##
Updated at UTC 2026-04-26T08:24:41.123382
| CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-7019 | 8.8 | 0.00% | 4 | 0 | 2026-04-26T05:16:01.330000 | A vulnerability was identified in Tenda F456 1.0.0.5. The impacted element is th | |
| CVE-2026-42255 | 7.2 | 0.00% | 2 | 0 | 2026-04-26T04:16:05.787000 | Technitium DNS Server before 15.0 allows DNS traffic amplification via cyclic na | |
| CVE-2026-7015 | 2.4 | 0.00% | 2 | 0 | 2026-04-26T03:16:00.530000 | A vulnerability has been found in MaxSite CMS up to 109.3. This issue affects so | |
| CVE-2026-6992 | 7.2 | 0.00% | 2 | 0 | 2026-04-25T18:16:19.413000 | A vulnerability was identified in Linksys MR9600 2.0.6.206937. This affects the | |
| CVE-2026-6988 | 8.8 | 0.00% | 4 | 0 | 2026-04-25T18:16:17.863000 | A flaw has been found in Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon. This issue | |
| CVE-2026-6951 | 9.8 | 0.08% | 4 | 0 | 2026-04-25T11:16:17.670000 | Versions of the package simple-git before 3.36.0 are vulnerable to Remote Code E | |
| CVE-2026-41433 | 8.4 | 0.02% | 2 | 0 | 2026-04-25T03:16:04.950000 | OpenTelemetry eBPF Instrumentation provides eBPF instrumentation based on the Op | |
| CVE-2026-41421 | 8.8 | 0.03% | 2 | 0 | 2026-04-25T03:16:04.790000 | SiYuan is an open-source personal knowledge management system. Prior to 3.6.5, S | |
| CVE-2026-33318 | 8.8 | 0.07% | 2 | 0 | 2026-04-25T03:16:04.223000 | Actual is a local-first personal finance tool. Prior to version 26.4.0, any auth | |
| CVE-2026-41277 | 8.8 | 0.12% | 2 | 0 | 2026-04-25T02:16:02.837000 | Flowise is a drag & drop user interface to build a customized large language mod | |
| CVE-2026-41275 | 7.5 | 0.04% | 2 | 0 | 2026-04-25T02:16:02.710000 | Flowise is a drag & drop user interface to build a customized large language mod | |
| CVE-2026-41266 | 7.5 | 0.04% | 2 | 0 | 2026-04-25T02:16:02.477000 | Flowise is a drag & drop user interface to build a customized large language mod | |
| CVE-2026-40886 | 7.7 | 0.04% | 1 | 0 | 2026-04-25T02:16:02.143000 | Argo Workflows is an open source container-native workflow engine for orchestrat | |
| CVE-2026-42171 | 7.8 | 0.01% | 2 | 0 | 2026-04-25T00:30:38 | NSIS (Nullsoft Scriptable Install System) 3.06.1 before 3.12 sometimes uses the | |
| CVE-2026-41044 | 8.8 | 0.10% | 2 | 0 | 2026-04-24T21:32:00 | Improper Input Validation, Improper Control of Generation of Code ('Code Injecti | |
| CVE-2026-23902 | 8.1 | 0.04% | 2 | 0 | 2026-04-24T21:32:00 | Incorrect Authorization vulnerability in Apache DolphinScheduler allows authenti | |
| CVE-2026-34415 | 9.8 | 0.19% | 1 | 0 | 2026-04-24T21:32:00 | Xerte Online Toolkits versions 3.15 and earlier contain an incomplete input vali | |
| CVE-2026-41248 | 9.1 | 0.09% | 5 | 0 | 2026-04-24T21:16:18.497000 | Clerk JavaScript is the official JavaScript repository for Clerk authentication. | |
| CVE-2026-41324 | 7.5 | 0.04% | 1 | 0 | 2026-04-24T21:02:13 | ### Summary `basic-ftp@5.2.2` is vulnerable to denial of service through unbound | |
| CVE-2026-41278 | 7.5 | 0.03% | 2 | 0 | 2026-04-24T21:00:59 | ### Summary The `GET /api/v1/public-chatflows/:id` endpoint returns the full ch | |
| CVE-2026-41279 | 7.5 | 0.04% | 2 | 0 | 2026-04-24T21:00:53 | ### Summary The text-to-speech generation endpoint (`POST /api/v1/text-to-speec | |
| CVE-2026-41271 | 7.1 | 0.06% | 2 | 0 | 2026-04-24T20:59:23 | ### Summary A Server-Side Request Forgery (SSRF) vulnerability exists in Flowise | |
| CVE-2026-41265 | 9.8 | 0.13% | 2 | 0 | 2026-04-24T20:58:07 | ZDI-CAN-29412: FlowiseAI Flowise Airtable_Agent Code Injection Remote Code Execu | |
| CVE-2026-41230 | 8.5 | 0.04% | 1 | 0 | 2026-04-24T20:54:08 | ## Summary `DomainZones::add()` accepts arbitrary DNS record types without a wh | |
| CVE-2026-41229 | 9.1 | 0.04% | 1 | 0 | 2026-04-24T20:53:59 | ## Summary `PhpHelper::parseArrayToString()` writes string values into single-q | |
| CVE-2026-41137 | 8.8 | 0.28% | 2 | 0 | 2026-04-24T20:44:06 | ### Summary The CSVAgent allows providing a custom Pandas CSV read code. Due to | |
| CVE-2024-7399 | 8.8 | 82.26% | 3 | 1 | template | 2026-04-24T20:23:57.990000 | Improper limitation of a pathname to a restricted directory vulnerability in Sam |
| CVE-2026-41477 | 7.8 | 0.01% | 2 | 0 | 2026-04-24T20:16:28.340000 | Deskflow is a keyboard and mouse sharing app. In 1.20.0, 1.26.0.134, and earlie | |
| CVE-2026-41429 | 8.8 | 0.02% | 2 | 0 | 2026-04-24T20:16:27.663000 | arduino-esp32 is an Arduino core for the ESP32, ESP32-S2, ESP32-S3, ESP32-C3, ES | |
| CVE-2026-40372 | 9.1 | 0.03% | 1 | 0 | 2026-04-24T19:59:44 | ## Executive Summary: A bug in `Microsoft.AspNetCore.DataProtection` 10.0.0-10 | |
| CVE-2024-57728 | 7.2 | 50.59% | 3 | 0 | 2026-04-24T19:27:00.700000 | SimpleHelp remote support software v5.5.7 and before allows admin users to uploa | |
| CVE-2026-41276 | 9.8 | 0.18% | 2 | 0 | 2026-04-24T19:17:11.770000 | Flowise is a drag & drop user interface to build a customized large language mod | |
| CVE-2026-41273 | 8.2 | 0.06% | 2 | 0 | 2026-04-24T19:17:11.530000 | Flowise is a drag & drop user interface to build a customized large language mod | |
| CVE-2026-41138 | 8.8 | 0.29% | 1 | 0 | 2026-04-24T19:17:11.260000 | Flowise is a drag & drop user interface to build a customized large language mod | |
| CVE-2026-40466 | 8.8 | 0.11% | 2 | 0 | 2026-04-24T19:17:10.567000 | Improper Input Validation, Improper Control of Generation of Code ('Code Injecti | |
| CVE-2026-33662 | 7.5 | 0.07% | 2 | 0 | 2026-04-24T19:17:09.997000 | OP-TEE is a Trusted Execution Environment (TEE) designed as companion to a non-s | |
| CVE-2025-50229 | 9.8 | 0.03% | 2 | 0 | 2026-04-24T19:16:31.937000 | Jizhicms v2.5.4 is vulnerable to SQL injection in the product editing module. | |
| CVE-2024-57726 | 8.8 | 52.25% | 3 | 0 | 2026-04-24T18:30:36 | SimpleHelp remote support software v5.5.7 and before has a vulnerability that al | |
| CVE-2025-29635 | 8.8 | 58.94% | 3 | 0 | 2026-04-24T18:30:36 | A command injection vulnerability in D-Link DIR-823X 240126 and 240802 allows an | |
| CVE-2026-6911 | 9.8 | 0.05% | 5 | 0 | 2026-04-24T17:56:41.280000 | Missing JWT signature verification in AWS Ops Wheel allows unauthenticated attac | |
| CVE-2026-40897 | 8.8 | 0.05% | 1 | 0 | 2026-04-24T17:56:41.280000 | Math.js is an extensive math library for JavaScript and Node.js. From 13.1.1 to | |
| CVE-2026-39920 | 9.8 | 0.20% | 5 | 0 | 2026-04-24T17:55:55.317000 | BridgeHead FileStore versions prior to 24A (released in early 2024) expose the A | |
| CVE-2026-41068 | 7.7 | 0.03% | 1 | 0 | 2026-04-24T17:16:21.240000 | Kyverno is a policy engine designed for cloud native platform engineering teams. | |
| CVE-2026-34279 | 9.1 | 0.07% | 1 | 0 | 2026-04-24T16:43:19.373000 | Vulnerability in the Oracle Enterprise Manager Base Platform product of Oracle E | |
| CVE-2026-6919 | 9.6 | 0.11% | 4 | 0 | 2026-04-24T16:39:50.947000 | Use after free in DevTools in Google Chrome prior to 147.0.7727.117 allowed a re | |
| CVE-2026-33524 | 7.5 | 0.04% | 1 | 0 | 2026-04-24T16:25:17 | ## Summary ### Unbounded Memory Allocation (all platforms) A crafted payload a | |
| CVE-2026-41492 | 9.8 | 0.06% | 3 | 0 | 2026-04-24T16:15:29 | ### Summary Dgraph `v25.3.2` still exposes the process command line through the | |
| CVE-2026-41328 | 9.1 | 0.08% | 3 | 0 | 2026-04-24T15:41:45 | ## 1. Executive Summary A vulnerability has been found in Dgraph that gives an | |
| CVE-2026-41327 | 9.1 | 0.03% | 4 | 0 | 2026-04-24T15:41:25 | ## 1. Executive Summary A vulnerability has been found in Dgraph that gives an | |
| CVE-2026-41316 | 8.1 | 0.08% | 1 | 0 | 2026-04-24T15:36:10 | ## Summary Ruby 2.7.0 (before ERB 2.2.0 was published on rubygems.org) introduc | |
| CVE-2026-21515 | 10.0 | 0.08% | 3 | 0 | 2026-04-24T15:32:39 | Exposure of sensitive information to an unauthorized actor in Azure IOT Central | |
| CVE-2026-5367 | 8.6 | 0.03% | 2 | 0 | 2026-04-24T15:32:39 | A flaw was found in OVN (Open Virtual Network). A remote attacker, by sending cr | |
| CVE-2026-41246 | 8.1 | 0.07% | 1 | 0 | 2026-04-24T15:19:50 | ### Impact Contour's [Cookie Rewriting](https://projectcontour.io/docs/1.33/con | |
| CVE-2026-41267 | 8.1 | 0.24% | 1 | 0 | 2026-04-24T15:14:48.233000 | Flowise is a drag & drop user interface to build a customized large language mod | |
| CVE-2026-41268 | 9.8 | 0.58% | 1 | 0 | 2026-04-24T15:14:39.110000 | Flowise is a drag & drop user interface to build a customized large language mod | |
| CVE-2026-41180 | 7.5 | 0.03% | 2 | 0 | 2026-04-24T14:50:56.203000 | PsiTransfer is an open source, self-hosted file sharing solution. Prior to versi | |
| CVE-2026-41208 | 8.8 | 0.23% | 2 | 0 | 2026-04-24T14:50:56.203000 | Paperclip is a Node.js server and React UI that orchestrates a team of AI agents | |
| CVE-2026-41323 | 8.1 | 0.02% | 1 | 0 | 2026-04-24T14:50:56.203000 | Kyverno is a policy engine designed for cloud native platform engineering teams. | |
| CVE-2026-41228 | 9.9 | 0.06% | 1 | 0 | 2026-04-24T14:50:56.203000 | Froxlor is open source server administration software. Prior to version 2.3.6, t | |
| CVE-2026-41040 | 7.5 | 0.04% | 2 | 0 | 2026-04-24T14:50:56.203000 | GROWI provided by GROWI, Inc. is vulnerable to a regular expression denial of se | |
| CVE-2026-6903 | 7.5 | 0.03% | 1 | 0 | 2026-04-24T14:50:56.203000 | The LabOne Web Server, backing the LabOne User Interface, contains insufficient | |
| CVE-2026-6886 | 9.8 | 0.16% | 1 | 0 | 2026-04-24T14:50:56.203000 | Borg SPM 2007 (Sales Ended in 2008) developed by BorG Technology Corporation has | |
| CVE-2026-41461 | 8.5 | 0.04% | 1 | 0 | 2026-04-24T14:50:56.203000 | SocialEngine versions 7.8.0 and prior contain a blind server-side request forger | |
| CVE-2026-41460 | 9.8 | 0.17% | 1 | 0 | 2026-04-24T14:50:56.203000 | SocialEngine versions 7.8.0 and prior contain a SQL injection vulnerability in t | |
| CVE-2025-62373 | 9.8 | 0.30% | 1 | 0 | 2026-04-24T14:50:56.203000 | Pipecat is an open-source Python framework for building real-time voice and mult | |
| CVE-2026-41241 | 8.7 | 0.03% | 1 | 0 | 2026-04-24T14:50:56.203000 | pretalx is a conference planning tool. Prior to 2026.1.0, The organiser search i | |
| CVE-2026-41196 | 0 | 0.07% | 1 | 0 | 2026-04-24T14:50:56.203000 | Luanti (formerly Minetest) is an open source voxel game-creation platform. Start | |
| CVE-2026-34003 | 7.8 | 0.01% | 1 | 0 | 2026-04-24T14:41:55.890000 | A flaw was found in the X.Org X server's XKB key types request validation. A loc | |
| CVE-2026-34001 | 7.8 | 0.01% | 1 | 0 | 2026-04-24T14:41:55.890000 | A flaw was found in the X.Org X server. This use-after-free vulnerability occurs | |
| CVE-2026-40471 | 9.6 | 0.02% | 1 | 0 | 2026-04-24T14:41:55.890000 | hackage-server lacked Cross-Site Request Forgery (CSRF) protection across its en | |
| CVE-2026-31177 | 9.8 | 0.06% | 1 | 0 | 2026-04-24T14:41:55.890000 | An issue was discovered in ToToLink A3300R firmware v17.0.0cu.557_B20221024 allo | |
| CVE-2026-31181 | 9.8 | 0.06% | 1 | 0 | 2026-04-24T14:41:55.890000 | An issue was discovered in ToToLink A3300R firmware v17.0.0cu.557_B20221024 allo | |
| CVE-2026-32210 | 9.3 | 0.04% | 2 | 0 | 2026-04-24T14:41:16.553000 | Server-side request forgery (ssrf) in Microsoft Dynamics 365 (Online) allows an | |
| CVE-2026-24303 | 9.6 | 0.04% | 3 | 0 | 2026-04-24T14:41:16.553000 | Improper access control in Microsoft Partner Center allows an authorized attacke | |
| CVE-2026-32172 | 8.0 | 0.04% | 1 | 0 | 2026-04-24T14:41:16.553000 | Uncontrolled search path element in Microsoft Power Apps allows an unauthorized | |
| CVE-2026-41336 | 7.8 | 0.01% | 1 | 0 | 2026-04-24T14:40:53.523000 | OpenClaw before 2026.3.31 allows workspace .env files to override the OPENCLAW_B | |
| CVE-2026-41349 | 8.8 | 0.11% | 1 | 0 | 2026-04-24T14:40:53.523000 | OpenClaw before 2026.3.28 contains an agentic consent bypass vulnerability allow | |
| CVE-2026-41353 | 8.1 | 0.04% | 1 | 0 | 2026-04-24T14:40:53.523000 | OpenClaw before 2026.3.22 contains an access control bypass vulnerability in the | |
| CVE-2026-41352 | 8.8 | 0.37% | 1 | 0 | 2026-04-24T14:40:53.523000 | OpenClaw before 2026.3.31 contains a remote code execution vulnerability where a | |
| CVE-2026-40623 | 8.1 | 0.03% | 2 | 0 | 2026-04-24T14:40:12.517000 | A vulnerability in SenseLive X3050's web management interface allows critical sy | |
| CVE-2026-40620 | 9.8 | 0.07% | 3 | 0 | 2026-04-24T14:40:12.517000 | A vulnerability in SenseLive X3050’s embedded management service allows full adm | |
| CVE-2026-35503 | 9.8 | 0.06% | 2 | 0 | 2026-04-24T14:40:12.517000 | A vulnerability in SenseLive X3050’s web management interface allows authenticat | |
| CVE-2026-40630 | 9.8 | 0.09% | 3 | 0 | 2026-04-24T14:40:12.517000 | A vulnerability in SenseLive X3050’s web management interface allows unauthor | |
| CVE-2026-25660 | 0 | 0.05% | 2 | 0 | 2026-04-24T14:39:28.770000 | CodeChecker is an analyzer tooling, defect database and viewer extension for the | |
| CVE-2026-1950 | 9.8 | 0.04% | 2 | 0 | 2026-04-24T14:39:28.770000 | Delta Electronics AS320T has No checking of the length of the buffer with the f | |
| CVE-2026-1952 | 9.8 | 0.04% | 3 | 0 | 2026-04-24T14:39:28.770000 | Delta Electronics AS320T has denial of service via the undocumented subfunction | |
| CVE-2026-21728 | 7.5 | 0.01% | 2 | 0 | 2026-04-24T14:39:28.770000 | Tempo queries with large limits can cause large memory allocations which can imp | |
| CVE-2026-5364 | 8.1 | 0.11% | 1 | 0 | 2026-04-24T14:38:26.740000 | The Drag and Drop File Upload for Contact Form 7 plugin for WordPress is vulnera | |
| CVE-2026-34305 | 7.5 | 0.04% | 2 | 0 | 2026-04-24T14:27:13.867000 | Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware | |
| CVE-2026-41651 | 8.8 | 0.22% | 8 | 5 | 2026-04-24T13:43:37.347000 | PackageKit is a a D-Bus abstraction layer that allows the user to manage package | |
| CVE-2026-1951 | 9.8 | 0.01% | 2 | 0 | 2026-04-24T09:30:36 | Delta Electronics AS320T has no checking of the length of the buffer with the di | |
| CVE-2026-1949 | 9.8 | 0.02% | 1 | 0 | 2026-04-24T06:31:23 | Delta Electronics AS320T has incorrect calculation of the buffer size on the sta | |
| CVE-2026-27841 | 8.1 | 0.01% | 2 | 0 | 2026-04-24T00:32:04 | A vulnerability in SenseLive X3050's web management interface allows state-chang | |
| CVE-2026-35064 | 7.5 | 0.05% | 2 | 0 | 2026-04-24T00:32:04 | A vulnerability in SenseLive X3050’s management ecosystem allows unauthenticated | |
| CVE-2026-39462 | 8.1 | 0.04% | 3 | 0 | 2026-04-24T00:32:04 | A vulnerability exists in SenseLive X3050’s web management interface in which pa | |
| CVE-2026-25775 | 9.8 | 0.07% | 3 | 0 | 2026-04-24T00:32:03 | A vulnerability in SenseLive X3050’s remote management service allows firmware r | |
| CVE-2026-27843 | 9.1 | 0.07% | 3 | 0 | 2026-04-24T00:32:03 | A vulnerability exists in SenseLive X3050's web management interface that allows | |
| CVE-2026-26150 | 8.6 | 0.06% | 2 | 0 | 2026-04-24T00:31:58 | Server-side request forgery (ssrf) in Microsoft Purview allows an unauthorized a | |
| CVE-2026-26210 | 9.8 | 0.04% | 1 | 0 | 2026-04-24T00:31:58 | KTransformers through 0.5.3 contains an unsafe deserialization vulnerability in | |
| CVE-2026-33819 | 10.0 | 0.27% | 1 | 0 | 2026-04-24T00:31:58 | Deserialization of untrusted data in Microsoft Bing allows an unauthorized attac | |
| CVE-2026-33102 | 9.3 | 0.04% | 1 | 0 | 2026-04-24T00:31:58 | Url redirection to untrusted site ('open redirect') in M365 Copilot allows an un | |
| CVE-2026-6920 | 7.5 | 0.08% | 2 | 0 | 2026-04-23T21:32:28 | Out of bounds read in GPU in Google Chrome on Android prior to 147.0.7727.117 al | |
| CVE-2026-31178 | 9.8 | 0.06% | 1 | 0 | 2026-04-23T21:32:28 | An issue was discovered in ToToLink A3300R firmware v17.0.0cu.557_B20221024 allo | |
| CVE-2026-39087 | 9.8 | 0.25% | 1 | 0 | 2026-04-23T21:32:26 | An issue in Ntfy ntfy.sh before v.2.21 allows a remote attacker to execute arbit | |
| CVE-2026-6942 | 9.8 | 0.27% | 1 | 0 | 2026-04-23T21:31:30 | radare2-mcp version 1.6.0 and earlier contains an os command injection vulnerabi | |
| CVE-2026-33694 | None | 0.01% | 1 | 0 | 2026-04-23T21:31:29 | This vulnerability allows an attacker to create a junction, enabling the deletio | |
| CVE-2026-28950 | 6.2 | 0.01% | 2 | 0 | 2026-04-23T21:16:05.527000 | A logging issue was addressed with improved data redaction. This issue is fixed | |
