@VulmonFeeds Vulmon Vulnerability FeedVulmon Vulnerability Feed posts on X about alerts, code, command, execution the most. They currently have [-----] followers and [---] posts still getting attention that total [---] engagements in the last [--] hours.
Social category influence technology brands 7.25% stocks 6.65% finance 0.91% products 0.3% automotive brands 0.3%
Social topic influence alerts #829, code 2.72%, command #944, execution #624, apple 2.11%, sap 1.81%, plugin #194, up to 1.21%, $6841t 1.21%, software 1.21%
Top accounts mentioned or mentioned by @transilienceai @rageagainstthepixelunitycli @farmfecore
Top assets mentioned Alphabet Inc Class A (GOOGL) Dell Technologies, Inc. (DELL) GE Vernova Inc. (GEV)
Top posts by engagements in the last [--] hours
"CVE-2026-2517 Open5GS SMF Denial of Service Vulnerability in Packet Filtering Function https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2517 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2517"
X Link 2026-02-15T13:29Z [----] followers, [--] engagements
"CVE-2026-2534 Remote Command Injection in Comfast CF-N1 V2 2.6.0.2 via Bandwidth Config. Vulnerability Notification: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2534 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2534"
X Link 2026-02-16T04:35Z [----] followers, [--] engagements
"CVE-2025-59905 Reflected Cross-Site Scripting Vulnerability in Kubysoft Node Endpoint https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-59905 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-59905"
X Link 2026-02-16T11:22Z [----] followers, [--] engagements
"CVE-2026-2452 Information Disclosure Vulnerability in Pretix Email Template Plac. Customizable Vulnerability Alerts: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2452 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2452"
X Link 2026-02-16T12:13Z [----] followers, [--] engagements
"CVE-2018-18920 Py-EVM v0.2.0-alpha.33 allows attackers to make a vm.execute_bytecode call that triggers computation._stack.values with '"stack": [---] [---] 0' where b'x' was expected resulting in an execution fa. http://vulmon.com/vulnerabilitydetailsqid=CVE-2018-18920 http://vulmon.com/vulnerabilitydetailsqid=CVE-2018-18920"
X Link 2018-11-12T07:37Z [----] followers, [--] engagements
"CVE-2020-10682 The Filemanager in CMS Made Simple 2.2.13 allows remote code execution via a .php.jpegd JPEG file as demonstrated by m1_files to admin/moduleinterface.php. The file should be sent as application/o. http://vulmon.com/vulnerabilitydetailsqid=CVE-2020-10682 http://vulmon.com/vulnerabilitydetailsqid=CVE-2020-10682"
X Link 2020-03-20T05:56Z [----] followers, [--] engagements
"CVE-2020-13645 In GNOME glib-networking through 2.64.2 the implementation of GTlsClientConnection skips hostname verification of the server's TLS certificate if the application fails to specify the expected s. http://vulmon.com/vulnerabilitydetailsqid=CVE-2020-13645 http://vulmon.com/vulnerabilitydetailsqid=CVE-2020-13645"
X Link 2020-06-29T03:48Z [----] followers, [--] engagements
"CVE-2020-35592 Pi-hole [---] [---] and 5.1.1 allows XSS via the Options header to the admin/ URI. A remote user is able to inject arbitrary web script or HTML due to incorrect sanitization of user-supplied data and . http://vulmon.com/vulnerabilitydetailsqid=CVE-2020-35592 http://vulmon.com/vulnerabilitydetailsqid=CVE-2020-35592"
X Link 2021-02-18T21:53Z [----] followers, [--] engagements
"CVE-2019-5021 Versions of the Official Alpine Linux Docker images (since v3.3) contain a NULL password for the root user. This vulnerability appears to be the result of a regression introduced in December of [---]. http://vulmon.com/vulnerabilitydetailsqid=CVE-2019-5021 http://vulmon.com/vulnerabilitydetailsqid=CVE-2019-5021"
X Link 2021-11-21T14:22Z [----] followers, [--] engagements
"CVE-2024-0584 A use-after-free issue was found in igmp_start_timer in net/ipv4/igmp.c in the network sub-component in the Linux Kernel. This flaw allows a local user to observe a refcnt use-after-free issue when r. http://vulmon.com/vulnerabilitydetailsqid=CVE-2024-0584 http://vulmon.com/vulnerabilitydetailsqid=CVE-2024-0584"
X Link 2024-01-16T15:23Z [----] followers, [--] engagements
"CVE-2023-5558 The LearnPress WordPress plugin before 4.2.5.5 does not sanitise and escape user input before outputting it back in the page leading to a Reflected Cross-Site Scripting which could be used against h. http://vulmon.com/vulnerabilitydetailsqid=CVE-2023-5558 http://vulmon.com/vulnerabilitydetailsqid=CVE-2023-5558"
X Link 2024-01-16T19:03Z [----] followers, [---] engagements
"CVE-2024-22113 Open redirect vulnerability in Access analysis CGI An-Analyzer released in [----] December [--] and earlier allows a remote unauthenticated attacker to redirect users to arbitrary websites and conduct p. http://vulmon.com/vulnerabilitydetailsqid=CVE-2024-22113 http://vulmon.com/vulnerabilitydetailsqid=CVE-2024-22113"
X Link 2024-01-22T06:23Z [----] followers, [--] engagements
"CVE-2023-47352 Technicolor TC8715D devices have predictable default WPA2 security passwords. An attacker who scans for SSID and BSSID values may be able to predict these passwords. http://vulmon.com/vulnerabilitydetailsqid=CVE-2023-47352 http://vulmon.com/vulnerabilitydetailsqid=CVE-2023-47352"
X Link 2024-01-22T06:24Z [----] followers, [--] engagements
"CVE-2024-25089 Malwarebytes Binisoft Windows Firewall Control before 6.9.9.2 allows remote attackers to execute arbitrary code via gRPC named pipes. http://vulmon.com/vulnerabilitydetailsqid=CVE-2024-25089 http://vulmon.com/vulnerabilitydetailsqid=CVE-2024-25089"
X Link 2024-02-04T23:35Z [----] followers, [---] engagements
"CVE-2024-1238 The ElementsKit Elementor addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the button ID parameter in all versions up to and including 3.0.6 due to insufficient input sa. https://vulmon.com/vulnerabilitydetailsqid=CVE-2024-1238 https://vulmon.com/vulnerabilitydetailsqid=CVE-2024-1238"
X Link 2024-03-30T11:06Z [----] followers, [--] engagements
"CVE-2024-12569 Sensitive Data Exposure in HikVision Camera Log Files - Credentials at Risk Sensitive information disclosure occurs in the HikVision camera driver log file within XProtect Device Pack. This situati. https://vulmon.com/vulnerabilitydetailsqid=CVE-2024-12569 https://vulmon.com/vulnerabilitydetailsqid=CVE-2024-12569"
X Link 2024-12-19T09:46Z [----] followers, [---] engagements
"CVE-2025-52078 File Upload Vulnerability in Writebot AI Content Generator Enabling Privilege Escalation https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-52078 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-52078"
X Link 2025-08-05T22:35Z [----] followers, [---] engagements
"CVE-2025-6067 Stored XSS in Easy Social Feed WordPress Plugin via Caption Parame. Vulnerability Alert Subscriptions: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-6067 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-6067"
X Link 2025-09-06T09:22Z [----] followers, [---] engagements
"CVE-2025-34201 Network Segmentation Vulnerability in Vasion Print Virtual Appliance Docker Containers https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-34201 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-34201"
X Link 2025-09-20T02:51Z [----] followers, [--] engagements
"CVE-2025-46152 Bitwise Right Shift Vulnerability in PyTorch Versions Prior to 2.7.0 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-46152 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-46152"
X Link 2025-09-25T21:05Z [----] followers, [---] engagements
"CVE-2025-8769 Remote Code Execution in Telenium Online Web Application via Perl Injecti. Vulnerability Notification: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-8769 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-8769"
X Link 2025-12-25T02:35Z [----] followers, [---] engagements
"CVE-2026-24919 Out-of-Bounds Write Vulnerability in DFX Module Affecting System Availability https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24919 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24919"
X Link 2026-02-06T13:45Z [----] followers, [--] engagements
"CVE-2025-66598 A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product supports old SSL/TLS versions potentially allowing an attacker to decrypt communications with. https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-66598 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-66598"
X Link 2026-02-09T11:50Z [----] followers, [--] engagements
"CVE-2025-66594 A vulnerability has been found in FAST/TOOLS provided by Yokogawa. Vulnerability Alert Subscriptions: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-66594 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-66594"
X Link 2026-02-09T12:21Z [----] followers, [--] engagements
"CVE-2025-66607 A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The response header contains an insecure setting. Users could be redirected to malicious sites by an attack. https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-66607 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-66607"
X Link 2026-02-09T12:51Z [----] followers, [--] engagements
"CVE-2025-66606 A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product does not properly encode URLs. An attacker could tamper with web pages or execute malicious sc. https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-66606 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-66606"
X Link 2026-02-09T13:22Z [----] followers, [--] engagements
"CVE-2025-66599 A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. Physical paths could be displayed on web pages. This information could be exploited by an attacker for othe. https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-66599 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-66599"
X Link 2026-02-09T13:32Z [----] followers, [--] engagements
"CVE-2025-66603 A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electr. Vulnerability Notification: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-66603 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-66603"
X Link 2026-02-09T13:42Z [----] followers, [--] engagements
"CVE-2025-10464 Sensitive Data Retrieval Vulnerability in Birtech Senseway Platform https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-10464 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-10464"
X Link 2026-02-09T15:04Z [----] followers, [--] engagements
"CVE-2026-1960 Stored Cross-Site Scripting in Loggro Pymes Web Application Facebo. Customizable Vulnerability Alerts: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1960 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1960"
X Link 2026-02-09T15:14Z [----] followers, [--] engagements
"CVE-2025-7708 Sensitive Information Disclosure Vulnerability in Atlas K12net Communication Channel https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-7708 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-7708"
X Link 2026-02-09T15:24Z [----] followers, [--] engagements
"CVE-2026-1959 Stored Cross-Site Scripting in Loggro Pymes Web Application Version 1.0.124 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1959 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1959"
X Link 2026-02-09T15:34Z [----] followers, [--] engagements
"CVE-2026-0632 Server-Side Request Forgery in Fluent Forms Pro Add On Pack WordPress Plugin https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-0632 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-0632"
X Link 2026-02-09T15:44Z [----] followers, [--] engagements
"CVE-2025-6830 SQL Injection in Xpoda Trkiye Information Technology Inc. Xpoda Studio Through Version [--------] https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-6830 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-6830"
X Link 2026-02-09T15:55Z [----] followers, [--] engagements
"CVE-2025-10463 Authentication Abuse Vulnerability in Birtech Senseway Platform Through . Vulnerability Notification: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-10463 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-10463"
X Link 2026-02-09T16:05Z [----] followers, [--] engagements
"CVE-2026-25848 Authentication Bypass Allowing Administrative Actions in . Don't wait vulnerability scanning results: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25848 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25848"
X Link 2026-02-09T16:25Z [----] followers, [--] engagements
"CVE-2026-25847 DOM-Based XSS Vulnerability in JetBrains PyCharm Jupyter Viewer Page https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25847 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25847"
X Link 2026-02-09T16:35Z [----] followers, [--] engagements
"CVE-2026-25846 JetBrains YouTrack Access Token Exposure via Mailbox Logs Before 2025.3.119033 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25846 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25846"
X Link 2026-02-09T16:45Z [----] followers, [--] engagements
"CVE-2026-24098 Information Disclosure in Apache Airflow Versions Before 3.1.7 Allows Unauthorized DAG Error Access https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24098 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24098"
X Link 2026-02-09T16:56Z [----] followers, [--] engagements
"CVE-2026-22922 Authorization Bypass in Apache Airflow 3.1.0-3.1.6 Enabling Unauthorized Log Access https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-22922 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-22922"
X Link 2026-02-09T17:06Z [----] followers, [--] engagements
"CVE-2026-23903 Authentication Bypass in Apache Shiro Before Version 2.0.7 via Case-Insensitive Filesystem https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23903 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23903"
X Link 2026-02-09T17:16Z [----] followers, [--] engagements
"CVE-2026-25905 Pyodide API Hijacking Vulnerability in MCP Server Python Execution https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25905 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25905"
X Link 2026-02-09T17:26Z [----] followers, [--] engagements
"CVE-2026-25916 SVG feImage Remote Image Bypass Vulnerability in Roundcube Webmail https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25916 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25916"
X Link 2026-02-09T17:36Z [----] followers, [--] engagements
"CVE-2026-25904 Localhost SSRF Vulnerability in Pydantic-AI MCP Run Python Sandbox https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25904 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25904"
X Link 2026-02-09T17:46Z [----] followers, [--] engagements
"CVE-2025-7799 Reflected XSS in Zirve Information Technologies E-Taxpayer Account. Customizable Vulnerability Alerts: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-7799 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-7799"
X Link 2026-02-09T17:57Z [----] followers, [--] engagements
"CVE-2026-2240 Local Out-of-Bounds Read Vulnerability in Janet Programming Language Compiler https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2240 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2240"
X Link 2026-02-09T18:17Z [----] followers, [--] engagements
"CVE-2026-24095 Checkmk Privilege Escalation via Unauthorized Configuration Page Access https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24095 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24095"
X Link 2026-02-09T18:27Z [----] followers, [--] engagements
"CVE-2026-0398 Resource Exhaustion and Cache Poisoning in DNS Recursor via Crafte. Customizable Vulnerability Alerts: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-0398 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-0398"
X Link 2026-02-09T18:37Z [----] followers, [--] engagements
"CVE-2025-63354 Stored XSS Vulnerability in Hitron HI3120 Parental Control Filter Customizable Vulnerability Alerts: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-63354 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-63354"
X Link 2026-02-09T18:47Z [----] followers, [--] engagements
"CVE-2026-24027 Crafted Zones Lead to Increased Incoming Network Traffic Vulnerability Notification: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24027 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24027"
X Link 2026-02-09T18:58Z [----] followers, [--] engagements
"CVE-2025-14831 Denial of Service Vulnerability in GnuTLS via Malicious C. Don't wait vulnerability scanning results: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-14831 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-14831"
X Link 2026-02-09T19:08Z [----] followers, [--] engagements
"CVE-2026-24343 CVE-2026-24343 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24343 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24343"
X Link 2026-02-09T19:28Z [----] followers, [--] engagements
"CVE-2026-23906 CVE-2026-23906 Vulnerability Alert Subscriptions: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23906 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23906"
X Link 2026-02-09T19:38Z [----] followers, [--] engagements
"CVE-2026-2242 Local Out-of-Bounds Read Vulnerability in Janet Programming Language 1.40.1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2242 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2242"
X Link 2026-02-09T19:49Z [----] followers, [--] engagements
"CVE-2026-2241 Local Out-of-Bounds Read Vulnerability in Janet-Lang os_strftime Function https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2241 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2241"
X Link 2026-02-09T19:59Z [----] followers, [--] engagements
"CVE-2026-21419 Dell Display and Peripheral Manager Local Privilege Escalation via Link Following Vulnerability https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-21419 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-21419"
X Link 2026-02-09T20:09Z [----] followers, [--] engagements
"CVE-2026-2245 Local Out-of-Bounds Read Vulnerability in CCExtractor MPEG. Don't wait vulnerability scanning results: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2245 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2245"
X Link 2026-02-09T20:50Z [----] followers, [--] engagements
"CVE-2026-2246 AprilRobotics apriltag Local Memory Corruption Vulnerability in Detector Function https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2246 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2246"
X Link 2026-02-09T21:00Z [----] followers, [--] engagements
"CVE-2026-25598 Audit Bypass in Harden-Runner GitHub Action Community Tier via Socket System Calls https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25598 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25598"
X Link 2026-02-09T21:10Z [----] followers, [--] engagements
"CVE-2026-25498 Remote Code Execution in Craft CMS via Unsanitized Configuration Data In. Vulnerability Notification: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25498 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25498"
X Link 2026-02-09T21:20Z [----] followers, [--] engagements
"CVE-2026-25497 Privilege Escalation in Craft CMS GraphQL API Enables Unauthorized Asset Manipulation https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25497 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25497"
X Link 2026-02-09T21:30Z [----] followers, [--] engagements
"CVE-2026-25496 Stored XSS Vulnerability in Craft CMS Number Field Type Settings https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25496 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25496"
X Link 2026-02-09T21:40Z [----] followers, [--] engagements
"CVE-2026-25495 SQL Injection in Craft CMS Control Panel via Unsanitized Order By Parameter https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25495 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25495"
X Link 2026-02-09T21:51Z [----] followers, [--] engagements
"CVE-2026-25494 IP Blocklist Bypass Vulnerability in Craft CMS GraphQL Asset Mutation https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25494 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25494"
X Link 2026-02-09T22:01Z [----] followers, [--] engagements
"CVE-2026-25493 Server-Side Request Forgery (SSRF) Vulnerability in Craft CMS GraphQL Asset Mutation https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25493 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25493"
X Link 2026-02-09T22:11Z [----] followers, [--] engagements
"CVE-2026-25492 GraphQL Mutation Vulnerability in Craft CMS Allowing Internal URL Fetch https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25492 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25492"
X Link 2026-02-09T22:21Z [----] followers, [--] engagements
"CVE-2026-25480 Cache Poisoning Vulnerability in Litestar FileStore Prior to 2.20.0 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25480 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25480"
X Link 2026-02-09T22:41Z [----] followers, [--] engagements
"CVE-2026-25479 Host Validation Bypass Vulnerability in Litestar ASGI Framework Before 2.20.0 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25479 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25479"
X Link 2026-02-09T22:52Z [----] followers, [--] engagements
"CVE-2026-25478 CORS Origin Validation Bypass in Litestar ASGI Framework Before 2.20.0 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25478 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25478"
X Link 2026-02-09T23:02Z [----] followers, [--] engagements
"CVE-2026-25231 Unauthenticated File Read Vulnerability in FileRise Web File Manager Before 3.3.0 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25231 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25231"
X Link 2026-02-09T23:12Z [----] followers, [--] engagements
"CVE-2026-25230 HTML Injection Vulnerability in FileRise Web File Manager Before 3.3.0 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25230 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25230"
X Link 2026-02-09T23:22Z [----] followers, [--] engagements
"CVE-2026-1529 Keycloak JWT Invitation Token Validation Bypass Enabling Unauthorized Registration https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1529 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1529"
X Link 2026-02-09T23:53Z [----] followers, [---] engagements
"CVE-2026-1486 Keycloak JWT Authorization Grant Vulnerability Allows Token Issuance via Disabled IdP https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1486 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1486"
X Link 2026-02-10T00:03Z [----] followers, [--] engagements
"CVE-2025-14778 Keycloak UMA Protection API Horizontal Privilege Escalation Vulnerability https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-14778 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-14778"
X Link 2026-02-10T00:13Z [----] followers, [--] engagements
"CVE-2026-24684 FreeRDP Use-After-Free Vulnerability in RDPSND Async Playback Thread Before 3.22.0 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24684 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24684"
X Link 2026-02-10T00:43Z [----] followers, [--] engagements
"CVE-2026-24681 Use-After-Free Vulnerability in FreeRDP Prior to 3.22.0 via URBDRC Channel https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24681 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24681"
X Link 2026-02-10T00:54Z [----] followers, [--] engagements
"CVE-2026-24682 FreeRDP Audio Format Parsing Vulnerability Leads to Out-of-Bounds Access https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24682 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24682"
X Link 2026-02-10T01:04Z [----] followers, [--] engagements
"CVE-2026-24683 Use-After-Free Vulnerability in FreeRDP Channel Callback Prior to Version 3.22.0 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24683 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24683"
X Link 2026-02-10T01:14Z [----] followers, [--] engagements
"CVE-2026-24680 Use-After-Free Vulnerability in FreeRDP SDL Pointer Handling Before 3.22.0 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24680 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24680"
X Link 2026-02-10T01:24Z [----] followers, [--] engagements
"CVE-2026-24679 FreeRDP URBDRC Client Out-of-Bounds Read Vulnerability Before 3.22.0 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24679 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24679"
X Link 2026-02-10T01:34Z [----] followers, [--] engagements
"CVE-2026-24678 FreeRDP Use-After-Free Vulnerability in Device Channel Prior to 3.22.0 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24678 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24678"
X Link 2026-02-10T01:45Z [----] followers, [--] engagements
"CVE-2026-24677 Out-of-Bounds Read Vulnerability in FreeRDP Before 3.22.0 H.264 Encoding https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24677 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24677"
X Link 2026-02-10T01:55Z [----] followers, [--] engagements
"CVE-2026-24491 Use-After-Free Vulnerability in FreeRDP Client Before Version [---]. Vulnerability Alert Subscriptions: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24491 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24491"
X Link 2026-02-10T02:05Z [----] followers, [--] engagements
"CVE-2026-24675 Use-After-Free Vulnerability in FreeRDP's libusb_udev_select_Interface Before 3.22.0 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24675 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24675"
X Link 2026-02-10T02:25Z [----] followers, [---] engagements
"CVE-2026-23948 NULL Pointer Dereference in FreeRDP Proxy via Malformed LogonInfoV2 PDU https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23948 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23948"
X Link 2026-02-10T02:35Z [----] followers, [--] engagements
"CVE-2026-25646 libpng 1.6.55 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25646 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25646"
X Link 2026-02-10T02:56Z [----] followers, [--] engagements
"CVE-2026-0845 WordPress WCFM Plugin Privilege Escalation via Unauthorized Settings Modi. Vulnerability Notification: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-0845 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-0845"
X Link 2026-02-10T03:06Z [----] followers, [--] engagements
"CVE-2026-25958 Privilege Escalation Vulnerability in Cube Semantic Layer Across Multiple Versions https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25958 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25958"
X Link 2026-02-10T03:57Z [----] followers, [--] engagements
"CVE-2026-25957 Denial of Service Vulnerability in Cube API Endpoint Before 1.5.13 and 1.4.2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25957 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25957"
X Link 2026-02-10T04:07Z [----] followers, [--] engagements
"CVE-2026-25939 Authorization Bypass Vulnerability in FUXA SCADA Software Versions 1.2.8-1.2.10 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25939 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25939"
X Link 2026-02-10T04:17Z [----] followers, [--] engagements
"CVE-2026-25951 Authenticated Path Traversal in FUXA SCADA Software Enables Remote Code Execution https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25951 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25951"
X Link 2026-02-10T04:37Z [----] followers, [--] engagements
"CVE-2026-25918 Credential Exposure Vulnerability in Unity CLI @rage-against-the-pixel/unity-cli Before 1.8.2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25918 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25918"
X Link 2026-02-10T06:09Z [----] followers, [---] engagements
"CVE-2025-11242 Server-Side Request Forgery Vulnerability in Teknolist Ok. Don't wait vulnerability scanning results: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-11242 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-11242"
X Link 2026-02-10T09:43Z [----] followers, [--] engagements
"CVE-2025-12063 InsecDirecture Reference Vulnerability in Enabling Unauthorized Data Modification Human title https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-12063 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-12063"
X Link 2026-02-10T10:44Z [----] followers, [--] engagements
"CVE-2025-12757 Information Disclosure Vulnerability in AXIS Camera Station Pro Access Controls https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-12757 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-12757"
X Link 2026-02-10T11:14Z [----] followers, [--] engagements
"CVE-2025-11142 Authenticated Remote Code Execution in Axis VAPIX API mediaclip.cgi https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-11142 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-11142"
X Link 2026-02-10T11:34Z [----] followers, [--] engagements
"CVE-2026-24328 SAP Business Server Pages Cross-Site Redirection in TAF_APPLAUNCHER Vulnerability https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24328 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24328"
X Link 2026-02-10T13:16Z [----] followers, [--] engagements
"CVE-2026-24327 Information Disclosure Vulnerability in SAP Strategic Enterprise . Customizable Vulnerability Alerts: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24327 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24327"
X Link 2026-02-10T13:26Z [----] followers, [--] engagements
"CVE-2026-24324 Authenticated Denial of Service in SAP BusinessObjects BI Platform AdminTools https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24324 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24324"
X Link 2026-02-10T13:37Z [----] followers, [--] engagements
"CVE-2026-24319 Information Disclosure Vulnerability in SAP Business One Memory Dump Files https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24319 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24319"
X Link 2026-02-10T14:48Z [----] followers, [--] engagements
"CVE-2026-23686 CRLF Injection Vulnerability in SAP NetWeaver Application Server Java https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23686 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23686"
X Link 2026-02-10T15:18Z [----] followers, [--] engagements
"CVE-2026-23688 Privilege Escalation in SAP Fiori App Manage Service Entry Sheets https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23688 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23688"
X Link 2026-02-10T15:28Z [----] followers, [--] engagements
"CVE-2025-15571 Local Null Pointer Dereference Exploit in ckolivas lrzip Up to [-----] https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15571 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15571"
X Link 2026-02-10T16:09Z [----] followers, [--] engagements
"CVE-2025-6967 Execution After Redirect Vulnerability in Sarman Soft CMS with JSON Hijacking https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-6967 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-6967"
X Link 2026-02-10T16:19Z [----] followers, [--] engagements
"CVE-2025-15570 Use-After-Free Vulnerability in lrzip LZMA Decompression Function Up to [-----] https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15570 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15570"
X Link 2026-02-10T16:29Z [----] followers, [--] engagements
"CVE-2025-15569 Local Privilege Escalation in Artifex MuPDF via Uncontrolled Search Path https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15569 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15569"
X Link 2026-02-10T16:40Z [----] followers, [--] engagements
"CVE-2025-11537 Credential Disclosure in Keycloak Logs When Verbose Logging Patte. Customizable Vulnerability Alerts: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-11537 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-11537"
X Link 2026-02-10T16:50Z [----] followers, [--] engagements
"CVE-2026-25655 DLL Hijacking in Siemens SINEC NMS Versions Below V4.0 SP2 (ICS) https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25655 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25655"
X Link 2026-02-10T17:10Z [----] followers, [--] engagements
"CVE-2026-23715 Out-of-Bounds Write Vulnerability in Simcenter Femap and Nastran XDB File Parsing https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23715 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23715"
X Link 2026-02-10T17:41Z [----] followers, [--] engagements
"CVE-2026-23716 Simcenter Femap and Nastran Out-of-Bounds Read Vulnerability in XDB Files https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23716 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23716"
X Link 2026-02-10T17:51Z [----] followers, [--] engagements
"CVE-2026-23718 Out-of-Bounds Read Vulnerability in Simcenter Femap and Nastran NDB File Parsing https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23718 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23718"
X Link 2026-02-10T18:01Z [----] followers, [--] engagements
"CVE-2026-23719 Heap-Based Buffer Overflow in Simcenter Femap and Nastran NDB File Parsing https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23719 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23719"
X Link 2026-02-10T18:11Z [----] followers, [--] engagements
"CVE-2026-23717 Out-of-Bounds Read Vulnerability in Simcenter Femap and Nastran XDB File Parsing https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23717 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23717"
X Link 2026-02-10T18:21Z [----] followers, [--] engagements
"CVE-2026-22923 Local Data Validation Vulnerability in NX Enabling Arbitrary Code Execution https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-22923 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-22923"
X Link 2026-02-10T18:32Z [----] followers, [--] engagements
"CVE-2026-1922 Stored XSS in The Events Calendar Shortcode & Block WordPress Plugin https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1922 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1922"
X Link 2026-02-10T18:42Z [----] followers, [--] engagements
"CVE-2026-1866 Stored XSS Vulnerability in WordPress Name Directory Plugin via HTML Enti. Vulnerability Notification: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1866 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1866"
X Link 2026-02-10T18:52Z [----] followers, [--] engagements
"CVE-2025-14895 Authorization Bypass in WordPress PopupKit Plugin Allows Sensitive Data Exposure https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-14895 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-14895"
X Link 2026-02-10T19:12Z [----] followers, [--] engagements
"CVE-2024-52334 Insecure Password Storage Vulnerability in syngo.plaza VB30E Versions Before HF07 https://vulmon.com/vulnerabilitydetailsqid=CVE-2024-52334 https://vulmon.com/vulnerabilitydetailsqid=CVE-2024-52334"
X Link 2026-02-10T19:22Z [----] followers, [--] engagements
"CVE-2026-26009 Remote Code Execution in Catalyst Platform via Malicious Server Template Commands https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-26009 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-26009"
X Link 2026-02-10T19:53Z [----] followers, [--] engagements
"CVE-2026-25610 MongoDB Aggregation $geoNear Pipeline Index Hint Causing Server C. Vulnerability Alert Subscriptions: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25610 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25610"
X Link 2026-02-10T20:03Z [----] followers, [--] engagements
"CVE-2026-25506 Local Buffer Overflow in MUNGE Authentication Service Enables Credential Forgery https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25506 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25506"
X Link 2026-02-10T20:23Z [----] followers, [--] engagements
"CVE-2026-21355 Out-of-Bounds Read Vulnerability in DNG SDK Versions 1.7.1 [----] and Earlier https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-21355 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-21355"
X Link 2026-02-10T20:34Z [----] followers, [--] engagements
"CVE-2026-21354 Integer Overflow Vulnerability in DNG SDK Versions 1.7.1 [----] and. Customizable Vulnerability Alerts: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-21354 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-21354"
X Link 2026-02-10T20:44Z [----] followers, [--] engagements
"CVE-2026-21353 Integer Overflow Vulnerability in Dng DNG SDK Versions versions [--]. Customizable Vulnerability Alerts: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-21353 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-21353"
X Link 2026-02-10T20:54Z [----] followers, [--] engagements
"CVE-2026-21352 Out-of-Bounds Write Vulnerability in DNG SDK Versions 1.7.1 [----] and Earlier https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-21352 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-21352"
X Link 2026-02-10T21:04Z [----] followers, [--] engagements
"CVE-2026-21345 Out-of-Bounds Read Vulnerability in Substance3D Stager Versions [--]. Customizable Vulnerability Alerts: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-21345 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-21345"
X Link 2026-02-10T21:14Z [----] followers, [--] engagements
"CVE-2026-21347 Integer Overflow Vulnerability in Bridge Versions 15.1.3 and 16.0.1 Enabling Code Execution https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-21347 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-21347"
X Link 2026-02-10T21:24Z [----] followers, [--] engagements
"CVE-2026-21346 Bridge Out-of-Bounds Write Vulnerability in Versions 15.1.3 and 16.0.1 Vulnerability Notification: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-21346 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-21346"
X Link 2026-02-10T21:35Z [----] followers, [--] engagements
"CVE-2026-21342 Out-of-Bounds Write Vulnerability in Substance3D Stager Versions 3.1.6 and Earlier https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-21342 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-21342"
X Link 2026-02-10T21:55Z [----] followers, [--] engagements
"CVE-2026-21343 Out-of-Bounds Read Vulnerability in Substance3D Stager Versions 3.1.6 and Earlier https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-21343 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-21343"
X Link 2026-02-10T22:05Z [----] followers, [--] engagements
"CVE-2026-21341 Out-of-Bounds Write Vulnerability in Substance3D Stager Versions 3.1.6 a. Vulnerability Notification: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-21341 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-21341"
X Link 2026-02-10T22:15Z [----] followers, [--] engagements
"CVE-2026-1849 MongoDB Server Recursive Expression Evaluation Causing Potential Out-of-Memory Failure https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1849 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1849"
X Link 2026-02-10T22:36Z [----] followers, [--] engagements
"CVE-2026-1847 MongoDB Replica Set Replication Stall via Large Document Insertion Customizable Vulnerability Alerts: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1847 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1847"
X Link 2026-02-10T22:56Z [----] followers, [--] engagements
"CVE-2026-25728 Time-of-Check to Time-of-Use Race Condition in ClipBucket v5 Imag. Customizable Vulnerability Alerts: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25728 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25728"
X Link 2026-02-11T00:17Z [----] followers, [--] engagements
"CVE-2026-25612 MongoDB Resource Lock Collision Vulnerability Causing Unintended Collection Unavailability https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25612 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25612"
X Link 2026-02-11T00:28Z [----] followers, [--] engagements
"CVE-2026-25611 MongoDB Denial of Service via Unauthenticated Memory Exhaustion Attack https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25611 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25611"
X Link 2026-02-11T00:38Z [----] followers, [--] engagements
"CVE-2025-12699 Cross-Site Scripting in ZOLL ePCR IOS App Enables Local File Read https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-12699 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-12699"
X Link 2026-02-11T04:01Z [----] followers, [--] engagements
"CVE-2026-1762 File Manipulation Vulnerability in GE Vernova Enervista UR Setup [--]. Vulnerability Alert Subscriptions: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1762 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1762"
X Link 2026-02-11T04:42Z [----] followers, [--] engagements
"CVE-2025-48515 AMD Secure Processor Boot Loader Memory Overwrite Vulnerability Enables Arbitrary Code Execution https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-48515 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-48515"
X Link 2026-02-11T05:22Z [----] followers, [--] engagements
"CVE-2025-29948 AMD SEV Firmware Vulnerability Enables Unauthorized Hypervisor Memory Integrity Bypass https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-29948 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-29948"
X Link 2026-02-11T05:53Z [----] followers, [--] engagements
"CVE-2025-29952 AMD SEV Firmware Vulnerability Enables Memory Corruption via Improper Initialization https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-29952 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-29952"
X Link 2026-02-11T06:03Z [----] followers, [--] engagements
"CVE-2025-29951 AMD Secure Processor Bootloader Buffer Overflow Enables Privilege Escalation https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-29951 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-29951"
X Link 2026-02-11T06:24Z [----] followers, [--] engagements
"CVE-2025-29950 SMM Memory Corruption Vulnerability Enables Arbitrary Code Execut. Customizable Vulnerability Alerts: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-29950 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-29950"
X Link 2026-02-11T06:34Z [----] followers, [--] engagements
"CVE-2025-29949 AMD Secure Processor Boot Loader Vulnerability Enables Out-of-Bounds Memory Corruption https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-29949 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-29949"
X Link 2026-02-11T06:54Z [----] followers, [--] engagements
"CVE-2025-29939 SEV Memory Integrity Vulnerability via Improper Access Control Du. Customizable Vulnerability Alerts: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-29939 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-29939"
X Link 2026-02-11T07:04Z [----] followers, [--] engagements
"CVE-2025-15524 Authenticated Gallery Metadata Disclosure in WordPress FooGallery Plugin https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15524 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15524"
X Link 2026-02-11T08:26Z [----] followers, [--] engagements
"CVE-2025-13431 SQL Injection in SlimStat Analytics WordPress Plugin Versions Up to 5.3.1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-13431 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-13431"
X Link 2026-02-11T08:46Z [----] followers, [--] engagements
"CVE-2025-14541 Remote Code Execution in Lucky Wheel Giveaway WordPress Plugin via eval() https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-14541 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-14541"
X Link 2026-02-11T08:56Z [----] followers, [--] engagements
"CVE-2025-15440 Stored XSS Vulnerability in iONE360 WordPress Configurator Plugin https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15440 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15440"
X Link 2026-02-11T11:49Z [----] followers, [--] engagements
"CVE-2025-7659 GitLab Web IDE Vulnerability Enables Unauthenticated Token. Don't wait vulnerability scanning results: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-7659 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-7659"
X Link 2026-02-11T14:32Z [----] followers, [--] engagements
"CVE-2025-14594 GitLab API Vulnerability Enables Unauthorized Pipeline Value Disclosure https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-14594 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-14594"
X Link 2026-02-11T14:42Z [----] followers, [--] engagements
"CVE-2025-14592 GraphQL Authorization Bypass in GitLab CE/EE Affecting Multiple Versions https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-14592 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-14592"
X Link 2026-02-11T14:52Z [----] followers, [--] engagements
"CVE-2025-12575 Server-Side Request Forgery Vulnerability in GitLab Enterprise Ed. Customizable Vulnerability Alerts: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-12575 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-12575"
X Link 2026-02-11T15:12Z [----] followers, [--] engagements
"CVE-2025-15096 WordPress Videospirecore Theme Plugin Privilege Escalation via Account Takeover https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15096 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15096"
X Link 2026-02-11T16:03Z [----] followers, [--] engagements
"CVE-2026-25869 Path Traversal in MiniGal Nano 0.3.5 and Prior via Directory Parameter https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25869 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25869"
X Link 2026-02-11T16:24Z [----] followers, [--] engagements
"CVE-2026-25868 Reflected XSS Vulnerability in MiniGal Nano 0.3.5 via Unvalidated dir Parameter https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25868 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25868"
X Link 2026-02-11T16:34Z [----] followers, [--] engagements
"CVE-2025-64075 Path Traversal Authentication Bypass in ZBT WE2001 Router Firmware 23.09.27 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-64075 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-64075"
X Link 2026-02-11T16:54Z [----] followers, [--] engagements
"CVE-2025-12474 Memory Corruption Vulnerability in libjxl Decoder via Uninitialized Memory Access https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-12474 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-12474"
X Link 2026-02-11T17:04Z [----] followers, [--] engagements
"CVE-2025-52541 DLL Hijacking Vulnerability in Vivado Enables Local Privilege Escalation https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-52541 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-52541"
X Link 2026-02-11T17:55Z [----] followers, [--] engagements
"CVE-2025-48508 GPU Hardware Reset Logic Vulnerability Enables Privileged Guest V. Customizable Vulnerability Alerts: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-48508 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-48508"
X Link 2026-02-11T18:16Z [----] followers, [--] engagements
"CVE-2025-48503 AMD Software Installer DLL Hijacking Vulnerability Enables Privilege Escalation https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-48503 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-48503"
X Link 2026-02-11T18:26Z [----] followers, [--] engagements
"CVE-2023-31324 AMD Secure Processor TOCTOU Race Condition Vulnerability in XGMI Trusted Agent https://vulmon.com/vulnerabilitydetailsqid=CVE-2023-31324 https://vulmon.com/vulnerabilitydetailsqid=CVE-2023-31324"
X Link 2026-02-11T18:56Z [----] followers, [--] engagements
"CVE-2024-36324 AMD Graphics Driver Arbitrary Code Execution via Improper Input Validation https://vulmon.com/vulnerabilitydetailsqid=CVE-2024-36324 https://vulmon.com/vulnerabilitydetailsqid=CVE-2024-36324"
X Link 2026-02-11T19:06Z [----] followers, [--] engagements
"CVE-2024-36320 Integer Overflow in AMD atihdwt6.sys Driver Enables Kernel-Level Memory Corruption https://vulmon.com/vulnerabilitydetailsqid=CVE-2024-36320 https://vulmon.com/vulnerabilitydetailsqid=CVE-2024-36320"
X Link 2026-02-11T19:17Z [----] followers, [--] engagements
"CVE-2023-20514 AMD Secure Processor Privilege Escalation via Arbitrary Memory Value Injection https://vulmon.com/vulnerabilitydetailsqid=CVE-2023-20514 https://vulmon.com/vulnerabilitydetailsqid=CVE-2023-20514"
X Link 2026-02-11T19:27Z [----] followers, [--] engagements
"CVE-2024-36316 Integer Overflow Vulnerability in AMD Graphics Driver Enabling Potential DoS Attack https://vulmon.com/vulnerabilitydetailsqid=CVE-2024-36316 https://vulmon.com/vulnerabilitydetailsqid=CVE-2024-36316"
X Link 2026-02-11T19:37Z [----] followers, [--] engagements
"CVE-2026-1227 XML External Entity Vulnerability in EBO Workstation Could. Don't wait vulnerability scanning results: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1227 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1227"
X Link 2026-02-11T19:57Z [----] followers, [--] engagements
"CVE-2025-8668 Reflected XSS Vulnerability in E-KalSoftwareite Turboard Software Platform Human this title follows the technical security vulnerability captures the key vulnerability type (product and title case. https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-8668 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-8668"
X Link 2026-02-11T20:28Z [----] followers, [--] engagements
"CVE-2025-62856 Path Traversal in Synology File Station [--] Enables Unautho. Don't wait vulnerability scanning results: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-62856 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-62856"
X Link 2026-02-11T20:38Z [----] followers, [--] engagements
"CVE-2026-2322 UI Spoofing Vulnerability in Google Chrome Before 145.0.7632.45 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2322 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2322"
X Link 2026-02-11T21:59Z [----] followers, [--] engagements
"CVE-2026-2313 Use-After-Free in Chrome CSS Rendering Engine Enables Remote Code Executi. Vulnerability Notification: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2313 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2313"
X Link 2026-02-11T23:00Z [----] followers, [--] engagements
"CVE-2026-2317 Cross-Origin Data Leak in Google Chrome Animation Rendering Prior to 145.0.7632.45 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2317 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2317"
X Link 2026-02-11T23:21Z [----] followers, [--] engagements
"CVE-2026-2318 UI Spoofing Vulnerability in Google Chrome PictureInPicture Before 145.0.7632.45 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2318 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2318"
X Link 2026-02-11T23:31Z [----] followers, [--] engagements
"CVE-2025-69872 Python-Diskcache Arbitrary Code Execution via Malicious Pickle Serialization https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-69872 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-69872"
X Link 2026-02-11T23:41Z [----] followers, [--] engagements
"CVE-2025-70296 Stored HTML Injection in Mealie 3.3.1 Recipe Notes Rendering Comp. Vulnerability Alert Subscriptions: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-70296 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-70296"
X Link 2026-02-11T23:51Z [----] followers, [--] engagements
"CVE-2025-70297 Stored XSS in Mealie 3.3.1 via Malicious SVG File Upload https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-70297 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-70297"
X Link 2026-02-12T00:01Z [----] followers, [--] engagements
"CVE-2025-69873 Regular Expression Denial of Service Vulnerability in Ajv JSON Schema Validator https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-69873 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-69873"
X Link 2026-02-12T00:12Z [----] followers, [--] engagements
"CVE-2025-69871 Race Condition in MedusaJS Medusa v2.12.2 Allows Unlimited Promot. Customizable Vulnerability Alerts: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-69871 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-69871"
X Link 2026-02-12T00:22Z [----] followers, [--] engagements
"CVE-2025-70085 Buffer Overflow Vulnerability in OpenSatKit 2.2.1 File Handling Functions https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-70085 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-70085"
X Link 2026-02-12T01:23Z [----] followers, [--] engagements
"CVE-2025-70084 Directory Traversal in OpenSatKit 2.2.1 Enables Unauthorized File Access and Deletion https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-70084 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-70084"
X Link 2026-02-12T01:33Z [----] followers, [--] engagements
"CVE-2025-69874 Path Traversal in nanotar 0.2.0 Enables Arbitrary File Write Vulnerability https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-69874 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-69874"
X Link 2026-02-12T01:53Z [----] followers, [--] engagements
"CVE-2025-65480 Remote Code Execution in Pacom Unison Client 5.13.1 via Report Template Injection https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-65480 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-65480"
X Link 2026-02-12T02:03Z [----] followers, [--] engagements
"CVE-2025-65128 Unauthenticated Configuration Modification in ZBT WE2001 Web Management API https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-65128 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-65128"
X Link 2026-02-12T02:14Z [----] followers, [--] engagements
"CVE-2025-65127 Unauthenticated Information Disclosure in ZBT WE2001 Web API via Session. Vulnerability Notification: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-65127 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-65127"
X Link 2026-02-12T02:54Z [----] followers, [--] engagements
"CVE-2025-13391 Unauthenticated File Deletion Vulnerability in WooCommerce Uni CPO Plugin https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-13391 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-13391"
X Link 2026-02-12T03:04Z [----] followers, [--] engagements
"CVE-2026-1729 Authentication Bypass Vulnerability in AdForest WordPress Theme Ve. Vulnerability Alert Subscriptions: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1729 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1729"
X Link 2026-02-12T04:05Z [----] followers, [--] engagements
"CVE-2026-20680 Sandbox Vulnerability Enables Unauthorized Access to Sensitive User Data. Vulnerability Notification: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20680 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20680"
X Link 2026-02-12T04:16Z [----] followers, [--] engagements
"CVE-2026-20677 Sandbox Bypass Race Condition in Apple Operating Systems Resolved https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20677 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20677"
X Link 2026-02-12T04:46Z [----] followers, [--] engagements
"CVE-2026-20682 Logic Vulnerability in Apple Notes Enabling Unauthorized . Don't wait vulnerability scanning results: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20682 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20682"
X Link 2026-02-12T04:56Z [----] followers, [--] engagements
"CVE-2026-20700 Memory Corruption Vulnerability in Apple Platforms Enabling Arbitrary Co. Vulnerability Notification: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20700 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20700"
X Link 2026-02-12T05:07Z [----] followers, [--] engagements
"CVE-2026-20674 Privacy Vulnerability in iOS and iPadOS [----] Allowing Unauthorize. Vulnerability Alert Subscriptions: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20674 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20674"
X Link 2026-02-12T05:37Z [----] followers, [---] engagements
"CVE-2026-20676 Safari Web Extension Tracking Vulnerability in Apple Platforms Be. Vulnerability Alert Subscriptions: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20676 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20676"
X Link 2026-02-12T05:47Z [----] followers, [--] engagements
"CVE-2026-20667 Sandbox Bypass Vulnerability in Apple iOS macOS and watchOS Pla. Customizable Vulnerability Alerts: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20667 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20667"
X Link 2026-02-12T05:57Z [----] followers, [--] engagements
"CVE-2026-20663 App Enumeration Vulnerability in iOS and iPadOS Versions Prior to [----] a. Vulnerability Notification: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20663 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20663"
X Link 2026-02-12T06:48Z [----] followers, [--] engagements
"CVE-2026-20640 Physical Access Screenshot Vulnerability in iPhone Mirror. Don't wait vulnerability scanning results: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20640 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20640"
X Link 2026-02-12T08:40Z [----] followers, [--] engagements
"CVE-2026-20650 Bluetooth Denial-of-Service Vulnerability in Apple Operating Systems [----] https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20650 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20650"
X Link 2026-02-12T09:11Z [----] followers, [--] engagements
"CVE-2026-20641 Privacy Vulnerability in Apple Platforms Allowing App Installation Ident. Vulnerability Notification: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20641 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20641"
X Link 2026-02-12T09:31Z [----] followers, [--] engagements
"CVE-2026-25157 OpenClaw AI Assistant Command Injection Vulnerability in Versions Prior to 2026.1.29 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25157 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25157"
X Link 2026-02-12T10:22Z [----] followers, [--] engagements
"CVE-2025-41117 Cross-Site Scripting in Grafana Explore Traces via Jaeger HTTP API Datasource https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-41117 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-41117"
X Link 2026-02-12T10:42Z [----] followers, [--] engagements
"CVE-2025-15577 Unauthenticated Arbitrary File Read Vulnerability in Valmet DNA W. Customizable Vulnerability Alerts: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15577 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15577"
X Link 2026-02-12T10:52Z [----] followers, [--] engagements
Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing