#cve

20 posts · Last used 9d

Back to Timeline
@hbrpgm@adalta.social · Mar 07, 2026
📺 https://peer.adalta.social/w/c683537bbcKVWaVpqKN1qU 🔗 [🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_LIL8H6-Q/1) 🔗 [ℹ️](https://app.box.com/s/dhra6ez059z59e78qwb3tjvq3n2simy7") Une simple requête pour un fichier de sous-titres révèle un écosystème de distribution vulnérable et potentiellement illicite. #humor #comedy #crime #cve #drama
View on adalta.social
0
0
0
@hbrpgm@adalta.social · Mar 07, 2026
📺 https://peer.adalta.social/w/pas9kztgshirWUBGgyyexM 🔗 [🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_LIL8H6-Q/1) 🔗 [ℹ️](https://app.box.com/s/dhra6ez059z59e78qwb3tjvq3n2simy7") A single illicit subtitle link exposes the systemic vulnerabilities and market failures of contemporary content distribution. #humor #comedy #crime #cve #drama
View on adalta.social
0
0
0
@hbrpgm@adalta.social · Mar 07, 2026
📺 https://peer.adalta.social/w/fj8LP6M9EvayZZAn8Gn4gp 🔗 [🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_LIL8H6-Q/1) 🔗 [ℹ️](https://app.box.com/s/dhra6ez059z59e78qwb3tjvq3n2simy7") Ein scheinbar trivialer Fehler 403 enthüllt die strukturelle Macht von Plattformen über kulturellen Zugang. #humor #comedy #crime #cve #drama
View on adalta.social
0
0
0
@hbrpgm@adalta.social · Mar 06, 2026
📺 https://peer.adalta.social/w/wHrwgG6TbqaqZh8D2DEueW 🔗 [🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_7U1GFGRG/1) 🔗 [ℹ️](https://www.fogolf.com/1184174/electric-id-golf-details-and-ssp-platform/") The ninth-generation Golf launch represents a critical strategic pivot, leveraging the Scalable Systems Platform (SSP) to offer both electric and internal combustion variants concurrently. #cve #train #golf #golfnews #idgolf
View on adalta.social
0
0
0
@sekurakbot@mastodon.com.pl · Feb 16, 2026
Jak wtyczka do backupów w WordPress pozwalała na zdalne wykonanie kodu – CVE-2026-1357 Backupy są ważne i każdy kto choć raz padł ofiarą ataku lub spotkał się z awarią środowiska produkcyjnego wie o czym jest mowa. Do wykonywania kopii zapasowych istnieje szereg rozwiązań, zarówno darmowych jak i komercyjnych. Coraz częściej można się również spotkać ze specjalistycznymi narzędziami, jakim jest np. popularny plugin WPvivid... #WBiegu #Backup #Bugbounty #Cve #Rce #Traversal #Wordpress https://sekurak.pl/jak-wtyczka-do-backupow-w-wordpress-pozwalala-na-zdalne-wykonanie-kodu-cve-2026-1357/
View on mastodon.com.pl
0
0
0
@hbrpgm@adalta.social · Feb 12, 2026
📺 https://peer.adalta.social/w/szNwziYVqZLTBwCgA6NWWf 🔗 [🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_N29YJ_DS/1) Une faille d'injection de code dans le système d'aide menace la stabilité des postes de travail critiques. #cybersecurity #security #threatintel #cve #osint
View on adalta.social
0
0
0
@hbrpgm@adalta.social · Feb 12, 2026
📺 https://peer.adalta.social/w/mE7ZhqmZWLS2X9HU5NGNPL 🔗 [🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_N29YJ_DS/1) A high-severity code injection flaw in KeePass's help system, while not actively exploited, presents a tangible risk of application crashes and workflow disruption through crafted HTML content. #cybersecurity #security #threatintel #cve #osint
View on adalta.social
0
0
0
@hbrpgm@adalta.social · Feb 12, 2026
📺 https://peer.adalta.social/w/wXivcJdGsJsNDv46vvaEjc 🔗 [🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_N29YJ_DS/1) Eine Code-Injection-Schwachstelle im Hilfesystem der Passwort-Manager-Software kann zu Anwendungsabstürzen führen, stellt jedoch ein moderates Risiko dar. #cybersecurity #security #threatintel #cve #osint
View on adalta.social
0
0
0
@hbrpgm@adalta.social · Feb 09, 2026
📺 https://peer.adalta.social/w/ha7u8osqJ9djsMHeNLvuaH 🔗 [🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_M-276VQJ/1) Une faille de dépassement de tampon accessible à distance compromet l'intégrité des réseaux, avec un exploit public disponible. #infosec #vulnerability #cve #exploit #release
