#Exploit

2026-01-28

Papermark 0.20.0 Path Traversal packetstorm.news/files/214538 #exploit

2026-01-28

FreePBX Firmware Shell Upload packetstorm.news/files/214537 #exploit

2026-01-28

AVideo 14.3.1 Cross Site Scripting packetstorm.news/files/214469 #exploit

Marc Ruef :verified:mruef@infosec.exchange
2026-01-28

Odd WebLogic Request. Possible CVE-2026-21962 Exploit Attempt or AI Slop? #vulnerability #exploit #cve #ai isc.sans.edu/diary/rss/32662

2026-01-28

General Graboids: Worms and Remote Code Execution in Command & Conquer — Atredis Partners

atredis.com/blog/2026/1/26/gen

#cybersecurity #vulnerability #exploit

2026-01-28

Critical vm2 Node.js Flaw Allows Sandbox Escape and Arbitrary Code Execution

thehackernews.com/2026/01/crit

#cybersecurity #vulnerability #exploit

2026-01-28

Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution

Again ...

thehackernews.com/2026/01/two-

#cybersecurity #vulnerability #exploit

DiodioGlow — SénégalDidioGlow
2026-01-28

🔥 Nouvelle vidéo tendance au Sénégal !
🎬 Khaby Lame vient de conclure un accord évalué à près d’un milliard de dollars. Qu’est ce que cela vous inspire en tant que Sénégalais ?
👇 Regardez la vidéo complète :
diodioglow.com/video/khaby-lam

2026-01-28

Fortinet continues to combat ongoing SSO admin attacks

Attackers have been targeting various Fortinet products for some time. A functional security update is still missing.

heise.de/en/news/Fortinet-cont

#Cyberangriff #Exploit #IT #Patchday #Security #IdentityManagement #Updates #news

2026-01-28

Fortinet kämpft weiter gegen laufende SSO-Admin-Attacken

Angreifer attackieren schon länger diverse Fortinet-Produkte. Ein funktionierendes Sicherheitsupdate fehlt nach wie vor. Ein temporärer Schutz soll helfen.

heise.de/news/Fortinet-kaempft

#Cyberangriff #Exploit #IT #Patchday #Security #IdentityManagement #Updates #news

2026-01-28

Cybercrime and APT Groups Exploiting WinRAR Bug - Decipher

decipher.sc/2026/01/27/cybercr

#threat-intelligence #vulnerability #exploit

Empire : Le Framework de Post-Exploitation pour les Tests d'Intrusion

peer.adalta.social/w/jNewMn7MJ

Empire: The Open-Source Post-Exploitation Framework

peer.adalta.social/w/xmgGwyiVz

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst