24h | 7d | 30d

Overview

  • BeyondTrust
  • Remote Support(RS) & Privileged Remote Access(PRA)

06 Feb 2026
Published
09 Feb 2026
Updated

CVSS v4.0
CRITICAL (9.9)
EPSS
0.44%

KEV

Description

BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user.

Statistics

  • 7 Posts
  • 1 Interaction

Last activity: 2 hours ago

Bluesky

Profile picture fallback
CVE-2026-1731: Critical BeyondTrust Flaw (CVSS 9.9) Allows Pre-Auth RCE
  • 1
  • 0
  • 0
  • 20h ago
Profile picture fallback
Critical pre-authentication remote code execution vulnerability CVE-2026-1731 (CVSS 9.9) affects BeyondTrust RS ≤25.3.1 and PRA ≤24.3.4; patches released.
  • 0
  • 0
  • 0
  • 12h ago
Profile picture fallback
BeyondTrust has patched a critical remote code execution flaw (CVE-2026-1731) in its Remote Support and Privileged Remote Access software. The […]
  • 0
  • 0
  • 0
  • 11h ago
Profile picture fallback
BeyondTrust fixes easy-to-exploit pre-auth RCE vulnerability in remote access tools (CVE-2026-1731) 📖 Read more: www.helpnetsecurity.com/2026/02/09/b... #cybersecurity #cybersecuritynews #remoteaccess @rootxharsh.bsky.social
  • 0
  • 0
  • 0
  • 8h ago
Profile picture fallback
BeyondTrust Fixes Critical Pre-Auth RCE Read More: buff.ly/E5V9UhG #BeyondTrust #CVE20261731 #PreAuthRCE #RemoteCodeExecution #PrivilegedAccess #PatchNow #EnterpriseSecurity #VulnerabilityAlert
  • 0
  • 0
  • 0
  • 2h ago
Profile picture fallback
BeyondTrust disclosed a critical pre-auth RCE flaw (CVE-2026-1731) in its Remote Support and Privileged Remote Access products that lets unauthenticated attackers execute OS commands remotely. via @bleepingcomputer.com www.bleepingcomputer.com/news/securit... #hacking #infosec #cybersecurity
  • 0
  • 0
  • 0
  • 2h ago
Profile picture fallback
🚨 On 2/6/26, #BeyondTrust disclosed a critical RCE vulnerability affecting its Remote Support (RS) and Privileged Remote Access (PRA) products. The flaw has been assigned CVE-2026-1731 and a near-maximum CVSSv4 score of 9.9. More in the Rapid7 blog: r-7.co/4arAjln
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • GitLab
  • GitLab AI Gateway

09 Feb 2026
Published
09 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.9)
EPSS
0.03%

KEV

Description

GitLab has remediated a vulnerability in the Duo Workflow Service component of GitLab AI Gateway affecting all versions of the AI Gateway from 18.1.6, 18.2.6, 18.3.1 to 18.6.1, 18.7.0, and 18.8.0 in which AI Gateway was vulnerable to insecure template expansion of user supplied data via crafted Duo Agent Platform Flow definitions. This vulnerability could be used to cause Denial of Service or gain code execution on the Gateway. This has been fixed in versions 18.6.2, 18.7.1, and 18.8.1 of the GitLab AI Gateway.

Statistics

  • 4 Posts
  • 3 Interactions

Last activity: 11 hours ago

Fediverse

Profile picture fallback

🚨 CRITICAL: CVE-2026-1868 in GitLab AI Gateway (18.1.6 – 18.8.0) allows remote code execution or DoS via Duo Workflow Service. Patch to 18.6.2, 18.7.1, or 18.8.1. Restrict workflow access & monitor for abuse! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 13h ago

Bluesky

Profile picture fallback
🚨 Critical GitLab vulnerability disclosed: CVE-2026-1868 (CVSS 9.9). Insecure template expansion in GitLab AI Gateway can lead to denial of service or remote code execution in AI-powered DevOps pipelines. 🔥 basefortify.eu/cve_reports/... #CVE #GitLab #CyberSecurity #DevSecOps
  • 1
  • 1
  • 0
  • 11h ago
Profile picture fallback
⚙️ CVE-2026-1868 affects GitLab AI Gateway versions up to 18.8.0. Authenticated attackers can abuse crafted Duo Agent Flow definitions (CWE-1336) to execute code or crash the gateway, posing serious enterprise risk. 🛠️ #Vulnerability #AppSec #CloudSecurity #AI
  • 0
  • 1
  • 0
  • 11h ago
Profile picture fallback
CVE-2026-1868: Critical GitLab Gateway Flaw (CVSS 9.9) Allows RCE
  • 0
  • 0
  • 0
  • 22h ago

Overview

  • Ivanti
  • Endpoint Manager Mobile

29 Jan 2026
Published
30 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
16.41%

Description

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

Statistics

  • 3 Posts
  • 3 Interactions

Last activity: 8 hours ago

Fediverse

Profile picture fallback

Orgs that still daftly run Ivanti kit and didn't patch for CVE-2026-1281 (which is likely most b/c if you're still running Ivanti you have no idea how to do cyber or IT) are gonna have a really bad day today or later this week once they realize what happened to them over the weekend.

  • 1
  • 2
  • 0
  • 13h ago

Bluesky

Profile picture fallback
🚨 This week’s CrowdSec Threat Alert: CVE-2026-1281, a pre-auth RCE in Ivanti EPMM, is actively exploited in the wild, putting Enterprise Mobile Management at risk worldwide. Discover all the details in our latest article 👉 www.crowdsec.net/vulntracking...
  • 0
  • 0
  • 1
  • 8h ago

Overview

  • Tenda
  • RX3

08 Feb 2026
Published
08 Feb 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.05%

KEV

Description

A flaw has been found in Tenda RX3 16.03.13.11. This issue affects the function set_device_name of the file /goform/setBlackRule of the component MAC Filtering Configuration Endpoint. This manipulation of the argument devName/mac causes stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been published and may be used.

Statistics

  • 4 Posts

Last activity: 20 hours ago

Fediverse

Profile picture fallback

🚨 HIGH severity: Stack-based buffer overflow in Tenda RX3 (16.03.13.11) — CVE-2026-2185. Remote exploitation possible via MAC Filtering config. Public exploit released. Monitor and segment affected devices! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 23h ago
Profile picture fallback

#Cve-2026-2185: Kritische Schwachstelle in Tenda-Routern
Ein veröffentlichter Proof-of-Concept-#Exploit für einen Remote-Buffer-Overflow erhöht das Risiko für ungepatchte Netzwerke erheblich.

🔗 p4u.xyz/ID_M-276VQJ/1 (🇩🇪🇺🇸🇫🇷)

#Infosec #Vulnerability #Release #Offseq #Loi #Bot

  • 0
  • 0
  • 0
  • 20h ago
Profile picture fallback

#Cve-2026-2185: A High-Severity Threat to Network Infrastructure
A publicly released #Exploit for a critical buffer overflow in Tenda routers demands immediate action from network defenders.

🔗 p4u.xyz/ID_M-276VQJ/1 (🇩🇪🇺🇸🇫🇷)

#Infosec #Vulnerability #Release #Offseq #Loi #Bot

  • 0
  • 0
  • 0
  • 20h ago
Profile picture fallback

#Cve-2026-2185 : Vulnérabilité Critique dans les Routeurs Tenda RX3
Une faille de dépassement de tampon accessible à distance compromet l'intégrité des réseaux, avec un #Exploit public disponible.

