24h | 7d | 30d

Overview

  • Microsoft
  • Microsoft Office 2019

26 Jan 2026
Published
30 Jan 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
2.91%

Description

Reliance on untrusted inputs in a security decision in Microsoft Office allows an unauthorized attacker to bypass a security feature locally.

Statistics

  • 8 Posts

Last activity: 5 hours ago

Fediverse

Profile picture fallback

Why CVSS Scores Don’t Always Reflect an Exploit’s Actual Severity

Today we're covering Operation Neusploit, the advanced cyberespionage campaign identified by Zscaler ThreatLabz attributed with confidence to the Russia-linked APT28 (A.K.A. Fancy Bear) threat group, we're sharing this perspective on its 7.8 score. Neusploit weaponizes CVE-2026-21509, a Microsoft Office zero-day security bypass vulnerablity, to target government and executive organizations in Ukraine,…

itnerd.blog/2026/02/04/why-cvs

  • 0
  • 0
  • 0
  • 6h ago

Bluesky

Profile picture fallback
APT28 Leverages CVE-2026-21509 in Operation Neusploit https://packetstorm.news/news/view/40302 #news
  • 0
  • 0
  • 0
  • 23h ago
Profile picture fallback
APT28 Uses Microsoft Office CVE-2026-21509 In Espionage-Focused Malware Attacks - https://mwyr.es/rm5e6zLI #thn #infosec
  • 0
  • 0
  • 0
  • 22h ago
Profile picture fallback
ロシアのハッカーが最近修正されたMicrosoft Officeの脆弱性(CVE-2026-21509)を悪用している Russian hackers are exploiting recently patched Microsoft Office vulnerability (CVE-2026-21509) #HelpNetSecurity (Feb 3) www.helpnetsecurity.com/2026/02/03/r...
  • 0
  • 0
  • 0
  • 21h ago
Profile picture fallback
APT28、スパイ活動に特化したマルウェア攻撃でMicrosoft OfficeのCVE-2026-21509を利用 APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks #HackerNews (Feb 3) thehackernews.com/2026/02/apt2...
  • 0
  • 0
  • 0
  • 12h ago
Profile picture fallback
Robin Dost details how APT28 uses CVE-2026-21509 in practice, relying on crafted RTF files that trigger OLE parsing without macros. The blog post walks through efficient IOC extraction from weaponised documents. blog.synapticsystems.de/apt28-geofen...
  • 0
  • 0
  • 0
  • 10h ago
Profile picture fallback
Russian Hackers Weaponize Microsoft Office Zero-Day: A Deep Dive into CVE-2026-21509 and How to Fortify Your Defenses + Video Introduction: CVE-2026-21509 is a critical, actively exploited zero-day vulnerability in Microsoft Office that allows remote code execution via malicious DOC files.…
  • 0
  • 0
  • 0
  • 10h ago
Profile picture fallback
Patch non ancora installate, exploit già in uso: il caso Office, CVE-2026-21509 e APT28 APT28 ha sfruttato lo zero-day CVE-2026-21509 in... https://www.ilsoftware.it/patch-non-ancora-installate-exploit-gia-in-uso-il-caso-office-cve-2026-21509-e-apt28/
  • 0
  • 0
  • 0
  • 5h ago

Overview

  • Meta
  • react-server-dom-webpack

03 Dec 2025
Published
11 Dec 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
57.94%

Description

A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.

Statistics

  • 4 Posts
  • 11 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture fallback

Two IPs now generate 56% of all CVE-2025-55182 exploitation traffic.

One deploys cryptominers. The other opens reverse shells.

We dug into the infrastructure. What we found goes back to 2020.

greynoise.io/blog/react2shell-

  • 8
  • 3
  • 1
  • 23h ago

Bluesky

Profile picture fallback
A critical React.js vulnerability (CVE-2025-55182) enables unauthenticated RCE and has triggered mass exploitation and cryptominer deployments.
  • 0
  • 0
  • 0
  • 10h ago
Profile picture fallback
From Zero to Hero: How I Uncovered a Critical RCE Vulnerability (CVE-2025-55182) and What It Means for Cybersecurity + Video Introduction: In the ever-evolving landscape of cybersecurity, remote code execution (RCE) vulnerabilities remain among the most severe threats, allowing attackers to take…
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • GNU
  • Inetutils

21 Jan 2026
Published
29 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
29.55%

Description

telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable.

Statistics

  • 3 Posts
  • 5 Interactions

Last activity: 2 hours ago

Fediverse

Profile picture fallback

🚨 Active exploitation confirmed: CVE-2026-24061.

This isn't just theoretical, it's a massive exposure. With nearly 800,000 Telnet instances exposed globally across legacy IoT and outdated servers, the risk of a root-level compromise is real and immediate.

We have updated Pentest-Tools.com to help you validate your exposure:

📡 Network Scanner - detects exposed Telnet services across your internal and external perimeters, identifying potentially vulnerable GNU Inetutils daemons.

🎯 Sniper Auto-Exploiter - safely executes a proof-of-concept to confirm if the authentication bypass is actually exploitable on your systems, providing the evidence needed to prioritize an immediate fix.

⚠️ Crucial detail: This critical vulnerability exists because telnetd fails to sanitize the USER environment variable. An attacker can simply supply -f root to bypass the login prompt entirely and gain instant, unauthenticated root shell access.

Attacks are happening in real-time. Validate your risk before it becomes a root-level compromise.

Check out more details about this critical vulnerability: pentest-tools.com/vulnerabilit

Detect with Network Scanner: pentest-tools.com/network-vuln

Validate with Sniper Auto-Exploiter: pentest-tools.com/exploit-help

  • 2
  • 2
  • 0
  • 5h ago
Profile picture fallback

Whatever your system is you need to patch in the fix for this CVE:

cve.org/CVERecord?id=CVE-2026-

The attack requires no credentials, no prior system access, and no user interaction.

Geez.

  • 0
  • 1
  • 0
  • 2h ago

Bluesky

Profile picture fallback
The Telnet Time Bomb: How a Single Command (CVE-2026-24061) Grants Root Access and How to Defuse It + Video Introduction: A recently disclosed critical vulnerability, CVE-2026-24061, has exposed the profound dangers of legacy protocols in modern networks. This flaw in GNU telnetd, a service that…
  • 0
  • 0
  • 0
  • 9h ago

Overview

  • SolarWinds
  • Web Help Desk

28 Jan 2026
Published
04 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
22.94%

Description

SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

Statistics

  • 5 Posts

Last activity: 8 hours ago

Fediverse

Profile picture fallback

CISA has added CVE-2025-40551, a critical SolarWinds Web Help Desk deserialization vulnerability, to the KEV catalog after confirming active exploitation.

The flaw enables unauthenticated remote code execution and has already been patched, though exploitation details remain undisclosed. Additional KEV inclusions span Sangoma FreePBX and GitLab, reflecting continued abuse of both enterprise and open-source platforms.

This reinforces the importance of KEV-driven prioritization and continuous monitoring beyond initial disclosure.

Source: thehackernews.com/2026/02/cisa

Community insight welcome.
Follow TechNadu for ongoing vulnerability and threat intelligence updates.

  • 0
  • 0
  • 0
  • 8h ago

Bluesky

Profile picture fallback
A critical untrusted-data deserialization vulnerability in SolarWinds Web Help Desk (CVE-2025-40551) enables unauthenticated remote code execution and is actively exploited.
  • 0
  • 0
  • 0
  • 13h ago
Profile picture fallback
米CISA、SolarWinds製品における脆弱性の悪用を警告(CVE-2025-40551) | Codebook|Security News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/43766/
  • 0
  • 0
  • 0
  • 13h ago
Profile picture fallback
Threat actors are actively exploiting an unauthenticated deserialization RCE in SolarWinds Web Help Desk (CVE-2025-40551); immediate patching is required.
  • 0
  • 0
  • 0
  • 10h ago
Profile picture fallback
A critical remote-code-execution vulnerability CVE-2025-40551 in SolarWinds Web Help Desk is actively exploited; federal agencies must install the patch within three days.
  • 0
  • 0
  • 0
  • 10h ago

Overview

  • win.rar GmbH
  • WinRAR

08 Aug 2025
Published
21 Oct 2025
Updated

CVSS v4.0
HIGH (8.4)
EPSS
4.61%

Description

A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET.

Statistics

  • 4 Posts

Last activity: 3 hours ago

Bluesky

Profile picture fallback
China-linked Amaranth-Dragon (APT41-associated) carried out stealthy, narrowly focused cyber espionage against Southeast Asian government and law enforcement, exploiting WinRAR CVE-2025-8088.
  • 0
  • 0
  • 0
  • 5h ago
Profile picture fallback
Amaranth-Dragon: Weaponizing CVE-2025-8088 for Targeted Espionage in the Southeast Asia
  • 0
  • 0
  • 1
  • 4h ago
Profile picture fallback
~Checkpoint~ Amaranth-Dragon (APT-41 nexus) exploits WinRAR CVE-2025-8088 in espionage campaigns targeting government entities in Southeast Asia. - IOCs: 92. 223. 120. 10, 93. 123. 17. 151, dns. annasoft. gcdn. co - #APT41 #CVE20258088 #ThreatIntel
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • @react-native-community/cli-server-api

03 Nov 2025
Published
04 Dec 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.40%

KEV

Description

The Metro Development Server, which is opened by the React Native Community CLI, binds to external interfaces by default. The server exposes an endpoint that is vulnerable to OS command injection. This allows unauthenticated network attackers to send a POST request to the server and run arbitrary executables. On Windows, the attackers can also execute arbitrary shell commands with fully controlled arguments.

