##
Updated at UTC 2026-04-08T17:53:17.348907
| CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-39846 | 9.0 | 0.14% | 2 | 0 | 2026-04-08T16:16:27.537000 | SiYuan is a personal knowledge management system. Prior to 3.6.4, a malicious no | |
| CVE-2026-34045 | 8.2 | 0.06% | 1 | 0 | 2026-04-08T16:16:24.043000 | Podman Desktop is a graphical tool for developing on containers and Kubernetes. | |
| CVE-2026-33229 | 0 | 0.00% | 2 | 0 | 2026-04-08T16:16:23.430000 | XWiki Platform is a generic wiki platform offering runtime services for applicat | |
| CVE-2026-31790 | 7.5 | 0.01% | 1 | 0 | 2026-04-08T15:16:11.967000 | Issue summary: Applications using RSASVE key encapsulation to establish a secret | |
| CVE-2026-39847 | 9.1 | 0.05% | 2 | 0 | 2026-04-08T11:57:19 | The RSGI static handler for Emmett's internal assets (`/__emmett__` paths) is vu | |
| CVE-2026-35039 | 9.1 | 0.02% | 2 | 0 | 2026-04-08T11:54:57 | _NOTE_: While the library exposes a mechanism which could introduce the vulnerab | |
| CVE-2026-3535 | 9.8 | 0.28% | 2 | 0 | 2026-04-08T09:31:42 | The DSGVO Google Web Fonts GDPR plugin for WordPress is vulnerable to arbitrary | |
| CVE-2026-25776 | 9.8 | 0.05% | 2 | 0 | 2026-04-08T09:16:20.360000 | Movable Type provided by Six Apart Ltd. contains a code injection vulnerability | |
| CVE-2026-24913 | 8.8 | 0.03% | 1 | 0 | 2026-04-08T06:31:38 | SQL Injection vulnerability exists in MATCHA INVOICE 2.6.6 and earlier. If this | |
| CVE-2026-4003 | 9.8 | 0.42% | 2 | 0 | 2026-04-08T06:31:38 | The Users manager – PN plugin for WordPress is vulnerable to Privilege Escalatio | |
| CVE-2026-1346 | 9.4 | 0.01% | 3 | 0 | 2026-04-08T03:32:18 | IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify | |
| CVE-2026-4788 | 8.4 | 0.01% | 1 | 0 | 2026-04-08T03:32:18 | IBM Tivoli Netcool Impact 7.1.0.0 through 7.1.0.37 stores sensitive information | |
| CVE-2026-3499 | 8.8 | 0.02% | 1 | 0 | 2026-04-08T03:32:18 | The Product Feed PRO for WooCommerce by AdTribes – Product Feeds for WooCommerce | |
| CVE-2026-5726 | 7.8 | 0.01% | 1 | 0 | 2026-04-08T03:16:07.700000 | ASDA-Soft Stack-based Buffer Overflow Vulnerability | |
| CVE-2026-3296 | 9.8 | 0.02% | 1 | 0 | 2026-04-08T02:16:04.067000 | The Everest Forms plugin for WordPress is vulnerable to PHP Object Injection in | |
| CVE-2026-3357 | 8.8 | 0.07% | 1 | 0 | 2026-04-08T01:16:41.057000 | IBM Langflow Desktop 1.6.0 through 1.8.2 Langflow could allow an authenticated u | |
| CVE-2026-39933 | None | 0.05% | 1 | 0 | 2026-04-08T00:30:33 | Improper neutralization of input during web page generation ('cross-site scripti | |
| CVE-2026-1342 | 8.4 | 0.01% | 2 | 0 | 2026-04-08T00:30:32 | IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify | |
| CVE-2026-5747 | 7.5 | 0.01% | 1 | 0 | 2026-04-08T00:16:05.657000 | An out-of-bounds write issue in the virtio PCI transport in Amazon Firecracker 1 | |
| CVE-2026-39397 | 9.4 | 0.04% | 1 | 0 | 2026-04-08T00:15:54 | ### Impact All `/api/puck/*` CRUD endpoint handlers registered by `createPuckPl | |
| CVE-2026-39356 | 7.5 | 0.03% | 1 | 0 | 2026-04-08T00:14:59 | ### Summary Drizzle ORM improperly escaped quoted SQL identifiers in its dialec | |
| CVE-2026-39376 | 7.5 | 0.04% | 1 | 0 | 2026-04-08T00:12:27 | ### Summary When `parse()` fetches a URL that returns an HTML page containing a | |
| CVE-2026-39371 | 8.1 | 0.01% | 1 | 1 | 2026-04-08T00:12:07 | **Summary** Server functions exported from `"use server"` files could be invoke | |
| CVE-2026-39369 | 7.6 | 0.05% | 1 | 0 | 2026-04-08T00:08:46 | ## Summary `objects/aVideoEncoderReceiveImage.json.php` allowed an authenticate | |
| CVE-2026-35533 | 7.8 | 0.01% | 1 | 0 | 2026-04-07T22:16:56 | ### Summary `mise` loads trust-control settings from a local project `.mise.tom | |
| CVE-2026-32862 | 7.8 | 0.01% | 1 | 0 | 2026-04-07T21:32:46 | There is a memory corruption vulnerability due to an out-of-bounds write in ResF | |
| CVE-2026-32861 | 7.8 | 0.01% | 1 | 0 | 2026-04-07T21:32:46 | There is a memory corruption vulnerability due to an out-of-bounds write when lo | |
| CVE-2026-32864 | 7.8 | 0.01% | 1 | 0 | 2026-04-07T21:32:46 | There is a memory corruption vulnerability due to an out-of-bounds read in mgcor | |
| CVE-2026-32863 | 7.8 | 0.01% | 1 | 0 | 2026-04-07T21:32:46 | There is a memory corruption vulnerability due to an out-of-bounds read in sentr | |
| CVE-2026-29181 | 7.5 | 0.04% | 1 | 0 | 2026-04-07T21:17:16.003000 | OpenTelemetry-Go is the Go implementation of OpenTelemetry. From 1.36.0 to 1.40. | |
| CVE-2026-39361 | 7.7 | 0.03% | 1 | 0 | 2026-04-07T20:16:29.837000 | OpenObserve is a cloud-native observability platform. In 0.70.3 and earlier, the | |
| CVE-2026-39329 | 8.8 | 0.03% | 1 | 0 | 2026-04-07T20:16:29.047000 | ChurchCRM is an open-source church management system. Prior to 7.1.0, an SQL inj | |
| CVE-2026-39326 | 8.8 | 0.03% | 1 | 0 | 2026-04-07T20:16:28.927000 | ChurchCRM is an open-source church management system. Prior to 7.1.0, an SQL inj | |
| CVE-2026-39317 | 8.8 | 0.03% | 1 | 0 | 2026-04-07T20:16:28.580000 | ChurchCRM is an open-source church management system. Prior to 7.1.0, a SQL inje | |
| CVE-2026-32860 | 7.8 | 0.01% | 1 | 0 | 2026-04-07T20:16:24.040000 | There is a memory corruption vulnerability due to an out-of-bounds write when lo | |
| CVE-2026-35464 | 7.5 | 0.08% | 1 | 0 | 2026-04-07T20:00:07 | ## Summary The fix for CVE-2026-33509 (GHSA-r7mc-x6x7-cqxx) added an `ADMIN_ONL | |
| CVE-2026-35463 | 8.8 | 0.26% | 1 | 0 | 2026-04-07T19:59:57 | ### Summary The `ADMIN_ONLY_OPTIONS` protection mechanism restricts security-cr | |
| CVE-2026-35457 | 8.2 | 0.04% | 1 | 0 | 2026-04-07T19:59:52 | ### Summary The rendezvous server stores pagination cookies without bounds. An u | |
| CVE-2026-5735 | 9.8 | 0.04% | 1 | 0 | 2026-04-07T19:16:48.023000 | Memory safety bugs present in Firefox 149.0.1 and Thunderbird 149.0.1. Some of t | |
| CVE-2026-24146 | 7.5 | 0.04% | 1 | 0 | 2026-04-07T18:31:45 | NVIDIA Triton Inference Server contains a vulnerability where insufficient input | |
| CVE-2026-24175 | 7.5 | 0.04% | 1 | 0 | 2026-04-07T18:31:45 | NVIDIA Triton Inference Server contains a vulnerability where an attacker could | |
| CVE-2026-24450 | 8.1 | 0.04% | 1 | 0 | 2026-04-07T18:31:35 | An integer overflow vulnerability exists in the uncompressed_fp_dng_load_raw fun | |
| CVE-2026-39340 | 8.1 | 0.03% | 1 | 0 | 2026-04-07T18:16:46.010000 | ChurchCRM is an open-source church management system. Prior to 7.1.0, a SQL inje | |
| CVE-2026-39337 | 10.0 | 0.27% | 1 | 0 | 2026-04-07T18:16:45.630000 | ChurchCRM is an open-source church management system. Prior to 7.1.0, critical p | |
| CVE-2026-39333 | 8.7 | 0.03% | 1 | 0 | 2026-04-07T18:16:44.997000 | ChurchCRM is an open-source church management system. Prior to 7.1.0, he FindFun | |
| CVE-2026-39327 | 8.8 | 0.03% | 1 | 0 | 2026-04-07T18:16:43.883000 | ChurchCRM is an open-source church management system. Prior to 7.1.0, an SQL inj | |
| CVE-2026-39323 | 8.8 | 0.03% | 1 | 0 | 2026-04-07T18:16:43.240000 | ChurchCRM is an open-source church management system. Prior to 7.1.0, a critical | |
| CVE-2026-39319 | 8.8 | 0.03% | 1 | 0 | 2026-04-07T18:16:42.950000 | ChurchCRM is an open-source church management system. Prior to 7.1.0, a second o | |
| CVE-2026-35576 | 8.7 | 0.03% | 1 | 0 | 2026-04-07T18:16:42.273000 | ChurchCRM is an open-source church management system. Prior to 7.0.0, a stored c | |
| CVE-2026-35575 | 8.0 | 0.04% | 1 | 0 | 2026-04-07T18:16:42.077000 | ChurchCRM is an open-source church management system. Prior to 6.5.3, a Stored C | |
| CVE-2026-35573 | 9.1 | 0.24% | 1 | 0 | 2026-04-07T18:16:41.760000 | ChurchCRM is an open-source church management system. Prior to 6.5.3, a path tra | |
| CVE-2026-24173 | 7.5 | 0.04% | 1 | 0 | 2026-04-07T18:16:39.787000 | NVIDIA Triton Inference Server contains a vulnerability where an attacker could | |
| CVE-2026-34148 | 7.5 | 0.04% | 1 | 0 | 2026-04-07T18:04:11 | ### Summary `@fedify/fedify` follows HTTP redirects recursively in its remote d | |
| CVE-2025-57834 | 7.5 | 0.08% | 1 | 0 | 2026-04-07T17:31:20.270000 | An issue was discovered in Samsung Mobile Processor, Wearable Processor, and Mod | |
| CVE-2025-54328 | 10.0 | 0.05% | 1 | 0 | 2026-04-07T17:28:19.270000 | An issue was discovered in SMS in Samsung Mobile Processor, Wearable Processor, | |
| CVE-2026-35485 | 7.5 | 0.37% | 1 | 0 | 2026-04-07T17:16:31.243000 | text-generation-webui is an open-source web interface for running Large Language | |
| CVE-2026-35042 | 7.5 | 0.01% | 2 | 0 | 2026-04-07T17:16:29.590000 | fast-jwt provides fast JSON Web Token (JWT) implementation. In 6.1.0 and earlier | |
| CVE-2026-24660 | 8.1 | 0.04% | 1 | 0 | 2026-04-07T17:16:27.583000 | A heap-based buffer overflow vulnerability exists in the x3f_load_huffman functi | |
| CVE-2026-35394 | 8.3 | 0.04% | 1 | 0 | 2026-04-07T16:16:25.893000 | Mobile Next is an MCP server for mobile development and automation. Prior to 0.0 | |
| CVE-2026-26026 | 9.1 | 0.04% | 1 | 0 | 2026-04-07T16:03:34.597000 | GLPI is a free asset and IT management software package. From 11.0.0 to before 1 | |
| CVE-2026-26263 | 8.1 | 0.03% | 1 | 0 | 2026-04-07T16:02:38.350000 | GLPI is a free asset and IT management software package. From 11.0.0 to before 1 | |
| CVE-2026-20432 | 8.0 | 0.05% | 1 | 0 | 2026-04-07T15:31:49 | In Modem, there is a possible out of bounds write due to a missing bounds check. | |
| CVE-2026-5373 | 8.1 | 0.03% | 1 | 0 | 2026-04-07T15:30:58 | An issue that allowed all-organization administrators to promote accounts to sup | |
| CVE-2026-22679 | 9.8 | 0.31% | 1 | 0 | 2026-04-07T15:30:53 | Weaver (Fanwei) E-cology 10.0 versions prior to 20260312 contain an unauthentica | |
| CVE-2026-34197 | 8.8 | 0.10% | 2 | 2 | template | 2026-04-07T15:30:49 | Improper Input Validation, Improper Control of Generation of Code ('Code Injecti |
| CVE-2026-20433 | 8.8 | 0.05% | 1 | 0 | 2026-04-07T15:30:48 | In Modem, there is a possible out of bounds write due to a missing bounds check. | |
| CVE-2026-4740 | 8.2 | 0.01% | 1 | 0 | 2026-04-07T15:17:46.797000 | A flaw was found in Open Cluster Management (OCM), the technology underlying Red | |
| CVE-2026-35405 | 7.5 | 0.04% | 1 | 0 | 2026-04-07T15:17:43.367000 | libp2p-rust is the official rust language Implementation of the libp2p networkin | |
| CVE-2026-35395 | 8.8 | 0.03% | 1 | 0 | 2026-04-07T15:17:43.230000 | WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, WeGIA (Web g | |
| CVE-2026-35043 | 7.8 | 0.07% | 1 | 0 | 2026-04-07T15:17:41.963000 | BentoML is a Python library for building online serving systems optimized for AI | |
| CVE-2026-35036 | 7.5 | 0.03% | 1 | 0 | 2026-04-07T15:17:41.730000 | Ech0 is an open-source, self-hosted publishing platform for personal idea sharin | |
| CVE-2026-34783 | 8.1 | 0.16% | 1 | 0 | 2026-04-07T15:17:40.383000 | Ferret is a declarative system for working with web data. Prior to 2.0.0-alpha.4 | |
| CVE-2026-35409 | 7.7 | 0.03% | 1 | 0 | 2026-04-07T14:20:08 | ### Summary A Server-Side Request Forgery (SSRF) protection bypass has been iden | |
| CVE-2026-35408 | 8.7 | 0.01% | 1 | 0 | 2026-04-07T14:19:50 | ## Summary Directus's Single Sign-On (SSO) login pages lacked a `Cross-Origin-O | |
| CVE-2026-5627 | 9.1 | 0.03% | 2 | 0 | 2026-04-07T14:16:24.460000 | A path traversal vulnerability exists in mintplex-labs/anything-llm versions up | |
| CVE-2026-23818 | 8.8 | 0.04% | 1 | 0 | 2026-04-07T14:16:20.830000 | A vulnerability has been identified in the graphical user interface (GUI) of HPE | |
| CVE-2026-28797 | 8.8 | 0.07% | 1 | 0 | 2026-04-07T13:20:55.200000 | RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. In versio | |
| CVE-2025-47391 | 7.8 | 0.01% | 1 | 0 | 2026-04-07T13:20:35.010000 | Memory corruption while processing a frame request from user. | |
| CVE-2025-47392 | 8.8 | 0.01% | 1 | 0 | 2026-04-07T13:20:35.010000 | Memory corruption when decoding corrupted satellite data files with invalid sign | |
| CVE-2026-21373 | 7.8 | 0.01% | 1 | 0 | 2026-04-07T13:20:35.010000 | Memory Corruption when accessing an output buffer without validating its size du | |
| CVE-2026-21376 | 7.8 | 0.01% | 2 | 0 | 2026-04-07T13:20:35.010000 | Memory Corruption when accessing an output buffer without validating its size du | |
| CVE-2026-21380 | 7.8 | 0.01% | 1 | 0 | 2026-04-07T13:20:35.010000 | Memory Corruption when using deprecated DMABUF IOCTL calls to manage video memor | |
| CVE-2026-21378 | 7.8 | 0.01% | 1 | 0 | 2026-04-07T13:20:35.010000 | Memory Corruption when accessing an output buffer without validating its size du | |
| CVE-2026-21375 | 7.8 | 0.01% | 1 | 0 | 2026-04-07T13:20:35.010000 | Memory Corruption when accessing an output buffer without validating its size du | |
| CVE-2026-33540 | 7.5 | 0.03% | 2 | 0 | 2026-04-07T13:20:35.010000 | Distribution is a toolkit to pack, ship, store, and deliver container content. P | |
| CVE-2026-5612 | 8.8 | 0.04% | 1 | 0 | 2026-04-07T13:20:35.010000 | A vulnerability was determined in Belkin F9K1015 1.00.10. This vulnerability aff | |
| CVE-2026-5628 | 8.8 | 0.04% | 2 | 0 | 2026-04-07T13:20:35.010000 | A security vulnerability has been detected in Belkin F9K1015 1.00.10. Impacted i | |
| CVE-2026-5629 | 8.8 | 0.04% | 2 | 0 | 2026-04-07T13:20:35.010000 | A vulnerability was detected in Belkin F9K1015 1.00.10. The affected element is | |
| CVE-2026-0740 | 9.8 | 0.08% | 4 | 1 | 2026-04-07T13:20:11.643000 | The Ninja Forms - File Uploads plugin for WordPress is vulnerable to arbitrary f | |
| CVE-2026-31842 | 7.5 | 0.05% | 1 | 0 | 2026-04-07T13:20:11.643000 | Tinyproxy through 1.11.3 is vulnerable to HTTP request parsing desynchronization | |
| CVE-2026-34896 | 7.5 | 0.02% | 1 | 0 | 2026-04-07T13:20:11.643000 | Cross-Site Request Forgery (CSRF) vulnerability in Analytify Under Construction, | |
| CVE-2026-35471 | 9.8 | 0.07% | 3 | 0 | 2026-04-07T13:20:11.643000 | goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.3, tdeleteFile() | |
| CVE-2026-5465 | 8.8 | 0.05% | 1 | 1 | 2026-04-07T13:20:11.643000 | The Booking for Appointments and Events Calendar – Amelia plugin for WordPress i | |
| CVE-2026-35171 | 9.8 | 0.30% | 2 | 0 | 2026-04-07T13:20:11.643000 | Kedro is a toolbox for production-ready data science. Prior to 1.3.0, Kedro allo | |
| CVE-2026-35021 | 7.8 | 0.03% | 1 | 0 | 2026-04-07T13:20:11.643000 | Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection v | |
| CVE-2026-35203 | 7.5 | 0.04% | 1 | 0 | 2026-04-07T13:20:11.643000 | ZLMediaKit is a streaming media service framework. the VP9 RTP payload parser in | |
| CVE-2026-35442 | 8.1 | 0.04% | 1 | 0 | 2026-04-07T13:20:11.643000 | Directus is a real-time API and App dashboard for managing SQL database content. | |
| CVE-2026-5686 | 8.8 | 0.02% | 1 | 0 | 2026-04-07T13:20:11.643000 | A security flaw has been discovered in Tenda CX12L 16.03.53.12. This vulnerabili | |
| CVE-2026-5709 | 8.8 | 0.07% | 1 | 0 | 2026-04-07T13:20:11.643000 | Unsanitized input in the FileBrowser API in AWS Research and Engineering Studio | |
| CVE-2026-5687 | 8.8 | 0.05% | 1 | 0 | 2026-04-07T13:20:11.643000 | A weakness has been identified in Tenda CX12L 16.03.53.12. This issue affects th | |
| CVE-2026-35050 | 9.1 | 0.06% | 1 | 0 | 2026-04-07T13:20:11.643000 | text-generation-webui is an open-source web interface for running Large Language | |
| CVE-2026-35045 | 8.1 | 0.03% | 1 | 1 | 2026-04-07T13:20:11.643000 | Tandoor Recipes is an application for managing recipes, planning meals, and buil | |
| CVE-2026-34975 | 8.5 | 0.03% | 2 | 0 | 2026-04-07T13:20:11.643000 | Plunk is an open-source email platform built on top of AWS SES. Prior to 0.8.0, | |
| CVE-2026-34208 | 10.0 | 0.06% | 1 | 0 | 2026-04-07T13:20:11.643000 | SandboxJS is a JavaScript sandboxing library. Prior to 0.8.36, SandboxJS blocks | |
| CVE-2026-34950 | 9.1 | 0.02% | 2 | 0 | 2026-04-07T13:20:11.643000 | fast-jwt provides fast JSON Web Token (JWT) implementation. In 6.1.0 and earlier | |
| CVE-2026-33752 | 8.6 | 0.01% | 1 | 1 | 2026-04-07T13:20:11.643000 | curl_cffi is the a Python binding for curl. Prior to 0.15.0, curl_cffi does not | |
| CVE-2026-34402 | 8.1 | 0.02% | 1 | 0 | 2026-04-07T13:20:11.643000 | ChurchCRM is an open-source church management system. Prior to 7.1.0, authentica | |
| CVE-2026-34904 | 7.5 | 0.02% | 1 | 0 | 2026-04-07T09:31:28 | Cross-Site Request Forgery (CSRF) vulnerability in Analytify Simple Social Media | |
| CVE-2026-1114 | 9.8 | 0.04% | 2 | 0 | 2026-04-07T09:31:22 | In parisneo/lollms version 2.1.0, the application's session management is vulner | |
| CVE-2025-65115 | 8.8 | 0.07% | 1 | 0 | 2026-04-07T06:30:28 | Remote Code Execution Vulnerability in JP1/IT Desktop Management 2 - Manager on | |
| CVE-2026-5708 | 8.8 | 0.12% | 1 | 0 | 2026-04-07T00:30:28 | Unsanitized control of user-modifiable attributes in the session creation compon | |
| CVE-2026-5707 | 8.8 | 0.21% | 1 | 0 | 2026-04-07T00:30:28 | Unsanitized input in an OS command in the virtual desktop session name handling | |
| CVE-2026-5685 | 8.8 | 0.05% | 1 | 0 | 2026-04-07T00:30:27 | A vulnerability was identified in Tenda CX12L 16.03.53.12. This affects the func | |
| CVE-2026-5684 | 8.0 | 0.03% | 1 | 0 | 2026-04-07T00:30:27 | A vulnerability was determined in Tenda CX12L 16.03.53.12. Affected by this issu | |
| CVE-2026-35393 | 9.8 | 0.07% | 3 | 0 | 2026-04-06T23:43:51 | ### Summary * POST multipart upload directory not sanitized | `httpserver/updown | |
| CVE-2026-35392 | 9.8 | 0.07% | 2 | 0 | 2026-04-06T23:43:46 | ### Summary * PUT upload has no path sanitization | `httpserver/updown.go:20-69` | |
| CVE-2026-35187 | 7.7 | 0.03% | 1 | 0 | 2026-04-06T23:43:26 | ## Vulnerability Details **CWE-918**: Server-Side Request Forgery (SSRF) The ` | |
| CVE-2026-35209 | 7.5 | 0.03% | 1 | 0 | 2026-04-06T23:42:30 | ### Impact Applications that pass unsanitized user input (e.g. parsed JSON requ | |
| CVE-2026-35044 | 8.8 | 0.04% | 1 | 0 | 2026-04-06T23:42:10 | ## Summary The Dockerfile generation function `generate_containerfile()` in `sr | |
| CVE-2026-34841 | 9.8 | 0.02% | 1 | 0 | 2026-04-06T23:41:04 | ### **Impact** This is a **supply chain attack** involving compromised versions | |
| CVE-2026-34989 | None | 0.05% | 1 | 0 | 2026-04-06T23:40:25 | ## Summary ### **Vulnerability 1: Stored DOM XSS via Profile Name Update (Persis | |
| CVE-2026-34976 | 10.0 | 0.03% | 2 | 0 | 2026-04-06T23:26:04 | The `restoreTenant` admin mutation is missing from the authorization middleware | |
| CVE-2026-33579 | 9.9 | 0.02% | 2 | 1 | 2026-04-06T23:16:26.987000 | OpenClaw before 2026.3.28 contains a privilege escalation vulnerability in the / | |
| CVE-2026-35172 | 7.5 | 0.03% | 1 | 0 | 2026-04-06T23:14:52 | ## summary: distribution can restore read access in `repo a` after an explicit d | |
| CVE-2026-34986 | 7.5 | 0.01% | 1 | 0 | 2026-04-06T23:11:46 | ### Impact Decrypting a JSON Web Encryption (JWE) object will panic if the `alg | |
| CVE-2026-35020 | 8.4 | 0.06% | 1 | 0 | 2026-04-06T21:31:41 | Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection v | |
| CVE-2026-35022 | 9.8 | 0.25% | 2 | 0 | 2026-04-06T21:31:41 | Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection v | |
| CVE-2025-47390 | 7.8 | 0.01% | 1 | 0 | 2026-04-06T18:33:15 | Memory corruption while preprocessing IOCTL request in JPEG driver. | |
| CVE-2026-21372 | 7.8 | 0.01% | 1 | 0 | 2026-04-06T18:33:15 | Memory Corruption when sending IOCTL requests with invalid buffer sizes during m | |
| CVE-2026-21367 | 7.7 | 0.04% | 1 | 0 | 2026-04-06T18:33:15 | Transient DOS when processing nonstandard FILS Discovery Frames with out-of-rang | |
| CVE-2026-21382 | 7.8 | 0.01% | 2 | 0 | 2026-04-06T18:33:15 | Memory Corruption when handling power management requests with improperly sized | |
| CVE-2026-21381 | 7.7 | 0.04% | 1 | 0 | 2026-04-06T18:33:15 | Transient DOS when receiving a service data frame with excessive length during d | |
| CVE-2026-21374 | 7.8 | 0.01% | 2 | 0 | 2026-04-06T18:33:07 | Memory Corruption when processing auxiliary sensor input/output control commands | |
| CVE-2026-21371 | 7.8 | 0.01% | 1 | 0 | 2026-04-06T18:33:06 | Memory Corruption when retrieving output buffer with insufficient size validatio | |
| CVE-2025-47389 | 7.8 | 0.01% | 1 | 0 | 2026-04-06T18:33:05 | Memory corruption when buffer copy operation fails due to integer overflow durin | |
| CVE-2026-35616 | 9.8 | 5.95% | 11 | 5 | 2026-04-06T18:12:57.863000 | A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through | |
| CVE-2026-30078 | 7.5 | 0.06% | 2 | 0 | 2026-04-06T15:31:34 | OpenAirInterface V2.2.0 AMF crashes when it receives an NGAP message with invali | |
| CVE-2026-34885 | 8.5 | 0.03% | 1 | 0 | template | 2026-04-06T15:31:34 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti |
| CVE-2026-3524 | 8.8 | 0.01% | 1 | 0 | 2026-04-06T15:31:34 | Mattermost Plugin Legal Hold versions <=1.1.4 fail to halt request processing af | |
| CVE-2026-35470 | 8.8 | 0.03% | 2 | 0 | 2026-04-03T21:57:08 | ## Description Six `confronta_righe.php` files across different modules in Open | |
| CVE-2026-32186 | 6.5 | 0.09% | 1 | 0 | 2026-04-03T21:32:44 | Microsoft Bing Elevation of Privilege Vulnerability | |
| CVE-2026-3184 | 3.7 | 0.08% | 1 | 1 | 2026-04-03T21:31:49 | A flaw was found in util-linux. Improper hostname canonicalization in the `login | |
| CVE-2026-34040 | 8.8 | 0.01% | 1 | 0 | 2026-04-03T16:51:28.670000 | Moby is an open source container framework. Prior to version 29.3.1, a security | |
| CVE-2026-1668 | 9.8 | 0.37% | 1 | 1 | 2026-04-02T15:03:02.430000 | The web interface on multiple Omada switches does not adequately validate certai | |
| CVE-2026-33744 | 7.8 | 0.01% | 1 | 0 | 2026-04-01T15:00:48.743000 | BentoML is a Python library for building online serving systems optimized for AI | |
| CVE-2025-59032 | 7.5 | 0.07% | 1 | 0 | 2026-03-27T09:31:18 | ManageSieve AUTHENTICATE command crashes when using literal as SASL initial resp | |
| CVE-2026-33509 | 7.5 | 0.08% | 1 | 0 | 2026-03-26T20:47:02.337000 | pyLoad is a free and open-source download manager written in Python. From versio | |
| CVE-2026-32251 | 6.5 | 0.03% | 2 | 0 | 2026-03-20T15:57:42.580000 | Tolgee is an open-source localization platform. Prior to 3.166.3, the XML parser | |
| CVE-2025-59718 | 9.8 | 7.62% | 2 | 2 | 2025-12-17T13:54:45.390000 | A improper verification of cryptographic signature vulnerability in Fortinet For | |
| CVE-2025-55182 | 10.0 | 66.27% | 1 | 100 | template | 2025-12-10T02:00:02.557000 | A pre-authentication remote code execution vulnerability exists in React Server |
| CVE-2025-11001 | 7.8 | 0.22% | 1 | 6 | 2025-11-24T15:07:32.807000 | 7-Zip ZIP File Parsing Directory Traversal Remote Code Execution Vulnerability. | |
| CVE-2025-64446 | 9.8 | 92.63% | 1 | 14 | template | 2025-11-21T18:27:33.730000 | A relative path traversal vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1 |
| CVE-2025-6965 | 9.8 | 0.15% | 1 | 0 | 2025-11-04T22:16:43.413000 | There exists a vulnerability in SQLite versions before 3.50.2 where the number o | |
| CVE-2025-26633 | 7.0 | 7.50% | 1 | 2 | 2025-10-27T17:13:29.327000 | Improper neutralization in Microsoft Management Console allows an unauthorized a | |
| CVE-2023-48788 | 9.8 | 94.13% | 1 | 1 | template | 2025-10-24T12:54:49.670000 | A improper neutralization of special elements used in an sql command ('sql injec |
| CVE-2025-48868 | 7.2 | 0.95% | 1 | 0 | 2025-09-29T14:06:57.020000 | Horilla is a free and open source Human Resource Management System (HRMS). An au | |
| CVE-2025-59528 | 10.0 | 82.39% | 7 | 1 | template | 2025-09-23T16:45:09.443000 | Flowise is a drag & drop user interface to build a customized large language mod |
| CVE-2025-4870 | 7.3 | 0.20% | 1 | 4 | 2025-05-21T21:32:25 | A vulnerability classified as critical was found in itsourcecode Restaurant Mana | |
| CVE-2016-2183 | 7.5 | 40.99% | 1 | 1 | 2025-04-12T10:46:40.837000 | The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and | |
| CVE-2023-33177 | 8.8 | 3.76% | 1 | 1 | 2024-11-21T08:05:03.337000 | Xibo is a content management system (CMS). A path traversal vulnerability exists | |
| CVE-2023-38766 | 5.4 | 0.21% | 1 | 0 | 2024-04-04T06:40:24 | Cross Site Scripting (XSS) vulnerability in ChurchCRM v.5.0.0 allows a remote at | |
| CVE-2026-39318 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-39332 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-39331 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2026-39330 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-39328 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2026-39339 | 0 | 0.10% | 1 | 0 | N/A | ||
| CVE-2026-39334 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-39344 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-39341 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-39355 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2026-34990 | 0 | 0.01% | 1 | 0 | N/A | ||
| CVE-2026-35164 | 0 | 0.21% | 1 | 0 | N/A | ||
| CVE-2026-35182 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-35174 | 0 | 0.35% | 1 | 0 | N/A | ||
| CVE-2026-34982 | 0 | 0.02% | 1 | 0 | N/A | ||
| CVE-2026-33510 | 0 | 0.04% | 2 | 0 | N/A | ||
| CVE-2026-26027 | 0 | 0.04% | 1 | 0 | N/A |
updated 2026-04-08T16:16:27.537000
2 posts
🔴 CVE-2026-39846 - Critical (9)
SiYuan is a personal knowledge management system. Prior to 3.6.4, a malicious note synced to another user can trigger remote code execution in the SiYuan Electron desktop client. The root cause is that table caption content is stored without safe ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39846/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-39846 | CRITICAL: SiYuan < 3.6.4 vulnerable to stored XSS in table captions. Exploit enables RCE via Electron’s Node.js access — patch to 3.6.4 ASAP! Details: https://radar.offseq.com/threat/cve-2026-39846-cwe-79-improper-neutralization-of-i-d77ddc8a #OffSeq #SiYuan #vuln #infosec
##updated 2026-04-08T16:16:24.043000
1 posts
🟠 CVE-2026-34045 - High (8.2)
Podman Desktop is a graphical tool for developing on containers and Kubernetes. Prior to 1.26.2, an unauthenticated HTTP server exposed by Podman Desktop allows any network attacker to remotely trigger denial-of-service conditions and extract sens...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34045/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T16:16:23.430000
2 posts
🚨 CVE-2026-33229 (HIGH): XWiki Platform (17.0.0-rc-1 <17.4.8, 17.5.0-rc-1 <17.10.1) allows users with script rights to bypass sandboxing & execute arbitrary Python code. Patch to 17.4.8/17.10.1 now! https://radar.offseq.com/threat/cve-2026-33229-cwe-862-missing-authorization-in-xw-2e4740d9 #OffSeq #XWiki #infosec #vulnerability
##🚨 CVE-2026-33229 (HIGH): XWiki Platform (17.0.0-rc-1 <17.4.8, 17.5.0-rc-1 <17.10.1) allows users with script rights to bypass sandboxing & execute arbitrary Python code. Patch to 17.4.8/17.10.1 now! https://radar.offseq.com/threat/cve-2026-33229-cwe-862-missing-authorization-in-xw-2e4740d9 #OffSeq #XWiki #infosec #vulnerability
##updated 2026-04-08T15:16:11.967000
1 posts
Critical OpenSSL Vulnerability Exposes Application Memory During RSA Operations
A newly revealed vulnerability in OpenSSL is sending shockwaves through the cybersecurity world. Experts warn that this flaw could allow attackers to extract sensitive data directly from application memory during cryptographic operations. The issue, tracked as CVE-2026-31790, targets the RSA Key Encapsulation Mechanism (KEM), specifically the RSASVE encapsulation process used to safely…
##updated 2026-04-08T11:57:19
2 posts
🔴 CVE-2026-39847 - Critical (9.1)
Emmett is a full-stack Python web framework designed with simplicity. From 2.5.0 to before 2.8.1, the RSGI static handler for Emmett's internal assets (/__emmett__ paths) is vulnerable to path traversal attacks. An attacker can use ../ sequences (...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39847/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ Emmett framework (2.5.0 – <2.8.1) suffers from a CRITICAL path traversal (CVE-2026-39847). Attackers can remotely read files outside the asset directory. Patch by upgrading to 2.8.1+. Details: https://radar.offseq.com/threat/cve-2026-39847-cwe-22-improper-limitation-of-a-pat-645f3706 #OffSeq #Emmett #PathTraversal #CVE202639847
##updated 2026-04-08T11:54:57
2 posts
🔴 CVE-2026-35039 - Critical (9.1)
fast-jwt provides fast JSON Web Token (JWT) implementation. From 0.0.1 to before 6.1.0, setting up a custom cacheKeyBuilder method which does not properly create unique keys for different tokens can lead to cache collisions. This could cause token...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35039/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-35039 - Critical (9.1)
fast-jwt provides fast JSON Web Token (JWT) implementation. From 0.0.1 to before 6.1.0, setting up a custom cacheKeyBuilder method which does not properly create unique keys for different tokens can lead to cache collisions. This could cause token...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35039/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T09:31:42
2 posts
⚠️ CVE-2026-3535: CRITICAL RCE in DSGVO Google Web Fonts GDPR (WordPress). Unauthenticated file upload lets attackers drop PHP shells via AJAX. No patch — disable plugin or block endpoint if using affected themes. More: https://radar.offseq.com/threat/cve-2026-3535-cwe-434-unrestricted-upload-of-file--f7fa2474 #OffSeq #WordPress #Infosec
##⚠️ CVE-2026-3535: CRITICAL RCE in DSGVO Google Web Fonts GDPR (WordPress). Unauthenticated file upload lets attackers drop PHP shells via AJAX. No patch — disable plugin or block endpoint if using affected themes. More: https://radar.offseq.com/threat/cve-2026-3535-cwe-434-unrestricted-upload-of-file--f7fa2474 #OffSeq #WordPress #Infosec
##updated 2026-04-08T09:16:20.360000
2 posts
🚨 CRITICAL: CVE-2026-25776 impacts Six Apart Movable Type ≤9.1.0. Unauthenticated code injection enables remote Perl script execution. No patch yet — restrict access & monitor. More info: https://radar.offseq.com/threat/cve-2026-25776-code-injection-in-six-apart-ltd-mov-c0a38b7e #OffSeq #Vuln #InfoSec #CVE #WebSecurity
##🚨 CRITICAL: CVE-2026-25776 impacts Six Apart Movable Type ≤9.1.0. Unauthenticated code injection enables remote Perl script execution. No patch yet — restrict access & monitor. More info: https://radar.offseq.com/threat/cve-2026-25776-code-injection-in-six-apart-ltd-mov-c0a38b7e #OffSeq #Vuln #InfoSec #CVE #WebSecurity
##updated 2026-04-08T06:31:38
1 posts
🟠 CVE-2026-24913 - High (8.8)
SQL Injection vulnerability exists in MATCHA INVOICE 2.6.6 and earlier. If this vulnerability is exploited, information stored in the database may be obtained or altered by a user who can log in to the product.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24913/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T06:31:38
2 posts
🔴 CVE-2026-4003 - Critical (9.8)
The Users manager – PN plugin for WordPress is vulnerable to Privilege Escalation via Arbitrary User Meta Update in all versions up to and including 1.1.15. This is due to a flawed authorization logic check in the userspn_ajax_nopriv_server() fu...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4003/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔥 CRITICAL: CVE-2026-4003 in Users manager – PN for WordPress allows unauthenticated attackers to escalate privileges via arbitrary user meta updates. Disable plugin ASAP and monitor for patches. https://radar.offseq.com/threat/cve-2026-4003-cwe-862-missing-authorization-in-fel-3d2461b4 #OffSeq #WordPress #Vuln #PrivilegeEscalation
##updated 2026-04-08T03:32:18
3 posts
🔴 CVE-2026-1346 - Critical (9.3)
IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 could allow a locally a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1346/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-1346 - Critical (9.3)
IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 could allow a locally a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1346/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔎 CRITICAL: CVE-2026-1346 in IBM Verify Identity Access Container (10.0 – 11.0.2) allows local privilege escalation to root. No patch available. Restrict access & monitor IBM advisories. https://radar.offseq.com/threat/cve-2026-1346-cwe-250-execution-with-unnecessary-p-0c7a9e3f #OffSeq #IBMSecurity #CVE20261346 #InfoSec
##updated 2026-04-08T03:32:18
1 posts
🟠 CVE-2026-4788 - High (8.4)
IBM Tivoli Netcool Impact 7.1.0.0 through 7.1.0.37 stores sensitive information in log files that could be read by a local user.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4788/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T03:32:18
1 posts
🟠 CVE-2026-3499 - High (8.8)
The Product Feed PRO for WooCommerce by AdTribes – Product Feeds for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions 13.4.6 through 13.5.2.1. This is due to missing or incorrect nonce validation on the aj...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3499/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T03:16:07.700000
1 posts
🟠 CVE-2026-5726 - High (7.8)
ASDA-Soft Stack-based Buffer Overflow Vulnerability
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5726/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T02:16:04.067000
1 posts
🔴 CVE-2026-3296 - Critical (9.8)
The Everest Forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.4.3 via deserialization of untrusted input from form entry metadata. This is due to the html-admin-page-entries-view.php file call...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3296/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T01:16:41.057000
1 posts
🟠 CVE-2026-3357 - High (8.8)
IBM Langflow Desktop 1.6.0 through 1.8.2 Langflow could allow an authenticated user to execute arbitrary code on the system, caused by an insecure default setting which permits the deserialization of untrusted data in the FAISS component.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3357/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T00:30:33
1 posts
🚨 CVE-2026-39933: CRITICAL XSS (CVSS 10) in Mediawiki - GlobalWatchlist Extension. Non-release branches vulnerable to input neutralization flaw (CWE-79). Audit deployments urgently! More info: https://radar.offseq.com/threat/cve-2026-39933-cwe-79-improper-neutralization-of-i-01337219 #OffSeq #XSS #Mediawiki #Security
##updated 2026-04-08T00:30:32
2 posts
🟠 CVE-2026-1342 - High (8.5)
IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 could allow a locally a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1342/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-1342 - High (8.5)
IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 could allow a locally a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1342/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T00:16:05.657000
1 posts
🟠 CVE-2026-5747 - High (7.5)
An out-of-bounds write issue in the virtio PCI transport in Amazon Firecracker 1.13.0 through 1.14.3 and 1.15.0 on x86_64 and aarch64 might allow a local guest user with root privileges to crash the Firecracker VMM process or potentially execute a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5747/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T00:15:54
1 posts
🔴 CVE-2026-39397 - Critical (9.4)
@delmaredigital/payload-puck is a PayloadCMS plugin for integrating Puck visual page builder. Prior to 0.6.23, all /api/puck/* CRUD endpoint handlers registered by createPuckPlugin() called Payload's local API with the default overrideAccess: true...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39397/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T00:14:59
1 posts
🟠 CVE-2026-39356 - High (7.5)
Drizzle is a modern TypeScript ORM. Prior to 0.45.2 and 1.0.0-beta.20, Drizzle ORM improperly escaped quoted SQL identifiers in its dialect-specific escapeName() implementations. In affected versions, embedded identifier delimiters were not escape...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39356/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T00:12:27
1 posts
🟠 CVE-2026-39376 - High (7.5)
FastFeedParser is a high performance RSS, Atom and RDF parser. Prior to 0.5.10, when parse() fetches a URL that returns an HTML page containing a tag, it recursively calls itself with the redirect URL — with no depth limit, no visited-URL dedup...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39376/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T00:12:07
1 posts
1 repos
🟠 CVE-2026-39371 - High (8.1)
RedwoodSDK is a server-first React framework. From 1.0.0-beta.50 to 1.0.5, erver functions exported from "use server" files could be invoked via GET requests, bypassing their intended HTTP method. In cookie-authenticated applications, this allowed...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39371/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T00:08:46
1 posts
🟠 CVE-2026-39369 - High (7.6)
WWBN AVideo is an open source video platform. In versions 26.0 and prior, objects/aVideoEncoderReceiveImage.json.php allowed an authenticated uploader to fetch attacker-controlled same-origin /videos/... URLs, bypass traversal scrubbing, and expos...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39369/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T22:16:56
1 posts
🟠 CVE-2026-35533 - High (7.7)
mise manages dev tools like node, python, cmake, and terraform. From 2026.2.18 through 2026.4.5, mise loads trust-control settings from a local project .mise.toml before the trust check runs. An attacker who can place a malicious .mise.toml in a r...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35533/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T21:32:46
1 posts
🟠 CVE-2026-32862 - High (7.8)
There is a memory corruption vulnerability due to an out-of-bounds write in ResFileFactory::InitResourceMgr() in NI LabVIEW. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32862/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T21:32:46
