#vulnerability

Carolina Code Conferencecarolinacodes
2026-02-04

Software Composition Analysis: Protecting Against Log4Shell : Discover how software composition analysis can help prevent Log4Shell-like attacks. Learn how it could've helped your organization avoid the scramble. youtube.com/shorts/3g9H_Gitv-8

Looks like CISA added SolarWinds to the KEV catalogue yesterday:

Critical: CVE-2025-40551: SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability #infosec #CISA #SolarWinds #vulnerability

Updated Broadcom advisory, login needed for details.

Critical: Broadcom OPS/MVS 14.0 - OPSMVS REST API Vulnerability (updates AssertJ from 3.27.6 to 3.27.7) support.broadcom.com/web/ecx/s #infosec #vulnerability #Broadcom

Infosecurity-Magazine: Hundreds of Malicious Crypto Trading Add-Ons Found in Moltbot/OpenClaw infosecurity-magazine.com/news #infosec #Moltbook #Moltbot #privacy #vulnerability

New.

Check Point: Amaranth-Dragon: Weaponizing CVE-2025-8088 for Targeted Espionage in the Southeast Asia research.checkpoint.com/2026/a

More:

The Hacker News: China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns thehackernews.com/2026/02/chin #Windows #infosec #vulnerability

2026-02-04

Take that China, my notepad++ is so out of date I did not download the malicious packages.

(ignores all other vulnerabilities)

#notepadplusplus #vulnerability

2026-02-04

Danger Bulletin: Cyberattacks Against Ukraine and EU Countries Using CVE-2026-21509 Exploit

UAC-0001 (APT28) has launched cyberattacks against Ukraine and EU countries exploiting the CVE-2026-21509 vulnerability in Microsoft Office products. The threat actor created malicious DOC files targeting government bodies and EU organizations. The attack chain involves WebDAV connections, COM hijacking, and the use of the COVENANT framework, which utilizes Filen cloud storage for command and control. The campaign began shortly after the vulnerability's disclosure, with multiple documents discovered containing similar exploits. The attackers employ sophisticated techniques to evade detection and maintain persistence, including disguising malicious files as legitimate Windows components and creating scheduled tasks.

Pulse ID: 6983549d1f4ab8a67c29cd5b
Pulse Link: otx.alienvault.com/pulse/69835
Pulse Author: AlienVault
Created: 2026-02-04 14:15:57

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#APT28 #Cloud #CyberAttack #CyberAttacks #CyberSecurity #EU #Government #InfoSec #Microsoft #MicrosoftOffice #OTX #Office #OpenThreatExchange #RAT #UK #Ukr #Ukraine #Vulnerability #Windows #bot #AlienVault

TheHackerWirethehackerwire
2026-02-04

πŸ”΄ CVE-2025-5329 - Critical (9.8)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Martcode Software Inc. Delta Course Automation allows SQL Injection.This issue affects Delta Course Automation: through 04022026.

NOTE: The vend...

πŸ”— thehackerwire.com/vulnerabilit

CVE Alert: CVE-2025-5329
TheHackerWirethehackerwire
2026-02-04

🟠 CVE-2025-15368 - High (8.8)

The SportsPress plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.7.26 via shortcodes 'template_name' attribute. This makes it possible for authenticated attackers, with contributor-level and above ...

πŸ”— thehackerwire.com/vulnerabilit

CVE Alert: CVE-2025-15368
BeyondMachines :verified:beyondmachines1@infosec.exchange
2026-02-04

Critical Authentication Bypass in Avation Light Engine Pro Allows Full Device Takeover

Avation Light Engine Pro contains a critical vulnerability (CVE-2026-1341) that allows unauthenticated remote attackers to take full control of the device due to a complete lack of authentication.

**Isolate your Avation Light Engine Pro from the internet and make them accessible only from trusted networks. There is no patch, and the vendor is unresponsive. Use a VPN and firewalls to ensure only authorized internal staff can reach the control interface, and start planning for a replacement.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

2026-02-04

Exports matter to us. A lot. You’ve been warned πŸ˜‰
Vulnerability-Lookup now supports KEV catalog export to NDJSON.

#OpenData #KEV #CVE #GCVE #Vulnerability #OpenSource #CyberSecurity

Screenshot of a KEV Catalog in Vulnerability-Lookup with the new export as NDJSON feature.
BeyondMachines :verified:beyondmachines1@infosec.exchange
2026-02-04

Docker Patches Critical 'DockerDash' Flaw in Ask Gordon AI Assistant

Docker patched a critical vulnerability called DockerDash in its Ask Gordon AI assistant that allowed attackers to execute remote code or steal sensitive environment data via malicious Docker image metadata.

**Treat all AI-processed metadata as untrusted code and ensure you update Docker Desktop and Docker CLI to version 4.50.0 to enable mandatory user confirmation for AI actions. This update prevents automated attacks that turn simple AI queries into dangerous system commands.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

TheHackerWirethehackerwire
2026-02-04

πŸ”΄ CVE-2025-59818 - Critical (10)

This vulnerability allows authenticated attackers to execute arbitrary commands on the underlying system using the file name of an uploaded file.

πŸ”— thehackerwire.com/vulnerabilit

CVE Alert: CVE-2025-59818
BeyondMachines :verified:beyondmachines1@infosec.exchange
2026-02-04

SQL Injection Vulnerability Reported in Quiz and Survey Master WordPress Plugin

A SQL injection vulnerability (CVE-2025-67987) in the Quiz and Survey Master WordPress plugin affects over 40,000 sites, allowing authenticated users with Subscriber-level access to extract sensitive database information.

**If you are using the Quiz and Survey Master plugin, plan a quick update to version 10.3.2. Even low-level user accounts can exploit this flaw, so do not assume your site is safe just because you trust your registered users.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

2026-02-04

Released a PowerShell IoC triage script for detecting the Notepad++ supply chain attack, including the previously known Rapid7 IoCs and now the newly released IoCs for chains 1 (ProShow) & 2 (Lua/Adobe) published by Securelist (securelist.com/notepad-supply-):

github.com/moltenbit/NotepadPl

#cybersecurity #vulnerability #incidentresponse #notepadplusplus #supplychainattack

TheHackerWirethehackerwire
2026-02-04

🟠 CVE-2025-15285 - High (7.5)

The SEO Flow by LupsOnline plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the checkBlogAuthentication() and checkCategoryAuthentication() functions in all versions up to, and including,...

πŸ”— thehackerwire.com/vulnerabilit

CVE Alert: CVE-2025-15285
TheHackerWirethehackerwire
2026-02-04

🟠 CVE-2025-15268 - High (7.5)

The Infility Global plugin for WordPress is vulnerable to unauthenticated SQL Injection via the 'infility_get_data' API action in all versions up to, and including, 2.14.46. This is due to insufficient escaping on the user supplied parameter and l...

πŸ”— thehackerwire.com/vulnerabilit

CVE Alert: CVE-2025-15268
2026-02-04
2026-02-04

Clawd Bot MOLT Sites Are Getting Out of Control…

youtube.com/watch?v=nm3MWCUVrWs

#threat-intelligence #ai-security #vulnerability

BeyondMachines :verified:beyondmachines1@infosec.exchange
2026-02-04

Critical Authentication Bypass in End-of-Life Synectix LAN 232 TRIO Adapters

Synectix LAN 232 TRIO adapters contain a critical vulnerability (CVE-2026-1633) that allows unauthenticated remote attackers to take full control of the device. Because the manufacturer is out of business, no patches will be released.

**If you use these Synectix adapters, isolate them from the internet immediately because they have no password protection and will never be patched. Since the company is out of business, plan a replacement of the devices.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst