FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Vulnerability Disclosure

20 articles

Exploit Database Vulnerability Disclosure Feb 2

[hardware] D-Link DIR-825 Rev.B 2.10 - Stack Buffer Overflow (DoS)

D-Link DIR-825 Rev.B 2.

Exploit Database →

Infosecurity Magazine Vulnerability Disclosure Amazon Jan 28

Critical and High Severity n8n Sandbox Flaws Allow RCE

Two critical security flaws in n8n have exposed sandboxing vulnerabilities, enabling remote code execution for attackers

T1190

Infosecurity Magazine →

Infosecurity Magazine Vulnerability Disclosure Jan 27

Pyodide Sandbox Escape Enables Remote Code Execution in Grist-Core

Critical sandbox escape vulnerability in Grist-Core enables remote code execution via a malicious formula

T1190

Infosecurity Magazine →

Infosecurity Magazine Vulnerability Disclosure Jan 22

Critical Appsmith Flaw Enables Account Takeovers

Critical vulnerability in Appsmith allows account takeover via flawed password reset process

Infosecurity Magazine →

Infosecurity Magazine Vulnerability Disclosure Jan 21

Experts Welcome Global Cybersecurity Vulnerability Enumeration Launch

A new service, the Global Cybersecurity Vulnerability Enumeration (GCVE), offers an alternative to the US-led CVE

Infosecurity Magazine →

Infosecurity Magazine Vulnerability Disclosure Intel Jan 19

Researchers Exploit Bug in StealC Infostealer to Collect Evidence

CyberArk says it exploited a vulnerability in the StealC infostealer to gather intelligence

Infosecurity Magazine →

Infosecurity Magazine Vulnerability Disclosure Check Point Linux Jan 16

RondoDox Botnet Targets HPE OneView Vulnerability in Exploitation Wave

Check Point Research has reported a surge in attacks on a vulnerability in HPE OneView, driven by the Linux-based RondoDox botnet

Infosecurity Magazine →

Recorded Future Vulnerability Disclosure Intel Jan 16

Threat and Vulnerability Management in 2026

Understand the future of threat and vulnerability management (TVM). Learn what TVM is, why traditional tools fail, and how intelligence is essential in today...

Recorded Future →

Infosecurity Magazine Vulnerability Disclosure Jan 15

Cyber Threat Actors Ramp Up Attacks on Industrial Environments

Hacktivists and cybercriminals have intensified their efforts to exploit vulnerabilities in industrial systems, according to a Cyble report

Infosecurity Magazine →

Google Project Zero Vulnerability Disclosure Google Jan 14

A 0-click exploit chain for the Pixel 9 Part 3: Where do we go from here?

While our previous two blog posts provided technical recommendations for increasing the effort required by attackers to develop 0-click exploit chains, our e...

T1598

Google Project Zero →

Google Project Zero Vulnerability Disclosure Linux Jan 14

A 0-click exploit chain for the Pixel 9 Part 2: Cracking the Sandbox with a Big Wave

With the advent of a potential Dolby Unified Decoder RCE exploit, it seemed prudent to see what kind of Linux kernel drivers might be accessible from the res...

T1190

Google Project Zero →

Google Project Zero Vulnerability Disclosure Google Jan 14

A 0-click exploit chain for the Pixel 9 Part 1: Decoding Dolby

Over the past few years, several AI-powered features have been added to mobile phones that allow users to better search and understand their messages. One ef...

Google Project Zero →

Trail of Bits Vulnerability Disclosure Jan 13

Lack of isolation in agentic browsers resurfaces old vulnerabilities

With browser-embedded AI agents, we’re essentially starting the security journey over again. We exploited a lack of isolation mechanisms in multiple agentic ...

Trail of Bits →

Exploit Database Vulnerability Disclosure WordPress Dec 25

[webapps] WordPress Quiz Maker 6.7.0.56 - SQL Injection

WordPress Quiz Maker 6.7.

1 IOC

Exploit Database →

Exploit Database Vulnerability Disclosure Dec 25

[webapps] FreeBSD rtsold 15.x - Remote Code Execution via DNSSL

FreeBSD rtsold 15.

T1190

Exploit Database →

Trail of Bits Vulnerability Disclosure Dec 16

Use GWP-ASan to detect exploits in production environments

Memory safety bugs like use-after-free and buffer overflows remain among the most exploited vulnerability classes in production software. While AddressSaniti...

Trail of Bits →

Exploit Database Vulnerability Disclosure Dec 16

[webapps] Summar Employee Portal 3.98.0 - Authenticated SQL Injection

Summar Employee Portal 3.98.

Exploit Database →

Recorded Future Vulnerability Disclosure Dec 8

Critical React2Shell Vulnerability Under Active Exploitation by Chinese Threat Actors

A critical vulnerability in React Server Components is allegedly being actively exploited by multiple Chinese threat actors, Recorded Future recommends organ...

Recorded Future →

Exploit Database Vulnerability Disclosure Dec 3

[webapps] MaNGOSWebV4 4.0.6 - Reflected XSS

MaNGOSWebV4 4.0.

Exploit Database →

Exploit Database Vulnerability Disclosure Dec 3

[webapps] Django 5.1.13 - SQL Injection

Django 5.1.

Exploit Database →

« Prev 1 ... 11 12 13 14 15 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA