24h | 7d | 30d

Overview

  • Ivanti
  • Endpoint Manager Mobile

29 Jan 2026
Published
30 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
16.41%

Description

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

Statistics

  • 3 Posts
  • 1 Interaction

Last activity: 12 hours ago

Fediverse

Profile picture fallback

This Ivanti Endpoint Manager Mobile (IPMM) security advisory seems to fit the timeline of the incident: forums.ivanti.com/s/article/Se

  • 1
  • 0
  • 0
  • 12h ago

Bluesky

Profile picture fallback
📢 Ivanti EPMM : deux RCE pré-auth (CVE-2026-1281/1340) activement exploitées — analyse watchTowr 📝 Source: watchTowr Labs publie une anal… https://cyberveille.ch/posts/2026-02-05-ivanti-epmm-deux-rce-pre-auth-cve-2026-1281-1340-activement-exploitees-analyse-watchtowr/ #Apache_RewriteMap #Cyberveille
  • 0
  • 0
  • 0
  • 19h ago
Profile picture fallback
📢 NCSC NL alerte: exploitation active de la zero‑day Ivanti EPMM (CVE‑2026‑1281), assume‑breach requis 📝 Selon le NCSC (Pays-Bas), un… https://cyberveille.ch/posts/2026-02-05-ncsc-nl-alerte-exploitation-active-de-la-zero-day-ivanti-epmm-cve-2026-1281-assume-breach-requis/ #CVE_2026_1281 #Cyberveille
  • 0
  • 0
  • 0
  • 19h ago

Overview

  • @react-native-community/cli-server-api

03 Nov 2025
Published
05 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.40%

Description

The Metro Development Server, which is opened by the React Native Community CLI, binds to external interfaces by default. The server exposes an endpoint that is vulnerable to OS command injection. This allows unauthenticated network attackers to send a POST request to the server and run arbitrary executables. On Windows, the attackers can also execute arbitrary shell commands with fully controlled arguments.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 6 hours ago

Fediverse

Profile picture fallback

‼️ CISA has added two vulnerabilities to the KEV Catalog

darkwebinformer.com/cisa-kev-c

CVE-2026-24423: SmarterTools SmarterMail Missing Authentication for Critical Function Vulnerability:

SmarterTools SmarterMail contains a missing authentication for critical function vulnerability in the ConnectToHub API method. This could allow the attacker to point the SmarterMail instance to a malicious HTTP server which serves the malicious OS command and could lead to command execution.

CVE-2025-11953: React Native Community CLI OS Command Injection Vulnerability:

React Native Community CLI contains an OS command injection vulnerability which could allow unauthenticated network attackers to send POST requests to the Metro Development Server and run arbitrary executables via a vulnerable endpoint exposed by the server. On Windows, attackers can also execute arbitrary shell commands with fully controlled arguments.

  • 0
  • 1
  • 0
  • 6h ago

Bluesky

Profile picture fallback
Metro4Shell: la vulnerabilità critica che colpisce React Native 📌 Link all'articolo : www.redhotcyber.com/post/met... #redhotcyber #news #vulnerabilita #meteo4shell #reactnative #sicurezzainformatica #cve202511953 #endpointhttp
  • 0
  • 0
  • 0
  • 7h ago

Overview

  • Fortinet
  • FortiOS

05 Feb 2026
Published
06 Feb 2026
Updated

CVSS v3.1
LOW (3.2)
EPSS
Pending

KEV

Description

Fortinet FortiOS through 7.6.6 allows attackers to decrypt LDAP credentials stored in device configuration files, as exploited in the wild from 2025-12-16 through 2026 (by default, the encryption key is the same across all customers' installations). NOTE: the Supplier's position is that the instance of CWE-1394 is not a vulnerability because customers "are supposed to enable" a non-default option that eliminates the weakness. However, that non-default option can disrupt functionality as shown in the "Managing FortiGates with private data encryption" document, and is therefore intentionally not a default option.

Statistics

  • 1 Post
  • 5 Interactions

Last activity: 4 hours ago

Fediverse

Profile picture fallback

Fortinet FortiOS through 7.6.6 allows attackers to decrypt LDAP credentials stored in device configuration files, as exploited in the wild from 2025-12-16 through 2026.

