24h | 7d | 30d

Overview

  • Ivanti
  • Endpoint Manager Mobile

29 Jan 2026
Published
30 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
19.39%

Description

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

Statistics

  • 29 Posts
  • 5 Interactions

Last activity: 3 hours ago

Fediverse

Profile picture

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

#ivanti #cybersecurity #vulnerabilitymanagement #vulnerability

vulnerability.circl.lu/vuln/CV

  • 0
  • 0
  • 0
  • 21h ago
Profile picture

Latest News (Jan 29-30, 2026):

Tech: Apple plans "Apple Intelligence" with Google Gemini integration, coinciding with Google's Chrome "auto browse" launch. China approved Nvidia H200 chip sales to its tech giants.

Cybersecurity: The FBI launched "Operation Winter SHIELD" to protect critical infrastructure. A major ShinyHunters phishing campaign targets Okta SSO accounts, and Ivanti EPMM (CVE-2026-1281) is a newly exploited vulnerability.

#News #Anonymous #AnonNews_irc

  • 0
  • 0
  • 0
  • 8h ago
Profile picture

⚠️ Alerte CERT-FR ⚠️

Les vulnérabilités critiques CVE-2026-1281 et CVE-2026-1340 affectant Ivanti Endpoint Manager Mobile sont activement exploitées dans le cadre d'attaques ciblées.
cert.ssi.gouv.fr/alerte/CERTFR

  • 2
  • 0
  • 1
  • 17h ago
Profile picture

‼️ CVE-2026-1281 & CVE-2026-1340: A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

Zero-Day: Yes
CVSS: Both 9.8
CVE Published: January 29th, 2026
KEV Catalog: January 29th, 2026

Affected Vendor: Ivanti
Vulnerability Type: Remote Code Execution (RCE)

Advisory: forums.ivanti.com/s/article/Se

  • 1
  • 1
  • 0
  • 9h ago
Profile picture

: Two Ivanti EPMM Unauthenticated Vulnerabilities CVE-2026-1281 & CVE-2026-1340 Actively Exploited, Patch Now!
👇
thehackernews.com/2026/01/two-

  • 0
  • 0
  • 1
  • 18h ago
Profile picture

Ivanti warns of two EPMM flaws exploited in zero-day attacks
bleepingcomputer.com/news/secu
Ivanti has disclosed two critical vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2026-1281 and CVE-2026-1340, that have been exploited in zero-day attacks. Both are unauthenticated remote code execution flaws with a CVSS score of 9.8.
Ivanti confirmed a limited number of customers were impacted at the time of disclosure.
Successful exploitation could allow attackers to execute arbitrary code on vulnerable EPMM appliances and potentially access sensitive administrative, user and device data.
Mitigations are available via RPM scripts:
• RPM 12.x.0.x for EPMM 12.5.0.x, 12.6.0.x and 12.7.0.x
• RPM 12.x.1.x for EPMM 12.5.1.0 and 12.6.1.0
Ivanti states the updates require no downtime and have no functional impact. Organizations should apply the mitigations immediately.
CISA has added CVE-2026-1281 to its Known Exploited Vulnerabilities catalogue, reinforcing the urgency of remediation.

  • 0
  • 0
  • 1
  • 15h ago
Profile picture

Ivanti Provides Temporary Patches for Actively Exploited EPMM Zero-Day
helpnetsecurity.com/2026/01/30
Ivanti issued provisional patches for two critical EPMM vulnerabilities (including one exploited in the wild). Security teams should apply these immediately and plan for permanent updates in upcoming releases.

  • 0
  • 0
  • 0
  • 15h ago
Profile picture

Ivanti confirms active exploitation of EPMM zero-day RCE flaws (CVE-2026-1281, CVE-2026-1340).
Emergency patches released—apply immediately.

🔗 technadu.com/ivanti-epmm-zero-

  • 0
  • 0
  • 0
  • 15h ago
Profile picture

📰 CRITICAL: Ivanti Patches Two Actively Exploited RCE Zero-Days in EPMM

🚨 CRITICAL UPDATE: Ivanti patches two actively exploited zero-day RCEs (CVE-2026-1281, CVE-2026-1340) in EPMM. Both are CVSS 9.8. Unauthenticated attackers can gain full control. Patch immediately! #Ivanti #ZeroDay #CyberSecurity #RCE

🔗 cyber.netsecops.io/articles/iv

  • 0
  • 0
  • 0
  • 10h ago
Profile picture

Not sure I like that I didn’t need the explanation about variable expansion to understand wtf happened 😅

labs.watchtowr.com/someone-kno

  • 0
  • 0
  • 0
  • 8h ago

Bluesky

Profile picture
📢 Ivanti alerte sur deux failles critiques EPMM exploitées en zero‑day (CVE‑2026‑1281/1340) 📝 Source: BleepingComputer — Ivanti a divulgué deu… https://cyberveille.ch/posts/2026-01-30-ivanti-alerte-sur-deux-failles-critiques-epmm-exploitees-en-zero-day-cve-2026-1281-1340/ #CVE_2026_1281 #Cyberveille
  • 0
  • 1
  • 0
  • 19h ago
Profile picture
Ivanti provides temporary patches for actively exploited EPMM zero-day (CVE-2026-1281) 📖 Read more: www.helpnetsecurity.com/2026/01/30/i... #cybersecurity #cybersecuritynews #endpointmanagement #patch
  • 0
  • 0
  • 0
  • 20h ago
Profile picture
Ivanti、ゼロデイ攻撃で悪用されているEPMMの脆弱性について警告(CVE-2026-1281、CVE-2026-1340) | Codebook|Security News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/43679/
  • 0
  • 0
  • 0
  • 23h ago
Profile picture
Two critical code-injection vulnerabilities (CVE-2026-1281 and CVE-2026-1340) enable unauthenticated remote code execution in Ivanti EPMM, exploited in zero-day attacks.
  • 0
  • 0
  • 1
  • 23h ago
Profile picture
Ivanti Endpoint Manager Mobile(EPMM)の脆弱性(CVE-2026-1281、CVE-2026-1340)に関する注意喚起 https://www.jpcert.or.jp/at/2026/at260002.html
  • 0
  • 0
  • 0
  • 21h ago
Profile picture
Security Advisory Ivanti Endpoint Manager Mobile (EPMM) (CVE-2026-1281 & CVE-2026-1340) #patchmanagement
  • 0
  • 0
  • 0
  • 19h ago
Profile picture
Someone Knows Bash Far Too Well, And We Love It (Ivanti EPMM Pre-Auth RCEs CVE-2026-1281 & CVE-2026-1340) - watchTowr Labs
  • 0
  • 0
  • 3
  • 11h ago
Profile picture
🚨 On 1/29/26, #Ivanti disclosed 2 new critical vulnerabilities affecting Endpoint Manager Mobile (EPMM): CVE-2026-1281 & CVE-2026-1340. The vendor has indicated that exploitation in the wild has already occurred prior to disclosure. More in our blog: r-7.co/4qZBsaH
  • 0
  • 0
  • 0
  • 11h ago
Profile picture
🔓 𝗩𝘂𝗹𝗻𝗪𝗮𝘁𝗰𝗵 𝗙𝗿𝗶𝗱𝗮𝘆: 𝗖𝗩𝗘-𝟮𝟬𝟮𝟲-𝟭𝟮𝟴𝟭 Ivanti announced emergency patches for two critical vulnerabilities, tracked as CVE-2026-1281 and CVE-2026-1340, in EPMM that have been exploited in the wild as zero-days.
  • 0
  • 0
  • 0
  • 11h ago
Profile picture
📌 Expert Bash Exploitation Uncovered in Ivanti EPMM Pre-Auth RCE Vulnerabilities (CVE-2026-1281 & CVE-2026-1340) https://www.cyberhub.blog/article/18811-expert-bash-exploitation-uncovered-in-ivanti-epmm-pre-auth-rce-vulnerabilities-cve-2026-1281-cve-2026-1340
  • 0
  • 0
  • 0
  • 7h ago
Profile picture
Ivanti patched two critical EPMM zero-day RCE vulnerabilities (CVE-2026-1281, CVE-2026-1340) that were being exploited in the wild.
  • 0
  • 0
  • 0
  • 6h ago
Profile picture
The latest update for #ArcticWolf includes "CVE-2026-1281 and CVE-2026-1340: Unauthenticated RCE Zero-Day Vulnerabilities in Ivanti Endpoint Manager Mobile" and "CVE-2026-24858: FortiCloud SSO Authentication Bypass Vulnerability Exploited". #cybersecurity #infosec https://opsmtrs.com/2ZFbaTl
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • Ivanti
  • Endpoint Manager Mobile

