24h | 7d | 30d

Overview

  • VMware
  • Aria Operations
  • vmware-aria-operations

25 Feb 2026
Published
04 Mar 2026
Updated

CVSS v3.1
HIGH (8.1)
EPSS
10.76%

Description

VMware Aria Operations contains a command injection vulnerability. A malicious unauthenticated actor may exploit this issue to execute arbitrary commands which may lead to remote code execution in VMware Aria Operations while support-assisted product migration is in progress.  To remediate CVE-2026-22719, apply the patches listed in the 'Fixed Version' column of the ' Response Matrix https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947 ' in VMSA-2026-0001  Workarounds for CVE-2026-22719 are documented in the 'Workarounds' column of the ' Response Matrix https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947 ' in VMSA-2026-0001

Statistics

  • 11 Posts
  • 2 Interactions

Last activity: 2 hours ago

Fediverse

Profile picture fallback

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a VMware Aria Operations vulnerability tracked as CVE-2026-22719 to its Known Exploited Vulnerabilities catalog, flagging the flaw as exploited in attacks.

bleepingcomputer.com/news/secu

#cybersecurity

  • 1
  • 1
  • 0
  • 2h ago
Profile picture fallback

The recently patched CVE-2026-22719 can be exploited by an unauthenticated attacker for remote code execution. securityweek.com/vmware-aria-o

  • 0
  • 0
  • 1
  • 16h ago

Bluesky

Profile picture fallback
CISA added CVE-2026-22719, a high-severity command injection vulnerability in Broadcom VMware Aria Operations, to its Known Exploited Vulnerabilities catalog due to active exploitation in the wild.
  • 0
  • 0
  • 2
  • 23h ago
Profile picture fallback
CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog #cybersecurity #hacking #news #infosec #security #technology #privacy thehackernews.com/20...
  • 0
  • 0
  • 0
  • 23h ago
Profile picture fallback
🛡️ How can you know if you're exposed? BaseFortify maps your installed software to known vulnerabilities like CVE-2026-22719 and provides attack scenarios, mitigation guidance, plus a security Q&A and AI assistant. Explore the platform 👇 basefortify.eu #CyberSecurity #VulnerabilityManagement
  • 0
  • 0
  • 0
  • 15h ago
Profile picture fallback
🔍 Details: CVE-2026-22719 is a command injection flaw Attackers can execute arbitrary commands in VMware Aria Operations during support-assisted migrations, potentially leading to remote code execution & infrastructure access. ⚠️ Patch to 8.18.6 or 9.0.2. #CyberDefense #VMwareSecurity #Infosec
  • 0
  • 0
  • 0
  • 15h ago
Profile picture fallback
📌 CVE-2026-22719 - VMware Aria Operations contains a command injection vulnerability. A malicious unauthenticated actor may exploit this issue to execute arbitrary comma... https://www.cyberhub.blog/cves/CVE-2026-22719
  • 0
  • 0
  • 0
  • 13h ago
Profile picture fallback
CISA、VMware Aria Operations の脆弱性 CVE-2026-22719 を KEV カタログに追加 CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog #HackerNews (Mar 4) thehackernews.com/2026/03/cisa...
  • 0
  • 0
  • 0
  • 5h ago

Overview

  • Qualcomm, Inc.
  • Snapdragon

02 Mar 2026
Published
04 Mar 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.65%

Description

Memory corruption while using alignments for memory allocation.

Statistics

  • 7 Posts
  • 2 Interactions

Last activity: 14 hours ago

Fediverse

Profile picture fallback

Google notifying Android user of high-severity vuln CVE-2026-21385 and March 2026 security update might work better if that link the "AI Mode" #slopgenerator did not link to December 2025 bulletin.

