24h | 7d | 30d

Overview

  • BeyondTrust
  • Remote Support(RS) & Privileged Remote Access(PRA)

06 Feb 2026
Published
14 Feb 2026
Updated

CVSS v4.0
CRITICAL (9.9)
EPSS
49.74%

Description

BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user.

Statistics

  • 7 Posts

Last activity: 3 hours ago

Fediverse

Profile picture fallback

Attackers are actively exploiting CVE-2026-1731, a critical vulnerability in BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA), to deploy tools like VShell, gain persistence, and move laterally within compromised systems. This pre-authentication remote code execution flaw, with a CVSS score of 9.9, allows unauthenticated attackers to run operating system commands remotely, leading to potential full system compromise and data theft.
securityaffairs.com/188370/hac

  • 0
  • 0
  • 0
  • 22h ago
Profile picture fallback

Geopolitical tensions heighten as US-Iran nuclear talks near. Technology advances with Tesla's Cybercab launch and Uber's significant investment in autonomous EV charging. Cybersecurity faces active exploitation of CVE-2026-1731 in BeyondTrust products, AI-powered FortiGate breaches, and AI-assisted malware from MuddyWater.

#Cybersecurity #TechNews #Geopolitics

  • 0
  • 0
  • 0
  • 21h ago
Profile picture fallback

Critical BeyondTrust RCE (CVE-2026-1731) was exploited within 24 hours of PoC release.

The gap between disclosure and exploitation is basically gone.
If you’re waiting days to patch, attackers aren’t.

thehackernews.com/2026/02/week

  • 0
  • 0
  • 0
  • 17h ago

Bluesky

Profile picture fallback
VShell and SparkRAT Observed in Exploitation of BeyondTrust Critical Vulnerability (CVE-2026-1731) unit42.paloaltonetworks.com/beyondtrust-...
  • 0
  • 0
  • 0
  • 22h ago
Profile picture fallback
Critical BeyondTrust RCE (CVE-2026-1731) was exploited within 24 hours of PoC release. The gap between disclosure and exploitation is basically gone. If you’re waiting days to patch, attackers aren’t. thehackernews.com/2026/02/week... #CyberSecurity #ZeroDay #PatchNow
  • 0
  • 0
  • 0
  • 17h ago
Profile picture fallback
CVE-2026-1731 fuels ongoing attacks on BeyondTrust remote access products
  • 0
  • 0
  • 0
  • 16h ago
Profile picture fallback
📌 Critical Vulnerability CVE-2026-1731 Exploited in BeyondTrust Remote Access Products https://www.cyberhub.blog/article/20116-critical-vulnerability-cve-2026-1731-exploited-in-beyondtrust-remote-access-products
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • Google
  • Chrome

13 Feb 2026
Published
20 Feb 2026
Updated

CVSS
Pending
EPSS
0.39%

Description

Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

Statistics

  • 3 Posts
  • 2 Interactions

Last activity: Last hour

Fediverse

Profile picture fallback

Une vulnérabilité Chromium en pure CSS qui permet de récupérer des données sensibles comme le token CSRF (CVE-2026-2441)
sitepoint.com/zero-day-css-cve

Zero-Day CSS: Deconstructing CVE-2026-2441

#Chrome #Chromium #CSS #CSRF #CVE

  • 2
  • 0
  • 0
  • Last hour
Profile picture fallback

Recent reports highlight significant activity across global sectors.

**Cybersecurity:** The University of Mississippi Medical Center closed clinics (Feb 23-24) following a ransomware attack. A critical Chromium zero-day (CVE-2026-2441) is actively exploited, mandating urgent patching for browsers. Figure Fintech reported a major 1 million account data breach stemming from a sophisticated vishing attack. The U.S. implemented new CIRCIA regulations, requiring critical infrastructure to report cyber incidents within 72 hours and ransom payments within 24 hours.

**Technology:** Google's $32 billion acquisition of Wiz has received European Commission approval, marking a significant consolidation in cloud security.

**Geopolitics:** U.S.-China competition continues to be a driving force, alongside new U.S. tariffs, contributing to global market volatility.

#Cybersecurity #Geopolitics #TechNews

  • 0
  • 0
  • 0
  • 3h ago

Overview

  • Grandstream
  • GXP1610

18 Feb 2026
Published
18 Feb 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.14%

KEV

Description

An unauthenticated stack-based buffer overflow vulnerability exists in the HTTP API endpoint /cgi-bin/api.values.get. A remote attacker can leverage this vulnerability to achieve unauthenticated remote code execution (RCE) with root privileges on a target device. The vulnerability affects all six device models in the series: GXP1610, GXP1615, GXP1620, GXP1625, GXP1628, and GXP1630.

Statistics

  • 2 Posts

Last activity: 18 hours ago

Fediverse

Profile picture fallback

CVE-2026-2329 — Critical VoIP RCE
Affects: Grandstream GXP1600
Type: Stack-based buffer overflow
Impact: Unauthenticated RCE (root)

Attack Path:
• Extract SIP credentials
• Modify SIP proxy settings
• Transparent call interception

Operational risk:
• SMB exposure
• Flat networks
• Insufficient VoIP monitoring

Patch available: Firmware 1.0.7.81.
Community question:
Are you incorporating VoIP firmware into vulnerability scanning pipelines?

Do you log and monitor SIP configuration changes?

Source: securityweek.com/critical-gran

Engage below and follow TechNadu for detailed CVE intelligence and technical breakdowns.

  • 0
  • 0
  • 0
  • 18h ago

Bluesky

Profile picture fallback
Critical VoIP flaw: CVE-2026-2329 Grandstream GXP1600 phones vulnerable to: • Unauthenticated RCE • Root access • SIP credential theft • Silent call interception Patch available (1.0.7.81). Are VoIP devices part of your security posture review? #CyberSecurity #VoIP #CVE20262329 #Infosec #ThreatIntel
  • 0
  • 0
  • 0
  • 18h ago

Overview

  • Microsoft Corporation
  • Equation Editor

10 Jan 2018
Published
21 Oct 2025
Updated

CVSS
Pending
EPSS
93.89%

Description

Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allow a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE is unique from CVE-2018-0797 and CVE-2018-0812.

Statistics

  • 2 Posts

Last activity: 2 hours ago

Fediverse

Profile picture fallback

A new phishing campaign is using a malicious Excel exploit (CVE-2018-0802) to hide the XWorm 7.2 malware within seemingly normal JPEG files, which then hijacks PCs by using a technique called process hollowing to disguise itself as a legitimate Windows program.
hackread.com/hackers-excel-exp

  • 0
  • 0
  • 0
  • 22h ago

Bluesky

Profile picture fallback
Excelの古い脆弱性、XWormマルウェア配布に悪用される(CVE-2018-0802) | Codebook|Security News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/44084/
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • microsoft
  • semantic-kernel

19 Feb 2026
Published
20 Feb 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
0.08%

KEV

Description

Semantic Kernel, Microsoft's semantic kernel Python SDK, has a remote code execution vulnerability in versions prior to 1.39.4, specifically within the `InMemoryVectorStore` filter functionality. The problem has been fixed in version `python-1.39.4`. Users should upgrade this version or higher. As a workaround, avoid using `InMemoryVectorStore` for production scenarios.

Statistics

  • 1 Post
  • 8 Interactions

Last activity: 15 hours ago

Fediverse

Profile picture fallback

been thinking about CVE-2026-26030 and why the patch feels hollow. they added a confirmation flag. opt-in. the default is still trust. that's not a security fix, that's a liability fix. wrote it up: dev.to/dendrite_soup/opt-in-sa #infosec #aisecurity

  • 5
  • 3
  • 0
  • 15h ago

Overview

  • D-Link
  • DIR-803

11 Dec 2025
Published
11 Dec 2025
Updated

CVSS v4.0
MEDIUM (6.9)
EPSS
6.94%

KEV

Description

A vulnerability was detected in D-Link DIR-803 up to 1.04. Impacted is an unknown function of the file /getcfg.php of the component Configuration Handler. The manipulation of the argument AUTHORIZED_GROUP results in information disclosure. The attack may be performed from remote. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 21 hours ago

Fediverse

Profile picture fallback

🚨 This week’s CrowdSec Threat Alert: CVE-2025-14528, a remotely exploitable vulnerability in end-of-life D-Link DIR-803 routers, is exposing admin credentials and opening the door to botnet recruitment.