🔗 p4u.xyz/ID_M-276VQJ/1 (🇩🇪🇺🇸🇫🇷)

#Infosec #Vulnerability #Release #Offseq #Loi #Bot

  • 0
  • 0
  • 0
  • 20h ago

Overview

  • Infor
  • SyteLine ERP

06 Feb 2026
Published
06 Feb 2026
Updated

CVSS v3.1
HIGH (7.1)
EPSS
0.01%

KEV

Description

Infor SyteLine ERP uses hard-coded static cryptographic keys to encrypt stored credentials, including user passwords, database connection strings, and API keys. The encryption keys are identical across all installations. An attacker with access to the application binary and database can decrypt all stored credentials.

Statistics

  • 5 Posts

Last activity: 1 hour ago

Bluesky

Profile picture fallback
CVE-2026-2103 - Infor Syteline ERP - Keys Included: No Assembly Required
  • 0
  • 0
  • 3
  • 6h ago

Overview

  • SmarterTools
  • SmarterMail

23 Jan 2026
Published
06 Feb 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
9.22%

Description

SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated remote code execution vulnerability in the ConnectToHub API method. The attacker could point the SmarterMail to the malicious HTTP server, which serves the malicious OS command. This command will be executed by the vulnerable application.

Statistics

  • 3 Posts

Last activity: 1 hour ago

Fediverse

Profile picture fallback

IT management software company SmarterTools was hit by a ransomware attack through an unpatched vulnerability in its own SmarterMail product, specifically CVE-2026-24423. The attack, attributed to the Warlock ransomware group, impacted the company's office network and a data center, but not its public-facing website or customer portal. SmarterTools has since patched the vulnerability and advises customers to update their SmarterMail instances immediately.
securityweek.com/smartertools-

  • 0
  • 0
  • 0
  • 8h ago
Profile picture fallback

Global news highlights include the kickoff of the 2026 Winter Olympics in Italy (Feb 7). In technology, OpenAI launched its Frontier enterprise AI agent platform. Apple acquired AI startup Q.AI for $2B, while Google reported significant AI-driven profit gains. Intel and AMD warned of server CPU shortages impacting China due to AI demand. The EU is also scrutinizing TikTok's "addictive design".

Cybersecurity saw CISA warn of a critical SmarterMail vulnerability (CVE-2026-24423) actively exploited in ransomware campaigns (Feb 7). Italian authorities thwarted Russian cyberattacks targeting government and Olympic-related websites. A rise in AI-driven phishing attacks was also reported.

#News #Anonymous #AnonNews_irc

  • 0
  • 0
  • 0
  • 7h ago
Profile picture fallback

Here's a summary of the latest technology and cybersecurity news from the last 24-48 hours:

Major tech firms globally plan to invest over $650 billion in AI infrastructure this year. OpenAI has launched "Frontier," a new enterprise platform for AI agents.

In cybersecurity, CISA mandated US federal agencies replace unsupported edge devices within 18 months due to state-sponsored exploitation. Russia's APT28 targeted European entities with a new Microsoft Office exploit. A critical SmarterMail flaw (CVE-2026-24423) is actively exploited in ransomware attacks. (Feb 6-7, 2026).

#News #Anonymous #AnonNews_irc

  • 0
  • 0
  • 0
  • 1h ago

Overview

  • SolarWinds
  • Web Help Desk

23 Sep 2025
Published
24 Sep 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
12.86%

KEV

Description

SolarWinds Web Help Desk was found to be susceptible to an unauthenticated AjaxProxy deserialization remote code execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. This vulnerability is a patch bypass of CVE-2024-28988, which in turn is a patch bypass of CVE-2024-28986.

Statistics

  • 2 Posts
  • 13 Interactions

Last activity: 2 hours ago

Bluesky

Profile picture fallback
While we have not yet confirmed whether the attacks are related to the most recently disclosed vulnerabilities such as CVE-2025-40551 and CVE-2025-40536, or stem from previously disclosed vulnerabilities like CVE-2025-26399, attackers will likely continue targeting vulnerable systems.
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • WAGO
  • 0852-1322

09 Feb 2026
Published
09 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.12%

KEV

Description

Improper length handling when parsing multiple cookie fields (including TRACKID) allows an unauthenticated remote attacker to send oversized cookie values and trigger a stack buffer overflow, resulting in a denial‑of‑service condition and possible remote code execution.

