24h | 7d | 30d

Overview

  • Google
  • Chrome

13 Feb 2026
Published
20 Feb 2026
Updated

CVSS
Pending
EPSS
0.34%

Description

Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

Statistics

  • 3 Posts
  • 5 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture fallback

Une vulnérabilité Chromium en pure CSS qui permet de récupérer des données sensibles comme le token CSRF (CVE-2026-2441)
sitepoint.com/zero-day-css-cve

Zero-Day CSS: Deconstructing CVE-2026-2441

#Chrome #Chromium #CSS #CSRF #CVE

  • 3
  • 2
  • 0
  • 14h ago
Profile picture fallback

Recent reports highlight significant activity across global sectors.

**Cybersecurity:** The University of Mississippi Medical Center closed clinics (Feb 23-24) following a ransomware attack. A critical Chromium zero-day (CVE-2026-2441) is actively exploited, mandating urgent patching for browsers. Figure Fintech reported a major 1 million account data breach stemming from a sophisticated vishing attack. The U.S. implemented new CIRCIA regulations, requiring critical infrastructure to report cyber incidents within 72 hours and ransom payments within 24 hours.

**Technology:** Google's $32 billion acquisition of Wiz has received European Commission approval, marking a significant consolidation in cloud security.

**Geopolitics:** U.S.-China competition continues to be a driving force, alongside new U.S. tariffs, contributing to global market volatility.

#Cybersecurity #Geopolitics #TechNews

  • 0
  • 0
  • 0
  • 17h ago
Profile picture fallback

BREAKING: 25M+ US Breach + Chrome Zero-Day + AI Malware (Feb 24,2026)

🚨 Conduent Breach Now Largest in US History - 25+ Million Affected 🚨
🌐 Chrome Zero-Day CVE-2026-2441 Actively Exploited 🌐
🤖 AI Prompts Are The New Malware 🤖

🔗 youtu.be/p4Ky1l4X_c4

  • 0
  • 0
  • 0
  • 1h ago

Overview

  • Microsoft
  • Windows 10 Version 1607

10 Feb 2026
Published
23 Feb 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
4.12%

Description

Protection mechanism failure in MSHTML Framework allows an unauthorized attacker to bypass a security feature over a network.

Statistics

  • 2 Posts
  • 3 Interactions

Last activity: 7 hours ago

Fediverse

Profile picture fallback

Akamai links recent MSHTML zero-day patched this month to APT28 operations

akamai.com/blog/security-resea

  • 3
  • 0
  • 0
  • 7h ago

Bluesky

Profile picture fallback
~Akamai~ Russian state-sponsored actor APT28 is actively exploiting a critical MSHTML vulnerability to bypass security features and execute arbitrary code. - IOCs: wellnesscaremed. com - #APT28 #CVE202621513 #ThreatIntel
  • 0
  • 0
  • 0
  • 20h ago

Overview

  • statamic
  • cms

24 Feb 2026
Published
24 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.3)
EPSS
Pending

KEV

Description

Statmatic is a Laravel and Git powered content management system (CMS). Prior to versions 6.3.3 and 5.73.10, an attacker may leverage a vulnerability in the password reset feature to capture a user's token and reset the password on their behalf. The attacker must know the email address of a valid account on the site, and the actual user must blindly click the link in their email even though they didn't request the reset. This has been fixed in 6.3.3 and 5.73.10.

Statistics

  • 2 Posts
  • 2 Interactions

Last activity: Last hour

Fediverse

Profile picture fallback

PSA for Statamic folks - update your sites ASAP! ⚠️

A CRITICAL vuln was discovered that allows full account takeover via password resets! 😱

All the details: cvereports.com/reports/CVE-202 #Laravel

  • 2
  • 0
  • 0
  • Last hour
Profile picture fallback

🚨 Statamic CMS CRITICAL vuln (CVE-2026-27593): Weak password reset lets attackers hijack accounts if users click a malicious link. Patch to 6.3.3/5.73.10+, educate users, enable MFA. Details: radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 1h ago

Overview

  • SolarWinds
  • Serv-U

24 Feb 2026
Published
24 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.03%

KEV

Description

A broken access control vulnerability exists in Serv-U which when exploited, gives a malicious actor the ability to create a system admin user and execute arbitrary code as a privileged account via domain admin or group admin privileges. This issue requires administrative privileges to abuse. On Windows deployments, the risk is scored as a medium because services frequently run under less-privileged service accounts by default.

Statistics

  • 3 Posts
  • 1 Interaction

Last activity: 5 hours ago

Bluesky

Profile picture fallback
The most severe of the four security flaws patched by SolarWinds today in Serv-U 15.5.4 is tracked as CVE-2025-40538, and it allows attackers with high privileges to gain root or admin permissions on vulnerable servers. www.bleepingcomputer.com/news/securit...
  • 0
  • 1
  • 1
  • 11h ago
Profile picture fallback
📌 CVE-2025-40538 - A broken access control vulnerability exists in Serv-U which when exploited, gives a malicious actor the ability to create a system admin user and exe... https://www.cyberhub.blog/cves/CVE-2025-40538
  • 0
  • 0
  • 0
  • 5h ago

Overview

  • Tenda
  • AC8

23 Feb 2026
Published
23 Feb 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.05%

KEV

Description

A vulnerability has been found in Tenda AC8 16.03.34.06. This affects the function webCgiGetUploadFile of the file /cgi-bin/UploadCfg of the component Httpd Service. The manipulation of the argument boundary leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

Statistics

  • 2 Posts

Last activity: 1 hour ago

Fediverse

Profile picture fallback

🚨 CVE-2026-3044: HIGH severity stack buffer overflow in Tenda AC8 (16.03.34.06) — remote exploit published! Restrict /cgi-bin/UploadCfg, monitor traffic, and disable remote mgmt. Await patches or consider device replacement. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 14h ago

Bluesky

Profile picture fallback
📌 CVE-2026-3044 - A vulnerability has been found in Tenda AC8 16.03.34.06. This affects the function webCgiGetUploadFile of the file /cgi-bin/UploadCfg of the component... https://www.cyberhub.blog/cves/CVE-2026-3044
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • Soliton Systems K.K.
  • FileZen

13 Feb 2026
Published
24 Feb 2026
Updated

CVSS v3.0
HIGH (8.8)
EPSS
0.33%

Description

FileZen contains an OS command injection vulnerability. When FileZen Antivirus Check Option is enabled, a logged-in user may send a specially crafted HTTP request to execute an arbitrary OS command.

Statistics

  • 2 Posts

Last activity: 4 hours ago

Bluesky

Profile picture fallback
~Cisa~ CISA warns of active exploitation of a command injection vulnerability (CVE-2026-25108) in Soliton Systems FileZen. - IOCs: CVE-2026-25108 - #CVE202625108 #ThreatIntel #Vulnerability
  • 0
  • 0
  • 0
  • 4h ago
Profile picture fallback
CISA、既知の悪用された脆弱性を1件カタログに追加 CISA Adds One Known Exploited Vulnerability to Catalog #CISA (Feb 24) CVE-2026-25108ソリトンシステムズ株式会社 FileZen OS コマンドインジェクション脆弱性 www.cisa.gov/news-events/...
  • 0
  • 0
  • 0
  • 4h ago

Overview

  • Apple
  • macOS

11 Feb 2026
Published
13 Feb 2026
Updated

CVSS
Pending
EPSS
0.43%

Description

A memory corruption issue was addressed with improved state management. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An attacker with memory write capability may be able to execute arbitrary code. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-14174 and CVE-2025-43529 were also issued in response to this report.

Statistics

  • 1 Post
  • 12 Interactions

Last activity: 2 hours ago

Fediverse

Profile picture fallback

Because the hits just keep on rolling, #Apple Pushes Emergency #iPhone #Update After ‘Extremely Sophisticated’ Spyware Attack.

So, this zero day is being exploited even as we speak. If you own Apple devices, go update now.

The flaw, tracked as CVE-2026-20700, is a memory corruption vulnerability in the system’s core components that could allow attackers to execute arbitrary code, potentially leading to device takeover, spyware installation, or data theft.

Why this matters:
The vulnerability is already being used in real-world, targeted attacks.
Attackers may exploit it via malicious websites or image files without user interaction.

How to update:
Go to Settings > General > Software Update.
Tap Download and Install.
Ensure your device is plugged in and connected to Wi-Fi.

Enable Automatic Updates to avoid missing future patches.

  • 8
  • 4
  • 0
  • 2h ago

Overview

  • Microsoft
  • Windows 10 Version 1507

14 Oct 2025
Published
22 Feb 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.10%

KEV

Description

Improper access control in Network Connection Status Indicator (NCSI) allows an authorized attacker to elevate privileges locally.

Statistics

  • 1 Post
  • 7 Interactions

Last activity: 4 hours ago

Fediverse

Profile picture fallback

It's a blog post I should have published months ago, but here we finally are.

"CVE-2025-59201 - Network Connection Status Indicator (NCSI) EoP"

Credit goes to t0zhang (on X) for the discovery.

👉 itm4n.github.io/cve-2025-59201

I'd like to write more of those but it's so time-consuming. 😔

  • 5
  • 2
  • 0
  • 4h ago

Overview

  • itsourcecode
  • Event Management System

23 Feb 2026
Published
23 Feb 2026
Updated

CVSS v4.0
MEDIUM (6.9)
EPSS
0.03%

KEV

Description

A vulnerability was detected in itsourcecode Event Management System 1.0. The affected element is an unknown function of the file /admin/index.php. Performing a manipulation of the argument ID results in sql injection. The attack is possible to be carried out remotely. The exploit is now public and may be used.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 2 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-3042 - A vulnerability was detected in itsourcecode Event Management System 1.0. The affected element is an unknown function of the file /admin/index.php. Pe... https://www.cyberhub.blog/cves/CVE-2026-3042
  • 0
  • 2
  • 0
  • 2h ago

Overview

  • FreePBX
  • filestore

07 Nov 2025
Published
13 Feb 2026
Updated

CVSS v4.0
HIGH (8.6)
EPSS
17.45%

Description

FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. In versions 17.0.2.36 and above before 17.0.3, the filestore module within the Administrative interface is vulnerable to a post-authentication command injection by an authenticated known user via the testconnection -> check_ssh_connect() function. An attacker can leverage this vulnerability to obtain remote access to the system as an asterisk user. This issue is fixed in version 17.0.3.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 5 hours ago

Bluesky

Profile picture fallback
IP data in our Compromised Website report, tagged 'freepbx-compromised' - www.shadowserver.org/what-we-do/n... Compromised FreePBX tracker: dashboard.shadowserver.org/statistics/c... Compromises are likely via CVE-2025-64328 Additional background from Fortinet: www.fortinet.com/blog/threat-...
  • 0
  • 1
  • 0
  • 5h ago
Showing 1 to 10 of 86 CVEs