24h | 7d | 30d

Overview

  • freescout-help-desk
  • freescout

03 Mar 2026
Published
05 Mar 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
0.03%

KEV

Description

FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. A patch bypass vulnerability for CVE-2026-27636 in FreeScout 1.8.206 and earlier allows any authenticated user with file upload permissions to achieve Remote Code Execution (RCE) on the server by uploading a malicious .htaccess file using a zero-width space character prefix to bypass the security check. The vulnerability exists in the sanitizeUploadedFileName() function in app/Http/Helper.php. The function contains a Time-of-Check to Time-of-Use (TOCTOU) flaw where the dot-prefix check occurs before sanitization removes invisible characters. This vulnerability is fixed in 1.8.207.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 22 hours ago

Bluesky

Profile picture fallback
📢 FreeScout: Zero‑click RCE non authentifié (CVE‑2026‑28289) corrigé en v1.8.207 📝 Source: OX Security (OX Research). https://cyberveille.ch/posts/2026-03-08-freescout-zero-click-rce-non-authentifie-cve-2026-28289-corrige-en-v1-8-207/ #CVE_2026_28289 #Cyberveille
  • 0
  • 1
  • 0
  • 22h ago

Overview

  • middleapi
  • orpc

06 Mar 2026
Published
06 Mar 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.32%

KEV

Description

oRPC is an tool that helps build APIs that are end-to-end type-safe and adhere to OpenAPI standards. Prior to version 1.13.6, a prototype pollution vulnerability exists in the RPC JSON deserializer of the @orpc/client package. The vulnerability allows unauthenticated, remote attackers to inject arbitrary properties into the global Object.prototype. Because this pollution persists for the lifetime of the Node.js process and affects all objects, it can lead to severe security breaches, including authentication bypass, denial of service, and potentially Remote Code Execution. This issue has been patched in version 1.13.6.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 11 hours ago

Bluesky

Profile picture fallback
CVE-2026-28794 - oRPC: Prototype Pollution in `@orpc/client` via `StandardRPCJsonSerializer` Deserialization scq.ms/4b7tqWn
  • 0
  • 1
  • 0
  • 11h ago

Overview

  • Linux
  • Linux

12 Nov 2025
Published
01 Dec 2025
Updated

CVSS
Pending
EPSS
0.03%

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: Fix data race in CPU latency PM QoS request handling The cpu_latency_qos_add/remove/update_request interfaces lack internal synchronization by design, requiring the caller to ensure thread safety. The current implementation relies on the 'pm_qos_enabled' flag, which is insufficient to prevent concurrent access and cannot serve as a proper synchronization mechanism. This has led to data races and list corruption issues. A typical race condition call trace is: [Thread A] ufshcd_pm_qos_exit() --> cpu_latency_qos_remove_request() --> cpu_latency_qos_apply(); --> pm_qos_update_target() --> plist_del <--(1) delete plist node --> memset(req, 0, sizeof(*req)); --> hba->pm_qos_enabled = false; [Thread B] ufshcd_devfreq_target --> ufshcd_devfreq_scale --> ufshcd_scale_clks --> ufshcd_pm_qos_update <--(2) pm_qos_enabled is true --> cpu_latency_qos_update_request --> pm_qos_update_target --> plist_del <--(3) plist node use-after-free Introduces a dedicated mutex to serialize PM QoS operations, preventing data races and ensuring safe access to PM QoS resources, including sysfs interface reads.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 7 hours ago

Bluesky

Profile picture fallback
Urgent for SUSE Linux Micro 6.2 admins! A new important kernel live patch (SUSE-SU-2026:20643-1) is out for CVE-2025-40130. Read more: 👉 tinyurl.com/2p4d9uu5 #SUSE #Security
  • 0
  • 1
  • 0
  • 7h ago

Overview

  • Apache Software Foundation
  • Apache Log4j2

10 Dec 2021
Published
21 Oct 2025
Updated

CVSS
Pending
EPSS
94.46%

Description

Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 16 hours ago

Bluesky

Profile picture fallback
Critical RCE Vulnerability in Apache Log4j 2 Exposes Millions of Servers – Patch Now! + Video Introduction: A newly disclosed remote code execution (RCE) vulnerability in the ubiquitous Apache Log4j 2 logging library (CVE-2021-44228, aka “Log4Shell”) has sent shockwaves through the cybersecurity…
  • 0
  • 1
  • 0
  • 16h ago

Overview

  • UTT
  • HiPER 810G

09 Mar 2026
Published
09 Mar 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.04%

KEV

Description

A security flaw has been discovered in UTT HiPER 810G up to 1.7.7-1711. Affected by this issue is the function strcpy of the file /goform/getOneApConfTempEntry. Performing a manipulation results in buffer overflow. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks.

Statistics

  • 1 Post

Last activity: 7 hours ago

Fediverse

Profile picture fallback

🚨 HIGH severity (CVSS 8.7) buffer overflow in UTT HiPER 810G (≤1.7.7-1711), via strcpy in /goform/getOneApConfTempEntry. Public exploit released — urgent monitoring advised. CVE-2026-3814 radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 7h ago

Overview

  • Changing
  • IDExpert Windows Logon Agent

02 Mar 2026
Published
02 Mar 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.13%

KEV

Description

IDExpert Windows Logon Agent developed by Changing has a Remote Code Execution vulnerability, allowing unauthenticated remote attackers to force the system to download arbitrary DLL files from a remote source and execute them.

Statistics

  • 1 Post

Last activity: 3 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-3000 - IDExpert Windows Logon Agent developed by Changing has a Remote Code Execution vulnerability, allowing unauthenticated remote attackers to force the s... https://www.cyberhub.blog/cves/CVE-2026-3000
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • VMware
  • Aria Operations
  • vmware-aria-operations

25 Feb 2026
Published
04 Mar 2026
Updated

CVSS v3.1
HIGH (8.1)
EPSS
7.35%

Description

VMware Aria Operations contains a command injection vulnerability. A malicious unauthenticated actor may exploit this issue to execute arbitrary commands which may lead to remote code execution in VMware Aria Operations while support-assisted product migration is in progress.  To remediate CVE-2026-22719, apply the patches listed in the 'Fixed Version' column of the ' Response Matrix https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947 ' in VMSA-2026-0001  Workarounds for CVE-2026-22719 are documented in the 'Workarounds' column of the ' Response Matrix https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947 ' in VMSA-2026-0001

Statistics

  • 1 Post

Last activity: 12 hours ago

Bluesky

Profile picture fallback
🌟 ニュースの詳細 イオン系列の「フードスタイル」1号店が東京・三田にオープンし、惣菜やこだわりの生鮮食品を販売しています。ブルボンの「プチシリーズ」発売30周年を記念して、オリジナルグッズやPayPayポイントがもらえるキャンペーンが実施されています。 🌸 技術と社会の進展 最新の技術ニュースでは、CISAがVMware Aria OperationsのコマンドインジェクションCVE-2026-22719をKEVカタログに追加し、Broadcomがパッチをリリースしたことが報告されています。AI社会の進展とその影響についての議論も盛んになっています。 🌸 ニュースの感想 最近のニュースは、世
  • 0
  • 0
  • 0
  • 12h ago

Overview

  • Changing
  • IDExpert Windows Logon Agent

02 Mar 2026
Published
02 Mar 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.13%

KEV

Description

IDExpert Windows Logon Agent developed by Changing has a Remote Code Execution vulnerability, allowing unauthenticated remote attackers to force the system to download arbitrary executable files from a remote source and execute them.

Statistics

  • 1 Post

Last activity: 2 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-2999 - IDExpert Windows Logon Agent developed by Changing has a Remote Code Execution vulnerability, allowing unauthenticated remote attackers to force the s... https://www.cyberhub.blog/cves/CVE-2026-2999
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • TP-Link Systems Inc.
  • Tapo C260 v1

10 Feb 2026
Published
11 Feb 2026
Updated

CVSS v4.0
MEDIUM (5.3)
EPSS
0.08%

KEV

Description

On TP-Link Tapo C260 v1, path traversal is possible due to improper handling of specific GET request paths via https, allowing local unauthenticated probing of filesystem paths. An attacker on the local network can determine whether certain files exists on the device, with no read, write or code execution possibilities.

Statistics

  • 1 Post

Last activity: 1 hour ago

Bluesky

Profile picture fallback
📢 TP-Link Tapo C260 : divulgation de fichiers, RCE invité et élévation de privilèges (CVE-2026-0651 à -0653) 📝 Sur un b… https://cyberveille.ch/posts/2026-03-08-tp-link-tapo-c260-divulgation-de-fichiers-rce-invite-et-elevation-de-privileges-cve-2026-0651-a-0653/ #CVE_2026_0651_0652_0653 #Cyberveille
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • Cisco
  • Cisco Identity Services Engine Software

25 Jun 2025
Published
26 Feb 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
24.79%

Description

A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system as root. The attacker does not require any valid credentials to exploit this vulnerability. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted API request. A successful exploit could allow the attacker to obtain root privileges on an affected device.

Statistics

  • 2 Posts

Last activity: 4 hours ago

Fediverse

Profile picture fallback

🚨 In this week’s threat alert, we dive into CVE-2025-20281, a critical Cisco Identity Services Engine (ISE) RCE vulnerability, as CrowdSec Threat Intelligence observes a new wave of exploitation attempts. We break down how the vulnerability works, why attackers are now incorporating it into opportunistic exploit kits, and what defenders should do to stay protected.

Read the full analysis and protect your systems 👉 crowdsec.net/vulntracking-repo

  • 0
  • 0
  • 1
  • 4h ago
Showing 11 to 20 of 40 CVEs