CVE-2026-25815

"customers "are supposed to enable" a non-default option that eliminates the weakness. " -> disputed

#fortinet #cybersecurity #vulnerabilitymanagement

🔗 vulnerability.circl.lu/vuln/CV

  • 3
  • 2
  • 0
  • 4h ago

Overview

  • F5
  • NGINX Open Source

04 Feb 2026
Published
05 Feb 2026
Updated

CVSS v3.1
MEDIUM (5.9)
EPSS
0.01%

KEV

Description

A vulnerability exists in NGINX OSS and NGINX Plus when configured to proxy to upstream Transport Layer Security (TLS) servers. An attacker with a man-in-the-middle (MITM) position on the upstream server side—along with conditions beyond the attacker's control—may be able to inject plain text data into the response from an upstream proxied server.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 18 hours ago

Fediverse

Profile picture fallback

nginx-1.28.2 stable and nginx-1.29.5 mainline versions have been released, with a fix for the SSL upstream injection vulnerability (CVE-2026-1642).
nginx.org/#2026-02-04
#nginx #security

  • 0
  • 1
  • 0
  • 18h ago

Overview

  • traefik
  • traefik

01 Aug 2025
Published
04 Aug 2025
Updated

CVSS v4.0
HIGH (7.3)
EPSS
0.66%

KEV

Description

Traefik is an HTTP reverse proxy and load balancer. In versions 2.11.27 and below, 3.0.0 through 3.4.4 and 3.5.0-rc1, a path traversal vulnerability was discovered in WASM Traefik’s plugin installation mechanism. By supplying a maliciously crafted ZIP archive containing file paths with ../ sequences, an attacker can overwrite arbitrary files on the system outside of the intended plugin directory. This can lead to remote code execution (RCE), privilege escalation, persistence, or denial of service. This is fixed in versions 2.11.28, 3.4.5 and 3.5.0.

Statistics

  • 1 Post

Last activity: 5 hours ago

Bluesky

Profile picture fallback
CRITICAL PATCH: openSUSE rolls out fix for high-severity OpenSSL flaw in Traefik 2.11.35 (CVE-2025-54386). Read more: 👉 tinyurl.com/yvhnndnz #Security
  • 0
  • 0
  • 0
  • 5h ago

Overview

  • sebastianbergmann
  • phpunit

27 Jan 2026
Published
28 Jan 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.08%

KEV

Description

PHPUnit is a testing framework for PHP. A vulnerability has been discovered in versions prior to 12.5.8, 11.5.50, 10.5.62, 9.6.33, and 8.5.52 involving unsafe deserialization of code coverage data in PHPT test execution. The vulnerability exists in the `cleanupForCoverage()` method, which deserializes code coverage files without validation, potentially allowing remote code execution if malicious `.coverage` files are present prior to the execution of the PHPT test. The vulnerability occurs when a `.coverage` file, which should not exist before test execution, is deserialized without the `allowed_classes` parameter restriction. An attacker with local file write access can place a malicious serialized object with a `__wakeup()` method into the file system, leading to arbitrary code execution during test runs with code coverage instrumentation enabled. This vulnerability requires local file write access to the location where PHPUnit stores or expects code coverage files for PHPT tests. This can occur through CI/CD pipeline attacks, the local development environment, and/or compromised dependencies. Rather than just silently sanitizing the input via `['allowed_classes' => false]`, the maintainer has chosen to make the anomalous state explicit by treating pre-existing `.coverage` files for PHPT tests as an error condition. Starting in versions in versions 12.5.8, 11.5.50, 10.5.62, 9.6.33, when a `.coverage` file is detected for a PHPT test prior to execution, PHPUnit will emit a clear error message identifying the anomalous state. Organizations can reduce the effective risk of this vulnerability through proper CI/CD configuration, including ephemeral runners, code review enforcement, branch protection, artifact isolation, and access control.