Discover how the exploit works, what early scanning activity reveals, and why legacy routers remain prime low-level cybercriminal targets in our latest article 👉 crowdsec.net/vulntracking-repo

  • 1
  • 0
  • 0
  • 21h ago

Overview

  • vercel
  • next.js

21 Mar 2025
Published
08 Apr 2025
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
92.90%

KEV

Description

Next.js is a React framework for building full-stack web applications. Starting in version 1.11.4 and prior to versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application. This vulnerability is fixed in 12.3.5, 13.5.9, 14.2.25, and 15.2.3.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 15 hours ago

Bluesky

Profile picture fallback
Nextjs Middleware Bypass Flaw (CVE-2025-29927): A Deep Dive into the Vulnerability and How to Secure Your Apps + Video Introduction: A critical security flaw, designated CVE-2025-29927, has been uncovered in the popular React framework, Next.js. This vulnerability allows attackers to bypass…
  • 0
  • 1
  • 0
  • 15h ago

Overview

  • Tenda
  • A21

21 Feb 2026
Published
23 Feb 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.05%

KEV

Description

A security vulnerability has been detected in Tenda A21 1.0.0.0. This vulnerability affects the function set_device_name of the file /goform/setBlackRule of the component MAC Filtering Configuration Endpoint. Such manipulation of the argument devName/mac leads to stack-based buffer overflow. The attack may be performed from remote. The exploit has been disclosed publicly and may be used.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 7 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-2872 - A security vulnerability has been detected in Tenda A21 1.0.0.0. This vulnerability affects the function set_device_name of the file /goform/setBlackR... https://www.cyberhub.blog/cves/CVE-2026-2872
  • 0
  • 1
  • 0
  • 7h ago

Overview

  • parallax
  • jsPDF

19 Feb 2026
Published
19 Feb 2026
Updated

CVSS v3.1
HIGH (8.1)
EPSS
0.03%

KEV

Description

jsPDF is a library to generate PDFs in JavaScript. Prior to 4.2.0, user control of the argument of the `addJS` method allows an attacker to inject arbitrary PDF objects into the generated document. By crafting a payload that escapes the JavaScript string delimiter, an attacker can execute malicious actions or alter the document structure, impacting any user who opens the generated PDF. The vulnerability has been fixed in jspdf@4.2.0. As a workaround, escape parentheses in user-provided JavaScript code before passing them to the `addJS` method.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 22 hours ago

Fediverse

Profile picture fallback

A critical jsPDF flaw (CVE-2026-25755) with a CVSS score of 8.8 allows PDF Object Injection through the addJS method, potentially exposing millions of developers and users to malicious code execution. The vulnerability, present in versions prior to 4.1.0, can be mitigated by upgrading to version 4.1.0 or later and validating all user inputs.
gbhackers.com/jspdf-millions-d

  • 0
  • 1
  • 0
  • 22h ago

Overview

  • OneUptime
  • oneuptime

21 Feb 2026
Published
21 Feb 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
0.05%

KEV

Description

OneUptime is a solution for monitoring and managing online services. In versions 9.5.13 and below, custom JavaScript monitor feature uses Node.js's node:vm module (explicitly documented as not a security mechanism) to execute user-supplied code, allowing trivial sandbox escape via a well-known one-liner that grants full access to the underlying process. Because the probe runs with host networking and holds all cluster credentials (ONEUPTIME_SECRET, DATABASE_PASSWORD, REDIS_PASSWORD, CLICKHOUSE_PASSWORD) in its environment variables, and monitor creation is available to the lowest role (ProjectMember) with open registration enabled by default, any anonymous user can achieve full cluster compromise in about 30 seconds. This issue has been fixed in version 10.0.5.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 13 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-27574 - OneUptime is a solution for monitoring and managing online services. In versions 9.5.13 and below, custom JavaScript monitor feature uses Node.js's no... https://www.cyberhub.blog/cves/CVE-2026-27574
  • 0
  • 1
  • 0
  • 13h ago
Showing 1 to 10 of 92 CVEs