24h | 7d | 30d

Overview

  • Ivanti
  • Endpoint Manager Mobile

29 Jan 2026
Published
30 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
16.41%

Description

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

Statistics

  • 2 Posts
  • 17 Interactions

Last activity: 4 hours ago

Fediverse

Profile picture fallback

If you have Ivanti EPMM, please follow these instructions.

hub.ivanti.com/s/article/Secur

“Technical Analysis updated with reliable Indicators of Compromise (IoC’s). Both in partnership with NCSC-NL.”

The Dutchies are at it again!🤘🇳🇱

  • 2
  • 0
  • 0
  • 23h ago

Bluesky

Profile picture fallback
We have started to report webshells (or other artifacts) found on Ivanti EPMM devices, likely compromised via CVE-2026-1281. 56 IPs found on 2026-02-06 Data in shadowserver.org/what-we-do/n... Tree Map view: dashboard.shadowserver.org/statistics/c... Thank you to the KSA NCA for the heads up!
  • 3
  • 12
  • 0
  • 4h ago

Overview

  • n8n-io
  • n8n

04 Feb 2026
Published
05 Feb 2026
Updated

CVSS v4.0
CRITICAL (9.4)
EPSS
0.03%

KEV

Description

n8n is an open source workflow automation platform. Prior to versions 1.123.17 and 2.5.2, an authenticated user with permission to create or modify workflows could abuse crafted expressions in workflow parameters to trigger unintended system command execution on the host running n8n. This issue has been patched in versions 1.123.17 and 2.5.2.

Statistics

  • 2 Posts
  • 2 Interactions

Last activity: 9 hours ago

Fediverse

Profile picture fallback

Critical n8n Vulnerability CVE-2026-25049 Enables Remote Command Execution thecyberexpress.com/critical-n #cybersecurity #infosec

  • 0
  • 1
  • 0
  • 22h ago

Bluesky

Profile picture fallback
Critical n8n RCE Exposed: How CVE-2026-25049 Turns Workflow Automation into a Cyber Weapon + Video Introduction: A critical vulnerability, CVE-2026-25049, has been discovered in the popular workflow automation tool n8n, posing a severe threat to organizations globally. With a near-maximum CVSS…
  • 0
  • 1
  • 0
  • 9h ago

Overview

  • Temporal
  • Temporal
  • temporal

30 Dec 2025
Published
02 Jan 2026
Updated

CVSS v4.0
LOW (1.3)
EPSS
0.06%

KEV

Description

When frontend.enableExecuteMultiOperation is enabled, the server can apply namespace-scoped validation and feature gates for the embedded StartWorkflowExecutionRequest using its Namespace field rather than the outer, authorized ExecuteMultiOperationRequest.Namespace. This allows a caller authorized for one namespace to bypass that namespace's limits/policies by setting the embedded start request's namespace to a different namespace. The workflow is still created in the outer (authorized) namespace; only validation/gating is performed under the wrong namespace context. This issue affects Temporal: from 1.24.0 through 1.29.1. Fixed in 1.27.4, 1.28.2, 1.29.2.

Statistics

  • 2 Posts

Last activity: 9 hours ago

Bluesky

Profile picture fallback
Masked namespace vulnerability in Temporal https://depthfirst.com/post/the-masked-namespace-vulnerability-in-temporal-cve-2025-14986 (https://news.ycombinator.com/item?id=46917477)
  • 0
  • 0
  • 0
  • 22h ago
Profile picture fallback
https://depthfirst.com/post/the-masked-namespace-vulnerability-in-temporal-cve-2025-14986 TemporalのExecuteMultiOperationエンドポイントで「Masked Namespace」脆弱性(CVE-2025-14986)を発見。 この脆弱性は、認証された名前空間とは異なる名前空間でポリシー評価をさせることを可能にしました。 Temporal v1.27で修正済みです。
  • 0
  • 0
  • 0
  • 9h ago

Overview

  • BeyondTrust
  • Remote Support(RS) & Privileged Remote Access(PRA)

06 Feb 2026
Published
06 Feb 2026
Updated

CVSS v4.0
CRITICAL (9.9)
EPSS
0.44%

KEV

Description

BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 9 hours ago

Fediverse

Profile picture fallback

🚨 CVE-2026-1731: CRITICAL RCE in BeyondTrust RS & PRA. Unauthenticated attackers can execute OS commands pre-auth. Restrict access, monitor logs, and prep for patching. CVSS 9.9 — act now! radar.offseq.com/threat/cve-20

  • 1
  • 0
  • 0
  • 9h ago

Overview

  • nyariv
  • SandboxJS

06 Feb 2026
Published
06 Feb 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
0.05%

KEV

Description

SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, a sandbox escape is possible by shadowing hasOwnProperty on a sandbox object, which disables prototype whitelist enforcement in the property-access path. This permits direct access to __proto__ and other blocked prototype properties, enabling host Object.prototype pollution and persistent cross-sandbox impact. This vulnerability is fixed in 0.8.29.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 2 hours ago

Fediverse

Profile picture fallback

🔥 CRITICAL vuln: CVE-2026-25586 in SandboxJS (<0.8.29) enables prototype pollution & sandbox escapes via hasOwnProperty shadowing. Remote RCE & cross-sandbox impact possible. Upgrade to 0.8.29+ ASAP! radar.offseq.com/threat/cve-20

  • 1
  • 0
  • 0
  • 2h ago

Overview

  • payloadcms
  • payload

06 Feb 2026
Published
06 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.05%

KEV

Description

Payload is a free and open source headless content management system. Prior to 3.73.0, when querying JSON or richText fields, user input was directly embedded into SQL without escaping, enabling blind SQL injection attacks. An unauthenticated attacker could extract sensitive data (emails, password reset tokens) and achieve full account takeover without password cracking. This vulnerability is fixed in 3.73.0.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 6 hours ago

Fediverse

Profile picture fallback

🚨 CVE-2026-25544: CRITICAL SQL injection in Payload CMS (<3.73.0). Unauthenticated attackers can extract emails & reset tokens — full account takeover possible. Patch to 3.73.0+ ASAP! radar.offseq.com/threat/cve-20

  • 0
  • 1
  • 0
  • 6h ago

Overview

  • urllib3
  • urllib3

07 Jan 2026
Published
23 Jan 2026
Updated

CVSS v4.0
HIGH (8.9)
EPSS
0.02%

KEV

Description

urllib3 is an HTTP client library for Python. urllib3's streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br`, or `zstd`). When using the streaming API, the library decompresses only the necessary bytes, enabling partial content consumption. Starting in version 1.22 and prior to version 2.6.3, for HTTP redirect responses, the library would read the entire response body to drain the connection and decompress the content unnecessarily. This decompression occurred even before any read methods were called, and configured read limits did not restrict the amount of decompressed data. As a result, there was no safeguard against decompression bombs. A malicious server could exploit this to trigger excessive resource consumption on the client. Applications and libraries are affected when they stream content from untrusted sources by setting `preload_content=False` when they do not disable redirects. Users should upgrade to at least urllib3 v2.6.3, in which the library does not decode content of redirect responses when `preload_content=False`. If upgrading is not immediately possible, disable redirects by setting `redirect=False` for requests to untrusted source.

Statistics

  • 1 Post

Last activity: 21 hours ago

Fediverse

Profile picture fallback

Aw man, someone had to go and ruin all our fun with cve.org/CVERecord?id=CVE-2026- 😩

  • 0
  • 0
  • 0
  • 21h ago

Overview

  • microsoft
  • semantic-kernel

06 Feb 2026
Published
06 Feb 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
0.10%

KEV

Description

Semantic Kernel is an SDK used to build, orchestrate, and deploy AI agents and multi-agent systems. Prior to 1.70.0, an Arbitrary File Write vulnerability has been identified in Microsoft's Semantic Kernel .NET SDK, specifically within the SessionsPythonPlugin. The problem has been fixed in Microsoft.SemanticKernel.Core version 1.70.0. As a mitigation, users can create a Function Invocation Filter which checks the arguments being passed to any calls to DownloadFileAsync  or UploadFileAsync and ensures the provided localFilePath is allow listed.

Statistics

  • 1 Post

Last activity: 5 hours ago

Fediverse

Profile picture fallback

🚨 CVE-2026-25592 (CRITICAL, CVSS 10) impacts Microsoft Semantic Kernel <1.70.0: Remote path traversal in SessionsPythonPlugin enables arbitrary file writes. Upgrade to 1.70.0+ & validate file paths! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 5h ago

Overview

  • IBM
  • Common Cryptographic Architecture

04 Feb 2026
Published
06 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.06%

KEV

Description

IBM Common Cryptographic Architecture (CCA) 7.5.52 and 8.4.82 could allow an unauthenticated user to execute arbitrary commands with elevated privileges on the system.

Statistics

  • 1 Post

Last activity: 18 hours ago

Bluesky

Profile picture fallback
CVE-2025-13375: Critical IBM Crypto Flaw (CVSS 9.8) Exposes HSMs
  • 0
  • 0
  • 0
  • 18h ago

Overview

  • Mozilla
  • Firefox

09 Dec 2025
Published
11 Dec 2025
Updated

CVSS
Pending
EPSS
0.06%

KEV

Description

Use-after-free in the WebRTC: Signaling component. This vulnerability affects Firefox < 146, Firefox ESR < 140.6, Thunderbird < 146, and Thunderbird < 140.6.

Statistics

  • 1 Post

Last activity: 23 hours ago

Bluesky

Profile picture fallback
🚨 Attention #openSUSE Tumbleweed Users & System Admins! 🚨 A new security update is live, patching vulnerability CVE-2025-14321 in the cockpit-machines package. Read more: 👉 tinyurl.com/325jehsn #Security
  • 0
  • 0
  • 0
  • 23h ago
Showing 1 to 10 of 31 CVEs