##
Updated at UTC 2026-04-05T15:25:03.845538
| CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-5567 | 8.8 | 0.00% | 2 | 0 | 2026-04-05T13:17:14.707000 | A flaw has been found in Tenda M3 1.0.0.10. This vulnerability affects the funct | |
| CVE-2026-5566 | 8.8 | 0.00% | 2 | 0 | 2026-04-05T13:17:14.520000 | A vulnerability was detected in UTT HiPER 1250GW up to 3.2.7-210907-180535. This | |
| CVE-2026-5558 | 6.3 | 0.03% | 2 | 0 | 2026-04-05T10:16:19.933000 | A flaw has been found in PHPGurukul PHPGurukul Online Shopping Portal Project up | |
| CVE-2026-5550 | 8.8 | 0.05% | 4 | 0 | 2026-04-05T08:16:25.100000 | A vulnerability was identified in Tenda AC10 16.03.10.10_multi_TDE01. This affec | |
| CVE-2026-5548 | 8.8 | 0.05% | 2 | 0 | 2026-04-05T08:16:24.650000 | A vulnerability was found in Tenda AC10 16.03.10.10_multi_TDE01. Affected by thi | |
| CVE-2026-5544 | 8.8 | 0.04% | 4 | 0 | 2026-04-05T06:32:08 | A security flaw has been discovered in UTT HiPER 1250GW up to 3.2.7-210907-18053 | |
| CVE-2026-1233 | 7.5 | 0.02% | 4 | 0 | 2026-04-04T12:31:10 | The Text to Speech for WP (AI Voices by Mementor) plugin for WordPress is vulner | |
| CVE-2026-2936 | 7.2 | 0.02% | 2 | 0 | 2026-04-04T12:31:04 | The Visitor Traffic Real Time Statistics plugin for WordPress is vulnerable to S | |
| CVE-2026-3666 | 8.8 | 0.03% | 4 | 0 | 2026-04-04T12:16:03.390000 | The wpForo Forum plugin for WordPress is vulnerable to arbitrary file deletion i | |
| CVE-2026-3445 | 7.1 | 0.03% | 2 | 0 | 2026-04-04T09:30:37 | The Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User | |
| CVE-2026-4896 | 8.1 | 0.01% | 2 | 0 | 2026-04-04T09:30:31 | The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Lis | |
| CVE-2026-5425 | 7.2 | 0.06% | 2 | 0 | 2026-04-04T09:16:20.500000 | The Widgets for Social Photo Feed plugin for WordPress is vulnerable to Stored C | |
| CVE-2026-35216 | 9.1 | 0.34% | 2 | 0 | 2026-04-04T06:04:59 | ### Summary An unauthenticated attacker can achieve Remote Code Execution (RCE) | |
| CVE-2026-35214 | 8.7 | 0.11% | 2 | 0 | 2026-04-04T06:04:22 | ## Summary The plugin file upload endpoint (`POST /api/plugin/upload`) passes t | |
| CVE-2026-4636 | 8.1 | 0.03% | 2 | 0 | 2026-04-04T06:00:16 | A flaw was found in Keycloak. An authenticated user with the uma_protection role | |
| CVE-2026-35616 | 9.8 | 0.03% | 17 | 2 | 2026-04-04T01:16:39.720000 | A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through | |
| CVE-2025-15620 | 8.6 | 0.01% | 1 | 0 | 2026-04-04T00:31:26 | HiOS Switch Platform contains a denial-of-service vulnerability in the web inter | |
| CVE-2026-34955 | 8.8 | 0.02% | 2 | 0 | 2026-04-04T00:16:19.370000 | PraisonAI is a multi-agent teams system. Prior to version 4.5.97, SubprocessSand | |
| CVE-2026-34771 | 7.5 | 0.04% | 2 | 0 | 2026-04-04T00:16:17.980000 | Electron is a framework for writing cross-platform desktop applications using Ja | |
| CVE-2026-34954 | 8.6 | 0.03% | 2 | 0 | 2026-04-03T23:17:06.810000 | PraisonAI is a multi-agent teams system. Prior to version 1.5.95, FileTools.down | |
| CVE-2026-34952 | 9.1 | 0.04% | 5 | 0 | 2026-04-03T23:17:06.490000 | PraisonAI is a multi-agent teams system. Prior to version 4.5.97, the PraisonAI | |
| CVE-2026-34938 | 10.0 | 0.10% | 5 | 0 | 2026-04-03T23:17:06.170000 | PraisonAI is a multi-agent teams system. Prior to version 1.5.90, execute_code() | |
| CVE-2026-33175 | 8.8 | 0.10% | 2 | 0 | 2026-04-03T22:16:26.483000 | OAuthenticator is software that allows OAuth2 identity providers to be plugged i | |
| CVE-2026-34824 | 7.5 | 0.02% | 2 | 0 | 2026-04-03T21:54:37 | ### Summary An uncontrolled resource consumption vulnerability exists in the Web | |
| CVE-2026-33950 | 9.4 | 0.05% | 1 | 0 | 2026-04-03T21:37:19 | ## Summary According to SignalK's security documentation, when a server is firs | |
| CVE-2026-25197 | 9.1 | 0.03% | 4 | 2 | 2026-04-03T21:31:49 | A specific endpoint allows authenticated users to pivot to other user profiles b | |
| CVE-2025-10681 | 8.6 | 0.04% | 2 | 2 | 2026-04-03T21:31:49 | Storage credentials are hardcoded in the mobile app and device firmware. These c | |
| CVE-2026-22665 | 8.1 | 0.03% | 2 | 0 | 2026-04-03T21:31:49 | prompts.chat prior to commit 1464475 contains an identity confusion vulnerabilit | |
| CVE-2026-28766 | 9.3 | 0.07% | 2 | 2 | 2026-04-03T21:31:49 | A specific endpoint exposes all user account information for registered Gardyn u | |
| CVE-2026-35558 | 7.8 | 0.04% | 2 | 0 | 2026-04-03T21:31:49 | Improper neutralization of special elements in the authentication components in | |
| CVE-2026-32646 | 7.5 | 0.07% | 2 | 2 | 2026-04-03T21:31:49 | A specific administrative endpoint is accessible without proper authentication, | |
| CVE-2026-35562 | 7.5 | 0.08% | 2 | 0 | 2026-04-03T21:31:49 | Allocation of resources without limits in the parsing components in Amazon Athen | |
| CVE-2026-22664 | 7.7 | 0.03% | 2 | 0 | 2026-04-03T21:31:48 | prompts.chat prior to commit 30a8f04 contains a server-side request forgery vuln | |
| CVE-2026-5485 | 7.8 | 0.03% | 2 | 0 | 2026-04-03T21:17:12.603000 | OS command injection in the browser-based authentication component in Amazon Ath | |
| CVE-2026-22663 | 7.5 | 0.03% | 2 | 0 | 2026-04-03T21:17:09.337000 | prompts.chat prior to commit 7b81836 contains multiple authorization bypass vuln | |
| CVE-2026-22661 | 8.1 | 0.04% | 2 | 0 | 2026-04-03T21:17:08.970000 | prompts.chat prior to commit 0f8d4c3 contains a path traversal vulnerability in | |
| CVE-2026-34758 | 9.1 | 0.03% | 1 | 0 | 2026-04-03T19:52:26.097000 | OneUptime is an open-source monitoring and observability platform. Prior to vers | |
| CVE-2026-34742 | 8.1 | 0.05% | 2 | 0 | 2026-04-03T19:48:25.627000 | The Go MCP SDK used Go's standard encoding/json. Prior to version 1.4.0, the Mod | |
| CVE-2025-59711 | 8.3 | 0.87% | 2 | 0 | 2026-04-03T18:31:21 | An issue was discovered in Biztalk360 before 11.5. Because of mishandling of use | |
| CVE-2026-26477 | 7.5 | 0.11% | 2 | 0 | 2026-04-03T18:31:21 | An issue in Dokuwiki v.2025-05-14b 'Librarian' allows a remote attacker to cause | |
| CVE-2025-43202 | 8.8 | 0.02% | 2 | 0 | 2026-04-03T18:31:17 | This issue was addressed with improved memory handling. This issue is fixed in i | |
| CVE-2025-43219 | 8.8 | 0.02% | 1 | 0 | 2026-04-03T18:31:17 | The issue was addressed with improved memory handling. This issue is fixed in ma | |
| CVE-2026-28373 | 9.6 | 0.03% | 3 | 0 | 2026-04-03T18:16:24.323000 | The Stackfield Desktop App before 1.10.2 for macOS and Windows contains a path t | |
| CVE-2026-0545 | 9.1 | 0.20% | 2 | 0 | 2026-04-03T18:16:21.540000 | In mlflow/mlflow, the FastAPI job endpoints under `/ajax-api/3.0/jobs/*` are not | |
| CVE-2025-43257 | 8.7 | 0.01% | 1 | 0 | 2026-04-03T17:57:19.197000 | This issue was addressed with improved handling of symlinks. This issue is fixed | |
| CVE-2026-31818 | 9.6 | 0.01% | 2 | 0 | 2026-04-03T16:16:39.800000 | Budibase is an open-source low-code platform. Prior to version 3.33.4, a server- | |
| CVE-2026-20160 | 9.8 | 0.17% | 2 | 0 | 2026-04-03T16:11:11.357000 | A vulnerability in Cisco Smart Software Manager On-Prem (SSM On-Prem) could allo | |
| CVE-2026-31027 | 9.8 | 0.15% | 1 | 0 | 2026-04-03T16:11:11.357000 | TOTOlink A3600R v5.9c.4959 contains a buffer overflow vulnerability in the setAp | |
| CVE-2026-20155 | 8.0 | 0.11% | 2 | 0 | 2026-04-03T16:11:11.357000 | A vulnerability in the web-based management interface of Cisco Evolved Programma | |
| CVE-2026-4634 | 7.5 | 0.07% | 2 | 0 | 2026-04-03T16:10:52.680000 | A flaw was found in Keycloak. An unauthenticated attacker can exploit this vulne | |
| CVE-2026-2699 | 9.8 | 0.41% | 8 | 1 | 2026-04-03T16:10:52.680000 | Customer Managed ShareFile Storage Zones Controller (SZC) allows an unauthentica | |
| CVE-2026-31931 | 7.5 | 0.05% | 2 | 0 | 2026-04-03T16:10:52.680000 | Suricata is a network IDS, IPS and NSM engine. From version 8.0.0 to before vers | |
| CVE-2026-33544 | 7.7 | 0.04% | 1 | 0 | 2026-04-03T16:10:52.680000 | Tinyauth is an authentication and authorization server. Prior to version 5.0.5, | |
| CVE-2026-34792 | 8.8 | 0.24% | 2 | 0 | 2026-04-03T16:10:52.680000 | Endian Firewall version 3.3.25 and prior allow authenticated users to execute ar | |
| CVE-2026-34793 | 8.8 | 0.24% | 1 | 0 | 2026-04-03T16:10:52.680000 | Endian Firewall version 3.3.25 and prior allow authenticated users to execute ar | |
| CVE-2026-34564 | 9.1 | 0.05% | 1 | 0 | 2026-04-03T16:10:52.680000 | CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, mo | |
| CVE-2026-33615 | 9.1 | 0.08% | 1 | 0 | 2026-04-03T16:10:52.680000 | An unauthenticated remote attacker can exploit an unauthenticated SQL Injection | |
| CVE-2026-34566 | 9.1 | 0.05% | 1 | 0 | 2026-04-03T16:10:52.680000 | CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, mo | |
| CVE-2026-34568 | 9.1 | 0.05% | 1 | 0 | 2026-04-03T16:10:52.680000 | CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, mo | |
| CVE-2026-4350 | 8.1 | 0.10% | 2 | 0 | 2026-04-03T16:10:23.730000 | The Perfmatters plugin for WordPress is vulnerable to arbitrary file deletion vi | |
| CVE-2026-34743 | 0 | 0.04% | 1 | 0 | 2026-04-03T16:10:23.730000 | XZ Utils provide a general-purpose data-compression library plus command-line to | |
| CVE-2026-32213 | 10.0 | 0.05% | 2 | 0 | 2026-04-03T16:10:23.730000 | Improper authorization in Azure AI Foundry allows an unauthorized attacker to el | |
| CVE-2026-33746 | 9.8 | 0.08% | 1 | 0 | 2026-04-03T16:10:23.730000 | Convoy is a KVM server management panel for hosting businesses. From version 3.9 | |
| CVE-2026-5349 | 8.8 | 0.04% | 1 | 0 | 2026-04-03T16:10:23.730000 | A vulnerability was identified in Trendnet TEW-657BRM 1.00.1. The affected eleme | |
| CVE-2025-65114 | 7.5 | 0.03% | 1 | 0 | 2026-04-03T16:10:23.730000 | Apache Traffic Server allows request smuggling if chunked messages are malformed | |
| CVE-2026-34877 | 9.8 | 0.07% | 1 | 0 | 2026-04-03T16:10:23.730000 | An issue was discovered in Mbed TLS versions from 2.19.0 up to 3.6.5, Mbed TLS 4 | |
| CVE-2026-34522 | 8.1 | 0.06% | 1 | 0 | 2026-04-03T16:10:23.730000 | SillyTavern is a locally installed user interface that allows users to interact | |
| CVE-2026-34827 | 7.5 | 0.04% | 1 | 0 | 2026-04-03T16:10:23.730000 | Rack is a modular Ruby web server interface. From versions 3.0.0.beta1 to before | |
| CVE-2026-5429 | 7.8 | 0.02% | 1 | 0 | 2026-04-03T16:10:23.730000 | Unsanitized input during web page generation in the Kiro Agent webview in Kiro I | |
| CVE-2026-32173 | 8.6 | 0.06% | 1 | 0 | 2026-04-03T16:10:23.730000 | Improper authentication in Azure SRE Agent allows an unauthorized attacker to di | |
| CVE-2026-35388 | 2.5 | 0.01% | 1 | 0 | 2026-04-03T16:10:23.730000 | OpenSSH before 10.3 omits connection multiplexing confirmation for proxy-mode mu | |
| CVE-2026-25773 | 8.1 | 0.01% | 2 | 0 | 2026-04-03T15:30:39 | ** UNSUPPORTED WHEN ASSIGNED ** Focalboard version 8.0 fails to sanitize categor | |
| CVE-2026-35467 | 7.5 | 0.02% | 2 | 0 | 2026-04-03T15:30:31 | The stored API keys in temporary browser client is not marked as protected allow | |
| CVE-2026-5463 | 8.6 | 0.85% | 2 | 0 | 2026-04-03T06:31:39 | Command injection vulnerability in console.run_module_with_output() in pymetaspl | |
| CVE-2026-35168 | 8.8 | 0.06% | 2 | 0 | 2026-04-03T03:47:38 | ## Description The Aggiornamenti (Updates) module in OpenSTAManager <= 2.10.1 c | |
| CVE-2026-28815 | None | 0.03% | 2 | 0 | 2026-04-03T03:39:42 | ### Summary The X-Wing decapsulation path accepts attacker-controlled encapsula | |
| CVE-2026-34780 | 8.4 | 0.04% | 2 | 0 | 2026-04-03T02:46:57 | ### Impact Apps that pass `VideoFrame` objects (from the WebCodecs API) across t | |
| CVE-2026-34774 | 8.1 | 0.04% | 2 | 0 | 2026-04-03T02:42:31 | ### Impact Apps that use offscreen rendering and allow child windows via `window | |
| CVE-2026-34769 | 7.8 | 0.02% | 2 | 0 | 2026-04-03T02:39:16 | ### Impact An undocumented `commandLineSwitches` webPreference allowed arbitrary | |
| CVE-2026-33107 | 10.0 | 0.05% | 1 | 0 | 2026-04-03T00:31:15 | Server-side request forgery (ssrf) in Azure Databricks allows an unauthorized at | |
| CVE-2026-33105 | 10.0 | 0.05% | 2 | 0 | 2026-04-03T00:31:14 | Improper authorization in Microsoft Azure Kubernetes Service allows an unauthori | |
| CVE-2026-32211 | 9.1 | 0.05% | 1 | 0 | 2026-04-03T00:31:14 | Missing authentication for critical function in Azure MCP Server allows an unaut | |
| CVE-2026-26135 | 9.6 | 0.05% | 1 | 0 | 2026-04-03T00:31:14 | Server-side request forgery (ssrf) in Azure Custom Locations Resource Provider ( | |
| CVE-2025-58136 | 7.5 | 0.04% | 1 | 0 | 2026-04-02T21:34:00 | A bug in POST request handling causes a crash under a certain condition. This i | |
| CVE-2025-43264 | 8.8 | 0.02% | 1 | 0 | 2026-04-02T21:33:02 | The issue was addressed with improved memory handling. This issue is fixed in ma | |
| CVE-2026-34426 | 7.6 | 0.04% | 1 | 0 | 2026-04-02T21:33:02 | OpenClaw versions prior to commit b57b680 contain an approval bypass vulnerabili | |
| CVE-2026-34829 | 7.5 | 0.04% | 1 | 0 | 2026-04-02T20:34:49 | ## Summary `Rack::Multipart::Parser` only wraps the request body in a `BoundedI | |
| CVE-2026-30287 | 8.4 | 0.01% | 1 | 0 | 2026-04-02T19:37:43.627000 | An arbitrary file overwrite vulnerability in Deep Thought Industries ACE Scanner | |
| CVE-2026-34785 | 7.5 | 0.03% | 1 | 0 | 2026-04-02T18:44:26 | ## Summary `Rack::Static` determines whether a request should be served as a st | |
| CVE-2026-30332 | 7.6 | 0.01% | 1 | 1 | 2026-04-02T18:31:45 | A Time-of-Check to Time-of-Use (TOCTOU) race condition vulnerability in Balena E | |
| CVE-2026-34876 | 7.5 | 0.02% | 1 | 0 | 2026-04-02T18:31:45 | An issue was discovered in Mbed TLS 3.x before 3.6.6. An out-of-bounds read vuln | |
| CVE-2026-5350 | 8.8 | 0.04% | 1 | 0 | 2026-04-02T18:31:45 | A security flaw has been discovered in Trendnet TEW-657BRM 1.00.1. The impacted | |
| CVE-2026-25212 | 10.0 | 0.04% | 1 | 0 | 2026-04-02T18:31:45 | An issue was discovered in Percona PMM before 3.7. Because an internal database | |
| CVE-2026-35385 | 7.5 | 0.04% | 2 | 0 | 2026-04-02T18:31:45 | In OpenSSH before 10.3, a file downloaded by scp may be installed setuid or setg | |
| CVE-2026-35386 | 3.6 | 0.01% | 1 | 0 | 2026-04-02T18:31:45 | In OpenSSH before 10.3, command execution can occur via shell metacharacters in | |
| CVE-2026-35387 | 3.1 | 0.03% | 1 | 0 | 2026-04-02T18:31:45 | OpenSSH before 10.3 can use unintended ECDSA algorithms. Listing of any ECDSA al | |
| CVE-2026-3502 | 7.8 | 1.32% | 5 | 2 | 2026-04-02T18:31:37 | TrueConf Client downloads application update code and applies it without perform | |
| CVE-2026-34791 | 8.8 | 0.24% | 1 | 0 | 2026-04-02T15:31:54 | Endian Firewall version 3.3.25 and prior allow authenticated users to execute ar | |
| CVE-2026-34797 | 8.8 | 0.24% | 1 | 0 | 2026-04-02T15:31:54 | Endian Firewall version 3.3.25 and prior allow authenticated users to execute ar | |
| CVE-2026-34794 | 8.8 | 0.24% | 2 | 0 | 2026-04-02T15:31:49 | Endian Firewall version 3.3.25 and prior allow authenticated users to execute ar | |
| CVE-2026-34796 | 8.8 | 0.24% | 2 | 0 | 2026-04-02T15:31:49 | Endian Firewall version 3.3.25 and prior allow authenticated users to execute ar | |
| CVE-2026-34795 | 8.8 | 0.24% | 1 | 0 | 2026-04-02T15:31:49 | Endian Firewall version 3.3.25 and prior allow authenticated users to execute ar | |
| CVE-2026-2701 | 9.1 | 0.19% | 8 | 0 | 2026-04-02T15:31:41 | Authenticated user can upload a malicious file to the server and execute it, whi | |
| CVE-2026-26928 | None | 0.02% | 1 | 0 | 2026-04-02T15:31:40 | SzafirHost downloads necessary files in the context of the initiating web page. | |
| CVE-2026-33613 | 7.2 | 0.12% | 1 | 0 | 2026-04-02T12:31:13 | Due to the improper neutralisation of special elements used in an OS command, a | |
| CVE-2026-33617 | 5.3 | 0.03% | 1 | 0 | 2026-04-02T12:31:13 | An unauthenticated remote attacker can access a configuration file containing da | |
| CVE-2026-33616 | 7.5 | 0.05% | 1 | 0 | 2026-04-02T12:31:13 | An unauthenticated remote attacker can exploit an unauthenticated blind SQL Inje | |
| CVE-2026-33614 | 7.5 | 0.05% | 1 | 0 | 2026-04-02T12:31:13 | An unauthenticated remote attacker can exploit an unauthenticated SQL Injection | |
| CVE-2026-34953 | 9.1 | 0.03% | 3 | 0 | 2026-04-01T23:29:02 | ### Summary `OAuthManager.validate_token()` returns `True` for any token not fo | |
| CVE-2026-34936 | 7.7 | 0.03% | 2 | 0 | 2026-04-01T23:21:46 | ### Summary `passthrough()` and `apassthrough()` in `praisonai` accept a caller | |
| CVE-2026-34934 | 9.8 | 0.05% | 4 | 0 | 2026-04-01T23:20:34 | ## Summary The `get_all_user_threads` function constructs raw SQL queries using | |
| CVE-2026-34935 | 9.8 | 0.08% | 4 | 0 | 2026-04-01T23:20:01 | ### Summary The `--mcp` CLI argument is passed directly to `shlex.split()` and | |
| CVE-2026-34937 | 7.8 | 0.03% | 4 | 0 | 2026-04-01T23:18:18 | ### Summary `run_python()` in `praisonai` constructs a shell command string by | |
| CVE-2026-34752 | None | 0.04% | 2 | 0 | 2026-04-01T22:56:12 | ### Summary Sending an email with `__proto__:` as a header name crashes the Har | |
| CVE-2026-34728 | 8.7 | 0.19% | 1 | 0 | 2026-04-01T22:30:33 | ### Summary The `MediaBrowserController::index()` method handles file deletion f | |
| CVE-2026-34725 | 8.3 | 0.02% | 1 | 0 | 2026-04-01T22:19:59 | ### Summary A stored XSS vulnerability exists in DbGate because attacker-control | |
| CVE-2026-34567 | 9.1 | 0.05% | 1 | 0 | 2026-04-01T22:06:53 | # Summary ### **Vulnerability: Blogs Posts (Categories) Full Account Takeover | |
| CVE-2026-34565 | 9.1 | 0.05% | 1 | 0 | 2026-04-01T22:05:48 | ## Summary ### **Vulnerability: Stored DOM XSS via Posts Added to Menu (Persiste | |
| CVE-2026-34524 | 8.3 | 0.05% | 1 | 0 | 2026-04-01T21:41:50 | ## Summary A Path Traversal vulnerability in chat endpoints allows an authentica | |
| CVE-2026-4828 | 8.2 | 0.04% | 1 | 0 | 2026-04-01T21:31:35 | Improper authentication in the OAuth login functionality in Devolutions Server 2 | |
| CVE-2026-30292 | 8.4 | 0.01% | 1 | 0 | 2026-04-01T21:31:34 | An arbitrary file overwrite vulnerability in Docudepot PDF Reader: PDF Viewer AP | |
| CVE-2026-4924 | 8.2 | 0.04% | 1 | 0 | 2026-04-01T21:31:34 | Improper authentication in the two-factor authentication (2FA) feature in Devo | |
| CVE-2026-30643 | 9.8 | 0.08% | 1 | 0 | 2026-04-01T21:30:30 | An issue was discovered in DedeCMS 5.7.118 allowing attackers to execute code vi | |
| CVE-2026-30291 | 8.4 | 0.01% | 1 | 0 | 2026-04-01T21:30:29 | An arbitrary file overwrite vulnerability in Ora Tools PDF Reader ' Reader & Edi | |
| CVE-2026-5281 | 8.8 | 3.03% | 10 | 1 | 2026-04-01T21:30:28 | Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote | |
| CVE-2026-34581 | 8.1 | 0.03% | 1 | 0 | 2026-04-01T20:58:51 | ### Summary When using the `Share Token` it is possible to bypass the limited se | |
| CVE-2026-34222 | 7.7 | 0.01% | 1 | 0 | 2026-04-01T20:25:50 | # Summary ## Broken Access Control in Tool Valves Open WebUI supports function | |
| CVE-2026-28805 | 8.8 | 0.03% | 2 | 0 | 2026-04-01T19:46:02 | ## Description Multiple AJAX select handlers in OpenSTAManager <= 2.10.1 are vu | |