| CVE-2026-33999 | 7.8 | 0.01% | 1 | 0 | 2026-04-23T18:33:25 | A flaw was found in the X.Org X server. This integer underflow vulnerability, sp | |
| CVE-2026-23751 | 9.8 | 0.16% | 1 | 0 | 2026-04-23T18:33:25 | Kofax Capture, now referred to as Tungsten Capture, version 6.0.0.0 (other versi | |
| CVE-2026-40470 | 9.9 | 0.05% | 1 | 0 | 2026-04-23T18:33:25 | A critical XSS vulnerability affected hackage-server and hackage.haskell.org. H | |
| CVE-2026-40472 | 9.9 | 0.05% | 1 | 0 | 2026-04-23T18:33:23 | In hackage-server, user-controlled metadata from .cabal files are rendered into | |
| CVE-2026-35225 | None | 0.14% | 1 | 0 | 2026-04-23T18:33:23 | An unauthenticated remote attacker is able to exhaust all available TCP connecti | |
| CVE-2026-39440 | 10.0 | 0.02% | 1 | 0 | 2026-04-23T15:39:02 | Improper Control of Generation of Code ('Code Injection') vulnerability in Funne | |
| CVE-2026-3844 | 9.8 | 0.06% | 3 | 4 | 2026-04-23T14:28:55.557000 | The Breeze Cache plugin for WordPress is vulnerable to arbitrary file uploads du | |
| CVE-2026-33626 | 7.5 | 0.03% | 7 | 0 | 2026-04-23T13:39:54.420000 | LMDeploy is a toolkit for compressing, deploying, and serving large language mod | |
| CVE-2026-6887 | 9.8 | 0.08% | 3 | 0 | 2026-04-23T12:31:45 | Borg SPM 2007 (Sales Ended in 2008) developed by BorG Technology Corporation has | |
| CVE-2026-6885 | 9.8 | 0.19% | 1 | 0 | 2026-04-23T12:31:45 | Borg SPM 2007 (Sales Ended in 2008) developed by BorG Technology Corporation has | |
| CVE-2026-34286 | 9.1 | 0.05% | 2 | 0 | 2026-04-23T12:07:46.893000 | Vulnerability in the Oracle Identity Manager Connector product of Oracle Fusion | |
| CVE-2026-34287 | 9.1 | 0.05% | 1 | 0 | 2026-04-23T12:07:28.307000 | Vulnerability in the Oracle Identity Manager Connector product of Oracle Fusion | |
| CVE-2026-33825 | 7.8 | 3.30% | 2 | 3 | 2026-04-23T00:31:18 | Insufficient granularity of access control in Microsoft Defender allows an autho | |
| CVE-2026-41468 | 8.7 | 0.07% | 1 | 0 | 2026-04-22T21:32:18 | Beghelli Sicuro24 SicuroWeb embeds AngularJS 1.5.2, an end-of-life component con | |
| CVE-2026-40050 | 9.8 | 0.27% | 2 | 0 | 2026-04-22T21:24:26.997000 | CrowdStrike has released security updates to address a critical unauthenticated | |
| CVE-2026-35344 | 3.3 | 0.01% | 1 | 0 | 2026-04-22T21:23:52.620000 | The dd utility in uutils coreutils suppresses errors during file truncation oper | |
| CVE-2026-33471 | 9.6 | 0.03% | 1 | 0 | 2026-04-22T19:13:47 | ### Impact `SkipBlockProof::verify` computes its quorum check using `BitSet.len( | |
| CVE-2026-34291 | 8.7 | 0.05% | 1 | 0 | 2026-04-22T15:32:43 | Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (com | |
| CVE-2026-34290 | 7.5 | 0.04% | 1 | 0 | 2026-04-22T15:32:42 | Vulnerability in the Oracle Identity Manager Connector product of Oracle Fusion | |
| CVE-2026-34297 | 7.5 | 0.04% | 2 | 0 | 2026-04-22T15:31:40 | Vulnerability in the Oracle HCM Common Architecture product of Oracle E-Business | |
| CVE-2026-34285 | 9.1 | 0.05% | 1 | 0 | 2026-04-22T15:31:39 | Vulnerability in the Oracle Identity Manager Connector product of Oracle Fusion | |
| CVE-2026-3298 | None | 0.05% | 2 | 0 | 2026-04-21T21:31:23 | The method "sock_recvfrom_into()" of "asyncio.ProacterEventLoop" (Windows only) | |
| CVE-2026-41066 | 7.5 | 0.03% | 1 | 0 | 2026-04-21T20:38:47 | ### Impact Using either of the two parsers in the default configuration (with `r | |
| CVE-2026-41264 | None | 0.22% | 2 | 0 | 2026-04-21T20:19:54 | ## Abstract Trend Micro's Zero Day Initiative has identified a vulnerability af | |
| CVE-2026-41197 | None | 0.04% | 1 | 0 | 2026-04-21T20:16:10 | ## Description Noir programs can invoke external functions through foreign call | |
| CVE-2026-5752 | 9.3 | 0.02% | 2 | 0 | 2026-04-21T15:16:37.563000 | Sandbox Escape Vulnerability in Terrarium allows arbitrary code execution with r | |
| CVE-2026-33824 | 9.8 | 0.10% | 1 | 2 | 2026-04-17T19:21:23.993000 | Double free in Windows IKE Extension allows an unauthorized attacker to execute | |
| CVE-2026-34197 | 8.8 | 65.27% | 2 | 9 | template | 2026-04-16T19:59:38.107000 | Improper Input Validation, Improper Control of Generation of Code ('Code Injecti |
| CVE-2018-25193 | 7.5 | 0.14% | 1 | 0 | 2026-04-15T14:53:58.147000 | Mongoose Web Server 6.9 contains a denial of service vulnerability that allows r | |
| CVE-2025-59532 | 0 | 0.05% | 1 | 1 | 2026-04-15T00:35:42.020000 | Codex CLI is a coding agent from OpenAI that runs locally. In versions 0.2.0 to | |
| CVE-2026-32201 | 6.5 | 7.94% | 1 | 1 | 2026-04-14T18:30:55 | Improper input validation in Microsoft Office SharePoint allows an unauthorized | |
| CVE-2026-34621 | 8.6 | 7.60% | 1 | 5 | 2026-04-13T21:23:27 | Acrobat Reader versions 24.001.30356, 26.001.21367 and earlier are affected by a | |
| CVE-2026-39987 | None | 45.53% | 2 | 7 | template | 2026-04-09T19:06:18 | ## Summary Marimo (19.6k stars) has a Pre-Auth RCE vulnerability. The terminal |
| CVE-2025-15467 | 8.8 | 0.70% | 1 | 6 | 2026-03-19T19:16:19.230000 | Issue summary: Parsing CMS AuthEnvelopedData or EnvelopedData message with malic | |
| CVE-2026-30869 | 9.3 | 0.68% | 1 | 0 | 2026-03-13T15:33:01.727000 | SiYuan is a personal knowledge management system. Prior to 3.5.10, a path traver | |
| CVE-2026-27966 | 9.8 | 0.23% | 2 | 1 | 2026-02-28T00:54:27.840000 | Langflow is a tool for building and deploying AI-powered agents and workflows. P | |
| CVE-2026-22039 | 10.0 | 0.02% | 1 | 0 | 2026-01-29T03:31:32 | ### Summary A critical authorization boundary bypass in namespaced Kyverno Poli | |
| CVE-2025-20333 | 9.9 | 41.43% | 2 | 0 | 2025-10-28T13:58:58.610000 | A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security | |
| CVE-2025-20362 | 6.5 | 50.69% | 2 | 0 | template | 2025-10-22T00:34:26 | A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security |
| CVE-2023-46805 | 8.2 | 94.37% | 1 | 9 | template | 2025-10-22T00:34:00 | An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 2 |
| CVE-2024-21887 | 9.1 | 94.41% | 1 | 12 | template | 2025-10-22T00:32:59 | A command injection vulnerability in web components of Ivanti Connect Secure (9. |
| CVE-2022-25912 | 8.1 | 43.31% | 3 | 0 | 2025-04-22T21:15:42.690000 | The package simple-git before 3.15.0 are vulnerable to Remote Code Execution (RC | |
| CVE-2023-20185 | 7.4 | 0.17% | 1 | 0 | 2024-11-21T07:40:46.280000 | A vulnerability in the Cisco ACI Multi-Site CloudSec encryption feature of Cisco | |
| CVE-2026-7026 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-31952 | 0 | 0.06% | 2 | 0 | N/A | ||
| CVE-2026-41478 | 0 | 0.03% | 2 | 0 | N/A | ||
| CVE-2026-34078 | 0 | 0.05% | 1 | 0 | N/A | ||
| CVE-2026-41428 | 0 | 0.06% | 2 | 0 | N/A | ||
| CVE-2026-33666 | 0 | 0.04% | 2 | 0 | N/A | ||
| CVE-2026-6912 | 0 | 0.15% | 2 | 0 | N/A | ||
| CVE-2026-41419 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-41309 | 0 | 0.06% | 1 | 0 | N/A | ||
| CVE-2026-41679 | 0 | 0.17% | 2 | 1 | N/A | ||
| CVE-2026-41564 | 0 | 0.03% | 2 | 0 | N/A |
updated 2026-04-26T05:16:01.330000
4 posts
🛑 HIGH severity: Buffer overflow in Tenda F456 (v1.0.0.5) via /goform/P2pListFilter ('menufacturer/Go'). Public exploit available, no patch. Limit exposure & monitor systems. CVE-2026-7019. https://radar.offseq.com/threat/cve-2026-7019-buffer-overflow-in-tenda-f456-8fc2e156 #OffSeq #Tenda #Vuln #BufferOverflow
##🟠 CVE-2026-7019 - High (8.8)
A vulnerability was identified in Tenda F456 1.0.0.5. The impacted element is the function fromP2pListFilter of the file /goform/P2pListFilter. The manipulation of the argument menufacturer/Go leads to buffer overflow. The attack is possible to be...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7019/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🛑 HIGH severity: Buffer overflow in Tenda F456 (v1.0.0.5) via /goform/P2pListFilter ('menufacturer/Go'). Public exploit available, no patch. Limit exposure & monitor systems. CVE-2026-7019. https://radar.offseq.com/threat/cve-2026-7019-buffer-overflow-in-tenda-f456-8fc2e156 #OffSeq #Tenda #Vuln #BufferOverflow
##🟠 CVE-2026-7019 - High (8.8)
A vulnerability was identified in Tenda F456 1.0.0.5. The impacted element is the function fromP2pListFilter of the file /goform/P2pListFilter. The manipulation of the argument menufacturer/Go leads to buffer overflow. The attack is possible to be...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7019/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-26T04:16:05.787000
2 posts
⚠️ CVE-2026-42255 (HIGH): Technitium DNS Server <15.0 is vulnerable to DNS amplification via cyclic delegation (CWE-684). No patch yet — monitor DNS traffic & apply filtering. https://radar.offseq.com/threat/cve-2026-42255-cwe-684-incorrect-provision-of-spec-30347b11 #OffSeq #DNS #Infosec #Vuln
##⚠️ CVE-2026-42255 (HIGH): Technitium DNS Server <15.0 is vulnerable to DNS amplification via cyclic delegation (CWE-684). No patch yet — monitor DNS traffic & apply filtering. https://radar.offseq.com/threat/cve-2026-42255-cwe-684-incorrect-provision-of-spec-30347b11 #OffSeq #DNS #Infosec #Vuln
##updated 2026-04-26T03:16:00.530000
2 posts
⚠️ CVE-2026-7015: MEDIUM XSS in MaxSite CMS (109.0 – 109.3) via Guestbook Plugin. Exploit public — remote attackers can target f_text/f_slug/f_limit/f_email. Patch in 109.4 (8a3946bd...). Upgrade now. Details: https://radar.offseq.com/threat/cve-2026-7015-cross-site-scripting-in-maxsite-cms-49304643 #OffSeq #XSS #MaxSiteCMS #Vuln
##⚠️ CVE-2026-7015: MEDIUM XSS in MaxSite CMS (109.0 – 109.3) via Guestbook Plugin. Exploit public — remote attackers can target f_text/f_slug/f_limit/f_email. Patch in 109.4 (8a3946bd...). Upgrade now. Details: https://radar.offseq.com/threat/cve-2026-7015-cross-site-scripting-in-maxsite-cms-49304643 #OffSeq #XSS #MaxSiteCMS #Vuln
##updated 2026-04-25T18:16:19.413000
2 posts
🚨 HIGH severity (CVSS 8.6) OS command injection in Linksys MR9600 (2.0.6.206937) — CVE-2026-6992. Remote attackers can gain control via the 'pin' argument. Exploit is public, no fix yet. Restrict remote access & monitor closely. https://radar.offseq.com/threat/cve-2026-6992-os-command-injection-in-linksys-mr96-18ae6106 #OffSeq #Vulnerability #Linksys
##🚨 HIGH severity (CVSS 8.6) OS command injection in Linksys MR9600 (2.0.6.206937) — CVE-2026-6992. Remote attackers can gain control via the 'pin' argument. Exploit is public, no fix yet. Restrict remote access & monitor closely. https://radar.offseq.com/threat/cve-2026-6992-os-command-injection-in-linksys-mr96-18ae6106 #OffSeq #Vulnerability #Linksys
##updated 2026-04-25T18:16:17.863000
4 posts
⚠️ HIGH severity: Tenda HG10 (HG7_HG9_HG10re_300001138_en_xpon) buffer overflow via Boa Service (formRoute). Remote RCE/DoS risk. Exploit public, patch pending. Restrict access & monitor Tenda updates. CVE-2026-6988 https://radar.offseq.com/threat/cve-2026-6988-buffer-overflow-in-tenda-hg10-324a24f1 #OffSeq #IoT #Vuln
##🟠 CVE-2026-6988 - High (8.8)
A flaw has been found in Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon. This issue affects the function formRoute of the file /boaform/formRouting of the component Boa Service. This manipulation of the argument nextHop causes buffer overflow. It is ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6988/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ HIGH severity: Tenda HG10 (HG7_HG9_HG10re_300001138_en_xpon) buffer overflow via Boa Service (formRoute). Remote RCE/DoS risk. Exploit public, patch pending. Restrict access & monitor Tenda updates. CVE-2026-6988 https://radar.offseq.com/threat/cve-2026-6988-buffer-overflow-in-tenda-hg10-324a24f1 #OffSeq #IoT #Vuln
##🟠 CVE-2026-6988 - High (8.8)
A flaw has been found in Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon. This issue affects the function formRoute of the file /boaform/formRouting of the component Boa Service. This manipulation of the argument nextHop causes buffer overflow. It is ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6988/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-25T11:16:17.670000
4 posts
🔴 CVE-2026-6951 - Critical (9.8)
Versions of the package simple-git before 3.36.0 are vulnerable to Remote Code Execution (RCE) due to an incomplete fix for [CVE-2022-25912](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221) that blocks the -c option but not the equivalent ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6951/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚩 CRITICAL: CVE-2026-6951 in simple-git <3.36.0 enables remote code execution via untrusted input to the options argument. Upgrade or block untrusted input! Impact: full system compromise. More: https://radar.offseq.com/threat/cve-2026-6951-remote-code-execution-rce-in-simple--178a7d4e #OffSeq #RCE #simplegit #Security
##🔴 CVE-2026-6951 - Critical (9.8)
Versions of the package simple-git before 3.36.0 are vulnerable to Remote Code Execution (RCE) due to an incomplete fix for [CVE-2022-25912](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221) that blocks the -c option but not the equivalent ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6951/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚩 CRITICAL: CVE-2026-6951 in simple-git <3.36.0 enables remote code execution via untrusted input to the options argument. Upgrade or block untrusted input! Impact: full system compromise. More: https://radar.offseq.com/threat/cve-2026-6951-remote-code-execution-rce-in-simple--178a7d4e #OffSeq #RCE #simplegit #Security
##updated 2026-04-25T03:16:04.950000
2 posts
🟠 CVE-2026-41433 - High (8.4)
OpenTelemetry eBPF Instrumentation provides eBPF instrumentation based on the OpenTelemetry standard. From 0.4.0 to before 0.8.0, a flaw in the Java agent injection path allows a local attacker controlling a Java workload to overwrite arbitrary ho...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41433/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41433 - High (8.4)
OpenTelemetry eBPF Instrumentation provides eBPF instrumentation based on the OpenTelemetry standard. From 0.4.0 to before 0.8.0, a flaw in the Java agent injection path allows a local attacker controlling a Java workload to overwrite arbitrary ho...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41433/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-25T03:16:04.790000
2 posts
🟠 CVE-2026-41421 - High (8.8)
SiYuan is an open-source personal knowledge management system. Prior to 3.6.5, SiYuan desktop renders notification messages as raw HTML inside an Electron renderer. The notification route POST /api/notification/pushMsg accepts a user-controlled ms...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41421/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41421 - High (8.8)
SiYuan is an open-source personal knowledge management system. Prior to 3.6.5, SiYuan desktop renders notification messages as raw HTML inside an Electron renderer. The notification route POST /api/notification/pushMsg accepts a user-controlled ms...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41421/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-25T03:16:04.223000
2 posts
🟠 CVE-2026-33318 - High (8.8)
Actual is a local-first personal finance tool. Prior to version 26.4.0, any authenticated user (including `BASIC` role) can escalate to `ADMIN` on servers migrated from password authentication to OpenID Connect. Three weaknesses combine: `POST /ac...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33318/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33318 - High (8.8)
Actual is a local-first personal finance tool. Prior to version 26.4.0, any authenticated user (including `BASIC` role) can escalate to `ADMIN` on servers migrated from password authentication to OpenID Connect. Three weaknesses combine: `POST /ac...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33318/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-25T02:16:02.837000
2 posts
🟠 CVE-2026-41277 - High (8.8)
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, a Mass Assignment vulnerability in the DocumentStore creation endpoint allows authenticated users to control the primary key (id) and internal...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41277/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41277 - High (8.8)