Statistics

  • 1 Post

Last activity: 15 hours ago

Bluesky

Profile picture fallback
#Fedora PHPUnit 12 Advisory: A Case Study in DevSecOps Urgency. The FEDORA-2026-470a48f838 advisory for CVE-2026-24765 is a textbook example of modern software supply chain risk. Read more: 👉 tinyurl.com/2x83mdze #Security
  • 0
  • 0
  • 0
  • 15h ago

Overview

  • WatchGuard
  • Fireware OS

30 Jan 2026
Published
02 Feb 2026
Updated

CVSS v4.0
HIGH (7.0)
EPSS
0.20%

KEV

Description

An LDAP Injection vulnerability in WatchGuard Fireware OS may allow a remote unauthenticated attacker to retrieve sensitive information from a connected LDAP authentication server through an exposed authentication or management web interface. This vulnerability may also allow a remote attacker to authenticate as an LDAP user with a partial identifier if they additionally have that user's valid passphrase.This issue affects Fireware OS: from 12.0 through 12.11.6, from 12.5 through 12.5.15, from 2025.1 through 2026.0.

Statistics

  • 2 Posts

Last activity: 3 hours ago

Overview

  • NixOS
  • nixpkgs

02 Feb 2026
Published
04 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.03%

KEV

Description

The NixOs Odoo package is an open source ERP and CRM system. From 21.11 to before 25.11 and 26.05, every NixOS based Odoo setup publicly exposes the database manager without any authentication. This allows unauthorized actors to delete and download the entire database, including Odoos file store. Unauthorized access is evident from http requests. If kept, searching access logs and/or Odoos log for requests to /web/database can give indicators, if this has been actively exploited. The database manager is a featured intended for development and not meant to be publicly reachable. On other setups, a master password acts as 2nd line of defence. However, due to the nature of NixOS, Odoo is not able to modify its own configuration file and thus unable to persist the auto-generated password. This also applies when manually setting a master password in the web-UI. This means, the password is lost when restarting Odoo. When no password is set, the user is prompted to set one directly via the database manager. This requires no authentication or action by any authorized user or the system administrator. Thus, the database is effectively world readable by anyone able to reach Odoo. This vulnerability is fixed in 25.11 and 26.05.

Statistics

  • 1 Post

Last activity: 2 hours ago

Bluesky

Profile picture fallback
OdooをNixOSで動かす企業は要注意、脆弱性 CVE-2026-25137でDBマネージャが未認証公開になるリスク rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #セキュリティ #Security #CybersecurityNews
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • Python Software Foundation
  • CPython

03 Dec 2025
Published
26 Jan 2026
Updated

CVSS v4.0
MEDIUM (6.3)
EPSS
0.09%

KEV

Description

When building nested elements using xml.dom.minidom methods such as appendChild() that have a dependency on _clear_id_cache() the algorithm is quadratic. Availability can be impacted when building excessively nested documents.

Statistics

  • 1 Post

Last activity: 15 hours ago

Bluesky

Profile picture fallback
🔍 Lambda Watchdog detected that CVE-2025-12084 is no longer present in latest AWS Lambda base image scans. https://github.com/aws/aws-lambda-base-images/issues/384 #AWS #Lambda #Security #CVE #DevOps #SecOps
  • 0
  • 0
  • 0
  • 15h ago

Overview

  • neutrinolabs
  • xrdp

27 Jan 2026
Published
03 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.24%

KEV

Description

xrdp is an open source RDP server. xrdp before v0.10.5 contains an unauthenticated stack-based buffer overflow vulnerability. The issue stems from improper bounds checking when processing user domain information during the connection sequence. If exploited, the vulnerability could allow remote attackers to execute arbitrary code on the target system. The vulnerability allows an attacker to overwrite the stack buffer and the return address, which could theoretically be used to redirect the execution flow. The impact of this vulnerability is lessened if a compiler flag has been used to build the xrdp executable with stack canary protection. If this is the case, a second vulnerability would need to be used to leak the stack canary value. Upgrade to version 0.10.5 to receive a patch. Additionally, do not rely on stack canary protection on production systems.

Statistics

  • 1 Post

Last activity: 4 hours ago

Bluesky

Profile picture fallback
Just published: Deep technical analysis of CVE-2025-68670, the critical libpainter0 vulnerability affecting #openSUSE Tumbleweed with CVSS scores reaching 9.2. Read more: 👉 tinyurl.com/deb8a8vp #Security
  • 0
  • 0
  • 0
  • 4h ago
Showing 11 to 20 of 40 CVEs