24h | 7d | 30d

Overview

  • Really Simple Plugins
  • Really Simple Security Pro multisite

15 Nov 2024
Published
23 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
93.89%

KEV

Description

The Really Simple Security (Free, Pro, and Pro Multisite) plugins for WordPress are vulnerable to authentication bypass in versions 9.0.0 to 9.1.1.1. This is due to improper user check error handling in the two-factor REST API actions with the 'check_login_and_get_user' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, when the "Two-Factor Authentication" setting is enabled (disabled by default).

Statistics

  • 1 Post

Last activity: 8 hours ago

Fediverse

Profile picture fallback

CW: Cybersecurity Technical Analysis

WordPress kembali menghadapi tantangan keamanan kritis. Kali ini menyerang plugin "Really Simple Security" (CVE-2024-10924) yang memungkinkan bypass autentikasi 2FA.

Baca selengkapnya di sini: analis-siber-purwakarta.blogsp

#Infosec #CyberSecurity #WordPress #Pentest #BlueTeam #AnalisSiber #WebSecurity

  • 0
  • 0
  • 0
  • 8h ago

Overview

  • BeyondTrust
  • Remote Support(RS) & Privileged Remote Access(PRA)

06 Feb 2026
Published
26 Feb 2026
Updated

CVSS v4.0
CRITICAL (9.9)
EPSS
81.50%

Description

BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user.

Statistics

  • 1 Post

Last activity: 23 hours ago

Bluesky

Profile picture fallback
~Huntress~ Attackers are exploiting critical flaw CVE-2026-1731 in outdated Bomgar RMMs to deploy LockBit ransomware. - IOCs: 146. 70. 41. 131, lokbt9@onionmail. org, CVE-2026-1731 - #Bomgar #CVE2026_1731 #Ransomware #ThreatIntel
  • 0
  • 0
  • 0
  • 23h ago

Overview

  • aEnrich
  • a+HRD

22 Apr 2026
Published
22 Apr 2026
Updated

CVSS v4.0
HIGH (7.1)
EPSS
0.04%

KEV

Description

The a+HRD developed by aEnrich has a Missing Authorization vulnerability, allowing authenticated remote attackers to arbitrarily read database contents through a specific API method.

Statistics

  • 1 Post

Last activity: 11 hours ago

Fediverse

Profile picture fallback

🔒 HIGH severity: aEnrich a+HRD (CVE-2026-6834) missing authorization flaw lets authenticated users read any database content via API. No patch yet — restrict API access & monitor for abuse. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 11h ago

Overview

  • Microsoft
  • Azure SRE Agent Gateway - SignalR Hub

02 Apr 2026
Published
21 Apr 2026
Updated

CVSS v3.1
HIGH (8.6)
EPSS
0.05%

KEV

Description

Improper authentication in Azure SRE Agent allows an unauthorized attacker to disclose information over a network.

Statistics

  • 1 Post

Last activity: 20 hours ago

Fediverse

Profile picture fallback

A security vulnerability in Azure's AI Agent allowed unauthorized access to commands, credentials, and sensitive information due to a flawed token verification system. This critical flaw, now patched and tracked as CVE-2026-32173, highlights growing concerns about AI agent security as rapid adoption outpaces governance controls.
govinfosecurity.com/token-flaw

  • 0
  • 0
  • 0
  • 20h ago

Overview

  • Cisco
  • Cisco Secure Email

17 Dec 2025
Published
26 Feb 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
6.80%

Description

A vulnerability in the Spam Quarantine feature of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager could allow an unauthenticated, remote attacker to execute arbitrary system commands on an affected device with root privileges. This vulnerability is due to insufficient validation of HTTP requests by the Spam Quarantine feature. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges.

Statistics

  • 1 Post

Last activity: 3 hours ago

Bluesky

Profile picture fallback
~Talos~ Phishing reemerges as the top initial access vector, with AI tools and valid accounts driving attacks against public admin and healthcare. - IOCs: CVE-2025-20393, CVE-2023-20198, MeowBackConn - #Phishing #Ransomware #ThreatIntel
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • Cisco
  • Cisco IOS XE Software

16 Oct 2023
Published
21 Oct 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
94.05%

Description

Cisco is providing an update for the ongoing investigation into observed exploitation of the web UI feature in Cisco IOS XE Software. We are updating the list of fixed releases and adding the Software Checker. Our investigation has determined that the actors exploited two previously unknown issues. The attacker first exploited CVE-2023-20198 to gain initial access and issued a privilege 15 command to create a local user and password combination. This allowed the user to log in with normal user access. The attacker then exploited another component of the web UI feature, leveraging the new local user to elevate privilege to root and write the implant to the file system. Cisco has assigned CVE-2023-20273 to this issue. CVE-2023-20198 has been assigned a CVSS Score of 10.0. CVE-2023-20273 has been assigned a CVSS Score of 7.2. Both of these CVEs are being tracked by CSCwh87343.

Statistics

  • 1 Post

Last activity: 3 hours ago

Bluesky

Profile picture fallback
~Talos~ Phishing reemerges as the top initial access vector, with AI tools and valid accounts driving attacks against public admin and healthcare. - IOCs: CVE-2025-20393, CVE-2023-20198, MeowBackConn - #Phishing #Ransomware #ThreatIntel
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • OpenSSL
  • OpenSSL

27 Jan 2026
Published
29 Jan 2026
Updated

CVSS
Pending
EPSS
0.06%

KEV

Description

Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously crafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing non-ASCII BMP code point can trigger a one byte write before the allocated buffer. Impact summary: The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service. The OPENSSL_uni2utf8() function performs a two-pass conversion of a PKCS#12 BMPString (UTF-16BE) to UTF-8. In the second pass, when emitting UTF-8 bytes, the helper function bmp_to_utf8() incorrectly forwards the remaining UTF-16 source byte count as the destination buffer capacity to UTF8_putc(). For BMP code points above U+07FF, UTF-8 requires three bytes, but the forwarded capacity can be just two bytes. UTF8_putc() then returns -1, and this negative value is added to the output length without validation, causing the length to become negative. The subsequent trailing NUL byte is then written at a negative offset, causing write outside of heap allocated buffer. The vulnerability is reachable via the public PKCS12_get_friendlyname() API when parsing attacker-controlled PKCS#12 files. While PKCS12_parse() uses a different code path that avoids this issue, PKCS12_get_friendlyname() directly invokes the vulnerable function. Exploitation requires an attacker to provide a malicious PKCS#12 file to be parsed by the application and the attacker can just trigger a one zero byte write before the allocated buffer. For that reason the issue was assessed as Low severity according to our Security Policy. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue. OpenSSL 1.0.2 is not affected by this issue.

Statistics

  • 1 Post

Last activity: 7 hours ago

Fediverse

Profile picture fallback

VDE-2026-023
Phoenix Contact: Several products are affected by vulnerabilities found in OpenSSL

Attacks are possible when installing key files and digitally signed objects. These attacks can only be carried out if these files are uploaded and installed by a logged-in user with high privileges.
CVE-2025-15467, CVE-2025-69419

certvde.com/en/advisories/vde-

phoenixcontact.csaf-tp.certvde

  • 0
  • 0
  • 0
  • 7h ago

Overview

  • OpenSSL
  • OpenSSL

27 Jan 2026
Published
20 Mar 2026
Updated

CVSS
Pending
EPSS
0.70%

KEV

Description

Issue summary: Parsing CMS AuthEnvelopedData or EnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution. When parsing CMS (Auth)EnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs. Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME (Auth)EnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the CMS implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3 and 3.0 are vulnerable to this issue. OpenSSL 1.1.1 and 1.0.2 are not affected by this issue.

Statistics

  • 1 Post

Last activity: 7 hours ago

Fediverse

Profile picture fallback

VDE-2026-023
Phoenix Contact: Several products are affected by vulnerabilities found in OpenSSL

Attacks are possible when installing key files and digitally signed objects. These attacks can only be carried out if these files are uploaded and installed by a logged-in user with high privileges.
CVE-2025-15467, CVE-2025-69419

certvde.com/en/advisories/vde-

phoenixcontact.csaf-tp.certvde

  • 0
  • 0
  • 0
  • 7h ago

Overview

  • Siemens
  • Solid Edge SE2025

08 Jul 2025
Published
08 Jul 2025
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.02%

KEV

Description

A vulnerability has been identified in Solid Edge SE2025 (All versions < V225.0 Update 5). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.

Statistics

  • 1 Post

Last activity: 23 hours ago

Fediverse

Profile picture fallback

Graph Construction Complete: 21 nodes, 12 edges.
Primary Drivers: ['CVE-2025-40739', 'CVE-2025-40740', 'CVE-2025-3508']

#GraphTheory #NetworkSecurity #TechnicalDebt #Audit
2/2

  • 0
  • 0
  • 0
  • 23h ago

Overview

  • HP Inc.
  • Certain HP DesignJet products

25 Jul 2025
Published
25 Jul 2025
Updated

CVSS v4.0
MEDIUM (6.0)
EPSS
0.05%

KEV

Description

Certain HP DesignJet products may be vulnerable to information disclosure though printer's web interface allowing unauthenticated users to view sensitive print job information.

Statistics

  • 1 Post

Last activity: 23 hours ago

Fediverse

Profile picture fallback

Graph Construction Complete: 21 nodes, 12 edges.
Primary Drivers: ['CVE-2025-40739', 'CVE-2025-40740', 'CVE-2025-3508']

#GraphTheory #NetworkSecurity #TechnicalDebt #Audit
2/2

  • 0
  • 0
  • 0
  • 23h ago
Showing 31 to 40 of 45 CVEs