24h | 7d | 30d

Overview

  • Acronis
  • Acronis Cyber Protect 16

20 Feb 2026
Published
20 Feb 2026
Updated

CVSS v3.0
CRITICAL (10.0)
EPSS
Pending

KEV

Description

Sensitive data disclosure and manipulation due to missing authorization. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39938, Acronis Cyber Protect 15 (Linux, Windows) before build 41800.

Statistics

  • 1 Post

Last activity: 6 hours ago

Bluesky

Profile picture fallback
πŸ“Œ CVE-2025-30416 https://www.cyberhub.blog/article/alert-cve-2025-30416
  • 0
  • 0
  • 0
  • 6h ago

Overview

  • curl
  • curl

08 Jan 2026
Published
08 Jan 2026
Updated

CVSS
Pending
EPSS
0.03%

KEV

Description

When doing SSH-based transfers using either SCP or SFTP, and setting the known_hosts file, libcurl could still mistakenly accept connecting to hosts *not present* in the specified file if they were added as recognized in the libssh *global* known_hosts file.

Statistics

  • 1 Post

Last activity: 20 hours ago

Bluesky

Profile picture fallback
🚨 New MEDIUM CVE detected in AWS Lambda 🚨 CVE-2025-15079 impacts curl-minimal in 40 Lambda base images. Details: https://github.com/aws/aws-lambda-base-images/issues/412 More: https://lambdawatchdog.com/ #AWS #Lambda #CVE #CloudSecurity #Serverless
  • 0
  • 0
  • 0
  • 20h ago

Overview

  • Dell
  • Unisphere for PowerMax

19 Feb 2026
Published
19 Feb 2026
Updated

CVSS v3.1
HIGH (8.1)
EPSS
0.05%

KEV

Description

Dell Unisphere for PowerMax, version(s) 10.2, contain(s) an External Control of File Name or Path vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability to delete arbitrary files.

Statistics

  • 2 Posts

Last activity: 17 hours ago

Fediverse

Profile picture fallback

πŸ”’ HIGH severity: Dell Unisphere for PowerMax 10.2 is vulnerable (CVE-2026-26360) to external control of file name/path. Remote, low privilege attackers could delete arbitrary files. Watch for patches! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 23h ago
Profile picture fallback

πŸ›‘ HIGH severity: Dell Unisphere for PowerMax v10.2 (CVE-2026-26360) has a network-based vulnerability β€” low-priv attackers can remotely delete files, risking data & availability. Restrict access, monitor logs, back up configs. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 17h ago

Overview

  • Diy Security SL
  • Foscam Video Management System

18 Feb 2026
Published
19 Feb 2026
Updated

CVSS v4.0
MEDIUM (4.6)
EPSS
0.03%

KEV

Description

Foscam Video Management System 1.1.4.9 contains a denial of service vulnerability in the username input field that allows attackers to crash the application. Attackers can overwrite the username with a 520-byte buffer of repeated 'A' characters to trigger an application crash during device login.

Statistics

  • 1 Post

Last activity: 5 hours ago

Bluesky

Profile picture fallback
πŸ“Œ CVE-2019-25353 https://www.cyberhub.blog/article/alert-cve-2019-25353
  • 0
  • 0
  • 0
  • 5h ago

Overview

  • OpenSSL
  • OpenSSL

27 Jan 2026
Published
29 Jan 2026
Updated

CVSS
Pending
EPSS
0.05%

KEV

Description

Issue summary: If an application using the SSL_CIPHER_find() function in a QUIC protocol client or server receives an unknown cipher suite from the peer, a NULL dereference occurs. Impact summary: A NULL pointer dereference leads to abnormal termination of the running process causing Denial of Service. Some applications call SSL_CIPHER_find() from the client_hello_cb callback on the cipher ID received from the peer. If this is done with an SSL object implementing the QUIC protocol, NULL pointer dereference will happen if the examined cipher ID is unknown or unsupported. As it is not very common to call this function in applications using the QUIC protocol and the worst outcome is Denial of Service, the issue was assessed as Low severity. The vulnerable code was introduced in the 3.2 version with the addition of the QUIC protocol support. The FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue, as the QUIC implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue. OpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue.

Statistics

  • 1 Post

Last activity: 20 hours ago

Bluesky

Profile picture fallback
🚨 New HIGH CVE detected in AWS Lambda 🚨 CVE-2025-15468 impacts openssl-fips-provider-latest in 40 Lambda base images. Details: https://github.com/aws/aws-lambda-base-images/issues/415 More: https://lambdawatchdog.com/ #AWS #Lambda #CVE #CloudSecurity #Serverless
  • 0
  • 0
  • 0
  • 20h ago

Overview

  • OpenSSL
  • OpenSSL

27 Jan 2026
Published
28 Jan 2026
Updated

CVSS
Pending
EPSS
0.07%

KEV

Description

Issue summary: A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file. Impact summary: An application calling TS_RESP_verify_response() with a malformed TimeStamp Response can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service. The functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2() access the signing cert attribute value without validating its type. When the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash. Exploiting this vulnerability requires an attacker to provide a malformed TimeStamp Response to an application that verifies timestamp responses. The TimeStamp protocol (RFC 3161) is not widely used and the impact of the exploit is just a Denial of Service. For these reasons the issue was assessed as Low severity. The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the TimeStamp Response implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue. OpenSSL 1.0.2 is not affected by this issue.

Statistics

  • 1 Post

Last activity: 20 hours ago

Bluesky

Profile picture fallback
🚨 New HIGH CVE detected in AWS Lambda 🚨 CVE-2025-69420 impacts openssl-fips-provider-latest in 40 Lambda base images. Details: https://github.com/aws/aws-lambda-base-images/issues/420 More: https://lambdawatchdog.com/ #AWS #Lambda #CVE #CloudSecurity #Serverless
  • 0
  • 0
  • 0
  • 20h ago

Overview

  • wp_media
  • BackWPup – WordPress Backup & Restore Plugin

19 Feb 2026
Published
19 Feb 2026
Updated

CVSS v3.1
HIGH (7.2)
EPSS
0.03%

KEV

Description

The BackWPup – WordPress Backup & Restore Plugin plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the save_site_option() function in all versions up to, and including, 5.6.2. This makes it possible for authenticated attackers, with level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.

Statistics

  • 1 Post

Last activity: 2 hours ago

Bluesky

Profile picture fallback
πŸ“Œ CVE-2025-15041 https://www.cyberhub.blog/article/alert-cve-2025-15041
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • Microsoft
  • Windows Admin Center

11 Dec 2025
Published
13 Feb 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.06%

KEV

Description

Improper access control in Windows Admin Center allows an authorized attacker to elevate privileges locally.

Statistics

  • 1 Post

Last activity: 11 hours ago

Bluesky

Profile picture fallback
CVE-2025-64669: Uncovering Local Privilege Escalation Vulnerability in Windows Admin Center
  • 0
  • 0
  • 0
  • 11h ago

Overview

  • kovidgoyal
  • calibre

20 Feb 2026
Published
20 Feb 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
Pending

KEV

Description

calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Versions 9.2.1 and below are vulnerable to Path Traversal through PDB readers (both 132-byte and 202-byte header variants) that allow arbitrary file writes with arbitrary extension and arbitrary content anywhere the user has write permissions. Files are written in 'wb' mode, silently overwriting existing files. This can lead to potential code execution and Denial of Service through file corruption. This issue has been fixed in version 9.3.0.

Statistics

  • 1 Post

Last activity: 5 hours ago

Fediverse

Profile picture fallback

⚠️ CRITICAL vuln: calibre <9.3.0 (CVE-2026-26065) allows arbitrary file writes via path traversal in PDB reader. Risks: code execution, DoS. Patch to 9.3.0+ ASAP! No known exploits yet. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 5h ago

Overview

  • EPSON
  • EPSON Printer Controller Installer
  • com.epson.InstallNavi.helper

19 Feb 2026
Published
19 Feb 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.01%

KEV

Description

The com.epson.InstallNavi.helper tool, deployed with the EPSON printer driver installer, contains a local privilege escalation vulnerability due to multiple flaws in its implementation. It fails to properly authenticate clients over the XPC protocol and does not correctly enforce macOS’s authorization model, exposing privileged functionality to untrusted users. Although it invokes the AuthorizationCopyRights API, it does so using overly permissive custom rights that it registers in the system’s authorization database (/var/db/auth.db). These rights can be requested and granted by the authorization daemon to any local user, regardless of privilege level. As a result, an attacker can exploit the vulnerable service to perform privileged operations such as executing arbitrary commands or installing system components without requiring administrative credentials.

Statistics

  • 1 Post

Last activity: 9 hours ago

Bluesky

Profile picture fallback
πŸ“Œ CVE-2025-4960 https://www.cyberhub.blog/article/alert-cve-2025-4960
  • 0
  • 0
  • 0
  • 9h ago
Showing 71 to 80 of 81 CVEs