Overview
Description
Statistics
- 24 Posts
- 6 Interactions
Fediverse
ICYMI: "Customers running Office 2021 and later will be automatically protected via a service-side change, but will be required to restart their Office applications for this to take effect."
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509
Microsoft veröffentlicht Notfall-Update für kritische Office-Sicherheitslücke CVE-2026-21509, die bereits aktiv ausgenutzt wird. Betroffen sind Versionen von Office 2016 bis #Microsoft365. https://winfuture.de/news,156440.html?utm_source=Mastodon&utm_medium=ManualStatus&utm_campaign=SocialMedia
Microsoft a patché en urgence une faille de sécurité zero-day dans Office : CVE-2026-21509 https://www.it-connect.fr/microsoft-office-faille-zero-day-cve-2026-21509/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #Microsoft #Office
The vulnerability, tracked as CVE-2026-21509, carries a CVSS score of 7.8 out of 10.0. It has been described as a security feature bypass in Microsoft Office. https://thehackernews.com/2026/01/microsoft-issues-emergency-patch-for.html
Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation https://thehackernews.com/2026/01/microsoft-issues-emergency-patch-for.html
[VULN] ⚠️"Une faille de Microsoft Office est activement exploitée par des pirates "
(NdR : cybercriminels et/ou opérateurs malveillants agissant pour le compte d’une entité soutenant les intérêts géopolitiques d’un État)
"Microsoft alerte sur une nouvelle faille critique dans Office. Déjà exploitée par des cybercriminels, la vulnérabilité permet de désactiver la sécurité mise en place par Microsoft. L’éditeur a commencé à déployer d’urgence un correctif pour Microsoft 365 et les versions récentes d’Office.
…
Pour protéger les internautes contre les attaques en cours, Microsoft a déployé une mise à jour qui « corrige la vulnérabilité qui contourne les mesures d’atténuation » d’Office. Les utilisateurs de Microsoft 365 et Microsoft Office sont invités à installer le correctif sans tarder.
Les utilisateurs d’Office 2021 et des versions ultérieures « seront automatiquement protégés grâce à une modification côté serveur, mais devront redémarrer leurs applications Office pour que cette modification prenne effet ». Il n’y a donc rien à faire, sauf redémarrer vos applications. Enfin, Microsoft n’a pas encore corrigé le tir sur Office 2016 et 2019. En attendant un correctif, Microsoft propose des mesures d’atténuation à ses utilisateurs."
👇
https://www.01net.com/actualites/faille-microsoft-office-activement-exploitee-pirates.html
🔬
⬇️
https://vulnerability.circl.lu/vuln/CVE-2026-21509
📜
⬇️
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509
Bluesky
Overview
Description
Statistics
- 11 Posts
- 19 Interactions
Fediverse
CVE-2026-24858
..... Allows an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts.....
‼️CVE-2026-24858: Fortinet Multiple Products Authentication Bypass Using an Alternate Path or Channel Vulnerability
Severity: Critical
CVSS: 9.8
Zero Day: Yes
CVE Published: January 27th, 2026
Advisory: https://github.com/advisories/GHSA-2x38-48vp-w23x
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0.15, FortiManager 7.6.0 through 7.6.5, FortiManager 7.4.0 through 7.4.9, FortiManager 7.2.0 through 7.2.11, FortiManager 7.0.0 through 7.0.15, FortiOS 7.6.0 through 7.6.5, FortiOS 7.4.0 through 7.4.10, FortiOS 7.2.0 through 7.2.12, FortiOS 7.0.0 through 7.0.18 may allow an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices.
🔴 CVE-2026-24858 - Critical (9.8)
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24858/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0.15, FortiManager 7.6.0 through 7.6.5, FortiManager 7.4.0 through 7.4.9, FortiManager 7.2.0 through 7.2.11, FortiManager 7.0.0 through 7.0.15, FortiOS ...
Bluesky
Overview
Description
Statistics
- 7 Posts
- 1 Interaction
Bluesky
Overview
- Meta
- react-server-dom-webpack
Description
Statistics
- 4 Posts
- 2 Interactions
Fediverse
https://www.akamai.com/blog/security-research/2026/jan/cve-2026-23864-react-nextjs-denial-of-service
Bluesky
Overview
Description
Statistics
- 5 Posts
- 7 Interactions
Fediverse
OpenSSL Security Advisory
https://openssl-library.org/news/secadv/20260127.txt
One high, one medium, and 9 low severity issues.
The high severity is a stack buffer overflow in CMS AuthEnvelopedData parsing (CVE-2025-15467): attacker provides an oversized IV, leading to buffer overflow prior to authentication, possibly leading to remote code execution if you're parsing untrusted CMS or PKCS#7 content with AEAD (e.g., AES-GCM).
Bluesky
Overview
Description
Statistics
- 3 Posts
- 1 Interaction
Bluesky
Overview
- sebastianbergmann
- phpunit
Description
Statistics
- 2 Posts
- 3 Interactions
Fediverse
RE: https://phpc.social/@sebastian/115965753874226093
This is CVE-2026-24765 now.
🟠 CVE-2026-24765 - High (7.8)
PHPUnit is a testing framework for PHP. A vulnerability has been discovered in versions prior to 12.5.8, 11.5.50, 10.5.62, 9.6.33, and 8.5.52 involving unsafe deserialization of code coverage data in PHPT test execution. The vulnerability exists i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24765/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
Overview
- nyariv
- SandboxJS
Description
Statistics
- 2 Posts
- 1 Interaction
Fediverse
🔴 CVE-2026-23830 - Critical (10)
SandboxJS is a JavaScript sandboxing library. Versions prior to 0.8.26 have a sandbox escape vulnerability due to `AsyncFunction` not being isolated in `SandboxFunction`. The library attempts to sandbox code execution by replacing the global `Func...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23830/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
Overview
Description
Statistics
- 3 Posts
Fediverse
Tracked as CVE-2024-37079 (CVSS score of 9.8), the flaw is described as an out-of-bounds write issue in the Distributed Computing Environment/Remote Procedure Calls (DCERPC) protocol implementation of vCenter Server. https://www.securityweek.com/2024-vmware-flaw-now-in-attackers-crosshairs/
Overview
Description
Statistics
- 2 Posts
- 4 Interactions