Skip to content
  • 0 Votes
    1 Posts
    0 Views
    projectdiscovery@infosec.exchangeP
    An AI just found a CVE in a library with 1.1 billion downloads.No human guidance. No custom rules. Neo reviewed Faraday's code, traced the URL logic, and found an SSRF that Snyk and Semgrep both missed.This is the class of bug that used to require your best engineer and a lot of time.Read the full breakdown: https://projectdiscovery.io/blog/how-neo-found-an-ssrf-vulnerability-in-faraday-and-why-it-matters-for-every-team-that-ships-code#cve
  • 🚨 New security advisory:

    Uncategorized cve vulnerabilityma cybersec
    1
    0 Votes
    1 Posts
    0 Views
    matchbook3469@infosec.exchangeM
    New security advisory:CVE-2026-26711 affects Carmelo Simple Food Order System.• Impact: Remote code execution or complete system compromise possible• Risk: Attackers can gain full control of affected systems• Mitigation: Patch immediately or isolate affected systemsFull breakdown:https://yazoul.net/advisory/cve/cve-2026-26711#CVE #VulnerabilityManagement #CyberSec
  • 🟠 New security advisory:

    Uncategorized cve securitypatchin hackernews
    1
    0 Votes
    1 Posts
    4 Views
    matchbook3469@infosec.exchangeM
    🟠 New security advisory:CVE-2026-2471 affects multiple systems.• Impact: Significant security breach potential• Risk: Unauthorized access or data exposure• Mitigation: Apply patches within 24-48 hoursFull breakdown:https://yazoul.net/advisory/cve/cve-2026-2471#CVE #SecurityPatching #HackerNews
  • ⛔ New security advisory:

    Uncategorized cve patchnow infoseccommunit
    1
    0 Votes
    1 Posts
    4 Views
    matchbook3469@infosec.exchangeM
    New security advisory:CVE-2026-24731 affects multiple systems.• Impact: Remote code execution or complete system compromise possible• Risk: Attackers can gain full control of affected systems• Mitigation: Patch immediately or isolate affected systemsFull breakdown:https://yazoul.net/advisory/cve/cve-2026-24731#CVE #PatchNow #InfoSecCommunity
  • 🚨 EUVD-2026-8858

    Uncategorized cybersecurity infosec euvd cve vulnerability
    1
    0 Votes
    1 Posts
    1 Views
    euvd_bot@mastodon.socialE
    EUVD-2026-8858 Score: 2.3/10 (CVSS v3.1) Product: VLC for Android Vendor: VideoLAN Updated: 2026-02-26 VideoLAN VLC for Android prior to version 3.7.0 contains a path traversal vulnerability in the Remote Access Server routing for the authenticated endpoint GET /download. The file query parameter is concatenated into a filesystem path under the configu... https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-8858#cybersecurity #infosec #euvd #cve #vulnerability
  • 0 Votes
    1 Posts
    0 Views
    secdb@infosec.exchangeS
    [CISA-2026:0225] CISA Adds 2 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0225)CISA has added 2 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.️ CVE-2022-20775 (https://secdb.nttzen.cloud/cve/detail/CVE-2022-20775)- Name: Cisco SD-WAN Path Traversal Vulnerability- Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt & Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.- Known To Be Used in Ransomware Campaigns? Unknown- Vendor: Cisco- Product: SD-WAN- Notes: CISA Mitigation Instructions: https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems ; https://www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems ; https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-sd-wan-priv-E6e8tEdF.html ; https://nvd.nist.gov/vuln/detail/CVE-2022-20775️ CVE-2026-20127 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-20127)- Name: Cisco Catalyst SD-WAN Controller and Manager Authentication Bypass Vulnerability- Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt & Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.- Known To Be Used in Ransomware Campaigns? Unknown- Vendor: Cisco- Product: Catalyst SD-WAN Controller and Manager- Notes: CISA Mitigation Instructions: https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems ; https://www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems ; https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk ; https://nvd.nist.gov/vuln/detail/CVE-2026-20127#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260225 #cisa20260225 #cve_2022_20775 #cve_2026_20127 #cve202220775 #cve202620127
  • 🚨 New security advisory:

    Uncategorized cve vulnerabilityma cybersec
    1
    0 Votes
    1 Posts
    2 Views
    matchbook3469@infosec.exchangeM
    New security advisory:CVE-2026-25785 affects multiple systems.• Impact: Remote code execution or complete system compromise possible• Risk: Attackers can gain full control of affected systems• Mitigation: Patch immediately or isolate affected systemsFull breakdown:https://yazoul.net/advisory/cve/cve-2026-25785#CVE #VulnerabilityManagement #CyberSec
  • 0 Votes
    4 Posts
    0 Views
    cravaterouge@infosec.exchangeC
    @itm4n Hope you will!