24h | 7d | 30d

Overview

  • Fortinet
  • FortiOS

09 Dec 2025
Published
14 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
2.27%

Description

A improper verification of cryptographic signature vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0.0 through 7.0.17, FortiProxy 7.6.0 through 7.6.3, FortiProxy 7.4.0 through 7.4.10, FortiProxy 7.2.0 through 7.2.14, FortiProxy 7.0.0 through 7.0.21, FortiSwitchManager 7.2.0 through 7.2.6, FortiSwitchManager 7.0.0 through 7.0.5 allows an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML response message.

Statistics

  • 4 Posts
  • 5 Interactions

Last activity: 17 hours ago

Fediverse

Profile picture

Cyber-kriminelle har iværksat en ny bølge af angreb mod Fortinets FortiGate-firewalls ved hjælp af en sårbarhed, der blev patchet ukorrekt i sidste måned

Sikkerhedsfirmaet Arctic Wolf siger, at hackere omgår Single Sign-On (SSO)-godkendelse ved hjælp af generiske brugernavne, opretter deres egen administrator-konto for fremtidig adgang og stjæler enhedens aktuelle konfigurationsfil

.. bekræftet, at angriberne har fundet en ny måde at udnytte CVE-2025-59718 på
arcticwolf.com/resources/blog/

  • 1
  • 1
  • 0
  • 23h ago
Profile picture

Arctic Wolf observes malicious configuration changes on Fortinet FortiGate devices via SSO accounts
Source: arcticwolf.com/resources/blog/
Arctic Wolf reports a new cluster of automated attacks observed from Jan. 15, 2026, involving unauthorized configuration changes on FortiGate firewalls. The activity includes creation of generic accounts for persistence, VPN access being granted to those accounts, and exfiltration of firewall configurations.
The campaign resembles activity Arctic Wolf disclosed in December 2025, which involved malicious SSO logins to administrator accounts followed by configuration changes and data exfiltration. Arctic Wolf has active detections in place and is alerting affected customers as additional cases are identified.
The activity follows Fortinet’s December advisory on two critical authentication bypass vulnerabilities, CVE-2025-59718 and CVE-2025-59719, which allow unauthenticated SSO access via crafted SAML messages when FortiCloud SSO is enabled. Affected products include FortiOS, FortiWeb, FortiProxy and FortiSwitchManager. It remains unclear whether the latest activity is fully mitigated by the existing patches.

  • 0
  • 0
  • 0
  • 17h ago

Bluesky

Profile picture
Fortigate Firewalls Hacked in Seconds: How Attackers Are Exploiting SSO Flaws to Own Your Network + Video Introduction: A critical vulnerability pair in Fortinet FortiGate firewalls (CVE-2025-59718 and CVE-2025-59719) is being actively exploited in automated attacks, allowing threat actors to…
  • 0
  • 0
  • 0
  • 18h ago

Overview

  • VMware vCenter Server

18 Jun 2024
Published
24 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
53.78%

Description

vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.

Statistics

  • 4 Posts
  • 1 Interaction

Last activity: 8 hours ago

Fediverse

Profile picture

Here's a summary of the latest in technology and cybersecurity from the last 24 hours:

**Cybersecurity:** Marlink Cyber revealed a critical DNS DoS flaw in ISC BIND (Jan 22). CISA added a Broadcom VMware vCenter vulnerability (CVE-2024-37079) to its exploited list (Jan 23). CISA & NSA warned of Chinese state-sponsored BRICKSTORM malware targeting gov networks (Jan 22).

**Technology:** Apple's Siri AI training is reportedly shifting to Google's TPUs (Jan 22). Nvidia CEO Jensen Huang linked AI growth to power constraints at Davos (Jan 22).

#News #Anonymous #AnonNews_irc

  • 0
  • 0
  • 0
  • 9h ago
Profile picture

‼️CISA has added 5 vulnerabilities to the KEV Catalog

darkwebinformer.com/cisa-kev-c

CVE-2024-37079: Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability

CVE-2025-68645: Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability

CVE-2025-34026: Versa Concerto Improper Authentication Vulnerability

CVE-2025-31125: Vite Vitejs Improper Access Control Vulnerability

CVE-2025-54313: Prettier eslint-config-prettier Embedded Malicious Code Vulnerability

  • 0
  • 1
  • 0
  • 10h ago

Bluesky

Profile picture
~Cisa~ CISA has added the actively exploited VMware vCenter Server out-of-bounds write vulnerability (CVE-2024-37079) to its KEV catalog. - IOCs: CVE-2024-37079 - #CVE202437079 #ThreatIntel #VMware
  • 0
  • 0
  • 0
  • 10h ago
Profile picture
Critical VMware vCenter Server vulnerability CVE-2024-37079 allows remote code execution via DCERPC and is being exploited in the wild despite Broadcom patches.
  • 0
  • 0
  • 0
  • 8h ago

Overview

  • GNU
  • Inetutils

21 Jan 2026
Published
23 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.41%

KEV

Description

telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable.

Statistics

  • 2 Posts

Last activity: 11 hours ago

Fediverse

Profile picture

Drop #762 (2026-01-23): If It Talks Like A…

duck_tails; crawler; url_pattern

I was going to make some space between DuckDB-centric Drops, but I literally had to use one of the new Community extensions I discovered yesterday to solve a self-inflicted problem (not my doing, but I am in charge, so it’s technically my problem, now). And, if I’m going to show off one extension, I might as well pick two more!

Subscribe

TL;DR

(This is an LLM/GPT-generated summary of today’s Drop. Ollama and MiniMax M2.1.)

duck_tails

[🖼 hrbrmstrsdailydrop.wordpress.c…]Photo by mauro carlo stella on Pexels.com

In the early days of of $WORK (years before I joined), the folks doing systems engineering, network engineering, and software engineering/app dev were not “data” people. For the most part, that’s still true, and — as such — sometimes causes a bit of pain for we data folk who need to perform research tasks.

One of those is somewhat more of an annoyance than others, and that would be how, and where (and, when) the API and app use tag nameid, and slug for input or output to the caller.

We have naming conventions for tags that we refine over time, and I have one example from this week. This tag — GNU Inetutils Telnetd Authentication Bypass CVE-2026-24061 Attempt — has our canonical form of the product/“thing”, the weakness, the CVE, and the action. Some of that is also encoded in fields, but there needs to be a nice display name for humans. When that weakness was first disclosed, no CVE existed, so the name was just “GNU Inetutils Telnetd Authentication Bypass Attempt”. And, when the data pipeline actually “tags” a given session, that’s permanent (I mean, we technically can go back and modify the record, but that violates all sorts of rules and contracts we have with ourselves and those folks who rely on the data).

Sadly, two APIs that I and others kind of rely on only allow querying by name, and one of them doesn’t store the UUID. (That sound you definitely just heard was me, yet again, smashing my head on the desk.) Truth be told, seeing the name in the query is nice for self-documentation (and typing/copying UUIDs is a pain), but when we’re tracking an emergent threat like this one, it means we have to add both names to the query. And, when I do make a query by id in these and other systems, the different names will return until the data ages out of production (~90d; but we keep all of it around forever). It’s not a show stopper, but it is annoying.

We’re about to move to storing the tags we create in a database, which will make normalizing everything a bit easier. Right now, they live in JSON files in git, and at least once a day there’s a process that scoops up all the tags into one file, which is also in git.

Sure, we could have thought this through a bit more and kept timestamped copies of the combined file, but “live and learn”?

I’ve used various tricks to get files out of git history but they’re all horribly clunky. So when I saw duck_tails yesterday, I might have SQUEEd. Here’s the official description:

Duck Tails brings git-aware data analysis capabilities to DuckDB, enabling sophisticated version-controlled data workflows. The extension provides three core capabilities:

Git Filesystem Access: Use the git:// protocol to access any file in your git repository at any commit, branch, or tag. This allows you to query historical data states, compare versions, and perform temporal analysis directly in SQL.

The functions are very straightforward, and withing about 3 minutes I was able to create a very small Bash+DuckDB script to get what I want:

 #!/usr/bin/env bash   cd /Users/hrbrmstr/gn/labs-viz-data   echo "Retrieving git history…"   mapfile -t queries < <(duckdb -c "INSTALL duck_tails FROM community;  LOAD duck_tails;  COPY (FROM git_log('git://docs/tags-no-metadata.json')  SELECT    'FROM read_json(''git://docs/tags-no-metadata.json@' || commit_hash || ''') SELECT name, id' AS query  ) TO '/dev/stdout' (FORMAT csv, QUOTE '', HEADER false)")   echo "Building the combined query…"   combined=""  for i in "${!queries[@]}"; do    if [[ $i -gt 0 ]]; then      combined+="  UNION  "    fi    combined+="${queries[$i]}"  done   echo "Creating CSV…"   duckdb -c "INSTALL duck_tails FROM community;  LOAD duck_tails;  COPY (SELECT DISTINCT name, id FROM (${combined})) TO '~/gn/labs-viz-data/tag-name-id-history.csv' (FORMAT csv, QUOTE '\"', FORCE_QUOTE *, HEADER true)"   echo "Done!" 

The first query builds a series of FROM statements that we combine in Bash, adding a UNION. And, at the end of the process, I have a super nice translation table I can use to glue things together without being too verbose, and always being able to rely on the id (which is not technically 100% true, but that’s a problem to solve for another day)!

It’s a greaty extension that relies on the widely-used libgit2 for all the underlying git work.

crawler

[🖼 hrbrmstrsdailydrop.wordpress.c…]

Thanks to “AI”, it’s getting harder to scrape content (legitimally) from the internet, but it’s not impossible, and there are sites on the open web who still do not mind if you responsibly yank some of their HTLM.

The DuckDB crawler (GH) extension gives our fowl friend scraping and content crunching superpowers. I’m just going to show off a couple, but hee are a few more to whet some appetites:

  • crawl() table function with automatic rate limiting and robots.txt compliance
  • crawl_url() for LATERAL joins
  • sitemap() for XML sitemap parsing
  • jq() and htmlpath() functions for CSS selector-based extraction
  • html.readability for article extraction
  • html.schema for JSON-LD/microdata parsing
  • CRAWLING MERGE INTO syntax for upsert operations

(There’s quite a bit more information and many more examples at the GH link.)

This is one small example of the utility:

 🦆>FROM crawl([       'duckdb.org/community_extension;,       'duckdb.org/community_extension;,       'duckdb.org/community_extension;,       'duckdb.org/community_extension;     ])     SELECT       url,       jq(html.document, 'title').text as title,       html.readability.text_content as contents     ;  ┌──────────────────────┬──────────────────────┬───────────────────────────────────────────────────────────────┐  │         url          │        title         │                           contents                            │  │       varchar        │       varchar        │                             json                              │  ├──────────────────────┼──────────────────────┼───────────────────────────────────────────────────────────────┤  │ duckdb.org…  │ duck_tails – DuckD…  │ "Smart Development Intelligence for DuckDB - Git-aware data…  │  │ duckdb.org…  │ crawler – DuckDB C…  │ "SQL-native web crawler with HTML extraction and MERGE supp…  │  │ duckdb.org…  │ html_readability –…  │ "Extract readable content from HTML using Mozilla's Readabi…  │  │ duckdb.org…  │ urlpattern – DuckD…  │ "WHATWG URLPattern API for matching and extracting componen…  │  └──────────────────────┴──────────────────────┴───────────────────────────────────────────────────────────────┘ 

(NOTE: there’s also a html_readability extension if you already have a pile of HTML around.)