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, a Mass Assignment vulnerability in the DocumentStore creation endpoint allows authenticated users to control the primary key (id) and internal...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41277/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-25T02:16:02.710000
2 posts
🟠 CVE-2026-41275 - High (7.5)
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the password reset functionality on cloud.flowiseai.com sends a reset password link over the unsecured HTTP protocol instead of HTTPS. This be...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41275/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41275 - High (7.5)
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the password reset functionality on cloud.flowiseai.com sends a reset password link over the unsecured HTTP protocol instead of HTTPS. This be...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41275/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-25T02:16:02.477000
2 posts
🟠 CVE-2026-41266 - High (7.5)
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, /api/v1/public-chatbotConfig/:id ep exposes sensitive data including API keys, HTTP authorization headers and internal configuration without a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41266/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41266 - High (7.5)
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, /api/v1/public-chatbotConfig/:id ep exposes sensitive data including API keys, HTTP authorization headers and internal configuration without a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41266/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-25T02:16:02.143000
1 posts
🟠 CVE-2026-40886 - High (7.7)
Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. From 3.6.5 to 4.0.4, an unchecked array index in the pod informer's podGCFromPod() function causes a controller-wide panic when a work...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40886/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-25T00:30:38
2 posts
🟠 CVE-2026-42171 - High (7.8)
NSIS (Nullsoft Scriptable Install System) 3.06.1 before 3.12 sometimes uses the Low IL temp directory when executing as SYSTEM, allowing local attackers to gain privileges (if they can cause my_GetTempFileName to return 0, as shown in the referenc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42171/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42171 - High (7.8)
NSIS (Nullsoft Scriptable Install System) 3.06.1 before 3.12 sometimes uses the Low IL temp directory when executing as SYSTEM, allowing local attackers to gain privileges (if they can cause my_GetTempFileName to return 0, as shown in the referenc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42171/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T21:32:00
2 posts
🟠 CVE-2026-41044 - High (8.8)
Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ, Apache ActiveMQ Broker, Apache ActiveMQ All.
An authenticated attacker can use the admin web console page to construct a malici...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41044/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41044 - High (8.8)
Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ, Apache ActiveMQ Broker, Apache ActiveMQ All.
An authenticated attacker can use the admin web console page to construct a malici...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41044/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T21:32:00
2 posts
🟠 CVE-2026-23902 - High (8.1)
Incorrect Authorization vulnerability in Apache DolphinScheduler allows authenticated users with system login permissions to use tenants that are not defined on the platform during workflow execution.
This issue affects Apache DolphinScheduler ve...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23902/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-23902 - High (8.1)
Incorrect Authorization vulnerability in Apache DolphinScheduler allows authenticated users with system login permissions to use tenants that are not defined on the platform during workflow execution.
This issue affects Apache DolphinScheduler ve...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23902/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T21:32:00
1 posts
⚠️ CRITICAL: xerteonlinetoolkits ≤3.15 has incomplete input validation in elFinder — .php4 files can be uploaded & executed, enabling unauth RCE. Restrict endpoint, monitor uploads, apply custom filters. Patch status unknown. CVE-2026-34415 https://radar.offseq.com/threat/cve-2026-34415-cwe-184-incomplete-list-of-disallow-f774ae94 #OffSeq #Vuln #RCE
##updated 2026-04-24T21:16:18.497000
5 posts
🔴 New security advisory:
CVE-2026-41248 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-41248-clerk-middleware-bypass-grants-unauth-access
🚨 CRITICAL: CVE-2026-41248 affects clerk astro, nextjs, nuxt — lets attackers bypass middleware in affected JS libs. Update to fixed versions ASAP to prevent unauthorized access. Patches available now. https://radar.offseq.com/threat/cve-2026-41248-cwe-436-interpretation-conflict-in--1e1431c1 #OffSeq #Vulnerability #ClerkJS
##🔴 CVE-2026-41248 - Critical (9.1)
Clerk JavaScript is the official JavaScript repository for Clerk authentication. createRouteMatcher in @clerk/nextjs, @clerk/nuxt, and @clerk/astro can be bypassed by certain crafted requests, allowing them to skip middleware gating and reach down...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41248/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL: CVE-2026-41248 affects clerk astro, nextjs, nuxt — lets attackers bypass middleware in affected JS libs. Update to fixed versions ASAP to prevent unauthorized access. Patches available now. https://radar.offseq.com/threat/cve-2026-41248-cwe-436-interpretation-conflict-in--1e1431c1 #OffSeq #Vulnerability #ClerkJS
##🔴 CVE-2026-41248 - Critical (9.1)
Clerk JavaScript is the official JavaScript repository for Clerk authentication. createRouteMatcher in @clerk/nextjs, @clerk/nuxt, and @clerk/astro can be bypassed by certain crafted requests, allowing them to skip middleware gating and reach down...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41248/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T21:02:13
1 posts
🟠 CVE-2026-41324 - High (7.5)
basic-ftp is an FTP client for Node.js. Versions prior to 5.3.0 are vulnerable to denial of service through unbounded memory growth while processing directory listings from a remote FTP server. A malicious or compromised server can send an extreme...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41324/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T21:00:59
2 posts
🟠 CVE-2026-41278 - High (7.5)
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the GET /api/v1/public-chatflows/:id endpoint returns the full chatflow object without sanitization for public chatflows. Docker validation re...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41278/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41278 - High (7.5)
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the GET /api/v1/public-chatflows/:id endpoint returns the full chatflow object without sanitization for public chatflows. Docker validation re...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41278/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T21:00:53
2 posts
🟠 CVE-2026-41279 - High (7.5)
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the text-to-speech generation endpoint (POST /api/v1/text-to-speech/generate) is whitelisted (no auth) and accepts a credentialId directly in ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41279/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41279 - High (7.5)
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the text-to-speech generation endpoint (POST /api/v1/text-to-speech/generate) is whitelisted (no auth) and accepts a credentialId directly in ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41279/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T20:59:23
2 posts
🟠 CVE-2026-41271 - High (8.3)
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, a Server-Side Request Forgery (SSRF) vulnerability exists in FlowiseAI's POST/GET API Chain components that allows unauthenticated attackers t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41271/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41271 - High (8.3)
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, a Server-Side Request Forgery (SSRF) vulnerability exists in FlowiseAI's POST/GET API Chain components that allows unauthenticated attackers t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41271/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T20:58:07
2 posts
🔴 CVE-2026-41265 - Critical (9.8)
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the specific flaw exists within the run method of the Airtable_Agents class. The issue results from the lack of proper sandboxing when evaluat...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41265/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-41265 - Critical (9.8)
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the specific flaw exists within the run method of the Airtable_Agents class. The issue results from the lack of proper sandboxing when evaluat...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41265/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T20:54:08
1 posts
🟠 CVE-2026-41230 - High (8.5)
Froxlor is open source server administration software. Prior to version 2.3.6, `DomainZones::add()` accepts arbitrary DNS record types without a whitelist and does not sanitize newline characters in the `content` field. When a DNS type not covered...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41230/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T20:53:59
1 posts
🔴 CVE-2026-41229 - Critical (9.1)
Froxlor is open source server administration software. Prior to version 2.3.6, `PhpHelper::parseArrayToString()` writes string values into single-quoted PHP string literals without escaping single quotes. When an admin with `change_serversettings`...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41229/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T20:44:06
2 posts
🟠 CVE-2026-41137 - High (8.8)
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, The CSVAgent allows providing a custom Pandas CSV read code. Due to lack of sanitization, an attacker can provide a command injection payload ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41137/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41137 - High (8.8)
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, The CSVAgent allows providing a custom Pandas CSV read code. Due to lack of sanitization, an attacker can provide a command injection payload ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41137/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T20:23:57.990000
3 posts
1 repos
🚨 [CISA-2026:0424] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0424)
CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2024-57726 (https://secdb.nttzen.cloud/cve/detail/CVE-2024-57726)
- Name: SimpleHelp Missing Authorization Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: SimpleHelp
- Product: SimpleHelp
- Notes: https://simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier ; https://nvd.nist.gov/vuln/detail/CVE-2024-57726
⚠️ CVE-2024-57728 (https://secdb.nttzen.cloud/cve/detail/CVE-2024-57728)
- Name: SimpleHelp Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: SimpleHelp
- Product: SimpleHelp
- Notes: https://simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier ; https://nvd.nist.gov/vuln/detail/CVE-2024-57728
⚠️ CVE-2024-7399 (https://secdb.nttzen.cloud/cve/detail/CVE-2024-7399)
- Name: Samsung MagicINFO 9 Server Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Samsung
- Product: MagicINFO 9 Server
- Notes: https://security.samsungtv.com/securityUpdates ; https://nvd.nist.gov/vuln/detail/CVE-2024-7399
⚠️ CVE-2025-29635 (https://secdb.nttzen.cloud/cve/detail/CVE-2025-29635)
- Name: D-Link DIR-823X Command Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: D-Link
- Product: DIR-823X
- Notes: https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10469 ; https://nvd.nist.gov/vuln/detail/CVE-2025-29635
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260424 #cisa20260424 #cve_2024_57726 #cve_2024_57728 #cve_2024_7399 #cve_2025_29635 #cve202457726 #cve202457728 #cve20247399 #cve202529635
##CVE ID: CVE-2024-7399
Vendor: Samsung
Product: MagicINFO 9 Server
Date Added: 2026-04-24
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2024-7399
Broadcom has a new advisory for a critical vulnerability:
Common Components and Services for z/OS 15.0 Vulnerability in CCS Apache Tomcat https://support.broadcom.com/web/ecx/security-advisory #Broadcom #Apache
CISA has updated the KEV catalogue:
- CVE-2024-57726: SimpleHelp Missing Authorization Vulnerability https://www.cve.org/CVERecord?id=CVE-2024-57726
- CVE-2024-57728: SimpleHelp Path Traversal Vulnerability https://www.cve.org/CVERecord?id=CVE-2024-57728
- CVE-2024-7399: Samsung MagicINFO 9 Server Path Traversal Vulnerability https://www.cve.org/CVERecord?id=CVE-2024-7399
- CVE-2025-29635: D-Link DIR-823X Command Injection Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-29635 #CISA #Samsung #DLink
Cisco has two advisories for high-severity vulnerabilities:
- CVE-2023-20185: Cisco ACI Multi-Site CloudSec Encryption Information Disclosure Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aci-cloudsec-enc-Vs5Wn2sX
- Informational, updated today: Continued Evolution of Persistence Mechanism Against Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-persist-CISAED25-03 @TalosSecurity #Cisco #infosec #vulnerability
##updated 2026-04-24T20:16:28.340000
2 posts
🟠 CVE-2026-41477 - High (7.8)
Deskflow is a keyboard and mouse sharing app. In 1.20.0, 1.26.0.134, and earlier, Deskflow daemon runs as SYSTEM and exposes an IPC named pipe with WorldAccessOption enabled. The daemon processes privileged commands without authentication, allowi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41477/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41477 - High (7.8)
Deskflow is a keyboard and mouse sharing app. In 1.20.0, 1.26.0.134, and earlier, Deskflow daemon runs as SYSTEM and exposes an IPC named pipe with WorldAccessOption enabled. The daemon processes privileged commands without authentication, allowi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41477/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T20:16:27.663000
2 posts
🟠 CVE-2026-41429 - High (8.8)
arduino-esp32 is an Arduino core for the ESP32, ESP32-S2, ESP32-S3, ESP32-C3, ESP32-C6 and ESP32-H2 microcontrollers. Prior to 3.3.8, there is a remotely reachable memory corruption issue in the NBNS packet handling path. When NetBIOS is enabled b...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41429/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41429 - High (8.8)
arduino-esp32 is an Arduino core for the ESP32, ESP32-S2, ESP32-S3, ESP32-C3, ESP32-C6 and ESP32-H2 microcontrollers. Prior to 3.3.8, there is a remotely reachable memory corruption issue in the NBNS packet handling path. When NetBIOS is enabled b...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41429/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T19:59:44
1 posts
Microsoft a publié un patch pour une faille critique dans ASP.NET : CVE-2026-40372 https://www.it-connect.fr/microsoft-a-publie-un-patch-pour-une-faille-critique-dans-asp-net-cve-2026-40372/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #Microsoft
##updated 2026-04-24T19:27:00.700000
3 posts
🚨 [CISA-2026:0424] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0424)
CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2024-57726 (https://secdb.nttzen.cloud/cve/detail/CVE-2024-57726)
- Name: SimpleHelp Missing Authorization Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: SimpleHelp
- Product: SimpleHelp
- Notes: https://simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier ; https://nvd.nist.gov/vuln/detail/CVE-2024-57726
⚠️ CVE-2024-57728 (https://secdb.nttzen.cloud/cve/detail/CVE-2024-57728)
