24h | 7d | 30d

Overview

  • Ivanti
  • Endpoint Manager Mobile

29 Jan 2026
Published
30 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
32.27%

KEV

Description

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

Statistics

  • 3 Posts

Last activity: 15 hours ago

Fediverse

Profile picture fallback

@christopherkunz didn't see this in your Toots yet, but hope you already saw it somewhere else:

bsi.bund.de/SharedDocs/Cybersi

Version 1.3: Ivanti EPMM - Aktive Angriffe über Zero-Day Schwachstellen beobachtet

Schwachstellen CVE-2026-1281 und CVE-2026-1340

nvd.nist.gov/vuln/detail/CVE-2

nvd.nist.gov/vuln/detail/CVE-2

  • 0
  • 0
  • 0
  • 15h ago

Bluesky

Profile picture fallback
CVE-2026-1281 & CVE-2026-1340: Ivanti EPMM Under Attack—Bash Arithmetic Exploits Deploying Covert Backdoors + Video Introduction: A fresh wave of sophisticated attacks is targeting enterprise mobile fleets, exploiting two critical zero-day vulnerabilities in Ivanti Endpoint Management Mobile…
  • 0
  • 0
  • 0
  • 18h ago
Profile picture fallback
Exploitation of two patched Ivanti EPMM critical vulnerabilities (CVE-2026-1281, CVE-2026-1340) has surged, enabling remote unauthenticated code execution and full MDM compromise.
  • 0
  • 0
  • 0
  • 15h ago

Overview

  • Microsoft, Inc
  • Windows 11

28 Jul 2025
Published
28 Jul 2025
Updated

CVSS v4.0
MEDIUM (5.4)
EPSS
0.02%

KEV

Description

DLL hijacking of all PE32 executables when run on Windows for ARM64 CPU architecture. This allows an attacker to execute code, if the attacker can plant a DLL in the same directory as the executable. Vulnerable versions of Windows 11 for ARM attempt to load Base DLLs that would ordinarily not be loaded from the application directory. Fixed in release 24H2, but present in all earlier versions of Windows 11 for ARM CPUs.

Statistics

  • 1 Post
  • 18 Interactions

Last activity: 13 hours ago

Fediverse

Profile picture fallback

I earned my first CVE credit (CVE-2025-7676) for helping with a Windows ARM vuln. So, to commemorate the credit, @reverseics presented me last week with a Trophy of Perpetual Futility, because there’s always more work to do.

raw.githubusercontent.com/reid

  • 1
  • 17
  • 0
  • 13h ago

Overview

  • Pending

31 Jul 2025
Published
18 Feb 2026
Updated

CVSS
Pending
EPSS
0.01%

KEV

Description

php-jwt v6.11.0 was discovered to contain weak encryption. NOTE: this issue has been disputed on the basis that key lengths are expected to be set by an application, not by this library. This dispute is subject to review under CNA rules 4.1.4, 4.1.14, and other rules; the dispute tagging is not meant to recommend an outcome for this CVE Record.

Statistics

  • 1 Post
  • 6 Interactions

Last activity: 23 hours ago

Fediverse

Profile picture fallback

If you're using firebase/php-jwt v6, surprise!

GitHub Advisory GHSA for CVE-2025-45769 ignores NVD "Disputed" status, blocks all php-jwt v6 users.

Details here:

github.com/firebase/php-jwt/is

#PHP #CVE

  • 2
  • 4
  • 0
  • 23h ago

Overview

  • Microsoft
  • Windows 10 Version 1507

08 Apr 2025
Published
13 Feb 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.47%

Description

Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 13 hours ago

Bluesky

Profile picture fallback
SEO poisoning ➡️ Fake RVTools ➡️ Python backdoor ➡️ PipeMagic ➡️ CVE-2025-29824 ➡️ #Ransomexx — domain-wide in <19 hrs. The Python backdoor connected to azure-secure-agent[.]com (87.251.67[.]241), enabling cmd/PowerShell exec, payload download, screenshots, and IP discovery.
  • 0
  • 2
  • 0
  • 13h ago

Overview

  • nikkhokkho
  • FileOptimizer

18 Feb 2026
Published
19 Feb 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.03%

KEV

Description

FileOptimizer 14.00.2524 contains a denial of service vulnerability that allows attackers to crash the application by manipulating the FileOptimizer32.ini configuration file. Attackers can overwrite the TempDirectory parameter with a 5000-character buffer to cause the application to crash when opening options.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 2 hours ago

Bluesky

Profile picture fallback
📌 CVE-2019-25358 https://www.cyberhub.blog/article/alert-cve-2019-25358
  • 0
  • 1
  • 0
  • 2h ago

Overview

  • OpenSSL
  • OpenSSL

27 Jan 2026
Published
29 Jan 2026
Updated

CVSS
Pending
EPSS
0.06%

KEV

Description

Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously crafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing non-ASCII BMP code point can trigger a one byte write before the allocated buffer. Impact summary: The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service. The OPENSSL_uni2utf8() function performs a two-pass conversion of a PKCS#12 BMPString (UTF-16BE) to UTF-8. In the second pass, when emitting UTF-8 bytes, the helper function bmp_to_utf8() incorrectly forwards the remaining UTF-16 source byte count as the destination buffer capacity to UTF8_putc(). For BMP code points above U+07FF, UTF-8 requires three bytes, but the forwarded capacity can be just two bytes. UTF8_putc() then returns -1, and this negative value is added to the output length without validation, causing the length to become negative. The subsequent trailing NUL byte is then written at a negative offset, causing write outside of heap allocated buffer. The vulnerability is reachable via the public PKCS12_get_friendlyname() API when parsing attacker-controlled PKCS#12 files. While PKCS12_parse() uses a different code path that avoids this issue, PKCS12_get_friendlyname() directly invokes the vulnerable function. Exploitation requires an attacker to provide a malicious PKCS#12 file to be parsed by the application and the attacker can just trigger a one zero byte write before the allocated buffer. For that reason the issue was assessed as Low severity according to our Security Policy. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue. OpenSSL 1.0.2 is not affected by this issue.

