## Updated at UTC 2026-04-05T15:25:03.845538

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-5567 8.8 0.00% 2 0 2026-04-05T13:17:14.707000 A flaw has been found in Tenda M3 1.0.0.10. This vulnerability affects the funct
CVE-2026-5566 8.8 0.00% 2 0 2026-04-05T13:17:14.520000 A vulnerability was detected in UTT HiPER 1250GW up to 3.2.7-210907-180535. This
CVE-2026-5558 6.3 0.03% 2 0 2026-04-05T10:16:19.933000 A flaw has been found in PHPGurukul PHPGurukul Online Shopping Portal Project up
CVE-2026-5550 8.8 0.05% 4 0 2026-04-05T08:16:25.100000 A vulnerability was identified in Tenda AC10 16.03.10.10_multi_TDE01. This affec
CVE-2026-5548 8.8 0.05% 2 0 2026-04-05T08:16:24.650000 A vulnerability was found in Tenda AC10 16.03.10.10_multi_TDE01. Affected by thi
CVE-2026-5544 8.8 0.04% 4 0 2026-04-05T06:32:08 A security flaw has been discovered in UTT HiPER 1250GW up to 3.2.7-210907-18053
CVE-2026-1233 7.5 0.02% 4 0 2026-04-04T12:31:10 The Text to Speech for WP (AI Voices by Mementor) plugin for WordPress is vulner
CVE-2026-2936 7.2 0.02% 2 0 2026-04-04T12:31:04 The Visitor Traffic Real Time Statistics plugin for WordPress is vulnerable to S
CVE-2026-3666 8.8 0.03% 4 0 2026-04-04T12:16:03.390000 The wpForo Forum plugin for WordPress is vulnerable to arbitrary file deletion i
CVE-2026-3445 7.1 0.03% 2 0 2026-04-04T09:30:37 The Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User
CVE-2026-4896 8.1 0.01% 2 0 2026-04-04T09:30:31 The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Lis
CVE-2026-5425 7.2 0.06% 2 0 2026-04-04T09:16:20.500000 The Widgets for Social Photo Feed plugin for WordPress is vulnerable to Stored C
CVE-2026-35216 9.1 0.34% 2 0 2026-04-04T06:04:59 ### Summary An unauthenticated attacker can achieve Remote Code Execution (RCE)
CVE-2026-35214 8.7 0.11% 2 0 2026-04-04T06:04:22 ## Summary The plugin file upload endpoint (`POST /api/plugin/upload`) passes t
CVE-2026-4636 8.1 0.03% 2 0 2026-04-04T06:00:16 A flaw was found in Keycloak. An authenticated user with the uma_protection role
CVE-2026-35616 9.8 0.03% 17 2 2026-04-04T01:16:39.720000 A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through
CVE-2025-15620 8.6 0.01% 1 0 2026-04-04T00:31:26 HiOS Switch Platform contains a denial-of-service vulnerability in the web inter
CVE-2026-34955 8.8 0.02% 2 0 2026-04-04T00:16:19.370000 PraisonAI is a multi-agent teams system. Prior to version 4.5.97, SubprocessSand
CVE-2026-34771 7.5 0.04% 2 0 2026-04-04T00:16:17.980000 Electron is a framework for writing cross-platform desktop applications using Ja
CVE-2026-34954 8.6 0.03% 2 0 2026-04-03T23:17:06.810000 PraisonAI is a multi-agent teams system. Prior to version 1.5.95, FileTools.down
CVE-2026-34952 9.1 0.04% 5 0 2026-04-03T23:17:06.490000 PraisonAI is a multi-agent teams system. Prior to version 4.5.97, the PraisonAI
CVE-2026-34938 10.0 0.10% 5 0 2026-04-03T23:17:06.170000 PraisonAI is a multi-agent teams system. Prior to version 1.5.90, execute_code()
CVE-2026-33175 8.8 0.10% 2 0 2026-04-03T22:16:26.483000 OAuthenticator is software that allows OAuth2 identity providers to be plugged i
CVE-2026-34824 7.5 0.02% 2 0 2026-04-03T21:54:37 ### Summary An uncontrolled resource consumption vulnerability exists in the Web
CVE-2026-33950 9.4 0.05% 1 0 2026-04-03T21:37:19 ## Summary According to SignalK's security documentation, when a server is firs
CVE-2026-25197 9.1 0.03% 4 2 2026-04-03T21:31:49 A specific endpoint allows authenticated users to pivot to other user profiles b
CVE-2025-10681 8.6 0.04% 2 2 2026-04-03T21:31:49 Storage credentials are hardcoded in the mobile app and device firmware. These c
CVE-2026-22665 8.1 0.03% 2 0 2026-04-03T21:31:49 prompts.chat prior to commit 1464475 contains an identity confusion vulnerabilit
CVE-2026-28766 9.3 0.07% 2 2 2026-04-03T21:31:49 A specific endpoint exposes all user account information for registered Gardyn u
CVE-2026-35558 7.8 0.04% 2 0 2026-04-03T21:31:49 Improper neutralization of special elements in the authentication components in
CVE-2026-32646 7.5 0.07% 2 2 2026-04-03T21:31:49 A specific administrative endpoint is accessible without proper authentication,
CVE-2026-35562 7.5 0.08% 2 0 2026-04-03T21:31:49 Allocation of resources without limits in the parsing components in Amazon Athen
CVE-2026-22664 7.7 0.03% 2 0 2026-04-03T21:31:48 prompts.chat prior to commit 30a8f04 contains a server-side request forgery vuln
CVE-2026-5485 7.8 0.03% 2 0 2026-04-03T21:17:12.603000 OS command injection in the browser-based authentication component in Amazon Ath
CVE-2026-22663 7.5 0.03% 2 0 2026-04-03T21:17:09.337000 prompts.chat prior to commit 7b81836 contains multiple authorization bypass vuln
CVE-2026-22661 8.1 0.04% 2 0 2026-04-03T21:17:08.970000 prompts.chat prior to commit 0f8d4c3 contains a path traversal vulnerability in
CVE-2026-34758 9.1 0.03% 1 0 2026-04-03T19:52:26.097000 OneUptime is an open-source monitoring and observability platform. Prior to vers
CVE-2026-34742 8.1 0.05% 2 0 2026-04-03T19:48:25.627000 The Go MCP SDK used Go's standard encoding/json. Prior to version 1.4.0, the Mod
CVE-2025-59711 8.3 0.87% 2 0 2026-04-03T18:31:21 An issue was discovered in Biztalk360 before 11.5. Because of mishandling of use
CVE-2026-26477 7.5 0.11% 2 0 2026-04-03T18:31:21 An issue in Dokuwiki v.2025-05-14b 'Librarian' allows a remote attacker to cause
CVE-2025-43202 8.8 0.02% 2 0 2026-04-03T18:31:17 This issue was addressed with improved memory handling. This issue is fixed in i
CVE-2025-43219 8.8 0.02% 1 0 2026-04-03T18:31:17 The issue was addressed with improved memory handling. This issue is fixed in ma
CVE-2026-28373 9.6 0.03% 3 0 2026-04-03T18:16:24.323000 The Stackfield Desktop App before 1.10.2 for macOS and Windows contains a path t
CVE-2026-0545 9.1 0.20% 2 0 2026-04-03T18:16:21.540000 In mlflow/mlflow, the FastAPI job endpoints under `/ajax-api/3.0/jobs/*` are not
CVE-2025-43257 8.7 0.01% 1 0 2026-04-03T17:57:19.197000 This issue was addressed with improved handling of symlinks. This issue is fixed
CVE-2026-31818 9.6 0.01% 2 0 2026-04-03T16:16:39.800000 Budibase is an open-source low-code platform. Prior to version 3.33.4, a server-
CVE-2026-20160 9.8 0.17% 2 0 2026-04-03T16:11:11.357000 A vulnerability in Cisco Smart Software Manager On-Prem (SSM On-Prem) could allo
CVE-2026-31027 9.8 0.15% 1 0 2026-04-03T16:11:11.357000 TOTOlink A3600R v5.9c.4959 contains a buffer overflow vulnerability in the setAp
CVE-2026-20155 8.0 0.11% 2 0 2026-04-03T16:11:11.357000 A vulnerability in the web-based management interface of Cisco Evolved Programma
CVE-2026-4634 7.5 0.07% 2 0 2026-04-03T16:10:52.680000 A flaw was found in Keycloak. An unauthenticated attacker can exploit this vulne
CVE-2026-2699 9.8 0.41% 8 1 2026-04-03T16:10:52.680000 Customer Managed ShareFile Storage Zones Controller (SZC) allows an unauthentica
CVE-2026-31931 7.5 0.05% 2 0 2026-04-03T16:10:52.680000 Suricata is a network IDS, IPS and NSM engine. From version 8.0.0 to before vers
CVE-2026-33544 7.7 0.04% 1 0 2026-04-03T16:10:52.680000 Tinyauth is an authentication and authorization server. Prior to version 5.0.5,
CVE-2026-34792 8.8 0.24% 2 0 2026-04-03T16:10:52.680000 Endian Firewall version 3.3.25 and prior allow authenticated users to execute ar
CVE-2026-34793 8.8 0.24% 1 0 2026-04-03T16:10:52.680000 Endian Firewall version 3.3.25 and prior allow authenticated users to execute ar
CVE-2026-34564 9.1 0.05% 1 0 2026-04-03T16:10:52.680000 CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, mo
CVE-2026-33615 9.1 0.08% 1 0 2026-04-03T16:10:52.680000 An unauthenticated remote attacker can exploit an unauthenticated SQL Injection
CVE-2026-34566 9.1 0.05% 1 0 2026-04-03T16:10:52.680000 CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, mo
CVE-2026-34568 9.1 0.05% 1 0 2026-04-03T16:10:52.680000 CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, mo
CVE-2026-4350 8.1 0.10% 2 0 2026-04-03T16:10:23.730000 The Perfmatters plugin for WordPress is vulnerable to arbitrary file deletion vi
CVE-2026-34743 0 0.04% 1 0 2026-04-03T16:10:23.730000 XZ Utils provide a general-purpose data-compression library plus command-line to
CVE-2026-32213 10.0 0.05% 2 0 2026-04-03T16:10:23.730000 Improper authorization in Azure AI Foundry allows an unauthorized attacker to el
CVE-2026-33746 9.8 0.08% 1 0 2026-04-03T16:10:23.730000 Convoy is a KVM server management panel for hosting businesses. From version 3.9
CVE-2026-5349 8.8 0.04% 1 0 2026-04-03T16:10:23.730000 A vulnerability was identified in Trendnet TEW-657BRM 1.00.1. The affected eleme
CVE-2025-65114 7.5 0.03% 1 0 2026-04-03T16:10:23.730000 Apache Traffic Server allows request smuggling if chunked messages are malformed
CVE-2026-34877 9.8 0.07% 1 0 2026-04-03T16:10:23.730000 An issue was discovered in Mbed TLS versions from 2.19.0 up to 3.6.5, Mbed TLS 4
CVE-2026-34522 8.1 0.06% 1 0 2026-04-03T16:10:23.730000 SillyTavern is a locally installed user interface that allows users to interact
CVE-2026-34827 7.5 0.04% 1 0 2026-04-03T16:10:23.730000 Rack is a modular Ruby web server interface. From versions 3.0.0.beta1 to before
CVE-2026-5429 7.8 0.02% 1 0 2026-04-03T16:10:23.730000 Unsanitized input during web page generation in the Kiro Agent webview in Kiro I
CVE-2026-32173 8.6 0.06% 1 0 2026-04-03T16:10:23.730000 Improper authentication in Azure SRE Agent allows an unauthorized attacker to di
CVE-2026-35388 2.5 0.01% 1 0 2026-04-03T16:10:23.730000 OpenSSH before 10.3 omits connection multiplexing confirmation for proxy-mode mu
CVE-2026-25773 8.1 0.01% 2 0 2026-04-03T15:30:39 ** UNSUPPORTED WHEN ASSIGNED ** Focalboard version 8.0 fails to sanitize categor
CVE-2026-35467 7.5 0.02% 2 0 2026-04-03T15:30:31 The stored API keys in temporary browser client is not marked as protected allow
CVE-2026-5463 8.6 0.85% 2 0 2026-04-03T06:31:39 Command injection vulnerability in console.run_module_with_output() in pymetaspl
CVE-2026-35168 8.8 0.06% 2 0 2026-04-03T03:47:38 ## Description The Aggiornamenti (Updates) module in OpenSTAManager <= 2.10.1 c
CVE-2026-28815 None 0.03% 2 0 2026-04-03T03:39:42 ### Summary The X-Wing decapsulation path accepts attacker-controlled encapsula
CVE-2026-34780 8.4 0.04% 2 0 2026-04-03T02:46:57 ### Impact Apps that pass `VideoFrame` objects (from the WebCodecs API) across t
CVE-2026-34774 8.1 0.04% 2 0 2026-04-03T02:42:31 ### Impact Apps that use offscreen rendering and allow child windows via `window
CVE-2026-34769 7.8 0.02% 2 0 2026-04-03T02:39:16 ### Impact An undocumented `commandLineSwitches` webPreference allowed arbitrary
CVE-2026-33107 10.0 0.05% 1 0 2026-04-03T00:31:15 Server-side request forgery (ssrf) in Azure Databricks allows an unauthorized at
CVE-2026-33105 10.0 0.05% 2 0 2026-04-03T00:31:14 Improper authorization in Microsoft Azure Kubernetes Service allows an unauthori
CVE-2026-32211 9.1 0.05% 1 0 2026-04-03T00:31:14 Missing authentication for critical function in Azure MCP Server allows an unaut
CVE-2026-26135 9.6 0.05% 1 0 2026-04-03T00:31:14 Server-side request forgery (ssrf) in Azure Custom Locations Resource Provider (
CVE-2025-58136 7.5 0.04% 1 0 2026-04-02T21:34:00 A bug in POST request handling causes a crash under a certain condition. This i
CVE-2025-43264 8.8 0.02% 1 0 2026-04-02T21:33:02 The issue was addressed with improved memory handling. This issue is fixed in ma
CVE-2026-34426 7.6 0.04% 1 0 2026-04-02T21:33:02 OpenClaw versions prior to commit b57b680 contain an approval bypass vulnerabili
CVE-2026-34829 7.5 0.04% 1 0 2026-04-02T20:34:49 ## Summary `Rack::Multipart::Parser` only wraps the request body in a `BoundedI
CVE-2026-30287 8.4 0.01% 1 0 2026-04-02T19:37:43.627000 An arbitrary file overwrite vulnerability in Deep Thought Industries ACE Scanner
CVE-2026-34785 7.5 0.03% 1 0 2026-04-02T18:44:26 ## Summary `Rack::Static` determines whether a request should be served as a st
CVE-2026-30332 7.6 0.01% 1 1 2026-04-02T18:31:45 A Time-of-Check to Time-of-Use (TOCTOU) race condition vulnerability in Balena E
CVE-2026-34876 7.5 0.02% 1 0 2026-04-02T18:31:45 An issue was discovered in Mbed TLS 3.x before 3.6.6. An out-of-bounds read vuln
CVE-2026-5350 8.8 0.04% 1 0 2026-04-02T18:31:45 A security flaw has been discovered in Trendnet TEW-657BRM 1.00.1. The impacted
CVE-2026-25212 10.0 0.04% 1 0 2026-04-02T18:31:45 An issue was discovered in Percona PMM before 3.7. Because an internal database
CVE-2026-35385 7.5 0.04% 2 0 2026-04-02T18:31:45 In OpenSSH before 10.3, a file downloaded by scp may be installed setuid or setg
CVE-2026-35386 3.6 0.01% 1 0 2026-04-02T18:31:45 In OpenSSH before 10.3, command execution can occur via shell metacharacters in
CVE-2026-35387 3.1 0.03% 1 0 2026-04-02T18:31:45 OpenSSH before 10.3 can use unintended ECDSA algorithms. Listing of any ECDSA al
CVE-2026-3502 7.8 1.32% 5 2 2026-04-02T18:31:37 TrueConf Client downloads application update code and applies it without perform
CVE-2026-34791 8.8 0.24% 1 0 2026-04-02T15:31:54 Endian Firewall version 3.3.25 and prior allow authenticated users to execute ar
CVE-2026-34797 8.8 0.24% 1 0 2026-04-02T15:31:54 Endian Firewall version 3.3.25 and prior allow authenticated users to execute ar
CVE-2026-34794 8.8 0.24% 2 0 2026-04-02T15:31:49 Endian Firewall version 3.3.25 and prior allow authenticated users to execute ar
CVE-2026-34796 8.8 0.24% 2 0 2026-04-02T15:31:49 Endian Firewall version 3.3.25 and prior allow authenticated users to execute ar
CVE-2026-34795 8.8 0.24% 1 0 2026-04-02T15:31:49 Endian Firewall version 3.3.25 and prior allow authenticated users to execute ar
CVE-2026-2701 9.1 0.19% 8 0 2026-04-02T15:31:41 Authenticated user can upload a malicious file to the server and execute it, whi
CVE-2026-26928 None 0.02% 1 0 2026-04-02T15:31:40 SzafirHost downloads necessary files in the context of the initiating web page. 
CVE-2026-33613 7.2 0.12% 1 0 2026-04-02T12:31:13 Due to the improper neutralisation of special elements used in an OS command, a
CVE-2026-33617 5.3 0.03% 1 0 2026-04-02T12:31:13 An unauthenticated remote attacker can access a configuration file containing da
CVE-2026-33616 7.5 0.05% 1 0 2026-04-02T12:31:13 An unauthenticated remote attacker can exploit an unauthenticated blind SQL Inje
CVE-2026-33614 7.5 0.05% 1 0 2026-04-02T12:31:13 An unauthenticated remote attacker can exploit an unauthenticated SQL Injection
CVE-2026-34953 9.1 0.03% 3 0 2026-04-01T23:29:02 ### Summary `OAuthManager.validate_token()` returns `True` for any token not fo
CVE-2026-34936 7.7 0.03% 2 0 2026-04-01T23:21:46 ### Summary `passthrough()` and `apassthrough()` in `praisonai` accept a caller
CVE-2026-34934 9.8 0.05% 4 0 2026-04-01T23:20:34 ## Summary The `get_all_user_threads` function constructs raw SQL queries using
CVE-2026-34935 9.8 0.08% 4 0 2026-04-01T23:20:01 ### Summary The `--mcp` CLI argument is passed directly to `shlex.split()` and
CVE-2026-34937 7.8 0.03% 4 0 2026-04-01T23:18:18 ### Summary `run_python()` in `praisonai` constructs a shell command string by
CVE-2026-34752 None 0.04% 2 0 2026-04-01T22:56:12 ### Summary Sending an email with `__proto__:` as a header name crashes the Har
CVE-2026-34728 8.7 0.19% 1 0 2026-04-01T22:30:33 ### Summary The `MediaBrowserController::index()` method handles file deletion f
CVE-2026-34725 8.3 0.02% 1 0 2026-04-01T22:19:59 ### Summary A stored XSS vulnerability exists in DbGate because attacker-control
CVE-2026-34567 9.1 0.05% 1 0 2026-04-01T22:06:53 # Summary ### **Vulnerability: Blogs Posts (Categories) Full Account Takeover
CVE-2026-34565 9.1 0.05% 1 0 2026-04-01T22:05:48 ## Summary ### **Vulnerability: Stored DOM XSS via Posts Added to Menu (Persiste
CVE-2026-34524 8.3 0.05% 1 0 2026-04-01T21:41:50 ## Summary A Path Traversal vulnerability in chat endpoints allows an authentica
CVE-2026-4828 8.2 0.04% 1 0 2026-04-01T21:31:35 Improper authentication in the OAuth login functionality in Devolutions Server 2
CVE-2026-30292 8.4 0.01% 1 0 2026-04-01T21:31:34 An arbitrary file overwrite vulnerability in Docudepot PDF Reader: PDF Viewer AP
CVE-2026-4924 8.2 0.04% 1 0 2026-04-01T21:31:34 Improper authentication in the two-factor authentication (2FA) feature in Devo
CVE-2026-30643 9.8 0.08% 1 0 2026-04-01T21:30:30 An issue was discovered in DedeCMS 5.7.118 allowing attackers to execute code vi
CVE-2026-30291 8.4 0.01% 1 0 2026-04-01T21:30:29 An arbitrary file overwrite vulnerability in Ora Tools PDF Reader ' Reader & Edi
CVE-2026-5281 8.8 3.03% 10 1 2026-04-01T21:30:28 Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote
CVE-2026-34581 8.1 0.03% 1 0 2026-04-01T20:58:51 ### Summary When using the `Share Token` it is possible to bypass the limited se
CVE-2026-34222 7.7 0.01% 1 0 2026-04-01T20:25:50 # Summary ## Broken Access Control in Tool Valves Open WebUI supports function
CVE-2026-28805 8.8 0.03% 2 0 2026-04-01T19:46:02 ## Description Multiple AJAX select handlers in OpenSTAManager <= 2.10.1 are vu
CVE-2026-33579 8.1 0.01% 15 1 2026-04-01T19:07:04.223000 OpenClaw before 2026.3.28 contains a privilege escalation vulnerability in the /
CVE-2026-30289 8.4 0.01% 1 0 2026-04-01T18:37:42 An arbitrary file overwrite vulnerability in Tinybeans Private Family Album App
CVE-2026-20094 8.8 0.35% 1 0 2026-04-01T18:37:00 A vulnerability in the web-based management interface of Cisco IMC could allow a
CVE-2026-20093 9.8 0.03% 2 0 2026-04-01T18:36:52 A vulnerability in the change password functionality of Cisco Integrated Managem
CVE-2026-5287 6.3 0.07% 1 0 2026-04-01T15:32:17 Use after free in PDF in Google Chrome prior to 146.0.7680.178 allowed a remote
CVE-2026-4747 8.8 0.18% 1 0 2026-04-01T15:30:57 Each RPCSEC_GSS data packet is validated by a routine which checks a signature i
CVE-2026-34601 7.5 0.04% 1 0 2026-04-01T00:19:07 ## Summary `@xmldom/xmldom` allows attacker-controlled strings containing the C
CVE-2026-25726 8.1 0.04% 2 0 2026-03-31T22:31:55 ### Impact This vulnerability affects **Cloudreve** instances that were **first
CVE-2026-33641 7.8 0.02% 1 0 2026-03-30T17:01:32 ## Summary Glances supports dynamic configuration values in which substrings enc
CVE-2026-4425 None 0.00% 1 0 2026-03-30T12:32:36 Rejected reason: Reserved for EastLink case, but no need for CVE anymore
CVE-2026-4415 8.1 0.48% 2 0 2026-03-30T09:31:38 Gigabyte Control Center developed by GIGABYTE has an Arbitrary File Write vulner
CVE-2026-21536 9.8 0.40% 1 0 2026-03-16T15:40:44.357000 Microsoft Devices Pricing Program Remote Code Execution Vulnerability
CVE-2025-55182 10.0 66.27% 4 100 template 2025-12-10T02:00:02.557000 A pre-authentication remote code execution vulnerability exists in React Server
CVE-2025-50286 8.1 62.34% 1 2 2025-08-06T15:31:37 A Remote Code Execution (RCE) vulnerability in Grav CMS v1.7.48 allows an authen
CVE-2025-30208 5.3 88.96% 1 23 template 2025-03-25T14:00:04 ### Summary The contents of arbitrary files can be returned to the browser. ###
CVE-2026-31933 0 0.04% 2 0 N/A
CVE-2026-26027 0 0.00% 2 0 N/A
CVE-2026-26026 0 0.00% 2 0 N/A
CVE-2026-34612 0 0.14% 4 0 N/A
CVE-2026-31932 0 0.04% 2 0 N/A
CVE-2026-35218 0 0.03% 2 0 N/A
CVE-2026-28798 0 0.04% 2 0 N/A
CVE-2026-27833 0 0.04% 2 0 N/A
CVE-2026-33184 0 0.04% 2 0 N/A
CVE-2026-27456 0 0.01% 1 0 N/A
CVE-2026-28289 0 17.68% 1 1 N/A
CVE-2026-34745 0 0.04% 2 0 N/A
CVE-2026-34838 0 0.45% 2 1 N/A
CVE-2025-70951 0 0.00% 1 0 N/A
CVE-2026-31937 0 0.04% 1 0 N/A
CVE-2026-31935 0 0.04% 1 0 N/A
CVE-2026-31934 0 0.04% 1 0 N/A
CVE-2026-34577 0 0.09% 1 0 N/A
CVE-2026-34717 0 0.04% 1 0 N/A
CVE-2026-33645 0 0.07% 1 0 N/A
CVE-2026-34840 0 0.05% 1 0 N/A
CVE-2026-34159 0 0.13% 1 0 N/A
CVE-2026-34072 0 0.04% 1 0 N/A

CVE-2026-5567
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-05T13:17:14.707000

2 posts

A flaw has been found in Tenda M3 1.0.0.10. This vulnerability affects the function setAdvPolicyData of the file /goform/setAdvPolicyData of the component Destination Handler. Executing a manipulation of the argument policyType can lead to buffer overflow. The attack can be executed remotely. The exploit has been published and may be used.