Statistics

  • 3 Posts
  • 1 Interaction

Last activity: 7 hours ago

Fediverse

Bluesky

Profile picture fallback
CVE-2025-11953 (Metro4Shell) in React Native Metro Server Enables RCE socradar.io/blog/cve-202...
  • 0
  • 0
  • 0
  • 7h ago

Overview

  • Ivanti
  • Endpoint Manager Mobile

29 Jan 2026
Published
30 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
16.41%

Description

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

Statistics

  • 1 Post
  • 10 Interactions

Last activity: 4 hours ago

Fediverse

Profile picture fallback

Only quickly popping on here from an otherwise very nice Fediverse vacation, because NCSC-NL has just put out an “assume-breach” warning. That’s… kinda big.

ncsc.nl/waarschuwing/ncsc-roep (Dutch)

  • 6
  • 4
  • 0
  • 4h ago

Overview

  • OpenClaw
  • OpenClaw

01 Feb 2026
Published
03 Feb 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.04%

KEV

Description

OpenClaw (aka clawdbot or Moltbot) before 2026.1.29 obtains a gatewayUrl value from a query string and automatically makes a WebSocket connection without prompting, sending a token value.

Statistics

  • 2 Posts

Last activity: 2 hours ago

Bluesky

Profile picture fallback
⚠️ OpenClaw – CVE-2026-25253 : un lien malveillant suffit à exécuter du code à distance en 1-clic Tous les détails par ici 👇 - www.it-connect.fr/openclaw-cve... #OpenClaw #Moltbot #IA #infosec #cybersecurite
  • 0
  • 0
  • 0
  • 2h ago
Profile picture fallback
The latest update for #Foresiet includes "CVE-2026-25253: OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link" and "CVE-2026-24858: Fortinet Multiple Products Authentication Bypass Zero-Day Analysis". #cybersecurity #infosec https://opsmtrs.com/3J3CMGz
  • 0
  • 0
  • 0
  • 18h ago

Overview

  • Fortinet
  • FortiProxy

27 Jan 2026
Published
29 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.4)
EPSS
3.71%

Description

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0.15, FortiManager 7.6.0 through 7.6.5, FortiManager 7.4.0 through 7.4.9, FortiManager 7.2.0 through 7.2.11, FortiManager 7.0.0 through 7.0.15, FortiOS 7.6.0 through 7.6.5, FortiOS 7.4.0 through 7.4.10, FortiOS 7.2.0 through 7.2.12, FortiOS 7.0.0 through 7.0.18, FortiProxy 7.6.0 through 7.6.4, FortiProxy 7.4.0 through 7.4.12, FortiProxy 7.2.0 through 7.2.15, FortiProxy 7.0.0 through 7.0.22, FortiWeb 8.0.0 through 8.0.3, FortiWeb 7.6.0 through 7.6.6, FortiWeb 7.4.0 through 7.4.11 may allow an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices.

Statistics

  • 2 Posts

Last activity: 8 hours ago

Bluesky

Profile picture fallback
The latest update for #Foresiet includes "CVE-2026-25253: OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link" and "CVE-2026-24858: Fortinet Multiple Products Authentication Bypass Zero-Day Analysis". #cybersecurity #infosec https://opsmtrs.com/3J3CMGz
  • 0
  • 0
  • 0
  • 18h ago

Overview

  • Kubernetes
  • ingress-nginx

03 Feb 2026
Published
04 Feb 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.10%

KEV

Description

A security issue was discovered in ingress-nginx cthe `rules.http.paths.path` Ingress field can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 3 hours ago

Fediverse

Profile picture fallback

💡 CVE-2026-24512: la vulnerabilità di ingress-NGINX che minaccia i cluster Kubernetes

gomoot.com/cve-2026-24512-la-v

#news #sicurezza #tech

  • 2
  • 0
  • 0
  • 3h ago
Showing 1 to 10 of 23 CVEs