fr/cve-2026-20700-a #ActuCybersécurité #Cybersécurité #Vulnérabilité #Apple

##

youranonnewsirc@nerdculture.de at 2026-02-13T07:45:49.000Z ##

Here's a summary of recent global, technology, and cybersecurity news from the last 24 hours:

Globally, Canada mourned 10 lives lost in a mass shooting in British Columbia (February 12).

In technology, Samsung began mass production of HBM4 with ultimate performance for AI computing (February 12). Waymo also launched fully autonomous operations with its 6th-generation Driver (February 12).

For cybersecurity, Google reported state-backed hackers are using Gemini AI for reconnaissance and attack support (February 12). Apple patched an actively exploited zero-day vulnerability (CVE-2026-20700) affecting iOS, macOS, and other devices (February 12). Additionally, Palo Alto Networks reportedly chose not to publicly link a global cyberespionage campaign to China over fears of retaliation (February 13).

#News #Anonymous #AnonNews_irc

##

thehackerwire@mastodon.social at 2026-02-13T00:04:38.000Z ##

🟠 CVE-2026-20700 - High (7.8)

A memory corruption issue was addressed with improved state management. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An attacker with memory write capability may be able to execute arbi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

secdb at 2026-02-12T22:00:16.528Z ##

🚨 [CISA-2026:0212] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2024-43468 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Configuration Manager SQL Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Configuration Manager
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-15556 (secdb.nttzen.cloud/cve/detail/)
- Name: Notepad++ Download of Code Without Integrity Check Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Notepad++
- Product: Notepad++
- Notes: notepad-plus-plus.org/news/cla ; community.notepad-plus-plus.or ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-40536 (secdb.nttzen.cloud/cve/detail/)
- Name: SolarWinds Web Help Desk Security Control Bypass Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: SolarWinds
- Product: Web Help Desk
- Notes: documentation.solarwinds.com/e ; solarwinds.com/trust-center/se ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-20700 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/126346 ; support.apple.com/en-us/126348 ; support.apple.com/en-us/126351 ; support.apple.com/en-us/126352 ; support.apple.com/en-us/126353 ; nvd.nist.gov/vuln/detail/CVE-2

##

AAKL at 2026-02-12T21:02:12.098Z ##

CISA has updated the KEV catalogue. I see Notepad++ has made it to the list.

- CVE-2025-40536: SolarWinds Web Help Desk Security Control Bypass Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-15556: Notepad++ Download of Code Without Integrity Check Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2024-43468: Microsoft Configuration Manager SQL Injection Vulnerability cve.org/CVERecord?id=CVE-2024-

- CVE-2026-20700: Apple Multiple Buffer Overflow Vulnerability cve.org/CVERecord?id=CVE-2026-

There are also several industrial advisories here: cisa.gov/

##

cisakevtracker@mastodon.social at 2026-02-12T19:01:10.000Z ##

CVE ID: CVE-2026-20700
Vendor: Apple
Product: Multiple Products
Date Added: 2026-02-12
Notes: support.apple.com/en-us/126346 ; support.apple.com/en-us/126348 ; support.apple.com/en-us/126351 ; support.apple.com/en-us/126352 ; support.apple.com/en-us/126353 ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

DarkWebInformer at 2026-02-12T18:51:53.049Z ##

‼️ CISA has added 3 vulnerabilities to the KEV Catalog

CVE-2025-15556: Notepad++ Download of Code Without Integrity Check Vulnerability: Notepad++ when using the WinGUp updater, contains a download of code without integrity check vulnerability that could allow an attacker to intercept or redirect update traffic to download and execute an attacker-controlled installer. This could lead to arbitrary code execution with the privileges of the user.

CVE-2026-20700: Apple Multiple Buffer Overflow Vulnerability: Apple iOS, macOS, tvOS, watchOS, and visionOS contain an improper restriction of operations within the bounds of a memory buffer vulnerability that could allow an attacker with memory write the capability to execute arbitrary code.

CVE-2024-43468: Microsoft Configuration Manager SQL Injection Vulnerability: Microsoft Configuration Manager contains an SQL injection vulnerability. An unauthenticated attacker could exploit this vulnerability by sending specially crafted requests to the target environment which are processed in an unsafe manner enabling the attacker to execute commands on the server and/or underlying database.

##

mastokukei@social.josko.org at 2026-02-12T18:01:47.000Z ##

Blip blop, I'm a #mastobot.
Here is a summary (in beta) of the latest posts in #technologyAtKukei masto.kukei.eu/browse/technolo category:
- Eddy Merckx Bikes unveils Corsa Strasbourg Ti and Corsa Pévèle Ti titanium bikes, handmade in Italy.
- WordPress plugin with ~900k installs exposed to a critical RCE flaw.
- Apple iOS 26.3 update patches CVE-2026-20700.
- Palantir sues Republik Magazin (Swiss outlet) over a published article.
- Waymo launches World Model for autonomous driving [1/2]

##

karvjorm.bsky.social@bsky.brid.gy at 2026-02-12T15:46:50.676Z ##

iPhoneissa ja Maceissä vakava haavoittuvuus - päivitä heti Applen koko tuoteperheestä on löytynyt vakava haavoittuvuus, johon isketään jo nyt rikollisten toimesta. Kyseinen haavoittuvuus, CVE-2026-20700, koskee käytännössä kaikkia Applen tuotteita dawn.fi/uutiset/2026...

iPhoneissa ja Maceissä vakava ...

##

chorrell@hachyderm.io at 2026-02-12T14:54:21.000Z ##

Update your iPhones to iOS 26.3, CVE-2026-20700 is pretty bad!

go.theregister.com/feed/www.th

##

jbhall56 at 2026-02-12T12:55:43.364Z ##

The vulnerability, tracked as CVE-2026-20700 (CVSS score: N/A), has been described as a memory corruption issue in dyld, Apple's Dynamic Link Editor. thehackernews.com/2026/02/appl

##

undercodenews@mastodon.social at 2026-02-12T12:21:55.000Z ##

Apple Releases Emergency Security Updates to Patch Actively Exploited Zero-Day CVE-2026-20700 Across iOS, macOS, and More + Video

A Critical Memory Corruption Flaw Forces Apple Into Rapid Defensive Action Apple has rolled out urgent security updates across its entire ecosystem, including iOS, iPadOS, macOS, watchOS, tvOS, and visionOS, to address an actively exploited zero-day vulnerability identified as CVE-2026-20700. The flaw, discovered by Google’s Threat Analysis…

undercodenews.com/apple-releas

##

PC_Fluesterer@social.tchncs.de at 2026-02-12T10:54:31.000Z ##

Apple aktualisiert alles 2026-02

Apples reguläre Updates im Februar flicken 71 Sicherheitslücken. Einige von denen stecken in mehreren von Apple Produkten. Bemerkenswert ist CVE-2026-20700, die bereits für Angriffe ausgenutzt wird (Zero-Day). Weitere drei neue Sicherheitslücken betreffen die Spracherkennung (Siri), ermöglichen sie doch, auch einem gesperrten iPhone persönliche Daten zu entloc

pc-fluesterer.info/wordpress/t

##

PC_Fluesterer@social.tchncs.de at 2026-02-12T10:54:29.000Z ##

Apple aktualisiert alles 2026-02

Apples reguläre Updates im Februar flicken 71 Sicherheitslücken. Einige von denen stecken in mehreren von Apple Produkten. Bemerkenswert ist CVE-2026-20700, die bereits für Angriffe ausgenutzt wird (Zero-Day). Weitere drei neue Sicherheit

pc-fluesterer.info/wordpress/2

#Allgemein #Empfehlung #Hintergrund #Mobilfunk #Warnung #0day #apple #cybercrime #ios #macos #sicherheit #UnplugTrump #vorbeugen

##

defendopsdiaries at 2026-02-12T01:20:40.293Z ##

A hidden flaw in Apple’s core system let hackers quietly bypass defenses and target high-profile users before anyone noticed. How did this zero-day slip through the cracks?

thedefendopsdiaries.com/inside

##

offseq at 2026-02-12T00:00:41.450Z ##

🚨 CRITICAL: CVE-2026-20700 impacts Apple macOS, iOS, iPadOS & more before v26.3. Memory corruption enables arbitrary code execution — exploited in sophisticated, targeted attacks. Urgently update all devices! radar.offseq.com/threat/cve-20

##

youranonnewsirc@nerdculture.de at 2026-02-13T13:45:46.000Z ##

Global cybersecurity remains critical: Threat actors are actively exploiting Google's Gemini AI for varied attack stages, from reconnaissance to phishing. Apple has patched a critical zero-day vulnerability (CVE-2026-20700) exploited in sophisticated attacks. CISA updated its KEV Catalog with four new vulnerabilities, urging immediate remediation. Furthermore, the EU launched a new ICT Supply Chain Security Toolbox to enhance risk mitigation. (Feb 12-13, 2026)

#Cybersecurity #AnonNews_irc #News

##

beyondmachines1@infosec.exchange at 2026-02-13T11:01:33.000Z ##

Apple Patches Actively Exploited Flaw, Over 90 Vulnerabilities in macOS, iOS, and iPadOS in February 2026 Security Updates

Apple released security updates on February 11, 2026, patching over 90 vulnerabilities across macOS, iOS, and iPadOS, including an actively exploited zero-day (CVE-2026-20700) — a memory corruption flaw in dyld enabling arbitrary code execution, likely used by nation-state actors or commercial spyware vendors against targeted individuals.

**Time to update your Apple devices. Prioritize iOS 26 devices, especially if you are a journalist or active in economy and policy - those are the first ones targeted by state actors to take control of mobile phones. Then all the rest of devices. Even if you are not a high profile target, update because hackers will learn to exploit the same flaws, so it will be open season on every vulnerable device.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

benzogaga33@mamot.fr at 2026-02-13T10:40:03.000Z ##

CVE-2026-20700 – Apple corrige sa première faille zero-day de 2026 : patchez ! it-connect.fr/cve-2026-20700-a #ActuCybersécurité #Cybersécurité #Vulnérabilité #Apple

##

youranonnewsirc@nerdculture.de at 2026-02-13T07:45:49.000Z ##

Here's a summary of recent global, technology, and cybersecurity news from the last 24 hours:

Globally, Canada mourned 10 lives lost in a mass shooting in British Columbia (February 12).

In technology, Samsung began mass production of HBM4 with ultimate performance for AI computing (February 12). Waymo also launched fully autonomous operations with its 6th-generation Driver (February 12).

For cybersecurity, Google reported state-backed hackers are using Gemini AI for reconnaissance and attack support (February 12). Apple patched an actively exploited zero-day vulnerability (CVE-2026-20700) affecting iOS, macOS, and other devices (February 12). Additionally, Palo Alto Networks reportedly chose not to publicly link a global cyberespionage campaign to China over fears of retaliation (February 13).

#News #Anonymous #AnonNews_irc

##

thehackerwire@mastodon.social at 2026-02-13T00:04:38.000Z ##

🟠 CVE-2026-20700 - High (7.8)

A memory corruption issue was addressed with improved state management. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An attacker with memory write capability may be able to execute arbi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

secdb@infosec.exchange at 2026-02-12T22:00:16.000Z ##

🚨 [CISA-2026:0212] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2024-43468 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Configuration Manager SQL Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Configuration Manager
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-15556 (secdb.nttzen.cloud/cve/detail/)
- Name: Notepad++ Download of Code Without Integrity Check Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Notepad++
- Product: Notepad++
- Notes: notepad-plus-plus.org/news/cla ; community.notepad-plus-plus.or ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-40536 (secdb.nttzen.cloud/cve/detail/)
- Name: SolarWinds Web Help Desk Security Control Bypass Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: SolarWinds
- Product: Web Help Desk
- Notes: documentation.solarwinds.com/e ; solarwinds.com/trust-center/se ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-20700 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/126346 ; support.apple.com/en-us/126348 ; support.apple.com/en-us/126351 ; support.apple.com/en-us/126352 ; support.apple.com/en-us/126353 ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260212 #cisa20260212 #cve_2024_43468 #cve_2025_15556 #cve_2025_40536 #cve_2026_20700 #cve202443468 #cve202515556 #cve202540536 #cve202620700

##

AAKL@infosec.exchange at 2026-02-12T21:02:12.000Z ##

CISA has updated the KEV catalogue. I see Notepad++ has made it to the list.

- CVE-2025-40536: SolarWinds Web Help Desk Security Control Bypass Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-15556: Notepad++ Download of Code Without Integrity Check Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2024-43468: Microsoft Configuration Manager SQL Injection Vulnerability cve.org/CVERecord?id=CVE-2024-

- CVE-2026-20700: Apple Multiple Buffer Overflow Vulnerability cve.org/CVERecord?id=CVE-2026-

There are also several industrial advisories here: cisa.gov/ #CISA #infosec #vulnerability #Apple #Microsoft #Notepad #SolarWinds

##

cisakevtracker@mastodon.social at 2026-02-12T19:01:10.000Z ##

CVE ID: CVE-2026-20700
Vendor: Apple
Product: Multiple Products
Date Added: 2026-02-12
Notes: support.apple.com/en-us/126346 ; support.apple.com/en-us/126348 ; support.apple.com/en-us/126351 ; support.apple.com/en-us/126352 ; support.apple.com/en-us/126353 ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

DarkWebInformer@infosec.exchange at 2026-02-12T18:51:53.000Z ##

‼️ CISA has added 3 vulnerabilities to the KEV Catalog

CVE-2025-15556: Notepad++ Download of Code Without Integrity Check Vulnerability: Notepad++ when using the WinGUp updater, contains a download of code without integrity check vulnerability that could allow an attacker to intercept or redirect update traffic to download and execute an attacker-controlled installer. This could lead to arbitrary code execution with the privileges of the user.

CVE-2026-20700: Apple Multiple Buffer Overflow Vulnerability: Apple iOS, macOS, tvOS, watchOS, and visionOS contain an improper restriction of operations within the bounds of a memory buffer vulnerability that could allow an attacker with memory write the capability to execute arbitrary code.

CVE-2024-43468: Microsoft Configuration Manager SQL Injection Vulnerability: Microsoft Configuration Manager contains an SQL injection vulnerability. An unauthenticated attacker could exploit this vulnerability by sending specially crafted requests to the target environment which are processed in an unsafe manner enabling the attacker to execute commands on the server and/or underlying database.

##

jbhall56@infosec.exchange at 2026-02-12T12:55:43.000Z ##

The vulnerability, tracked as CVE-2026-20700 (CVSS score: N/A), has been described as a memory corruption issue in dyld, Apple's Dynamic Link Editor. thehackernews.com/2026/02/appl

##

defendopsdiaries@infosec.exchange at 2026-02-12T01:20:40.000Z ##

A hidden flaw in Apple’s core system let hackers quietly bypass defenses and target high-profile users before anyone noticed. How did this zero-day slip through the cracks?

thedefendopsdiaries.com/inside

##

offseq@infosec.exchange at 2026-02-12T00:00:41.000Z ##

🚨 CRITICAL: CVE-2026-20700 impacts Apple macOS, iOS, iPadOS & more before v26.3. Memory corruption enables arbitrary code execution — exploited in sophisticated, targeted attacks. Urgently update all devices! radar.offseq.com/threat/cve-20 #OffSeq #AppleSecurity #CVE202620700 #ThreatIntel

##

CVE-2024-43468
(9.8 CRITICAL)

EPSS: 86.39%

updated 2026-02-12T21:31:24

10 posts

Microsoft Configuration Manager Remote Code Execution Vulnerability

3 repos

https://github.com/synacktiv/CVE-2024-43468

https://github.com/tadash10/Detailed-Analysis-and-Mitigation-Strategies-for-CVE-2024-38124-and-CVE-2024-43468

https://github.com/nikallass/CVE-2024-43468_mTLS_go

defendopsdiaries at 2026-02-13T12:48:01.496Z ##

A Microsoft ConfigMgr flaw went from “too complex to worry about” to a full-blown crisis almost overnight after public exploit code dropped. How did this one slip through the cracks?

thedefendopsdiaries.com/cve-20

##

secdb at 2026-02-12T22:00:16.528Z ##

🚨 [CISA-2026:0212] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2024-43468 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Configuration Manager SQL Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Configuration Manager
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-15556 (secdb.nttzen.cloud/cve/detail/)
- Name: Notepad++ Download of Code Without Integrity Check Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Notepad++
- Product: Notepad++
- Notes: notepad-plus-plus.org/news/cla ; community.notepad-plus-plus.or ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-40536 (secdb.nttzen.cloud/cve/detail/)
- Name: SolarWinds Web Help Desk Security Control Bypass Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: SolarWinds
- Product: Web Help Desk
- Notes: documentation.solarwinds.com/e ; solarwinds.com/trust-center/se ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-20700 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/126346 ; support.apple.com/en-us/126348 ; support.apple.com/en-us/126351 ; support.apple.com/en-us/126352 ; support.apple.com/en-us/126353 ; nvd.nist.gov/vuln/detail/CVE-2

##

AAKL at 2026-02-12T21:02:12.098Z ##

CISA has updated the KEV catalogue. I see Notepad++ has made it to the list.

- CVE-2025-40536: SolarWinds Web Help Desk Security Control Bypass Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-15556: Notepad++ Download of Code Without Integrity Check Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2024-43468: Microsoft Configuration Manager SQL Injection Vulnerability cve.org/CVERecord?id=CVE-2024-

- CVE-2026-20700: Apple Multiple Buffer Overflow Vulnerability cve.org/CVERecord?id=CVE-2026-

There are also several industrial advisories here: cisa.gov/

##

cisakevtracker@mastodon.social at 2026-02-12T19:01:25.000Z ##

CVE ID: CVE-2024-43468
Vendor: Microsoft
Product: Configuration Manager
Date Added: 2026-02-12
Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

DarkWebInformer at 2026-02-12T18:51:53.049Z ##

‼️ CISA has added 3 vulnerabilities to the KEV Catalog

CVE-2025-15556: Notepad++ Download of Code Without Integrity Check Vulnerability: Notepad++ when using the WinGUp updater, contains a download of code without integrity check vulnerability that could allow an attacker to intercept or redirect update traffic to download and execute an attacker-controlled installer. This could lead to arbitrary code execution with the privileges of the user.

CVE-2026-20700: Apple Multiple Buffer Overflow Vulnerability: Apple iOS, macOS, tvOS, watchOS, and visionOS contain an improper restriction of operations within the bounds of a memory buffer vulnerability that could allow an attacker with memory write the capability to execute arbitrary code.

CVE-2024-43468: Microsoft Configuration Manager SQL Injection Vulnerability: Microsoft Configuration Manager contains an SQL injection vulnerability. An unauthenticated attacker could exploit this vulnerability by sending specially crafted requests to the target environment which are processed in an unsafe manner enabling the attacker to execute commands on the server and/or underlying database.

##

defendopsdiaries@infosec.exchange at 2026-02-13T12:48:01.000Z ##

A Microsoft ConfigMgr flaw went from “too complex to worry about” to a full-blown crisis almost overnight after public exploit code dropped. How did this one slip through the cracks?

thedefendopsdiaries.com/cve-20

##

secdb@infosec.exchange at 2026-02-12T22:00:16.000Z ##

🚨 [CISA-2026:0212] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2024-43468 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Configuration Manager SQL Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Configuration Manager
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-15556 (secdb.nttzen.cloud/cve/detail/)
- Name: Notepad++ Download of Code Without Integrity Check Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Notepad++
- Product: Notepad++
- Notes: notepad-plus-plus.org/news/cla ; community.notepad-plus-plus.or ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-40536 (secdb.nttzen.cloud/cve/detail/)
- Name: SolarWinds Web Help Desk Security Control Bypass Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: SolarWinds
- Product: Web Help Desk
- Notes: documentation.solarwinds.com/e ; solarwinds.com/trust-center/se ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-20700 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/126346 ; support.apple.com/en-us/126348 ; support.apple.com/en-us/126351 ; support.apple.com/en-us/126352 ; support.apple.com/en-us/126353 ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260212 #cisa20260212 #cve_2024_43468 #cve_2025_15556 #cve_2025_40536 #cve_2026_20700 #cve202443468 #cve202515556 #cve202540536 #cve202620700

##

AAKL@infosec.exchange at 2026-02-12T21:02:12.000Z ##

CISA has updated the KEV catalogue. I see Notepad++ has made it to the list.

- CVE-2025-40536: SolarWinds Web Help Desk Security Control Bypass Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-15556: Notepad++ Download of Code Without Integrity Check Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2024-43468: Microsoft Configuration Manager SQL Injection Vulnerability cve.org/CVERecord?id=CVE-2024-

- CVE-2026-20700: Apple Multiple Buffer Overflow Vulnerability cve.org/CVERecord?id=CVE-2026-

There are also several industrial advisories here: cisa.gov/ #CISA #infosec #vulnerability #Apple #Microsoft #Notepad #SolarWinds

##

cisakevtracker@mastodon.social at 2026-02-12T19:01:25.000Z ##

CVE ID: CVE-2024-43468
Vendor: Microsoft
Product: Configuration Manager
Date Added: 2026-02-12
Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

DarkWebInformer@infosec.exchange at 2026-02-12T18:51:53.000Z ##

‼️ CISA has added 3 vulnerabilities to the KEV Catalog

CVE-2025-15556: Notepad++ Download of Code Without Integrity Check Vulnerability: Notepad++ when using the WinGUp updater, contains a download of code without integrity check vulnerability that could allow an attacker to intercept or redirect update traffic to download and execute an attacker-controlled installer. This could lead to arbitrary code execution with the privileges of the user.

CVE-2026-20700: Apple Multiple Buffer Overflow Vulnerability: Apple iOS, macOS, tvOS, watchOS, and visionOS contain an improper restriction of operations within the bounds of a memory buffer vulnerability that could allow an attacker with memory write the capability to execute arbitrary code.

CVE-2024-43468: Microsoft Configuration Manager SQL Injection Vulnerability: Microsoft Configuration Manager contains an SQL injection vulnerability. An unauthenticated attacker could exploit this vulnerability by sending specially crafted requests to the target environment which are processed in an unsafe manner enabling the attacker to execute commands on the server and/or underlying database.

##

CVE-2026-26216(CVSS UNKNOWN)

EPSS: 0.20%

updated 2026-02-12T20:09:30

4 posts

A critical remote code execution vulnerability exists in the Crawl4AI Docker API deployment. The `/crawl` endpoint accepts a `hooks` parameter containing Python code that is executed using `exec()`. The `__import__` builtin was included in the allowed builtins, allowing attackers to import arbitrary modules and execute system commands. **Attack Vector:** ```json POST /crawl { "urls": ["https://

thehackerwire@mastodon.social at 2026-02-12T21:34:59.000Z ##

🔴 CVE-2026-26216 - Critical (10)

Crawl4AI versions prior to 0.8.0 contain a remote code execution vulnerability in the Docker API deployment. The /crawl endpoint accepts a hooks parameter containing Python code that is executed using exec(). The __import__ builtin was included in...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-02-12T17:30:17.907Z ##

⚠️ CRITICAL RCE (CVE-2026-26216) in Crawl4AI <0.8.0: /crawl endpoint allows unauthenticated Python code injection via exec(), enabling server takeover & lateral movement. Restrict access, monitor activity, upgrade ASAP. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-12T21:34:59.000Z ##

🔴 CVE-2026-26216 - Critical (10)

Crawl4AI versions prior to 0.8.0 contain a remote code execution vulnerability in the Docker API deployment. The /crawl endpoint accepts a hooks parameter containing Python code that is executed using exec(). The __import__ builtin was included in...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-12T17:30:17.000Z ##

⚠️ CRITICAL RCE (CVE-2026-26216) in Crawl4AI <0.8.0: /crawl endpoint allows unauthenticated Python code injection via exec(), enabling server takeover & lateral movement. Restrict access, monitor activity, upgrade ASAP. radar.offseq.com/threat/cve-20 #OffSeq #CVE202626216 #infosec #RCE

##

CVE-2025-69872(CVSS UNKNOWN)

EPSS: 0.08%

updated 2026-02-12T20:08:45

2 posts

DiskCache (python-diskcache) through 5.6.3 uses Python pickle for serialization by default. An attacker with write access to the cache directory can achieve arbitrary code execution when a victim application reads from the cache.

thehackerwire@mastodon.social at 2026-02-13T02:29:07.000Z ##

🔴 CVE-2025-69872 - Critical (9.8)

DiskCache (python-diskcache) through 5.6.3 uses Python pickle for serialization by default. An attacker with write access to the cache directory can achieve arbitrary code execution when a victim application reads from the cache.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T02:29:07.000Z ##

🔴 CVE-2025-69872 - Critical (9.8)

DiskCache (python-diskcache) through 5.6.3 uses Python pickle for serialization by default. An attacker with write access to the cache directory can achieve arbitrary code execution when a victim application reads from the cache.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70085
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-02-12T18:31:25

2 posts

An issue was discovered in OpenSatKit 2.2.1. The EventErrStr buffer has a fixed size of 256 bytes. The code uses sprintf to format two filenames (Source1Filename and the string returned by FileUtil_FileStateStr) into this buffer without any length checking and without using bounded format specifiers such as %.*s. If the filename length approaches OS_MAX_PATH_LEN (commonly 64-256 bytes), the combin

thehackerwire@mastodon.social at 2026-02-13T03:15:50.000Z ##

🔴 CVE-2025-70085 - Critical (9.8)

An issue was discovered in OpenSatKit 2.2.1. The EventErrStr buffer has a fixed size of 256 bytes. The code uses sprintf to format two filenames (Source1Filename and the string returned by FileUtil_FileStateStr) into this buffer without any length...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T03:15:50.000Z ##

🔴 CVE-2025-70085 - Critical (9.8)

An issue was discovered in OpenSatKit 2.2.1. The EventErrStr buffer has a fixed size of 256 bytes. The code uses sprintf to format two filenames (Source1Filename and the string returned by FileUtil_FileStateStr) into this buffer without any length...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20626
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-12T18:31:25

2 posts

This issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 26.3 and iPadOS 26.3, macOS Tahoe 26.3, visionOS 26.3. A malicious app may be able to gain root privileges.

thehackerwire@mastodon.social at 2026-02-13T01:07:26.000Z ##

🟠 CVE-2026-20626 - High (7.8)

This issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 26.3 and iPadOS 26.3, macOS Tahoe 26.3, visionOS 26.3. A malicious app may be able to gain root privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T01:07:26.000Z ##

🟠 CVE-2026-20626 - High (7.8)

This issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 26.3 and iPadOS 26.3, macOS Tahoe 26.3, visionOS 26.3. A malicious app may be able to gain root privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69871
(8.1 HIGH)

EPSS: 0.04%

updated 2026-02-12T18:31:24

2 posts

A race condition vulnerability exists in MedusaJS Medusa v2.12.2 and earlier in the registerUsage() function of the promotion module. The function performs a non-atomic read-check-update operation when enforcing promotion usage limits. This allows unauthenticated remote attackers to bypass usage limits by sending concurrent checkout requests, resulting in unlimited redemptions of limited-use promo

thehackerwire@mastodon.social at 2026-02-13T01:22:48.000Z ##

🟠 CVE-2025-69871 - High (8.1)

A race condition vulnerability exists in MedusaJS Medusa v2.12.2 and earlier in the registerUsage() function of the promotion module. The function performs a non-atomic read-check-update operation when enforcing promotion usage limits. This allows...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T01:22:48.000Z ##

🟠 CVE-2025-69871 - High (8.1)

A race condition vulnerability exists in MedusaJS Medusa v2.12.2 and earlier in the registerUsage() function of the promotion module. The function performs a non-atomic read-check-update operation when enforcing promotion usage limits. This allows...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-46290
(7.5 HIGH)

EPSS: 0.14%

updated 2026-02-12T18:31:24

2 posts

A logic issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.4, macOS Sonoma 14.8.4. A remote attacker may be able to cause a denial-of-service.

thehackerwire@mastodon.social at 2026-02-13T01:22:38.000Z ##

🟠 CVE-2025-46290 - High (7.5)

A logic issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.4, macOS Sonoma 14.8.4. A remote attacker may be able to cause a denial-of-service.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T01:22:38.000Z ##

🟠 CVE-2025-46290 - High (7.5)

A logic issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.4, macOS Sonoma 14.8.4. A remote attacker may be able to cause a denial-of-service.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2249
(9.8 CRITICAL)

EPSS: 0.17%

updated 2026-02-12T18:31:24

1 posts

METIS DFS devices (versions <= oscore 2.1.234-r18) expose a web-based shell at the /console endpoint that does not require authentication. Accessing this endpoint allows a remote attacker to execute arbitrary operating system commands with 'daemon' privileges. This results in the compromise of the software, granting unauthorized access to modify configuration, read and alter sensitive data, or dis

1 repos

https://github.com/taylorwerno/CVE-2026-2249

thehackerwire@mastodon.social at 2026-02-11T21:28:18.000Z ##

🔴 CVE-2026-2249 - Critical (9.8)

METIS DFS devices (versions &lt;= oscore 2.1.234-r18) expose a web-based shell at the /console endpoint that does not require authentication. Accessing this endpoint allows a remote attacker to execute arbitrary operating system commands with &#03...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2248
(9.8 CRITICAL)

EPSS: 0.17%

updated 2026-02-12T18:31:24

1 posts

METIS WIC devices (versions <= oscore 2.1.234-r18) expose a web-based shell at the /console endpoint that does not require authentication. Accessing this endpoint allows a remote attacker to execute arbitrary operating system commands with root (UID 0) privileges. This results in full system compromise, allowing unauthorized access to modify system configuration, read sensitive data, or disrupt de

thehackerwire@mastodon.social at 2026-02-11T21:28:08.000Z ##

🔴 CVE-2026-2248 - Critical (9.8)

METIS WIC devices (versions &lt;= oscore 2.1.234-r18) expose a web-based shell at the /console endpoint that does not require authentication. Accessing this endpoint allows a remote attacker to execute arbitrary operating system commands with root...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69634
(9.1 CRITICAL)

EPSS: 0.05%

updated 2026-02-12T18:30:23

2 posts

Cross Site Request Forgery vulnerability in Dolibarr ERP & CRM v.22.0.9 allows a remote attacker to escalate privileges via the notes field in perms.php

thehackerwire@mastodon.social at 2026-02-12T22:01:46.000Z ##

🔴 CVE-2025-69634 - Critical (9)

Cross Site Request Forgery vulnerability in Dolibarr ERP & CRM v.22.0.9 allows a remote attacker to escalate privileges via the notes field in perms.php

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T22:01:46.000Z ##

🔴 CVE-2025-69634 - Critical (9)

Cross Site Request Forgery vulnerability in Dolibarr ERP & CRM v.22.0.9 allows a remote attacker to escalate privileges via the notes field in perms.php

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2250
(7.5 HIGH)

EPSS: 0.07%

updated 2026-02-12T16:16:18.783000

1 posts

The /dbviewer/ web endpoint in METIS WIC devices is exposed without authentication. A remote attacker can access and export the internal telemetry SQLite database containing sensitive operational data. Additionally, the application is configured with debug mode enabled, causing malformed requests to return verbose Django tracebacks that disclose backend source code, local file paths, and system co

thehackerwire@mastodon.social at 2026-02-11T22:21:59.000Z ##

🟠 CVE-2026-2250 - High (7.5)

The /dbviewer/ web endpoint in METIS WIC devices is exposed without authentication. A remote attacker can access and export the internal telemetry SQLite database containing sensitive operational data. Additionally, the application is configured w...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26235
(7.5 HIGH)

EPSS: 0.07%

updated 2026-02-12T16:16:17.917000

4 posts

JUNG Smart Visu Server 1.1.1050 contains a denial of service vulnerability that allows unauthenticated attackers to remotely shutdown or reboot the server. Attackers can send a single POST request to trigger the server reboot without requiring any authentication.

1 repos

https://github.com/mbanyamer/CVE-2026-26235-JUNG-Smart-Visu-Server-Unauthenticated-Reboot-Shutdown

thehackerwire@mastodon.social at 2026-02-13T00:04:20.000Z ##

🟠 CVE-2026-26235 - High (7.5)

JUNG Smart Visu Server 1.1.1050 contains a denial of service vulnerability that allows unauthenticated attackers to remotely shutdown or reboot the server. Attackers can send a single POST request to trigger the server reboot without requiring any...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-02-12T10:00:30.144Z ##

🚨 CVE-2026-26235 (HIGH): JUNG Smart Visu Server 1.1.1050 lets unauthenticated users remotely shut down or reboot the server via POST request. Restrict network access, monitor logs, and await vendor patch. Details: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-13T00:04:20.000Z ##

🟠 CVE-2026-26235 - High (7.5)

JUNG Smart Visu Server 1.1.1050 contains a denial of service vulnerability that allows unauthenticated attackers to remotely shutdown or reboot the server. Attackers can send a single POST request to trigger the server reboot without requiring any...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-12T10:00:30.000Z ##

🚨 CVE-2026-26235 (HIGH): JUNG Smart Visu Server 1.1.1050 lets unauthenticated users remotely shut down or reboot the server via POST request. Restrict network access, monitor logs, and await vendor patch. Details: radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #OTSecurity

##

CVE-2025-67135
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-02-12T16:16:04.620000

2 posts

Weak Security in the PF-50 1.2 keyfob of PGST PG107 Alarm System 1.25.05.hf allows attackers to compromise access control via a code replay attack.

thehackerwire@mastodon.social at 2026-02-13T01:22:28.000Z ##

🔴 CVE-2025-67135 - Critical (9.8)

Weak Security in the PF-50 1.2 keyfob of PGST PG107 Alarm System 1.25.05.hf allows attackers to compromise access control via a code replay attack.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T01:22:28.000Z ##

🔴 CVE-2025-67135 - Critical (9.8)

Weak Security in the PF-50 1.2 keyfob of PGST PG107 Alarm System 1.25.05.hf allows attackers to compromise access control via a code replay attack.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-14892
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-02-12T15:33:54

2 posts

The Prime Listing Manager WordPress plugin through 1.1 allows an attacker to gain administrative access without having any kind of account on the targeted site and perform unauthorized actions due to a hardcoded secret.

thehackerwire@mastodon.social at 2026-02-12T23:15:30.000Z ##

🔴 CVE-2025-14892 - Critical (9.8)

The Prime Listing Manager WordPress plugin through 1.1 allows an attacker to gain administrative access without having any kind of account on the targeted site and perform unauthorized actions due to a hardcoded secret.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T23:15:30.000Z ##

🔴 CVE-2025-14892 - Critical (9.8)

The Prime Listing Manager WordPress plugin through 1.1 allows an attacker to gain administrative access without having any kind of account on the targeted site and perform unauthorized actions due to a hardcoded secret.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70083
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-12T15:33:51

2 posts

An issue was discovered in OpenSatKit 2.2.1. The DirName field in the telecommand is provided by the ground segment and must be treated as untrusted input. The program copies DirName into the local buffer DirWithSep using strcpy. The size of this buffer is OS_MAX_PATH_LEN. If the length of DirName is greater than or equal to OS_MAX_PATH_LEN, a stack buffer overflow occurs, overwriting adjacent sta

thehackerwire@mastodon.social at 2026-02-13T03:15:31.000Z ##

🟠 CVE-2025-70083 - High (7.8)

An issue was discovered in OpenSatKit 2.2.1. The DirName field in the telecommand is provided by the ground segment and must be treated as untrusted input. The program copies DirName into the local buffer DirWithSep using strcpy. The size of this ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T03:15:31.000Z ##

🟠 CVE-2025-70083 - High (7.8)

An issue was discovered in OpenSatKit 2.2.1. The DirName field in the telecommand is provided by the ground segment and must be treated as untrusted input. The program copies DirName into the local buffer DirWithSep using strcpy. The size of this ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2004
(8.8 HIGH)

EPSS: 0.10%

updated 2026-02-12T15:32:55

6 posts

Missing validation of type of input in PostgreSQL intarray extension selectivity estimator function allows an object creator to execute arbitrary code as the operating system user running the database. Versions before PostgreSQL 18.2, 17.8, 16.12, 15.16, and 14.21 are affected.

1 repos

https://github.com/dkstar11q/Ashwesker-CVE-2026-20045

mastokukei@social.josko.org at 2026-02-13T09:02:24.000Z ##

Blip blop, I'm a #mastobot.
Here is a summary (in beta) of the latest posts in #programmingAtKukei masto.kukei.eu/browse/programm category:
- MinIO repository is no longer maintained.
- CVE-2026-2004: PostgreSQL intarray extension has missing input validation allowing OS code execution.
- JupyterLite officially joins Project Jupyter.
- TypeScript 6.0 Beta released.
- Interop 2026: WebKit features including container queries, anchor positioning, and related CSS/HTML innovations.
- [1/2]

##

thehackerwire@mastodon.social at 2026-02-12T22:16:18.000Z ##

🟠 CVE-2026-2004 - High (8.8)

Missing validation of type of input in PostgreSQL intarray extension selectivity estimator function allows an object creator to execute arbitrary code as the operating system user running the database. Versions before PostgreSQL 18.2, 17.8, 16.12...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

mastokukei@social.josko.org at 2026-02-12T18:02:20.000Z ##

Blip blop, I'm a #mastobot.
Here is a summary (in beta) of the latest posts in #programmingAtKukei masto.kukei.eu/browse/programm category:
- AI agents coordinating on real work and autonomous coding (Claude Code, agent frameworks, Copilot-style testing)
- PostgreSQL CVE-2026-2004: missing input validation in intarray extension allows OS code execution
- Python ecosystem events: PyCon Namibia 2026 and PyCon Sweden 2025/2026 (speaker announcements and tracks)
- NixOS and Guix: full [1/2]

##

0x3e4@cyberplace.social at 2026-02-12T17:33:13.000Z ##

few new #postgresql vulns out there today

🔐 CVE-2026-2004
CVE-2026-2004

Missing validation of type of input in PostgreSQL intarray extension selectivity estimator function allows an object creator to execute arbitrary code as the operating system user running the database.

📊 CVSS Score: 8.8
⚠️ Severity: High
📅 Published: 02/12/2026, 02:16 PM
🏷️ Aliases: CVE-2026-2004
🛡️ CWE: CWE-1287
📚 References: postgresql.org/support/securit

🔗 hecate.pw/vulnerability/CVE-20

#cve #vulnerability #hecate

##

thehackerwire@mastodon.social at 2026-02-12T22:16:18.000Z ##

🟠 CVE-2026-2004 - High (8.8)

Missing validation of type of input in PostgreSQL intarray extension selectivity estimator function allows an object creator to execute arbitrary code as the operating system user running the database. Versions before PostgreSQL 18.2, 17.8, 16.12...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

0x3e4@cyberplace.social at 2026-02-12T17:33:13.000Z ##

few new #postgresql vulns out there today

🔐 CVE-2026-2004
CVE-2026-2004

Missing validation of type of input in PostgreSQL intarray extension selectivity estimator function allows an object creator to execute arbitrary code as the operating system user running the database.

📊 CVSS Score: 8.8
⚠️ Severity: High
📅 Published: 02/12/2026, 02:16 PM
🏷️ Aliases: CVE-2026-2004
🛡️ CWE: CWE-1287
📚 References: postgresql.org/support/securit

🔗 hecate.pw/vulnerability/CVE-20

#cve #vulnerability #hecate

##

CVE-2025-10969
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-02-12T15:32:54

2 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Farktor Software E-Commerce Services Inc. E-Commerce Package allows Blind SQL Injection.This issue affects E-Commerce Package: through 27112025.

thehackerwire@mastodon.social at 2026-02-12T22:40:16.000Z ##

🔴 CVE-2025-10969 - Critical (9.8)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Farktor Software E-Commerce Services Inc. E-Commerce Package allows Blind SQL Injection.This issue affects E-Commerce Package: through 27112025.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T22:40:16.000Z ##

🔴 CVE-2025-10969 - Critical (9.8)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Farktor Software E-Commerce Services Inc. E-Commerce Package allows Blind SQL Injection.This issue affects E-Commerce Package: through 27112025.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2007
(8.2 HIGH)

EPSS: 0.04%

updated 2026-02-12T15:32:54

2 posts

Heap buffer overflow in PostgreSQL pg_trgm allows a database user to achieve unknown impacts via a crafted input string. The attacker has limited control over the byte patterns to be written, but we have not ruled out the viability of attacks that lead to privilege escalation. PostgreSQL 18.1 and 18.0 are affected.

thehackerwire@mastodon.social at 2026-02-12T22:40:06.000Z ##

🟠 CVE-2026-2007 - High (8.2)

Heap buffer overflow in PostgreSQL pg_trgm allows a database user to achieve unknown impacts via a crafted input string. The attacker has limited control over the byte patterns to be written, but we have not ruled out the viability of attacks tha...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T22:40:06.000Z ##

🟠 CVE-2026-2007 - High (8.2)

Heap buffer overflow in PostgreSQL pg_trgm allows a database user to achieve unknown impacts via a crafted input string. The attacker has limited control over the byte patterns to be written, but we have not ruled out the viability of attacks tha...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-14014
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-02-12T15:32:54

2 posts

Unrestricted Upload of File with Dangerous Type vulnerability in NTN Information Processing Services Computer Software Hardware Industry and Trade Ltd. Co. Smart Panel allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Smart Panel: before 20251215.

thehackerwire@mastodon.social at 2026-02-12T22:16:08.000Z ##

🔴 CVE-2025-14014 - Critical (9.8)

Unrestricted Upload of File with Dangerous Type vulnerability in NTN Information Processing Services Computer Software Hardware Industry and Trade Ltd. Co. Smart Panel allows Accessing Functionality Not Properly Constrained by ACLs.This issue affe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T22:16:08.000Z ##

🔴 CVE-2025-14014 - Critical (9.8)

Unrestricted Upload of File with Dangerous Type vulnerability in NTN Information Processing Services Computer Software Hardware Industry and Trade Ltd. Co. Smart Panel allows Accessing Functionality Not Properly Constrained by ACLs.This issue affe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1104
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-12T15:32:54

2 posts

The FastDup – Fastest WordPress Migration & Duplicator plugin for WordPress is vulnerable to unauthorized backup creation and download due to a missing capability check on REST API endpoints in all versions up to, and including, 2.7.1. This makes it possible for authenticated attackers, with Contributor-level access and above, to create and download full-site backup archives containing the entire

thehackerwire@mastodon.social at 2026-02-12T22:01:55.000Z ##

🟠 CVE-2026-1104 - High (8.8)

The FastDup – Fastest WordPress Migration & Duplicator plugin for WordPress is vulnerable to unauthorized backup creation and download due to a missing capability check on REST API endpoints in all versions up to, and including, 2.7.1. This make...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T22:01:55.000Z ##

🟠 CVE-2026-1104 - High (8.8)

The FastDup – Fastest WordPress Migration & Duplicator plugin for WordPress is vulnerable to unauthorized backup creation and download due to a missing capability check on REST API endpoints in all versions up to, and including, 2.7.1. This make...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-13002
(8.2 HIGH)

EPSS: 0.04%

updated 2026-02-12T15:32:53

2 posts

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Farktor Software E-Commerce Services Inc. E-Commerce Package allows Cross-Site Scripting (XSS).This issue affects E-Commerce Package: through 27112025.

thehackerwire@mastodon.social at 2026-02-12T22:40:26.000Z ##

🟠 CVE-2025-13002 - High (8.2)

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Farktor Software E-Commerce Services Inc. E-Commerce Package allows Cross-Site Scripting (XSS).This issue affects E-Commerce Package: thro...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T22:40:26.000Z ##

🟠 CVE-2025-13002 - High (8.2)

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Farktor Software E-Commerce Services Inc. E-Commerce Package allows Cross-Site Scripting (XSS).This issue affects E-Commerce Package: thro...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20610
(7.8 HIGH)

EPSS: 0.03%

updated 2026-02-12T15:32:47

2 posts

This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Tahoe 26.3. An app may be able to gain root privileges.

thehackerwire@mastodon.social at 2026-02-13T01:07:35.000Z ##

🟠 CVE-2026-20610 - High (7.8)

This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Tahoe 26.3. An app may be able to gain root privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T01:07:35.000Z ##

🟠 CVE-2026-20610 - High (7.8)

This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Tahoe 26.3. An app may be able to gain root privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70084
(7.5 HIGH)

EPSS: 0.24%

updated 2026-02-12T15:16:05.350000

2 posts

Directory traversal vulnerability in OpenSatKit 2.2.1 allows attackers to gain access to sensitive information or delete arbitrary files via crafted value to the FileUtil_GetFileInfo function.

thehackerwire@mastodon.social at 2026-02-13T03:15:41.000Z ##

🟠 CVE-2025-70084 - High (7.5)

Directory traversal vulnerability in OpenSatKit 2.2.1 allows attackers to gain access to sensitive information or delete arbitrary files via crafted value to the FileUtil_GetFileInfo function.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T03:15:41.000Z ##

🟠 CVE-2025-70084 - High (7.5)

Directory traversal vulnerability in OpenSatKit 2.2.1 allows attackers to gain access to sensitive information or delete arbitrary files via crafted value to the FileUtil_GetFileInfo function.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70029
(7.5 HIGH)

EPSS: 0.02%

updated 2026-02-12T15:16:04.567000

2 posts

An issue in Sunbird-Ed SunbirdEd-portal v1.13.4 allows attackers to obtain sensitive information. The application disables TLS/SSL certificate validation by setting 'rejectUnauthorized': false in HTTP request options

thehackerwire@mastodon.social at 2026-02-13T02:29:26.000Z ##

🟠 CVE-2025-70029 - High (7.5)

An issue in Sunbird-Ed SunbirdEd-portal v1.13.4 allows attackers to obtain sensitive information. The application disables TLS/SSL certificate validation by setting 'rejectUnauthorized': false in HTTP request options

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T02:29:26.000Z ##

🟠 CVE-2025-70029 - High (7.5)

An issue in Sunbird-Ed SunbirdEd-portal v1.13.4 allows attackers to obtain sensitive information. The application disables TLS/SSL certificate validation by setting 'rejectUnauthorized': false in HTTP request options

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-15573
(9.4 CRITICAL)

EPSS: 0.02%

updated 2026-02-12T15:16:03.043000

2 posts

The affected devices do not validate the server certificate when connecting to the SolaX Cloud MQTTS server hosted in the Alibaba Cloud (mqtt001.solaxcloud.com, TCP 8883). This allows attackers in a man-in-the-middle position to act as the legitimate MQTT server and issue arbitrary commands to devices.

thehackerwire@mastodon.social at 2026-02-12T23:15:20.000Z ##

🔴 CVE-2025-15573 - Critical (9.4)

The affected devices do not validate the server certificate when connecting to the SolaX Cloud MQTTS server hosted in the Alibaba Cloud (mqtt001.solaxcloud.com, TCP 8883). This allows attackers in a man-in-the-middle position to act as the legitim...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T23:15:20.000Z ##

🔴 CVE-2025-15573 - Critical (9.4)

The affected devices do not validate the server certificate when connecting to the SolaX Cloud MQTTS server hosted in the Alibaba Cloud (mqtt001.solaxcloud.com, TCP 8883). This allows attackers in a man-in-the-middle position to act as the legitim...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2360
(8.0 HIGH)

EPSS: 0.04%

updated 2026-02-12T15:11:02.290000

1 posts

PostgreSQL Anonymizer contains a vulnerability that allows a user to gain superuser privileges by creating a custom operator in the public schema and place malicious code in that operator. This operator will later be executed with superuser privileges when the extension is created. The risk is higher with PostgreSQL 14 or with instances upgraded from PostgreSQL 14 or a prior version. With PostgreS

thehackerwire@mastodon.social at 2026-02-11T21:02:42.000Z ##

🟠 CVE-2026-2360 - High (8)

PostgreSQL Anonymizer contains a vulnerability that allows a user to gain superuser privileges by creating a custom operator in the public schema and place malicious code in that operator. This operator will later be executed with superuser privil...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2006
(8.8 HIGH)

EPSS: 0.06%

updated 2026-02-12T15:10:37.307000

2 posts

Missing validation of multibyte character length in PostgreSQL text manipulation allows a database user to issue crafted queries that achieve a buffer overrun. That suffices to execute arbitrary code as the operating system user running the database. Versions before PostgreSQL 18.2, 17.8, 16.12, 15.16, and 14.21 are affected.

thehackerwire@mastodon.social at 2026-02-12T22:18:35.000Z ##

🟠 CVE-2026-2006 - High (8.8)

Missing validation of multibyte character length in PostgreSQL text manipulation allows a database user to issue crafted queries that achieve a buffer overrun. That suffices to execute arbitrary code as the operating system user running the datab...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T22:18:35.000Z ##

🟠 CVE-2026-2006 - High (8.8)

Missing validation of multibyte character length in PostgreSQL text manipulation allows a database user to issue crafted queries that achieve a buffer overrun. That suffices to execute arbitrary code as the operating system user running the datab...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2005
(8.8 HIGH)

EPSS: 0.06%

updated 2026-02-12T15:10:37.307000

2 posts

Heap buffer overflow in PostgreSQL pgcrypto allows a ciphertext provider to execute arbitrary code as the operating system user running the database. Versions before PostgreSQL 18.2, 17.8, 16.12, 15.16, and 14.21 are affected.

thehackerwire@mastodon.social at 2026-02-12T22:16:27.000Z ##

🟠 CVE-2026-2005 - High (8.8)

Heap buffer overflow in PostgreSQL pgcrypto allows a ciphertext provider to execute arbitrary code as the operating system user running the database. Versions before PostgreSQL 18.2, 17.8, 16.12, 15.16, and 14.21 are affected.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T22:16:27.000Z ##

🟠 CVE-2026-2005 - High (8.8)

Heap buffer overflow in PostgreSQL pgcrypto allows a ciphertext provider to execute arbitrary code as the operating system user running the database. Versions before PostgreSQL 18.2, 17.8, 16.12, 15.16, and 14.21 are affected.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1320
(7.2 HIGH)

EPSS: 0.03%

updated 2026-02-12T15:10:37.307000

2 posts

The Secure Copy Content Protection and Content Locking plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'X-Forwarded-For' HTTP header in all versions up to, and including, 4.9.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses

offseq at 2026-02-12T14:30:20.349Z ##

⚠️ HIGH severity alert: CVE-2026-1320 impacts ays-pro Secure Copy Content Protection & Content Locking (all versions) — Stored XSS via 'X-Forwarded-For' lets unauth attackers inject scripts. Monitor and restrict input. More: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-12T14:30:20.000Z ##

⚠️ HIGH severity alert: CVE-2026-1320 impacts ays-pro Secure Copy Content Protection & Content Locking (all versions) — Stored XSS via 'X-Forwarded-For' lets unauth attackers inject scripts. Monitor and restrict input. More: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #XSS

##

CVE-2026-23857
(8.2 HIGH)

EPSS: 0.01%

updated 2026-02-12T15:10:37.307000

4 posts

Dell Update Package (DUP) Framework, versions 23.12.00 through 24.12.00, contains an Improper Handling of Insufficient Permissions or Privileges vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.

offseq at 2026-02-12T13:00:31.465Z ##

Dell Update Package Framework (23.12.00 – 24.12.00) hit by HIGH severity (CVSS 8.2) vuln: improper permission checks enable local privilege escalation. Restrict access & monitor for updates. CVE-2026-23857 🛡️ radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-12T03:22:30.000Z ##

🟠 CVE-2026-23857 - High (8.2)

Dell Update Package (DUP) Framework, versions 23.12.00 through 24.12.00, contains an Improper Handling of Insufficient Permissions or Privileges vulnerability. A low privileged attacker with local access could potentially exploit this vulnerabilit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-12T13:00:31.000Z ##

Dell Update Package Framework (23.12.00 – 24.12.00) hit by HIGH severity (CVSS 8.2) vuln: improper permission checks enable local privilege escalation. Restrict access & monitor for updates. CVE-2026-23857 🛡️ radar.offseq.com/threat/cve-20 #OffSeq #Dell #PrivilegeEscalation #Vuln

##

thehackerwire@mastodon.social at 2026-02-12T03:22:30.000Z ##

🟠 CVE-2026-23857 - High (8.2)

Dell Update Package (DUP) Framework, versions 23.12.00 through 24.12.00, contains an Improper Handling of Insufficient Permissions or Privileges vulnerability. A low privileged attacker with local access could potentially exploit this vulnerabilit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1729
(9.8 CRITICAL)

EPSS: 0.19%

updated 2026-02-12T15:10:37.307000

6 posts

The AdForest theme for WordPress is vulnerable to authentication bypass in all versions up to, and including, 6.0.12. This is due to the plugin not properly verifying a user's identity prior to authenticating them through the 'sb_login_user_with_otp_fun' function. This makes it possible for unauthenticated attackers to log in as arbitrary users, including administrators.

1 repos

https://github.com/ninjazan420/CVE-2026-1729-PoC-AdForest-WordPress-Authentication-Bypass

offseq at 2026-02-12T07:00:34.685Z ##

🚨 CRITICAL: CVE-2026-1729 in AdForest (≤6.0.12) enables unauthenticated OTP login as any user — including admins. No patch yet. Block vulnerable OTP function, monitor logs, and deploy WAF rules ASAP. radar.offseq.com/threat/cve-20

##

offseq at 2026-02-12T03:00:30.533Z ##

🚨 CVE-2026-1729 (CRITICAL): AdForest WordPress theme authentication bypass lets attackers log in as any user — including admin! All versions affected, no patch yet. Disable OTP login & deploy WAF rules ASAP. More: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-12T02:26:27.000Z ##

🔴 CVE-2026-1729 - Critical (9.8)

The AdForest theme for WordPress is vulnerable to authentication bypass in all versions up to, and including, 6.0.12. This is due to the plugin not properly verifying a user's identity prior to authenticating them through the 'sb_login_user_with_o...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-12T07:00:34.000Z ##

🚨 CRITICAL: CVE-2026-1729 in AdForest (≤6.0.12) enables unauthenticated OTP login as any user — including admins. No patch yet. Block vulnerable OTP function, monitor logs, and deploy WAF rules ASAP. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vulnerability

##

offseq@infosec.exchange at 2026-02-12T03:00:30.000Z ##

🚨 CVE-2026-1729 (CRITICAL): AdForest WordPress theme authentication bypass lets attackers log in as any user — including admin! All versions affected, no patch yet. Disable OTP login & deploy WAF rules ASAP. More: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #CVE20261729 #WebSecurity

##

thehackerwire@mastodon.social at 2026-02-12T02:26:27.000Z ##

🔴 CVE-2026-1729 - Critical (9.8)

The AdForest theme for WordPress is vulnerable to authentication bypass in all versions up to, and including, 6.0.12. This is due to the plugin not properly verifying a user's identity prior to authenticating them through the 'sb_login_user_with_o...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-64487
(7.6 HIGH)

EPSS: 0.01%

updated 2026-02-12T15:10:37.307000

1 posts

Outline is a service that allows for collaborative documentation. Prior to 1.1.0, a privilege escalation vulnerability exists in the Outline document management system due to inconsistent authorization checks between user and group membership management endpoints. This vulnerability is fixed in 1.1.0.

thehackerwire@mastodon.social at 2026-02-11T21:27:58.000Z ##

🟠 CVE-2025-64487 - High (7.6)

Outline is a service that allows for collaborative documentation. Prior to 1.1.0, a privilege escalation vulnerability exists in the Outline document management system due to inconsistent authorization checks between user and group membership mana...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25676
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-12T06:30:21

4 posts

The installer of M-Track Duo HD version 1.0.0 contains an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries. As a result, arbitrary code may be executed with administrator privileges.

1 repos

https://github.com/Nexxus67/cve-2026-25676

thehackerwire@mastodon.social at 2026-02-12T23:15:39.000Z ##

🟠 CVE-2026-25676 - High (7.8)

The installer of M-Track Duo HD version 1.0.0 contains an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries. As a result, arbitrary code may be executed with administrator privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-02-12T08:30:53.599Z ##

⚠️ CVE-2026-25676: HIGH-severity DLL search path vuln in M-Audio M-Track Duo HD v1.0.0 installer. Local attackers can hijack DLLs to run code as admin. Restrict installer use, monitor for patches! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-12T23:15:39.000Z ##

🟠 CVE-2026-25676 - High (7.8)

The installer of M-Track Duo HD version 1.0.0 contains an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries. As a result, arbitrary code may be executed with administrator privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-12T08:30:53.000Z ##

⚠️ CVE-2026-25676: HIGH-severity DLL search path vuln in M-Audio M-Track Duo HD v1.0.0 installer. Local attackers can hijack DLLs to run code as admin. Restrict installer use, monitor for patches! radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Infosec #CVE2026_25676

##

CVE-2026-26234
(8.8 HIGH)

EPSS: 0.07%

updated 2026-02-12T06:30:21

4 posts

JUNG Smart Visu Server 1.1.1050 contains a request header manipulation vulnerability that allows unauthenticated attackers to override request URLs by injecting arbitrary values in the X-Forwarded-Host header. Attackers can manipulate proxied requests to generate tainted responses, enabling cache poisoning, potential phishing, and redirecting users to malicious domains.

offseq at 2026-02-12T11:30:34.950Z ##

🔎 CVE-2026-26234 (HIGH): JUNG Smart Visu Server (v1.0.830 – 1.1.1050) allows unauthenticated X-Forwarded-Host header injection — leads to cache poisoning, phishing, and redirects. Patch when available, restrict access, monitor logs. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-12T04:22:55.000Z ##

🟠 CVE-2026-26234 - High (8.8)

JUNG Smart Visu Server 1.1.1050 contains a request header manipulation vulnerability that allows unauthenticated attackers to override request URLs by injecting arbitrary values in the X-Forwarded-Host header. Attackers can manipulate proxied requ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-12T11:30:34.000Z ##

🔎 CVE-2026-26234 (HIGH): JUNG Smart Visu Server (v1.0.830 – 1.1.1050) allows unauthenticated X-Forwarded-Host header injection — leads to cache poisoning, phishing, and redirects. Patch when available, restrict access, monitor logs. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #IoT

##

thehackerwire@mastodon.social at 2026-02-12T04:22:55.000Z ##

🟠 CVE-2026-26234 - High (8.8)

JUNG Smart Visu Server 1.1.1050 contains a request header manipulation vulnerability that allows unauthenticated attackers to override request URLs by injecting arbitrary values in the X-Forwarded-Host header. Attackers can manipulate proxied requ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23856
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-12T03:31:06

2 posts

Dell iDRAC Service Module (iSM) for Windows, versions prior to 6.0.3.1, and Dell iDRAC Service Module (iSM) for Linux, versions prior to 5.4.1.1, contain an Improper Access Control vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.

thehackerwire@mastodon.social at 2026-02-12T03:22:39.000Z ##

🟠 CVE-2026-23856 - High (7.8)

Dell iDRAC Service Module (iSM) for Windows, versions prior to 6.0.3.1, and Dell iDRAC Service Module (iSM) for Linux, versions prior to 5.4.1.1, contain an Improper Access Control vulnerability. A low privileged attacker with local access could p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T03:22:39.000Z ##

🟠 CVE-2026-23856 - High (7.8)

Dell iDRAC Service Module (iSM) for Windows, versions prior to 6.0.3.1, and Dell iDRAC Service Module (iSM) for Linux, versions prior to 5.4.1.1, contain an Improper Access Control vulnerability. A low privileged attacker with local access could p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0969
(8.8 HIGH)

EPSS: 0.07%

updated 2026-02-12T03:31:01

4 posts

The serialize function used to compile MDX in next-mdx-remote is vulnerable to arbitrary code execution due to insufficient sanitization of MDX content.

thehackerwire@mastodon.social at 2026-02-12T03:22:59.000Z ##

🟠 CVE-2026-0969 - High (8.8)

The serialize function used to compile MDX in next-mdx-remote is vulnerable to arbitrary code execution due to insufficient sanitization of MDX content.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T03:22:38.000Z ##

🟠 CVE-2026-0969 - High (8.8)

The serialize function used to compile MDX in next-mdx-remote is vulnerable to arbitrary code execution due to insufficient sanitization of MDX content.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T03:22:59.000Z ##

🟠 CVE-2026-0969 - High (8.8)

The serialize function used to compile MDX in next-mdx-remote is vulnerable to arbitrary code execution due to insufficient sanitization of MDX content.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T03:22:38.000Z ##

🟠 CVE-2026-0969 - High (8.8)

The serialize function used to compile MDX in next-mdx-remote is vulnerable to arbitrary code execution due to insufficient sanitization of MDX content.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26215(CVSS UNKNOWN)

EPSS: 0.13%

updated 2026-02-12T00:31:12

2 posts

manga-image-translator version beta-0.3 and prior in shared API mode contains an unsafe deserialization vulnerability that can lead to unauthenticated remote code execution. The FastAPI endpoints /simple_execute/{method} and /execute/{method} deserialize attacker-controlled request bodies using pickle.loads() without validation. Although a nonce-based authorization check is intended to restrict ac

1 repos

https://github.com/mbanyamer/-CVE-2026-26215-manga-image-translator-RCE

offseq at 2026-02-12T06:00:31.098Z ##

CVE-2026-26215: CRITICAL RCE in zyddnys manga-image-translator (beta-0.3 & earlier). Unauthenticated attackers can exploit unsafe pickle.loads() in FastAPI endpoints to execute code. Disable endpoints & monitor for threats! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-12T06:00:31.000Z ##

CVE-2026-26215: CRITICAL RCE in zyddnys manga-image-translator (beta-0.3 & earlier). Unauthenticated attackers can exploit unsafe pickle.loads() in FastAPI endpoints to execute code. Disable endpoints & monitor for threats! radar.offseq.com/threat/cve-20 #OffSeq #CVE202626215 #infosec

##

CVE-2026-26010
(7.6 HIGH)

EPSS: 0.01%

updated 2026-02-11T23:14:54

1 posts

### Summary Calls issued by the UI against `/api/v1/ingestionPipelines` leak JWTs used by `ingestion-bot` for certain services (Glue / Redshift / Postgres) ### Details Any read-only user can gain access to a highly privileged account, typically which has the Ingestion Bot Role. This enables destructive changes in OpenMetadata instances, and potential data leakage (e.g. sample data, or service met

thehackerwire@mastodon.social at 2026-02-11T21:17:14.000Z ##

🟠 CVE-2026-26010 - High (7.6)

OpenMetadata is a unified metadata platform. Prior to 1.11.8, calls issued by the UI against /api/v1/ingestionPipelines leak JWTs used by ingestion-bot for certain services (Glue / Redshift / Postgres). Any read-only user can gain access to a high...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25759
(8.7 HIGH)

EPSS: 0.01%

updated 2026-02-11T23:14:17

1 posts

### Impact Stored XSS vulnerability in content titles allow authenticated users with content creation permissions to inject malicious JavaScript that executes when viewed by higher-privileged users. Malicious user must have an account with control panel access and content creation permissions. This vulnerability can be exploited to allow super admin accounts to be created. ### Patches This has

thehackerwire@mastodon.social at 2026-02-11T21:17:24.000Z ##

🟠 CVE-2026-25759 - High (8.7)

Statmatic is a Laravel and Git powered content management system (CMS). From 6.0.0 to before 6.2.3, a stored XSS vulnerability in content titles allows authenticated users with content creation permissions to inject malicious JavaScript that execu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69873(CVSS UNKNOWN)

EPSS: 0.07%

updated 2026-02-11T21:30:48

2 posts

ajv (Another JSON Schema Validator) through version 8.17.1 is vulnerable to Regular Expression Denial of Service (ReDoS) when the $data option is enabled. The pattern keyword accepts runtime data via JSON Pointer syntax ($data reference), which is passed directly to the JavaScript RegExp() constructor without validation. An attacker can inject a malicious regex pattern (e.g., "^(a|a)*$") combined

thehackerwire@mastodon.social at 2026-02-13T02:29:16.000Z ##

🟠 CVE-2025-69873 - High (7.5)

ajv (Another JSON Schema Validator) through version 8.17.1 is vulnerable to Regular Expression Denial of Service (ReDoS) when the $data option is enabled. The pattern keyword accepts runtime data via JSON Pointer syntax ($data reference), which is...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T02:29:16.000Z ##

🟠 CVE-2025-69873 - High (7.5)

ajv (Another JSON Schema Validator) through version 8.17.1 is vulnerable to Regular Expression Denial of Service (ReDoS) when the $data option is enabled. The pattern keyword accepts runtime data via JSON Pointer syntax ($data reference), which is...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2315
(8.8 HIGH)

EPSS: 0.02%

updated 2026-02-11T21:30:48

1 posts

Inappropriate implementation in WebGPU in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-02-11T21:02:33.000Z ##

🟠 CVE-2026-2315 - High (8.8)

Inappropriate implementation in WebGPU in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2313
(8.8 HIGH)

EPSS: 0.02%

updated 2026-02-11T21:30:48

1 posts

Use after free in CSS in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-02-11T21:01:55.000Z ##

🟠 CVE-2026-2313 - High (8.8)

Use after free in CSS in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-52868
(8.1 HIGH)

EPSS: 0.10%

updated 2026-02-11T21:30:40

2 posts

A buffer overflow vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to modify memory or crash processes. We have already fixed the vulnerability in the following version: Qsync Central 5.0.0.4 ( 2026/01/20 ) and later

thehackerwire@mastodon.social at 2026-02-11T23:26:32.000Z ##

🟠 CVE-2025-52868 - High (8.1)

A buffer overflow vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to modify memory or crash processes.

We have already fixed the vulnerability in the foll...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-11T23:26:32.000Z ##

🟠 CVE-2025-52868 - High (8.1)

A buffer overflow vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to modify memory or crash processes.

We have already fixed the vulnerability in the foll...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-48725
(8.1 HIGH)

EPSS: 0.10%

updated 2026-02-11T21:30:39

2 posts

A buffer overflow vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains a user account, they can then exploit the vulnerability to modify memory or crash processes. We have already fixed the vulnerability in the following version: QuTS hero h5.3.2.3354 build 20251225 and later

thehackerwire@mastodon.social at 2026-02-12T00:31:01.000Z ##

🟠 CVE-2025-48725 - High (8.1)

A buffer overflow vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains a user account, they can then exploit the vulnerability to modify memory or crash processes.

We have already fixed the ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T00:31:01.000Z ##

🟠 CVE-2025-48725 - High (8.1)

A buffer overflow vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains a user account, they can then exploit the vulnerability to modify memory or crash processes.

We have already fixed the ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-48724
(8.1 HIGH)

EPSS: 0.10%

updated 2026-02-11T21:30:39

2 posts

A buffer overflow vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to modify memory or crash processes. We have already fixed the vulnerability in the following version: Qsync Central 5.0.0.4 ( 2026/01/20 ) and later

thehackerwire@mastodon.social at 2026-02-12T00:30:52.000Z ##

🟠 CVE-2025-48724 - High (8.1)

A buffer overflow vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to modify memory or crash processes.

We have already fixed the vulnerability in the foll...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T00:30:52.000Z ##

🟠 CVE-2025-48724 - High (8.1)

A buffer overflow vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to modify memory or crash processes.

We have already fixed the vulnerability in the foll...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-30276
(8.8 HIGH)

EPSS: 0.11%

updated 2026-02-11T21:30:39

2 posts

An out-of-bounds write vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to modify or corrupt memory. We have already fixed the vulnerability in the following version: Qsync Central 5.0.0.4 ( 2026/01/20 ) and later

thehackerwire@mastodon.social at 2026-02-11T23:26:41.000Z ##

🟠 CVE-2025-30276 - High (8.8)

An out-of-bounds write vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to modify or corrupt memory.

We have already fixed the vulnerability in the followi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-11T23:26:41.000Z ##

🟠 CVE-2025-30276 - High (8.8)

An out-of-bounds write vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to modify or corrupt memory.

We have already fixed the vulnerability in the followi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21239
(7.8 HIGH)

EPSS: 0.03%

updated 2026-02-11T21:30:37

2 posts

Heap-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally.

thehackerwire@mastodon.social at 2026-02-12T03:36:20.000Z ##

🟠 CVE-2026-21239 - High (7.8)

Heap-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T03:36:20.000Z ##

🟠 CVE-2026-21239 - High (7.8)

Heap-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-48723
(8.1 HIGH)

EPSS: 0.10%

updated 2026-02-11T21:18:06.230000

2 posts

A buffer overflow vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to modify memory or crash processes. We have already fixed the vulnerability in the following version: Qsync Central 5.0.0.4 ( 2026/01/20 ) and later

thehackerwire@mastodon.social at 2026-02-11T23:26:50.000Z ##

🟠 CVE-2025-48723 - High (8.1)

A buffer overflow vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to modify memory or crash processes.

We have already fixed the vulnerability in the foll...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-11T23:26:50.000Z ##

🟠 CVE-2025-48723 - High (8.1)

A buffer overflow vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to modify memory or crash processes.

We have already fixed the vulnerability in the foll...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-30269
(8.1 HIGH)

EPSS: 0.04%

updated 2026-02-11T21:10:50.490000

2 posts

A use of externally-controlled format string vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to obtain secret data or modify memory. We have already fixed the vulnerability in the following version: Qsync Central 5.0.0.4 ( 2026/01/20 ) and later

thehackerwire@mastodon.social at 2026-02-12T00:31:11.000Z ##

🟠 CVE-2025-30269 - High (8.1)

A use of externally-controlled format string vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to obtain secret data or modify memory.

We have already fixed...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T00:31:11.000Z ##

🟠 CVE-2025-30269 - High (8.1)

A use of externally-controlled format string vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to obtain secret data or modify memory.

We have already fixed...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21236
(7.8 HIGH)

EPSS: 0.03%

updated 2026-02-11T21:07:23.287000

2 posts

Heap-based buffer overflow in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

thehackerwire@mastodon.social at 2026-02-12T03:36:01.000Z ##

🟠 CVE-2026-21236 - High (7.8)

Heap-based buffer overflow in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T03:36:01.000Z ##

🟠 CVE-2026-21236 - High (7.8)

Heap-based buffer overflow in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21238
(7.8 HIGH)

EPSS: 0.03%

updated 2026-02-11T21:01:48.670000

2 posts

Improper access control in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

thehackerwire@mastodon.social at 2026-02-12T03:36:11.000Z ##

🟠 CVE-2026-21238 - High (7.8)

Improper access control in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T03:36:11.000Z ##

🟠 CVE-2026-21238 - High (7.8)

Improper access control in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21245
(7.8 HIGH)

EPSS: 0.03%

updated 2026-02-11T20:44:29.940000

2 posts

Heap-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally.

thehackerwire@mastodon.social at 2026-02-12T02:26:49.000Z ##

🟠 CVE-2026-21245 - High (7.8)

Heap-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T02:26:49.000Z ##

🟠 CVE-2026-21245 - High (7.8)

Heap-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25084
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-02-11T18:31:36

1 posts

Authentication for ZLAN5143D can be bypassed by directly accessing internal URLs.

thehackerwire@mastodon.social at 2026-02-11T21:08:30.000Z ##

🔴 CVE-2026-25084 - Critical (9.8)

Authentication for ZLAN5143D can be bypassed by directly accessing internal URLs.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24789
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-02-11T18:31:36

1 posts

An unprotected API endpoint allows an attacker to remotely change the device password without providing authentication.

thehackerwire@mastodon.social at 2026-02-11T21:08:20.000Z ##

🔴 CVE-2026-24789 - Critical (9.8)

An unprotected API endpoint allows an attacker to remotely change the device password without providing authentication.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2361
(8.1 HIGH)

EPSS: 0.04%

updated 2026-02-11T18:31:36

1 posts

PostgreSQL Anonymizer contains a vulnerability that allows a user to gain superuser privileges by creating a temporary view based on a function containing malicious code. When the anon.get_tablesample_ratio function is then called, the malicious code is executed with superuser privileges. This privilege elevation can be exploited by users having the CREATE privilege in PostgreSQL 15 and later. The

thehackerwire@mastodon.social at 2026-02-11T21:02:51.000Z ##

🟠 CVE-2026-2361 - High (8)

PostgreSQL Anonymizer contains a vulnerability that allows a user to gain superuser privileges by creating a temporary view based on a function containing malicious code. When the anon.get_tablesample_ratio function is then called, the malicious c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-64075
(10.0 CRITICAL)

EPSS: 0.44%

updated 2026-02-11T18:06:04.010000

1 posts

A path traversal vulnerability in the check_token function of Shenzhen Zhibotong Electronics ZBT WE2001 23.09.27 allows remote attackers to bypass authentication and perform administrative actions by supplying a crafted session cookie value.

thehackerwire@mastodon.social at 2026-02-11T21:08:40.000Z ##

🔴 CVE-2025-64075 - Critical (10)

A path traversal vulnerability in the check_token function of Shenzhen Zhibotong Electronics ZBT WE2001 23.09.27 allows remote attackers to bypass authentication and perform administrative actions by supplying a crafted session cookie value.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

cyclone at 2026-02-13T21:17:38.911Z ##

Windows Notepad RCE - CVE-2026-20841

A crafted Markdown link could trigger command execution via protocol handler abuse on Windows 11 Notepad.

forum.hashpwn.net/post/10031

##

mjlmo@vivaldi.net at 2026-02-13T15:25:13.000Z ##

Microsoft's #Notepad Got Pawned. The #vulnerability exploit #PoC code is public. Fork it while it's hot: github.com/BTtea/CVE-2026-2084

#cve2026_20841 #cyberSecurity

##

hackernewsrobot@mastodon.social at 2026-02-12T21:02:08.000Z ##

Windows Notepad App Remote Code Execution Vulnerability cve.org/CVERecord?id=CVE-2026-

##

Sdowney@mastodon.social at 2026-02-12T18:53:59.000Z ##

cve.org/CVERecord?id=CVE-2026-
AI enabled remote code execution in Windows Notepad if you open the wrong text file.

##

arudesalad@piefed.ca at 2026-02-12T17:29:09.533Z ##

Literally

(CVE)

##

mastokukei@social.josko.org at 2026-02-12T09:01:42.000Z ##

revolt.
- AI governance: SpaceX merger prompts XAI leadership shake‑up; GLM‑5 discussed; EU digital sovereignty push.
- Windows security: Windows 11 Notepad remote code execution CVE-2026-20841 disclosed.
- Bochum urban space: Bochum city center has thousands of unused parking spots; space wasted, calls for transit/urban‑planning action. [2/2]

##

_r_netsec at 2026-02-12T07:43:06.123Z ##

Microsoft's Notepad Got Pwned (CVE-2026-20841) foss-daily.org/posts/microsoft

##

jacenboy@mastodon.jacen.moe at 2026-02-11T23:11:59.000Z ##

Social engineering using Notepad?

jacen.moe/blog/20260211-weapon

#Cybersecurity #SocialEngineering #Infosec #Microsoft #Windows #Tech #Technology

##

cyclone@infosec.exchange at 2026-02-13T21:17:38.000Z ##

Windows Notepad RCE - CVE-2026-20841

A crafted Markdown link could trigger command execution via protocol handler abuse on Windows 11 Notepad.

forum.hashpwn.net/post/10031

#notepad #rce #cve202620841 #cybersecurity #news #hashpwn

##

Sdowney@mastodon.social at 2026-02-12T18:53:59.000Z ##

cve.org/CVERecord?id=CVE-2026-
AI enabled remote code execution in Windows Notepad if you open the wrong text file.

##

_r_netsec@infosec.exchange at 2026-02-12T07:43:06.000Z ##

Microsoft's Notepad Got Pwned (CVE-2026-20841) foss-daily.org/posts/microsoft

##

jacenboy@mastodon.jacen.moe at 2026-02-11T23:11:59.000Z ##

Social engineering using Notepad?

jacen.moe/blog/20260211-weapon

#Cybersecurity #SocialEngineering #Infosec #Microsoft #Windows #Tech #Technology

##

CVE-2025-12059
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-02-11T15:30:36

1 posts

Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability in Logo Software Industry and Trade Inc. Logo j-Platform allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Logo j-Platform: from 3.29.6.4 through 13112025.

thehackerwire@mastodon.social at 2026-02-11T22:22:18.000Z ##

🔴 CVE-2025-12059 - Critical (9.8)

Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability in Logo Software Industry and Trade Inc. Logo j-Platform allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Logo ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-48503
(7.9 HIGH)

EPSS: 0.01%

updated 2026-02-11T15:30:35

1 posts

A DLL hijacking vulnerability in the AMD Software Installer could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.

thehackerwire@mastodon.social at 2026-02-11T22:22:08.000Z ##

🟠 CVE-2025-48503 - High (7.8)

A DLL hijacking vulnerability in the AMD Software Installer could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0910
(8.8 HIGH)

EPSS: 0.07%

updated 2026-02-11T15:30:34

2 posts

The wpForo Forum plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.4.13 via deserialization of untrusted input in the 'wpforo_display_array_data' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vuln

thehackerwire@mastodon.social at 2026-02-11T22:34:31.000Z ##

🟠 CVE-2026-0910 - High (8.8)

The wpForo Forum plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.4.13 via deserialization of untrusted input in the 'wpforo_display_array_data' function. This makes it possible for authenticated a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-11T22:34:31.000Z ##

🟠 CVE-2026-0910 - High (8.8)

The wpForo Forum plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.4.13 via deserialization of untrusted input in the 'wpforo_display_array_data' function. This makes it possible for authenticated a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-8668
(9.4 CRITICAL)

EPSS: 0.04%

updated 2026-02-11T15:30:34

2 posts

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in E-Kalite Software Hardware Engineering Design and Internet Services Industry and Trade Ltd. Co. Turboard allows Reflected XSS.This issue affects Turboard: from 2025.07 through 11022026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

thehackerwire@mastodon.social at 2026-02-11T22:34:21.000Z ##

🔴 CVE-2025-8668 - Critical (9.4)

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in E-Kalite Software Hardware Engineering Design and Internet Services Industry and Trade Ltd. Co. Turboard allows Reflected XSS.This issue a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-11T22:34:21.000Z ##

🔴 CVE-2025-8668 - Critical (9.4)

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in E-Kalite Software Hardware Engineering Design and Internet Services Industry and Trade Ltd. Co. Turboard allows Reflected XSS.This issue a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1357
(9.8 CRITICAL)

EPSS: 0.40%

updated 2026-02-11T15:27:26.370000

4 posts

The Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress is vulnerable to Unauthenticated Arbitrary File Upload in versions up to and including 0.9.123. This is due to improper error handling in the RSA decryption process combined with a lack of path sanitization when writing uploaded files. When the plugin fails to decrypt a session key using openssl_private_decrypt(), it

4 repos

https://github.com/microcyberr/CVE-2026-1357

https://github.com/LucasM0ntes/POC-CVE-2026-1357

https://github.com/itsismarcos/Exploit-CVE-2026-1357

https://github.com/halilkirazkaya/CVE-2026-1357

beyondmachines1 at 2026-02-13T08:01:32.436Z ##

Critical RCE Vulnerability Reported in WPvivid Backup Plugin

WPvivid Backup & Migration plugin for WordPress patched a critical RCE vulnerability (CVE-2026-1357) that allows unauthenticated attackers to upload malicious PHP files via predictable cryptographic keys.

**If you are using WPvivid plugin, update to version 0.9.124 ASAP. If you cannot update right away, ensure the 'receive backup from another site' feature is disabled to close the primary attack vector.**

beyondmachines.net/event_detai

##

thehackerwire@mastodon.social at 2026-02-12T02:13:25.000Z ##

🔴 CVE-2026-1357 - Critical (9.8)

The Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress is vulnerable to Unauthenticated Arbitrary File Upload in versions up to and including 0.9.123. This is due to improper error handling in the RSA decryption process...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

beyondmachines1@infosec.exchange at 2026-02-13T08:01:32.000Z ##

Critical RCE Vulnerability Reported in WPvivid Backup Plugin

WPvivid Backup & Migration plugin for WordPress patched a critical RCE vulnerability (CVE-2026-1357) that allows unauthenticated attackers to upload malicious PHP files via predictable cryptographic keys.

**If you are using WPvivid plugin, update to version 0.9.124 ASAP. If you cannot update right away, ensure the 'receive backup from another site' feature is disabled to close the primary attack vector.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

thehackerwire@mastodon.social at 2026-02-12T02:13:25.000Z ##

🔴 CVE-2026-1357 - Critical (9.8)

The Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress is vulnerable to Unauthenticated Arbitrary File Upload in versions up to and including 0.9.123. This is due to improper error handling in the RSA decryption process...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1560
(8.8 HIGH)

EPSS: 0.24%

updated 2026-02-11T15:27:26.370000

2 posts

The Custom Block Builder – Lazy Blocks plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.2.0 via multiple functions in the 'LazyBlocks_Blocks' class. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server.

1 repos

https://github.com/Z3YR0xX/CVE-2026-1560-Authenticated-Remote-Code-Execution-in-Lazy-Blocks-4.2.0

thehackerwire@mastodon.social at 2026-02-12T01:50:45.000Z ##

🟠 CVE-2026-1560 - High (8.8)

The Custom Block Builder – Lazy Blocks plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.2.0 via multiple functions in the 'LazyBlocks_Blocks' class. This makes it possible for authenticated atta...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T01:50:45.000Z ##

🟠 CVE-2026-1560 - High (8.8)

The Custom Block Builder – Lazy Blocks plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.2.0 via multiple functions in the 'LazyBlocks_Blocks' class. This makes it possible for authenticated atta...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-8025
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-02-11T15:27:26.370000

2 posts

Missing Authentication for Critical Function, Improper Access Control vulnerability in Dinosoft Business Solutions Dinosoft ERP allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Dinosoft ERP: from < 3.0.1 through 11022026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

thehackerwire@mastodon.social at 2026-02-11T22:34:42.000Z ##

🔴 CVE-2025-8025 - Critical (9.8)

Missing Authentication for Critical Function, Improper Access Control vulnerability in Dinosoft Business Solutions Dinosoft ERP allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Dinosoft ERP: from &lt; 3.0.1 throug...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-11T22:34:42.000Z ##

🔴 CVE-2025-8025 - Critical (9.8)

Missing Authentication for Critical Function, Improper Access Control vulnerability in Dinosoft Business Solutions Dinosoft ERP allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Dinosoft ERP: from &lt; 3.0.1 throug...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0958
(7.5 HIGH)

EPSS: 0.03%

updated 2026-02-11T12:30:27

2 posts

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.4 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 that could have allowed an unauthenticated user to cause denial of service through memory or CPU exhaustion by bypassing JSON validation middleware limits.

thehackerwire@mastodon.social at 2026-02-12T01:21:11.000Z ##

🟠 CVE-2026-0958 - High (7.5)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.4 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 that could have allowed an unauthenticated user to cause denial of service through memory or CPU exhaustion b...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T01:21:11.000Z ##

🟠 CVE-2026-0958 - High (7.5)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.4 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 that could have allowed an unauthenticated user to cause denial of service through memory or CPU exhaustion b...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-8099
(7.5 HIGH)

EPSS: 0.04%

updated 2026-02-11T12:30:27

2 posts

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 10.8 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 that, under certain conditions, could have allowed an unauthenticated user to cause denial of service by sending repeated GraphQL queries.

thehackerwire@mastodon.social at 2026-02-12T01:21:01.000Z ##

🟠 CVE-2025-8099 - High (7.5)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 10.8 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 that, under certain conditions, could have allowed an unauthenticated user to cause denial of service by send...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T01:21:01.000Z ##

🟠 CVE-2025-8099 - High (7.5)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 10.8 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 that, under certain conditions, could have allowed an unauthenticated user to cause denial of service by send...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-7659
(8.0 HIGH)

EPSS: 0.01%

updated 2026-02-11T12:30:27

2 posts

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.2 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 that could have allowed an unauthenticated user to steal tokens and access private repositories by abusing incomplete validation in the Web IDE.

thehackerwire@mastodon.social at 2026-02-12T01:20:51.000Z ##

🟠 CVE-2025-7659 - High (8)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.2 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 that could have allowed an unauthenticated user to steal tokens and access private repositories by abusing in...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T01:20:51.000Z ##

🟠 CVE-2025-7659 - High (8)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.2 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 that could have allowed an unauthenticated user to steal tokens and access private repositories by abusing in...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-15096
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-11T12:30:26

2 posts

The 'Videospirecore Theme Plugin' plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.0.6. This is due to the plugin not properly validating a user's identity prior to updating their details like email. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change arbitrary user's email addr

thehackerwire@mastodon.social at 2026-02-12T01:50:36.000Z ##

🟠 CVE-2025-15096 - High (8.8)

The 'Videospirecore Theme Plugin' plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.0.6. This is due to the plugin not properly validating a user's identity prior to updating th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T01:50:36.000Z ##

🟠 CVE-2025-15096 - High (8.8)

The 'Videospirecore Theme Plugin' plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.0.6. This is due to the plugin not properly validating a user's identity prior to updating th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-10174
(8.3 HIGH)

EPSS: 0.01%

updated 2026-02-11T12:30:26

2 posts

Cleartext Transmission of Sensitive Information vulnerability in Pan Software & Information Technologies Ltd. PanCafe Pro allows Flooding.This issue affects PanCafe Pro: from < 3.3.2 through 23092025.

thehackerwire@mastodon.social at 2026-02-12T01:50:26.000Z ##

🟠 CVE-2025-10174 - High (8.3)

Cleartext Transmission of Sensitive Information vulnerability in Pan Software & Information Technologies Ltd. PanCafe Pro allows Flooding.This issue affects PanCafe Pro: from &lt; 3.3.2 through 23092025.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T01:50:26.000Z ##

🟠 CVE-2025-10174 - High (8.3)

Cleartext Transmission of Sensitive Information vulnerability in Pan Software & Information Technologies Ltd. PanCafe Pro allows Flooding.This issue affects PanCafe Pro: from &lt; 3.3.2 through 23092025.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-10913
(8.3 HIGH)

EPSS: 0.04%

updated 2026-02-11T09:30:24

2 posts

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Saastech Cleaning and Internet Services Inc. TemizlikYolda allows Cross-Site Scripting (XSS).This issue affects TemizlikYolda: through 11022026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

thehackerwire@mastodon.social at 2026-02-12T02:13:16.000Z ##

🟠 CVE-2025-10913 - High (8.3)

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Saastech Cleaning and Internet Services Inc. TemizlikYolda allows Cross-Site Scripting (XSS).This issue affects TemizlikYolda: through 110...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T02:13:16.000Z ##

🟠 CVE-2025-10913 - High (8.3)

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Saastech Cleaning and Internet Services Inc. TemizlikYolda allows Cross-Site Scripting (XSS).This issue affects TemizlikYolda: through 110...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-9986
(8.2 HIGH)

EPSS: 0.03%

updated 2026-02-11T09:30:24

2 posts

Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Vadi Corporate Information Systems Ltd. Co. DIGIKENT allows Excavation.This issue affects DIGIKENT: through 13092025.

thehackerwire@mastodon.social at 2026-02-12T02:13:06.000Z ##

🟠 CVE-2025-9986 - High (8.2)

Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Vadi Corporate Information Systems Ltd. Co. DIGIKENT allows Excavation.This issue affects DIGIKENT: through 13092025.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T02:13:06.000Z ##

🟠 CVE-2025-9986 - High (8.2)

Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Vadi Corporate Information Systems Ltd. Co. DIGIKENT allows Excavation.This issue affects DIGIKENT: through 13092025.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21228
(8.1 HIGH)

EPSS: 0.04%

updated 2026-02-10T21:51:48.077000

2 posts

Improper certificate validation in Azure Local allows an unauthorized attacker to execute code over a network.

thehackerwire@mastodon.social at 2026-02-12T04:01:14.000Z ##

🟠 CVE-2026-21228 - High (8.1)

Improper certificate validation in Azure Local allows an unauthorized attacker to execute code over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T04:01:14.000Z ##

🟠 CVE-2026-21228 - High (8.1)

Improper certificate validation in Azure Local allows an unauthorized attacker to execute code over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21537
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-10T18:30:54

1 posts

Improper control of generation of code ('code injection') in Microsoft Defender for Linux allows an unauthorized attacker to execute code over an adjacent network.

linux@activitypub.awakari.com at 2026-02-10T08:00:00.000Z ## CVE-2026-21537 Microsoft Defender for Endpoint Linux Extension Remote Code Execution Vulnerability Improper control of generation of code ('code injection') in Microsoft Defender for Linux ...

#CVE

Origin | Interest | Match ##

CVE-2026-21240
(7.8 HIGH)

EPSS: 0.02%

updated 2026-02-10T18:30:51

2 posts

Time-of-check time-of-use (toctou) race condition in Windows HTTP.sys allows an authorized attacker to elevate privileges locally.

thehackerwire@mastodon.social at 2026-02-12T04:01:03.000Z ##

🟠 CVE-2026-21240 - High (7.8)

Time-of-check time-of-use (toctou) race condition in Windows HTTP.sys allows an authorized attacker to elevate privileges locally.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T04:01:03.000Z ##

🟠 CVE-2026-21240 - High (7.8)

Time-of-check time-of-use (toctou) race condition in Windows HTTP.sys allows an authorized attacker to elevate privileges locally.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21243
(7.5 HIGH)

EPSS: 0.06%

updated 2026-02-10T18:30:51

2 posts

Null pointer dereference in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network.

thehackerwire@mastodon.social at 2026-02-12T02:26:39.000Z ##

🟠 CVE-2026-21243 - High (7.5)

Null pointer dereference in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T02:26:39.000Z ##

🟠 CVE-2026-21243 - High (7.5)

Null pointer dereference in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1603
(8.6 HIGH)

EPSS: 0.18%

updated 2026-02-10T18:30:49

2 posts

An authentication bypass in Ivanti Endpoint Manager before version 2024 SU5 allows a remote unauthenticated attacker to leak specific stored credential data.

beyondmachines1 at 2026-02-12T13:01:32.149Z ##

Ivanti Patches High-Severity Authentication Bypass in Endpoint Manager

Ivanti patched a high-severity authentication bypass (CVE-2026-1603) and a SQL injection flaw (CVE-2026-1602) in its Endpoint Manager software that could allow attackers to steal credentials and sensitive database information.

**If you are using Ivanti EPM, one more patch cycle. Plan a quick update to Ivanti EPM instance to version 2024 SU5 or later. If possible, make sure your management servers are not exposed directly to the public internet.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-02-12T13:01:32.000Z ##

Ivanti Patches High-Severity Authentication Bypass in Endpoint Manager

Ivanti patched a high-severity authentication bypass (CVE-2026-1603) and a SQL injection flaw (CVE-2026-1602) in its Endpoint Manager software that could allow attackers to steal credentials and sensitive database information.

**If you are using Ivanti EPM, one more patch cycle. Plan a quick update to Ivanti EPM instance to version 2024 SU5 or later. If possible, make sure your management servers are not exposed directly to the public internet.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-21229
(8.0 HIGH)

EPSS: 0.07%

updated 2026-02-10T18:30:49

2 posts

Improper input validation in Power BI allows an authorized attacker to execute code over a network.

thehackerwire@mastodon.social at 2026-02-12T04:01:25.000Z ##

🟠 CVE-2026-21229 - High (8)

Improper input validation in Power BI allows an authorized attacker to execute code over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-12T04:01:25.000Z ##

🟠 CVE-2026-21229 - High (8)

Improper input validation in Power BI allows an authorized attacker to execute code over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1602
(6.5 MEDIUM)

EPSS: 0.05%

updated 2026-02-10T18:30:38

2 posts

SQL injection in Ivanti Endpoint Manager before version 2024 SU5 allows a remote authenticated attacker to read arbitrary data from the database.

beyondmachines1 at 2026-02-12T13:01:32.149Z ##

Ivanti Patches High-Severity Authentication Bypass in Endpoint Manager

Ivanti patched a high-severity authentication bypass (CVE-2026-1603) and a SQL injection flaw (CVE-2026-1602) in its Endpoint Manager software that could allow attackers to steal credentials and sensitive database information.

**If you are using Ivanti EPM, one more patch cycle. Plan a quick update to Ivanti EPM instance to version 2024 SU5 or later. If possible, make sure your management servers are not exposed directly to the public internet.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-02-12T13:01:32.000Z ##

Ivanti Patches High-Severity Authentication Bypass in Endpoint Manager

Ivanti patched a high-severity authentication bypass (CVE-2026-1603) and a SQL injection flaw (CVE-2026-1602) in its Endpoint Manager software that could allow attackers to steal credentials and sensitive database information.

**If you are using Ivanti EPM, one more patch cycle. Plan a quick update to Ivanti EPM instance to version 2024 SU5 or later. If possible, make sure your management servers are not exposed directly to the public internet.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-24061
(9.8 CRITICAL)

EPSS: 83.89%

updated 2026-02-10T18:30:34

7 posts

telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable.

Nuclei template

58 repos

https://github.com/ibrahmsql/CVE-2026-24061-PoC

https://github.com/obrunolima1910/CVE-2026-24061

https://github.com/cumakurt/tscan

https://github.com/LucasPDiniz/CVE-2026-24061

https://github.com/madfxr/Twenty-Three-Scanner

https://github.com/duy-31/CVE-2026-24061---telnetd

https://github.com/SeptembersEND/CVE--2026-24061

https://github.com/ridpath/Terrminus-CVE-2026-2406

https://github.com/Lingzesec/CVE-2026-24061-GUI

https://github.com/X-croot/CVE-2026-24061_POC

https://github.com/novitahk/Exploit-CVE-2026-24061

https://github.com/yanxinwu946/CVE-2026-24061--telnetd

https://github.com/z3n70/CVE-2026-24061

https://github.com/hilwa24/CVE-2026-24061

https://github.com/buzz075/CVE-2026-24061

https://github.com/hackingyseguridad/root

https://github.com/TryA9ain/CVE-2026-24061

https://github.com/ms0x08-dev/CVE-2026-24061-POC

https://github.com/punitdarji/telnetd-cve-2026-24061

https://github.com/Chocapikk/CVE-2026-24061

https://github.com/typeconfused/CVE-2026-24061

https://github.com/nrnw/CVE-2026-24061-GNU-inetutils-Telnet-Detector

https://github.com/canpilayda/inetutils-telnetd-cve-2026-24061

https://github.com/FurkanKAYAPINAR/CVE-2026-24061-telnet2root

https://github.com/h3athen/CVE-2026-24061

https://github.com/Parad0x7e/CVE-2026-24061

https://github.com/SafeBreach-Labs/CVE-2026-24061

https://github.com/Mefhika120/Ashwesker-CVE-2026-24061

https://github.com/SystemVll/CVE-2026-24061

https://github.com/r00tuser111/CVE-2026-24061

https://github.com/Gabs-hub/CVE-2026-24061_Lab

https://github.com/androidteacher/CVE-2026-24061-PoC-Telnetd

https://github.com/leonjza/inetutils-telnetd-auth-bypass

https://github.com/killsystema/scan-cve-2026-24061

https://github.com/BrainBob/Telnet-TestVuln-CVE-2026-24061

https://github.com/MY0723/GNU-Inetutils-telnet-CVE-2026-24061-

https://github.com/scumfrog/cve-2026-24061

https://github.com/shivam-bathla/CVE-2026-24061-setup

https://github.com/infat0x/CVE-2026-24061

https://github.com/xuemian168/CVE-2026-24061

https://github.com/lavabyte/telnet-CVE-2026-24061

https://github.com/franckferman/CVE_2026_24061_PoC

https://github.com/cyberpoul/CVE-2026-24061-POC

https://github.com/midox008/CVE-2026-24061

https://github.com/XsanFlip/CVE-2026-24061-Scanner

https://github.com/JayGLXR/CVE-2026-24061-POC

https://github.com/BrainBob/CVE-2026-24061

https://github.com/Mr-Zapi/CVE-2026-24061

https://github.com/balgan/CVE-2026-24061

https://github.com/hyu164/Terrminus-CVE-2026-2406

https://github.com/Alter-N0X/CVE-2026-24061-POC

https://github.com/m3ngx1ng/cve_2026_24061_cli

https://github.com/monstertsl/CVE-2026-24061

https://github.com/Ali-brarou/telnest

https://github.com/0x7556/CVE-2026-24061

https://github.com/0xXyc/telnet-inetutils-auth-bypass-CVE-2026-24061

https://github.com/parameciumzhang/Tell-Me-Root

https://github.com/dotelpenguin/telnetd_CVE-2026-24061_tester

tobru@mstdn.social at 2026-02-12T21:37:19.000Z ##

2026-01-14: The Day the telnet Died

"On January 14, 2026, global telnet traffic observed by GreyNoise sensors fell off a cliff. A 59% sustained reduction, eighteen ASNs going completely silent, five countries vanishing from our data entirely. Six days later, CVE-2026-24061 dropped. Coincidence is one explanation."

Link: labs.greynoise.io/grimoire/202

#linkdump #blogpost #filtering #internet #iso #security #telnet

##

catsalad at 2026-02-12T02:21:01.772Z ##
USER='-f root' telnet -a ur.momma

root@ur.momma:~# got em!

cve.org/CVERecord?id=CVE-2026-

lists.gnu.org/archive/html/bug

##

cyborg42@chaos.social at 2026-02-11T23:10:43.000Z ##

Fixed Issues

> Fixed a security vulnerability regarding telnetd (CVE-2026-24061).

Thanks Synology.

##

tobru@mstdn.social at 2026-02-12T21:37:19.000Z ##

2026-01-14: The Day the telnet Died

"On January 14, 2026, global telnet traffic observed by GreyNoise sensors fell off a cliff. A 59% sustained reduction, eighteen ASNs going completely silent, five countries vanishing from our data entirely. Six days later, CVE-2026-24061 dropped. Coincidence is one explanation."

Link: labs.greynoise.io/grimoire/202

#linkdump #blogpost #filtering #internet #iso #security #telnet

##

catsalad@infosec.exchange at 2026-02-12T02:21:01.000Z ##
USER='-f root' telnet -a ur.momma

root@ur.momma:~# got em!

cve.org/CVERecord?id=CVE-2026-

lists.gnu.org/archive/html/bug

##

cyborg42@chaos.social at 2026-02-11T23:10:43.000Z ##

Fixed Issues

> Fixed a security vulnerability regarding telnetd (CVE-2026-24061).

Thanks Synology.

##

waldoj@mastodon.social at 2026-02-11T22:00:02.000Z ##

I'm just reading this GNU telnetd CVE from last month. I did not realize that telnet was still a thing, but it turns out anybody could provide a username of "-f root" and, boom, they had root. The vulnerability existed for 11 years. *Wow*. cve.org/CVERecord?id=CVE-2026-

##

CVE-2025-66630(CVSS UNKNOWN)

EPSS: 0.01%

updated 2026-02-09T18:49:19

2 posts

Fiber v2 contains an internal vendored copy of `gofiber/utils`, and its functions `UUIDv4()` and `UUID()` inherit the same critical weakness described in the upstream advisory. On **Go versions prior to 1.24**, the underlying `crypto/rand` implementation **can return an error** if secure randomness cannot be obtained. In such cases, these Fiber v2 UUID functions silently fall back to generating pr

beyondmachines1 at 2026-02-12T15:01:33.379Z ##

Critical UUID Flaw in Fiber v2 Framework Enables Session Hijacking

Fiber v2 patched a critical vulnerability (CVE-2025-66630) that generates predictable all-zero UUIDs when secure randomness fails, enabling session hijacking and CSRF bypass.

**If you are running applications running Fiber v2, prioritize updating to version 2.52.11 and update environments to Go 1.24, This is a weird flaw that may not happen regularly and is hard to reproduce, but it will hit you if you leave the old version long enough. It's better to patch than to hope.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-02-12T15:01:33.000Z ##

Critical UUID Flaw in Fiber v2 Framework Enables Session Hijacking

Fiber v2 patched a critical vulnerability (CVE-2025-66630) that generates predictable all-zero UUIDs when secure randomness fails, enabling session hijacking and CSRF bypass.

**If you are running applications running Fiber v2, prioritize updating to version 2.52.11 and update environments to Go 1.24, This is a weird flaw that may not happen regularly and is hard to reproduce, but it will hit you if you leave the old version long enough. It's better to patch than to hope.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-1868
(9.9 CRITICAL)

EPSS: 0.03%

updated 2026-02-09T16:08:35.290000

2 posts

GitLab has remediated a vulnerability in the Duo Workflow Service component of GitLab AI Gateway affecting all versions of the AI Gateway from 18.1.6, 18.2.6, 18.3.1 to 18.6.1, 18.7.0, and 18.8.0 in which AI Gateway was vulnerable to insecure template expansion of user supplied data via crafted Duo Agent Platform Flow definitions. This vulnerability could be used to cause Denial of Service or gain

0x3e4@cyberplace.social at 2026-02-13T15:22:44.000Z ##

🔐 CVE-2026-1868

📊 CVSS: 9.9 · Critical
📅 02/09/2026, 07:16 AM
🛡️ CWE: CWE-1336
📦 Affected: #GitLab GitLab AI Gateway (>= 18.1.6, < 18.6.2, >= 18.7.0, < 18.7.1, >= 18.8.0, < 18.8.1)

📚 References: about.gitlab.com/releases/2026

🔗 hecate.pw/vulnerability/CVE-20

#cve #vulnerability #hecate

##

0x3e4@cyberplace.social at 2026-02-13T15:22:44.000Z ##

🔐 CVE-2026-1868

📊 CVSS: 9.9 · Critical
📅 02/09/2026, 07:16 AM
🛡️ CWE: CWE-1336
📦 Affected: #GitLab GitLab AI Gateway (>= 18.1.6, < 18.6.2, >= 18.7.0, < 18.7.1, >= 18.8.0, < 18.8.1)

📚 References: about.gitlab.com/releases/2026

🔗 hecate.pw/vulnerability/CVE-20

#cve #vulnerability #hecate

##

CVE-2026-2084
(7.2 HIGH)

EPSS: 0.25%

updated 2026-02-07T12:31:33

1 posts

A weakness has been identified in D-Link DIR-823X 250416. This impacts an unknown function of the file /goform/set_language. Executing a manipulation of the argument langSelection can lead to os command injection. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks.

9 repos

https://github.com/tangent65536/CVE-2026-20841

https://github.com/uky007/CVE-2026-20841_notepad_analysis

https://github.com/BTtea/CVE-2026-20841-PoC

https://github.com/dogukankurnaz/CVE-2026-20841-PoC

https://github.com/atiilla/CVE-2026-20841

https://github.com/patchpoint/CVE-2026-20841

https://github.com/RajaUzairAbdullah/CVE-2026-20841

https://github.com/SecureWithUmer/CVE-2026-20841

https://github.com/hackfaiz/CVE-2026-20841-PoC

CVE-2026-21643
(9.8 CRITICAL)

EPSS: 0.17%

updated 2026-02-06T09:30:35

3 posts

An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiClientEMS 7.4.4 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.

cyberveille@mastobot.ping.moi at 2026-02-13T19:00:07.000Z ##

📢 Fortinet corrige une SQLi critique dans FortiClientEMS (CVE-2026-21643)
📝 Selon un avis PSIRT de Fortinet publié le 6 février 2026, une vulnérabilité critique d’injection SQL affecte FortiClientEMS.
📖 cyberveille : cyberveille.ch/posts/2026-02-1
🌐 source : fortiguard.com/psirt/FG-IR-25-
#CVE_2026_21643 #FortiClientEMS #Cyberveille

##

0x3e4@cyberplace.social at 2026-02-13T15:43:06.000Z ##

🔐 CVE-2026-21643

📊 CVSS: 9.1 · Critical
📅 02/06/2026, 08:24 AM
🛡️ CWE: CWE-89
📦 Affected: Fortinet FortiClientEMS (7.4.4)
📚 fortiguard.fortinet.com/psirt/

🔗 hecate.pw/vulnerability/CVE-20

#cve #vulnerability #hecate

##

0x3e4@cyberplace.social at 2026-02-13T15:43:06.000Z ##

🔐 CVE-2026-21643

📊 CVSS: 9.1 · Critical
📅 02/06/2026, 08:24 AM
🛡️ CWE: CWE-89
📦 Affected: Fortinet FortiClientEMS (7.4.4)
📚 fortiguard.fortinet.com/psirt/

🔗 hecate.pw/vulnerability/CVE-20

#cve #vulnerability #hecate

##

CVE-2025-64712
(9.8 CRITICAL)

EPSS: 0.08%

updated 2026-02-04T19:53:06

4 posts

A Path Traversal vulnerability in the `partition_msg` function allows an attacker to write or overwrite arbitrary files on the filesystem when processing malicious MSG files with attachments. ## Impact An attacker can craft a malicious .msg file with attachment filenames containing path traversal sequences (e.g., `../../../etc/cron.d/malicious`). When processed with `process_attachments=Tru

CVE-2026-20119
(7.5 HIGH)

EPSS: 0.09%

updated 2026-02-04T18:30:51

2 posts

A vulnerability in the text rendering subsystem of Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of input received by an affected device. An attacker could exploit this vulnerability by getting

AAKL at 2026-02-13T18:33:25.492Z ##

New advisory.

This updates a critical Cisco vulnerability first published in january.

CVE-2026-20045: Cisco Unified Communications Products Remote Code Execution Vulnerability sec.cloudapps.cisco.com/securi

From yesterday:

CVE-2026-20119: Cisco TelePresence Collaboration Endpoint Software and RoomOS Software Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

CVE-2025-20359 and CVE-2025-20360: Multiple Cisco Products Snort 3 MIME Denial of Service Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity

##

AAKL@infosec.exchange at 2026-02-13T18:33:25.000Z ##

New advisory.

This updates a critical Cisco vulnerability first published in january.

CVE-2026-20045: Cisco Unified Communications Products Remote Code Execution Vulnerability sec.cloudapps.cisco.com/securi

From yesterday:

CVE-2026-20119: Cisco TelePresence Collaboration Endpoint Software and RoomOS Software Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

CVE-2025-20359 and CVE-2025-20360: Multiple Cisco Products Snort 3 MIME Denial of Service Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco #infosec #vulnerability

##

CVE-2026-1281
(9.8 CRITICAL)

EPSS: 54.26%

updated 2026-01-30T00:31:29

2 posts

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

1 repos

https://github.com/MehdiLeDeaut/CVE-2026-1281-Ivanti-EPMM-RCE

CVE-2026-1340
(9.8 CRITICAL)

EPSS: 40.23%

updated 2026-01-30T00:31:28

2 posts

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

1 repos

https://github.com/MehdiLeDeaut/CVE-2026-1281-Ivanti-EPMM-RCE

CVE-2025-14523
(8.2 HIGH)

EPSS: 0.06%

updated 2026-01-29T16:16:07.627000

1 posts

A flaw in libsoup’s HTTP header handling allows multiple Host: headers in a request and returns the last occurrence for server-side processing. Common front proxies often honor the first Host: header, so this mismatch can cause vhost confusion where a proxy routes a request to one backend but the backend interprets it as destined for another host. This discrepancy enables request-smuggling style a

linux@activitypub.awakari.com at 2026-02-12T18:34:25.000Z ## Oracle Linux 7 libsoup Important Fix for Buffer Overflow CVE-2025-14523 The following updated rpms for Oracle Linux 7 have been uploaded to the Unbreakable Linux Network:

#Oracle #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2026-23760
(9.8 CRITICAL)

EPSS: 55.52%

updated 2026-01-27T18:33:14

2 posts

SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. An unauthenticated attacker can supply a target administrator username and a new password to reset the acc

Nuclei template

2 repos

https://github.com/MaxMnMl/smartermail-CVE-2026-23760-poc

https://github.com/hilwa24/CVE-2026-23760_SmarterMail-Auth-Bypass-and-RCE

CVE-2026-20045
(8.2 HIGH)

EPSS: 1.10%

updated 2026-01-21T21:31:31

2 posts

A vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM &amp; Presence Service (Unified CM IM&amp;P), Cisco Unity Connection, and Cisco Webex Calling Dedicated Instance could allow an unauthenticated, remote attacker&nbsp;to execute arbitrary commands on the under

1 repos

https://github.com/dkstar11q/Ashwesker-CVE-2026-20045

AAKL at 2026-02-13T18:33:25.492Z ##

New advisory.

This updates a critical Cisco vulnerability first published in january.

CVE-2026-20045: Cisco Unified Communications Products Remote Code Execution Vulnerability sec.cloudapps.cisco.com/securi

From yesterday:

CVE-2026-20119: Cisco TelePresence Collaboration Endpoint Software and RoomOS Software Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

CVE-2025-20359 and CVE-2025-20360: Multiple Cisco Products Snort 3 MIME Denial of Service Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity

##

AAKL@infosec.exchange at 2026-02-13T18:33:25.000Z ##

New advisory.

This updates a critical Cisco vulnerability first published in january.

CVE-2026-20045: Cisco Unified Communications Products Remote Code Execution Vulnerability sec.cloudapps.cisco.com/securi

From yesterday:

CVE-2026-20119: Cisco TelePresence Collaboration Endpoint Software and RoomOS Software Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

CVE-2025-20359 and CVE-2025-20360: Multiple Cisco Products Snort 3 MIME Denial of Service Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco #infosec #vulnerability

##

CVE-2025-8088
(8.8 HIGH)

EPSS: 3.90%

updated 2025-10-22T00:34:26

2 posts

A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET.

29 repos

https://github.com/pexlexity/WinRAR-CVE-2025-8088-Path-Traversal-PoC

https://github.com/ghostn4444/CVE-2025-8088

https://github.com/AdityaBhatt3010/CVE-2025-8088-WinRAR-Zero-Day-Path-Traversal

https://github.com/techcorp/CVE-2025-8088-Exploit

https://github.com/sxyrxyy/CVE-2025-8088-WinRAR-Proof-of-Concept-PoC-Exploit-

https://github.com/pescada-dev/-CVE-2025-8088

https://github.com/onlytoxi/CVE-2025-8088-Winrar-Tool

https://github.com/Ismael-20223/CVE-2025-8088

https://github.com/nuky-alt/CVE-2025-8088

https://github.com/pentestfunctions/CVE-2025-8088-Multi-Document

https://github.com/kitsuneshade/WinRAR-Exploit-Tool---Rust-Edition

https://github.com/hexsecteam/CVE-2025-8088-Winrar-Tool

https://github.com/lucyna77/winrar-exploit

https://github.com/ilhamrzr/RAR-Anomaly-Inspector

https://github.com/Markusino488/cve-2025-8088

https://github.com/pentestfunctions/best-CVE-2025-8088

https://github.com/papcaii2004/CVE-2025-8088-WinRAR-builder

https://github.com/Shinkirou789/Cve-2025-8088-WinRar-vulnerability

https://github.com/jordan922/CVE-2025-8088

https://github.com/Syrins/CVE-2025-8088-Winrar-Tool-Gui

https://github.com/DeepBlue-dot/CVE-2025-8088-WinRAR-Startup-PoC

https://github.com/walidpyh/CVE-2025-8088

https://github.com/knight0x07/WinRAR-CVE-2025-8088-PoC-RAR

https://github.com/nhattanhh/CVE-2025-8088

https://github.com/travisbgreen/cve-2025-8088

https://github.com/xi0onamdev/WinRAR-CVE-2025-8088-Exploitation-Toolkit

https://github.com/0xAbolfazl/CVE-2025-8088-WinRAR-PathTraversal-PoC

https://github.com/undefined-name12/CVE-2025-8088-Winrar

https://github.com/hbesljx/CVE-2025-8088-EXP

campuscodi@mastodon.social at 2026-02-11T23:40:29.000Z ##

Stairwell: "over 80% of monitored environments contain vulnerable versions of WinRAR affected by CVE-2025-8088"

🙃🙃🙃🙃🙃 :blobpeek:

stairwell.com/resources/stairw

##

campuscodi@mastodon.social at 2026-02-11T23:40:29.000Z ##

Stairwell: "over 80% of monitored environments contain vulnerable versions of WinRAR affected by CVE-2025-8088"

🙃🙃🙃🙃🙃 :blobpeek:

stairwell.com/resources/stairw

##

CVE-2025-20360
(5.8 MEDIUM)

EPSS: 0.13%

updated 2025-10-15T18:31:58

2 posts

Multiple Cisco products are affected by a vulnerability in the Snort 3 HTTP Decoder that could allow an unauthenticated, remote attacker to cause the Snort 3 Detection Engine to restart. This vulnerability is due to a lack of complete error checking when the MIME fields of the HTTP header are parsed. An attacker could exploit this vulnerability by sending crafted HTTP packets through an establis

AAKL at 2026-02-13T18:33:25.492Z ##

New advisory.

This updates a critical Cisco vulnerability first published in january.

CVE-2026-20045: Cisco Unified Communications Products Remote Code Execution Vulnerability sec.cloudapps.cisco.com/securi

From yesterday:

CVE-2026-20119: Cisco TelePresence Collaboration Endpoint Software and RoomOS Software Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

CVE-2025-20359 and CVE-2025-20360: Multiple Cisco Products Snort 3 MIME Denial of Service Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity

##

AAKL@infosec.exchange at 2026-02-13T18:33:25.000Z ##

New advisory.

This updates a critical Cisco vulnerability first published in january.

CVE-2026-20045: Cisco Unified Communications Products Remote Code Execution Vulnerability sec.cloudapps.cisco.com/securi

From yesterday:

CVE-2026-20119: Cisco TelePresence Collaboration Endpoint Software and RoomOS Software Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

CVE-2025-20359 and CVE-2025-20360: Multiple Cisco Products Snort 3 MIME Denial of Service Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco #infosec #vulnerability

##

CVE-2025-20359
(6.5 MEDIUM)

EPSS: 0.29%

updated 2025-10-15T18:31:58

2 posts

Multiple Cisco products are affected by a vulnerability in the Snort 3 HTTP Decoder that could allow an unauthenticated, remote attacker to cause the disclosure of possible sensitive data or cause the Snort 3 Detection Engine to crash. This vulnerability is due to an error in the logic of buffer handling when the MIME fields of the HTTP header are parsed. This can result in a buffer under-read. A

AAKL at 2026-02-13T18:33:25.492Z ##

New advisory.

This updates a critical Cisco vulnerability first published in january.

CVE-2026-20045: Cisco Unified Communications Products Remote Code Execution Vulnerability sec.cloudapps.cisco.com/securi

From yesterday:

CVE-2026-20119: Cisco TelePresence Collaboration Endpoint Software and RoomOS Software Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

CVE-2025-20359 and CVE-2025-20360: Multiple Cisco Products Snort 3 MIME Denial of Service Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity

##

AAKL@infosec.exchange at 2026-02-13T18:33:25.000Z ##

New advisory.

This updates a critical Cisco vulnerability first published in january.

CVE-2026-20045: Cisco Unified Communications Products Remote Code Execution Vulnerability sec.cloudapps.cisco.com/securi

From yesterday:

CVE-2026-20119: Cisco TelePresence Collaboration Endpoint Software and RoomOS Software Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

CVE-2025-20359 and CVE-2025-20360: Multiple Cisco Products Snort 3 MIME Denial of Service Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco #infosec #vulnerability

##

CVE-2024-6387
(8.1 HIGH)

EPSS: 25.87%

updated 2025-04-24T21:32:54

2 posts

A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog().

96 repos

https://github.com/l0n3m4n/CVE-2024-6387

https://github.com/identity-threat-labs/CVE-2024-6387-Vulnerability-Checker

https://github.com/bigb0x/CVE-2024-6387

https://github.com/password123456/cve-security-response-guidelines

https://github.com/filipi86/CVE-2024-6387-Vulnerability-Checker

https://github.com/zenzue/CVE-2024-6387-Mitigation

https://github.com/thegenetic/CVE-2024-6387-exploit

https://github.com/xonoxitron/regreSSHion-checker

https://github.com/RickGeex/CVE-2024-6387-Checker

https://github.com/passwa11/cve-2024-6387-poc

https://github.com/grupooruss/CVE-2024-6387

https://github.com/getdrive/CVE-2024-6387-PoC

https://github.com/Karmakstylez/CVE-2024-6387

https://github.com/BrandonLynch2402/cve-2024-6387-nuclei-template

https://github.com/imv7/CVE-2024-6387

https://github.com/invaderslabs/regreSSHion-CVE-2024-6387-

https://github.com/hssmo/cve-2024-6387_AImade

https://github.com/identity-threat-labs/Article-RegreSSHion-CVE-2024-6387

https://github.com/FerasAlrimali/CVE-2024-6387-POC

https://github.com/shyrwall/cve-2024-6387-poc

https://github.com/vkaushik-chef/regreSSHion

https://github.com/Ngagne-Demba-Dia/CVE-2024-6387-corrigee

https://github.com/dgourillon/mitigate-CVE-2024-6387

https://github.com/xaitax/CVE-2024-6387_Check

https://github.com/sardine-web/CVE-2024-6387_Check

https://github.com/Symbolexe/CVE-2024-6387

https://github.com/prelearn-code/CVE-2024-6387

https://github.com/jack0we/CVE-2024-6387

https://github.com/edsonjt81/CVE-2024-6387_Check

https://github.com/JackSparrowhk/ssh-CVE-2024-6387-poc

https://github.com/daniel-odrinski/CVE-2024-6387-Mitigation-Ansible-Playbook

https://github.com/acrono/cve-2024-6387-poc

https://github.com/sardine-web/CVE-2024-6387-template

https://github.com/TAM-K592/CVE-2024-6387

https://github.com/YassDEV221608/CVE-2024-6387_PoC

https://github.com/kuffsit/check_cve_2024_6387

https://github.com/lflare/cve-2024-6387-poc

https://github.com/s1d6point7bugcrowd/CVE-2024-6387-Race-Condition-in-Signal-Handling-for-OpenSSH

https://github.com/0x4D31/cve-2024-6387_hassh

https://github.com/redux-sibi-jose/mitigate_ssh

https://github.com/sxlmnwb/CVE-2024-6387

https://github.com/xonoxitron/regreSSHion

https://github.com/ahlfors/CVE-2024-6387

https://github.com/theaog/spirit

https://github.com/xristos8574/regreSSHion-nmap-scanner

https://github.com/DimaMend/cve-2024-6387-poc

https://github.com/no-one-sec/CVE-2024-6387

https://github.com/kinu404/CVE-2024-6387

https://github.com/alex14324/ssh_poc2024

https://github.com/awusan125/test_for6387

https://github.com/arielrbrdev/redteamlab1

https://github.com/CognisysGroup/CVE-2024-6387-Checker

https://github.com/Mufti22/CVE-2024-6387-checkher

https://github.com/ACHUX21/checker-CVE-2024-6387

https://github.com/moften/regreSSHion-CVE-2024-6387

https://github.com/mrmtwoj/CVE-2024-6387

https://github.com/xiw1ll/CVE-2024-6387_Checker

https://github.com/AiGptCode/ssh_exploiter_CVE-2024-6387

https://github.com/rumochnaya/openssh-cve-2024-6387.sh

https://github.com/P4x1s/CVE-2024-6387

https://github.com/jocker2410/CVE-2024-6387_poc

https://github.com/sms2056/CVE-2024-6387

https://github.com/MaulikxLakhani/SSHScout

https://github.com/muyuanlove/CVE-2024-6387fixshell

https://github.com/ThatNotEasy/CVE-2024-6387

https://github.com/harshinsecurity/sentinelssh

https://github.com/HadesNull123/CVE-2024-6387_Check

https://github.com/dawnl3ss/CVE-2024-6387

https://github.com/anhvutuan/CVE-2024-6387-poc-1

https://github.com/d0rb/CVE-2024-6387

https://github.com/dream434/CVE-2024-6387

https://github.com/turbobit/CVE-2024-6387-OpenSSH-Vulnerability-Checker

https://github.com/teamos-hub/regreSSHion

https://github.com/n1cks0n/Test_CVE-2024-6387

https://github.com/OhDamnn/Noregressh

https://github.com/R4Tw1z/CVE-2024-6387

https://github.com/almogopp/OpenSSH-CVE-2024-6387-Fix

https://github.com/YassDEV221608/CVE-2024-6387

https://github.com/l-urk/CVE-2024-6387

https://github.com/th3gokul/CVE-2024-6387

https://github.com/paradessia/CVE-2024-6387-nmap

https://github.com/betancour/OpenSSH-Vulnerability-test

https://github.com/lala-amber/CVE-2024-6387

https://github.com/CiderAndWhisky/regression-scanner

https://github.com/PrincipalAnthony/CVE-2024-6387-Updated-x64bit

https://github.com/MrR0b0t19/CVE-2024-6387-Exploit-POC

https://github.com/zgzhang/cve-2024-6387-poc

https://github.com/SkyGodling/CVE-2024-6387-POC

https://github.com/4lxprime/regreSSHive

https://github.com/shamo0/CVE-2024-6387_PoC

https://github.com/t3rry327/cve-2024-6387-poc

https://github.com/devarshishimpi/CVE-2024-6387-Check

https://github.com/wiggels/regresshion-check

https://github.com/X-Projetion/CVE-2023-4596-OpenSSH-Multi-Checker

https://github.com/kubota/CVE-2024-6387-Vulnerability-Checker

https://github.com/azurejoga/CVE-2024-6387-how-to-fix

azonenberg@ioc.exchange at 2026-02-13T02:19:20.000Z ##

@r @ireneista it should be possible to package a secure messenger client in a stable linux distro like debian and have it still be usable 3+ years after release with only fixes for specific vulns backported.

and there should be a single digit number of these vulns, if any, if you designed your network and parsing architecture right.

Like, if you exclude DOSes and bugs in non-default features, CVE-2024-6387 is the last SSH vuln that I actually worry about. The last one of substance before that was the 2023 double-free that's not believed exploitable, then we get all the way back to CVE-2016-0777 and 0778 for another bad one.

Why can we not make a messenger with that kind of security record? One where running an early-2025 release today is perfectly safe?

##

azonenberg at 2026-02-13T02:19:20.503Z ##

@r @ireneista it should be possible to package a secure messenger client in a stable linux distro like debian and have it still be usable 3+ years after release with only fixes for specific vulns backported.

and there should be a single digit number of these vulns, if any, if you designed your network and parsing architecture right.

Like, if you exclude DOSes and bugs in non-default features, CVE-2024-6387 is the last SSH vuln that I actually worry about. The last one of substance before that was the 2023 double-free that's not believed exploitable, then we get all the way back to CVE-2016-0777 and 0778 for another bad one.

Why can we not make a messenger with that kind of security record? One where running an early-2025 release today is perfectly safe?

##

CVE-2016-0777
(6.5 MEDIUM)

EPSS: 67.20%

updated 2025-04-12T10:46:40.837000

2 posts

The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.

1 repos

https://github.com/Abdirisaq-ali-aynab/openssh-vulnerability-assessment

azonenberg@ioc.exchange at 2026-02-13T02:19:20.000Z ##

@r @ireneista it should be possible to package a secure messenger client in a stable linux distro like debian and have it still be usable 3+ years after release with only fixes for specific vulns backported.

and there should be a single digit number of these vulns, if any, if you designed your network and parsing architecture right.

Like, if you exclude DOSes and bugs in non-default features, CVE-2024-6387 is the last SSH vuln that I actually worry about. The last one of substance before that was the 2023 double-free that's not believed exploitable, then we get all the way back to CVE-2016-0777 and 0778 for another bad one.

Why can we not make a messenger with that kind of security record? One where running an early-2025 release today is perfectly safe?

##

azonenberg at 2026-02-13T02:19:20.503Z ##

@r @ireneista it should be possible to package a secure messenger client in a stable linux distro like debian and have it still be usable 3+ years after release with only fixes for specific vulns backported.

and there should be a single digit number of these vulns, if any, if you designed your network and parsing architecture right.

Like, if you exclude DOSes and bugs in non-default features, CVE-2024-6387 is the last SSH vuln that I actually worry about. The last one of substance before that was the 2023 double-free that's not believed exploitable, then we get all the way back to CVE-2016-0777 and 0778 for another bad one.

Why can we not make a messenger with that kind of security record? One where running an early-2025 release today is perfectly safe?

##

CVE-2024-53114
(5.5 MEDIUM)

EPSS: 0.01%

updated 2024-12-11T21:31:57

1 posts

In the Linux kernel, the following vulnerability has been resolved: x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client A number of Zen4 client SoCs advertise the ability to use virtualized VMLOAD/VMSAVE, but using these instructions is reported to be a cause of a random host reboot. These instructions aren't intended to be advertised on Zen4 client so clear the capability.

linux@activitypub.awakari.com at 2026-02-13T10:50:27.000Z ## Ubuntu 20.04 LTS linux-aws Critical Kernel Flaw USN-8033-4 CVE-2024-53114 Several security issues were fixed in the Linux kernel.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2017-12542
(10.0 CRITICAL)

EPSS: 94.25%

updated 2023-02-02T05:07:08

2 posts

A authentication bypass and execution of code vulnerability in HPE Integrated Lights-out 4 (iLO 4) version prior to 2.53 was found.

Nuclei template

3 repos

https://github.com/sk1dish/ilo4-rce-vuln-scanner

https://github.com/skelsec/CVE-2017-12542

https://github.com/VijayShankar22/CVE-2017-12542

CVE-2026-26268
(0 None)

EPSS: 0.00%

4 posts

N/A

thehackerwire@mastodon.social at 2026-02-13T22:18:17.000Z ##

🟠 CVE-2026-26268 - High (8)

Cursor is a code editor built for programming with AI. Sandbox escape via writing .git configuration was possible in versions prior to 2.5. A malicious agent (ie prompt injection) could write to improperly protected .git settings, including git ho...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T22:17:26.000Z ##

🟠 CVE-2026-26268 - High (8)

Cursor is a code editor built for programming with AI. Sandbox escape via writing .git configuration was possible in versions prior to 2.5. A malicious agent (ie prompt injection) could write to improperly protected .git settings, including git ho...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T22:18:17.000Z ##

🟠 CVE-2026-26268 - High (8)

Cursor is a code editor built for programming with AI. Sandbox escape via writing .git configuration was possible in versions prior to 2.5. A malicious agent (ie prompt injection) could write to improperly protected .git settings, including git ho...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T22:17:26.000Z ##

🟠 CVE-2026-26268 - High (8)

Cursor is a code editor built for programming with AI. Sandbox escape via writing .git configuration was possible in versions prior to 2.5. A malicious agent (ie prompt injection) could write to improperly protected .git settings, including git ho...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25991
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-02-13T21:56:37.000Z ##

🟠 CVE-2026-25991 - High (7.7)

Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Prior to 2.5.1, there is a Blind Server-Side Request Forgery (SSRF) vulnerability in the Cookmate recipe import feature of Tandoor Recipes. The ap...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T21:56:37.000Z ##

🟠 CVE-2026-25991 - High (7.7)

Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Prior to 2.5.1, there is a Blind Server-Side Request Forgery (SSRF) vulnerability in the Cookmate recipe import feature of Tandoor Recipes. The ap...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21878
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-02-13T21:56:28.000Z ##

🟠 CVE-2026-21878 - High (7.5)

BACnet Stack is a BACnet open source protocol stack C library for embedded systems. Prior to 1.5.0.rc3, a vulnerability has been discovered in BACnet Stack's file writing functionality where there is no validation of user-provided file paths, allo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T21:56:28.000Z ##

🟠 CVE-2026-21878 - High (7.5)

BACnet Stack is a BACnet open source protocol stack C library for embedded systems. Prior to 1.5.0.rc3, a vulnerability has been discovered in BACnet Stack's file writing functionality where there is no validation of user-provided file paths, allo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26208
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-02-13T21:56:18.000Z ##

🟠 CVE-2026-26208 - High (7.8)

ADB Explorer is a fluent UI for ADB on Windows. Prior to Beta 0.9.26020, ADB Explorer is vulnerable to Insecure Deserialization leading to Remote Code Execution. The application attempts to deserialize the App.txt settings file using Newtonsoft.Js...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-13T21:56:18.000Z ##

🟠 CVE-2026-26208 - High (7.8)

ADB Explorer is a fluent UI for ADB on Windows. Prior to Beta 0.9.26020, ADB Explorer is vulnerable to Insecure Deserialization leading to Remote Code Execution. The application attempts to deserialize the App.txt settings file using Newtonsoft.Js...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25227
(0 None)

EPSS: 0.03%

7 posts

N/A

mastokukei@social.josko.org at 2026-02-13T18:02:37.000Z ##

1.3/mbedTLS updates.
- JupyterLite officially joins Project Jupyter.
- Authentik CVEs: CVE-2026-25227, CVE-2026-25922, CVE-2026-25748; patched in 2025.10.4/2025.12.4. [2/2]

##

0x3e4@cyberplace.social at 2026-02-13T13:19:42.000Z ##

🔐 CVE-2026-25227
CVE-2026-25227

📊 CVSS Score: 9.1
⚠️ Severity: Critical
📅 Published: 02/12/2026, 08:16 PM
🏷️ Aliases: CVE-2026-25227
🛡️ CWE: CWE-94
🔗 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H (security-advisories@github.com)
📚 References: github.com/goauthentik/authent github.com/goauthentik/authent

🔗 hecate.pw/vulnerability/CVE-20

#cve #vulnerability #hecate

##

offseq at 2026-02-13T06:00:30.322Z ##

⚠️ CVE-2026-25227 (CRITICAL, CVSS 9.1): Code injection in goauthentik authentik via delegated permissions. Patch to 2025.8.6, 2025.10.4, or 2025.12.4 urgently. Audit permissions & monitor test endpoint usage. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-12T21:02:24.000Z ##

🔴 CVE-2026-25227 - Critical (9.1)

authentik is an open-source identity provider. From 2021.3.1 to before 2025.8.6, 2025.10.4, and 2025.12.4, when using delegated permissions, a User that has the permission Can view * Property Mapping or Can view Expression Policy is able to execut...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

0x3e4@cyberplace.social at 2026-02-13T13:19:42.000Z ##

🔐 CVE-2026-25227
CVE-2026-25227

📊 CVSS Score: 9.1
⚠️ Severity: Critical
📅 Published: 02/12/2026, 08:16 PM
🏷️ Aliases: CVE-2026-25227
🛡️ CWE: CWE-94
🔗 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H (security-advisories@github.com)
📚 References: github.com/goauthentik/authent github.com/goauthentik/authent

🔗 hecate.pw/vulnerability/CVE-20

#cve #vulnerability #hecate

##

offseq@infosec.exchange at 2026-02-13T06:00:30.000Z ##

⚠️ CVE-2026-25227 (CRITICAL, CVSS 9.1): Code injection in goauthentik authentik via delegated permissions. Patch to 2025.8.6, 2025.10.4, or 2025.12.4 urgently. Audit permissions & monitor test endpoint usage. radar.offseq.com/threat/cve-20 #OffSeq #authentik #infosec #CVE

##

thehackerwire@mastodon.social at 2026-02-12T21:02:24.000Z ##

🔴 CVE-2026-25227 - Critical (9.1)

authentik is an open-source identity provider. From 2021.3.1 to before 2025.8.6, 2025.10.4, and 2025.12.4, when using delegated permissions, a User that has the permission Can view * Property Mapping or Can view Expression Policy is able to execut...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25922
(0 None)

EPSS: 0.01%

5 posts

N/A

mastokukei@social.josko.org at 2026-02-13T18:02:37.000Z ##

1.3/mbedTLS updates.
- JupyterLite officially joins Project Jupyter.
- Authentik CVEs: CVE-2026-25227, CVE-2026-25922, CVE-2026-25748; patched in 2025.10.4/2025.12.4. [2/2]

##

0x3e4@cyberplace.social at 2026-02-13T13:19:41.000Z ##

🔐 CVE-2026-25922
CVE-2026-25922

📊 CVSS Score: 8.8
⚠️ Severity: High
📅 Published: 02/12/2026, 08:16 PM
🏷️ Aliases: CVE-2026-25922
🛡️ CWE: CWE-287, CWE-347
🔗 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (security-advisories@github.com)
📚 References: github.com/goauthentik/authent github.com/goauthentik/authent

🔗 hecate.pw/vulnerability/CVE-20

#cve #vulnerability #hecate

##

thehackerwire@mastodon.social at 2026-02-12T21:08:36.000Z ##

🟠 CVE-2026-25922 - High (8.8)

authentik is an open-source identity provider. Prior to 2025.8.6, 2025.10.4, and 2025.12.4, when using a SAML Source that has the option Verify Assertion Signature under Verification Certificate enabled and not Verify Response Signature, or does n...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

0x3e4@cyberplace.social at 2026-02-13T13:19:41.000Z ##

🔐 CVE-2026-25922
CVE-2026-25922

📊 CVSS Score: 8.8
⚠️ Severity: High
📅 Published: 02/12/2026, 08:16 PM
🏷️ Aliases: CVE-2026-25922
🛡️ CWE: CWE-287, CWE-347
🔗 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (security-advisories@github.com)
📚 References: github.com/goauthentik/authent github.com/goauthentik/authent

🔗 hecate.pw/vulnerability/CVE-20

#cve #vulnerability #hecate

##

thehackerwire@mastodon.social at 2026-02-12T21:08:36.000Z ##

🟠 CVE-2026-25922 - High (8.8)

authentik is an open-source identity provider. Prior to 2025.8.6, 2025.10.4, and 2025.12.4, when using a SAML Source that has the option Verify Assertion Signature under Verification Certificate enabled and not Verify Response Signature, or does n...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25748
(0 None)

EPSS: 0.03%

5 posts

N/A

mastokukei@social.josko.org at 2026-02-13T18:02:37.000Z ##

1.3/mbedTLS updates.
- JupyterLite officially joins Project Jupyter.
- Authentik CVEs: CVE-2026-25227, CVE-2026-25922, CVE-2026-25748; patched in 2025.10.4/2025.12.4. [2/2]

##

0x3e4@cyberplace.social at 2026-02-13T13:19:40.000Z ##

🔐 CVE-2026-25748
CVE-2026-25748

📊 CVSS Score: 8.6
⚠️ Severity: High
📅 Published: 02/12/2026, 08:16 PM
🏷️ Aliases: CVE-2026-25748
🛡️ CWE: CWE-287
🔗 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N (security-advisories@github.com)
📚 References: github.com/goauthentik/authent github.com/goauthentik/authent

🔗 hecate.pw/vulnerability/CVE-20

#cve #vulnerability #hecate

##

thehackerwire@mastodon.social at 2026-02-12T21:02:34.000Z ##

🟠 CVE-2026-25748 - High (8.6)

authentik is an open-source identity provider. Prior to 2025.10.4 and 2025.12.4, with a malformed cookie it was possible to bypass authentication when using forward authentication in the authentik Proxy Provider when used in conjunction with Traef...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

0x3e4@cyberplace.social at 2026-02-13T13:19:40.000Z ##

🔐 CVE-2026-25748
CVE-2026-25748

📊 CVSS Score: 8.6
⚠️ Severity: High
📅 Published: 02/12/2026, 08:16 PM
🏷️ Aliases: CVE-2026-25748
🛡️ CWE: CWE-287
🔗 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N (security-advisories@github.com)
📚 References: github.com/goauthentik/authent github.com/goauthentik/authent

🔗 hecate.pw/vulnerability/CVE-20

#cve #vulnerability #hecate

##

thehackerwire@mastodon.social at 2026-02-12T21:02:34.000Z ##

🟠 CVE-2026-25748 - High (8.6)

authentik is an open-source identity provider. Prior to 2025.10.4 and 2025.12.4, with a malformed cookie it was possible to bypass authentication when using forward authentication in the authentik Proxy Provider when used in conjunction with Traef...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26012
(0 None)

EPSS: 0.02%

2 posts

N/A

CVE-2026-24044
(0 None)

EPSS: 0.04%

2 posts

N/A

offseq at 2026-02-13T09:00:35.240Z ##

🚨 CRITICAL: CVE-2026-24044 in element-hq ess-helm (<25.12.1) uses an insecure PRNG for Matrix server keys. Attackers can recreate keys, impersonate servers & disrupt comms. Upgrade to 25.12.1+ & rotate keys! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-13T09:00:35.000Z ##

🚨 CRITICAL: CVE-2026-24044 in element-hq ess-helm (<25.12.1) uses an insecure PRNG for Matrix server keys. Attackers can recreate keys, impersonate servers & disrupt comms. Upgrade to 25.12.1+ & rotate keys! radar.offseq.com/threat/cve-20 #OffSeq #Matrix #CVE202624044 #Helm

##

CVE-2026-26068
(0 None)

EPSS: 0.57%

2 posts

N/A

offseq at 2026-02-13T07:30:30.214Z ##

⚠️ CRITICAL: CVE-2026-26068 impacts jm33-m0 emp3r0r (<3.21.1), allowing unauthenticated RCE via command injection on operator hosts. Upgrade to 3.21.1+ now and restrict access. Details: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-13T07:30:30.000Z ##

⚠️ CRITICAL: CVE-2026-26068 impacts jm33-m0 emp3r0r (<3.21.1), allowing unauthenticated RCE via command injection on operator hosts. Upgrade to 3.21.1+ now and restrict access. Details: radar.offseq.com/threat/cve-20 #OffSeq #Linux #Vuln #C2

##

CVE-2026-26011
(0 None)

EPSS: 0.06%

2 posts

N/A

offseq at 2026-02-13T04:30:30.676Z ##

🚨 CRITICAL: CVE-2026-26011 in ROS 2 navigation2 (≤1.3.11) allows unauth attackers in the same DDS domain to trigger heap out-of-bounds writes via /initialpose, causing DoS or further exploit. Isolate & patch! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-13T04:30:30.000Z ##

🚨 CRITICAL: CVE-2026-26011 in ROS 2 navigation2 (≤1.3.11) allows unauth attackers in the same DDS domain to trigger heap out-of-bounds writes via /initialpose, causing DoS or further exploit. Isolate & patch! radar.offseq.com/threat/cve-20 #OffSeq #ROS2 #infosec #robotics

##

CVE-2026-26020
(0 None)

EPSS: 0.08%

2 posts

N/A

offseq at 2026-02-13T03:00:30.055Z ##

🚨 CRITICAL: CVE-2026-26020 in AutoGPT (<0.6.48) allows authenticated RCE via improper authorization of BlockInstallationBlock. Patch to 0.6.48+ ASAP! Monitor for suspicious graph configs. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-13T03:00:30.000Z ##

🚨 CRITICAL: CVE-2026-26020 in AutoGPT (<0.6.48) allows authenticated RCE via improper authorization of BlockInstallationBlock. Patch to 0.6.48+ ASAP! Monitor for suspicious graph configs. radar.offseq.com/threat/cve-20 #OffSeq #AutoGPT #Infosec #Vulnerability

##

CVE-2026-26069
(0 None)

EPSS: 0.04%

2 posts

N/A

offseq at 2026-02-13T00:00:42.451Z ##

🚨 CVE-2026-26069 (CRITICAL, CVSS 9.1): Scraparr v3.0.0-beta to <3.0.2 leaks Readarr API keys via /metrics if no alias is set. Upgrade to 3.0.2+, restrict /metrics access, and check for exposed endpoints. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-13T00:00:42.000Z ##

🚨 CVE-2026-26069 (CRITICAL, CVSS 9.1): Scraparr v3.0.0-beta to <3.0.2 leaks Readarr API keys via /metrics if no alias is set. Upgrade to 3.0.2+, restrict /metrics access, and check for exposed endpoints. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #Scraparr #APISecurity

##

CVE-2026-26080
(0 None)

EPSS: 0.00%

2 posts

N/A

ScriptFanix@maly.io at 2026-02-12T15:04:27.000Z ##

2 vulnerabilities in HAProxy have been fixed:
CVE-2026-26080 and CVE-2026-26081. DoS affecting QUIC

haproxy.com/blog/cves-2026-qui

##

ScriptFanix@maly.io at 2026-02-12T15:04:27.000Z ##

2 vulnerabilities in HAProxy have been fixed:
CVE-2026-26080 and CVE-2026-26081. DoS affecting QUIC

haproxy.com/blog/cves-2026-qui

##

CVE-2026-26081
(0 None)

EPSS: 0.00%

2 posts

N/A

ScriptFanix@maly.io at 2026-02-12T15:04:27.000Z ##

2 vulnerabilities in HAProxy have been fixed:
CVE-2026-26080 and CVE-2026-26081. DoS affecting QUIC

haproxy.com/blog/cves-2026-qui

##

ScriptFanix@maly.io at 2026-02-12T15:04:27.000Z ##

2 vulnerabilities in HAProxy have been fixed:
CVE-2026-26080 and CVE-2026-26081. DoS affecting QUIC

haproxy.com/blog/cves-2026-qui

##

CVE-2026-26029
(0 None)

EPSS: 0.07%

1 posts

N/A

thehackerwire@mastodon.social at 2026-02-11T22:18:53.000Z ##

🟠 CVE-2026-26029 - High (7.5)

sf-mcp-server is an implementation of Salesforce MCP server for Claude for Desktop. A command injection vulnerability exists in sf-mcp-server due to unsafe use of child_process.exec when constructing Salesforce CLI commands with user-controlled in...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

Visit counter For Websites