- Name: SimpleHelp Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: SimpleHelp
- Product: SimpleHelp
- Notes: https://simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier ; https://nvd.nist.gov/vuln/detail/CVE-2024-57728
⚠️ CVE-2024-7399 (https://secdb.nttzen.cloud/cve/detail/CVE-2024-7399)
- Name: Samsung MagicINFO 9 Server Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Samsung
- Product: MagicINFO 9 Server
- Notes: https://security.samsungtv.com/securityUpdates ; https://nvd.nist.gov/vuln/detail/CVE-2024-7399
⚠️ CVE-2025-29635 (https://secdb.nttzen.cloud/cve/detail/CVE-2025-29635)
- Name: D-Link DIR-823X Command Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: D-Link
- Product: DIR-823X
- Notes: https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10469 ; https://nvd.nist.gov/vuln/detail/CVE-2025-29635
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260424 #cisa20260424 #cve_2024_57726 #cve_2024_57728 #cve_2024_7399 #cve_2025_29635 #cve202457726 #cve202457728 #cve20247399 #cve202529635
##CVE ID: CVE-2024-57728
Vendor: SimpleHelp
Product: SimpleHelp
Date Added: 2026-04-24
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2024-57728
Broadcom has a new advisory for a critical vulnerability:
Common Components and Services for z/OS 15.0 Vulnerability in CCS Apache Tomcat https://support.broadcom.com/web/ecx/security-advisory #Broadcom #Apache
CISA has updated the KEV catalogue:
- CVE-2024-57726: SimpleHelp Missing Authorization Vulnerability https://www.cve.org/CVERecord?id=CVE-2024-57726
- CVE-2024-57728: SimpleHelp Path Traversal Vulnerability https://www.cve.org/CVERecord?id=CVE-2024-57728
- CVE-2024-7399: Samsung MagicINFO 9 Server Path Traversal Vulnerability https://www.cve.org/CVERecord?id=CVE-2024-7399
- CVE-2025-29635: D-Link DIR-823X Command Injection Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-29635 #CISA #Samsung #DLink
Cisco has two advisories for high-severity vulnerabilities:
- CVE-2023-20185: Cisco ACI Multi-Site CloudSec Encryption Information Disclosure Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aci-cloudsec-enc-Vs5Wn2sX
- Informational, updated today: Continued Evolution of Persistence Mechanism Against Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-persist-CISAED25-03 @TalosSecurity #Cisco #infosec #vulnerability
##updated 2026-04-24T19:17:11.770000
2 posts
🔴 CVE-2026-41276 - Critical (9.8)
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, this vulnerability allows remote attackers to bypass authentication on affected installations of FlowiseAI Flowise. Authentication is not requ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41276/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-41276 - Critical (9.8)
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, this vulnerability allows remote attackers to bypass authentication on affected installations of FlowiseAI Flowise. Authentication is not requ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41276/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T19:17:11.530000
2 posts
🟠 CVE-2026-41273 - High (8.2)
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, Flowise contains an authentication bypass vulnerability that allows an unauthenticated attacker to obtain OAuth 2.0 access tokens associated w...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41273/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41273 - High (8.2)
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, Flowise contains an authentication bypass vulnerability that allows an unauthenticated attacker to obtain OAuth 2.0 access tokens associated w...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41273/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T19:17:11.260000
1 posts
🟠 CVE-2026-41138 - High (8.3)
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, there is a remote code execution vulnerability in AirtableAgent.ts caused by lack of input verification when using Pandas. The user’s input ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41138/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T19:17:10.567000
2 posts
🟠 CVE-2026-40466 - High (8.8)
Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ All, Apache ActiveMQ.
An authenticated attacker may bypass the fix in CVE-2026-34197 by adding a conne...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40466/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-40466 - High (8.8)
Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ All, Apache ActiveMQ.
An authenticated attacker may bypass the fix in CVE-2026-34197 by adding a conne...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40466/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T19:17:09.997000
2 posts
🟠 CVE-2026-33662 - High (7.5)
OP-TEE is a Trusted Execution Environment (TEE) designed as companion to a non-secure Linux kernel running on Arm; Cortex-A cores using the TrustZone technology. From 3.8.0 to 4.10, in the function emsa_pkcs1_v1_5_encode() in core/drivers/crypto/c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33662/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33662 - High (7.5)
OP-TEE is a Trusted Execution Environment (TEE) designed as companion to a non-secure Linux kernel running on Arm; Cortex-A cores using the TrustZone technology. From 3.8.0 to 4.10, in the function emsa_pkcs1_v1_5_encode() in core/drivers/crypto/c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33662/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T19:16:31.937000
2 posts
🔴 CVE-2025-50229 - Critical (9.8)
Jizhicms v2.5.4 is vulnerable to SQL injection in the product editing module.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-50229/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-50229 - Critical (9.8)
Jizhicms v2.5.4 is vulnerable to SQL injection in the product editing module.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-50229/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T18:30:36
3 posts
🚨 [CISA-2026:0424] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0424)
CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2024-57726 (https://secdb.nttzen.cloud/cve/detail/CVE-2024-57726)
- Name: SimpleHelp Missing Authorization Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: SimpleHelp
- Product: SimpleHelp
- Notes: https://simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier ; https://nvd.nist.gov/vuln/detail/CVE-2024-57726
⚠️ CVE-2024-57728 (https://secdb.nttzen.cloud/cve/detail/CVE-2024-57728)
- Name: SimpleHelp Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: SimpleHelp
- Product: SimpleHelp
- Notes: https://simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier ; https://nvd.nist.gov/vuln/detail/CVE-2024-57728
⚠️ CVE-2024-7399 (https://secdb.nttzen.cloud/cve/detail/CVE-2024-7399)
- Name: Samsung MagicINFO 9 Server Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Samsung
- Product: MagicINFO 9 Server
- Notes: https://security.samsungtv.com/securityUpdates ; https://nvd.nist.gov/vuln/detail/CVE-2024-7399
⚠️ CVE-2025-29635 (https://secdb.nttzen.cloud/cve/detail/CVE-2025-29635)
- Name: D-Link DIR-823X Command Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: D-Link
- Product: DIR-823X
- Notes: https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10469 ; https://nvd.nist.gov/vuln/detail/CVE-2025-29635
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260424 #cisa20260424 #cve_2024_57726 #cve_2024_57728 #cve_2024_7399 #cve_2025_29635 #cve202457726 #cve202457728 #cve20247399 #cve202529635
##CVE ID: CVE-2024-57726
Vendor: SimpleHelp
Product: SimpleHelp
Date Added: 2026-04-24
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2024-57726
Broadcom has a new advisory for a critical vulnerability:
Common Components and Services for z/OS 15.0 Vulnerability in CCS Apache Tomcat https://support.broadcom.com/web/ecx/security-advisory #Broadcom #Apache
CISA has updated the KEV catalogue:
- CVE-2024-57726: SimpleHelp Missing Authorization Vulnerability https://www.cve.org/CVERecord?id=CVE-2024-57726
- CVE-2024-57728: SimpleHelp Path Traversal Vulnerability https://www.cve.org/CVERecord?id=CVE-2024-57728
- CVE-2024-7399: Samsung MagicINFO 9 Server Path Traversal Vulnerability https://www.cve.org/CVERecord?id=CVE-2024-7399
- CVE-2025-29635: D-Link DIR-823X Command Injection Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-29635 #CISA #Samsung #DLink
Cisco has two advisories for high-severity vulnerabilities:
- CVE-2023-20185: Cisco ACI Multi-Site CloudSec Encryption Information Disclosure Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aci-cloudsec-enc-Vs5Wn2sX
- Informational, updated today: Continued Evolution of Persistence Mechanism Against Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-persist-CISAED25-03 @TalosSecurity #Cisco #infosec #vulnerability
##updated 2026-04-24T18:30:36
3 posts
🚨 [CISA-2026:0424] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0424)
CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2024-57726 (https://secdb.nttzen.cloud/cve/detail/CVE-2024-57726)
- Name: SimpleHelp Missing Authorization Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: SimpleHelp
- Product: SimpleHelp
- Notes: https://simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier ; https://nvd.nist.gov/vuln/detail/CVE-2024-57726
⚠️ CVE-2024-57728 (https://secdb.nttzen.cloud/cve/detail/CVE-2024-57728)
- Name: SimpleHelp Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: SimpleHelp
- Product: SimpleHelp
- Notes: https://simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier ; https://nvd.nist.gov/vuln/detail/CVE-2024-57728
⚠️ CVE-2024-7399 (https://secdb.nttzen.cloud/cve/detail/CVE-2024-7399)
- Name: Samsung MagicINFO 9 Server Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Samsung
- Product: MagicINFO 9 Server
- Notes: https://security.samsungtv.com/securityUpdates ; https://nvd.nist.gov/vuln/detail/CVE-2024-7399
⚠️ CVE-2025-29635 (https://secdb.nttzen.cloud/cve/detail/CVE-2025-29635)
- Name: D-Link DIR-823X Command Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: D-Link
- Product: DIR-823X
- Notes: https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10469 ; https://nvd.nist.gov/vuln/detail/CVE-2025-29635
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260424 #cisa20260424 #cve_2024_57726 #cve_2024_57728 #cve_2024_7399 #cve_2025_29635 #cve202457726 #cve202457728 #cve20247399 #cve202529635
##CVE ID: CVE-2025-29635
Vendor: D-Link
Product: DIR-823X
Date Added: 2026-04-24
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-29635
Broadcom has a new advisory for a critical vulnerability:
Common Components and Services for z/OS 15.0 Vulnerability in CCS Apache Tomcat https://support.broadcom.com/web/ecx/security-advisory #Broadcom #Apache
CISA has updated the KEV catalogue:
- CVE-2024-57726: SimpleHelp Missing Authorization Vulnerability https://www.cve.org/CVERecord?id=CVE-2024-57726
- CVE-2024-57728: SimpleHelp Path Traversal Vulnerability https://www.cve.org/CVERecord?id=CVE-2024-57728
- CVE-2024-7399: Samsung MagicINFO 9 Server Path Traversal Vulnerability https://www.cve.org/CVERecord?id=CVE-2024-7399
- CVE-2025-29635: D-Link DIR-823X Command Injection Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-29635 #CISA #Samsung #DLink
Cisco has two advisories for high-severity vulnerabilities:
- CVE-2023-20185: Cisco ACI Multi-Site CloudSec Encryption Information Disclosure Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aci-cloudsec-enc-Vs5Wn2sX
- Informational, updated today: Continued Evolution of Persistence Mechanism Against Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-persist-CISAED25-03 @TalosSecurity #Cisco #infosec #vulnerability
##updated 2026-04-24T17:56:41.280000
5 posts
🚨 New security advisory:
CVE-2026-6911 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-6911-ops-wheel-unauthenticated-admin-access
🚨 CRITICAL: CVE-2026-6911 in AWS Ops Wheel — missing JWT signature checks allow unauth access & admin control over all tenants. Patch by redeploying from the updated repo! Details: https://radar.offseq.com/threat/cve-2026-6911-cwe-347-improper-verification-of-cry-0f0da004 #OffSeq #AWS #Vuln #JWT
##🚨 CRITICAL: CVE-2026-6911 in AWS Ops Wheel — missing JWT signature checks allow unauth access & admin control over all tenants. Patch by redeploying from the updated repo! Details: https://radar.offseq.com/threat/cve-2026-6911-cwe-347-improper-verification-of-cry-0f0da004 #OffSeq #AWS #Vuln #JWT
##🔴 CVE-2026-6911 - Critical (9.8)
Missing JWT signature verification in AWS Ops Wheel allows unauthenticated attackers to forge JWT tokens and gain unintended administrative access to the application, including the ability to read, modify, and delete all application data across te...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6911/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Issue with AWS Ops Wheel (CVE-2026-6911 and CVE-2026-6912
Bulletin ID: 2026-018-AWS Scope: AWS Content Type: Important (requires attention) Publication Date: 2026/04/24 09:15 AM PDT
Description:
AWS Ops Wheel is an open-source tool that helps teams make random selections using a virtua...
https://aws.amazon.com/security/security-bulletins/rss/2026-018-aws/
##updated 2026-04-24T17:56:41.280000
1 posts
🟠 CVE-2026-40897 - High (8.8)
Math.js is an extensive math library for JavaScript and Node.js. From 13.1.1 to before 15.2.0, a vulnerability allowed executing arbitrary JavaScript via the expression parser of mathjs. You can be affected when you have an application where users...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40897/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T17:55:55.317000
5 posts
🔴 New security advisory:
CVE-2026-39920 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-39920-bridgehead-filestore-unauth-rce
🔥 CVE-2026-39920: BridgeHead FileStore <24A has a CRITICAL flaw — Apache Axis2 admin exposed with default creds, allowing unauthenticated remote OS command execution. Restrict access, change creds & monitor! Patch status pending. https://radar.offseq.com/threat/cve-2026-39920-cwe-1188-initialization-of-a-resour-596011eb #OffSeq #Vuln #Cybersecurity
##🔴 CVE-2026-39920 - Critical (9.8)
BridgeHead FileStore versions prior to 24A (released in early 2024) expose the Apache Axis2 administration module on network-accessible endpoints with default credentials that allows unauthenticated remote attackers to execute arbitrary OS command...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39920/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔥 CVE-2026-39920: BridgeHead FileStore <24A has a CRITICAL flaw — Apache Axis2 admin exposed with default creds, allowing unauthenticated remote OS command execution. Restrict access, change creds & monitor! Patch status pending. https://radar.offseq.com/threat/cve-2026-39920-cwe-1188-initialization-of-a-resour-596011eb #OffSeq #Vuln #Cybersecurity
##🔴 CVE-2026-39920 - Critical (9.8)
BridgeHead FileStore versions prior to 24A (released in early 2024) expose the Apache Axis2 administration module on network-accessible endpoints with default credentials that allows unauthenticated remote attackers to execute arbitrary OS command...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39920/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T17:16:21.240000
1 posts
🟠 CVE-2026-41068 - High (7.7)
Kyverno is a policy engine designed for cloud native platform engineering teams. The patch for CVE-2026-22039 fixed cross-namespace privilege escalation in Kyverno's `apiCall` context by validating the `URLPath` field. However, the ConfigMap conte...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41068/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T16:43:19.373000
1 posts
🔴 CVE-2026-34279 - Critical (9.1)
Vulnerability in the Oracle Enterprise Manager Base Platform product of Oracle Enterprise Manager (component: Event Management). Supported versions that are affected are 13.5 and 24.1. Easily exploitable vulnerability allows high privileged atta...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34279/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T16:39:50.947000
4 posts
@andrewnez hm, is that search correct? The 343 on linked NVD page seems to include e.g. CVE-2026-6919 which isnt really related?
It's not an in any way relevant difference (4 false associations) but now I am really curious why those are associated....
##🔴 CVE-2026-6919 - Critical (9.6)
Use after free in DevTools in Google Chrome prior to 147.0.7727.117 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6919/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##@andrewnez hm, is that search correct? The 343 on linked NVD page seems to include e.g. CVE-2026-6919 which isnt really related?
It's not an in any way relevant difference (4 false associations) but now I am really curious why those are associated....
##🔴 CVE-2026-6919 - Critical (9.6)
Use after free in DevTools in Google Chrome prior to 147.0.7727.117 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6919/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T16:25:17
1 posts
🟠 CVE-2026-33524 - High (7.5)
Zserio is a framework for serializing structured data with a compact and efficient way with low overhead. Prior to 2.18.1, a crafted payload as small as 4-5 bytes can force memory allocations of up to 16 GB, crashing any process with an OOM error ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33524/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T16:15:29
3 posts
⚠️ CRITICAL: dgraph-io Dgraph (< 25.3.3) leaks admin tokens via unauthenticated /debug/vars endpoint. Attackers can gain admin access! Patch to 25.3.3+ ASAP. CVE-2026-41492 | More: https://radar.offseq.com/threat/cve-2026-41492-cwe-200-exposure-of-sensitive-infor-932f1edf #OffSeq #CVE202641492 #Dgraph #Vulnerability
##⚠️ CRITICAL: dgraph-io Dgraph (< 25.3.3) leaks admin tokens via unauthenticated /debug/vars endpoint. Attackers can gain admin access! Patch to 25.3.3+ ASAP. CVE-2026-41492 | More: https://radar.offseq.com/threat/cve-2026-41492-cwe-200-exposure-of-sensitive-infor-932f1edf #OffSeq #CVE202641492 #Dgraph #Vulnerability
##🔴 CVE-2026-41492 - Critical (9.8)
Dgraph is an open source distributed GraphQL database. Prior to 25.3.3, Dgraphl exposes the process command line through the unauthenticated /debug/vars endpoint on Alpha. Because the admin token is commonly supplied via the --security "token=..."...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41492/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T15:41:45
3 posts
🚨 CVE-2026-41328: CRITICAL DQL injection in dgraph-io Dgraph (<25.3.3) allows unauthenticated full DB read! Exploit via crafted POSTs to port 8080. Patch to 25.3.3+ or enable ACL to mitigate. Details: https://radar.offseq.com/threat/cve-2026-41328-cwe-943-improper-neutralization-of--c8d19cb1 #OffSeq #CVE202641328 #GraphQL #infosec
##🚨 CVE-2026-41328: CRITICAL DQL injection in dgraph-io Dgraph (<25.3.3) allows unauthenticated full DB read! Exploit via crafted POSTs to port 8080. Patch to 25.3.3+ or enable ACL to mitigate. Details: https://radar.offseq.com/threat/cve-2026-41328-cwe-943-improper-neutralization-of--c8d19cb1 #OffSeq #CVE202641328 #GraphQL #infosec
##🔴 CVE-2026-41328 - Critical (9.1)
Dgraph is an open source distributed GraphQL database. Prior to 25.3.3, a vulnerability has been found in Dgraph that gives an unauthenticated attacker full read access to every piece of data in the database. This affects Dgraph's default configur...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41328/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T15:41:25
4 posts
🚨 CRITICAL vuln: CVE-2026-41327 in dgraph-io dgraph (<25.3.3). Unauthenticated attacker can exfiltrate all DB data with a crafted POST via upsert mutation. Upgrade to 25.3.3+ or enable ACL ASAP! https://radar.offseq.com/threat/cve-2026-41327-cwe-943-improper-neutralization-of--8885efbe #OffSeq #Vuln #GraphQL #DataLeak
##🚨 CRITICAL vuln: CVE-2026-41327 in dgraph-io dgraph (<25.3.3). Unauthenticated attacker can exfiltrate all DB data with a crafted POST via upsert mutation. Upgrade to 25.3.3+ or enable ACL ASAP! https://radar.offseq.com/threat/cve-2026-41327-cwe-943-improper-neutralization-of--8885efbe #OffSeq #Vuln #GraphQL #DataLeak
##🔴 CVE-2026-41327 - Critical (9.1)
Dgraph is an open source distributed GraphQL database. Prior to 25.3.3, a vulnerability has been found in Dgraph that gives an unauthenticated attacker full read access to every piece of data in the database. This affects Dgraph's default configur...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41327/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-41327 - Critical (9.1)
Dgraph is an open source distributed GraphQL database. Prior to 25.3.3, a vulnerability has been found in Dgraph that gives an unauthenticated attacker full read access to every piece of data in the database. This affects Dgraph's default configur...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41327/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T15:36:10
1 posts
🟠 CVE-2026-41316 - High (8.1)
ERB is a templating system for Ruby. Ruby 2.7.0 (before ERB 2.2.0 was published on rubygems.org) introduced an `@_init` instance variable guard in `ERB#result` and `ERB#run` to prevent code execution when an ERB object is reconstructed via `Marsha...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41316/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T15:32:39
3 posts
🔴 New security advisory:
CVE-2026-21515 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-21515-azure-iot-central-elevates-privileges
🔴 CVE-2026-21515 - Critical (9.9)
Exposure of sensitive information to an unauthorized actor in Azure IOT Central allows an authorized attacker to elevate privileges over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21515/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-21515 - Critical (9.9)
Exposure of sensitive information to an unauthorized actor in Azure IOT Central allows an authorized attacker to elevate privileges over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21515/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T15:32:39
2 posts
🟠 CVE-2026-5367 - High (8.6)
A flaw was found in OVN (Open Virtual Network). A remote attacker, by sending crafted DHCPv6 (Dynamic Host Configuration Protocol for IPv6) SOLICIT packets with an inflated Client ID length, could cause the ovn-controller to read beyond the bounds...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5367/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-5367 - High (8.6)
A flaw was found in OVN (Open Virtual Network). A remote attacker, by sending crafted DHCPv6 (Dynamic Host Configuration Protocol for IPv6) SOLICIT packets with an inflated Client ID length, could cause the ovn-controller to read beyond the bounds...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5367/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T15:19:50
1 posts
🟠 CVE-2026-41246 - High (8.1)
Contour is a Kubernetes ingress controller using Envoy proxy. From v1.19.0 to before v1.33.4, v1.32.5, and v1.31.6, Contour's Cookie Rewriting feature is vulnerable to Lua code injection. An attacker with RBAC permissions to create or modify HTTPP...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41246/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T15:14:48.233000
1 posts
🟠 CVE-2026-41267 - High (8.1)
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, an improper mass assignment (JSON injection) vulnerability in the account registration endpoint of Flowise Cloud allows unauthenticated attack...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41267/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T15:14:39.110000
1 posts
🟠 CVE-2026-41268 - High (7.7)
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, Flowise is vulnerable to a critical unauthenticated remote command execution (RCE) vulnerability. It can be exploited via a parameter override...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41268/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T14:50:56.203000
2 posts
🟠 CVE-2026-41180 - High (7.5)
PsiTransfer is an open source, self-hosted file sharing solution. Prior to version 2.4.3, the upload PATCH flow under `/files/:uploadId` validates the mounted request path using the still-encoded `req.path`, but the downstream tus handler later wr...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41180/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41180 - High (7.5)
PsiTransfer is an open source, self-hosted file sharing solution. Prior to version 2.4.3, the upload PATCH flow under `/files/:uploadId` validates the mounted request path using the still-encoded `req.path`, but the downstream tus handler later wr...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41180/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T14:50:56.203000
2 posts
🟠 CVE-2026-41208 - High (8.8)
Paperclip is a Node.js server and React UI that orchestrates a team of AI agents to run a business. Versions of @paperclipai/server prior to 2026.416.0 contain a privilege escalation vulnerability that allows an attacker with an Agent API key to e...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41208/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41208 - High (8.8)
Paperclip is a Node.js server and React UI that orchestrates a team of AI agents to run a business. Versions of @paperclipai/server prior to 2026.416.0 contain a privilege escalation vulnerability that allows an attacker with an Agent API key to e...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41208/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T14:50:56.203000
1 posts
🟠 CVE-2026-41323 - High (8.1)
Kyverno is a policy engine designed for cloud native platform engineering teams. Prior to versions 1.18.0-rc1, 1.17.2-rc1, and 1.16.4, Kyverno's apiCall feature in ClusterPolicy automatically attaches the admission controller's ServiceAccount toke...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41323/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T14:50:56.203000
1 posts
🔴 CVE-2026-41228 - Critical (9.9)
Froxlor is open source server administration software. Prior to version 2.3.6, the Froxlor API endpoint `Customers.update` (and `Admins.update`) does not validate the `def_language` parameter against the list of available language files. An authen...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41228/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T14:50:56.203000
2 posts
🟠 CVE-2026-41040 - High (7.5)
GROWI provided by GROWI, Inc. is vulnerable to a regular expression denial of service (ReDoS) via a crafted input string.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41040/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41040 - High (7.5)
GROWI provided by GROWI, Inc. is vulnerable to a regular expression denial of service (ReDoS) via a crafted input string.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41040/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T14:50:56.203000
1 posts
🟠 CVE-2026-6903 - High (7.5)
The LabOne Web Server, backing the LabOne User Interface, contains insufficient input validation in its file access functionality. An unauthenticated attacker could exploit this vulnerability to read arbitrary files on the host system that are acc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6903/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T14:50:56.203000
1 posts
🔴 CVE-2026-6886 - Critical (9.8)
Borg SPM 2007 (Sales Ended in 2008) developed by BorG Technology Corporation has a Authentication Bypass vulnerability, allowing unauthenticated remote attackers to log into the system as any user.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6886/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T14:50:56.203000
1 posts
🟠 CVE-2026-41461 - High (8.5)
SocialEngine versions 7.8.0 and prior contain a blind server-side request forgery vulnerability in the /core/link/preview endpoint where user-supplied input passed via the uri request parameter is not sanitized before being used to construct outbo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41461/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T14:50:56.203000
1 posts
🔴 CVE-2026-41460 - Critical (9.8)
SocialEngine versions 7.8.0 and prior contain a SQL injection vulnerability in the /activity/index/get-memberall endpoint where user-supplied input passed via the text parameter is not sanitized before being incorporated into a SQL query. An unaut...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41460/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T14:50:56.203000
1 posts
🔴 CVE-2025-62373 - Critical (9.8)
Pipecat is an open-source Python framework for building real-time voice and multimodal conversational agents. Versions 0.0.41 through 0.0.93 have a vulnerability in `LivekitFrameSerializer` – an optional, non-default, undocumented frame serializ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-62373/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T14:50:56.203000
1 posts
🟠 CVE-2026-41241 - High (8.7)
pretalx is a conference planning tool. Prior to 2026.1.0, The organiser search in the pretalx backend rendered submission titles, speaker display names, and user names/emails into the result dropdown using innerHTML string interpolation. Any user ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41241/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T14:50:56.203000
1 posts
🔴 CVE-2026-41196: luanti 5.0.0 – 5.15.1 has a CRITICAL code injection vuln (CVSS 9.0). Malicious mods can break Lua sandbox with LuaJIT, gaining full filesystem access. Patch: upgrade to 5.15.2 or mitigate via getfenv = nil. https://radar.offseq.com/threat/cve-2026-41196-cwe-94-improper-control-of-generati-70ec6155 #OffSeq #CVE202641196 #vuln
##updated 2026-04-24T14:41:55.890000
1 posts
🟠 CVE-2026-34003 - High (7.8)
A flaw was found in the X.Org X server's XKB key types request validation. A local attacker could send a specially crafted request to the X server, leading to an out-of-bounds memory access vulnerability. This could result in the disclosure of sen...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34003/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T14:41:55.890000
1 posts
🟠 CVE-2026-34001 - High (7.8)
A flaw was found in the X.Org X server. This use-after-free vulnerability occurs in the XSYNC fence triggering logic, specifically within the miSyncTriggerFence() function. An attacker with access to the X11 server can exploit this without user in...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34001/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T14:41:55.890000
1 posts
🔴 CVE-2026-40471 - Critical (9.6)
hackage-server lacked Cross-Site Request Forgery (CSRF) protection across its endpoints. Scripts on foreign sites could trigger requests to hackage server, possibly abusing latent credentials to upload packages or perform other administrative acti...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40471/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T14:41:55.890000
1 posts
🔴 CVE-2026-31177 - Critical (9.8)
An issue was discovered in ToToLink A3300R firmware v17.0.0cu.557_B20221024 allowing attackers to execute arbitrary commands via the stunMinAlive parameter to /cgi-bin/cstecgi.cgi.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-31177/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T14:41:55.890000
1 posts
🔴 CVE-2026-31181 - Critical (9.8)
An issue was discovered in ToToLink A3300R firmware v17.0.0cu.557_B20221024 allowing attackers to execute arbitrary commands via the stunServerAddr parameter to /cgi-bin/cstecgi.cgi.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-31181/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T14:41:16.553000
2 posts
🚨 New security advisory:
CVE-2026-32210 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-32210-dynamics-365-ssrf-lets-attackers-spoof
🔴 CVE-2026-32210 - Critical (9.3)
Server-side request forgery (ssrf) in Microsoft Dynamics 365 (Online) allows an unauthorized attacker to perform spoofing over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32210/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T14:41:16.553000
3 posts
🔴 New security advisory:
CVE-2026-24303 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-24303-partner-center-privilege-escalation
🔴 CVE-2026-24303 - Critical (9.6)
Improper access control in Microsoft Partner Center allows an authorized attacker to elevate privileges over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24303/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-24303 - Critical (9.6)
Improper access control in Microsoft Partner Center allows an authorized attacker to elevate privileges over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24303/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T14:41:16.553000
1 posts
🟠 CVE-2026-32172 - High (8)
Uncontrolled search path element in Microsoft Power Apps allows an unauthorized attacker to execute code over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32172/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T14:40:53.523000
1 posts
🟠 CVE-2026-41336 - High (7.8)
OpenClaw before 2026.3.31 allows workspace .env files to override the OPENCLAW_BUNDLED_HOOKS_DIR environment variable, enabling loading of attacker-controlled hook code. Attackers can replace trusted default-on bundled hooks from untrusted workspa...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41336/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T14:40:53.523000
1 posts
🟠 CVE-2026-41349 - High (8.8)
OpenClaw before 2026.3.28 contains an agentic consent bypass vulnerability allowing LLM agents to silently disable execution approval via config.patch parameter. Remote attackers can exploit this to bypass security controls and execute unauthorize...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41349/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T14:40:53.523000
1 posts
🟠 CVE-2026-41353 - High (8.1)
OpenClaw before 2026.3.22 contains an access control bypass vulnerability in the allowProfiles feature that allows attackers to circumvent profile restrictions through persistent profile mutation and runtime profile selection. Remote attackers can...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41353/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T14:40:53.523000
1 posts
🟠 CVE-2026-41352 - High (8.8)
OpenClaw before 2026.3.31 contains a remote code execution vulnerability where a device-paired node can bypass the node scope gate authentication mechanism. Attackers with device pairing credentials can execute arbitrary node commands on the host ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41352/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T14:40:12.517000
2 posts
🟠 CVE-2026-40623 - High (8.1)
A vulnerability in SenseLive X3050's web management interface allows critical system and network configuration parameters to be modified without sufficient validation and safety controls. Due to inadequate enforcement of constraints on sensitive...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40623/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-40623 - High (8.1)
A vulnerability in SenseLive X3050's web management interface allows critical system and network configuration parameters to be modified without sufficient validation and safety controls. Due to inadequate enforcement of constraints on sensitive...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40623/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T14:40:12.517000
3 posts
🔴 CVE-2026-40620 - Critical (9.8)
A vulnerability in SenseLive X3050’s embedded management service allows full administrative control to be established without any form of authentication or authorization on the SenseLive config application. The service accepts management conne...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40620/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-40620 - Critical (9.8)
A vulnerability in SenseLive X3050’s embedded management service allows full administrative control to be established without any form of authentication or authorization on the SenseLive config application. The service accepts management conne...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40620/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##SenseLive X3050 V1.523 is at CRITICAL risk (CVE-2026-40620, CVSS 9.3): missing auth lets remote attackers gain admin access. No patch yet — restrict management access, monitor logs, and follow vendor updates. https://radar.offseq.com/threat/cve-2026-40620-cwe-306-missing-authentication-for--0af2786c #OffSeq #CVE202640620 #IoTSecurity
##updated 2026-04-24T14:40:12.517000
2 posts
🔴 CVE-2026-35503 - Critical (9.8)
A vulnerability in SenseLive X3050’s web management interface allows authentication logic to be performed entirely on the client side, relying on hardcoded values within browser-executed scripts rather than server-side verification. An attacker...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35503/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-35503 - Critical (9.8)
A vulnerability in SenseLive X3050’s web management interface allows authentication logic to be performed entirely on the client side, relying on hardcoded values within browser-executed scripts rather than server-side verification. An attacker...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35503/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T14:40:12.517000
3 posts
🔴 CVE-2026-40630 - Critical (9.8)
A vulnerability in
SenseLive
X3050’s web management interface allows unauthorized access to certain configuration endpoints due to improper access control enforcement. An attacker with network access to the device may be able to bypass the i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40630/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-40630 - Critical (9.8)
A vulnerability in
SenseLive
X3050’s web management interface allows unauthorized access to certain configuration endpoints due to improper access control enforcement. An attacker with network access to the device may be able to bypass the i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40630/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL: SenseLive X3050 v1.523 is vulnerable to authentication bypass (CVE-2026-40630) via alternate paths. No fix yet — restrict device network access and monitor closely. https://radar.offseq.com/threat/cve-2026-40630-cwe-288-authentication-bypass-using-b2eedf7d #OffSeq #CVE202640630 #IoTSecurity #VulnAlert
##updated 2026-04-24T14:39:28.770000
2 posts
Ericsson CodeChecker (≤6.27.3) is vulnerable to CRITICAL auth bypass (CVE-2026-25660). Attackers can assign permissions via crafted URLs. Restrict access & monitor for changes. Patch not yet available. https://radar.offseq.com/threat/cve-2026-25660-cwe-290-authentication-bypass-by-sp-881e021f #OffSeq #vulnerability #CodeChecker #infosec
##Ericsson CodeChecker (≤6.27.3) is vulnerable to CRITICAL auth bypass (CVE-2026-25660). Attackers can assign permissions via crafted URLs. Restrict access & monitor for changes. Patch not yet available. https://radar.offseq.com/threat/cve-2026-25660-cwe-290-authentication-bypass-by-sp-881e021f #OffSeq #vulnerability #CodeChecker #infosec
##updated 2026-04-24T14:39:28.770000
2 posts
🔴 CVE-2026-1950 - Critical (9.8)
Delta Electronics AS320T has
No checking of the length of the buffer with the file name vulnerability.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1950/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-1950 - Critical (9.8)
Delta Electronics AS320T has
No checking of the length of the buffer with the file name vulnerability.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1950/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T14:39:28.770000
3 posts
🔴 CVE-2026-1952 - Critical (9.8)
Delta Electronics AS320T has denial of service via the undocumented subfunction vulnerability.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1952/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-1952 - Critical (9.8)
Delta Electronics AS320T has denial of service via the undocumented subfunction vulnerability.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1952/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ CRITICAL: CVE-2026-1952 in DeltaWW AS320T (CVSS 9.8) enables denial of service via hidden subfunction (CWE-912). Vendor patch is available for this cloud-hosted service — confirm your instance is protected. https://radar.offseq.com/threat/cve-2026-1952-cwe-912-hidden-functionality-in-delt-72d86c2b #OffSeq #DeltaWW #Vuln #CloudSecurity
##updated 2026-04-24T14:39:28.770000
2 posts
🟠 CVE-2026-21728 - High (7.5)
Tempo queries with large limits can cause large memory allocations which can impact the availability of the service, depending on its deployment strategy.
Mitigation can be done by setting max_result_limit in the search config, e.g. to 262144 (2^...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21728/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-21728 - High (7.5)
Tempo queries with large limits can cause large memory allocations which can impact the availability of the service, depending on its deployment strategy.
Mitigation can be done by setting max_result_limit in the search config, e.g. to 262144 (2^...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21728/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T14:38:26.740000
1 posts
🟠 CVE-2026-5364 - High (8.1)
The Drag and Drop File Upload for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file upload in versions up to, and including, 1.1.3. This is due to the plugin extracting the file extension before sanitization occurs and allowing t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5364/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T14:27:13.867000
2 posts
🟠 CVE-2026-34305 - High (7.5)
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Services). Supported versions that are affected are 12.2.1.4.0, 14.1.1.0.0, 14.1.2.0.0 and 15.1.1.0.0. Easily exploitable vulnerability allows unauth...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34305/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34305 - High (7.5)
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Services). Supported versions that are affected are 12.2.1.4.0, 14.1.1.0.0, 14.1.2.0.0 and 15.1.1.0.0. Easily exploitable vulnerability allows unauth...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34305/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T13:43:37.347000
8 posts
5 repos
https://github.com/Vozec/CVE-2026-41651
https://github.com/0xBlackash/CVE-2026-41651
https://github.com/baph00met/CVE-2026-41651
Pack2TheRoot : une faille vieille de 12 ans offre les clés de votre Linux à n’importe qui https://goodtech.info/pack2theroot-faille-linux-packagekit-root-cve-2026-41651/ #Sécurité #Àlaune
##🚨 CVE-2026-41651 (Pack2TheRoot)
PackageKit vulnerable to TOCTOU Race on Transaction Flags leads to arbitrary package installation as root
PackageKit is a a D-Bus abstraction layer that allows the user to manage packages in a secure way using a cross-distro, cross-architecture API. PackageKit between and including versions 1.0.2 and 1.3.4 is vulnerable to a time-of-check time-of-use (TOCTOU) race condition on transaction flags that allows unprivileged users to install packages as root and thus leads to a local privilege escalation. This is patched in version 1.3.5.
ℹ️ Additional info on ZEN SecDB https://secdb.nttzen.cloud/cve/detail/CVE-2026-41651
#nttdata #zen #secdb #infosec
#pack2theroot #cve2026411651 #packagekit #toctou
Pack2TheRoot : une faille vieille de 12 ans offre les clés de votre Linux à n’importe qui https://goodtech.info/pack2theroot-faille-linux-packagekit-root-cve-2026-41651/ #Sécurité #Àlaune
##🚨 CVE-2026-41651 (Pack2TheRoot)
PackageKit vulnerable to TOCTOU Race on Transaction Flags leads to arbitrary package installation as root
PackageKit is a a D-Bus abstraction layer that allows the user to manage packages in a secure way using a cross-distro, cross-architecture API. PackageKit between and including versions 1.0.2 and 1.3.4 is vulnerable to a time-of-check time-of-use (TOCTOU) race condition on transaction flags that allows unprivileged users to install packages as root and thus leads to a local privilege escalation. This is patched in version 1.3.5.
ℹ️ Additional info on ZEN SecDB https://secdb.nttzen.cloud/cve/detail/CVE-2026-41651
#nttdata #zen #secdb #infosec
#pack2theroot #cve2026411651 #packagekit #toctou
Pack2TheRoot (CVE-2026-41651): Cross-Distro Local Privilege Escalation Vulnerability
https://github.security.telekom.com/2026/04/pack2theroot-linux-local-privilege-escalation.html
Read on HackerWorkspace: https://hackerworkspace.com/article/pack2theroot-cve-2026-41651-cross-distro-local-privilege-escalation-vulnerability
##Here's a harmless little #PoC for the #PackageKit LPE vulnerability (CVE-2026-41651), by @br3zel and myself: https://codeberg.org/hillu/cve-2026-41651-poc
It was a lot of fun to piece together.
📢 CVE-2026-41651 : Élévation de privilèges locale cross-distro via PackageKit (Pack2TheRoot)
📝 ## 🔍 Contexte
Publié le 22 avril 2026 par l'équipe Red Team de Deutsche Telekom sur leur blog séc...
📖 cyberveille : https://cyberveille.ch/posts/2026-04-23-cve-2026-41651-elevation-de-privileges-locale-cross-distro-via-packagekit-pack2theroot/
🌐 source : https://github.security.telekom.com/2026/04/pack2theroot-linux-local-privilege-escalation.html
#CVE_2026_41651 #IOC #Cyberveille
updated 2026-04-24T09:30:36
2 posts
🔴 CVE-2026-1951 - Critical (9.8)
Delta Electronics AS320T has no checking of the length of the buffer with the directory name
vulnerability.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1951/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CRITICAL: CVE-2026-1951 stack-based buffer overflow in DeltaWW AS320T cloud service (CVSS 9.8). Remote attackers can gain full system control. Patch available — no exploits in the wild yet. Update now! https://radar.offseq.com/threat/cve-2026-1951-cwe-121-stack-based-buffer-overflow--c6177746 #OffSeq #Cybersecurity #Vuln
##updated 2026-04-24T06:31:23
1 posts
🔴 CVE-2026-1949 - Critical (9.8)
Delta Electronics AS320T has incorrect calculation of the buffer size on the stack in the GET/PUT request handler of the web service.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1949/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T00:32:04
2 posts
🟠 CVE-2026-27841 - High (8.1)
A vulnerability in SenseLive X3050's web management interface allows state-changing operations to be triggered without proper Cross-Site Request Forgery (CSRF) protections. Because the application does not enforce server-side validation of reque...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27841/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-27841 - High (8.1)
A vulnerability in SenseLive X3050's web management interface allows state-changing operations to be triggered without proper Cross-Site Request Forgery (CSRF) protections. Because the application does not enforce server-side validation of reque...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27841/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T00:32:04
2 posts
🟠 CVE-2026-35064 - High (7.5)
A vulnerability in SenseLive X3050’s management ecosystem allows unauthenticated discovery of deployed units through the vendor’s management protocol, enabling identification of device presence, identifiers, and management interfaces without...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35064/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35064 - High (7.5)
A vulnerability in SenseLive X3050’s management ecosystem allows unauthenticated discovery of deployed units through the vendor’s management protocol, enabling identification of device presence, identifiers, and management interfaces without...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35064/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T00:32:04
3 posts
🟠 CVE-2026-39462 - High (8.1)
A vulnerability exists in SenseLive X3050’s web management interface in which password updates are not reliably applied due to improper handling of credential changes on the backend. After the device undergoes a factory restore using the SenseL...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39462/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-39462 - High (8.1)
A vulnerability exists in SenseLive X3050’s web management interface in which password updates are not reliably applied due to improper handling of credential changes on the backend. After the device undergoes a factory restore using the SenseL...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39462/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##CVE-2026-39462 (CRITICAL): SenseLive X3050 V1.523 lets attackers bypass password changes after factory reset — device may accept old or default creds. No fix yet. Limit reliance on resets and monitor for updates. https://radar.offseq.com/threat/cve-2026-39462-cwe-522-insufficiently-protected-cr-cedf02e1 #OffSeq #IoTSecurity #CVE202639462
##updated 2026-04-24T00:32:03
3 posts
🔴 CVE-2026-25775 - Critical (9.8)
A vulnerability in SenseLive X3050’s remote management service allows firmware retrieval and update operations to be performed without authentication or authorization. The service accepts firmware-related requests from any reachable host and d...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25775/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25775 - Critical (9.8)
A vulnerability in SenseLive X3050’s remote management service allows firmware retrieval and update operations to be performed without authentication or authorization. The service accepts firmware-related requests from any reachable host and d...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25775/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔍 CVE-2026-25775: SenseLive X3050 (V1.523) critical vuln — remote firmware updates possible without auth! Patch unavailable. Restrict access & monitor for unauthorized firmware actions. https://radar.offseq.com/threat/cve-2026-25775-cwe-306-missing-authentication-for--773ccfcd #OffSeq #IoTSecurity #CVE202625775
##updated 2026-04-24T00:32:03
3 posts
🔴 CVE-2026-27843 - Critical (9.1)
A vulnerability exists in SenseLive X3050's web management interface that allows critical configuration parameters to be modified without sufficient authentication or server-side validation. By applying unsupported or disruptive values to recover...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27843/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-27843 - Critical (9.1)
A vulnerability exists in SenseLive X3050's web management interface that allows critical configuration parameters to be modified without sufficient authentication or server-side validation. By applying unsupported or disruptive values to recover...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27843/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-27843: SenseLive X3050 (V1.523) CRITICAL vuln — missing auth lets attackers lock out users, causing full denial-of-service. No reset button; recovery needs console access. Restrict mgmt access & monitor configs. https://radar.offseq.com/threat/cve-2026-27843-cwe-306-missing-authentication-for--e4fcb515 #OffSeq #IoTSecurity #Vuln
##updated 2026-04-24T00:31:58
2 posts
🟠 CVE-2026-26150 - High (8.6)
Server-side request forgery (ssrf) in Microsoft Purview allows an unauthorized attacker to elevate privileges over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26150/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-26150 - High (8.6)
Server-side request forgery (ssrf) in Microsoft Purview allows an unauthorized attacker to elevate privileges over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26150/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T00:31:58
1 posts
🔴 CVE-2026-26210 - Critical (9.8)
KTransformers through 0.5.3 contains an unsafe deserialization vulnerability in the balance_serve backend mode where the scheduler RPC server binds a ZMQ ROUTER socket to all interfaces with no authentication and deserializes incoming messages usi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26210/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T00:31:58
1 posts
🔴 CVE-2026-33819 - Critical (10)
Deserialization of untrusted data in Microsoft Bing allows an unauthorized attacker to execute code over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33819/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T00:31:58
1 posts
🔴 CVE-2026-33102 - Critical (9.3)
Url redirection to untrusted site ('open redirect') in M365 Copilot allows an unauthorized attacker to elevate privileges over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33102/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T21:32:28
2 posts
🔴 New security advisory:
CVE-2026-6920 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-6920-chrome-android-gpu-sandbox-escape
🟠 CVE-2026-6920 - High (7.5)
Out of bounds read in GPU in Google Chrome on Android prior to 147.0.7727.117 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6920/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T21:32:28
1 posts
🔴 CVE-2026-31178 - Critical (9.8)
An issue was discovered in ToToLink A3300R firmware v17.0.0cu.557_B20221024 allowing attackers to execute arbitrary commands via the stunMaxAlive parameter to /cgi-bin/cstecgi.cgi.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-31178/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T21:32:26
1 posts
🔴 CVE-2026-39087 - Critical (9.8)
An issue in Ntfy ntfy.sh before v.2.21 allows a remote attacker to execute arbitrary code via the parseActions function
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39087/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T21:31:30
1 posts
🔴 CVE-2026-6942 - Critical (9.8)
radare2-mcp version 1.6.0 and earlier contains an os command injection vulnerability that allows remote attackers to execute arbitrary commands by bypassing the command filter through shell metacharacters in user-controlled input passed to r2_cmd_...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6942/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T21:31:29
1 posts
🛡️ CrowdStrike LogScale CRITICAL vuln (CVE-2026-40050): unauth path traversal — remote file read risk for self-hosted users. Tenable Nessus for Windows: HIGH vuln (CVE-2026-33694), file deletion & privilege escalation. Patch ASAP! https://radar.offseq.com/threat/vulnerabilities-patched-in-crowdstrike-tenable-pro-da7dee84 #OffSeq #Vuln #CrowdStrike #Tenable
##updated 2026-04-23T21:16:05.527000
2 posts
Apple issues iOS/iPadOS 26.4.2 to fix a Notification Services bug (CVE-2026-28950) that could retain deleted-app notification previews — Signal says preserved fragments will be removed after users update. Install now: https://cyberinsider.com/apple-fixes-ios-privacy-flaw-that-allowed-signal-message-retrieval/ 🔒📱 #iOS #Privacy #Security
##Apple fixes iOS flaw exposing deleted messages via notification logs (CVE-2026-28950).
Even encrypted apps were impacted.
Patch now.
updated 2026-04-23T18:33:25
1 posts
🟠 CVE-2026-33999 - High (7.8)
A flaw was found in the X.Org X server. This integer underflow vulnerability, specifically in the XKB compatibility map handling, allows an attacker with local or remote X11 server access to trigger a buffer read overrun. This can lead to memory-s...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33999/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T18:33:25
1 posts
🔴 CVE-2026-23751 - Critical (9.8)
Kofax Capture, now referred to as Tungsten Capture, version 6.0.0.0 (other versions may be affected) exposes a deprecated .NET Remoting HTTP channel on port 2424 via the Ascent Capture Service that is accessible without authentication and uses a d...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23751/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T18:33:25
1 posts
🔴 CVE-2026-40470 - Critical (9.9)
A critical XSS vulnerability affected hackage-server and
hackage.haskell.org. HTML and JavaScript files provided in source
packages or via the documentation upload facility were served
as-is on the main hackage.haskell.org domain. As a consequen...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40470/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T18:33:23
1 posts
🔴 CVE-2026-40472 - Critical (9.9)
In hackage-server, user-controlled metadata from .cabal files are rendered into HTML
href attributes without proper sanitization, enabling stored
Cross-Site Scripting (XSS) attacks.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40472/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T18:33:23
1 posts
#OT #Advisory VDE-2026-040
CODESYS EtherNetIP - Improper timeout handling
CODESYS EtherNet/IP is an add‑on for the CODESYS Development System that provides a fully integrated EtherNet/IP protocol stack along with diagnostic capabilities. A flaw in the EtherNet/IP adapter protocol stack library results in a vulnerability within the generated application code. When an EtherNet/IP adapter is configured, this vulnerable protocol stack is downloaded to and executed by CODESYS Control runtime systems.
#CVE CVE-2026-35225
https://certvde.com/en/advisories/vde-2026-040/
#oCSAF
#CSAF https://codesys.csaf-tp.certvde.com/.well-known/csaf/white/2026/advisory2026-04_vde-2026-040.json
updated 2026-04-23T15:39:02
1 posts
🔴 CVE-2026-39440 - Critical (9.9)
Improper Control of Generation of Code ('Code Injection') vulnerability in Funnelforms LLC FunnelFormsPro allows Remote Code Inclusion.This issue affects FunnelFormsPro: from n/a through 3.8.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39440/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T14:28:55.557000
3 posts
4 repos
https://github.com/tausifzaman/CVE-2026-3844
https://github.com/dinosn/CVE-2026-3844
Cloudways Patches Actively Exploited File Upload Flaw in Breeze Cache Plugin
Cloudways patched a critical vulnerability in the Breeze Cache WordPress plugin (CVE-2026-3844) that allows unauthenticated attackers to upload malicious files and execute remote code. The flaw is currently under active exploitation, but it requires a non-default setting to be enabled in order to be exploited.
**If you use the Breeze Cache WordPress plugin, update it to version 2.4.5 ASAP. If you can't update right away, disable the "Host Files Locally - Gravatars" setting as a temporary workaround until you can apply the update.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/cloudways-patches-actively-exploited-file-upload-flaw-in-breeze-cache-plugin-e-w-c-7-u/gD2P6Ple2L
🔴 CVE-2026-3844 - Critical (9.8)
The Breeze Cache plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'fetch_gravatar_from_remote' function in all versions up to, and including, 2.4.4. This makes it possible for unauthenticated ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3844/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚩 CVE-2026-3844 (CRITICAL): Breeze Cache ≤2.4.4 lets unauthenticated attackers upload arbitrary files via 'fetch_gravatar_from_remote' if "Host Files Locally - Gravatars" is enabled. RCE possible. Check settings & update! https://radar.offseq.com/threat/cve-2026-3844-cwe-434-unrestricted-upload-of-file--8e6074b3 #OffSeq #WordPress #infosec
##updated 2026-04-23T13:39:54.420000
7 posts
Thirteen hours from disclosure to exploitation. CVE-2026-33626 in LMDeploy is an SSRF that hits cloud metadata and internal services. If you run LMDeploy, patch it.
##LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure
https://thehackernews.com/2026/04/lmdeploy-cve-2026-33626-flaw-exploited.html
Read on HackerWorkspace: https://hackerworkspace.com/article/lmdeploy-cve-2026-33626-flaw-exploited-within-13-hours-of-disclosure
##Thirteen hours from disclosure to exploitation. CVE-2026-33626 in LMDeploy is an SSRF that hits cloud metadata and internal services. If you run LMDeploy, patch it.
##LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure
https://thehackernews.com/2026/04/lmdeploy-cve-2026-33626-flaw-exploited.html
Read on HackerWorkspace: https://hackerworkspace.com/article/lmdeploy-cve-2026-33626-flaw-exploited-within-13-hours-of-disclosure
##LMDeploy AI Inference Engine Exploited Hours After SSRF Disclosure
LMDeploy's vision-language module contains a high-severity SSRF vulnerability (CVE-2026-33626) that attackers exploited within 13 hours to scan internal networks and target cloud metadata. The flaw allows unauthenticated users to bypass network restrictions by providing malicious image URLs to the inference server.
**If you're running LMDeploy, immediately update to version 0.12.3 or later to patch the SSRF vulnerability (CVE-2026-33626). Also, enforce IMDSv2 with required session tokens on your cloud instances and restrict outbound network traffic from inference servers to block credential theft and internal scanning.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/lmdeploy-ai-inference-engine-exploited-hours-after-ssrf-disclosure-i-a-y-c-t/gD2P6Ple2L
Exploit su LMDeploy CVE-2026-33626: attacco SSRF immediato dopo disclosure https://deafnews.it/article/exploit-su-lmdeploy-cve-2026-33626-attacco-ssrf-immediato-dopo-disclosure
##An SSRF bug in an LLM deployment server got exploited 12 hours after it was patched
##updated 2026-04-23T12:31:45
3 posts
🔴 CVE-2026-6887 - Critical (9.8)
Borg SPM 2007 (Sales Ended in 2008) developed by BorG Technology Corporation has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6887/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-6887 - Critical (9.8)
Borg SPM 2007 (Sales Ended in 2008) developed by BorG Technology Corporation has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6887/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL SQL Injection (CVE-2026-6887) in BorG SPM 2007: unauthenticated remote attackers can manipulate databases. No patch, product EOL. Isolate or discontinue use ASAP. Details: https://radar.offseq.com/threat/cve-2026-6887-cwe-89-improper-neutralization-of-sp-f0a62364 #OffSeq #SQLInjection #Vuln #InfoSec
##updated 2026-04-23T12:31:45
1 posts
🔴 CVE-2026-6885 - Critical (9.8)
Borg SPM 2007 (Sales Ended in 2008) developed by BorG Technology Corporation has an Arbitrary File Upload vulnerability, allowing unauthenticated remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6885/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T12:07:46.893000
2 posts
🔴 CVE-2026-34286 - Critical (9.1)
Vulnerability in the Oracle Identity Manager Connector product of Oracle Fusion Middleware (component: Core). The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network acc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34286/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-34286 - Critical (9.1)
Vulnerability in the Oracle Identity Manager Connector product of Oracle Fusion Middleware (component: Core). The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network acc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34286/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T12:07:28.307000
1 posts
🔴 CVE-2026-34287 - Critical (9.1)
Vulnerability in the Oracle Identity Manager Connector product of Oracle Fusion Middleware (component: Core). The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network acc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34287/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T00:31:18
2 posts
3 repos
https://github.com/Letlaka/redsun-bluehammer-undefend-detection-pack
🛡️ Microsoft Defender Elevation of Privilege Vulnerability
Description
🛡️ Insufficient granularity of access control in Microsoft Defender allows an authorized attacker to elevate privileges locally.
##Just in: CVE-2026-33825 "BlueHammer" just hit the CISA KEV. Meanwhile, I'm not near my Windows PC, so I'm not sure if the Red Sun still prevails.
##updated 2026-04-22T21:32:18
1 posts
🛑 CVE-2026-41468: Beghelli SicuroWeb (Sicuro24) uses unmaintained AngularJS 1.5.2, allowing network-adjacent attackers to hijack sessions via MITM and template injection. Enforce HTTPS, monitor activity. No patch yet. More: https://radar.offseq.com/threat/cve-2026-41468-cwe-1104-use-of-unmaintained-third--1563ff90 #OffSeq #CVE202641468 #infosec
##updated 2026-04-22T21:24:26.997000
2 posts
CrowdStrike Patches Critical Path Traversal Vulnerability in LogScale
CrowdStrike patched a critical unauthenticated path traversal vulnerability (CVE-2026-40050) in LogScale that allows remote attackers to read arbitrary files from self-hosted server filesystems.
**If you use self-hosted LogScale, plan a quick update to a patched version ASAP. Always keep your cluster API endpoints behind a firewall or VPN to limit exposure to attackers.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/crowdstrike-patches-critical-path-traversal-vulnerability-in-logscale-b-w-e-5-i/gD2P6Ple2L
🛡️ CrowdStrike LogScale CRITICAL vuln (CVE-2026-40050): unauth path traversal — remote file read risk for self-hosted users. Tenable Nessus for Windows: HIGH vuln (CVE-2026-33694), file deletion & privilege escalation. Patch ASAP! https://radar.offseq.com/threat/vulnerabilities-patched-in-crowdstrike-tenable-pro-da7dee84 #OffSeq #Vuln #CrowdStrike #Tenable
##updated 2026-04-22T21:23:52.620000
1 posts
updated 2026-04-22T19:13:47
1 posts
🔥 CRITICAL vuln in nimiq-block (<1.3.0): Flawed input validation in SkipBlockProof::verify lets attackers bypass PoS quorum using crafted indices. Patch in v1.3.0 — upgrade ASAP! CVE-2026-33471 https://radar.offseq.com/threat/cve-2026-33471-cwe-20-improper-input-validation-in-2bd8708b #OffSeq #Rust #Security #Blockchain
##updated 2026-04-22T15:32:43
1 posts
🟠 CVE-2026-34291 - High (8.7)
Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.2.0.0. Difficult to exploit vulnerability allows unauthenticated attacker with network ac...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34291/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T15:32:42
1 posts
🟠 CVE-2026-34290 - High (7.5)
Vulnerability in the Oracle Identity Manager Connector product of Oracle Fusion Middleware (component: Core). The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network acc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34290/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T15:31:40
2 posts
🟠 CVE-2026-34297 - High (7.5)
Vulnerability in the Oracle HCM Common Architecture product of Oracle E-Business Suite (component: Knowledge Integration). Supported versions that are affected are 12.2.3-12.2.15. Easily exploitable vulnerability allows unauthenticated attacker w...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34297/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34297 - High (7.5)
Vulnerability in the Oracle HCM Common Architecture product of Oracle E-Business Suite (component: Knowledge Integration). Supported versions that are affected are 12.2.3-12.2.15. Easily exploitable vulnerability allows unauthenticated attacker w...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34297/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T15:31:39
1 posts
🔴 CVE-2026-34285 - Critical (9.1)
Vulnerability in the Oracle Identity Manager Connector product of Oracle Fusion Middleware (component: Core). The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network acc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34285/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-21T21:31:23
2 posts
Python asyncio Vulnerability Exposes Windows Systems to Remote Code Execution
A high-severity out-of-bounds write vulnerability (CVE-2026-3298) in Python's asyncio module on Windows allows remote attackers to cause memory corruption or execute arbitrary code. The flaw affects Python versions 3.11 through 3.14 and requires immediate patching or code-level mitigations.
**If you're running Python applications on Windows (versions 3.11 through 3.14) that use asyncio for network communication, upgrade to the latest patched Python version as soon as it's available. Until then, avoid using the sock_recvfrom_into() method with untrusted network traffic, and watch for unexpected crashes on your Windows Python servers.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-python-asyncio-vulnerability-exposes-windows-systems-to-remote-code-execution-e-o-n-y-1/gD2P6Ple2L
Python asyncio Vulnerability Exposes Windows Systems to Remote Code Execution
A high-severity out-of-bounds write vulnerability (CVE-2026-3298) in Python's asyncio module on Windows allows remote attackers to cause memory corruption or execute arbitrary code. The flaw affects Python versions 3.11 through 3.14 and requires immediate patching or code-level mitigations.
**If you're running Python applications on Windows (versions 3.11 through 3.14) that use asyncio for network communication, upgrade to the latest patched Python version as soon as it's available. Until then, avoid using the sock_recvfrom_into() method with untrusted network traffic, and watch for unexpected crashes on your Windows Python servers.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-python-asyncio-vulnerability-exposes-windows-systems-to-remote-code-execution-e-o-n-y-1/gD2P6Ple2L
updated 2026-04-21T20:38:47
1 posts
🟠 CVE-2026-41066 - High (7.5)
lxml is a library for processing XML and HTML in the Python language. Prior to 6.1.0, using either of the two parsers in the default configuration (with resolve_entities=True) allows untrusted XML input to read local files. Setting the resolve_ent...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41066/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-21T20:19:54
2 posts
🔴 CVE-2026-41264 - Critical (9.8)
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the specific flaw exists within the run method of the CSV_Agents class. The issue results from the lack of proper sandboxing when evaluating a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41264/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-41264 - Critical (9.8)
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the specific flaw exists within the run method of the CSV_Agents class. The issue results from the lack of proper sandboxing when evaluating a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41264/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-21T20:16:10
1 posts
🚩 CRITICAL: CVE-2026-41197 in noir-lang noir (<1.0.0-beta.19). Incorrect buffer allocation for nested arrays can corrupt Brillig VM heap. Memory safety risk! Upgrade to 1.0.0-beta.19+ ASAP. https://radar.offseq.com/threat/cve-2026-41197-cwe-131-incorrect-calculation-of-bu-282b810c #OffSeq #NoirLang #CVE202641197 #AppSec
##updated 2026-04-21T15:16:37.563000
2 posts
Cohere Terrarium (CVE-2026-5752) and OpenAI Codex CLI (CVE-2025-59532): a cross-CVE analysis of AI code sandbox escapes https://blog.barrack.ai/pyodide-sandbox-escape-cohere-terrarium-openai-codex/
##Projekt Terrarium, który miał uruchamiać kod generowany przez modele AI w bezpiecznej piaskownicy, okazał się śmiertelną pułapką. Luka CVE-2026-5752 pozwala napastnikom na przejęcie pełnej kontroli nad systemem, a najgorsze jest to, że projekt nie jest już rozwijany.
#si #ai #sztucznainteligencja #wiadomości #informacje #technologia
##updated 2026-04-17T19:21:23.993000
1 posts
2 repos
CVE-2026-33824: Remote Code Execution in Windows IKEv2 - the folks from TrendAI Research break down this wormable bug that was patched last week. The show root cause & offer detection guidance. Read the details as https://www.zerodayinitiative.com/blog/2026/4/22/cve-2026-33824-remote-code-execution-in-windows-ikev2
##updated 2026-04-16T19:59:38.107000
2 posts
9 repos
https://github.com/AtoposX-J/CVE-2026-34197-Apache-ActiveMQ-RCE
https://github.com/KONDORDEVSECURITYCORP/CVE-2026-34197
https://github.com/hg0434hongzh0/CVE-2026-34197
https://github.com/xshysjhq/CVE-2026-34197-payload-Apache-ActiveMQ-
https://github.com/DEVSECURITYSPRO/CVE-2026-34197
https://github.com/keraattin/CVE-2026-34197
https://github.com/0xBlackash/CVE-2026-34197
🟠 CVE-2026-40466 - High (8.8)
Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ All, Apache ActiveMQ.
An authenticated attacker may bypass the fix in CVE-2026-34197 by adding a conne...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40466/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-40466 - High (8.8)
Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ All, Apache ActiveMQ.
An authenticated attacker may bypass the fix in CVE-2026-34197 by adding a conne...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40466/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-15T14:53:58.147000
1 posts
#OT #Advisory VDE-2026-019
Pilz: Vulnerability affecting PASvisu Runtime
The PASvisu Runtime is affected by a vulnerability in a third-party component which can be exploited by malicious web requests.
#CVE CVE-2018-25193
https://certvde.com/en/advisories/vde-2026-019/
#CSAF https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2026/ppsa-2026-002.json
##updated 2026-04-15T00:35:42.020000
1 posts
1 repos
Cohere Terrarium (CVE-2026-5752) and OpenAI Codex CLI (CVE-2025-59532): a cross-CVE analysis of AI code sandbox escapes https://blog.barrack.ai/pyodide-sandbox-escape-cohere-terrarium-openai-codex/
##updated 2026-04-14T18:30:55
1 posts
1 repos
🖲️ #Noticia de #CiberSeguridad #CiberGuerra #CiberAtaque #CiberNoticia
⚫ Más de 1.300 servidores SharePoint expuestos a la vulnerabilidad CVE-2026-32201 de abril
🔗 http://blog.segu-info.com.ar/2026/04/mas-de-1300-servidores-sharepoint.html
Más de 1.370 servidores SharePoint con acceso a Internet siguen sin parchearse
contra la vulnerabilidad CVE-2026-32201, una falla de suplantación de
identidad que, según Microsoft, fue explotada como una vulnerabilidad de día
cero.
"Una
##updated 2026-04-13T21:23:27
1 posts
5 repos
https://github.com/eduardorossi84/CVE-2026-34621-POC
https://github.com/KeulenR01/Remediate-AdobeAcrobat-CVE-2026-34621
https://github.com/ercihan/CVE-2026-34621_PDF_SAMPLE
CVE-2026-34621: Adobe Acrobat Reader zero-day was on VirusTotal for 136 days before Adobe named it a CVE https://nefariousplan.com/posts/adobe-acrobat-cve-2026-34621-detection-lie
##updated 2026-04-09T19:06:18
2 posts
7 repos
https://github.com/Nxploited/CVE-2026-39987
https://github.com/mki9/CVE-2026-39987_exploit
https://github.com/keraattin/CVE-2026-39987
https://github.com/h3raklez/CVE-2026-39987
https://github.com/Dhiaelhak-Rached/CVE-2026-39987-lab-or-marimo-cve-lab
🚨 [CISA-2026:0423] CISA Adds One Known Exploited Vulnerability to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0423)
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2026-39987 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39987)
- Name: Marimo Remote Code Execution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Marimo
- Product: Marimo
- Notes: https://github.com/marimo-team/marimo/security/advisories/GHSA-2679-6mx9-h9xc ; https://nvd.nist.gov/vuln/detail/CVE-2026-39987
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260423 #cisa20260423 #cve_2026_39987 #cve202639987
##CVE ID: CVE-2026-39987
Vendor: Marimo
Product: Marimo
Date Added: 2026-04-23
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-39987
updated 2026-03-19T19:16:19.230000
1 posts
6 repos
https://github.com/WostGit/cve-2025-15467-crash
https://github.com/balgan/CVE-2025-15467
https://github.com/materaj2/cve-2025-15467
https://github.com/mr-r3b00t/CVE-2025-15467
#OT #Advisory VDE-2026-029
METTLER TOLEDO: OpenSSL vulnerability in MX and MR balances
MX/MR firmware V2.0.0 or earlier is affected by the OpenSSL vulnerability CVE-2025-15467.
#CVE CVE-2025-15467
https://certvde.com/en/advisories/vde-2026-029/
#oCSAF
#CSAF https://mettler-toledo.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2026-029.json
updated 2026-03-13T15:33:01.727000
1 posts
🚨 EUVD-2026-25626
📊 Score: 7.1/10 (CVSS v3.1)
📦 Product: SiYuan
🏢 Vendor: siyuan-note
📅 Updated: 2026-04-24
📝 SiYuan is an open-source personal knowledge management system. Prior to 3.6.5, the fix for CVE-2026-30869 only added a denylist check (IsSensitivePath) but did not address the root cause — a redundant url.PathUnescape() call in serveExport(). An authentic...
🔗 https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-25626
##updated 2026-02-28T00:54:27.840000
2 posts
1 repos
https://github.com/Anon-Cyber-Team/CVE-2026-27966--RCE-in-Langflow
The latest Metasploit Weekly Wrapup is here! Highlights include a new RCE exploit for Langflow (CVE-2026-27966), improved check method visibility with detailed reasoning, and updates for legacy SMB targets. Plus 3 other new modules!
Read more: https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-04-25-2026/
##The latest Metasploit Weekly Wrapup is here! Highlights include a new RCE exploit for Langflow (CVE-2026-27966), improved check method visibility with detailed reasoning, and updates for legacy SMB targets. Plus 3 other new modules!
Read more: https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-04-25-2026/
##updated 2026-01-29T03:31:32
1 posts
🟠 CVE-2026-41068 - High (7.7)
Kyverno is a policy engine designed for cloud native platform engineering teams. The patch for CVE-2026-22039 fixed cross-namespace privilege escalation in Kyverno's `apiCall` context by validating the `URLPath` field. However, the ConfigMap conte...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41068/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2025-10-28T13:58:58.610000
2 posts
⚠️ CRITICAL: FIRESTARTER Backdoor
APT actors deployed FIRESTARTER, a persistent Linux backdoor on Cisco Firepower and Secure Firewall devices via CVE-2025-20333 and CVE-2025-20362. The malware survives firmware patches and works with LINE VIPER to maintain remote access. Any organization running these devices is at risk of undetect…
##⚠️ CRITICAL: FIRESTARTER Backdoor
APT actors deployed FIRESTARTER, a persistent Linux backdoor on Cisco Firepower and Secure Firewall devices via CVE-2025-20333 and CVE-2025-20362. The malware survives firmware patches and works with LINE VIPER to maintain remote access. Any organization running these devices is at risk of undetect…
##updated 2025-10-22T00:34:26
2 posts
⚠️ CRITICAL: FIRESTARTER Backdoor
APT actors deployed FIRESTARTER, a persistent Linux backdoor on Cisco Firepower and Secure Firewall devices via CVE-2025-20333 and CVE-2025-20362. The malware survives firmware patches and works with LINE VIPER to maintain remote access. Any organization running these devices is at risk of undetect…
##⚠️ CRITICAL: FIRESTARTER Backdoor
APT actors deployed FIRESTARTER, a persistent Linux backdoor on Cisco Firepower and Secure Firewall devices via CVE-2025-20333 and CVE-2025-20362. The malware survives firmware patches and works with LINE VIPER to maintain remote access. Any organization running these devices is at risk of undetect…
##updated 2025-10-22T00:34:00
1 posts
9 repos
https://github.com/Chocapikk/CVE-2023-46805
https://github.com/duy-31/CVE-2023-46805_CVE-2024-21887
https://github.com/rxwx/pulse-meter
https://github.com/yoryio/CVE-2023-46805
https://github.com/Hexastrike/Ivanti-Connect-Secure-Logs-Parser
https://github.com/seajaysec/Ivanti-Connect-Around-Scan
https://github.com/cbeek-r7/CVE-2023-46805
https://github.com/raminkarimkhani1996/CVE-2023-46805_CVE-2024-21887
CVE-2023-46805 is actively exploited in Ivanti Connect Secure and Policy Secure gateways. When chained with CVE-2024-21887, attackers gain unauthenticated RCE and full VPN appliance compromise, posing critical enterprise perimeter risk.
Read the full threat brief:
https://thecybermind.co/i1n8
updated 2025-10-22T00:32:59
1 posts
12 repos
https://github.com/gobysec/GobyVuls
https://github.com/duy-31/CVE-2023-46805_CVE-2024-21887
https://github.com/rxwx/pulse-meter
https://github.com/pwniel/ivanti_shell
https://github.com/yoryio/CVE-2023-46805
https://github.com/Chocapikk/CVE-2024-21887
https://github.com/oways/ivanti-CVE-2024-21887
https://github.com/Hexastrike/Ivanti-Connect-Secure-Logs-Parser
https://github.com/Chocapikk/CVE-2024-21893-to-CVE-2024-21887
https://github.com/gobysec/Goby
https://github.com/seajaysec/Ivanti-Connect-Around-Scan
https://github.com/raminkarimkhani1996/CVE-2023-46805_CVE-2024-21887
CVE-2023-46805 is actively exploited in Ivanti Connect Secure and Policy Secure gateways. When chained with CVE-2024-21887, attackers gain unauthenticated RCE and full VPN appliance compromise, posing critical enterprise perimeter risk.
Read the full threat brief:
https://thecybermind.co/i1n8
updated 2025-04-22T21:15:42.690000
3 posts
🔴 CVE-2026-6951 - Critical (9.8)
Versions of the package simple-git before 3.36.0 are vulnerable to Remote Code Execution (RCE) due to an incomplete fix for [CVE-2022-25912](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221) that blocks the -c option but not the equivalent ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6951/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 EUVD-2026-25639
📊 Score: 9.2/10 (CVSS v3.1)
📦 Product: simple-git
📅 Updated: 2026-04-25
📝 Versions of the package simple-git before 3.36.0 are vulnerable to Remote Code Execution (RCE) due to an incomplete fix for [CVE-2022-25912](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221) that blocks the -c option but not the equivalent --config form. If untruste...
🔗 https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-25639
##🔴 CVE-2026-6951 - Critical (9.8)
Versions of the package simple-git before 3.36.0 are vulnerable to Remote Code Execution (RCE) due to an incomplete fix for [CVE-2022-25912](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221) that blocks the -c option but not the equivalent ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6951/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2024-11-21T07:40:46.280000
1 posts
Broadcom has a new advisory for a critical vulnerability:
Common Components and Services for z/OS 15.0 Vulnerability in CCS Apache Tomcat https://support.broadcom.com/web/ecx/security-advisory #Broadcom #Apache
CISA has updated the KEV catalogue:
- CVE-2024-57726: SimpleHelp Missing Authorization Vulnerability https://www.cve.org/CVERecord?id=CVE-2024-57726
- CVE-2024-57728: SimpleHelp Path Traversal Vulnerability https://www.cve.org/CVERecord?id=CVE-2024-57728
- CVE-2024-7399: Samsung MagicINFO 9 Server Path Traversal Vulnerability https://www.cve.org/CVERecord?id=CVE-2024-7399
- CVE-2025-29635: D-Link DIR-823X Command Injection Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-29635 #CISA #Samsung #DLink
Cisco has two advisories for high-severity vulnerabilities:
- CVE-2023-20185: Cisco ACI Multi-Site CloudSec Encryption Information Disclosure Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aci-cloudsec-enc-Vs5Wn2sX
- Informational, updated today: Continued Evolution of Persistence Mechanism Against Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-persist-CISAED25-03 @TalosSecurity #Cisco #infosec #vulnerability
##MEDIUM severity alert: CVE-2026-7026 in D-Link DGS-3420 v1.50.018 allows remote XSS via System Info Settings Page. Exploit is public. Assess your devices and monitor for abuse. https://radar.offseq.com/threat/cve-2026-7026-cross-site-scripting-in-d-link-dgs-3-10e9ee49 #OffSeq #DLink #Vuln #XSS
##MEDIUM severity alert: CVE-2026-7026 in D-Link DGS-3420 v1.50.018 allows remote XSS via System Info Settings Page. Exploit is public. Assess your devices and monitor for abuse. https://radar.offseq.com/threat/cve-2026-7026-cross-site-scripting-in-d-link-dgs-3-10e9ee49 #OffSeq #DLink #Vuln #XSS
##🟠 CVE-2026-31952 - High (7.6)
Xibo is an open source digital signage platform with a web content management system and Windows display player software. Versions 1.7 through 4.4.0 have an SQL injection vulnerability in the API routes inside the CMS responsible for Filtering Dat...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-31952/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-31952 - High (7.6)
Xibo is an open source digital signage platform with a web content management system and Windows display player software. Versions 1.7 through 4.4.0 have an SQL injection vulnerability in the API routes inside the CMS responsible for Filtering Dat...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-31952/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-41478 - Critical (9.9)
Saltcorn is an extensible, open source, no-code database application builder. Prior to 1.4.6, 1.5.6, and 1.6.0-beta.5, a SQL injection vulnerability in Saltcorn’s mobile-sync routes allows any authenticated low-privilege user with read access to...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41478/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-41478 - Critical (9.9)
Saltcorn is an extensible, open source, no-code database application builder. Prior to 1.4.6, 1.5.6, and 1.6.0-beta.5, a SQL injection vulnerability in Saltcorn’s mobile-sync routes allows any authenticated low-privilege user with read access to...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41478/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##📢 CVE-2026-34078 : Sandbox escape dans Flatpak via injection de chemins non fiables
📝 ## 🗓️ Contexte
Article publié le 23 avril 2026 par Sebastian Wick (mainteneur de Flatpak) sur son blog personnel.
📖 cyberveille : https://cyberveille.ch/posts/2026-04-24-cve-2026-34078-sandbox-escape-dans-flatpak-via-injection-de-chemins-non-fiables/
🌐 source : https://blog.sebastianwick.net/posts/how-hard-is-it-to-open-a-file/
#CVE_2026_34078 #Flatpak #Cyberveille
🔴 CVE-2026-41428 - Critical (9.1)
Budibase is an open-source low-code platform. Prior to 3.35.4, the authenticated middleware uses unanchored regular expressions to match public (no-auth) endpoint patterns against ctx.request.url. Since ctx.request.url in Koa includes the query st...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41428/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-41428 - Critical (9.1)
Budibase is an open-source low-code platform. Prior to 3.35.4, the authenticated middleware uses unanchored regular expressions to match public (no-auth) endpoint patterns against ctx.request.url. Since ctx.request.url in Koa includes the query st...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41428/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33666 - High (7.5)
Zserio is a framework for serializing structured data with a compact and efficient way with low overhead. Prior to 2.18.1, in BitStreamReader.h readBytes() / readString(), the setBitPosition() bounds check receives the overflowed value and is comp...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33666/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33666 - High (7.5)
Zserio is a framework for serializing structured data with a compact and efficient way with low overhead. Prior to 2.18.1, in BitStreamReader.h readBytes() / readString(), the setBitPosition() bounds check receives the overflowed value and is comp...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33666/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-6912 - High (8.8)
Improperly controlled modification of dynamically-determined object attributes in the Cognito User Pool configuration in AWS Ops Wheel before PR #165 allows remote authenticated users to escalate to deployment admin privileges and manage Cognito u...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6912/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Issue with AWS Ops Wheel (CVE-2026-6911 and CVE-2026-6912
Bulletin ID: 2026-018-AWS Scope: AWS Content Type: Important (requires attention) Publication Date: 2026/04/24 09:15 AM PDT
Description:
AWS Ops Wheel is an open-source tool that helps teams make random selections using a virtua...
https://aws.amazon.com/security/security-bulletins/rss/2026-018-aws/
##🟠 CVE-2026-41419 - High (7.6)
4ga Boards is a boards system for realtime project management. Prior to 3.3.5, a path traversal vulnerability allows an authenticated user with board import privileges to make the server ingest arbitrary host files as board attachments during BOAR...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41419/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41309 - High (8.2)
Open Source Social Network (OSSN) is open-source social networking software developed in PHP. Versions prior to 9.0 are vulnerable to resource exhaustion. An attacker can upload a specially crafted image with extreme pixel dimensions (e.g., $10000...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41309/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-41679 - Critical (10)
Paperclip is a Node.js server and React UI that orchestrates a team of AI agents to run a business. Prior to version 2026.416.0, an unauthenticated attacker can achieve full remote code execution on any network-accessible Paperclip instance runnin...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41679/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL: CVE-2026-41679 in Paperclip (<2026.416.0) enables unauthenticated remote code execution via API chain — no user creds needed. Upgrade to 2026.416.0+ ASAP! Full details: https://radar.offseq.com/threat/cve-2026-41679-cwe-287-improper-authentication-in--09e9d7e4 #OffSeq #CVE202641679 #infosec #rce
##🟠 CVE-2026-41564 - High (7.5)
CryptX versions before 0.088 for Perl do not reseed the Crypt::PK PRNG state after forking.
The Crypt::PK::RSA, Crypt::PK::DSA, Crypt::PK::DH, Crypt::PK::ECC, Crypt::PK::Ed25519 and Crypt::PK::X25519 modules seed a per-object PRNG state in their ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41564/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41564 - High (7.5)
CryptX versions before 0.088 for Perl do not reseed the Crypt::PK PRNG state after forking.
The Crypt::PK::RSA, Crypt::PK::DSA, Crypt::PK::DH, Crypt::PK::ECC, Crypt::PK::Ed25519 and Crypt::PK::X25519 modules seed a per-object PRNG state in their ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41564/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##