Skip to main content

Latest Cybersecurity News

🧠 Daily Cyber Threat Intelligence Report (IOC Export Available)

🧠 Daily Cyber Threat Intelligence Briefing This report applies impact (CVSS), likelihood (EPSS), trend analysis, and acceleration metrics to identify vulnerabilities with imminent exploitation risk. 🚨 Actively Exploited Vulnerabilities (CISA KEV) [CRITICAL] CVE-2025-11953 – React Native Community CLI OS Command Injection Vulnerability This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: ; https://github.com/react-native-community/cli/commit/15089907d1f1301b22c72d7f68846a2ef20df547;https://github.com/react-native-community/cli/pull/2735 ; https://nvd.nist.gov/vuln/detail/CVE-2025-11953 [CRITICAL] CVE-2026-24423 – SmarterTools SmarterMail Missing Authentication for Critical Function Vulnerability https://www.smartertools.com/smartermail/release-notes/current ; https://www.cve.org/CVERecord?id=CVE-2026-24423 ; https://nvd.nist.gov/vuln/de...

🚨 URGENT: Known Exploited Vulnerabilities (CISA KEV)

🚨 URGENT: Known Exploited Vulnerabilities (CISA KEV)

This report lists vulnerabilities confirmed to be actively exploited in the wild, as tracked by CISA. Immediate remediation is strongly recommended.

CVE-2025-11953 – React Native Community CLI OS Command Injection Vulnerability

Vendor: React Native Community

Product: CLI

Date Added to KEV: 2026-02-05

Patch Due By: 2026-02-26

This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: ; https://github.com/react-native-community/cli/commit/15089907d1f1301b22c72d7f68846a2ef20df547;https://github.com/react-native-community/cli/pull/2735 ; https://nvd.nist.gov/vuln/detail/CVE-2025-11953


CVE-2026-24423 – SmarterTools SmarterMail Missing Authentication for Critical Function Vulnerability

Vendor: SmarterTools

Product: SmarterMail

Date Added to KEV: 2026-02-05

Patch Due By: 2026-02-26

https://www.smartertools.com/smartermail/release-notes/current ; https://www.cve.org/CVERecord?id=CVE-2026-24423 ; https://nvd.nist.gov/vuln/detail/CVE-2026-24423


CVE-2021-39935 – GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability

Vendor: GitLab

Product: Community and Enterprise Editions

Date Added to KEV: 2026-02-03

Patch Due By: 2026-02-24

https://about.gitlab.com/releases/2021/12/06/security-release-gitlab-14-5-2-released/ ; https://nvd.nist.gov/vuln/detail/CVE-2021-39935


CVE-2025-64328 – Sangoma FreePBX OS Command Injection Vulnerability

Vendor: Sangoma

Product: FreePBX

Date Added to KEV: 2026-02-03

Patch Due By: 2026-02-24

https://github.com/FreePBX/security-reporting/security/advisories/GHSA-vm9p-46mv-5xvw ; https://nvd.nist.gov/vuln/detail/CVE-2025-64328


CVE-2019-19006 – Sangoma FreePBX Improper Authentication Vulnerability

Vendor: Sangoma

Product: FreePBX

Date Added to KEV: 2026-02-03

Patch Due By: 2026-02-24

https://wiki.freepbx.org/display/FOP/2019-11-20%2BRemote%2BAdmin%2BAuthentication%2BBypass ; https://nvd.nist.gov/vuln/detail/CVE-2019-19006


CVE-2025-40551 – SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability

Vendor: SolarWinds

Product: Web Help Desk

Date Added to KEV: 2026-02-03

Patch Due By: 2026-02-06

https://www.solarwinds.com/trust-center/security-advisories/cve-2025-40551 ; https://nvd.nist.gov/vuln/detail/CVE-2025-40551


CVE-2026-1281 – Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability

Vendor: Ivanti

Product: Endpoint Manager Mobile (EPMM)

Date Added to KEV: 2026-01-29

Patch Due By: 2026-02-01

Please adhere to Ivanti's guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible Ivanti products affected by this vulnerability. Apply any final mitigations provided by the vendor as soon as possible. For more information please: see: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340 ; https://support.mobileiron.com/mi/vsp/AB1771634/ivanti-security-update-1761642-1.0.0S-5.noarch.rpm ; https://support.mobileiron.com/mi/vsp/AB1771634/ivanti-security-update-1761642-1.0.0L-5.noarch.rpm ; https://nvd.nist.gov/vuln/detail/CVE-2026-1281


CVE-2026-24858 – Fortinet Multiple Products Authentication Bypass Using an Alternate Path or Channel Vulnerability

Vendor: Fortinet

Product: Multiple Products

Date Added to KEV: 2026-01-27

Patch Due By: 2026-01-30

Please adhere to Fortinet's guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible Fortinet products affected by this vulnerability. Apply any final mitigations provided by the vendor as soon as they become available. For more information please see: https://fortiguard.fortinet.com/psirt/FG-IR-26-060 ; https://www.fortinet.com/blog/psirt-blogs/analysis-of-sso-abuse-on-fortios ; https://nvd.nist.gov/vuln/detail/CVE-2026-24858


CVE-2018-14634 – Linux Kernel Integer Overflow Vulnerability

Vendor: Linux

Product: Kernal

Date Added to KEV: 2026-01-26

Patch Due By: 2026-02-16

This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/about/ ; https://www.kernel.org/ ; https://www.cve.org/CVERecord?id=CVE-2018-14634; https://access.redhat.com/errata/RHSA-2018:3540 ; https://nvd.nist.gov/vuln/detail/CVE-2018-14634


CVE-2025-52691 – SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability

Vendor: SmarterTools

Product: SmarterMail

Date Added to KEV: 2026-01-26

Patch Due By: 2026-02-16

https://www.smartertools.com/smartermail/release-notes/current ; https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-124/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-52691


Why This Matters

KEV-listed vulnerabilities are frequently leveraged by ransomware groups, APT actors, and botnets. Delayed remediation significantly increases breach risk.

Author: CyberDudeBivash Threat Intelligence Team

Source: https://cyberbivash.blogspot.com

Comments

Popular posts from this blog

CYBERDUDEBIVASH-BRAND-LOGO

CyberDudeBivash Official Brand Logo This page hosts the official CyberDudeBivash brand logo for use in our cybersecurity blogs, newsletters, and apps. The logo represents the CyberDudeBivash mission - building a global Cybersecurity, AI, and Threat Intelligence Network . The CyberDudeBivash logo may be embedded in posts, banners, and newsletters to establish authority and reinforce trust in our content. Unauthorized use is prohibited. © CyberDudeBivash | Cybersecurity, AI & Threat Intelligence Network cyberdudebivash.com     cyberbivash.blogspot.com      cryptobivash.code.blog     cyberdudebivash-news.blogspot.com   © 2024–2025 CyberDudeBivash Pvt Ltd. All Rights Reserved. Unauthorized reproduction, redistribution, or copying of any content is strictly prohibited. CyberDudeBivash Official Brand & Ecosystem Page Cyb...

400,000 Sites at Risk: You MUST Update NOW to Block Unauthenticated Account Takeover (CVE-2025-11833)

Author: CyberDudeBivash Powered by: CyberDudeBivash Brand | cyberdudebivash.com Related: cyberbivash.blogspot.com 400,000 Sites at Risk: You MUST Update NOW to Block Unauthenticated Account Takeover (CVE-2025-11833) — by CyberDudeBivash By CyberDudeBivash · 01 Nov 2025 · cyberdudebivash.com · Intel on cyberbivash.blogspot.com LinkedIn: ThreatWire cryptobivash.code.blog WORDPRESS PLUGIN VULNERABILITY • CVE-2025-11833 • UNAUTHENTICATED RCE Situation: A CVSS 9.8 Critical vulnerability, CVE-2025-11833 , has been disclosed in a popular WordPress "User Profile & Login" plugin with 400,000+ active installs . This flaw allows any unauthenticated attacker to instantly create a new administrator account, leading to full site takeover , PII theft , and ransomware deployment. This is a decision-grade brief for every CISO, IT Director, and business owner. Your corporate website, e-com...

VM Escape Exploit Chain (Core Virtualization) Explained By CyberDudeBivash

        VM Escape Exploit Chain (Core Virtualization) Explained By CyberDudeBivash     By CyberDudeBivash • October 01, 2025, 11:47 AM IST • Exploit Development & Technical Analysis   In the world of exploit development, some targets are considered the holy grail. A **VM Escape** is one of them. The entire architecture of the modern cloud and enterprise data centers is built on the promise that a virtual machine is a secure, isolated prison. A VM escape is the ultimate prison break. It's the art of breaking through the digital walls of a guest operating system to execute code on the underlying host hypervisor, shattering the core security boundary of virtualization. This is not a simple attack; it's a multi-stage exploit chain that requires deep knowledge of hardware, software, and memory manipulation. This is our masterclass explanation of how it's done.   Disclosure: This is an advanced technical analysis for educational purpose...