Aggregator
Iran-linked actors use Telegram as C2 in malware attacks on dissidents
2 days 2 hours ago
Iran-linked actors use Telegram as C2 to spread malware targeting dissidents and journalists, enabling surveillance and data theft. The FBI warns that Iran’s Ministry of Intelligence and Security (MOIS) runs cyber campaigns using Telegram as a command-and-control infrastructure to deliver malware. Threat actors target Iranian dissidents, journalists, and opposition groups worldwide. Once deployed, the malware […]
Pierluigi Paganini
微软释出紧急更新修复微软账号登录问题
2 days 2 hours ago
微软释出了紧急更新 KB5085516,修复三月例行安全更新 KB5079473 释出后出现的微软账号登录问题,该问题影响使用微软账号登录的应用如 Teams、OneDrive、Microsoft Edge、Microsoft 365 Copilot 以及 Excel 和 Word 等 Office 应用,当用户通过微软账号登录这些应用会返回错误信息,声称用户未连接到互联网。微软表示,使用 Microsoft Entra ID 登录的企业客户未受影响。
【最后7天】OSRC联合4大SRC开启"春日猎洞",50%额外奖励、新人加成、联合大礼包等你来拿!
2 days 2 hours ago
1.5倍好礼、新人好礼、联合大礼包等你来拿!
诚邀渠道合作伙伴共启新征程
2 days 2 hours ago
BYOVD攻击泛滥!火绒专项防护守护系统安全
2 days 2 hours ago
案例一“银狐”组织利用“IP-Guard等行为管理软件”获取用户电脑权限,记录用户电脑的日常操作,实现对用户电
CVE-2026-4603 | jsrsasign up to 11.1.0 KEYUTIL Parser ext/rsa.js divide by zero (SNYK-JS-JSRSASIGN-15371176 / EUVD-2026-14380)
2 days 2 hours ago
A vulnerability labeled as problematic has been found in jsrsasign up to 11.1.0. This issue affects some unknown processing of the file ext/rsa.js of the component KEYUTIL Parser. The manipulation results in divide by zero.
This vulnerability was named CVE-2026-4603. The attack needs to be approached locally. There is no available exploit.
The affected component should be upgraded.
vuldb.com
CVE-2026-4601 | jsrsasign up to 11.1.0 Private Key KJUR.crypto.DSA.signWithMessageHash missing cryptographic step (SNYK-JS-JSRSASIGN-15370941 / EUVD-2026-14377)
2 days 2 hours ago
A vulnerability marked as problematic has been reported in jsrsasign up to 11.1.0. Impacted is the function KJUR.crypto.DSA.signWithMessageHash of the component Private Key Handler. This manipulation causes missing cryptographic step.
The identification of this vulnerability is CVE-2026-4601. It is possible to initiate the attack remotely. There is no exploit available.
It is suggested to upgrade the affected component.
vuldb.com
CVE-2026-4602 | jsrsasign up to 11.1.0 ext/jsbn2.js numeric conversion (SNYK-JS-JSRSASIGN-15371175 / EUVD-2026-14379)
2 days 2 hours ago
A vulnerability described as problematic has been identified in jsrsasign up to 11.1.0. The affected element is an unknown function of the file ext/jsbn2.js. Such manipulation leads to incorrect conversion between numeric types.
This vulnerability is referenced as CVE-2026-4602. It is possible to launch the attack remotely. No exploit is available.
Upgrading the affected component is recommended.
vuldb.com
CVE-2026-4577 | code-projects Exam Form Submission 1.0 /admin/update_s4.php sname cross site scripting (EUVD-2026-14384)
2 days 2 hours ago
A vulnerability was found in code-projects Exam Form Submission 1.0. It has been classified as problematic. The affected element is an unknown function of the file /admin/update_s4.php. Performing a manipulation of the argument sname results in cross site scripting.
This vulnerability was named CVE-2026-4577. The attack may be initiated remotely. In addition, an exploit is available.
vuldb.com
CVE-2025-13997 | kingaddons King Addons for Elementor Plugin up to 51.1.49 on WordPress render_full_form information disclosure (EUVD-2025-208931)
2 days 2 hours ago
A vulnerability has been found in kingaddons King Addons for Elementor Plugin up to 51.1.49 on WordPress and classified as problematic. Affected by this vulnerability is the function render_full_form. This manipulation causes information disclosure.
This vulnerability is registered as CVE-2025-13997. Remote exploitation of the attack is possible. No exploit is available.
The affected component should be upgraded.
vuldb.com
CVE-2025-6229 | shaonsina Sina Extension for Elementor Plugin up to 3.7.0 on WordPress cross site scripting (EUVD-2025-208932)
2 days 2 hours ago
A vulnerability was found in shaonsina Sina Extension for Elementor Plugin up to 3.7.0 on WordPress and classified as problematic. Affected by this issue is some unknown functionality. Such manipulation leads to cross site scripting.
This vulnerability is documented as CVE-2025-6229. The attack can be executed remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
vuldb.com
CVE-2026-23554 | Xen EPT use after free (EUVD-2026-14382 / Nessus ID 302811)
2 days 2 hours ago
A vulnerability classified as critical has been found in Xen. The affected element is an unknown function of the component EPT. This manipulation causes use after free.
This vulnerability is handled as CVE-2026-23554. The attack can only be done within the local network. There is not any exploit available.
It is recommended to apply a patch to fix this issue.
vuldb.com
CVE-2026-23555 | Xen Xenstored denial of service (EUVD-2026-14383 / Nessus ID 302813)
2 days 2 hours ago
A vulnerability classified as critical was found in Xen. The impacted element is an unknown function of the component Xenstored. Such manipulation leads to denial of service.
This vulnerability is uniquely identified as CVE-2026-23555. The attack can only be initiated within the local network. No exploit exists.
Applying a patch is advised to resolve this issue.
vuldb.com
CVE-2026-4578 | code-projects Exam Form Submission 1.0 /admin/update_s3.php sname cross site scripting (EUVD-2026-14387)
2 days 2 hours ago
A vulnerability was found in code-projects Exam Form Submission 1.0. It has been declared as problematic. The impacted element is an unknown function of the file /admin/update_s3.php. Executing a manipulation of the argument sname can lead to cross site scripting.
The identification of this vulnerability is CVE-2026-4578. The attack may be launched remotely. Furthermore, there is an exploit available.
vuldb.com
CVE-2026-4579 | code-projects Simple Laundry System 1.0 Parameters /viewdetail.php serviceId sql injection (EUVD-2026-14388)
2 days 2 hours ago
A vulnerability was found in code-projects Simple Laundry System 1.0. It has been rated as critical. This affects an unknown function of the file /viewdetail.php of the component Parameters Handler. The manipulation of the argument serviceId leads to sql injection.
This vulnerability is referenced as CVE-2026-4579. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
vuldb.com
CVE-2026-3587 | WAGO Lean Managed Switch 852-1816-010-000 010-001 prior V1.2.1.S0 Restricted Interface backdoor (VDE-2026-020 / EUVD-2026-14385)
2 days 2 hours ago
A vulnerability was found in WAGO Lean Managed Switch 852-1812, Lean Managed Switch 852-1813, Lean Managed Switch 852-1813-000-001, Lean Managed Switch 852-1816, Industrial Managed Switch 852-303, Industrial Managed Switch 852-1305, Industrial Managed Switch 852-1305-000-001, Industrial Managed Switch 852-1505-000-001, Industrial Managed Switch 852-1505, Industrial Managed Switch 852-602, Industrial Managed Switch 852-603, Industrial Managed Switch 852-1605, Lean Managed Switch 852-1812-010-000, Lean Managed Switch 852-1813-010-000 and Lean Managed Switch 852-1816-010-000 010-001. It has been classified as critical. This affects an unknown part of the component Restricted Interface. Performing a manipulation results in backdoor.
This vulnerability is reported as CVE-2026-3587. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is recommended.
vuldb.com
CVE-2026-4628 | Red Hat Keycloak resource_set Endpoint access control (EUVD-2026-14389)
2 days 2 hours ago
A vulnerability was found in Red Hat Keycloak. It has been rated as critical. This issue affects some unknown processing of the component resource_set Endpoint. The manipulation leads to improper access controls.
This vulnerability is traded as CVE-2026-4628. It is possible to initiate the attack remotely. There is no exploit available.
vuldb.com
CVE-2026-33017 | langflow-ai Langflow up to 1.8.1 Public Flow Build Endpoint eval injection
2 days 2 hours ago
A vulnerability, which was classified as critical, was found in langflow-ai Langflow up to 1.8.1. This impacts an unknown function of the component Public Flow Build Endpoint. Executing a manipulation can lead to improper neutralization of directives in dynamically evaluated code.
The identification of this vulnerability is CVE-2026-33017. The attack may be launched remotely. There is no exploit available.
vuldb.com
CVE-2026-4468 | Comfast CF-AC100 2.6.0.8 command injection
2 days 2 hours ago
A vulnerability was found in Comfast CF-AC100 2.6.0.8. It has been rated as critical. Affected is an unknown function of the file /cgi-bin/mbox-config?method=SET§ion=update_interface_png. This manipulation causes command injection.
This vulnerability is tracked as CVE-2026-4468. The attack is possible to be carried out remotely. Moreover, an exploit is present.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com