## Updated at UTC 2026-04-14T08:38:29.453820

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-40313 9.1 0.00% 4 0 2026-04-14T04:17:13.890000 PraisonAI is a multi-agent teams system. In versions 4.5.139 and below, the GitH
CVE-2026-40289 9.1 0.00% 4 0 2026-04-14T04:17:12.710000 PraisonAI is a multi-agent teams system. In versions below 4.5.139 of PraisonAI
CVE-2026-40288 9.8 0.00% 4 0 2026-04-14T04:17:12.210000 PraisonAI is a multi-agent teams system. In versions below 4.5.139 of PraisonAI
CVE-2026-40287 8.4 0.00% 2 0 2026-04-14T04:17:11.977000 PraisonAI is a multi-agent teams system. Versions 4.5.138 and below are vulnerab
CVE-2026-6264 9.8 0.00% 4 0 2026-04-14T03:16:09.050000 A critical vulnerability in the Talend JobServer and Talend Runtime allows unaut
CVE-2026-4365 9.1 0.00% 2 0 2026-04-14T02:16:05.767000 The LearnPress plugin for WordPress is vulnerable to unauthorized data deletion
CVE-2026-4352 7.5 0.00% 2 0 2026-04-14T02:16:05.613000 The JetEngine plugin for WordPress is vulnerable to SQL Injection via the Custom
CVE-2026-22564 9.8 0.00% 2 0 2026-04-14T00:31:19 An Improper Access Control vulnerability could allow a malicious actor with acce
CVE-2026-22566 7.5 0.00% 2 0 2026-04-14T00:31:12 An Improper Access Control vulnerability could allow a malicious actor with acce
CVE-2026-40164 7.5 0.00% 2 0 2026-04-14T00:16:07.360000 jq is a command-line JSON processor. Before commit 0c7d133c3c7e37c00b6d46b658a02
CVE-2026-27681 9.9 0.00% 4 0 2026-04-14T00:16:06.560000 Due to insufficient authorization checks in SAP Business Planning and Consolidat
CVE-2026-33901 7.5 0.00% 2 0 2026-04-14T00:07:45 A heap buffer overflow occurs in the MVG decoder that could result in an out of
CVE-2026-33908 7.5 0.00% 2 0 2026-04-14T00:06:45 Magick frees the memory of the XML tree via the `DestroyXMLTree` function; howev
CVE-2026-22563 9.8 0.00% 4 0 2026-04-13T22:16:28.050000 A series of Improper Input Validation vulnerabilities could allow a Command Inje
CVE-2026-22562 9.8 0.00% 2 0 2026-04-13T22:16:27.870000 A malicious actor with access to the UniFi Play network could exploit a Path Tra
CVE-2026-30999 7.5 0.00% 2 0 2026-04-13T21:31:47 A heap buffer overflow in the av_bprint_finalize() function of FFmpeg v8.0.1 all
CVE-2026-30997 7.5 0.00% 2 0 2026-04-13T21:31:47 An out-of-bounds read in the read_global_param() function (libavcodec/av1dec.c)
CVE-2025-66769 7.5 0.00% 2 0 2026-04-13T21:31:47 A NULL pointer dereference in Nitro PDF Pro for Windows v14.41.1.4 allows attack
CVE-2026-40044 9.8 0.00% 2 0 2026-04-13T21:30:51 Pachno 1.0.6 contains a deserialization vulnerability that allows unauthenticate
CVE-2026-6198 8.8 0.00% 2 0 2026-04-13T21:30:51 A vulnerability has been found in Tenda F456 1.0.0.5. This issue affects the fun
CVE-2026-6197 8.8 0.00% 2 0 2026-04-13T21:30:51 A flaw has been found in Tenda F456 1.0.0.5. This vulnerability affects the func
CVE-2026-34621 8.6 0.04% 23 2 2026-04-13T21:23:27 Acrobat Reader versions 24.001.30356, 26.001.21367 and earlier are affected by a
CVE-2026-35650 7.5 0.06% 1 0 2026-04-13T20:46:42.373000 OpenClaw before 2026.3.22 contains an environment variable override handling vul
CVE-2026-35668 7.7 0.05% 2 0 2026-04-13T20:43:10.547000 OpenClaw before 2026.3.24 contains a path traversal vulnerability in sandbox enf
CVE-2026-35663 8.8 0.04% 1 0 2026-04-13T20:39:05.993000 OpenClaw before 2026.3.25 contains a privilege escalation vulnerability allowing
CVE-2026-30998 7.5 0.00% 2 0 2026-04-13T20:16:33.003000 An improper resource deallocation and closure vulnerability in the tools/zmqsend
CVE-2025-69624 7.5 0.00% 2 0 2026-04-13T20:16:26.437000 Nitro PDF Pro for Windows 14.41.1.4 contains a NULL pointer dereference vulnerab
CVE-2026-35641 7.8 0.01% 1 0 2026-04-13T20:14:11.753000 OpenClaw before 2026.3.24 contains an arbitrary code execution vulnerability in
CVE-2026-34197 8.8 6.22% 1 6 template 2026-04-13T19:21:56 Improper Input Validation, Improper Control of Generation of Code ('Code Injecti
CVE-2026-6200 8.8 0.00% 2 0 2026-04-13T19:16:58.240000 A vulnerability was determined in Tenda F456 1.0.0.5. The affected element is th
CVE-2026-6199 8.8 0.00% 2 0 2026-04-13T19:16:58.033000 A vulnerability was found in Tenda F456 1.0.0.5. Impacted is the function fromqo
CVE-2026-40042 9.8 0.00% 2 0 2026-04-13T19:16:51.960000 Pachno 1.0.6 contains an XML external entity injection vulnerability that allows
CVE-2026-40040 8.8 0.00% 2 0 2026-04-13T19:16:51.617000 Pachno 1.0.6 contains an unrestricted file upload vulnerability that allows auth
CVE-2023-21529 8.8 36.68% 9 0 2026-04-13T19:00:02.583000 Microsoft Exchange Server Remote Code Execution Vulnerability
CVE-2026-21643 9.8 13.70% 7 2 template 2026-04-13T19:00:02.583000 An improper neutralization of special elements used in an sql command ('sql inje
CVE-2025-60710 7.8 0.19% 7 1 2026-04-13T18:31:39 Improper link resolution before file access ('link following') in Host Process f
CVE-2026-6196 8.8 0.00% 2 0 2026-04-13T18:30:49 A vulnerability was detected in Tenda F456 1.0.0.5. This affects the function fr
CVE-2026-6194 8.8 0.00% 2 0 2026-04-13T18:30:48 A weakness has been identified in Totolink A3002MU B20211125.1046. Affected by t
CVE-2026-6186 8.8 0.00% 2 0 2026-04-13T18:30:48 A security vulnerability has been detected in UTT HiPER 1200GW up to 2.5.3-17030
CVE-2026-5085 9.1 0.02% 2 0 2026-04-13T18:30:40 Solstice::Session versions through 1440 for Perl generates session ids insecurel
CVE-2023-36424 7.8 10.30% 7 1 2026-04-13T18:30:35 Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2020-9715 7.8 50.44% 7 2 2026-04-13T18:30:34 Adobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 20
CVE-2012-1854 7.8 1.36% 7 0 2026-04-13T18:30:34 Untrusted search path vulnerability in VBE6.dll in Microsoft Office 2003 SP3, 20
CVE-2026-6195 9.8 0.00% 2 0 2026-04-13T18:16:32.353000 A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191
CVE-2026-32316 8.2 0.00% 2 0 2026-04-13T18:16:29.420000 jq is a command-line JSON processor. An integer overflow vulnerability exists th
CVE-2026-28291 8.1 0.00% 2 0 2026-04-13T18:16:28.760000 simple-git enables running native Git commands from JavaScript. Versions up to a
CVE-2026-33858 8.8 0.00% 2 0 2026-04-13T17:16:28.600000 Dag Authors, who normally should not be able to execute code in the webserver co
CVE-2026-32252 7.7 0.02% 1 0 2026-04-13T16:16:26.590000 Chartbrew is an open-source web application that can connect directly to databas
CVE-2026-35337 8.8 0.30% 3 0 2026-04-13T15:32:45 Deserialization of Untrusted Data vulnerability in Apache Storm. Versions Affec
CVE-2026-1462 8.8 0.00% 2 0 2026-04-13T15:31:50 A vulnerability in the `TFSMLayer` class of the `keras` package, version 3.13.0,
CVE-2026-40198 7.5 0.03% 2 0 2026-04-13T15:31:37 Net::CIDR::Lite versions before 0.23 for Perl does not validate IPv6 group count
CVE-2026-34578 8.2 0.20% 1 0 2026-04-13T15:02:47.353000 OPNsense is a FreeBSD based firewall and routing platform. Prior to 26.1.6, OPNs
CVE-2026-33266 7.5 0.02% 1 0 2026-04-13T15:02:47.353000 Use of Hard-coded Cryptographic Key vulnerability in Apache OpenMeetings. The r
CVE-2026-39853 7.8 0.01% 1 0 2026-04-13T15:02:47.353000 osslsigncode is a tool that implements Authenticode signing and timestamping. Pr
CVE-2026-39843 7.7 0.03% 1 0 2026-04-13T15:02:47.353000 Plane is an an open-source project management tool. From 0.28.0 to before 1.3.0,
CVE-2026-39974 8.5 0.03% 1 0 2026-04-13T15:02:27.760000 n8n-MCP is a Model Context Protocol (MCP) server that provides AI assistants wit
CVE-2026-1584 7.5 0.08% 1 0 2026-04-13T15:02:27.760000 A flaw was found in gnutls. A remote, unauthenticated attacker can exploit this
CVE-2026-30478 8.8 0.01% 1 0 2026-04-13T15:02:27.760000 A Dynamic-link Library Injection vulnerability in GatewayGeo MapServer for Windo
CVE-2026-39983 8.6 1.56% 1 1 2026-04-13T15:02:27.760000 basic-ftp is an FTP client for Node.js. Prior to 5.2.1, basic-ftp allows FTP com
CVE-2026-39981 8.8 0.48% 1 0 2026-04-13T15:02:27.760000 AGiXT is a dynamic AI Agent Automation Platform. Prior to 1.9.2, the safe_join()
CVE-2026-40069 7.5 0.03% 1 0 2026-04-13T15:02:27.760000 BSV Ruby SDK is the Ruby SDK for the BSV blockchain. From 0.1.0 to before 0.8.2,
CVE-2025-13926 9.8 0.07% 1 0 2026-04-13T15:02:27.760000 An attacker could use data obtained by sniffing the network traffic to forge pa
CVE-2026-29146 7.5 0.03% 2 0 2026-04-13T15:02:27.760000 Padding Oracle vulnerability in Apache Tomcat's EncryptInterceptor with default
CVE-2026-29129 7.5 0.02% 1 0 2026-04-13T15:02:27.760000 Configured cipher preference order not preserved vulnerability in Apache Tomcat.
CVE-2026-24880 7.5 0.03% 1 0 2026-04-13T15:02:27.760000 Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CVE-2026-34486 7.5 0.01% 1 0 2026-04-13T15:02:27.760000 Missing Encryption of Sensitive Data vulnerability in Apache Tomcat due to theΒ f
CVE-2026-40175 10.0 0.24% 2 3 2026-04-13T15:02:06.187000 Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.
CVE-2026-1115 9.6 0.04% 1 0 2026-04-13T15:02:06.187000 A Stored Cross-Site Scripting (XSS) vulnerability was identified in the social f
CVE-2026-6028 9.8 0.89% 1 0 2026-04-13T15:02:06.187000 A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191
CVE-2026-6027 9.8 0.89% 1 0 2026-04-13T15:02:06.187000 A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. This is
CVE-2026-6029 9.8 0.89% 1 0 2026-04-13T15:02:06.187000 A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. The affec
CVE-2026-22750 7.5 0.03% 1 0 2026-04-13T15:02:06.187000 When configuring SSL bundles in Spring Cloud Gateway by using the configuration
CVE-2026-39304 7.5 0.04% 1 0 2026-04-13T15:02:06.187000 Denial of Service via Out of Memory vulnerability in Apache ActiveMQ Client, Apa
CVE-2026-33707 9.4 0.07% 2 0 2026-04-13T15:02:06.187000 Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, th
CVE-2026-40157 0 0.07% 1 0 2026-04-13T15:02:06.187000 PraisonAI is a multi-agent teams system. Prior to 4.5.128, cmd_unpack in the rec
CVE-2026-40217 8.8 0.19% 1 0 2026-04-13T15:02:06.187000 LiteLLM through 2026-04-08 allows remote attackers to execute arbitrary code via
CVE-2026-6067 7.5 0.06% 1 0 2026-04-13T15:02:06.187000 A heap buffer overflow vulnerability exists in the Netwide Assembler (NASM) due
CVE-2026-35595 8.3 0.03% 1 0 2026-04-13T15:02:06.187000 Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0,
CVE-2026-40158 8.6 0.03% 2 0 2026-04-13T15:02:06.187000 PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAI's AST-based
CVE-2026-32892 9.1 0.19% 2 0 2026-04-13T15:02:06.187000 Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, Ch
CVE-2026-40200 8.1 0.01% 1 0 2026-04-13T15:02:06.187000 An issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based memory co
CVE-2026-31941 7.7 0.03% 1 0 2026-04-13T15:02:06.187000 Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, Ch
CVE-2026-31940 7.5 0.04% 1 0 2026-04-13T15:02:06.187000 Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, in
CVE-2026-5483 8.5 0.06% 1 0 2026-04-13T15:02:06.187000 A flaw was found in odh-dashboard in Red Hat Openshift AI. This vulnerability in
CVE-2026-33618 8.8 0.05% 1 0 2026-04-13T15:02:06.187000 Chamilo LMS is a learning management system. Prior to .0.0-RC.3, the PlatformCon
CVE-2026-33710 7.5 0.03% 1 0 2026-04-13T15:02:06.187000 Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, RE
CVE-2026-1116 8.2 0.01% 3 0 2026-04-13T15:01:43.663000 A Cross-site Scripting (XSS) vulnerability was identified in the `from_dict` met
CVE-2026-3830 8.6 0.04% 1 0 2026-04-13T15:01:43.663000 The Product Filter for WooCommerce by WBW WordPress plugin before 3.1.3 does not
CVE-2026-5936 8.5 0.03% 1 0 2026-04-13T15:01:43.663000 An attacker can control a server-side HTTP request by supplying a crafted URL, c
CVE-2026-25208 8.1 0.04% 1 0 2026-04-13T15:01:43.663000 Integer overflow vulnerability in Samsung Open Source Escargot allows Overflow B
CVE-2026-25205 7.4 0.01% 1 0 2026-04-13T15:01:43.663000 Heap-based buffer overflow vulnerability in Samsung Open Source Escargot allows
CVE-2026-6156 9.8 0.89% 2 0 2026-04-13T15:01:43.663000 A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191
CVE-2026-40393 8.1 0.04% 1 0 2026-04-13T15:01:43.663000 In Mesa before 25.3.6 and 26 before 26.0.1, out-of-bounds memory access can occu
CVE-2026-6131 9.8 0.89% 1 0 2026-04-13T15:01:43.663000 A vulnerability was found in Totolink A7100RU 7.4cu.2313_b20191024. Affected by
CVE-2026-34853 7.7 0.01% 1 0 2026-04-13T15:01:43.663000 Permission bypass vulnerability in the LBS module. Impact: Successful exploitati
CVE-2026-6133 8.8 0.05% 1 0 2026-04-13T15:01:43.663000 A vulnerability was identified in Tenda F451 1.0.0.7_cn_svn7958. This affects th
CVE-2026-6135 8.8 0.05% 1 0 2026-04-13T15:01:43.663000 A weakness has been identified in Tenda F451 1.0.0.7_cn_svn7958. This issue affe
CVE-2026-6140 9.8 0.89% 2 0 2026-04-13T15:01:43.663000 A vulnerability was found in Totolink A7100RU 7.4cu.2313_b20191024. This impacts
CVE-2026-6113 9.8 0.89% 2 0 2026-04-13T15:01:43.663000 A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191
CVE-2026-6121 8.8 0.05% 1 0 2026-04-13T15:01:43.663000 A flaw has been found in Tenda F451 1.0.0.7. Affected by this vulnerability is t
CVE-2026-6115 9.8 0.89% 2 0 2026-04-13T15:01:43.663000 A flaw has been found in Totolink A7100RU 7.4cu.2313_b20191024. This affects the
CVE-2026-6120 8.8 0.05% 1 0 2026-04-13T15:01:43.663000 A vulnerability was detected in Tenda F451 1.0.0.7. Affected is the function fro
CVE-2026-6116 9.8 0.89% 2 0 2026-04-13T15:01:43.663000 A vulnerability has been found in Totolink A7100RU 7.4cu.2313_b20191024. This vu
CVE-2026-6114 9.8 0.89% 2 0 2026-04-13T15:01:43.663000 A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected
CVE-2026-6106 3.5 0.03% 1 0 2026-04-13T15:01:43.663000 A vulnerability was detected in 1Panel-dev MaxKB up to 2.2.1. This vulnerability
CVE-2026-5144 8.8 0.05% 1 0 2026-04-13T15:01:43.663000 The BuddyPress Groupblog plugin for WordPress is vulnerable to Privilege Escalat
CVE-2026-5809 7.1 0.03% 2 0 2026-04-13T15:01:43.663000 The wpForo Forum plugin for WordPress is vulnerable to Arbitrary File Deletion i
CVE-2026-4149 10.0 1.27% 2 0 2026-04-13T15:01:43.663000 Sonos Era 300 SMB Response Out-Of-Bounds Access Remote Code Execution Vulnerabil
CVE-2026-4153 7.8 0.06% 1 0 2026-04-13T15:01:43.663000 GIMP PSP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerabi
CVE-2026-4152 7.8 0.06% 1 0 2026-04-13T15:01:43.663000 GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerabi
CVE-2026-4151 7.8 0.06% 1 0 2026-04-13T15:01:43.663000 GIMP ANI File Parsing Integer Overflow Remote Code Execution Vulnerability. This
CVE-2026-6168 8.8 0.08% 1 0 2026-04-13T09:31:39 A flaw has been found in TOTOLINK A7000R up to 9.1.0u.6115. The affected element
CVE-2026-6154 9.8 0.89% 2 0 2026-04-13T06:30:37 A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. Th
CVE-2026-6155 9.8 0.89% 2 0 2026-04-13T06:30:37 A weakness has been identified in Totolink A7100RU 7.4cu.2313. The impacted elem
CVE-2026-6157 8.8 0.08% 1 0 2026-04-13T06:30:37 A vulnerability was detected in Totolink A800R 4.1.2cu.5137_B20200730. This impa
CVE-2026-6152 7.3 0.03% 1 0 2026-04-13T03:30:35 A vulnerability was determined in code-projects Vehicle Showroom Management Syst
CVE-2026-6139 9.8 0.89% 2 0 2026-04-13T03:30:29 A vulnerability has been found in Totolink A7100RU 7.4cu.2313_b20191024. This af
CVE-2026-6138 9.8 0.89% 2 0 2026-04-13T00:30:34 A flaw has been found in Totolink A7100RU 7.4cu.2313_b20191024. The impacted ele
CVE-2026-6132 9.8 0.89% 2 0 2026-04-13T00:30:34 A vulnerability was determined in Totolink A7100RU 7.4cu.2313_b20191024. Affecte
CVE-2026-6134 8.8 0.02% 1 0 2026-04-13T00:30:34 A security flaw has been discovered in Tenda F451 1.0.0.7_cn_svn7958. This vulne
CVE-2026-6137 8.8 0.05% 1 0 2026-04-13T00:30:34 A vulnerability was detected in Tenda F451 1.0.0.7_cn_svn7958. The affected elem
CVE-2026-6136 8.8 0.05% 1 0 2026-04-13T00:30:34 A security vulnerability has been detected in Tenda F451 1.0.0.7_cn_svn7958. Imp
CVE-2026-6124 8.8 0.05% 1 0 2026-04-12T09:31:45 A vulnerability was determined in Tenda F451 1.0.0.7. This vulnerability affects
CVE-2026-6122 8.8 0.05% 1 0 2026-04-12T09:31:45 A vulnerability has been found in Tenda F451 1.0.0.7. Affected by this issue is
CVE-2026-6123 8.8 0.09% 1 0 2026-04-12T09:31:44 A vulnerability was found in Tenda F451 1.0.0.7. This affects the function fromA
CVE-2026-6112 9.8 0.89% 2 0 2026-04-12T06:30:33 A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. Affecte
CVE-2026-31845 9.3 0.02% 2 0 2026-04-11T21:30:24 A reflected cross-site scripting (XSS) vulnerability exists in Rukovoditel CRM v
CVE-2026-5217 7.2 0.08% 1 0 2026-04-11T03:30:41 The Optimole – Optimize Images | Convert WebP & AVIF | CDN & Lazy Load | Image O
CVE-2026-4150 7.8 0.06% 1 0 2026-04-11T03:30:41 GIMP PSD File Parsing Integer Overflow Remote Code Execution Vulnerability. This
CVE-2026-29145 9.1 0.06% 1 1 2026-04-10T22:07:26 CLIENT_CERT authentication does not fail as expected for some scenarios when sof
CVE-2026-34487 7.5 0.03% 1 0 2026-04-10T21:38:44 Insertion of Sensitive Information into Log File vulnerability in the cloud memb
CVE-2026-34483 7.5 0.03% 1 0 2026-04-10T21:38:24 Improper Encoding or Escaping of Output vulnerability in the JsonAccessLogValve
CVE-2026-40189 None 0.10% 1 0 2026-04-10T21:37:33 ### Summary goshs enforces the documented per-folder `.goshs` ACL/basic-auth mec
CVE-2026-40188 7.7 0.03% 1 0 2026-04-10T21:37:28 ### Summary The SFTP command rename sanitizes only the source path and not the d
CVE-2026-40046 5.4 0.04% 1 0 2026-04-10T21:35:58 Integer Overflow or Wraparound vulnerability in Apache ActiveMQ, Apache ActiveMQ
CVE-2026-34020 7.5 0.03% 1 0 2026-04-10T21:35:18 Use of GET Request Method With Sensitive Query Strings vulnerability in Apache O
CVE-2026-6057 9.8 0.11% 1 0 2026-04-10T21:32:22 FalkorDB Browser 1.9.3 contains an unauthenticated path traversal vulnerability
CVE-2026-5412 10.0 0.04% 1 0 2026-04-10T21:00:18 ### Impact If a user has login permission to a controller and knows the control
CVE-2026-35643 8.8 0.04% 2 0 2026-04-10T19:38:05 ## Summary Android Canvas WebView pages from untrusted origins could invoke the
CVE-2026-35666 8.8 0.04% 1 0 2026-04-10T19:37:45 ## Summary Allow-always exec approvals did not unwrap /usr/bin/time, so an unreg
CVE-2026-40163 8.2 0.08% 1 0 2026-04-10T19:30:28 ### Summary Two unauthenticated path traversal vulnerabilities exist in Saltcor
CVE-2026-40156 7.8 0.02% 1 0 2026-04-10T19:26:45 PraisonAI automatically loads a file named `tools.py` from the current working d
CVE-2026-35669 None 0.04% 1 0 2026-04-10T17:29:55 ## Summary Gateway Plugin HTTP auth: "gateway" Mints operator.admin Runtime Sco
CVE-2026-35660 None 0.04% 1 0 2026-04-10T17:27:04 ## Summary Before `v2026.3.23`, the Gateway `agent` RPC accepted `/reset` and `/
CVE-2026-35653 8.1 0.04% 1 0 2026-04-10T17:24:51 > Fixed in OpenClaw 2026.3.24, the current shipping release. # Title `browser.
CVE-2025-5804 7.5 0.07% 1 0 2026-04-10T15:32:07 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2025-58913 8.1 0.11% 1 0 2026-04-10T15:32:07 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-33092 7.8 0.01% 1 0 2026-04-10T15:32:05 Local privilege escalation due to improper handling of environment variables. Th
CVE-2025-66168 5.4 0.07% 1 0 2026-04-10T14:59:48 Apache ActiveMQ does not properly validate the remaining length field which may
CVE-2026-6026 9.8 0.89% 1 0 2026-04-10T09:31:20 A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. Th
CVE-2026-28704 7.8 0.01% 1 0 2026-04-10T09:31:16 Emocheck insecurely loads Dynamic Link Libraries (DLLs). If a crafted DLL file i
CVE-2026-39912 9.1 0.06% 1 1 2026-04-09T21:31:36 V2Board 1.6.1 through 1.7.4 and Xboard through 0.1.9 expose authentication token
CVE-2026-4436 8.6 0.05% 1 0 2026-04-09T21:31:36 A low-privileged remote attacker can send Modbus packets to manipulate register
CVE-2026-40070 8.1 0.01% 1 0 2026-04-09T20:28:11 # Unverified certifier signatures persisted by `acquire_certificate` ## Affecte
CVE-2026-39987 None 2.70% 7 3 template 2026-04-09T19:06:18 ## Summary Marimo (19.6k stars) has a Pre-Auth RCE vulnerability. The terminal
CVE-2026-39942 8.5 0.03% 1 0 2026-04-09T19:05:28 ## Summary A broken access control vulnerability was identified in the Directus
CVE-2026-39911 8.8 0.12% 1 0 2026-04-09T18:31:34 Hashgraph Guardian through version 3.5.0 contains an unsandboxed JavaScript exec
CVE-2026-5329 8.6 0.20% 1 0 2026-04-09T18:31:34 Rapid7 Velociraptor versions prior to 0.76.2Β contain an improper input validatio
CVE-2026-4837 6.6 0.23% 2 0 2026-04-08T21:26:13.410000 An eval() injection vulnerability in the Rapid7 Insight Agent beaconing logic fo
CVE-2026-39365 None 4.05% 1 0 template 2026-04-07T22:16:29 ### Summary Any files ending with `.map` even out side the project can be retur
CVE-2026-4519 0 0.03% 1 0 2026-04-07T18:16:47.223000 The webbrowser.open() API would accept leading dashes in the URL which could be
CVE-2026-34885 8.5 5.71% 1 0 template 2026-04-07T13:20:35.010000 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-22666 7.2 0.15% 1 1 2026-04-07T13:20:11.643000 Dolibarr ERP/CRM versions prior to 23.0.2 contain an authenticated remote code e
CVE-2026-5690 7.3 4.86% 1 0 2026-04-07T13:20:11.643000 A flaw has been found in Totolink A7100RU 7.4cu.2313_b20191024. The impacted ele
CVE-2026-5689 7.3 4.86% 1 0 2026-04-07T13:20:11.643000 A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. The affec
CVE-2026-5677 7.3 4.86% 1 0 2026-04-07T13:20:11.643000 A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. Im
CVE-2026-5691 7.3 4.86% 1 0 2026-04-07T00:30:28 A vulnerability has been found in Totolink A7100RU 7.4cu.2313_b20191024. This af
CVE-2026-5692 7.3 4.86% 1 0 2026-04-07T00:30:28 A vulnerability was found in Totolink A7100RU 7.4cu.2313_b20191024. This impacts
CVE-2026-5688 7.3 4.86% 1 0 2026-04-07T00:30:28 A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191
CVE-2026-5678 7.3 4.86% 1 0 2026-04-06T21:31:41 A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. The aff
CVE-2026-33613 7.2 0.15% 1 0 2026-04-03T16:10:52.680000 Due to the improper neutralisation of special elements used in an OS command, a
CVE-2026-33614 7.5 0.06% 1 0 2026-04-03T16:10:52.680000 An unauthenticated remote attacker can exploit an unauthenticated SQL Injection
CVE-2026-33616 7.5 0.06% 1 0 2026-04-03T16:10:52.680000 An unauthenticated remote attacker can exploit an unauthenticated blind SQL Inje
CVE-2026-33615 9.1 0.10% 1 0 2026-04-02T12:31:13 An unauthenticated remote attacker can exploit an unauthenticated SQL Injection
CVE-2026-33617 5.3 0.04% 1 0 2026-04-02T12:31:13 An unauthenticated remote attacker can access a configuration file containing da
CVE-2026-3584 9.8 17.09% 1 1 template 2026-03-21T00:32:48 The Kali Forms plugin for WordPress is vulnerable to Remote Code Execution in al
CVE-2026-25253 8.8 0.09% 2 9 2026-02-13T17:41:02.987000 OpenClaw (aka clawdbot or Moltbot) before 2026.1.29 obtains a gatewayUrl value f
CVE-2025-0520 0 1.61% 3 0 2025-11-04T23:15:33.920000 An unrestricted file upload vulnerability in ShowDoc caused by improper validati
CVE-2025-4802 7.8 0.04% 2 1 2025-11-03T20:19:11.153000 Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Librar
CVE-2019-1367 7.5 89.25% 1 1 2025-10-29T14:34:22.990000 A remote code execution vulnerability exists in the way that the scripting engin
CVE-2025-59528 10.0 82.39% 2 10 template 2025-09-23T16:45:09.443000 Flowise is a drag & drop user interface to build a customized large language mod
CVE-2025-59145 0 0.10% 2 0 2025-09-16T12:49:16.060000 color-name is a JSON with CSS color names. On 8 September 2025, an npm publishin
CVE-2025-8061 7.0 0.01% 1 3 2025-09-11T21:32:01 A potential insufficient access control vulnerability was reported in the Lenovo
CVE-2025-53928 0 0.78% 1 0 N/A
CVE-2026-32605 0 0.00% 2 0 N/A
CVE-2026-34079 0 0.13% 1 0 N/A
CVE-2026-39980 0 0.07% 1 0 N/A
CVE-2026-34734 0 0.01% 1 0 N/A
CVE-2026-33698 0 0.05% 2 0 N/A
CVE-2026-31939 0 0.04% 1 0 N/A
CVE-2026-32931 0 0.16% 1 0 N/A
CVE-2026-40168 0 0.04% 1 0 N/A

CVE-2026-40313
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-04-14T04:17:13.890000

4 posts

PraisonAI is a multi-agent teams system. In versions 4.5.139 and below, the GitHub Actions workflows are vulnerable to ArtiPACKED attack, a known credential leakage vector caused by using actions/checkout without setting persist-credentials: false. By default, actions/checkout writes the GITHUB_TOKEN (and sometimes ACTIONS_RUNTIME_TOKEN) into the .git/config file for persistence, and if any subseq

offseq at 2026-04-14T04:30:28.554Z ##

🚩 CRITICAL CVE-2026-40313: PraisonAI ≀ 4.5.139 exposes GITHUB_TOKEN in workflow artifacts. Attackers can push malicious code & steal secrets. Upgrade to 4.5.140+ & set persist-credentials: false. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-14T04:19:20.000Z ##

πŸ”΄ CVE-2026-40313 - Critical (9.1)

PraisonAI is a multi-agent teams system. In versions 4.5.139 and below, the GitHub Actions workflows are vulnerable to ArtiPACKED attack, a known credential leakage vector caused by using actions/checkout without setting persist-credentials: false...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-14T04:30:28.000Z ##

🚩 CRITICAL CVE-2026-40313: PraisonAI ≀ 4.5.139 exposes GITHUB_TOKEN in workflow artifacts. Attackers can push malicious code & steal secrets. Upgrade to 4.5.140+ & set persist-credentials: false. radar.offseq.com/threat/cve-20 #OffSeq #SupplyChain #CVE202640313

##

thehackerwire@mastodon.social at 2026-04-14T04:19:20.000Z ##

πŸ”΄ CVE-2026-40313 - Critical (9.1)

PraisonAI is a multi-agent teams system. In versions 4.5.139 and below, the GitHub Actions workflows are vulnerable to ArtiPACKED attack, a known credential leakage vector caused by using actions/checkout without setting persist-credentials: false...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40289
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-04-14T04:17:12.710000

4 posts

PraisonAI is a multi-agent teams system. In versions below 4.5.139 of PraisonAI and 1.5.140 of praisonaiagents, the browser bridge (praisonai browser start) is vulnerable to unauthenticated remote session hijacking due to missing authentication and a bypassable origin check on its /ws WebSocket endpoint. The server binds to 0.0.0.0 by default and only validates the Origin header when one is presen

offseq at 2026-04-14T06:00:31.159Z ##

⚠️ CVE-2026-40289: PraisonAI <4.5.139 & praisonaiagents <1.5.140 have a critical missing auth vuln on /ws. Remote attackers can hijack browser automation sessions. Patch ASAP or restrict access! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-14T05:29:09.000Z ##

πŸ”΄ CVE-2026-40289 - Critical (9.1)

PraisonAI is a multi-agent teams system. In versions below 4.5.139 of PraisonAI and 1.5.140 of praisonaiagents, the browser bridge (praisonai browser start) is vulnerable to unauthenticated remote session hijacking due to missing authentication an...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-14T06:00:31.000Z ##

⚠️ CVE-2026-40289: PraisonAI <4.5.139 & praisonaiagents <1.5.140 have a critical missing auth vuln on /ws. Remote attackers can hijack browser automation sessions. Patch ASAP or restrict access! radar.offseq.com/threat/cve-20 #OffSeq #Infosec #Vulnerability #PraisonAI

##

thehackerwire@mastodon.social at 2026-04-14T05:29:09.000Z ##

πŸ”΄ CVE-2026-40289 - Critical (9.1)

PraisonAI is a multi-agent teams system. In versions below 4.5.139 of PraisonAI and 1.5.140 of praisonaiagents, the browser bridge (praisonai browser start) is vulnerable to unauthenticated remote session hijacking due to missing authentication an...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40288
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-04-14T04:17:12.210000

4 posts

PraisonAI is a multi-agent teams system. In versions below 4.5.139 of PraisonAI and 1.5.140 of praisonaiagents, the workflow engine is vulnerable to arbitrary command and code execution through untrusted YAML files. When praisonai workflow run <file.yaml> loads a YAML file with type: job, the JobWorkflowExecutor in job_workflow.py processes steps that support run: (shell commands via subprocess.ru

offseq at 2026-04-14T07:30:28.915Z ##

🚨 CVE-2026-40288 (CRITICAL, CVSS 9.8): PraisonAI <4.5.139 vulnerable to OS command injection via untrusted YAML files. Attackers can achieve full system compromise. Upgrade ASAP! More: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-14T04:19:29.000Z ##

πŸ”΄ CVE-2026-40288 - Critical (9.8)

PraisonAI is a multi-agent teams system. In versions below 4.5.139 of PraisonAI and 1.5.140 of praisonaiagents, the workflow engine is vulnerable to arbitrary command and code execution through untrusted YAML files. When praisonai workflow run lo...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-14T07:30:28.000Z ##

🚨 CVE-2026-40288 (CRITICAL, CVSS 9.8): PraisonAI <4.5.139 vulnerable to OS command injection via untrusted YAML files. Attackers can achieve full system compromise. Upgrade ASAP! More: radar.offseq.com/threat/cve-20 #OffSeq #PraisonAI #InfoSec

##

thehackerwire@mastodon.social at 2026-04-14T04:19:29.000Z ##

πŸ”΄ CVE-2026-40288 - Critical (9.8)

PraisonAI is a multi-agent teams system. In versions below 4.5.139 of PraisonAI and 1.5.140 of praisonaiagents, the workflow engine is vulnerable to arbitrary command and code execution through untrusted YAML files. When praisonai workflow run lo...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40287
(8.4 HIGH)

EPSS: 0.00%

updated 2026-04-14T04:17:11.977000

2 posts

PraisonAI is a multi-agent teams system. Versions 4.5.138 and below are vulnerable to arbitrary code execution through automatic, unsanitized import of a tools.py file from the current working directory. Components including call.py (import_tools_from_file()), tool_resolver.py (_load_local_tools()), and CLI tool-loading paths blindly import ./tools.py at startup without any validation, sandboxing,

thehackerwire@mastodon.social at 2026-04-14T05:29:19.000Z ##

🟠 CVE-2026-40287 - High (8.4)

PraisonAI is a multi-agent teams system. Versions 4.5.138 and below are vulnerable to arbitrary code execution through automatic, unsanitized import of a tools.py file from the current working directory. Components including call.py (import_tools_...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-14T05:29:19.000Z ##

🟠 CVE-2026-40287 - High (8.4)

PraisonAI is a multi-agent teams system. Versions 4.5.138 and below are vulnerable to arbitrary code execution through automatic, unsanitized import of a tools.py file from the current working directory. Components including call.py (import_tools_...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6264
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-04-14T03:16:09.050000

4 posts

A critical vulnerability in the Talend JobServer and Talend Runtime allows unauthenticated remote code execution via the JMX monitoring port. The attack vector is the JMX monitoring port of the Talend JobServer. The vulnerability can be mitigated for the Talend JobServer by requiring TLS client authentication for the monitoring port; however, the patch must be applied for full mitigation. For Tale

thehackerwire@mastodon.social at 2026-04-14T04:00:16.000Z ##

πŸ”΄ CVE-2026-6264 - Critical (9.8)

A critical vulnerability in the Talend JobServer and Talend Runtime allows unauthenticated remote code execution via the JMX monitoring port. The attack vector is the JMX monitoring port of the Talend JobServer. The vulnerability can be mitigated ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-04-14T03:00:28.468Z ##

πŸ”΄ CRITICAL: CVE-2026-6264 affects Talend JobServer 8.0 & 7.3. Unauthenticated RCE via JMX port β€” patch immediately or require TLS client auth for mitigation. Disable JMX in Runtime if possible. Details: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-14T04:00:16.000Z ##

πŸ”΄ CVE-2026-6264 - Critical (9.8)

A critical vulnerability in the Talend JobServer and Talend Runtime allows unauthenticated remote code execution via the JMX monitoring port. The attack vector is the JMX monitoring port of the Talend JobServer. The vulnerability can be mitigated ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-14T03:00:28.000Z ##

πŸ”΄ CRITICAL: CVE-2026-6264 affects Talend JobServer 8.0 & 7.3. Unauthenticated RCE via JMX port β€” patch immediately or require TLS client auth for mitigation. Disable JMX in Runtime if possible. Details: radar.offseq.com/threat/cve-20 #OffSeq #Talend #Vuln #RCE #Infosec

##

CVE-2026-4365
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-04-14T02:16:05.767000

2 posts

The LearnPress plugin for WordPress is vulnerable to unauthorized data deletion due to a missing capability check on the `delete_question_answer()` function in all versions up to, and including, 4.3.2.8. The plugin exposes a `wp_rest` nonce in public frontend HTML (`lpData`) to unauthenticated visitors, and uses that nonce as the only security gate for the `lp-load-ajax` AJAX dispatcher. The `dele

thehackerwire@mastodon.social at 2026-04-14T04:00:38.000Z ##

πŸ”΄ CVE-2026-4365 - Critical (9.1)

The LearnPress plugin for WordPress is vulnerable to unauthorized data deletion due to a missing capability check on the `delete_question_answer()` function in all versions up to, and including, 4.3.2.8. The plugin exposes a `wp_rest` nonce in pub...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-14T04:00:38.000Z ##

πŸ”΄ CVE-2026-4365 - Critical (9.1)

The LearnPress plugin for WordPress is vulnerable to unauthorized data deletion due to a missing capability check on the `delete_question_answer()` function in all versions up to, and including, 4.3.2.8. The plugin exposes a `wp_rest` nonce in pub...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4352
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-14T02:16:05.613000

2 posts

The JetEngine plugin for WordPress is vulnerable to SQL Injection via the Custom Content Type (CCT) REST API search endpoint in all versions up to, and including, 3.8.6.1. This is due to the `_cct_search` parameter being interpolated directly into a SQL query string via `sprintf()` without sanitization or use of `$wpdb->prepare()`. WordPress REST API's `wp_unslash()` call on `$_GET` strips the `wp

thehackerwire@mastodon.social at 2026-04-14T04:00:26.000Z ##

🟠 CVE-2026-4352 - High (7.5)

The JetEngine plugin for WordPress is vulnerable to SQL Injection via the Custom Content Type (CCT) REST API search endpoint in all versions up to, and including, 3.8.6.1. This is due to the `_cct_search` parameter being interpolated directly into...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-14T04:00:26.000Z ##

🟠 CVE-2026-4352 - High (7.5)

The JetEngine plugin for WordPress is vulnerable to SQL Injection via the Custom Content Type (CCT) REST API search endpoint in all versions up to, and including, 3.8.6.1. This is due to the `_cct_search` parameter being interpolated directly into...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22564
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-04-14T00:31:19

2 posts

An Improper Access Control vulnerability could allow a malicious actor with access to the UniFi Play network to enable SSH to make unauthorized changes to the system.
 Affected Products: UniFi Play PowerAmp (Version 1.0.35 and earlier)
 UniFi Play Audio PortΒ  (Version 1.0.24 and earlier)
 Mitigation: Update UniFi Play PowerAmp to Version 1.0.38 or later
 Update UniFi Play Audio PortΒ  to Versio

thehackerwire@mastodon.social at 2026-04-13T22:31:36.000Z ##

πŸ”΄ CVE-2026-22564 - Critical (9.8)

An Improper Access Control vulnerability could allow a malicious actor with access to the UniFi Play network to enable SSH to make unauthorized changes to the system.


Affected Products:
UniFi Play PowerAmp (Version 1.0.35 and earlier)

UniF...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-13T22:31:36.000Z ##

πŸ”΄ CVE-2026-22564 - Critical (9.8)

An Improper Access Control vulnerability could allow a malicious actor with access to the UniFi Play network to enable SSH to make unauthorized changes to the system.


Affected Products:
UniFi Play PowerAmp (Version 1.0.35 and earlier)

UniF...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22566
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-14T00:31:12

2 posts

An Improper Access Control vulnerability could allow a malicious actor with access to the UniFi Play network to obtain UniFi Play WiFi credentials.
 Affected Products: UniFi Play PowerAmp (Version 1.0.35 and earlier)
 UniFi Play Audio PortΒ  (Version 1.0.24 and earlier)
 Mitigation: Update UniFi Play PowerAmp to Version 1.0.38 or later
 Update UniFi Play Audio PortΒ  to Version 1.1.9 or later

thehackerwire@mastodon.social at 2026-04-13T22:31:45.000Z ##

🟠 CVE-2026-22566 - High (7.5)

An Improper Access Control vulnerability could allow a malicious actor with access to the UniFi Play network to obtain UniFi Play WiFi credentials.


Affected Products:
UniFi Play PowerAmp (Version 1.0.35 and earlier)

UniFi Play Audio Port ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-13T22:31:45.000Z ##

🟠 CVE-2026-22566 - High (7.5)

An Improper Access Control vulnerability could allow a malicious actor with access to the UniFi Play network to obtain UniFi Play WiFi credentials.


Affected Products:
UniFi Play PowerAmp (Version 1.0.35 and earlier)

UniFi Play Audio Port ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40164
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-14T00:16:07.360000

2 posts

jq is a command-line JSON processor. Before commit 0c7d133c3c7e37c00b6d46b658a02244fdd3c784, jq used MurmurHash3 with a hardcoded, publicly visible seed (0x432A9843) for all JSON object hash table operations, which allowed an attacker to precompute key collisions offline. By supplying a crafted JSON object (~100 KB) where all keys hashed to the same bucket, hash table lookups degraded from O(1) to

thehackerwire@mastodon.social at 2026-04-14T05:48:52.000Z ##

🟠 CVE-2026-40164 - High (7.5)

jq is a command-line JSON processor. Before commit 0c7d133c3c7e37c00b6d46b658a02244fdd3c784, jq used MurmurHash3 with a hardcoded, publicly visible seed (0x432A9843) for all JSON object hash table operations, which allowed an attacker to precomput...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-14T05:48:52.000Z ##

🟠 CVE-2026-40164 - High (7.5)

jq is a command-line JSON processor. Before commit 0c7d133c3c7e37c00b6d46b658a02244fdd3c784, jq used MurmurHash3 with a hardcoded, publicly visible seed (0x432A9843) for all JSON object hash table operations, which allowed an attacker to precomput...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27681
(9.9 CRITICAL)

EPSS: 0.00%

updated 2026-04-14T00:16:06.560000

4 posts

Due to insufficient authorization checks in SAP Business Planning and Consolidation and SAP Business Warehouse, an authenticated user can execute crafted SQL statements to read, modify, and delete database data. This leads to a high impact on the confidentiality, integrity, and availability of the system.

thehackerwire@mastodon.social at 2026-04-14T05:49:02.000Z ##

πŸ”΄ CVE-2026-27681 - Critical (9.9)

Due to insufficient authorization checks in SAP Business Planning and Consolidation and SAP Business Warehouse, an authenticated user can execute crafted SQL statements to read, modify, and delete database data. This leads to a high impact on the ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-04-14T01:30:29.854Z ##

🚨 CRITICAL: CVE-2026-27681 in SAP BPC & BW (CVSS 9.9). Authenticated users can inject SQL, risking data integrity & availability. No patch yet β€” restrict access & monitor DB activity. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-14T05:49:02.000Z ##

πŸ”΄ CVE-2026-27681 - Critical (9.9)

Due to insufficient authorization checks in SAP Business Planning and Consolidation and SAP Business Warehouse, an authenticated user can execute crafted SQL statements to read, modify, and delete database data. This leads to a high impact on the ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-14T01:30:29.000Z ##

🚨 CRITICAL: CVE-2026-27681 in SAP BPC & BW (CVSS 9.9). Authenticated users can inject SQL, risking data integrity & availability. No patch yet β€” restrict access & monitor DB activity. radar.offseq.com/threat/cve-20 #OffSeq #SAP #Vuln #SQLi

##

CVE-2026-33901
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-14T00:07:45

2 posts

A heap buffer overflow occurs in the MVG decoder that could result in an out of bounds write when processing a crafted image.

thehackerwire@mastodon.social at 2026-04-13T21:26:30.000Z ##

🟠 CVE-2026-33901 - High (7.5)

ImageMagick is free and open-source software used for editing and manipulating digital images. In versions below both 7.1.2-19 and 6.9.13-44, a heap buffer overflow occurs in the MVG decoder that could result in an out of bounds write when process...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-13T21:26:30.000Z ##

🟠 CVE-2026-33901 - High (7.5)

ImageMagick is free and open-source software used for editing and manipulating digital images. In versions below both 7.1.2-19 and 6.9.13-44, a heap buffer overflow occurs in the MVG decoder that could result in an out of bounds write when process...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33908
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-14T00:06:45

2 posts

Magick frees the memory of the XML tree via the `DestroyXMLTree` function; however, this process is executed recursively with no depth limit imposed. When magick processes an XML file with deeply nested structures, it will exhaust the stack memory, resulting in a Denial of Service (DoS) attack.

thehackerwire@mastodon.social at 2026-04-13T22:32:07.000Z ##

🟠 CVE-2026-33908 - High (7.5)

ImageMagick is free and open-source software used for editing and manipulating digital images. In versions below both 7.1.2-19 and 6.9.13-44, Magick frees the memory of the XML tree via the `DestroyXMLTree()` function; however, this process is exe...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-13T22:32:07.000Z ##

🟠 CVE-2026-33908 - High (7.5)

ImageMagick is free and open-source software used for editing and manipulating digital images. In versions below both 7.1.2-19 and 6.9.13-44, Magick frees the memory of the XML tree via the `DestroyXMLTree()` function; however, this process is exe...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22563
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-04-13T22:16:28.050000

4 posts

A series of Improper Input Validation vulnerabilities could allow a Command Injection by a malicious actor with access to the UniFi Play network. Affected Products: UniFi Play PowerAmp (Version 1.0.35 and earlier)
 UniFi Play Audio PortΒ  (Version 1.0.24 and earlier)
 Mitigation: Update UniFi Play PowerAmp to Version 1.0.38 or later
 Update UniFi Play Audio PortΒ  to Version 1.1.9 or later

offseq at 2026-04-14T00:00:39.802Z ##

CVE-2026-22563: Ubiquiti UniFi Play PowerAmp (≀1.0.35) & Audio Port (≀1.0.24) have a critical command injection flaw (CVSS 9.8). Network access = full compromise. Update to 1.0.38+/1.1.9+ ASAP! πŸ›‘οΈ radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-13T22:31:26.000Z ##

πŸ”΄ CVE-2026-22563 - Critical (9.8)

A series of Improper Input Validation vulnerabilities could allow a Command Injection by a malicious actor with access to the UniFi Play network.

Affected Products:
UniFi Play PowerAmp (Version 1.0.35 and earlier)

UniFi Play Audio Port  (Ver...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-14T00:00:39.000Z ##

CVE-2026-22563: Ubiquiti UniFi Play PowerAmp (≀1.0.35) & Audio Port (≀1.0.24) have a critical command injection flaw (CVSS 9.8). Network access = full compromise. Update to 1.0.38+/1.1.9+ ASAP! πŸ›‘οΈ radar.offseq.com/threat/cve-20 #OffSeq #CVE202622563 #infosec #patch

##

thehackerwire@mastodon.social at 2026-04-13T22:31:26.000Z ##

πŸ”΄ CVE-2026-22563 - Critical (9.8)

A series of Improper Input Validation vulnerabilities could allow a Command Injection by a malicious actor with access to the UniFi Play network.

Affected Products:
UniFi Play PowerAmp (Version 1.0.35 and earlier)

UniFi Play Audio Port  (Ver...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22562
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-04-13T22:16:27.870000

2 posts

A malicious actor with access to the UniFi Play network could exploit a Path Traversal vulnerability found in the device firmware to write files on the system that could be used for a remote code execution (RCE). Affected Products: UniFi Play PowerAmp (Version 1.0.35 and earlier)
UniFi Play Audio PortΒ  (Version 1.0.24 and earlier)
 Mitigation: Update UniFi Play PowerAmp to Version 1.0.38 or lat

thehackerwire@mastodon.social at 2026-04-14T05:49:12.000Z ##

πŸ”΄ CVE-2026-22562 - Critical (9.8)

A malicious actor with access to the UniFi Play network could exploit a Path Traversal vulnerability found in the device firmware to write files on the system that could be used for a remote code execution (RCE).

Affected Products:
UniFi Play Po...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-14T05:49:12.000Z ##

πŸ”΄ CVE-2026-22562 - Critical (9.8)

A malicious actor with access to the UniFi Play network could exploit a Path Traversal vulnerability found in the device firmware to write files on the system that could be used for a remote code execution (RCE).

Affected Products:
UniFi Play Po...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30999
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-13T21:31:47

2 posts

A heap buffer overflow in the av_bprint_finalize() function of FFmpeg v8.0.1 allows attackers to cause a Denial of Service (DoS) via a crafted input.

thehackerwire@mastodon.social at 2026-04-13T22:00:12.000Z ##

🟠 CVE-2026-30999 - High (7.5)

A heap buffer overflow in the av_bprint_finalize() function of FFmpeg v8.0.1 allows attackers to cause a Denial of Service (DoS) via a crafted input.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-13T22:00:12.000Z ##

🟠 CVE-2026-30999 - High (7.5)

A heap buffer overflow in the av_bprint_finalize() function of FFmpeg v8.0.1 allows attackers to cause a Denial of Service (DoS) via a crafted input.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30997
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-13T21:31:47

2 posts

An out-of-bounds read in the read_global_param() function (libavcodec/av1dec.c) of FFmpeg v8.0.1 allows attackers to cause a Denial of Service (DoS) via a crafted input.

thehackerwire@mastodon.social at 2026-04-13T21:59:52.000Z ##

🟠 CVE-2026-30997 - High (7.5)

An out-of-bounds read in the read_global_param() function (libavcodec/av1dec.c) of FFmpeg v8.0.1 allows attackers to cause a Denial of Service (DoS) via a crafted input.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-13T21:59:52.000Z ##

🟠 CVE-2026-30997 - High (7.5)

An out-of-bounds read in the read_global_param() function (libavcodec/av1dec.c) of FFmpeg v8.0.1 allows attackers to cause a Denial of Service (DoS) via a crafted input.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-66769
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-13T21:31:47

2 posts

A NULL pointer dereference in Nitro PDF Pro for Windows v14.41.1.4 allows attackers to cause a Denial of Service (DoS) via a crafted XFA packet.

thehackerwire@mastodon.social at 2026-04-13T21:26:40.000Z ##

🟠 CVE-2025-66769 - High (7.5)

A NULL pointer dereference in Nitro PDF Pro for Windows v14.41.1.4 allows attackers to cause a Denial of Service (DoS) via a crafted XFA packet.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-13T21:26:40.000Z ##

🟠 CVE-2025-66769 - High (7.5)

A NULL pointer dereference in Nitro PDF Pro for Windows v14.41.1.4 allows attackers to cause a Denial of Service (DoS) via a crafted XFA packet.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40044
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-04-13T21:30:51

2 posts

Pachno 1.0.6 contains a deserialization vulnerability that allows unauthenticated attackers to execute arbitrary code by injecting malicious serialized objects into cache files. Attackers can write PHP object payloads to world-writable cache files with predictable names in the cache directory, which are unserialized during framework bootstrap before authentication checks occur.

thehackerwire@mastodon.social at 2026-04-13T19:55:21.000Z ##

πŸ”΄ CVE-2026-40044 - Critical (9.8)

Pachno 1.0.6 contains a deserialization vulnerability that allows unauthenticated attackers to execute arbitrary code by injecting malicious serialized objects into cache files. Attackers can write PHP object payloads to world-writable cache files...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-13T19:55:21.000Z ##

πŸ”΄ CVE-2026-40044 - Critical (9.8)

Pachno 1.0.6 contains a deserialization vulnerability that allows unauthenticated attackers to execute arbitrary code by injecting malicious serialized objects into cache files. Attackers can write PHP object payloads to world-writable cache files...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6198
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-13T21:30:51

2 posts

A vulnerability has been found in Tenda F456 1.0.0.5. This issue affects the function fromNatStaticSetting of the file /goform/NatStaticSetting. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

thehackerwire@mastodon.social at 2026-04-13T19:55:11.000Z ##

🟠 CVE-2026-6198 - High (8.8)

A vulnerability has been found in Tenda F456 1.0.0.5. This issue affects the function fromNatStaticSetting of the file /goform/NatStaticSetting. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to initiate...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-13T19:55:11.000Z ##

🟠 CVE-2026-6198 - High (8.8)

A vulnerability has been found in Tenda F456 1.0.0.5. This issue affects the function fromNatStaticSetting of the file /goform/NatStaticSetting. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to initiate...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6197
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-13T21:30:51

2 posts

A flaw has been found in Tenda F456 1.0.0.5. This vulnerability affects the function formWrlsafeset of the file /goform/AdvSetWrlsafeset. Executing a manipulation of the argument mit_ssid can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been published and may be used.

thehackerwire@mastodon.social at 2026-04-13T19:22:33.000Z ##

🟠 CVE-2026-6197 - High (8.8)

A flaw has been found in Tenda F456 1.0.0.5. This vulnerability affects the function formWrlsafeset of the file /goform/AdvSetWrlsafeset. Executing a manipulation of the argument mit_ssid can lead to stack-based buffer overflow. The attack may be ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-13T19:22:33.000Z ##

🟠 CVE-2026-6197 - High (8.8)

A flaw has been found in Tenda F456 1.0.0.5. This vulnerability affects the function formWrlsafeset of the file /goform/AdvSetWrlsafeset. Executing a manipulation of the argument mit_ssid can lead to stack-based buffer overflow. The attack may be ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34621
(8.6 HIGH)

EPSS: 0.04%

updated 2026-04-13T21:23:27

23 posts

Acrobat Reader versions 24.001.30356, 26.001.21367 and earlier are affected by an Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

2 repos

https://github.com/ercihan/CVE-2026-34621

https://github.com/eduardorossi84/CVE-2026-34621-POC

bettycjung.bsky.social@bsky.brid.gy at 2026-04-14T05:19:13.178Z ##

The vulnerability, assigned the CVE identifier CVE-2026-34621, carries a CVSS score of 8.6 out of 10.0. Successful exploitation of the flaw could allow an attacker to run malicious code on affected installations.

##

bettycjung.bsky.social@bsky.brid.gy at 2026-04-14T05:09:12.377Z ##

Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621 thehackernews.com/2026/04/adob...

Adobe Patches Actively Exploit...

##

youranonnewsirc@nerdculture.de at 2026-04-13T22:31:39.000Z ##

The U.S. initiated a naval blockade on all Iranian ports today, following failed peace talks, escalating tensions and causing oil prices to surge. The UK stated it would not support this action. In cybersecurity, Adobe released emergency patches for a critical, actively exploited zero-day in Acrobat and Reader (CVE-2026-34621). Additionally, a critical vulnerability in the Marimo open-source Python notebook platform (CVE-2026-39987) is now under active exploitation, allowing remote code execution. A U.S. DOT report also revealed significant cybersecurity gaps in 45 critical FAA air traffic systems.

#AnonNews_irc #Cybersecurity #News

##

Chris@mast.social at 2026-04-13T21:14:18.000Z ##

CISA Adds Seven Known Exploited Vulnerabilities to Catalog

CVE-2012-1854 Visual Basic for Applications Insecure Library Loading

CVE-2020-9715 Adobe Acrobat Use-After-Free

CVE-2023-21529 Microsoft Exchange Deserialization of Untrusted

CVE-2023-36424 Microsoft Windows Out-of-Bounds Read

CVE-2025-60710 Microsoft Windows Link Following

CVE-2026-21643 Fortinet SQL Injection

CVE-2026-34621 Adobe Acrobat Reader Prototype

cisa.gov/news-events/alerts/20

#cybersecurity #cisa #adobe #microsoft

##

secdb at 2026-04-13T20:00:16.275Z ##

🚨 [CISA-2026:0413] CISA Adds 7 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 7 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2012-1854 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Visual Basic for Applications (VBA)
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2020-9715 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat
- Notes: helpx.adobe.com/security/produ ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-21529 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Exchange Server
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-36424 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Out-of-Bounds Read Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-60710 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Link Following Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21643 (secdb.nttzen.cloud/cve/detail/)
- Name: Fortinet SQL Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Fortinet
- Product: FortiClient EMS
- Notes: fortiguard.fortinet.com/psirt/ ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-34621 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat and Reader Prototype Pollution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat and Reader
- Notes: helpx.adobe.com/security/produ ; nvd.nist.gov/vuln/detail/CVE-2

##

AAKL at 2026-04-13T19:27:36.582Z ##

CISA has updated the KEV catalogue:

- CVE-2026-34621: Adobe Acrobat and Reader Prototype Pollution Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21643: Fortinet SQL Injection Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2020-9715: Adobe Acrobat Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2020-

- CVE-2023-36424: Microsoft Windows Out-of-Bounds Read Vulnerability cve.org/CVERecord?id=CVE-2023-

- CVE-2023-21529: Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability cve.org/CVERecord?id=CVE-2023-

- CVE-2025-60710: Microsoft Windows Link Following Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2012-1854: Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability cve.org/CVERecord?id=CVE-2012-

##

cisakevtracker@mastodon.social at 2026-04-13T18:02:37.000Z ##

CVE ID: CVE-2026-34621
Vendor: Adobe
Product: Acrobat and Reader
Date Added: 2026-04-13
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

undercodenews@mastodon.social at 2026-04-13T16:28:47.000Z ##

Adobe Emergency Patch Fixes Actively Exploited Acrobat Zero-Day (CVE-2026-34621)

Introduction Adobe has released an urgent security update addressing a high-risk vulnerability in Acrobat Reader and Acrobat products that has already been exploited in real-world attacks. The flaw, tracked as CVE-2026-34621, is particularly dangerous because it enables attackers to bypass sandbox protections and execute malicious code simply by convincing a user to open a crafted PDF…

undercodenews.com/adobe-emerge

##

oversecurity@mastodon.social at 2026-04-13T15:50:30.000Z ##

Adobe rolls out emergency fix for Acrobat, Reader zero-day flaw

Adobe has released an emergency security update for Acrobat Reader to fix a vulnerability, tracked as CVE-2026-34621, that has been exploited in...

πŸ”—οΈ [Bleepingcomputer] link.is.it/1HWevZ

##

bettycjung.bsky.social@bsky.brid.gy at 2026-04-14T05:09:12.377Z ##

Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621 thehackernews.com/2026/04/adob...

Adobe Patches Actively Exploit...

##

youranonnewsirc@nerdculture.de at 2026-04-13T22:31:39.000Z ##

The U.S. initiated a naval blockade on all Iranian ports today, following failed peace talks, escalating tensions and causing oil prices to surge. The UK stated it would not support this action. In cybersecurity, Adobe released emergency patches for a critical, actively exploited zero-day in Acrobat and Reader (CVE-2026-34621). Additionally, a critical vulnerability in the Marimo open-source Python notebook platform (CVE-2026-39987) is now under active exploitation, allowing remote code execution. A U.S. DOT report also revealed significant cybersecurity gaps in 45 critical FAA air traffic systems.

#AnonNews_irc #Cybersecurity #News

##

secdb@infosec.exchange at 2026-04-13T20:00:16.000Z ##

🚨 [CISA-2026:0413] CISA Adds 7 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 7 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2012-1854 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Visual Basic for Applications (VBA)
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2020-9715 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat
- Notes: helpx.adobe.com/security/produ ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-21529 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Exchange Server
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-36424 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Out-of-Bounds Read Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-60710 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Link Following Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21643 (secdb.nttzen.cloud/cve/detail/)
- Name: Fortinet SQL Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Fortinet
- Product: FortiClient EMS
- Notes: fortiguard.fortinet.com/psirt/ ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-34621 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat and Reader Prototype Pollution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat and Reader
- Notes: helpx.adobe.com/security/produ ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260413 #cisa20260413 #cve_2012_1854 #cve_2020_9715 #cve_2023_21529 #cve_2023_36424 #cve_2025_60710 #cve_2026_21643 #cve_2026_34621 #cve20121854 #cve20209715 #cve202321529 #cve202336424 #cve202560710 #cve202621643 #cve202634621

##

AAKL@infosec.exchange at 2026-04-13T19:27:36.000Z ##

CISA has updated the KEV catalogue:

- CVE-2026-34621: Adobe Acrobat and Reader Prototype Pollution Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21643: Fortinet SQL Injection Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2020-9715: Adobe Acrobat Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2020-

- CVE-2023-36424: Microsoft Windows Out-of-Bounds Read Vulnerability cve.org/CVERecord?id=CVE-2023-

- CVE-2023-21529: Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability cve.org/CVERecord?id=CVE-2023-

- CVE-2025-60710: Microsoft Windows Link Following Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2012-1854: Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability cve.org/CVERecord?id=CVE-2012- #CISA #Microsoft #Windows #Adobe #Fortinet #infosec #vulnerability

##

cisakevtracker@mastodon.social at 2026-04-13T18:02:37.000Z ##

CVE ID: CVE-2026-34621
Vendor: Adobe
Product: Acrobat and Reader
Date Added: 2026-04-13
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

oversecurity@mastodon.social at 2026-04-13T15:50:30.000Z ##

Adobe rolls out emergency fix for Acrobat, Reader zero-day flaw

Adobe has released an emergency security update for Acrobat Reader to fix a vulnerability, tracked as CVE-2026-34621, that has been exploited in...

πŸ”—οΈ [Bleepingcomputer] link.is.it/1HWevZ

##

youranonnewsirc@nerdculture.de at 2026-04-13T14:32:11.000Z ##

Recent global developments include a major cybersecurity breach, ongoing geopolitical tensions, and critical advancements in AI. A hacker leveraged AI platforms (Claude Code, GPT-4.1) to compromise nine Mexican government agencies, exfiltrating millions of records (Apr 12). Rockstar Games faces a ransom threat from ShinyHunters following a supply-chain cyberattack (Apr 12). Adobe also issued an emergency patch for a critical Acrobat Reader zero-day (CVE-2026-34621) actively exploited since December (Apr 12). Geopolitically, US-Iran talks in Pakistan to end their six-week conflict concluded without agreement, impacting oil markets and the Strait of Hormuz (Apr 12-13). In technology, Anthropic has withheld its new AI model, "Claude Mythos Preview," due to its advanced capability in discovering software vulnerabilities, deeming it too risky for public release (Apr 12).

#Cybersecurity #TechNews #Geopolitics

##

decio@infosec.exchange at 2026-04-13T12:20:54.000Z ##

Le patch est dΓ©sormais dispo:

"*Adobe has released a security update for Adobe Acrobat and Reader for Windows and macOS. This update addresses a critical vulnerability. Successful exploitation could lead to arbitrary code execution.

β€―Adobe is aware of CVE-2026-34621 being exploited in the wild.*"
πŸ‘‡
helpx.adobe.com/security/produ

#CyberVeille #CVE_2026_34621

##

oversecurity@mastodon.social at 2026-04-13T08:30:38.000Z ##

Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621

Adobe has issued emergency security updates addressing a severe Acrobat Reader flaw tracked as CVE-2026-34621, a high-impact Adobe vulnerability...

πŸ”—οΈ [Thecyberexpress] link.is.it/pTL1zP

##

youranonnewsirc@nerdculture.de at 2026-04-13T06:32:04.000Z ##

Geopolitical: US-Iran peace talks failed, raising Strait of Hormuz blockade threat and soaring oil prices (April 12-13).

Tech: Japan allocates $4B for Rapidus to accelerate 2nm AI chip production by 2027 (April 12). Harvard unveils "Cascade" AI for faster quantum error correction (April 12).

Cybersecurity: Adobe issued emergency patch for actively exploited Acrobat zero-day (CVE-2026-34621) (April 12). Iran-linked groups persist in targeting US industrial control systems (April 11-12).

#AnonNews_irc #Cybersecurity #Anonymous #News

##

beyondmachines1@infosec.exchange at 2026-04-12T11:01:10.000Z ##

Adobe Issues Emergency Patch for Actively Exploited Acrobat Reader Zero-Day

Adobe released emergency patches for CVE-2026-34621, a critical prototype pollution vulnerability in Acrobat and Reader that is being actively exploited to run arbitrary code via malicious PDF files.

**Update your Adobe Acrobat and Reader immediately because attackers are already using this flaw to take over computers through simple PDF files. If you cannot patch right away, use a browser-based PDF viewer as a temporary safety measure and disable Javascript in your Adobe Acrobat and Reader.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

thehackerwire@mastodon.social at 2026-04-12T03:27:53.000Z ##

πŸ”΄ CVE-2026-34621 - Critical (9.6)

Acrobat Reader versions 24.001.30356, 26.001.21367 and earlier are affected by an Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') vulnerability that could result in arbitrary code execution in the context ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-11T11:30:30.000Z ##

🚨 CRITICAL: CVE-2026-34621 in Adobe Acrobat Reader (≀26.001.21367) enables arbitrary code execution via prototype pollution if a user opens a malicious file. No patch yet β€” exercise caution! radar.offseq.com/threat/cve-20 #OffSeq #Adobe #Security

##

offseq@infosec.exchange at 2026-04-11T10:30:28.000Z ##

🚨 CRITICAL: CVE-2026-34621 in Adobe Acrobat Reader (≀26.001.21367) enables prototype pollution & arbitrary code execution via malicious files. No patch yet β€” avoid opening untrusted PDFs. Monitor advisories. radar.offseq.com/threat/cve-20 #OffSeq #Adobe #Vuln #Infosec

##

CVE-2026-35650
(7.5 HIGH)

EPSS: 0.06%

updated 2026-04-13T20:46:42.373000

1 posts

OpenClaw before 2026.3.22 contains an environment variable override handling vulnerability that allows attackers to bypass the shared host environment policy through inconsistent sanitization paths. Attackers can supply blocked or malformed override keys that slip through inconsistent validation to execute arbitrary code with unintended environment variables.

thehackerwire@mastodon.social at 2026-04-11T07:00:35.000Z ##

🟠 CVE-2026-35650 - High (7.5)

OpenClaw before 2026.3.22 contains an environment variable override handling vulnerability that allows attackers to bypass the shared host environment policy through inconsistent sanitization paths. Attackers can supply blocked or malformed overri...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35668
(7.7 HIGH)

EPSS: 0.05%

updated 2026-04-13T20:43:10.547000

2 posts

OpenClaw before 2026.3.24 contains a path traversal vulnerability in sandbox enforcement allowing sandboxed agents to read arbitrary files from other agents' workspaces via unnormalized mediaUrl or fileUrl parameter keys. Attackers can exploit incomplete parameter validation in normalizeSandboxMediaParams and missing mediaLocalRoots context to access sensitive files including API keys and configur

thehackerwire@mastodon.social at 2026-04-11T06:14:10.000Z ##

🟠 CVE-2026-35668 - High (7.7)

OpenClaw before 2026.3.24 contains a path traversal vulnerability in sandbox enforcement allowing sandboxed agents to read arbitrary files from other agents' workspaces via unnormalized mediaUrl or fileUrl parameter keys. Attackers can exploit inc...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-11T06:11:01.000Z ##

🟠 CVE-2026-35668 - High (7.7)

OpenClaw before 2026.3.24 contains a path traversal vulnerability in sandbox enforcement allowing sandboxed agents to read arbitrary files from other agents' workspaces via unnormalized mediaUrl or fileUrl parameter keys. Attackers can exploit inc...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35663
(8.8 HIGH)

EPSS: 0.04%

updated 2026-04-13T20:39:05.993000

1 posts

OpenClaw before 2026.3.25 contains a privilege escalation vulnerability allowing non-admin operators to self-request broader scopes during backend reconnect. Attackers can bypass pairing requirements to reconnect as operator.admin, gaining unauthorized administrative privileges.

thehackerwire@mastodon.social at 2026-04-11T06:11:10.000Z ##

🟠 CVE-2026-35663 - High (8.8)

OpenClaw before 2026.3.25 contains a privilege escalation vulnerability allowing non-admin operators to self-request broader scopes during backend reconnect. Attackers can bypass pairing requirements to reconnect as operator.admin, gaining unautho...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30998
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-13T20:16:33.003000

2 posts

An improper resource deallocation and closure vulnerability in the tools/zmqsend.c component of FFmpeg v8.0.1 allows attackers to cause a Denial of Service (DoS) via supplying a crafted input file.

thehackerwire@mastodon.social at 2026-04-13T22:00:02.000Z ##

🟠 CVE-2026-30998 - High (7.5)

An improper resource deallocation and closure vulnerability in the tools/zmqsend.c component of FFmpeg v8.0.1 allows attackers to cause a Denial of Service (DoS) via supplying a crafted input file.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-13T22:00:02.000Z ##

🟠 CVE-2026-30998 - High (7.5)

An improper resource deallocation and closure vulnerability in the tools/zmqsend.c component of FFmpeg v8.0.1 allows attackers to cause a Denial of Service (DoS) via supplying a crafted input file.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69624
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-13T20:16:26.437000

2 posts

Nitro PDF Pro for Windows 14.41.1.4 contains a NULL pointer dereference vulnerability in the JavaScript implementation of app.alert(). When app.alert() is called with more than one argument and the first argument evaluates to null (for example, app.alert(app.activeDocs, true) when app.activeDocs is null), the engine routes the call through a fallback path intended for non-string arguments. In this

thehackerwire@mastodon.social at 2026-04-13T21:26:51.000Z ##

🟠 CVE-2025-69624 - High (7.5)

Nitro PDF Pro for Windows 14.41.1.4 contains a NULL pointer dereference vulnerability in the JavaScript implementation of app.alert(). When app.alert() is called with more than one argument and the first argument evaluates to null (for example, ap...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-13T21:26:51.000Z ##

🟠 CVE-2025-69624 - High (7.5)

Nitro PDF Pro for Windows 14.41.1.4 contains a NULL pointer dereference vulnerability in the JavaScript implementation of app.alert(). When app.alert() is called with more than one argument and the first argument evaluates to null (for example, ap...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35641
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-13T20:14:11.753000

1 posts

OpenClaw before 2026.3.24 contains an arbitrary code execution vulnerability in local plugin and hook installation that allows attackers to execute malicious code by crafting a .npmrc file with a git executable override. During npm install execution in the staged package directory, attackers can leverage git dependencies to trigger execution of arbitrary programs specified in the attacker-controll

thehackerwire@mastodon.social at 2026-04-11T07:00:48.000Z ##

🟠 CVE-2026-35641 - High (7.8)

OpenClaw before 2026.3.24 contains an arbitrary code execution vulnerability in local plugin and hook installation that allows attackers to execute malicious code by crafting a .npmrc file with a git executable override. During npm install executi...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34197
(8.8 HIGH)

EPSS: 6.22%

updated 2026-04-13T19:21:56

1 posts

Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ. Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bridge atΒ /api/jolokia/ on the web console. The default Jolokia access policy permitsΒ exec operations on all ActiveMQΒ MBeans (org.apache.activemq:*), including BrokerService.addNetworkConnector(String) a

Nuclei template

6 repos

https://github.com/DEVSECURITYSPRO/CVE-2026-34197

https://github.com/0xBlackash/CVE-2026-34197

https://github.com/AtoposX-J/CVE-2026-34197-Apache-ActiveMQ-RCE

https://github.com/hg0434hongzh0/CVE-2026-34197

https://github.com/KONDORDEVSECURITYCORP/CVE-2026-34197

https://github.com/dinosn/CVE-2026-34197

secdb@infosec.exchange at 2026-04-13T00:01:20.000Z ##

πŸ“ˆ CVE Published in last 7 days (2026-04-06 - 2026-04-13)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1590

Severity:
- Critical: 126
- High: 530
- Medium: 671
- Low: 50
- None: 213

Status:
- : 7
- Analyzed: 175
- Awaiting Analysis: 513
- Modified: 12
- Received: 645
- Rejected: 14
- Undergoing Analysis: 224

Top CNAs:
- GitHub, Inc.: 462
- VulDB: 202
- Patchstack: 175
- MITRE: 115
- Wordfence: 95
- VulnCheck: 92
- Chrome: 60
- Apache Software Foundation: 31
- Juniper Networks, Inc.: 27
- wolfSSL Inc.: 22

Top Affected Products:
- UNKNOWN: 1354
- Dlink Di-8003 Firmware: 27
- Openclaw: 27
- Churchcrm: 24
- Qualcomm Fastconnect 7800 Firmware: 16
- Qualcomm Wsa8840 Firmware: 16
- Qualcomm Wcd9385 Firmware: 16
- Qualcomm Fastconnect 6900 Firmware: 16
- Qualcomm Wsa8845h Firmware: 16
- Qualcomm Wcd9380 Firmware: 16

Top EPSS Score:
- CVE-2026-34197 - 5.60 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34885 - 5.14 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39365 - 3.12 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5677 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5678 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5688 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5689 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5690 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5691 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5692 - 2.96 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-6200
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-13T19:16:58.240000

2 posts

A vulnerability was determined in Tenda F456 1.0.0.5. The affected element is the function formwebtypelibrary of the file /goform/webtypelibrary. This manipulation of the argument menufacturer/Go causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-04-13T19:22:23.000Z ##

🟠 CVE-2026-6200 - High (8.8)

A vulnerability was determined in Tenda F456 1.0.0.5. The affected element is the function formwebtypelibrary of the file /goform/webtypelibrary. This manipulation of the argument menufacturer/Go causes stack-based buffer overflow. The attack can ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-13T19:22:23.000Z ##

🟠 CVE-2026-6200 - High (8.8)

A vulnerability was determined in Tenda F456 1.0.0.5. The affected element is the function formwebtypelibrary of the file /goform/webtypelibrary. This manipulation of the argument menufacturer/Go causes stack-based buffer overflow. The attack can ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6199
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-13T19:16:58.033000

2 posts

A vulnerability was found in Tenda F456 1.0.0.5. Impacted is the function fromqossetting of the file /goform/qossetting. The manipulation of the argument page results in stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been made public and could be used.

thehackerwire@mastodon.social at 2026-04-13T19:22:12.000Z ##

🟠 CVE-2026-6199 - High (8.8)

A vulnerability was found in Tenda F456 1.0.0.5. Impacted is the function fromqossetting of the file /goform/qossetting. The manipulation of the argument page results in stack-based buffer overflow. It is possible to launch the attack remotely. Th...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-13T19:22:12.000Z ##

🟠 CVE-2026-6199 - High (8.8)

A vulnerability was found in Tenda F456 1.0.0.5. Impacted is the function fromqossetting of the file /goform/qossetting. The manipulation of the argument page results in stack-based buffer overflow. It is possible to launch the attack remotely. Th...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40042
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-04-13T19:16:51.960000

2 posts

Pachno 1.0.6 contains an XML external entity injection vulnerability that allows unauthenticated attackers to read arbitrary files by exploiting unsafe XML parsing in the TextParser helper. Attackers can inject malicious XML entities through wiki table syntax and inline tags in issue descriptions, comments, and wiki articles to trigger entity resolution via simplexml_load_string() without LIBXML_N

thehackerwire@mastodon.social at 2026-04-13T19:59:56.000Z ##

πŸ”΄ CVE-2026-40042 - Critical (9.8)

Pachno 1.0.6 contains an XML external entity injection vulnerability that allows unauthenticated attackers to read arbitrary files by exploiting unsafe XML parsing in the TextParser helper. Attackers can inject malicious XML entities through wiki ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-13T19:59:56.000Z ##

πŸ”΄ CVE-2026-40042 - Critical (9.8)

Pachno 1.0.6 contains an XML external entity injection vulnerability that allows unauthenticated attackers to read arbitrary files by exploiting unsafe XML parsing in the TextParser helper. Attackers can inject malicious XML entities through wiki ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40040
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-13T19:16:51.617000

2 posts

Pachno 1.0.6 contains an unrestricted file upload vulnerability that allows authenticated users to upload arbitrary file types by bypassing ineffective extension filtering to the /uploadfile endpoint. Attackers can upload executable files .php5 scripts to web-accessible directories and execute them to achieve remote code execution on the server.

thehackerwire@mastodon.social at 2026-04-13T19:55:33.000Z ##

🟠 CVE-2026-40040 - High (8.8)

Pachno 1.0.6 contains an unrestricted file upload vulnerability that allows authenticated users to upload arbitrary file types by bypassing ineffective extension filtering to the /uploadfile endpoint. Attackers can upload executable files .php5 sc...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-13T19:55:33.000Z ##

🟠 CVE-2026-40040 - High (8.8)

Pachno 1.0.6 contains an unrestricted file upload vulnerability that allows authenticated users to upload arbitrary file types by bypassing ineffective extension filtering to the /uploadfile endpoint. Attackers can upload executable files .php5 sc...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2023-21529
(8.8 HIGH)

EPSS: 36.68%

updated 2026-04-13T19:00:02.583000

9 posts

Microsoft Exchange Server Remote Code Execution Vulnerability

beyondmachines1 at 2026-04-14T08:01:09.289Z ##

CISA Reports Active Exploitation of Four Microsoft Vulnerabilities, Including a 14-Year-Old Flaw

CISA flagged four actively exploited Microsoft vulnerabilities, spanning from 2012 to 2025 covering privilege escalation, remote code execution in Exchange Server, and insecure library loading, with at least one (CVE-2023-21529) tied to Storm-1175's Medusa ransomware campaigns. US Federal agencies must patch all four by April 27, 2026.

**Most of these flaws are old. So if you haven't patched your systems for over a year - let alone 14 years, it's high time to do it today. Because hackers don't care how old a vulnerability is. It's still usable. If you're still running Exchange Server 2013, 2016, or 2019 on-premises, prioritize patching or migrating those immediately.**

beyondmachines.net/event_detai

##

Chris@mast.social at 2026-04-13T21:14:18.000Z ##

CISA Adds Seven Known Exploited Vulnerabilities to Catalog

CVE-2012-1854 Visual Basic for Applications Insecure Library Loading

CVE-2020-9715 Adobe Acrobat Use-After-Free

CVE-2023-21529 Microsoft Exchange Deserialization of Untrusted

CVE-2023-36424 Microsoft Windows Out-of-Bounds Read

CVE-2025-60710 Microsoft Windows Link Following

CVE-2026-21643 Fortinet SQL Injection

CVE-2026-34621 Adobe Acrobat Reader Prototype

cisa.gov/news-events/alerts/20

#cybersecurity #cisa #adobe #microsoft

##

secdb at 2026-04-13T20:00:16.275Z ##

🚨 [CISA-2026:0413] CISA Adds 7 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 7 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2012-1854 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Visual Basic for Applications (VBA)
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2020-9715 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat
- Notes: helpx.adobe.com/security/produ ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-21529 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Exchange Server
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-36424 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Out-of-Bounds Read Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-60710 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Link Following Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21643 (secdb.nttzen.cloud/cve/detail/)
- Name: Fortinet SQL Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Fortinet
- Product: FortiClient EMS
- Notes: fortiguard.fortinet.com/psirt/ ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-34621 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat and Reader Prototype Pollution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat and Reader
- Notes: helpx.adobe.com/security/produ ; nvd.nist.gov/vuln/detail/CVE-2

##

AAKL at 2026-04-13T19:27:36.582Z ##

CISA has updated the KEV catalogue:

- CVE-2026-34621: Adobe Acrobat and Reader Prototype Pollution Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21643: Fortinet SQL Injection Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2020-9715: Adobe Acrobat Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2020-

- CVE-2023-36424: Microsoft Windows Out-of-Bounds Read Vulnerability cve.org/CVERecord?id=CVE-2023-

- CVE-2023-21529: Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability cve.org/CVERecord?id=CVE-2023-

- CVE-2025-60710: Microsoft Windows Link Following Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2012-1854: Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability cve.org/CVERecord?id=CVE-2012-

##

cisakevtracker@mastodon.social at 2026-04-13T18:01:35.000Z ##

CVE ID: CVE-2023-21529
Vendor: Microsoft
Product: Exchange Server
Date Added: 2026-04-13
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

beyondmachines1@infosec.exchange at 2026-04-14T08:01:09.000Z ##

CISA Reports Active Exploitation of Four Microsoft Vulnerabilities, Including a 14-Year-Old Flaw

CISA flagged four actively exploited Microsoft vulnerabilities, spanning from 2012 to 2025 covering privilege escalation, remote code execution in Exchange Server, and insecure library loading, with at least one (CVE-2023-21529) tied to Storm-1175's Medusa ransomware campaigns. US Federal agencies must patch all four by April 27, 2026.

**Most of these flaws are old. So if you haven't patched your systems for over a year - let alone 14 years, it's high time to do it today. Because hackers don't care how old a vulnerability is. It's still usable. If you're still running Exchange Server 2013, 2016, or 2019 on-premises, prioritize patching or migrating those immediately.**
#cybersecurity #infosec #advisory #ransomware
beyondmachines.net/event_detai

##

secdb@infosec.exchange at 2026-04-13T20:00:16.000Z ##

🚨 [CISA-2026:0413] CISA Adds 7 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 7 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2012-1854 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Visual Basic for Applications (VBA)
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2020-9715 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat
- Notes: helpx.adobe.com/security/produ ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-21529 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Exchange Server
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-36424 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Out-of-Bounds Read Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-60710 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Link Following Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21643 (secdb.nttzen.cloud/cve/detail/)
- Name: Fortinet SQL Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Fortinet
- Product: FortiClient EMS
- Notes: fortiguard.fortinet.com/psirt/ ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-34621 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat and Reader Prototype Pollution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat and Reader
- Notes: helpx.adobe.com/security/produ ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260413 #cisa20260413 #cve_2012_1854 #cve_2020_9715 #cve_2023_21529 #cve_2023_36424 #cve_2025_60710 #cve_2026_21643 #cve_2026_34621 #cve20121854 #cve20209715 #cve202321529 #cve202336424 #cve202560710 #cve202621643 #cve202634621

##

AAKL@infosec.exchange at 2026-04-13T19:27:36.000Z ##

CISA has updated the KEV catalogue:

- CVE-2026-34621: Adobe Acrobat and Reader Prototype Pollution Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21643: Fortinet SQL Injection Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2020-9715: Adobe Acrobat Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2020-

- CVE-2023-36424: Microsoft Windows Out-of-Bounds Read Vulnerability cve.org/CVERecord?id=CVE-2023-

- CVE-2023-21529: Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability cve.org/CVERecord?id=CVE-2023-

- CVE-2025-60710: Microsoft Windows Link Following Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2012-1854: Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability cve.org/CVERecord?id=CVE-2012- #CISA #Microsoft #Windows #Adobe #Fortinet #infosec #vulnerability

##

cisakevtracker@mastodon.social at 2026-04-13T18:01:35.000Z ##

CVE ID: CVE-2023-21529
Vendor: Microsoft
Product: Exchange Server
Date Added: 2026-04-13
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-21643
(9.8 CRITICAL)

EPSS: 13.70%

updated 2026-04-13T19:00:02.583000

7 posts

An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiClientEMS 7.4.4 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.

Nuclei template

2 repos

https://github.com/alirezac0/CVE-2026-21643

https://github.com/0xBlackash/CVE-2026-21643

Chris@mast.social at 2026-04-13T21:14:18.000Z ##

CISA Adds Seven Known Exploited Vulnerabilities to Catalog

CVE-2012-1854 Visual Basic for Applications Insecure Library Loading

CVE-2020-9715 Adobe Acrobat Use-After-Free

CVE-2023-21529 Microsoft Exchange Deserialization of Untrusted

CVE-2023-36424 Microsoft Windows Out-of-Bounds Read

CVE-2025-60710 Microsoft Windows Link Following

CVE-2026-21643 Fortinet SQL Injection

CVE-2026-34621 Adobe Acrobat Reader Prototype

cisa.gov/news-events/alerts/20

#cybersecurity #cisa #adobe #microsoft

##

secdb at 2026-04-13T20:00:16.275Z ##

🚨 [CISA-2026:0413] CISA Adds 7 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 7 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2012-1854 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Visual Basic for Applications (VBA)
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2020-9715 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat
- Notes: helpx.adobe.com/security/produ ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-21529 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Exchange Server
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-36424 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Out-of-Bounds Read Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-60710 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Link Following Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21643 (secdb.nttzen.cloud/cve/detail/)
- Name: Fortinet SQL Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Fortinet
- Product: FortiClient EMS
- Notes: fortiguard.fortinet.com/psirt/ ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-34621 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat and Reader Prototype Pollution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat and Reader
- Notes: helpx.adobe.com/security/produ ; nvd.nist.gov/vuln/detail/CVE-2

##

AAKL at 2026-04-13T19:27:36.582Z ##

CISA has updated the KEV catalogue:

- CVE-2026-34621: Adobe Acrobat and Reader Prototype Pollution Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21643: Fortinet SQL Injection Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2020-9715: Adobe Acrobat Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2020-

- CVE-2023-36424: Microsoft Windows Out-of-Bounds Read Vulnerability cve.org/CVERecord?id=CVE-2023-

- CVE-2023-21529: Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability cve.org/CVERecord?id=CVE-2023-

- CVE-2025-60710: Microsoft Windows Link Following Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2012-1854: Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability cve.org/CVERecord?id=CVE-2012-

##

cisakevtracker@mastodon.social at 2026-04-13T18:02:22.000Z ##

CVE ID: CVE-2026-21643
Vendor: Fortinet
Product: FortiClient EMS
Date Added: 2026-04-13
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

secdb@infosec.exchange at 2026-04-13T20:00:16.000Z ##

🚨 [CISA-2026:0413] CISA Adds 7 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 7 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2012-1854 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Visual Basic for Applications (VBA)
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2020-9715 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat
- Notes: helpx.adobe.com/security/produ ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-21529 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Exchange Server
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-36424 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Out-of-Bounds Read Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-60710 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Link Following Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21643 (secdb.nttzen.cloud/cve/detail/)
- Name: Fortinet SQL Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Fortinet
- Product: FortiClient EMS
- Notes: fortiguard.fortinet.com/psirt/ ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-34621 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat and Reader Prototype Pollution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat and Reader
- Notes: helpx.adobe.com/security/produ ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260413 #cisa20260413 #cve_2012_1854 #cve_2020_9715 #cve_2023_21529 #cve_2023_36424 #cve_2025_60710 #cve_2026_21643 #cve_2026_34621 #cve20121854 #cve20209715 #cve202321529 #cve202336424 #cve202560710 #cve202621643 #cve202634621

##

AAKL@infosec.exchange at 2026-04-13T19:27:36.000Z ##

CISA has updated the KEV catalogue:

- CVE-2026-34621: Adobe Acrobat and Reader Prototype Pollution Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21643: Fortinet SQL Injection Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2020-9715: Adobe Acrobat Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2020-

- CVE-2023-36424: Microsoft Windows Out-of-Bounds Read Vulnerability cve.org/CVERecord?id=CVE-2023-

- CVE-2023-21529: Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability cve.org/CVERecord?id=CVE-2023-

- CVE-2025-60710: Microsoft Windows Link Following Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2012-1854: Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability cve.org/CVERecord?id=CVE-2012- #CISA #Microsoft #Windows #Adobe #Fortinet #infosec #vulnerability

##

cisakevtracker@mastodon.social at 2026-04-13T18:02:22.000Z ##

CVE ID: CVE-2026-21643
Vendor: Fortinet
Product: FortiClient EMS
Date Added: 2026-04-13
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-60710
(7.8 HIGH)

EPSS: 0.19%

updated 2026-04-13T18:31:39

7 posts

Improper link resolution before file access ('link following') in Host Process for Windows Tasks allows an authorized attacker to elevate privileges locally.

1 repos

https://github.com/redpack-kr/CVE-2025-60710

Chris@mast.social at 2026-04-13T21:14:18.000Z ##

CISA Adds Seven Known Exploited Vulnerabilities to Catalog

CVE-2012-1854 Visual Basic for Applications Insecure Library Loading

CVE-2020-9715 Adobe Acrobat Use-After-Free

CVE-2023-21529 Microsoft Exchange Deserialization of Untrusted

CVE-2023-36424 Microsoft Windows Out-of-Bounds Read

CVE-2025-60710 Microsoft Windows Link Following

CVE-2026-21643 Fortinet SQL Injection

CVE-2026-34621 Adobe Acrobat Reader Prototype

cisa.gov/news-events/alerts/20

#cybersecurity #cisa #adobe #microsoft

##

secdb at 2026-04-13T20:00:16.275Z ##

🚨 [CISA-2026:0413] CISA Adds 7 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 7 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2012-1854 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Visual Basic for Applications (VBA)
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2020-9715 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat
- Notes: helpx.adobe.com/security/produ ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-21529 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Exchange Server
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-36424 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Out-of-Bounds Read Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-60710 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Link Following Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21643 (secdb.nttzen.cloud/cve/detail/)
- Name: Fortinet SQL Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Fortinet
- Product: FortiClient EMS
- Notes: fortiguard.fortinet.com/psirt/ ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-34621 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat and Reader Prototype Pollution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat and Reader
- Notes: helpx.adobe.com/security/produ ; nvd.nist.gov/vuln/detail/CVE-2

##

AAKL at 2026-04-13T19:27:36.582Z ##

CISA has updated the KEV catalogue:

- CVE-2026-34621: Adobe Acrobat and Reader Prototype Pollution Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21643: Fortinet SQL Injection Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2020-9715: Adobe Acrobat Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2020-

- CVE-2023-36424: Microsoft Windows Out-of-Bounds Read Vulnerability cve.org/CVERecord?id=CVE-2023-

- CVE-2023-21529: Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability cve.org/CVERecord?id=CVE-2023-

- CVE-2025-60710: Microsoft Windows Link Following Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2012-1854: Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability cve.org/CVERecord?id=CVE-2012-

##

cisakevtracker@mastodon.social at 2026-04-13T18:01:20.000Z ##

CVE ID: CVE-2025-60710
Vendor: Microsoft
Product: Windows
Date Added: 2026-04-13
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

secdb@infosec.exchange at 2026-04-13T20:00:16.000Z ##

🚨 [CISA-2026:0413] CISA Adds 7 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 7 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2012-1854 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Visual Basic for Applications (VBA)
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2020-9715 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat
- Notes: helpx.adobe.com/security/produ ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-21529 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Exchange Server
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-36424 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Out-of-Bounds Read Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-60710 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Link Following Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21643 (secdb.nttzen.cloud/cve/detail/)
- Name: Fortinet SQL Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Fortinet
- Product: FortiClient EMS
- Notes: fortiguard.fortinet.com/psirt/ ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-34621 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat and Reader Prototype Pollution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat and Reader
- Notes: helpx.adobe.com/security/produ ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260413 #cisa20260413 #cve_2012_1854 #cve_2020_9715 #cve_2023_21529 #cve_2023_36424 #cve_2025_60710 #cve_2026_21643 #cve_2026_34621 #cve20121854 #cve20209715 #cve202321529 #cve202336424 #cve202560710 #cve202621643 #cve202634621

##

AAKL@infosec.exchange at 2026-04-13T19:27:36.000Z ##

CISA has updated the KEV catalogue:

- CVE-2026-34621: Adobe Acrobat and Reader Prototype Pollution Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21643: Fortinet SQL Injection Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2020-9715: Adobe Acrobat Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2020-

- CVE-2023-36424: Microsoft Windows Out-of-Bounds Read Vulnerability cve.org/CVERecord?id=CVE-2023-

- CVE-2023-21529: Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability cve.org/CVERecord?id=CVE-2023-

- CVE-2025-60710: Microsoft Windows Link Following Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2012-1854: Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability cve.org/CVERecord?id=CVE-2012- #CISA #Microsoft #Windows #Adobe #Fortinet #infosec #vulnerability

##

cisakevtracker@mastodon.social at 2026-04-13T18:01:20.000Z ##

CVE ID: CVE-2025-60710
Vendor: Microsoft
Product: Windows
Date Added: 2026-04-13
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-6196
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-13T18:30:49

2 posts

A vulnerability was detected in Tenda F456 1.0.0.5. This affects the function fromexeCommand of the file /goform/exeCommand. Performing a manipulation of the argument cmdinput results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit is now public and may be used.

thehackerwire@mastodon.social at 2026-04-13T18:17:25.000Z ##

🟠 CVE-2026-6196 - High (8.8)

A vulnerability was detected in Tenda F456 1.0.0.5. This affects the function fromexeCommand of the file /goform/exeCommand. Performing a manipulation of the argument cmdinput results in stack-based buffer overflow. The attack is possible to be ca...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-13T18:17:25.000Z ##

🟠 CVE-2026-6196 - High (8.8)

A vulnerability was detected in Tenda F456 1.0.0.5. This affects the function fromexeCommand of the file /goform/exeCommand. Performing a manipulation of the argument cmdinput results in stack-based buffer overflow. The attack is possible to be ca...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6194
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-13T18:30:48

2 posts

A weakness has been identified in Totolink A3002MU B20211125.1046. Affected by this vulnerability is the function sub_410188 of the file /boafrm/formWlanSetup of the component HTTP Request Handler. This manipulation of the argument wan-url causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attac

thehackerwire@mastodon.social at 2026-04-13T18:17:07.000Z ##

🟠 CVE-2026-6194 - High (8.8)

A weakness has been identified in Totolink A3002MU B20211125.1046. Affected by this vulnerability is the function sub_410188 of the file /boafrm/formWlanSetup of the component HTTP Request Handler. This manipulation of the argument wan-url causes ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-13T18:17:07.000Z ##

🟠 CVE-2026-6194 - High (8.8)

A weakness has been identified in Totolink A3002MU B20211125.1046. Affected by this vulnerability is the function sub_410188 of the file /boafrm/formWlanSetup of the component HTTP Request Handler. This manipulation of the argument wan-url causes ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6186
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-13T18:30:48

2 posts

A security vulnerability has been detected in UTT HiPER 1200GW up to 2.5.3-170306. This vulnerability affects the function strcpy of the file /goform/formNatStaticMap. The manipulation of the argument NatBind leads to buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used.

thehackerwire@mastodon.social at 2026-04-13T16:32:10.000Z ##

🟠 CVE-2026-6186 - High (8.8)

A security vulnerability has been detected in UTT HiPER 1200GW up to 2.5.3-170306. This vulnerability affects the function strcpy of the file /goform/formNatStaticMap. The manipulation of the argument NatBind leads to buffer overflow. The attack i...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-13T16:32:10.000Z ##

🟠 CVE-2026-6186 - High (8.8)

A security vulnerability has been detected in UTT HiPER 1200GW up to 2.5.3-170306. This vulnerability affects the function strcpy of the file /goform/formNatStaticMap. The manipulation of the argument NatBind leads to buffer overflow. The attack i...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5085
(9.1 CRITICAL)

EPSS: 0.02%

updated 2026-04-13T18:30:40

2 posts

Solstice::Session versions through 1440 for Perl generates session ids insecurely. The _generateSessionID method returns an MD5 digest seeded by the epoch time, a random hash reference, a call to the built-in rand() function and the process id. The same method is used in the _generateID method in Solstice::Subsession, which is part of the same distribution. The epoch time may be guessed, if it

thehackerwire@mastodon.social at 2026-04-13T15:36:37.000Z ##

πŸ”΄ CVE-2026-5085 - Critical (9.1)

Solstice::Session versions through 1440 for Perl generates session ids insecurely.

The _generateSessionID method returns an MD5 digest seeded by the epoch time, a random hash reference, a call to the built-in rand() function and the process id.

...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-13T15:36:37.000Z ##

πŸ”΄ CVE-2026-5085 - Critical (9.1)

Solstice::Session versions through 1440 for Perl generates session ids insecurely.

The _generateSessionID method returns an MD5 digest seeded by the epoch time, a random hash reference, a call to the built-in rand() function and the process id.

...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2023-36424
(7.8 HIGH)

EPSS: 10.30%

updated 2026-04-13T18:30:35

7 posts

Windows Common Log File System Driver Elevation of Privilege Vulnerability

1 repos

https://github.com/zerozenxlabs/CVE-2023-36424

Chris@mast.social at 2026-04-13T21:14:18.000Z ##

CISA Adds Seven Known Exploited Vulnerabilities to Catalog

CVE-2012-1854 Visual Basic for Applications Insecure Library Loading

CVE-2020-9715 Adobe Acrobat Use-After-Free

CVE-2023-21529 Microsoft Exchange Deserialization of Untrusted

CVE-2023-36424 Microsoft Windows Out-of-Bounds Read

CVE-2025-60710 Microsoft Windows Link Following

CVE-2026-21643 Fortinet SQL Injection

CVE-2026-34621 Adobe Acrobat Reader Prototype

cisa.gov/news-events/alerts/20

#cybersecurity #cisa #adobe #microsoft

##

secdb at 2026-04-13T20:00:16.275Z ##

🚨 [CISA-2026:0413] CISA Adds 7 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 7 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2012-1854 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Visual Basic for Applications (VBA)
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2020-9715 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat
- Notes: helpx.adobe.com/security/produ ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-21529 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Exchange Server
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-36424 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Out-of-Bounds Read Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-60710 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Link Following Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21643 (secdb.nttzen.cloud/cve/detail/)
- Name: Fortinet SQL Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Fortinet
- Product: FortiClient EMS
- Notes: fortiguard.fortinet.com/psirt/ ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-34621 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat and Reader Prototype Pollution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat and Reader
- Notes: helpx.adobe.com/security/produ ; nvd.nist.gov/vuln/detail/CVE-2

##

AAKL at 2026-04-13T19:27:36.582Z ##

CISA has updated the KEV catalogue:

- CVE-2026-34621: Adobe Acrobat and Reader Prototype Pollution Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21643: Fortinet SQL Injection Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2020-9715: Adobe Acrobat Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2020-

- CVE-2023-36424: Microsoft Windows Out-of-Bounds Read Vulnerability cve.org/CVERecord?id=CVE-2023-

- CVE-2023-21529: Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability cve.org/CVERecord?id=CVE-2023-

- CVE-2025-60710: Microsoft Windows Link Following Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2012-1854: Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability cve.org/CVERecord?id=CVE-2012-

##

cisakevtracker@mastodon.social at 2026-04-13T18:01:51.000Z ##

CVE ID: CVE-2023-36424
Vendor: Microsoft
Product: Windows
Date Added: 2026-04-13
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

secdb@infosec.exchange at 2026-04-13T20:00:16.000Z ##

🚨 [CISA-2026:0413] CISA Adds 7 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 7 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2012-1854 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Visual Basic for Applications (VBA)
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2020-9715 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat
- Notes: helpx.adobe.com/security/produ ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-21529 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Exchange Server
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-36424 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Out-of-Bounds Read Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-60710 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Link Following Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21643 (secdb.nttzen.cloud/cve/detail/)
- Name: Fortinet SQL Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Fortinet
- Product: FortiClient EMS
- Notes: fortiguard.fortinet.com/psirt/ ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-34621 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat and Reader Prototype Pollution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat and Reader
- Notes: helpx.adobe.com/security/produ ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260413 #cisa20260413 #cve_2012_1854 #cve_2020_9715 #cve_2023_21529 #cve_2023_36424 #cve_2025_60710 #cve_2026_21643 #cve_2026_34621 #cve20121854 #cve20209715 #cve202321529 #cve202336424 #cve202560710 #cve202621643 #cve202634621

##

AAKL@infosec.exchange at 2026-04-13T19:27:36.000Z ##

CISA has updated the KEV catalogue:

- CVE-2026-34621: Adobe Acrobat and Reader Prototype Pollution Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21643: Fortinet SQL Injection Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2020-9715: Adobe Acrobat Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2020-

- CVE-2023-36424: Microsoft Windows Out-of-Bounds Read Vulnerability cve.org/CVERecord?id=CVE-2023-

- CVE-2023-21529: Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability cve.org/CVERecord?id=CVE-2023-

- CVE-2025-60710: Microsoft Windows Link Following Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2012-1854: Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability cve.org/CVERecord?id=CVE-2012- #CISA #Microsoft #Windows #Adobe #Fortinet #infosec #vulnerability

##

cisakevtracker@mastodon.social at 2026-04-13T18:01:51.000Z ##

CVE ID: CVE-2023-36424
Vendor: Microsoft
Product: Windows
Date Added: 2026-04-13
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2020-9715
(7.8 HIGH)

EPSS: 50.44%

updated 2026-04-13T18:30:34

7 posts

Adobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier have an use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution .

2 repos

https://github.com/lsw29475/CVE-2020-9715

https://github.com/wonjunchun/CVE-2020-9715

Chris@mast.social at 2026-04-13T21:14:18.000Z ##

CISA Adds Seven Known Exploited Vulnerabilities to Catalog

CVE-2012-1854 Visual Basic for Applications Insecure Library Loading

CVE-2020-9715 Adobe Acrobat Use-After-Free

CVE-2023-21529 Microsoft Exchange Deserialization of Untrusted

CVE-2023-36424 Microsoft Windows Out-of-Bounds Read

CVE-2025-60710 Microsoft Windows Link Following

CVE-2026-21643 Fortinet SQL Injection

CVE-2026-34621 Adobe Acrobat Reader Prototype

cisa.gov/news-events/alerts/20

#cybersecurity #cisa #adobe #microsoft

##

secdb at 2026-04-13T20:00:16.275Z ##

🚨 [CISA-2026:0413] CISA Adds 7 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 7 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2012-1854 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Visual Basic for Applications (VBA)
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2020-9715 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat
- Notes: helpx.adobe.com/security/produ ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-21529 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Exchange Server
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-36424 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Out-of-Bounds Read Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-60710 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Link Following Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21643 (secdb.nttzen.cloud/cve/detail/)
- Name: Fortinet SQL Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Fortinet
- Product: FortiClient EMS
- Notes: fortiguard.fortinet.com/psirt/ ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-34621 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat and Reader Prototype Pollution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat and Reader
- Notes: helpx.adobe.com/security/produ ; nvd.nist.gov/vuln/detail/CVE-2

##

AAKL at 2026-04-13T19:27:36.582Z ##

CISA has updated the KEV catalogue:

- CVE-2026-34621: Adobe Acrobat and Reader Prototype Pollution Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21643: Fortinet SQL Injection Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2020-9715: Adobe Acrobat Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2020-

- CVE-2023-36424: Microsoft Windows Out-of-Bounds Read Vulnerability cve.org/CVERecord?id=CVE-2023-

- CVE-2023-21529: Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability cve.org/CVERecord?id=CVE-2023-

- CVE-2025-60710: Microsoft Windows Link Following Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2012-1854: Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability cve.org/CVERecord?id=CVE-2012-

##

cisakevtracker@mastodon.social at 2026-04-13T18:02:06.000Z ##

CVE ID: CVE-2020-9715
Vendor: Adobe
Product: Acrobat
Date Added: 2026-04-13
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

secdb@infosec.exchange at 2026-04-13T20:00:16.000Z ##

🚨 [CISA-2026:0413] CISA Adds 7 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 7 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2012-1854 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Visual Basic for Applications (VBA)
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2020-9715 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat
- Notes: helpx.adobe.com/security/produ ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-21529 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Exchange Server
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-36424 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Out-of-Bounds Read Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-60710 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Link Following Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21643 (secdb.nttzen.cloud/cve/detail/)
- Name: Fortinet SQL Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Fortinet
- Product: FortiClient EMS
- Notes: fortiguard.fortinet.com/psirt/ ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-34621 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat and Reader Prototype Pollution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat and Reader
- Notes: helpx.adobe.com/security/produ ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260413 #cisa20260413 #cve_2012_1854 #cve_2020_9715 #cve_2023_21529 #cve_2023_36424 #cve_2025_60710 #cve_2026_21643 #cve_2026_34621 #cve20121854 #cve20209715 #cve202321529 #cve202336424 #cve202560710 #cve202621643 #cve202634621

##

AAKL@infosec.exchange at 2026-04-13T19:27:36.000Z ##

CISA has updated the KEV catalogue:

- CVE-2026-34621: Adobe Acrobat and Reader Prototype Pollution Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21643: Fortinet SQL Injection Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2020-9715: Adobe Acrobat Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2020-

- CVE-2023-36424: Microsoft Windows Out-of-Bounds Read Vulnerability cve.org/CVERecord?id=CVE-2023-

- CVE-2023-21529: Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability cve.org/CVERecord?id=CVE-2023-

- CVE-2025-60710: Microsoft Windows Link Following Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2012-1854: Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability cve.org/CVERecord?id=CVE-2012- #CISA #Microsoft #Windows #Adobe #Fortinet #infosec #vulnerability

##

cisakevtracker@mastodon.social at 2026-04-13T18:02:06.000Z ##

CVE ID: CVE-2020-9715
Vendor: Adobe
Product: Acrobat
Date Added: 2026-04-13
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2012-1854
(7.8 HIGH)

EPSS: 1.36%

updated 2026-04-13T18:30:34

7 posts

Untrusted search path vulnerability in VBE6.dll in Microsoft Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Microsoft Visual Basic for Applications (VBA); and Summit Microsoft Visual Basic for Applications SDK allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .docx file, aka "Visual Basic for App

Chris@mast.social at 2026-04-13T21:14:18.000Z ##

CISA Adds Seven Known Exploited Vulnerabilities to Catalog

CVE-2012-1854 Visual Basic for Applications Insecure Library Loading

CVE-2020-9715 Adobe Acrobat Use-After-Free

CVE-2023-21529 Microsoft Exchange Deserialization of Untrusted

CVE-2023-36424 Microsoft Windows Out-of-Bounds Read

CVE-2025-60710 Microsoft Windows Link Following

CVE-2026-21643 Fortinet SQL Injection

CVE-2026-34621 Adobe Acrobat Reader Prototype

cisa.gov/news-events/alerts/20

#cybersecurity #cisa #adobe #microsoft

##

secdb at 2026-04-13T20:00:16.275Z ##

🚨 [CISA-2026:0413] CISA Adds 7 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 7 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2012-1854 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Visual Basic for Applications (VBA)
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2020-9715 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat
- Notes: helpx.adobe.com/security/produ ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-21529 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Exchange Server
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-36424 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Out-of-Bounds Read Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-60710 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Link Following Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21643 (secdb.nttzen.cloud/cve/detail/)
- Name: Fortinet SQL Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Fortinet
- Product: FortiClient EMS
- Notes: fortiguard.fortinet.com/psirt/ ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-34621 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat and Reader Prototype Pollution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat and Reader
- Notes: helpx.adobe.com/security/produ ; nvd.nist.gov/vuln/detail/CVE-2

##

AAKL at 2026-04-13T19:27:36.582Z ##

CISA has updated the KEV catalogue:

- CVE-2026-34621: Adobe Acrobat and Reader Prototype Pollution Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21643: Fortinet SQL Injection Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2020-9715: Adobe Acrobat Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2020-

- CVE-2023-36424: Microsoft Windows Out-of-Bounds Read Vulnerability cve.org/CVERecord?id=CVE-2023-

- CVE-2023-21529: Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability cve.org/CVERecord?id=CVE-2023-

- CVE-2025-60710: Microsoft Windows Link Following Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2012-1854: Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability cve.org/CVERecord?id=CVE-2012-

##

cisakevtracker@mastodon.social at 2026-04-13T18:01:04.000Z ##

CVE ID: CVE-2012-1854
Vendor: Microsoft
Product: Visual Basic for Applications (VBA)
Date Added: 2026-04-13
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

secdb@infosec.exchange at 2026-04-13T20:00:16.000Z ##

🚨 [CISA-2026:0413] CISA Adds 7 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 7 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2012-1854 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Visual Basic for Applications (VBA)
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2020-9715 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat
- Notes: helpx.adobe.com/security/produ ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-21529 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Exchange Server
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-36424 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Out-of-Bounds Read Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-60710 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Link Following Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-21643 (secdb.nttzen.cloud/cve/detail/)
- Name: Fortinet SQL Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Fortinet
- Product: FortiClient EMS
- Notes: fortiguard.fortinet.com/psirt/ ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-34621 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat and Reader Prototype Pollution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat and Reader
- Notes: helpx.adobe.com/security/produ ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260413 #cisa20260413 #cve_2012_1854 #cve_2020_9715 #cve_2023_21529 #cve_2023_36424 #cve_2025_60710 #cve_2026_21643 #cve_2026_34621 #cve20121854 #cve20209715 #cve202321529 #cve202336424 #cve202560710 #cve202621643 #cve202634621

##

AAKL@infosec.exchange at 2026-04-13T19:27:36.000Z ##

CISA has updated the KEV catalogue:

- CVE-2026-34621: Adobe Acrobat and Reader Prototype Pollution Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-21643: Fortinet SQL Injection Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2020-9715: Adobe Acrobat Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2020-

- CVE-2023-36424: Microsoft Windows Out-of-Bounds Read Vulnerability cve.org/CVERecord?id=CVE-2023-

- CVE-2023-21529: Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability cve.org/CVERecord?id=CVE-2023-

- CVE-2025-60710: Microsoft Windows Link Following Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2012-1854: Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability cve.org/CVERecord?id=CVE-2012- #CISA #Microsoft #Windows #Adobe #Fortinet #infosec #vulnerability

##

cisakevtracker@mastodon.social at 2026-04-13T18:01:04.000Z ##

CVE ID: CVE-2012-1854
Vendor: Microsoft
Product: Visual Basic for Applications (VBA)
Date Added: 2026-04-13
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-6195
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-04-13T18:16:32.353000

2 posts

A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected by this issue is the function setPasswordCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument admpass leads to os command injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.

thehackerwire@mastodon.social at 2026-04-13T18:17:16.000Z ##

πŸ”΄ CVE-2026-6195 - Critical (9.8)

A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected by this issue is the function setPasswordCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument admpass lea...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-13T18:17:16.000Z ##

πŸ”΄ CVE-2026-6195 - Critical (9.8)

A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected by this issue is the function setPasswordCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument admpass lea...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32316
(8.2 HIGH)

EPSS: 0.00%

updated 2026-04-13T18:16:29.420000

2 posts

jq is a command-line JSON processor. An integer overflow vulnerability exists through version 1.8.1 within the jvp_string_append() and jvp_string_copy_replace_bad functions, where concatenating strings with a combined length exceeding 2^31 bytes causes a 32-bit unsigned integer overflow in the buffer allocation size calculation, resulting in a drastically undersized heap buffer. Subsequent memory

thehackerwire@mastodon.social at 2026-04-13T18:18:20.000Z ##

🟠 CVE-2026-32316 - High (8.2)

jq is a command-line JSON processor. An integer overflow vulnerability exists through version 1.8.1 within the jvp_string_append() and jvp_string_copy_replace_bad functions, where concatenating strings with a combined length exceeding 2^31 bytes c...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-13T18:18:20.000Z ##

🟠 CVE-2026-32316 - High (8.2)

jq is a command-line JSON processor. An integer overflow vulnerability exists through version 1.8.1 within the jvp_string_append() and jvp_string_copy_replace_bad functions, where concatenating strings with a combined length exceeding 2^31 bytes c...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28291
(8.1 HIGH)

EPSS: 0.00%

updated 2026-04-13T18:16:28.760000

2 posts

simple-git enables running native Git commands from JavaScript. Versions up to and including 3.31.1 allow execution of arbitrary commands through Git option manipulation, bypassing safety checks meant to block dangerous options like -u and --upload-pack. The flaw stems from an incomplete fix for CVE-2022-25860, as Git's flexible option parsing allows numerous character combinations (e.g., -vu, -4u

thehackerwire@mastodon.social at 2026-04-13T18:19:30.000Z ##

🟠 CVE-2026-28291 - High (8.1)

simple-git enables running native Git commands from JavaScript. Versions up to and including 3.31.1 allow execution of arbitrary commands through Git option manipulation, bypassing safety checks meant to block dangerous options like -u and --uploa...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-13T18:19:30.000Z ##

🟠 CVE-2026-28291 - High (8.1)

simple-git enables running native Git commands from JavaScript. Versions up to and including 3.31.1 allow execution of arbitrary commands through Git option manipulation, bypassing safety checks meant to block dangerous options like -u and --uploa...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33858
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-13T17:16:28.600000

2 posts

Dag Authors, who normally should not be able to execute code in the webserver context could craft XCom payload causing the webserver to execute arbitrary code. Since Dag Authors are already highly trusted, severity of this issue is Low. Users are recommended to upgrade to Apache Airflow 3.2.0, which resolves this issue.

thehackerwire@mastodon.social at 2026-04-13T16:34:24.000Z ##

🟠 CVE-2026-33858 - High (8.8)

Dag Authors, who normally should not be able to execute code in the webserver context could craft XCom payload causing the webserver to execute arbitrary code. Since Dag Authors are already highly trusted, severity of this issue is Low.

Users ar...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-13T16:34:24.000Z ##

🟠 CVE-2026-33858 - High (8.8)

Dag Authors, who normally should not be able to execute code in the webserver context could craft XCom payload causing the webserver to execute arbitrary code. Since Dag Authors are already highly trusted, severity of this issue is Low.

Users ar...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32252
(7.7 HIGH)

EPSS: 0.02%

updated 2026-04-13T16:16:26.590000

1 posts

Chartbrew is an open-source web application that can connect directly to databases and APIs and use the data to create charts. Prior to 4.9.0, a cross-tenant authorization bypass exists in Chartbrew in GET /team/:team_id/template/generate/:project_id. The GET handler calls checkAccess(req, "updateAny", "chart") without awaiting the returned promise, and it does not verify that the supplied project

thehackerwire@mastodon.social at 2026-04-11T04:48:59.000Z ##

🟠 CVE-2026-32252 - High (7.7)

Chartbrew is an open-source web application that can connect directly to databases and APIs and use the data to create charts. Prior to 4.9.0, a cross-tenant authorization bypass exists in Chartbrew in GET /team/:team_id/template/generate/:project...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35337
(8.8 HIGH)

EPSS: 0.30%

updated 2026-04-13T15:32:45

3 posts

Deserialization of Untrusted Data vulnerability in Apache Storm. Versions Affected: before 2.8.6. Description: When processing topology credentials submitted via the Nimbus Thrift API, Storm deserializes the base64-encoded TGT blob using ObjectInputStream.readObject() without any class filtering or validation.Β An authenticated user with topology submission rights could supply a crafted serializ

thehackerwire@mastodon.social at 2026-04-13T15:36:26.000Z ##

🟠 CVE-2026-35337 - High (8.8)

Deserialization of Untrusted Data vulnerability in Apache Storm.

Versions Affected:
before 2.8.6.

Description:
When processing topology credentials submitted via the Nimbus Thrift API, Storm deserializes the base64-encoded TGT blob using Object...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-13T15:36:26.000Z ##

🟠 CVE-2026-35337 - High (8.8)

Deserialization of Untrusted Data vulnerability in Apache Storm.

Versions Affected:
before 2.8.6.

Description:
When processing topology credentials submitted via the Nimbus Thrift API, Storm deserializes the base64-encoded TGT blob using Object...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-13T10:30:29.000Z ##

πŸ”’ CRITICAL: CVE-2026-35337 in Apache Storm Client (<2.8.6) allows authenticated users to achieve RCE via unsafe deserialization in Nimbus/Worker JVMs. Upgrade to 2.8.6 or restrict deserialization classes now! Details: radar.offseq.com/threat/cve-20 #OffSeq #ApacheStorm #Vuln

##

CVE-2026-1462
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-13T15:31:50

2 posts

A vulnerability in the `TFSMLayer` class of the `keras` package, version 3.13.0, allows attacker-controlled TensorFlow SavedModels to be loaded during deserialization of `.keras` models, even when `safe_mode=True`. This bypasses the security guarantees of `safe_mode` and enables arbitrary attacker-controlled code execution during model inference under the victim's privileges. The issue arises due

thehackerwire@mastodon.social at 2026-04-13T15:36:16.000Z ##

🟠 CVE-2026-1462 - High (8.8)

A vulnerability in the `TFSMLayer` class of the `keras` package, version 3.13.0, allows attacker-controlled TensorFlow SavedModels to be loaded during deserialization of `.keras` models, even when `safe_mode=True`. This bypasses the security guara...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-13T15:36:16.000Z ##

🟠 CVE-2026-1462 - High (8.8)

A vulnerability in the `TFSMLayer` class of the `keras` package, version 3.13.0, allows attacker-controlled TensorFlow SavedModels to be loaded during deserialization of `.keras` models, even when `safe_mode=True`. This bypasses the security guara...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40198
(7.5 HIGH)

EPSS: 0.03%

updated 2026-04-13T15:31:37

2 posts

Net::CIDR::Lite versions before 0.23 for Perl does not validate IPv6 group count, which may allow IP ACL bypass. _pack_ipv6() does not check that uncompressed IPv6 addresses (without ::) have exactly 8 hex groups. Inputs like "abcd", "1:2:3", or "1:2:3:4:5:6:7" are accepted and produce packed values of wrong length (3, 7, or 15 bytes instead of 17). The packed values are used internally for mask

thehackerwire@mastodon.social at 2026-04-13T18:38:10.000Z ##

🟠 CVE-2026-40198 - High (7.5)

Net::CIDR::Lite versions before 0.23 for Perl does not validate IPv6 group count, which may allow IP ACL bypass.

_pack_ipv6() does not check that uncompressed IPv6 addresses (without ::) have exactly 8 hex groups. Inputs like "abcd", "1:2:3", or ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-13T18:38:10.000Z ##

🟠 CVE-2026-40198 - High (7.5)

Net::CIDR::Lite versions before 0.23 for Perl does not validate IPv6 group count, which may allow IP ACL bypass.

_pack_ipv6() does not check that uncompressed IPv6 addresses (without ::) have exactly 8 hex groups. Inputs like "abcd", "1:2:3", or ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34578
(8.2 HIGH)

EPSS: 0.20%

updated 2026-04-13T15:02:47.353000

1 posts

OPNsense is a FreeBSD based firewall and routing platform. Prior to 26.1.6, OPNsense's LDAP authentication connector passes the login username directly into an LDAP search filter without calling ldap_escape(). An unauthenticated attacker can inject LDAP filter metacharacters into the username field of the WebGUI login page to enumerate valid LDAP usernames in the configured directory. When the LDA

thehackerwire@mastodon.social at 2026-04-12T10:59:51.000Z ##

🟠 CVE-2026-34578 - High (8.2)

OPNsense is a FreeBSD based firewall and routing platform. Prior to 26.1.6, OPNsense's LDAP authentication connector passes the login username directly into an LDAP search filter without calling ldap_escape(). An unauthenticated attacker can injec...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33266
(7.5 HIGH)

EPSS: 0.02%

updated 2026-04-13T15:02:47.353000

1 posts

Use of Hard-coded Cryptographic Key vulnerability in Apache OpenMeetings. The remember-me cookie encryption key is set to default value in openmeetings.properties and not being auto-rotated. In case OM admin hasn't changed the default encryption key, an attacker who has stolen a cookie from a logged-in user can get full user credentials. This issue affects Apache OpenMeetings: from 6.1.0 before

thehackerwire@mastodon.social at 2026-04-12T10:00:53.000Z ##

🟠 CVE-2026-33266 - High (7.5)

Use of Hard-coded Cryptographic Key vulnerability in Apache OpenMeetings.

The remember-me cookie encryption key is set to default value in openmeetings.properties and not being auto-rotated. In case OM admin hasn't changed the default encryption ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39853
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-13T15:02:47.353000

1 posts

osslsigncode is a tool that implements Authenticode signing and timestamping. Prior to 2.12, A stack buffer overflow vulnerability exists in osslsigncode in several signature verification paths. During verification of a PKCS#7 signature, the code copies the digest value from a parsed SpcIndirectDataContent structure into a fixed-size stack buffer (mdbuf[EVP_MAX_MD_SIZE], 64 bytes) without validat

thehackerwire@mastodon.social at 2026-04-12T10:00:34.000Z ##

🟠 CVE-2026-39853 - High (7.8)

osslsigncode is a tool that implements Authenticode signing and timestamping. Prior to 2.12, A stack buffer overflow vulnerability exists in osslsigncode in several signature verification paths. During verification of a PKCS#7 signature, the code ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39843
(7.7 HIGH)

EPSS: 0.03%

updated 2026-04-13T15:02:47.353000

1 posts

Plane is an an open-source project management tool. From 0.28.0 to before 1.3.0, the remediation of GHSA-jcc6-f9v6-f7jw is incomplete which could lead to the same full read Server-Side Request Forgery when a normal html page contains a link tag with an href that redirects to a private IP address is supplied to Add link by an authenticated attacker with low privileges. Redirects for the main page U

thehackerwire@mastodon.social at 2026-04-12T09:00:13.000Z ##

🟠 CVE-2026-39843 - High (7.7)

Plane is an an open-source project management tool. From 0.28.0 to before 1.3.0, the remediation of GHSA-jcc6-f9v6-f7jw is incomplete which could lead to the same full read Server-Side Request Forgery when a normal html page contains a link tag wi...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39974
(8.5 HIGH)

EPSS: 0.03%

updated 2026-04-13T15:02:27.760000

1 posts

n8n-MCP is a Model Context Protocol (MCP) server that provides AI assistants with comprehensive access to n8n node documentation, properties, and operations. Prior to 2.47.4, an authenticated Server-Side Request Forgery in n8n-mcp allows a caller holding a valid AUTH_TOKEN to cause the server to issue HTTP requests to arbitrary URLs supplied through multi-tenant HTTP headers. Response bodies are r

thehackerwire@mastodon.social at 2026-04-12T08:59:53.000Z ##

🟠 CVE-2026-39974 - High (8.5)

n8n-MCP is a Model Context Protocol (MCP) server that provides AI assistants with comprehensive access to n8n node documentation, properties, and operations. Prior to 2.47.4, an authenticated Server-Side Request Forgery in n8n-mcp allows a caller ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1584
(7.5 HIGH)

EPSS: 0.08%

updated 2026-04-13T15:02:27.760000

1 posts

A flaw was found in gnutls. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted ClientHello message with an invalid Pre-Shared Key (PSK) binder value during the TLS handshake. This can lead to a NULL pointer dereference, causing the server to crash and resulting in a remote Denial of Service (DoS) condition.

thehackerwire@mastodon.social at 2026-04-12T08:44:34.000Z ##

🟠 CVE-2026-1584 - High (7.5)

A flaw was found in gnutls. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted ClientHello message with an invalid Pre-Shared Key (PSK) binder value during the TLS handshake. This can lead to a NULL po...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30478
(8.8 HIGH)

EPSS: 0.01%

updated 2026-04-13T15:02:27.760000

1 posts

A Dynamic-link Library Injection vulnerability in GatewayGeo MapServer for Windows version 5 allows attackers to escalate privileges via a crafted executable.

thehackerwire@mastodon.social at 2026-04-12T08:44:25.000Z ##

🟠 CVE-2026-30478 - High (8.8)

A Dynamic-link Library Injection vulnerability in GatewayGeo MapServer for Windows version 5 allows attackers to escalate privileges via a crafted executable.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39983
(8.6 HIGH)

EPSS: 1.56%

updated 2026-04-13T15:02:27.760000

1 posts

basic-ftp is an FTP client for Node.js. Prior to 5.2.1, basic-ftp allows FTP command injection via CRLF sequences (\r\n) in file path parameters passed to high-level path APIs such as cd(), remove(), rename(), uploadFrom(), downloadTo(), list(), and removeDir(). The library's protectWhitespace() helper only handles leading spaces and returns other paths unchanged, while FtpContext.send() writes th

1 repos

https://github.com/zebbernCVE/CVE-2026-39983

thehackerwire@mastodon.social at 2026-04-12T08:00:01.000Z ##

🟠 CVE-2026-39983 - High (8.6)

basic-ftp is an FTP client for Node.js. Prior to 5.2.1, basic-ftp allows FTP command injection via CRLF sequences (\r\n) in file path parameters passed to high-level path APIs such as cd(), remove(), rename(), uploadFrom(), downloadTo(), list(), a...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39981
(8.8 HIGH)

EPSS: 0.48%

updated 2026-04-13T15:02:27.760000

1 posts

AGiXT is a dynamic AI Agent Automation Platform. Prior to 1.9.2, the safe_join() function in the essential_abilities extension fails to validate that resolved file paths remain within the designated agent workspace. An authenticated attacker can use directory traversal sequences to read, write, or delete arbitrary files on the server hosting the AGiXT instance. This vulnerability is fixed in 1.9.2

thehackerwire@mastodon.social at 2026-04-12T07:59:51.000Z ##

🟠 CVE-2026-39981 - High (8.8)

AGiXT is a dynamic AI Agent Automation Platform. Prior to 1.9.2, the safe_join() function in the essential_abilities extension fails to validate that resolved file paths remain within the designated agent workspace. An authenticated attacker can u...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40069
(7.5 HIGH)

EPSS: 0.03%

updated 2026-04-13T15:02:27.760000

1 posts

BSV Ruby SDK is the Ruby SDK for the BSV blockchain. From 0.1.0 to before 0.8.2, BSV::Network::ARC's failure detection only recognises REJECTED and DOUBLE_SPEND_ATTEMPTED. ARC responses with txStatus values of INVALID, MALFORMED, MINED_IN_STALE_BLOCK, or any ORPHAN-containing extraInfo / txStatus are silently treated as successful broadcasts. Applications that gate actions on broadcaster success a

thehackerwire@mastodon.social at 2026-04-12T07:33:12.000Z ##

🟠 CVE-2026-40069 - High (7.5)

BSV Ruby SDK is the Ruby SDK for the BSV blockchain. From 0.1.0 to before 0.8.2, BSV::Network::ARC's failure detection only recognises REJECTED and DOUBLE_SPEND_ATTEMPTED. ARC responses with txStatus values of INVALID, MALFORMED, MINED_IN_STALE_BL...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-13926
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-04-13T15:02:27.760000

1 posts

An attacker could use data obtained by sniffing the network traffic to forge packets in order to make arbitrary requests to Contemporary Controls BASC 20T.

thehackerwire@mastodon.social at 2026-04-12T07:00:00.000Z ##

πŸ”΄ CVE-2025-13926 - Critical (9.8)

An attacker could use data obtained by sniffing the network traffic to
forge packets in order to make arbitrary requests to Contemporary
Controls BASC 20T.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-29146
(7.5 HIGH)

EPSS: 0.03%

updated 2026-04-13T15:02:27.760000

2 posts

Padding Oracle vulnerability in Apache Tomcat's EncryptInterceptor with default configuration. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.0.0-M1 through 10.1.52, from 9.0.13 through 9..115, from 8.5.38 through 8.5.100, from 7.0.100 through 7.0.109. Users are recommended to upgrade to version 11.0.19, 10.1.53 and 9.0.116, which fixes the issue.

thehackerwire@mastodon.social at 2026-04-12T06:08:58.000Z ##

🟠 CVE-2026-29146 - High (7.5)

Padding Oracle vulnerability in Apache Tomcat's EncryptInterceptor with default configuration.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.0.0-M1 through 10.1.52, from 9.0.13 through 9..115, from 8.5.38 through 8.5.1...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-12T05:45:31.000Z ##

🟠 CVE-2026-34486 - High (7.5)

Missing Encryption of Sensitive Data vulnerability in Apache Tomcat due to the fix for CVE-2026-29146 allowing the bypass of the EncryptInterceptor.

This issue affects Apache Tomcat: 11.0.20, 10.1.53, 9.0.116.

Users are recommended to upgrade t...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-29129
(7.5 HIGH)

EPSS: 0.02%

updated 2026-04-13T15:02:27.760000

1 posts

Configured cipher preference order not preserved vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.16 through 11.0.18, from 10.1.51 through 10.1.52, from 9.0.114 through 9.0.115. Users are recommended to upgrade to version 11.0.20, 10.1.53 or 9.0.116, which fix the issue.

thehackerwire@mastodon.social at 2026-04-12T06:00:17.000Z ##

🟠 CVE-2026-29129 - High (7.5)

Configured cipher preference order not preserved vulnerability in Apache Tomcat.

This issue affects Apache Tomcat: from 11.0.16 through 11.0.18, from 10.1.51 through 10.1.52, from 9.0.114 through 9.0.115.

Users are recommended to upgrade to vers...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24880
(7.5 HIGH)

EPSS: 0.03%

updated 2026-04-13T15:02:27.760000

1 posts

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') vulnerability in Apache Tomcat via invalid chunk extension. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M1 through 10.1.52, from 9.0.0.M1 through 9.0.115, from 8.5.0 through 8.5.100, from 7.0.0 through 7.0.109. Other, unsupported versions may also be affected. Users are recommended

thehackerwire@mastodon.social at 2026-04-12T06:00:06.000Z ##

🟠 CVE-2026-24880 - High (7.5)

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') vulnerability in Apache Tomcat via invalid chunk extension.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M1 through 10.1.52, from 9....

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34486
(7.5 HIGH)

EPSS: 0.01%

updated 2026-04-13T15:02:27.760000

1 posts

Missing Encryption of Sensitive Data vulnerability in Apache Tomcat due to theΒ fix for CVE-2026-29146 allowing the bypass of the EncryptInterceptor. This issue affects Apache Tomcat: 11.0.20, 10.1.53, 9.0.116. Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117, which fix the issue.

thehackerwire@mastodon.social at 2026-04-12T05:45:31.000Z ##

🟠 CVE-2026-34486 - High (7.5)

Missing Encryption of Sensitive Data vulnerability in Apache Tomcat due to the fix for CVE-2026-29146 allowing the bypass of the EncryptInterceptor.

This issue affects Apache Tomcat: 11.0.20, 10.1.53, 9.0.116.

Users are recommended to upgrade t...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40175
(10.0 CRITICAL)

EPSS: 0.24%

updated 2026-04-13T15:02:06.187000

2 posts

Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.0, the Axios library is vulnerable to a specific "Gadget" attack chain that allows Prototype Pollution in any third-party dependency to be escalated into Remote Code Execution (RCE) or Full Cloud Compromise (via AWS IMDSv2 bypass). This vulnerability is fixed in 1.15.0.

3 repos

https://github.com/surri/audit-axios

https://github.com/0xBlackash/CVE-2026-40175

https://github.com/kengzzzz/CVE-2026-40175

m3r@c.im at 2026-04-13T15:19:38.000Z ##

"Critical Axios Vulnerability Allows Remote Code Execution"

At this point, people probably just point $AI_AGENT to a package.json file and let it rip instead of specific targets. Less actual work for hundreds of thousands more vulnerable hosts.

nvd.nist.gov/vuln/detail/CVE-2

#cybersecurity #security #axios #javascript #web #nodejs

##

thehackerwire@mastodon.social at 2026-04-11T04:01:55.000Z ##

πŸ”΄ CVE-2026-40175 - Critical (10)

Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.0, the Axios library is vulnerable to a specific "Gadget" attack chain that allows Prototype Pollution in any third-party dependency to be escalated into Remote Code E...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1115
(9.6 CRITICAL)

EPSS: 0.04%

updated 2026-04-13T15:02:06.187000

1 posts

A Stored Cross-Site Scripting (XSS) vulnerability was identified in the social feature of parisneo/lollms, affecting the latest version prior to 2.2.0. The vulnerability exists in the `create_post` function within `backend/routers/social/__init__.py`, where user-provided content is directly assigned to the `DBPost` model without sanitization. This allows attackers to inject and store malicious Jav

thehackerwire@mastodon.social at 2026-04-12T05:00:10.000Z ##

πŸ”΄ CVE-2026-1115 - Critical (9.6)

A Stored Cross-Site Scripting (XSS) vulnerability was identified in the social feature of parisneo/lollms, affecting the latest version prior to 2.2.0. The vulnerability exists in the `create_post` function within `backend/routers/social/__init__....

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6028
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-13T15:02:06.187000

1 posts

A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. Impacted is the function setPptpServerCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument enable leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.

thehackerwire@mastodon.social at 2026-04-12T05:00:00.000Z ##

πŸ”΄ CVE-2026-6028 - Critical (9.8)

A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. Impacted is the function setPptpServerCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument enable leads to os comma...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6027
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-13T15:02:06.187000

1 posts

A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. This issue affects the function setUrlFilterRules of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument enable can lead to os command injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.

thehackerwire@mastodon.social at 2026-04-12T04:59:49.000Z ##

πŸ”΄ CVE-2026-6027 - Critical (9.8)

A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. This issue affects the function setUrlFilterRules of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument enable can lead to o...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6029
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-13T15:02:06.187000

1 posts

A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. The affected element is the function setVpnAccountCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument User results in os command injection. The attack may be launched remotely. The exploit is now public and may be used.

thehackerwire@mastodon.social at 2026-04-12T04:35:19.000Z ##

πŸ”΄ CVE-2026-6029 - Critical (9.8)

A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. The affected element is the function setVpnAccountCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument User results in os command...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22750
(7.5 HIGH)

EPSS: 0.03%

updated 2026-04-13T15:02:06.187000

1 posts

When configuring SSL bundles in Spring Cloud Gateway by using the configuration propertyΒ spring.ssl.bundle, the configuration was silently ignored and the default SSL configuration was used instead. Note: TheΒ 4.2.xΒ branch is no longer under open source support. If you are using Spring Cloud GatewayΒ 4.2.0Β and are not an enterprise customer, you can upgrade to any Spring Cloud GatewayΒ 4.2.xΒ release

thehackerwire@mastodon.social at 2026-04-12T04:00:34.000Z ##

🟠 CVE-2026-22750 - High (7.5)

When configuring SSL bundles in Spring Cloud Gateway by using the configuration property spring.ssl.bundle, the configuration was silently ignored and the default SSL configuration was used instead.
Note: The 4.2.x branch is no longer under ope...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39304
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-13T15:02:06.187000

1 posts

Denial of Service via Out of Memory vulnerability in Apache ActiveMQ Client, Apache ActiveMQ Broker, Apache ActiveMQ. ActiveMQ NIO SSL transports do not correctly handle TLSv1.3 handshake KeyUpdates triggered by clients. This makes it possible for a client to rapidly trigger updates which causes the broker to exhaust all its memory in the SSL engine leading to DoS. Note: TLS versions before TLSv

thehackerwire@mastodon.social at 2026-04-12T04:00:13.000Z ##

🟠 CVE-2026-39304 - High (7.5)

Denial of Service via Out of Memory vulnerability in Apache ActiveMQ Client, Apache ActiveMQ Broker, Apache ActiveMQ.

ActiveMQ NIO SSL transports do not correctly handle TLSv1.3 handshake KeyUpdates triggered by clients. This makes it possible fo...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33707
(9.4 CRITICAL)

EPSS: 0.07%

updated 2026-04-13T15:02:06.187000

2 posts

Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, the default password reset mechanism generates tokens using sha1($email) with no random component, no expiration, and no rate limiting. An attacker who knows a user's email can compute the reset token and change the victim's password without authentication. This vulnerability is fixed in 1.11.38 and 2.0.0-RC.3.

offseq@infosec.exchange at 2026-04-11T16:00:13.000Z ##

CVE-2026-33707: Chamilo LMS (CRITICAL) password reset flaw β€” reset tokens are sha1(email), no randomness or expiry. Attackers with an email can hijack accounts. Affected: <1.11.38, 2.0.0-alpha.1 – <2.0.0-RC.3. Patch now! radar.offseq.com/threat/cve-20 #OffSeq #infosec #CVE #LMS

##

thehackerwire@mastodon.social at 2026-04-11T04:49:18.000Z ##

πŸ”΄ CVE-2026-33707 - Critical (9.4)

Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, the default password reset mechanism generates tokens using sha1($email) with no random component, no expiration, and no rate limiting. An attacker who knows a user's em...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40157
(0 None)

EPSS: 0.07%

updated 2026-04-13T15:02:06.187000

1 posts

PraisonAI is a multi-agent teams system. Prior to 4.5.128, cmd_unpack in the recipe CLI extracts .praison tar archives using raw tar.extract() without validating archive member paths. A .praison bundle containing ../../ entries will write files outside the intended output directory. An attacker who distributes a malicious bundle can overwrite arbitrary files on the victim's filesystem when they ru

offseq@infosec.exchange at 2026-04-11T07:30:28.000Z ##

🚨 CRITICAL: CVE-2026-40157 in PraisonAI (<4.5.128) enables path traversal via malicious .praison bundles β€” risk: file overwrite & code execution. Patch to 4.5.128+ & avoid untrusted archives. Full details: radar.offseq.com/threat/cve-20 #OffSeq #PraisonAI #infosec #vuln

##

CVE-2026-40217
(8.8 HIGH)

EPSS: 0.19%

updated 2026-04-13T15:02:06.187000

1 posts

LiteLLM through 2026-04-08 allows remote attackers to execute arbitrary code via bytecode rewriting at the /guardrails/test_custom_code URI.

thehackerwire@mastodon.social at 2026-04-11T07:03:37.000Z ##

🟠 CVE-2026-40217 - High (8.8)

LiteLLM through 2026-04-08 allows remote attackers to execute arbitrary code via bytecode rewriting at the /guardrails/test_custom_code URI.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6067
(7.5 HIGH)

EPSS: 0.06%

updated 2026-04-13T15:02:06.187000

1 posts

A heap buffer overflow vulnerability exists in the Netwide Assembler (NASM) due to a lack of bounds checking in the obj_directive() function. This vulnerability can be exploited by a user assembling a malicious .asm file, potentially leading to heap memory corruption, denial of service (crash), and arbitrary code execution.

thehackerwire@mastodon.social at 2026-04-11T07:03:27.000Z ##

🟠 CVE-2026-6067 - High (7.5)

A heap buffer overflow vulnerability exists in the Netwide Assembler (NASM) due to a lack of bounds checking in the obj_directive() function. This vulnerability can be exploited by a user assembling a malicious .asm file, potentially leading to he...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35595
(8.3 HIGH)

EPSS: 0.03%

updated 2026-04-13T15:02:06.187000

1 posts

Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, the CanUpdate check at pkg/models/project_permissions.go:139-148 only requires CanWrite on the new parent project when changing parent_project_id. However, Vikunja's permission model uses a recursive CTE that walks up the project hierarchy to compute permissions. Moving a project under a different parent changes the pe

thehackerwire@mastodon.social at 2026-04-11T07:02:14.000Z ##

🟠 CVE-2026-35595 - High (8.3)

Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, the CanUpdate check at pkg/models/project_permissions.go:139-148 only requires CanWrite on the new parent project when changing parent_project_id. However, Vikunja's p...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40158
(8.6 HIGH)

EPSS: 0.03%

updated 2026-04-13T15:02:06.187000

2 posts

PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAI's AST-based Python sandbox can be bypassed using type.__getattribute__ trampoline, allowing arbitrary code execution when running untrusted agent code. The _execute_code_direct function in praisonaiagents/tools/python_tools.py uses AST filtering to block dangerous Python attributes like __subclasses__, __globals__, and __bases__.

thehackerwire@mastodon.social at 2026-04-11T06:14:02.000Z ##

🟠 CVE-2026-40158 - High (8.6)

PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAI's AST-based Python sandbox can be bypassed using type.__getattribute__ trampoline, allowing arbitrary code execution when running untrusted agent code. The _execute_code_direct f...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-11T06:10:50.000Z ##

🟠 CVE-2026-40158 - High (8.6)

PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAI's AST-based Python sandbox can be bypassed using type.__getattribute__ trampoline, allowing arbitrary code execution when running untrusted agent code. The _execute_code_direct f...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32892
(9.1 CRITICAL)

EPSS: 0.19%

updated 2026-04-13T15:02:06.187000

2 posts

Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, Chamilo LMS contains an OS Command Injection vulnerability in the file move function. The move() function in fileManage.lib.php passes user-controlled path values directly into exec() shell commands without using escapeshellarg(). When a user moves a document via document.php, the move_to POST parameter β€” which only pass

offseq@infosec.exchange at 2026-04-11T06:00:27.000Z ##

Chamilo LMS CRITICAL vuln (CVE-2026-32892): OS Command Injection via move_to POST param in fileManage.lib.php. Auth'd teachers can run arbitrary commands as www-data. Patch: 1.11.38/2.0.0-RC.3. Details: radar.offseq.com/threat/cve-20 #OffSeq #Chamilo #CVE202632892 #infosec

##

thehackerwire@mastodon.social at 2026-04-11T06:00:07.000Z ##

πŸ”΄ CVE-2026-32892 - Critical (9.1)

Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, Chamilo LMS contains an OS Command Injection vulnerability in the file move function. The move() function in fileManage.lib.php passes user-controlled path values direct...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40200
(8.1 HIGH)

EPSS: 0.01%

updated 2026-04-13T15:02:06.187000

1 posts

An issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based memory corruption can occur during qsort of very large arrays, due to incorrectly implemented double-word primitives. The number of elements must exceed about seven million, i.e., the 32nd Leonardo number on 32-bit platforms (or the 64th Leonardo number on 64-bit platforms, which is not practical).

thehackerwire@mastodon.social at 2026-04-11T06:00:20.000Z ##

🟠 CVE-2026-40200 - High (8.1)

An issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based memory corruption can occur during qsort of very large arrays, due to incorrectly implemented double-word primitives. The number of elements must exceed about seven million, i....

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31941
(7.7 HIGH)

EPSS: 0.03%

updated 2026-04-13T15:02:06.187000

1 posts

Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, Chamilo LMS contains a Server-Side Request Forgery (SSRF) vulnerability in the Social Wall feature. The endpoint read_url_with_open_graph accepts a URL from the user via the social_wall_new_msg_main POST parameter and performs two server-side HTTP requests to that URL without validating whether the target is an internal

thehackerwire@mastodon.social at 2026-04-11T05:59:55.000Z ##

🟠 CVE-2026-31941 - High (7.7)

Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, Chamilo LMS contains a Server-Side Request Forgery (SSRF) vulnerability in the Social Wall feature. The endpoint read_url_with_open_graph accepts a URL from the user via...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31940
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-13T15:02:06.187000

1 posts

Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, in main/lp/aicc_hacp.php, user-controlled request parameters are directly used to set the PHP session ID before loading global bootstrap. This leads to session fixation. This vulnerability is fixed in 1.11.38 and 2.0.0-RC.3.

thehackerwire@mastodon.social at 2026-04-11T05:03:39.000Z ##

🟠 CVE-2026-31940 - High (7.5)

Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, in main/lp/aicc_hacp.php, user-controlled request parameters are directly used to set the PHP session ID before loading global bootstrap. This leads to session fixation....

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5483
(8.5 HIGH)

EPSS: 0.06%

updated 2026-04-13T15:02:06.187000

1 posts

A flaw was found in odh-dashboard in Red Hat Openshift AI. This vulnerability in the `odh-dashboard` component of Red Hat OpenShift AI (RHOAI) allows for the disclosure of Kubernetes Service Account tokens through a NodeJS endpoint. This could enable an attacker to gain unauthorized access to Kubernetes resources.

thehackerwire@mastodon.social at 2026-04-11T05:00:38.000Z ##

🟠 CVE-2026-5483 - High (8.5)

A flaw was found in odh-dashboard in Red Hat Openshift AI. This vulnerability in the `odh-dashboard` component of Red Hat OpenShift AI (RHOAI) allows for the disclosure of Kubernetes Service Account tokens through a NodeJS endpoint. This could ena...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33618
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-13T15:02:06.187000

1 posts

Chamilo LMS is a learning management system. Prior to .0.0-RC.3, the PlatformConfigurationController::decodeSettingArray() method uses PHP's eval() to parse platform settings from the database. An attacker with admin access (obtainable via Advisory 1) can inject arbitrary PHP code into the settings, which is then executed when any user (including unauthenticated) requests /platform-config/list. Th

thehackerwire@mastodon.social at 2026-04-11T05:00:19.000Z ##

🟠 CVE-2026-33618 - High (8.8)

Chamilo LMS is a learning management system. Prior to .0.0-RC.3, the PlatformConfigurationController::decodeSettingArray() method uses PHP's eval() to parse platform settings from the database. An attacker with admin access (obtainable via Advisor...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33710
(7.5 HIGH)

EPSS: 0.03%

updated 2026-04-13T15:02:06.187000

1 posts

Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, REST API keys are generated using md5(time() + (user_id * 5) - rand(10000, 10000)). The rand(10000, 10000) call always returns exactly 10000 (min == max), making the formula effectively md5(timestamp + user_id*5 - 10000). An attacker who knows a username and approximate key creation time can brute-force the API key. This

thehackerwire@mastodon.social at 2026-04-11T04:49:08.000Z ##

🟠 CVE-2026-33710 - High (7.5)

Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, REST API keys are generated using md5(time() + (user_id * 5) - rand(10000, 10000)). The rand(10000, 10000) call always returns exactly 10000 (min == max), making the for...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1116
(8.2 HIGH)

EPSS: 0.01%

updated 2026-04-13T15:01:43.663000

3 posts

A Cross-site Scripting (XSS) vulnerability was identified in the `from_dict` method of the `AppLollmsMessage` class in parisneo/lollms prior to version 2.2.0. The vulnerability arises from the lack of sanitization or HTML encoding of the `content` field when deserializing user-provided data. This allows an attacker to inject malicious HTML or JavaScript payloads, which can be executed in the conte

Matchbook3469@mastodon.social at 2026-04-13T15:57:12.000Z ##

🟠 New security advisory:

CVE-2026-1116 affects multiple systems.

β€’ Impact: Significant security breach potential
β€’ Risk: Unauthorized access or data exposure
β€’ Mitigation: Apply patches within 24-48 hours

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #VulnerabilityManagement #CyberSec

##

thehackerwire@mastodon.social at 2026-04-12T03:27:34.000Z ##

🟠 CVE-2026-1116 - High (8.2)

A Cross-site Scripting (XSS) vulnerability was identified in the `from_dict` method of the `AppLollmsMessage` class in parisneo/lollms prior to version 2.2.0. The vulnerability arises from the lack of sanitization or HTML encoding of the `content`...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-12T03:00:32.000Z ##

🚨 HIGH severity XSS (CVE-2026-1116) in parisneo/lollms pre-2.2.0: Improper input sanitization in from_dict allows attackers to inject malicious scripts. Update ASAP! radar.offseq.com/threat/cve-20 #OffSeq #XSS #Vuln #InfoSec

##

CVE-2026-3830
(8.6 HIGH)

EPSS: 0.04%

updated 2026-04-13T15:01:43.663000

1 posts

The Product Filter for WooCommerce by WBW WordPress plugin before 3.1.3 does not sanitize and escape a parameter before using it in a SQL statement, allowing unauthenticated users to perform SQL injection attacks

thehackerwire@mastodon.social at 2026-04-13T14:33:28.000Z ##

🟠 CVE-2026-3830 - High (8.6)

The Product Filter for WooCommerce by WBW WordPress plugin before 3.1.3 does not sanitize and escape a parameter before using it in a SQL statement, allowing unauthenticated users to perform SQL injection attacks

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5936
(8.5 HIGH)

EPSS: 0.03%

updated 2026-04-13T15:01:43.663000

1 posts

An attacker can control a server-side HTTP request by supplying a crafted URL, causing the server to initiate requests to arbitrary destinations. This behavior may be exploited to probe internal network services, access otherwise unreachable endpoints (e.g., cloud metadata services), or bypass network access controls, potentially leading to sensitive information disclosure and further compromise o

thehackerwire@mastodon.social at 2026-04-13T07:47:05.000Z ##

🟠 CVE-2026-5936 - High (8.5)

An attacker can control a server-side HTTP request by supplying a crafted URL, causing the server to initiate requests to arbitrary destinations. This behavior may be exploited to probe internal network services, access otherwise unreachable endpo...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25208
(8.1 HIGH)

EPSS: 0.04%

updated 2026-04-13T15:01:43.663000

1 posts

Integer overflow vulnerability in Samsung Open Source Escargot allows Overflow Buffers.This issue affects Escargot: 97e8115ab1110bc502b4b5e4a0c689a71520d335.

thehackerwire@mastodon.social at 2026-04-13T05:30:33.000Z ##

🟠 CVE-2026-25208 - High (8.1)

Integer overflow vulnerability in Samsung Open Source Escargot allows Overflow Buffers.This issue affects Escargot: 97e8115ab1110bc502b4b5e4a0c689a71520d335.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25205
(7.4 HIGH)

EPSS: 0.01%

updated 2026-04-13T15:01:43.663000

1 posts

Heap-based buffer overflow vulnerability in Samsung Open Source Escargot allows out-of-bounds write.This issue affects Escargot:commit hashΒ  97e8115ab1110bc502b4b5e4a0c689a71520d335 .

thehackerwire@mastodon.social at 2026-04-13T05:30:22.000Z ##

🟠 CVE-2026-25205 - High (8.1)

Heap-based buffer overflow vulnerability in Samsung Open Source Escargot allows out-of-bounds write.This issue affects Escargot:commit hash 
97e8115ab1110bc502b4b5e4a0c689a71520d335

.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6156
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-13T15:01:43.663000

2 posts

A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function setIpQosRules of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument Comment leads to os command injection. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.

offseq@infosec.exchange at 2026-04-13T04:30:28.000Z ##

πŸ›‘ CRITICAL: CVE-2026-6156 in Totolink A7100RU (7.4cu.2313_b20191024) enables unauthenticated OS command injection via setIpQosRules. No patch yet β€” restrict access & monitor updates. Exploit is public. Details: radar.offseq.com/threat/cve-20 #OffSeq #IoTSecurity #Vuln

##

thehackerwire@mastodon.social at 2026-04-13T04:17:21.000Z ##

πŸ”΄ CVE-2026-6156 - Critical (9.8)

A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function setIpQosRules of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument Comment leads to os comman...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40393
(8.1 HIGH)

EPSS: 0.04%

updated 2026-04-13T15:01:43.663000

1 posts

In Mesa before 25.3.6 and 26 before 26.0.1, out-of-bounds memory access can occur in WebGPU because the amount of to-be-allocated data depends on an untrusted party, and is then used for alloca.

thehackerwire@mastodon.social at 2026-04-13T04:26:27.000Z ##

🟠 CVE-2026-40393 - High (8.1)

In Mesa before 25.3.6 and 26 before 26.0.1, out-of-bounds memory access can occur in WebGPU because the amount of to-be-allocated data depends on an untrusted party, and is then used for alloca.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6131
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-13T15:01:43.663000

1 posts

A vulnerability was found in Totolink A7100RU 7.4cu.2313_b20191024. Affected by this vulnerability is the function setTracerouteCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument command results in os command injection. The attack may be launched remotely. The exploit has been made public and could be used.

thehackerwire@mastodon.social at 2026-04-13T04:26:08.000Z ##

πŸ”΄ CVE-2026-6131 - Critical (9.8)

A vulnerability was found in Totolink A7100RU 7.4cu.2313_b20191024. Affected by this vulnerability is the function setTracerouteCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument command results in ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34853
(7.7 HIGH)

EPSS: 0.01%

updated 2026-04-13T15:01:43.663000

1 posts

Permission bypass vulnerability in the LBS module. Impact: Successful exploitation of this vulnerability may affect availability.

thehackerwire@mastodon.social at 2026-04-13T04:25:10.000Z ##

🟠 CVE-2026-34853 - High (7.7)

Permission bypass vulnerability in the LBS module.
Impact: Successful exploitation of this vulnerability may affect availability.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6133
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-13T15:01:43.663000

1 posts

A vulnerability was identified in Tenda F451 1.0.0.7_cn_svn7958. This affects the function fromSafeUrlFilter of the file /goform/SafeUrlFilter. Such manipulation of the argument page leads to stack-based buffer overflow. The attack can be executed remotely. The exploit is publicly available and might be used.

thehackerwire@mastodon.social at 2026-04-13T04:01:45.000Z ##

🟠 CVE-2026-6133 - High (8.8)

A vulnerability was identified in Tenda F451 1.0.0.7_cn_svn7958. This affects the function fromSafeUrlFilter of the file /goform/SafeUrlFilter. Such manipulation of the argument page leads to stack-based buffer overflow. The attack can be executed...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6135
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-13T15:01:43.663000

1 posts

A weakness has been identified in Tenda F451 1.0.0.7_cn_svn7958. This issue affects the function fromSetIpBind of the file /goform/SetIpBind. Executing a manipulation of the argument page can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks.

thehackerwire@mastodon.social at 2026-04-13T04:01:33.000Z ##

🟠 CVE-2026-6135 - High (8.8)

A weakness has been identified in Tenda F451 1.0.0.7_cn_svn7958. This issue affects the function fromSetIpBind of the file /goform/SetIpBind. Executing a manipulation of the argument page can lead to stack-based buffer overflow. The attack may be ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6140
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-13T15:01:43.663000

2 posts

A vulnerability was found in Totolink A7100RU 7.4cu.2313_b20191024. This impacts the function UploadFirmwareFile of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument FileName results in os command injection. The attack may be initiated remotely. The exploit has been made public and could be used.

thehackerwire@mastodon.social at 2026-04-13T03:36:05.000Z ##

πŸ”΄ CVE-2026-6140 - Critical (9.8)

A vulnerability was found in Totolink A7100RU 7.4cu.2313_b20191024. This impacts the function UploadFirmwareFile of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument FileName results in os comman...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-13T01:30:38.000Z ##

🚨 CRITICAL: Totolink A7100RU 7.4cu.2313_b20191024 exposed to OS command injection via UploadFirmwareFile in /cgi-bin/cstecgi.cgi. Public exploit available β€” restrict access & monitor now. CVE-2026-6140 radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #IoTSecurity

##

CVE-2026-6113
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-13T15:01:43.663000

2 posts

A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected by this vulnerability is the function setTtyServiceCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument ttyEnable leads to os command injection. The attack can be launched remotely. The exploit has been disclosed publicly and may be used.

offseq@infosec.exchange at 2026-04-12T09:00:27.000Z ##

Totolink A7100RU (7.4cu.2313_b20191024) hit by CRITICAL OS command injection (CVE-2026-6113) β€” remote, unauthenticated attackers could execute commands. No patch yet; restrict access & monitor for updates. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #RouterSecurity

##

thehackerwire@mastodon.social at 2026-04-12T04:33:13.000Z ##

πŸ”΄ CVE-2026-6113 - Critical (9.8)

A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected by this vulnerability is the function setTtyServiceCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument t...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6121
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-13T15:01:43.663000

1 posts

A flaw has been found in Tenda F451 1.0.0.7. Affected by this vulnerability is the function WrlclientSet of the file /goform/WrlclientSet of the component httpd. This manipulation of the argument GO causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been published and may be used.

thehackerwire@mastodon.social at 2026-04-12T08:36:21.000Z ##

🟠 CVE-2026-6121 - High (8.8)

A flaw has been found in Tenda F451 1.0.0.7. Affected by this vulnerability is the function WrlclientSet of the file /goform/WrlclientSet of the component httpd. This manipulation of the argument GO causes stack-based buffer overflow. The attack m...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6115
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-13T15:01:43.663000

2 posts

A flaw has been found in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function setAppCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument enable can lead to os command injection. The attack may be launched remotely. The exploit has been published and may be used.

offseq@infosec.exchange at 2026-04-12T07:30:28.000Z ##

🚨 CRITICAL: CVE-2026-6115 in Totolink A7100RU (7.4cu.2313_b20191024) allows unauth'd remote OS command injection via /cgi-bin/cstecgi.cgi. No patch yet. Restrict access & monitor vendor updates. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Router #Infosec

##

thehackerwire@mastodon.social at 2026-04-12T05:42:51.000Z ##

πŸ”΄ CVE-2026-6115 - Critical (9.8)

A flaw has been found in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function setAppCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument enable can lead to os command injection. Th...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6120
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-13T15:01:43.663000

1 posts

A vulnerability was detected in Tenda F451 1.0.0.7. Affected is the function fromDhcpListClient of the file /goform/DhcpListClient of the component httpd. The manipulation of the argument page results in stack-based buffer overflow. The attack can be launched remotely. The exploit is now public and may be used.

thehackerwire@mastodon.social at 2026-04-12T06:59:47.000Z ##

🟠 CVE-2026-6120 - High (8.8)

A vulnerability was detected in Tenda F451 1.0.0.7. Affected is the function fromDhcpListClient of the file /goform/DhcpListClient of the component httpd. The manipulation of the argument page results in stack-based buffer overflow. The attack can...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6116
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-13T15:01:43.663000

2 posts

A vulnerability has been found in Totolink A7100RU 7.4cu.2313_b20191024. This vulnerability affects the function setDiagnosisCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument ip leads to os command injection. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.

offseq@infosec.exchange at 2026-04-12T06:00:29.000Z ##

Totolink A7100RU (fw 7.4cu.2313_b20191024) suffers CRITICAL OS command injection (CVE-2026-6116, CVSS 9.3). Remote, unauthenticated RCE is possible. No patch yet β€” disable remote access or isolate device! radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #RouterSecurity

##

thehackerwire@mastodon.social at 2026-04-12T05:42:41.000Z ##

πŸ”΄ CVE-2026-6116 - Critical (9.8)

A vulnerability has been found in Totolink A7100RU 7.4cu.2313_b20191024. This vulnerability affects the function setDiagnosisCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument ip leads to os command...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6114
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-13T15:01:43.663000

2 posts

A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected by this issue is the function setNetworkCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument proto results in os command injection. The attack may be initiated remotely. The exploit is now public and may be used.

thehackerwire@mastodon.social at 2026-04-12T04:33:23.000Z ##

πŸ”΄ CVE-2026-6114 - Critical (9.8)

A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected by this issue is the function setNetworkCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument proto results in o...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-12T04:30:27.000Z ##

Totolink A7100RU (7.4cu.2313_b20191024) faces a CRITICAL OS command injection (CVE-2026-6114, CVSS 9.3). Remote, unauthenticated code execution possible. No patch yet β€” disable remote mgmt & watch for updates. radar.offseq.com/threat/cve-20 #OffSeq #CVE20266114 #Vuln #RouterSecurity

##

CVE-2026-6106
(3.5 LOW)

EPSS: 0.03%

updated 2026-04-13T15:01:43.663000

1 posts

A vulnerability was detected in 1Panel-dev MaxKB up to 2.2.1. This vulnerability affects the function StaticHeadersMiddleware of the file apps/common/middleware/static_headers_middleware.py of the component Public Chat Interface. The manipulation of the argument Name results in cross site scripting. The attack may be launched remotely. The exploit is now public and may be used. Upgrading to versio

offseq@infosec.exchange at 2026-04-12T01:30:30.000Z ##

πŸ”Ž CVE-2026-6106: 1Panel-dev MaxKB v2.2.0/2.2.1 impacted by MEDIUM XSS via Public Chat Interface (Name arg). Patch to v2.8.0 to mitigate. No in-the-wild exploits yet. Full details: radar.offseq.com/threat/cve-20 #OffSeq #XSS #Vuln

##

CVE-2026-5144
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-13T15:01:43.663000

1 posts

The BuddyPress Groupblog plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.9.3. This is due to the group blog settings handler accepting the `groupblog-blogid`, `default-member`, and `groupblog-silent-add` parameters from user input without proper authorization checks. The `groupblog-blogid` parameter allows any group admin (including Subscribers wh

offseq@infosec.exchange at 2026-04-11T22:00:11.000Z ##

🚩 HIGH severity: CVE-2026-5144 impacts BuddyPress Groupblog ≀1.9.3. Authenticated users (even Subscribers) can escalate to Admin on WordPress Multisite. No patch yet β€” disable or restrict plugin for now. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #CVE20265144 #infosec

##

CVE-2026-5809
(7.1 HIGH)

EPSS: 0.03%

updated 2026-04-13T15:01:43.663000

2 posts

The wpForo Forum plugin for WordPress is vulnerable to Arbitrary File Deletion in versions up to and including 3.0.2. This is due to a two-step logic flaw: the topic_add() and topic_edit() action handlers accept arbitrary user-supplied data[*] arrays from $_REQUEST and store them as postmeta without restricting which fields may contain array values. Because 'body' is included in the allowed topic

offseq@infosec.exchange at 2026-04-11T20:30:12.000Z ##

πŸ“’ CVE-2026-5809 (HIGH): wpForo Forum ≀3.0.2 lets authenticated users delete arbitrary files like wp-config.php, risking site availability. Restrict permissions & monitor edits until a fix. Details: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln #WebSec

##

offseq@infosec.exchange at 2026-04-11T09:00:29.000Z ##

πŸ›‘οΈ CVE-2026-5809: HIGH severity vuln in wpForo Forum plugin ≀3.0.2 lets subscriber+ users delete arbitrary files (e.g., wp-config.php). No patch yet β€” restrict permissions & monitor topic edits for abuse. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln #InfoSec

##

CVE-2026-4149
(10.0 CRITICAL)

EPSS: 1.27%

updated 2026-04-13T15:01:43.663000

2 posts

Sonos Era 300 SMB Response Out-Of-Bounds Access Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Sonos Era 300. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the DataOffset field within SMB responses. The issue results from the lack of proper valida

offseq@infosec.exchange at 2026-04-11T13:00:26.000Z ##

⚠️ CVE-2026-4149: Sonos Era 300 (v17.5) has a CRITICAL remote code execution vulnerability via SMB, allowing kernel-level compromise without auth. No patch yet β€” restrict SMB access! radar.offseq.com/threat/cve-20 #OffSeq #Sonos #Infosec #RCE

##

thehackerwire@mastodon.social at 2026-04-11T03:55:26.000Z ##

πŸ”΄ CVE-2026-4149 - Critical (10)

Sonos Era 300 SMB Response Out-Of-Bounds Access Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Sonos Era 300. Authentication is not required to exploit this vu...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4153
(7.8 HIGH)

EPSS: 0.06%

updated 2026-04-13T15:01:43.663000

1 posts

GIMP PSP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PSP files. The issue results f

thehackerwire@mastodon.social at 2026-04-11T04:00:25.000Z ##

🟠 CVE-2026-4153 - High (7.8)

GIMP PSP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerabilit...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4152
(7.8 HIGH)

EPSS: 0.06%

updated 2026-04-13T15:01:43.663000

1 posts

GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JP2 files. The issue results f

thehackerwire@mastodon.social at 2026-04-11T04:00:10.000Z ##

🟠 CVE-2026-4152 - High (7.8)

GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerabilit...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4151
(7.8 HIGH)

EPSS: 0.06%

updated 2026-04-13T15:01:43.663000

1 posts

GIMP ANI File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of ANI files. The issue results from the la

thehackerwire@mastodon.social at 2026-04-11T03:59:58.000Z ##

🟠 CVE-2026-4151 - High (7.8)

GIMP ANI File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6168
(8.8 HIGH)

EPSS: 0.08%

updated 2026-04-13T09:31:39

1 posts

A flaw has been found in TOTOLINK A7000R up to 9.1.0u.6115. The affected element is the function setWiFiEasyGuestCfg of the file /cgi-bin/cstecgi.cgi. This manipulation of the argument ssid5g causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been published and may be used.

thehackerwire@mastodon.social at 2026-04-13T07:46:55.000Z ##

🟠 CVE-2026-6168 - High (8.8)

A flaw has been found in TOTOLINK A7000R up to 9.1.0u.6115. The affected element is the function setWiFiEasyGuestCfg of the file /cgi-bin/cstecgi.cgi. This manipulation of the argument ssid5g causes stack-based buffer overflow. Remote exploitation...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6154
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-13T06:30:37

2 posts

A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. The affected element is the function setWizardCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument wizard results in os command injection. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks.

offseq@infosec.exchange at 2026-04-13T07:30:27.000Z ##

πŸ›‘ CRITICAL: Totolink A7100RU (v7.4cu.2313_b20191024) suffers from unauthenticated OS command injection (CVE-2026-6154). Public exploit out, no patch yet. Isolate devices & check vendor updates. radar.offseq.com/threat/cve-20 #OffSeq #CVE20266154 #router #infosec

##

thehackerwire@mastodon.social at 2026-04-13T04:25:01.000Z ##

πŸ”΄ CVE-2026-6154 - Critical (9.8)

A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. The affected element is the function setWizardCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument wizard results...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6155
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-13T06:30:37

2 posts

A weakness has been identified in Totolink A7100RU 7.4cu.2313. The impacted element is the function setWanCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument pppoeServiceName can lead to os command injection. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks.

offseq@infosec.exchange at 2026-04-13T06:00:28.000Z ##

CRITICAL: CVE-2026-6155 in Totolink A7100RU (fw 7.4cu.2313) allows unauthenticated OS command injection via pppoeServiceName in CGI handler. No patch yet β€” restrict remote access & monitor activity. Details: radar.offseq.com/threat/cve-20 #OffSeq #CVE20266155 #Infosec

##

thehackerwire@mastodon.social at 2026-04-13T04:17:11.000Z ##

πŸ”΄ CVE-2026-6155 - Critical (9.8)

A weakness has been identified in Totolink A7100RU 7.4cu.2313. The impacted element is the function setWanCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument pppoeServiceName can lead to os c...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6157
(8.8 HIGH)

EPSS: 0.08%

updated 2026-04-13T06:30:37

1 posts

A vulnerability was detected in Totolink A800R 4.1.2cu.5137_B20200730. This impacts the function setAppEasyWizardConfig in the library /lib/cste_modules/app.so. The manipulation of the argument apcliSsid results in buffer overflow. The attack can be executed remotely. The exploit is now public and may be used.

thehackerwire@mastodon.social at 2026-04-13T04:17:01.000Z ##

🟠 CVE-2026-6157 - High (8.8)

A vulnerability was detected in Totolink A800R 4.1.2cu.5137_B20200730. This impacts the function setAppEasyWizardConfig in the library /lib/cste_modules/app.so. The manipulation of the argument apcliSsid results in buffer overflow. The attack can ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6152
(7.3 HIGH)

EPSS: 0.03%

updated 2026-04-13T03:30:35

1 posts

A vulnerability was determined in code-projects Vehicle Showroom Management System 1.0. This issue affects some unknown processing of the file /util/StaffAddingFunction.php. This manipulation of the argument STAFF_ID causes sql injection. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized.

Matchbook3469@mastodon.social at 2026-04-13T23:11:40.000Z ##

🟠 New security advisory:

CVE-2026-6152 affects multiple systems.

β€’ Impact: Significant security breach potential
β€’ Risk: Unauthorized access or data exposure
β€’ Mitigation: Apply patches within 24-48 hours

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #VulnerabilityManagement #CyberSec

##

CVE-2026-6139
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-13T03:30:29

2 posts

A vulnerability has been found in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function UploadOpenVpnCert of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument FileName leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

thehackerwire@mastodon.social at 2026-04-13T03:35:55.000Z ##

πŸ”΄ CVE-2026-6139 - Critical (9.8)

A vulnerability has been found in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function UploadOpenVpnCert of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument FileName leads to os command inje...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-13T03:00:29.000Z ##

Totolink A7100RU (7.4cu.2313_b20191024) faces CRITICAL OS command injection (CVE-2026-6139, CVSS 9.3). Remote, unauthenticated exploit possible. No patch yet β€” isolate & monitor! radar.offseq.com/threat/cve-20 #OffSeq #infosec #vuln #IoTSecurity

##

CVE-2026-6138
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-13T00:30:34

2 posts

A flaw has been found in Totolink A7100RU 7.4cu.2313_b20191024. The impacted element is the function setAccessDeviceCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument mac causes os command injection. The attack can be initiated remotely. The exploit has been published and may be used.

offseq@infosec.exchange at 2026-04-13T09:00:27.000Z ##

⚠️ CRITICAL: Totolink A7100RU (7.4cu.2313_b20191024) suffers from unauthenticated OS command injection (CVE-2026-6138, CVSS 9.3). No patch yet. Limit remote access & watch for vendor updates. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Infosec #RouterSecurity

##

thehackerwire@mastodon.social at 2026-04-13T04:00:23.000Z ##

πŸ”΄ CVE-2026-6138 - Critical (9.8)

A flaw has been found in Totolink A7100RU 7.4cu.2313_b20191024. The impacted element is the function setAccessDeviceCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument mac causes os command injectio...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6132
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-13T00:30:34

2 posts

A vulnerability was determined in Totolink A7100RU 7.4cu.2313_b20191024. Affected by this issue is the function setLedCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument enable causes os command injection. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-04-13T04:26:18.000Z ##

πŸ”΄ CVE-2026-6132 - Critical (9.8)

A vulnerability was determined in Totolink A7100RU 7.4cu.2313_b20191024. Affected by this issue is the function setLedCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument enable causes os command inj...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-13T00:00:22.000Z ##

⚠️ CRITICAL OS command injection (CVE-2026-6132) in Totolink A7100RU routers (7.4cu.2313_b20191024). Unauthenticated remote code execution possible. No patch yet β€” restrict access & monitor closely. Details: radar.offseq.com/threat/cve-20 #OffSeq #CVE20266132 #IoTSecurity

##

CVE-2026-6134
(8.8 HIGH)

EPSS: 0.02%

updated 2026-04-13T00:30:34

1 posts

A security flaw has been discovered in Tenda F451 1.0.0.7_cn_svn7958. This vulnerability affects the function fromqossetting of the file /goform/qossetting. Performing a manipulation of the argument qos results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks.

thehackerwire@mastodon.social at 2026-04-13T04:01:58.000Z ##

🟠 CVE-2026-6134 - High (8.8)

A security flaw has been discovered in Tenda F451 1.0.0.7_cn_svn7958. This vulnerability affects the function fromqossetting of the file /goform/qossetting. Performing a manipulation of the argument qos results in stack-based buffer overflow. The ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6137
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-13T00:30:34

1 posts

A vulnerability was detected in Tenda F451 1.0.0.7_cn_svn7958. The affected element is the function fromAdvSetWan of the file /goform/AdvSetWan. The manipulation of the argument wanmode/PPPOEPassword results in stack-based buffer overflow. It is possible to launch the attack remotely. The exploit is now public and may be used.

thehackerwire@mastodon.social at 2026-04-13T04:00:04.000Z ##

🟠 CVE-2026-6137 - High (8.8)

A vulnerability was detected in Tenda F451 1.0.0.7_cn_svn7958. The affected element is the function fromAdvSetWan of the file /goform/AdvSetWan. The manipulation of the argument wanmode/PPPOEPassword results in stack-based buffer overflow. It is p...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6136
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-13T00:30:34

1 posts

A security vulnerability has been detected in Tenda F451 1.0.0.7_cn_svn7958. Impacted is the function frmL7ImForm of the file /goform/L7Im. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.

thehackerwire@mastodon.social at 2026-04-13T03:36:15.000Z ##

🟠 CVE-2026-6136 - High (8.8)

A security vulnerability has been detected in Tenda F451 1.0.0.7_cn_svn7958. Impacted is the function frmL7ImForm of the file /goform/L7Im. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to initiate the ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6124
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-12T09:31:45

1 posts

A vulnerability was determined in Tenda F451 1.0.0.7. This vulnerability affects the function fromSafeMacFilter of the file /goform/SafeMacFilter of the component httpd. Executing a manipulation of the argument page/menufacturer can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-04-12T10:00:05.000Z ##

🟠 CVE-2026-6124 - High (8.8)

A vulnerability was determined in Tenda F451 1.0.0.7. This vulnerability affects the function fromSafeMacFilter of the file /goform/SafeMacFilter of the component httpd. Executing a manipulation of the argument page/menufacturer can lead to stack-...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6122
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-12T09:31:45

1 posts

A vulnerability has been found in Tenda F451 1.0.0.7. Affected by this issue is the function frmL7ProtForm of the file /goform/L7Prot of the component httpd. Such manipulation of the argument page leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

thehackerwire@mastodon.social at 2026-04-12T08:36:12.000Z ##

🟠 CVE-2026-6122 - High (8.8)

A vulnerability has been found in Tenda F451 1.0.0.7. Affected by this issue is the function frmL7ProtForm of the file /goform/L7Prot of the component httpd. Such manipulation of the argument page leads to stack-based buffer overflow. The attack m...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6123
(8.8 HIGH)

EPSS: 0.09%

updated 2026-04-12T09:31:44

1 posts

A vulnerability was found in Tenda F451 1.0.0.7. This affects the function fromAddressNat of the file /goform/addressNat of the component httpd. Performing a manipulation of the argument entrys results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used.

thehackerwire@mastodon.social at 2026-04-12T10:00:16.000Z ##

🟠 CVE-2026-6123 - High (8.8)

A vulnerability was found in Tenda F451 1.0.0.7. This affects the function fromAddressNat of the file /goform/addressNat of the component httpd. Performing a manipulation of the argument entrys results in stack-based buffer overflow. Remote exploi...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6112
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-12T06:30:33

2 posts

A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. Affected is the function setRadvdCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument maxRtrAdvInterval causes os command injection. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks.

offseq@infosec.exchange at 2026-04-12T10:30:29.000Z ##

🚨 CVE-2026-6112 (CRITICAL, CVSS 9.3): Totolink A7100RU (fw 7.4cu.2313_b20191024) is vulnerable to unauthenticated OS command injection via /cgi-bin/cstecgi.cgi. No patch yet β€” restrict access & monitor activity. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #Infosec #CVE20266112

##

thehackerwire@mastodon.social at 2026-04-12T04:33:33.000Z ##

πŸ”΄ CVE-2026-6112 - Critical (9.8)

A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. Affected is the function setRadvdCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument maxRtrAdvInterval causes os command inje...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31845
(9.3 CRITICAL)

EPSS: 0.02%

updated 2026-04-11T21:30:24

2 posts

A reflected cross-site scripting (XSS) vulnerability exists in Rukovoditel CRM version 3.6.4 and earlier in the Zadarma telephony API endpoint (/api/tel/zadarma.php). The application directly reflects user-supplied input from the 'zd_echo' GET parameter into the HTTP response without proper sanitization, output encoding, or content-type restrictions. The vulnerable code is: if (isset($_GET['zd_e

thehackerwire@mastodon.social at 2026-04-12T03:27:43.000Z ##

πŸ”΄ CVE-2026-31845 - Critical (9.3)

A reflected cross-site scripting (XSS) vulnerability exists in Rukovoditel CRM version 3.6.4 and earlier in the Zadarma telephony API endpoint (/api/tel/zadarma.php). The application directly reflects user-supplied input from the 'zd_echo' GET par...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-11T19:00:12.000Z ##

🚨 CRITICAL XSS in Rukovoditel CRM 3.6.4 (CVE-2026-31845): Pre-auth reflected XSS in the Zadarma API (/api/tel/zadarma.php) lets attackers inject JS via 'zd_echo'. Patch or restrict access! radar.offseq.com/threat/cve-20 #OffSeq #XSS #Rukovoditel #Infosec

##

CVE-2026-5217
(7.2 HIGH)

EPSS: 0.08%

updated 2026-04-11T03:30:41

1 posts

The Optimole – Optimize Images | Convert WebP & AVIF | CDN & Lazy Load | Image Optimization plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 4.2.2. This is due to insufficient input sanitization and output escaping on the user-supplied 's' parameter (srcset descriptor) in the unauthenticated /wp-json/optimole/v1/optimizations REST endpoint. Th

offseq@infosec.exchange at 2026-04-12T00:00:40.000Z ##

🚨 HIGH risk: Optimole WordPress plugin (≀4.2.2) vulnerable to unauthenticated stored XSS via /wp-json/optimole/v1/optimizations. HMAC bypassed. Disable plugin until patch. CVE-2026-5217 radar.offseq.com/threat/cve-20 #OffSeq #WordPress #XSS #infosec

##

CVE-2026-4150
(7.8 HIGH)

EPSS: 0.06%

updated 2026-04-11T03:30:41

1 posts

GIMP PSD File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PSD files. The issue results from the la

thehackerwire@mastodon.social at 2026-04-11T03:55:36.000Z ##

🟠 CVE-2026-4150 - High (7.8)

GIMP PSD File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-29145
(9.1 CRITICAL)

EPSS: 0.06%

updated 2026-04-10T22:07:26

1 posts

CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled vulnerability in Apache Tomcat, Apache Tomcat Native. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M7 through 10.1.52, from 9.0.83 through 9.0.115; Apache Tomcat Native: from 1.1.23 through 1.1.34, from 1.2.0 through 1.2.39, from 1.3.0 through 1.3.6, from 2.0.0 throu

1 repos

https://github.com/gregk4sec/cve-2026-29145

thehackerwire@mastodon.social at 2026-04-12T06:08:47.000Z ##

πŸ”΄ CVE-2026-29145 - Critical (9.1)

CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled vulnerability in Apache Tomcat, Apache Tomcat Native.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M7 through 10.1...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34487
(7.5 HIGH)

EPSS: 0.03%

updated 2026-04-10T21:38:44

1 posts

Insertion of Sensitive Information into Log File vulnerability in the cloud membership for clustering component of Apache Tomcat exposed the Kubernetes bearer token. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.20, from 10.1.0-M1 through 10.1.53, from 9.0.13 through 9.0.116. Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117, which fix the issue.

thehackerwire@mastodon.social at 2026-04-12T05:45:42.000Z ##

🟠 CVE-2026-34487 - High (7.5)

Insertion of Sensitive Information into Log File vulnerability in the cloud membership for clustering component of Apache Tomcat exposed the Kubernetes bearer token.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.20, from 10.1.0-M1...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34483
(7.5 HIGH)

EPSS: 0.03%

updated 2026-04-10T21:38:24

1 posts

Improper Encoding or Escaping of Output vulnerability in the JsonAccessLogValve component of Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.20, from 10.1.0-M1 through 10.1.53, from 9.0.40 through 9.0.116. Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117 , which fix the issue.

thehackerwire@mastodon.social at 2026-04-12T06:09:08.000Z ##

🟠 CVE-2026-34483 - High (7.5)

Improper Encoding or Escaping of Output vulnerability in the JsonAccessLogValve component of Apache Tomcat.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.20, from 10.1.0-M1 through 10.1.53, from 9.0.40 through 9.0.116.

Users are ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40189(CVSS UNKNOWN)

EPSS: 0.10%

updated 2026-04-10T21:37:33

1 posts

### Summary goshs enforces the documented per-folder `.goshs` ACL/basic-auth mechanism for directory listings and file reads, but it does not enforce the same authorization checks for state-changing routes. An unauthenticated attacker can upload files with `PUT`, upload files with multipart `POST /upload`, create directories with `?mkdir`, and delete files with `?delete` inside a `.goshs`-protecte

offseq@infosec.exchange at 2026-04-11T14:30:12.000Z ##

CVE-2026-40189 (CRITICAL): patrickhener goshs <2.0.0-beta.4 has a missing auth bug β€” attackers can upload, delete, or remove auth files, exposing protected dirs. Upgrade to 2.0.0-beta.4 ASAP. radar.offseq.com/threat/cve-20 #OffSeq #CVE202640189 #GoLang #infosec

##

CVE-2026-40188
(7.7 HIGH)

EPSS: 0.03%

updated 2026-04-10T21:37:28

1 posts

### Summary The SFTP command rename sanitizes only the source path and not the destination, so it is possible to write outside of the root directory of the SFTP. ### Details Here is the issue: ```go // helper.go:155-215 func cmdFile(root string, r *sftp.Request, ip string, sftpServer *SFTPServer) error { fullPath, err := sanitizePath(r.Filepath, root) // Source: SANITIZED if err != nil

thehackerwire@mastodon.social at 2026-04-11T04:01:16.000Z ##

🟠 CVE-2026-40188 - High (7.7)

goshs is a SimpleHTTPServer written in Go. From 1.0.7 to before 2.0.0-beta.4, the SFTP command rename sanitizes only the source path and not the destination, so it is possible to write outside of the root directory of the SFTP. This vulnerability ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40046
(5.4 MEDIUM)

EPSS: 0.04%

updated 2026-04-10T21:35:58

1 posts

Integer Overflow or Wraparound vulnerability in Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ MQTT. The fix for "CVE-2025-66168: MQTT control packet remaining length field is not properly validated" was only applied to 5.19.2 (and future 5.19.x) releases but was missed for all 6.0.0+ versions. This issue affects Apache ActiveMQ: from 6.0.0 before 6.2.4; Apache ActiveMQ All: from 6.0.0 bef

thehackerwire@mastodon.social at 2026-04-12T08:44:44.000Z ##

🟠 CVE-2026-40046 - High (7.5)

Integer Overflow or Wraparound vulnerability in Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ MQTT.

The fix for "CVE-2025-66168: MQTT control packet remaining length field is not properly validated" was only applied to 5.19.2 (and future ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34020
(7.5 HIGH)

EPSS: 0.03%

updated 2026-04-10T21:35:18

1 posts

Use of GET Request Method With Sensitive Query Strings vulnerability in Apache OpenMeetings. The REST login endpoint uses HTTP GET method with username and password passed as query parameters.Β Please check references regarding possible impact This issue affects Apache OpenMeetings: from 3.1.3 before 9.0.0. Users are recommended to upgrade to version 9.0.0, which fixes the issue.

thehackerwire@mastodon.social at 2026-04-12T10:00:43.000Z ##

🟠 CVE-2026-34020 - High (7.5)

Use of GET Request Method With Sensitive Query Strings vulnerability in Apache OpenMeetings.

The REST login endpoint uses HTTP GET method with username and password passed as query parameters. Please check references regarding possible impact

...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6057
(9.8 CRITICAL)

EPSS: 0.11%

updated 2026-04-10T21:32:22

1 posts

FalkorDB Browser 1.9.3 contains an unauthenticated path traversal vulnerability in the file upload API that allows remote attackers to write arbitrary files and achieve remote code execution.

thehackerwire@mastodon.social at 2026-04-12T04:00:24.000Z ##

πŸ”΄ CVE-2026-6057 - Critical (9.8)

FalkorDB Browser 1.9.3 contains an unauthenticated path traversal vulnerability in the file upload API that allows remote attackers to write arbitrary files and achieve remote code execution.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5412
(10.0 CRITICAL)

EPSS: 0.04%

updated 2026-04-10T21:00:18

1 posts

### Impact If a user has login permission to a controller and knows the controller model UUID, they can call the CloudSpec method on the Controller facade and get cloud credentials used to bootstrap the controller. The CloudSpec API is called by workers running in the controller to maintain connection to the cloud - this aspect is not the issue. The API is also called by the CLI when killing (f

thehackerwire@mastodon.social at 2026-04-11T07:06:33.000Z ##

πŸ”΄ CVE-2026-5412 - Critical (9.9)

In Juju versions prior to 2.9.57 and 3.6.21, an authorization issue exists in the Controller facade. An authenticated user can call the CloudSpec API method to extract the cloud credentials used to bootstrap the controller. This allows a low-privi...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35643
(8.8 HIGH)

EPSS: 0.04%

updated 2026-04-10T19:38:05

2 posts

## Summary Android Canvas WebView pages from untrusted origins could invoke the JavascriptInterface bridge and inject instructions into the app. ## Affected Packages / Versions - Package: `openclaw` (npm) - Affected: < 2026.3.22 - Fixed: >= 2026.3.22 - Latest released tag checked: `v2026.3.23-2` (`630f1479c44f78484dfa21bb407cbe6f171dac87`) - Latest published npm version checked: `2026.3.23-2` ##

thehackerwire@mastodon.social at 2026-04-11T07:03:17.000Z ##

🟠 CVE-2026-35643 - High (8.8)

OpenClaw before 2026.3.22 contains an unvalidated WebView JavascriptInterface vulnerability allowing attackers to inject arbitrary instructions. Untrusted pages can invoke the canvas bridge to execute malicious code within the Android application ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-11T07:02:07.000Z ##

🟠 CVE-2026-35643 - High (8.8)

OpenClaw before 2026.3.22 contains an unvalidated WebView JavascriptInterface vulnerability allowing attackers to inject arbitrary instructions. Untrusted pages can invoke the canvas bridge to execute malicious code within the Android application ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35666
(8.8 HIGH)

EPSS: 0.04%

updated 2026-04-10T19:37:45

1 posts

## Summary Allow-always exec approvals did not unwrap /usr/bin/time, so an unregistered time wrapper could bypass executable binding and reuse approval state for the inner command. ## Affected Packages / Versions - Package: `openclaw` (npm) - Affected: < 2026.3.22 - Fixed: >= 2026.3.22 - Latest released tag checked: `v2026.3.23-2` (`630f1479c44f78484dfa21bb407cbe6f171dac87`) - Latest published np

thehackerwire@mastodon.social at 2026-04-11T06:11:20.000Z ##

🟠 CVE-2026-35666 - High (8.8)

OpenClaw before 2026.3.22 contains an allowlist bypass vulnerability in system.run approvals that fails to unwrap /usr/bin/time wrappers. Attackers can bypass executable binding restrictions by using an unregistered time wrapper to reuse approval ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40163
(8.2 HIGH)

EPSS: 0.08%

updated 2026-04-10T19:30:28

1 posts

### Summary Two unauthenticated path traversal vulnerabilities exist in Saltcorn's mobile sync endpoints. The `POST /sync/offline_changes` endpoint allows an unauthenticated attacker to create arbitrary directories and write a `changes.json` file with attacker-controlled JSON content anywhere on the server filesystem. The `GET /sync/upload_finished` endpoint allows an unauthenticated attacker to

thehackerwire@mastodon.social at 2026-04-11T05:00:29.000Z ##

🟠 CVE-2026-40163 - High (8.2)

Saltcorn is an extensible, open source, no-code database application builder. Prior to 1.4.5, 1.5.5, and 1.6.0-beta.4, the POST /sync/offline_changes endpoint allows an unauthenticated attacker to create arbitrary directories and write a changes.j...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40156
(7.8 HIGH)

EPSS: 0.02%

updated 2026-04-10T19:26:45

1 posts

PraisonAI automatically loads a file named `tools.py` from the current working directory to discover and register custom agent tools. This loading process uses `importlib.util.spec_from_file_location` and immediately executes module-level code via `spec.loader.exec_module()` **without explicit user consent, validation, or sandboxing**. The `tools.py` file is loaded **implicitly**, even when it is

thehackerwire@mastodon.social at 2026-04-11T06:10:40.000Z ##

🟠 CVE-2026-40156 - High (7.8)

PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAI automatically loads a file named tools.py from the current working directory to discover and register custom agent tools. This loading process uses importlib.util.spec_from_file_...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35669(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-04-10T17:29:55

1 posts

## Summary Gateway Plugin HTTP auth: "gateway" Mints operator.admin Runtime Scope ## Affected Packages / Versions - Package: `openclaw` - Affected versions: `<= 2026.3.24` - First patched version: `2026.3.25` - Latest published npm version at verification time: `2026.3.24` ## Details Gateway-authenticated plugin HTTP routes previously created a runtime scope set that included `operator.admin`

thehackerwire@mastodon.social at 2026-04-11T06:11:00.000Z ##

🟠 CVE-2026-35669 - High (8.8)

OpenClaw before 2026.3.25 contains a privilege escalation vulnerability in gateway-authenticated plugin HTTP routes that incorrectly mint operator.admin runtime scope regardless of caller-granted scopes. Attackers can exploit this scope boundary b...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35660(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-04-10T17:27:04

1 posts

## Summary Before `v2026.3.23`, the Gateway `agent` RPC accepted `/reset` and `/new` for callers with only `operator.write`, even though the direct `sessions.reset` RPC correctly requires `operator.admin`. ## Affected Packages / Versions - Package: `openclaw` (npm) - Affected: `< 2026.3.23` - Fixed: `>= 2026.3.23` - Latest released tag checked: `v2026.3.23-2` (`630f1479c44f78484dfa21bb407cbe6f171

thehackerwire@mastodon.social at 2026-04-11T06:14:19.000Z ##

🟠 CVE-2026-35660 - High (8.1)

OpenClaw before 2026.3.23 contains an insufficient access control vulnerability in the Gateway agent /reset endpoint that allows callers with operator.write permission to reset admin sessions. Attackers with operator.write privileges can invoke /r...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35653
(8.1 HIGH)

EPSS: 0.04%

updated 2026-04-10T17:24:51

1 posts

> Fixed in OpenClaw 2026.3.24, the current shipping release. # Title `browser.request` still allows `POST /reset-profile` through the `operator.write` surface in OpenClaw `v2026.3.22` after `GHSA-vmhq-cqm9-6p7q` ## Severity Assessment High CWE: - `CWE-863: Incorrect Authorization` Proposed CVSS v3.1: - `8.1` (`CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H`) An authenticated caller who only

thehackerwire@mastodon.social at 2026-04-11T07:00:21.000Z ##

🟠 CVE-2026-35653 - High (8.1)

OpenClaw before 2026.3.24 contains an incorrect authorization vulnerability in the POST /reset-profile endpoint that allows authenticated callers with operator.write access to browser.request to bypass profile mutation restrictions. Attackers can ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-5804
(7.5 HIGH)

EPSS: 0.07%

updated 2026-04-10T15:32:07

1 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Case Themes Case Theme User allows PHP Local File Inclusion.This issue affects Case Theme User: from n/a before 1.0.4.

thehackerwire@mastodon.social at 2026-04-11T07:05:02.000Z ##

🟠 CVE-2025-5804 - High (7.5)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Case Themes Case Theme User allows PHP Local File Inclusion.This issue affects Case Theme User: from n/a before 1.0.4.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-58913
(8.1 HIGH)

EPSS: 0.11%

updated 2026-04-10T15:32:07

1 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in CactusThemes VideoPro allows PHP Local File Inclusion.This issue affects VideoPro: from n/a through 2.3.8.1.

thehackerwire@mastodon.social at 2026-04-11T07:04:51.000Z ##

🟠 CVE-2025-58913 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in CactusThemes VideoPro allows PHP Local File Inclusion.This issue affects VideoPro: from n/a through 2.3.8.1.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33092
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-10T15:32:05

1 posts

Local privilege escalation due to improper handling of environment variables. The following products are affected: Acronis True Image OEM (macOS) before build 42571, Acronis True Image (macOS) before build 42902.

thehackerwire@mastodon.social at 2026-04-11T07:04:41.000Z ##

🟠 CVE-2026-33092 - High (7.8)

Local privilege escalation due to improper handling of environment variables. The following products are affected: Acronis True Image OEM (macOS) before build 42571, Acronis True Image (macOS) before build 42902.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-66168
(5.4 MEDIUM)

EPSS: 0.07%

updated 2026-04-10T14:59:48

1 posts

Apache ActiveMQ does not properly validate the remaining length field which may lead to an overflow during the decoding of malformed packets.Β When this integer overflow occurs, ActiveMQ may incorrectly compute the total Remaining Length and subsequently misinterpret the payload as multiple MQTT control packets which makesΒ the broker susceptible to unexpected behavior when interacting with non-comp

thehackerwire@mastodon.social at 2026-04-12T08:44:44.000Z ##

🟠 CVE-2026-40046 - High (7.5)

Integer Overflow or Wraparound vulnerability in Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ MQTT.

The fix for "CVE-2025-66168: MQTT control packet remaining length field is not properly validated" was only applied to 5.19.2 (and future ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6026
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-10T09:31:20

1 posts

A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. This vulnerability affects the function setPortalConfWeChat of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument enable results in os command injection. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks.

thehackerwire@mastodon.social at 2026-04-12T04:35:39.000Z ##

πŸ”΄ CVE-2026-6026 - Critical (9.8)

A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. This vulnerability affects the function setPortalConfWeChat of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument enab...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28704
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-10T09:31:16

1 posts

Emocheck insecurely loads Dynamic Link Libraries (DLLs). If a crafted DLL file is placed to the same directory, an arbitrary code may be executed with the privilege of the user invoking EmoCheck.

thehackerwire@mastodon.social at 2026-04-12T04:35:29.000Z ##

🟠 CVE-2026-28704 - High (7.8)

Emocheck insecurely loads Dynamic Link Libraries (DLLs). If a crafted DLL file is placed to the same directory, an arbitrary code may be executed with the privilege of the user invoking EmoCheck.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39912
(9.1 CRITICAL)

EPSS: 0.06%

updated 2026-04-09T21:31:36

1 posts

V2Board 1.6.1 through 1.7.4 and Xboard through 0.1.9 expose authentication tokens in HTTP response bodies of the loginWithMailLink endpoint when the login_with_mail_link_enable feature is active. Unauthenticated attackers can POST to the loginWithMailLink endpoint with a known email address to receive the full authentication URL in the response, then exchange the token at the token2Login endpoint

1 repos

https://github.com/Chocapikk/CVE-2026-39912

thehackerwire@mastodon.social at 2026-04-12T07:00:10.000Z ##

πŸ”΄ CVE-2026-39912 - Critical (9.1)

V2Board 1.6.1 through 1.7.4 and Xboard through 0.1.9 expose authentication tokens in HTTP response bodies of the loginWithMailLink endpoint when the login_with_mail_link_enable feature is active. Unauthenticated attackers can POST to the loginWith...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4436
(8.6 HIGH)

EPSS: 0.05%

updated 2026-04-09T21:31:36

1 posts

A low-privileged remote attacker can send Modbus packets to manipulate register values that are inputs to the odorant injection logic such that too much or too little odorant is injected into a gas line.

thehackerwire@mastodon.social at 2026-04-12T05:45:21.000Z ##

🟠 CVE-2026-4436 - High (8.6)

A low-privileged remote attacker can send Modbus packets to manipulate
register values that are inputs to the odorant injection logic such that
too much or too little odorant is injected into a gas line.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40070
(8.1 HIGH)

EPSS: 0.01%

updated 2026-04-09T20:28:11

1 posts

# Unverified certifier signatures persisted by `acquire_certificate` ## Affected packages Both `bsv-sdk` and `bsv-wallet` are published from the [sgbett/bsv-ruby-sdk](https://github.com/sgbett/bsv-ruby-sdk) repository. The vulnerable code lives in `lib/bsv/wallet_interface/wallet_client.rb`, which is **physically shipped inside both gems** (the `bsv-wallet.gemspec` `files` list bundles the entir

thehackerwire@mastodon.social at 2026-04-12T07:33:21.000Z ##

🟠 CVE-2026-40070 - High (8.1)

BSV Ruby SDK is the Ruby SDK for the BSV blockchain. From 0.3.1 to before 0.8.2, BSV::Wallet::WalletClient#acquire_certificate persists certificate records to storage without verifying the certifier's signature over the certificate contents. In ac...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39987(CVSS UNKNOWN)

EPSS: 2.70%

updated 2026-04-09T19:06:18

7 posts

## Summary Marimo (19.6k stars) has a Pre-Auth RCE vulnerability. The terminal WebSocket endpoint `/terminal/ws` lacks authentication validation, allowing an unauthenticated attacker to obtain a full PTY shell and execute arbitrary system commands. Unlike other WebSocket endpoints (e.g., `/ws`) that correctly call `validate_auth()` for authentication, the `/terminal/ws` endpoint only checks the

Nuclei template

3 repos

https://github.com/0xBlackash/CVE-2026-39987

https://github.com/mki9/CVE-2026-39987_exploit

https://github.com/fevar54/marimo_CVE-2026-39987_RCE_PoC

youranonnewsirc@nerdculture.de at 2026-04-13T22:31:39.000Z ##

The U.S. initiated a naval blockade on all Iranian ports today, following failed peace talks, escalating tensions and causing oil prices to surge. The UK stated it would not support this action. In cybersecurity, Adobe released emergency patches for a critical, actively exploited zero-day in Acrobat and Reader (CVE-2026-34621). Additionally, a critical vulnerability in the Marimo open-source Python notebook platform (CVE-2026-39987) is now under active exploitation, allowing remote code execution. A U.S. DOT report also revealed significant cybersecurity gaps in 45 critical FAA air traffic systems.

#AnonNews_irc #Cybersecurity #News

##

patrickcmiller at 2026-04-13T15:42:00.930Z ##

CVE-2026-39987: Marimo RCE exploited in hours after disclosure securityaffairs.com/190623/hac

##

youranonnewsirc@nerdculture.de at 2026-04-13T22:31:39.000Z ##

The U.S. initiated a naval blockade on all Iranian ports today, following failed peace talks, escalating tensions and causing oil prices to surge. The UK stated it would not support this action. In cybersecurity, Adobe released emergency patches for a critical, actively exploited zero-day in Acrobat and Reader (CVE-2026-34621). Additionally, a critical vulnerability in the Marimo open-source Python notebook platform (CVE-2026-39987) is now under active exploitation, allowing remote code execution. A U.S. DOT report also revealed significant cybersecurity gaps in 45 critical FAA air traffic systems.

#AnonNews_irc #Cybersecurity #News

##

patrickcmiller@infosec.exchange at 2026-04-13T15:42:00.000Z ##

CVE-2026-39987: Marimo RCE exploited in hours after disclosure securityaffairs.com/190623/hac

##

patrickcmiller@infosec.exchange at 2026-04-13T03:12:00.000Z ##

Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure thehackernews.com/2026/04/mari

##

rxerium@infosec.exchange at 2026-04-12T17:53:08.000Z ##

🚨 Pre-Auth RCE vuln tagged as CVE-2026-39987 (CVSS 9.3) seeing active exploitation in the wild as reported by Vulncheck and Bleeping Computer.

Passively scan infrastructure to find potentially vulnerable instances:
github.com/rxerium/rxerium-tem

An unauthenticated attacker can obtain a full interactive root shell on the server via a single WebSocket connection. No user interaction or authentication token is required, even when authentication is enabled on the marimo instance
github.com/marimo-team/marimo/

##

beyondmachines1@infosec.exchange at 2026-04-11T08:01:09.000Z ##

Marimo Python Notebook RCE Exploited Hours After Disclosure

Marimo patched a critical RCE vulnerability (CVE-2026-39987) that was exploited within 10 hours of disclosure to steal cloud credentials and SSH keys. The flaw allows unauthenticated attackers to gain full interactive shell access via a WebSocket authentication bypass.

**If you're running Marimo notebooks, update to version 0.23.0 immediately and rotate any credentials (AWS keys, SSH keys, database passwords, API secrets) that were stored on or accessible from that system. If you can't update right away, block access to the /terminal/ws endpoint or put the notebook behind a reverse proxy with authentication and never expose notebook platforms directly to the internet.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

CVE-2026-39942
(8.5 HIGH)

EPSS: 0.03%

updated 2026-04-09T19:05:28

1 posts

## Summary A broken access control vulnerability was identified in the Directus file management API that allows authenticated users to overwrite files belonging to other users by manipulating the `filename_disk` parameter. ## Details The `PATCH /files/{id}` endpoint accepts a user-controlled `filename_disk` parameter. By setting this value to match the storage path of another user's file, an at

thehackerwire@mastodon.social at 2026-04-12T09:00:03.000Z ##

🟠 CVE-2026-39942 - High (8.5)

Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.17.0, the PATCH /files/{id} endpoint accepts a user-controlled filename_disk parameter. By setting this value to match the storage path of another user's ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39911
(8.8 HIGH)

EPSS: 0.12%

updated 2026-04-09T18:31:34

1 posts

Hashgraph Guardian through version 3.5.0 contains an unsandboxed JavaScript execution vulnerability in the Custom Logic policy block worker that allows authenticated Standard Registry users to execute arbitrary code by passing user-supplied JavaScript expressions directly to the Node.js Function() constructor without isolation. Attackers can import native Node.js modules to read arbitrary files fr

thehackerwire@mastodon.social at 2026-04-12T08:00:11.000Z ##

🟠 CVE-2026-39911 - High (8.8)

Hashgraph Guardian through version 3.5.0 contains an unsandboxed JavaScript execution vulnerability in the Custom Logic policy block worker that allows authenticated Standard Registry users to execute arbitrary code by passing user-supplied JavaSc...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5329
(8.6 HIGH)

EPSS: 0.20%

updated 2026-04-09T18:31:34

1 posts

Rapid7 Velociraptor versions prior to 0.76.2Β contain an improper input validation vulnerability in the client monitoring message handler on the Velociraptor server (primarily Linux) that allows an authenticated remote attacker to write to arbitrary internal server queues via a crafted monitoring message with a malicious queue name. The server handler that receives client monitoring messagesΒ does

thehackerwire@mastodon.social at 2026-04-12T07:00:20.000Z ##

🟠 CVE-2026-5329 - High (8.5)

Rapid7 Velociraptor versions prior to 0.76.2 contain an improper input validation vulnerability in the client monitoring message handler on the Velociraptor server (primarily Linux) that allows an authenticated remote attacker to write to arbitr...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4837
(6.6 MEDIUM)

EPSS: 0.23%

updated 2026-04-08T21:26:13.410000

2 posts

An eval() injection vulnerability in the Rapid7 Insight Agent beaconing logic for Linux versions could theoretically allow an attacker to achieve remote code execution as root via a crafted beacon response. Because the Agent uses mutual TLS (mTLS) to verify commands from the Rapid7 Platform, it is unlikely that the eval() function could be exploited remotely without prior, highly privileged access

vitobotta@mastodon.social at 2026-04-13T12:10:33.000Z ##

So it's not something random attackers can exploit, but if someone compromises the backend, they could own every Linux system running the agent. It's a high-impact scenario that shows how security tools themselves can become attack vectors.

sentinelone.com/vulnerability-

2/2

##

vitobotta@mastodon.social at 2026-04-13T12:10:26.000Z ##

Interesting vulnerability in Rapid7's Insight Agent for Linux. CVE-2026-4837 is an eval() injection that could theoretically allow remote code execution as root. The catch? An attacker would need highly privileged access to the Rapid7 backend platform to craft a malicious beacon response.

1/2

##

CVE-2026-39365(CVSS UNKNOWN)

EPSS: 4.05%

updated 2026-04-07T22:16:29

1 posts

### Summary Any files ending with `.map` even out side the project can be returned to the browser. ### Impact Only apps that match the following conditions are affected: - explicitly exposes the Vite dev server to the network (using `--host` or [`server.host` config option](https://vitejs.dev/config/server-options.html#server-host)) - have a sensitive content in files ending with `.map` and th

Nuclei template

secdb@infosec.exchange at 2026-04-13T00:01:20.000Z ##

πŸ“ˆ CVE Published in last 7 days (2026-04-06 - 2026-04-13)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1590

Severity:
- Critical: 126
- High: 530
- Medium: 671
- Low: 50
- None: 213

Status:
- : 7
- Analyzed: 175
- Awaiting Analysis: 513
- Modified: 12
- Received: 645
- Rejected: 14
- Undergoing Analysis: 224

Top CNAs:
- GitHub, Inc.: 462
- VulDB: 202
- Patchstack: 175
- MITRE: 115
- Wordfence: 95
- VulnCheck: 92
- Chrome: 60
- Apache Software Foundation: 31
- Juniper Networks, Inc.: 27
- wolfSSL Inc.: 22

Top Affected Products:
- UNKNOWN: 1354
- Dlink Di-8003 Firmware: 27
- Openclaw: 27
- Churchcrm: 24
- Qualcomm Fastconnect 7800 Firmware: 16
- Qualcomm Wsa8840 Firmware: 16
- Qualcomm Wcd9385 Firmware: 16
- Qualcomm Fastconnect 6900 Firmware: 16
- Qualcomm Wsa8845h Firmware: 16
- Qualcomm Wcd9380 Firmware: 16

Top EPSS Score:
- CVE-2026-34197 - 5.60 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34885 - 5.14 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39365 - 3.12 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5677 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5678 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5688 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5689 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5690 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5691 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5692 - 2.96 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-4519
(0 None)

EPSS: 0.03%

updated 2026-04-07T18:16:47.223000

1 posts

The webbrowser.open() API would accept leading dashes in the URL which could be handled as command line options for certain web browsers. New behavior rejects leading dashes. Users are recommended to sanitize URLs prior to passing to webbrowser.open().

EUVD_Bot@mastodon.social at 2026-04-13T23:01:07.000Z ##

🚨 EUVD-2026-22134

πŸ“Š Score: 7.0/10 (CVSS v3.1)
πŸ“¦ Product: CPython
🏒 Vendor: Python Software Foundation
πŸ“… Updated: 2026-04-13

πŸ“ Mitgation of CVE-2026-4519 was incomplete. If the URL contained "%action" the mitigation could be bypassed for certain browser types the "webbrowser.open()" API could have commands injected into the underlying shell. See CVE-2026-4519 for ...

πŸ”— euvd.enisa.europa.eu/vulnerabi

#cybersecurity #infosec #euvd #cve #vulnerability

##

CVE-2026-34885
(8.5 HIGH)

EPSS: 5.71%

updated 2026-04-07T13:20:35.010000

1 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in David Lingren Media LIbrary Assistant allows SQL Injection.This issue affects Media LIbrary Assistant: from n/a through 3.34.

Nuclei template

secdb@infosec.exchange at 2026-04-13T00:01:20.000Z ##

πŸ“ˆ CVE Published in last 7 days (2026-04-06 - 2026-04-13)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1590

Severity:
- Critical: 126
- High: 530
- Medium: 671
- Low: 50
- None: 213

Status:
- : 7
- Analyzed: 175
- Awaiting Analysis: 513
- Modified: 12
- Received: 645
- Rejected: 14
- Undergoing Analysis: 224

Top CNAs:
- GitHub, Inc.: 462
- VulDB: 202
- Patchstack: 175
- MITRE: 115
- Wordfence: 95
- VulnCheck: 92
- Chrome: 60
- Apache Software Foundation: 31
- Juniper Networks, Inc.: 27
- wolfSSL Inc.: 22

Top Affected Products:
- UNKNOWN: 1354
- Dlink Di-8003 Firmware: 27
- Openclaw: 27
- Churchcrm: 24
- Qualcomm Fastconnect 7800 Firmware: 16
- Qualcomm Wsa8840 Firmware: 16
- Qualcomm Wcd9385 Firmware: 16
- Qualcomm Fastconnect 6900 Firmware: 16
- Qualcomm Wsa8845h Firmware: 16
- Qualcomm Wcd9380 Firmware: 16

Top EPSS Score:
- CVE-2026-34197 - 5.60 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34885 - 5.14 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39365 - 3.12 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5677 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5678 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5688 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5689 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5690 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5691 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5692 - 2.96 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-22666
(7.2 HIGH)

EPSS: 0.15%

updated 2026-04-07T13:20:11.643000

1 posts

Dolibarr ERP/CRM versions prior to 23.0.2 contain an authenticated remote code execution vulnerability in the dol_eval_standard() function that fails to apply forbidden string checks in whitelist mode and does not detect PHP dynamic callable syntax. Attackers with administrator privileges can inject malicious payloads through computed extrafields or other evaluation paths using PHP dynamic callabl

1 repos

https://github.com/JivaSecurity/DOLIBARR-RCE-CVE-2026-22666

_r_netsec@infosec.exchange at 2026-04-13T13:43:05.000Z ##

CVE-2026-22666: Dolibarr 23.0.0 dol_eval() whitelist bypass -> RCE (full write-up + PoC) jivasecurity.com/writeups/doli

##

CVE-2026-5690
(7.3 HIGH)

EPSS: 4.86%

updated 2026-04-07T13:20:11.643000

1 posts

A flaw has been found in Totolink A7100RU 7.4cu.2313_b20191024. The impacted element is the function setRemoteCfg of the file /cgi-bin/cstecgi.cgi. Executing a manipulation of the argument enable can lead to os command injection. The attack can be executed remotely. The exploit has been published and may be used.

secdb@infosec.exchange at 2026-04-13T00:01:20.000Z ##

πŸ“ˆ CVE Published in last 7 days (2026-04-06 - 2026-04-13)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1590

Severity:
- Critical: 126
- High: 530
- Medium: 671
- Low: 50
- None: 213

Status:
- : 7
- Analyzed: 175
- Awaiting Analysis: 513
- Modified: 12
- Received: 645
- Rejected: 14
- Undergoing Analysis: 224

Top CNAs:
- GitHub, Inc.: 462
- VulDB: 202
- Patchstack: 175
- MITRE: 115
- Wordfence: 95
- VulnCheck: 92
- Chrome: 60
- Apache Software Foundation: 31
- Juniper Networks, Inc.: 27
- wolfSSL Inc.: 22

Top Affected Products:
- UNKNOWN: 1354
- Dlink Di-8003 Firmware: 27
- Openclaw: 27
- Churchcrm: 24
- Qualcomm Fastconnect 7800 Firmware: 16
- Qualcomm Wsa8840 Firmware: 16
- Qualcomm Wcd9385 Firmware: 16
- Qualcomm Fastconnect 6900 Firmware: 16
- Qualcomm Wsa8845h Firmware: 16
- Qualcomm Wcd9380 Firmware: 16

Top EPSS Score:
- CVE-2026-34197 - 5.60 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34885 - 5.14 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39365 - 3.12 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5677 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5678 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5688 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5689 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5690 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5691 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5692 - 2.96 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-5689
(7.3 HIGH)

EPSS: 4.86%

updated 2026-04-07T13:20:11.643000

1 posts

A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. The affected element is the function setNtpCfg of the file /cgi-bin/cstecgi.cgi. Performing a manipulation of the argument tz results in os command injection. Remote exploitation of the attack is possible. The exploit is now public and may be used.

secdb@infosec.exchange at 2026-04-13T00:01:20.000Z ##

πŸ“ˆ CVE Published in last 7 days (2026-04-06 - 2026-04-13)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1590

Severity:
- Critical: 126
- High: 530
- Medium: 671
- Low: 50
- None: 213

Status:
- : 7
- Analyzed: 175
- Awaiting Analysis: 513
- Modified: 12
- Received: 645
- Rejected: 14
- Undergoing Analysis: 224

Top CNAs:
- GitHub, Inc.: 462
- VulDB: 202
- Patchstack: 175
- MITRE: 115
- Wordfence: 95
- VulnCheck: 92
- Chrome: 60
- Apache Software Foundation: 31
- Juniper Networks, Inc.: 27
- wolfSSL Inc.: 22

Top Affected Products:
- UNKNOWN: 1354
- Dlink Di-8003 Firmware: 27
- Openclaw: 27
- Churchcrm: 24
- Qualcomm Fastconnect 7800 Firmware: 16
- Qualcomm Wsa8840 Firmware: 16
- Qualcomm Wcd9385 Firmware: 16
- Qualcomm Fastconnect 6900 Firmware: 16
- Qualcomm Wsa8845h Firmware: 16
- Qualcomm Wcd9380 Firmware: 16

Top EPSS Score:
- CVE-2026-34197 - 5.60 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34885 - 5.14 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39365 - 3.12 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5677 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5678 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5688 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5689 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5690 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5691 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5692 - 2.96 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-5677
(7.3 HIGH)

EPSS: 4.86%

updated 2026-04-07T13:20:11.643000

1 posts

A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. Impacted is the function CsteSystem of the file /cgi-bin/cstecgi.cgi. Performing a manipulation of the argument resetFlags results in os command injection. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks.

secdb@infosec.exchange at 2026-04-13T00:01:20.000Z ##

πŸ“ˆ CVE Published in last 7 days (2026-04-06 - 2026-04-13)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1590

Severity:
- Critical: 126
- High: 530
- Medium: 671
- Low: 50
- None: 213

Status:
- : 7
- Analyzed: 175
- Awaiting Analysis: 513
- Modified: 12
- Received: 645
- Rejected: 14
- Undergoing Analysis: 224

Top CNAs:
- GitHub, Inc.: 462
- VulDB: 202
- Patchstack: 175
- MITRE: 115
- Wordfence: 95
- VulnCheck: 92
- Chrome: 60
- Apache Software Foundation: 31
- Juniper Networks, Inc.: 27
- wolfSSL Inc.: 22

Top Affected Products:
- UNKNOWN: 1354
- Dlink Di-8003 Firmware: 27
- Openclaw: 27
- Churchcrm: 24
- Qualcomm Fastconnect 7800 Firmware: 16
- Qualcomm Wsa8840 Firmware: 16
- Qualcomm Wcd9385 Firmware: 16
- Qualcomm Fastconnect 6900 Firmware: 16
- Qualcomm Wsa8845h Firmware: 16
- Qualcomm Wcd9380 Firmware: 16

Top EPSS Score:
- CVE-2026-34197 - 5.60 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34885 - 5.14 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39365 - 3.12 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5677 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5678 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5688 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5689 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5690 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5691 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5692 - 2.96 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-5691
(7.3 HIGH)

EPSS: 4.86%

updated 2026-04-07T00:30:28

1 posts

A vulnerability has been found in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function setFirewallType of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument firewallType leads to os command injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.

secdb@infosec.exchange at 2026-04-13T00:01:20.000Z ##

πŸ“ˆ CVE Published in last 7 days (2026-04-06 - 2026-04-13)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1590

Severity:
- Critical: 126
- High: 530
- Medium: 671
- Low: 50
- None: 213

Status:
- : 7
- Analyzed: 175
- Awaiting Analysis: 513
- Modified: 12
- Received: 645
- Rejected: 14
- Undergoing Analysis: 224

Top CNAs:
- GitHub, Inc.: 462
- VulDB: 202
- Patchstack: 175
- MITRE: 115
- Wordfence: 95
- VulnCheck: 92
- Chrome: 60
- Apache Software Foundation: 31
- Juniper Networks, Inc.: 27
- wolfSSL Inc.: 22

Top Affected Products:
- UNKNOWN: 1354
- Dlink Di-8003 Firmware: 27
- Openclaw: 27
- Churchcrm: 24
- Qualcomm Fastconnect 7800 Firmware: 16
- Qualcomm Wsa8840 Firmware: 16
- Qualcomm Wcd9385 Firmware: 16
- Qualcomm Fastconnect 6900 Firmware: 16
- Qualcomm Wsa8845h Firmware: 16
- Qualcomm Wcd9380 Firmware: 16

Top EPSS Score:
- CVE-2026-34197 - 5.60 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34885 - 5.14 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39365 - 3.12 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5677 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5678 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5688 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5689 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5690 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5691 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5692 - 2.96 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-5692
(7.3 HIGH)

EPSS: 4.86%

updated 2026-04-07T00:30:28

1 posts

A vulnerability was found in Totolink A7100RU 7.4cu.2313_b20191024. This impacts the function setGameSpeedCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument enable results in os command injection. The attack may be performed from remote. The exploit has been made public and could be used.

secdb@infosec.exchange at 2026-04-13T00:01:20.000Z ##

πŸ“ˆ CVE Published in last 7 days (2026-04-06 - 2026-04-13)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1590

Severity:
- Critical: 126
- High: 530
- Medium: 671
- Low: 50
- None: 213

Status:
- : 7
- Analyzed: 175
- Awaiting Analysis: 513
- Modified: 12
- Received: 645
- Rejected: 14
- Undergoing Analysis: 224

Top CNAs:
- GitHub, Inc.: 462
- VulDB: 202
- Patchstack: 175
- MITRE: 115
- Wordfence: 95
- VulnCheck: 92
- Chrome: 60
- Apache Software Foundation: 31
- Juniper Networks, Inc.: 27
- wolfSSL Inc.: 22

Top Affected Products:
- UNKNOWN: 1354
- Dlink Di-8003 Firmware: 27
- Openclaw: 27
- Churchcrm: 24
- Qualcomm Fastconnect 7800 Firmware: 16
- Qualcomm Wsa8840 Firmware: 16
- Qualcomm Wcd9385 Firmware: 16
- Qualcomm Fastconnect 6900 Firmware: 16
- Qualcomm Wsa8845h Firmware: 16
- Qualcomm Wcd9380 Firmware: 16

Top EPSS Score:
- CVE-2026-34197 - 5.60 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34885 - 5.14 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39365 - 3.12 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5677 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5678 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5688 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5689 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5690 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5691 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5692 - 2.96 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-5688
(7.3 HIGH)

EPSS: 4.86%

updated 2026-04-07T00:30:28

1 posts

A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. Impacted is the function setDdnsCfg of the file /cgi-bin/cstecgi.cgi. Such manipulation of the argument provider leads to os command injection. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.

secdb@infosec.exchange at 2026-04-13T00:01:20.000Z ##

πŸ“ˆ CVE Published in last 7 days (2026-04-06 - 2026-04-13)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1590

Severity:
- Critical: 126
- High: 530
- Medium: 671
- Low: 50
- None: 213

Status:
- : 7
- Analyzed: 175
- Awaiting Analysis: 513
- Modified: 12
- Received: 645
- Rejected: 14
- Undergoing Analysis: 224

Top CNAs:
- GitHub, Inc.: 462
- VulDB: 202
- Patchstack: 175
- MITRE: 115
- Wordfence: 95
- VulnCheck: 92
- Chrome: 60
- Apache Software Foundation: 31
- Juniper Networks, Inc.: 27
- wolfSSL Inc.: 22

Top Affected Products:
- UNKNOWN: 1354
- Dlink Di-8003 Firmware: 27
- Openclaw: 27
- Churchcrm: 24
- Qualcomm Fastconnect 7800 Firmware: 16
- Qualcomm Wsa8840 Firmware: 16
- Qualcomm Wcd9385 Firmware: 16
- Qualcomm Fastconnect 6900 Firmware: 16
- Qualcomm Wsa8845h Firmware: 16
- Qualcomm Wcd9380 Firmware: 16

Top EPSS Score:
- CVE-2026-34197 - 5.60 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34885 - 5.14 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39365 - 3.12 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5677 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5678 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5688 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5689 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5690 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5691 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5692 - 2.96 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-5678
(7.3 HIGH)

EPSS: 4.86%

updated 2026-04-06T21:31:41

1 posts

A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. The affected element is the function setScheduleCfg of the file /cgi-bin/cstecgi.cgi. Executing a manipulation of the argument mode can lead to os command injection. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks.

secdb@infosec.exchange at 2026-04-13T00:01:20.000Z ##

πŸ“ˆ CVE Published in last 7 days (2026-04-06 - 2026-04-13)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1590

Severity:
- Critical: 126
- High: 530
- Medium: 671
- Low: 50
- None: 213

Status:
- : 7
- Analyzed: 175
- Awaiting Analysis: 513
- Modified: 12
- Received: 645
- Rejected: 14
- Undergoing Analysis: 224

Top CNAs:
- GitHub, Inc.: 462
- VulDB: 202
- Patchstack: 175
- MITRE: 115
- Wordfence: 95
- VulnCheck: 92
- Chrome: 60
- Apache Software Foundation: 31
- Juniper Networks, Inc.: 27
- wolfSSL Inc.: 22

Top Affected Products:
- UNKNOWN: 1354
- Dlink Di-8003 Firmware: 27
- Openclaw: 27
- Churchcrm: 24
- Qualcomm Fastconnect 7800 Firmware: 16
- Qualcomm Wsa8840 Firmware: 16
- Qualcomm Wcd9385 Firmware: 16
- Qualcomm Fastconnect 6900 Firmware: 16
- Qualcomm Wsa8845h Firmware: 16
- Qualcomm Wcd9380 Firmware: 16

Top EPSS Score:
- CVE-2026-34197 - 5.60 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34885 - 5.14 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39365 - 3.12 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5677 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5678 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5688 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5689 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5690 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5691 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5692 - 2.96 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-33613
(7.2 HIGH)

EPSS: 0.15%

updated 2026-04-03T16:10:52.680000

1 posts

Due to the improper neutralisation of special elements used in an OS command, a remote attacker can exploit an RCE vulnerability in the generateSrpArray function, resulting in full system compromise. This vulnerability can only be attacked if the attacker has some other way to write arbitrary data to the user table.

certvde@infosec.exchange at 2026-04-13T11:32:38.000Z ##

#OT #Advisory VDE-2026-043
Helmholz: Multiple Vulnerabilities in myREX24V2/myREX24V2.virtual

Multiple vulnerabilities have been discovered in Helmholz myREX24V2/myREX24V2.virtual that could allow RCE, SQLi or information leakage.
#CVE CVE-2026-33615, CVE-2026-33616, CVE-2026-33614, CVE-2026-33613, CVE-2026-33617

certvde.com/en/advisories/vde-

#CSAF helmholz.csaf-tp.certvde.com/.

##

CVE-2026-33614
(7.5 HIGH)

EPSS: 0.06%

updated 2026-04-03T16:10:52.680000

1 posts

An unauthenticated remote attacker can exploit an unauthenticated SQL Injection vulnerability in the getinfo endpoint due to improper neutralization of special elements in a SQL SELECT command. This can result in a total loss of confidentiality.

certvde@infosec.exchange at 2026-04-13T11:32:38.000Z ##

#OT #Advisory VDE-2026-043
Helmholz: Multiple Vulnerabilities in myREX24V2/myREX24V2.virtual

Multiple vulnerabilities have been discovered in Helmholz myREX24V2/myREX24V2.virtual that could allow RCE, SQLi or information leakage.
#CVE CVE-2026-33615, CVE-2026-33616, CVE-2026-33614, CVE-2026-33613, CVE-2026-33617

certvde.com/en/advisories/vde-

#CSAF helmholz.csaf-tp.certvde.com/.

##

CVE-2026-33616
(7.5 HIGH)

EPSS: 0.06%

updated 2026-04-03T16:10:52.680000

1 posts

An unauthenticated remote attacker can exploit an unauthenticated blind SQL Injection vulnerability in the mb24api endpoint due to improper neutralization of special elements in a SQL SELECT command. This can result in a total loss of confidentiality.

certvde@infosec.exchange at 2026-04-13T11:32:38.000Z ##

#OT #Advisory VDE-2026-043
Helmholz: Multiple Vulnerabilities in myREX24V2/myREX24V2.virtual

Multiple vulnerabilities have been discovered in Helmholz myREX24V2/myREX24V2.virtual that could allow RCE, SQLi or information leakage.
#CVE CVE-2026-33615, CVE-2026-33616, CVE-2026-33614, CVE-2026-33613, CVE-2026-33617

certvde.com/en/advisories/vde-

#CSAF helmholz.csaf-tp.certvde.com/.

##

CVE-2026-33615
(9.1 CRITICAL)

EPSS: 0.10%

updated 2026-04-02T12:31:13

1 posts

An unauthenticated remote attacker can exploit an unauthenticated SQL Injection vulnerability in the setinfo endpoint due to improper neutralization of special elements in a SQL UPDATE command. This can result in a total loss of integrity and availability.

certvde@infosec.exchange at 2026-04-13T11:32:38.000Z ##

#OT #Advisory VDE-2026-043
Helmholz: Multiple Vulnerabilities in myREX24V2/myREX24V2.virtual

Multiple vulnerabilities have been discovered in Helmholz myREX24V2/myREX24V2.virtual that could allow RCE, SQLi or information leakage.
#CVE CVE-2026-33615, CVE-2026-33616, CVE-2026-33614, CVE-2026-33613, CVE-2026-33617

certvde.com/en/advisories/vde-

#CSAF helmholz.csaf-tp.certvde.com/.

##

CVE-2026-33617
(5.3 MEDIUM)

EPSS: 0.04%

updated 2026-04-02T12:31:13

1 posts

An unauthenticated remote attacker can access a configuration file containing database credentials. This can result in a some loss of confidentiality, but there is no endpoint exposed to use these credentials.

certvde@infosec.exchange at 2026-04-13T11:32:38.000Z ##

#OT #Advisory VDE-2026-043
Helmholz: Multiple Vulnerabilities in myREX24V2/myREX24V2.virtual

Multiple vulnerabilities have been discovered in Helmholz myREX24V2/myREX24V2.virtual that could allow RCE, SQLi or information leakage.
#CVE CVE-2026-33615, CVE-2026-33616, CVE-2026-33614, CVE-2026-33613, CVE-2026-33617

certvde.com/en/advisories/vde-

#CSAF helmholz.csaf-tp.certvde.com/.

##

CVE-2026-3584
(9.8 CRITICAL)

EPSS: 17.09%

updated 2026-03-21T00:32:48

1 posts

The Kali Forms plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.4.9 via the 'form_process' function. This is due to the 'prepare_post_data' function mapping user-supplied keys directly into internal placeholder storage, combined with the use of 'call_user_func' on these placeholder values. This makes it possible for unauthenticated attackers to ex

Nuclei template

1 repos

https://github.com/Yucaerin/CVE-2026-3584

wordfence@mastodon.social at 2026-04-13T19:45:37.000Z ##

Attackers Actively Exploiting Critical Vulnerability in Kali Forms Plugin

A critical Remote Code Execution vulnerability (CVE-2026-3584, CVSS 9.8) in Kali Forms with 10,000+ active installations is under active attack. Over 312,200 exploit attempts blocked.

Update to version 2.4.10.

wordfence.com/blog/2026/04/att

#WordPress #WebSecurity #Wordfence

##

hasamba at 2026-04-13T16:27:45.713Z ##

----------------

πŸ› οΈ Tool
===================

Opening: openclaw-ops is an operational skill and script collection designed to manage local or self-hosted OpenClaw gateways. The package focuses on continuous monitoring, automated repair workflows, update/change detection, session-level analysis, and pre-installation security auditing of third-party skills. The bundle was tested against OpenClaw 2026.4.11 and documents a minimum supported baseline of v2026.2.12 due to prior critical fixes including CVE-2026-25253.

Key Features:
β€’ Includes a dedicated skill /openclaw-ops to triage gateway configuration and runtime components: gateway, auth, exec approvals, cron jobs, channels, sessions, and installation state.
β€’ Provides single-purpose scripts such as heal.sh (one-shot auto-fix), post-update.sh (post-update orchestrator), and watchdog.sh (periodic liveness restarter with escalation).
β€’ Offers session tooling: session-monitor.sh for behavioral checks over JSONL session logs, session-search.sh for full-text search with structured, redacted output, and session-resume.sh to compact a session into a markdown resume with failure context.
β€’ Supplies operational checks: check-update.sh for version-change detection and explainers, health-check.sh for declarative URL/process checks, and security-scan.sh to score configuration and credential exposure (0–100).

Technical Implementation:
β€’ Scripts rely on standard runtime tools (Python3, curl, openssl, ripgrep) and read runtime metadata from ~/.openclaw/openclaw.json, with the option to override the gateway port via the OPENCLAW_GATEWAY_PORT environment variable.
β€’ The post-update orchestrator sequences update detection, healing, workspace reconciliation (VPS-aware), security scan, and a sentinel trigger via a policy-guard state file (policy-guard.trigger).
β€’ macOS-specific integration is provided for always-on supervision via a LaunchAgent installer wrapper (watchdog-install.sh), while non-macOS environments are expected to use scheduling alternatives.

Use Cases:
β€’ Continuous operations for small self-hosted deployments invoking automated healing and watchdog restarts.
β€’ Pre-installation vetting of third-party skills via skill-audit.sh to reduce risky dependencies.
β€’ Incident summarization through daily-digest.sh and a shared incident-manager.sh helper for lifecycle flows.

Limitations:
β€’ The watchdog installer is macOS-only; cross-platform uptime requires external schedulers.
β€’ Several scripts depend on external binaries (e.g., rg, openssl, curl) and assume local file-system state in ~/.openclaw.
β€’ No bundled remote orchestration; intended for local/self-hosted operators rather than managed SaaS.

πŸ”Ή tool -2026-25253

πŸ”— Source: github.com/cathrynlavery/openc

##

hasamba@infosec.exchange at 2026-04-13T16:27:45.000Z ##

----------------

πŸ› οΈ Tool
===================

Opening: openclaw-ops is an operational skill and script collection designed to manage local or self-hosted OpenClaw gateways. The package focuses on continuous monitoring, automated repair workflows, update/change detection, session-level analysis, and pre-installation security auditing of third-party skills. The bundle was tested against OpenClaw 2026.4.11 and documents a minimum supported baseline of v2026.2.12 due to prior critical fixes including CVE-2026-25253.

Key Features:
β€’ Includes a dedicated skill /openclaw-ops to triage gateway configuration and runtime components: gateway, auth, exec approvals, cron jobs, channels, sessions, and installation state.
β€’ Provides single-purpose scripts such as heal.sh (one-shot auto-fix), post-update.sh (post-update orchestrator), and watchdog.sh (periodic liveness restarter with escalation).
β€’ Offers session tooling: session-monitor.sh for behavioral checks over JSONL session logs, session-search.sh for full-text search with structured, redacted output, and session-resume.sh to compact a session into a markdown resume with failure context.
β€’ Supplies operational checks: check-update.sh for version-change detection and explainers, health-check.sh for declarative URL/process checks, and security-scan.sh to score configuration and credential exposure (0–100).

Technical Implementation:
β€’ Scripts rely on standard runtime tools (Python3, curl, openssl, ripgrep) and read runtime metadata from ~/.openclaw/openclaw.json, with the option to override the gateway port via the OPENCLAW_GATEWAY_PORT environment variable.
β€’ The post-update orchestrator sequences update detection, healing, workspace reconciliation (VPS-aware), security scan, and a sentinel trigger via a policy-guard state file (policy-guard.trigger).
β€’ macOS-specific integration is provided for always-on supervision via a LaunchAgent installer wrapper (watchdog-install.sh), while non-macOS environments are expected to use scheduling alternatives.

Use Cases:
β€’ Continuous operations for small self-hosted deployments invoking automated healing and watchdog restarts.
β€’ Pre-installation vetting of third-party skills via skill-audit.sh to reduce risky dependencies.
β€’ Incident summarization through daily-digest.sh and a shared incident-manager.sh helper for lifecycle flows.

Limitations:
β€’ The watchdog installer is macOS-only; cross-platform uptime requires external schedulers.
β€’ Several scripts depend on external binaries (e.g., rg, openssl, curl) and assume local file-system state in ~/.openclaw.
β€’ No bundled remote orchestration; intended for local/self-hosted operators rather than managed SaaS.

πŸ”Ή tool #OpenClaw #security #ops #CVE-2026-25253

πŸ”— Source: github.com/cathrynlavery/openc

##

CVE-2025-0520
(0 None)

EPSS: 1.61%

updated 2025-11-04T23:15:33.920000

3 posts

An unrestricted file upload vulnerability in ShowDoc caused by improper validation of file extension allows execution of arbitrary PHP, leading to remote code execution.This issue affects ShowDoc: before 2.8.7.

undercodenews@mastodon.social at 2026-04-14T07:21:18.000Z ##

Critical ShowDoc RCE Vulnerability Sparks Alarm as Active Exploits Surge Across Unpatched Servers

Introduction: A Silent Threat Resurfaces in Legacy Systems A dangerous remote code execution (RCE) vulnerability has re-emerged as a serious cybersecurity concern, exposing how outdated software can become a gateway for modern attacks. The flaw, identified as CVE-2025-0520, targets ShowDocβ€”a widely used documentation toolβ€”and has begun to surface in active exploitation…

undercodenews.com/critical-sho

##

hackerworkspace at 2026-04-14T06:10:23.460Z ##

ShowDoc RCE Flaw CVE-2025-0520 Actively Exploited on Unpatched Servers

thehackernews.com/2026/04/show

Read on HackerWorkspace: hackerworkspace.com/article/sh

##

hackerworkspace@infosec.exchange at 2026-04-14T06:10:23.000Z ##

ShowDoc RCE Flaw CVE-2025-0520 Actively Exploited on Unpatched Servers

thehackernews.com/2026/04/show

Read on HackerWorkspace: hackerworkspace.com/article/sh

#cybersecurity #vulnerability #exploit

##

CVE-2025-4802
(7.8 HIGH)

EPSS: 0.04%

updated 2025-11-03T20:19:11.153000

2 posts

Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo).

1 repos

https://github.com/Betim-Hodza/CVE-2025-4802-Proof-of-Concept

alleleintel at 2026-04-13T17:28:31.278Z ##

We chose a vulnerability in glibc (CVE-2025-4802) to teach students registered in our binary exploitation training the importance of the libc, loader, dynamic linker, and the kernel in making the execution of a modern Linux binary possible.

Furthermore, it demonstrates how a small oversight in the static glibc code allowed arbitrary libraries to be loaded into privileged code. Do you know the crucial role of the auxiliary vector? Or the main differences between dynamically and statically compiled binaries?

Check out the blog post for a brief analysis of CVE-2025-4802.

allelesecurity.com/libc-vuln-a

##

alleleintel@infosec.exchange at 2026-04-13T17:28:31.000Z ##

We chose a vulnerability in glibc (CVE-2025-4802) to teach students registered in our binary exploitation training the importance of the libc, loader, dynamic linker, and the kernel in making the execution of a modern Linux binary possible.

Furthermore, it demonstrates how a small oversight in the static glibc code allowed arbitrary libraries to be loaded into privileged code. Do you know the crucial role of the auxiliary vector? Or the main differences between dynamically and statically compiled binaries?

Check out the blog post for a brief analysis of CVE-2025-4802.

allelesecurity.com/libc-vuln-a

##

CVE-2019-1367
(7.5 HIGH)

EPSS: 89.25%

updated 2025-10-29T14:34:22.990000

1 posts

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1221.

1 repos

https://github.com/mandarenmanman/CVE-2019-1367

CVE-2025-59528
(10.0 CRITICAL)

EPSS: 82.39%

updated 2025-09-23T16:45:09.443000

2 posts

Flowise is a drag & drop user interface to build a customized large language model flow. In version 3.0.5, Flowise is vulnerable to remote code execution. The CustomMCP node allows users to input configuration settings for connecting to an external MCP server. This node parses the user-provided mcpServerConfig string to build the MCP server configuration. However, during this process, it executes

Nuclei template

10 repos

https://github.com/secopssite/HTB

https://github.com/zimshk/CVE-2025-59528.yaml

https://github.com/jwsly12/CVE-2025-58434-59528-htb-ctf

https://github.com/kartik2005221/CVE-2025-58434-AND-59528-POC

https://github.com/TYehan/CVE-2025-58434-59528

https://github.com/AzureADTrent/CVE-2025-58434-59528

https://github.com/Kamigold/Flowise-RCE

https://github.com/honney336/CVE-2025-58434_CVE-2025-59528

https://github.com/vanhari/CVE-2025-59528

https://github.com/UsifAraby/CVE-2025-59528-POC

hackmag at 2026-04-13T19:00:03.510Z ##

βšͺ️ Critical Flowise vulnerability is actively exploited in attacks

πŸ—¨οΈ Researchers have recorded the first attempted attacks on the Flowise AI platform using the critical vulnerability CVE-2025-59528, which is an arbitrary JavaScript code injection issue. This bug received the maximum score of 10 on the CVSS scale and has been…

πŸ”— hackmag.com/news/flowise-attac

##

hackmag@infosec.exchange at 2026-04-13T19:00:03.000Z ##

βšͺ️ Critical Flowise vulnerability is actively exploited in attacks

πŸ—¨οΈ Researchers have recorded the first attempted attacks on the Flowise AI platform using the critical vulnerability CVE-2025-59528, which is an arbitrary JavaScript code injection issue. This bug received the maximum score of 10 on the CVSS scale and has been…

πŸ”— hackmag.com/news/flowise-attac

#news

##

CVE-2025-59145
(0 None)

EPSS: 0.10%

updated 2025-09-16T12:49:16.060000

2 posts

color-name is a JSON with CSS color names. On 8 September 2025, an npm publishing account for color-name was taken over after a phishing attack. Version 2.0.1 was published, functionally identical to the previous patch version, but with a malware payload added attempting to redirect cryptocurrency transactions to the attacker's own addresses from within browser environments. Local environments, se

benrothke at 2026-04-13T16:14:12.676Z ##

is a high-severity in Chat (CVE-2025-59145, CVSS 9.6) that gives attackers ability to silently steal source code, API keys & secrets from private repos w/o executing any malicious code. Good overview from @blackfogprivacy. api.cyfluencer.com/s/camoleak-

##

benrothke@infosec.exchange at 2026-04-13T16:14:12.000Z ##

#CamoLeak is a high-severity #vuln in #GitHub #Copilot Chat (CVE-2025-59145, CVSS 9.6) that gives attackers ability to silently steal source code, API keys & secrets from private repos w/o executing any malicious code. Good overview from @blackfogprivacy. api.cyfluencer.com/s/camoleak-

##

CVE-2025-8061
(7.0 None)

EPSS: 0.01%

updated 2025-09-11T21:32:01

1 posts

A potential insufficient access control vulnerability was reported in the Lenovo Dispatcher 3.0 and Dispatcher 3.1 drivers used by some Lenovo consumer notebooks that could allow an authenticated local user to execute code with elevated privileges. The Lenovo Dispatcher 3.2 driver is not affected. This vulnerability does not affect systems when the Windows feature Core Isolation Memory Integrity i

3 repos

https://github.com/symeonp/Lenovo-CVE-2025-8061

https://github.com/spawn451/CVE-2025-8061-Exploit

https://github.com/segura2010/lenovo-dispatcher-poc

CVE-2025-53928
(0 None)

EPSS: 0.78%

1 posts

N/A

EUVD_Bot@mastodon.social at 2026-04-14T01:02:11.000Z ##

🚨 EUVD-2026-22162

πŸ“Š Score: 4.6/10 (CVSS v3.1)
πŸ“¦ Product: MaxKB
🏒 Vendor: 1Panel-dev
πŸ“… Updated: 2026-04-14

πŸ“ MaxKB is an open-source AI assistant for enterprise. Versions 2.7.1 and below contain an incomplete fix for CVE-2025-53928, where a Remote Code Execution vulnerability still exists in the MCP node of the workflow engine. MaxKB only restricts the referencing...

πŸ”— euvd.enisa.europa.eu/vulnerabi

#cybersecurity #infosec #euvd #cve #vulnerability

##

CVE-2026-32605
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-04-13T21:00:32.000Z ##

🟠 CVE-2026-32605 - High (7.5)

nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake protocol based on the Albatross consensus algorithm. Prior to version 1.3.0, an untrusted peer could crash a validator by publishing a signed tendermint proposal message ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-13T21:00:32.000Z ##

🟠 CVE-2026-32605 - High (7.5)

nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake protocol based on the Albatross consensus algorithm. Prior to version 1.3.0, an untrusted peer could crash a validator by publishing a signed tendermint proposal message ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34079
(0 None)

EPSS: 0.13%

1 posts

N/A

zaphodb@twitter.resolvt.net at 2026-04-12T09:42:05.000Z ##

nice typo in
[SECURITY] [DSA 6207-1] flatpak security update:
"delete arbitrary hosts on the host"
lists.debian.org/debian-securi

in security-tracker.debian.org/tr it's "files" btw.

##

CVE-2026-39980
(0 None)

EPSS: 0.07%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-12T07:33:32.000Z ##

πŸ”΄ CVE-2026-39980 - Critical (9.1)

OpenCTI is an open source platform for managing cyber threat intelligence knowledge and observables. Prior to 6.9.5, the safeEjs.ts file does not properly sanitize EJS templates. Users with the Manage customization capability can run arbitrary Jav...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34734
(0 None)

EPSS: 0.01%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-12T05:59:54.000Z ##

🟠 CVE-2026-34734 - High (7.8)

HDF5 is software for managing data. In 1.14.1-2 and earlier, a heap-use-after-free was found in the h5dump helper utility. An attacker who can supply a malicious h5 file can trigger a heap use-after-free. The freed object is referenced in a memmov...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33698
(0 None)

EPSS: 0.05%

2 posts

N/A

offseq@infosec.exchange at 2026-04-11T17:30:11.000Z ##

Chamilo LMS <1.11.38 is vulnerable (CVE-2026-33698, CVSS 9.3, CRITICAL): unauth attackers can execute PHP & modify files if main/install/ is accessible. Upgrade to 1.11.38 + restrict dir access. More: radar.offseq.com/threat/cve-20 #OffSeq #Chamilo #Vuln #LMS

##

offseq@infosec.exchange at 2026-04-11T04:30:29.000Z ##

πŸ”” CVE-2026-33698: Chamilo LMS (<1.11.38) has a CRITICAL flaw β€” exposed install/ dir lets unauth attackers execute PHP & modify files. Upgrade to 1.11.38+ & restrict install/ directory access now! Details: radar.offseq.com/threat/cve-20 #OffSeq #Chamilo #Vuln

##

CVE-2026-31939
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-11T05:03:30.000Z ##

🟠 CVE-2026-31939 - High (8.3)

Chamilo LMS is a learning management system. Prior to 1.11.38, there is a path traversal in main/exercise/savescores.php leading to arbitrary file feletion. User input from $_REQUEST['test'] is concatenated directly into filesystem path without ca...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32931
(0 None)

EPSS: 0.16%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-11T05:03:21.000Z ##

🟠 CVE-2026-32931 - High (7.5)

Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, an unrestricted file upload vulnerability in the exercise sound upload function allows an authenticated teacher to upload a PHP webshell by spoofing the Content-Type hea...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40168
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-11T04:01:41.000Z ##

🟠 CVE-2026-40168 - High (8.2)

Postiz is an AI social media scheduling tool. Prior to 2.21.5, the /api/public/stream endpoint is vulnerable to SSRF. Although the application validates the initially supplied URL and blocks direct private/internal hosts, it does not re-validate t...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

Visit counter For Websites