  • 0
  • 2
  • 0
  • 15h ago
Profile picture fallback

The exploitation activity against CVE-2026-21385, a high-severity memory corruption flaw, could be tied to commercial spyware or nation-state threat groups. darkreading.com/threat-intelli

  • 0
  • 0
  • 1
  • 16h ago
Profile picture fallback

Project Zero’s “0-day in the Wild” spreadsheet just added CVE-2026-21385, an issue in the Qualcomm graphics driver: https://docs.qualcomm.com/securitybulletin/march-2026-bulletin.html#_cve-2026-21385

  • 0
  • 0
  • 0
  • 14h ago

Bluesky

Profile picture fallback
Google confirme la faille CVE-2026-21385 dans un composant Android Qualcomm, exploitée en conditions réelles. Problème de dépassement mémoire (score 7.8) lié au Graphics. #Qualcomm #CyberSecurity #Android 📱
  • 0
  • 0
  • 0
  • 22h ago
Profile picture fallback
📌 CVE-2026-21385 - Memory corruption while using alignments for memory allocation. https://www.cyberhub.blog/cves/CVE-2026-21385
  • 0
  • 0
  • 0
  • 15h ago
Profile picture fallback
Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited thehackernews.com/2026/03/goog...
  • 0
  • 0
  • 0
  • 15h ago

Overview

  • Microsoft
  • Windows 11 version 21H2

11 Jun 2024
Published
17 Dec 2025
Updated

CVSS v3.1
HIGH (7.8)
EPSS
52.31%

KEV

Description

Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

Statistics

  • 3 Posts
  • 6 Interactions

Last activity: 8 hours ago

Fediverse

Profile picture fallback

Exploiting Reversing (ER) series: article 07 | Exploitation Techniques | CVE-2024-30085 (part 01)

I am excited to release the seventh article in the Exploiting Reversing Series (ERS). Titled “Exploitation Techniques | CVE-2024-30085 (part 01)” this 119-page technical guide offers a comprehensive roadmap for vulnerability exploitation:

exploitreversing.com/2026/03/0

Key features of this edition:

[+] Dual Exploit Strategies: Two distinct exploit versions using Token Stealing and I/O Ring techniques.
[+] Exploit ALPC + PreviousMode Flip + Token Stealing: elevation of privilege of a regular user to SYSTEM.
[+] Exploit ALPC + Pipes + I/O Ring: elevation of privilege of a regular user to SYSTEM.
[+] Solid Reliability: Two complete working and stable exploits, including an improved cleanup stage.
[+] Optimized Exploit Logic: Significant refinements to the codebase and technical execution for better stability and predictability.

The article guides you through the two distinct techniques for exploiting the CVE-2024-30085 Heap Buffer Overflow vulnerability.

I hope this serves as a definitive resource for your research. If you find it helpful, please feel free to share it or reach out with your feedback!

Enjoy your reading and have an excellent day.

  • 2
  • 2
  • 0
  • 11h ago

Bluesky

Profile picture fallback
Exploiting Reversing (ER) series: article 07 | Exploitation Techniques | CVE-2024-30085 (part 01) exploitreversing.com/2026/03/04/e... Enjoy your reading and have an excellent day. #exploit #vulnerability #cve #exploitation #infosec #informationsecurity #windows
  • 1
  • 1
  • 0
  • 11h ago
Profile picture fallback
CVE-2024-30085 Exposed: Two Full Exploit Chains for Windows Kernel Privilege Escalation + Video Introduction: A new, in-depth technical analysis of CVE-2024-30085 has been released, revealing not one, but two distinct and stable exploit strategies to achieve SYSTEM privileges on vulnerable Windows…
  • 0
  • 0
  • 0
  • 8h ago

Overview

  • Cisco
  • Cisco Secure Firewall Management Center (FMC)

04 Mar 2026
Published
05 Mar 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
Pending

KEV

Description

A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device. This vulnerability is due to insecure deserialization of a user-supplied Java byte stream. An attacker could exploit this vulnerability by sending a crafted serialized Java object to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the device and elevate privileges to root. Note: If the FMC management interface does not have public internet access, the attack surface that is associated with this vulnerability is reduced.

Statistics

  • 6 Posts
  • 10 Interactions

Last activity: 6 hours ago

Fediverse

Profile picture fallback

Second is CVE-2026-20131: remote code execution in the same product by way of, aww yiss, Java deserialization.

sec.cloudapps.cisco.com/securi

  • 2
  • 5
  • 1
  • 11h ago
Profile picture fallback

💥 Cisco warns of max severity Secure FMC flaws giving root access

「 Both vulnerabilities can be exploited remotely by unauthenticated attackers: the authentication bypass flaw (CVE-2026-20079) allows attackers to gain root access to the underlying operating system, while the remote code execution (RCE) vulnerability (CVE-2026-20131) lets them execute arbitrary Java code as root on unpatched devices 」

#cisco #rce #cybersecurity
bleepingcomputer.com/news/secu

  • 1
  • 1
  • 0
  • 6h ago
Profile picture fallback

yikes.. 50 CVEs for Cisco today incl. two max severity CVE-2026-20131 & CVE-2026-20079 with auth bypass 🫡

hecate.pw/vulnerabilities?sear

🚬

#vulnerability #cve #cisco

  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback

Abstract’s ASTRO research team just released blog about critical CISCO vulnerabilities: CVE-2026-20079 and CVE-2026-20131

itnerd.blog/2026/03/04/abstrac

  • 0
  • 0
  • 0
  • 7h ago

Bluesky

Profile picture fallback
Abstract’s ASTRO research team just released blog about critical CISCO vulnerabilities: CVE-2026-20079 and CVE-2026-20131 Abstract's ASTRO research team has just published a blog entitled: Critical Cisco Vulnerabilities: CVE-2026-20079 and CVE-2026-20131 Affecting Cisco Secure Firewall Management…
  • 0
  • 1
  • 0
  • 8h ago

Overview

  • Cisco
  • Cisco Secure Firewall Management Center (FMC)

04 Mar 2026
Published
05 Mar 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
Pending

KEV

Description

A vulnerability in the web interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to bypass authentication and execute script files on an affected device to obtain root access to the underlying operating system. This vulnerability is due to an improper system process that is created at boot time. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute a variety of scripts and commands that allow root access to the device.

Statistics

  • 6 Posts
  • 10 Interactions

Last activity: 6 hours ago

Fediverse

Profile picture fallback

2 perfect 10s from Cisco today! First up, CVE-2026-20079, auth bypass in Cisco Secure Firewall Management, by way of a...rogue process launched at boot?

sec.cloudapps.cisco.com/securi

  • 2
  • 5
  • 1
  • 11h ago
Profile picture fallback

💥 Cisco warns of max severity Secure FMC flaws giving root access

「 Both vulnerabilities can be exploited remotely by unauthenticated attackers: the authentication bypass flaw (CVE-2026-20079) allows attackers to gain root access to the underlying operating system, while the remote code execution (RCE) vulnerability (CVE-2026-20131) lets them execute arbitrary Java code as root on unpatched devices 」

#cisco #rce #cybersecurity
bleepingcomputer.com/news/secu

  • 1
  • 1
  • 0
  • 6h ago
Profile picture fallback

yikes.. 50 CVEs for Cisco today incl. two max severity CVE-2026-20131 & CVE-2026-20079 with auth bypass 🫡

hecate.pw/vulnerabilities?sear

🚬

#vulnerability #cve #cisco

  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback

Abstract’s ASTRO research team just released blog about critical CISCO vulnerabilities: CVE-2026-20079 and CVE-2026-20131

itnerd.blog/2026/03/04/abstrac

  • 0
  • 0
  • 0
  • 7h ago

Bluesky

Profile picture fallback
Abstract’s ASTRO research team just released blog about critical CISCO vulnerabilities: CVE-2026-20079 and CVE-2026-20131 Abstract's ASTRO research team has just published a blog entitled: Critical Cisco Vulnerabilities: CVE-2026-20079 and CVE-2026-20131 Affecting Cisco Secure Firewall Management…
  • 0
  • 1
  • 0
  • 8h ago

Overview

  • IceWarp
  • IceWarp

23 Dec 2025
Published
30 Dec 2025
Updated

CVSS v3.0
CRITICAL (9.8)
EPSS
1.29%

KEV

Description

IceWarp14 X-File-Operation Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IceWarp. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the X-File-Operation header. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-27394.

Statistics

  • 2 Posts

Last activity: 5 hours ago

Bluesky

Profile picture fallback
Más de 1200 servidores IceWarp siguen siendo vulnerables a la falla RCE no autenticada (CVE-2025-14500). El fallo permite a atacantes tomar control total de servidores de correo. Si usas IceWarp, ¡actualiza a la versión 13.0.4 de inmediato! #ciberseguridad www.linkedin.com/pulse/m%C3%A...
  • 0
  • 0
  • 0
  • 12h ago
Profile picture fallback
1,200台以上のIceWarpサーバーが、認証されていないリモートコード実行の脆弱性(CVE-2025-14500)に対して依然として脆弱です Over 1,200 IceWarp servers still vulnerable to unauthenticated RCE flaw (CVE-2025-14500) #HelpNetSecurity (Mar 4) www.helpnetsecurity.com/2026/03/04/i...
  • 0
  • 0
  • 0
  • 5h ago

Overview

  • Sophos
  • Sophos Firewall

25 Mar 2022
Published
21 Oct 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
94.44%

Description

An authentication bypass vulnerability in the User Portal and Webadmin allows a remote attacker to execute code in Sophos Firewall version v18.5 MR3 and older.

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 9 hours ago

Fediverse

Profile picture fallback

Here's a taste of what GreyNoise customers got in this week's At The Edge intelligence brief.

268M sessions. 540K unique IPs. Four findings that matter.

→ Sophos CVE-2022-1040 surged 435% — second consecutive week
→ 9.1M RDP sessions from two IPs, one JA4T fingerprint
→ VPN siege Week 6 — vendors rotating after our published analysis
→ Scanning landscape collapsed. Enterprise campaigns didn't.

Full brief: IOCs, attribution, recommendations.

🔗 greynoise.io/resources/at-the-

greynoise.io/contact

  • 1
  • 2
  • 0
  • 9h ago

Overview

  • Microsoft
  • ASP.NET Core 2.3

14 Oct 2025
Published
22 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.9)
EPSS
0.36%

KEV

Description

Inconsistent interpretation of http requests ('http request/response smuggling') in ASP.NET Core allows an authorized attacker to bypass a security feature over a network.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 20 hours ago

Fediverse

Profile picture fallback

VDE-2026-001
METTLER TOLEDO: ASP.NET core vulnerability in LabX

LabX 21.2.12 (formerly known as LabX Cloud 1.2.12) is affected by the ASP.NET core vulnerability CVE-2025-55315.
CVE-2025-55315

certvde.com/en/advisories/vde-

mettler-toledo.csaf-tp.certvde

  • 1
  • 1
  • 0
  • 20h ago

Overview

  • Cisco
  • Cisco Catalyst SD-WAN Manager

25 Feb 2026
Published
26 Feb 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.02%

KEV

Description

A vulnerability in the Data Collection Agent (DCA) feature of Cisco Catalyst SD-WAN Manager could allow an authenticated, local attacker to gain DCA user privileges on an affected system. To exploit this vulnerability, the attacker must have valid vmanage credentials on the affected system. This vulnerability is due to the presence of a credential file for the DCA user on an affected system. An attacker could exploit this vulnerability by accessing the filesystem as a low-privileged user and reading the file that contains the DCA password from that affected system. A successful exploit could allow the attacker to access another affected system and gain DCA user privileges. Note: Cisco Catalyst SD-WAN Manager releases 20.18 and later are not affected by this vulnerability.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 7 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-20128 - A vulnerability in the Data Collection Agent (DCA) feature of Cisco Catalyst SD-WAN Manager could allow an authenticated, local attacker to gain DCA u... https://www.cyberhub.blog/cves/CVE-2026-20128
  • 0
  • 1
  • 0
  • 7h ago

Overview

  • expressjs
  • multer

04 Mar 2026
Published
04 Mar 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
Pending

KEV

Description

Multer is a node.js middleware for handling `multipart/form-data`. A vulnerability in Multer prior to version 2.1.1 allows an attacker to trigger a Denial of Service (DoS) by sending malformed requests, potentially causing stack overflow. Users should upgrade to version 2.1.1 to receive a patch. No known workarounds are available.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 12 hours ago

Bluesky

Profile picture fallback
🚨 High-severity security fix in multer@2.1.1 just released! Patches CVE-2026-3520 — vulnerable to Denial of Service via uncontrolled recursion github.com/expressjs/mu...
  • 0
  • 1
  • 1
  • 12h ago
Showing 1 to 10 of 78 CVEs