The SharePoint remote code execution vulnerability CVE-2026-20963, which Microsoft patched in January, has been exploited in ...
A newly disclosed vulnerability tracked as CVE-2026-32746 has put a spotlight back on a service most security teams would rather ...
Veeam patches three critical-severity flaws and two high-severity issues.
A critical Microsoft SharePoint vulnerability patched in January is now being exploited in attacks, the Cybersecurity and ...
CISA warns of an actively exploited SharePoint RCE flaw (CVE-2026-20963) and urges organizations to patch their systems.
Windows Server 2025 is currently open to a Remote Code Execution exploit via the Windows Update Service, and at the time of this writing a fix from Microsoft has yet to fully patch the issue. Reports ...
The Interlock ransomware gang has been exploiting a maximum severity remote code execution (RCE) vulnerability in Cisco's Secure Firewall Management Center (FMC) software in zero-day attacks since ...
Veeam fixes 7 Backup & Replication flaws, including CVSS 9.9 RCE bugs, warning attackers may exploit unpatched systems.
Langflow CVE-2026-33017 exploited in 20 hours after disclosure, enabling RCE via exec(), exposing systems before patching cycles.
Because attacker-supplied flow data is used in public flows, the bug leads to unauthenticated remote code execution.
An unauthenticated user can execute the attack, and there’s no mitigation, just a hotfix that should be applied immediately. A maximum severity remote code execution vulnerability in Hewlett Packard ...
Remote code execution vulnerability targets Microsoft Office document users The attackers use a specially crafted Office document to launch the attack Microsoft recommends that customers use an ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results