24h | 7d | 30d

Overview

  • Ivanti
  • Connect Secure

08 Jan 2025
Published
21 Oct 2025
Updated

CVSS v3.1
CRITICAL (9.0)
EPSS
94.10%

Description

A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a remote unauthenticated attacker to achieve remote code execution.

Statistics

  • 4 Posts
  • 3 Interactions

Last activity: 12 hours ago

Fediverse

Profile picture

👀 Seeing who’s poking Ivanti Connect Secure?

GreyNoise just caught a ~100x spike in recon on CVE-2025-0282 featuring one loud AS213790 campaign and one sneaky botnet spread across 6K IPs.

We broke down the infra + what defenders should do next. 👇
labs.greynoise.io/grimoire/202

  • 1
  • 1
  • 1
  • 12h ago
Profile picture

☕ & - Two campaigns (100x spike!) are hitting Ivanti Connect Secure; one loud (34K sessions from Romania/Moldova), one stealthy (~6K distributed IPs). Both target a pre-exploitation endpoint for CVE-2025-0282. labs.greynoise.io/grimoire/202

  • 1
  • 0
  • 1
  • 12h ago

Overview

  • SolarWinds
  • Web Help Desk

28 Jan 2026
Published
29 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.65%

KEV

Description

SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

Statistics

  • 5 Posts
  • 3 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture

‼️ SolarWinds Web Help Desk RCE Hit by Multiple Critical Security Flaws; CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, CVE-2025-40554

CVSS: All 9.8
CVEs Published: January 28th, 2026

CVE-2025-40551: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

CVE-2025-40552: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.

CVE-2025-40553: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

CVE-2025-40554: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.

Advisories:

nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2

  • 1
  • 2
  • 0
  • 11h ago
Profile picture

SolarWinds warns of critical Web Help Desk RCE, auth bypass flaws
bleepingcomputer.com/news/secu

SolarWinds has released security updates to patch critical authentication
bypass and remote command execution vulnerabilities in its Web Help Desk IT
help desk software.

The authentication bypass security flaws (tracked as CVE-2025-40552 and
CVE-2025-40554) patched today by SolarWinds were reported by watchTowr's Piotr
Bazydlo and can be exploited by remote unauthenticated threat actors in
low-complexity attacks.

Bazydlo also found and reported a critical remote code execution (RCE) flaw
(CVE-2025-40553) stemming from an untrusted data deserialization weakness that
can enable attackers without privileges to run commands on vulnerable hosts.
A second RCE vulnerability (CVE-2025-40551) reported by Horizon3.ai security
researcher Jimi Sebree can also enable unauthenticated attackers to execute
commands remotely.

  • 0
  • 0
  • 0
  • 14h ago
Profile picture

📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.

Sources:
- bleepingcomputer.com/news/secu
- cloud.google.com/blog/topics/t
- nvd.nist.gov/vuln/detail/CVE-2
- helpnetsecurity.com/2026/01/28

---

🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀

CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.

Sources:
- nvd.nist.gov/vuln/detail/CVE-2
infosecurity-magazine.com/news
- openssl-library.org/news/vulne
- twitter.com/IntCyberDigest/sta

---

🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡

SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.

Sources:
- bleepingcomputer.com/news/secu
- helpnetsecurity.com/2026/01/29
- rapid7.com/blog/post/etr-multi
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2

  • 0
  • 0
  • 0
  • 12h ago

Bluesky

Profile picture
SolarWinds Web Help Desk Deserialization of Untrusted Data Remote Code Execution Vulnerability (CVE-2025-40553) URL: www.solarwinds.com/trust-center... Classification: Critical, Solution: Official Fix, Exploit Maturity: Not Defined, CVSSv3.1: 9.8
  • 0
  • 0
  • 0
  • 22h ago
Profile picture
SolarWinds、Web Help Deskにおける重大な脆弱性を複数修正(CVE-2025-40552、CVE-2025-40553他) | Codebook|Security News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/43668/
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • SolarWinds
  • Web Help Desk

28 Jan 2026
Published
29 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.03%

KEV

Description

SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.

Statistics

  • 5 Posts
  • 3 Interactions

Last activity: 11 hours ago

Fediverse

Profile picture

🚨 2 critical authentication bypass and remote command execution vulnerabilities in Solarwinds WHD have been disclosed.

