24h | 7d | 30d

Overview

  • Microsoft
  • Windows Admin Center

17 Feb 2026
Published
19 Feb 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.07%

KEV

Description

Improper authentication in Windows Admin Center allows an authorized attacker to elevate privileges over a network.

Statistics

  • 6 Posts
  • 1 Interaction

Last activity: Last hour

Bluesky

Profile picture fallback
Microsoft Patches CVE-2026-26119 Privilege Escalation In Windows Admin Center - https://mwyr.es/XiaTZ3k #thn #infosec
  • 0
  • 0
  • 0
  • 20h ago
Profile picture fallback
マイクロソフト、Windows Admin Center における権限昇格脆弱性 CVE-2026-26119 を修正 Microsoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin Center #HackerNews (Feb 19) thehackernews.com/2026/02/micr...
  • 0
  • 0
  • 0
  • 18h ago
Profile picture fallback
Microsoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin Center https://thehackernews.com/2026/02/microsoft-patches-cve-2026-26119.html
  • 0
  • 0
  • 0
  • 13h ago
Profile picture fallback
🛑 Windows Admin Center - CVE-2026-26119 : cette faille dans Windows Admin Center peut mener à la compromission du domaine Mon article à ce sujet 👇 - www.it-connect.fr/cve-2026-261... #infosec #cybersecurite #WindowsAdminCenter #Microsoft
  • 0
  • 0
  • 0
  • 8h ago
Profile picture fallback
Microsoft revela una vulnerabilidad crítica en el Centro de administración de Windows (CVE-2026-26119). Atención! Una vulnerabilidad crítica en Windows Admin Center permite a atacantes tomar el control total del servidor. Actualiza ya. #ciberseguridad #cybersecurity www.linkedin.com/pulse/micros...
  • 0
  • 0
  • 0
  • Last hour

Overview

  • Microsoft
  • Windows 10 Version 1507

13 May 2025
Published
13 Feb 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.35%

KEV

Description

Time-of-check time-of-use (toctou) race condition in Windows Fundamentals allows an authorized attacker to execute code over a network.

Statistics

  • 6 Posts
  • 1 Interaction

Last activity: 1 hour ago

Fediverse

Profile picture fallback
[RSS] Discovery & Analysis of CVE-2025-29969

https://www.safebreach.com/blog/safebreach_labs_discovers_cve-2025-29969/

(Windows MS-EVEN RPC Remote Code Execution Vulnerability)
  • 0
  • 0
  • 0
  • 1h ago

Bluesky

Profile picture fallback
[RSS] Discovery & Analysis of CVE-2025-29969 www.safebreach.com -> (Windows MS-EVEN RPC Remote Code Execution Vulnerability) Original->
  • 1
  • 0
  • 0
  • 1h ago
Profile picture fallback
EventLog-in: Propagating With Weak Credentials Using the Eventlog Service in Microsoft Windows (CVE-2025-29969) www.safebreach.com/blog/safebre... github.com/SafeBreach-L...
  • 0
  • 0
  • 0
  • 21h ago
Profile picture fallback
The latest update for #SafeBreach includes "SafeBreach's Evolution into an #AI-First Development Team: Part I" and "EventLog-in: Propagating With Weak Credentials Using the Eventlog Service in Microsoft #Windows (CVE-2025-29969)". #Cybersecurity https://opsmtrs.com/41NWGuQ
  • 0
  • 0
  • 0
  • 14h ago
Profile picture fallback
EventLogin Exploit: How Low-Privilege Users Can Weaponize Windows Event Logging to Own Your Domain + Video Introduction: In a startling revelation for enterprise security, a new proof-of-concept tool named "EventLogin" has emerged, demonstrating the active exploitation of CVE-2025-29969. This…
  • 0
  • 0
  • 0
  • 14h ago
Profile picture fallback
Discovery & Analysis of CVE-2025-29969
  • 0
  • 0
  • 0
  • 7h ago

Overview

  • BeyondTrust
  • Remote Support(RS) & Privileged Remote Access(PRA)

06 Feb 2026
Published
14 Feb 2026
Updated

CVSS v4.0
CRITICAL (9.9)
EPSS
49.74%

Description

BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user.

