24h | 7d | 30d

Overview

  • Microsoft
  • Windows 10 Version 1809

13 Jan 2026
Published
14 Jan 2026
Updated

CVSS v3.1
MEDIUM (5.5)
EPSS
23.28%

Description

Exposure of sensitive information to an unauthorized actor in Desktop Windows Manager allows an authorized attacker to disclose information locally.

Statistics

  • 12 Posts
  • 2 Interactions

Last activity: 2 hours ago

Fediverse

Profile picture

Here's a summary of the most important world, technology, and cybersecurity news from the last 24-48 hours:

World: A train crash in Thailand killed at least 22 people (Jan 14). US President Trump warned Iran amid protests and reaffirmed his desire to acquire Greenland (Jan 14).

Technology: Big Tech companies are heavily investing in energy infrastructure to power their AI ambitions amidst growing backlash over resource usage (Jan 14). Apple's status as a tech visionary is being questioned amidst the rapid AI advancements (Jan 14).

Cybersecurity: CISA and Microsoft patched an actively exploited Windows information disclosure vulnerability (CVE-2026-20805) (Jan 13-14). The World Economic Forum's 2026 outlook highlights enterprise security facing a "three-front war" from cybercrime, AI misuse, and supply chain attacks (Jan 13).

#News #Anonymous #AnonNews_irc

  • 0
  • 0
  • 0
  • 12h ago
Profile picture

📰 CISA Mandates Patch for Exploited Windows Zero-Day Used in Attack Chains

🚨 CISA adds actively exploited Windows zero-day CVE-2026-20805 to its KEV catalog! The info-disclosure flaw in Desktop Window Manager is used to bypass ASLR in attack chains. Federal agencies must patch by Feb 3. ⚠️ #Windows #ZeroDay #Infosec

🔗 cyber.netsecops.io/articles/ci

  • 0
  • 0
  • 0
  • 9h ago
Profile picture

📰 Microsoft's January 2026 Patch Tuesday Fixes 114 Flaws, Including One Exploited Zero-Day

Microsoft's January 2026 Patch Tuesday is massive, fixing 114 vulnerabilities! 💻 The update includes 8 critical RCE flaws and one actively exploited zero-day (CVE-2026-20805). Prioritize patching now! #PatchTuesday #Microsoft #Cybersecurity

🔗 cyber.netsecops.io/articles/mi

  • 0
  • 0
  • 0
  • 9h ago
Profile picture

Microsoft patched an actively exploited Windows DWM flaw (CVE-2026-20805) in January Patch Tuesday.

CISA added it to the KEV list within hours, warning of real-world attacks.
Patch now. Medium severity, high impact when chained.

#Windows #PatchTuesday #CyberSecurity #CVE

  • 0
  • 0
  • 0
  • 2h ago
Profile picture

Microsoft Flickentag 2026-01

Zum Beginn des Jahres bringt Microsoft (MS) Flicken für 113 Sicherheitslücken - eine ganze Menge. Von denen wird eine (CVE-2026-20805) bereits für Angriffe ausgenutzt (Zero-Day); eine andere (CVE-2026-21265) war schon lange bekannt, aber wird (noch) nicht für Angriffe genutzt. Von den jetzt geflickten Sicherheitslücken stuft MS 8 als kritisch ein, 5 von denen stecken in Komponenten von MS-Office. Die bereits ausgenutzte CVE-2026-20805 stuft MS nur als wichtig (nicht als kritisch) ein, das verstehe wer will. Die CISA hat diese Lücke in den KEV (Known Exploited Vulnerabilities) Katalog aufgenommen und eine Order erlassen, nach der Behörden

pc-fluesterer.info/wordpress/2

#Warnung #0day #exploits #Microsoft #office #sicherheit #UnplugTrump #windows #zahlen #zeroday

  • 1
  • 1
  • 0
  • 13h ago
Profile picture

Cyber Threat Intelligence Briefing – Jan. 14, 2026

Incident: Microsoft Windows users impacted by CVE-2026-20805 causing memory information disclosure

Date of Incident (ET): Unknown

Date of Disclosure (ET): Jan. 13, 2026

Summary: Microsoft addressed a zero-day vulnerability in Desktop Window Manager actively exploited to leak sensitive memory addresses. CISA added the flaw to its Known Exploited Vulnerabilities catalog, requiring federal agencies to patch by Feb. 3.

Source: theregister.com/2026/01/14/pat

Incident: Nissan Motor Corporation impacted by Everest ransomware causing data extortion threat

Date of Incident (ET): Jan. 10, 2026

Date of Disclosure (ET): Jan. 13, 2026

Summary: The Everest ransomware group listed Nissan on its leak site, claiming the theft of 900 gigabytes of data. The group has threatened to release dealership orders, sales records, and internal business communications if demands are unmet.

Source: scworld.com/brief/everest-rans

Incident: Polish power system impacted by Russian-linked actor causing attempted disruption

Date of Incident (ET): December 2025

Date of Disclosure (ET): Jan. 13, 2026

Summary: Poland's energy minister confirmed the country repelled a massive cyberattack targeting communications between renewable installations and distribution operators. Officials attributed the failed attempt to disrupt critical infrastructure to Russian military intelligence actors.

Source: straitstimes.com/world/europe/

Incident: Gogs repository service impacted by CVE-2025-8110 causing remote code execution

Date of Incident (ET): Unknown

Date of Disclosure (ET): Jan. 13, 2026

Summary: CISA warned of active exploitation of a high-severity path traversal flaw in the Gogs Git service. The vulnerability allows attackers to overwrite sensitive files and achieve code execution; approximately 700 instances have been compromised.

Source: thehackernews.com/2026/01/cisa

Incident: Betterment customers impacted by social engineering causing unauthorized PII access

Date of Incident (ET): Jan. 9, 2026

Date of Disclosure (ET): Jan. 12, 2026

Summary: Fintech firm Betterment confirmed a breach of third-party marketing systems via social engineering. Attackers accessed customer names and contact details to distribute fraudulent cryptocurrency scam notifications to users, though core accounts remained secure.

Source: techcrunch.com/2026/01/12/fint

  • 0
  • 0
  • 0
  • 12h ago

Bluesky

Profile picture
~Cisa~ CISA added actively exploited Microsoft Windows vulnerability CVE-2026-20805 to its KEV catalog. - IOCs: CVE-2026-20805 - #CISA #CVE202620805 #ThreatIntel
  • 0
  • 0
  • 0
  • 23h ago
Profile picture
「この内 CVE-2026-20805 の脆弱性について、Microsoft 社では悪用の事実を確認済みと公表しており、今後被害が拡大するおそれがあるため、至急、セキュリティ更新プログラムを適用してください。」
  • 0
  • 0
  • 0
  • 21h ago
Profile picture
マイクロソフト、2026年1月の月例パッチで悪用確認のゼロデイ含む脆弱性114件に対処(CVE-2026-20805他) | Codebook|Security News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/43375/
  • 0
  • 0
  • 0
  • 21h ago
Profile picture
Microsoft released January 2026 security updates addressing 114 vulnerabilities, including an actively exploited Desktop Window Manager information-disclosure flaw CVE-2026-20805.
  • 0
  • 0
  • 0
  • 16h ago
Profile picture
Microsoft и американските власти предупредиха, че в Windows е открита уязвимост, която киберпрестъпниците са използвали активно. Уязвимостта с номер CVE-2026-20805 е открита от експерти по киберсигурност в Microsoft и позволява на нападател, който вече е проникнал в системата...
  • 0
  • 0
  • 0
  • 9h ago
Profile picture
Microsoft、Windowsの定例アップデートで3件のゼロデイ 脆弱性を修正(CVE-2026-20805/21265/CVE-2023-31096) rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #セキュリティ #Security
  • 0
  • 0
  • 0
  • 4h ago

Overview

  • Fortinet
  • FortiSIEM

13 Jan 2026
Published
14 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.4)
EPSS
0.07%

KEV

Description

An improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet FortiSIEM 7.4.0, FortiSIEM 7.3.0 through 7.3.4, FortiSIEM 7.1.0 through 7.1.8, FortiSIEM 7.0.0 through 7.0.4, FortiSIEM 6.7.0 through 6.7.10 may allow an attacker to execute unauthorized code or commands via crafted TCP requests.

Statistics

  • 7 Posts
  • 1 Interaction

Last activity: 8 hours ago

Fediverse

Profile picture

‼️CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution

Exploit/PoC: github.com/horizon3ai/CVE-2025

CVSS: 9.4
Published: Jan 13, 2026

Writeup: horizon3.ai/attack-research/di

Advisory: fortiguard.fortinet.com/psirt/

  • 0
  • 1
  • 0
  • 8h ago
Profile picture
  • 0
  • 0
  • 0
  • 15h ago
Profile picture

🚨 CVE-2025-64155: Critical unauthenticated OS command injection in Fortinet FortiSIEM which may allow an unauthenticated attacker to execute unauthorised code or commands via crafted TCP requests. (CVSS 9.8)

I've created a vulnerability detection script here:
github.com/rxerium/rxerium-tem

Patches are strongly advised. If you are unable to patch it is recommended that you limit access to the phMonitor port (7900) as per Fortinet's advisory:
fortiguard.fortinet.com/psirt/

  • 0
  • 0
  • 0
  • 14h ago

Bluesky

Profile picture
📌 Critical Fortinet FortiSIEM Vulnerability (CVE-2025-64155) Allowed Remote Root Access for Three Years https://www.cyberhub.blog/article/18004-critical-fortinet-fortisiem-vulnerability-cve-2025-64155-allowed-remote-root-access-for-three-years
  • 0
  • 0
  • 0
  • 19h ago
Profile picture
[RSS] CVE-2025-64155: Three Years of Remotely Rooting the Fortinet FortiSIEM horizon3.ai -> Original->
  • 0
  • 0
  • 0
  • 15h ago
Profile picture
Fortinet patched a critical OS command injection in FortiSIEM (CVE-2025-64155, CVSS 9.4) that can be exploited without authentication. The flaw […]
  • 0
  • 0
  • 0
  • 13h ago
Profile picture
Fortinet Fixes FortiSIEM RCE Flaw Read More: www.cybermaterial.com/p/fortinet-f... #FortiSIEM #FortinetSecurity #UnauthenticatedRCE #CVE202564155 #SIEMSecurity #SOCOperations #PatchNow #EnterpriseSecurity #ThreatMitigation
  • 0
  • 0
  • 0
  • 8h ago

Overview

  • Microsoft
  • Windows Server 2019

13 Jan 2026
Published
14 Jan 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.08%

KEV

Description

Improper access control in Windows Deployment Services allows an unauthorized attacker to execute code over an adjacent network.

Statistics

  • 5 Posts

Last activity: 8 hours ago

Bluesky

Profile picture
CVE-2026-0386 shows how unattend.xml can leak creds on insecure channels, so #WDS is moving to secure by default. Hands free setups fade out by April 2026 unless you override them, so it’s smart to shift to safer deployment paths now.
  • 0
  • 0
  • 0
  • 15h ago
Profile picture
Microsoft: Windows Deployment Services #WDS Hands-Free Deployment Hardening Guidance related to CVE-2026-0386 www.elevenforum.com/t/windows-de...
  • 0
  • 0
  • 0
  • 12h ago
Profile picture
🛑 Serveur WDS - CVE-2026-0386 Le Patch Tuesday de janvier 2026 corrige une faille de sécurité importante dans WDS (Services de déploiement Windows). 👇 J'ai publié un article à ce sujet : - www.it-connect.fr/serveur-wds-... #WDS #infosec #cybersecurite #infosec #veilleIT
  • 0
  • 0
  • 0
  • 10h ago
Profile picture
微软正分阶段禁用 Windows 部署服务(WDS)中的高风险“免手动部署”功能,以修复 CVE-2026-0386 漏洞,该漏洞可致远程代码执行与凭据窃取;自 2026 年 4 月起系统将默认禁用该功能,IT 管理员需提前配置注册表或迁移至安全方案。 #微软 #WindowsServer #网络安全 #CVE20260386 👇 https://windiscover.com/posts/microsoft-securing-windows-server-component-it-admins-warned-2.html
  • 0
  • 0
  • 0
  • 8h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 3 Posts
  • 6 Interactions

Last activity: 8 hours ago

Fediverse

Profile picture

There's the DoS.

CVSS-BT: 7.7 / CVSS-B: 8.7 (CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/AU:Y/R:U/V:D/RE:M/U:Amber)

security.paloaltonetworks.com/

  • 2
  • 4
  • 0
  • 9h ago
Profile picture

@cR0w cve-2026-0227 seems spicy

  • 0
  • 0
  • 0
  • 10h ago

Bluesky

Profile picture
Paloaltoの脆弱性情報 「CVE-2026-0227 PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway and Portal (Severity: HIGH)」が公開されました。 → https://security.paloaltonetworks.com/CVE-2026-0227
  • 0
  • 0
  • 0
  • 8h ago

Overview

  • Kubernetes
  • Kubernetes

21 Jan 2021
Published
17 Sep 2024
Updated

CVSS v3.1
MEDIUM (6.3)
EPSS
24.78%

KEV

Description

Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker who is able to patch the status (which is considered a privileged operation and should not typically be granted to users) of a LoadBalancer service can set the status.loadBalancer.ingress.ip to similar effect.

Statistics

  • 2 Posts
  • 16 Interactions

Last activity: 16 hours ago

Fediverse

Profile picture

For anyone who's been to one of my talks over the last couple of years, you may have seen me mention "the unpatchable 4", which is a set of Kubernetes CVEs for which there are no patches, you need to mitigate them with configuration or architecture choices.

I've been meaning to write more about them, and finally got a chance so here's the first in a mini-series of posts looking at the CVEs and the underlying reasons they occur. This time it's CVE-2020-8554.

securitylabs.datadoghq.com/art

  • 7
  • 9
  • 0
  • 17h ago

Bluesky

Profile picture
Unpatchable Vulnerabilities of Kubernetes: CVE-2020-8554 #patchmanagement
  • 0
  • 0
  • 0
  • 16h ago

Overview

  • agentfront
  • enclave

13 Jan 2026
Published
14 Jan 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
0.10%

KEV

Description

Enclave is a secure JavaScript sandbox designed for safe AI agent code execution. Prior to 2.7.0, there is a critical sandbox escape vulnerability in enclave-vm that allows untrusted, sandboxed JavaScript code to execute arbitrary code in the host Node.js runtime. When a tool invocation fails, enclave-vm exposes a host-side Error object to sandboxed code. This Error object retains its host realm prototype chain, which can be traversed to reach the host Function constructor. An attacker can intentionally trigger a host error, then climb the prototype chain. Using the host Function constructor, arbitrary JavaScript can be compiled and executed in the host context, fully bypassing the sandbox and granting access to sensitive resources such as process.env, filesystem, and network. This breaks enclave-vm’s core security guarantee of isolating untrusted code. This vulnerability is fixed in 2.7.0.

Statistics

  • 2 Posts

Last activity: 16 hours ago

Fediverse

Profile picture

🔴 CVE-2026-22686 - Critical (10)

Enclave is a secure JavaScript sandbox designed for safe AI agent code execution. Prior to 2.7.0, there is a critical sandbox escape vulnerability in enclave-vm that allows untrusted, sandboxed JavaScript code to execute arbitrary code in the host...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

  • 0
  • 0
  • 0
  • 21h ago

Bluesky

Profile picture
🚨 CVE-2026-22686 (CVSS 10.0) A critical sandbox escape in enclave-vm lets untrusted JavaScript break isolation and execute code in the host Node.js runtime. Full host compromise is possible. 🔓💥 🔍 Details: basefortify.eu/cve_reports/... #CVE #CyberSecurity #NodeJS #JavaScript #AI
  • 0
  • 0
  • 0
  • 16h ago

Overview

  • Microsoft
  • Windows 10 Version 1809

13 Jan 2026
Published
14 Jan 2026
Updated

CVSS v3.1
MEDIUM (6.4)
EPSS
0.21%

KEV

Description

Windows Secure Boot stores Microsoft certificates in the UEFI KEK and DB. These original certificates are approaching expiration, and devices containing affected certificate versions must update them to maintain Secure Boot functionality and avoid compromising security by losing security fixes related to Windows boot manager or Secure Boot. The operating system’s certificate update protection mechanism relies on firmware components that might contain defects, which can cause certificate trust updates to fail or behave unpredictably. This leads to potential disruption of the Secure Boot trust chain and requires careful validation and deployment to restore intended security guarantees. Certificate Authority (CA) Location Purpose Expiration Date Microsoft Corporation KEK CA 2011 KEK Signs updates to the DB and DBX 06/24/2026 Microsoft Corporation UEFI CA 2011 DB Signs 3rd party boot loaders, Option ROMs, etc. 06/27/2026 Microsoft Windows Production PCA 2011 DB Signs the Windows Boot Manager 10/19/2026 For more information see this CVE and Windows Secure Boot certificate expiration and CA updates.

Statistics

  • 2 Posts
  • 4 Interactions

Last activity: 13 hours ago

Fediverse

Profile picture

Microsoft Flickentag 2026-01

Zum Beginn des Jahres bringt Microsoft (MS) Flicken für 113 Sicherheitslücken - eine ganze Menge. Von denen wird eine (CVE-2026-20805) bereits für Angriffe ausgenutzt (Zero-Day); eine andere (CVE-2026-21265) war schon lange bekannt, aber wird (noch) nicht für Angriffe genutzt. Von den jetzt geflickten Sicherheitslücken stuft MS 8 als kritisch ein, 5 von denen stecken in Komponenten von MS-Office. Die bereits ausgenutzte CVE-2026-20805 stuft MS nur als wichtig (nicht als kritisch) ein, das verstehe wer will. Die CISA hat diese Lücke in den KEV (Known Exploited Vulnerabilities) Katalog aufgenommen und eine Order erlassen, nach der Behörden

pc-fluesterer.info/wordpress/2

#Warnung #0day #exploits #Microsoft #office #sicherheit #UnplugTrump #windows #zahlen #zeroday

  • 1
  • 1
  • 0
  • 13h ago

Bluesky

Profile picture
🚨Microsoft’s Jan 2026 Patch Advisory is live! 100+ vulnerabilities patched across Windows, Office, SharePoint, Azure & core OS components, including multiple Critical RCEs and an actively exploited Secure Boot bypass (CVE-2026-21265). 🛡️ Patch fast → reduce exposure. www.sequretek.com/resources/re...
  • 1
  • 1
  • 0
  • 17h ago

Overview

  • Apache Software Foundation
  • Apache Camel Neo4j
  • org.apache.camel:camel-neo4j

14 Jan 2026
Published
14 Jan 2026
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

Cypher Injection vulnerability in Apache Camel camel-neo4j component. This issue affects Apache Camel: from 4.10.0 before 4.10.8, from 4.14.0 before 4.14.3, from 4.15.0 before 4.17.0 Users are recommended to upgrade to version 4.10.8 for 4.10.x LTS and 4.14.3 for 4.14.x LTS and 4.17.0.

Statistics

  • 1 Post
  • 6 Interactions

Last activity: 13 hours ago

Fediverse

Profile picture

Haven't seen a cypher injection for a while. This one is in Apache Camel-Neo4j.

camel.apache.org/security/CVE-

  • 3
  • 3
  • 0
  • 13h ago

Overview

  • mastodon
  • mastodon

08 Jan 2026
Published
08 Jan 2026
Updated

CVSS v4.0
HIGH (7.1)
EPSS
0.04%

KEV

Description

Mastodon is a free, open-source social network server based on ActivityPub. By nature, Mastodon performs a lot of outbound requests to user-provided domains. Mastodon, however, has some protection mechanism to disallow requests to local IP addresses (unless specified in `ALLOWED_PRIVATE_ADDRESSES`) to avoid the "confused deputy" problem. The list of disallowed IP address ranges was lacking some IP address ranges that can be used to reach local IP addresses. An attacker can use an IP address in the affected ranges to make Mastodon perform HTTP requests against loopback or local network hosts, potentially allowing access to otherwise private resources and services. This is fixed in Mastodon v4.5.4, v4.4.11, v4.3.17 and v4.2.29.

Statistics

  • 1 Post
  • 5 Interactions

Last activity: 23 hours ago

Fediverse

Profile picture

 XserverからMastodonに関して重大かつ緊急性の高いセキュリティ脆弱性が確認されたとのことで昨日メールが届いていた。@mstdn.mrmts.com のMastodonの現在のバージョンはv4.5.4です。ちのみに、@mstdn.jp のMastodonのバージョンはv4.1.25です。以下転載。

■発表された脆弱性
 CVE-2026-22245

■影響を受ける環境
 Mastodonをご利用の環境

■脆弱性を確認したバージョン
 v4.2.29未満
 v4.3.17未満
 v4.4.11未満
 v4.5.4未満

■脆弱性の影響
 脆弱性の悪用により、第三者がサーバー内部の情報へ
 不正にアクセスし、機密情報が漏洩する恐れがあります。

■対策
 開発元の指示に従い、脆弱性が修正された最新バージョンへのアップデート
 を適用してください。

■詳細について(外部サイト)
 nvd.nist.gov/vuln/detail/CVE-2

  • 3
  • 2
  • 0
  • 23h ago

Overview

  • n8n-io
  • n8n

07 Jan 2026
Published
12 Jan 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
2.96%

KEV

Description

n8n is an open source workflow automation platform. Versions starting with 1.65.0 and below 1.121.0 enable an attacker to access files on the underlying server through execution of certain form-based workflows. A vulnerable workflow could grant access to an unauthenticated remote attacker, resulting in exposure of sensitive information stored on the system and may enable further compromise depending on deployment configuration and workflow usage. This issue is fixed in version 1.121.0.

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 6 hours ago

Fediverse

Profile picture
Self-hosting n8n? Urgent one: CVE-2026-21858 (Ni8mare) is CVSS 10.0 and affects 1.65.0 to <1.121.0. Update to 1.121.0+ ASAP. If patching isn’t feasible today, restrict public access to webhook and form endpoints, or take the instance offline until you can update.

Video: https://www.youtube.com/watch?v=Ez5MDGG9Qck

#n8n #cybersecurity #selfhosting #infosec #homelab
  • 2
  • 1
  • 0
  • 6h ago
Showing 1 to 10 of 87 CVEs