29 Jan 2026
Published
30 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.16%

KEV

Description

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

Statistics

  • 25 Posts
  • 4 Interactions

Last activity: 3 hours ago

Fediverse

Profile picture

⚠️ Alerte CERT-FR ⚠️

Les vulnérabilités critiques CVE-2026-1281 et CVE-2026-1340 affectant Ivanti Endpoint Manager Mobile sont activement exploitées dans le cadre d'attaques ciblées.
cert.ssi.gouv.fr/alerte/CERTFR

  • 2
  • 0
  • 1
  • 17h ago
Profile picture

‼️ CVE-2026-1281 & CVE-2026-1340: A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

Zero-Day: Yes
CVSS: Both 9.8
CVE Published: January 29th, 2026
KEV Catalog: January 29th, 2026

Affected Vendor: Ivanti
Vulnerability Type: Remote Code Execution (RCE)

Advisory: forums.ivanti.com/s/article/Se

  • 1
  • 1
  • 0
  • 9h ago
Profile picture

: Two Ivanti EPMM Unauthenticated Vulnerabilities CVE-2026-1281 & CVE-2026-1340 Actively Exploited, Patch Now!
👇
thehackernews.com/2026/01/two-

  • 0
  • 0
  • 1
  • 18h ago
Profile picture

Ivanti warns of two EPMM flaws exploited in zero-day attacks
bleepingcomputer.com/news/secu
Ivanti has disclosed two critical vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2026-1281 and CVE-2026-1340, that have been exploited in zero-day attacks. Both are unauthenticated remote code execution flaws with a CVSS score of 9.8.
Ivanti confirmed a limited number of customers were impacted at the time of disclosure.
Successful exploitation could allow attackers to execute arbitrary code on vulnerable EPMM appliances and potentially access sensitive administrative, user and device data.
Mitigations are available via RPM scripts:
• RPM 12.x.0.x for EPMM 12.5.0.x, 12.6.0.x and 12.7.0.x
• RPM 12.x.1.x for EPMM 12.5.1.0 and 12.6.1.0
Ivanti states the updates require no downtime and have no functional impact. Organizations should apply the mitigations immediately.
CISA has added CVE-2026-1281 to its Known Exploited Vulnerabilities catalogue, reinforcing the urgency of remediation.

  • 0
  • 0
  • 1
  • 15h ago
Profile picture

Ivanti Provides Temporary Patches for Actively Exploited EPMM Zero-Day
helpnetsecurity.com/2026/01/30
Ivanti issued provisional patches for two critical EPMM vulnerabilities (including one exploited in the wild). Security teams should apply these immediately and plan for permanent updates in upcoming releases.

  • 0
  • 0
  • 0
  • 15h ago
Profile picture

Ivanti confirms active exploitation of EPMM zero-day RCE flaws (CVE-2026-1281, CVE-2026-1340).
Emergency patches released—apply immediately.

🔗 technadu.com/ivanti-epmm-zero-

  • 0
  • 0
  • 0
  • 15h ago
Profile picture

📰 CRITICAL: Ivanti Patches Two Actively Exploited RCE Zero-Days in EPMM

🚨 CRITICAL UPDATE: Ivanti patches two actively exploited zero-day RCEs (CVE-2026-1281, CVE-2026-1340) in EPMM. Both are CVSS 9.8. Unauthenticated attackers can gain full control. Patch immediately! #Ivanti #ZeroDay #CyberSecurity #RCE

🔗 cyber.netsecops.io/articles/iv

  • 0
  • 0
  • 0
  • 10h ago
Profile picture

Not sure I like that I didn’t need the explanation about variable expansion to understand wtf happened 😅