Statistics

  • 6 Posts

Last activity: 2 hours ago

Fediverse

Profile picture fallback

VShell and SparkRAT Observed in Exploitation of BeyondTrust Critical Vulnerability (CVE-2026-1731)

unit42.paloaltonetworks.com/be

  • 0
  • 0
  • 0
  • 12h ago
Profile picture fallback

The CISA has updated its Known Exploited Vulnerabilities (KEV) catalog for a BeyondTrust vulnerability (CVE-2026-1731) indicating its exploitation in ransomware attacks. This critical flaw allows for unauthenticated remote code execution and has been observed in attacks targeting various sectors globally, with threat intelligence firms noting its use in reconnaissance, data theft, and malware deployment.
securityweek.com/beyondtrust-v

  • 0
  • 0
  • 0
  • 7h ago
Profile picture fallback

"CISA: BeyondTrust RCE flaw now exploited in ransomware attacks"

"[...] Cybersecurity and Infrastructure Security Agency (CISA) warns. Hackers are actively exploiting the CVE-2026-1731 vulnerability in the BeyondTrust Remote Support product, the U.S."

bleepingcomputer.com/news/secu

  • 0
  • 0
  • 0
  • 2h ago

Bluesky

Profile picture fallback
The latest update for #CyCognito includes "Permission to Ignore: Leveraging the CTEM Framework to Focus on Real Risk" and "Emerging Threat: CVE-2026-1731 – BeyondTrust Privileged Access Exposure Risk". #cybersecurity #AttackSurfaceManagement #EASM https://opsmtrs.com/44Srq0X
  • 0
  • 0
  • 0
  • 13h ago
Profile picture fallback
Critical BeyondTrust vulnerability CVE-2026-1731 is being exploited in ransomware attacks, prompting a CISA KEV update and observed malicious activity across multiple sectors and countries.
  • 0
  • 0
  • 0
  • 7h ago
Profile picture fallback
Critical CVE-2026-1731 in BeyondTrust Remote Support/Privileged Remote Access permits OS command execution as the site user, enabling web shells, backdoors, and malware deployment.
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • Microsoft
  • Windows Notepad

10 Feb 2026
Published
19 Feb 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.09%

KEV

Description

Improper neutralization of special elements used in a command ('command injection') in Windows Notepad App allows an unauthorized attacker to execute code locally.

Statistics

  • 6 Posts
  • 4 Interactions

Last activity: 6 hours ago

Fediverse

Profile picture fallback

CVE-2026-20841: Arbitrary Code Execution in the Windows Notepad - The TrendAI Research team takes a deep dive into this recently patched file parsing bug to show you root cause, source code walk through, and provide detection guidance. Read the details at zerodayinitiative.com/blog/202

  • 1
  • 2
  • 1
  • 22h ago
Profile picture fallback
  • 0
  • 0
  • 1
  • 21h ago
Profile picture fallback

A proof-of-concept has been released for a Windows Notepad vulnerability (CVE-2026-20841) that allows malicious command execution by tricking users into opening a crafted Markdown file and clicking a link. Microsoft has patched this high-severity flaw in its February 2026 release, affecting Notepad versions 11.2508 and earlier.
cybersecuritynews.com/poc-wind

  • 0
  • 0
  • 0
  • 6h ago

Bluesky

Profile picture fallback
[RSS] CVE-2026-20841: Arbitrary Code Execution in the Windows Notepad www.thezdi.com -> ZDI analysis of the notorious vuln Original->
  • 0
  • 1
  • 0
  • 11h ago

Overview

  • Honeywell
  • I-HIB2PI-UL 2MP IP

17 Feb 2026
Published
18 Feb 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.04%

KEV

Description

The affected products are vulnerable to an unauthenticated API endpoint exposure, which may allow an attacker to remotely change the "forgot password" recovery email address.