thehackerwire@mastodon.social at 2026-04-05T14:00:22.000Z ##

🟠 CVE-2026-5567 - High (8.8)

A flaw has been found in Tenda M3 1.0.0.10. This vulnerability affects the function setAdvPolicyData of the file /goform/setAdvPolicyData of the component Destination Handler. Executing a manipulation of the argument policyType can lead to buffer ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-05T14:00:22.000Z ##

🟠 CVE-2026-5567 - High (8.8)

A flaw has been found in Tenda M3 1.0.0.10. This vulnerability affects the function setAdvPolicyData of the file /goform/setAdvPolicyData of the component Destination Handler. Executing a manipulation of the argument policyType can lead to buffer ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5566
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-05T13:17:14.520000

2 posts

A vulnerability was detected in UTT HiPER 1250GW up to 3.2.7-210907-180535. This affects the function strcpy of the file /goform/formNatStaticMap. Performing a manipulation of the argument NatBind results in buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used.

thehackerwire@mastodon.social at 2026-04-05T14:00:12.000Z ##

🟠 CVE-2026-5566 - High (8.8)

A vulnerability was detected in UTT HiPER 1250GW up to 3.2.7-210907-180535. This affects the function strcpy of the file /goform/formNatStaticMap. Performing a manipulation of the argument NatBind results in buffer overflow. Remote exploitation of...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-05T14:00:12.000Z ##

🟠 CVE-2026-5566 - High (8.8)

A vulnerability was detected in UTT HiPER 1250GW up to 3.2.7-210907-180535. This affects the function strcpy of the file /goform/formNatStaticMap. Performing a manipulation of the argument NatBind results in buffer overflow. Remote exploitation of...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5558
(6.3 MEDIUM)

EPSS: 0.03%

updated 2026-04-05T10:16:19.933000

2 posts

A flaw has been found in PHPGurukul PHPGurukul Online Shopping Portal Project up to 2.1. Impacted is an unknown function of the file /pending-orders.php of the component Parameter Handler. This manipulation of the argument ID causes sql injection. The attack is possible to be carried out remotely. The exploit has been published and may be used.

offseq at 2026-04-05T10:30:26.358Z ##

⚠️ MEDIUM risk: CVE-2026-5558 allows SQL injection in PHPGurukul Online Shopping Portal (v2.0, 2.1) via /pending-orders.php. Exploit is public. Review your instances & restrict access if needed. Details: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-04-05T10:30:26.000Z ##

⚠️ MEDIUM risk: CVE-2026-5558 allows SQL injection in PHPGurukul Online Shopping Portal (v2.0, 2.1) via /pending-orders.php. Exploit is public. Review your instances & restrict access if needed. Details: radar.offseq.com/threat/cve-20 #OffSeq #SQLInjection #PHP #Vuln

##

CVE-2026-5550
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-05T08:16:25.100000

4 posts

A vulnerability was identified in Tenda AC10 16.03.10.10_multi_TDE01. This affects the function fromSysToolChangePwd of the file /bin/httpd. The manipulation leads to stack-based buffer overflow. The attack may be initiated remotely. Multiple endpoints might be affected.

offseq at 2026-04-05T09:00:28.602Z ##

🔎 HIGH severity: Tenda AC10 (v16.03.10.10_multi_TDE01) has a stack buffer overflow (CVE-2026-5550) in /bin/httpd. Remote code execution possible. No patch yet — restrict remote mgmt & monitor closely. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-05T08:17:43.000Z ##

🟠 CVE-2026-5550 - High (8.8)

A vulnerability was identified in Tenda AC10 16.03.10.10_multi_TDE01. This affects the function fromSysToolChangePwd of the file /bin/httpd. The manipulation leads to stack-based buffer overflow. The attack may be initiated remotely. Multiple endp...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-05T09:00:28.000Z ##

🔎 HIGH severity: Tenda AC10 (v16.03.10.10_multi_TDE01) has a stack buffer overflow (CVE-2026-5550) in /bin/httpd. Remote code execution possible. No patch yet — restrict remote mgmt & monitor closely. radar.offseq.com/threat/cve-20 #OffSeq #infosec #CVE2026_5550

##

thehackerwire@mastodon.social at 2026-04-05T08:17:43.000Z ##

🟠 CVE-2026-5550 - High (8.8)

A vulnerability was identified in Tenda AC10 16.03.10.10_multi_TDE01. This affects the function fromSysToolChangePwd of the file /bin/httpd. The manipulation leads to stack-based buffer overflow. The attack may be initiated remotely. Multiple endp...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5548
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-05T08:16:24.650000

2 posts

A vulnerability was found in Tenda AC10 16.03.10.10_multi_TDE01. Affected by this vulnerability is the function fromSysToolChangePwd of the file /bin/httpd. Performing a manipulation of the argument sys.userpass results in stack-based buffer overflow. The attack can be initiated remotely.

thehackerwire@mastodon.social at 2026-04-05T08:17:52.000Z ##

🟠 CVE-2026-5548 - High (8.8)

A vulnerability was found in Tenda AC10 16.03.10.10_multi_TDE01. Affected by this vulnerability is the function fromSysToolChangePwd of the file /bin/httpd. Performing a manipulation of the argument sys.userpass results in stack-based buffer overf...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-05T08:17:52.000Z ##

🟠 CVE-2026-5548 - High (8.8)

A vulnerability was found in Tenda AC10 16.03.10.10_multi_TDE01. Affected by this vulnerability is the function fromSysToolChangePwd of the file /bin/httpd. Performing a manipulation of the argument sys.userpass results in stack-based buffer overf...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5544
(8.8 HIGH)

EPSS: 0.04%

updated 2026-04-05T06:32:08

4 posts

A security flaw has been discovered in UTT HiPER 1250GW up to 3.2.7-210907-180535. The impacted element is an unknown function of the file /goform/formRemoteControl. The manipulation of the argument Profile results in stack-based buffer overflow. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks.

thehackerwire@mastodon.social at 2026-04-05T06:24:22.000Z ##

🟠 CVE-2026-5544 - High (8.8)

A security flaw has been discovered in UTT HiPER 1250GW up to 3.2.7-210907-180535. The impacted element is an unknown function of the file /goform/formRemoteControl. The manipulation of the argument Profile results in stack-based buffer overflow. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-04-05T06:00:26.012Z ##

🔎 CVE-2026-5544: HIGH severity stack overflow in UTT HiPER 1250GW (≤ v3.2.7-210907-180535). Remote, no auth needed. Public exploit code available — restrict network access & monitor vendor alerts. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-05T06:24:22.000Z ##

🟠 CVE-2026-5544 - High (8.8)

A security flaw has been discovered in UTT HiPER 1250GW up to 3.2.7-210907-180535. The impacted element is an unknown function of the file /goform/formRemoteControl. The manipulation of the argument Profile results in stack-based buffer overflow. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-05T06:00:26.000Z ##

🔎 CVE-2026-5544: HIGH severity stack overflow in UTT HiPER 1250GW (≤ v3.2.7-210907-180535). Remote, no auth needed. Public exploit code available — restrict network access & monitor vendor alerts. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #CyberSecurity #UTT

##

CVE-2026-1233
(7.5 HIGH)

EPSS: 0.02%

updated 2026-04-04T12:31:10

4 posts

The Text to Speech for WP (AI Voices by Mementor) plugin for WordPress is vulnerable to sensitive information exposure in all versions up to, and including, 1.9.8. This is due to the plugin containing hardcoded MySQL database credentials for the vendor's external telemetry server in the `Mementor_TTS_Remote_Telemetry` class. This makes it possible for unauthenticated attackers to extract and decod

offseq at 2026-04-05T03:00:26.518Z ##

CVE-2026-1233 (HIGH): The Text to Speech for WP plugin (<=1.9.8) exposes hardcoded MySQL creds, risking unauthorized write access to telemetry DB. No patch yet — disable or restrict access. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-05T01:20:09.000Z ##

🟠 CVE-2026-1233 - High (7.5)

The Text to Speech for WP (AI Voices by Mementor) plugin for WordPress is vulnerable to sensitive information exposure in all versions up to, and including, 1.9.8. This is due to the plugin containing hardcoded MySQL database credentials for the v...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-05T03:00:26.000Z ##

CVE-2026-1233 (HIGH): The Text to Speech for WP plugin (<=1.9.8) exposes hardcoded MySQL creds, risking unauthorized write access to telemetry DB. No patch yet — disable or restrict access. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #InfoSec #CVE

##

thehackerwire@mastodon.social at 2026-04-05T01:20:09.000Z ##

🟠 CVE-2026-1233 - High (7.5)

The Text to Speech for WP (AI Voices by Mementor) plugin for WordPress is vulnerable to sensitive information exposure in all versions up to, and including, 1.9.8. This is due to the plugin containing hardcoded MySQL database credentials for the v...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2936
(7.2 HIGH)

EPSS: 0.02%

updated 2026-04-04T12:31:04

2 posts

The Visitor Traffic Real Time Statistics plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'page_title' parameter in all versions up to, and including, 8.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever an admin user accesses the Traffic by T

offseq at 2026-04-05T01:30:26.958Z ##

⚠️ HIGH severity XSS (CVE-2026-2936) in Visitor Traffic Real Time Statistics WP plugin ≤8.4. Unauth attackers can inject persistent scripts via 'page_title', executed by admins. No patch yet — restrict access or disable plugin. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-04-05T01:30:26.000Z ##

⚠️ HIGH severity XSS (CVE-2026-2936) in Visitor Traffic Real Time Statistics WP plugin ≤8.4. Unauth attackers can inject persistent scripts via 'page_title', executed by admins. No patch yet — restrict access or disable plugin. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #XSS

##

CVE-2026-3666
(8.8 HIGH)

EPSS: 0.03%

updated 2026-04-04T12:16:03.390000

4 posts

The wpForo Forum plugin for WordPress is vulnerable to arbitrary file deletion in all versions up to, and including, 2.4.16. This is due to a missing file name/path validation against path traversal sequences. This makes it possible for authenticated attackers, with subscriber level access and above, to delete arbitrary files on the server by embedding a crafted path traversal string in a forum po

thehackerwire@mastodon.social at 2026-04-05T01:19:59.000Z ##

🟠 CVE-2026-3666 - High (8.8)

The wpForo Forum plugin for WordPress is vulnerable to arbitrary file deletion in all versions up to, and including, 2.4.16. This is due to a missing file name/path validation against path traversal sequences. This makes it possible for authentica...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-04-05T00:00:36.814Z ##

wpForo Forum plugin for WordPress (up to 2.4.16) has a HIGH severity path traversal vuln (CVE-2026-3666) 🛡️. Authenticated users can delete server files. No patch yet — restrict permissions & watch for suspicious deletions. More: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-05T01:19:59.000Z ##

🟠 CVE-2026-3666 - High (8.8)

The wpForo Forum plugin for WordPress is vulnerable to arbitrary file deletion in all versions up to, and including, 2.4.16. This is due to a missing file name/path validation against path traversal sequences. This makes it possible for authentica...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-05T00:00:36.000Z ##

wpForo Forum plugin for WordPress (up to 2.4.16) has a HIGH severity path traversal vuln (CVE-2026-3666) 🛡️. Authenticated users can delete server files. No patch yet — restrict permissions & watch for suspicious deletions. More: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Infosec

##

CVE-2026-3445
(7.1 HIGH)

EPSS: 0.03%

updated 2026-04-04T09:30:37

2 posts

The Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress plugin for WordPress is vulnerable to unauthorized membership payment bypass in all versions up to, and including, 4.16.11. This is due to a missing ownership verification on the `change_plan_sub_id` parameter in the `process_checkout()` function. This makes it possible for aut

offseq at 2026-04-05T04:30:26.620Z ##

🚨 HIGH severity: CVE-2026-3445 in ProfilePress plugin lets subscriber-level users bypass paid memberships via missing authorization in process_checkout(). No patch yet. Restrict privileges & monitor activity. Details: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-04-05T04:30:26.000Z ##

🚨 HIGH severity: CVE-2026-3445 in ProfilePress plugin lets subscriber-level users bypass paid memberships via missing authorization in process_checkout(). No patch yet. Restrict privileges & monitor activity. Details: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln

##

CVE-2026-4896
(8.1 HIGH)

EPSS: 0.01%

updated 2026-04-04T09:30:31

2 posts

The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 6.7.25 via multiple AJAX actions including `wcfm_modify_order_status`, `delete_wcfm_article`, `delete_wcfm_product`, and the article management controller due to missing validation on user-suppl

thehackerwire@mastodon.social at 2026-04-05T01:20:19.000Z ##

🟠 CVE-2026-4896 - High (8.1)

The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 6.7.25 via multiple AJAX actions includ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-05T01:20:19.000Z ##

🟠 CVE-2026-4896 - High (8.1)

The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 6.7.25 via multiple AJAX actions includ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5425
(7.2 HIGH)

EPSS: 0.06%

updated 2026-04-04T09:16:20.500000

2 posts

The Widgets for Social Photo Feed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'feed_data' parameter keys in all versions up to, and including, 1.7.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

offseq at 2026-04-05T07:30:27.798Z ##

⚠️ HIGH severity: Stored XSS (CVE-2026-5425) in trustindex Widgets for Social Photo Feed (≤1.7.9) allows unauthenticated attackers to inject malicious scripts via 'feed_data'. No patch yet — disable plugin. Details: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-04-05T07:30:27.000Z ##

⚠️ HIGH severity: Stored XSS (CVE-2026-5425) in trustindex Widgets for Social Photo Feed (≤1.7.9) allows unauthenticated attackers to inject malicious scripts via 'feed_data'. No patch yet — disable plugin. Details: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #XSS #Vuln

##

CVE-2026-35216
(9.1 CRITICAL)

EPSS: 0.34%

updated 2026-04-04T06:04:59

2 posts

### Summary An unauthenticated attacker can achieve Remote Code Execution (RCE) on the Budibase server by triggering an automation that contains a Bash step via the public webhook endpoint. No authentication is required to trigger the exploit. The process executes as `root` inside the container. ### Details **Vulnerable endpoint — `packages/server/src/api/routes/webhook.ts` line 13:** ```typesc

thehackerwire@mastodon.social at 2026-04-04T03:01:21.000Z ##

🔴 CVE-2026-35216 - Critical (9)

Budibase is an open-source low-code platform. Prior to version 3.33.4, an unauthenticated attacker can achieve Remote Code Execution (RCE) on the Budibase server by triggering an automation that contains a Bash step via the public webhook endpoint...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T03:01:21.000Z ##

🔴 CVE-2026-35216 - Critical (9)

Budibase is an open-source low-code platform. Prior to version 3.33.4, an unauthenticated attacker can achieve Remote Code Execution (RCE) on the Budibase server by triggering an automation that contains a Bash step via the public webhook endpoint...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35214
(8.7 HIGH)

EPSS: 0.11%

updated 2026-04-04T06:04:22

2 posts

## Summary The plugin file upload endpoint (`POST /api/plugin/upload`) passes the user-supplied filename directly to `createTempFolder()` without sanitizing path traversal sequences. An attacker with Global Builder privileges can craft a multipart upload with a filename containing `../` to delete arbitrary directories via `rmSync` and write arbitrary files via tarball extraction to any filesystem

thehackerwire@mastodon.social at 2026-04-04T03:01:12.000Z ##

🟠 CVE-2026-35214 - High (8.7)

Budibase is an open-source low-code platform. Prior to version 3.33.4, the plugin file upload endpoint (POST /api/plugin/upload) passes the user-supplied filename directly to createTempFolder() without sanitizing path traversal sequences. An attac...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T03:01:12.000Z ##

🟠 CVE-2026-35214 - High (8.7)

Budibase is an open-source low-code platform. Prior to version 3.33.4, the plugin file upload endpoint (POST /api/plugin/upload) passes the user-supplied filename directly to createTempFolder() without sanitizing path traversal sequences. An attac...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4636
(8.1 HIGH)

EPSS: 0.03%

updated 2026-04-04T06:00:16

2 posts

A flaw was found in Keycloak. An authenticated user with the uma_protection role can bypass User-Managed Access (UMA) policy validation. This allows the attacker to include resource identifiers owned by other users in a policy creation request, even if the URL path specifies an attacker-owned resource. Consequently, the attacker gains unauthorized permissions to victim-owned resources, enabling th

thehackerwire@mastodon.social at 2026-04-05T03:01:15.000Z ##

🟠 CVE-2026-4636 - High (8.1)

A flaw was found in Keycloak. An authenticated user with the uma_protection role can bypass User-Managed Access (UMA) policy validation. This allows the attacker to include resource identifiers owned by other users in a policy creation request, ev...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-05T03:01:15.000Z ##

🟠 CVE-2026-4636 - High (8.1)

A flaw was found in Keycloak. An authenticated user with the uma_protection role can bypass User-Managed Access (UMA) policy validation. This allows the attacker to include resource identifiers owned by other users in a policy creation request, ev...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35616
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-04-04T01:16:39.720000

17 posts

A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.

2 repos

https://github.com/0xBlackash/CVE-2026-35616

https://github.com/z3r0h3ro/CVE-2026-35616-poc

beyondmachines1 at 2026-04-05T08:01:10.326Z ##

Fortinet Issues Emergency Hotfix for Actively Exploited FortiClient EMS Zero-Day

Fortinet has released emergency hotfix for an actively exploited critical zero-day vulnerability (CVE-2026-35616) in FortiClient EMS that allows unauthenticated attackers to bypass API security and run arbitrary commands.

**If you use FortiClient EMS versions 7.4.5 or 7.4.6, apply Fortinet's emergency hotfix ASAP. It's being actively exploited andcan give attackers full control of your endpoint management server. While you're at it, check your EMS API logs for any signs of unauthorized access or unusual command execution that might indicate you've already been compromised.**

beyondmachines.net/event_detai

##

youranonnewsirc@nerdculture.de at 2026-04-05T03:43:01.000Z ##

Recent global developments on April 4, 2026:

Geopolitical: Trump challenges NATO's future over "Operation Epic Fury" participation; US-Iran conflict ongoing, Planet Labs withholds satellite images.
Technology: AI breakthroughs include Google DeepMind's Alpha Green for code optimization & OpenAI's GPT-6 on smartphones. Green compute initiatives accelerate.
Cybersecurity: Fortinet zero-day (CVE-2026-35616) exploited; EC suffers Trivy supply chain breach. New polymorphic malware & AI-generated bot threats emerge.

#AnonNews_irc #Cybersecurity #News

##

hackerworkspace at 2026-04-04T22:28:25.841Z ##

Fortinet CVE-2026-35616 Actively Exploited - Decipher

decipher.sc/2026/04/04/fortine

Read on HackerWorkspace: hackerworkspace.com/article/fo

##

youranonnewsirc@nerdculture.de at 2026-04-04T19:43:05.000Z ##

Geopolitical tensions escalate as the Iran War continues, leading to the functional closure of the Strait of Hormuz, severely impacting global energy markets. In cybersecurity, the European Commission confirmed a 300GB data breach on April 4, 2026, stemming from a Trivy supply chain attack. Additionally, critical RCE flaws in Progress ShareFile were reported on April 3, 2026, and an actively exploited FortiClient EMS zero-day (CVE-2026-35616) necessitated urgent hotfixes on April 4, 2026.

#AnonNews_irc #Cybersecurity #News

##

Matchbook3469@mastodon.social at 2026-04-04T15:00:12.000Z ##

🔴 New security advisory:

CVE-2026-35616 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #PatchNow #InfoSecCommunity

##

0x3e4@cyberplace.social at 2026-04-04T08:22:25.000Z ##

FortiYikes at it again..

🔐 CVE-2026-35616

📊 CVSS: 9.1 · Critical
📅 04/04/2026, 05:31 AM
🛡️ CWE: CWE-284
📦 Affected: Fortinet FortiClientEMS (>= 7.4.5, <= 7.4.6)
📚 fortiguard.fortinet.com/psirt/ nvd.nist.gov/vuln/detail/CVE-2

🔗 hecate.pw/vulnerability/CVE-20

#cve #vulnerability #hecate

##

rxerium at 2026-04-04T07:31:20.866Z ##

🚨 Forticlient EMS Zero Day disclosed minutes ago actively being exploited in the wild as being report by @DefusedCyber & @fortinet

I've created a vulnerability detection script to check for vulnerable instances:
github.com/rxerium/rxerium-tem

Fortinet recommends that you install hotfixes for EMS 7.4.5 / 7.4.6 as per their advisory:
fortiguard.com/psirt/FG-IR-26-

##

offseq at 2026-04-04T01:30:28.984Z ##

🚨 CRITICAL: CVE-2026-35616 affects Fortinet FortiClientEMS 7.4.5 – 7.4.6. Unauthenticated attackers can run code via crafted requests — leading to total system compromise. Official fix is out. Patch ASAP! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-04T01:21:54.000Z ##

🔴 CVE-2026-35616 - Critical (9.8)

A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

beyondmachines1@infosec.exchange at 2026-04-05T08:01:10.000Z ##

Fortinet Issues Emergency Hotfix for Actively Exploited FortiClient EMS Zero-Day

Fortinet has released emergency hotfix for an actively exploited critical zero-day vulnerability (CVE-2026-35616) in FortiClient EMS that allows unauthenticated attackers to bypass API security and run arbitrary commands.

**If you use FortiClient EMS versions 7.4.5 or 7.4.6, apply Fortinet's emergency hotfix ASAP. It's being actively exploited andcan give attackers full control of your endpoint management server. While you're at it, check your EMS API logs for any signs of unauthorized access or unusual command execution that might indicate you've already been compromised.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

youranonnewsirc@nerdculture.de at 2026-04-05T03:43:01.000Z ##

Recent global developments on April 4, 2026:

Geopolitical: Trump challenges NATO's future over "Operation Epic Fury" participation; US-Iran conflict ongoing, Planet Labs withholds satellite images.
Technology: AI breakthroughs include Google DeepMind's Alpha Green for code optimization & OpenAI's GPT-6 on smartphones. Green compute initiatives accelerate.
Cybersecurity: Fortinet zero-day (CVE-2026-35616) exploited; EC suffers Trivy supply chain breach. New polymorphic malware & AI-generated bot threats emerge.

#AnonNews_irc #Cybersecurity #News

##

hackerworkspace@infosec.exchange at 2026-04-04T22:28:25.000Z ##

Fortinet CVE-2026-35616 Actively Exploited - Decipher

decipher.sc/2026/04/04/fortine

Read on HackerWorkspace: hackerworkspace.com/article/fo

#cybersecurity #vulnerability #exploit

##

youranonnewsirc@nerdculture.de at 2026-04-04T19:43:05.000Z ##

Geopolitical tensions escalate as the Iran War continues, leading to the functional closure of the Strait of Hormuz, severely impacting global energy markets. In cybersecurity, the European Commission confirmed a 300GB data breach on April 4, 2026, stemming from a Trivy supply chain attack. Additionally, critical RCE flaws in Progress ShareFile were reported on April 3, 2026, and an actively exploited FortiClient EMS zero-day (CVE-2026-35616) necessitated urgent hotfixes on April 4, 2026.

#AnonNews_irc #Cybersecurity #News

##

0x3e4@cyberplace.social at 2026-04-04T08:22:25.000Z ##

FortiYikes at it again..

