24h | 7d | 30d

Overview

  • Ivanti
  • Endpoint Manager Mobile

29 Jan 2026
Published
30 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
14.89%

Description

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

Statistics

  • 4 Posts
  • 5 Interactions

Last activity: 9 hours ago

Bluesky

Profile picture
Spike in Ivanti EPMM CVE-2026-1281 RCE exploitation attempts seen by our sensors last 24 hours from at least 13 source IPs. In our scans, we see ~1600 exposed instances worldwide (no vulnerability assessment). Top exposed: Germany (516) Ivanti hotfix guidance: forums.ivanti.com/s/article/Se...
  • 1
  • 4
  • 0
  • 16h ago
Profile picture
CVE-2026-1281 has been added to CISA Known Exploited Vulnerability catalog: www.cisa.gov/news-events/... Additional background from watchTowr: labs.watchtowr.com/someone-know...
  • 0
  • 0
  • 0
  • 16h ago
Profile picture
📢 Ivanti publie des correctifs temporaires pour deux failles critiques EPMM, dont une zero‑day exploitée (CVE-20…📝 … https://cyberveille.ch/posts/2026-01-31-ivanti-publie-des-correctifs-temporaires-pour-deux-failles-critiques-epmm-dont-une-zero-day-exploitee-cve-2026-1281/ #CVE_2026_1281 #Cyberveil…
  • 0
  • 0
  • 0
  • 13h ago
Profile picture
Operation Midnight Tether: How Attackers Are Weaponizing Ivanti’s EPMM Zero-Days and Your 5-Step Cyber Triage Plan + Video Introduction: Two critical, unauthenticated remote code execution (RCE) vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2026-1281 and CVE-2026-1340,…
  • 0
  • 0
  • 0
  • 9h ago

Overview

  • rust-lang
  • rust

09 Apr 2024
Published
04 Nov 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
80.47%

KEV

Description

Rust is a programming language. The Rust Security Response WG was notified that the Rust standard library prior to version 1.77.2 did not properly escape arguments when invoking batch files (with the `bat` and `cmd` extensions) on Windows using the `Command`. An attacker able to control the arguments passed to the spawned process could execute arbitrary shell commands by bypassing the escaping. The severity of this vulnerability is critical for those who invoke batch files on Windows with untrusted arguments. No other platform or use is affected. The `Command::arg` and `Command::args` APIs state in their documentation that the arguments will be passed to the spawned process as-is, regardless of the content of the arguments, and will not be evaluated by a shell. This means it should be safe to pass untrusted input as an argument. On Windows, the implementation of this is more complex than other platforms, because the Windows API only provides a single string containing all the arguments to the spawned process, and it's up to the spawned process to split them. Most programs use the standard C run-time argv, which in practice results in a mostly consistent way arguments are splitted. One exception though is `cmd.exe` (used among other things to execute batch files), which has its own argument splitting logic. That forces the standard library to implement custom escaping for arguments passed to batch files. Unfortunately it was reported that our escaping logic was not thorough enough, and it was possible to pass malicious arguments that would result in arbitrary shell execution. Due to the complexity of `cmd.exe`, we didn't identify a solution that would correctly escape arguments in all cases. To maintain our API guarantees, we improved the robustness of the escaping code, and changed the `Command` API to return an `InvalidInput` error when it cannot safely escape an argument. This error will be emitted when spawning the process. The fix is included in Rust 1.77.2. Note that the new escaping logic for batch files errs on the conservative side, and could reject valid arguments. Those who implement the escaping themselves or only handle trusted inputs on Windows can also use the `CommandExt::raw_arg` method to bypass the standard library's escaping logic.

Statistics

  • 2 Posts
  • 2 Interactions

Last activity: 14 hours ago

Fediverse

Profile picture

The severity of this vulnerability was critical if you were invoking batch files on Windows with untrusted arguments. hackernoon.com/rust-cve-2024-2 #rust

  • 1
  • 0
  • 0
  • 14h ago
Profile picture
  • 1
  • 0
  • 0
  • 14h ago

Overview

  • Cisco
  • Cisco Unified Communications Manager

21 Jan 2026
Published
22 Jan 2026
Updated

CVSS v3.1
HIGH (8.2)
EPSS
1.10%

Description

A vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), Cisco Unity Connection, and Cisco Webex Calling Dedicated Instance could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device.  This vulnerability is due to improper validation of user-supplied input in HTTP requests. An attacker could exploit this vulnerability by sending a sequence of crafted HTTP requests to the web-based management interface of an affected device. A successful exploit could allow the attacker to obtain user-level access to the underlying operating system and then elevate privileges to root. Note: Cisco has assigned this security advisory a Security Impact Rating (SIR) of Critical rather than High as the score indicates. The reason is that exploitation of this vulnerability could result in an attacker elevating privileges to root.

Statistics

  • 2 Posts
  • 9 Interactions

Last activity: 14 hours ago

Fediverse

Profile picture

🍩 & - Since its disclosure 11 days ago, 95% of the exploitation attempts of CVE-2026-20045, a critical vulnerability in Cisco Unified Communications Manager, have used a distinctive user-agent: Mozilla/5.0 (compatible; CiscoExploit/1.0) and are heavily targeted against our Cisco Unified Communications Manager (UCM) sensors.

We're tracking it here: viz.greynoise.io/tags/cisco-un

Appears to be from github.com/Ashwesker/Ashwesker

  • 2
  • 7
  • 1
  • 14h ago

Overview

  • Microsoft
  • Windows 10 Version 1809

13 Jan 2026
Published
30 Jan 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.06%

KEV

Description

Improper access control in Windows HTTP.sys allows an authorized attacker to elevate privileges over a network.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 15 hours ago

Fediverse

Profile picture

A new technique abuses Kerberos TGS requests and DNS CNAME resolution to allow attackers to impersonate users by relaying authentication tickets. This method, detailed in research by Cymulate, enables lateral movement and privilege escalation, and while Microsoft has patched HTTP-related vulnerabilities (CVE-2026-20929), the core DNS CNAME abuse remains a threat.
cymulate.com/blog/kerberos-aut

  • 1
  • 1
  • 0
  • 15h ago

Overview

  • win.rar GmbH
  • WinRAR

08 Aug 2025
Published
21 Oct 2025
Updated

CVSS v4.0
HIGH (8.4)
EPSS
4.61%

Description

A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 2 hours ago

Fediverse

Profile picture

Google Warns of Active Exploitation of WinRAR Vulnerability CVE-2025-8088 thehackernews.com/2026/01/goog #cybersecurity #infosec

  • 1
  • 0
  • 0
  • 2h ago

Overview

  • Pending

20 Jun 2024
Published
02 Aug 2024
Updated

CVSS
Pending
EPSS
67.46%

KEV

Description

An issue in the component js2py.disable_pyimport() of js2py up to v0.74 allows attackers to execute arbitrary code via a crafted API call.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 16 hours ago

Fediverse

Profile picture

CodeTwo from HackTheBox features a js2py sandbox escape via CVE-2024-28397, MD5 hash cracking from SQLite, and abusing npbackup-cli sudo permissions to read root's SSH key from backups.

0xdf.gitlab.io/2026/01/31/htb-

  • 0
  • 1
  • 1
  • 16h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 13 hours ago

Bluesky

Profile picture
Security Advisory: Database and filestore publicly accessible with default Odoo configuration (CVE-2026-25137) discourse.nixos.org/t/security-a... #nixos #nixpkgs #security
  • 0
  • 1
  • 0
  • 13h ago

Overview

  • NaturalIntelligence
  • fast-xml-parser

30 Jan 2026
Published
30 Jan 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.07%

KEV

Description

fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. In versions 4.3.6 through 5.3.3, a RangeError vulnerability exists in the numeric entity processing of fast-xml-parser when parsing XML with out-of-range entity code points (e.g., `�` or `�`). This causes the parser to throw an uncaught exception, crashing any application that processes untrusted XML input. Version 5.3.4 fixes the issue.

Statistics

  • 1 Post

Last activity: 19 hours ago

Bluesky

Profile picture
🚨 New HIGH CVE detected in AWS Lambda 🚨 CVE-2026-25128 impacts fast-xml-parser in 4 Lambda base images. Details: https://github.com/aws/aws-lambda-base-images/issues/393 More: https://lambdawatchdog.com/ #AWS #Lambda #CVE #CloudSecurity #Serverless
  • 0
  • 0
  • 0
  • 19h ago

Overview

  • Fortinet
  • FortiProxy

27 Jan 2026
Published
29 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.4)
EPSS
3.14%

Description

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0.15, FortiManager 7.6.0 through 7.6.5, FortiManager 7.4.0 through 7.4.9, FortiManager 7.2.0 through 7.2.11, FortiManager 7.0.0 through 7.0.15, FortiOS 7.6.0 through 7.6.5, FortiOS 7.4.0 through 7.4.10, FortiOS 7.2.0 through 7.2.12, FortiOS 7.0.0 through 7.0.18, FortiProxy 7.6.0 through 7.6.4, FortiProxy 7.4.0 through 7.4.12, FortiProxy 7.2.0 through 7.2.15, FortiProxy 7.0.0 through 7.0.22, FortiWeb 8.0.0 through 8.0.3, FortiWeb 7.6.0 through 7.6.6, FortiWeb 7.4.0 through 7.4.11 may allow an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices.

Statistics

  • 1 Post

Last activity: 2 hours ago

Bluesky

Profile picture
That new version resolves CVE-2026-24858 which is that big oopsie where if you have a FortiCloud account you can access devices registered to other FortiCloud account. fortiguard.fortinet.com/psirt/FG-IR-...
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • cursor
  • cursor

14 Jan 2026
Published
14 Jan 2026
Updated

CVSS v4.0
HIGH (7.2)
EPSS
0.05%

KEV

Description

Cursor is a code editor built for programming with AI. Prior to 2.3, hen the Cursor Agent is running in Auto-Run Mode with Allowlist mode enabled, certain shell built-ins can still be executed without appearing in the allowlist and without requiring user approval. This allows an attacker via indirect or direct prompt injection to poison the shell environment by setting, modifying, or removing environment variables that influence trusted commands. This vulnerability is fixed in 2.3.

Statistics

  • 1 Post

Last activity: 20 hours ago

Fediverse

Profile picture

Sicherheitslücke in Cursor-IDE: Shell-Befehle werden zur Angriffsfläche

Die als CVE-2026-22708 klassifizierte Lücke ermöglicht Angreifern die Ausführung von Remote-Code durch Manipulation von Umgebungsvariablen – selbst bei leerer Befehlsliste.

all-about-security.de/sicherhe

#shell #cve #remotecode #cursoride #cybersecurity

  • 0
  • 0
  • 0
  • 20h ago
Showing 1 to 10 of 17 CVEs