Overview
- Ivanti
- Endpoint Manager Mobile
Description
Statistics
- 3 Posts
Fediverse
@christopherkunz didn't see this in your Toots yet, but hope you already saw it somewhere else:
https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2026/2026-221601-1032_bits.html
Version 1.3: Ivanti EPMM - Aktive Angriffe über Zero-Day Schwachstellen beobachtet
Schwachstellen CVE-2026-1281 und CVE-2026-1340
2 nylige #0day (CVE-2026-1281 og CVE-2026-1340) i Ivanti EPMM-platformen er blevet udnyttet i siden mindst sommeren 2025
Tysklands 🇩🇪 cyber-sikkerheds-agentur har fundet beviser for kompromittering under efterforskningen af angrebene
De 2 zero-days er blevet knyttet til angreb på det hollandske 🇳🇱 data-beskyttelses-agentur og Europa-Kommissionen 🇪🇺
Palo Alto Networks har nogle detaljer om angrebene, som nu omfatter både spionage og cyber-kriminalitet
https://unit42.paloaltonetworks.com/ivanti-cve-2026-1281-cve-2026-1340/
Overview
Description
Statistics
- 3 Posts
Fediverse
@christopherkunz didn't see this in your Toots yet, but hope you already saw it somewhere else:
https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2026/2026-221601-1032_bits.html
Version 1.3: Ivanti EPMM - Aktive Angriffe über Zero-Day Schwachstellen beobachtet
Schwachstellen CVE-2026-1281 und CVE-2026-1340
2 nylige #0day (CVE-2026-1281 og CVE-2026-1340) i Ivanti EPMM-platformen er blevet udnyttet i siden mindst sommeren 2025
Tysklands 🇩🇪 cyber-sikkerheds-agentur har fundet beviser for kompromittering under efterforskningen af angrebene
De 2 zero-days er blevet knyttet til angreb på det hollandske 🇳🇱 data-beskyttelses-agentur og Europa-Kommissionen 🇪🇺
Palo Alto Networks har nogle detaljer om angrebene, som nu omfatter både spionage og cyber-kriminalitet
https://unit42.paloaltonetworks.com/ivanti-cve-2026-1281-cve-2026-1340/
Overview
- Microsoft, Inc
- Windows 11
Description
Statistics
- 1 Post
- 18 Interactions
Fediverse
I earned my first CVE credit (CVE-2025-7676) for helping with a Windows ARM vuln. So, to commemorate the credit, @reverseics presented me last week with a Trophy of Perpetual Futility, because there’s always more work to do.
https://raw.githubusercontent.com/reidmefirst/vuln-disclosure/refs/heads/main/2025-04.txt
Overview
Description
Statistics
- 1 Post
- 2 Interactions
Overview
- nikkhokkho
- FileOptimizer
Description
Statistics
- 1 Post
- 1 Interaction
Overview
Description
Statistics
- 1 Post
- 1 Interaction
Fediverse
"OX Security discovered a vulnerability (CVE-2025-65716) in Markdown Preview Enhanced that enables a crafted Markdown file to execute JavaScript in the Markdown preview, allowing local port enumeration and exfiltration to an attacker-controlled server."
https://www.ox.security/blog/cve-2025-65716-markdown-preview-enhanced-vscode-vulnerability/
Overview
- TryGhost
- Ghost
Description
Statistics
- 1 Post
Fediverse
⚠️ CVE-2026-26980: CRITICAL SQL Injection in TryGhost Ghost CMS (3.24.0 – 6.19.0). Unauth attackers can read DB data remotely. Patch to 6.19.1 now! https://radar.offseq.com/threat/cve-2026-26980-cwe-89-improper-neutralization-of-s-8eb7ae8a #OffSeq #SQLInjection #GhostCMS #Vuln
Overview
- Genivia Inc.
- gSOAP
Description
Statistics
- 1 Post
Overview
- Tsinghua Unigroup
- Electronic Archives System
Description
Statistics
- 1 Post
Overview
- kovidgoyal
- calibre
Description
Statistics
- 1 Post
Fediverse
🛑 CRITICAL CVE-2026-26064 in calibre <9.3.0: Path traversal in extract_pictures enables arbitrary file writes & remote code execution on Windows. Patch to 9.3.0+ ASAP. User interaction required. Details: https://radar.offseq.com/threat/cve-2026-26064-cwe-22-improper-limitation-of-a-pat-71d04e0e #OffSeq #Calibre #Vuln #InfoSec