I don’t have tons of scraping tasks to do anymore, but when I do, I’m reaching for this. I’ll always lean into using two standalone binaries (duckdb & this library) that work everywhere painlessly vs. a gajillion dependencies in R or Python (or whatev).

url_pattern

[🖼 hrbrmstrsdailydrop.wordpress.c…]Photo by Designecologist on Pexels.com

While I may not need to scrape, I do need to parse and compare URLs all the time. Some other extensions have some functions for the parsing, but we now have a dedicated urlpattern extension that only focuses on the matching bit (it can extract as well).

It implements the WHATWG “URL Pattern Standard

This extension also has some thorough examples in GH, so I’ll leave you to peruse them as you prepare for the crushing cold and snow headed our way (at least for ~180m folks in the U.S.).

FIN

Remember, you can follow and interact with the full text of The Daily Drop’s free posts on:

  • Mastodon via @dailydrop.hrbrmstr.dev@dailydrop.hrbrmstr.dev
  • Bluesky via <https://bsky.app/profile/dailydrop.hrbrmstr.dev.web.brid.gy>

☮️

  • 0
  • 0
  • 0
  • 13h ago

Bluesky

Profile picture
Vulnerabilità critica in telnetd consente accesso root remoto a tutti, dopo 11 anni La vulnerabilità CVE-2026-24061 dimostra come un servi... https://www.ilsoftware.it/vulnerabilita-critica-in-telnetd-consente-accesso-root-remoto-a-tutti-dopo-11-anni/
  • 0
  • 0
  • 0
  • 11h ago

Overview

  • GnuPG
  • GnuPG

28 Dec 2025
Published
14 Jan 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.02%

KEV

Description

In GnuPG before 2.4.9, armor_filter in g10/armor.c has two increments of an index variable where one is intended, leading to an out-of-bounds write for crafted input. (For ExtendedLTS, 2.2.51 and later are fixed versions.)

Statistics

  • 2 Posts

Last activity: 16 hours ago

Bluesky

Profile picture
🚨 New HIGH CVE detected in AWS Lambda 🚨 CVE-2025-68973 impacts gnupg2 in 7 Lambda base images. Details: https://github.com/aws/aws-lambda-base-images/issues/383 More: https://lambdawatchdog.com/ #AWS #Lambda #CVE #CloudSecurity #Serverless
  • 0
  • 0
  • 0
  • 18h ago
Profile picture
🔐 CRITICAL: #SUSE Linux GPG2 vuln (CVE-2025-68973) patched. Affects core cryptographic trust. High risk for enterprise integrity. Read more: 👉 tinyurl.com/yvpu5x6n #Security
  • 0
  • 0
  • 0
  • 16h ago

Overview

  • ISC
  • BIND 9

21 Jan 2026
Published
21 Jan 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.02%

KEV

Description

Malformed BRID/HHIT records can cause `named` to terminate unexpectedly. This issue affects BIND 9 versions 9.18.40 through 9.18.43, 9.20.13 through 9.20.17, 9.21.12 through 9.21.16, 9.18.40-S1 through 9.18.43-S1, and 9.20.13-S1 through 9.20.17-S1.

Statistics

  • 2 Posts

Last activity: 20 hours ago

Bluesky

Profile picture
BIND 9の脆弱性対策について(CVE-2025-13878) | 情報セキュリティ | IPA 独立行政法人 情報処理推進機構 https://www.ipa.go.jp/security/security-alert/2025/alert20260123.html
  • 0
  • 0
  • 0
  • 22h ago
Profile picture
> BIND 9の脆弱性対策について(CVE-2025-13878) https://www.ipa.go.jp/security/security-alert/2025/alert20260123.html
  • 0
  • 0
  • 0
  • 20h ago

Overview

  • Pending

12 Sep 2025
Published
12 Sep 2025
Updated

CVSS
Pending
EPSS
0.11%

KEV

Description

OpenSynergy BlueSDK (aka Blue SDK) through 6.x has Improper Input Validation. The specific flaw exists within the BlueSDK Bluetooth stack. The issue results from the lack of proper validation of remote L2CAP channel ID (CID). An attacker can leverage this to create an L2CAP channel with the null identifier assigned as a remote CID.

Statistics

  • 2 Posts
  • 5 Interactions

Last activity: 13 hours ago

Fediverse

Profile picture

Kritische Lücke bei Zoom Node! Wer Zoom Node für das hybride Arbeiten nutzt, sollte jetzt schnellstens handeln. Eine aktuelle Sicherheitslücke (CVE-2024-45431) hat es in sich: Mit einem CVSS-Score von 9,9 von 10 ist sie fast am Maximum der Gefährlichkeit. Angreifer können über die Zoom Node-Dienste Schadcode einschleusen und diesen aus der Ferne ausführen (Remote Code Execution). #CyberSecurity #Zoom #ITSecurity #PatchManagement #HybridWork

  • 4
  • 1
  • 1
  • 13h ago

Overview

  • NetSupport Ltd.
  • NetSupport Manager

29 Aug 2025
Published
03 Nov 2025
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.44%

KEV

Description

A heap-based buffer overflow vulnerability in NetSupport Manager 14.x versions prior to 14.12.0000 allows a remote, unauthenticated attacker to cause a denial of service (DoS) or execute arbitrary code.

Statistics

  • 2 Posts
  • 22 Interactions

Last activity: 17 hours ago

Fediverse

Profile picture

You like technical deep dives into binary exploitation and crazy heap wizardry? Then you'll like our blog post about unauth'ed RCE in NetSupport Manager aka CVE-2025-34164 & CVE-2025-34165 code-white.com/blog/2026-01-ns

  • 12
  • 10
  • 1
  • 17h ago

Overview

  • NetSupport Ltd.
  • NetSupport Manager

29 Aug 2025
Published
02 Sep 2025
Updated

CVSS v4.0
HIGH (8.8)
EPSS
0.28%

KEV

Description

A stack-based buffer overflow vulnerability in NetSupport Manager 14.x versions prior to 14.12.0000 allows a remote, unauthenticated attacker to cause a denial of service (DoS) or potentially leak a limited amount of memory.

Statistics

  • 2 Posts
  • 22 Interactions

Last activity: 17 hours ago

Fediverse

Profile picture

You like technical deep dives into binary exploitation and crazy heap wizardry? Then you'll like our blog post about unauth'ed RCE in NetSupport Manager aka CVE-2025-34164 & CVE-2025-34165 code-white.com/blog/2026-01-ns

  • 12
  • 10
  • 1
  • 17h ago

Overview

  • TrioFox
  • TrioFox

10 Nov 2025
Published
12 Nov 2025
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
74.74%

Description

Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access Control flaw that allows access to initial setup pages even after setup is complete.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 10 hours ago

Fediverse

Profile picture

Join @vulncheck next week for our new In the Wild webcast series! This month, our research team will do a deep dive on developing an exploit for Gladinet Triofox CVE-2025-12480, a process that wound up being significantly more complex than expected.

Wednesday, Jan. 28 @ 1 PM ET (and the last Wednesday of every month!)

wwv.vulncheck.com/in-the-wild-

  • 1
  • 0
  • 0
  • 10h ago

Overview

  • Meta
  • react-server-dom-webpack

03 Dec 2025
Published
11 Dec 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
55.12%

Description

A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 10 hours ago

Bluesky

Profile picture
React bug (CVE-2025-55182) just keeps buggin
  • 0
  • 3
  • 0
  • 10h ago
Showing 1 to 10 of 80 CVEs