Statistics

  • 3 Posts
  • 3 Interactions

Last activity: 4 hours ago

Fediverse

Profile picture fallback

Why TF does the NVD not include the CVE title, vendor, or other useful information. If you look at the following you have no what's impacted and have to hunt details in the links.

nvd.nist.gov/vuln/detail/CVE-2

The backing CVE data contains all of this:

cveawg.mitre.org/api/cve/CVE-2

  • 1
  • 2
  • 0
  • 4h ago
Profile picture fallback

CRITICAL INTEL: Honeywell CVSS 9.8 (CVE-2026-1670) is here. 🚨 Unauthenticated API exploitation means total compromise. I’m breaking down the Sovereign Sentry strategy using Raspberry Pi & Suricata to harden your network. thecybermind.co/2026/02/20/cve

thecybermind.co/2026/02/20/cve

  • 0
  • 0
  • 0
  • 6h ago

Bluesky

Profile picture fallback
CISA、ハネウェルのCCTVにおける重大な認証バイパス脆弱性CVE-2026-1670について警告 CISA alerts to critical auth bypass CVE-2026-1670 in Honeywell CCTVs #SecurityAffairs (Feb 19) securityaffairs.com/188234/secur...
  • 0
  • 0
  • 0
  • 18h ago

Overview

  • Google
  • Chrome

13 Feb 2026
Published
18 Feb 2026
Updated

CVSS
Pending
EPSS
0.53%

Description

Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

Statistics

  • 3 Posts
  • 1 Interaction

Last activity: 6 hours ago

Fediverse

Profile picture fallback

Chrome CSS Zero-Day (CVE-2026-2441)

Google has patched a CVSS 8.8 high-severity use-after-free bug in Chrome’s CSS engine that is being exploited in the wild. This also affects all Chrome-based browsers such as Brave, Edge and Opera.

forum.hashpwn.net/post/10273

  • 1
  • 0
  • 0
  • 16h ago
Profile picture fallback

A proof-of-concept exploit has been released for CVE-2026-2441, a critical use-after-free zero-day vulnerability in Google Chrome's Blink CSS engine that is actively being exploited in the wild. Users are urged to update Chrome immediately to the latest versions to patch this vulnerability.
cybersecuritynews.com/chrome-0

  • 0
  • 0
  • 0
  • 6h ago

Bluesky

Profile picture fallback
CVE-2026-2441: The First Chrome Zero-Day of 2026 is Already Exploited—Patch Now + Video Introduction: The cybersecurity landscape of 2026 has begun with a stark reminder of our browser-based attack surface. A high-severity zero-day vulnerability, designated CVE-2026-2441, has been discovered in…
  • 0
  • 0
  • 0
  • 16h ago

Overview

  • microsoft
  • semantic-kernel

19 Feb 2026
Published
20 Feb 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
0.09%

KEV

Description

Semantic Kernel, Microsoft's semantic kernel Python SDK, has a remote code execution vulnerability in versions prior to 1.39.4, specifically within the `InMemoryVectorStore` filter functionality. The problem has been fixed in version `python-1.39.4`. Users should upgrade this version or higher. As a workaround, avoid using `InMemoryVectorStore` for production scenarios.

Statistics

  • 2 Posts
  • 2 Interactions

Last activity: 18 hours ago

Fediverse

Profile picture fallback

⚠️ CRITICAL RCE: CVE-2026-26030 in Microsoft Semantic Kernel (<1.39.4) lets remote attackers execute code via InMemoryVectorStore filter. Upgrade to 1.39.4+ ASAP or avoid this component in prod. Details: radar.offseq.com/threat/cve-20

  • 1
  • 1
  • 0
  • 23h ago

Overview

  • Dell
  • RecoverPoint for Virtual Machines

17 Feb 2026
Published
19 Feb 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
28.78%

Description

Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a hardcoded credential vulnerability. This is considered critical as an unauthenticated remote attacker with knowledge of the hardcoded credential could potentially exploit this vulnerability leading to unauthorized access to the underlying operating system and root-level persistence. Dell recommends that customers upgrade or apply one of the remediations as soon as possible.

Statistics

  • 3 Posts
  • 1 Interaction

Last activity: 7 hours ago

Bluesky

Profile picture fallback
The CISA Has Provided Two Warnings That You Should Pay Attention To The CISA has given US government agencies three days to patch their systems against a maximum-severity hardcoded credential vulnerability (CVE-2026-22769)in Dell’s RecoverPoint solution exploited by the UNC6201 Chinese hacking…
  • 0
  • 1
  • 1
  • 23h ago
Profile picture fallback
Federal civilian agencies must patch critical Dell RecoverPoint vulnerability CVE-2026-22769 within three days due to active exploitation and espionage-linked malware deployment.
  • 0
  • 0
  • 0
  • 7h ago

Overview

  • TryGhost
  • Ghost

20 Feb 2026
Published
20 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.4)
EPSS
0.08%

KEV

Description

Ghost is a Node.js content management system. Versions 3.24.0 through 6.19.0 allow unauthenticated attackers to perform arbitrary reads from the database. This issue has been fixed in version 6.19.1.

Statistics

  • 2 Posts

Last activity: Last hour

Fediverse

Profile picture fallback

⚠️ CVE-2026-26980: CRITICAL SQL Injection in TryGhost Ghost CMS (3.24.0 – 6.19.0). Unauth attackers can read DB data remotely. Patch to 6.19.1 now! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 14h ago

Bluesky

Profile picture fallback
📌 CVE-2026-26980 - Ghost is a Node.js content management system. Versions 3.24.0 through 6.19.0 allow unauthenticated attackers to perform arbitrary reads from the datab... https://www.cyberhub.blog/cves/CVE-2026-26980
  • 0
  • 0
  • 0
  • Last hour

Overview

  • Grandstream
  • GXP1610

18 Feb 2026
Published
18 Feb 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.09%

KEV

Description

An unauthenticated stack-based buffer overflow vulnerability exists in the HTTP API endpoint /cgi-bin/api.values.get. A remote attacker can leverage this vulnerability to achieve unauthenticated remote code execution (RCE) with root privileges on a target device. The vulnerability affects all six device models in the series: GXP1610, GXP1615, GXP1620, GXP1625, GXP1628, and GXP1630.

Statistics

  • 2 Posts

Last activity: 3 hours ago

Fediverse

Profile picture fallback

Hacking like the 1990s (cvss 9.8) —
A Cold War Style Vulnerability in Modern VoIP
‏ Presented by LowLevelTV –

[Invidious](yewtu.be/watch?v=I4brAvpjbrg)
[YouTube](youtube.com/watch?v=I4brAvpjbrg)

Writeups:

Douglas McKee
[The Phone is Listening: A Cold War–Style Vulnerability in Modern VoIP](rapid7.com/blog/post/ve-phone-)

Stephen Fewer:
[CVE-2026-2329: Critical Unauthenticated Stack Buffer Overflow in Grandstream GXP1600 VoIP Phones](rapid7.com/blog/post/ve-cve-20)

#hacking #voip #security #infosec #osint #cve #bug

  • 0
  • 0
  • 0
  • 3h ago

Bluesky

Profile picture fallback
Grandstream VoIP Flaw Enables Eavesdropping Read More: buff.ly/TSDAjK1 #Grandstream #VoIPSecurity #CVE20262329 #RootAccess #TelecomSecurity #CriticalVulnerability #PatchNow #CyberAlert
  • 0
  • 0
  • 0
  • 3h ago
Showing 1 to 10 of 84 CVEs