CVE Feed
- CVE-2026-26227 – VLC for Android < 3.7.0 Remote Access OTP Authentication Bypass February 26, 2026
- CVE-2026-26682 – FastCMS Remote Code Execution Vulnerability February 26, 2026
- CVE-2026-26932 – Improper Validation of Array Index in Packetbeat Leading to Denial of Service February 26, 2026
- CVE-2026-26934 – Improper Validation of Specified Quantity in Input in Kibana Leading to Denial of Service February 26, 2026
- CVE-2026-26935 – Improper Input Validation in Kibana Leading to Denial of Service February 26, 2026
- CVE-2026-26936 – Inefficient Regular Expression Complexity in Kibana Leading to Denial of Service February 26, 2026
- CVE-2026-23747 – Golioth Firmware SDK < 0.22.0 Payload Utils Stack-based Buffer Overflow February 26, 2026
- CVE-2026-23748 – Golioth Firmware SDK < 0.22.0 LightDB State Out-of-Bounds Read February 26, 2026
- CVE-2026-23749 – Golioth Firmware SDK < 0.22.0 Blockwise Transfer Path Out-of-Bounds Read February 26, 2026
- CVE-2026-23750 – Golioth Pouch < [INSERT FIXED VERSION] BLE GATT Heap-based Buffer Overflow February 26, 2026
- CVE-2026-26938 – Improper Neutralization of Special Elements Used in a Template Engine in Kibana Workflows Leading to Server-Side Request Forgery (SSRF) February 26, 2026
- CVE-2026-26937 – Uncontrolled Resource Consumption in Kibana Leading to Denial of Service February 26, 2026
- CVE-2025-50857 – ZenTaoPMS Directory Traversal Vulnerability February 26, 2026
- CVE-2026-28295 – Gvfs: gvfs ftp backend: information disclosure via untrusted pasv responses February 26, 2026
- CVE-2026-28296 – Gvfs: ftp gvfs backend: arbitrary ftp command injection via crlf sequences in file paths February 26, 2026
- CVE-2026-26207 – DIscourse's discourse-policy plugin lacks post access check February 26, 2026
- CVE-2026-26228 – VLC for Android < 3.7.0 Remote Access Path Traversal February 26, 2026
- CVE-2026-26265 – Discourse has IDOR vulnerability in the directory items endpoint February 26, 2026
- CVE-2026-26078 – Discourse has authentication bypass vulnerability in the Patreon plugin webhook endpoint February 26, 2026
Microsoft Security
- Threat modeling AI applications February 26, 2026AI threat modeling helps teams identify misuse, emergent risk, and failure modes in probabilistic and agentic AI systems. The post Threat modeling AI applications appeared first on Microsoft Security Blog.Scott Christiansen, Alyssa Ofstein and Neil Coles
- Developer-targeting campaign using malicious Next.js repositories February 24, 2026A developer-targeting campaign leveraged malicious Next.js repositories to trigger a covert RCE-to-C2 chain through standard build workflows. The activity demonstrates how staged command-and-control can hide inside routine development tasks. The post Developer-targeting campaign using malicious Next.js repositories appeared first on Microsoft Security Blog.Microsoft Defender Experts and Microsoft Defender Security Research Team
- Scaling security operations with Microsoft Defender autonomous defense and expert-led services February 24, 2026AI-powered cyberattacks outpace aging SOC tools, and this new guide explains why manual defense fails and how autonomous, expert-led security transforms modern protection. The post Scaling security operations with Microsoft Defender autonomous defense and expert-led services appeared first on Microsoft Security Blog.Andrew Conway
- New e-book: Establishing a proactive defense with Microsoft Security Exposure Management February 19, 2026Read the new maturity-based guide that helps organizations move from fragmented, reactive security practices to a unified exposure management approach that enables proactive defense. The post New e-book: Establishing a proactive defense with Microsoft Security Exposure Management appeared first on Microsoft Security Blog.Adi Shua Zucker
- Running OpenClaw safely: identity, isolation, and runtime risk February 19, 2026Self-hosted agents execute code with durable credentials and process untrusted input. This creates dual supply chain risk, where skills and external instructions converge in the same runtime. As OpenClaw-like systems enter enterprises, governance and runtime isolation become critical. The post Running OpenClaw safely: identity, isolation, and runtime risk appeared first on Microsoft Security Blog.Microsoft Defender Security Research Team