| CVE-2026-33579 | 8.1 | 0.01% | 15 | 1 | 2026-04-01T19:07:04.223000 | OpenClaw before 2026.3.28 contains a privilege escalation vulnerability in the / | |
| CVE-2026-30289 | 8.4 | 0.01% | 1 | 0 | 2026-04-01T18:37:42 | An arbitrary file overwrite vulnerability in Tinybeans Private Family Album App | |
| CVE-2026-20094 | 8.8 | 0.35% | 1 | 0 | 2026-04-01T18:37:00 | A vulnerability in the web-based management interface of Cisco IMC could allow a | |
| CVE-2026-20093 | 9.8 | 0.03% | 2 | 0 | 2026-04-01T18:36:52 | A vulnerability in the change password functionality of Cisco Integrated Managem | |
| CVE-2026-5287 | 6.3 | 0.07% | 1 | 0 | 2026-04-01T15:32:17 | Use after free in PDF in Google Chrome prior to 146.0.7680.178 allowed a remote | |
| CVE-2026-4747 | 8.8 | 0.18% | 1 | 0 | 2026-04-01T15:30:57 | Each RPCSEC_GSS data packet is validated by a routine which checks a signature i | |
| CVE-2026-34601 | 7.5 | 0.04% | 1 | 0 | 2026-04-01T00:19:07 | ## Summary `@xmldom/xmldom` allows attacker-controlled strings containing the C | |
| CVE-2026-25726 | 8.1 | 0.04% | 2 | 0 | 2026-03-31T22:31:55 | ### Impact This vulnerability affects **Cloudreve** instances that were **first | |
| CVE-2026-33641 | 7.8 | 0.02% | 1 | 0 | 2026-03-30T17:01:32 | ## Summary Glances supports dynamic configuration values in which substrings enc | |
| CVE-2026-4425 | None | 0.00% | 1 | 0 | 2026-03-30T12:32:36 | Rejected reason: Reserved for EastLink case, but no need for CVE anymore | |
| CVE-2026-4415 | 8.1 | 0.48% | 2 | 0 | 2026-03-30T09:31:38 | Gigabyte Control Center developed by GIGABYTE has an Arbitrary File Write vulner | |
| CVE-2026-21536 | 9.8 | 0.40% | 1 | 0 | 2026-03-16T15:40:44.357000 | Microsoft Devices Pricing Program Remote Code Execution Vulnerability | |
| CVE-2025-55182 | 10.0 | 66.27% | 4 | 100 | template | 2025-12-10T02:00:02.557000 | A pre-authentication remote code execution vulnerability exists in React Server |
| CVE-2025-50286 | 8.1 | 62.34% | 1 | 2 | 2025-08-06T15:31:37 | A Remote Code Execution (RCE) vulnerability in Grav CMS v1.7.48 allows an authen | |
| CVE-2025-30208 | 5.3 | 88.96% | 1 | 23 | template | 2025-03-25T14:00:04 | ### Summary The contents of arbitrary files can be returned to the browser. ### |
| CVE-2026-31933 | 0 | 0.04% | 2 | 0 | N/A | ||
| CVE-2026-26027 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-26026 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-34612 | 0 | 0.14% | 4 | 0 | N/A | ||
| CVE-2026-31932 | 0 | 0.04% | 2 | 0 | N/A | ||
| CVE-2026-35218 | 0 | 0.03% | 2 | 0 | N/A | ||
| CVE-2026-28798 | 0 | 0.04% | 2 | 0 | N/A | ||
| CVE-2026-27833 | 0 | 0.04% | 2 | 0 | N/A | ||
| CVE-2026-33184 | 0 | 0.04% | 2 | 0 | N/A | ||
| CVE-2026-27456 | 0 | 0.01% | 1 | 0 | N/A | ||
| CVE-2026-28289 | 0 | 17.68% | 1 | 1 | N/A | ||
| CVE-2026-34745 | 0 | 0.04% | 2 | 0 | N/A | ||
| CVE-2026-34838 | 0 | 0.45% | 2 | 1 | N/A | ||
| CVE-2025-70951 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2026-31937 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2026-31935 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2026-31934 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2026-34577 | 0 | 0.09% | 1 | 0 | N/A | ||
| CVE-2026-34717 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2026-33645 | 0 | 0.07% | 1 | 0 | N/A | ||
| CVE-2026-34840 | 0 | 0.05% | 1 | 0 | N/A | ||
| CVE-2026-34159 | 0 | 0.13% | 1 | 0 | N/A | ||
| CVE-2026-34072 | 0 | 0.04% | 1 | 0 | N/A |
updated 2026-04-05T13:17:14.707000
2 posts
🟠 CVE-2026-5567 - High (8.8)
A flaw has been found in Tenda M3 1.0.0.10. This vulnerability affects the function setAdvPolicyData of the file /goform/setAdvPolicyData of the component Destination Handler. Executing a manipulation of the argument policyType can lead to buffer ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5567/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-5567 - High (8.8)
A flaw has been found in Tenda M3 1.0.0.10. This vulnerability affects the function setAdvPolicyData of the file /goform/setAdvPolicyData of the component Destination Handler. Executing a manipulation of the argument policyType can lead to buffer ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5567/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-05T13:17:14.520000
2 posts
🟠 CVE-2026-5566 - High (8.8)
A vulnerability was detected in UTT HiPER 1250GW up to 3.2.7-210907-180535. This affects the function strcpy of the file /goform/formNatStaticMap. Performing a manipulation of the argument NatBind results in buffer overflow. Remote exploitation of...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5566/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-5566 - High (8.8)
A vulnerability was detected in UTT HiPER 1250GW up to 3.2.7-210907-180535. This affects the function strcpy of the file /goform/formNatStaticMap. Performing a manipulation of the argument NatBind results in buffer overflow. Remote exploitation of...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5566/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-05T10:16:19.933000
2 posts
⚠️ MEDIUM risk: CVE-2026-5558 allows SQL injection in PHPGurukul Online Shopping Portal (v2.0, 2.1) via /pending-orders.php. Exploit is public. Review your instances & restrict access if needed. Details: https://radar.offseq.com/threat/cve-2026-5558-sql-injection-in-phpgurukul-phpguruk-e94dae7f #OffSeq #SQLInjection #PHP #Vuln
##⚠️ MEDIUM risk: CVE-2026-5558 allows SQL injection in PHPGurukul Online Shopping Portal (v2.0, 2.1) via /pending-orders.php. Exploit is public. Review your instances & restrict access if needed. Details: https://radar.offseq.com/threat/cve-2026-5558-sql-injection-in-phpgurukul-phpguruk-e94dae7f #OffSeq #SQLInjection #PHP #Vuln
##updated 2026-04-05T08:16:25.100000
4 posts
🔎 HIGH severity: Tenda AC10 (v16.03.10.10_multi_TDE01) has a stack buffer overflow (CVE-2026-5550) in /bin/httpd. Remote code execution possible. No patch yet — restrict remote mgmt & monitor closely. https://radar.offseq.com/threat/cve-2026-5550-stack-based-buffer-overflow-in-tenda-a47995aa #OffSeq #infosec #CVE2026_5550
##🟠 CVE-2026-5550 - High (8.8)
A vulnerability was identified in Tenda AC10 16.03.10.10_multi_TDE01. This affects the function fromSysToolChangePwd of the file /bin/httpd. The manipulation leads to stack-based buffer overflow. The attack may be initiated remotely. Multiple endp...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5550/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔎 HIGH severity: Tenda AC10 (v16.03.10.10_multi_TDE01) has a stack buffer overflow (CVE-2026-5550) in /bin/httpd. Remote code execution possible. No patch yet — restrict remote mgmt & monitor closely. https://radar.offseq.com/threat/cve-2026-5550-stack-based-buffer-overflow-in-tenda-a47995aa #OffSeq #infosec #CVE2026_5550
##🟠 CVE-2026-5550 - High (8.8)
A vulnerability was identified in Tenda AC10 16.03.10.10_multi_TDE01. This affects the function fromSysToolChangePwd of the file /bin/httpd. The manipulation leads to stack-based buffer overflow. The attack may be initiated remotely. Multiple endp...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5550/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-05T08:16:24.650000
2 posts
🟠 CVE-2026-5548 - High (8.8)
A vulnerability was found in Tenda AC10 16.03.10.10_multi_TDE01. Affected by this vulnerability is the function fromSysToolChangePwd of the file /bin/httpd. Performing a manipulation of the argument sys.userpass results in stack-based buffer overf...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5548/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-5548 - High (8.8)
A vulnerability was found in Tenda AC10 16.03.10.10_multi_TDE01. Affected by this vulnerability is the function fromSysToolChangePwd of the file /bin/httpd. Performing a manipulation of the argument sys.userpass results in stack-based buffer overf...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5548/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-05T06:32:08
4 posts
🟠 CVE-2026-5544 - High (8.8)
A security flaw has been discovered in UTT HiPER 1250GW up to 3.2.7-210907-180535. The impacted element is an unknown function of the file /goform/formRemoteControl. The manipulation of the argument Profile results in stack-based buffer overflow. ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5544/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔎 CVE-2026-5544: HIGH severity stack overflow in UTT HiPER 1250GW (≤ v3.2.7-210907-180535). Remote, no auth needed. Public exploit code available — restrict network access & monitor vendor alerts. https://radar.offseq.com/threat/cve-2026-5544-stack-based-buffer-overflow-in-utt-h-45d31ae5 #OffSeq #Vulnerability #CyberSecurity #UTT
##🟠 CVE-2026-5544 - High (8.8)
A security flaw has been discovered in UTT HiPER 1250GW up to 3.2.7-210907-180535. The impacted element is an unknown function of the file /goform/formRemoteControl. The manipulation of the argument Profile results in stack-based buffer overflow. ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5544/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔎 CVE-2026-5544: HIGH severity stack overflow in UTT HiPER 1250GW (≤ v3.2.7-210907-180535). Remote, no auth needed. Public exploit code available — restrict network access & monitor vendor alerts. https://radar.offseq.com/threat/cve-2026-5544-stack-based-buffer-overflow-in-utt-h-45d31ae5 #OffSeq #Vulnerability #CyberSecurity #UTT
##updated 2026-04-04T12:31:10
4 posts
CVE-2026-1233 (HIGH): The Text to Speech for WP plugin (<=1.9.8) exposes hardcoded MySQL creds, risking unauthorized write access to telemetry DB. No patch yet — disable or restrict access. https://radar.offseq.com/threat/cve-2026-1233-cwe-798-use-of-hard-coded-credential-6c6e620c #OffSeq #WordPress #InfoSec #CVE
##🟠 CVE-2026-1233 - High (7.5)
The Text to Speech for WP (AI Voices by Mementor) plugin for WordPress is vulnerable to sensitive information exposure in all versions up to, and including, 1.9.8. This is due to the plugin containing hardcoded MySQL database credentials for the v...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1233/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##CVE-2026-1233 (HIGH): The Text to Speech for WP plugin (<=1.9.8) exposes hardcoded MySQL creds, risking unauthorized write access to telemetry DB. No patch yet — disable or restrict access. https://radar.offseq.com/threat/cve-2026-1233-cwe-798-use-of-hard-coded-credential-6c6e620c #OffSeq #WordPress #InfoSec #CVE
##🟠 CVE-2026-1233 - High (7.5)
The Text to Speech for WP (AI Voices by Mementor) plugin for WordPress is vulnerable to sensitive information exposure in all versions up to, and including, 1.9.8. This is due to the plugin containing hardcoded MySQL database credentials for the v...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1233/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-04T12:31:04
2 posts
⚠️ HIGH severity XSS (CVE-2026-2936) in Visitor Traffic Real Time Statistics WP plugin ≤8.4. Unauth attackers can inject persistent scripts via 'page_title', executed by admins. No patch yet — restrict access or disable plugin. https://radar.offseq.com/threat/cve-2026-2936-cwe-79-improper-neutralization-of-in-422ba84b #OffSeq #WordPress #XSS
##⚠️ HIGH severity XSS (CVE-2026-2936) in Visitor Traffic Real Time Statistics WP plugin ≤8.4. Unauth attackers can inject persistent scripts via 'page_title', executed by admins. No patch yet — restrict access or disable plugin. https://radar.offseq.com/threat/cve-2026-2936-cwe-79-improper-neutralization-of-in-422ba84b #OffSeq #WordPress #XSS
##updated 2026-04-04T12:16:03.390000
4 posts
🟠 CVE-2026-3666 - High (8.8)
The wpForo Forum plugin for WordPress is vulnerable to arbitrary file deletion in all versions up to, and including, 2.4.16. This is due to a missing file name/path validation against path traversal sequences. This makes it possible for authentica...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3666/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##wpForo Forum plugin for WordPress (up to 2.4.16) has a HIGH severity path traversal vuln (CVE-2026-3666) 🛡️. Authenticated users can delete server files. No patch yet — restrict permissions & watch for suspicious deletions. More: https://radar.offseq.com/threat/cve-2026-3666-cwe-22-improper-limitation-of-a-path-8b05d9d8 #OffSeq #WordPress #Infosec
##🟠 CVE-2026-3666 - High (8.8)
The wpForo Forum plugin for WordPress is vulnerable to arbitrary file deletion in all versions up to, and including, 2.4.16. This is due to a missing file name/path validation against path traversal sequences. This makes it possible for authentica...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3666/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##wpForo Forum plugin for WordPress (up to 2.4.16) has a HIGH severity path traversal vuln (CVE-2026-3666) 🛡️. Authenticated users can delete server files. No patch yet — restrict permissions & watch for suspicious deletions. More: https://radar.offseq.com/threat/cve-2026-3666-cwe-22-improper-limitation-of-a-path-8b05d9d8 #OffSeq #WordPress #Infosec
##updated 2026-04-04T09:30:37
2 posts
🚨 HIGH severity: CVE-2026-3445 in ProfilePress plugin lets subscriber-level users bypass paid memberships via missing authorization in process_checkout(). No patch yet. Restrict privileges & monitor activity. Details: https://radar.offseq.com/threat/cve-2026-3445-cwe-862-missing-authorization-in-pro-38b78a54 #OffSeq #WordPress #Vuln
##🚨 HIGH severity: CVE-2026-3445 in ProfilePress plugin lets subscriber-level users bypass paid memberships via missing authorization in process_checkout(). No patch yet. Restrict privileges & monitor activity. Details: https://radar.offseq.com/threat/cve-2026-3445-cwe-862-missing-authorization-in-pro-38b78a54 #OffSeq #WordPress #Vuln
##updated 2026-04-04T09:30:31
2 posts
🟠 CVE-2026-4896 - High (8.1)
The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 6.7.25 via multiple AJAX actions includ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4896/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-4896 - High (8.1)
The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 6.7.25 via multiple AJAX actions includ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4896/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-04T09:16:20.500000
2 posts
⚠️ HIGH severity: Stored XSS (CVE-2026-5425) in trustindex Widgets for Social Photo Feed (≤1.7.9) allows unauthenticated attackers to inject malicious scripts via 'feed_data'. No patch yet — disable plugin. Details: https://radar.offseq.com/threat/cve-2026-5425-cwe-79-improper-neutralization-of-in-1c7aa2af #OffSeq #WordPress #XSS #Vuln
##⚠️ HIGH severity: Stored XSS (CVE-2026-5425) in trustindex Widgets for Social Photo Feed (≤1.7.9) allows unauthenticated attackers to inject malicious scripts via 'feed_data'. No patch yet — disable plugin. Details: https://radar.offseq.com/threat/cve-2026-5425-cwe-79-improper-neutralization-of-in-1c7aa2af #OffSeq #WordPress #XSS #Vuln
##updated 2026-04-04T06:04:59
2 posts
🔴 CVE-2026-35216 - Critical (9)
Budibase is an open-source low-code platform. Prior to version 3.33.4, an unauthenticated attacker can achieve Remote Code Execution (RCE) on the Budibase server by triggering an automation that contains a Bash step via the public webhook endpoint...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35216/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-35216 - Critical (9)
Budibase is an open-source low-code platform. Prior to version 3.33.4, an unauthenticated attacker can achieve Remote Code Execution (RCE) on the Budibase server by triggering an automation that contains a Bash step via the public webhook endpoint...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35216/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-04T06:04:22
2 posts
🟠 CVE-2026-35214 - High (8.7)
Budibase is an open-source low-code platform. Prior to version 3.33.4, the plugin file upload endpoint (POST /api/plugin/upload) passes the user-supplied filename directly to createTempFolder() without sanitizing path traversal sequences. An attac...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35214/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35214 - High (8.7)
Budibase is an open-source low-code platform. Prior to version 3.33.4, the plugin file upload endpoint (POST /api/plugin/upload) passes the user-supplied filename directly to createTempFolder() without sanitizing path traversal sequences. An attac...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35214/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-04T06:00:16
2 posts
🟠 CVE-2026-4636 - High (8.1)
A flaw was found in Keycloak. An authenticated user with the uma_protection role can bypass User-Managed Access (UMA) policy validation. This allows the attacker to include resource identifiers owned by other users in a policy creation request, ev...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4636/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-4636 - High (8.1)
A flaw was found in Keycloak. An authenticated user with the uma_protection role can bypass User-Managed Access (UMA) policy validation. This allows the attacker to include resource identifiers owned by other users in a policy creation request, ev...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4636/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-04T01:16:39.720000
17 posts
2 repos
Fortinet Issues Emergency Hotfix for Actively Exploited FortiClient EMS Zero-Day
Fortinet has released emergency hotfix for an actively exploited critical zero-day vulnerability (CVE-2026-35616) in FortiClient EMS that allows unauthenticated attackers to bypass API security and run arbitrary commands.
**If you use FortiClient EMS versions 7.4.5 or 7.4.6, apply Fortinet's emergency hotfix ASAP. It's being actively exploited andcan give attackers full control of your endpoint management server. While you're at it, check your EMS API logs for any signs of unauthorized access or unusual command execution that might indicate you've already been compromised.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/fortinet-issues-emergency-hotfix-for-actively-exploited-forticlient-ems-zero-day-p-2-q-w-2/gD2P6Ple2L
Recent global developments on April 4, 2026:
Geopolitical: Trump challenges NATO's future over "Operation Epic Fury" participation; US-Iran conflict ongoing, Planet Labs withholds satellite images.
Technology: AI breakthroughs include Google DeepMind's Alpha Green for code optimization & OpenAI's GPT-6 on smartphones. Green compute initiatives accelerate.
Cybersecurity: Fortinet zero-day (CVE-2026-35616) exploited; EC suffers Trivy supply chain breach. New polymorphic malware & AI-generated bot threats emerge.
Fortinet CVE-2026-35616 Actively Exploited - Decipher
https://decipher.sc/2026/04/04/fortinet-cve-2026-35616-actively-exploited/
Read on HackerWorkspace: https://hackerworkspace.com/article/fortinet-cve-2026-35616-actively-exploited-decipher
##Geopolitical tensions escalate as the Iran War continues, leading to the functional closure of the Strait of Hormuz, severely impacting global energy markets. In cybersecurity, the European Commission confirmed a 300GB data breach on April 4, 2026, stemming from a Trivy supply chain attack. Additionally, critical RCE flaws in Progress ShareFile were reported on April 3, 2026, and an actively exploited FortiClient EMS zero-day (CVE-2026-35616) necessitated urgent hotfixes on April 4, 2026.
##🔴 New security advisory:
CVE-2026-35616 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-35616-forticlientems-rce
FortiYikes at it again..
🔐 CVE-2026-35616
📊 CVSS: 9.1 · Critical
📅 04/04/2026, 05:31 AM
🛡️ CWE: CWE-284
📦 Affected: Fortinet FortiClientEMS (>= 7.4.5, <= 7.4.6)
📚 https://fortiguard.fortinet.com/psirt/FG-IR-26-099 https://nvd.nist.gov/vuln/detail/CVE-2026-35616
🚨 Forticlient EMS Zero Day disclosed minutes ago actively being exploited in the wild as being report by @DefusedCyber & @fortinet
I've created a vulnerability detection script to check for vulnerable instances:
https://github.com/rxerium/rxerium-templates/blob/main/2026/CVE-2026-35616.yaml
Fortinet recommends that you install hotfixes for EMS 7.4.5 / 7.4.6 as per their advisory:
https://www.fortiguard.com/psirt/FG-IR-26-099
🚨 CRITICAL: CVE-2026-35616 affects Fortinet FortiClientEMS 7.4.5 – 7.4.6. Unauthenticated attackers can run code via crafted requests — leading to total system compromise. Official fix is out. Patch ASAP! https://radar.offseq.com/threat/cve-2026-35616-escalation-of-privilege-in-fortinet-1f903372 #OffSeq #Fortinet #Vuln #PatchTuesday
##🔴 CVE-2026-35616 - Critical (9.8)
A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35616/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Fortinet Issues Emergency Hotfix for Actively Exploited FortiClient EMS Zero-Day
Fortinet has released emergency hotfix for an actively exploited critical zero-day vulnerability (CVE-2026-35616) in FortiClient EMS that allows unauthenticated attackers to bypass API security and run arbitrary commands.
**If you use FortiClient EMS versions 7.4.5 or 7.4.6, apply Fortinet's emergency hotfix ASAP. It's being actively exploited andcan give attackers full control of your endpoint management server. While you're at it, check your EMS API logs for any signs of unauthorized access or unusual command execution that might indicate you've already been compromised.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/fortinet-issues-emergency-hotfix-for-actively-exploited-forticlient-ems-zero-day-p-2-q-w-2/gD2P6Ple2L
Recent global developments on April 4, 2026:
Geopolitical: Trump challenges NATO's future over "Operation Epic Fury" participation; US-Iran conflict ongoing, Planet Labs withholds satellite images.
Technology: AI breakthroughs include Google DeepMind's Alpha Green for code optimization & OpenAI's GPT-6 on smartphones. Green compute initiatives accelerate.
Cybersecurity: Fortinet zero-day (CVE-2026-35616) exploited; EC suffers Trivy supply chain breach. New polymorphic malware & AI-generated bot threats emerge.
Fortinet CVE-2026-35616 Actively Exploited - Decipher
https://decipher.sc/2026/04/04/fortinet-cve-2026-35616-actively-exploited/
Read on HackerWorkspace: https://hackerworkspace.com/article/fortinet-cve-2026-35616-actively-exploited-decipher
##Geopolitical tensions escalate as the Iran War continues, leading to the functional closure of the Strait of Hormuz, severely impacting global energy markets. In cybersecurity, the European Commission confirmed a 300GB data breach on April 4, 2026, stemming from a Trivy supply chain attack. Additionally, critical RCE flaws in Progress ShareFile were reported on April 3, 2026, and an actively exploited FortiClient EMS zero-day (CVE-2026-35616) necessitated urgent hotfixes on April 4, 2026.
##FortiYikes at it again..
🔐 CVE-2026-35616
📊 CVSS: 9.1 · Critical
📅 04/04/2026, 05:31 AM
🛡️ CWE: CWE-284
📦 Affected: Fortinet FortiClientEMS (>= 7.4.5, <= 7.4.6)
📚 https://fortiguard.fortinet.com/psirt/FG-IR-26-099 https://nvd.nist.gov/vuln/detail/CVE-2026-35616
🚨 Forticlient EMS Zero Day disclosed minutes ago actively being exploited in the wild as being report by @DefusedCyber & @fortinet
I've created a vulnerability detection script to check for vulnerable instances:
https://github.com/rxerium/rxerium-templates/blob/main/2026/CVE-2026-35616.yaml
Fortinet recommends that you install hotfixes for EMS 7.4.5 / 7.4.6 as per their advisory:
https://www.fortiguard.com/psirt/FG-IR-26-099
🚨 CRITICAL: CVE-2026-35616 affects Fortinet FortiClientEMS 7.4.5 – 7.4.6. Unauthenticated attackers can run code via crafted requests — leading to total system compromise. Official fix is out. Patch ASAP! https://radar.offseq.com/threat/cve-2026-35616-escalation-of-privilege-in-fortinet-1f903372 #OffSeq #Fortinet #Vuln #PatchTuesday
##🔴 CVE-2026-35616 - Critical (9.8)
A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35616/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-04T00:31:26
1 posts
🟠 CVE-2025-15620 - High (8.6)
HiOS Switch Platform versions 09.1.00 prior to 09.4.05 and 10.3.01 contains a denial-of-service vulnerability in the web interface that allows remote attackers to reboot the affected device by sending a malicious HTTP GET request to a specific end...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15620/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-04T00:16:19.370000
2 posts
🟠 CVE-2026-34955 - High (8.8)
PraisonAI is a multi-agent teams system. Prior to version 4.5.97, SubprocessSandbox in all modes (BASIC, STRICT, NETWORK_ISOLATED) calls subprocess.run() with shell=True and relies solely on string-pattern matching to block dangerous commands. The...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34955/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34955 - High (8.8)
PraisonAI is a multi-agent teams system. Prior to version 4.5.97, SubprocessSandbox in all modes (BASIC, STRICT, NETWORK_ISOLATED) calls subprocess.run() with shell=True and relies solely on string-pattern matching to block dangerous commands. The...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34955/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-04T00:16:17.980000
2 posts
🟠 CVE-2026-34771 - High (7.5)
Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.0, 40.7.0, and 41.0.0-beta.8, apps that register an asynchronous session.setPermissionRequestHandler() may be vu...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34771/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34771 - High (7.5)
Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.0, 40.7.0, and 41.0.0-beta.8, apps that register an asynchronous session.setPermissionRequestHandler() may be vu...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34771/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T23:17:06.810000
2 posts
🟠 CVE-2026-34954 - High (8.6)
PraisonAI is a multi-agent teams system. Prior to version 1.5.95, FileTools.download_file() in praisonaiagents validates the destination path but performs no validation on the url parameter, passing it directly to httpx.stream() with follow_redire...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34954/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34954 - High (8.6)
PraisonAI is a multi-agent teams system. Prior to version 1.5.95, FileTools.download_file() in praisonaiagents validates the destination path but performs no validation on the url parameter, passing it directly to httpx.stream() with follow_redire...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34954/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T23:17:06.490000
5 posts
⛔ New security advisory:
CVE-2026-34952 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-34952-praisonai-agent-access-flaw
🚨 CVE-2026-34952 (CRITICAL): PraisonAI < 4.5.97 lets unauthenticated users access /ws & /info — enumerate agents & send arbitrary messages. High confidentiality & integrity risk. Patch to 4.5.97+ now! https://radar.offseq.com/threat/cve-2026-34952-cwe-306-missing-authentication-for--4a535aff #OffSeq #PraisonAI #Vuln #Cybersecurity
##🔴 CVE-2026-34952 - Critical (9.1)
PraisonAI is a multi-agent teams system. Prior to version 4.5.97, the PraisonAI Gateway server accepts WebSocket connections at /ws and serves agent topology at /info with no authentication. Any network client can connect, enumerate registered age...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34952/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-34952 (CRITICAL): PraisonAI < 4.5.97 lets unauthenticated users access /ws & /info — enumerate agents & send arbitrary messages. High confidentiality & integrity risk. Patch to 4.5.97+ now! https://radar.offseq.com/threat/cve-2026-34952-cwe-306-missing-authentication-for--4a535aff #OffSeq #PraisonAI #Vuln #Cybersecurity
##🔴 CVE-2026-34952 - Critical (9.1)
PraisonAI is a multi-agent teams system. Prior to version 4.5.97, the PraisonAI Gateway server accepts WebSocket connections at /ws and serves agent topology at /info with no authentication. Any network client can connect, enumerate registered age...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34952/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T23:17:06.170000
5 posts
🔴 New security advisory:
CVE-2026-34938 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-34938-praisonai-critical-rce
🚨 CRITICAL: CVE-2026-34938 in PraisonAI <1.5.90 lets attackers bypass sandbox protections and achieve arbitrary OS command execution. Immediate upgrade to v1.5.90+ required. Full system compromise possible. https://radar.offseq.com/threat/cve-2026-34938-cwe-693-protection-mechanism-failur-01ac669c #OffSeq #CVE202634938 #infosec #PraisonAI
##🔴 CVE-2026-34938 - Critical (10)
PraisonAI is a multi-agent teams system. Prior to version 1.5.90, execute_code() in praisonai-agents runs attacker-controlled Python inside a three-layer sandbox that can be fully bypassed by passing a str subclass with an overridden startswith() ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34938/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL: CVE-2026-34938 in PraisonAI <1.5.90 lets attackers bypass sandbox protections and achieve arbitrary OS command execution. Immediate upgrade to v1.5.90+ required. Full system compromise possible. https://radar.offseq.com/threat/cve-2026-34938-cwe-693-protection-mechanism-failur-01ac669c #OffSeq #CVE202634938 #infosec #PraisonAI
##🔴 CVE-2026-34938 - Critical (10)
PraisonAI is a multi-agent teams system. Prior to version 1.5.90, execute_code() in praisonai-agents runs attacker-controlled Python inside a three-layer sandbox that can be fully bypassed by passing a str subclass with an overridden startswith() ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34938/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T22:16:26.483000
2 posts
🟠 CVE-2026-33175 - High (8.8)
OAuthenticator is software that allows OAuth2 identity providers to be plugged in and used with JupyterHub. Prior to version 17.4.0, an authentication bypass vulnerability in oauthenticator allows an attacker with an unverified email address on an...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33175/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33175 - High (8.8)
OAuthenticator is software that allows OAuth2 identity providers to be plugged in and used with JupyterHub. Prior to version 17.4.0, an authentication bypass vulnerability in oauthenticator allows an attacker with an unverified email address on an...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33175/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T21:54:37
2 posts
🟠 CVE-2026-34824 - High (7.5)
Mesop is a Python-based UI framework that allows users to build web applications. From version 1.2.3 to before version 1.2.5, an uncontrolled resource consumption vulnerability exists in the WebSocket implementation of the Mesop framework. An unau...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34824/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34824 - High (7.5)
Mesop is a Python-based UI framework that allows users to build web applications. From version 1.2.3 to before version 1.2.5, an uncontrolled resource consumption vulnerability exists in the WebSocket implementation of the Mesop framework. An unau...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34824/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T21:37:19
1 posts
🔴 CVE-2026-33950 - Critical (9.4)
Signal K Server is a server application that runs on a central hub in a boat. Prior to version 2.24.0-beta.4, there is a privilege escalation vulnerability by Admin Role Injection via /enableSecurity. An unauthenticated attacker can gain full Admi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33950/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T21:31:49
4 posts
2 repos
🚨 CVE-2026-25197 (CRITICAL): Gardyn Cloud API lets authenticated users access other profiles by tweaking ID in API calls (CWE-639). No patch yet — restrict access & monitor for abuse. Details: https://radar.offseq.com/threat/cve-2026-25197-cwe-639-in-gardyn-cloud-api-0887f9ef #OffSeq #APIsecurity #CVE202625197
##🔴 CVE-2026-25197 - Critical (9.1)
A specific endpoint allows authenticated users to pivot to other user profiles by modifying the id number in the API call.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25197/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-25197 (CRITICAL): Gardyn Cloud API lets authenticated users access other profiles by tweaking ID in API calls (CWE-639). No patch yet — restrict access & monitor for abuse. Details: https://radar.offseq.com/threat/cve-2026-25197-cwe-639-in-gardyn-cloud-api-0887f9ef #OffSeq #APIsecurity #CVE202625197
##🔴 CVE-2026-25197 - Critical (9.1)
A specific endpoint allows authenticated users to pivot to other user profiles by modifying the id number in the API call.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25197/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T21:31:49
2 posts
2 repos
🟠 CVE-2025-10681 - High (8.6)
Storage credentials are hardcoded in the mobile app and device firmware. These credentials do not adequately limit end user permissions and do not expire within a reasonable amount of time. This vulnerability may grant unauthorized access to produ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-10681/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-10681 - High (8.6)
Storage credentials are hardcoded in the mobile app and device firmware. These credentials do not adequately limit end user permissions and do not expire within a reasonable amount of time. This vulnerability may grant unauthorized access to produ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-10681/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T21:31:49
2 posts
🟠 CVE-2026-22665 - High (8.1)
prompts.chat prior to commit 1464475 contains an identity confusion vulnerability due to inconsistent case-sensitive and case-insensitive handling of usernames across write and read paths, allowing attackers to create case-variant usernames that b...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22665/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-22665 - High (8.1)
prompts.chat prior to commit 1464475 contains an identity confusion vulnerability due to inconsistent case-sensitive and case-insensitive handling of usernames across write and read paths, allowing attackers to create case-variant usernames that b...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22665/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T21:31:49
2 posts
2 repos
🔴 CVE-2026-28766 - Critical (9.3)
A specific endpoint exposes all user account information for registered Gardyn users without requiring authentication.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28766/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-28766 - Critical (9.3)
A specific endpoint exposes all user account information for registered Gardyn users without requiring authentication.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28766/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T21:31:49
2 posts
🟠 CVE-2026-35558 - High (7.8)
Improper neutralization of special elements in the authentication components in Amazon Athena ODBC driver before 2.1.0.0 might allow a threat actor to execute arbitrary code or redirect authentication flows by using specially crafted connection pa...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35558/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35558 - High (7.8)
Improper neutralization of special elements in the authentication components in Amazon Athena ODBC driver before 2.1.0.0 might allow a threat actor to execute arbitrary code or redirect authentication flows by using specially crafted connection pa...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35558/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T21:31:49
2 posts
2 repos
🟠 CVE-2026-32646 - High (7.5)
A specific administrative endpoint is accessible without proper authentication, exposing device management functions.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32646/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-32646 - High (7.5)
A specific administrative endpoint is accessible without proper authentication, exposing device management functions.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32646/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T21:31:49
2 posts
🟠 CVE-2026-35562 - High (7.5)
Allocation of resources without limits in the parsing components in Amazon Athena ODBC driver before 2.1.0.0 might allow a threat actor to cause a denial of service by delivering crafted input that triggers excessive resource consumption during th...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35562/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35562 - High (7.5)
Allocation of resources without limits in the parsing components in Amazon Athena ODBC driver before 2.1.0.0 might allow a threat actor to cause a denial of service by delivering crafted input that triggers excessive resource consumption during th...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35562/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T21:31:48
2 posts
🟠 CVE-2026-22664 - High (7.7)
prompts.chat prior to commit 30a8f04 contains a server-side request forgery vulnerability in Fal.ai media status polling that allows authenticated users to perform arbitrary outbound requests by supplying attacker-controlled URLs in the token para...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22664/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-22664 - High (7.7)
prompts.chat prior to commit 30a8f04 contains a server-side request forgery vulnerability in Fal.ai media status polling that allows authenticated users to perform arbitrary outbound requests by supplying attacker-controlled URLs in the token para...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22664/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T21:17:12.603000
2 posts
🟠 CVE-2026-5485 - High (7.8)
OS command injection in the browser-based authentication component in Amazon Athena ODBC driver before 2.0.5.1 on Linux might allow a threat actor to execute arbitrary code by using specially crafted connection parameters that are loaded by the dr...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5485/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-5485 - High (7.8)
OS command injection in the browser-based authentication component in Amazon Athena ODBC driver before 2.0.5.1 on Linux might allow a threat actor to execute arbitrary code by using specially crafted connection parameters that are loaded by the dr...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5485/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T21:17:09.337000
2 posts
🟠 CVE-2026-22663 - High (7.5)
prompts.chat prior to commit 7b81836 contains multiple authorization bypass vulnerabilities due to missing isPrivate checks across API endpoints and page metadata generation that allow unauthorized users to access sensitive data associated with pr...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22663/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-22663 - High (7.5)
prompts.chat prior to commit 7b81836 contains multiple authorization bypass vulnerabilities due to missing isPrivate checks across API endpoints and page metadata generation that allow unauthorized users to access sensitive data associated with pr...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22663/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T21:17:08.970000
2 posts
🟠 CVE-2026-22661 - High (8.1)
prompts.chat prior to commit 0f8d4c3 contains a path traversal vulnerability in skill file handling that allows attackers to write arbitrary files to the client system by crafting malicious ZIP archives with unsanitized filenames containing path t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22661/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-22661 - High (8.1)
prompts.chat prior to commit 0f8d4c3 contains a path traversal vulnerability in skill file handling that allows attackers to write arbitrary files to the client system by crafting malicious ZIP archives with unsanitized filenames containing path t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22661/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T19:52:26.097000
1 posts
🔴 CVE-2026-34758 - Critical (9.1)
OneUptime is an open-source monitoring and observability platform. Prior to version 10.0.42, unauthenticated access to Notification test and Phone Number management endpoints allows SMS/Call/Email/WhatsApp abuse and phone number purchase. This iss...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34758/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T19:48:25.627000
2 posts
🟠 CVE-2026-34742 - High (8.1)
The Go MCP SDK used Go's standard encoding/json. Prior to version 1.4.0, the Model Context Protocol (MCP) Go SDK does not enable DNS rebinding protection by default for HTTP-based servers. When an HTTP-based MCP server is run on localhost without ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34742/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34742 - High (8.1)
The Go MCP SDK used Go's standard encoding/json. Prior to version 1.4.0, the Model Context Protocol (MCP) Go SDK does not enable DNS rebinding protection by default for HTTP-based servers. When an HTTP-based MCP server is run on localhost without ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34742/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T18:31:21
2 posts
🟠 CVE-2025-59711 - High (8.3)
An issue was discovered in Biztalk360 before 11.5. Because of mishandling of user-provided input in an upload mechanism, an authenticated attacker is able to write files outside of the destination directory and/or coerce an authentication from the...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-59711/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-59711 - High (8.3)
An issue was discovered in Biztalk360 before 11.5. Because of mishandling of user-provided input in an upload mechanism, an authenticated attacker is able to write files outside of the destination directory and/or coerce an authentication from the...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-59711/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T18:31:21
2 posts
🟠 CVE-2026-26477 - High (7.5)
An issue in Dokuwiki v.2025-05-14b 'Librarian' allows a remote attacker to cause a denial of service via the media_upload_xhr() function in the media.php file
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26477/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-26477 - High (7.5)
An issue in Dokuwiki v.2025-05-14b 'Librarian' allows a remote attacker to cause a denial of service via the media_upload_xhr() function in the media.php file
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26477/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T18:31:17
2 posts
🟠 CVE-2025-43202 - High (8.8)
This issue was addressed with improved memory handling. This issue is fixed in iOS 18.6 and iPadOS 18.6, macOS Sequoia 15.6. Processing a file may lead to memory corruption.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-43202/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-43202 - High (8.8)
This issue was addressed with improved memory handling. This issue is fixed in iOS 18.6 and iPadOS 18.6, macOS Sequoia 15.6. Processing a file may lead to memory corruption.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-43202/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T18:31:17
1 posts
🟠 CVE-2025-43219 - High (8.8)
The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.6. Processing a maliciously crafted image may corrupt process memory.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-43219/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T18:16:24.323000
3 posts
🔴 New security advisory:
CVE-2026-28373 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-28373-stackfield-desktop-app-path-traversal
🔴 CVE-2026-28373 - Critical (9.6)
The Stackfield Desktop App before 1.10.2 for macOS and Windows contains a path traversal vulnerability in certain decryption functionality when processing the filePath property. A malicious export can write arbitrary content to any path on the vic...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28373/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-28373 - Critical (9.6)
The Stackfield Desktop App before 1.10.2 for macOS and Windows contains a path traversal vulnerability in certain decryption functionality when processing the filePath property. A malicious export can write arbitrary content to any path on the vic...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28373/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T18:16:21.540000
2 posts
🔴 CVE-2026-0545 - Critical (9.1)
In mlflow/mlflow, the FastAPI job endpoints under `/ajax-api/3.0/jobs/*` are not protected by authentication or authorization when the `basic-auth` app is enabled. This vulnerability affects the latest version of the repository. If job execution i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0545/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-0545 - Critical (9.1)
In mlflow/mlflow, the FastAPI job endpoints under `/ajax-api/3.0/jobs/*` are not protected by authentication or authorization when the `basic-auth` app is enabled. This vulnerability affects the latest version of the repository. If job execution i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0545/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T17:57:19.197000
1 posts
🟠 CVE-2025-43257 - High (8.7)
This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Sequoia 15.6. An app may be able to break out of its sandbox.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-43257/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T16:16:39.800000
2 posts
🔴 CVE-2026-31818 - Critical (9.6)
Budibase is an open-source low-code platform. Prior to version 3.33.4, a server-side request forgery (SSRF) vulnerability exists in Budibase's REST datasource connector. The platform's SSRF protection mechanism (IP blacklist) is rendered completel...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-31818/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-31818 - Critical (9.6)
Budibase is an open-source low-code platform. Prior to version 3.33.4, a server-side request forgery (SSRF) vulnerability exists in Budibase's REST datasource connector. The platform's SSRF protection mechanism (IP blacklist) is rendered completel...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-31818/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T16:11:11.357000
2 posts
Critical Cisco Smart Software Manager Vulnerability Allows Root Command Execution
Cisco patched a critical unauthenticated remote code execution vulnerability (CVE-2026-20160) in its Smart Software Manager On-Prem platform that allows attackers to gain root access. The flaw is caused by an exposed internal API and requires no user interaction to exploit.
**Treat this Cisco SSM update as an emergency priority because it allows full root access without a password and has no available workarounds. First, make sure the SSM is isolated from the internet and accessible only from trusted networks. Even with that, patch ASAP. Since license managers often have broad network reach, a compromise here provides attackers an ideal platform for lateral movement across your entire infrastructure.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-cisco-smart-software-manager-vulnerability-allows-root-command-execution-5-h-v-c-1/gD2P6Ple2L
🔴 CVE-2026-20160 - Critical (9.8)
A vulnerability in Cisco Smart Software Manager On-Prem (SSM On-Prem) could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected SSM On-Prem host.
This vulnerability is due to...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20160/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T16:11:11.357000
1 posts
🔴 CVE-2026-31027 - Critical (9.8)
TOTOlink A3600R v5.9c.4959 contains a buffer overflow vulnerability in the setAppEasyWizardConfig interface of /lib/cste_modules/app.so. The vulnerability occurs because the rootSsid parameter is not properly validated for length, allowing remote ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-31027/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T16:11:11.357000
2 posts
🟠 CVE-2026-20155 - High (8)
A vulnerability in the web-based management interface of Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker with low privileges to access sensitive information that they are not authorized to access.
...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20155/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-20155 - High (8)
A vulnerability in the web-based management interface of Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker with low privileges to access sensitive information that they are not authorized to access.
...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20155/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T16:10:52.680000
2 posts
🟠 CVE-2026-4634 - High (7.5)
A flaw was found in Keycloak. An unauthenticated attacker can exploit this vulnerability by sending a specially crafted POST request with an excessively long scope parameter to the OpenID Connect (OIDC) token endpoint. This leads to high resource ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4634/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-4634 - High (7.5)
A flaw was found in Keycloak. An unauthenticated attacker can exploit this vulnerability by sending a specially crafted POST request with an excessively long scope parameter to the OpenID Connect (OIDC) token endpoint. This leads to high resource ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4634/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T16:10:52.680000
8 posts
1 repos
https://github.com/watchtowrlabs/watchTowr-vs-Progress-ShareFile-CVE-2026-2699
🔴 CVE-2026-2699 - Critical (9.8)
Customer Managed ShareFile Storage Zones Controller (SZC) allows an unauthenticated attacker to access restricted configuration pages. This leads to changing system configuration and potential remote code execution.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2699/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Progress Software Patches Critical RCE Chain in ShareFile Storage Zones Controller
Progress Software patched two critical vulnerabilities (CVE-2026-2699 and CVE-2026-2701) in ShareFile Storage Zones Controller that allow unauthenticated attackers to bypass authentication and execute remote code.
**If you manage your own ShareFile storage zones, update to version 5.12.4 or move to version 6 to prevent full system takeover. File transfer tools are high-value targets for ransomware groups, so treat this patch as a top priority. If you can't patch, isolate the instances until they are patched. General isolation doesn't work since these systems are designed to be accessible from the public internet.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/progress-software-patches-critical-rce-chain-in-sharefile-storage-zones-controller-6-f-a-f-n/gD2P6Ple2L
🔴 CVE-2026-2699 - Critical (9.8)
Customer Managed ShareFile Storage Zones Controller (SZC) allows an unauthenticated attacker to access restricted configuration pages. This leads to changing system configuration and potential remote code execution.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2699/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Progress Software Patches Critical RCE Chain in ShareFile Storage Zones Controller
Progress Software patched two critical vulnerabilities (CVE-2026-2699 and CVE-2026-2701) in ShareFile Storage Zones Controller that allow unauthenticated attackers to bypass authentication and execute remote code.
**If you manage your own ShareFile storage zones, update to version 5.12.4 or move to version 6 to prevent full system takeover. File transfer tools are high-value targets for ransomware groups, so treat this patch as a top priority. If you can't patch, isolate the instances until they are patched. General isolation doesn't work since these systems are designed to be accessible from the public internet.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/progress-software-patches-critical-rce-chain-in-sharefile-storage-zones-controller-6-f-a-f-n/gD2P6Ple2L
New.
WatchTower: You’re Not Supposed To ShareFile With Everyone (Progress ShareFile Pre-Auth RCE Chain CVE-2026-2699 & CVE-2026-2701) https://labs.watchtowr.com/youre-not-supposed-to-sharefile-with-everyone-progress-sharefile-pre-auth-rce-chain-cve-2026-2699-cve-2026-2701/
Recorded Future: Latin America and the Caribbean Cybercrime Landscape https://www.recordedfuture.com/research/latin-america-and-the-caribbean-cybercrime-landscape
Mandiant: vSphere and BRICKSTORM Malware: A Defender's Guide https://cloud.google.com/blog/topics/threat-intelligence/vsphere-brickstorm-defender-guide
Cisco: UAT-10608: Inside a large-scale automated credential harvesting operation targeting web applications https://blog.talosintelligence.com/uat-10608-inside-a-large-scale-automated-credential-harvesting-operation-targeting-web-applications/
Threat Fabric: The Malware Gap: Why Fraud & Security Controls Still Miss Mobile Malware https://www.threatfabric.com/blogs/the-malware-gap-why-fraud-security-controls-still-miss-mobile-malware
Abnormal Security: Meet VENOM: The PhaaS Platform That Neutralizes MFA https://abnormal.ai/blog/venom-phishing-campaign-mfa-credential-theft
From yesterday:
Zscaler: Anthropic Claude Code Leak https://www.zscaler.com/blogs/security-research/anthropic-claude-code-leak #infosec #threatresearch #vulnerability #malware #threatintel #threatintelligence
##You’re Not Supposed To ShareFile With Everyone (Progress ShareFile Pre-Auth RCE Chain CVE-2026-2699 and CVE-2026-2701) https://labs.watchtowr.com/youre-not-supposed-to-sharefile-with-everyone-progress-sharefile-pre-auth-rce-chain-cve-2026-2699-cve-2026-2701/
##You’re Not Supposed To ShareFile With Everyone (Progress ShareFile Pre-Auth RCE Chain CVE-2026-2699 & CVE-2026-2701)
#CVE_2026_2699 #CVE_2026_2701
https://labs.watchtowr.com/youre-not-supposed-to-sharefile-with-everyone-progress-sharefile-pre-auth-rce-chain-cve-2026-2699-cve-2026-2701/
You’re Not Supposed To ShareFile With Everyone (Progress ShareFile Pre-Auth RCE Chain CVE-2026-2699 & CVE-2026-2701) - watchTowr Labs https://labs.watchtowr.com/youre-not-supposed-to-sharefile-with-everyone-progress-sharefile-pre-auth-rce-chain-cve-2026-2699-cve-2026-2701/
##updated 2026-04-03T16:10:52.680000
2 posts
🟠 CVE-2026-31931 - High (7.5)
Suricata is a network IDS, IPS and NSM engine. From version 8.0.0 to before version 8.0.4, use of the "tls.alpn" rule keyword can cause Suricata to crash with a NULL dereference. This issue has been patched in version 8.0.4.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-31931/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-31931 - High (7.5)
Suricata is a network IDS, IPS and NSM engine. From version 8.0.0 to before version 8.0.4, use of the "tls.alpn" rule keyword can cause Suricata to crash with a NULL dereference. This issue has been patched in version 8.0.4.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-31931/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T16:10:52.680000
1 posts
🟠 CVE-2026-33544 - High (7.7)
Tinyauth is an authentication and authorization server. Prior to version 5.0.5, all three OAuth service implementations (GenericOAuthService, GithubOAuthService, GoogleOAuthService) store PKCE verifiers and access tokens as mutable struct fields o...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33544/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T16:10:52.680000
2 posts
🟠 CVE-2026-34792 - High (8.8)
Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_clamav.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call,...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34792/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34792 - High (8.8)
Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_clamav.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call,...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34792/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T16:10:52.680000
1 posts
🟠 CVE-2026-34793 - High (8.8)
Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_firewall.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() cal...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34793/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T16:10:52.680000
1 posts
🚨 CVE-2026-34564 (CRITICAL, CVSS 9.1): ci4ms < 0.31.0.0 vulnerable to stored XSS via Menu Management. Low-priv attackers can inject scripts, impacting admins & users. Patch & audit menus now. https://radar.offseq.com/threat/cve-2026-34564-cwe-79-improper-neutralization-of-i-8f6e6ad8 #OffSeq #XSS #infosec #vuln
##updated 2026-04-03T16:10:52.680000
1 posts
#OT #Advisory VDE-2026-030
MB connect line: Multiple Vulnerabilities in mbCONNECT24/mymbCONNECT24
Multiple vulnerabilities have been discovered in MB connect line mbCONNECT24/mymbCONNECT24 that could allow RCE, SQLi or information leakage.