labs.watchtowr.com/someone-kno

  • 0
  • 0
  • 0
  • 8h ago

Bluesky

Profile picture
Ivanti、ゼロデイ攻撃で悪用されているEPMMの脆弱性について警告(CVE-2026-1281、CVE-2026-1340) | Codebook|Security News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/43679/
  • 0
  • 0
  • 0
  • 23h ago
Profile picture
Two critical code-injection vulnerabilities (CVE-2026-1281 and CVE-2026-1340) enable unauthenticated remote code execution in Ivanti EPMM, exploited in zero-day attacks.
  • 0
  • 0
  • 1
  • 23h ago
Profile picture
Ivanti Endpoint Manager Mobile(EPMM)の脆弱性(CVE-2026-1281、CVE-2026-1340)に関する注意喚起 https://www.jpcert.or.jp/at/2026/at260002.html
  • 0
  • 0
  • 0
  • 21h ago
Profile picture
Security Advisory Ivanti Endpoint Manager Mobile (EPMM) (CVE-2026-1281 & CVE-2026-1340) #patchmanagement
  • 0
  • 0
  • 0
  • 19h ago
Profile picture
Someone Knows Bash Far Too Well, And We Love It (Ivanti EPMM Pre-Auth RCEs CVE-2026-1281 & CVE-2026-1340) - watchTowr Labs
  • 0
  • 0
  • 3
  • 11h ago
Profile picture
🚨 On 1/29/26, #Ivanti disclosed 2 new critical vulnerabilities affecting Endpoint Manager Mobile (EPMM): CVE-2026-1281 & CVE-2026-1340. The vendor has indicated that exploitation in the wild has already occurred prior to disclosure. More in our blog: r-7.co/4qZBsaH
  • 0
  • 0
  • 0
  • 11h ago
Profile picture
🔓 𝗩𝘂𝗹𝗻𝗪𝗮𝘁𝗰𝗵 𝗙𝗿𝗶𝗱𝗮𝘆: 𝗖𝗩𝗘-𝟮𝟬𝟮𝟲-𝟭𝟮𝟴𝟭 Ivanti announced emergency patches for two critical vulnerabilities, tracked as CVE-2026-1281 and CVE-2026-1340, in EPMM that have been exploited in the wild as zero-days.
  • 0
  • 0
  • 0
  • 11h ago
Profile picture
📌 Expert Bash Exploitation Uncovered in Ivanti EPMM Pre-Auth RCE Vulnerabilities (CVE-2026-1281 & CVE-2026-1340) https://www.cyberhub.blog/article/18811-expert-bash-exploitation-uncovered-in-ivanti-epmm-pre-auth-rce-vulnerabilities-cve-2026-1281-cve-2026-1340
  • 0
  • 0
  • 0
  • 7h ago
Profile picture
Ivanti patched two critical EPMM zero-day RCE vulnerabilities (CVE-2026-1281, CVE-2026-1340) that were being exploited in the wild.
  • 0
  • 0
  • 0
  • 6h ago
Profile picture
The latest update for #ArcticWolf includes "CVE-2026-1281 and CVE-2026-1340: Unauthenticated RCE Zero-Day Vulnerabilities in Ivanti Endpoint Manager Mobile" and "CVE-2026-24858: FortiCloud SSO Authentication Bypass Vulnerability Exploited". #cybersecurity #infosec https://opsmtrs.com/2ZFbaTl
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • win.rar GmbH
  • WinRAR

08 Aug 2025
Published
21 Oct 2025
Updated

CVSS v4.0
HIGH (8.4)
EPSS
3.53%

Description

A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET.

Statistics

  • 4 Posts
  • 11 Interactions

Last activity: 9 hours ago

Fediverse

Profile picture

Sicherheitsloch in WinRAR wird reichlich ausgenutzt

Da Windows früher nicht mit komprimierten Dateien umgehen konnte, musste man sich mit zusätzlichen Tools helfen. Eines von denen war und ist WinRAR. Das dürfte immer noch als Altlast auf vielen Windows-Rechnern herumliegen. Das ist gefährlich, wenn es nicht aktualisiert wurde. Im Juli 2025 wurde ein Update (auf Version 7.13) veröffentlicht, mit dem eine kritische Sicherheitslücke (CVE-2025-8088) geschlossen wird. Diese Sicherheitslücke wird allerseits für Angriffe ausgenutzt, vom kommerziell interessierten Cybergangster bis zu staatlichen Hackern. Für einen Angriff reicht es aus, WinRAR ein speziell präpariertes Archiv (komprimierte Datei) unterzuschieben. Ist es

pc-fluesterer.info/wordpress/2

#Warnung #cybercrime #exploits #windows #wissen

  • 5
  • 5
  • 0
  • 17h ago

Bluesky

Profile picture
NEW OUTBREAK ALERT: CVE-2025-8088 is a high-severity path traversal vulnerability in WinRAR that attackers exploit by leveraging Alternate Data Streams (ADS). #Explore our managed security and compliance solutions: kootek-consulting-ltd145108215.hubspotpagebuilder.eu
  • 0
  • 1
  • 0
  • 15h ago
Profile picture
WinRARの脆弱性、ハッカーに悪用され続ける(CVE-2025-8088) | Codebook|Security News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/43660/
  • 0
  • 0
  • 0
  • 23h ago
Profile picture
📢 Exploitation massive de la faille WinRAR CVE-2025-8088 par des acteurs étatiques et criminels 📝 Source: Google Threat Intelligence Gro… https://cyberveille.ch/posts/2026-01-29-exploitation-massive-de-la-faille-winrar-cve-2025-8088-par-des-acteurs-etatiques-et-criminels/ #CVE_2025_8088 #Cyberveille
  • 0
  • 0
  • 0
  • 9h ago

Overview

  • GNU
  • Inetutils

21 Jan 2026
Published
29 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
33.90%

Description

telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 1 hour ago

Fediverse

Profile picture

New #synology #DSM Version: 7.3.2-86009 Update 1 is out.

This is a security patch:

Fixed Issues
- Fixed a security vulnerability regarding telnetd (CVE-2026-24061).

synology.com/en-global/release

#selfhosting #selfhosted #homelab

  • 1
  • 0
  • 0
  • 19h ago

Bluesky

Profile picture
📌 Critical Vulnerability CVE-2026-24061 Discovered in GNU InetUtils Affecting Telnet Access https://www.cyberhub.blog/article/18826-critical-vulnerability-cve-2026-24061-discovered-in-gnu-inetutils-affecting-telnet-access
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • Fortinet
  • FortiProxy

27 Jan 2026
Published
29 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.4)
EPSS
3.63%

Description

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0.15, FortiManager 7.6.0 through 7.6.5, FortiManager 7.4.0 through 7.4.9, FortiManager 7.2.0 through 7.2.11, FortiManager 7.0.0 through 7.0.15, FortiOS 7.6.0 through 7.6.5, FortiOS 7.4.0 through 7.4.10, FortiOS 7.2.0 through 7.2.12, FortiOS 7.0.0 through 7.0.18, FortiProxy 7.6.0 through 7.6.4, FortiProxy 7.4.0 through 7.4.12, FortiProxy 7.2.0 through 7.2.15, FortiProxy 7.0.0 through 7.0.22, FortiWeb 8.0.0 through 8.0.3, FortiWeb 7.6.0 through 7.6.6, FortiWeb 7.4.0 through 7.4.11 may allow an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices.

Statistics

  • 3 Posts
  • 1 Interaction

Last activity: 3 hours ago

Bluesky

Profile picture
📢 Fortinet corrige le zero-day CVE-2026-24858 dans FortiCloud SSO exploité activement 📝 Selon Help Net Security, Fortinet a commencé à diffuser d… https://cyberveille.ch/posts/2026-01-30-fortinet-corrige-le-zero-day-cve-2026-24858-dans-forticloud-sso-exploite-activement/ #CVE_2026_24858 #Cyberveille
  • 0
  • 1
  • 0
  • 19h ago
Profile picture
The latest update for #Foresiet includes "CVE-2026-24858: Fortinet Multiple Products Authentication Bypass Zero-Day Analysis" and "Emerging Ransomware Threat: Reverse Engineering the Green Blood Group Golang Payload". #cybersecurity #infosec https://opsmtrs.com/3J3CMGz
  • 0
  • 0
  • 0
  • 3h ago
Profile picture
The latest update for #ArcticWolf includes "CVE-2026-1281 and CVE-2026-1340: Unauthenticated RCE Zero-Day Vulnerabilities in Ivanti Endpoint Manager Mobile" and "CVE-2026-24858: FortiCloud SSO Authentication Bypass Vulnerability Exploited". #cybersecurity #infosec https://opsmtrs.com/2ZFbaTl
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • n8n

27 Jan 2026
Published
27 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.9)
EPSS
0.31%

KEV

Description

n8n contains a critical Remote Code Execution (RCE) vulnerability in its workflow Expression evaluation system. Expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime. An authenticated attacker could abuse this behavior to execute arbitrary code with the privileges of the n8n process. Successful exploitation may lead to full compromise of the affected instance, including unauthorized access to sensitive data, modification of workflows, and execution of system-level operations.

