Security Alerts
We monitor threats 24/7. We publish alerts about critical vulnerabilities based on CISA KEV and NVD.
Critical (CVSS 9.0+)
CVE-2024-43468
CVE-2024-43468: 2024 Vulnerability Now Actively Exploited (Microsoft)
CVE-2026-24423
CVE-2026-24423: SmarterTools SmarterMail Missing Authentication for Critical Function Vulnerability
CVE-2025-11953
CVE-2025-11953: React Native Community CLI OS Command Injection Vulnerability
CVE-2019-19006
CVE-2019-19006: 2019 Vulnerability Now Actively Exploited (Sangoma)
CVE-2025-40551
CVE-2025-40551: SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability
CVE-2026-1281
CVE-2026-1281: Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability
CVE-2026-24858
CVE-2026-24858: Fortinet Multiple Products Authentication Bypass Using an Alternate Path or Channel Vulnerability
CVE-2025-52691
CVE-2025-52691: SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability
CVE-2026-23760
CVE-2026-23760: SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability
CVE-2026-24061
CVE-2026-24061: GNU InetUtils Argument Injection Vulnerability
High (CVSS 7.0-8.9)
CVE-2026-20700
CVE-2026-20700: Apple Multiple Buffer Overflow Vulnerability
CVE-2025-40536
CVE-2025-40536: SolarWinds Web Help Desk Security Control Bypass Vulnerability
CVE-2026-21510
CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure Vulnerability
CVE-2026-21513
CVE-2026-21513: Microsoft Internet Explorer Protection Mechanism Failure Vulnerability
CVE-2026-21514
CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability
CVE-2026-21533
CVE-2026-21533: Microsoft Windows Improper Privilege Management Vulnerability
CVE-2026-21519
CVE-2026-21519: Microsoft Windows Type Confusion Vulnerability
CVE-2025-64328
CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability
CVE-2018-14634
CVE-2018-14634: 2018 Vulnerability Now Actively Exploited (Linux)
CVE-2026-21509
CVE-2026-21509: Microsoft Office Security Feature Bypass Vulnerability
Data Sources
We publish alerts based on official government sources:
Want to Reduce IT Risk and Costs?
Book a free consultation - we respond within 24h
Or download free guide:
Download NIS2 Checklist