Skip to main content
FreeIntelHub
Feed Threat Feed Search Trending
Intelligence CVE Priority Vulnerability IOC Lookup IOC Feed YARA Rules Phishing Lookup Exploit Lookup Pastes Dark Web
Adversaries Threat Groups Software Campaigns
Explore Dashboard Geo Map Heatmap MITRE ATT&CK
Browse Sources Vendors Categories Sectors
RSS API
FreeIntelHub
/
Sign In

Vulnerability Disclosure

20 articles

SANS ISC Vulnerability Disclosure 6h ago

Wireshark 4.6.6 Released, (Sun, May 24th)

Wireshark release 4.6.

SANS ISC →

HackRead Vulnerability Disclosure 1d ago

RondoDox Botnet Exploits Critical 2018 Vulnerability to Hijack ASUS Routers

Cybersecurity firm VulnCheck reveals hackers are using a critical 2018 vulnerability to bypass authentication and hack over a million ASUS routers.

HackRead →

SecurityWeek Vulnerability Disclosure 1d ago

‘Underminr’ Vulnerability Lets Attackers Hide Malicious Connections Behind Trusted Domains

The stealthy vulnerability impacts roughly 88 million domains and can be exploited to bypass DNS filtering and hide command-and-control traffic. The post ‘Un...

SecurityWeek →

GBHackers Vulnerability Disclosure Microsoft F5 Linux Intel 1d ago

Hackers Exploit F5 BIG-IP to Gain SSH Access and Pivot Into Linux Networks

Threat actors are actively exploiting end-of-life F5 BIG-IP appliances to gain unauthorized SSH access into enterprise networks, using the compromised device...

GBHackers →

GBHackers Vulnerability Disclosure Amazon 1d ago

Ubiquiti Patches Critical UniFi OS Privilege Escalation Flaws

Ubiquiti has released urgent security patches for five critical and high-severity vulnerabilities across its UniFi OS platform, addressing flaws that could a...

T1548

GBHackers →

GBHackers Vulnerability Disclosure GitHub 1d ago

Hackers Compromise Laravel-Lang Packages via 700 GitHub Repos

A sophisticated and active supply chain attack has struck the Laravel-Lang open-source organization, compromising over 700 historical package versions across...

T1190 T1195

GBHackers →

CSO Online Vulnerability Disclosure Microsoft Google Oracle 1d ago

Google leaks details for Chromium bug that can turn browsers into bots

Chromium — the open-source browser that underpins Google Chrome, Microsoft Edge, and Opera, among others — contains an unpatched vulnerability that attackers...

CSO Online →

SC Media Vulnerability Disclosure Microsoft 2d ago

Organizations knowingly ship vulnerable code amid shrinking exploit windows

New research from Checkmarx reveals that 75% of organizations admit to frequently or sometimes deploying code they are aware is vulnerable.

SC Media →

BleepingComputer Vulnerability Disclosure Drupal 2d ago

Drupal: Critical SQL injection flaw now targeted in attacks

Drupal is warning that hackers are attempting to exploit a "highly critical" SQL injection vulnerability announced earlier this week. [.

BleepingComputer →

GBHackers Vulnerability Disclosure 2d ago

Hackers Exploit Middle East Telecoms for Massive C2 Operations

Hackers are increasingly abusing Middle East telecommunications networks and hosting providers to operate large-scale command-and-control (C2) infrastructure...

T1583

GBHackers →

GBHackers Vulnerability Disclosure Microsoft Google 2d ago

Google’s Exploit Code Release Raises Concern Over Unfixed Chromium Security Bug

Google’s recent release of proof-of-concept (PoC) exploit code for a still-unpatched Chromium vulnerability has sparked significant concern across the cybers...

GBHackers →

GBHackers Vulnerability Disclosure 2d ago

Russian Hackers Exploit RDP, VPNs, Supply Chains for Initial Access

Russian state-sponsored and aligned threat groups are increasingly combining Remote Desktop Protocol (RDP), Virtual Private Networks (VPNs), supply chain com...

T1204 T1195

GBHackers →

The Hacker News Vulnerability Disclosure Microsoft Linux 2d ago

Making Vulnerable Drivers Exploitable Without Hardware - The BYOVD Perspective

1 Introduction This article provides a technical analysis of how many Windows kernel mode drivers can be interacted with from user mode without the hardware ...

The Hacker News →

GBHackers Vulnerability Disclosure Apple Oracle 2d ago

Popular npm Package “art-template” Backdoored in Watering-Hole Attack

Hackers compromised the popular art-template npm package to inject a stealthy backdoor that redirected users’ browsers to a malicious watering‑hole site deli...

GBHackers →

Help Net Security Vulnerability Disclosure 2d ago

CISA’s new KEV nomination form opens reporting to vendors and researchers

The Cybersecurity and Infrastructure Security Agency launched a new nomination form that lets researchers, vendors, and industry partners report known exploi...

1 IOC

Help Net Security →

CSO Online Vulnerability Disclosure Google 2d ago

Google folds CodeMender into agent ecosystem amid push for AI-led AppSec

Google is expanding the role of its CodeMender security agent from autonomous vulnerability remediation toward a larger agentic development ecosystem, signal...

CSO Online →

CSO Online Vulnerability Disclosure Cisco 3d ago

Critical vulnerability in Cisco Secure Workload rated at maximum severity

A critical vulnerability in the on-premises version of the Cisco Secure Workload security platform could allow a threat actor to obtain the privileges of a s...

CSO Online →

Wordfence Blog Vulnerability Disclosure Intel WordPress 3d ago

Wordfence Intelligence Weekly WordPress Vulnerability Report (May 11, 2026 to May 17, 2026)

Last week, there were disclosed in and that have been added to the Wordfence Intelligence Vulnerability Database, and there were that contributed to WordPres...

Wordfence Blog →

Schneier on Security Vulnerability Disclosure Apple Linux 3d ago

macOS Kernel Memory Corruption Exploit

A group used Anthropic’s Mythos AI model to help find a kernel memory corruption vulnerability and exploit on Apple’s M5. News article.

Schneier on Security →

The Record Vulnerability Disclosure 3d ago

UK plans for cybercrime law reform would protect almost no one, experts warn

The proposals would require researchers to cease activity the moment a vulnerability is identified, meaning they could not confirm it was real, assess its se...

The Record →

1 2 3 ... 20 Next page»
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA