24h | 7d | 30d

Overview

  • Hewlett Packard Enterprise (HPE)
  • HPE OneView

16 Dec 2025
Published
08 Jan 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
84.85%

Description

A remote code execution issue exists in HPE OneView.

Statistics

  • 1 Post

Last activity: 6 hours ago

Bluesky

Profile picture
Warning Issued for Exploitation of Critical HPE OneView Vulnerability #None #Check_Point #HPE_OneView #CVE-2025-37164
  • 0
  • 0
  • 0
  • 6h ago

Overview

  • Python Software Foundation
  • CPython

01 Dec 2025
Published
22 Dec 2025
Updated

CVSS v4.0
MEDIUM (6.3)
EPSS
0.09%

KEV

Description

When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.

Statistics

  • 2 Posts

Last activity: 18 hours ago

Bluesky

Profile picture
🚨 Attention System Administrators & DevOps Professionals! 🚨 A critical Denial-of-Service (DoS) vulnerability (CVE-2025-13836) has been patched in #Python 3.12 on Fedora 43. Read more: πŸ‘‰ tinyurl.com/2pvtvzcv #Fedora #Security
  • 0
  • 0
  • 0
  • 21h ago
Profile picture
URGENT: Patch #Python 3.11 on #Fedora43 now! CVEs: CVE-2025-13836 (HTTP Client DoS) & CVE-2025-12084 (XML DoS). Read more: πŸ‘‰ tinyurl.com/mrabktfb #Security #Fedora
  • 0
  • 0
  • 0
  • 18h ago

Overview

  • irisideatechsolutions
  • Kalrav AI Agent

24 Jan 2026
Published
24 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.14%

KEV

Description

The Kalrav AI Agent plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the kalrav_upload_file AJAX action in all versions up to, and including, 2.3.3. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

Statistics

  • 1 Post

Last activity: 2 hours ago

Bluesky

Profile picture
🚨 Critical WordPress vulnerability disclosed: CVE-2025-13374 affects the Kalrav AI Agent plugin and enables unauthenticated arbitrary file uploads, potentially leading to full server compromise. Full analysis: basefortify.eu/cve_reports/... #CVE #WordPress #CriticalVuln πŸ”
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • WellChoose
  • Single Sign-On Portal System

26 Jan 2026
Published
26 Jan 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
Pending

KEV

Description

Single Sign-On Portal System developed by WellChoose has a OS Command Injection vulnerability, allowing authenticated remote attackers to inject arbitrary OS commands and execute them on the server.

Statistics

  • 1 Post

Last activity: 2 hours ago

Fediverse

Profile picture

🟠 CVE-2026-1427 - High (8.8)

Organization Portal System developed by WellChoose has a OS Command Injection vulnerability, allowing authenticated remote attackers to inject arbitrary OS commands and execute them on the server.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

  • 0
  • 0
  • 0
  • 2h ago

Overview

  • Red Hat
  • Red Hat Enterprise Linux 10
  • libsoup3

11 Dec 2025
Published
13 Jan 2026
Updated

CVSS
Pending
EPSS
0.04%

KEV

Description

A flaw in libsoup’s HTTP header handling allows multiple Host: headers in a request and returns the last occurrence for server-side processing. Common front proxies often honor the first Host: header, so this mismatch can cause vhost confusion where a proxy routes a request to one backend but the backend interprets it as destined for another host. This discrepancy enables request-smuggling style attacks, cache poisoning, or bypassing host-based access controls when an attacker supplies duplicate Host headers.

Statistics

  • 1 Post

Last activity: Last hour

Bluesky

Profile picture
🚨 THREAD: #Fedora 42 mingw-libsoup security patch is out for CVE-2025-14523. 1/4: What is it? A fix for a "Duplicate Host Header" flaw. Read more: πŸ‘‰ tinyurl.com/37wp3kh8 #Security
  • 0
  • 0
  • 0
  • Last hour

Overview

  • rabbitmq
  • rabbitmq-server

25 Mar 2025
Published
26 Mar 2025
Updated

CVSS v3.1
MEDIUM (6.1)
EPSS
0.15%

KEV

Description

RabbitMQ is a messaging and streaming broker. Versions prior to 4.0.3 are vulnerable to a sophisticated attack that could modify virtual host name on disk and then make it unrecoverable (with other on disk file modifications) can lead to arbitrary JavaScript code execution in the browsers of management UI users. When a virtual host on a RabbitMQ node fails to start, recent versions will display an error message (a notification) in the management UI. The error message includes virtual host name, which was not escaped prior to open source RabbitMQ 4.0.3 and Tanzu RabbitMQ 4.0.3, 3.13.8. An attack that both makes a virtual host fail to start and creates a new virtual host name with an XSS code snippet or changes the name of an existing virtual host on disk could trigger arbitrary JavaScript code execution in the management UI (the user's browser). Open source RabbitMQ `4.0.3` and Tanzu RabbitMQ `4.0.3` and `3.13.8` patch the issue.

Statistics

  • 1 Post

Last activity: 23 hours ago

Bluesky

Profile picture
Technical deep dive just published: "Critical RabbitMQ Vulnerability Patched: Analyzing CVE-2025-30219. Read more: πŸ‘‰ tinyurl.com/mr2nmxsa #Security #OpenSUSE
  • 0
  • 0
  • 0
  • 23h ago

Overview

  • Microsoft
  • Windows Admin Center in Azure Portal

13 Jan 2026
Published
23 Jan 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.02%

KEV

Description

Improper verification of cryptographic signature in Windows Admin Center allows an authorized attacker to elevate privileges locally.

Statistics

  • 1 Post

Last activity: 23 hours ago

Fediverse

Profile picture

Microslop is a bit late for the new year celebration (or a bit early for Chinese new year).

Either way they're starting/ending the year with a banger: CVE-2026-20965

Being able to steal Global Admin token and labeling it a medium severity.

#infosec #infosec2026 #itsec #itsecurity

  • 0
  • 0
  • 0
  • 23h ago

Overview

  • Foundation Agents
  • MetaGPT

23 Jan 2026
Published
23 Jan 2026
Updated

CVSS v3.0
CRITICAL (9.8)
EPSS
1.39%

KEV

Description

Foundation Agents MetaGPT actionoutput_str_to_mapping Code Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foundation Agents MetaGPT. Authentication is not required to exploit this vulnerability. The specific flaw exists within the actionoutput_str_to_mapping function. The issue results from the lack of proper validation of a user-supplied string before using it to execute Python code. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-28124.

Statistics

  • 1 Post

Last activity: 9 hours ago

Fediverse

Profile picture

πŸ“° Trend Micro Details New RCE Flaw in MetaGPT (CVE-2026-0761)

Trend Micro details a new high-severity RCE vulnerability (CVE-2026-0761) in Foundation Agents MetaGPT. ⚠️ The flaw can be exploited over HTTP for initial access or lateral movement. Patch and scan systems now! #CVE #RCE #Vulnerability

πŸ”— cyber.netsecops.io/articles/tr

  • 0
  • 0
  • 0
  • 9h ago

Overview

  • InspiryThemes
  • Real Homes CRM
  • realhomes-crm

22 Jan 2026
Published
22 Jan 2026
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

Unrestricted Upload of File with Dangerous Type vulnerability in InspiryThemes Real Homes CRM realhomes-crm allows Using Malicious Files.This issue affects Real Homes CRM: from n/a through <= 1.0.0.

Statistics

  • 1 Post

Last activity: 9 hours ago

Bluesky

Profile picture
CVE-2025-67968 (CVSS 9.9): Critical Flaw in Real Estate Theme Exposes 30,000 Sites to Takeover
  • 0
  • 0
  • 0
  • 9h ago

Overview

  • Wireshark Foundation
  • Wireshark

14 Jan 2026
Published
14 Jan 2026
Updated

CVSS v3.1
MEDIUM (5.3)
EPSS
0.03%

KEV

Description

IEEE 802.11 protocol dissector crash in Wireshark 4.6.0 to 4.6.2 and 4.4.0 to 4.4.12 allows denial of service

Statistics

  • 1 Post

Last activity: 22 hours ago

Bluesky

Profile picture
Security Advisory: Wireshark 4.6.3 Update The #Wireshark Foundation and Red Hat have coordinated the release of version 4.6.3, addressing four medium-severity denial of service vulnerabilities (CVE-2026-0959 through CVE-2026-0962). Read more: πŸ‘‰ tinyurl.com/mr26aymp #Fedora
  • 0
  • 0
  • 0
  • 22h ago
Showing 11 to 20 of 27 CVEs