24h | 7d | 30d

Overview

  • Ivanti
  • Endpoint Manager Mobile

29 Jan 2026
Published
30 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
14.89%

Description

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

Statistics

  • 4 Posts
  • 5 Interactions

Last activity: 16 hours ago

Bluesky

Profile picture
Spike in Ivanti EPMM CVE-2026-1281 RCE exploitation attempts seen by our sensors last 24 hours from at least 13 source IPs. In our scans, we see ~1600 exposed instances worldwide (no vulnerability assessment). Top exposed: Germany (516) Ivanti hotfix guidance: forums.ivanti.com/s/article/Se...
  • 1
  • 4
  • 0
  • 22h ago
Profile picture
CVE-2026-1281 has been added to CISA Known Exploited Vulnerability catalog: www.cisa.gov/news-events/... Additional background from watchTowr: labs.watchtowr.com/someone-know...
  • 0
  • 0
  • 0
  • 22h ago
Profile picture
📢 Ivanti publie des correctifs temporaires pour deux failles critiques EPMM, dont une zero‑day exploitée (CVE-20…📝 … https://cyberveille.ch/posts/2026-01-31-ivanti-publie-des-correctifs-temporaires-pour-deux-failles-critiques-epmm-dont-une-zero-day-exploitee-cve-2026-1281/ #CVE_2026_1281 #Cyberveil…
  • 0
  • 0
  • 0
  • 20h ago
Profile picture
Operation Midnight Tether: How Attackers Are Weaponizing Ivanti’s EPMM Zero-Days and Your 5-Step Cyber Triage Plan + Video Introduction: Two critical, unauthenticated remote code execution (RCE) vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2026-1281 and CVE-2026-1340,…
  • 0
  • 0
  • 0
  • 16h ago

Overview

  • rust-lang
  • rust

09 Apr 2024
Published
04 Nov 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
79.91%

KEV

Description

Rust is a programming language. The Rust Security Response WG was notified that the Rust standard library prior to version 1.77.2 did not properly escape arguments when invoking batch files (with the `bat` and `cmd` extensions) on Windows using the `Command`. An attacker able to control the arguments passed to the spawned process could execute arbitrary shell commands by bypassing the escaping. The severity of this vulnerability is critical for those who invoke batch files on Windows with untrusted arguments. No other platform or use is affected. The `Command::arg` and `Command::args` APIs state in their documentation that the arguments will be passed to the spawned process as-is, regardless of the content of the arguments, and will not be evaluated by a shell. This means it should be safe to pass untrusted input as an argument. On Windows, the implementation of this is more complex than other platforms, because the Windows API only provides a single string containing all the arguments to the spawned process, and it's up to the spawned process to split them. Most programs use the standard C run-time argv, which in practice results in a mostly consistent way arguments are splitted. One exception though is `cmd.exe` (used among other things to execute batch files), which has its own argument splitting logic. That forces the standard library to implement custom escaping for arguments passed to batch files. Unfortunately it was reported that our escaping logic was not thorough enough, and it was possible to pass malicious arguments that would result in arbitrary shell execution. Due to the complexity of `cmd.exe`, we didn't identify a solution that would correctly escape arguments in all cases. To maintain our API guarantees, we improved the robustness of the escaping code, and changed the `Command` API to return an `InvalidInput` error when it cannot safely escape an argument. This error will be emitted when spawning the process. The fix is included in Rust 1.77.2. Note that the new escaping logic for batch files errs on the conservative side, and could reject valid arguments. Those who implement the escaping themselves or only handle trusted inputs on Windows can also use the `CommandExt::raw_arg` method to bypass the standard library's escaping logic.

Statistics

  • 2 Posts
  • 2 Interactions

Last activity: 21 hours ago

Fediverse

Profile picture

The severity of this vulnerability was critical if you were invoking batch files on Windows with untrusted arguments. hackernoon.com/rust-cve-2024-2 #rust

  • 1
  • 0
  • 0
  • 21h ago
Profile picture
  • 1
  • 0
  • 0
  • 21h ago

Overview

  • Cisco
  • Cisco Unified Communications Manager

21 Jan 2026
Published
22 Jan 2026
Updated

CVSS v3.1
HIGH (8.2)
EPSS
1.10%

Description

A vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), Cisco Unity Connection, and Cisco Webex Calling Dedicated Instance could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device.  This vulnerability is due to improper validation of user-supplied input in HTTP requests. An attacker could exploit this vulnerability by sending a sequence of crafted HTTP requests to the web-based management interface of an affected device. A successful exploit could allow the attacker to obtain user-level access to the underlying operating system and then elevate privileges to root. Note: Cisco has assigned this security advisory a Security Impact Rating (SIR) of Critical rather than High as the score indicates. The reason is that exploitation of this vulnerability could result in an attacker elevating privileges to root.

Statistics

  • 2 Posts
  • 9 Interactions

Last activity: 21 hours ago

Fediverse

Profile picture

🍩 & - Since its disclosure 11 days ago, 95% of the exploitation attempts of CVE-2026-20045, a critical vulnerability in Cisco Unified Communications Manager, have used a distinctive user-agent: Mozilla/5.0 (compatible; CiscoExploit/1.0) and are heavily targeted against our Cisco Unified Communications Manager (UCM) sensors.

We're tracking it here: viz.greynoise.io/tags/cisco-un

Appears to be from github.com/Ashwesker/Ashwesker

  • 2
  • 7
  • 1
  • 21h ago

Overview

  • Microsoft
  • Windows 10 Version 1809

13 Jan 2026
Published
30 Jan 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.06%

KEV

Description

Improper access control in Windows HTTP.sys allows an authorized attacker to elevate privileges over a network.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 22 hours ago

Fediverse

Profile picture

A new technique abuses Kerberos TGS requests and DNS CNAME resolution to allow attackers to impersonate users by relaying authentication tickets. This method, detailed in research by Cymulate, enables lateral movement and privilege escalation, and while Microsoft has patched HTTP-related vulnerabilities (CVE-2026-20929), the core DNS CNAME abuse remains a threat.
cymulate.com/blog/kerberos-aut

  • 1
  • 1
  • 0
  • 22h ago

Overview

  • Fortinet
  • FortiProxy

27 Jan 2026
Published
29 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.4)
EPSS
3.14%

Description

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0.15, FortiManager 7.6.0 through 7.6.5, FortiManager 7.4.0 through 7.4.9, FortiManager 7.2.0 through 7.2.11, FortiManager 7.0.0 through 7.0.15, FortiOS 7.6.0 through 7.6.5, FortiOS 7.4.0 through 7.4.10, FortiOS 7.2.0 through 7.2.12, FortiOS 7.0.0 through 7.0.18, FortiProxy 7.6.0 through 7.6.4, FortiProxy 7.4.0 through 7.4.12, FortiProxy 7.2.0 through 7.2.15, FortiProxy 7.0.0 through 7.0.22, FortiWeb 8.0.0 through 8.0.3, FortiWeb 7.6.0 through 7.6.6, FortiWeb 7.4.0 through 7.4.11 may allow an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 9 hours ago

Bluesky

Profile picture
That new version resolves CVE-2026-24858 which is that big oopsie where if you have a FortiCloud account you can access devices registered to other FortiCloud account. fortiguard.fortinet.com/psirt/FG-IR-...
  • 0
  • 2
  • 0
  • 9h ago

Overview

  • Pending

20 Jun 2024
Published
02 Aug 2024
Updated

CVSS
Pending
EPSS
67.46%

KEV

Description

An issue in the component js2py.disable_pyimport() of js2py up to v0.74 allows attackers to execute arbitrary code via a crafted API call.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 23 hours ago

Fediverse

Profile picture

CodeTwo from HackTheBox features a js2py sandbox escape via CVE-2024-28397, MD5 hash cracking from SQLite, and abusing npbackup-cli sudo permissions to read root's SSH key from backups.

0xdf.gitlab.io/2026/01/31/htb-

  • 0
  • 1
  • 1
  • 23h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 20 hours ago

Bluesky

Profile picture
Security Advisory: Database and filestore publicly accessible with default Odoo configuration (CVE-2026-25137) discourse.nixos.org/t/security-a... #nixos #nixpkgs #security
  • 0
  • 1
  • 0
  • 20h ago

Overview

  • win.rar GmbH
  • WinRAR

08 Aug 2025
Published
21 Oct 2025
Updated

CVSS v4.0
HIGH (8.4)
EPSS
4.61%

Description

A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET.

Statistics

  • 1 Post

Last activity: 9 hours ago

Fediverse

Profile picture

Google Warns of Active Exploitation of WinRAR Vulnerability CVE-2025-8088 thehackernews.com/2026/01/goog #cybersecurity #infosec

  • 0
  • 0
  • 0
  • 9h ago

Overview

  • coreruleset
  • coreruleset

08 Jan 2026
Published
08 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.3)
EPSS
0.04%

KEV

Description

The OWASP core rule set (CRS) is a set of generic attack detection rules for use with compatible web application firewalls. Prior to versions 4.22.0 and 3.3.8, the current rule 922110 has a bug when processing multipart requests with multiple parts. When the first rule in a chain iterates over a collection (like `MULTIPART_PART_HEADERS`), the capture variables (`TX:0`, `TX:1`) get overwritten with each iteration. Only the last captured value is available to the chained rule, which means malicious charsets in earlier parts can be missed if a later part has a legitimate charset. Versions 4.22.0 and 3.3.8 patch the issue.

Statistics

  • 1 Post

Last activity: 1 hour ago

Fediverse

Profile picture

CVE-2026-21876: Critical Multipart Charset Bypass Fixed in CRS 4.22.0 and 3.3.8 coreruleset.org/20260106/cve-2

  • 0
  • 0
  • 0
  • 1h ago

Overview

  • Apple
  • macOS

11 Dec 2024
Published
03 Nov 2025
Updated

CVSS
Pending
EPSS
0.12%

KEV

Description

A logic issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.2, macOS Ventura 13.7.2, macOS Sonoma 14.7.2. An app may be able to execute arbitrary code with kernel privileges.

Statistics

  • 1 Post

Last activity: 6 hours ago

Bluesky

Profile picture
📌 Google Project Zero Researcher Details Exploitation of macOS CoreAudio Type Confusion Vulnerability (CVE-2024-54529) https://www.cyberhub.blog/article/18896-google-project-zero-researcher-details-exploitation-of-macos-coreaudio-type-confusion-vulnerability-cve-2024-54529
  • 0
  • 0
  • 0
  • 6h ago
Showing 1 to 10 of 14 CVEs