#CVE CVE-2026-33615, CVE-2026-33616, CVE-2026-33614, CVE-2026-33613, CVE-2026-33617
https://certvde.com/en/advisories/vde-2026-030/
#CSAF https://mbconnectline.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2026-030.json
##updated 2026-04-03T16:10:52.680000
1 posts
🚨 CVE-2026-34566: Critical stored XSS (CVSS 9.1) in ci4ms < 0.31.0.0. Attackers can inject persistent JS via Page Management, impacting admins & users. Upgrade to 0.31.0.0+, audit content, enable CSP. Details: https://radar.offseq.com/threat/cve-2026-34566-cwe-79-improper-neutralization-of-i-937ed996 #OffSeq #XSS #Vuln #Infosec
##updated 2026-04-03T16:10:52.680000
1 posts
🔥 CVE-2026-34568: CRITICAL stored XSS in ci4ms CMS (<0.31.0.0). Authenticated users can inject persistent JS via blog posts, risking session hijack & data theft. Patch ASAP to 0.31.0.0! https://radar.offseq.com/threat/cve-2026-34568-cwe-79-improper-neutralization-of-i-ae5d4369 #OffSeq #XSS #CVE202634568 #infosec
##updated 2026-04-03T16:10:23.730000
2 posts
🟠 CVE-2026-4350 - High (8.1)
The Perfmatters plugin for WordPress is vulnerable to arbitrary file deletion via path traversal in all versions up to, and including, 2.5.9.1. This is due to the `PMCS::action_handler()` method processing the `$_GET['delete']` parameter without a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4350/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-4350 - High (8.1)
The Perfmatters plugin for WordPress is vulnerable to arbitrary file deletion via path traversal in all versions up to, and including, 2.5.9.1. This is due to the `PMCS::action_handler()` method processing the `$_GET['delete']` parameter without a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4350/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T16:10:23.730000
1 posts
XZ Utils 5.8.3 Released to Patch Buffer Overflow and Memory Access Flaws
XZ Utils version 5.8.3 addresses a critical buffer overflow (CVE-2026-34743) and a 32-bit memory access flaw affecting versions 5.0.0 and later. Although developers consider the real-world risk low, security organizations have assigned a CVSS score of 9.8 due to the potential for arbitrary code execution.
**Even if developers claim a bug is hard to hit, a CVSS 9.8 in a core library like XZ requires attention. Plan an update of your Linux distributions and container images now to ensure this foundational component isn't a weak link in your supply chain.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/xz-utils-5-8-3-released-to-patch-buffer-overflow-and-memory-access-flaws-8-i-t-m-h/gD2P6Ple2L
updated 2026-04-03T16:10:23.730000
2 posts
🛑 CRITICAL: CVE-2026-32213 impacts Azure AI Foundry. Improper authorization lets remote attackers fully compromise systems — no auth needed! Restrict access, enhance monitoring, & prep IR now. https://radar.offseq.com/threat/cve-2026-32213-cwe-285-improper-authorization-in-m-b7cd2d00 #OffSeq #Azure #Cloud #Vuln #BlueTeam
##🔴 CVE-2026-32213 - Critical (10)
Improper authorization in Azure AI Foundry allows an unauthorized attacker to elevate privileges over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32213/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T16:10:23.730000
1 posts
🔴 CVE-2026-33746 - Critical (9.8)
Convoy is a KVM server management panel for hosting businesses. From version 3.9.0-beta to before version 4.5.1, the JWTService::decode() method did not verify the cryptographic signature of JWT tokens. While the method configured a symmetric HMAC...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33746/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T16:10:23.730000
1 posts
🟠 CVE-2026-5349 - High (8.8)
A vulnerability was identified in Trendnet TEW-657BRM 1.00.1. The affected element is the function add_apcdb of the file /setup.cgi. The manipulation of the argument mac_pc_dba leads to stack-based buffer overflow. The attack can be initiated remo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5349/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T16:10:23.730000
1 posts
🟠 CVE-2025-65114 - High (7.5)
Apache Traffic Server allows request smuggling if chunked messages are malformed.
This issue affects Apache Traffic Server: from 9.0.0 through 9.2.12, from 10.0.0 through 10.1.1.
Users are recommended to upgrade to version 9.2.13 or 10.1.2, wh...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65114/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T16:10:23.730000
1 posts
🔴 CVE-2026-34877 - Critical (9.8)
An issue was discovered in Mbed TLS versions from 2.19.0 up to 3.6.5, Mbed TLS 4.0.0. Insufficient protection of serialized SSL context or session structures allows an attacker who can modify the serialized structures to induce memory corruption, ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34877/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T16:10:23.730000
1 posts
🟠 CVE-2026-34522 - High (8.1)
SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. Prior to version 1.17.0, a path traversal vulnerability in /api/...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34522/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T16:10:23.730000
1 posts
🟠 CVE-2026-34827 - High (7.5)
Rack is a modular Ruby web server interface. From versions 3.0.0.beta1 to before 3.1.21, and 3.2.0 to before 3.2.6, Rack::Multipart::Parser#handle_mime_head parses quoted multipart parameters such as Content-Disposition: form-data; name="..." usin...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34827/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T16:10:23.730000
1 posts
🟠 CVE-2026-5429 - High (7.8)
Unsanitized input during web page generation in the Kiro Agent webview in Kiro IDE before version 0.8.140 allows a remote unauthenticated threat actor to execute arbitrary code via a potentially damaging crafted color theme name when a local user ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5429/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T16:10:23.730000
1 posts
🟠 CVE-2026-32173 - High (8.6)
Improper authentication in Azure SRE Agent allows an unauthorized attacker to disclose information over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32173/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T16:10:23.730000
1 posts
Anyone have time to look through the vuln fixes for OpenSSH today? I haven't yet because I'm trying not to care about it but there are at least four CVEs apparently.
https://www.openssh.org/txt/release-10.3
CVE-2026-35385
CVE-2026-35386
CVE-2026-35387
CVE-2026-35388
updated 2026-04-03T15:30:39
2 posts
🟠 CVE-2026-25773 - High (8.1)
** UNSUPPORTED WHEN ASSIGNED ** Focalboard version 8.0 fails to sanitize category IDs before incorporating them into dynamic SQL statements when reordering categories. An attacker can inject a malicious SQL payload into the category id field, whic...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25773/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25773 - High (8.1)
** UNSUPPORTED WHEN ASSIGNED ** Focalboard version 8.0 fails to sanitize category IDs before incorporating them into dynamic SQL statements when reordering categories. An attacker can inject a malicious SQL payload into the category id field, whic...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25773/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T15:30:31
2 posts
🟠 CVE-2026-35467 - High (7.5)
The stored API keys in temporary browser client is not marked as protected allowing for JavScript console or other errors to allow for extraction of the encryption credentials.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35467/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35467 - High (7.5)
The stored API keys in temporary browser client is not marked as protected allowing for JavScript console or other errors to allow for extraction of the encryption credentials.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35467/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T06:31:39
2 posts
⚠️ CRITICAL vuln: pymetasploit3 ≤1.0.6 (CVE-2026-5463) lets attackers inject commands via newline chars in console.run_module_with_output(), risking full session compromise. Avoid untrusted input, watch for patches. https://radar.offseq.com/threat/cve-2026-5463-cwe-77-improper-neutralization-of-sp-6f7ed040 #OffSeq #CVE20265463 #infosec
##🟠 CVE-2026-5463 - High (8.6)
Command injection vulnerability in console.run_module_with_output() in pymetasploit3 through version 1.0.6 allows attackers to inject newline characters into module options such as RHOSTS. This breaks the intended command structure and causes the ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5463/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T03:47:38
2 posts
🟠 CVE-2026-35168 - High (8.8)
OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to version 2.10.2, the Aggiornamenti (Updates) module in OpenSTAManager contains a database conflict resolution feature (op=risolvi-conflitti-databa...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35168/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35168 - High (8.8)
OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to version 2.10.2, the Aggiornamenti (Updates) module in OpenSTAManager contains a database conflict resolution feature (op=risolvi-conflitti-databa...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35168/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T03:39:42
2 posts
🟠 CVE-2026-28815 - High (7.5)
A remote attacker can supply a short X-Wing HPKE encapsulated key and trigger an out-of-bounds read in the C decapsulation path, potentially causing a crash or memory disclosure depending on runtime protections. This issue is fixed in swift-crypto...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28815/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-28815 - High (7.5)
A remote attacker can supply a short X-Wing HPKE encapsulated key and trigger an out-of-bounds read in the C decapsulation path, potentially causing a crash or memory disclosure depending on runtime protections. This issue is fixed in swift-crypto...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28815/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T02:46:57
2 posts
🟠 CVE-2026-34780 - High (8.3)
Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. From versions 39.0.0-alpha.1 to before 39.8.0, 40.0.0-alpha.1 to before 40.7.0, and 41.0.0-alpha.1 to before 41.0.0-beta.8, apps that pass Vide...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34780/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34780 - High (8.3)
Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. From versions 39.0.0-alpha.1 to before 39.8.0, 40.0.0-alpha.1 to before 40.7.0, and 41.0.0-alpha.1 to before 41.0.0-beta.8, apps that pass Vide...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34780/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T02:42:31
2 posts
🟠 CVE-2026-34774 - High (8.1)
Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 39.8.1, 40.7.0, and 41.0.0, apps that use offscreen rendering and allow child windows via window.open() may be vulnerable to ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34774/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34774 - High (8.1)
Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 39.8.1, 40.7.0, and 41.0.0, apps that use offscreen rendering and allow child windows via window.open() may be vulnerable to ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34774/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T02:39:16
2 posts
🟠 CVE-2026-34769 - High (7.7)
Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.0, 40.7.0, and 41.0.0-beta.8, an undocumented commandLineSwitches webPreference allowed arbitrary switches to be...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34769/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34769 - High (7.7)
Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.0, 40.7.0, and 41.0.0-beta.8, an undocumented commandLineSwitches webPreference allowed arbitrary switches to be...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34769/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T00:31:15
1 posts
🔴 CVE-2026-33107 - Critical (10)
Server-side request forgery (ssrf) in Azure Databricks allows an unauthorized attacker to elevate privileges over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33107/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T00:31:14
2 posts
CVE-2026-33105 hits Azure Kubernetes Service with CVSS 10.0. Unauthenticated remote privilege escalation - Microsoft patched it but check your AKS clusters. Critical severity, no user interaction required.
##🔴 CVE-2026-33105 - Critical (10)
Improper authorization in Microsoft Azure Kubernetes Service allows an unauthorized attacker to elevate privileges over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33105/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T00:31:14
1 posts
🔴 CVE-2026-32211 - Critical (9.1)
Missing authentication for critical function in Azure MCP Server allows an unauthorized attacker to disclose information over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32211/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T00:31:14
1 posts
🔴 CVE-2026-26135 - Critical (9.6)
Server-side request forgery (ssrf) in Azure Custom Locations Resource Provider (RP) allows an authorized attacker to elevate privileges over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26135/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-02T21:34:00
1 posts
🟠 CVE-2025-58136 - High (7.5)
A bug in POST request handling causes a crash under a certain condition.
This issue affects Apache Traffic Server: from 10.0.0 through 10.1.1, from 9.0.0 through 9.2.12.
Users are recommended to upgrade to version 10.1.2 or 9.2.13, which fix the...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-58136/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-02T21:33:02
1 posts
🟠 CVE-2025-43264 - High (8.8)
The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.6. Processing a maliciously crafted image may corrupt process memory.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-43264/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-02T21:33:02
1 posts
🟠 CVE-2026-34426 - High (7.6)
OpenClaw versions prior to commit b57b680 contain an approval bypass vulnerability due to inconsistent environment variable normalization between approval and execution paths, allowing attackers to inject attacker-controlled environment variables...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34426/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-02T20:34:49
1 posts
🟠 CVE-2026-34829 - High (7.5)
Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Multipart::Parser only wraps the request body in a BoundedIO when CONTENT_LENGTH is present. When a multipart/form-data request is sent without a Conte...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34829/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-02T19:37:43.627000
1 posts
🟠 CVE-2026-30287 - High (8.4)
An arbitrary file overwrite vulnerability in Deep Thought Industries ACE Scanner PDF Scanner v1.4.5 allows attackers to overwrite critical internal files via the file import process, leading to arbitrary code execution or information exposure.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30287/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-02T18:44:26
1 posts
🟠 CVE-2026-34785 - High (7.5)
Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Static determines whether a request should be served as a static file using a simple string prefix check. When configured with URL prefixes such as "/c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34785/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-02T18:31:45
1 posts
1 repos
🟠 CVE-2026-30332 - High (7.5)
A Time-of-Check to Time-of-Use (TOCTOU) race condition vulnerability in Balena Etcher for Windows prior to v2.1.4 allows attackers to escalate privileges and execute arbitrary code via replacing a legitimate script with a crafted payload during th...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30332/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-02T18:31:45
1 posts
🟠 CVE-2026-34876 - High (7.5)
An issue was discovered in Mbed TLS 3.x before 3.6.6. An out-of-bounds read vulnerability in mbedtls_ccm_finish() in library/ccm.c allows attackers to obtain adjacent CCM context data via invocation of the multipart CCM API with an oversized tag_l...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34876/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-02T18:31:45
1 posts
🟠 CVE-2026-5350 - High (8.8)
A security flaw has been discovered in Trendnet TEW-657BRM 1.00.1. The impacted element is the function update_pcdb of the file /setup.cgi. The manipulation of the argument mac_pc_dba results in stack-based buffer overflow. The attack can be launc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5350/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-02T18:31:45
1 posts
🔴 CVE-2026-25212 - Critical (9.9)
An issue was discovered in Percona PMM before 3.7. Because an internal database user retains specific superuser privileges, an attacker with pmm-admin rights can abuse the "Add data source" feature to break out of the database context and execute ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25212/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-02T18:31:45
2 posts
🟠 CVE-2026-35385 - High (7.5)
In OpenSSH before 10.3, a file downloaded by scp may be installed setuid or setgid, an outcome contrary to some users' expectations, if the download is performed as root with -O (legacy scp protocol) and without -p (preserve mode).
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35385/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Anyone have time to look through the vuln fixes for OpenSSH today? I haven't yet because I'm trying not to care about it but there are at least four CVEs apparently.
https://www.openssh.org/txt/release-10.3
CVE-2026-35385
CVE-2026-35386
CVE-2026-35387
CVE-2026-35388
updated 2026-04-02T18:31:45
1 posts
Anyone have time to look through the vuln fixes for OpenSSH today? I haven't yet because I'm trying not to care about it but there are at least four CVEs apparently.
https://www.openssh.org/txt/release-10.3
CVE-2026-35385
CVE-2026-35386
CVE-2026-35387
CVE-2026-35388
updated 2026-04-02T18:31:45
1 posts
Anyone have time to look through the vuln fixes for OpenSSH today? I haven't yet because I'm trying not to care about it but there are at least four CVEs apparently.
https://www.openssh.org/txt/release-10.3
CVE-2026-35385
CVE-2026-35386
CVE-2026-35387
CVE-2026-35388
updated 2026-04-02T18:31:37
5 posts
2 repos
https://github.com/fevar54/CVE-2026-3502---TrueConf-Client-Update-Hijacking-PoC
https://github.com/fevar54/CVE-2026-3502-Scanner---TrueConf-Vulnerability-Detection-Tool
Geopolitical tensions escalate between Algeria and Morocco, impacting European security and energy stability. In technology, IBM and Arm announced a strategic collaboration on new dual-architecture hardware for future AI and data-intensive workloads. On the cybersecurity front, CISA added a new exploited vulnerability (CVE-2026-3502) to its catalog, while L.A. Metro confirmed a mid-March hack, with systems still being restored.
##🚨 [CISA-2026:0402] CISA Adds One Known Exploited Vulnerability to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0402)
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2026-3502 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-3502)
- Name: TrueConf Client Download of Code Without Integrity Check Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: TrueConf
- Product: Client
- Notes: https://trueconf.com/blog/update/trueconf-8-5 ; https://trueconf.com/downloads/windows.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-3502
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260402 #cisa20260402 #cve_2026_3502 #cve20263502
##CVE ID: CVE-2026-3502
Vendor: TrueConf
Product: Client
Date Added: 2026-04-02
Notes: https://trueconf.com/blog/update/trueconf-8-5 ; https://trueconf.com/downloads/windows.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-3502
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-3502
TrueConf Zero-Day Exploited in Targeted Government Attacks
China-nexus attackers exploited a zero-day vulnerability (CVE-2026-3502) in TrueConf's update mechanism to deploy the Havoc C2 framework across Southeast Asian government networks. The flaw allows attackers who compromise an on-premises server to push malicious updates to all connected clients without verification.
**If you use TrueConf for videoconferencing, update all Windows clients to version 8.5.3 immediately. Also check your systems for signs of compromise. Look for files like poweriso.exe or iscsiexe.dll in unexpected folders, and make sure any trueconf_windows_update.exe file has a valid digital signature before allowing it to run.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/trueconf-zero-day-exploited-in-targeted-government-attacks-9-4-c-x-v/gD2P6Ple2L
Broadcom has several advisories today, three critical and one high-severity, plus more https://support.broadcom.com/web/ecx/security-advisory #Broadcom
CISA has added to the KEV catalogue:
- CVE-2026-3502: TrueConf Client Download of Code Without Integrity Check Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-3502
- Three industrial vulnerabilities added https://www.cisa.gov/ #CISA
Cisco has tagged Apple for zero-day reports https://talosintelligence.com/vulnerability_info @TalosSecurity #Cisco #Apple #infosec #vulnerability
##updated 2026-04-02T15:31:54
1 posts
🟠 CVE-2026-34791 - High (8.8)
Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_proxy.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34791/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-02T15:31:54
1 posts
🟠 CVE-2026-34797 - High (8.8)
Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_smtp.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, w...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34797/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-02T15:31:49
2 posts
🟠 CVE-2026-34794 - High (8.8)
Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_ids.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, wh...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34794/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34794 - High (8.8)
Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_ids.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, wh...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34794/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-02T15:31:49
2 posts
🟠 CVE-2026-34796 - High (8.8)
Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_openvpn.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34796/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34796 - High (8.8)
Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_openvpn.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34796/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-02T15:31:49
1 posts
🟠 CVE-2026-34795 - High (8.8)
Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_log.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, wh...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34795/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-02T15:31:41
8 posts
🔴 CVE-2026-2701 - Critical (9.1)
Authenticated user can upload a malicious file to the server and execute it, which leads to remote code execution.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2701/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Progress Software Patches Critical RCE Chain in ShareFile Storage Zones Controller
Progress Software patched two critical vulnerabilities (CVE-2026-2699 and CVE-2026-2701) in ShareFile Storage Zones Controller that allow unauthenticated attackers to bypass authentication and execute remote code.
**If you manage your own ShareFile storage zones, update to version 5.12.4 or move to version 6 to prevent full system takeover. File transfer tools are high-value targets for ransomware groups, so treat this patch as a top priority. If you can't patch, isolate the instances until they are patched. General isolation doesn't work since these systems are designed to be accessible from the public internet.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/progress-software-patches-critical-rce-chain-in-sharefile-storage-zones-controller-6-f-a-f-n/gD2P6Ple2L
🔴 CVE-2026-2701 - Critical (9.1)
Authenticated user can upload a malicious file to the server and execute it, which leads to remote code execution.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2701/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Progress Software Patches Critical RCE Chain in ShareFile Storage Zones Controller
Progress Software patched two critical vulnerabilities (CVE-2026-2699 and CVE-2026-2701) in ShareFile Storage Zones Controller that allow unauthenticated attackers to bypass authentication and execute remote code.
**If you manage your own ShareFile storage zones, update to version 5.12.4 or move to version 6 to prevent full system takeover. File transfer tools are high-value targets for ransomware groups, so treat this patch as a top priority. If you can't patch, isolate the instances until they are patched. General isolation doesn't work since these systems are designed to be accessible from the public internet.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/progress-software-patches-critical-rce-chain-in-sharefile-storage-zones-controller-6-f-a-f-n/gD2P6Ple2L
New.
WatchTower: You’re Not Supposed To ShareFile With Everyone (Progress ShareFile Pre-Auth RCE Chain CVE-2026-2699 & CVE-2026-2701) https://labs.watchtowr.com/youre-not-supposed-to-sharefile-with-everyone-progress-sharefile-pre-auth-rce-chain-cve-2026-2699-cve-2026-2701/
Recorded Future: Latin America and the Caribbean Cybercrime Landscape https://www.recordedfuture.com/research/latin-america-and-the-caribbean-cybercrime-landscape
Mandiant: vSphere and BRICKSTORM Malware: A Defender's Guide https://cloud.google.com/blog/topics/threat-intelligence/vsphere-brickstorm-defender-guide
Cisco: UAT-10608: Inside a large-scale automated credential harvesting operation targeting web applications https://blog.talosintelligence.com/uat-10608-inside-a-large-scale-automated-credential-harvesting-operation-targeting-web-applications/
Threat Fabric: The Malware Gap: Why Fraud & Security Controls Still Miss Mobile Malware https://www.threatfabric.com/blogs/the-malware-gap-why-fraud-security-controls-still-miss-mobile-malware
Abnormal Security: Meet VENOM: The PhaaS Platform That Neutralizes MFA https://abnormal.ai/blog/venom-phishing-campaign-mfa-credential-theft
From yesterday:
Zscaler: Anthropic Claude Code Leak https://www.zscaler.com/blogs/security-research/anthropic-claude-code-leak #infosec #threatresearch #vulnerability #malware #threatintel #threatintelligence
##You’re Not Supposed To ShareFile With Everyone (Progress ShareFile Pre-Auth RCE Chain CVE-2026-2699 and CVE-2026-2701) https://labs.watchtowr.com/youre-not-supposed-to-sharefile-with-everyone-progress-sharefile-pre-auth-rce-chain-cve-2026-2699-cve-2026-2701/
##You’re Not Supposed To ShareFile With Everyone (Progress ShareFile Pre-Auth RCE Chain CVE-2026-2699 & CVE-2026-2701)
#CVE_2026_2699 #CVE_2026_2701
https://labs.watchtowr.com/youre-not-supposed-to-sharefile-with-everyone-progress-sharefile-pre-auth-rce-chain-cve-2026-2699-cve-2026-2701/
You’re Not Supposed To ShareFile With Everyone (Progress ShareFile Pre-Auth RCE Chain CVE-2026-2699 & CVE-2026-2701) - watchTowr Labs https://labs.watchtowr.com/youre-not-supposed-to-sharefile-with-everyone-progress-sharefile-pre-auth-rce-chain-cve-2026-2699-cve-2026-2701/
##updated 2026-04-02T15:31:40
1 posts
Ciekawy błąd, 0/1 click RCE w oprogramowaniu związanym z Szafir/KIR służącym do elektronicznych podpisów, używanym przez 900k użytkowników.
Tldr: wchodzisz w link, (niekoniecznie) klikasz "ok" w zespoofowanym okienku, dostajesz malware.
Research: Michał Leszczyński
https://www.cve.org/CVERecord?id=CVE-2026-26928
updated 2026-04-02T12:31:13
1 posts
#OT #Advisory VDE-2026-030
MB connect line: Multiple Vulnerabilities in mbCONNECT24/mymbCONNECT24
Multiple vulnerabilities have been discovered in MB connect line mbCONNECT24/mymbCONNECT24 that could allow RCE, SQLi or information leakage.
#CVE CVE-2026-33615, CVE-2026-33616, CVE-2026-33614, CVE-2026-33613, CVE-2026-33617
https://certvde.com/en/advisories/vde-2026-030/
#CSAF https://mbconnectline.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2026-030.json
##updated 2026-04-02T12:31:13
1 posts
#OT #Advisory VDE-2026-030
MB connect line: Multiple Vulnerabilities in mbCONNECT24/mymbCONNECT24
Multiple vulnerabilities have been discovered in MB connect line mbCONNECT24/mymbCONNECT24 that could allow RCE, SQLi or information leakage.
#CVE CVE-2026-33615, CVE-2026-33616, CVE-2026-33614, CVE-2026-33613, CVE-2026-33617
https://certvde.com/en/advisories/vde-2026-030/
#CSAF https://mbconnectline.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2026-030.json
##updated 2026-04-02T12:31:13
1 posts
#OT #Advisory VDE-2026-030
MB connect line: Multiple Vulnerabilities in mbCONNECT24/mymbCONNECT24
Multiple vulnerabilities have been discovered in MB connect line mbCONNECT24/mymbCONNECT24 that could allow RCE, SQLi or information leakage.
#CVE CVE-2026-33615, CVE-2026-33616, CVE-2026-33614, CVE-2026-33613, CVE-2026-33617
https://certvde.com/en/advisories/vde-2026-030/
#CSAF https://mbconnectline.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2026-030.json
##updated 2026-04-02T12:31:13
1 posts
#OT #Advisory VDE-2026-030
MB connect line: Multiple Vulnerabilities in mbCONNECT24/mymbCONNECT24
Multiple vulnerabilities have been discovered in MB connect line mbCONNECT24/mymbCONNECT24 that could allow RCE, SQLi or information leakage.
#CVE CVE-2026-33615, CVE-2026-33616, CVE-2026-33614, CVE-2026-33613, CVE-2026-33617
https://certvde.com/en/advisories/vde-2026-030/
#CSAF https://mbconnectline.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2026-030.json
##updated 2026-04-01T23:29:02
3 posts
🔴 CVE-2026-34953 - Critical (9.1)
PraisonAI is a multi-agent teams system. Prior to version 4.5.97, OAuthManager.validate_token() returns True for any token not found in its internal store, which is empty by default. Any HTTP request to the MCP server with an arbitrary Bearer toke...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34953/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-34953 - Critical (9.1)
PraisonAI is a multi-agent teams system. Prior to version 4.5.97, OAuthManager.validate_token() returns True for any token not found in its internal store, which is empty by default. Any HTTP request to the MCP server with an arbitrary Bearer toke...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34953/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ CRITICAL vuln in PraisonAI (<4.5.97): CVE-2026-34953 allows any bearer token to bypass auth & gain full access to all agent capabilities. Patch to 4.5.97+ now! No exploits yet. Details: https://radar.offseq.com/threat/cve-2026-34953-cwe-863-incorrect-authorization-in--72e3ef5e #OffSeq #CVE202634953 #infosec #patch
##updated 2026-04-01T23:21:46
2 posts
🟠 CVE-2026-34936 - High (7.7)
PraisonAI is a multi-agent teams system. Prior to version 4.5.90, passthrough() and apassthrough() in praisonai accept a caller-controlled api_base parameter that is concatenated with endpoint and passed directly to httpx.Client.request() when the...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34936/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34936 - High (7.7)
PraisonAI is a multi-agent teams system. Prior to version 4.5.90, passthrough() and apassthrough() in praisonai accept a caller-controlled api_base parameter that is concatenated with endpoint and passed directly to httpx.Client.request() when the...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34936/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-01T23:20:34
4 posts
🚨 CVE-2026-34934: PraisonAI <4.5.90 affected by CRITICAL SQL injection (CVSS 9.8). Unauthenticated attackers can gain full DB access via unsanitized thread IDs. Upgrade to 4.5.90+ ASAP. Details: https://radar.offseq.com/threat/cve-2026-34934-cwe-89-improper-neutralization-of-s-2e7eac46 #OffSeq #infosec #SQLInjection #PraisonAI
##🔴 CVE-2026-34934 - Critical (9.8)
PraisonAI is a multi-agent teams system. Prior to version 4.5.90, the get_all_user_threads function constructs raw SQL queries using f-strings with unescaped thread IDs fetched from the database. An attacker stores a malicious thread ID via update...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34934/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-34934: PraisonAI <4.5.90 affected by CRITICAL SQL injection (CVSS 9.8). Unauthenticated attackers can gain full DB access via unsanitized thread IDs. Upgrade to 4.5.90+ ASAP. Details: https://radar.offseq.com/threat/cve-2026-34934-cwe-89-improper-neutralization-of-s-2e7eac46 #OffSeq #infosec #SQLInjection #PraisonAI
##🔴 CVE-2026-34934 - Critical (9.8)
PraisonAI is a multi-agent teams system. Prior to version 4.5.90, the get_all_user_threads function constructs raw SQL queries using f-strings with unescaped thread IDs fetched from the database. An attacker stores a malicious thread ID via update...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34934/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-01T23:20:01
4 posts
⚠️ CRITICAL: PraisonAI (v4.5.15 - <4.5.69) vulnerable to OS command injection via - -mcp, allowing arbitrary OS commands (CVE-2026-34935). Patch to 4.5.69+ now! https://radar.offseq.com/threat/cve-2026-34935-cwe-78-improper-neutralization-of-s-aa91a94a #OffSeq #CVE202634935 #PraisonAI #infosec
##🔴 CVE-2026-34935 - Critical (9.8)
PraisonAI is a multi-agent teams system. From version 4.5.15 to before version 4.5.69, the --mcp CLI argument is passed directly to shlex.split() and forwarded through the call chain to anyio.open_process() with no validation, allowlist check, or ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34935/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ CRITICAL: PraisonAI (v4.5.15 - <4.5.69) vulnerable to OS command injection via - -mcp, allowing arbitrary OS commands (CVE-2026-34935). Patch to 4.5.69+ now! https://radar.offseq.com/threat/cve-2026-34935-cwe-78-improper-neutralization-of-s-aa91a94a #OffSeq #CVE202634935 #PraisonAI #infosec
##🔴 CVE-2026-34935 - Critical (9.8)
PraisonAI is a multi-agent teams system. From version 4.5.15 to before version 4.5.69, the --mcp CLI argument is passed directly to shlex.split() and forwarded through the call chain to anyio.open_process() with no validation, allowlist check, or ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34935/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-01T23:18:18
4 posts
🟠 CVE-2026-34937 - High (7.8)
PraisonAI is a multi-agent teams system. Prior to version 1.5.90, run_python() in praisonai constructs a shell command string by interpolating user-controlled code into python3 -c "" and passing it to subprocess.run(..., shell=True). The escaping ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34937/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34937 - High (7.8)
PraisonAI is a multi-agent teams system. Prior to version 1.5.90, run_python() in praisonai constructs a shell command string by interpolating user-controlled code into python3 -c "" and passing it to subprocess.run(..., shell=True). The escaping ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34937/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34937 - High (7.8)
PraisonAI is a multi-agent teams system. Prior to version 1.5.90, run_python() in praisonai constructs a shell command string by interpolating user-controlled code into python3 -c "" and passing it to subprocess.run(..., shell=True). The escaping ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34937/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34937 - High (7.8)
PraisonAI is a multi-agent teams system. Prior to version 1.5.90, run_python() in praisonai constructs a shell command string by interpolating user-controlled code into python3 -c "" and passing it to subprocess.run(..., shell=True). The escaping ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34937/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-01T22:56:12
2 posts
🟠 CVE-2026-34752 - High (7.5)
Haraka is a Node.js mail server. Prior to version 3.1.4, sending an email with __proto__: as a header name crashes the Haraka worker process. This issue has been patched in version 3.1.4.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34752/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34752 - High (7.5)
Haraka is a Node.js mail server. Prior to version 3.1.4, sending an email with __proto__: as a header name crashes the Haraka worker process. This issue has been patched in version 3.1.4.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34752/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-01T22:30:33
1 posts
🟠 CVE-2026-34728 - High (8.7)
phpMyFAQ is an open source FAQ web application. Prior to version 4.1.1, the MediaBrowserController::index() method handles file deletion for the media browser. When the fileRemove action is triggered, the user-supplied name parameter is concatenat...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34728/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-01T22:19:59
1 posts
🟠 CVE-2026-34725 - High (8.2)
DbGate is cross-platform database manager. From version 7.0.0 to before version 7.1.5, a stored XSS vulnerability exists in DbGate because attacker-controlled SVG icon strings are rendered as raw HTML without sanitization. In the web UI this allow...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34725/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-01T22:06:53
1 posts
CRITICAL: CVE-2026-34567 in ci4ms (<0.31.0.0) enables stored XSS via blog categories. Attackers can hijack sessions or steal data. Upgrade to 0.31.0.0 ASAP & audit for injected scripts. https://radar.offseq.com/threat/cve-2026-34567-cwe-79-improper-neutralization-of-i-5c12fe3e #OffSeq #XSS #InfoSec #CVE202634567
##updated 2026-04-01T22:05:48
1 posts
⚠️ CRITICAL: CVE-2026-34565 in ci4ms (<0.31.0.0) enables persistent XSS via menu management. Low-priv users can inject scripts impacting admins & users. Upgrade to 0.31.0.0+ now! https://radar.offseq.com/threat/cve-2026-34565-cwe-79-improper-neutralization-of-i-f662be7e #OffSeq #XSS #WebSecurity
##updated 2026-04-01T21:41:50
1 posts
🟠 CVE-2026-34524 - High (8.3)
SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. Prior to version 1.17.0, a path traversal vulnerability in chat ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34524/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-01T21:31:35
1 posts
🟠 CVE-2026-4828 - High (8.2)
Improper authentication in the OAuth login functionality in Devolutions Server 2026.1.11 and earlier allows a remote attacker with valid credentials to bypass multi-factor authentication via a crafted login request.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4828/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-01T21:31:34
1 posts
🟠 CVE-2026-30292 - High (8.4)
An arbitrary file overwrite vulnerability in Docudepot PDF Reader: PDF Viewer APP v1.0.34 allows attackers to overwrite critical internal files via the file import process, leading to arbitrary code execution or information exposure.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30292/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-01T21:31:34
1 posts
🟠 CVE-2026-4924 - High (8.2)
Improper
authentication in the two-factor authentication (2FA) feature in
Devolutions Server 2026.1.11 and earlier allows a remote attacker with valid
credentials to bypass multifactor authentication and gain unauthorized
access to the victim ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4924/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-01T21:30:30
1 posts
🔴 CVE-2026-30643 - Critical (9.8)
An issue was discovered in DedeCMS 5.7.118 allowing attackers to execute code via crafted setup tag values in a module upload.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30643/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-01T21:30:29
1 posts
🟠 CVE-2026-30291 - High (8.4)
An arbitrary file overwrite vulnerability in Ora Tools PDF Reader ' Reader & Editor APPv4.3.5 allows attackers to overwrite critical internal files via the file import process, leading to arbitrary code execution or information exposure.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30291/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-01T21:30:28
10 posts
1 repos
https://github.com/umair-aziz025/CVE-2026-5281-Research-Toolkit
#Google parchea un zero-day de #Chrome en #WebGPU (CVE-2026-5281) que ya se está explotando
##Geopolitical: US-Israel/Iran conflict intensifies; F-15E reportedly downed. UN debates Strait of Hormuz access.
Technology: 6G networks raise significant AI-driven cybersecurity risks. Apple plans to open Siri to rival AI in iOS 27. NASA's Artemis II mission launched astronauts to the Moon.
Cybersecurity: Google Chrome zero-day (CVE-2026-5281) actively exploited. Odido Telecom suffered a breach exposing 6 million identities. Lapsus$ claimed a supply chain attack on LiteLLM. Texas hospital hit by ransomware, affecting 250,000 patients.
#AnonNews_irc #Cybersecurity #News
CISA just added CVE-2026-5281, a vulnerability in Google Dawn, to its Known Exploited Vulnerabilities catalog. Dawn is the WebGPU implementation used across Chromium-based browsers, which means this flaw has a wide attack surface touching Chrome, Edge, and other...
Read more: https://steelefortress.com/jycnya
Cybersecurity #CyberDefense #DataPrivacy
##Geopolitical tensions rise as Iran's Strait of Hormuz blockade severely disrupts shipping, causing global oil price surges. In cybersecurity, Google issued an emergency patch for a Chrome zero-day (CVE-2026-5281) actively exploited, alongside critical F5 BIG-IP and Citrix NetScaler vulnerabilities under exploitation. The tech sector saw OpenAI secure $122B in funding, with Oracle cutting jobs for AI infrastructure investments. Social media companies face new addiction lawsuits.
##Geopolitical: US-Israel/Iran conflict intensifies; F-15E reportedly downed. UN debates Strait of Hormuz access.
Technology: 6G networks raise significant AI-driven cybersecurity risks. Apple plans to open Siri to rival AI in iOS 27. NASA's Artemis II mission launched astronauts to the Moon.
Cybersecurity: Google Chrome zero-day (CVE-2026-5281) actively exploited. Odido Telecom suffered a breach exposing 6 million identities. Lapsus$ claimed a supply chain attack on LiteLLM. Texas hospital hit by ransomware, affecting 250,000 patients.
#AnonNews_irc #Cybersecurity #News
CISA just added CVE-2026-5281, a vulnerability in Google Dawn, to its Known Exploited Vulnerabilities catalog. Dawn is the WebGPU implementation used across Chromium-based browsers, which means this flaw has a wide attack surface touching Chrome, Edge, and other...
Read more: https://steelefortress.com/jycnya
Cybersecurity #CyberDefense #DataPrivacy
##Geopolitical tensions rise as Iran's Strait of Hormuz blockade severely disrupts shipping, causing global oil price surges. In cybersecurity, Google issued an emergency patch for a Chrome zero-day (CVE-2026-5281) actively exploited, alongside critical F5 BIG-IP and Citrix NetScaler vulnerabilities under exploitation. The tech sector saw OpenAI secure $122B in funding, with Oracle cutting jobs for AI infrastructure investments. Social media companies face new addiction lawsuits.
##⚪️ Google Chrome patches fourth actively exploited zero‑day vulnerability
🗨️ Google developers have released an emergency update for the Chrome browser that fixes the 0‑day vulnerability CVE-2026-5281, which has already been exploited in real-world attacks. The vulnerability tracked as CVE-2026-5281 is related to a use-after-free issue in Dawn, the cross-platform…
##Google Patches Fourth Chrome Zero-Day of 2026 in Emergency Update
Google released emergency updates for Chrome to patch 21 vulnerabilities, including an actively exploited zero-day (CVE-2026-5281) in the Dawn WebGPU implementation that allows for data corruption and potential code execution.
**Once more, an urgent patch for Chrome - Google is patching an actively exploited flaw in Chrome. DONT DELAY! Update all your Chrome and Chromium browsers (Edge, Opera, Brave, Vivaldi...). Updating the browser is easy, all your tabs reopen after the patch.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/google-patches-fourth-chrome-zero-day-of-2026-in-emergency-update-8-h-v-a-t/gD2P6Ple2L
updated 2026-04-01T20:58:51
1 posts
🟠 CVE-2026-34581 - High (8.1)
goshs is a SimpleHTTPServer written in Go. From version 1.1.0 to before version 2.0.0-beta.2, when using the Share Token it is possible to bypass the limited selected file download with all the gosh functionalities, including code exec. This issue...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34581/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-01T20:25:50
1 posts
🟠 CVE-2026-34222 - High (7.7)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to version 0.8.11, there is a broken access control vulnerability in tool values. This issue has been patched in version 0.8.11.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34222/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-01T19:46:02
2 posts
🟠 CVE-2026-28805 - High (8.8)
OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to version 2.10.2, multiple AJAX select handlers in OpenSTAManager are vulnerable to Time-Based Blind SQL Injection through the options[stato] GET p...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28805/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-28805 - High (8.8)
OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to version 2.10.2, multiple AJAX select handlers in OpenSTAManager are vulnerable to Time-Based Blind SQL Injection through the options[stato] GET p...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28805/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-01T19:07:04.223000
15 posts
1 repos
OpenClaw privilege escalation vulnerability: https://nvd.nist.gov/vuln/detail/CVE-2026-33579
Discussion: http://news.ycombinator.com/item?id=47628608
##OpenClaw also got a terrifying privilege escalation vulnerability https://nvd.nist.gov/vuln/detail/CVE-2026-33579
Meanwhile the OpenClaw founder is claiming shush, it's no big deal, probably most of these aren't really exploitable! (There's good business interest reasons to argue that, since OpenClaw's founders got acquired by OpenAI) https://news.ycombinator.com/item?id=47629849
Okay. I know I have more than a few security researchers following me. There's a public list of literally hundreds of thousands of publicly accessible OpenClaw instances right here: https://openclaw.allegro.earth/
Anyone try taking a sampling of them and testing how vulnerable against recent escalation CVEs they are? Could be a rather juicy writeup!
##OpenClaw privilege escalation vulnerability
https://nvd.nist.gov/vuln/detail/CVE-2026-33579
Discussion: https://news.ycombinator.com/item?id=47628608
OpenClaw privilege escalation vulnerability: https://nvd.nist.gov/vuln/detail/CVE-2026-33579
Discussion: http://news.ycombinator.com/item?id=47628608
##OpenClaw privilege escalation vulnerability: https://nvd.nist.gov/vuln/detail/CVE-2026-33579
Discussion: http://news.ycombinator.com/item?id=47628608
##OpenClaw privilege escalation vulnerability
Link: https://nvd.nist.gov/vuln/detail/CVE-2026-33579
Discussion: https://news.ycombinator.com/item?id=47628608
OpenClaw privilege escalation vulnerability
##OpenClaw also got a terrifying privilege escalation vulnerability https://nvd.nist.gov/vuln/detail/CVE-2026-33579
Meanwhile the OpenClaw founder is claiming shush, it's no big deal, probably most of these aren't really exploitable! (There's good business interest reasons to argue that, since OpenClaw's founders got acquired by OpenAI) https://news.ycombinator.com/item?id=47629849
Okay. I know I have more than a few security researchers following me. There's a public list of literally hundreds of thousands of publicly accessible OpenClaw instances right here: https://openclaw.allegro.earth/
Anyone try taking a sampling of them and testing how vulnerable against recent escalation CVEs they are? Could be a rather juicy writeup!
##OpenClaw privilege escalation vulnerability
https://nvd.nist.gov/vuln/detail/CVE-2026-33579
Discussion: https://news.ycombinator.com/item?id=47628608
OpenClaw privilege escalation vulnerability
Link: https://nvd.nist.gov/vuln/detail/CVE-2026-33579
Discussion: https://news.ycombinator.com/item?id=47628608
OpenClaw privilege escalation vulnerability
##@masek Thanks for the screenshot and the reference to CVE-2026-33579 - the reddit comment has been removed. 🙏
##Also, is it possible the github commit links for the patch for CVE-2026-33579 are... just wrong? That commit doesnt really seem to match the description? (Didnt fully check it yet)
##I'm trying to understand a bit more about CVE-2026-33579, the critical vulnerability in OpenClaw. To exploit, an attacker needs low-level paring privilege permissions. How does one acquire such privileges? Can anyone do it? I'm asking because I want to understand what's required for an attacker to exploit.
Feel free to ping me at DanArs.82, or drop an answer here.
##If you're running OpenClaw, you probably got hacked in the last week https://blink.new/blog/cve-2026-33579-openclaw-privilege-escalation-2026
##updated 2026-04-01T18:37:42
1 posts
🟠 CVE-2026-30289 - High (8.4)
An arbitrary file overwrite vulnerability in Tinybeans Private Family Album App v5.9.5-prod allows attackers to overwrite critical internal files via the file import process, leading to arbitrary code execution or information exposure.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30289/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-01T18:37:00
1 posts
🟠 CVE-2026-20094 - High (8.8)
A vulnerability in the web-based management interface of Cisco IMC could allow an authenticated, remote attacker with read-only privileges to perform command injection attacks on an affected system and execute arbitrary commands as the root user.
...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20094/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-01T18:36:52
2 posts
Critical Cisco IMC Authentication Bypass Allows Remote Administrative Takeover
Cisco patched a critical authentication bypass (CVE-2026-20093) in its Integrated Management Controller that allows unauthenticated attackers to gain Admin access by changing passwords via crafted HTTP requests.
**If your organization is running Cisco FMC on-premise, SSM On-Prem, or UCS servers with exposed IMC interfaces, consider this urgent and critical. Your immediate first step must be to ensure the web and management interfaces for all these devices are strictly isolated and accessible only from highly trusted internal networks. Even if you have them isolated, threat actors will weaponize these flaws and look for a way in.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-cisco-imc-authentication-bypass-allows-remote-administrative-takeover-6-o-v-j-i/gD2P6Ple2L
🔴 CVE-2026-20093 - Critical (9.8)
A vulnerability in the change password functionality of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to bypass authentication and gain access to the system as Admin.
This vulnerability is due...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20093/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-01T15:32:17
1 posts
🟠 CVE-2026-5287 - High (8.8)
Use after free in PDF in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5287/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-01T15:30:57
1 posts
Claude wrote a full FreeBSD remote kernel RCE with root shell
https://github.com/califio/publications/blob/main/MADBugs/CVE-2026-4747/write-up.md
Discussion: https://news.ycombinator.com/item?id=47597119
updated 2026-04-01T00:19:07
1 posts
🟠 CVE-2026-34601 - High (7.5)
xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) `DOMParser` and `XMLSerializer` module. In xmldom versions 0.6.0 and prior and @xmldom/xmldom prior to versions 0.8.12 and 0.9.9, xmldom/xmldom allows attacker-controlled string...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34601/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-31T22:31:55
2 posts
🟠 CVE-2026-25726 - High (8.1)
Cloudreve is a self-hosted file management and sharing system. Prior to version 4.13.0, the application uses the weak pseudo-random number generator math/rand seeded with time.Now().UnixNano() to generate critical security secrets, including the s...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25726/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25726 - High (8.1)
Cloudreve is a self-hosted file management and sharing system. Prior to version 4.13.0, the application uses the weak pseudo-random number generator math/rand seeded with time.Now().UnixNano() to generate critical security secrets, including the s...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25726/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-30T17:01:32
1 posts
🟠 CVE-2026-33641 - High (7.8)
Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.3, Glances supports dynamic configuration values in which substrings enclosed in backticks are executed as system commands during configuration parsing. This beh...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33641/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-30T12:32:36
1 posts
INTEL ALERT] CVE-2026-4425 is live. Is your GIGABYTE Control Center (GCC) acting as a backdoor for digital decay? I’m breaking down the forensic evidence and showing you how to harden your precinct. Don't let unpatched utilities breach your perimeter.
Read the full brief at The Cyber Mind Co.
##updated 2026-03-30T09:31:38
2 posts
INTEL ALERT] CVE-2026-4425 is live. Is your GIGABYTE Control Center (GCC) acting as a backdoor for digital decay? I’m breaking down the forensic evidence and showing you how to harden your precinct. Don't let unpatched utilities breach your perimeter.
Read the full brief at The Cyber Mind Co.
##Gigabyte Patches Arbitrary File Write Flaw in Control Center Utility
Gigabyte patched a vulnerability (CVE-2026-4415) in its Control Center utility that lets unauthenticated remote attackers write arbitrary files and run code with system privileges. The flaw affects the pairing feature in versions 25.07.21.01 and earlier, requiring an update to version 25.12.10.01.
**If you use Gigabyte hardware, update the Control Center utility to version 25.12.10.01 ASAP. It's fairly easy and stops remote attackers from hijacking your system. In the meantime, disable the pairing feature if you do not use it (even if you do use it, disable and enable when you need it).**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/gigabyte-patches-arbitrary-file-write-flaw-in-control-center-utility-y-f-6-c-r/gD2P6Ple2L
updated 2026-03-16T15:40:44.357000
1 posts
XBOW autonomous AI found 3 critical RCEs in Microsoft Cloud - first time AI discovered production vulnerabilities without source code access. CVE-2026-21536 was flagged as one of March Patch Tuesday's most severe issues. The arms race between researchers and hackers has shifted.
##updated 2025-12-10T02:00:02.557000
4 posts
100 repos
https://github.com/xcanwin/CVE-2025-55182-React-RCE
https://github.com/songsanggggg/CVE-2025-55182
https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool
https://github.com/ThemeHackers/CVE-2025-55182
https://github.com/hidden-investigations/react2shell-scanner
https://github.com/kondukto-io/vulnerable-next-js-poc
https://github.com/MemerGamer/CVE-2025-55182
https://github.com/gensecaihq/react2shell-scanner
https://github.com/chrahman/react2shell-CVE-2025-55182-full-rce-script
https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension
https://github.com/BeichenDream/CVE-2025-55182-GodzillaMemoryShell
https://github.com/yanoshercohen/React2Shell_CVE-2025-55182
https://github.com/freeqaz/react2shell
https://github.com/Syrins/CVE-2025-55182-React2Shell-RCE
https://github.com/Rsatan/Next.js-Exploit-Tool
https://github.com/aliclub0x00/CVE-2025-55182-POC-NEXTJS
https://github.com/momika233/CVE-2025-55182-bypass
https://github.com/Cr4at0r/Next.js-RCE-Scanner-BurpSuite-Extension-
https://github.com/StealthMoud/CVE-2025-55182-Scanner
https://github.com/M4xSec/CVE-2025-55182-React2Shell-RCE-Shell
https://github.com/nehkark/CVE-2025-55182
https://github.com/LucasPDiniz/CVE-2025-55182
https://github.com/shamo0/react2shell-PoC
https://github.com/BlackTechX011/React2Shell
https://github.com/alsaut1/react2shell-lab
https://github.com/Updatelap/CVE-2025-55182
https://github.com/jctommasi/react2shellVulnApp
https://github.com/l4rm4nd/CVE-2025-55182
https://github.com/jf0x3a/CVE-2025-55182-exploit
https://github.com/vulncheck-oss/cve-2025-55182
https://github.com/techgaun/cve-2025-55182-scanner
https://github.com/Dh4v4l8/CVE-2025-55182-poc-tool
https://github.com/xalgord/React2Shell
https://github.com/Tiger-Foxx/exploit-react-CVE-2025-55182
https://github.com/subhdotsol/CVE-2025-55182
https://github.com/acheong08/CVE-2025-55182-poc
https://github.com/sickwell/CVE-2025-55182
https://github.com/santihabib/CVE-2025-55182-analysis
https://github.com/LemonTeatw1/CVE-2025-55182-exploit
https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script
https://github.com/MrR0b0t19/CVE-2025-55182-shellinteractive
https://github.com/mrknow001/RSC_Detector
https://github.com/sumanrox/rschunter
https://github.com/hackersatyamrastogi/react2shell-ultimate
https://github.com/whiteov3rflow/CVE-2025-55182-poc
https://github.com/Cillian-Collins/CVE-2025-55182
https://github.com/Spritualkb/CVE-2025-55182-exp
https://github.com/vijay-shirhatti/RSC-Detect-CVE-2025-55182
https://github.com/sudo-Yangziran/CVE-2025-55182POC
https://github.com/zzhorc/CVE-2025-55182
https://github.com/ZihxS/check-react-rce-cve-2025-55182
https://github.com/theman001/CVE-2025-55182
https://github.com/zack0x01/CVE-2025-55182-advanced-scanner-
https://github.com/kOaDT/poc-cve-2025-55182
https://github.com/ejpir/CVE-2025-55182-research
https://github.com/AliHzSec/CVE-2025-55182
https://github.com/assetnote/react2shell-scanner
https://github.com/cybertechajju/R2C-CVE-2025-55182-66478
https://github.com/shyambhanushali/React2Shell
https://github.com/websecuritylabs/React2Shell-Library
https://github.com/hoosin/CVE-2025-55182
https://github.com/logesh-GIT001/CVE-2025-55182
https://github.com/theori-io/reactguard
https://github.com/msanft/CVE-2025-55182
https://github.com/RavinduRathnayaka/CVE-2025-55182-PoC
https://github.com/alfazhossain/CVE-2025-55182-Exploiter
https://github.com/EynaExp/CVE-2025-55182-POC
https://github.com/emredavut/CVE-2025-55182
https://github.com/alptexans/RSC-Detect-CVE-2025-55182
https://github.com/RuoJi6/CVE-2025-55182-RCE-shell
https://github.com/MoLeft/React2Shell-Toolbox
https://github.com/Archerkong/CVE-2025-55182
https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension
https://github.com/hualy13/CVE-2025-55182
https://github.com/AdityaBhatt3010/React2Shell-CVE-2025-55182
https://github.com/Chocapikk/CVE-2025-55182
https://github.com/surajhacx/react2shellpoc
https://github.com/Pizz33/CVE-2025-55182-burpscanner
https://github.com/snipevx/React2Shell-POC
https://github.com/CymulateResearch/React2Shell-Scanner
https://github.com/keklick1337/CVE-2025-55182-golang-PoC
https://github.com/VeilVulp/RscScan-cve-2025-55182
https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js
https://github.com/xkillbit/cve-2025-55182-scanner
https://github.com/c0rydoras/CVE-2025-55182
https://github.com/fatguru/CVE-2025-55182-scanner
https://github.com/im-ezboy/CVE-2025-55182-zoomeye
https://github.com/ejpir/CVE-2025-55182-bypass
https://github.com/CirqueiraDev/MassExploit-CVE-2025-55182
https://github.com/heiheishushu/rsc_detect_CVE-2025-55182
https://github.com/dwisiswant0/CVE-2025-55182
https://github.com/Faithtiannn/CVE-2025-55182
https://github.com/zack0x01/vuln-app-CVE-2025-55182
https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc
https://github.com/ynsmroztas/NextRce
https://github.com/timsonner/React2Shell-CVE-2025-55182
Hackers exploit React2Shell in automated credential theft campaign
Hackers are running a large-scale campaign to steal credentials in an automated way after exploiting React2Shell (CVE-2025-55182) in vulnerable...
🔗️ [Bleepingcomputer] https://link.is.it/7WBrWn
##Hackers exploit React2Shell in automated credential theft campaign
Hackers are running a large-scale campaign to steal credentials in an automated way after exploiting React2Shell (CVE-2025-55182) in vulnerable...
🔗️ [Bleepingcomputer] https://link.is.it/7WBrWn
##⚠️ Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials
「 The campaign is assessed to be targeting Next.js applications that are vulnerable to CVE-2025-55182 (CVSS score: 10.0), a critical flaw in React Server Components and Next.js App Router that could result in remote code execution, for initial access, and then dropping the NEXUS Listener collection framework 」
https://thehackernews.com/2026/04/hackers-exploit-cve-2025-55182-to.html
##Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials
https://thehackernews.com/2026/04/hackers-exploit-cve-2025-55182-to.html
Read on HackerWorkspace: https://hackerworkspace.com/article/hackers-exploit-cve-2025-55182-to-breach-766-next-js-hosts-steal-credentials
##updated 2025-08-06T15:31:37
1 posts
2 repos
Metasploit Framework is here with 5 new modules! Exploits for FreeScout (CVE-2026-28289) and Grav CMS (CVE-2025-50286) RCEs, plus a generic HTTP command execution module and a new Windows persistence technique. We also have a slew of bug fixes and enhancements including SOCKS proxy performance improvements #Metasploit https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-04-03-2026/1
##updated 2025-03-25T14:00:04
1 posts
23 repos
https://github.com/iSee857/CVE-2025-30208-PoC
https://github.com/ThumpBo/CVE-2025-30208-EXP
https://github.com/jackieya/ViteVulScan
https://github.com/marino-admin/Vite-CVE-2025-30208-Scanner
https://github.com/0xshaheen/CVE-2025-30208
https://github.com/xuemian168/CVE-2025-30208
https://github.com/Lusensec/CVE-2025-30208
https://github.com/4xura/CVE-2025-30208
https://github.com/nkuty/CVE-2025-30208-31125-31486-32395
https://github.com/TH-SecForge/CVE-2025-30208
https://github.com/HaGsec/CVE-2025-30208
https://github.com/MiclelsonCN/CVE-2025-30208_POC
https://github.com/HazaVVIP/CVE-2025-30208
https://github.com/imbas007/CVE-2025-30208-template
https://github.com/keklick1337/CVE-2025-30208-ViteVulnScanner
https://github.com/sadhfdw129/CVE-2025-30208-Vite
https://github.com/On1onss/CVE-2025-30208
https://github.com/r0ngy40/CVE-2025-30208-Series
https://github.com/sumeet-darekar/CVE-2025-30208
https://github.com/kk12-30/CVE-2025-30208
https://github.com/4m3rr0r/CVE-2025-30208-PoC
Attempts to Exploit Exposed "Vite" Installs (CVE-2025-30208) https://isc.sans.edu/diary/32860
##🟠 CVE-2026-31933 - High (7.5)
Suricata is a network IDS, IPS and NSM engine. Prior to versions 7.0.15 and 8.0.4, specially crafted traffic can cause Suricata to slow down, affecting performance in IDS mode. This issue has been patched in versions 7.0.15 and 8.0.4.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-31933/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-31933 - High (7.5)
Suricata is a network IDS, IPS and NSM engine. Prior to versions 7.0.15 and 8.0.4, specially crafted traffic can cause Suricata to slow down, affecting performance in IDS mode. This issue has been patched in versions 7.0.15 and 8.0.4.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-31933/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Tiens, intéressant : il s’agit du rapport technique sur la faille #glpi, à l'origine du patch du mois passé.
Si vous administrez un service GLPI
⬇️
"mettez à jour vers la version 11.0.6 disponible depuis le 3 mars 2026. Si la mise à jour n’est pas encore possible, activez l’authentification sur l’endpoint /Inventory (Paramètres → Inventaire → En-tête d’autorisation)."
⬇️
"GLPI : Blind XSS → ATO → SSTI → RCE — anatomie d'une chaîne 0-day
BZHunt a découvert deux vulnérabilités chaînées dans GLPI 11.0.0–11.0.5 (CVE-2026-26026, CVE-2026-26027) permettant à un attaquant non authentifié d'exécuter du code arbitraire via une Blind Stored XSS et une SSTI. Analyse technique complète et responsible disclosure."
👇
https://www.bzhunt.fr/blog/cve_glpi/
...et nice to know: Claude a encore aidé & tiré (Notice de transparence très appréciée)
"Cette recherche a été conduite avec l’assistance de Claude Opus 4.6 (Anthropic), utilisé par BZHunt dans son processus de R&D. Toutes les vulnérabilités ont été identifiées, vérifiées et exploitées par des chercheurs humains. Nous faisons le choix de la transparence sur l’usage de l’IA dans nos travaux, dans l’attente que des standards clairs émergent sur ce sujet."
#CyberVeille #CVE_2026_26026 CVE-2026-26027
##Tiens, intéressant : il s’agit du rapport technique sur la faille #glpi, à l'origine du patch du mois passé.
Si vous administrez un service GLPI
⬇️
"mettez à jour vers la version 11.0.6 disponible depuis le 3 mars 2026. Si la mise à jour n’est pas encore possible, activez l’authentification sur l’endpoint /Inventory (Paramètres → Inventaire → En-tête d’autorisation)."
⬇️
"GLPI : Blind XSS → ATO → SSTI → RCE — anatomie d'une chaîne 0-day
BZHunt a découvert deux vulnérabilités chaînées dans GLPI 11.0.0–11.0.5 (CVE-2026-26026, CVE-2026-26027) permettant à un attaquant non authentifié d'exécuter du code arbitraire via une Blind Stored XSS et une SSTI. Analyse technique complète et responsible disclosure."
👇
https://www.bzhunt.fr/blog/cve_glpi/
...et nice to know: Claude a encore aidé & tiré (Notice de transparence très appréciée)
"Cette recherche a été conduite avec l’assistance de Claude Opus 4.6 (Anthropic), utilisé par BZHunt dans son processus de R&D. Toutes les vulnérabilités ont été identifiées, vérifiées et exploitées par des chercheurs humains. Nous faisons le choix de la transparence sur l’usage de l’IA dans nos travaux, dans l’attente que des standards clairs émergent sur ce sujet."
#CyberVeille #CVE_2026_26026 CVE-2026-26027
##Tiens, intéressant : il s’agit du rapport technique sur la faille #glpi, à l'origine du patch du mois passé.
Si vous administrez un service GLPI
⬇️
"mettez à jour vers la version 11.0.6 disponible depuis le 3 mars 2026. Si la mise à jour n’est pas encore possible, activez l’authentification sur l’endpoint /Inventory (Paramètres → Inventaire → En-tête d’autorisation)."
⬇️
"GLPI : Blind XSS → ATO → SSTI → RCE — anatomie d'une chaîne 0-day
BZHunt a découvert deux vulnérabilités chaînées dans GLPI 11.0.0–11.0.5 (CVE-2026-26026, CVE-2026-26027) permettant à un attaquant non authentifié d'exécuter du code arbitraire via une Blind Stored XSS et une SSTI. Analyse technique complète et responsible disclosure."
👇
https://www.bzhunt.fr/blog/cve_glpi/
...et nice to know: Claude a encore aidé & tiré (Notice de transparence très appréciée)
"Cette recherche a été conduite avec l’assistance de Claude Opus 4.6 (Anthropic), utilisé par BZHunt dans son processus de R&D. Toutes les vulnérabilités ont été identifiées, vérifiées et exploitées par des chercheurs humains. Nous faisons le choix de la transparence sur l’usage de l’IA dans nos travaux, dans l’attente que des standards clairs émergent sur ce sujet."
#CyberVeille #CVE_2026_26026 CVE-2026-26027
##Tiens, intéressant : il s’agit du rapport technique sur la faille #glpi, à l'origine du patch du mois passé.
Si vous administrez un service GLPI
⬇️
"mettez à jour vers la version 11.0.6 disponible depuis le 3 mars 2026. Si la mise à jour n’est pas encore possible, activez l’authentification sur l’endpoint /Inventory (Paramètres → Inventaire → En-tête d’autorisation)."
⬇️
"GLPI : Blind XSS → ATO → SSTI → RCE — anatomie d'une chaîne 0-day
BZHunt a découvert deux vulnérabilités chaînées dans GLPI 11.0.0–11.0.5 (CVE-2026-26026, CVE-2026-26027) permettant à un attaquant non authentifié d'exécuter du code arbitraire via une Blind Stored XSS et une SSTI. Analyse technique complète et responsible disclosure."
👇
https://www.bzhunt.fr/blog/cve_glpi/
...et nice to know: Claude a encore aidé & tiré (Notice de transparence très appréciée)
"Cette recherche a été conduite avec l’assistance de Claude Opus 4.6 (Anthropic), utilisé par BZHunt dans son processus de R&D. Toutes les vulnérabilités ont été identifiées, vérifiées et exploitées par des chercheurs humains. Nous faisons le choix de la transparence sur l’usage de l’IA dans nos travaux, dans l’attente que des standards clairs émergent sur ce sujet."
#CyberVeille #CVE_2026_26026 CVE-2026-26027
##⚠️ SQL Injection (CVSS 10, CRITICAL) in Kestra < 1.3.7 — authenticated users can trigger RCE via /api/v1/main/flows/search. Patch to v1.3.7 to mitigate. CVE-2026-34612. Details: https://radar.offseq.com/threat/cve-2026-34612-cwe-89-improper-neutralization-of-s-c7c6454f #OffSeq #Kestra #SQLInjection #RCE
##🔴 CVE-2026-34612 - Critical (9.9)
Kestra is an open-source, event-driven orchestration platform. Prior to version 1.3.7, Kestra (default docker-compose deployment) contains a SQL Injection vulnerability that leads to Remote Code Execution (RCE) in the following endpoint "GET /api/...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34612/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ SQL Injection (CVSS 10, CRITICAL) in Kestra < 1.3.7 — authenticated users can trigger RCE via /api/v1/main/flows/search. Patch to v1.3.7 to mitigate. CVE-2026-34612. Details: https://radar.offseq.com/threat/cve-2026-34612-cwe-89-improper-neutralization-of-s-c7c6454f #OffSeq #Kestra #SQLInjection #RCE
##🔴 CVE-2026-34612 - Critical (9.9)
Kestra is an open-source, event-driven orchestration platform. Prior to version 1.3.7, Kestra (default docker-compose deployment) contains a SQL Injection vulnerability that leads to Remote Code Execution (RCE) in the following endpoint "GET /api/...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34612/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-31932 - High (7.5)
Suricata is a network IDS, IPS and NSM engine. Prior to versions 7.0.15 and 8.0.4, inefficiency in KRB5 buffering can lead to performance degradation. This issue has been patched in versions 7.0.15 and 8.0.4.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-31932/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-31932 - High (7.5)
Suricata is a network IDS, IPS and NSM engine. Prior to versions 7.0.15 and 8.0.4, inefficiency in KRB5 buffering can lead to performance degradation. This issue has been patched in versions 7.0.15 and 8.0.4.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-31932/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35218 - High (8.7)
Budibase is an open-source low-code platform. Prior to version 3.32.5, Budibase's Builder Command Palette renders entity names (tables, views, queries, automations) using Svelte's {@html} directive without any sanitization. An authenticated user w...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35218/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35218 - High (8.7)
Budibase is an open-source low-code platform. Prior to version 3.32.5, Budibase's Builder Command Palette renders entity names (tables, views, queries, automations) using Svelte's {@html} directive without any sanitization. An authenticated user w...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35218/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-28798 - Critical (9)
ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. Prior to version 1.5.3, a proxy endpoint (/v1/sys/proxy) exposed by ZimaOS's web interface can be abused (via an externally reachable domain using a Clo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28798/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-28798 - Critical (9)
ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. Prior to version 1.5.3, a proxy endpoint (/v1/sys/proxy) exposed by ZimaOS's web interface can be abused (via an externally reachable domain using a Clo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28798/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-27833 - High (7.5)
Piwigo is an open source photo gallery application for the web. Prior to version 16.3.0, the pwg.history.search API method in Piwigo is registered without the admin_only option, allowing unauthenticated users to access the full browsing history of...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27833/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-27833 - High (7.5)
Piwigo is an open source photo gallery application for the web. Prior to version 16.3.0, the pwg.history.search API method in Piwigo is registered without the admin_only option, allowing unauthenticated users to access the full browsing history of...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27833/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33184 - High (7.5)
nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake protocol based on the Albatross consensus algorithm. Prior to version 1.3.0, the discovery handler accepts a peer-controlled limit during handshake and stores it unchange...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33184/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33184 - High (7.5)
nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake protocol based on the Albatross consensus algorithm. Prior to version 1.3.0, the discovery handler accepts a peer-controlled limit during handshake and stores it unchange...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33184/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Metasploit Framework is here with 5 new modules! Exploits for FreeScout (CVE-2026-28289) and Grav CMS (CVE-2025-50286) RCEs, plus a generic HTTP command execution module and a new Windows persistence technique. We also have a slew of bug fixes and enhancements including SOCKS proxy performance improvements #Metasploit https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-04-03-2026/1
##🚨 CRITICAL: CVE-2026-34745 in ShaneIsrael fireshare (<1.5.3) enables unauth’d file writes to any server path via /api/uploadChunked/public. Upgrade to 1.5.3 ASAP or restrict access. Full details: https://radar.offseq.com/threat/cve-2026-34745-cwe-22-improper-limitation-of-a-pat-3a68f043 #OffSeq #CVE202634745 #infosec #patchnow
##🔴 CVE-2026-34745 - Critical (9.1)
Fireshare facilitates self-hosted media and link sharing. Prior to version 1.5.3, the fix for CVE-2026-33645 was applied to the authenticated /api/uploadChunked endpoint but was not applied to the unauthenticated /api/uploadChunked/public endpoint...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34745/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-34838 (CRITICAL, CVSS 10): Group-Office <6.8.156, <25.0.90, <26.0.12 vulnerable to insecure deserialization (CWE-502). Authenticated attackers can achieve RCE by injecting malicious serialized objects. Patch now! https://radar.offseq.com/threat/cve-2026-34838-cwe-502-deserialization-of-untruste-f6c31d56 #OffSeq #Vuln #RCE
##🔴 CVE-2026-34838 - Critical (9.9)
Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.156, 25.0.90, and 26.0.12, a vulnerability in the AbstractSettingsCollection model leads to insecure deserialization when these settings are l...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34838/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##New RCE in Control Web Panel (CVE-2025-70951) https://fenrisk.com/rce-centos-webpanel-2
##🟠 CVE-2026-31937 - High (7.5)
Suricata is a network IDS, IPS and NSM engine. Prior to version 7.0.15, inefficiency in DCERPC buffering can lead to a performance degradation. This issue has been patched in version 7.0.15.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-31937/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-31935 - High (7.5)
Suricata is a network IDS, IPS and NSM engine. Prior to versions 7.0.15 and 8.0.4, flooding of craft HTTP2 continuation frames can lead to memory exhaustion, usually resulting in the Suricata process being shut down by the operating system. This i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-31935/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-31934 - High (7.5)
Suricata is a network IDS, IPS and NSM engine. From version 8.0.0 to before version 8.0.4, there is a quadratic complexity issue when searching for URLs in mime encoded messages over SMTP leading to a performance impact. This issue has been patche...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-31934/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34577 - High (8.6)
Postiz is an AI social media scheduling tool. Prior to version 2.21.3, the GET /public/stream endpoint in PublicController accepts a user-supplied url query parameter and proxies the full HTTP response back to the caller. The only validation is ur...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34577/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-34717 - Critical (9.9)
OpenProject is an open-source, web-based project management software. Prior to version 17.2.3, the =n operator in modules/reporting/lib/report/operator.rb:177 embeds user input directly into SQL WHERE clauses without parameterization. This issue h...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34717/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-34745 - Critical (9.1)
Fireshare facilitates self-hosted media and link sharing. Prior to version 1.5.3, the fix for CVE-2026-33645 was applied to the authenticated /api/uploadChunked endpoint but was not applied to the unauthenticated /api/uploadChunked/public endpoint...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34745/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34840 - High (8.1)
OneUptime is an open-source monitoring and observability platform. Prior to version 10.0.42, OneUptime's SAML SSO implementation (App/FeatureSet/Identity/Utils/SSO.ts) has decoupled signature verification and identity extraction. isSignatureValid(...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34840/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-34159 - Critical (9.8)
llama.cpp is an inference of several LLM models in C/C++. Prior to version b8492, the RPC backend's deserialize_tensor() skips all bounds validation when a tensor's buffer field is 0. An unauthenticated attacker can read and write arbitrary proces...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34159/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34072 - High (8.3)
Cr*nMaster (cronmaster) is a Cronjob management UI with human readable syntax, live logging and log history for cronjobs. Prior to version 2.2.0, an authentication bypass in middleware allows unauthenticated requests with an invalid session cookie...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34072/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##