24h | 7d | 30d

Overview

  • NaturalIntelligence
  • fast-xml-parser

20 Feb 2026
Published
23 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.3)
EPSS
0.04%

KEV

Description

fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. From 4.1.3to before 5.3.5, a dot (.) in a DOCTYPE entity name is treated as a regex wildcard during entity replacement, allowing an attacker to shadow built-in XML entities (<, >, &, ", ') with arbitrary values. This bypasses entity encoding and leads to XSS when parsed output is rendered. This vulnerability is fixed in 5.3.5.

Statistics

  • 1 Post

Last activity: 20 hours ago

Bluesky

Profile picture fallback
🔍 Lambda Watchdog detected that CVE-2026-25896 is no longer present in latest AWS Lambda base image scans. https://github.com/aws/aws-lambda-base-images/issues/429 #AWS #Lambda #Security #CVE #DevOps #SecOps
  • 0
  • 0
  • 0
  • 20h ago

Overview

  • Copeland
  • Copeland XWEB 300D PRO

27 Feb 2026
Published
27 Feb 2026
Updated

CVSS v3.1
HIGH (8.0)
EPSS
0.11%

KEV

Description

An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code execution on the system by injecting malicious input into the Wi-Fi SSID and/or password fields can lead to remote code execution when the configuration is processed.

Statistics

  • 1 Post

Last activity: 9 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-25196 - An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code executi... https://www.cyberhub.blog/cves/CVE-2026-25196
  • 0
  • 0
  • 0
  • 9h ago

Overview

  • Tenda
  • F453

01 Mar 2026
Published
01 Mar 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
Pending

KEV

Description

A vulnerability has been found in Tenda F453 1.0.0.3. This vulnerability affects the function fromSetIpBind of the file /goform/SetIpBind. The manipulation of the argument page leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

Statistics

  • 1 Post

Last activity: 5 hours ago

Fediverse

Profile picture fallback

🚨 HIGH severity: Tenda F453 v1.0.0.3 has a buffer overflow (CVE-2026-3379) in /goform/SetIpBind. Remotely exploitable with no auth. Restrict access, monitor for exploit attempts, and patch ASAP. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 5h ago

Overview

  • Microsoft Corporation
  • Microsoft Outlook

13 Oct 2017
Published
21 Oct 2025
Updated

CVSS
Pending
EPSS
82.85%

Description

Microsoft Outlook 2010 SP2, Outlook 2013 SP1 and RT SP1, and Outlook 2016 allow an attacker to execute arbitrary commands, due to how Microsoft Office handles objects in memory, aka "Microsoft Outlook Security Feature Bypass Vulnerability."

Statistics

  • 1 Post

Last activity: 5 hours ago

Fediverse

Profile picture fallback

In case anyone needs them: These are some IOCs associated with current events.

Most are dated, but may give you a starting point in your threat hunts.

MuddyWater,C2 IP,185.236.234.161,DeepInstinct 2024
MuddyWater,C2 IP,185.216.13.242,DeepInstinct
MuddyWater,C2 IP,45.66.249.226,Cyberthint 2025
MuddyWater,C2 IP,91.121.240.102,NetSecurity
MuddyWater,C2 IP,137.74.131.19,SOCPrime 2026
MuddyWater,C2 IP,164.132.237.68,Protostellar
MuddyWater,C2 IP,185.94.108.91,ESET 2025
MuddyWater,C2 IP,45.159.104.13,USCYBERCOM
MuddyWater,C2 IP,185.162.231.46,Joint Advisory
MuddyWater,C2 IP,185.236.234.165,Radar Offseq
MuddyWater,C2 IP,82.117.255.29,Stormshield
MuddyWater,C2 Domain,oneskyapp[.]com,MITRE G0069
APT33,C2 IP,91.219.236.148,MITRE G0064
APT33,C2 Port,808,MITRE
APT33,Malware Hash,e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855,FireEye
APT33,Exploit CVE,CVE-2017-11774,Mandiant
APT33,Malware Hash,d41d8cd98f00b204e9800998ecf8427e,Microsoft
APT33,C2 Domain,elfin-team[.]org,Leak
APT35,C2 IP,84.200.193.20,Stormshield 2025
APT35,C2 IP,79.132.131.184,DomainTools
APT35,C2 IP,128.199.237.132,Internal Leak
APT35,C2 IP,212.175.168.58,Stormshield
APT35,C2 Domain,rohan63[.]xyz,GitHub Leak
APT35,Email Domain,irgc-leak[.]email,DTI Report

  • 0
  • 0
  • 0
  • 5h ago

Overview

  • Copeland
  • Copeland XWEB 300D PRO

27 Feb 2026
Published
27 Feb 2026
Updated

CVSS v3.1
HIGH (8.0)
EPSS
0.11%

KEV

Description

An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code execution on the system by providing malicious input via the device hostname configuration which is later processed during system setup, resulting in remote code execution.

Statistics

  • 1 Post

Last activity: 11 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-20764 - An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code executi... https://www.cyberhub.blog/cves/CVE-2026-20764
  • 0
  • 0
  • 0
  • 11h ago

Overview

  • Copeland
  • Copeland XWEB 300D PRO

27 Feb 2026
Published
27 Feb 2026
Updated

CVSS v3.1
HIGH (8.0)
EPSS
0.20%

KEV

Description

An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code execution on the system by injecting malicious input into the map filename field during the map upload action of the parameters route.

Statistics

  • 1 Post

Last activity: 15 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-20902 - An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code exec... https://www.cyberhub.blog/cves/CVE-2026-20902
  • 0
  • 0
  • 0
  • 15h ago

Overview

  • Microchip
  • TimePictra

28 Feb 2026
Published
28 Feb 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.05%

KEV

Description

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Microchip TimePictra allows Query System for Information.This issue affects TimePictra: from 11.0 through 11.3 SP2.

Statistics

  • 1 Post

Last activity: 8 hours ago

Fediverse

Profile picture fallback

🚨 CVE-2026-3010: CRITICAL XSS in Microchip TimePictra v11.0 – 11.3 SP2. Remote, unauthenticated attackers can inject scripts via web UI. Restrict access, enable WAF, monitor logs. Patch awaited. Full info: radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 8h ago

Overview

  • Microchip
  • TimePictra

28 Feb 2026
Published
28 Feb 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.05%

KEV

Description

Missing Authentication for Critical Function vulnerability in Microchip TimePictra allows Configuration/Environment Manipulation.This issue affects TimePictra: from 11.0 through 11.3 SP2.

Statistics

  • 1 Post

Last activity: 7 hours ago

Fediverse

Profile picture fallback

⚠️ CRITICAL vuln in Microchip TimePictra (11.0 – 11.3 SP2): CVE-2026-2844 lets remote, unauthenticated attackers manipulate configs. No patch yet — restrict access & monitor logs! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 7h ago

Overview

  • MOTEX Inc.
  • Lanscope Endpoint Manager (On-Premises) Sub-Manager Server

25 Feb 2026
Published
25 Feb 2026
Updated

CVSS v3.0
CRITICAL (9.8)
EPSS
0.09%

KEV

Description

Path traversal vulnerability exists in Lanscope Endpoint Manager (On-Premises) Sub-Manager Server Ver.9.4.7.3 and earlier, which may allow an attacker to tamper with arbitrary files and execute arbitrary code on the affected system.

Statistics

  • 1 Post

Last activity: 1 hour ago

Bluesky

Profile picture fallback
📌 CVE-2026-25785 - Path traversal vulnerability exists in Lanscope Endpoint Manager (On-Premises) Sub-Manager Server Ver.9.4.7.3 and earlier, which may allow an attacker... https://www.cyberhub.blog/cves/CVE-2026-25785
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • karakeep-app
  • karakeep

25 Feb 2026
Published
25 Feb 2026
Updated

CVSS v3.1
HIGH (8.2)
EPSS
0.03%

KEV

Description

Karakeep is a elf-hostable bookmark-everything app. In version 0.30.0, when the Reddit metascraper plugin returns `readableContentHtml`, the HTML parsing subprocess uses it directly without running it through DOMPurify. Every other content source in the crawler goes through Readability + DOMPurify, but the Reddit path skips both. Since this content ends up in `dangerouslySetInnerHTML` in the reader view, any malicious HTML in the Reddit response gets executed in the user's browser. Version 0.31.0 contains a patch for this issue.

Statistics

  • 1 Post

Last activity: 4 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-27627 - Karakeep is a elf-hostable bookmark-everything app. In version 0.30.0, when the Reddit metascraper plugin returns `readableContentHtml`, the HTML pars... https://www.cyberhub.blog/cves/CVE-2026-27627
  • 0
  • 0
  • 0
  • 4h ago
Showing 11 to 20 of 32 CVEs