24h | 7d | 30d

Overview

  • Ivanti
  • Endpoint Manager Mobile

29 Jan 2026
Published
30 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
19.39%

Description

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

Statistics

  • 20 Posts
  • 7 Interactions

Last activity: 2 hours ago

Fediverse

Profile picture

🔴 CVE-2026-1281 - Critical (9.8)

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

  • 0
  • 0
  • 0
  • 17h ago
Profile picture

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

#ivanti #cybersecurity #vulnerabilitymanagement #vulnerability

vulnerability.circl.lu/vuln/CV

  • 0
  • 0
  • 0
  • 8h ago
Profile picture

⚠️ Alerte CERT-FR ⚠️

Les vulnérabilités critiques CVE-2026-1281 et CVE-2026-1340 affectant Ivanti Endpoint Manager Mobile sont activement exploitées dans le cadre d'attaques ciblées.
cert.ssi.gouv.fr/alerte/CERTFR

  • 1
  • 0
  • 1
  • 4h ago
Profile picture

: Two Ivanti EPMM Unauthenticated Vulnerabilities CVE-2026-1281 & CVE-2026-1340 Actively Exploited, Patch Now!
👇
thehackernews.com/2026/01/two-

  • 0
  • 0
  • 1
  • 6h ago
Profile picture

Ivanti warns of two EPMM flaws exploited in zero-day attacks
bleepingcomputer.com/news/secu
Ivanti has disclosed two critical vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2026-1281 and CVE-2026-1340, that have been exploited in zero-day attacks. Both are unauthenticated remote code execution flaws with a CVSS score of 9.8.
Ivanti confirmed a limited number of customers were impacted at the time of disclosure.
Successful exploitation could allow attackers to execute arbitrary code on vulnerable EPMM appliances and potentially access sensitive administrative, user and device data.
Mitigations are available via RPM scripts:
• RPM 12.x.0.x for EPMM 12.5.0.x, 12.6.0.x and 12.7.0.x
• RPM 12.x.1.x for EPMM 12.5.1.0 and 12.6.1.0
Ivanti states the updates require no downtime and have no functional impact. Organizations should apply the mitigations immediately.
CISA has added CVE-2026-1281 to its Known Exploited Vulnerabilities catalogue, reinforcing the urgency of remediation.

  • 0
  • 0
  • 0
  • 3h ago
Profile picture

Ivanti Provides Temporary Patches for Actively Exploited EPMM Zero-Day
helpnetsecurity.com/2026/01/30
Ivanti issued provisional patches for two critical EPMM vulnerabilities (including one exploited in the wild). Security teams should apply these immediately and plan for permanent updates in upcoming releases.

  • 0
  • 0
  • 0
  • 3h ago
Profile picture

Ivanti confirms active exploitation of EPMM zero-day RCE flaws (CVE-2026-1281, CVE-2026-1340).
Emergency patches released—apply immediately.

🔗 technadu.com/ivanti-epmm-zero-

  • 0
  • 0
  • 0
  • 2h ago

Bluesky

Profile picture
📢 Ivanti alerte sur deux failles critiques EPMM exploitées en zero‑day (CVE‑2026‑1281/1340) 📝 Source: BleepingComputer — Ivanti a divulgué deu… https://cyberveille.ch/posts/2026-01-30-ivanti-alerte-sur-deux-failles-critiques-epmm-exploitees-en-zero-day-cve-2026-1281-1340/ #CVE_2026_1281 #Cyberveille
  • 0
  • 1
  • 0
  • 7h ago
Profile picture
~Cisa~ CISA has added the actively exploited Ivanti EPMM code injection vulnerability (CVE-2026-1281) to its KEV catalog. - IOCs: CVE-2026-1281 - #CVE20261281 #Ivanti #ThreatIntel
  • 0
  • 0
  • 0
  • 11h ago
Profile picture
Ivanti provides temporary patches for actively exploited EPMM zero-day (CVE-2026-1281) 📖 Read more: www.helpnetsecurity.com/2026/01/30/i... #cybersecurity #cybersecuritynews #endpointmanagement #patch
  • 0
  • 0
  • 0
  • 7h ago
Profile picture
Security Advisory Ivanti Endpoint Manager Mobile (EPMM) (CVE-2026-1281 & CVE-2026-1340) forums.ivanti.com/s/article/Se...
  • 1
  • 2
  • 0
  • 18h ago
Profile picture
Ivanti has disclosed two critical vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2026-1281 and CVE-2026-1340, that were exploited in zero-day attacks.
  • 1
  • 1
  • 0
  • 17h ago
Profile picture
> 注意喚起: Ivanti Endpoint Manager Mobile(EPMM)の脆弱性(CVE-2026-1281、CVE-2026-1340)に関する注意喚起 (公開) https://www.jpcert.or.jp/at/2026/at260002.html
  • 0
  • 0
  • 0
  • 12h ago
Profile picture
Ivanti、ゼロデイ攻撃で悪用されているEPMMの脆弱性について警告(CVE-2026-1281、CVE-2026-1340) | Codebook|Security News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/43679/
  • 0
  • 0
  • 0
  • 11h ago
Profile picture
Two critical code-injection vulnerabilities (CVE-2026-1281 and CVE-2026-1340) enable unauthenticated remote code execution in Ivanti EPMM, exploited in zero-day attacks.
  • 0
  • 0
  • 1
  • 10h ago
Profile picture
Ivanti Endpoint Manager Mobile(EPMM)の脆弱性(CVE-2026-1281、CVE-2026-1340)に関する注意喚起 https://www.jpcert.or.jp/at/2026/at260002.html
  • 0
  • 0
  • 0
  • 8h ago
Profile picture
Security Advisory Ivanti Endpoint Manager Mobile (EPMM) (CVE-2026-1281 & CVE-2026-1340) #patchmanagement
  • 0
  • 0
  • 0
  • 7h ago

Overview

  • Ivanti
  • Endpoint Manager Mobile

29 Jan 2026
Published
30 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.16%

KEV

Description

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

Statistics

  • 16 Posts
  • 6 Interactions

Last activity: 2 hours ago

Fediverse

Profile picture

🔴 CVE-2026-1340 - Critical (9.8)

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

  • 0
  • 0
  • 0
  • 17h ago
Profile picture

⚠️ Alerte CERT-FR ⚠️

Les vulnérabilités critiques CVE-2026-1281 et CVE-2026-1340 affectant Ivanti Endpoint Manager Mobile sont activement exploitées dans le cadre d'attaques ciblées.
cert.ssi.gouv.fr/alerte/CERTFR

  • 1
  • 0
  • 1
  • 4h ago
Profile picture

: Two Ivanti EPMM Unauthenticated Vulnerabilities CVE-2026-1281 & CVE-2026-1340 Actively Exploited, Patch Now!
👇
thehackernews.com/2026/01/two-

  • 0
  • 0
  • 1
  • 6h ago
Profile picture

Ivanti warns of two EPMM flaws exploited in zero-day attacks
bleepingcomputer.com/news/secu
Ivanti has disclosed two critical vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2026-1281 and CVE-2026-1340, that have been exploited in zero-day attacks. Both are unauthenticated remote code execution flaws with a CVSS score of 9.8.
Ivanti confirmed a limited number of customers were impacted at the time of disclosure.
Successful exploitation could allow attackers to execute arbitrary code on vulnerable EPMM appliances and potentially access sensitive administrative, user and device data.
Mitigations are available via RPM scripts:
• RPM 12.x.0.x for EPMM 12.5.0.x, 12.6.0.x and 12.7.0.x
• RPM 12.x.1.x for EPMM 12.5.1.0 and 12.6.1.0
Ivanti states the updates require no downtime and have no functional impact. Organizations should apply the mitigations immediately.
CISA has added CVE-2026-1281 to its Known Exploited Vulnerabilities catalogue, reinforcing the urgency of remediation.

  • 0
  • 0
  • 0
  • 3h ago
Profile picture

Ivanti Provides Temporary Patches for Actively Exploited EPMM Zero-Day
helpnetsecurity.com/2026/01/30
Ivanti issued provisional patches for two critical EPMM vulnerabilities (including one exploited in the wild). Security teams should apply these immediately and plan for permanent updates in upcoming releases.

  • 0
  • 0
  • 0
  • 3h ago
Profile picture

Ivanti confirms active exploitation of EPMM zero-day RCE flaws (CVE-2026-1281, CVE-2026-1340).
Emergency patches released—apply immediately.

🔗 technadu.com/ivanti-epmm-zero-

  • 0
  • 0
  • 0
  • 2h ago

Bluesky

Profile picture
Security Advisory Ivanti Endpoint Manager Mobile (EPMM) (CVE-2026-1281 & CVE-2026-1340) forums.ivanti.com/s/article/Se...
  • 1
  • 2
  • 0
  • 18h ago
Profile picture
Ivanti has disclosed two critical vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2026-1281 and CVE-2026-1340, that were exploited in zero-day attacks.
  • 1
  • 1
  • 0
  • 17h ago
Profile picture
> 注意喚起: Ivanti Endpoint Manager Mobile(EPMM)の脆弱性(CVE-2026-1281、CVE-2026-1340)に関する注意喚起 (公開) https://www.jpcert.or.jp/at/2026/at260002.html
  • 0
  • 0
  • 0
  • 12h ago
Profile picture
Ivanti、ゼロデイ攻撃で悪用されているEPMMの脆弱性について警告(CVE-2026-1281、CVE-2026-1340) | Codebook|Security News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/43679/
  • 0
  • 0
  • 0
  • 11h ago
Profile picture
Two critical code-injection vulnerabilities (CVE-2026-1281 and CVE-2026-1340) enable unauthenticated remote code execution in Ivanti EPMM, exploited in zero-day attacks.
  • 0
  • 0
  • 1
  • 10h ago
Profile picture
Ivanti Endpoint Manager Mobile(EPMM)の脆弱性(CVE-2026-1281、CVE-2026-1340)に関する注意喚起 https://www.jpcert.or.jp/at/2026/at260002.html
  • 0
  • 0
  • 0
  • 8h ago
Profile picture
Security Advisory Ivanti Endpoint Manager Mobile (EPMM) (CVE-2026-1281 & CVE-2026-1340) #patchmanagement
  • 0
  • 0
  • 0
  • 7h ago

Overview

  • Fortinet
  • FortiProxy

27 Jan 2026
Published
29 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.4)
EPSS
3.63%

Description

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0.15, FortiManager 7.6.0 through 7.6.5, FortiManager 7.4.0 through 7.4.9, FortiManager 7.2.0 through 7.2.11, FortiManager 7.0.0 through 7.0.15, FortiOS 7.6.0 through 7.6.5, FortiOS 7.4.0 through 7.4.10, FortiOS 7.2.0 through 7.2.12, FortiOS 7.0.0 through 7.0.18, FortiProxy 7.6.0 through 7.6.4, FortiProxy 7.4.0 through 7.4.12, FortiProxy 7.2.0 through 7.2.15, FortiProxy 7.0.0 through 7.0.22, FortiWeb 8.0.0 through 8.0.3, FortiWeb 7.6.0 through 7.6.6, FortiWeb 7.4.0 through 7.4.11 may allow an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices.

Statistics

  • 5 Posts
  • 1 Interaction

Last activity: 7 hours ago

Bluesky

Profile picture
📢 Fortinet corrige le zero-day CVE-2026-24858 dans FortiCloud SSO exploité activement 📝 Selon Help Net Security, Fortinet a commencé à diffuser d… https://cyberveille.ch/posts/2026-01-30-fortinet-corrige-le-zero-day-cve-2026-24858-dans-forticloud-sso-exploite-activement/ #CVE_2026_24858 #Cyberveille
  • 0
  • 1
  • 0
  • 7h ago
Profile picture
The cybersecurity vendor on Tuesday disclosed CVE-2026-24858, a critical authentication bypass vulnerability with a CVSS score of 9.8 that affects FortiOS, FortiManager, FortiAnalyzer, FortiProxy, and FortiWeb.
  • 0
  • 0
  • 0
  • 22h ago
Profile picture
Fortinet confirmed a critical zero-day (CVE-2026-24858) enabling FortiCloud SSO login bypass. Active attacks led Fortinet to temporarily disable SSO and urge immediate patching. via @darkreading.bsky.social www.darkreading.com/vulnerabilit... #hacking #infosec #cybersecurity
  • 0
  • 0
  • 0
  • 20h ago
Profile picture
Fortinet、FortiCloud SSOの管理者ログインに認証バイパス 脆弱性、サイバー攻撃による実害も(CVE-2026-24858) rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #セキュリティ #Security #CybersecurityNews #DataBreach
  • 0
  • 0
  • 0
  • 17h ago

Overview

  • win.rar GmbH
  • WinRAR

08 Aug 2025
Published
21 Oct 2025
Updated

CVSS v4.0
HIGH (8.4)
EPSS
3.53%

Description

A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET.

Statistics

  • 5 Posts
  • 11 Interactions

Last activity: 3 hours ago

Fediverse

Profile picture

Sicherheitsloch in WinRAR wird reichlich ausgenutzt

Da Windows früher nicht mit komprimierten Dateien umgehen konnte, musste man sich mit zusätzlichen Tools helfen. Eines von denen war und ist WinRAR. Das dürfte immer noch als Altlast auf vielen Windows-Rechnern herumliegen. Das ist gefährlich, wenn es nicht aktualisiert wurde. Im Juli 2025 wurde ein Update (auf Version 7.13) veröffentlicht, mit dem eine kritische Sicherheitslücke (CVE-2025-8088) geschlossen wird. Diese Sicherheitslücke wird allerseits für Angriffe ausgenutzt, vom kommerziell interessierten Cybergangster bis zu staatlichen Hackern. Für einen Angriff reicht es aus, WinRAR ein speziell präpariertes Archiv (komprimierte Datei) unterzuschieben. Ist es

pc-fluesterer.info/wordpress/2

#Warnung #cybercrime #exploits #windows #wissen

  • 5
  • 4
  • 0
  • 5h ago
Profile picture

📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.

Sources:
- bleepingcomputer.com/news/secu
- cloud.google.com/blog/topics/t
- nvd.nist.gov/vuln/detail/CVE-2
- helpnetsecurity.com/2026/01/28

---

🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀

CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.

Sources:
- nvd.nist.gov/vuln/detail/CVE-2
infosecurity-magazine.com/news
- openssl-library.org/news/vulne
- twitter.com/IntCyberDigest/sta

---

🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡

SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.

Sources:
- bleepingcomputer.com/news/secu
- helpnetsecurity.com/2026/01/29
- rapid7.com/blog/post/etr-multi
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2

  • 0
  • 1
  • 0
  • 21h ago

Bluesky

Profile picture
NEW OUTBREAK ALERT: CVE-2025-8088 is a high-severity path traversal vulnerability in WinRAR that attackers exploit by leveraging Alternate Data Streams (ADS). #Explore our managed security and compliance solutions: kootek-consulting-ltd145108215.hubspotpagebuilder.eu
  • 0
  • 1
  • 0
  • 3h ago
Profile picture
Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088 #patchmanagement
  • 0
  • 0
  • 0
  • 20h ago
Profile picture
WinRARの脆弱性、ハッカーに悪用され続ける(CVE-2025-8088) | Codebook|Security News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/43660/
  • 0
  • 0
  • 0
  • 11h ago

Overview

  • GNU
  • Inetutils

21 Jan 2026
Published
29 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
33.90%

Description

telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable.

Statistics

  • 4 Posts
  • 5 Interactions

Last activity: 6 hours ago

Fediverse

Profile picture

Telnet è una tecnologia vecchia ma ancora presente in molti sistemi.
Nel video spiego cos’è, perché oggi rappresenta un rischio e cosa significa la vulnerabilità CVE-2026-24061 anche per chi non è un esperto di sicurezza.

Un modo semplice per capire perché alcuni servizi “storici” possono diventare un problema serio.

Video completo qui:
youtu.be/VJ98qp6mzqo

@linux @sicurezza #unoLinux

  • 1
  • 3
  • 0
  • 23h ago
Profile picture

New #synology #DSM Version: 7.3.2-86009 Update 1 is out.

This is a security patch:

Fixed Issues
- Fixed a security vulnerability regarding telnetd (CVE-2026-24061).

synology.com/en-global/release

#selfhosting #selfhosted #homelab

  • 1
  • 0
  • 0
  • 6h ago
Profile picture

Un accès root en une seule commande : cette faille dans GNU InetUtils menace les accès Telnet it-connect.fr/faille-cve-2026- #ActuCybersécurité #Cybersécurité #Vulnérabilité

  • 0
  • 0
  • 0
  • 23h ago

Bluesky

Profile picture
Telnetの公開サーバー約80万台へサイバー攻撃 リスク-GNU InetUtils telnetdの認証回避 脆弱性(CVE-2026-24061) rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #セキュリティ #Security #CybersecurityNews
  • 0
  • 0
  • 0
  • 15h ago

Overview

  • Ivanti
  • Connect Secure

08 Jan 2025
Published
21 Oct 2025
Updated

CVSS v3.1
CRITICAL (9.0)
EPSS
94.10%

Description

A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a remote unauthenticated attacker to achieve remote code execution.

Statistics

  • 4 Posts
  • 3 Interactions

Last activity: 22 hours ago

Fediverse

Profile picture

👀 Seeing who’s poking Ivanti Connect Secure?

GreyNoise just caught a ~100x spike in recon on CVE-2025-0282 featuring one loud AS213790 campaign and one sneaky botnet spread across 6K IPs.

We broke down the infra + what defenders should do next. 👇
labs.greynoise.io/grimoire/202

  • 1
  • 1
  • 1
  • 22h ago
Profile picture

☕ & - Two campaigns (100x spike!) are hitting Ivanti Connect Secure; one loud (34K sessions from Romania/Moldova), one stealthy (~6K distributed IPs). Both target a pre-exploitation endpoint for CVE-2025-0282. labs.greynoise.io/grimoire/202

  • 1
  • 0
  • 1
  • 22h ago

Overview

  • OpenSSL
  • OpenSSL

27 Jan 2026
Published
29 Jan 2026
Updated

CVSS
Pending
EPSS
0.44%

KEV

Description

Issue summary: Parsing CMS AuthEnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution. When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs. Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the CMS implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3 and 3.0 are vulnerable to this issue. OpenSSL 1.1.1 and 1.0.2 are not affected by this issue.

Statistics

  • 4 Posts
  • 1 Interaction

Last activity: 7 hours ago

Fediverse

Profile picture

Critical Vulnerabilities Allow Remote Attackers to Execute Malicious Code (CVE-2025-15467). Patches released:
👇
cybersecuritynews.com/openssl-

  • 0
  • 0
  • 1
  • 23h ago
Profile picture

🔴 CVE-2025-15467 - Critical (9.8)

Issue summary: Parsing CMS AuthEnvelopedData message with maliciously
crafted AEAD parameters can trigger a stack buffer overflow.

Impact summary: A stack buffer overflow may lead to a crash, causing Denial
of Service, or potentially remote code ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

  • 0
  • 0
  • 0
  • 7h ago
Profile picture

📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.

Sources:
- bleepingcomputer.com/news/secu
- cloud.google.com/blog/topics/t
- nvd.nist.gov/vuln/detail/CVE-2
- helpnetsecurity.com/2026/01/28

---

🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀

CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.

Sources:
- nvd.nist.gov/vuln/detail/CVE-2
infosecurity-magazine.com/news
- openssl-library.org/news/vulne
- twitter.com/IntCyberDigest/sta

---

🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡

SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.

Sources:
- bleepingcomputer.com/news/secu
- helpnetsecurity.com/2026/01/29
- rapid7.com/blog/post/etr-multi
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2

  • 0
  • 1
  • 0
  • 21h ago

Overview

  • Microsoft
  • Microsoft Office 2019

26 Jan 2026
Published
30 Jan 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
2.83%

Description

Reliance on untrusted inputs in a security decision in Microsoft Office allows an unauthorized attacker to bypass a security feature locally.

Statistics

  • 3 Posts

Last activity: 3 hours ago

Fediverse

Profile picture

Microsoft Office Zero-Day Vulnerability, CVE-2026-21509, Under Active Exploitation
cybersec.xmcyber.com/s/microso

  • 0
  • 0
  • 1
  • 16h ago

Bluesky

Profile picture
🚨 Security Alert 🚨 Microsoft Office zero-day (CVE-2026-21509) is being actively exploited. Attackers can bypass OLE security via crafted Office docs, leading to code execution & malware. 👉 www.sequretek.com/resources/th... #ZeroDay #CyberSecurity #ThreatIntel #MicrosoftOffice
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • SolarWinds
  • Web Help Desk

28 Jan 2026
Published
29 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.87%

KEV

Description

SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

Statistics

  • 3 Posts
  • 4 Interactions

Last activity: 16 hours ago

Fediverse

Profile picture

⚠️ Critical Solarwinds Web Vulnerability Allows Remote Code Execution and Security Bypass

「 Multiple critical vulnerabilities in SolarWinds Web Help Desk (WHD), culminating in unauthenticated remote code execution (RCE) via Java deserialization in CVE-2025-40551, were uncovered by Horizon3.ai researchers.
These flaws chain static credentials, security bypasses, and deserialization weaknesses, affecting versions prior to 2026.1 」

  • 0
  • 0
  • 0
  • 16h ago
Profile picture

‼️ SolarWinds Web Help Desk RCE Hit by Multiple Critical Security Flaws; CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, CVE-2025-40554

CVSS: All 9.8
CVEs Published: January 28th, 2026

CVE-2025-40551: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

CVE-2025-40552: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.

CVE-2025-40553: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

CVE-2025-40554: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.

Advisories:

nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2

  • 1
  • 2
  • 0
  • 21h ago
Profile picture

📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.

Sources:
- bleepingcomputer.com/news/secu
- cloud.google.com/blog/topics/t
- nvd.nist.gov/vuln/detail/CVE-2
- helpnetsecurity.com/2026/01/28

---

🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀

CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.

Sources:
- nvd.nist.gov/vuln/detail/CVE-2
infosecurity-magazine.com/news
- openssl-library.org/news/vulne
- twitter.com/IntCyberDigest/sta

---

🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡

SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.

Sources:
- bleepingcomputer.com/news/secu
- helpnetsecurity.com/2026/01/29
- rapid7.com/blog/post/etr-multi
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2

  • 0
  • 1
  • 0
  • 21h ago

Overview

  • choijun
  • LA-Studio Element Kit for Elementor

22 Jan 2026
Published
22 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.04%

KEV

Description

The LA-Studio Element Kit for Elementor plugin for WordPress is vulnerable to Administrative User Creation in all versions up to, and including, 1.5.6.3. This is due to the 'ajax_register_handle' function not restricting what user roles a user can register with. This makes it possible for unauthenticated attackers to supply the 'lakit_bkrole' parameter during registration and gain administrator access to the site.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 19 hours ago

Fediverse

Profile picture

‼️ CVE-2026-0920: Explanation and payload of the recent vulnerability in the LA-Studio Element WordPress plugin.

PoC/Exploit: github.com/John-doe-code-a11/C

CVSS: 9.8
CVE Published: January 22nd, 2026

Advisory: github.com/advisories/GHSA-m3h

Technical Analysis: wordfence.com/blog/2026/01/200

  • 0
  • 1
  • 0
  • 19h ago
Showing 1 to 10 of 67 CVEs