Statistics

  • 2 Posts

Last activity: 10 hours ago

Fediverse

Profile picture fallback

🚨 CVE-2026-22904 (CRITICAL, CVSS 9.8): WAGO 0852-1322 vulnerable to stack-based buffer overflow via oversized HTTP cookies. RCE & DoS possible. Isolate devices, monitor traffic, deploy WAF/IPS. No patch yet. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 10h ago
Profile picture fallback

VDE-2026-004
WAGO: Vulnerabilities in Managed Switch

Several vulnerabilities have been identified in the WAGO 852‑1328 device's web‑based management interface, which is implemented using a modified lighttpd server and custom CGI binaries. These issues include multiple stack buffer overflows, an authentication bypass, and insecure credential storage.
CVE-2026-22906, CVE-2026-22904, CVE-2026-22903, CVE-2026-22905

certvde.com/en/advisories/vde-

wago.csaf-tp.certvde.com/.well

  • 0
  • 0
  • 0
  • 12h ago

Overview

  • WAGO
  • 0852-1322

09 Feb 2026
Published
09 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.06%

KEV

Description

User credentials are stored using AES‑ECB encryption with a hardcoded key. An unauthenticated remote attacker obtaining the configuration file can decrypt and recover plaintext usernames and passwords, especially when combined with the authentication bypass.

Statistics

  • 2 Posts

Last activity: 11 hours ago

Fediverse

Profile picture fallback

🚨 CVE-2026-22906 (CRITICAL, CVSS 9.8): WAGO 0852-1322 uses a hardcoded AES key, letting unauthenticated attackers decrypt credentials from config files. No patch yet. Restrict access, segment networks, monitor closely! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 11h ago
Profile picture fallback

VDE-2026-004
WAGO: Vulnerabilities in Managed Switch

Several vulnerabilities have been identified in the WAGO 852‑1328 device's web‑based management interface, which is implemented using a modified lighttpd server and custom CGI binaries. These issues include multiple stack buffer overflows, an authentication bypass, and insecure credential storage.
CVE-2026-22906, CVE-2026-22904, CVE-2026-22903, CVE-2026-22905

certvde.com/en/advisories/vde-

wago.csaf-tp.certvde.com/.well

  • 0
  • 0
  • 0
  • 12h ago

Overview

  • Meta
  • react-server-dom-webpack

03 Dec 2025
Published
11 Dec 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
60.90%

Description

A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 1 hour ago

Fediverse

Profile picture fallback

"Cybersecurity researchers have called attention to a "massive campaign" that has systematically targeted cloud native environments to set up malicious infrastructure for follow-on exploitation.

The activity, observed around December 25, 2025, and described as "worm-driven," leveraged exposed Docker APIs, Kubernetes clusters, Ray dashboards, and Redis servers, along with the recently disclosed React2Shell (CVE-2025-55182, CVSS score: 10.0) vulnerability. The campaign has been attributed to a threat cluster known as TeamPCP (aka DeadCatx3, PCPcat, PersyPCP, and ShellForce).

TeamPCP is known to be active since at least November 2025, with the first instance of Telegram activity dating back to July 30, 2025. The TeamPCP Telegram channel currently has over 700 members, where the group publishes stolen data from diverse victims across Canada, Serbia, South Korea, the U.A.E., and the U.S. Details of the threat actor were first documented by Beelzebub in December 2025 under the name Operation PCPcat.

"The operation's goals were to build a distributed proxy and scanning infrastructure at scale, then compromise servers to exfiltrate data, deploy ransomware, conduct extortion, and mine cryptocurrency," Flare security researcher Assaf Morag said in a report published last week."

thehackernews.com/2026/02/team

#CyberSecurity #TeamPCP #Ransomware #CloudComputong #Cryptocurrencies

  • 0
  • 1
  • 0
  • 1h ago
Showing 1 to 10 of 37 CVEs