View on adalta.social
0
0
0
@hbrpgm@adalta.social · Feb 09, 2026
📺 https://peer.adalta.social/w/kpVddxKp2FBwhdvJ28fzU2 🔗 [🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_M-276VQJ/1) A publicly released exploit for a critical buffer overflow in Tenda routers demands immediate action from network defenders. #infosec #vulnerability #cve #exploit #release
View on adalta.social
0
0
0
@hbrpgm@adalta.social · Feb 09, 2026
📺 https://peer.adalta.social/w/jG6JrBKpEnD9cTemxKWzzY 🔗 [🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_M-276VQJ/1) Ein veröffentlichter Proof-of-Concept-Exploit für einen Remote-Buffer-Overflow erhöht das Risiko für ungepatchte Netzwerke erheblich. #infosec #vulnerability #cve #exploit #release
View on adalta.social
0
0
0
@hbrpgm@adalta.social · Feb 08, 2026
📺 https://peer.adalta.social/w/1yG6uMbdZ6ERmwL2Sfck4Q 🔗 [🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_HW7Y74-Y/1) Une vulnérabilité publique et exploitée sur un équipement non maintenu représente un risque de priorité 1 pour les réseaux hérités. #cybersecurity #security #threatintel #osint #cve
View on adalta.social
0
0
0
@hbrpgm@adalta.social · Feb 08, 2026
📺 https://peer.adalta.social/w/snU5nCd7kRYQC28d23s8xm 🔗 [🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_HW7Y74-Y/1) A publicly exploitable, remote OS command injection flaw in the unmaintained D-Link DIR-615 router poses a critical risk to consumer and small office networks. #cybersecurity #security #threatintel #osint #cve
View on adalta.social
0
0
0
@hbrpgm@adalta.social · Feb 08, 2026
📺 https://peer.adalta.social/w/shXDXweVZNtm8Qt8kPLhEj 🔗 [🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_HW7Y74-Y/1) Öffentlich verfügbarer Exploit für eine Remote-Command-Injection in der DIR-615-Firmware stellt ein kritisches Risiko für ungepatchte, ungewartete Geräte dar. #cybersecurity #security #threatintel #osint #cve
View on adalta.social
0
0
0
@hbrpgm@adalta.social · Feb 05, 2026
📺 https://peer.adalta.social/w/oKrbQ3HamL2pFvNH2jjP2z 🔗 [🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_J4ZYBSFG/1) An unquoted service path vulnerability in a widely used VPN client enables attackers with local access to gain full SYSTEM control over Windows endpoints. #cybersecurity #security #threatintel #osint #cve
View on adalta.social
0
0
0
@hbrpgm@adalta.social · Feb 05, 2026
📺 https://peer.adalta.social/w/g9qXhTZRu5rcZyA45zxm2U 🔗 [🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_J4ZYBSFG/1) Ein unquotierter Dienstpfad in Version 9.2 ermöglicht lokalen Angreifern die Ausführung von Code mit SYSTEM-Rechten. #cybersecurity #security #threatintel #osint #cve
View on adalta.social
0
0
0
@hbrpgm@adalta.social · Jan 29, 2026
📺 https://peer.adalta.social/w/czT4evi4npSbK3nLpqUYfP Kritische RCE-Schwachstelle in Cisco Unified Communications Ein unauthentifizierter Angreifer kann übe #security #vulnerability #cve #cloud #rce
View on adalta.social
0
0
0
@hbrpgm@adalta.social · Jan 29, 2026
📺 https://peer.adalta.social/w/wvhuHV4KVZUkYUC8Z9iQux Kritische RCE-Schwachstelle in Cisco Unified Communications Ein unauthentifizierter Angreifer kann übe #security #vulnerability #cve #cloud #rce
View on adalta.social
0
0
0
@hn50@social.lansky.name · Jan 27, 2026
0
0
0
@TheHackerWire@infosec.exchange · Jan 13, 2026
🟠 CVE-2025-66176 - High (8.8) There is a Stack overflow Vulnerability in the device Search and Discovery feature of Hikvision Access Control Products. If exploited, an attacker on the same local area network (LAN) could cause the device to malfunction by sending specially crafted packets to an unpatched device. 🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-66176/ #CVE #vulnerability #infosec #cybersecurity
View on infosec.exchange
0
0
0