Statistics

  • 2 Posts

Last activity: 12 hours ago

Bluesky

Profile picture
Deux failles critiques dans n8n permettent l'exécution de code à distance via une injection eval (CVE-2026-1470, CVSS 9.9) pour utilisateurs authentifiés. Protégez vos workflows ! ⚠️ #n8n #CyberSecurity #Automatisation
  • 0
  • 0
  • 0
  • 21h ago
Profile picture
Researchers at JFrog who discovered the vulnerabilities assigned a critical severity score of 9.9 for one of them (CVE-2026-1470), and a high severity score of 8.5 to the second (CVE-2026-0863). www.darkreading.com/vulnerab...
  • 0
  • 0
  • 0
  • 12h ago

Overview

  • Gemini MCP Tool
  • gemini-mcp-tool

23 Jan 2026
Published
23 Jan 2026
Updated

CVSS v3.0
CRITICAL (9.8)
EPSS
1.27%

KEV

Description

gemini-mcp-tool execAsync Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of gemini-mcp-tool. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the execAsync method. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-27783.

Statistics

  • 1 Post
  • 4 Interactions

Last activity: 9 hours ago

Fediverse

Profile picture

‼️ CVE-2026-0755: Reported Zero-Day in Gemini MCP Tool Could Allow Remote Code Execution

Zero-Day: Yes
CVSS: 9.8
CVE Published: January 23rd, 2026

Affected Vendor: Gemini MCP Tool
Vulnerability Type: Remote Code Execution (RCE)

Advisory: github.com/advisories/GHSA-28q

  • 2
  • 2
  • 0
  • 9h ago

Overview

  • Synacor
  • Zimbra Server

16 Aug 2022
Published
17 Sep 2024
Updated

CVSS
Pending
EPSS
5.12%

KEV

Description

Zimbra's sudo configuration permits the zimbra user to execute the zmslapd binary as root with arbitrary parameters. As part of its intended functionality, zmslapd can load a user-defined configuration file, which includes plugins in the form of .so files, which also execute as root.

Statistics

  • 1 Post
  • 4 Interactions

Last activity: 6 hours ago

Fediverse

Profile picture

@Weld When I was at Rapid7, we were firm that we wouldn't sign anything preventing us from disclosing. Sometimes that made it real difficult to talk to the company

Sadly the link to the disclosure is dead now, but this was my favourite: attackerkb.com/topics/92AeLOE1

  • 0
  • 4
  • 0
  • 6h ago

Overview

  • 7-Zip
  • 7-Zip

19 Nov 2025
Published
21 Nov 2025
Updated

CVSS v3.0
HIGH (7.0)
EPSS
0.37%

KEV

Description

7-Zip ZIP File Parsing Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of 7-Zip. Interaction with this product is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the handling of symbolic links in ZIP files. Crafted data in a ZIP file can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of a service account. Was ZDI-CAN-26753.

Statistics

  • 1 Post

Last activity: 18 hours ago

Fediverse

Profile picture

@TeddyTheBest Yes it is open source but it is a little tough to claim the moral high ground here when 7-Zip also frequently has security issues and like WinRAR offers no autoupdate

nvd.nist.gov/vuln/detail/CVE-2

  • 0
  • 0
  • 0
  • 18h ago

Overview

  • Totolink
  • A3600R

30 Jan 2026
Published
30 Jan 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
Pending

KEV

Description

A security flaw has been discovered in Totolink A3600R 5.9c.4959. This issue affects the function setAppEasyWizardConfig in the library /lib/cste_modules/app.so. Performing a manipulation of the argument apcliSsid results in buffer overflow. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks.

Statistics

  • 2 Posts

Last activity: 11 hours ago

Fediverse

Profile picture

🟠 CVE-2026-1686 - High (8.8)

A security flaw has been discovered in Totolink A3600R 5.9c.4959. This issue affects the function setAppEasyWizardConfig in the library /lib/cste_modules/app.so. Performing a manipulation of the argument apcliSsid results in buffer overflow. It is...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

  • 0
  • 0
  • 1
  • 11h ago
Showing 1 to 10 of 45 CVEs