Vulnerability detection scripts can be found below:
CVE-2025-40552:
github.com/rxerium/rxerium-tem

CVE-2025-40554:
github.com/rxerium/rxerium-tem

At the time of writing there are no signs of active exploitation in the wild but it is strongly recommended that you patch as per Solarwind's security advisory:
documentation.solarwinds.com/e

  • 0
  • 0
  • 0
  • 22h ago
Profile picture

‼️ SolarWinds Web Help Desk RCE Hit by Multiple Critical Security Flaws; CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, CVE-2025-40554

CVSS: All 9.8
CVEs Published: January 28th, 2026

CVE-2025-40551: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

CVE-2025-40552: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.

CVE-2025-40553: SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

CVE-2025-40554: SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.

Advisories:

nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2
nvd.nist.gov/vuln/detail/CVE-2

  • 1
  • 2
  • 0
  • 11h ago
Profile picture

SolarWinds warns of critical Web Help Desk RCE, auth bypass flaws
bleepingcomputer.com/news/secu

SolarWinds has released security updates to patch critical authentication
bypass and remote command execution vulnerabilities in its Web Help Desk IT
help desk software.

The authentication bypass security flaws (tracked as CVE-2025-40552 and
CVE-2025-40554) patched today by SolarWinds were reported by watchTowr's Piotr
Bazydlo and can be exploited by remote unauthenticated threat actors in
low-complexity attacks.

Bazydlo also found and reported a critical remote code execution (RCE) flaw
(CVE-2025-40553) stemming from an untrusted data deserialization weakness that
can enable attackers without privileges to run commands on vulnerable hosts.
A second RCE vulnerability (CVE-2025-40551) reported by Horizon3.ai security
researcher Jimi Sebree can also enable unauthenticated attackers to execute
commands remotely.

  • 0
  • 0
  • 0
  • 14h ago
Profile picture

📦 That WinRAR "Free Trial" You Never Paid For? Hackers Are Exploiting It Right Now 🚨
A WinRAR vulnerability patched last July (CVE-2025-8088) is still being actively exploited by Russian APTs, Chinese threat actors, and cybercrime gangs six months later. The path traversal flaw lets attackers slip malicious files into your system when you extract seemingly innocent archives. If you're still using WinRAR, update immediately or switch to 7-Zip.

Sources:
- bleepingcomputer.com/news/secu
- cloud.google.com/blog/topics/t
- nvd.nist.gov/vuln/detail/CVE-2
- helpnetsecurity.com/2026/01/28

---

🔓 Critical OpenSSL Flaw Could Let Hackers Take Over Your Computer Via Email 💀

CVE-2025-15467 is a critical 9.8 CVSS remote code execution vulnerability in OpenSSL's CMS and S/MIME message processing. OpenSSL powers encrypted communications across the entire internet, and this flaw allows unauthenticated attackers to execute arbitrary code remotely without any credentials. A working proof-of-concept already exists in the wild, meaning both defenders and attackers have access to it.

Sources:
- nvd.nist.gov/vuln/detail/CVE-2
infosecurity-magazine.com/news
- openssl-library.org/news/vulne
- twitter.com/IntCyberDigest/sta

---

🤦 SolarWinds Ships Critical Vulnerabilities In Their Own Software (Yes, THAT SolarWinds) 🤡

SolarWinds, the company that became the poster child for supply chain attacks after their 2020 breach, just disclosed four critical vulnerabilities in their Web Help Desk product. The flaws include unauthenticated remote code execution and authentication bypass that can be chained together to completely compromise systems without logging in. Five years after congressional hearings and intense security scrutiny, they still shipped this mess.

Sources:
- bleepingcomputer.com/news/secu
- helpnetsecurity.com/2026/01/29
- rapid7.com/blog/post/etr-multi
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2
- nvd.nist.gov/vuln/detail/CVE-2

  • 0
  • 0
  • 0
  • 12h ago

Bluesky

Profile picture
SolarWinds Web Help Desk Authentication Bypass Vulnerability (CVE-2025-40554) Download PDF URL: www.solarwinds.com/trust-center... Classification: Critical, Solution: Official Fix, Exploit Maturity: Not Defined, CVSSv3.1: 9.8
  • 0
  • 0
  • 0
  • 22h ago

Overview

  • gristlabs
  • grist-core

22 Jan 2026
Published
22 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.06%

KEV

Description

Grist is spreadsheet software using Python as its formula language. Grist offers several methods for running those formulas in a sandbox, for cases where the user may be working with untrusted spreadsheets. One such method runs them in pyodide, but pyodide on node does not have a useful sandbox barrier. If a user of Grist sets `GRIST_SANDBOX_FLAVOR` to `pyodide` and opens a malicious document, that document could run arbitrary processes on the server hosting Grist. The problem has been addressed in Grist version 1.7.9 and up, by running pyodide under deno. As a workaround, a user can use the gvisor-based sandbox by setting `GRIST_SANDBOX_FLAVOR` to `gvisor`.

