CVE Feed
- CVE-2026-1813 – bolo-blog bolo-solo FreeMarker Template PicUploadProcessor.java unrestricted upload February 4, 2026
- CVE-2026-1633 – Synectix LAN 232 TRIO Missing Authentication for Critical Function February 4, 2026
- CVE-2026-24513 – ingress-nginx auth-url protection bypass February 3, 2026
- CVE-2026-24514 – ingress-nginx Admission Controller denial of service February 3, 2026
- CVE-2026-1580 – ingress-nginx auth-method nginx configuration injection February 3, 2026
- CVE-2026-1632 – RISS SRL MOMA Seismic Station Missing Authentication for Critical Function February 3, 2026
- CVE-2026-1755 – Menu Icons by ThemeIsle <= 0.13.20 – Authenticated (Author+) Stored Cross-Site Scripting February 3, 2026
- CVE-2026-1812 – bolo-blog bolo-solo Filename BackupService.java importFromCnblogs path traversal February 3, 2026
- CVE-2026-24512 – ingress-nginx auth-method nginx configuration injection February 3, 2026
- CVE-2025-33081 – Multiple Vulnerabilities in IBM Concert Software. February 3, 2026
- CVE-2025-36033 – IBM Engineering Lifecycle Management – Global Configuration Management is vulnerable to cross-site scripting February 3, 2026
- CVE-2025-36094 – Multiple security vulnerabilities are addressed with IBM Cloud Pak for Business Automation iFixes for January 2026. February 3, 2026
- CVE-2020-37084 – School ERP Pro 1.0 Admin Profile Photo Upload Remote Code Execution Vulnerability February 3, 2026
- CVE-2020-37087 – Easy Transfer 1.7 for iOS – Persistent Cross-Site Scripting February 3, 2026
- CVE-2026-25223 – Fastify's Content-Type header tab character allows body validation bypass February 3, 2026
- CVE-2026-25224 – Fastify Vulnerable to DoS via Unbounded Memory Allocation in sendWebStream February 3, 2026
- CVE-2026-25509 – CI4MS Vulnerable to User Email Enumeration via Password Reset Flow February 3, 2026
- CVE-2026-25510 – CI4MS Vulnerable to Remote Code Execution (RCE) via Arbitrary File Creation and Save in File Editor February 3, 2026
- CVE-2026-25148 – Qwik SSR XSS via Unsafe Virtual Node Serialization February 3, 2026
Microsoft Security
- Microsoft SDL: Evolving security practices for an AI-powered world February 3, 2026Discover Microsoft’s holistic SDL for AI combining policy, research, and enablement to help leaders secure AI systems against evolving cyberthreats. The post Microsoft SDL: Evolving security practices for an AI-powered world appeared first on Microsoft Security Blog.Yonatan Zunger
- Infostealers without borders: macOS, Python stealers, and platform abuse February 2, 2026How modern infostealers target macOS systems, leverage Python‑based stealers, and abuse trusted platforms and utilities to distribute credential‑stealing payloads. The post Infostealers without borders: macOS, Python stealers, and platform abuse appeared first on Microsoft Security Blog.Microsoft Defender Security Research Team
- Case study: Securing AI application supply chains January 30, 2026Securing AI-powered applications requires more than just safeguarding prompts. Organizations must adopt a holistic approach that includes monitoring the AI supply chain, assessing frameworks, SDKs, and orchestration layers for vulnerabilities, and enforcing strong runtime controls for agents and tools. Leveraging visibility into these components allows security teams to detect, respond to, and remediate risks before […]Microsoft Defender Security Research Team
- Turning threat reports into detection insights with AI January 29, 2026Security teams often spend days manually turning long incident reports and threat writeups into actionable detections by extracting TTPs. This blog post shows an AI-assisted workflow that does the same job in minutes. It extracts the TTPs, maps them to existing detection coverage, and flags potential gaps. Defenders can respond faster, with human experts still […]Microsoft Defender Security Research Team
- New Microsoft Data Security Index report explores secure AI adoption to protect sensitive data January 29, 2026The 2026 Microsoft Data Security Index explores one of the most pressing questions facing organizations today: How can we harness the power of generative while safeguarding sensitive data? The post New Microsoft Data Security Index report explores secure AI adoption to protect sensitive data appeared first on Microsoft Security Blog.Herain Oberoi



