#  @VulmonFeeds Vulmon Vulnerability Feed Vulmon Vulnerability Feed posts on X about alerts, plugin, up to, vulnerability the most. They currently have [-----] followers and [---] posts still getting attention that total [-----] engagements in the last [--] hours. ### Engagements: [-----] [#](/creator/twitter::941389496771399680/interactions)  - [--] Week [------] -46% - [--] Month [-------] +39% - [--] Months [-------] +96% - [--] Year [-------] +44% ### Mentions: [--] [#](/creator/twitter::941389496771399680/posts_active)  - [--] Week [---] -32% - [--] Month [-----] +47% - [--] Months [-----] +119% - [--] Year [------] +15% ### Followers: [-----] [#](/creator/twitter::941389496771399680/followers)  - [--] Week [-----] +0.18% - [--] Month [-----] +0.89% - [--] Months [-----] +3.50% - [--] Year [-----] +8.60% ### CreatorRank: [---------] [#](/creator/twitter::941389496771399680/influencer_rank)  ### Social Influence **Social category influence** [technology brands](/list/technology-brands) 9.18% [stocks](/list/stocks) 7.65% [finance](/list/finance) 1.28% [automotive brands](/list/automotive-brands) 0.51% [social networks](/list/social-networks) 0.26% [products](/list/products) 0.26% **Social topic influence** [alerts](/topic/alerts) #651, [plugin](/topic/plugin) #126, [up to](/topic/up-to) 3.06%, [vulnerability](/topic/vulnerability) 2.3%, [data](/topic/data) 2.04%, [bypass](/topic/bypass) #362, [command](/topic/command) 1.79%, [apple](/topic/apple) 1.79%, [ibm](/topic/ibm) 1.53%, [sap](/topic/sap) #595 **Top accounts mentioned or mentioned by** [@transilienceai](/creator/undefined) [@farmfecore](/creator/undefined) [@rageagainstthepixelunitycli](/creator/undefined) **Top assets mentioned** [IBM (IBM)](/topic/ibm) [Alphabet Inc Class A (GOOGL)](/topic/$googl) [Flex Ltd. Ordinary Shares (FLEX)](/topic/$flex) [Dell Technologies, Inc. (DELL)](/topic/dell) [GE Vernova Inc. (GEV)](/topic/$gev) ### Top Social Posts Top posts by engagements in the last [--] hours "CVE-2025-56647 WebSocket Origin Validation Bypass in npm @farmfe/core Before 1.7.6 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-56647 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-56647" [X Link](https://x.com/VulmonFeeds/status/2022005267487977781) 2026-02-12T17:49Z [----] followers, [--] engagements "CVE-2018-18920 Py-EVM v0.2.0-alpha.33 allows attackers to make a vm.execute_bytecode call that triggers computation._stack.values with '"stack": [---] [---] 0' where b'x' was expected resulting in an execution fa. http://vulmon.com/vulnerabilitydetailsqid=CVE-2018-18920 http://vulmon.com/vulnerabilitydetailsqid=CVE-2018-18920" [X Link](https://x.com/VulmonFeeds/status/1061885742274744320) 2018-11-12T07:37Z [----] followers, [--] engagements "CVE-2020-13645 In GNOME glib-networking through 2.64.2 the implementation of GTlsClientConnection skips hostname verification of the server's TLS certificate if the application fails to specify the expected s. http://vulmon.com/vulnerabilitydetailsqid=CVE-2020-13645 http://vulmon.com/vulnerabilitydetailsqid=CVE-2020-13645" [X Link](https://x.com/VulmonFeeds/status/1277448928519217154) 2020-06-29T03:48Z [----] followers, [--] engagements "CVE-2024-22113 Open redirect vulnerability in Access analysis CGI An-Analyzer released in [----] December [--] and earlier allows a remote unauthenticated attacker to redirect users to arbitrary websites and conduct p. http://vulmon.com/vulnerabilitydetailsqid=CVE-2024-22113 http://vulmon.com/vulnerabilitydetailsqid=CVE-2024-22113" [X Link](https://x.com/VulmonFeeds/status/1749316872737030349) 2024-01-22T06:23Z [----] followers, [--] engagements "CVE-2023-47352 Technicolor TC8715D devices have predictable default WPA2 security passwords. An attacker who scans for SSID and BSSID values may be able to predict these passwords. http://vulmon.com/vulnerabilitydetailsqid=CVE-2023-47352 http://vulmon.com/vulnerabilitydetailsqid=CVE-2023-47352" [X Link](https://x.com/VulmonFeeds/status/1749317125762662717) 2024-01-22T06:24Z [----] followers, [--] engagements "CVE-2024-25089 Malwarebytes Binisoft Windows Firewall Control before 6.9.9.2 allows remote attackers to execute arbitrary code via gRPC named pipes. http://vulmon.com/vulnerabilitydetailsqid=CVE-2024-25089 http://vulmon.com/vulnerabilitydetailsqid=CVE-2024-25089" [X Link](https://x.com/VulmonFeeds/status/1754287698699813076) 2024-02-04T23:35Z [----] followers, [---] engagements "CVE-2025-34201 Network Segmentation Vulnerability in Vasion Print Virtual Appliance Docker Containers https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-34201 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-34201" [X Link](https://x.com/VulmonFeeds/status/1969232927775920322) 2025-09-20T02:51Z [----] followers, [--] engagements "CVE-2025-46152 Bitwise Right Shift Vulnerability in PyTorch Versions Prior to 2.7.0 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-46152 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-46152" [X Link](https://x.com/VulmonFeeds/status/1971320194430644410) 2025-09-25T21:05Z [----] followers, [---] engagements "CVE-2025-52987 Clickjacking Vulnerability in Juniper Networks Paragon Au. Don't wait vulnerability scanning results: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-52987 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-52987" [X Link](https://x.com/VulmonFeeds/status/2011997287803654506) 2026-01-16T03:01Z [----] followers, [---] engagements "CVE-2026-21721 Organization-Internal Dashboard Permissions Bypass in Splunk Ente. Customizable Vulnerability Alerts: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-21721 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-21721" [X Link](https://x.com/VulmonFeeds/status/2016171778754699595) 2026-01-27T15:29Z [----] followers, [--] engagements "CVE-2026-1633 Unauthenticated Web Interface Vulnerability in Synectix LAN [---] TR. Vulnerability Alert Subscriptions: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1633 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1633" [X Link](https://x.com/VulmonFeeds/status/2018845175586431423) 2026-02-04T00:32Z [----] followers, [--] engagements "CVE-2026-1813 Remote File Upload Vulnerability in Bolo-Solo Blog Platform Up to 2.6.4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1813 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1813" [X Link](https://x.com/VulmonFeeds/status/2018847735537967377) 2026-02-04T00:43Z [----] followers, [--] engagements "CVE-2026-1632 Unauthenticated Web Management Interface Vulnerability in MOMA Seismic Station v2.4.2520 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1632 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1632" [X Link](https://x.com/VulmonFeeds/status/2018850295468458444) 2026-02-04T00:53Z [----] followers, [--] engagements "CVE-2026-1755 Stored XSS in Menu Icons by ThemeIsle WordPress Plugin via Image Alt Text https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1755 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1755" [X Link](https://x.com/VulmonFeeds/status/2018855414780100658) 2026-02-04T01:13Z [----] followers, [--] engagements "CVE-2025-33081 Local Information Disclosure Vulnerability in IBM Concert 1.0.0 Through 2.1.0 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-33081 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-33081" [X Link](https://x.com/VulmonFeeds/status/2018857974672855044) 2026-02-04T01:23Z [----] followers, [--] engagements "CVE-2025-36033 Cross-Site Scripting in IBM Engineering Lifecycle Management Glob. Vulnerability Alert Subscriptions: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-36033 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-36033" [X Link](https://x.com/VulmonFeeds/status/2018860534242607181) 2026-02-04T01:33Z [----] followers, [--] engagements "CVE-2025-36094 IBM Cloud Pak for Business Automation Denial of Service via Input Validation Vulnerability https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-36094 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-36094" [X Link](https://x.com/VulmonFeeds/status/2018863094479417402) 2026-02-04T01:44Z [----] followers, [--] engagements "CVE-2026-25510 Remote Code Execution in CI4MS CMS Before Version 0.28.5.0 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25510 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25510" [X Link](https://x.com/VulmonFeeds/status/2018865654552547629) 2026-02-04T01:54Z [----] followers, [--] engagements "CVE-2026-25509 Email Enumeration Vulnerability in CI4MS Authentication Prior to 0.28.5.0 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25509 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25509" [X Link](https://x.com/VulmonFeeds/status/2018868214508220679) 2026-02-04T02:04Z [----] followers, [--] engagements "CVE-2026-25224 Fastify Web Streams Denial-of-Service Vulnerability Prior to Vers. Customizable Vulnerability Alerts: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25224 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25224" [X Link](https://x.com/VulmonFeeds/status/2018870774455574694) 2026-02-04T02:14Z [----] followers, [--] engagements "CVE-2026-25223 Fastify Content-Type Validation Bypass Vulnerability Befo. Don't wait vulnerability scanning results: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25223 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25223" [X Link](https://x.com/VulmonFeeds/status/2018873334444835051) 2026-02-04T02:24Z [----] followers, [--] engagements "CVE-2026-25148 Cross-Site Scripting in Qwik.js Server-Side Rendering Prior to Version 1.19.0 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25148 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25148" [X Link](https://x.com/VulmonFeeds/status/2018875894446596123) 2026-02-04T02:34Z [----] followers, [--] engagements "CVE-2026-25150 Prototype Pollution Vulnerability in Qwik Framework Prior to Version 1.19.0 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25150 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25150" [X Link](https://x.com/VulmonFeeds/status/2018881014639030291) 2026-02-04T02:55Z [----] followers, [--] engagements "CVE-2026-25155 Content-Type Header Parsing Vulnerability in Qwik Framework Before 1.12.0 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25155 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25155" [X Link](https://x.com/VulmonFeeds/status/2018883574506656189) 2026-02-04T03:05Z [----] followers, [--] engagements "CVE-2026-25149 Open Redirect Vulnerability in Qwik City Middleware Before Version 1.19.0 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25149 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25149" [X Link](https://x.com/VulmonFeeds/status/2018886134445613349) 2026-02-04T03:15Z [----] followers, [--] engagements "CVE-2026-1341 Unauthenticated Configuration Access in Avation Light Engine Pro https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1341 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1341" [X Link](https://x.com/VulmonFeeds/status/2018888694761931241) 2026-02-04T03:25Z [----] followers, [--] engagements "CVE-2026-1811 Path Traversal in B3log Bolo-Solo up to 2.6.4 via Filename Handler https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1811 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1811" [X Link](https://x.com/VulmonFeeds/status/2018891254713471267) 2026-02-04T03:35Z [----] followers, [--] engagements "CVE-2025-69621 Arbitrary File Overwrite in Comic Book Reader v1.0.95 Enables System Compromise https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-69621 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-69621" [X Link](https://x.com/VulmonFeeds/status/2018896377003085948) 2026-02-04T03:56Z [----] followers, [--] engagements "CVE-2025-69620 Path Traversal in Moo Chan Song v4.5.7 Enables Denial of Service Attack https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-69620 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-69620" [X Link](https://x.com/VulmonFeeds/status/2018898937025822928) 2026-02-04T04:06Z [----] followers, [--] engagements "CVE-2026-1791 Unrestricted File Upload Vulnerability in Hillstone Networks Security Gateway V5.5 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1791 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1791" [X Link](https://x.com/VulmonFeeds/status/2018906618390257700) 2026-02-04T04:37Z [----] followers, [--] engagements "CVE-2026-23704 Cross-Site Scripting in Movable Type [--] and [---] Series Allowing Arbitrary Script Execution https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23704 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23704" [X Link](https://x.com/VulmonFeeds/status/2018950177399132374) 2026-02-04T07:30Z [----] followers, [--] engagements "CVE-2026-21393 Stored Cross-Site Scripting Vulnerability in Movable Type Edit Comment Feature https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-21393 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-21393" [X Link](https://x.com/VulmonFeeds/status/2018952737061245323) 2026-02-04T07:40Z [----] followers, [--] engagements "CVE-2026-24447 Code Execution Vulnerability in Movable Type via Malicious CSV File https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24447 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24447" [X Link](https://x.com/VulmonFeeds/status/2018955296920498419) 2026-02-04T07:50Z [----] followers, [--] engagements "CVE-2026-22875 Stored Cross-Site Scripting Vulnerability in Movable Type Export Sites https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-22875 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-22875" [X Link](https://x.com/VulmonFeeds/status/2018957856834244854) 2026-02-04T08:00Z [----] followers, [--] engagements "CVE-2026-20982 Path Traversal in ShortcutService Enables Privileged Local File Creation https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20982 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20982" [X Link](https://x.com/VulmonFeeds/status/2018968094673186977) 2026-02-04T08:41Z [----] followers, [--] engagements "CVE-2026-20981 Physical Attacker Command Execution in FacAtFunction via Input Va. Customizable Vulnerability Alerts: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20981 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20981" [X Link](https://x.com/VulmonFeeds/status/2018970654507184459) 2026-02-04T08:51Z [----] followers, [--] engagements "CVE-2026-20985 Samsung Members URL Injection Vulnerability Enables Arbitrary Activity Launch https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20985 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20985" [X Link](https://x.com/VulmonFeeds/status/2018973214211207281) 2026-02-04T09:01Z [----] followers, [--] engagements "CVE-2026-20979 Local Privilege Escalation in Settings Prior to SMR Feb-2026 Release [--] https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20979 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20979" [X Link](https://x.com/VulmonFeeds/status/2018983453870420363) 2026-02-04T09:42Z [----] followers, [--] engagements "CVE-2026-20978 Local Authorization Bypass in KnoxGuardManager Prior to SMR Feb-2026 Release [--] https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20978 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20978" [X Link](https://x.com/VulmonFeeds/status/2018986013717135541) 2026-02-04T09:52Z [----] followers, [--] engagements "CVE-2026-0816 SQL Injection in All Push Notification for WP Plugin WordPress Versions 1.5.3 and Below https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-0816 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-0816" [X Link](https://x.com/VulmonFeeds/status/2018993695916241273) 2026-02-04T10:23Z [----] followers, [--] engagements "CVE-2026-0743 Stored XSS in WP Content Permission Plugin for WordPress Administrators https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-0743 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-0743" [X Link](https://x.com/VulmonFeeds/status/2018996255750267334) 2026-02-04T10:33Z [----] followers, [--] engagements "CVE-2026-0742 Stored XSS Vulnerability in Smart Appointment & Booking WordPress Plugin https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-0742 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-0742" [X Link](https://x.com/VulmonFeeds/status/2018998815668260893) 2026-02-04T10:43Z [----] followers, [--] engagements "CVE-2026-1370 SQL Injection in SIBS WooCommerce Payment Gateway Plugin = 2.2.0 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1370 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1370" [X Link](https://x.com/VulmonFeeds/status/2019001375493947477) 2026-02-04T10:53Z [----] followers, [--] engagements "CVE-2026-0679 Authorization Bypass in Fortis for WooCommerce Plugin Enables Order Status Manipulation https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-0679 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-0679" [X Link](https://x.com/VulmonFeeds/status/2019003935365661047) 2026-02-04T11:03Z [----] followers, [--] engagements "CVE-2026-0681 Stored Cross-Site Scripting in WordPress Extended Random Number Generator Plugin https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-0681 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-0681" [X Link](https://x.com/VulmonFeeds/status/2019006495547875803) 2026-02-04T11:13Z [----] followers, [--] engagements "CVE-2025-15507 Unauthenticated License Status Modification in Magic Import Document Extractor WordPress Plugin https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15507 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15507" [X Link](https://x.com/VulmonFeeds/status/2019011615287279621) 2026-02-04T11:34Z [----] followers, [--] engagements "CVE-2025-15482 Unauthenticated Sensitive Information Disclosure in Chapa Payment Gateway Plugin https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15482 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15482" [X Link](https://x.com/VulmonFeeds/status/2019014175272443948) 2026-02-04T11:44Z [----] followers, [--] engagements "CVE-2025-15487 Path Traversal in WordPress Code Explorer Plugin Versions 1.4.6 and Below https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15487 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15487" [X Link](https://x.com/VulmonFeeds/status/2019016735320309922) 2026-02-04T11:54Z [----] followers, [--] engagements "CVE-2025-15268 Unauthenticated SQL Injection in Infility Global WordPress Plugin 2.14.46 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15268 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15268" [X Link](https://x.com/VulmonFeeds/status/2019021854443176014) 2026-02-04T12:14Z [----] followers, [--] engagements "CVE-2025-15260 Privilege Escalation in MyRewards WordPress Plugin via Unauthorized Rule Modification https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15260 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15260" [X Link](https://x.com/VulmonFeeds/status/2019024414419910833) 2026-02-04T12:25Z [----] followers, [--] engagements "CVE-2025-15285 SEO Flow WordPress Plugin Unauthorized Data Modification via Authentication Bypass https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15285 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15285" [X Link](https://x.com/VulmonFeeds/status/2019026974056853650) 2026-02-04T12:35Z [----] followers, [--] engagements "CVE-2025-59818 Authenticated Command Injection Vulnerability in File Upload Mech. Customizable Vulnerability Alerts: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-59818 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-59818" [X Link](https://x.com/VulmonFeeds/status/2019042333224779778) 2026-02-04T13:36Z [----] followers, [--] engagements "CVE-2026-1622 Information Disclosure Vulnerability in Neo4j Enterprise and Community Editions https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1622 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1622" [X Link](https://x.com/VulmonFeeds/status/2019044893310505375) 2026-02-04T13:46Z [----] followers, [--] engagements "CVE-2025-41085 Stored XSS Vulnerability in Apidog 2.7.15 via Unsanitized SVG Image Upload https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-41085 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-41085" [X Link](https://x.com/VulmonFeeds/status/2019047453270433849) 2026-02-04T13:56Z [----] followers, [--] engagements "CVE-2025-15368 Local File Inclusion in WordPress SportsPress Plugin via Shortcode Template Attribute https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15368 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15368" [X Link](https://x.com/VulmonFeeds/status/2019055138728493240) 2026-02-04T14:27Z [----] followers, [--] engagements "CVE-2026-22548 F5 BIG-IP Advanced WAF Process Termination Vulnerability https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-22548 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-22548" [X Link](https://x.com/VulmonFeeds/status/2019075632441819310) 2026-02-04T15:48Z [----] followers, [--] engagements "CVE-2026-20732 F5 BIG-IP Configuration Utility Error Message Spoofing Vu. Don't wait vulnerability scanning results: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20732 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20732" [X Link](https://x.com/VulmonFeeds/status/2019078192401703364) 2026-02-04T15:58Z [----] followers, [--] engagements "CVE-2026-20730 BIG-IP Edge Client Windows VPN Client Information Disclosure Vulnerability https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20730 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20730" [X Link](https://x.com/VulmonFeeds/status/2019080752340611109) 2026-02-04T16:08Z [----] followers, [--] engagements "CVE-2026-23047 Linux Kernel Libceph Vulnerability Don't wait vulnerability scanning results: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23047 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23047" [X Link](https://x.com/VulmonFeeds/status/2019098671237812582) 2026-02-04T17:20Z [----] followers, [--] engagements "CVE-2026-23043 NULL Pointer Dereference in Linux Kernel Btrfs Log Replay. Don't wait vulnerability scanning results: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23043 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23043" [X Link](https://x.com/VulmonFeeds/status/2019114027784237516) 2026-02-04T18:21Z [----] followers, [--] engagements "CVE-2025-70545 Stored Cross-Site Scripting in Belden ONT 2K05X Router Web Management Interface https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-70545 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-70545" [X Link](https://x.com/VulmonFeeds/status/2019119147414659384) 2026-02-04T18:41Z [----] followers, [--] engagements "CVE-2026-25532 Integer Underflow in Espressif IoT Development Framework WPS Enrollee Implementation https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25532 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25532" [X Link](https://x.com/VulmonFeeds/status/2019129395525411184) 2026-02-04T19:22Z [----] followers, [--] engagements "CVE-2026-25508 Out-of-Bounds Read in Espressif IoT Development Framework BLE Provisioni. Vulnerability Notification: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25508 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25508" [X Link](https://x.com/VulmonFeeds/status/2019131955791507602) 2026-02-04T19:32Z [----] followers, [--] engagements "CVE-2026-25507 Use-After-Free Vulnerability in Espressif IOT Development Framework BLE Provisioning https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25507 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25507" [X Link](https://x.com/VulmonFeeds/status/2019134515931689327) 2026-02-04T19:42Z [----] followers, [--] engagements "CVE-2026-25139 Out-of-Bounds Read Vulnerability in RIOT OS [-------] 6LoWPAN Stack https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25139 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25139" [X Link](https://x.com/VulmonFeeds/status/2019137075841262035) 2026-02-04T19:52Z [----] followers, [--] engagements "CVE-2026-22247 Server-Side Request Forgery (SSRF) Vulnerability in GLPI Webhook Feature 11.0.0-11.0.4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-22247 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-22247" [X Link](https://x.com/VulmonFeeds/status/2019142194876039448) 2026-02-04T20:13Z [----] followers, [--] engagements "CVE-2026-22044 SQL Injection Vulnerability in GLPI Asset Management Software [----] to 10.0.23 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-22044 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-22044" [X Link](https://x.com/VulmonFeeds/status/2019144755020435726) 2026-02-04T20:23Z [----] followers, [--] engagements "CVE-2026-21893 Command Injection Vulnerability in n8n Workflow Automatio. Don't wait vulnerability scanning results: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-21893 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-21893" [X Link](https://x.com/VulmonFeeds/status/2019147314938409137) 2026-02-04T20:33Z [----] followers, [--] engagements "CVE-2025-69213 SQL Injection in OpenSTAManager 2.9.8 via Authenticated Endpoint Vulnerability https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-69213 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-69213" [X Link](https://x.com/VulmonFeeds/status/2019152434006794251) 2026-02-04T20:53Z [----] followers, [--] engagements "CVE-2025-64712 Path Traversal in Unstructured Library Prior to 0.18.18 Enabling Arbitrary File Write https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-64712 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-64712" [X Link](https://x.com/VulmonFeeds/status/2019154993937363218) 2026-02-04T21:03Z [----] followers, [--] engagements "CVE-2026-25115 Python Sandbox Escape Vulnerability in n8n Workflow Autom. Don't wait vulnerability scanning results: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25115 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25115" [X Link](https://x.com/VulmonFeeds/status/2019160112565190840) 2026-02-04T21:24Z [----] followers, [--] engagements "CVE-2026-25056 Authenticated File Write Vulnerability in n8n Workflow Automation Platform https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25056 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25056" [X Link](https://x.com/VulmonFeeds/status/2019162672344809645) 2026-02-04T21:34Z [----] followers, [--] engagements "CVE-2026-25055 n8n Workflow Automation Platform Remote Code Execution via Unvalidated File Transfers https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25055 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25055" [X Link](https://x.com/VulmonFeeds/status/2019165232145322497) 2026-02-04T21:44Z [----] followers, [--] engagements "CVE-2026-25054 Stored Cross-Site Scripting in n8n Workflow Automation Pl. Don't wait vulnerability scanning results: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25054 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25054" [X Link](https://x.com/VulmonFeeds/status/2019167792163934347) 2026-02-04T21:54Z [----] followers, [--] engagements "CVE-2026-25053 Authenticated Command Execution and File Read Vulnerability in n8n Workflow Platform https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25053 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25053" [X Link](https://x.com/VulmonFeeds/status/2019170352102858917) 2026-02-04T22:05Z [----] followers, [--] engagements "CVE-2026-25052 Authenticated File Read Vulnerability in n8n Workflow Automation Platform https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25052 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25052" [X Link](https://x.com/VulmonFeeds/status/2019172911962087843) 2026-02-04T22:15Z [----] followers, [--] engagements "CVE-2026-25051 Cross-Site Scripting in n8n Workflow Automation Platform Before 1.123.2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25051 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25051" [X Link](https://x.com/VulmonFeeds/status/2019175471632543923) 2026-02-04T22:25Z [----] followers, [--] engagements "CVE-2026-25049 Workflow Automation Command Injection in n8n Prior to Versions 1.123.17 and 2.5.2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25049 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25049" [X Link](https://x.com/VulmonFeeds/status/2019178031596580979) 2026-02-04T22:35Z [----] followers, [--] engagements "CVE-2026-23110 Linux Kernel SCSI Error Handler Race Condition Prevents I/O Completion Wake-Up https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23110 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23110" [X Link](https://x.com/VulmonFeeds/status/2019180591711666613) 2026-02-04T22:45Z [----] followers, [--] engagements "CVE-2026-23109 Use-After-Free in Linux Kernel fs/writeback Affects FUSE Filesystem Inte. Vulnerability Notification: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23109 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23109" [X Link](https://x.com/VulmonFeeds/status/2019183151612846242) 2026-02-04T22:55Z [----] followers, [--] engagements "CVE-2026-23108 USB Memory Leak in Linux Kernel can usb_8dev Driver https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23108 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23108" [X Link](https://x.com/VulmonFeeds/status/2019185711593701836) 2026-02-04T23:06Z [----] followers, [--] engagements "CVE-2026-23107 Linux Kernel Null Pointer Dereference in ARM64 ZA Context Restora. Vulnerability Alert Subscriptions: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23107 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23107" [X Link](https://x.com/VulmonFeeds/status/2019188271654256744) 2026-02-04T23:16Z [----] followers, [--] engagements "CVE-2026-23106 Linux Kernel Timekeeping Auxiliary Timekeeper Leap State Adjustme. Customizable Vulnerability Alerts: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23106 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23106" [X Link](https://x.com/VulmonFeeds/status/2019190831479935350) 2026-02-04T23:26Z [----] followers, [--] engagements "CVE-2026-23105 Use After Free in Linux Kernel qfq Qdisc Class Activity Determination https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23105 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23105" [X Link](https://x.com/VulmonFeeds/status/2019193391423111552) 2026-02-04T23:36Z [----] followers, [--] engagements "CVE-2026-23104 Linux Kernel Ice Driver HWMON Sysfs Attribute Call Trace Vulnerability https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23104 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23104" [X Link](https://x.com/VulmonFeeds/status/2019195951320121620) 2026-02-04T23:46Z [----] followers, [--] engagements "CVE-2026-23103 Race Condition in Linux Kernel ipvlan Address Management Lock Implementation https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23103 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23103" [X Link](https://x.com/VulmonFeeds/status/2019198512106287438) 2026-02-04T23:56Z [----] followers, [--] engagements "CVE-2026-23102 Linux Kernel SVE Context Restoration Vulnerability Causing Out-of-Bounds Memory Reads https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23102 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23102" [X Link](https://x.com/VulmonFeeds/status/2019201072170999901) 2026-02-05T00:07Z [----] followers, [--] engagements "CVE-2026-23101 Race Condition in Linux Kernel LED Class Initialization Causing Uninitialized Work Queue https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23101 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23101" [X Link](https://x.com/VulmonFeeds/status/2019203632034361632) 2026-02-05T00:17Z [----] followers, [--] engagements "CVE-2026-23100 Shared PMD Table Detection Failure in Linux Kernel Hugetlb Subsystem https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23100 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23100" [X Link](https://x.com/VulmonFeeds/status/2019206191784563043) 2026-02-05T00:27Z [----] followers, [--] engagements "CVE-2026-23099 Linux Kernel Bonding Driver Out-of-Bounds Read in LACP Mode Configuration https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23099 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23099" [X Link](https://x.com/VulmonFeeds/status/2019208751757119824) 2026-02-05T00:37Z [----] followers, [--] engagements "CVE-2026-23098 Linux Kernel Double-Free Vulnerability in netrom Network Routing Mechanism https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23098 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23098" [X Link](https://x.com/VulmonFeeds/status/2019211311725383711) 2026-02-05T00:47Z [----] followers, [--] engagements "CVE-2026-23097 Linux Kernel Deadlock in Hugetlb File Folio Migration Lock Ordering https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23097 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23097" [X Link](https://x.com/VulmonFeeds/status/2019213871433584771) 2026-02-05T00:57Z [----] followers, [--] engagements "CVE-2026-23096 Linux Kernel Use-After-Free Vulnerability in uacce Character Device Handling https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23096 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23096" [X Link](https://x.com/VulmonFeeds/status/2019216431083065642) 2026-02-05T01:08Z [----] followers, [--] engagements "CVE-2026-23095 Memory Leak in Linux Kernel GUE Protocol Handler with Inner IP Protocol [--] https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23095 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23095" [X Link](https://x.com/VulmonFeeds/status/2019218991126876222) 2026-02-05T01:18Z [----] followers, [--] engagements "CVE-2026-23094 Sysfs Isolation Check Condition Vulnerability in Linux Kernel uacce https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23094 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23094" [X Link](https://x.com/VulmonFeeds/status/2019221551011303893) 2026-02-05T01:28Z [----] followers, [--] engagements "CVE-2026-23093 DMA Unmapping Issue in Linux Kernel KSMBD SMBD Component https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23093 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23093" [X Link](https://x.com/VulmonFeeds/status/2019224110803333365) 2026-02-05T01:38Z [----] followers, [--] engagements "CVE-2026-23092 Out-of-Bounds Write in Linux Kernel IIO DAC AD3552R-HS Driver Vulnerability Alert Subscriptions: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23092 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23092" [X Link](https://x.com/VulmonFeeds/status/2019226670637436984) 2026-02-05T01:48Z [----] followers, [--] engagements "CVE-2026-1898 LDAP User Sync Remote Access Control Vulnerability in WeKan up to [----] https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1898 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1898" [X Link](https://x.com/VulmonFeeds/status/2019231793384202410) 2026-02-05T02:09Z [----] followers, [--] engagements "CVE-2026-1897 WeKan Authorization Bypass Vulnerability in Position-History Tracking Component https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1897 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1897" [X Link](https://x.com/VulmonFeeds/status/2019234353323053507) 2026-02-05T02:19Z [----] followers, [--] engagements "CVE-2026-1896 WeKan Board Migration Vulnerability Enables Unauthorized Remote Access Control Bypass https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1896 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1896" [X Link](https://x.com/VulmonFeeds/status/2019236913186497016) 2026-02-05T02:29Z [----] followers, [--] engagements "CVE-2026-25585 Out-of-Bounds Read Vulnerability in iccDEV Color Management Library Before 2.3.1.3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25585 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25585" [X Link](https://x.com/VulmonFeeds/status/2019242031827009662) 2026-02-05T02:49Z [----] followers, [--] engagements "CVE-2026-22038 Sensitive Information Disclosure in AutoGPT Platform Prior to v0. Vulnerability Alert Subscriptions: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-22038 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-22038" [X Link](https://x.com/VulmonFeeds/status/2019244592898486458) 2026-02-05T03:00Z [----] followers, [--] engagements "CVE-2026-1895 WeKan Remote Improper Access Control Vulnerability in Attachment Storage Handler https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1895 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1895" [X Link](https://x.com/VulmonFeeds/status/2019247152887701635) 2026-02-05T03:10Z [----] followers, [--] engagements "CVE-2025-62616 Server-Side Request Forgery (SSRF) in AutoGPT Platform Prior to v0.6.34 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-62616 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-62616" [X Link](https://x.com/VulmonFeeds/status/2019249712759558196) 2026-02-05T03:20Z [----] followers, [--] engagements "CVE-2026-1894 Improper Authorization Vulnerability in WeKan REST API Before Vers. Vulnerability Alert Subscriptions: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1894 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1894" [X Link](https://x.com/VulmonFeeds/status/2019254831454507510) 2026-02-05T03:40Z [----] followers, [--] engagements "CVE-2026-25578 Cross-Site Scripting in Navidrome Music Server Before 0.60.0 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25578 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25578" [X Link](https://x.com/VulmonFeeds/status/2019257391485788562) 2026-02-05T03:50Z [----] followers, [--] engagements "CVE-2026-25579 Navidrome Denial of Service via Oversized Image Resizing in Versions Before 0.60.0 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25579 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25579" [X Link](https://x.com/VulmonFeeds/status/2019259951407862041) 2026-02-05T04:01Z [----] followers, [---] engagements "CVE-2026-25583 Heap Buffer Overflow in iccDEV Library Prior to Version 2.3.1.3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25583 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25583" [X Link](https://x.com/VulmonFeeds/status/2019262511292273048) 2026-02-05T04:11Z [----] followers, [--] engagements "CVE-2026-25584 Stack Buffer Overflow in iccDEV Library Enables Potential Code Execution https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25584 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25584" [X Link](https://x.com/VulmonFeeds/status/2019265071017308665) 2026-02-05T04:21Z [----] followers, [--] engagements "CVE-2026-25582 Heap Buffer Overflow in iccDEV XML to ICC Profile Conversion Before 2.3.1.3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25582 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25582" [X Link](https://x.com/VulmonFeeds/status/2019267630964646340) 2026-02-05T04:31Z [----] followers, [---] engagements "CVE-2026-25539 Remote Code Execution in SiYuan Knowledge Management System Prior to 3.5.5 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25539 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25539" [X Link](https://x.com/VulmonFeeds/status/2019277867524251932) 2026-02-05T05:12Z [----] followers, [--] engagements "CVE-2026-25575 Path Traversal in NavigaTUM API Allows Unauthenticated File Overwrite https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25575 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25575" [X Link](https://x.com/VulmonFeeds/status/2019280427484123304) 2026-02-05T05:22Z [----] followers, [--] engagements "CVE-2026-25546 Remote Code Execution in Godot MCP Server Prior to Version 0.1.1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25546 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25546" [X Link](https://x.com/VulmonFeeds/status/2019282987230126577) 2026-02-05T05:32Z [----] followers, [--] engagements "CVE-2026-25541 Integer Overflow in Bytes Library BytesMut::reserve Leading to Potential Memory Corruption https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25541 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25541" [X Link](https://x.com/VulmonFeeds/status/2019285547177435372) 2026-02-05T05:42Z [----] followers, [--] engagements "CVE-2026-25526 Arbitrary Java Execution Vulnerability in JinJava Template Engine Before 2.7.6 and 2.8.3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25526 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25526" [X Link](https://x.com/VulmonFeeds/status/2019288107091157009) 2026-02-05T05:52Z [----] followers, [--] engagements "CVE-2025-10314 Local Privilege Escalation in Mitsubishi FREQSHIP-mini 8.0.0-8.0.2 via Service Permissions https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-10314 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-10314" [X Link](https://x.com/VulmonFeeds/status/2019295788199719170) 2026-02-05T06:23Z [----] followers, [--] engagements "CVE-2025-11730 Post-Authentication Command Injection in Zyxel ATP USG FLEX and USG20(W)-VPN Firmware https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-11730 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-11730" [X Link](https://x.com/VulmonFeeds/status/2019298347840913871) 2026-02-05T06:33Z [----] followers, [--] engagements "CVE-2025-15080 Unauthenticated Remote Data Manipulation in Mitsubishi MELSEC iQ-R Series CPUs https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15080 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15080" [X Link](https://x.com/VulmonFeeds/status/2019303470239469817) 2026-02-05T06:53Z [----] followers, [--] engagements "CVE-2025-14150 Information Disclosure Vulnerability in IBM webMethods Integration Server [-----] to [----] https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-14150 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-14150" [X Link](https://x.com/VulmonFeeds/status/2019426392035746253) 2026-02-05T15:02Z [----] followers, [--] engagements "CVE-2025-13491 IBM App Connect Enterprise Container Vulnerability https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-13491 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-13491" [X Link](https://x.com/VulmonFeeds/status/2019428951790092323) 2026-02-05T15:12Z [----] followers, [--] engagements "CVE-2025-13379 SQL Injection Vulnerability in IBM Aspera Console 3.4.0 Through 3.4.8 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-13379 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-13379" [X Link](https://x.com/VulmonFeeds/status/2019431511758442803) 2026-02-05T15:22Z [----] followers, [--] engagements "CVE-2026-1707 pgAdmin [----] Restore Restriction Bypass via Key Disclosure in Server Mode https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1707 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1707" [X Link](https://x.com/VulmonFeeds/status/2019485297034019171) 2026-02-05T18:56Z [----] followers, [--] engagements "CVE-2025-70073 Remote Code Execution in ChestnutCMS v1.5.8 via Template . Don't wait vulnerability scanning results: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-70073 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-70073" [X Link](https://x.com/VulmonFeeds/status/2019487856884842758) 2026-02-05T19:06Z [----] followers, [--] engagements "CVE-2025-68121 Session Resumption Bypass in Go crypto/tls Config.GetConf. Don't wait vulnerability scanning results: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-68121 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-68121" [X Link](https://x.com/VulmonFeeds/status/2019490416882573583) 2026-02-05T19:16Z [----] followers, [--] engagements "CVE-2025-58190 Denial of Service Vulnerability in Golang's html.Parse Function via Infinite Parsing Loop https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-58190 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-58190" [X Link](https://x.com/VulmonFeeds/status/2019492976947253330) 2026-02-05T19:27Z [----] followers, [--] engagements "CVE-2025-47911 Quadratic Complexity Denial of Service in P. Customizable Vulnerability Alerts: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-47911 http://golang.org/x/net/html https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-47911 http://golang.org/x/net/html" [X Link](https://x.com/VulmonFeeds/status/2019495536819048610) 2026-02-05T19:37Z [----] followers, [--] engagements "CVE-2025-15551 JavaScript Code Injection Vulnerability in Multiple TP-Link Router Models https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15551 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15551" [X Link](https://x.com/VulmonFeeds/status/2019500655749017750) 2026-02-05T19:57Z [----] followers, [--] engagements "CVE-2026-25630 Rejected reason https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25630 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25630" [X Link](https://x.com/VulmonFeeds/status/2019526275241590793) 2026-02-05T21:39Z [----] followers, [--] engagements "CVE-2025-15341 Tanium Benchmark Vulnerability Customizable Vulnerability Alerts: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15341 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15341" [X Link](https://x.com/VulmonFeeds/status/2019531394129530993) 2026-02-05T21:59Z [----] followers, [--] engagements "CVE-2026-1301 Heap Overflow in PubSub JSON Decoder Before Authentication https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1301 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1301" [X Link](https://x.com/VulmonFeeds/status/2019536512732344784) 2026-02-05T22:20Z [----] followers, [--] engagements "CVE-2025-15343 Tanium Enforce Vulnerability https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15343 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15343" [X Link](https://x.com/VulmonFeeds/status/2019539072532861167) 2026-02-05T22:30Z [----] followers, [--] engagements "CVE-2025-15337 Tanium Patch Incorrect Default Permissions Vulnerability https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15337 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15337" [X Link](https://x.com/VulmonFeeds/status/2019544191131431097) 2026-02-05T22:50Z [----] followers, [--] engagements "CVE-2025-15338 Tanium Partner Integration Vulnerability https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15338 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15338" [X Link](https://x.com/VulmonFeeds/status/2019551868926456036) 2026-02-05T23:21Z [----] followers, [--] engagements "CVE-2025-15326 Tanium Patch Improper Access Controls Vulnerability Disclosed https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15326 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15326" [X Link](https://x.com/VulmonFeeds/status/2019562105666478197) 2026-02-06T00:01Z [----] followers, [--] engagements "CVE-2025-15331 Uncontrolled Resource Consumption Vulnerability in Tanium Connect https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15331 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15331" [X Link](https://x.com/VulmonFeeds/status/2019564665521512611) 2026-02-06T00:11Z [----] followers, [--] engagements "CVE-2025-15330 Tanium Deploy Improper Input Validation Vulnerability Enables Unauthoriz. Vulnerability Notification: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15330 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15330" [X Link](https://x.com/VulmonFeeds/status/2019567225275822392) 2026-02-06T00:22Z [----] followers, [--] engagements "CVE-2025-15324 Tanium Engage Documentation Vulnerability Disclosed https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15324 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15324" [X Link](https://x.com/VulmonFeeds/status/2019580022000922866) 2026-02-06T01:12Z [----] followers, [--] engagements "CVE-2025-15321 Improper Input Validation Vulnerability in Tanium Appliance https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15321 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15321" [X Link](https://x.com/VulmonFeeds/status/2019582582002717114) 2026-02-06T01:23Z [----] followers, [--] engagements "CVE-2025-15311 Unauthorized Code Execution Vulnerability in Tanium Appliance https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15311 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15311" [X Link](https://x.com/VulmonFeeds/status/2019585141786485218) 2026-02-06T01:33Z [----] followers, [---] engagements "CVE-2025-15323 Tanium Appliance Improper Certificate Validation Vulnerability https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15323 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15323" [X Link](https://x.com/VulmonFeeds/status/2019587701771481206) 2026-02-06T01:43Z [----] followers, [--] engagements "CVE-2026-23623 Unauthorized File Download Bypass in Collabora Online via Keyboard Shortcut https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23623 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23623" [X Link](https://x.com/VulmonFeeds/status/2019600500891525136) 2026-02-06T02:34Z [----] followers, [--] engagements "CVE-2025-68458 Webpack Build-Time SSRF Vulnerability via URL Parsing in Resolver Plugin https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-68458 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-68458" [X Link](https://x.com/VulmonFeeds/status/2019613296232464542) 2026-02-06T03:25Z [----] followers, [--] engagements "CVE-2025-32393 Denial of Service Vulnerability in AutoGPT RSS Feed Parsing Mechanism https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-32393 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-32393" [X Link](https://x.com/VulmonFeeds/status/2019618415128780805) 2026-02-06T03:45Z [----] followers, [--] engagements "CVE-2026-25815 Fortinet FortiOS LDAP Credential Decryption Vulnerability Through 7.6.6 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25815 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25815" [X Link](https://x.com/VulmonFeeds/status/2019620975126495574) 2026-02-06T03:55Z [----] followers, [--] engagements "CVE-2026-1964 Improper Access Controls Vulnerability in WeKan REST Endpoint Before [----] Vulnerability Notification: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1964 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1964" [X Link](https://x.com/VulmonFeeds/status/2019626094031249668) 2026-02-06T04:15Z [----] followers, [--] engagements "CVE-2026-2009 CVE-2026-2009 Improper Access Control allows unauthorized creat. Customizable Vulnerability Alerts: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2009 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2009" [X Link](https://x.com/VulmonFeeds/status/2019628653957566878) 2026-02-06T04:26Z [----] followers, [--] engagements "CVE-2026-25643 CVE-2026-25643 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25643 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25643" [X Link](https://x.com/VulmonFeeds/status/2019631213997130099) 2026-02-06T04:36Z [----] followers, [--] engagements "CVE-2026-1963 Improper Access Controls in WeKan Attachment Storage Compo. Don't wait vulnerability scanning results: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1963 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1963" [X Link](https://x.com/VulmonFeeds/status/2019633773713739822) 2026-02-06T04:46Z [----] followers, [--] engagements "CVE-2026-1962 WeKan Attachment Migration Remote Improper Access Control Vulnerability https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1962 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1962" [X Link](https://x.com/VulmonFeeds/status/2019636333690392748) 2026-02-06T04:56Z [----] followers, [--] engagements "CVE-2026-0106 Local Privilege Escalation in VPU Kernel Module via Arbitrary Address Mmap https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-0106 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-0106" [X Link](https://x.com/VulmonFeeds/status/2019638893465706542) 2026-02-06T05:06Z [----] followers, [--] engagements "CVE-2026-1977 Code Injection Vulnerability in isaacwasserman mcp-vegalite-server Visualize Function https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1977 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1977" [X Link](https://x.com/VulmonFeeds/status/2019644015746969781) 2026-02-06T05:27Z [----] followers, [--] engagements "CVE-2026-25698 Rejected reason https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25698 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25698" [X Link](https://x.com/VulmonFeeds/status/2019646575996240274) 2026-02-06T05:37Z [----] followers, [--] engagements "CVE-2026-25695 Rejected reason https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25695 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25695" [X Link](https://x.com/VulmonFeeds/status/2019649135821885757) 2026-02-06T05:47Z [----] followers, [--] engagements "CVE-2026-25692 Rejected reason https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25692 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25692" [X Link](https://x.com/VulmonFeeds/status/2019651695634989521) 2026-02-06T05:57Z [----] followers, [--] engagements "CVE-2026-25696 Rejected reason Don't wait vulnerability scanning results: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25696 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25696" [X Link](https://x.com/VulmonFeeds/status/2019654255464899009) 2026-02-06T06:07Z [----] followers, [--] engagements "CVE-2026-25697 Rejected reason https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25697 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25697" [X Link](https://x.com/VulmonFeeds/status/2019656815072444528) 2026-02-06T06:18Z [----] followers, [--] engagements "CVE-2026-25694 Rejected reason https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25694 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25694" [X Link](https://x.com/VulmonFeeds/status/2019659374638031073) 2026-02-06T06:28Z [----] followers, [--] engagements "CVE-2026-25693 Rejected reason https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25693 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25693" [X Link](https://x.com/VulmonFeeds/status/2019661934300184678) 2026-02-06T06:38Z [----] followers, [--] engagements "CVE-2025-15566 Kubernetes Ingress-Nginx Arbitrary Code Execution via Header Injection Annotation https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15566 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15566" [X Link](https://x.com/VulmonFeeds/status/2019664494041960900) 2026-02-06T06:48Z [----] followers, [--] engagements "CVE-2026-1975 Null Pointer Dereference Vulnerability in Free5GC Up to 4.1.0 Vulnerability Notification: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1975 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1975" [X Link](https://x.com/VulmonFeeds/status/2019669612984475674) 2026-02-06T07:08Z [----] followers, [--] engagements "CVE-2026-1228 Insecure Direct Object Reference in WordPress Timeline Block Plugin = 1.3.3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1228 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1228" [X Link](https://x.com/VulmonFeeds/status/2019672172927521168) 2026-02-06T07:19Z [----] followers, [--] engagements "CVE-2026-1974 Denial of Service Vulnerability in Free5GC SMF Component Up to [---]. Vulnerability Alert Subscriptions: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1974 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1974" [X Link](https://x.com/VulmonFeeds/status/2019679850764656953) 2026-02-06T07:49Z [----] followers, [--] engagements "CVE-2026-2008 Remote Code Injection in Abhiphile Fermat-MCP via Equation Chart Manipulation https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2008 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2008" [X Link](https://x.com/VulmonFeeds/status/2019690090977505327) 2026-02-06T08:30Z [----] followers, [--] engagements "CVE-2026-1998 MicroPython Local Memory Corruption Vulnerability in Import Function Up to 1.27.0 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1998 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1998" [X Link](https://x.com/VulmonFeeds/status/2019692650790638031) 2026-02-06T08:40Z [----] followers, [--] engagements "CVE-2026-1888 Stored XSS in WordPress Docus YouTube Video Playlist Plugin via Shortcode Attributes https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1888 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1888" [X Link](https://x.com/VulmonFeeds/status/2019695210679206058) 2026-02-06T08:50Z [----] followers, [--] engagements "CVE-2026-1909 Stored XSS in WaveSurfer-WP WordPress Plugin via Audio Shortcode https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1909 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1909" [X Link](https://x.com/VulmonFeeds/status/2019697770664181963) 2026-02-06T09:00Z [----] followers, [--] engagements "CVE-2026-1401 Stored XSS in WordPress Tune Library Plugin via CSV Import (All Versions) https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1401 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1401" [X Link](https://x.com/VulmonFeeds/status/2019700330498326667) 2026-02-06T09:10Z [----] followers, [--] engagements "CVE-2026-0521 Reflected XSS in TYDAC AG MAP+ 3.4.0 PDF Export Functionality https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-0521 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-0521" [X Link](https://x.com/VulmonFeeds/status/2019702890156224641) 2026-02-06T09:21Z [----] followers, [--] engagements "CVE-2026-1808 Stored XSS in Orange Confort+ WordPress Plugin via Shortcode Parameter https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1808 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1808" [X Link](https://x.com/VulmonFeeds/status/2019705450023776321) 2026-02-06T09:31Z [----] followers, [--] engagements "CVE-2025-10753 OAuth SSO WordPress Plugin Unauthenticated Redirect URL Modification Vulnerability https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-10753 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-10753" [X Link](https://x.com/VulmonFeeds/status/2019708009631404095) 2026-02-06T09:41Z [----] followers, [--] engagements "CVE-2026-1991 Local Null Pointer Dereference Vulnerability in libuvc UVC Descriptor Handler https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1991 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1991" [X Link](https://x.com/VulmonFeeds/status/2019710569519931868) 2026-02-06T09:51Z [----] followers, [--] engagements "CVE-2026-0598 Unauthorized Access to User Conversations in Ansible Lightspeed API Endpoints https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-0598 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-0598" [X Link](https://x.com/VulmonFeeds/status/2019713129370865963) 2026-02-06T10:01Z [----] followers, [--] engagements "CVE-2026-1990 Null Pointer Dereference Vulnerability in oatpp Framework Up to 1.3.1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1990 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1990" [X Link](https://x.com/VulmonFeeds/status/2019715689272025441) 2026-02-06T10:11Z [----] followers, [--] engagements "CVE-2026-1979 Local Use-After-Free Vulnerability in mruby VM Execution Function Up to 3.4.0 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1979 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1979" [X Link](https://x.com/VulmonFeeds/status/2019718249210864002) 2026-02-06T10:22Z [----] followers, [--] engagements "CVE-2026-1978 Remote Request Manipulation Vulnerability in NanoCMS [---] User Information Handler https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1978 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1978" [X Link](https://x.com/VulmonFeeds/status/2019720809091105045) 2026-02-06T10:32Z [----] followers, [--] engagements "CVE-2026-2014 SQL Injection Vulnerability in itsourcecode Student Management System [---] https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2014 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2014" [X Link](https://x.com/VulmonFeeds/status/2019725931036704918) 2026-02-06T10:52Z [----] followers, [--] engagements "CVE-2026-2013 SQL Injection in itsourcecode Student Management System [---] via Argument . Vulnerability Notification: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2013 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2013" [X Link](https://x.com/VulmonFeeds/status/2019728490879168892) 2026-02-06T11:02Z [----] followers, [--] engagements "CVE-2026-2012 SQL Injection in itsourcecode Student Management System [---] via Argument Manipulation https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2012 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2012" [X Link](https://x.com/VulmonFeeds/status/2019743845693432184) 2026-02-06T12:03Z [----] followers, [--] engagements "CVE-2026-2011 SQL Injection in itsourcecode Student Management System [---] Remote Exploit https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2011 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2011" [X Link](https://x.com/VulmonFeeds/status/2019746405749793180) 2026-02-06T12:14Z [----] followers, [--] engagements "CVE-2026-24923 Permission Control Vulnerability in HDC Module Compromising Service Confidentiality https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24923 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24923" [X Link](https://x.com/VulmonFeeds/status/2019761760127893573) 2026-02-06T13:15Z [----] followers, [--] engagements "CVE-2026-24921 HDC Module Address Read Vulnerability Compromising Availability and Confidentiality https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24921 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24921" [X Link](https://x.com/VulmonFeeds/status/2019766879263342770) 2026-02-06T13:35Z [----] followers, [--] engagements "CVE-2026-24915 Out-of-Bounds Read Vulnerability in Media Subsystem Impacts System Availability https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24915 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24915" [X Link](https://x.com/VulmonFeeds/status/2019774558018912421) 2026-02-06T14:05Z [----] followers, [--] engagements "CVE-2026-21643 SQL Injection in Fortinet FortiClientEMS 7.4.4 Enables Unauthenticated Remote Code Execution https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-21643 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-21643" [X Link](https://x.com/VulmonFeeds/status/2019777118033383781) 2026-02-06T14:16Z [----] followers, [--] engagements "CVE-2026-1785 Cross-Site Request Forgery in WordPress Code Snippets Plugin Versions 3.9.4 and Below https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1785 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1785" [X Link](https://x.com/VulmonFeeds/status/2019779677749932124) 2026-02-06T14:26Z [----] followers, [--] engagements "CVE-2026-24916 Identity Authentication Bypass in Window Module Affecting Service Confidentiality https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24916 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24916" [X Link](https://x.com/VulmonFeeds/status/2019787355255669101) 2026-02-06T14:56Z [----] followers, [--] engagements "CVE-2026-1499 WordPress WP Duplicate Plugin Authenticated Arbitrary File Upload Leading to RCE https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1499 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1499" [X Link](https://x.com/VulmonFeeds/status/2019789915261681732) 2026-02-06T15:06Z [----] followers, [--] engagements "CVE-2026-1252 Stored XSS in WordPress Events Listing Widget Plugin via E. Don't wait vulnerability scanning results: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1252 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1252" [X Link](https://x.com/VulmonFeeds/status/2019792475255136594) 2026-02-06T15:17Z [----] followers, [--] engagements "CVE-2026-2010 Improper Authorization Vulnerability in PublicCMS Trade Payment Handler https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2010 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2010" [X Link](https://x.com/VulmonFeeds/status/2019795035353502044) 2026-02-06T15:27Z [----] followers, [--] engagements "CVE-2026-1279 Stored XSS in WordPress Employee Directory Plugin via Shortcode Parameter https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1279 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1279" [X Link](https://x.com/VulmonFeeds/status/2019800154295972157) 2026-02-06T15:47Z [----] followers, [--] engagements "CVE-2026-2058 CLOUD-CLASSROOMS-php-1.0 PoC - Sql Injection Erro Based Presentation: Security vulnerability https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2058 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2058" [X Link](https://x.com/VulmonFeeds/status/2019805277034295552) 2026-02-06T16:07Z [----] followers, [--] engagements "CVE-2026-2016 Stack-Based Buffer Overflow in libfastcommon Base64 Decoding Function https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2016 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2016" [X Link](https://x.com/VulmonFeeds/status/2019810395737694722) 2026-02-06T16:28Z [----] followers, [--] engagements "CVE-2026-1293 Stored XSS Vulnerability in Yoast SEO WordPress Plugin via Schema Block Attribute https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1293 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1293" [X Link](https://x.com/VulmonFeeds/status/2019812956041547828) 2026-02-06T16:38Z [----] followers, [--] engagements "CVE-2026-2015 Improper Authorization Vulnerability in InAbilis i--i-Final Educar upcar via School ID Manipulation Human explanation https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2015 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2015" [X Link](https://x.com/VulmonFeeds/status/2019815516056015310) 2026-02-06T16:48Z [----] followers, [--] engagements "CVE-2025-66598 A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product supports old SSL/TLS versions potentially allowing an attacker to decrypt communications with. https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-66598 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-66598" [X Link](https://x.com/VulmonFeeds/status/2020827749393260890) 2026-02-09T11:50Z [----] followers, [--] engagements "CVE-2025-66594 A vulnerability has been found in FAST/TOOLS provided by Yokogawa. Vulnerability Alert Subscriptions: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-66594 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-66594" [X Link](https://x.com/VulmonFeeds/status/2020835427410702443) 2026-02-09T12:21Z [----] followers, [--] engagements "CVE-2025-66607 A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The response header contains an insecure setting. Users could be redirected to malicious sites by an attack. https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-66607 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-66607" [X Link](https://x.com/VulmonFeeds/status/2020843105365135634) 2026-02-09T12:51Z [----] followers, [--] engagements "CVE-2025-66606 A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product does not properly encode URLs. An attacker could tamper with web pages or execute malicious sc. https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-66606 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-66606" [X Link](https://x.com/VulmonFeeds/status/2020850783785304334) 2026-02-09T13:22Z [----] followers, [--] engagements "CVE-2025-66599 A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. Physical paths could be displayed on web pages. This information could be exploited by an attacker for othe. https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-66599 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-66599" [X Link](https://x.com/VulmonFeeds/status/2020853343891927347) 2026-02-09T13:32Z [----] followers, [--] engagements "CVE-2025-66603 A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electr. Vulnerability Notification: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-66603 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-66603" [X Link](https://x.com/VulmonFeeds/status/2020855904111820939) 2026-02-09T13:42Z [----] followers, [--] engagements "CVE-2025-10464 Sensitive Data Retrieval Vulnerability in Birtech Senseway Platform https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-10464 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-10464" [X Link](https://x.com/VulmonFeeds/status/2020876380410348001) 2026-02-09T15:04Z [----] followers, [--] engagements Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing
@VulmonFeeds Vulmon Vulnerability FeedVulmon Vulnerability Feed posts on X about alerts, plugin, up to, vulnerability the most. They currently have [-----] followers and [---] posts still getting attention that total [-----] engagements in the last [--] hours.
Social category influence technology brands 9.18% stocks 7.65% finance 1.28% automotive brands 0.51% social networks 0.26% products 0.26%
Social topic influence alerts #651, plugin #126, up to 3.06%, vulnerability 2.3%, data 2.04%, bypass #362, command 1.79%, apple 1.79%, ibm 1.53%, sap #595
Top accounts mentioned or mentioned by @transilienceai @farmfecore @rageagainstthepixelunitycli
Top assets mentioned IBM (IBM) Alphabet Inc Class A (GOOGL) Flex Ltd. Ordinary Shares (FLEX) Dell Technologies, Inc. (DELL) GE Vernova Inc. (GEV)
Top posts by engagements in the last [--] hours
"CVE-2025-56647 WebSocket Origin Validation Bypass in npm @farmfe/core Before 1.7.6 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-56647 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-56647"
X Link 2026-02-12T17:49Z [----] followers, [--] engagements
"CVE-2018-18920 Py-EVM v0.2.0-alpha.33 allows attackers to make a vm.execute_bytecode call that triggers computation._stack.values with '"stack": [---] [---] 0' where b'x' was expected resulting in an execution fa. http://vulmon.com/vulnerabilitydetailsqid=CVE-2018-18920 http://vulmon.com/vulnerabilitydetailsqid=CVE-2018-18920"
X Link 2018-11-12T07:37Z [----] followers, [--] engagements
"CVE-2020-13645 In GNOME glib-networking through 2.64.2 the implementation of GTlsClientConnection skips hostname verification of the server's TLS certificate if the application fails to specify the expected s. http://vulmon.com/vulnerabilitydetailsqid=CVE-2020-13645 http://vulmon.com/vulnerabilitydetailsqid=CVE-2020-13645"
X Link 2020-06-29T03:48Z [----] followers, [--] engagements
"CVE-2024-22113 Open redirect vulnerability in Access analysis CGI An-Analyzer released in [----] December [--] and earlier allows a remote unauthenticated attacker to redirect users to arbitrary websites and conduct p. http://vulmon.com/vulnerabilitydetailsqid=CVE-2024-22113 http://vulmon.com/vulnerabilitydetailsqid=CVE-2024-22113"
X Link 2024-01-22T06:23Z [----] followers, [--] engagements
"CVE-2023-47352 Technicolor TC8715D devices have predictable default WPA2 security passwords. An attacker who scans for SSID and BSSID values may be able to predict these passwords. http://vulmon.com/vulnerabilitydetailsqid=CVE-2023-47352 http://vulmon.com/vulnerabilitydetailsqid=CVE-2023-47352"
X Link 2024-01-22T06:24Z [----] followers, [--] engagements
"CVE-2024-25089 Malwarebytes Binisoft Windows Firewall Control before 6.9.9.2 allows remote attackers to execute arbitrary code via gRPC named pipes. http://vulmon.com/vulnerabilitydetailsqid=CVE-2024-25089 http://vulmon.com/vulnerabilitydetailsqid=CVE-2024-25089"
X Link 2024-02-04T23:35Z [----] followers, [---] engagements
"CVE-2025-34201 Network Segmentation Vulnerability in Vasion Print Virtual Appliance Docker Containers https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-34201 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-34201"
X Link 2025-09-20T02:51Z [----] followers, [--] engagements
"CVE-2025-46152 Bitwise Right Shift Vulnerability in PyTorch Versions Prior to 2.7.0 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-46152 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-46152"
X Link 2025-09-25T21:05Z [----] followers, [---] engagements
"CVE-2025-52987 Clickjacking Vulnerability in Juniper Networks Paragon Au. Don't wait vulnerability scanning results: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-52987 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-52987"
X Link 2026-01-16T03:01Z [----] followers, [---] engagements
"CVE-2026-21721 Organization-Internal Dashboard Permissions Bypass in Splunk Ente. Customizable Vulnerability Alerts: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-21721 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-21721"
X Link 2026-01-27T15:29Z [----] followers, [--] engagements
"CVE-2026-1633 Unauthenticated Web Interface Vulnerability in Synectix LAN [---] TR. Vulnerability Alert Subscriptions: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1633 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1633"
X Link 2026-02-04T00:32Z [----] followers, [--] engagements
"CVE-2026-1813 Remote File Upload Vulnerability in Bolo-Solo Blog Platform Up to 2.6.4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1813 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1813"
X Link 2026-02-04T00:43Z [----] followers, [--] engagements
"CVE-2026-1632 Unauthenticated Web Management Interface Vulnerability in MOMA Seismic Station v2.4.2520 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1632 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1632"
X Link 2026-02-04T00:53Z [----] followers, [--] engagements
"CVE-2026-1755 Stored XSS in Menu Icons by ThemeIsle WordPress Plugin via Image Alt Text https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1755 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1755"
X Link 2026-02-04T01:13Z [----] followers, [--] engagements
"CVE-2025-33081 Local Information Disclosure Vulnerability in IBM Concert 1.0.0 Through 2.1.0 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-33081 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-33081"
X Link 2026-02-04T01:23Z [----] followers, [--] engagements
"CVE-2025-36033 Cross-Site Scripting in IBM Engineering Lifecycle Management Glob. Vulnerability Alert Subscriptions: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-36033 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-36033"
X Link 2026-02-04T01:33Z [----] followers, [--] engagements
"CVE-2025-36094 IBM Cloud Pak for Business Automation Denial of Service via Input Validation Vulnerability https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-36094 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-36094"
X Link 2026-02-04T01:44Z [----] followers, [--] engagements
"CVE-2026-25510 Remote Code Execution in CI4MS CMS Before Version 0.28.5.0 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25510 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25510"
X Link 2026-02-04T01:54Z [----] followers, [--] engagements
"CVE-2026-25509 Email Enumeration Vulnerability in CI4MS Authentication Prior to 0.28.5.0 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25509 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25509"
X Link 2026-02-04T02:04Z [----] followers, [--] engagements
"CVE-2026-25224 Fastify Web Streams Denial-of-Service Vulnerability Prior to Vers. Customizable Vulnerability Alerts: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25224 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25224"
X Link 2026-02-04T02:14Z [----] followers, [--] engagements
"CVE-2026-25223 Fastify Content-Type Validation Bypass Vulnerability Befo. Don't wait vulnerability scanning results: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25223 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25223"
X Link 2026-02-04T02:24Z [----] followers, [--] engagements
"CVE-2026-25148 Cross-Site Scripting in Qwik.js Server-Side Rendering Prior to Version 1.19.0 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25148 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25148"
X Link 2026-02-04T02:34Z [----] followers, [--] engagements
"CVE-2026-25150 Prototype Pollution Vulnerability in Qwik Framework Prior to Version 1.19.0 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25150 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25150"
X Link 2026-02-04T02:55Z [----] followers, [--] engagements
"CVE-2026-25155 Content-Type Header Parsing Vulnerability in Qwik Framework Before 1.12.0 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25155 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25155"
X Link 2026-02-04T03:05Z [----] followers, [--] engagements
"CVE-2026-25149 Open Redirect Vulnerability in Qwik City Middleware Before Version 1.19.0 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25149 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25149"
X Link 2026-02-04T03:15Z [----] followers, [--] engagements
"CVE-2026-1341 Unauthenticated Configuration Access in Avation Light Engine Pro https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1341 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1341"
X Link 2026-02-04T03:25Z [----] followers, [--] engagements
"CVE-2026-1811 Path Traversal in B3log Bolo-Solo up to 2.6.4 via Filename Handler https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1811 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1811"
X Link 2026-02-04T03:35Z [----] followers, [--] engagements
"CVE-2025-69621 Arbitrary File Overwrite in Comic Book Reader v1.0.95 Enables System Compromise https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-69621 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-69621"
X Link 2026-02-04T03:56Z [----] followers, [--] engagements
"CVE-2025-69620 Path Traversal in Moo Chan Song v4.5.7 Enables Denial of Service Attack https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-69620 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-69620"
X Link 2026-02-04T04:06Z [----] followers, [--] engagements
"CVE-2026-1791 Unrestricted File Upload Vulnerability in Hillstone Networks Security Gateway V5.5 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1791 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1791"
X Link 2026-02-04T04:37Z [----] followers, [--] engagements
"CVE-2026-23704 Cross-Site Scripting in Movable Type [--] and [---] Series Allowing Arbitrary Script Execution https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23704 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23704"
X Link 2026-02-04T07:30Z [----] followers, [--] engagements
"CVE-2026-21393 Stored Cross-Site Scripting Vulnerability in Movable Type Edit Comment Feature https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-21393 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-21393"
X Link 2026-02-04T07:40Z [----] followers, [--] engagements
"CVE-2026-24447 Code Execution Vulnerability in Movable Type via Malicious CSV File https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24447 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24447"
X Link 2026-02-04T07:50Z [----] followers, [--] engagements
"CVE-2026-22875 Stored Cross-Site Scripting Vulnerability in Movable Type Export Sites https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-22875 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-22875"
X Link 2026-02-04T08:00Z [----] followers, [--] engagements
"CVE-2026-20982 Path Traversal in ShortcutService Enables Privileged Local File Creation https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20982 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20982"
X Link 2026-02-04T08:41Z [----] followers, [--] engagements
"CVE-2026-20981 Physical Attacker Command Execution in FacAtFunction via Input Va. Customizable Vulnerability Alerts: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20981 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20981"
X Link 2026-02-04T08:51Z [----] followers, [--] engagements
"CVE-2026-20985 Samsung Members URL Injection Vulnerability Enables Arbitrary Activity Launch https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20985 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20985"
X Link 2026-02-04T09:01Z [----] followers, [--] engagements
"CVE-2026-20979 Local Privilege Escalation in Settings Prior to SMR Feb-2026 Release [--] https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20979 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20979"
X Link 2026-02-04T09:42Z [----] followers, [--] engagements
"CVE-2026-20978 Local Authorization Bypass in KnoxGuardManager Prior to SMR Feb-2026 Release [--] https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20978 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20978"
X Link 2026-02-04T09:52Z [----] followers, [--] engagements
"CVE-2026-0816 SQL Injection in All Push Notification for WP Plugin WordPress Versions 1.5.3 and Below https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-0816 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-0816"
X Link 2026-02-04T10:23Z [----] followers, [--] engagements
"CVE-2026-0743 Stored XSS in WP Content Permission Plugin for WordPress Administrators https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-0743 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-0743"
X Link 2026-02-04T10:33Z [----] followers, [--] engagements
"CVE-2026-0742 Stored XSS Vulnerability in Smart Appointment & Booking WordPress Plugin https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-0742 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-0742"
X Link 2026-02-04T10:43Z [----] followers, [--] engagements
"CVE-2026-1370 SQL Injection in SIBS WooCommerce Payment Gateway Plugin = 2.2.0 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1370 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1370"
X Link 2026-02-04T10:53Z [----] followers, [--] engagements
"CVE-2026-0679 Authorization Bypass in Fortis for WooCommerce Plugin Enables Order Status Manipulation https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-0679 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-0679"
X Link 2026-02-04T11:03Z [----] followers, [--] engagements
"CVE-2026-0681 Stored Cross-Site Scripting in WordPress Extended Random Number Generator Plugin https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-0681 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-0681"
X Link 2026-02-04T11:13Z [----] followers, [--] engagements
"CVE-2025-15507 Unauthenticated License Status Modification in Magic Import Document Extractor WordPress Plugin https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15507 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15507"
X Link 2026-02-04T11:34Z [----] followers, [--] engagements
"CVE-2025-15482 Unauthenticated Sensitive Information Disclosure in Chapa Payment Gateway Plugin https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15482 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15482"
X Link 2026-02-04T11:44Z [----] followers, [--] engagements
"CVE-2025-15487 Path Traversal in WordPress Code Explorer Plugin Versions 1.4.6 and Below https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15487 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15487"
X Link 2026-02-04T11:54Z [----] followers, [--] engagements
"CVE-2025-15268 Unauthenticated SQL Injection in Infility Global WordPress Plugin 2.14.46 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15268 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15268"
X Link 2026-02-04T12:14Z [----] followers, [--] engagements
"CVE-2025-15260 Privilege Escalation in MyRewards WordPress Plugin via Unauthorized Rule Modification https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15260 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15260"
X Link 2026-02-04T12:25Z [----] followers, [--] engagements
"CVE-2025-15285 SEO Flow WordPress Plugin Unauthorized Data Modification via Authentication Bypass https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15285 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15285"
X Link 2026-02-04T12:35Z [----] followers, [--] engagements
"CVE-2025-59818 Authenticated Command Injection Vulnerability in File Upload Mech. Customizable Vulnerability Alerts: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-59818 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-59818"
X Link 2026-02-04T13:36Z [----] followers, [--] engagements
"CVE-2026-1622 Information Disclosure Vulnerability in Neo4j Enterprise and Community Editions https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1622 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1622"
X Link 2026-02-04T13:46Z [----] followers, [--] engagements
"CVE-2025-41085 Stored XSS Vulnerability in Apidog 2.7.15 via Unsanitized SVG Image Upload https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-41085 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-41085"
X Link 2026-02-04T13:56Z [----] followers, [--] engagements
"CVE-2025-15368 Local File Inclusion in WordPress SportsPress Plugin via Shortcode Template Attribute https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15368 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15368"
X Link 2026-02-04T14:27Z [----] followers, [--] engagements
"CVE-2026-22548 F5 BIG-IP Advanced WAF Process Termination Vulnerability https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-22548 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-22548"
X Link 2026-02-04T15:48Z [----] followers, [--] engagements
"CVE-2026-20732 F5 BIG-IP Configuration Utility Error Message Spoofing Vu. Don't wait vulnerability scanning results: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20732 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20732"
X Link 2026-02-04T15:58Z [----] followers, [--] engagements
"CVE-2026-20730 BIG-IP Edge Client Windows VPN Client Information Disclosure Vulnerability https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20730 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-20730"
X Link 2026-02-04T16:08Z [----] followers, [--] engagements
"CVE-2026-23047 Linux Kernel Libceph Vulnerability Don't wait vulnerability scanning results: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23047 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23047"
X Link 2026-02-04T17:20Z [----] followers, [--] engagements
"CVE-2026-23043 NULL Pointer Dereference in Linux Kernel Btrfs Log Replay. Don't wait vulnerability scanning results: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23043 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23043"
X Link 2026-02-04T18:21Z [----] followers, [--] engagements
"CVE-2025-70545 Stored Cross-Site Scripting in Belden ONT 2K05X Router Web Management Interface https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-70545 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-70545"
X Link 2026-02-04T18:41Z [----] followers, [--] engagements
"CVE-2026-25532 Integer Underflow in Espressif IoT Development Framework WPS Enrollee Implementation https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25532 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25532"
X Link 2026-02-04T19:22Z [----] followers, [--] engagements
"CVE-2026-25508 Out-of-Bounds Read in Espressif IoT Development Framework BLE Provisioni. Vulnerability Notification: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25508 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25508"
X Link 2026-02-04T19:32Z [----] followers, [--] engagements
"CVE-2026-25507 Use-After-Free Vulnerability in Espressif IOT Development Framework BLE Provisioning https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25507 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25507"
X Link 2026-02-04T19:42Z [----] followers, [--] engagements
"CVE-2026-25139 Out-of-Bounds Read Vulnerability in RIOT OS [-------] 6LoWPAN Stack https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25139 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25139"
X Link 2026-02-04T19:52Z [----] followers, [--] engagements
"CVE-2026-22247 Server-Side Request Forgery (SSRF) Vulnerability in GLPI Webhook Feature 11.0.0-11.0.4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-22247 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-22247"
X Link 2026-02-04T20:13Z [----] followers, [--] engagements
"CVE-2026-22044 SQL Injection Vulnerability in GLPI Asset Management Software [----] to 10.0.23 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-22044 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-22044"
X Link 2026-02-04T20:23Z [----] followers, [--] engagements
"CVE-2026-21893 Command Injection Vulnerability in n8n Workflow Automatio. Don't wait vulnerability scanning results: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-21893 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-21893"
X Link 2026-02-04T20:33Z [----] followers, [--] engagements
"CVE-2025-69213 SQL Injection in OpenSTAManager 2.9.8 via Authenticated Endpoint Vulnerability https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-69213 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-69213"
X Link 2026-02-04T20:53Z [----] followers, [--] engagements
"CVE-2025-64712 Path Traversal in Unstructured Library Prior to 0.18.18 Enabling Arbitrary File Write https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-64712 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-64712"
X Link 2026-02-04T21:03Z [----] followers, [--] engagements
"CVE-2026-25115 Python Sandbox Escape Vulnerability in n8n Workflow Autom. Don't wait vulnerability scanning results: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25115 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25115"
X Link 2026-02-04T21:24Z [----] followers, [--] engagements
"CVE-2026-25056 Authenticated File Write Vulnerability in n8n Workflow Automation Platform https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25056 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25056"
X Link 2026-02-04T21:34Z [----] followers, [--] engagements
"CVE-2026-25055 n8n Workflow Automation Platform Remote Code Execution via Unvalidated File Transfers https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25055 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25055"
X Link 2026-02-04T21:44Z [----] followers, [--] engagements
"CVE-2026-25054 Stored Cross-Site Scripting in n8n Workflow Automation Pl. Don't wait vulnerability scanning results: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25054 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25054"
X Link 2026-02-04T21:54Z [----] followers, [--] engagements
"CVE-2026-25053 Authenticated Command Execution and File Read Vulnerability in n8n Workflow Platform https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25053 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25053"
X Link 2026-02-04T22:05Z [----] followers, [--] engagements
"CVE-2026-25052 Authenticated File Read Vulnerability in n8n Workflow Automation Platform https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25052 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25052"
X Link 2026-02-04T22:15Z [----] followers, [--] engagements
"CVE-2026-25051 Cross-Site Scripting in n8n Workflow Automation Platform Before 1.123.2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25051 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25051"
X Link 2026-02-04T22:25Z [----] followers, [--] engagements
"CVE-2026-25049 Workflow Automation Command Injection in n8n Prior to Versions 1.123.17 and 2.5.2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25049 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25049"
X Link 2026-02-04T22:35Z [----] followers, [--] engagements
"CVE-2026-23110 Linux Kernel SCSI Error Handler Race Condition Prevents I/O Completion Wake-Up https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23110 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23110"
X Link 2026-02-04T22:45Z [----] followers, [--] engagements
"CVE-2026-23109 Use-After-Free in Linux Kernel fs/writeback Affects FUSE Filesystem Inte. Vulnerability Notification: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23109 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23109"
X Link 2026-02-04T22:55Z [----] followers, [--] engagements
"CVE-2026-23108 USB Memory Leak in Linux Kernel can usb_8dev Driver https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23108 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23108"
X Link 2026-02-04T23:06Z [----] followers, [--] engagements
"CVE-2026-23107 Linux Kernel Null Pointer Dereference in ARM64 ZA Context Restora. Vulnerability Alert Subscriptions: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23107 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23107"
X Link 2026-02-04T23:16Z [----] followers, [--] engagements
"CVE-2026-23106 Linux Kernel Timekeeping Auxiliary Timekeeper Leap State Adjustme. Customizable Vulnerability Alerts: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23106 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23106"
X Link 2026-02-04T23:26Z [----] followers, [--] engagements
"CVE-2026-23105 Use After Free in Linux Kernel qfq Qdisc Class Activity Determination https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23105 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23105"
X Link 2026-02-04T23:36Z [----] followers, [--] engagements
"CVE-2026-23104 Linux Kernel Ice Driver HWMON Sysfs Attribute Call Trace Vulnerability https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23104 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23104"
X Link 2026-02-04T23:46Z [----] followers, [--] engagements
"CVE-2026-23103 Race Condition in Linux Kernel ipvlan Address Management Lock Implementation https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23103 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23103"
X Link 2026-02-04T23:56Z [----] followers, [--] engagements
"CVE-2026-23102 Linux Kernel SVE Context Restoration Vulnerability Causing Out-of-Bounds Memory Reads https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23102 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23102"
X Link 2026-02-05T00:07Z [----] followers, [--] engagements
"CVE-2026-23101 Race Condition in Linux Kernel LED Class Initialization Causing Uninitialized Work Queue https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23101 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23101"
X Link 2026-02-05T00:17Z [----] followers, [--] engagements
"CVE-2026-23100 Shared PMD Table Detection Failure in Linux Kernel Hugetlb Subsystem https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23100 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23100"
X Link 2026-02-05T00:27Z [----] followers, [--] engagements
"CVE-2026-23099 Linux Kernel Bonding Driver Out-of-Bounds Read in LACP Mode Configuration https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23099 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23099"
X Link 2026-02-05T00:37Z [----] followers, [--] engagements
"CVE-2026-23098 Linux Kernel Double-Free Vulnerability in netrom Network Routing Mechanism https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23098 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23098"
X Link 2026-02-05T00:47Z [----] followers, [--] engagements
"CVE-2026-23097 Linux Kernel Deadlock in Hugetlb File Folio Migration Lock Ordering https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23097 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23097"
X Link 2026-02-05T00:57Z [----] followers, [--] engagements
"CVE-2026-23096 Linux Kernel Use-After-Free Vulnerability in uacce Character Device Handling https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23096 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23096"
X Link 2026-02-05T01:08Z [----] followers, [--] engagements
"CVE-2026-23095 Memory Leak in Linux Kernel GUE Protocol Handler with Inner IP Protocol [--] https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23095 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23095"
X Link 2026-02-05T01:18Z [----] followers, [--] engagements
"CVE-2026-23094 Sysfs Isolation Check Condition Vulnerability in Linux Kernel uacce https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23094 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23094"
X Link 2026-02-05T01:28Z [----] followers, [--] engagements
"CVE-2026-23093 DMA Unmapping Issue in Linux Kernel KSMBD SMBD Component https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23093 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23093"
X Link 2026-02-05T01:38Z [----] followers, [--] engagements
"CVE-2026-23092 Out-of-Bounds Write in Linux Kernel IIO DAC AD3552R-HS Driver Vulnerability Alert Subscriptions: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23092 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23092"
X Link 2026-02-05T01:48Z [----] followers, [--] engagements
"CVE-2026-1898 LDAP User Sync Remote Access Control Vulnerability in WeKan up to [----] https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1898 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1898"
X Link 2026-02-05T02:09Z [----] followers, [--] engagements
"CVE-2026-1897 WeKan Authorization Bypass Vulnerability in Position-History Tracking Component https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1897 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1897"
X Link 2026-02-05T02:19Z [----] followers, [--] engagements
"CVE-2026-1896 WeKan Board Migration Vulnerability Enables Unauthorized Remote Access Control Bypass https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1896 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1896"
X Link 2026-02-05T02:29Z [----] followers, [--] engagements
"CVE-2026-25585 Out-of-Bounds Read Vulnerability in iccDEV Color Management Library Before 2.3.1.3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25585 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25585"
X Link 2026-02-05T02:49Z [----] followers, [--] engagements
"CVE-2026-22038 Sensitive Information Disclosure in AutoGPT Platform Prior to v0. Vulnerability Alert Subscriptions: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-22038 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-22038"
X Link 2026-02-05T03:00Z [----] followers, [--] engagements
"CVE-2026-1895 WeKan Remote Improper Access Control Vulnerability in Attachment Storage Handler https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1895 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1895"
X Link 2026-02-05T03:10Z [----] followers, [--] engagements
"CVE-2025-62616 Server-Side Request Forgery (SSRF) in AutoGPT Platform Prior to v0.6.34 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-62616 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-62616"
X Link 2026-02-05T03:20Z [----] followers, [--] engagements
"CVE-2026-1894 Improper Authorization Vulnerability in WeKan REST API Before Vers. Vulnerability Alert Subscriptions: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1894 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1894"
X Link 2026-02-05T03:40Z [----] followers, [--] engagements
"CVE-2026-25578 Cross-Site Scripting in Navidrome Music Server Before 0.60.0 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25578 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25578"
X Link 2026-02-05T03:50Z [----] followers, [--] engagements
"CVE-2026-25579 Navidrome Denial of Service via Oversized Image Resizing in Versions Before 0.60.0 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25579 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25579"
X Link 2026-02-05T04:01Z [----] followers, [---] engagements
"CVE-2026-25583 Heap Buffer Overflow in iccDEV Library Prior to Version 2.3.1.3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25583 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25583"
X Link 2026-02-05T04:11Z [----] followers, [--] engagements
"CVE-2026-25584 Stack Buffer Overflow in iccDEV Library Enables Potential Code Execution https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25584 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25584"
X Link 2026-02-05T04:21Z [----] followers, [--] engagements
"CVE-2026-25582 Heap Buffer Overflow in iccDEV XML to ICC Profile Conversion Before 2.3.1.3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25582 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25582"
X Link 2026-02-05T04:31Z [----] followers, [---] engagements
"CVE-2026-25539 Remote Code Execution in SiYuan Knowledge Management System Prior to 3.5.5 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25539 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25539"
X Link 2026-02-05T05:12Z [----] followers, [--] engagements
"CVE-2026-25575 Path Traversal in NavigaTUM API Allows Unauthenticated File Overwrite https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25575 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25575"
X Link 2026-02-05T05:22Z [----] followers, [--] engagements
"CVE-2026-25546 Remote Code Execution in Godot MCP Server Prior to Version 0.1.1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25546 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25546"
X Link 2026-02-05T05:32Z [----] followers, [--] engagements
"CVE-2026-25541 Integer Overflow in Bytes Library BytesMut::reserve Leading to Potential Memory Corruption https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25541 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25541"
X Link 2026-02-05T05:42Z [----] followers, [--] engagements
"CVE-2026-25526 Arbitrary Java Execution Vulnerability in JinJava Template Engine Before 2.7.6 and 2.8.3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25526 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25526"
X Link 2026-02-05T05:52Z [----] followers, [--] engagements
"CVE-2025-10314 Local Privilege Escalation in Mitsubishi FREQSHIP-mini 8.0.0-8.0.2 via Service Permissions https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-10314 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-10314"
X Link 2026-02-05T06:23Z [----] followers, [--] engagements
"CVE-2025-11730 Post-Authentication Command Injection in Zyxel ATP USG FLEX and USG20(W)-VPN Firmware https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-11730 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-11730"
X Link 2026-02-05T06:33Z [----] followers, [--] engagements
"CVE-2025-15080 Unauthenticated Remote Data Manipulation in Mitsubishi MELSEC iQ-R Series CPUs https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15080 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15080"
X Link 2026-02-05T06:53Z [----] followers, [--] engagements
"CVE-2025-14150 Information Disclosure Vulnerability in IBM webMethods Integration Server [-----] to [----] https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-14150 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-14150"
X Link 2026-02-05T15:02Z [----] followers, [--] engagements
"CVE-2025-13491 IBM App Connect Enterprise Container Vulnerability https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-13491 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-13491"
X Link 2026-02-05T15:12Z [----] followers, [--] engagements
"CVE-2025-13379 SQL Injection Vulnerability in IBM Aspera Console 3.4.0 Through 3.4.8 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-13379 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-13379"
X Link 2026-02-05T15:22Z [----] followers, [--] engagements
"CVE-2026-1707 pgAdmin [----] Restore Restriction Bypass via Key Disclosure in Server Mode https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1707 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1707"
X Link 2026-02-05T18:56Z [----] followers, [--] engagements
"CVE-2025-70073 Remote Code Execution in ChestnutCMS v1.5.8 via Template . Don't wait vulnerability scanning results: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-70073 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-70073"
X Link 2026-02-05T19:06Z [----] followers, [--] engagements
"CVE-2025-68121 Session Resumption Bypass in Go crypto/tls Config.GetConf. Don't wait vulnerability scanning results: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-68121 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-68121"
X Link 2026-02-05T19:16Z [----] followers, [--] engagements
"CVE-2025-58190 Denial of Service Vulnerability in Golang's html.Parse Function via Infinite Parsing Loop https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-58190 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-58190"
X Link 2026-02-05T19:27Z [----] followers, [--] engagements
"CVE-2025-47911 Quadratic Complexity Denial of Service in P. Customizable Vulnerability Alerts: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-47911 http://golang.org/x/net/html https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-47911 http://golang.org/x/net/html"
X Link 2026-02-05T19:37Z [----] followers, [--] engagements
"CVE-2025-15551 JavaScript Code Injection Vulnerability in Multiple TP-Link Router Models https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15551 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15551"
X Link 2026-02-05T19:57Z [----] followers, [--] engagements
"CVE-2026-25630 Rejected reason https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25630 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25630"
X Link 2026-02-05T21:39Z [----] followers, [--] engagements
"CVE-2025-15341 Tanium Benchmark Vulnerability Customizable Vulnerability Alerts: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15341 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15341"
X Link 2026-02-05T21:59Z [----] followers, [--] engagements
"CVE-2026-1301 Heap Overflow in PubSub JSON Decoder Before Authentication https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1301 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1301"
X Link 2026-02-05T22:20Z [----] followers, [--] engagements
"CVE-2025-15343 Tanium Enforce Vulnerability https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15343 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15343"
X Link 2026-02-05T22:30Z [----] followers, [--] engagements
"CVE-2025-15337 Tanium Patch Incorrect Default Permissions Vulnerability https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15337 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15337"
X Link 2026-02-05T22:50Z [----] followers, [--] engagements
"CVE-2025-15338 Tanium Partner Integration Vulnerability https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15338 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15338"
X Link 2026-02-05T23:21Z [----] followers, [--] engagements
"CVE-2025-15326 Tanium Patch Improper Access Controls Vulnerability Disclosed https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15326 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15326"
X Link 2026-02-06T00:01Z [----] followers, [--] engagements
"CVE-2025-15331 Uncontrolled Resource Consumption Vulnerability in Tanium Connect https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15331 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15331"
X Link 2026-02-06T00:11Z [----] followers, [--] engagements
"CVE-2025-15330 Tanium Deploy Improper Input Validation Vulnerability Enables Unauthoriz. Vulnerability Notification: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15330 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15330"
X Link 2026-02-06T00:22Z [----] followers, [--] engagements
"CVE-2025-15324 Tanium Engage Documentation Vulnerability Disclosed https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15324 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15324"
X Link 2026-02-06T01:12Z [----] followers, [--] engagements
"CVE-2025-15321 Improper Input Validation Vulnerability in Tanium Appliance https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15321 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15321"
X Link 2026-02-06T01:23Z [----] followers, [--] engagements
"CVE-2025-15311 Unauthorized Code Execution Vulnerability in Tanium Appliance https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15311 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15311"
X Link 2026-02-06T01:33Z [----] followers, [---] engagements
"CVE-2025-15323 Tanium Appliance Improper Certificate Validation Vulnerability https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15323 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15323"
X Link 2026-02-06T01:43Z [----] followers, [--] engagements
"CVE-2026-23623 Unauthorized File Download Bypass in Collabora Online via Keyboard Shortcut https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23623 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-23623"
X Link 2026-02-06T02:34Z [----] followers, [--] engagements
"CVE-2025-68458 Webpack Build-Time SSRF Vulnerability via URL Parsing in Resolver Plugin https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-68458 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-68458"
X Link 2026-02-06T03:25Z [----] followers, [--] engagements
"CVE-2025-32393 Denial of Service Vulnerability in AutoGPT RSS Feed Parsing Mechanism https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-32393 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-32393"
X Link 2026-02-06T03:45Z [----] followers, [--] engagements
"CVE-2026-25815 Fortinet FortiOS LDAP Credential Decryption Vulnerability Through 7.6.6 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25815 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25815"
X Link 2026-02-06T03:55Z [----] followers, [--] engagements
"CVE-2026-1964 Improper Access Controls Vulnerability in WeKan REST Endpoint Before [----] Vulnerability Notification: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1964 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1964"
X Link 2026-02-06T04:15Z [----] followers, [--] engagements
"CVE-2026-2009 CVE-2026-2009 Improper Access Control allows unauthorized creat. Customizable Vulnerability Alerts: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2009 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=4 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2009"
X Link 2026-02-06T04:26Z [----] followers, [--] engagements
"CVE-2026-25643 CVE-2026-25643 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25643 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25643"
X Link 2026-02-06T04:36Z [----] followers, [--] engagements
"CVE-2026-1963 Improper Access Controls in WeKan Attachment Storage Compo. Don't wait vulnerability scanning results: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1963 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1963"
X Link 2026-02-06T04:46Z [----] followers, [--] engagements
"CVE-2026-1962 WeKan Attachment Migration Remote Improper Access Control Vulnerability https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1962 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1962"
X Link 2026-02-06T04:56Z [----] followers, [--] engagements
"CVE-2026-0106 Local Privilege Escalation in VPU Kernel Module via Arbitrary Address Mmap https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-0106 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-0106"
X Link 2026-02-06T05:06Z [----] followers, [--] engagements
"CVE-2026-1977 Code Injection Vulnerability in isaacwasserman mcp-vegalite-server Visualize Function https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1977 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1977"
X Link 2026-02-06T05:27Z [----] followers, [--] engagements
"CVE-2026-25698 Rejected reason https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25698 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25698"
X Link 2026-02-06T05:37Z [----] followers, [--] engagements
"CVE-2026-25695 Rejected reason https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25695 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25695"
X Link 2026-02-06T05:47Z [----] followers, [--] engagements
"CVE-2026-25692 Rejected reason https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25692 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25692"
X Link 2026-02-06T05:57Z [----] followers, [--] engagements
"CVE-2026-25696 Rejected reason Don't wait vulnerability scanning results: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25696 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25696"
X Link 2026-02-06T06:07Z [----] followers, [--] engagements
"CVE-2026-25697 Rejected reason https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25697 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25697"
X Link 2026-02-06T06:18Z [----] followers, [--] engagements
"CVE-2026-25694 Rejected reason https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25694 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25694"
X Link 2026-02-06T06:28Z [----] followers, [--] engagements
"CVE-2026-25693 Rejected reason https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25693 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-25693"
X Link 2026-02-06T06:38Z [----] followers, [--] engagements
"CVE-2025-15566 Kubernetes Ingress-Nginx Arbitrary Code Execution via Header Injection Annotation https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15566 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-15566"
X Link 2026-02-06T06:48Z [----] followers, [--] engagements
"CVE-2026-1975 Null Pointer Dereference Vulnerability in Free5GC Up to 4.1.0 Vulnerability Notification: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1975 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1975"
X Link 2026-02-06T07:08Z [----] followers, [--] engagements
"CVE-2026-1228 Insecure Direct Object Reference in WordPress Timeline Block Plugin = 1.3.3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1228 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1228"
X Link 2026-02-06T07:19Z [----] followers, [--] engagements
"CVE-2026-1974 Denial of Service Vulnerability in Free5GC SMF Component Up to [---]. Vulnerability Alert Subscriptions: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1974 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1974"
X Link 2026-02-06T07:49Z [----] followers, [--] engagements
"CVE-2026-2008 Remote Code Injection in Abhiphile Fermat-MCP via Equation Chart Manipulation https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2008 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2008"
X Link 2026-02-06T08:30Z [----] followers, [--] engagements
"CVE-2026-1998 MicroPython Local Memory Corruption Vulnerability in Import Function Up to 1.27.0 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1998 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1998"
X Link 2026-02-06T08:40Z [----] followers, [--] engagements
"CVE-2026-1888 Stored XSS in WordPress Docus YouTube Video Playlist Plugin via Shortcode Attributes https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1888 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1888"
X Link 2026-02-06T08:50Z [----] followers, [--] engagements
"CVE-2026-1909 Stored XSS in WaveSurfer-WP WordPress Plugin via Audio Shortcode https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1909 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1909"
X Link 2026-02-06T09:00Z [----] followers, [--] engagements
"CVE-2026-1401 Stored XSS in WordPress Tune Library Plugin via CSV Import (All Versions) https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1401 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1401"
X Link 2026-02-06T09:10Z [----] followers, [--] engagements
"CVE-2026-0521 Reflected XSS in TYDAC AG MAP+ 3.4.0 PDF Export Functionality https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-0521 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-0521"
X Link 2026-02-06T09:21Z [----] followers, [--] engagements
"CVE-2026-1808 Stored XSS in Orange Confort+ WordPress Plugin via Shortcode Parameter https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1808 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1808"
X Link 2026-02-06T09:31Z [----] followers, [--] engagements
"CVE-2025-10753 OAuth SSO WordPress Plugin Unauthenticated Redirect URL Modification Vulnerability https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-10753 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-10753"
X Link 2026-02-06T09:41Z [----] followers, [--] engagements
"CVE-2026-1991 Local Null Pointer Dereference Vulnerability in libuvc UVC Descriptor Handler https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1991 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1991"
X Link 2026-02-06T09:51Z [----] followers, [--] engagements
"CVE-2026-0598 Unauthorized Access to User Conversations in Ansible Lightspeed API Endpoints https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-0598 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-0598"
X Link 2026-02-06T10:01Z [----] followers, [--] engagements
"CVE-2026-1990 Null Pointer Dereference Vulnerability in oatpp Framework Up to 1.3.1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1990 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1990"
X Link 2026-02-06T10:11Z [----] followers, [--] engagements
"CVE-2026-1979 Local Use-After-Free Vulnerability in mruby VM Execution Function Up to 3.4.0 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1979 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1979"
X Link 2026-02-06T10:22Z [----] followers, [--] engagements
"CVE-2026-1978 Remote Request Manipulation Vulnerability in NanoCMS [---] User Information Handler https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1978 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1978"
X Link 2026-02-06T10:32Z [----] followers, [--] engagements
"CVE-2026-2014 SQL Injection Vulnerability in itsourcecode Student Management System [---] https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2014 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2014"
X Link 2026-02-06T10:52Z [----] followers, [--] engagements
"CVE-2026-2013 SQL Injection in itsourcecode Student Management System [---] via Argument . Vulnerability Notification: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2013 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2013"
X Link 2026-02-06T11:02Z [----] followers, [--] engagements
"CVE-2026-2012 SQL Injection in itsourcecode Student Management System [---] via Argument Manipulation https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2012 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2012"
X Link 2026-02-06T12:03Z [----] followers, [--] engagements
"CVE-2026-2011 SQL Injection in itsourcecode Student Management System [---] Remote Exploit https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2011 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2011"
X Link 2026-02-06T12:14Z [----] followers, [--] engagements
"CVE-2026-24923 Permission Control Vulnerability in HDC Module Compromising Service Confidentiality https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24923 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24923"
X Link 2026-02-06T13:15Z [----] followers, [--] engagements
"CVE-2026-24921 HDC Module Address Read Vulnerability Compromising Availability and Confidentiality https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24921 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24921"
X Link 2026-02-06T13:35Z [----] followers, [--] engagements
"CVE-2026-24915 Out-of-Bounds Read Vulnerability in Media Subsystem Impacts System Availability https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24915 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24915"
X Link 2026-02-06T14:05Z [----] followers, [--] engagements
"CVE-2026-21643 SQL Injection in Fortinet FortiClientEMS 7.4.4 Enables Unauthenticated Remote Code Execution https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-21643 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-21643"
X Link 2026-02-06T14:16Z [----] followers, [--] engagements
"CVE-2026-1785 Cross-Site Request Forgery in WordPress Code Snippets Plugin Versions 3.9.4 and Below https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1785 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1785"
X Link 2026-02-06T14:26Z [----] followers, [--] engagements
"CVE-2026-24916 Identity Authentication Bypass in Window Module Affecting Service Confidentiality https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24916 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-24916"
X Link 2026-02-06T14:56Z [----] followers, [--] engagements
"CVE-2026-1499 WordPress WP Duplicate Plugin Authenticated Arbitrary File Upload Leading to RCE https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1499 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1499"
X Link 2026-02-06T15:06Z [----] followers, [--] engagements
"CVE-2026-1252 Stored XSS in WordPress Events Listing Widget Plugin via E. Don't wait vulnerability scanning results: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1252 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=2 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1252"
X Link 2026-02-06T15:17Z [----] followers, [--] engagements
"CVE-2026-2010 Improper Authorization Vulnerability in PublicCMS Trade Payment Handler https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2010 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2010"
X Link 2026-02-06T15:27Z [----] followers, [--] engagements
"CVE-2026-1279 Stored XSS in WordPress Employee Directory Plugin via Shortcode Parameter https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1279 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1279"
X Link 2026-02-06T15:47Z [----] followers, [--] engagements
"CVE-2026-2058 CLOUD-CLASSROOMS-php-1.0 PoC - Sql Injection Erro Based Presentation: Security vulnerability https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2058 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2058"
X Link 2026-02-06T16:07Z [----] followers, [--] engagements
"CVE-2026-2016 Stack-Based Buffer Overflow in libfastcommon Base64 Decoding Function https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2016 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2016"
X Link 2026-02-06T16:28Z [----] followers, [--] engagements
"CVE-2026-1293 Stored XSS Vulnerability in Yoast SEO WordPress Plugin via Schema Block Attribute https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1293 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-1293"
X Link 2026-02-06T16:38Z [----] followers, [--] engagements
"CVE-2026-2015 Improper Authorization Vulnerability in InAbilis i--i-Final Educar upcar via School ID Manipulation Human explanation https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2015 https://vulmon.com/vulnerabilitydetailsqid=CVE-2026-2015"
X Link 2026-02-06T16:48Z [----] followers, [--] engagements
"CVE-2025-66598 A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product supports old SSL/TLS versions potentially allowing an attacker to decrypt communications with. https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-66598 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-66598"
X Link 2026-02-09T11:50Z [----] followers, [--] engagements
"CVE-2025-66594 A vulnerability has been found in FAST/TOOLS provided by Yokogawa. Vulnerability Alert Subscriptions: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-66594 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=1 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-66594"
X Link 2026-02-09T12:21Z [----] followers, [--] engagements
"CVE-2025-66607 A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The response header contains an insecure setting. Users could be redirected to malicious sites by an attack. https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-66607 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-66607"
X Link 2026-02-09T12:51Z [----] followers, [--] engagements
"CVE-2025-66606 A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product does not properly encode URLs. An attacker could tamper with web pages or execute malicious sc. https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-66606 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-66606"
X Link 2026-02-09T13:22Z [----] followers, [--] engagements
"CVE-2025-66599 A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. Physical paths could be displayed on web pages. This information could be exploited by an attacker for othe. https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-66599 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-66599"
X Link 2026-02-09T13:32Z [----] followers, [--] engagements
"CVE-2025-66603 A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electr. Vulnerability Notification: https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-66603 https://alerts.vulmon.com/utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-66603"
X Link 2026-02-09T13:42Z [----] followers, [--] engagements
"CVE-2025-10464 Sensitive Data Retrieval Vulnerability in Birtech Senseway Platform https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-10464 https://vulmon.com/vulnerabilitydetailsqid=CVE-2025-10464"
X Link 2026-02-09T15:04Z [----] followers, [--] engagements
Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing
/creator/twitter::VulmonFeeds