24h | 7d | 30d

Overview

  • Tenda
  • F453

28 Feb 2026
Published
28 Feb 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.05%

KEV

Description

A vulnerability was detected in Tenda F453 1.0.0.3. Affected by this issue is the function fromSafeUrlFilter of the file /goform/SafeUrlFilter. Performing a manipulation of the argument page results in buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used.

Statistics

  • 1 Post

Last activity: 8 hours ago

Fediverse

Profile picture fallback

⚠️ CVE-2026-3377 (HIGH): Buffer overflow in Tenda F453 v1.0.0.3 via /goform/SafeUrlFilter. Public exploit available, no patch yet. Restrict device access & monitor traffic. Details: radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 8h ago

Overview

  • OpenStack
  • Vitrage

27 Feb 2026
Published
27 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.08%

KEV

Description

In the query parser in OpenStack Vitrage before 12.0.1, 13.0.0, 14.0.0, and 15.0.0, a user allowed to access the Vitrage API may trigger code execution on the Vitrage service host as the user the Vitrage service runs under. This may result in unauthorized access to the host and further compromise of the Vitrage service. All deployments exposing the Vitrage API are affected. This occurs in _create_query_function in vitrage/graph/query.py.

Statistics

  • 1 Post

Last activity: 6 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-28370 - In the query parser in OpenStack Vitrage before 12.0.1, 13.0.0, 14.0.0, and 15.0.0, a user allowed to access the Vitrage API may trigger code executio... https://www.cyberhub.blog/cves/CVE-2026-28370
  • 0
  • 0
  • 0
  • 6h ago

Overview

  • Copeland
  • Copeland XWEB 300D PRO

27 Feb 2026
Published
27 Feb 2026
Updated

CVSS v3.1
HIGH (8.0)
EPSS
0.11%

KEV

Description

An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code execution on the system by injecting malicious input into the Wi-Fi SSID and/or password fields can lead to remote code execution when the configuration is processed.

Statistics

  • 1 Post

Last activity: 16 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-25196 - An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code executi... https://www.cyberhub.blog/cves/CVE-2026-25196
  • 0
  • 0
  • 0
  • 16h ago

Overview

  • Tenda
  • F453

01 Mar 2026
Published
01 Mar 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.05%

KEV

Description

A vulnerability has been found in Tenda F453 1.0.0.3. This vulnerability affects the function fromSetIpBind of the file /goform/SetIpBind. The manipulation of the argument page leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

Statistics

  • 1 Post

Last activity: 12 hours ago

Fediverse

Profile picture fallback

🚨 HIGH severity: Tenda F453 v1.0.0.3 has a buffer overflow (CVE-2026-3379) in /goform/SetIpBind. Remotely exploitable with no auth. Restrict access, monitor for exploit attempts, and patch ASAP. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 12h ago

Overview

  • Microsoft Corporation
  • Microsoft Outlook

13 Oct 2017
Published
21 Oct 2025
Updated

CVSS
Pending
EPSS
82.85%

Description

Microsoft Outlook 2010 SP2, Outlook 2013 SP1 and RT SP1, and Outlook 2016 allow an attacker to execute arbitrary commands, due to how Microsoft Office handles objects in memory, aka "Microsoft Outlook Security Feature Bypass Vulnerability."

Statistics

  • 1 Post

Last activity: 12 hours ago

Fediverse

Profile picture fallback

In case anyone needs them: These are some IOCs associated with current events.

Most are dated, but may give you a starting point in your threat hunts.

MuddyWater,C2 IP,185.236.234.161,DeepInstinct 2024
MuddyWater,C2 IP,185.216.13.242,DeepInstinct
MuddyWater,C2 IP,45.66.249.226,Cyberthint 2025
MuddyWater,C2 IP,91.121.240.102,NetSecurity
MuddyWater,C2 IP,137.74.131.19,SOCPrime 2026
MuddyWater,C2 IP,164.132.237.68,Protostellar
MuddyWater,C2 IP,185.94.108.91,ESET 2025
MuddyWater,C2 IP,45.159.104.13,USCYBERCOM
MuddyWater,C2 IP,185.162.231.46,Joint Advisory
MuddyWater,C2 IP,185.236.234.165,Radar Offseq
MuddyWater,C2 IP,82.117.255.29,Stormshield
MuddyWater,C2 Domain,oneskyapp[.]com,MITRE G0069
APT33,C2 IP,91.219.236.148,MITRE G0064
APT33,C2 Port,808,MITRE
APT33,Malware Hash,e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855,FireEye
APT33,Exploit CVE,CVE-2017-11774,Mandiant
APT33,Malware Hash,d41d8cd98f00b204e9800998ecf8427e,Microsoft
APT33,C2 Domain,elfin-team[.]org,Leak
APT35,C2 IP,84.200.193.20,Stormshield 2025
APT35,C2 IP,79.132.131.184,DomainTools
APT35,C2 IP,128.199.237.132,Internal Leak
APT35,C2 IP,212.175.168.58,Stormshield
APT35,C2 Domain,rohan63[.]xyz,GitHub Leak
APT35,Email Domain,irgc-leak[.]email,DTI Report

  • 0
  • 0
  • 0
  • 12h ago

Overview

  • Red Hat
  • Red Hat Enterprise Linux 10
  • libsoup3

02 Feb 2026
Published
17 Feb 2026
Updated

CVSS
Pending
EPSS
1.64%

KEV

Description

A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart HTTP response, which can lead to memory corruption. This issue may result in application crashes or arbitrary code execution in applications that process untrusted server responses, and it does not require authentication or user interaction.

Statistics

  • 1 Post

Last activity: 1 hour ago

Bluesky

Profile picture fallback
Critical vulnerability patched in #openSUSE Leap 16.0: CVE-2026-1761 in libsoup2. This is a CVSS 9.2 stack-based buffer overflow in multipart response parsing, leading to potential RCE. Read more: 👉 tinyurl.com/2r2cr9xe #Security
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • Tenda
  • F453

28 Feb 2026
Published
28 Feb 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.05%

KEV

Description

A security vulnerability has been detected in Tenda F453 1.0.0.3. Affected by this vulnerability is the function fromSafeMacFilter of the file /goform/SafeMacFilter. Such manipulation of the argument page leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.

Statistics

  • 1 Post

Last activity: 6 hours ago

Fediverse

Profile picture fallback

🔒 CVE-2026-3376: HIGH severity buffer overflow in Tenda F453 v1.0.0.3 (/goform/SafeMacFilter). Public exploit enables remote code execution — no auth needed. Isolate devices & restrict access until patched. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 6h ago

Overview

  • Copeland
  • Copeland XWEB 300D PRO

27 Feb 2026
Published
27 Feb 2026
Updated

CVSS v3.1
HIGH (8.0)
EPSS
0.11%

KEV

Description

An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code execution on the system by providing malicious input via the device hostname configuration which is later processed during system setup, resulting in remote code execution.

Statistics

  • 1 Post

Last activity: 18 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-20764 - An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code executi... https://www.cyberhub.blog/cves/CVE-2026-20764
  • 0
  • 0
  • 0
  • 18h ago

Overview

  • gVectors Team
  • wpForo Forum

28 Feb 2026
Published
28 Feb 2026
Updated

CVSS v4.0
HIGH (8.8)
EPSS
0.02%

KEV

Description

wpForo 2.4.14 contains an unauthenticated SQL injection vulnerability in Topics::get_topics() where the ORDER BY clause relies on ineffective esc_sql() sanitization on unquoted identifiers. Attackers exploit the wpfob parameter with CASE WHEN payloads to perform blind boolean extraction of credentials from the WordPress database.

Statistics

  • 1 Post

Last activity: 5 hours ago

Fediverse

Profile picture fallback

🛡️ HIGH severity: CVE-2026-28562 in wpForo Forum 2.4.14 (WordPress) — unauthenticated SQL injection via wpfob, enabling blind credential extraction. Apply WAF rules & monitor logs until a fix is released. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 5h ago

Overview

  • Juniper Networks
  • Junos OS Evolved

25 Feb 2026
Published
26 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.25%

KEV

Description

An Incorrect Permission Assignment for Critical Resource vulnerability in the On-Box Anomaly detection framework of Juniper Networks Junos OS Evolved on PTX Series allows an unauthenticated, network-based attacker to execute code as root. The On-Box Anomaly detection framework should only be reachable by other internal processes over the internal routing instance, but not over an externally exposed port. With the ability to access and manipulate the service to execute code as root a remote attacker can take complete control of the device. Please note that this service is enabled by default as no specific configuration is required. This issue affects Junos OS Evolved on PTX Series: * 25.4 versions before 25.4R1-S1-EVO, 25.4R2-EVO. This issue does not affect Junos OS Evolved versions before 25.4R1-EVO. This issue does not affect Junos OS.

Statistics

  • 1 Post

Last activity: 20 hours ago

Bluesky

Profile picture fallback
2026-02 Out-of-Cycle Security Bulletin: Junos OS Evolved: PTX Series: A vulnerability allows a unauthenticated, network-based attacker to execute code as root (CVE-2026-21902) #patchmanagement
  • 0
  • 0
  • 0
  • 20h ago
Showing 11 to 20 of 32 CVEs