Statistics

  • 1 Post

Last activity: 16 hours ago

Bluesky

Profile picture fallback
🚨 New HIGH CVE detected in AWS Lambda 🚨 CVE-2025-69419 impacts openssl-fips-provider-latest in 40 Lambda base images. Details: https://github.com/aws/aws-lambda-base-images/issues/419 More: https://lambdawatchdog.com/ #AWS #Lambda #CVE #CloudSecurity #Serverless
  • 0
  • 0
  • 0
  • 16h ago

Overview

  • curl
  • curl

08 Jan 2026
Published
16 Jan 2026
Updated

CVSS
Pending
EPSS
0.01%

KEV

Description

When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl, changing TLS options in one thread would inadvertently change them globally and therefore possibly also affect other concurrently setup transfers. Disabling certificate verification for a specific transfer could unintentionally disable the feature for other threads as well.

Statistics

  • 1 Post

Last activity: 16 hours ago

Bluesky

Profile picture fallback
🚨 New MEDIUM CVE detected in AWS Lambda 🚨 CVE-2025-14017 impacts curl-minimal in 40 Lambda base images. Details: https://github.com/aws/aws-lambda-base-images/issues/409 More: https://lambdawatchdog.com/ #AWS #Lambda #CVE #CloudSecurity #Serverless
  • 0
  • 0
  • 0
  • 16h ago

Overview

  • Pending

04 Dec 2025
Published
05 Dec 2025
Updated

CVSS
Pending
EPSS
0.04%

KEV

Description

A denial-of-service vulnerability exists in github.com/sirupsen/logrus when using Entry.Writer() to log a single-line payload larger than 64KB without newline characters. Due to limitations in the internal bufio.Scanner, the read fails with "token too long" and the writer pipe is closed, leaving Writer() unusable and causing application unavailability (DoS). This affects versions < 1.8.3, 1.9.0, and 1.9.2. The issue is fixed in 1.8.3, 1.9.1, and 1.9.3+, where the input is chunked and the writer continues to function even if an error is logged.

Statistics

  • 2 Posts

Last activity: 14 hours ago

Bluesky

Profile picture fallback
Critical security update for #Fedora users! A new patch for Fvwm3 (CVE-2025-65637) fixes a high-severity Denial-of-Service flaw in the logrus logging library. Read more:👉 tinyurl.com/mu6ftvdx #Security
  • 0
  • 0
  • 0
  • 14h ago
Profile picture fallback
🔧 #Fedora 42 Security Corner A critical patch for fvwm3 just dropped (FEDORA-2026-439af2cc95) addressing CVE-2025-65637. This is a nasty one: a remote DoS in the Logrus library. Read more: 👉 tinyurl.com/3xt2t8hr #Security
  • 0
  • 0
  • 0
  • 14h ago

Overview

  • pterodactyl
  • panel

19 Feb 2026
Published
19 Feb 2026
Updated

CVSS v4.0
CRITICAL (9.2)
EPSS
Pending

KEV

Description

Wings is the server control plane for Pterodactyl, a free, open-source game server management panel. Prior to version 1.12.1, a missing authorization check in multiple controllers allows any user with access to a node secret token to fetch information about any server on a Pterodactyl instance, even if that server is associated with a different node. This issue stems from missing logic to verify that the node requesting server data is the same node that the server is associated with. Any authenticated Wings node can retrieve server installation scripts (potentially containing secret values) and manipulate the installation status of servers belonging to other nodes. Wings nodes may also manipulate the transfer status of servers belonging to other nodes. This vulnerability requires a user to acquire a secret access token for a node. Unless a user gains access to a Wings secret access token they would not be able to access any of these vulnerable endpoints, as every endpoint requires a valid node access token. A single compromised Wings node daemon token (stored in plaintext at `/etc/pterodactyl/config.yml`) grants access to sensitive configuration data of every server on the panel, rather than only to servers that the node has access to. An attacker can use this information to move laterally through the system, send excessive notifications, destroy server data on other nodes, and otherwise exfiltrate secrets that they should not have access to with only a node token. Additionally, triggering a false transfer success causes the panel to delete the server from the source node, resulting in permanent data loss. Users should upgrade to version 1.12.1 to receive a fix.

Statistics

  • 1 Post

Last activity: 5 hours ago

Fediverse

Profile picture fallback

⚠️ CRITICAL: Pterodactyl Panel <1.12.1 has an auth bypass (CVE-2026-26016). Wings node token = full access to all servers, data loss risk. Upgrade to 1.12.1 ASAP & secure tokens! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 5h ago

Overview

  • BeyondTrust
  • Remote Support(RS) & Privileged Remote Access(PRA)

06 Feb 2026
Published
14 Feb 2026
Updated

CVSS v4.0
CRITICAL (9.9)
EPSS
49.74%

Description

BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user.

Statistics

  • 1 Post

Last activity: 18 hours ago

Bluesky

Profile picture fallback
The Apex Convergence: How ZeroDayRAT and BeyondTrust CVE-2026-1731 Bridge Mobile Spying to Physical Breaches + Video Introduction: A new class of sophisticated threat, termed a "High-Convergence" vector, has been detected, demonstrating a terrifying evolution in cyber-physical attacks. By…
  • 0
  • 0
  • 0
  • 18h ago
Showing 11 to 20 of 73 CVEs