🔐 CVE-2026-35616

📊 CVSS: 9.1 · Critical
📅 04/04/2026, 05:31 AM
🛡️ CWE: CWE-284
📦 Affected: Fortinet FortiClientEMS (>= 7.4.5, <= 7.4.6)
📚 fortiguard.fortinet.com/psirt/ nvd.nist.gov/vuln/detail/CVE-2

🔗 hecate.pw/vulnerability/CVE-20

#cve #vulnerability #hecate

##

rxerium@infosec.exchange at 2026-04-04T07:31:20.000Z ##

🚨 Forticlient EMS Zero Day disclosed minutes ago actively being exploited in the wild as being report by @DefusedCyber & @fortinet

I've created a vulnerability detection script to check for vulnerable instances:
github.com/rxerium/rxerium-tem

Fortinet recommends that you install hotfixes for EMS 7.4.5 / 7.4.6 as per their advisory:
fortiguard.com/psirt/FG-IR-26-

##

offseq@infosec.exchange at 2026-04-04T01:30:28.000Z ##

🚨 CRITICAL: CVE-2026-35616 affects Fortinet FortiClientEMS 7.4.5 – 7.4.6. Unauthenticated attackers can run code via crafted requests — leading to total system compromise. Official fix is out. Patch ASAP! radar.offseq.com/threat/cve-20 #OffSeq #Fortinet #Vuln #PatchTuesday

##

thehackerwire@mastodon.social at 2026-04-04T01:21:54.000Z ##

🔴 CVE-2026-35616 - Critical (9.8)

A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-15620
(8.6 HIGH)

EPSS: 0.01%

updated 2026-04-04T00:31:26

1 posts

HiOS Switch Platform contains a denial-of-service vulnerability in the web interface that allows remote attackers to reboot the affected device by sending a malicious HTTP GET request to a specific endpoint. Attackers can trigger an uncontrolled reboot condition through crafted HTTP requests to cause service disruption and unavailability of the switch.

thehackerwire@mastodon.social at 2026-04-03T01:59:51.000Z ##

🟠 CVE-2025-15620 - High (8.6)

HiOS Switch Platform versions 09.1.00 prior to 09.4.05 and 10.3.01 contains a denial-of-service vulnerability in the web interface that allows remote attackers to reboot the affected device by sending a malicious HTTP GET request to a specific end...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34955
(8.8 HIGH)

EPSS: 0.02%

updated 2026-04-04T00:16:19.370000

2 posts

PraisonAI is a multi-agent teams system. Prior to version 4.5.97, SubprocessSandbox in all modes (BASIC, STRICT, NETWORK_ISOLATED) calls subprocess.run() with shell=True and relies solely on string-pattern matching to block dangerous commands. The blocklist does not include sh or bash as standalone executables, allowing trivial sandbox escape in STRICT mode via sh -c '<command>'. This issue has be

thehackerwire@mastodon.social at 2026-04-04T01:10:45.000Z ##

🟠 CVE-2026-34955 - High (8.8)

PraisonAI is a multi-agent teams system. Prior to version 4.5.97, SubprocessSandbox in all modes (BASIC, STRICT, NETWORK_ISOLATED) calls subprocess.run() with shell=True and relies solely on string-pattern matching to block dangerous commands. The...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T01:10:45.000Z ##

🟠 CVE-2026-34955 - High (8.8)

PraisonAI is a multi-agent teams system. Prior to version 4.5.97, SubprocessSandbox in all modes (BASIC, STRICT, NETWORK_ISOLATED) calls subprocess.run() with shell=True and relies solely on string-pattern matching to block dangerous commands. The...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34771
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-04T00:16:17.980000

2 posts

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.0, 40.7.0, and 41.0.0-beta.8, apps that register an asynchronous session.setPermissionRequestHandler() may be vulnerable to a use-after-free when handling fullscreen, pointer-lock, or keyboard-lock permission requests. If the requesting frame navigates or the windo

thehackerwire@mastodon.social at 2026-04-04T01:15:00.000Z ##

🟠 CVE-2026-34771 - High (7.5)

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.0, 40.7.0, and 41.0.0-beta.8, apps that register an asynchronous session.setPermissionRequestHandler() may be vu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T01:15:00.000Z ##

🟠 CVE-2026-34771 - High (7.5)

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.0, 40.7.0, and 41.0.0-beta.8, apps that register an asynchronous session.setPermissionRequestHandler() may be vu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34954
(8.6 HIGH)

EPSS: 0.03%

updated 2026-04-03T23:17:06.810000

2 posts

PraisonAI is a multi-agent teams system. Prior to version 1.5.95, FileTools.download_file() in praisonaiagents validates the destination path but performs no validation on the url parameter, passing it directly to httpx.stream() with follow_redirects=True. An attacker who controls the URL can reach any host accessible from the server including cloud metadata services and internal network services.

thehackerwire@mastodon.social at 2026-04-04T01:22:11.000Z ##

🟠 CVE-2026-34954 - High (8.6)

PraisonAI is a multi-agent teams system. Prior to version 1.5.95, FileTools.download_file() in praisonaiagents validates the destination path but performs no validation on the url parameter, passing it directly to httpx.stream() with follow_redire...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T01:22:11.000Z ##

🟠 CVE-2026-34954 - High (8.6)

PraisonAI is a multi-agent teams system. Prior to version 1.5.95, FileTools.download_file() in praisonaiagents validates the destination path but performs no validation on the url parameter, passing it directly to httpx.stream() with follow_redire...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34952
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-04-03T23:17:06.490000

5 posts

PraisonAI is a multi-agent teams system. Prior to version 4.5.97, the PraisonAI Gateway server accepts WebSocket connections at /ws and serves agent topology at /info with no authentication. Any network client can connect, enumerate registered agents, and send arbitrary messages to agents and their tool sets. This issue has been patched in version 4.5.97.

Matchbook3469@mastodon.social at 2026-04-05T13:48:14.000Z ##

⛔ New security advisory:

CVE-2026-34952 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #ZeroDay #ThreatIntel

##

offseq at 2026-04-04T03:00:27.998Z ##

🚨 CVE-2026-34952 (CRITICAL): PraisonAI < 4.5.97 lets unauthenticated users access /ws & /info — enumerate agents & send arbitrary messages. High confidentiality & integrity risk. Patch to 4.5.97+ now! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-04T01:15:17.000Z ##

🔴 CVE-2026-34952 - Critical (9.1)

PraisonAI is a multi-agent teams system. Prior to version 4.5.97, the PraisonAI Gateway server accepts WebSocket connections at /ws and serves agent topology at /info with no authentication. Any network client can connect, enumerate registered age...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-04T03:00:27.000Z ##

🚨 CVE-2026-34952 (CRITICAL): PraisonAI < 4.5.97 lets unauthenticated users access /ws & /info — enumerate agents & send arbitrary messages. High confidentiality & integrity risk. Patch to 4.5.97+ now! radar.offseq.com/threat/cve-20 #OffSeq #PraisonAI #Vuln #Cybersecurity

##

thehackerwire@mastodon.social at 2026-04-04T01:15:17.000Z ##

🔴 CVE-2026-34952 - Critical (9.1)

PraisonAI is a multi-agent teams system. Prior to version 4.5.97, the PraisonAI Gateway server accepts WebSocket connections at /ws and serves agent topology at /info with no authentication. Any network client can connect, enumerate registered age...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34938
(10.0 CRITICAL)

EPSS: 0.10%

updated 2026-04-03T23:17:06.170000

5 posts

PraisonAI is a multi-agent teams system. Prior to version 1.5.90, execute_code() in praisonai-agents runs attacker-controlled Python inside a three-layer sandbox that can be fully bypassed by passing a str subclass with an overridden startswith() method to the _safe_getattr wrapper, achieving arbitrary OS command execution on the host. This issue has been patched in version 1.5.90.

Matchbook3469@mastodon.social at 2026-04-04T07:33:50.000Z ##

🔴 New security advisory:

CVE-2026-34938 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #PatchNow #InfoSecCommunity

##

offseq at 2026-04-04T04:30:26.973Z ##

🚨 CRITICAL: CVE-2026-34938 in PraisonAI <1.5.90 lets attackers bypass sandbox protections and achieve arbitrary OS command execution. Immediate upgrade to v1.5.90+ required. Full system compromise possible. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-04T01:15:09.000Z ##

🔴 CVE-2026-34938 - Critical (10)

PraisonAI is a multi-agent teams system. Prior to version 1.5.90, execute_code() in praisonai-agents runs attacker-controlled Python inside a three-layer sandbox that can be fully bypassed by passing a str subclass with an overridden startswith() ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-04T04:30:26.000Z ##

🚨 CRITICAL: CVE-2026-34938 in PraisonAI <1.5.90 lets attackers bypass sandbox protections and achieve arbitrary OS command execution. Immediate upgrade to v1.5.90+ required. Full system compromise possible. radar.offseq.com/threat/cve-20 #OffSeq #CVE202634938 #infosec #PraisonAI

##

thehackerwire@mastodon.social at 2026-04-04T01:15:09.000Z ##

🔴 CVE-2026-34938 - Critical (10)

PraisonAI is a multi-agent teams system. Prior to version 1.5.90, execute_code() in praisonai-agents runs attacker-controlled Python inside a three-layer sandbox that can be fully bypassed by passing a str subclass with an overridden startswith() ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33175
(8.8 HIGH)

EPSS: 0.10%

updated 2026-04-03T22:16:26.483000

2 posts

OAuthenticator is software that allows OAuth2 identity providers to be plugged in and used with JupyterHub. Prior to version 17.4.0, an authentication bypass vulnerability in oauthenticator allows an attacker with an unverified email address on an Auth0 tenant to login to JupyterHub. When email is used as the usrname_claim, this gives users control over their username and the possibility of accoun

thehackerwire@mastodon.social at 2026-04-04T01:53:30.000Z ##

🟠 CVE-2026-33175 - High (8.8)

OAuthenticator is software that allows OAuth2 identity providers to be plugged in and used with JupyterHub. Prior to version 17.4.0, an authentication bypass vulnerability in oauthenticator allows an attacker with an unverified email address on an...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T01:53:30.000Z ##

🟠 CVE-2026-33175 - High (8.8)

OAuthenticator is software that allows OAuth2 identity providers to be plugged in and used with JupyterHub. Prior to version 17.4.0, an authentication bypass vulnerability in oauthenticator allows an attacker with an unverified email address on an...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34824
(7.5 HIGH)

EPSS: 0.02%

updated 2026-04-03T21:54:37

2 posts

### Summary An uncontrolled resource consumption vulnerability exists in the WebSocket implementation of the Mesop framework. An unauthenticated attacker can send a rapid succession of WebSocket messages, forcing the server to spawn an unbounded number of operating system threads. This leads to thread exhaustion and Out of Memory (OOM) errors, causing a complete Denial of Service (DoS) for any app

thehackerwire@mastodon.social at 2026-04-04T01:22:20.000Z ##

🟠 CVE-2026-34824 - High (7.5)

Mesop is a Python-based UI framework that allows users to build web applications. From version 1.2.3 to before version 1.2.5, an uncontrolled resource consumption vulnerability exists in the WebSocket implementation of the Mesop framework. An unau...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T01:22:20.000Z ##

🟠 CVE-2026-34824 - High (7.5)

Mesop is a Python-based UI framework that allows users to build web applications. From version 1.2.3 to before version 1.2.5, an uncontrolled resource consumption vulnerability exists in the WebSocket implementation of the Mesop framework. An unau...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33950
(9.4 CRITICAL)

EPSS: 0.05%

updated 2026-04-03T21:37:19

1 posts

## Summary According to SignalK's security documentation, when a server is first initialized without security enabled, the **/skServer/enableSecurity** endpoint is intentionally exposed to allow the owner to set up the initial admin account. This initial open access is by design. However, the critical vulnerability is that this route is never deregistered or disabled after the initial successful

thehackerwire@mastodon.social at 2026-04-03T04:00:37.000Z ##

🔴 CVE-2026-33950 - Critical (9.4)

Signal K Server is a server application that runs on a central hub in a boat. Prior to version 2.24.0-beta.4, there is a privilege escalation vulnerability by Admin Role Injection via /enableSecurity. An unauthenticated attacker can gain full Admi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25197
(9.1 CRITICAL)

EPSS: 0.03%

updated 2026-04-03T21:31:49

4 posts

A specific endpoint allows authenticated users to pivot to other user profiles by modifying the id number in the API call.

2 repos

https://github.com/MichaelAdamGroberman/CVE-2026-25197

https://github.com/MichaelAdamGroberman/ICSA-26-055-03

offseq at 2026-04-04T10:30:27.054Z ##

🚨 CVE-2026-25197 (CRITICAL): Gardyn Cloud API lets authenticated users access other profiles by tweaking ID in API calls (CWE-639). No patch yet — restrict access & monitor for abuse. Details: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-04T02:15:36.000Z ##

🔴 CVE-2026-25197 - Critical (9.1)

A specific endpoint allows authenticated users to pivot to other user profiles by modifying the id number in the API call.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-04T10:30:27.000Z ##

🚨 CVE-2026-25197 (CRITICAL): Gardyn Cloud API lets authenticated users access other profiles by tweaking ID in API calls (CWE-639). No patch yet — restrict access & monitor for abuse. Details: radar.offseq.com/threat/cve-20 #OffSeq #APIsecurity #CVE202625197

##

thehackerwire@mastodon.social at 2026-04-04T02:15:36.000Z ##

🔴 CVE-2026-25197 - Critical (9.1)

A specific endpoint allows authenticated users to pivot to other user profiles by modifying the id number in the API call.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-10681
(8.6 HIGH)

EPSS: 0.04%

updated 2026-04-03T21:31:49

2 posts

Storage credentials are hardcoded in the mobile app and device firmware. These credentials do not adequately limit end user permissions and do not expire within a reasonable amount of time. This vulnerability may grant unauthorized access to production storage containers.

2 repos

https://github.com/MichaelAdamGroberman/ICSA-26-055-03

https://github.com/MichaelAdamGroberman/CVE-2025-10681

thehackerwire@mastodon.social at 2026-04-04T02:27:23.000Z ##

🟠 CVE-2025-10681 - High (8.6)

Storage credentials are hardcoded in the mobile app and device firmware. These credentials do not adequately limit end user permissions and do not expire within a reasonable amount of time. This vulnerability may grant unauthorized access to produ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T02:27:23.000Z ##

🟠 CVE-2025-10681 - High (8.6)

Storage credentials are hardcoded in the mobile app and device firmware. These credentials do not adequately limit end user permissions and do not expire within a reasonable amount of time. This vulnerability may grant unauthorized access to produ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22665
(8.1 HIGH)

EPSS: 0.03%

updated 2026-04-03T21:31:49

2 posts

prompts.chat prior to commit 1464475 contains an identity confusion vulnerability due to inconsistent case-sensitive and case-insensitive handling of usernames across write and read paths, allowing attackers to create case-variant usernames that bypass uniqueness checks. Attackers can exploit non-deterministic username resolution to impersonate victim accounts, replace profile content on canonical

thehackerwire@mastodon.social at 2026-04-04T02:15:27.000Z ##

🟠 CVE-2026-22665 - High (8.1)

prompts.chat prior to commit 1464475 contains an identity confusion vulnerability due to inconsistent case-sensitive and case-insensitive handling of usernames across write and read paths, allowing attackers to create case-variant usernames that b...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T02:15:27.000Z ##

🟠 CVE-2026-22665 - High (8.1)

prompts.chat prior to commit 1464475 contains an identity confusion vulnerability due to inconsistent case-sensitive and case-insensitive handling of usernames across write and read paths, allowing attackers to create case-variant usernames that b...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28766
(9.3 CRITICAL)

EPSS: 0.07%

updated 2026-04-03T21:31:49

2 posts

A specific endpoint exposes all user account information for registered Gardyn users without requiring authentication.

2 repos

https://github.com/MichaelAdamGroberman/CVE-2026-28766

https://github.com/MichaelAdamGroberman/ICSA-26-055-03

thehackerwire@mastodon.social at 2026-04-04T02:02:09.000Z ##

🔴 CVE-2026-28766 - Critical (9.3)

A specific endpoint exposes all user account information for registered Gardyn users without requiring authentication.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T02:02:09.000Z ##

🔴 CVE-2026-28766 - Critical (9.3)

A specific endpoint exposes all user account information for registered Gardyn users without requiring authentication.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35558
(7.8 HIGH)

EPSS: 0.04%

updated 2026-04-03T21:31:49

2 posts

Improper neutralization of special elements in the authentication components in Amazon Athena ODBC driver before 2.1.0.0 might allow a threat actor to execute arbitrary code or redirect authentication flows by using specially crafted connection parameters that are processed by the driver during user-initiated authentication. To remediate this issue, users should upgrade to version 2.1.0.0.

thehackerwire@mastodon.social at 2026-04-04T02:02:00.000Z ##

🟠 CVE-2026-35558 - High (7.8)

Improper neutralization of special elements in the authentication components in Amazon Athena ODBC driver before 2.1.0.0 might allow a threat actor to execute arbitrary code or redirect authentication flows by using specially crafted connection pa...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T02:02:00.000Z ##

🟠 CVE-2026-35558 - High (7.8)

Improper neutralization of special elements in the authentication components in Amazon Athena ODBC driver before 2.1.0.0 might allow a threat actor to execute arbitrary code or redirect authentication flows by using specially crafted connection pa...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32646
(7.5 HIGH)

EPSS: 0.07%

updated 2026-04-03T21:31:49

2 posts

A specific administrative endpoint is accessible without proper authentication, exposing device management functions.

2 repos

https://github.com/MichaelAdamGroberman/ICSA-26-055-03

https://github.com/MichaelAdamGroberman/CVE-2026-32646

thehackerwire@mastodon.social at 2026-04-04T02:00:09.000Z ##

🟠 CVE-2026-32646 - High (7.5)

A specific administrative endpoint is accessible without proper authentication, exposing device management functions.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T02:00:09.000Z ##

🟠 CVE-2026-32646 - High (7.5)

A specific administrative endpoint is accessible without proper authentication, exposing device management functions.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35562
(7.5 HIGH)

EPSS: 0.08%

updated 2026-04-03T21:31:49

2 posts

Allocation of resources without limits in the parsing components in Amazon Athena ODBC driver before 2.1.0.0 might allow a threat actor to cause a denial of service by delivering crafted input that triggers excessive resource consumption during the driver's parsing operations. To remediate this issue, users should upgrade to version 2.1.0.0.

thehackerwire@mastodon.social at 2026-04-04T01:59:49.000Z ##

🟠 CVE-2026-35562 - High (7.5)

Allocation of resources without limits in the parsing components in Amazon Athena ODBC driver before 2.1.0.0 might allow a threat actor to cause a denial of service by delivering crafted input that triggers excessive resource consumption during th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T01:59:49.000Z ##

🟠 CVE-2026-35562 - High (7.5)

Allocation of resources without limits in the parsing components in Amazon Athena ODBC driver before 2.1.0.0 might allow a threat actor to cause a denial of service by delivering crafted input that triggers excessive resource consumption during th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22664
(7.7 HIGH)

EPSS: 0.03%

updated 2026-04-03T21:31:48

2 posts

prompts.chat prior to commit 30a8f04 contains a server-side request forgery vulnerability in Fal.ai media status polling that allows authenticated users to perform arbitrary outbound requests by supplying attacker-controlled URLs in the token parameter. Attackers can exploit the lack of URL validation to disclose the FAL_API_KEY in the Authorization header, enabling credential theft, internal netw

thehackerwire@mastodon.social at 2026-04-04T02:15:17.000Z ##

🟠 CVE-2026-22664 - High (7.7)

prompts.chat prior to commit 30a8f04 contains a server-side request forgery vulnerability in Fal.ai media status polling that allows authenticated users to perform arbitrary outbound requests by supplying attacker-controlled URLs in the token para...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T02:15:17.000Z ##

🟠 CVE-2026-22664 - High (7.7)

prompts.chat prior to commit 30a8f04 contains a server-side request forgery vulnerability in Fal.ai media status polling that allows authenticated users to perform arbitrary outbound requests by supplying attacker-controlled URLs in the token para...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5485
(7.8 HIGH)

EPSS: 0.03%

updated 2026-04-03T21:17:12.603000

2 posts

OS command injection in the browser-based authentication component in Amazon Athena ODBC driver before 2.0.5.1 on Linux might allow a threat actor to execute arbitrary code by using specially crafted connection parameters that are loaded by the driver during a local user-initiated connection. To remediate this issue, users should upgrade to version 2.0.5.1 or later.

thehackerwire@mastodon.social at 2026-04-04T01:59:59.000Z ##

🟠 CVE-2026-5485 - High (7.8)

OS command injection in the browser-based authentication component in Amazon Athena ODBC driver before 2.0.5.1 on Linux might allow a threat actor to execute arbitrary code by using specially crafted connection parameters that are loaded by the dr...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T01:59:59.000Z ##

🟠 CVE-2026-5485 - High (7.8)

OS command injection in the browser-based authentication component in Amazon Athena ODBC driver before 2.0.5.1 on Linux might allow a threat actor to execute arbitrary code by using specially crafted connection parameters that are loaded by the dr...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22663
(7.5 HIGH)

EPSS: 0.03%

updated 2026-04-03T21:17:09.337000

2 posts

prompts.chat prior to commit 7b81836 contains multiple authorization bypass vulnerabilities due to missing isPrivate checks across API endpoints and page metadata generation that allow unauthorized users to access sensitive data associated with private prompts. Attackers can exploit these missing authorization checks to retrieve private prompt version history, change requests, examples, current co

thehackerwire@mastodon.social at 2026-04-04T02:02:18.000Z ##

🟠 CVE-2026-22663 - High (7.5)

prompts.chat prior to commit 7b81836 contains multiple authorization bypass vulnerabilities due to missing isPrivate checks across API endpoints and page metadata generation that allow unauthorized users to access sensitive data associated with pr...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T02:02:18.000Z ##

🟠 CVE-2026-22663 - High (7.5)

prompts.chat prior to commit 7b81836 contains multiple authorization bypass vulnerabilities due to missing isPrivate checks across API endpoints and page metadata generation that allow unauthorized users to access sensitive data associated with pr...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22661
(8.1 HIGH)

EPSS: 0.04%

updated 2026-04-03T21:17:08.970000

2 posts

prompts.chat prior to commit 0f8d4c3 contains a path traversal vulnerability in skill file handling that allows attackers to write arbitrary files to the client system by crafting malicious ZIP archives with unsanitized filenames containing path traversal sequences. Attackers can exploit missing server-side filename validation to inject path traversal sequences ../ into skill file archives, which

thehackerwire@mastodon.social at 2026-04-04T02:27:32.000Z ##

🟠 CVE-2026-22661 - High (8.1)

prompts.chat prior to commit 0f8d4c3 contains a path traversal vulnerability in skill file handling that allows attackers to write arbitrary files to the client system by crafting malicious ZIP archives with unsanitized filenames containing path t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T02:27:32.000Z ##

🟠 CVE-2026-22661 - High (8.1)

prompts.chat prior to commit 0f8d4c3 contains a path traversal vulnerability in skill file handling that allows attackers to write arbitrary files to the client system by crafting malicious ZIP archives with unsanitized filenames containing path t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34758
(9.1 CRITICAL)

EPSS: 0.03%

updated 2026-04-03T19:52:26.097000

1 posts

OneUptime is an open-source monitoring and observability platform. Prior to version 10.0.42, unauthenticated access to Notification test and Phone Number management endpoints allows SMS/Call/Email/WhatsApp abuse and phone number purchase. This issue has been patched in version 10.0.42.

thehackerwire@mastodon.social at 2026-04-03T02:03:29.000Z ##

🔴 CVE-2026-34758 - Critical (9.1)

OneUptime is an open-source monitoring and observability platform. Prior to version 10.0.42, unauthenticated access to Notification test and Phone Number management endpoints allows SMS/Call/Email/WhatsApp abuse and phone number purchase. This iss...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34742
(8.1 HIGH)

EPSS: 0.05%

updated 2026-04-03T19:48:25.627000

2 posts

The Go MCP SDK used Go's standard encoding/json. Prior to version 1.4.0, the Model Context Protocol (MCP) Go SDK does not enable DNS rebinding protection by default for HTTP-based servers. When an HTTP-based MCP server is run on localhost without authentication with StreamableHTTPHandler or SSEHandler, a malicious website could exploit DNS rebinding to bypass same-origin policy restrictions and se

thehackerwire@mastodon.social at 2026-04-04T05:00:36.000Z ##

🟠 CVE-2026-34742 - High (8.1)

The Go MCP SDK used Go's standard encoding/json. Prior to version 1.4.0, the Model Context Protocol (MCP) Go SDK does not enable DNS rebinding protection by default for HTTP-based servers. When an HTTP-based MCP server is run on localhost without ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T05:00:36.000Z ##

🟠 CVE-2026-34742 - High (8.1)

The Go MCP SDK used Go's standard encoding/json. Prior to version 1.4.0, the Model Context Protocol (MCP) Go SDK does not enable DNS rebinding protection by default for HTTP-based servers. When an HTTP-based MCP server is run on localhost without ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-59711
(8.3 HIGH)

EPSS: 0.87%

updated 2026-04-03T18:31:21

2 posts

An issue was discovered in Biztalk360 before 11.5. Because of mishandling of user-provided input in an upload mechanism, an authenticated attacker is able to write files outside of the destination directory and/or coerce an authentication from the service, aka Directory Traversal.

thehackerwire@mastodon.social at 2026-04-04T03:02:43.000Z ##

🟠 CVE-2025-59711 - High (8.3)

An issue was discovered in Biztalk360 before 11.5. Because of mishandling of user-provided input in an upload mechanism, an authenticated attacker is able to write files outside of the destination directory and/or coerce an authentication from the...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T03:02:43.000Z ##

🟠 CVE-2025-59711 - High (8.3)

An issue was discovered in Biztalk360 before 11.5. Because of mishandling of user-provided input in an upload mechanism, an authenticated attacker is able to write files outside of the destination directory and/or coerce an authentication from the...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26477
(7.5 HIGH)

EPSS: 0.11%

updated 2026-04-03T18:31:21

2 posts

An issue in Dokuwiki v.2025-05-14b 'Librarian' allows a remote attacker to cause a denial of service via the media_upload_xhr() function in the media.php file

thehackerwire@mastodon.social at 2026-04-04T03:02:33.000Z ##

🟠 CVE-2026-26477 - High (7.5)

An issue in Dokuwiki v.2025-05-14b 'Librarian' allows a remote attacker to cause a denial of service via the media_upload_xhr() function in the media.php file

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T03:02:33.000Z ##

🟠 CVE-2026-26477 - High (7.5)

An issue in Dokuwiki v.2025-05-14b 'Librarian' allows a remote attacker to cause a denial of service via the media_upload_xhr() function in the media.php file

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-43202
(8.8 HIGH)

EPSS: 0.02%

updated 2026-04-03T18:31:17

2 posts

This issue was addressed with improved memory handling. This issue is fixed in iOS 18.6 and iPadOS 18.6, macOS Sequoia 15.6. Processing a file may lead to memory corruption.

thehackerwire@mastodon.social at 2026-04-04T05:09:19.000Z ##

🟠 CVE-2025-43202 - High (8.8)

This issue was addressed with improved memory handling. This issue is fixed in iOS 18.6 and iPadOS 18.6, macOS Sequoia 15.6. Processing a file may lead to memory corruption.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T05:09:19.000Z ##

🟠 CVE-2025-43202 - High (8.8)

This issue was addressed with improved memory handling. This issue is fixed in iOS 18.6 and iPadOS 18.6, macOS Sequoia 15.6. Processing a file may lead to memory corruption.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-43219
(8.8 HIGH)

EPSS: 0.02%

updated 2026-04-03T18:31:17

1 posts

The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.6. Processing a maliciously crafted image may corrupt process memory.

thehackerwire@mastodon.social at 2026-04-03T02:30:28.000Z ##

🟠 CVE-2025-43219 - High (8.8)

The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.6. Processing a maliciously crafted image may corrupt process memory.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28373
(9.6 CRITICAL)

EPSS: 0.03%

updated 2026-04-03T18:16:24.323000

3 posts

The Stackfield Desktop App before 1.10.2 for macOS and Windows contains a path traversal vulnerability in certain decryption functionality when processing the filePath property. A malicious export can write arbitrary content to any path on the victim's filesystem.

Matchbook3469@mastodon.social at 2026-04-04T22:58:06.000Z ##

🔴 New security advisory:

CVE-2026-28373 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #PatchNow #InfoSecCommunity

##

thehackerwire@mastodon.social at 2026-04-04T03:00:32.000Z ##

🔴 CVE-2026-28373 - Critical (9.6)

The Stackfield Desktop App before 1.10.2 for macOS and Windows contains a path traversal vulnerability in certain decryption functionality when processing the filePath property. A malicious export can write arbitrary content to any path on the vic...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T03:00:32.000Z ##

🔴 CVE-2026-28373 - Critical (9.6)

The Stackfield Desktop App before 1.10.2 for macOS and Windows contains a path traversal vulnerability in certain decryption functionality when processing the filePath property. A malicious export can write arbitrary content to any path on the vic...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0545
(9.1 CRITICAL)

EPSS: 0.20%

updated 2026-04-03T18:16:21.540000

2 posts

In mlflow/mlflow, the FastAPI job endpoints under `/ajax-api/3.0/jobs/*` are not protected by authentication or authorization when the `basic-auth` app is enabled. This vulnerability affects the latest version of the repository. If job execution is enabled (`MLFLOW_SERVER_ENABLE_JOB_EXECUTION=true`) and any job function is allowlisted, any network client can submit, read, search, and cancel jobs w

thehackerwire@mastodon.social at 2026-04-04T03:00:22.000Z ##

🔴 CVE-2026-0545 - Critical (9.1)

In mlflow/mlflow, the FastAPI job endpoints under `/ajax-api/3.0/jobs/*` are not protected by authentication or authorization when the `basic-auth` app is enabled. This vulnerability affects the latest version of the repository. If job execution i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T03:00:22.000Z ##

🔴 CVE-2026-0545 - Critical (9.1)

In mlflow/mlflow, the FastAPI job endpoints under `/ajax-api/3.0/jobs/*` are not protected by authentication or authorization when the `basic-auth` app is enabled. This vulnerability affects the latest version of the repository. If job execution i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-43257
(8.7 HIGH)

EPSS: 0.01%

updated 2026-04-03T17:57:19.197000

1 posts

This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Sequoia 15.6. An app may be able to break out of its sandbox.

thehackerwire@mastodon.social at 2026-04-03T02:21:47.000Z ##

🟠 CVE-2025-43257 - High (8.7)

This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Sequoia 15.6. An app may be able to break out of its sandbox.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31818
(9.6 CRITICAL)

EPSS: 0.01%

updated 2026-04-03T16:16:39.800000

2 posts

Budibase is an open-source low-code platform. Prior to version 3.33.4, a server-side request forgery (SSRF) vulnerability exists in Budibase's REST datasource connector. The platform's SSRF protection mechanism (IP blacklist) is rendered completely ineffective because the BLACKLIST_IPS environment variable is not set by default in any of the official deployment configurations. When this variable i

thehackerwire@mastodon.social at 2026-04-04T03:02:23.000Z ##

🔴 CVE-2026-31818 - Critical (9.6)

Budibase is an open-source low-code platform. Prior to version 3.33.4, a server-side request forgery (SSRF) vulnerability exists in Budibase's REST datasource connector. The platform's SSRF protection mechanism (IP blacklist) is rendered completel...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T03:02:23.000Z ##

🔴 CVE-2026-31818 - Critical (9.6)

Budibase is an open-source low-code platform. Prior to version 3.33.4, a server-side request forgery (SSRF) vulnerability exists in Budibase's REST datasource connector. The platform's SSRF protection mechanism (IP blacklist) is rendered completel...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20160
(9.8 CRITICAL)

EPSS: 0.17%

updated 2026-04-03T16:11:11.357000

2 posts

A vulnerability in Cisco Smart Software Manager On-Prem (SSM On-Prem) could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected SSM On-Prem host. This vulnerability is due to the unintentional exposure of an&nbsp;internal service. An attacker could exploit this vulnerability by sending a crafted request to the API of the expo

beyondmachines1@infosec.exchange at 2026-04-02T15:01:26.000Z ##

Critical Cisco Smart Software Manager Vulnerability Allows Root Command Execution

Cisco patched a critical unauthenticated remote code execution vulnerability (CVE-2026-20160) in its Smart Software Manager On-Prem platform that allows attackers to gain root access. The flaw is caused by an exposed internal API and requires no user interaction to exploit.

**Treat this Cisco SSM update as an emergency priority because it allows full root access without a password and has no available workarounds. First, make sure the SSM is isolated from the internet and accessible only from trusted networks. Even with that, patch ASAP. Since license managers often have broad network reach, a compromise here provides attackers an ideal platform for lateral movement across your entire infrastructure.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

thehackerwire@mastodon.social at 2026-04-02T05:25:42.000Z ##

🔴 CVE-2026-20160 - Critical (9.8)

A vulnerability in Cisco Smart Software Manager On-Prem (SSM On-Prem) could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected SSM On-Prem host.

This vulnerability is due to...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31027
(9.8 CRITICAL)

EPSS: 0.15%

updated 2026-04-03T16:11:11.357000

1 posts

TOTOlink A3600R v5.9c.4959 contains a buffer overflow vulnerability in the setAppEasyWizardConfig interface of /lib/cste_modules/app.so. The vulnerability occurs because the rootSsid parameter is not properly validated for length, allowing remote attackers to trigger a buffer overflow, potentially leading to arbitrary code execution or denial of service.

thehackerwire@mastodon.social at 2026-04-02T06:00:12.000Z ##

🔴 CVE-2026-31027 - Critical (9.8)

TOTOlink A3600R v5.9c.4959 contains a buffer overflow vulnerability in the setAppEasyWizardConfig interface of /lib/cste_modules/app.so. The vulnerability occurs because the rootSsid parameter is not properly validated for length, allowing remote ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20155
(8.0 HIGH)

EPSS: 0.11%

updated 2026-04-03T16:11:11.357000

2 posts

A vulnerability in the web-based management interface of Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker with low privileges to access sensitive information that they are not authorized to access. This vulnerability is due to improper authorization checks on a REST API endpoint of an affected device.&nbsp;An attacker could exploit this vulnerabili

thehackerwire@mastodon.social at 2026-04-02T05:35:22.000Z ##

🟠 CVE-2026-20155 - High (8)

A vulnerability in the web-based management interface of Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker with low privileges to access sensitive information that they are not authorized to access.

...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-02T05:25:29.000Z ##

🟠 CVE-2026-20155 - High (8)

A vulnerability in the web-based management interface of Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker with low privileges to access sensitive information that they are not authorized to access.

...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4634
(7.5 HIGH)

EPSS: 0.07%

updated 2026-04-03T16:10:52.680000

2 posts

A flaw was found in Keycloak. An unauthenticated attacker can exploit this vulnerability by sending a specially crafted POST request with an excessively long scope parameter to the OpenID Connect (OIDC) token endpoint. This leads to high resource consumption and prolonged processing times, ultimately resulting in a Denial of Service (DoS) for the Keycloak server.

thehackerwire@mastodon.social at 2026-04-05T03:01:05.000Z ##

🟠 CVE-2026-4634 - High (7.5)

A flaw was found in Keycloak. An unauthenticated attacker can exploit this vulnerability by sending a specially crafted POST request with an excessively long scope parameter to the OpenID Connect (OIDC) token endpoint. This leads to high resource ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-05T03:01:05.000Z ##

🟠 CVE-2026-4634 - High (7.5)

A flaw was found in Keycloak. An unauthenticated attacker can exploit this vulnerability by sending a specially crafted POST request with an excessively long scope parameter to the OpenID Connect (OIDC) token endpoint. This leads to high resource ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2699
(9.8 CRITICAL)

EPSS: 0.41%

updated 2026-04-03T16:10:52.680000

8 posts

Customer Managed ShareFile Storage Zones Controller (SZC) allows an unauthenticated attacker to access restricted configuration pages. This leads to changing system configuration and potential remote code execution.

1 repos

https://github.com/watchtowrlabs/watchTowr-vs-Progress-ShareFile-CVE-2026-2699

thehackerwire@mastodon.social at 2026-04-05T02:00:07.000Z ##

🔴 CVE-2026-2699 - Critical (9.8)

Customer Managed ShareFile Storage Zones Controller (SZC) allows an unauthenticated attacker to access restricted configuration pages. This leads to changing system configuration and potential remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

beyondmachines1 at 2026-04-04T08:01:27.162Z ##

Progress Software Patches Critical RCE Chain in ShareFile Storage Zones Controller

Progress Software patched two critical vulnerabilities (CVE-2026-2699 and CVE-2026-2701) in ShareFile Storage Zones Controller that allow unauthenticated attackers to bypass authentication and execute remote code.

**If you manage your own ShareFile storage zones, update to version 5.12.4 or move to version 6 to prevent full system takeover. File transfer tools are high-value targets for ransomware groups, so treat this patch as a top priority. If you can't patch, isolate the instances until they are patched. General isolation doesn't work since these systems are designed to be accessible from the public internet.**

beyondmachines.net/event_detai

##

thehackerwire@mastodon.social at 2026-04-05T02:00:07.000Z ##

🔴 CVE-2026-2699 - Critical (9.8)

Customer Managed ShareFile Storage Zones Controller (SZC) allows an unauthenticated attacker to access restricted configuration pages. This leads to changing system configuration and potential remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

beyondmachines1@infosec.exchange at 2026-04-04T08:01:27.000Z ##

Progress Software Patches Critical RCE Chain in ShareFile Storage Zones Controller

Progress Software patched two critical vulnerabilities (CVE-2026-2699 and CVE-2026-2701) in ShareFile Storage Zones Controller that allow unauthenticated attackers to bypass authentication and execute remote code.

**If you manage your own ShareFile storage zones, update to version 5.12.4 or move to version 6 to prevent full system takeover. File transfer tools are high-value targets for ransomware groups, so treat this patch as a top priority. If you can't patch, isolate the instances until they are patched. General isolation doesn't work since these systems are designed to be accessible from the public internet.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

AAKL@infosec.exchange at 2026-04-02T17:18:17.000Z ##

New.

WatchTower: You’re Not Supposed To ShareFile With Everyone (Progress ShareFile Pre-Auth RCE Chain CVE-2026-2699 & CVE-2026-2701) labs.watchtowr.com/youre-not-s

Recorded Future: Latin America and the Caribbean Cybercrime Landscape recordedfuture.com/research/la

Mandiant: vSphere and BRICKSTORM Malware: A Defender's Guide cloud.google.com/blog/topics/t

Cisco: UAT-10608: Inside a large-scale automated credential harvesting operation targeting web applications blog.talosintelligence.com/uat

Threat Fabric: The Malware Gap: Why Fraud & Security Controls Still Miss Mobile Malware threatfabric.com/blogs/the-mal

Abnormal Security: Meet VENOM: The PhaaS Platform That Neutralizes MFA abnormal.ai/blog/venom-phishin

From yesterday:

Zscaler: Anthropic Claude Code Leak zscaler.com/blogs/security-res #infosec #threatresearch #vulnerability #malware #threatintel #threatintelligence

##

sambowne@infosec.exchange at 2026-04-02T14:50:15.000Z ##

You’re Not Supposed To ShareFile With Everyone (Progress ShareFile Pre-Auth RCE Chain CVE-2026-2699 and CVE-2026-2701) labs.watchtowr.com/youre-not-s

##

threatcodex@infosec.exchange at 2026-04-02T14:33:27.000Z ##

You’re Not Supposed To ShareFile With Everyone (Progress ShareFile Pre-Auth RCE Chain CVE-2026-2699 & CVE-2026-2701)
#CVE_2026_2699 #CVE_2026_2701
labs.watchtowr.com/youre-not-s

##

_r_netsec@infosec.exchange at 2026-04-02T11:13:05.000Z ##

You’re Not Supposed To ShareFile With Everyone (Progress ShareFile Pre-Auth RCE Chain CVE-2026-2699 & CVE-2026-2701) - watchTowr Labs labs.watchtowr.com/youre-not-s

##

CVE-2026-31931
(7.5 HIGH)

EPSS: 0.05%

updated 2026-04-03T16:10:52.680000

2 posts

Suricata is a network IDS, IPS and NSM engine. From version 8.0.0 to before version 8.0.4, use of the "tls.alpn" rule keyword can cause Suricata to crash with a NULL dereference. This issue has been patched in version 8.0.4.

thehackerwire@mastodon.social at 2026-04-04T05:09:37.000Z ##

🟠 CVE-2026-31931 - High (7.5)

Suricata is a network IDS, IPS and NSM engine. From version 8.0.0 to before version 8.0.4, use of the "tls.alpn" rule keyword can cause Suricata to crash with a NULL dereference. This issue has been patched in version 8.0.4.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T05:09:37.000Z ##

🟠 CVE-2026-31931 - High (7.5)

Suricata is a network IDS, IPS and NSM engine. From version 8.0.0 to before version 8.0.4, use of the "tls.alpn" rule keyword can cause Suricata to crash with a NULL dereference. This issue has been patched in version 8.0.4.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33544
(7.7 HIGH)

EPSS: 0.04%

updated 2026-04-03T16:10:52.680000

1 posts

Tinyauth is an authentication and authorization server. Prior to version 5.0.5, all three OAuth service implementations (GenericOAuthService, GithubOAuthService, GoogleOAuthService) store PKCE verifiers and access tokens as mutable struct fields on singleton instances shared across all concurrent requests. When two users initiate OAuth login for the same provider concurrently, a race condition bet

thehackerwire@mastodon.social at 2026-04-03T07:00:59.000Z ##

🟠 CVE-2026-33544 - High (7.7)

Tinyauth is an authentication and authorization server. Prior to version 5.0.5, all three OAuth service implementations (GenericOAuthService, GithubOAuthService, GoogleOAuthService) store PKCE verifiers and access tokens as mutable struct fields o...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34792
(8.8 HIGH)

EPSS: 0.24%

updated 2026-04-03T16:10:52.680000

2 posts

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_clamav.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, which allows command injection due to an incomplete regular expression validation.

thehackerwire@mastodon.social at 2026-04-03T06:05:25.000Z ##

🟠 CVE-2026-34792 - High (8.8)

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_clamav.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call,...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-03T06:01:11.000Z ##

🟠 CVE-2026-34792 - High (8.8)

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_clamav.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call,...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34793
(8.8 HIGH)

EPSS: 0.24%

updated 2026-04-03T16:10:52.680000

1 posts

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_firewall.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, which allows command injection due to an incomplete regular expression validation.

thehackerwire@mastodon.social at 2026-04-03T06:01:19.000Z ##

🟠 CVE-2026-34793 - High (8.8)

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_firewall.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() cal...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34564
(9.1 CRITICAL)

EPSS: 0.05%

updated 2026-04-03T16:10:52.680000

1 posts

CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input when adding Pages to navigation menus through the Menu Management functionality. Page-related data selected via the Pages section is stored server-side and rendered w

offseq@infosec.exchange at 2026-04-02T10:30:28.000Z ##

🚨 CVE-2026-34564 (CRITICAL, CVSS 9.1): ci4ms < 0.31.0.0 vulnerable to stored XSS via Menu Management. Low-priv attackers can inject scripts, impacting admins & users. Patch & audit menus now. radar.offseq.com/threat/cve-20 #OffSeq #XSS #infosec #vuln

##

CVE-2026-33615
(9.1 CRITICAL)

EPSS: 0.08%

updated 2026-04-03T16:10:52.680000

1 posts

An unauthenticated remote attacker can exploit an unauthenticated SQL Injection vulnerability in the setinfo endpoint due to improper neutralization of special elements in a SQL UPDATE command. This can result in a total loss of integrity and availability.

certvde@infosec.exchange at 2026-04-02T09:04:04.000Z ##

#OT #Advisory VDE-2026-030
MB connect line: Multiple Vulnerabilities in mbCONNECT24/mymbCONNECT24

Multiple vulnerabilities have been discovered in MB connect line mbCONNECT24/mymbCONNECT24 that could allow RCE, SQLi or information leakage.
#CVE CVE-2026-33615, CVE-2026-33616, CVE-2026-33614, CVE-2026-33613, CVE-2026-33617

certvde.com/en/advisories/vde-

#CSAF mbconnectline.csaf-tp.certvde.

##

CVE-2026-34566
(9.1 CRITICAL)

EPSS: 0.05%

updated 2026-04-03T16:10:52.680000

1 posts

CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input within the Page Management functionality when creating or editing pages. Multiple input fields accept attacker-controlled JavaScript payloads that are stored server-s

offseq@infosec.exchange at 2026-04-02T07:30:31.000Z ##

🚨 CVE-2026-34566: Critical stored XSS (CVSS 9.1) in ci4ms < 0.31.0.0. Attackers can inject persistent JS via Page Management, impacting admins & users. Upgrade to 0.31.0.0+, audit content, enable CSP. Details: radar.offseq.com/threat/cve-20 #OffSeq #XSS #Vuln #Infosec

##

CVE-2026-34568
(9.1 CRITICAL)

EPSS: 0.05%

updated 2026-04-03T16:10:52.680000

1 posts

CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input when creating or editing blog posts. An attacker can inject a malicious JavaScript payload into blog post content, which is then stored server-side. This stored paylo

offseq@infosec.exchange at 2026-04-02T04:30:27.000Z ##

🔥 CVE-2026-34568: CRITICAL stored XSS in ci4ms CMS (<0.31.0.0). Authenticated users can inject persistent JS via blog posts, risking session hijack & data theft. Patch ASAP to 0.31.0.0! radar.offseq.com/threat/cve-20 #OffSeq #XSS #CVE202634568 #infosec

##

CVE-2026-4350
(8.1 HIGH)

EPSS: 0.10%

updated 2026-04-03T16:10:23.730000

2 posts

The Perfmatters plugin for WordPress is vulnerable to arbitrary file deletion via path traversal in all versions up to, and including, 2.5.9.1. This is due to the `PMCS::action_handler()` method processing the `$_GET['delete']` parameter without any sanitization, authorization check, or nonce verification. The unsanitized filename is concatenated with the storage directory path and passed to `unli

thehackerwire@mastodon.social at 2026-04-04T04:00:29.000Z ##

🟠 CVE-2026-4350 - High (8.1)

The Perfmatters plugin for WordPress is vulnerable to arbitrary file deletion via path traversal in all versions up to, and including, 2.5.9.1. This is due to the `PMCS::action_handler()` method processing the `$_GET['delete']` parameter without a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T04:00:29.000Z ##

🟠 CVE-2026-4350 - High (8.1)

The Perfmatters plugin for WordPress is vulnerable to arbitrary file deletion via path traversal in all versions up to, and including, 2.5.9.1. This is due to the `PMCS::action_handler()` method processing the `$_GET['delete']` parameter without a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34743
(0 None)

EPSS: 0.04%

updated 2026-04-03T16:10:23.730000

1 posts

XZ Utils provide a general-purpose data-compression library plus command-line tools. Prior to version 5.8.3, if lzma_index_decoder() was used to decode an Index that contained no Records, the resulting lzma_index was left in a state where where a subsequent lzma_index_append() would allocate too little memory, and a buffer overflow would occur. This issue has been patched in version 5.8.3.

beyondmachines1@infosec.exchange at 2026-04-03T10:01:27.000Z ##

XZ Utils 5.8.3 Released to Patch Buffer Overflow and Memory Access Flaws

XZ Utils version 5.8.3 addresses a critical buffer overflow (CVE-2026-34743) and a 32-bit memory access flaw affecting versions 5.0.0 and later. Although developers consider the real-world risk low, security organizations have assigned a CVSS score of 9.8 due to the potential for arbitrary code execution.

**Even if developers claim a bug is hard to hit, a CVSS 9.8 in a core library like XZ requires attention. Plan an update of your Linux distributions and container images now to ensure this foundational component isn't a weak link in your supply chain.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-32213
(10.0 CRITICAL)

EPSS: 0.05%

updated 2026-04-03T16:10:23.730000

2 posts

Improper authorization in Azure AI Foundry allows an unauthorized attacker to elevate privileges over a network.

offseq@infosec.exchange at 2026-04-03T07:30:27.000Z ##

🛑 CRITICAL: CVE-2026-32213 impacts Azure AI Foundry. Improper authorization lets remote attackers fully compromise systems — no auth needed! Restrict access, enhance monitoring, & prep IR now. radar.offseq.com/threat/cve-20 #OffSeq #Azure #Cloud #Vuln #BlueTeam

##

thehackerwire@mastodon.social at 2026-04-03T01:22:58.000Z ##

🔴 CVE-2026-32213 - Critical (10)

Improper authorization in Azure AI Foundry allows an unauthorized attacker to elevate privileges over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33746
(9.8 CRITICAL)

EPSS: 0.08%

updated 2026-04-03T16:10:23.730000

1 posts

Convoy is a KVM server management panel for hosting businesses. From version 3.9.0-beta to before version 4.5.1, the JWTService::decode() method did not verify the cryptographic signature of JWT tokens. While the method configured a symmetric HMAC-SHA256 signer via lcobucci/jwt, it only validated time-based claims (exp, nbf, iat) using the StrictValidAt constraint. The SignedWith constraint was no

thehackerwire@mastodon.social at 2026-04-03T05:00:33.000Z ##

🔴 CVE-2026-33746 - Critical (9.8)

Convoy is a KVM server management panel for hosting businesses. From version 3.9.0-beta to before version 4.5.1, the JWTService::decode() method did not verify the cryptographic signature of JWT tokens. While the method configured a symmetric HMAC...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5349
(8.8 HIGH)

EPSS: 0.04%

updated 2026-04-03T16:10:23.730000

1 posts

A vulnerability was identified in Trendnet TEW-657BRM 1.00.1. The affected element is the function add_apcdb of the file /setup.cgi. The manipulation of the argument mac_pc_dba leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit is publicly available and might be used. The vendor confirms, that "[t]he product in question (...) has been discontinued and end of li

thehackerwire@mastodon.social at 2026-04-03T04:02:34.000Z ##

🟠 CVE-2026-5349 - High (8.8)

A vulnerability was identified in Trendnet TEW-657BRM 1.00.1. The affected element is the function add_apcdb of the file /setup.cgi. The manipulation of the argument mac_pc_dba leads to stack-based buffer overflow. The attack can be initiated remo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-65114
(7.5 HIGH)

EPSS: 0.03%

updated 2026-04-03T16:10:23.730000

1 posts

Apache Traffic Server allows request smuggling if chunked messages are malformed.  This issue affects Apache Traffic Server: from 9.0.0 through 9.2.12, from 10.0.0 through 10.1.1. Users are recommended to upgrade to version 9.2.13 or 10.1.2, which fix the issue.

thehackerwire@mastodon.social at 2026-04-03T04:00:46.000Z ##

🟠 CVE-2025-65114 - High (7.5)

Apache Traffic Server allows request smuggling if chunked messages are malformed. 

This issue affects Apache Traffic Server: from 9.0.0 through 9.2.12, from 10.0.0 through 10.1.1.

Users are recommended to upgrade to version 9.2.13 or 10.1.2, wh...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34877
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-04-03T16:10:23.730000

1 posts

An issue was discovered in Mbed TLS versions from 2.19.0 up to 3.6.5, Mbed TLS 4.0.0. Insufficient protection of serialized SSL context or session structures allows an attacker who can modify the serialized structures to induce memory corruption, leading to arbitrary code execution. This is caused by Incorrect Use of Privileged APIs.

thehackerwire@mastodon.social at 2026-04-03T03:06:34.000Z ##

🔴 CVE-2026-34877 - Critical (9.8)

An issue was discovered in Mbed TLS versions from 2.19.0 up to 3.6.5, Mbed TLS 4.0.0. Insufficient protection of serialized SSL context or session structures allows an attacker who can modify the serialized structures to induce memory corruption, ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34522
(8.1 HIGH)

EPSS: 0.06%

updated 2026-04-03T16:10:23.730000

1 posts

SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. Prior to version 1.17.0, a path traversal vulnerability in /api/chats/import allows an authenticated attacker to write attacker-controlled files outside the intended chats directory by injecting traversal sequences in

thehackerwire@mastodon.social at 2026-04-03T03:05:54.000Z ##

🟠 CVE-2026-34522 - High (8.1)

SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. Prior to version 1.17.0, a path traversal vulnerability in /api/...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34827
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-03T16:10:23.730000

1 posts

Rack is a modular Ruby web server interface. From versions 3.0.0.beta1 to before 3.1.21, and 3.2.0 to before 3.2.6, Rack::Multipart::Parser#handle_mime_head parses quoted multipart parameters such as Content-Disposition: form-data; name="..." using repeated String#index searches combined with String#slice! prefix deletion. For escape-heavy quoted values, this causes super-linear processing. An una

thehackerwire@mastodon.social at 2026-04-03T03:01:25.000Z ##

🟠 CVE-2026-34827 - High (7.5)

Rack is a modular Ruby web server interface. From versions 3.0.0.beta1 to before 3.1.21, and 3.2.0 to before 3.2.6, Rack::Multipart::Parser#handle_mime_head parses quoted multipart parameters such as Content-Disposition: form-data; name="..." usin...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5429
(7.8 HIGH)

EPSS: 0.02%

updated 2026-04-03T16:10:23.730000

1 posts

Unsanitized input during web page generation in the Kiro Agent webview in Kiro IDE before version 0.8.140 allows a remote unauthenticated threat actor to execute arbitrary code via a potentially damaging crafted color theme name when a local user opens the workspace. This issue requires the user to trust the workspace when prompted. To remediate this issue, users should upgrade to version 0.8.140

thehackerwire@mastodon.social at 2026-04-03T02:00:29.000Z ##

🟠 CVE-2026-5429 - High (7.8)

Unsanitized input during web page generation in the Kiro Agent webview in Kiro IDE before version 0.8.140 allows a remote unauthenticated threat actor to execute arbitrary code via a potentially damaging crafted color theme name when a local user ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32173
(8.6 HIGH)

EPSS: 0.06%

updated 2026-04-03T16:10:23.730000

1 posts

Improper authentication in Azure SRE Agent allows an unauthorized attacker to disclose information over a network.

thehackerwire@mastodon.social at 2026-04-03T01:22:38.000Z ##

🟠 CVE-2026-32173 - High (8.6)

Improper authentication in Azure SRE Agent allows an unauthorized attacker to disclose information over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35388
(2.5 LOW)

EPSS: 0.01%

updated 2026-04-03T16:10:23.730000

1 posts

OpenSSH before 10.3 omits connection multiplexing confirmation for proxy-mode multiplexing sessions.

cR0w@infosec.exchange at 2026-04-02T18:24:41.000Z ##

Anyone have time to look through the vuln fixes for OpenSSH today? I haven't yet because I'm trying not to care about it but there are at least four CVEs apparently.

openssh.org/txt/release-10.3

CVE-2026-35385
CVE-2026-35386
CVE-2026-35387
CVE-2026-35388

##

CVE-2026-25773
(8.1 HIGH)

EPSS: 0.01%

updated 2026-04-03T15:30:39

2 posts

** UNSUPPORTED WHEN ASSIGNED ** Focalboard version 8.0 fails to sanitize category IDs before incorporating them into dynamic SQL statements when reordering categories. An attacker can inject a malicious SQL payload into the category id field, which is stored in the database and later executed unsanitized when the category reorder API processes the stored value. This Second-Order SQL Injection (Tim

thehackerwire@mastodon.social at 2026-04-04T04:00:19.000Z ##

🟠 CVE-2026-25773 - High (8.1)

** UNSUPPORTED WHEN ASSIGNED ** Focalboard version 8.0 fails to sanitize category IDs before incorporating them into dynamic SQL statements when reordering categories. An attacker can inject a malicious SQL payload into the category id field, whic...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T04:00:19.000Z ##

🟠 CVE-2026-25773 - High (8.1)

** UNSUPPORTED WHEN ASSIGNED ** Focalboard version 8.0 fails to sanitize category IDs before incorporating them into dynamic SQL statements when reordering categories. An attacker can inject a malicious SQL payload into the category id field, whic...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35467
(7.5 HIGH)

EPSS: 0.02%

updated 2026-04-03T15:30:31

2 posts

The stored API keys in temporary browser client is not marked as protected allowing for JavScript console or other errors to allow for extraction of the encryption credentials.

thehackerwire@mastodon.social at 2026-04-04T05:00:27.000Z ##

🟠 CVE-2026-35467 - High (7.5)

The stored API keys in temporary browser client is not marked as protected allowing for JavScript console or other errors to allow for extraction of the encryption credentials.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T05:00:27.000Z ##

🟠 CVE-2026-35467 - High (7.5)

The stored API keys in temporary browser client is not marked as protected allowing for JavScript console or other errors to allow for extraction of the encryption credentials.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5463
(8.6 HIGH)

EPSS: 0.85%

updated 2026-04-03T06:31:39

2 posts

Command injection vulnerability in console.run_module_with_output() in pymetasploit3 through version 1.0.6 allows attackers to inject newline characters into module options such as RHOSTS. This breaks the intended command structure and causes the Metasploit console to execute additional unintended commands, potentially leading to arbitrary command execution and manipulation of Metasploit sessions.

offseq@infosec.exchange at 2026-04-03T06:00:27.000Z ##

⚠️ CRITICAL vuln: pymetasploit3 ≤1.0.6 (CVE-2026-5463) lets attackers inject commands via newline chars in console.run_module_with_output(), risking full session compromise. Avoid untrusted input, watch for patches. radar.offseq.com/threat/cve-20 #OffSeq #CVE20265463 #infosec

##

thehackerwire@mastodon.social at 2026-04-03T06:00:15.000Z ##

🟠 CVE-2026-5463 - High (8.6)

Command injection vulnerability in console.run_module_with_output() in pymetasploit3 through version 1.0.6 allows attackers to inject newline characters into module options such as RHOSTS. This breaks the intended command structure and causes the ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35168
(8.8 HIGH)

EPSS: 0.06%

updated 2026-04-03T03:47:38

2 posts

## Description The Aggiornamenti (Updates) module in OpenSTAManager <= 2.10.1 contains a database conflict resolution feature (`op=risolvi-conflitti-database`) that accepts a JSON array of SQL statements via POST and executes them directly against the database without any validation, allowlist, or sanitization. An authenticated attacker with access to the Aggiornamenti module can execute arbitra

thehackerwire@mastodon.social at 2026-04-04T05:09:28.000Z ##

🟠 CVE-2026-35168 - High (8.8)

OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to version 2.10.2, the Aggiornamenti (Updates) module in OpenSTAManager contains a database conflict resolution feature (op=risolvi-conflitti-databa...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T05:09:28.000Z ##

🟠 CVE-2026-35168 - High (8.8)

OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to version 2.10.2, the Aggiornamenti (Updates) module in OpenSTAManager contains a database conflict resolution feature (op=risolvi-conflitti-databa...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28815(CVSS UNKNOWN)

EPSS: 0.03%

updated 2026-04-03T03:39:42

2 posts

### Summary The X-Wing decapsulation path accepts attacker-controlled encapsulated ciphertext bytes without enforcing the required fixed ciphertext length. The decapsulation call is forwarded into a C API, which expects a compile-time fixed-size ciphertext buffer of 1120 bytes. This creates an FFI memory-safety boundary issue when a shorter `Data` value is passed in, because the C code may read b

thehackerwire@mastodon.social at 2026-04-04T04:00:39.000Z ##

🟠 CVE-2026-28815 - High (7.5)

A remote attacker can supply a short X-Wing HPKE encapsulated key and trigger an out-of-bounds read in the C decapsulation path, potentially causing a crash or memory disclosure depending on runtime protections. This issue is fixed in swift-crypto...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T04:00:39.000Z ##

🟠 CVE-2026-28815 - High (7.5)

A remote attacker can supply a short X-Wing HPKE encapsulated key and trigger an out-of-bounds read in the C decapsulation path, potentially causing a crash or memory disclosure depending on runtime protections. This issue is fixed in swift-crypto...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34780
(8.4 HIGH)

EPSS: 0.04%

updated 2026-04-03T02:46:57

2 posts

### Impact Apps that pass `VideoFrame` objects (from the WebCodecs API) across the `contextBridge` are vulnerable to a context isolation bypass. An attacker who can execute JavaScript in the main world (for example, via XSS) can use a bridged `VideoFrame` to gain access to the isolated world, including any Node.js APIs exposed to the preload script. Apps are only affected if a preload script retu

thehackerwire@mastodon.social at 2026-04-04T01:21:45.000Z ##

🟠 CVE-2026-34780 - High (8.3)

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. From versions 39.0.0-alpha.1 to before 39.8.0, 40.0.0-alpha.1 to before 40.7.0, and 41.0.0-alpha.1 to before 41.0.0-beta.8, apps that pass Vide...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T01:21:45.000Z ##

🟠 CVE-2026-34780 - High (8.3)

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. From versions 39.0.0-alpha.1 to before 39.8.0, 40.0.0-alpha.1 to before 40.7.0, and 41.0.0-alpha.1 to before 41.0.0-beta.8, apps that pass Vide...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34774
(8.1 HIGH)

EPSS: 0.04%

updated 2026-04-03T02:42:31

2 posts

### Impact Apps that use offscreen rendering and allow child windows via `window.open()` may be vulnerable to a use-after-free. If the parent offscreen `WebContents` is destroyed while a child window remains open, subsequent paint frames on the child dereference freed memory, which may lead to a crash or memory corruption. Apps are only affected if they use offscreen rendering (`webPreferences.of

thehackerwire@mastodon.social at 2026-04-04T01:14:42.000Z ##

🟠 CVE-2026-34774 - High (8.1)

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 39.8.1, 40.7.0, and 41.0.0, apps that use offscreen rendering and allow child windows via window.open() may be vulnerable to ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T01:14:42.000Z ##

🟠 CVE-2026-34774 - High (8.1)

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 39.8.1, 40.7.0, and 41.0.0, apps that use offscreen rendering and allow child windows via window.open() may be vulnerable to ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34769
(7.8 HIGH)

EPSS: 0.02%

updated 2026-04-03T02:39:16

2 posts

### Impact An undocumented `commandLineSwitches` webPreference allowed arbitrary switches to be appended to the renderer process command line. Apps that construct `webPreferences` by spreading untrusted configuration objects may inadvertently allow an attacker to inject switches that disable renderer sandboxing or web security controls. Apps are only affected if they construct `webPreferences` fr

thehackerwire@mastodon.social at 2026-04-04T01:14:52.000Z ##

🟠 CVE-2026-34769 - High (7.7)

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.0, 40.7.0, and 41.0.0-beta.8, an undocumented commandLineSwitches webPreference allowed arbitrary switches to be...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T01:14:52.000Z ##

🟠 CVE-2026-34769 - High (7.7)

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.0, 40.7.0, and 41.0.0-beta.8, an undocumented commandLineSwitches webPreference allowed arbitrary switches to be...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33107
(10.0 CRITICAL)

EPSS: 0.05%

updated 2026-04-03T00:31:15

1 posts

Server-side request forgery (ssrf) in Azure Databricks allows an unauthorized attacker to elevate privileges over a network.

thehackerwire@mastodon.social at 2026-04-03T01:02:35.000Z ##

🔴 CVE-2026-33107 - Critical (10)

Server-side request forgery (ssrf) in Azure Databricks allows an unauthorized attacker to elevate privileges over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33105
(10.0 CRITICAL)

EPSS: 0.05%

updated 2026-04-03T00:31:14

2 posts

Improper authorization in Microsoft Azure Kubernetes Service allows an unauthorized attacker to elevate privileges over a network.

vitobotta@mastodon.social at 2026-04-03T13:02:01.000Z ##

CVE-2026-33105 hits Azure Kubernetes Service with CVSS 10.0. Unauthenticated remote privilege escalation - Microsoft patched it but check your AKS clusters. Critical severity, no user interaction required.

##

thehackerwire@mastodon.social at 2026-04-03T01:02:27.000Z ##

🔴 CVE-2026-33105 - Critical (10)

Improper authorization in Microsoft Azure Kubernetes Service allows an unauthorized attacker to elevate privileges over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32211
(9.1 CRITICAL)

EPSS: 0.05%

updated 2026-04-03T00:31:14

1 posts

Missing authentication for critical function in Azure MCP Server allows an unauthorized attacker to disclose information over a network.

thehackerwire@mastodon.social at 2026-04-03T01:22:48.000Z ##

🔴 CVE-2026-32211 - Critical (9.1)

Missing authentication for critical function in Azure MCP Server allows an unauthorized attacker to disclose information over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26135
(9.6 CRITICAL)

EPSS: 0.05%

updated 2026-04-03T00:31:14

1 posts

Server-side request forgery (ssrf) in Azure Custom Locations Resource Provider (RP) allows an authorized attacker to elevate privileges over a network.

thehackerwire@mastodon.social at 2026-04-03T01:02:44.000Z ##

🔴 CVE-2026-26135 - Critical (9.6)

Server-side request forgery (ssrf) in Azure Custom Locations Resource Provider (RP) allows an authorized attacker to elevate privileges over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-58136
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-02T21:34:00

1 posts

A bug in POST request handling causes a crash under a certain condition. This issue affects Apache Traffic Server: from 10.0.0 through 10.1.1, from 9.0.0 through 9.2.12. Users are recommended to upgrade to version 10.1.2 or 9.2.13, which fix the issue. A workaround for older versions is to set proxy.config.http.request_buffer_enabled to 0 (the default value is 0).

thehackerwire@mastodon.social at 2026-04-03T04:02:26.000Z ##

🟠 CVE-2025-58136 - High (7.5)

A bug in POST request handling causes a crash under a certain condition.

This issue affects Apache Traffic Server: from 10.0.0 through 10.1.1, from 9.0.0 through 9.2.12.

Users are recommended to upgrade to version 10.1.2 or 9.2.13, which fix the...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-43264
(8.8 HIGH)

EPSS: 0.02%

updated 2026-04-02T21:33:02

1 posts

The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.6. Processing a maliciously crafted image may corrupt process memory.

thehackerwire@mastodon.social at 2026-04-03T02:21:38.000Z ##

🟠 CVE-2025-43264 - High (8.8)

The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.6. Processing a maliciously crafted image may corrupt process memory.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34426
(7.6 HIGH)

EPSS: 0.04%

updated 2026-04-02T21:33:02

1 posts

OpenClaw versions prior to commit b57b680 contain an approval bypass vulnerability due to inconsistent environment variable normalization between approval and execution paths, allowing attackers to inject attacker-controlled environment variables into execution without approval system validation. Attackers can exploit differing normalization logic to discard non-portable keys during approval proce

thehackerwire@mastodon.social at 2026-04-03T02:21:28.000Z ##

🟠 CVE-2026-34426 - High (7.6)

OpenClaw versions prior to commit b57b680 contain an approval bypass vulnerability due to inconsistent environment variable normalization between approval and execution paths, allowing attackers to inject attacker-controlled environment variables...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34829
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-02T20:34:49

1 posts

## Summary `Rack::Multipart::Parser` only wraps the request body in a `BoundedIO` when `CONTENT_LENGTH` is present. When a `multipart/form-data` request is sent without a `Content-Length` header, such as with HTTP chunked transfer encoding, multipart parsing continues until end-of-stream with no total size limit. For file parts, the uploaded body is written directly to a temporary file on disk r

thehackerwire@mastodon.social at 2026-04-03T03:06:25.000Z ##

🟠 CVE-2026-34829 - High (7.5)

Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Multipart::Parser only wraps the request body in a BoundedIO when CONTENT_LENGTH is present. When a multipart/form-data request is sent without a Conte...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30287
(8.4 HIGH)

EPSS: 0.01%

updated 2026-04-02T19:37:43.627000

1 posts

An arbitrary file overwrite vulnerability in Deep Thought Industries ACE Scanner PDF Scanner v1.4.5 allows attackers to overwrite critical internal files via the file import process, leading to arbitrary code execution or information exposure.

thehackerwire@mastodon.social at 2026-04-02T06:01:13.000Z ##

🟠 CVE-2026-30287 - High (8.4)

An arbitrary file overwrite vulnerability in Deep Thought Industries ACE Scanner PDF Scanner v1.4.5 allows attackers to overwrite critical internal files via the file import process, leading to arbitrary code execution or information exposure.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34785
(7.5 HIGH)

EPSS: 0.03%

updated 2026-04-02T18:44:26

1 posts

## Summary `Rack::Static` determines whether a request should be served as a static file using a simple string prefix check. When configured with URL prefixes such as `"/css"`, it matches any request path that begins with that string, including unrelated paths such as `"/css-config.env"` or `"/css-backup.sql"`. As a result, files under the static root whose names merely share the configured pref

thehackerwire@mastodon.social at 2026-04-03T03:06:44.000Z ##

🟠 CVE-2026-34785 - High (7.5)

Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Static determines whether a request should be served as a static file using a simple string prefix check. When configured with URL prefixes such as "/c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30332
(7.6 HIGH)

EPSS: 0.01%

updated 2026-04-02T18:31:45

1 posts

A Time-of-Check to Time-of-Use (TOCTOU) race condition vulnerability in Balena Etcher for Windows prior to v2.1.4 allows attackers to escalate privileges and execute arbitrary code via replacing a legitimate script with a crafted payload during the flashing process.

1 repos

https://github.com/B1tBreaker/CVE-2026-30332

thehackerwire@mastodon.social at 2026-04-03T05:00:23.000Z ##

🟠 CVE-2026-30332 - High (7.5)

A Time-of-Check to Time-of-Use (TOCTOU) race condition vulnerability in Balena Etcher for Windows prior to v2.1.4 allows attackers to escalate privileges and execute arbitrary code via replacing a legitimate script with a crafted payload during th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34876
(7.5 HIGH)

EPSS: 0.02%

updated 2026-04-02T18:31:45

1 posts

An issue was discovered in Mbed TLS 3.x before 3.6.6. An out-of-bounds read vulnerability in mbedtls_ccm_finish() in library/ccm.c allows attackers to obtain adjacent CCM context data via invocation of the multipart CCM API with an oversized tag_len parameter. This is caused by missing validation of the tag_len parameter against the size of the internal 16-byte authentication buffer. The issue aff

thehackerwire@mastodon.social at 2026-04-03T05:00:12.000Z ##

🟠 CVE-2026-34876 - High (7.5)

An issue was discovered in Mbed TLS 3.x before 3.6.6. An out-of-bounds read vulnerability in mbedtls_ccm_finish() in library/ccm.c allows attackers to obtain adjacent CCM context data via invocation of the multipart CCM API with an oversized tag_l...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5350
(8.8 HIGH)

EPSS: 0.04%

updated 2026-04-02T18:31:45

1 posts

A security flaw has been discovered in Trendnet TEW-657BRM 1.00.1. The impacted element is the function update_pcdb of the file /setup.cgi. The manipulation of the argument mac_pc_dba results in stack-based buffer overflow. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks. The vendor confirms, that "[t]he product in question (...) has bee

thehackerwire@mastodon.social at 2026-04-03T04:02:43.000Z ##

🟠 CVE-2026-5350 - High (8.8)

A security flaw has been discovered in Trendnet TEW-657BRM 1.00.1. The impacted element is the function update_pcdb of the file /setup.cgi. The manipulation of the argument mac_pc_dba results in stack-based buffer overflow. The attack can be launc...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25212
(10.0 CRITICAL)

EPSS: 0.04%

updated 2026-04-02T18:31:45

1 posts

An issue was discovered in Percona PMM before 3.7. Because an internal database user retains specific superuser privileges, an attacker with pmm-admin rights can abuse the "Add data source" feature to break out of the database context and execute shell commands on the underlying operating system.

thehackerwire@mastodon.social at 2026-04-03T04:00:55.000Z ##

🔴 CVE-2026-25212 - Critical (9.9)

An issue was discovered in Percona PMM before 3.7. Because an internal database user retains specific superuser privileges, an attacker with pmm-admin rights can abuse the "Add data source" feature to break out of the database context and execute ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35385
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-02T18:31:45

2 posts

In OpenSSH before 10.3, a file downloaded by scp may be installed setuid or setgid, an outcome contrary to some users' expectations, if the download is performed as root with -O (legacy scp protocol) and without -p (preserve mode).

thehackerwire@mastodon.social at 2026-04-03T03:06:14.000Z ##

🟠 CVE-2026-35385 - High (7.5)

In OpenSSH before 10.3, a file downloaded by scp may be installed setuid or setgid, an outcome contrary to some users' expectations, if the download is performed as root with -O (legacy scp protocol) and without -p (preserve mode).

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

cR0w@infosec.exchange at 2026-04-02T18:24:41.000Z ##

Anyone have time to look through the vuln fixes for OpenSSH today? I haven't yet because I'm trying not to care about it but there are at least four CVEs apparently.

openssh.org/txt/release-10.3

CVE-2026-35385
CVE-2026-35386
CVE-2026-35387
CVE-2026-35388

##

CVE-2026-35386
(3.6 LOW)

EPSS: 0.01%

updated 2026-04-02T18:31:45

1 posts

In OpenSSH before 10.3, command execution can occur via shell metacharacters in a username within a command line. This requires a scenario where the username on the command line is untrusted, and also requires a non-default configurations of % in ssh_config.

cR0w@infosec.exchange at 2026-04-02T18:24:41.000Z ##

Anyone have time to look through the vuln fixes for OpenSSH today? I haven't yet because I'm trying not to care about it but there are at least four CVEs apparently.

openssh.org/txt/release-10.3

CVE-2026-35385
CVE-2026-35386
CVE-2026-35387
CVE-2026-35388

##

CVE-2026-35387
(3.1 LOW)

EPSS: 0.03%

updated 2026-04-02T18:31:45

1 posts

OpenSSH before 10.3 can use unintended ECDSA algorithms. Listing of any ECDSA algorithm in PubkeyAcceptedAlgorithms or HostbasedAcceptedAlgorithms is misinterpreted to mean all ECDSA algorithms.

cR0w@infosec.exchange at 2026-04-02T18:24:41.000Z ##

Anyone have time to look through the vuln fixes for OpenSSH today? I haven't yet because I'm trying not to care about it but there are at least four CVEs apparently.

openssh.org/txt/release-10.3

CVE-2026-35385
CVE-2026-35386
CVE-2026-35387
CVE-2026-35388

##

CVE-2026-3502
(7.8 HIGH)

EPSS: 1.32%

updated 2026-04-02T18:31:37

5 posts

TrueConf Client downloads application update code and applies it without performing verification. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user.

2 repos

https://github.com/fevar54/CVE-2026-3502---TrueConf-Client-Update-Hijacking-PoC

https://github.com/fevar54/CVE-2026-3502-Scanner---TrueConf-Vulnerability-Detection-Tool

youranonnewsirc@nerdculture.de at 2026-04-03T03:43:09.000Z ##

Geopolitical tensions escalate between Algeria and Morocco, impacting European security and energy stability. In technology, IBM and Arm announced a strategic collaboration on new dual-architecture hardware for future AI and data-intensive workloads. On the cybersecurity front, CISA added a new exploited vulnerability (CVE-2026-3502) to its catalog, while L.A. Metro confirmed a mid-March hack, with systems still being restored.

#AnonNews_irc #Cybersecurity #News

##

secdb@infosec.exchange at 2026-04-02T22:00:15.000Z ##

🚨 [CISA-2026:0402] CISA Adds One Known Exploited Vulnerability to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2026-3502 (secdb.nttzen.cloud/cve/detail/)
- Name: TrueConf Client Download of Code Without Integrity Check Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: TrueConf
- Product: Client
- Notes: trueconf.com/blog/update/truec ; trueconf.com/downloads/windows ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260402 #cisa20260402 #cve_2026_3502 #cve20263502

##

cisakevtracker@mastodon.social at 2026-04-02T21:00:59.000Z ##

CVE ID: CVE-2026-3502
Vendor: TrueConf
Product: Client
Date Added: 2026-04-02
Notes: trueconf.com/blog/update/truec ; trueconf.com/downloads/windows ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

beyondmachines1@infosec.exchange at 2026-04-02T20:01:26.000Z ##

TrueConf Zero-Day Exploited in Targeted Government Attacks

China-nexus attackers exploited a zero-day vulnerability (CVE-2026-3502) in TrueConf's update mechanism to deploy the Havoc C2 framework across Southeast Asian government networks. The flaw allows attackers who compromise an on-premises server to push malicious updates to all connected clients without verification.

**If you use TrueConf for videoconferencing, update all Windows clients to version 8.5.3 immediately. Also check your systems for signs of compromise. Look for files like poweriso.exe or iscsiexe.dll in unexpected folders, and make sure any trueconf_windows_update.exe file has a valid digital signature before allowing it to run.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

AAKL@infosec.exchange at 2026-04-02T17:22:57.000Z ##

Broadcom has several advisories today, three critical and one high-severity, plus more support.broadcom.com/web/ecx/s #Broadcom

CISA has added to the KEV catalogue:

- CVE-2026-3502: TrueConf Client Download of Code Without Integrity Check Vulnerability cve.org/CVERecord?id=CVE-2026-

- Three industrial vulnerabilities added cisa.gov/ #CISA

Cisco has tagged Apple for zero-day reports talosintelligence.com/vulnerab @TalosSecurity #Cisco #Apple #infosec #vulnerability

##

CVE-2026-34791
(8.8 HIGH)

EPSS: 0.24%

updated 2026-04-02T15:31:54

1 posts

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_proxy.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, which allows command injection due to an incomplete regular expression validation.

thehackerwire@mastodon.social at 2026-04-03T07:00:17.000Z ##

🟠 CVE-2026-34791 - High (8.8)

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_proxy.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34797
(8.8 HIGH)

EPSS: 0.24%

updated 2026-04-02T15:31:54

1 posts

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_smtp.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, which allows command injection due to an incomplete regular expression validation.

thehackerwire@mastodon.social at 2026-04-03T06:01:01.000Z ##

🟠 CVE-2026-34797 - High (8.8)

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_smtp.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, w...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34794
(8.8 HIGH)

EPSS: 0.24%

updated 2026-04-02T15:31:49

2 posts

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_ids.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, which allows command injection due to an incomplete regular expression validation.

thehackerwire@mastodon.social at 2026-04-03T06:05:16.000Z ##

🟠 CVE-2026-34794 - High (8.8)

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_ids.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, wh...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-03T06:01:02.000Z ##

🟠 CVE-2026-34794 - High (8.8)

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_ids.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, wh...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34796
(8.8 HIGH)

EPSS: 0.24%

updated 2026-04-02T15:31:49

2 posts

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_openvpn.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, which allows command injection due to an incomplete regular expression validation.

thehackerwire@mastodon.social at 2026-04-03T06:05:07.000Z ##

🟠 CVE-2026-34796 - High (8.8)

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_openvpn.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-03T06:00:53.000Z ##

🟠 CVE-2026-34796 - High (8.8)

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_openvpn.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34795
(8.8 HIGH)

EPSS: 0.24%

updated 2026-04-02T15:31:49

1 posts

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_log.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, which allows command injection due to an incomplete regular expression validation.

thehackerwire@mastodon.social at 2026-04-03T06:01:10.000Z ##

🟠 CVE-2026-34795 - High (8.8)

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_log.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, wh...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2701
(9.1 CRITICAL)

EPSS: 0.19%

updated 2026-04-02T15:31:41

8 posts

Authenticated user can upload a malicious file to the server and execute it, which leads to remote code execution.

thehackerwire@mastodon.social at 2026-04-05T02:00:17.000Z ##

🔴 CVE-2026-2701 - Critical (9.1)

Authenticated user can upload a malicious file to the server and execute it, which leads to remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

beyondmachines1 at 2026-04-04T08:01:27.162Z ##

Progress Software Patches Critical RCE Chain in ShareFile Storage Zones Controller

Progress Software patched two critical vulnerabilities (CVE-2026-2699 and CVE-2026-2701) in ShareFile Storage Zones Controller that allow unauthenticated attackers to bypass authentication and execute remote code.

**If you manage your own ShareFile storage zones, update to version 5.12.4 or move to version 6 to prevent full system takeover. File transfer tools are high-value targets for ransomware groups, so treat this patch as a top priority. If you can't patch, isolate the instances until they are patched. General isolation doesn't work since these systems are designed to be accessible from the public internet.**

beyondmachines.net/event_detai

##

thehackerwire@mastodon.social at 2026-04-05T02:00:17.000Z ##

🔴 CVE-2026-2701 - Critical (9.1)

Authenticated user can upload a malicious file to the server and execute it, which leads to remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

beyondmachines1@infosec.exchange at 2026-04-04T08:01:27.000Z ##

Progress Software Patches Critical RCE Chain in ShareFile Storage Zones Controller

Progress Software patched two critical vulnerabilities (CVE-2026-2699 and CVE-2026-2701) in ShareFile Storage Zones Controller that allow unauthenticated attackers to bypass authentication and execute remote code.

**If you manage your own ShareFile storage zones, update to version 5.12.4 or move to version 6 to prevent full system takeover. File transfer tools are high-value targets for ransomware groups, so treat this patch as a top priority. If you can't patch, isolate the instances until they are patched. General isolation doesn't work since these systems are designed to be accessible from the public internet.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

AAKL@infosec.exchange at 2026-04-02T17:18:17.000Z ##

New.

WatchTower: You’re Not Supposed To ShareFile With Everyone (Progress ShareFile Pre-Auth RCE Chain CVE-2026-2699 & CVE-2026-2701) labs.watchtowr.com/youre-not-s

Recorded Future: Latin America and the Caribbean Cybercrime Landscape recordedfuture.com/research/la

Mandiant: vSphere and BRICKSTORM Malware: A Defender's Guide cloud.google.com/blog/topics/t

Cisco: UAT-10608: Inside a large-scale automated credential harvesting operation targeting web applications blog.talosintelligence.com/uat

Threat Fabric: The Malware Gap: Why Fraud & Security Controls Still Miss Mobile Malware threatfabric.com/blogs/the-mal

Abnormal Security: Meet VENOM: The PhaaS Platform That Neutralizes MFA abnormal.ai/blog/venom-phishin

From yesterday:

Zscaler: Anthropic Claude Code Leak zscaler.com/blogs/security-res #infosec #threatresearch #vulnerability #malware #threatintel #threatintelligence

##

sambowne@infosec.exchange at 2026-04-02T14:50:15.000Z ##

You’re Not Supposed To ShareFile With Everyone (Progress ShareFile Pre-Auth RCE Chain CVE-2026-2699 and CVE-2026-2701) labs.watchtowr.com/youre-not-s

##

threatcodex@infosec.exchange at 2026-04-02T14:33:27.000Z ##

You’re Not Supposed To ShareFile With Everyone (Progress ShareFile Pre-Auth RCE Chain CVE-2026-2699 & CVE-2026-2701)
#CVE_2026_2699 #CVE_2026_2701
labs.watchtowr.com/youre-not-s

##

_r_netsec@infosec.exchange at 2026-04-02T11:13:05.000Z ##

You’re Not Supposed To ShareFile With Everyone (Progress ShareFile Pre-Auth RCE Chain CVE-2026-2699 & CVE-2026-2701) - watchTowr Labs labs.watchtowr.com/youre-not-s

##

CVE-2026-26928(CVSS UNKNOWN)

EPSS: 0.02%

updated 2026-04-02T15:31:40

1 posts

SzafirHost downloads necessary files in the context of the initiating web page. When called, SzafirHost updates its dynamic library. JAR files are correctly verified based on a list of trusted file hashes, and if a file was not on that list, it was checked to see if it had been digitally signed by the vendor. The application doesn't verify hash or vendor's digital signature of uploaded DLL, SO, JN

bezpieka@infosec.exchange at 2026-04-03T10:18:10.000Z ##

Ciekawy błąd, 0/1 click RCE w oprogramowaniu związanym z Szafir/KIR służącym do elektronicznych podpisów, używanym przez 900k użytkowników.
Tldr: wchodzisz w link, (niekoniecznie) klikasz "ok" w zespoofowanym okienku, dostajesz malware.
Research: Michał Leszczyński
cve.org/CVERecord?id=CVE-2026-

##

CVE-2026-33613
(7.2 HIGH)

EPSS: 0.12%

updated 2026-04-02T12:31:13

1 posts

Due to the improper neutralisation of special elements used in an OS command, a remote attacker can exploit an RCE vulnerability in the generateSrpArray function, resulting in full system compromise. This vulnerability can only be attacked if the attacker has some other way to write arbitrary data to the user table.

certvde@infosec.exchange at 2026-04-02T09:04:04.000Z ##

#OT #Advisory VDE-2026-030
MB connect line: Multiple Vulnerabilities in mbCONNECT24/mymbCONNECT24

Multiple vulnerabilities have been discovered in MB connect line mbCONNECT24/mymbCONNECT24 that could allow RCE, SQLi or information leakage.
#CVE CVE-2026-33615, CVE-2026-33616, CVE-2026-33614, CVE-2026-33613, CVE-2026-33617

certvde.com/en/advisories/vde-

#CSAF mbconnectline.csaf-tp.certvde.

##

CVE-2026-33617
(5.3 MEDIUM)

EPSS: 0.03%

updated 2026-04-02T12:31:13

1 posts

An unauthenticated remote attacker can access a configuration file containing database credentials. This can result in a some loss of confidentiality, but there is no endpoint exposed to use these credentials.

certvde@infosec.exchange at 2026-04-02T09:04:04.000Z ##

#OT #Advisory VDE-2026-030
MB connect line: Multiple Vulnerabilities in mbCONNECT24/mymbCONNECT24

Multiple vulnerabilities have been discovered in MB connect line mbCONNECT24/mymbCONNECT24 that could allow RCE, SQLi or information leakage.
#CVE CVE-2026-33615, CVE-2026-33616, CVE-2026-33614, CVE-2026-33613, CVE-2026-33617

certvde.com/en/advisories/vde-

#CSAF mbconnectline.csaf-tp.certvde.

##

CVE-2026-33616
(7.5 HIGH)

EPSS: 0.05%

updated 2026-04-02T12:31:13

1 posts

An unauthenticated remote attacker can exploit an unauthenticated blind SQL Injection vulnerability in the mb24api endpoint due to improper neutralization of special elements in a SQL SELECT command. This can result in a total loss of confidentiality.

certvde@infosec.exchange at 2026-04-02T09:04:04.000Z ##

#OT #Advisory VDE-2026-030
MB connect line: Multiple Vulnerabilities in mbCONNECT24/mymbCONNECT24

Multiple vulnerabilities have been discovered in MB connect line mbCONNECT24/mymbCONNECT24 that could allow RCE, SQLi or information leakage.
#CVE CVE-2026-33615, CVE-2026-33616, CVE-2026-33614, CVE-2026-33613, CVE-2026-33617

certvde.com/en/advisories/vde-

#CSAF mbconnectline.csaf-tp.certvde.

##

CVE-2026-33614
(7.5 HIGH)

EPSS: 0.05%

updated 2026-04-02T12:31:13

1 posts

An unauthenticated remote attacker can exploit an unauthenticated SQL Injection vulnerability in the getinfo endpoint due to improper neutralization of special elements in a SQL SELECT command. This can result in a total loss of confidentiality.

certvde@infosec.exchange at 2026-04-02T09:04:04.000Z ##

#OT #Advisory VDE-2026-030
MB connect line: Multiple Vulnerabilities in mbCONNECT24/mymbCONNECT24

Multiple vulnerabilities have been discovered in MB connect line mbCONNECT24/mymbCONNECT24 that could allow RCE, SQLi or information leakage.
#CVE CVE-2026-33615, CVE-2026-33616, CVE-2026-33614, CVE-2026-33613, CVE-2026-33617

certvde.com/en/advisories/vde-

#CSAF mbconnectline.csaf-tp.certvde.

##

CVE-2026-34953
(9.1 CRITICAL)

EPSS: 0.03%

updated 2026-04-01T23:29:02

3 posts

### Summary `OAuthManager.validate_token()` returns `True` for any token not found in its internal store, which is empty by default. Any HTTP request to the MCP server with an arbitrary Bearer token is treated as authenticated, granting full access to all registered tools and agent capabilities. ### Details `oauth.py:364` (source) -> `oauth.py:374` (loop miss) -> `oauth.py:381` (sink) ```python

thehackerwire@mastodon.social at 2026-04-04T01:16:47.000Z ##

🔴 CVE-2026-34953 - Critical (9.1)

PraisonAI is a multi-agent teams system. Prior to version 4.5.97, OAuthManager.validate_token() returns True for any token not found in its internal store, which is empty by default. Any HTTP request to the MCP server with an arbitrary Bearer toke...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T01:16:47.000Z ##

🔴 CVE-2026-34953 - Critical (9.1)

PraisonAI is a multi-agent teams system. Prior to version 4.5.97, OAuthManager.validate_token() returns True for any token not found in its internal store, which is empty by default. Any HTTP request to the MCP server with an arbitrary Bearer toke...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-04T00:00:49.000Z ##

⚠️ CRITICAL vuln in PraisonAI (<4.5.97): CVE-2026-34953 allows any bearer token to bypass auth & gain full access to all agent capabilities. Patch to 4.5.97+ now! No exploits yet. Details: radar.offseq.com/threat/cve-20 #OffSeq #CVE202634953 #infosec #patch

##

CVE-2026-34936
(7.7 HIGH)

EPSS: 0.03%

updated 2026-04-01T23:21:46

2 posts

### Summary `passthrough()` and `apassthrough()` in `praisonai` accept a caller-controlled `api_base` parameter that is concatenated with `endpoint` and passed directly to `httpx.Client.request()` when the litellm primary path raises `AttributeError`. No URL scheme validation, private IP filtering, or domain allowlist is applied, allowing requests to any host reachable from the server. ### Detai

thehackerwire@mastodon.social at 2026-04-04T01:24:18.000Z ##

🟠 CVE-2026-34936 - High (7.7)

PraisonAI is a multi-agent teams system. Prior to version 4.5.90, passthrough() and apassthrough() in praisonai accept a caller-controlled api_base parameter that is concatenated with endpoint and passed directly to httpx.Client.request() when the...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T01:24:18.000Z ##

🟠 CVE-2026-34936 - High (7.7)

PraisonAI is a multi-agent teams system. Prior to version 4.5.90, passthrough() and apassthrough() in praisonai accept a caller-controlled api_base parameter that is concatenated with endpoint and passed directly to httpx.Client.request() when the...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34934
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-04-01T23:20:34

4 posts

## Summary The `get_all_user_threads` function constructs raw SQL queries using f-strings with unescaped thread IDs fetched from the database. An attacker stores a malicious thread ID via `update_thread`. When the application loads the thread list, the injected payload executes and grants full database access. --- ## Details **File Path:** `src/praisonai/praisonai/ui/sql_alchemy.py` **Flow:

offseq at 2026-04-04T06:00:26.828Z ##

🚨 CVE-2026-34934: PraisonAI <4.5.90 affected by CRITICAL SQL injection (CVSS 9.8). Unauthenticated attackers can gain full DB access via unsanitized thread IDs. Upgrade to 4.5.90+ ASAP. Details: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-04T01:22:29.000Z ##

🔴 CVE-2026-34934 - Critical (9.8)

PraisonAI is a multi-agent teams system. Prior to version 4.5.90, the get_all_user_threads function constructs raw SQL queries using f-strings with unescaped thread IDs fetched from the database. An attacker stores a malicious thread ID via update...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-04T06:00:26.000Z ##

🚨 CVE-2026-34934: PraisonAI <4.5.90 affected by CRITICAL SQL injection (CVSS 9.8). Unauthenticated attackers can gain full DB access via unsanitized thread IDs. Upgrade to 4.5.90+ ASAP. Details: radar.offseq.com/threat/cve-20 #OffSeq #infosec #SQLInjection #PraisonAI

##

thehackerwire@mastodon.social at 2026-04-04T01:22:29.000Z ##

🔴 CVE-2026-34934 - Critical (9.8)

PraisonAI is a multi-agent teams system. Prior to version 4.5.90, the get_all_user_threads function constructs raw SQL queries using f-strings with unescaped thread IDs fetched from the database. An attacker stores a malicious thread ID via update...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34935
(9.8 CRITICAL)

EPSS: 0.08%

updated 2026-04-01T23:20:01

4 posts

### Summary The `--mcp` CLI argument is passed directly to `shlex.split()` and forwarded through the call chain to `anyio.open_process()` with no validation, allowlist check, or sanitization at any hop, allowing arbitrary OS command execution as the process user. ### Details `cli/features/mcp.py:61` (source) -> `praisonaiagents/mcp/mcp.py:345` (hop) -> `mcp/client/stdio/__init__.py:253` (sink)

offseq at 2026-04-04T07:30:29.302Z ##

⚠️ CRITICAL: PraisonAI (v4.5.15 - <4.5.69) vulnerable to OS command injection via - -mcp, allowing arbitrary OS commands (CVE-2026-34935). Patch to 4.5.69+ now! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-04T01:24:08.000Z ##

🔴 CVE-2026-34935 - Critical (9.8)

PraisonAI is a multi-agent teams system. From version 4.5.15 to before version 4.5.69, the --mcp CLI argument is passed directly to shlex.split() and forwarded through the call chain to anyio.open_process() with no validation, allowlist check, or ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-04T07:30:29.000Z ##

⚠️ CRITICAL: PraisonAI (v4.5.15 - <4.5.69) vulnerable to OS command injection via - -mcp, allowing arbitrary OS commands (CVE-2026-34935). Patch to 4.5.69+ now! radar.offseq.com/threat/cve-20 #OffSeq #CVE202634935 #PraisonAI #infosec

##

thehackerwire@mastodon.social at 2026-04-04T01:24:08.000Z ##

🔴 CVE-2026-34935 - Critical (9.8)

PraisonAI is a multi-agent teams system. From version 4.5.15 to before version 4.5.69, the --mcp CLI argument is passed directly to shlex.split() and forwarded through the call chain to anyio.open_process() with no validation, allowlist check, or ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34937
(7.8 HIGH)

EPSS: 0.03%

updated 2026-04-01T23:18:18

4 posts

### Summary `run_python()` in `praisonai` constructs a shell command string by interpolating user-controlled code into `python3 -c "<code>"` and passing it to `subprocess.run(..., shell=True)`. The escaping logic only handles `\` and `"`, leaving `$()` and backtick substitutions unescaped, allowing arbitrary OS command execution before Python is invoked. ### Details `execute_command.py:290` (so

thehackerwire@mastodon.social at 2026-04-04T01:16:39.000Z ##

🟠 CVE-2026-34937 - High (7.8)

PraisonAI is a multi-agent teams system. Prior to version 1.5.90, run_python() in praisonai constructs a shell command string by interpolating user-controlled code into python3 -c "" and passing it to subprocess.run(..., shell=True). The escaping ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T01:15:02.000Z ##

🟠 CVE-2026-34937 - High (7.8)

PraisonAI is a multi-agent teams system. Prior to version 1.5.90, run_python() in praisonai constructs a shell command string by interpolating user-controlled code into python3 -c "" and passing it to subprocess.run(..., shell=True). The escaping ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T01:16:39.000Z ##

🟠 CVE-2026-34937 - High (7.8)

PraisonAI is a multi-agent teams system. Prior to version 1.5.90, run_python() in praisonai constructs a shell command string by interpolating user-controlled code into python3 -c "" and passing it to subprocess.run(..., shell=True). The escaping ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T01:15:02.000Z ##

🟠 CVE-2026-34937 - High (7.8)

PraisonAI is a multi-agent teams system. Prior to version 1.5.90, run_python() in praisonai constructs a shell command string by interpolating user-controlled code into python3 -c "" and passing it to subprocess.run(..., shell=True). The escaping ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34752(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-04-01T22:56:12

2 posts

### Summary Sending an email with `__proto__:` as a header name crashes the Haraka worker process. ### Details The header parser at `node_modules/haraka-email-message/lib/header.js:215-218` stores headers in a plain `{}` object: ```javascript _add_header(key, value, method) { this.headers[key] ??= [] // line 216 this.headers[key][method](value) // line 217 } ``` When `key`

thehackerwire@mastodon.social at 2026-04-04T05:00:46.000Z ##

🟠 CVE-2026-34752 - High (7.5)

Haraka is a Node.js mail server. Prior to version 3.1.4, sending an email with __proto__: as a header name crashes the Haraka worker process. This issue has been patched in version 3.1.4.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T05:00:46.000Z ##

🟠 CVE-2026-34752 - High (7.5)

Haraka is a Node.js mail server. Prior to version 3.1.4, sending an email with __proto__: as a header name crashes the Haraka worker process. This issue has been patched in version 3.1.4.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34728
(8.7 HIGH)

EPSS: 0.19%

updated 2026-04-01T22:30:33

1 posts

### Summary The `MediaBrowserController::index()` method handles file deletion for the media browser. When the `fileRemove` action is triggered, the user-supplied `name` parameter is concatenated with the base upload directory path without any path traversal validation. The `FILTER_SANITIZE_SPECIAL_CHARS` filter only encodes HTML special characters (`&`, `'`, `"`, `<`, `>`) and characters with ASC

thehackerwire@mastodon.social at 2026-04-03T07:00:27.000Z ##

🟠 CVE-2026-34728 - High (8.7)

phpMyFAQ is an open source FAQ web application. Prior to version 4.1.1, the MediaBrowserController::index() method handles file deletion for the media browser. When the fileRemove action is triggered, the user-supplied name parameter is concatenat...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34725
(8.3 HIGH)

EPSS: 0.02%

updated 2026-04-01T22:19:59

1 posts

### Summary A stored XSS vulnerability exists in DbGate because attacker-controlled SVG icon strings are rendered as raw HTML without sanitization. In the web UI this allows script execution in another user's browser; in the Electron desktop app this can escalate to local code execution because Electron is configured with `nodeIntegration: true` and `contextIsolation: false`. ### Details The issu

thehackerwire@mastodon.social at 2026-04-03T02:30:46.000Z ##

🟠 CVE-2026-34725 - High (8.2)

DbGate is cross-platform database manager. From version 7.0.0 to before version 7.1.5, a stored XSS vulnerability exists in DbGate because attacker-controlled SVG icon strings are rendered as raw HTML without sanitization. In the web UI this allow...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34567
(9.1 CRITICAL)

EPSS: 0.05%

updated 2026-04-01T22:06:53

1 posts

# Summary ### **Vulnerability: Blogs Posts (Categories) Full Account Takeover for All-Roles & Privilege-Escalation via Stored DOM XSS** - Stored Cross-Site Scripting via Unsanitized Blog Post Content in Blog Management (Categories) ### Description The application fails to properly sanitize user-controlled input when creating or editing blog posts within the **Categories** section. An attacker c

offseq@infosec.exchange at 2026-04-02T06:00:27.000Z ##

CRITICAL: CVE-2026-34567 in ci4ms (<0.31.0.0) enables stored XSS via blog categories. Attackers can hijack sessions or steal data. Upgrade to 0.31.0.0 ASAP & audit for injected scripts. radar.offseq.com/threat/cve-20 #OffSeq #XSS #InfoSec #CVE202634567

##

CVE-2026-34565
(9.1 CRITICAL)

EPSS: 0.05%

updated 2026-04-01T22:05:48

1 posts

## Summary ### **Vulnerability: Stored DOM XSS via Posts Added to Menu (Persistent Payload Injection)** - Stored Cross-Site Scripting via Unsafe Rendering of Post Entries in Menu Management ### Description The application fails to properly sanitize user-controlled input when **adding Posts to navigation menus** through the Menu Management functionality. Post-related data selected via the Posts se

offseq@infosec.exchange at 2026-04-02T09:00:29.000Z ##

⚠️ CRITICAL: CVE-2026-34565 in ci4ms (<0.31.0.0) enables persistent XSS via menu management. Low-priv users can inject scripts impacting admins & users. Upgrade to 0.31.0.0+ now! radar.offseq.com/threat/cve-20 #OffSeq #XSS #WebSecurity

##

CVE-2026-34524
(8.3 HIGH)

EPSS: 0.05%

updated 2026-04-01T21:41:50

1 posts

## Summary A Path Traversal vulnerability in chat endpoints allows an authenticated attacker to read and delete arbitrary files under their user data root (for example `secrets.json` and `settings.json`) by supplying `avatar_url=".."`. ### Details The input validator used by `avatar_url` blocks only `/` and NUL bytes, but does not block traversal segments like `..`. Evidence: - Weak validator re

thehackerwire@mastodon.social at 2026-04-03T03:06:04.000Z ##

🟠 CVE-2026-34524 - High (8.3)

SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. Prior to version 1.17.0, a path traversal vulnerability in chat ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4828
(8.2 HIGH)

EPSS: 0.04%

updated 2026-04-01T21:31:35

1 posts

Improper authentication in the OAuth login functionality in Devolutions Server 2026.1.11 and earlier allows a remote attacker with valid credentials to bypass multi-factor authentication via a crafted login request.

thehackerwire@mastodon.social at 2026-04-02T05:35:31.000Z ##

🟠 CVE-2026-4828 - High (8.2)

Improper authentication in the OAuth login functionality in Devolutions Server 2026.1.11 and earlier allows a remote attacker with valid credentials to bypass multi-factor authentication via a crafted login request.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30292
(8.4 HIGH)

EPSS: 0.01%

updated 2026-04-01T21:31:34

1 posts

An arbitrary file overwrite vulnerability in Docudepot PDF Reader: PDF Viewer APP v1.0.34 allows attackers to overwrite critical internal files via the file import process, leading to arbitrary code execution or information exposure.

thehackerwire@mastodon.social at 2026-04-02T06:00:22.000Z ##

🟠 CVE-2026-30292 - High (8.4)

An arbitrary file overwrite vulnerability in Docudepot PDF Reader: PDF Viewer APP v1.0.34 allows attackers to overwrite critical internal files via the file import process, leading to arbitrary code execution or information exposure.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4924
(8.2 HIGH)

EPSS: 0.04%

updated 2026-04-01T21:31:34

1 posts

Improper authentication in the two-factor authentication (2FA) feature in Devolutions Server 2026.1.11 and earlier allows a remote attacker with valid credentials to bypass multifactor authentication and gain unauthorized access to the victim account via reuse of a partially authenticated session token.

thehackerwire@mastodon.social at 2026-04-02T05:35:41.000Z ##

🟠 CVE-2026-4924 - High (8.2)

Improper
authentication in the two-factor authentication (2FA) feature in
Devolutions Server 2026.1.11 and earlier allows a remote attacker with valid
credentials to bypass multifactor authentication and gain unauthorized
access to the victim ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30643
(9.8 CRITICAL)

EPSS: 0.08%

updated 2026-04-01T21:30:30

1 posts

An issue was discovered in DedeCMS 5.7.118 allowing attackers to execute code via crafted setup tag values in a module upload.

thehackerwire@mastodon.social at 2026-04-02T05:25:19.000Z ##

🔴 CVE-2026-30643 - Critical (9.8)

An issue was discovered in DedeCMS 5.7.118 allowing attackers to execute code via crafted setup tag values in a module upload.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30291
(8.4 HIGH)

EPSS: 0.01%

updated 2026-04-01T21:30:29

1 posts

An arbitrary file overwrite vulnerability in Ora Tools PDF Reader ' Reader & Editor APPv4.3.5 allows attackers to overwrite critical internal files via the file import process, leading to arbitrary code execution or information exposure.

thehackerwire@mastodon.social at 2026-04-02T06:00:32.000Z ##

🟠 CVE-2026-30291 - High (8.4)

An arbitrary file overwrite vulnerability in Ora Tools PDF Reader ' Reader & Editor APPv4.3.5 allows attackers to overwrite critical internal files via the file import process, leading to arbitrary code execution or information exposure.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5281
(8.8 HIGH)

EPSS: 3.03%

updated 2026-04-01T21:30:28

10 posts

Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

1 repos

https://github.com/umair-aziz025/CVE-2026-5281-Research-Toolkit

cktodon@mas.to at 2026-04-04T19:00:10.000Z ##

#Google parchea un zero-day de #Chrome en #WebGPU (CVE-2026-5281) que ya se está explotando

unaaldia.hispasec.com/2026/04/

##

youranonnewsirc@nerdculture.de at 2026-04-04T11:43:10.000Z ##

Geopolitical: US-Israel/Iran conflict intensifies; F-15E reportedly downed. UN debates Strait of Hormuz access.
Technology: 6G networks raise significant AI-driven cybersecurity risks. Apple plans to open Siri to rival AI in iOS 27. NASA's Artemis II mission launched astronauts to the Moon.
Cybersecurity: Google Chrome zero-day (CVE-2026-5281) actively exploited. Odido Telecom suffered a breach exposing 6 million identities. Lapsus$ claimed a supply chain attack on LiteLLM. Texas hospital hit by ransomware, affecting 250,000 patients.
#AnonNews_irc #Cybersecurity #News

##

steelefortress at 2026-04-04T11:00:13.958Z ##

CISA just added CVE-2026-5281, a vulnerability in Google Dawn, to its Known Exploited Vulnerabilities catalog. Dawn is the WebGPU implementation used across Chromium-based browsers, which means this flaw has a wide attack surface touching Chrome, Edge, and other...

Read more: steelefortress.com/jycnya

Cybersecurity

##

youranonnewsirc@nerdculture.de at 2026-04-04T03:43:04.000Z ##

Geopolitical tensions rise as Iran's Strait of Hormuz blockade severely disrupts shipping, causing global oil price surges. In cybersecurity, Google issued an emergency patch for a Chrome zero-day (CVE-2026-5281) actively exploited, alongside critical F5 BIG-IP and Citrix NetScaler vulnerabilities under exploitation. The tech sector saw OpenAI secure $122B in funding, with Oracle cutting jobs for AI infrastructure investments. Social media companies face new addiction lawsuits.

#Cybersecurity #Geopolitics #TechNews

##

youranonnewsirc@nerdculture.de at 2026-04-04T11:43:10.000Z ##

Geopolitical: US-Israel/Iran conflict intensifies; F-15E reportedly downed. UN debates Strait of Hormuz access.
Technology: 6G networks raise significant AI-driven cybersecurity risks. Apple plans to open Siri to rival AI in iOS 27. NASA's Artemis II mission launched astronauts to the Moon.
Cybersecurity: Google Chrome zero-day (CVE-2026-5281) actively exploited. Odido Telecom suffered a breach exposing 6 million identities. Lapsus$ claimed a supply chain attack on LiteLLM. Texas hospital hit by ransomware, affecting 250,000 patients.
#AnonNews_irc #Cybersecurity #News

##

steelefortress@infosec.exchange at 2026-04-04T11:00:13.000Z ##

CISA just added CVE-2026-5281, a vulnerability in Google Dawn, to its Known Exploited Vulnerabilities catalog. Dawn is the WebGPU implementation used across Chromium-based browsers, which means this flaw has a wide attack surface touching Chrome, Edge, and other...

Read more: steelefortress.com/jycnya

Cybersecurity #CyberDefense #DataPrivacy

##

youranonnewsirc@nerdculture.de at 2026-04-04T03:43:04.000Z ##

Geopolitical tensions rise as Iran's Strait of Hormuz blockade severely disrupts shipping, causing global oil price surges. In cybersecurity, Google issued an emergency patch for a Chrome zero-day (CVE-2026-5281) actively exploited, alongside critical F5 BIG-IP and Citrix NetScaler vulnerabilities under exploitation. The tech sector saw OpenAI secure $122B in funding, with Oracle cutting jobs for AI infrastructure investments. Social media companies face new addiction lawsuits.

#Cybersecurity #Geopolitics #TechNews

##

LLMs@activitypub.awakari.com at 2026-04-02T18:34:08.000Z ## CISA warns of actively exploited Chrome zero-day as Google ships fix CISA has added a newly exploited Chrome vulnerability, CVE-2026-5281, to its Known Exploited Vulnerabilities catalog and ordered...

#News

Origin | Interest | Match ##

hackmag@infosec.exchange at 2026-04-03T05:00:02.000Z ##

⚪️ Google Chrome patches fourth actively exploited zero‑day vulnerability

🗨️ Google developers have released an emergency update for the Chrome browser that fixes the 0‑day vulnerability CVE-2026-5281, which has already been exploited in real-world attacks. The vulnerability tracked as CVE-2026-5281 is related to a use-after-free issue in Dawn, the cross-platform…

🔗 hackmag.com/news/cve-2026-5281

#news

##

beyondmachines1@infosec.exchange at 2026-04-02T08:01:27.000Z ##

Google Patches Fourth Chrome Zero-Day of 2026 in Emergency Update

Google released emergency updates for Chrome to patch 21 vulnerabilities, including an actively exploited zero-day (CVE-2026-5281) in the Dawn WebGPU implementation that allows for data corruption and potential code execution.

**Once more, an urgent patch for Chrome - Google is patching an actively exploited flaw in Chrome. DONT DELAY! Update all your Chrome and Chromium browsers (Edge, Opera, Brave, Vivaldi...). Updating the browser is easy, all your tabs reopen after the patch.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-34581
(8.1 HIGH)

EPSS: 0.03%

updated 2026-04-01T20:58:51

1 posts

### Summary When using the `Share Token` it is possible to bypass the limited selected file download with all the gosh functionalities, including code exec. ### Details The `BasicAuthMiddleware` checks for a `?token=` parameter **before** checking credentials. If the token exists in `SharedLinks`, the request passes through with **no auth check at all**. The handler then processes all query para

thehackerwire@mastodon.social at 2026-04-03T02:03:38.000Z ##

🟠 CVE-2026-34581 - High (8.1)

goshs is a SimpleHTTPServer written in Go. From version 1.1.0 to before version 2.0.0-beta.2, when using the Share Token it is possible to bypass the limited selected file download with all the gosh functionalities, including code exec. This issue...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34222
(7.7 HIGH)

EPSS: 0.01%

updated 2026-04-01T20:25:50

1 posts

# Summary ## Broken Access Control in Tool Valves Open WebUI supports function calling through "Tools". Function calling allows an LLM to reliably connect to external tools and interact with external APIs. Exemplary use-cases include connecting to an internal knowledge base, retrieving emails from an exchange server, or retrieving order data from a shop backend. These interactions often require

thehackerwire@mastodon.social at 2026-04-02T05:25:10.000Z ##

🟠 CVE-2026-34222 - High (7.7)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to version 0.8.11, there is a broken access control vulnerability in tool values. This issue has been patched in version 0.8.11.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28805
(8.8 HIGH)

EPSS: 0.03%

updated 2026-04-01T19:46:02

2 posts

## Description Multiple AJAX select handlers in OpenSTAManager <= 2.10.1 are vulnerable to Time-Based Blind SQL Injection through the `options[stato]` GET parameter. The user-supplied value is read from `$superselect['stato']` and concatenated directly into SQL WHERE clauses as a bare expression, without any sanitization, parameterization, or allowlist validation. An authenticated attacker can i

thehackerwire@mastodon.social at 2026-04-05T03:00:55.000Z ##

🟠 CVE-2026-28805 - High (8.8)

OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to version 2.10.2, multiple AJAX select handlers in OpenSTAManager are vulnerable to Time-Based Blind SQL Injection through the options[stato] GET p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-05T03:00:55.000Z ##

🟠 CVE-2026-28805 - High (8.8)

OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to version 2.10.2, multiple AJAX select handlers in OpenSTAManager are vulnerable to Time-Based Blind SQL Injection through the options[stato] GET p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33579
(8.1 HIGH)

EPSS: 0.01%

updated 2026-04-01T19:07:04.223000

15 posts

OpenClaw before 2026.3.28 contains a privilege escalation vulnerability in the /pair approve command path that fails to forward caller scopes into the core approval check. A caller with pairing privileges but without admin privileges can approve pending device requests asking for broader scopes including admin access by exploiting the missing scope validation in extensions/device-pair/index.ts and

1 repos

https://github.com/atalovesyou/openclaw-security-checker

newsyc500@toot.community at 2026-04-05T06:43:29.000Z ##

OpenClaw privilege escalation vulnerability: nvd.nist.gov/vuln/detail/CVE-2

Discussion: news.ycombinator.com/item?id=4

##

cwebber@social.coop at 2026-04-04T15:49:02.000Z ##

OpenClaw also got a terrifying privilege escalation vulnerability nvd.nist.gov/vuln/detail/CVE-2

Meanwhile the OpenClaw founder is claiming shush, it's no big deal, probably most of these aren't really exploitable! (There's good business interest reasons to argue that, since OpenClaw's founders got acquired by OpenAI) news.ycombinator.com/item?id=4

Okay. I know I have more than a few security researchers following me. There's a public list of literally hundreds of thousands of publicly accessible OpenClaw instances right here: openclaw.allegro.earth/

Anyone try taking a sampling of them and testing how vulnerable against recent escalation CVEs they are? Could be a rather juicy writeup!

##

hnbest@mastodon.social at 2026-04-04T07:00:02.000Z ##

OpenClaw privilege escalation vulnerability
nvd.nist.gov/vuln/detail/CVE-2
Discussion: news.ycombinator.com/item?id=4

##

newsyc300@toot.community at 2026-04-04T05:43:29.000Z ##

OpenClaw privilege escalation vulnerability: nvd.nist.gov/vuln/detail/CVE-2

Discussion: news.ycombinator.com/item?id=4

##

newsyc250@toot.community at 2026-04-04T02:03:39.000Z ##

OpenClaw privilege escalation vulnerability: nvd.nist.gov/vuln/detail/CVE-2

Discussion: news.ycombinator.com/item?id=4

##

hn250@social.lansky.name at 2026-04-04T01:55:12.000Z ##

OpenClaw privilege escalation vulnerability

Link: nvd.nist.gov/vuln/detail/CVE-2
Discussion: news.ycombinator.com/item?id=4

##

CuratedHackerNews@mastodon.social at 2026-04-04T00:05:04.000Z ##

OpenClaw privilege escalation vulnerability

nvd.nist.gov/vuln/detail/CVE-2

#gov

##

cwebber@social.coop at 2026-04-04T15:49:02.000Z ##

OpenClaw also got a terrifying privilege escalation vulnerability nvd.nist.gov/vuln/detail/CVE-2

Meanwhile the OpenClaw founder is claiming shush, it's no big deal, probably most of these aren't really exploitable! (There's good business interest reasons to argue that, since OpenClaw's founders got acquired by OpenAI) news.ycombinator.com/item?id=4

Okay. I know I have more than a few security researchers following me. There's a public list of literally hundreds of thousands of publicly accessible OpenClaw instances right here: openclaw.allegro.earth/

Anyone try taking a sampling of them and testing how vulnerable against recent escalation CVEs they are? Could be a rather juicy writeup!

##

hnbest@mastodon.social at 2026-04-04T07:00:02.000Z ##

OpenClaw privilege escalation vulnerability
nvd.nist.gov/vuln/detail/CVE-2
Discussion: news.ycombinator.com/item?id=4

##

hn250@social.lansky.name at 2026-04-04T01:55:12.000Z ##

OpenClaw privilege escalation vulnerability

Link: nvd.nist.gov/vuln/detail/CVE-2
Discussion: news.ycombinator.com/item?id=4

##

CuratedHackerNews@mastodon.social at 2026-04-04T00:05:04.000Z ##

OpenClaw privilege escalation vulnerability

nvd.nist.gov/vuln/detail/CVE-2

#gov

##

jesterchen@social.tchncs.de at 2026-04-03T20:27:32.000Z ##

@masek Thanks for the screenshot and the reference to CVE-2026-33579 - the reddit comment has been removed. 🙏

##

nyanbinary@infosec.exchange at 2026-04-03T18:44:03.000Z ##

Also, is it possible the github commit links for the patch for CVE-2026-33579 are... just wrong? That commit doesnt really seem to match the description? (Didnt fully check it yet)

##

dangoodin@infosec.exchange at 2026-04-03T18:27:11.000Z ##

I'm trying to understand a bit more about CVE-2026-33579, the critical vulnerability in OpenClaw. To exploit, an attacker needs low-level paring privilege permissions. How does one acquire such privileges? Can anyone do it? I'm asking because I want to understand what's required for an attacker to exploit.

Feel free to ping me at DanArs.82, or drop an answer here.

##

_r_netsec@infosec.exchange at 2026-04-03T13:43:05.000Z ##

If you're running OpenClaw, you probably got hacked in the last week blink.new/blog/cve-2026-33579-

##

CVE-2026-30289
(8.4 HIGH)

EPSS: 0.01%

updated 2026-04-01T18:37:42

1 posts

An arbitrary file overwrite vulnerability in Tinybeans Private Family Album App v5.9.5-prod allows attackers to overwrite critical internal files via the file import process, leading to arbitrary code execution or information exposure.

thehackerwire@mastodon.social at 2026-04-02T06:01:24.000Z ##

🟠 CVE-2026-30289 - High (8.4)

An arbitrary file overwrite vulnerability in Tinybeans Private Family Album App v5.9.5-prod allows attackers to overwrite critical internal files via the file import process, leading to arbitrary code execution or information exposure.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20094
(8.8 HIGH)

EPSS: 0.35%

updated 2026-04-01T18:37:00

1 posts

A vulnerability in the web-based management interface of Cisco IMC could allow an authenticated, remote attacker with read-only privileges to perform command injection attacks on an affected system and execute arbitrary commands as the root user. This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted commands to the

thehackerwire@mastodon.social at 2026-04-02T05:26:01.000Z ##

🟠 CVE-2026-20094 - High (8.8)

A vulnerability in the web-based management interface of Cisco IMC could allow an authenticated, remote attacker with read-only privileges to perform command injection attacks on an affected system and execute arbitrary commands as the root user.
...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20093
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-04-01T18:36:52

2 posts

A vulnerability in the change password functionality of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to bypass authentication and gain access to the system as&nbsp;Admin. This vulnerability is due to incorrect handling of password change requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A

beyondmachines1@infosec.exchange at 2026-04-02T16:01:27.000Z ##

Critical Cisco IMC Authentication Bypass Allows Remote Administrative Takeover

Cisco patched a critical authentication bypass (CVE-2026-20093) in its Integrated Management Controller that allows unauthenticated attackers to gain Admin access by changing passwords via crafted HTTP requests.

**If your organization is running Cisco FMC on-premise, SSM On-Prem, or UCS servers with exposed IMC interfaces, consider this urgent and critical. Your immediate first step must be to ensure the web and management interfaces for all these devices are strictly isolated and accessible only from highly trusted internal networks. Even if you have them isolated, threat actors will weaponize these flaws and look for a way in.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

thehackerwire@mastodon.social at 2026-04-02T05:25:52.000Z ##

🔴 CVE-2026-20093 - Critical (9.8)

A vulnerability in the change password functionality of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to bypass authentication and gain access to the system as&nbsp;Admin.

This vulnerability is due...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5287
(6.3 MEDIUM)

EPSS: 0.07%

updated 2026-04-01T15:32:17

1 posts

Use after free in PDF in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-04-02T06:01:33.000Z ##

🟠 CVE-2026-5287 - High (8.8)

Use after free in PDF in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4747
(8.8 HIGH)

EPSS: 0.18%

updated 2026-04-01T15:30:57

1 posts

Each RPCSEC_GSS data packet is validated by a routine which checks a signature in the packet. This routine copies a portion of the packet into a stack buffer, but fails to ensure that the buffer is sufficiently large, and a malicious client can trigger a stack overflow. Notably, this does not require the client to authenticate itself first. As kgssapi.ko's RPCSEC_GSS implementation is vulnerabl

CVE-2026-34601
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-01T00:19:07

1 posts

## Summary `@xmldom/xmldom` allows attacker-controlled strings containing the CDATA terminator `]]>` to be inserted into a `CDATASection` node. During serialization, `XMLSerializer` emitted the CDATA content verbatim without rejecting or safely splitting the terminator. As a result, data intended to remain text-only became **active XML markup** in the serialized output, enabling XML structure inj

thehackerwire@mastodon.social at 2026-04-03T03:01:34.000Z ##

🟠 CVE-2026-34601 - High (7.5)

xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) `DOMParser` and `XMLSerializer` module. In xmldom versions 0.6.0 and prior and @xmldom/xmldom prior to versions 0.8.12 and 0.9.9, xmldom/xmldom allows attacker-controlled string...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25726
(8.1 HIGH)

EPSS: 0.04%

updated 2026-03-31T22:31:55

2 posts

### Impact This vulnerability affects **Cloudreve** instances that were **first deployed/initialized** with versions prior to V4.10.0. The application uses the weak pseudo-random number generator `math/rand` seeded with `time.Now().UnixNano()` to generate critical security secrets, including the `secret_key`, and `hash_id_salt`. These secrets are generated upon first startup and persisted in the

thehackerwire@mastodon.social at 2026-04-04T02:27:42.000Z ##

🟠 CVE-2026-25726 - High (8.1)

Cloudreve is a self-hosted file management and sharing system. Prior to version 4.13.0, the application uses the weak pseudo-random number generator math/rand seeded with time.Now().UnixNano() to generate critical security secrets, including the s...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T02:27:42.000Z ##

🟠 CVE-2026-25726 - High (8.1)

Cloudreve is a self-hosted file management and sharing system. Prior to version 4.13.0, the application uses the weak pseudo-random number generator math/rand seeded with time.Now().UnixNano() to generate critical security secrets, including the s...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33641
(7.8 HIGH)

EPSS: 0.02%

updated 2026-03-30T17:01:32

1 posts

## Summary Glances supports dynamic configuration values in which substrings enclosed in backticks are executed as system commands during configuration parsing. This behavior occurs in Config.get_value() and is implemented without validation or restriction of the executed commands. If an attacker can modify or influence configuration files, arbitrary commands will execute automatically with the p

thehackerwire@mastodon.social at 2026-04-03T07:00:37.000Z ##

🟠 CVE-2026-33641 - High (7.8)

Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.3, Glances supports dynamic configuration values in which substrings enclosed in backticks are executed as system commands during configuration parsing. This beh...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4425(CVSS UNKNOWN)

EPSS: 0.00%

updated 2026-03-30T12:32:36

1 posts

Rejected reason: Reserved for EastLink case, but no need for CVE anymore

thecybermind@infosec.exchange at 2026-04-02T11:57:05.000Z ##

INTEL ALERT] CVE-2026-4425 is live. Is your GIGABYTE Control Center (GCC) acting as a backdoor for digital decay? I’m breaking down the forensic evidence and showing you how to harden your precinct. Don't let unpatched utilities breach your perimeter.

Read the full brief at The Cyber Mind Co.

thecybermind.co/2026/04/02/gig

##

CVE-2026-4415
(8.1 HIGH)

EPSS: 0.48%

updated 2026-03-30T09:31:38

2 posts

Gigabyte Control Center developed by GIGABYTE has an Arbitrary File Write vulnerability. When the pairing feature is enabled, unauthenticated remote attackers can write arbitrary files to any location on the underlying operating system, leading to arbitrary code execution or privilege escalation.

thecybermind@infosec.exchange at 2026-04-02T11:57:05.000Z ##

INTEL ALERT] CVE-2026-4425 is live. Is your GIGABYTE Control Center (GCC) acting as a backdoor for digital decay? I’m breaking down the forensic evidence and showing you how to harden your precinct. Don't let unpatched utilities breach your perimeter.

Read the full brief at The Cyber Mind Co.

thecybermind.co/2026/04/02/gig

##

beyondmachines1@infosec.exchange at 2026-04-02T09:01:26.000Z ##

Gigabyte Patches Arbitrary File Write Flaw in Control Center Utility

Gigabyte patched a vulnerability (CVE-2026-4415) in its Control Center utility that lets unauthenticated remote attackers write arbitrary files and run code with system privileges. The flaw affects the pairing feature in versions 25.07.21.01 and earlier, requiring an update to version 25.12.10.01.

**If you use Gigabyte hardware, update the Control Center utility to version 25.12.10.01 ASAP. It's fairly easy and stops remote attackers from hijacking your system. In the meantime, disable the pairing feature if you do not use it (even if you do use it, disable and enable when you need it).**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-21536
(9.8 CRITICAL)

EPSS: 0.40%

updated 2026-03-16T15:40:44.357000

1 posts

Microsoft Devices Pricing Program Remote Code Execution Vulnerability

vitobotta@mastodon.social at 2026-04-03T16:59:27.000Z ##

XBOW autonomous AI found 3 critical RCEs in Microsoft Cloud - first time AI discovered production vulnerabilities without source code access. CVE-2026-21536 was flagged as one of March Patch Tuesday's most severe issues. The arms race between researchers and hackers has shifted.

##

CVE-2025-55182
(10.0 CRITICAL)

EPSS: 66.27%

updated 2025-12-10T02:00:02.557000

4 posts

A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.

Nuclei template

100 repos

https://github.com/xcanwin/CVE-2025-55182-React-RCE

https://github.com/songsanggggg/CVE-2025-55182

https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool

https://github.com/ThemeHackers/CVE-2025-55182

https://github.com/hidden-investigations/react2shell-scanner

https://github.com/kondukto-io/vulnerable-next-js-poc

https://github.com/MemerGamer/CVE-2025-55182

https://github.com/gensecaihq/react2shell-scanner

https://github.com/chrahman/react2shell-CVE-2025-55182-full-rce-script

https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension

https://github.com/BeichenDream/CVE-2025-55182-GodzillaMemoryShell

https://github.com/yanoshercohen/React2Shell_CVE-2025-55182

https://github.com/freeqaz/react2shell

https://github.com/Syrins/CVE-2025-55182-React2Shell-RCE

https://github.com/Rsatan/Next.js-Exploit-Tool

https://github.com/aliclub0x00/CVE-2025-55182-POC-NEXTJS

https://github.com/momika233/CVE-2025-55182-bypass

https://github.com/Cr4at0r/Next.js-RCE-Scanner-BurpSuite-Extension-

https://github.com/StealthMoud/CVE-2025-55182-Scanner

https://github.com/M4xSec/CVE-2025-55182-React2Shell-RCE-Shell

https://github.com/nehkark/CVE-2025-55182

https://github.com/LucasPDiniz/CVE-2025-55182

https://github.com/shamo0/react2shell-PoC

https://github.com/BlackTechX011/React2Shell

https://github.com/alsaut1/react2shell-lab

https://github.com/Updatelap/CVE-2025-55182

https://github.com/jctommasi/react2shellVulnApp

https://github.com/l4rm4nd/CVE-2025-55182

https://github.com/jf0x3a/CVE-2025-55182-exploit

https://github.com/vulncheck-oss/cve-2025-55182

https://github.com/techgaun/cve-2025-55182-scanner

https://github.com/Dh4v4l8/CVE-2025-55182-poc-tool

https://github.com/xalgord/React2Shell

https://github.com/Tiger-Foxx/exploit-react-CVE-2025-55182

https://github.com/subhdotsol/CVE-2025-55182

https://github.com/acheong08/CVE-2025-55182-poc

https://github.com/sickwell/CVE-2025-55182

https://github.com/santihabib/CVE-2025-55182-analysis

https://github.com/LemonTeatw1/CVE-2025-55182-exploit

https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script

https://github.com/MrR0b0t19/CVE-2025-55182-shellinteractive

https://github.com/mrknow001/RSC_Detector

https://github.com/sumanrox/rschunter

https://github.com/hackersatyamrastogi/react2shell-ultimate

https://github.com/whiteov3rflow/CVE-2025-55182-poc

https://github.com/Cillian-Collins/CVE-2025-55182

https://github.com/Spritualkb/CVE-2025-55182-exp

https://github.com/vijay-shirhatti/RSC-Detect-CVE-2025-55182

https://github.com/sudo-Yangziran/CVE-2025-55182POC

https://github.com/zzhorc/CVE-2025-55182

https://github.com/ZihxS/check-react-rce-cve-2025-55182

https://github.com/theman001/CVE-2025-55182

https://github.com/zack0x01/CVE-2025-55182-advanced-scanner-

https://github.com/kOaDT/poc-cve-2025-55182

https://github.com/ejpir/CVE-2025-55182-research

https://github.com/AliHzSec/CVE-2025-55182

https://github.com/assetnote/react2shell-scanner

https://github.com/AdityaBhatt3010/React2Shell-CVE-2025-55182-The-Deserialization-Bug-That-Broke-the-Web

https://github.com/cybertechajju/R2C-CVE-2025-55182-66478

https://github.com/shyambhanushali/React2Shell

https://github.com/websecuritylabs/React2Shell-Library

https://github.com/hoosin/CVE-2025-55182

https://github.com/logesh-GIT001/CVE-2025-55182

https://github.com/theori-io/reactguard

https://github.com/msanft/CVE-2025-55182

https://github.com/RavinduRathnayaka/CVE-2025-55182-PoC

https://github.com/alfazhossain/CVE-2025-55182-Exploiter

https://github.com/EynaExp/CVE-2025-55182-POC

https://github.com/emredavut/CVE-2025-55182

https://github.com/alptexans/RSC-Detect-CVE-2025-55182

https://github.com/RuoJi6/CVE-2025-55182-RCE-shell

https://github.com/MoLeft/React2Shell-Toolbox

https://github.com/Archerkong/CVE-2025-55182

https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension

https://github.com/hualy13/CVE-2025-55182

https://github.com/AdityaBhatt3010/React2Shell-CVE-2025-55182

https://github.com/Chocapikk/CVE-2025-55182

https://github.com/surajhacx/react2shellpoc

https://github.com/Pizz33/CVE-2025-55182-burpscanner

https://github.com/snipevx/React2Shell-POC

https://github.com/CymulateResearch/React2Shell-Scanner

https://github.com/keklick1337/CVE-2025-55182-golang-PoC

https://github.com/VeilVulp/RscScan-cve-2025-55182

https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js

https://github.com/xkillbit/cve-2025-55182-scanner

https://github.com/c0rydoras/CVE-2025-55182

https://github.com/Security-Phoenix-demo/react2shell-scanner-rce-react-next-CVE-2025-55182-CVE-2025-66478

https://github.com/fatguru/CVE-2025-55182-scanner

https://github.com/im-ezboy/CVE-2025-55182-zoomeye

https://github.com/ejpir/CVE-2025-55182-bypass

https://github.com/CirqueiraDev/MassExploit-CVE-2025-55182

https://github.com/heiheishushu/rsc_detect_CVE-2025-55182

https://github.com/dwisiswant0/CVE-2025-55182

https://github.com/Faithtiannn/CVE-2025-55182

https://github.com/zack0x01/vuln-app-CVE-2025-55182

https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc

https://github.com/ynsmroztas/NextRce

https://github.com/timsonner/React2Shell-CVE-2025-55182

https://github.com/zr0n/react2shell

https://github.com/kavienanj/CVE-2025-55182

oversecurity@mastodon.social at 2026-04-05T14:40:05.000Z ##

Hackers exploit React2Shell in automated credential theft campaign

Hackers are running a large-scale campaign to steal credentials in an automated way after exploiting React2Shell (CVE-2025-55182) in vulnerable...

🔗️ [Bleepingcomputer] link.is.it/7WBrWn

##

oversecurity@mastodon.social at 2026-04-05T14:40:05.000Z ##

Hackers exploit React2Shell in automated credential theft campaign

Hackers are running a large-scale campaign to steal credentials in an automated way after exploiting React2Shell (CVE-2025-55182) in vulnerable...

🔗️ [Bleepingcomputer] link.is.it/7WBrWn

##

jbz@indieweb.social at 2026-04-03T21:18:00.000Z ##

⚠️ Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials

「 The campaign is assessed to be targeting Next.js applications that are vulnerable to CVE-2025-55182 (CVSS score: 10.0), a critical flaw in React Server Components and Next.js App Router that could result in remote code execution, for initial access, and then dropping the NEXUS Listener collection framework 」

thehackernews.com/2026/04/hack

#nextjs #infosec #react2shell #CVE202555182

##

hackerworkspace@infosec.exchange at 2026-04-02T22:23:28.000Z ##

Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials

thehackernews.com/2026/04/hack

Read on HackerWorkspace: hackerworkspace.com/article/ha

#databreach #cybersecurity #vulnerability

##

CVE-2025-50286
(8.1 HIGH)

EPSS: 62.34%

updated 2025-08-06T15:31:37

1 posts

A Remote Code Execution (RCE) vulnerability in Grav CMS v1.7.48 allows an authenticated admin to upload a malicious plugin via the /admin/tools/direct-install interface. Once uploaded, the plugin is automatically extracted and loaded, allowing arbitrary PHP code execution and reverse shell access.

2 repos

https://github.com/x1o3/CVE-2025-50286

https://github.com/binneko/CVE-2025-50286

metasploit@infosec.exchange at 2026-04-03T20:06:32.000Z ##

Metasploit Framework is here with 5 new modules! Exploits for FreeScout (CVE-2026-28289) and Grav CMS (CVE-2025-50286) RCEs, plus a generic HTTP command execution module and a new Windows persistence technique. We also have a slew of bug fixes and enhancements including SOCKS proxy performance improvements #Metasploit rapid7.com/blog/post/pt-metasp

##

CVE-2025-30208
(5.3 MEDIUM)

EPSS: 88.96%

updated 2025-03-25T14:00:04

1 posts

### Summary The contents of arbitrary files can be returned to the browser. ### Impact Only apps explicitly exposing the Vite dev server to the network (using `--host` or [`server.host` config option](https://vitejs.dev/config/server-options.html#server-host)) are affected. ### Details `@fs` denies access to files outside of Vite serving allow list. Adding `?raw??` or `?import&raw??` to the URL

Nuclei template

23 repos

https://github.com/iSee857/CVE-2025-30208-PoC

https://github.com/ThumpBo/CVE-2025-30208-EXP

https://github.com/jackieya/ViteVulScan

https://github.com/marino-admin/Vite-CVE-2025-30208-Scanner

https://github.com/0xshaheen/CVE-2025-30208

https://github.com/xuemian168/CVE-2025-30208

https://github.com/Lusensec/CVE-2025-30208

https://github.com/4xura/CVE-2025-30208

https://github.com/nkuty/CVE-2025-30208-31125-31486-32395

https://github.com/TH-SecForge/CVE-2025-30208

https://github.com/HaGsec/CVE-2025-30208

https://github.com/MiclelsonCN/CVE-2025-30208_POC

https://github.com/HazaVVIP/CVE-2025-30208

https://github.com/imbas007/CVE-2025-30208-template

https://github.com/keklick1337/CVE-2025-30208-ViteVulnScanner

https://github.com/sadhfdw129/CVE-2025-30208-Vite

https://github.com/On1onss/CVE-2025-30208

https://github.com/r0ngy40/CVE-2025-30208-Series

https://github.com/sumeet-darekar/CVE-2025-30208

https://github.com/kk12-30/CVE-2025-30208

https://github.com/4m3rr0r/CVE-2025-30208-PoC

https://github.com/lilil3333/Vite-CVE-2025-30208-EXP

https://github.com/ThemeHackers/CVE-2025-30208

sans_isc@infosec.exchange at 2026-04-02T14:51:18.000Z ##

Attempts to Exploit Exposed "Vite" Installs (CVE-2025-30208) isc.sans.edu/diary/32860

##

CVE-2026-31933
(0 None)

EPSS: 0.04%

2 posts

N/A

thehackerwire@mastodon.social at 2026-04-05T01:59:56.000Z ##

🟠 CVE-2026-31933 - High (7.5)

Suricata is a network IDS, IPS and NSM engine. Prior to versions 7.0.15 and 8.0.4, specially crafted traffic can cause Suricata to slow down, affecting performance in IDS mode. This issue has been patched in versions 7.0.15 and 8.0.4.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-05T01:59:56.000Z ##

🟠 CVE-2026-31933 - High (7.5)

Suricata is a network IDS, IPS and NSM engine. Prior to versions 7.0.15 and 8.0.4, specially crafted traffic can cause Suricata to slow down, affecting performance in IDS mode. This issue has been patched in versions 7.0.15 and 8.0.4.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26027
(0 None)

EPSS: 0.00%

2 posts

N/A

decio at 2026-04-04T23:18:23.813Z ##

Tiens, intéressant : il s’agit du rapport technique sur la faille , à l'origine du patch du mois passé.
Si vous administrez un service GLPI

⬇️
"mettez à jour vers la version 11.0.6 disponible depuis le 3 mars 2026. Si la mise à jour n’est pas encore possible, activez l’authentification sur l’endpoint /Inventory (Paramètres → Inventaire → En-tête d’autorisation)."
⬇️
"GLPI : Blind XSS → ATO → SSTI → RCE — anatomie d'une chaîne 0-day
BZHunt a découvert deux vulnérabilités chaînées dans GLPI 11.0.0–11.0.5 (CVE-2026-26026, CVE-2026-26027) permettant à un attaquant non authentifié d'exécuter du code arbitraire via une Blind Stored XSS et une SSTI. Analyse technique complète et responsible disclosure."
👇
bzhunt.fr/blog/cve_glpi/

...et nice to know: Claude a encore aidé & tiré (Notice de transparence très appréciée)

"Cette recherche a été conduite avec l’assistance de Claude Opus 4.6 (Anthropic), utilisé par BZHunt dans son processus de R&D. Toutes les vulnérabilités ont été identifiées, vérifiées et exploitées par des chercheurs humains. Nous faisons le choix de la transparence sur l’usage de l’IA dans nos travaux, dans l’attente que des standards clairs émergent sur ce sujet."

CVE-2026-26027

##

decio@infosec.exchange at 2026-04-04T23:18:23.000Z ##

Tiens, intéressant : il s’agit du rapport technique sur la faille #glpi, à l'origine du patch du mois passé.
Si vous administrez un service GLPI

⬇️
"mettez à jour vers la version 11.0.6 disponible depuis le 3 mars 2026. Si la mise à jour n’est pas encore possible, activez l’authentification sur l’endpoint /Inventory (Paramètres → Inventaire → En-tête d’autorisation)."
⬇️
"GLPI : Blind XSS → ATO → SSTI → RCE — anatomie d'une chaîne 0-day
BZHunt a découvert deux vulnérabilités chaînées dans GLPI 11.0.0–11.0.5 (CVE-2026-26026, CVE-2026-26027) permettant à un attaquant non authentifié d'exécuter du code arbitraire via une Blind Stored XSS et une SSTI. Analyse technique complète et responsible disclosure."
👇
bzhunt.fr/blog/cve_glpi/

...et nice to know: Claude a encore aidé & tiré (Notice de transparence très appréciée)

"Cette recherche a été conduite avec l’assistance de Claude Opus 4.6 (Anthropic), utilisé par BZHunt dans son processus de R&D. Toutes les vulnérabilités ont été identifiées, vérifiées et exploitées par des chercheurs humains. Nous faisons le choix de la transparence sur l’usage de l’IA dans nos travaux, dans l’attente que des standards clairs émergent sur ce sujet."

#CyberVeille #CVE_2026_26026 CVE-2026-26027

##

CVE-2026-26026
(0 None)

EPSS: 0.00%

2 posts

N/A

decio at 2026-04-04T23:18:23.813Z ##

Tiens, intéressant : il s’agit du rapport technique sur la faille , à l'origine du patch du mois passé.
Si vous administrez un service GLPI

⬇️
"mettez à jour vers la version 11.0.6 disponible depuis le 3 mars 2026. Si la mise à jour n’est pas encore possible, activez l’authentification sur l’endpoint /Inventory (Paramètres → Inventaire → En-tête d’autorisation)."
⬇️
"GLPI : Blind XSS → ATO → SSTI → RCE — anatomie d'une chaîne 0-day
BZHunt a découvert deux vulnérabilités chaînées dans GLPI 11.0.0–11.0.5 (CVE-2026-26026, CVE-2026-26027) permettant à un attaquant non authentifié d'exécuter du code arbitraire via une Blind Stored XSS et une SSTI. Analyse technique complète et responsible disclosure."
👇
bzhunt.fr/blog/cve_glpi/

...et nice to know: Claude a encore aidé & tiré (Notice de transparence très appréciée)

"Cette recherche a été conduite avec l’assistance de Claude Opus 4.6 (Anthropic), utilisé par BZHunt dans son processus de R&D. Toutes les vulnérabilités ont été identifiées, vérifiées et exploitées par des chercheurs humains. Nous faisons le choix de la transparence sur l’usage de l’IA dans nos travaux, dans l’attente que des standards clairs émergent sur ce sujet."

CVE-2026-26027

##

decio@infosec.exchange at 2026-04-04T23:18:23.000Z ##

Tiens, intéressant : il s’agit du rapport technique sur la faille #glpi, à l'origine du patch du mois passé.
Si vous administrez un service GLPI

⬇️
"mettez à jour vers la version 11.0.6 disponible depuis le 3 mars 2026. Si la mise à jour n’est pas encore possible, activez l’authentification sur l’endpoint /Inventory (Paramètres → Inventaire → En-tête d’autorisation)."
⬇️
"GLPI : Blind XSS → ATO → SSTI → RCE — anatomie d'une chaîne 0-day
BZHunt a découvert deux vulnérabilités chaînées dans GLPI 11.0.0–11.0.5 (CVE-2026-26026, CVE-2026-26027) permettant à un attaquant non authentifié d'exécuter du code arbitraire via une Blind Stored XSS et une SSTI. Analyse technique complète et responsible disclosure."
👇
bzhunt.fr/blog/cve_glpi/

...et nice to know: Claude a encore aidé & tiré (Notice de transparence très appréciée)

"Cette recherche a été conduite avec l’assistance de Claude Opus 4.6 (Anthropic), utilisé par BZHunt dans son processus de R&D. Toutes les vulnérabilités ont été identifiées, vérifiées et exploitées par des chercheurs humains. Nous faisons le choix de la transparence sur l’usage de l’IA dans nos travaux, dans l’attente que des standards clairs émergent sur ce sujet."

#CyberVeille #CVE_2026_26026 CVE-2026-26027

##

CVE-2026-34612
(0 None)

EPSS: 0.14%

4 posts

N/A

offseq at 2026-04-04T09:00:28.173Z ##

⚠️ SQL Injection (CVSS 10, CRITICAL) in Kestra < 1.3.7 — authenticated users can trigger RCE via /api/v1/main/flows/search. Patch to v1.3.7 to mitigate. CVE-2026-34612. Details: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-04T01:24:27.000Z ##

🔴 CVE-2026-34612 - Critical (9.9)

Kestra is an open-source, event-driven orchestration platform. Prior to version 1.3.7, Kestra (default docker-compose deployment) contains a SQL Injection vulnerability that leads to Remote Code Execution (RCE) in the following endpoint "GET /api/...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-04T09:00:28.000Z ##

⚠️ SQL Injection (CVSS 10, CRITICAL) in Kestra < 1.3.7 — authenticated users can trigger RCE via /api/v1/main/flows/search. Patch to v1.3.7 to mitigate. CVE-2026-34612. Details: radar.offseq.com/threat/cve-20 #OffSeq #Kestra #SQLInjection #RCE

##

thehackerwire@mastodon.social at 2026-04-04T01:24:27.000Z ##

🔴 CVE-2026-34612 - Critical (9.9)

Kestra is an open-source, event-driven orchestration platform. Prior to version 1.3.7, Kestra (default docker-compose deployment) contains a SQL Injection vulnerability that leads to Remote Code Execution (RCE) in the following endpoint "GET /api/...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31932
(0 None)

EPSS: 0.04%

2 posts

N/A

thehackerwire@mastodon.social at 2026-04-04T06:00:13.000Z ##

🟠 CVE-2026-31932 - High (7.5)

Suricata is a network IDS, IPS and NSM engine. Prior to versions 7.0.15 and 8.0.4, inefficiency in KRB5 buffering can lead to performance degradation. This issue has been patched in versions 7.0.15 and 8.0.4.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T06:00:13.000Z ##

🟠 CVE-2026-31932 - High (7.5)

Suricata is a network IDS, IPS and NSM engine. Prior to versions 7.0.15 and 8.0.4, inefficiency in KRB5 buffering can lead to performance degradation. This issue has been patched in versions 7.0.15 and 8.0.4.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35218
(0 None)

EPSS: 0.03%

2 posts

N/A

thehackerwire@mastodon.social at 2026-04-04T03:01:31.000Z ##

🟠 CVE-2026-35218 - High (8.7)

Budibase is an open-source low-code platform. Prior to version 3.32.5, Budibase's Builder Command Palette renders entity names (tables, views, queries, automations) using Svelte's {@html} directive without any sanitization. An authenticated user w...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T03:01:31.000Z ##

🟠 CVE-2026-35218 - High (8.7)

Budibase is an open-source low-code platform. Prior to version 3.32.5, Budibase's Builder Command Palette renders entity names (tables, views, queries, automations) using Svelte's {@html} directive without any sanitization. An authenticated user w...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28798
(0 None)

EPSS: 0.04%

2 posts

N/A

thehackerwire@mastodon.social at 2026-04-04T03:00:12.000Z ##

🔴 CVE-2026-28798 - Critical (9)

ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. Prior to version 1.5.3, a proxy endpoint (/v1/sys/proxy) exposed by ZimaOS's web interface can be abused (via an externally reachable domain using a Clo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T03:00:12.000Z ##

🔴 CVE-2026-28798 - Critical (9)

ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. Prior to version 1.5.3, a proxy endpoint (/v1/sys/proxy) exposed by ZimaOS's web interface can be abused (via an externally reachable domain using a Clo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27833
(0 None)

EPSS: 0.04%

2 posts

N/A

thehackerwire@mastodon.social at 2026-04-04T01:53:40.000Z ##

🟠 CVE-2026-27833 - High (7.5)

Piwigo is an open source photo gallery application for the web. Prior to version 16.3.0, the pwg.history.search API method in Piwigo is registered without the admin_only option, allowing unauthenticated users to access the full browsing history of...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T01:53:40.000Z ##

🟠 CVE-2026-27833 - High (7.5)

Piwigo is an open source photo gallery application for the web. Prior to version 16.3.0, the pwg.history.search API method in Piwigo is registered without the admin_only option, allowing unauthenticated users to access the full browsing history of...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33184
(0 None)

EPSS: 0.04%

2 posts

N/A

thehackerwire@mastodon.social at 2026-04-04T01:53:21.000Z ##

🟠 CVE-2026-33184 - High (7.5)

nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake protocol based on the Albatross consensus algorithm. Prior to version 1.3.0, the discovery handler accepts a peer-controlled limit during handshake and stores it unchange...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T01:53:21.000Z ##

🟠 CVE-2026-33184 - High (7.5)

nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake protocol based on the Albatross consensus algorithm. Prior to version 1.3.0, the discovery handler accepts a peer-controlled limit during handshake and stores it unchange...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27456
(0 None)

EPSS: 0.01%

1 posts

N/A

linux@activitypub.awakari.com at 2026-04-05T08:02:24.000Z ## CVE-2026-27456 util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup Information published.

#CVE

Origin | Interest | Match ##

CVE-2026-28289
(0 None)

EPSS: 17.68%

1 posts

N/A

1 repos

https://github.com/0xBlackash/CVE-2026-28289

metasploit@infosec.exchange at 2026-04-03T20:06:32.000Z ##

Metasploit Framework is here with 5 new modules! Exploits for FreeScout (CVE-2026-28289) and Grav CMS (CVE-2025-50286) RCEs, plus a generic HTTP command execution module and a new Windows persistence technique. We also have a slew of bug fixes and enhancements including SOCKS proxy performance improvements #Metasploit rapid7.com/blog/post/pt-metasp

##

CVE-2026-34745
(0 None)

EPSS: 0.04%

2 posts

N/A

offseq@infosec.exchange at 2026-04-03T10:30:27.000Z ##

🚨 CRITICAL: CVE-2026-34745 in ShaneIsrael fireshare (<1.5.3) enables unauth’d file writes to any server path via /api/uploadChunked/public. Upgrade to 1.5.3 ASAP or restrict access. Full details: radar.offseq.com/threat/cve-20 #OffSeq #CVE202634745 #infosec #patchnow

##

thehackerwire@mastodon.social at 2026-04-03T02:03:19.000Z ##

🔴 CVE-2026-34745 - Critical (9.1)

Fireshare facilitates self-hosted media and link sharing. Prior to version 1.5.3, the fix for CVE-2026-33645 was applied to the authenticated /api/uploadChunked endpoint but was not applied to the unauthenticated /api/uploadChunked/public endpoint...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34838
(0 None)

EPSS: 0.45%

2 posts

N/A

1 repos

https://github.com/bamuwe/CVE-2026-34838

offseq@infosec.exchange at 2026-04-03T09:00:27.000Z ##

🚨 CVE-2026-34838 (CRITICAL, CVSS 10): Group-Office <6.8.156, <25.0.90, <26.0.12 vulnerable to insecure deserialization (CWE-502). Authenticated attackers can achieve RCE by injecting malicious serialized objects. Patch now! radar.offseq.com/threat/cve-20 #OffSeq #Vuln #RCE

##

thehackerwire@mastodon.social at 2026-04-03T02:00:04.000Z ##

🔴 CVE-2026-34838 - Critical (9.9)

Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.156, 25.0.90, and 26.0.12, a vulnerability in the AbstractSettingsCollection model leads to insecure deserialization when these settings are l...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70951
(0 None)

EPSS: 0.00%

1 posts

N/A

CVE-2026-31937
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-03T07:09:12.000Z ##

🟠 CVE-2026-31937 - High (7.5)

Suricata is a network IDS, IPS and NSM engine. Prior to version 7.0.15, inefficiency in DCERPC buffering can lead to a performance degradation. This issue has been patched in version 7.0.15.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31935
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-03T07:09:02.000Z ##

🟠 CVE-2026-31935 - High (7.5)

Suricata is a network IDS, IPS and NSM engine. Prior to versions 7.0.15 and 8.0.4, flooding of craft HTTP2 continuation frames can lead to memory exhaustion, usually resulting in the Suricata process being shut down by the operating system. This i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31934
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-03T07:08:53.000Z ##

🟠 CVE-2026-31934 - High (7.5)

Suricata is a network IDS, IPS and NSM engine. From version 8.0.0 to before version 8.0.4, there is a quadratic complexity issue when searching for URLs in mime encoded messages over SMTP leading to a performance impact. This issue has been patche...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34577
(0 None)

EPSS: 0.09%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-03T03:01:44.000Z ##

🟠 CVE-2026-34577 - High (8.6)

Postiz is an AI social media scheduling tool. Prior to version 2.21.3, the GET /public/stream endpoint in PublicController accepts a user-supplied url query parameter and proxies the full HTTP response back to the caller. The only validation is ur...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34717
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-03T02:30:36.000Z ##

🔴 CVE-2026-34717 - Critical (9.9)

OpenProject is an open-source, web-based project management software. Prior to version 17.2.3, the =n operator in modules/reporting/lib/report/operator.rb:177 embeds user input directly into SQL WHERE clauses without parameterization. This issue h...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33645
(0 None)

EPSS: 0.07%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-03T02:03:19.000Z ##

🔴 CVE-2026-34745 - Critical (9.1)

Fireshare facilitates self-hosted media and link sharing. Prior to version 1.5.3, the fix for CVE-2026-33645 was applied to the authenticated /api/uploadChunked endpoint but was not applied to the unauthenticated /api/uploadChunked/public endpoint...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34840
(0 None)

EPSS: 0.05%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-03T02:00:16.000Z ##

🟠 CVE-2026-34840 - High (8.1)

OneUptime is an open-source monitoring and observability platform. Prior to version 10.0.42, OneUptime's SAML SSO implementation (App/FeatureSet/Identity/Utils/SSO.ts) has decoupled signature verification and identity extraction. isSignatureValid(...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34159
(0 None)

EPSS: 0.13%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-02T04:02:10.000Z ##

🔴 CVE-2026-34159 - Critical (9.8)

llama.cpp is an inference of several LLM models in C/C++. Prior to version b8492, the RPC backend's deserialize_tensor() skips all bounds validation when a tensor's buffer field is 0. An unauthenticated attacker can read and write arbitrary proces...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34072
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-02T04:02:01.000Z ##

🟠 CVE-2026-34072 - High (8.3)

Cr*nMaster (cronmaster) is a Cronjob management UI with human readable syntax, live logging and log history for cronjobs. Prior to version 2.2.0, an authentication bypass in middleware allows unauthenticated requests with an invalid session cookie...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

Visit counter For Websites