FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Check Point Cloudflare Oracle Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Vulnerability Disclosure

20 articles

Exploit Database Vulnerability Disclosure 2d ago

[webapps] xibocms 3.3.4 - RCE

xibocms 3.3.

Exploit Database →

CSO Online Vulnerability Disclosure Microsoft Google Apple Amazon Linux 3d ago

What Anthropic Glasswing reveals about the future of vulnerability discovery

AI giant Anthropic has unveiled Project Glasswing, a cybersecurity initiative built around Claude Mythos Preview, a model it describes as “cybersecurity in t...

CSO Online →

BleepingComputer Vulnerability Disclosure WordPress 3d ago

Hackers exploit critical flaw in Ninja Forms WordPress plugin

A critical vulnerability in the Ninja Forms File Uploads premium add-on for WordPress allows uploading arbitrary files without authentication, which can lead...

T1190

BleepingComputer →

SC Media Vulnerability Disclosure Linux 3d ago

New CUPS vulnerabilities threaten RCE, network breaches

Attackers could combine a pair of newly discovered vulnerabilities in the Common Unix Printing System used by Linux and other Unix-like systems to facilitate...

T1190

SC Media →

SANS ISC Vulnerability Disclosure 3d ago

A Little Bit Pivoting: What Web Shells are Attackers Looking for?, (Tue, Apr 7th)

Webshells remain a popular method for attackers to maintain persistence on a compromised web server. Many "arbitrary file write" and "remote code execution" ...

T1190

SANS ISC →

HackRead Vulnerability Disclosure 3d ago

GrafanaGhost Vulnerability Allows Data Theft via AI Injection

GrafanaGhost is a critical vulnerability in Grafana’s AI components that uses indirect prompt injection and protocol-relative URL bypasses to exfiltrate data.

T1041

HackRead →

SecurityWeek Vulnerability Disclosure Oracle 3d ago

Critical Flowise Vulnerability in Attacker Crosshairs

The improper validation of user-supplied JavaScript code allows attackers to execute arbitrary code and access the file system. The post Critical Flowise Vul...

SecurityWeek →

Infosecurity Magazine Vulnerability Disclosure 3d ago

GPU Rowhammer Attack Enables Privilege Escalation and Full System Compromise

GPUBreach uses GPU Rowhammer on GDDR6 to flip bits, corrupt page tables and escalate to system root

T1548

Infosecurity Magazine →

SC Media Vulnerability Disclosure 3d ago

Malicious email delivers advanced malware with privilege escalation and evasion tactics

The attack chain begins with a user receiving an email containing a URL that downloads an encoded .cmd file.

T1548

SC Media →

SecurityWeek Vulnerability Disclosure Google 3d ago

Severe StrongBox Vulnerability Patched in Android

A critical DoS vulnerability in the Framework component of Android has also been fixed with the latest update. The post Severe StrongBox Vulnerability Patche...

SecurityWeek →

Infosecurity Magazine Vulnerability Disclosure Amazon 3d ago

GrafanaGhost Exploit Bypasses AI Guardrails for Silent Data Exfiltration

GrafanaGhost chains AI prompt injection and URL flaws to exfiltrate sensitive Grafana data

T1041

Infosecurity Magazine →

GBHackers Vulnerability Disclosure Amazon Linux 3d ago

CUPS Vulnerabilities Could Allow Remote Attackers to Achieve Root-Level Code Execution

A team of AI-driven vulnerability hunting agents directed by security researcher Asim Viladi Oglu Manizada has discovered two critical security flaws in CUPS...

T1190

GBHackers →

GBHackers Vulnerability Disclosure Amazon 3d ago

Windmill Developer Platform Flaws Expose Users to RCE Attacks, Proof-of-Concept Published

Cybersecurity researchers have discovered critical vulnerabilities in the Windmill developer platform and Nextcloud Flow, an integration embedding the Windmi...

T1041

GBHackers →

GBHackers Vulnerability Disclosure 3d ago

GPUBreach Attack Could Lead to Full System Takeover and Root Shell Access

A newly discovered vulnerability dubbed “GPUBreach” demonstrates that GPU-based Rowhammer attacks can now achieve complete system compromise. Scheduled for p...

GBHackers →

CISA Advisories Vulnerability Disclosure 3d ago

Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure

Advisory at a Glance Title Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure Original Publication Apri...

CISA Advisories →

Security Affairs Vulnerability Disclosure 3d ago

GPUBreach exploit uses GPU memory bit-flips to achieve full system takeover

GPUBreach attack technique uses GPU memory bit-flips to escalate privileges and potentially take full control of a system. New research shows that attacks li...

Security Affairs →

GBHackers Vulnerability Disclosure Google 3d ago

Critical Android Flaw Allows Zero-Interaction Denial-of-Service Attacks

Google has rolled out its April 2026 Android Security Bulletin, addressing multiple vulnerabilities across the mobile operating system. The most alarming dis...

GBHackers →

The Hacker News Vulnerability Disclosure 3d ago

New GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-Flips

New academic research has identified multiple RowHammer attacks against high-performance graphics processing units (GPUs) that could be exploited to escalate...

T1548

The Hacker News →

GBHackers Vulnerability Disclosure Sophos 3d ago

Threat Actors Exploit LogMeIn Resolve, ScreenConnect in Phishing Campaigns

Threat actors are abusing legitimate remote monitoring and management (RMM) tools LogMeIn Resolve and ScreenConnect in a multi‑stage phishing campaign that b...

T1566 T1204

GBHackers →

Help Net Security Vulnerability Disclosure 3d ago

The case for fixing CWE weakness patterns instead of patching one bug at a time

In this Help Net Security interview, Alec Summers, MITRE CVE/CWE Project Lead, discusses how CWE is moving from a background reference into active use in vul...

Help Net Security →

« Prev 1 2 3 4 5 ... 18 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA