24h | 7d | 30d

Overview

  • Simopro Technology
  • WinMatrix

16 Apr 2026
Published
16 Apr 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
Pending

KEV

Description

WinMatrix agent developed by Simopro Technology has a Missing Authentication vulnerability, allowing authenticated local attackers to execute arbitrary code with SYSTEM privileges on the local machine as well as on all hosts within the environment where the agent is installed.

Statistics

  • 1 Post

Last activity: 4 hours ago

Fediverse

Profile picture fallback

🔴 CRITICAL: CVE-2026-6348 in Simopro WinMatrix 3.5.13 lets local authenticated users execute code as SYSTEM. No patch yet — restrict access & monitor usage. Details: radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 4h ago

Overview

  • Microsoft
  • Windows

16 May 2019
Published
21 Oct 2025
Updated

CVSS
Pending
EPSS
94.45%

Description

A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'.

Statistics

  • 1 Post
  • 131 Interactions

Last activity: 17 hours ago

Bluesky

Profile picture fallback
There are only two bug classes left: complexity and memory safety. CurveBall (CVE-2020-0601)? Complexity. BigSig (CVE-2021-43527)? Memory safety. Log4Shell (CVE-2021-44228)? Complexity. BlueKeep (CVE-2019-0708)? Memory safety. Heartbleed looks like memory safety, but it's actually complexity.
  • 14
  • 117
  • 0
  • 17h ago

Overview

  • Mozilla
  • NSS

08 Dec 2021
Published
04 Aug 2024
Updated

CVSS
Pending
EPSS
5.24%

KEV

Description

NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures. Applications using NSS for handling signatures encoded within CMS, S/MIME, PKCS \#7, or PKCS \#12 are likely to be impacted. Applications using NSS for certificate validation or other TLS, X.509, OCSP or CRL functionality may be impacted, depending on how they configure NSS. *Note: This vulnerability does NOT impact Mozilla Firefox.* However, email clients and PDF viewers that use NSS for signature verification, such as Thunderbird, LibreOffice, Evolution and Evince are believed to be impacted. This vulnerability affects NSS < 3.73 and NSS < 3.68.1.

Statistics

  • 1 Post
  • 131 Interactions

Last activity: 17 hours ago

Bluesky

Profile picture fallback
There are only two bug classes left: complexity and memory safety. CurveBall (CVE-2020-0601)? Complexity. BigSig (CVE-2021-43527)? Memory safety. Log4Shell (CVE-2021-44228)? Complexity. BlueKeep (CVE-2019-0708)? Memory safety. Heartbleed looks like memory safety, but it's actually complexity.
  • 14
  • 117
  • 0
  • 17h ago

Overview

  • Apache Software Foundation
  • Apache Log4j2

10 Dec 2021
Published
21 Oct 2025
Updated

CVSS
Pending
EPSS
94.36%

Description

Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.

Statistics

  • 1 Post
  • 131 Interactions

Last activity: 17 hours ago

Bluesky

Profile picture fallback
There are only two bug classes left: complexity and memory safety. CurveBall (CVE-2020-0601)? Complexity. BigSig (CVE-2021-43527)? Memory safety. Log4Shell (CVE-2021-44228)? Complexity. BlueKeep (CVE-2019-0708)? Memory safety. Heartbleed looks like memory safety, but it's actually complexity.
  • 14
  • 117
  • 0
  • 17h ago

Overview

  • Microsoft
  • Windows

14 Jan 2020
Published
21 Oct 2025
Updated

CVSS
Pending
EPSS
94.09%

Description

A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source, aka 'Windows CryptoAPI Spoofing Vulnerability'.

Statistics

  • 1 Post
  • 131 Interactions

Last activity: 17 hours ago

Bluesky

Profile picture fallback
There are only two bug classes left: complexity and memory safety. CurveBall (CVE-2020-0601)? Complexity. BigSig (CVE-2021-43527)? Memory safety. Log4Shell (CVE-2021-44228)? Complexity. BlueKeep (CVE-2019-0708)? Memory safety. Heartbleed looks like memory safety, but it's actually complexity.
  • 14
  • 117
  • 0
  • 17h ago

Overview

  • Microsoft
  • Windows 10 Version 1507

08 Jul 2025
Published
13 Feb 2026
Updated

CVSS v3.1
LOW (3.5)
EPSS
0.44%

KEV

Description

External control of file name or path in Windows Storage allows an authorized attacker to perform spoofing over a network.

Statistics

  • 1 Post

Last activity: 6 hours ago

Bluesky

Profile picture fallback
CVE-2025-49760 & CVE-2025-49716: Windows RPC Poisoning and Netlogon Hardening – The Active Directory Takeover Threat + Video Introduction: Remote Procedure Call (RPC) is the backbone of inter-process communication in Windows environments, widely used for everything from file sharing to…
  • 0
  • 0
  • 0
  • 6h ago

Overview

  • Ivanti
  • Neurons for ITSM (On-Premise)

14 Apr 2026
Published
14 Apr 2026
Updated

CVSS v3.1
MEDIUM (5.7)
EPSS
0.11%

KEV

Description

Improper protection of an alternate path in Ivanti N-ITSM before version 2025.4 allows a remote authenticated attacker to retain access when their account has been disabled.

Statistics

  • 1 Post

Last activity: 21 hours ago

Bluesky

Profile picture fallback
Two vulnerabilities in Ivanti Neurons ITSM (CVE-2026-4913 & CVE-2026-4914) allow session persistence and stored XSS to expose session data. Cloud fixes released Dec 12, 2025; on-prem users must update via Ivanti License System. #IvantiFix #SessionHijack
  • 0
  • 0
  • 0
  • 21h ago

Overview

  • Ivanti
  • Neurons for ITSM (On-Premise)

14 Apr 2026
Published
14 Apr 2026
Updated

CVSS v3.1
MEDIUM (5.4)
EPSS
0.07%

KEV

Description

Stored XSS in Ivanti N-ITSM before version 2025.4 allows a remote authenticated attacker to obtain limited information from other user sessions. User interaction is required.

Statistics

  • 1 Post

Last activity: 21 hours ago

Bluesky

Profile picture fallback
Two vulnerabilities in Ivanti Neurons ITSM (CVE-2026-4913 & CVE-2026-4914) allow session persistence and stored XSS to expose session data. Cloud fixes released Dec 12, 2025; on-prem users must update via Ivanti License System. #IvantiFix #SessionHijack
  • 0
  • 0
  • 0
  • 21h ago

Overview

  • BerriAI
  • litellm

06 Apr 2026
Published
06 Apr 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.19%

KEV

Description

LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. Prior to 1.83.0, the /config/update endpoint does not enforce admin role authorization. A user who is already authenticated into the platform can then use this endpoint to modify proxy configuration and environment variables, register custom pass-through endpoint handlers pointing to attacker-controlled Python code, achieving remote code execution, read arbitrary server files by setting UI_LOGO_PATH and fetching via /get_image, and take over other privileged accounts by overwriting UI_USERNAME and UI_PASSWORD environment variables. Fixed in v1.83.0.

Statistics

  • 1 Post

Last activity: 12 hours ago

Bluesky

Profile picture fallback
LiteLLM、認証回避とRCEにつながる複数の重大脆弱性を修正(CVE-2026-35030,CVE-2026-35029) rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #セキュリティ #Security #CybersecurityNews #ainews
  • 0
  • 0
  • 0
  • 12h ago

Overview

  • BerriAI
  • litellm

06 Apr 2026
Published
07 Apr 2026
Updated

CVSS v4.0
CRITICAL (9.4)
EPSS
0.08%

KEV

Description

LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. Prior to 1.83.0, when JWT authentication is enabled (enable_jwt_auth: true), the OIDC userinfo cache uses token[:20] as the cache key. JWT headers produced by the same signing algorithm generate identical first 20 characters. This configuration option is not enabled by default. Most instances are not affected. An unauthenticated attacker can craft a token whose first 20 characters match a legitimate user's cached token. On cache hit, the attacker inherits the legitimate user's identity and permissions. This affects deployments with JWT/OIDC authentication enabled. Fixed in v1.83.0.

Statistics

  • 1 Post

Last activity: 12 hours ago

Bluesky

Profile picture fallback
LiteLLM、認証回避とRCEにつながる複数の重大脆弱性を修正(CVE-2026-35030,CVE-2026-35029) rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #セキュリティ #Security #CybersecurityNews #ainews
  • 0
  • 0
  • 0
  • 12h ago
Showing 31 to 40 of 55 CVEs