Statistics

  • 2 Posts

Last activity: 11 hours ago

Bluesky

Profile picture
CVE-2026-24002: Critical Sandbox Escape Turns Grist Spreadsheets into RCE Weapons
  • 0
  • 0
  • 0
  • 18h ago
Profile picture
Grist Core Flaw Enables Remote Code Execution Read More: buff.ly/Vm8WYov #CVE202624002 #RemoteCodeExecution #GristCore #OpenSourceSecurity #Pyodide #AppSec #VulnerabilityDisclosure #ZeroDay
  • 0
  • 0
  • 0
  • 11h ago

Overview

  • Go standard library
  • net/url
  • net/url

28 Jan 2026
Published
29 Jan 2026
Updated

CVSS
Pending
EPSS
0.01%

KEV

Description

The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.

Statistics

  • 2 Posts

Last activity: 10 hours ago

Fediverse

Profile picture

🟠 CVE-2025-61726 - High (7.5)

The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse larg...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

  • 0
  • 0
  • 0
  • 10h ago

Bluesky

Profile picture
🚨 New UNKNOWN CVE detected in AWS Lambda 🚨 CVE-2025-61726 impacts stdlib in 27 Lambda base images. Details: https://github.com/aws/aws-lambda-base-images/issues/387 More: https://lambdawatchdog.com/ #AWS #Lambda #CVE #CloudSecurity #Serverless
  • 0
  • 0
  • 0
  • 18h ago

Overview

  • n8n

18 Jan 2026
Published
23 Jan 2026
Updated

CVSS v3.1
HIGH (8.5)
EPSS
0.06%

KEV

Description

Using string formatting and exception handling, an attacker may bypass n8n's python-task-executor sandbox restrictions and run arbitrary unrestricted Python code in the underlying operating system. The vulnerability can be exploited via the Code block by an authenticated user with basic permissions and can lead to a full n8n instance takeover on instances operating under "Internal" execution mode. If the instance is operating under the "External" execution mode (ex. n8n's official Docker image) - arbitrary code execution occurs inside a Sidecar container and not the main node, which significantly reduces the vulnerability impact.

Statistics

  • 3 Posts
  • 1 Interaction

Last activity: 19 hours ago

Fediverse

Profile picture

🚨 2 new vulnerability scripts created for the n8n vulnerabilities disclosed today:

CVE-2026-1470:
github.com/rxerium/rxerium-tem

CVE-2026-0863:
github.com/rxerium/rxerium-tem

Happy hunting.

  • 0
  • 0
  • 0
  • 22h ago
Profile picture

n8n – CVE-2026-1470 et CVE-2026-0863 : deux nouvelles failles patchées, comment se protéger ? it-connect.fr/n8n-cve-2026-147 #ActuCybersécurité #Cybersécurité #Vulnérabilité

  • 0
  • 0
  • 0
  • 19h ago

Bluesky

Profile picture
n8n - CVE-2026-1470 et CVE-2026-0863 : deux nouvelles failles patchées, comment se protéger ? 👇 Les détails dans l'article de Florian : - www.it-connect.fr/n8n-cve-2026... #n8n #infosec #cybersecurite
  • 0
  • 1
  • 0
  • 23h ago

Overview

  • n8n

27 Jan 2026
Published
27 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.9)
EPSS
0.31%

KEV

Description

n8n contains a critical Remote Code Execution (RCE) vulnerability in its workflow Expression evaluation system. Expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime. An authenticated attacker could abuse this behavior to execute arbitrary code with the privileges of the n8n process. Successful exploitation may lead to full compromise of the affected instance, including unauthorized access to sensitive data, modification of workflows, and execution of system-level operations.

Statistics

  • 3 Posts
  • 1 Interaction

Last activity: 19 hours ago

Fediverse

Profile picture

🚨 2 new vulnerability scripts created for the n8n vulnerabilities disclosed today:

CVE-2026-1470:
github.com/rxerium/rxerium-tem

CVE-2026-0863:
github.com/rxerium/rxerium-tem

Happy hunting.

  • 0
  • 0
  • 0
  • 22h ago
Profile picture

n8n – CVE-2026-1470 et CVE-2026-0863 : deux nouvelles failles patchées, comment se protéger ? it-connect.fr/n8n-cve-2026-147 #ActuCybersécurité #Cybersécurité #Vulnérabilité

  • 0
  • 0
  • 0
  • 19h ago

Bluesky

Profile picture
n8n - CVE-2026-1470 et CVE-2026-0863 : deux nouvelles failles patchées, comment se protéger ? 👇 Les détails dans l'article de Florian : - www.it-connect.fr/n8n-cve-2026... #n8n #infosec #cybersecurite
  • 0
  • 1
  • 0
  • 23h ago

Overview

  • FreePBX
  • security-reporting

07 Nov 2025
Published
07 Nov 2025
Updated

CVSS v4.0
HIGH (8.6)
EPSS
0.46%

KEV

Description

FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. In versions 17.0.2.36 and above before 17.0.3, the filestore module within the Administrative interface is vulnerable to a post-authentication command injection by an authenticated known user via the testconnection -> check_ssh_connect() function. An attacker can leverage this vulnerability to obtain remote access to the system as an asterisk user. This issue is fixed in version 17.0.3.

Statistics

  • 2 Posts

Last activity: 14 hours ago

Fediverse

Profile picture

Unveiling the Weaponized Web Shell EncystPHP
fortinet.com/blog/threat-resea

FortiGuard Labs has discovered a web shell that we named “EncystPHP.” It
features several advanced capabilities, including remote command execution,
persistence mechanisms, and web shell deployment. Incidents were launched in
early December last year and propagated via exploitation of the FreePBX
vulnerability CVE-2025-64328.

Its malicious activity appears to be associated with the hacker group
INJ3CTOR3, first identified in 2020, which targeted CVE-2019-19006. In 2022,
the threat actor shifted its focus to the Elastix system via CVE-2021-45461.
These incidents begin with the exploitation of a FreePBX vulnerability,
followed by the deployment of a PHP web shell in the target environments. We
assess that this campaign represents recent attack activity and behavior
patterns associated with INJ3CTOR3.

  • 0
  • 0
  • 0
  • 14h ago

Bluesky

Profile picture
FortiGuard Labs analyses EncystPHP, a weaponized web shell delivering remote command execution, persistence and further web shell deployment. It spreads by exploiting FreePBX vulnerability CVE-2025-64328 and is linked to the INJ3CTOR3 actor. www.fortinet.com/blog/threat-...
  • 0
  • 0
  • 0
  • 19h ago

Overview

  • choijun
  • LA-Studio Element Kit for Elementor

22 Jan 2026
Published
22 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.04%

KEV

Description

The LA-Studio Element Kit for Elementor plugin for WordPress is vulnerable to Administrative User Creation in all versions up to, and including, 1.5.6.3. This is due to the 'ajax_register_handle' function not restricting what user roles a user can register with. This makes it possible for unauthenticated attackers to supply the 'lakit_bkrole' parameter during registration and gain administrator access to the site.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 9 hours ago

Fediverse

Profile picture

‼️ CVE-2026-0920: Explanation and payload of the recent vulnerability in the LA-Studio Element WordPress plugin.

PoC/Exploit: github.com/John-doe-code-a11/C

CVSS: 9.8
CVE Published: January 22nd, 2026

Advisory: github.com/advisories/GHSA-m3h

Technical Analysis: wordfence.com/blog/2026/01/200

  • 0
  • 1
  • 0
  • 9h ago

Overview

  • inc2734
  • Snow Monkey Forms

28 Jan 2026
Published
28 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.14%

KEV

Description

The Snow Monkey Forms plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'generate_user_dirpath' function in all versions up to, and including, 12.0.3. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

Statistics

  • 1 Post

Last activity: 8 hours ago

Fediverse

Profile picture

‼️ CVE-2026-1056: Snow Monkey Forms <= 12.0.3 - Unauthenticated Arbitrary File Deletion via Path Traversal

PoC/Exploit: github.com/ch4r0nn/CVE-2026-10

CVSS: 9.8
CVE Published: January 28th, 2026

Advisory: github.com/advisories/GHSA-g5p

Details: The Snow Monkey Forms plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'generate_user_dirpath' function in all versions up to, and including, 12.0.3. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

  • 0
  • 0
  • 0
  • 8h ago
Showing 11 to 20 of 69 CVEs