1 posts
🟠 CVE-2026-32861 - High (7.8)
There is a memory corruption vulnerability due to an out-of-bounds write when loading a corrupted LVCLASS file in NI LabVIEW. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32861/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T21:32:46
1 posts
🟠 CVE-2026-32864 - High (7.8)
There is a memory corruption vulnerability due to an out-of-bounds read in mgcore_SH_25_3!aligned_free() in NI LabVIEW. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an atta...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32864/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T21:32:46
1 posts
🟠 CVE-2026-32863 - High (7.8)
There is a memory corruption vulnerability due to an out-of-bounds read in sentry_transaction_context_set_operation() in NI LabVIEW. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation req...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32863/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T21:17:16.003000
1 posts
🟠 CVE-2026-29181 - High (7.5)
OpenTelemetry-Go is the Go implementation of OpenTelemetry. From 1.36.0 to 1.40.0, multi-value baggage: header extraction parses each header field-value independently and aggregates members across values. This allows an attacker to amplify cpu and...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29181/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T20:16:29.837000
1 posts
🟠 CVE-2026-39361 - High (7.7)
OpenObserve is a cloud-native observability platform. In 0.70.3 and earlier, the validate_enrichment_url function in src/handler/http/request/enrichment_table/mod.rs fails to block IPv6 addresses because Rust's url crate returns them with surround...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39361/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T20:16:29.047000
1 posts
🟠 CVE-2026-39329 - High (8.8)
ChurchCRM is an open-source church management system. Prior to 7.1.0, an SQL injection vulnerability was identified in /EventNames.php in ChurchCRM. Authenticated users with AddEvent privileges can inject SQL via the newEvtTypeCntLst parameter dur...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39329/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T20:16:28.927000
1 posts
🟠 CVE-2026-39326 - High (8.8)
ChurchCRM is an open-source church management system. Prior to 7.1.0, an SQL injection vulnerability was found in the endpoint /PropertyTypeEditor.php in ChurchCRM. Authenticated users with the role isMenuOptionsEnabled can inject arbitrary SQL st...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39326/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T20:16:28.580000
1 posts
🟠 CVE-2026-39317 - High (8.8)
ChurchCRM is an open-source church management system. Prior to 7.1.0, a SQL injection vulnerability exists in ChurchCRM's SettingsIndividual.php where user-controlled array keys from the type POST parameter are used directly in SQL queries without...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39317/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T20:16:24.040000
1 posts
🟠 CVE-2026-32860 - High (7.8)
There is a memory corruption vulnerability due to an out-of-bounds write when loading a corrupted LVLIB file in NI LabVIEW. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32860/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T20:00:07
1 posts
🟠 CVE-2026-35464 - High (7.5)
pyLoad is a free and open-source download manager written in Python. The fix for CVE-2026-33509 added an ADMIN_ONLY_OPTIONS set to block non-admin users from modifying security-critical config options. The storage_folder option is not in this set ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35464/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T19:59:57
1 posts
🟠 CVE-2026-35463 - High (8.8)
pyLoad is a free and open-source download manager written in Python. In 0.5.0b3.dev96 and earlier, the ADMIN_ONLY_OPTIONS protection mechanism restricts security-critical configuration values (reconnect scripts, SSL certs, proxy credentials) to ad...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35463/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T19:59:52
1 posts
🟠 CVE-2026-35457 - High (8.2)
libp2p-rust is the official rust language Implementation of the libp2p networking stack. Prior to 0.17.1, the rendezvous server stores pagination cookies without bounds. An unauthenticated peer can repeatedly issue DISCOVER requests and force unbo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35457/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T19:16:48.023000
1 posts
⛔ New security advisory:
CVE-2026-5735 affects Mozilla Firefox.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-5735-firefox-thunderbird-rce
updated 2026-04-07T18:31:45
1 posts
🟠 CVE-2026-24146 - High (7.5)
NVIDIA Triton Inference Server contains a vulnerability where insufficient input validation and a large number of outputs could cause a server crash. A successful exploit of this vulnerability might lead to denial of service.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24146/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T18:31:45
1 posts
🟠 CVE-2026-24175 - High (7.5)
NVIDIA Triton Inference Server contains a vulnerability where an attacker could cause a server crash by sending a malformed request header to the server. A successful exploit of this vulnerability might lead to denial of service.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24175/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T18:31:35
1 posts
🟠 CVE-2026-24450 - High (8.1)
An integer overflow vulnerability exists in the uncompressed_fp_dng_load_raw functionality of LibRaw Commit 8dc68e2. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vu...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24450/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T18:16:46.010000
1 posts
🟠 CVE-2026-39340 - High (8.1)
ChurchCRM is an open-source church management system. Prior to 7.1.0, a SQL injection vulnerability exists in PropertyTypeEditor.php, part of the administration functionality for managing property type categories (People → Person Properties / Fa...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39340/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T18:16:45.630000
1 posts
🔴 CVE-2026-39337 - Critical (10)
ChurchCRM is an open-source church management system. Prior to 7.1.0, critical pre-authentication remote code execution vulnerability in ChurchCRM's setup wizard allows unauthenticated attackers to inject arbitrary PHP code during the initial inst...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39337/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T18:16:44.997000
1 posts
🟠 CVE-2026-39333 - High (8.7)
ChurchCRM is an open-source church management system. Prior to 7.1.0, he FindFundRaiser.php endpoint reflects user-supplied input (DateStart and DateEnd) into HTML input field attributes without proper output encoding for the HTML attribute contex...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39333/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T18:16:43.883000
1 posts
🟠 CVE-2026-39327 - High (8.8)
ChurchCRM is an open-source church management system. Prior to 7.1.0, an SQL injection vulnerability was found in the endpoint /MemberRoleChange.php in ChurchCRM 7.0.5. Authenticated users with the role Manage Groups & Roles (ManageGroups) can inj...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39327/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T18:16:43.240000
1 posts
🟠 CVE-2026-39323 - High (8.8)
ChurchCRM is an open-source church management system. Prior to 7.1.0, a critical SQL injection vulnerability exists in ChurchCRM's PropertyTypeEditor.php where the Name and Description POST parameters are sanitized only with strip_tags() before di...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39323/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T18:16:42.950000
1 posts
🟠 CVE-2026-39319 - High (8.8)
ChurchCRM is an open-source church management system. Prior to 7.1.0, a second order SQL injection vulnerability was found in the endpoint /FundRaiserEditor.php in ChurchCRM. A user has to be authenticated but doesn't need any privileges. These us...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39319/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T18:16:42.273000
1 posts
🟠 CVE-2026-35576 - High (8.7)
ChurchCRM is an open-source church management system. Prior to 7.0.0, a stored cross-site scripting (XSS) vulnerability exists in ChurchCRM within the Person Property Management subsystem. This issue persists in versions patched for CVE-2023-38766...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35576/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T18:16:42.077000
1 posts
🟠 CVE-2026-35575 - High (8)
ChurchCRM is an open-source church management system. Prior to 6.5.3, a Stored Cross-Site Scripting (Stored XSS) vulnerability in the admin panel’s group-creation feature allows any user with group-creation privileges to inject malicious JavaScr...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35575/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T18:16:41.760000
1 posts
🔴 CVE-2026-35573 - Critical (9.1)
ChurchCRM is an open-source church management system. Prior to 6.5.3, a path traversal vulnerability in ChurchCRM's backup restore functionality allows authenticated administrators to upload arbitrary files and achieve remote code execution by ove...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35573/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T18:16:39.787000
1 posts
🟠 CVE-2026-24173 - High (7.5)
NVIDIA Triton Inference Server contains a vulnerability where an attacker could cause a server crash by sending a malformed request to the server. A successful exploit of this vulnerability might lead to denial of service.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24173/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T18:04:11
1 posts
🟠 CVE-2026-34148 - High (7.5)
Fedify is a TypeScript library for building federated server apps powered by ActivityPub. Prior to 1.9.6, 1.10.5, 2.0.8, and 2.1.1, @fedify/fedify follows HTTP redirects recursively in its remote document loader and authenticated document loader w...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34148/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T17:31:20.270000
1 posts
🟠 CVE-2025-57834 - High (7.5)
An issue was discovered in Samsung Mobile Processor, Wearable Processor, and Modem (Exynos 980, 850, 990, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 1580, 2500, 1680, 9110, W920, W930, W1000, Modem 5123, Modem 5300, Modem 5400, and Modem 5410...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-57834/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T17:28:19.270000
1 posts
🔴 CVE-2025-54328 - Critical (10)
An issue was discovered in SMS in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 1580, 2500, 9110, W920, W930, W1000, Modem 5123, Modem 5300, and Modem 5400. A Stack-ba...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-54328/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T17:16:31.243000
1 posts
🟠 CVE-2026-35485 - High (7.5)
text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.3, an unauthenticated path traversal vulnerability in load_grammar() allows reading any file on the server filesystem with no extension restriction...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35485/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T17:16:29.590000
2 posts
🟠 CVE-2026-35042 - High (7.5)
fast-jwt provides fast JSON Web Token (JWT) implementation. In 6.1.0 and earlier, fast-jwt does not validate the crit (Critical) Header Parameter defined in RFC 7515 §4.1.11. When a JWS token contains a crit array listing extensions that fast-jwt...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35042/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35042 - High (7.5)
fast-jwt provides fast JSON Web Token (JWT) implementation. In 6.1.0 and earlier, fast-jwt does not validate the crit (Critical) Header Parameter defined in RFC 7515 §4.1.11. When a JWS token contains a crit array listing extensions that fast-jwt...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35042/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T17:16:27.583000
1 posts
🟠 CVE-2026-24660 - High (8.1)
A heap-based buffer overflow vulnerability exists in the x3f_load_huffman functionality of LibRaw Commit d20315b. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulne...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24660/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T16:16:25.893000
1 posts
🟠 CVE-2026-35394 - High (8.3)
Mobile Next is an MCP server for mobile development and automation. Prior to 0.0.50, the mobile_open_url tool in mobile-mcp passes user-supplied URLs directly to Android's intent system without any scheme validation, allowing execution of arbitrar...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35394/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T16:03:34.597000
1 posts
🔴 CVE-2026-26026 - Critical (9.1)
GLPI is a free asset and IT management software package. From 11.0.0 to before 11.0.6, template injection by an administrator lead to RCE. This vulnerability is fixed in 11.0.6.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26026/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T16:02:38.350000
1 posts
🟠 CVE-2026-26263 - High (8.1)
GLPI is a free asset and IT management software package. From 11.0.0 to before 11.0.6, an unauthenticated time-based blind SQL injection exists in GLPI's Search engine. This vulnerability is fixed in 11.0.6.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26263/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T15:31:49
1 posts
🟠 CVE-2026-20432 - High (8)
In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges n...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20432/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T15:30:58
1 posts
🟠 CVE-2026-5373 - High (8.1)
An issue that allowed all-organization administrators to promote accounts to superuser status has been resolved. This is an instance of CWE-269: Improper Privilege Management, and has an estimated CVSS score of CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5373/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T15:30:53
1 posts
🔴 CVE-2026-22679 - Critical (9.8)
Weaver (Fanwei) E-cology 10.0 versions prior to 20260312 contain an unauthenticated remote code execution vulnerability in the /papi/esearch/data/devops/dubboApi/debug/method endpoint that allows attackers to execute arbitrary commands by invokin...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22679/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T15:30:49
2 posts
2 repos
CVE-2026-34197: ActiveMQ RCE via Jolokia API https://horizon3.ai/intelligence/blogs/cve-2026-34197-activemq-rce-jolokia/
##🟠 CVE-2026-34197 - High (8.8)
Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ.
Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bridge at /api/jolokia/ on the web console. The d...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34197/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T15:30:48
1 posts
🟠 CVE-2026-20433 - High (8.8)
In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges n...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20433/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T15:17:46.797000
1 posts
🟠 CVE-2026-4740 - High (8.2)
A flaw was found in Open Cluster Management (OCM), the technology underlying Red Hat Advanced Cluster Management (ACM). Improper validation of Kubernetes client certificate renewal allows a managed cluster administrator to forge a client certifica...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4740/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T15:17:43.367000
1 posts
🟠 CVE-2026-35405 - High (7.5)
libp2p-rust is the official rust language Implementation of the libp2p networking stack. Prior to 0.17.1, libp2p-rendezvous server has no limit on how many namespaces a single peer can register. A malicious peer can just keep registering unique n...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35405/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T15:17:43.230000
1 posts
🟠 CVE-2026-35395 - High (8.8)
WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, WeGIA (Web gerenciador para instituições assistenciais) contains a SQL injection vulnerability in dao/memorando/DespachoDAO.php. The id_memorando parameter is extracted from $_R...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35395/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T15:17:41.963000
1 posts
🟠 CVE-2026-35043 - High (7.8)
BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.38, the cloud deployment path in src/bentoml/_internal/cloud/deployment.py was not included in the fix for CVE-2026-33744. Line...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35043/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T15:17:41.730000
1 posts
🟠 CVE-2026-35036 - High (7.5)
Ech0 is an open-source, self-hosted publishing platform for personal idea sharing. Prior to 4.2.8, Ech0 implements link preview (editor fetches a page title) through GET /api/website/title. That is legitimate product behavior, but the implementati...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35036/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T15:17:40.383000
1 posts
🟠 CVE-2026-34783 - High (8.1)
Ferret is a declarative system for working with web data. Prior to 2.0.0-alpha.4, a path traversal vulnerability in Ferret's IO::FS::WRITE standard library function allows a malicious website to write arbitrary files to the filesystem of the machi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34783/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T14:20:08
1 posts
🟠 CVE-2026-35409 - High (7.7)
Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.16.0, a Server-Side Request Forgery (SSRF) protection bypass has been identified and fixed in Directus. The IP address validation mechanism used to block ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35409/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T14:19:50
1 posts
🟠 CVE-2026-35408 - High (8.7)
Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.17.0, Directus's Single Sign-On (SSO) login pages lacked a Cross-Origin-Opener-Policy (COOP) HTTP response header. Without this header, a malicious cross-...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35408/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T14:16:24.460000
2 posts
🔴 CVE-2026-5627 - Critical (9.1)
A path traversal vulnerability exists in mintplex-labs/anything-llm versions up to and including 1.9.1, within the `AgentFlows` component. The vulnerability arises from improper handling of user input in the `loadFlow` and `deleteFlow` methods in ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5627/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-5627: Critical path traversal in mintplex-labs/anything-llm (<=1.9.1). Attackers with high privileges can access/delete sensitive .json files. Upgrade to 1.12.1. https://radar.offseq.com/threat/cve-2026-5627-cwe-29-path-traversal-filename-in-mi-9e476f7c #OffSeq #Vuln #PathTraversal #Security
##updated 2026-04-07T14:16:20.830000
1 posts
🟠 CVE-2026-23818 - High (8.8)
A vulnerability has been identified in the graphical user interface (GUI) of HPE Aruba Networking Private 5G Core On-Prem that could allow an attacker to abuse an open redirect vulnerability in the login flow using a crafted URL. Successful exploi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23818/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T13:20:55.200000
1 posts
🟠 CVE-2026-28797 - High (8.8)
RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. In versions 0.24.0 and prior, a Server-Side Template Injection (SSTI) vulnerability exists in RAGFlow's Agent workflow Text Processing (StringTransform) and Message components....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28797/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T13:20:35.010000
1 posts
🟠 CVE-2025-47391 - High (7.8)
Memory corruption while processing a frame request from user.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-47391/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T13:20:35.010000
1 posts
🟠 CVE-2025-47392 - High (8.8)
Memory corruption when decoding corrupted satellite data files with invalid signature offsets.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-47392/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T13:20:35.010000
1 posts
🟠 CVE-2026-21373 - High (7.8)
Memory Corruption when accessing an output buffer without validating its size during IOCTL processing.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21373/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T13:20:35.010000
2 posts
🟠 CVE-2026-21376 - High (7.8)
Memory Corruption when accessing an output buffer without validating its size during IOCTL processing in a camera sensor driver.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21376/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-21376 - High (7.8)
Memory Corruption when accessing an output buffer without validating its size during IOCTL processing in a camera sensor driver.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21376/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T13:20:35.010000
1 posts
🟠 CVE-2026-21380 - High (7.8)
Memory Corruption when using deprecated DMABUF IOCTL calls to manage video memory.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21380/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T13:20:35.010000
1 posts
🟠 CVE-2026-21378 - High (7.8)
Memory Corruption when accessing an output buffer without validating its size during IOCTL processing in a camera sensor driver.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21378/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T13:20:35.010000
1 posts
🟠 CVE-2026-21375 - High (7.8)
Memory Corruption when accessing an output buffer without validating its size during IOCTL processing.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21375/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T13:20:35.010000
2 posts
🟠 CVE-2026-33540 - High (7.5)
Distribution is a toolkit to pack, ship, store, and deliver container content. Prior to 3.1.0, in pull-through cache mode, distribution discovers token auth endpoints by parsing WWW-Authenticate challenges returned by the configured upstream regis...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33540/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33540 - High (7.5)
Distribution is a toolkit to pack, ship, store, and deliver container content. Prior to 3.1.0, in pull-through cache mode, distribution discovers token auth endpoints by parsing WWW-Authenticate challenges returned by the configured upstream regis...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33540/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T13:20:35.010000
1 posts
⚠️ HIGH severity: Stack buffer overflow in Belkin F9K1015 v1.00.10 (/goform/formWlEncrypt, CVE-2026-5612). Remote code exec/DoS possible. No vendor patch. Restrict remote access & monitor advisories. https://radar.offseq.com/threat/cve-2026-5612-stack-based-buffer-overflow-in-belki-c7735710 #OffSeq #Vulnerability #RouterSecurity #CVE20265612
##updated 2026-04-07T13:20:35.010000
2 posts
📢 CVE-2026-5628: HIGH severity stack buffer overflow in Belkin F9K1015 (v1.00.10). Remotely exploitable — no patch yet. Restrict mgmt access & disable remote mgmt until fixed. Info: https://radar.offseq.com/threat/cve-2026-5628-stack-based-buffer-overflow-in-belki-732548e5 #OffSeq #Vuln #IoT #Belkin
##🟠 CVE-2026-5628 - High (8.8)
A security vulnerability has been detected in Belkin F9K1015 1.00.10. Impacted is the function formSetSystemSettings of the file /goform/formSetSystemSettings of the component Setting Handler. The manipulation of the argument webpage leads to stac...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5628/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T13:20:35.010000
2 posts
⚠️ CVE-2026-5629: High-severity stack buffer overflow in Belkin F9K1015 (v1.00.10). Remote exploit possible — public code out, no patch yet. Restrict device access & monitor vendor updates. https://radar.offseq.com/threat/cve-2026-5629-stack-based-buffer-overflow-in-belki-abbd3417 #OffSeq #Vulnerability #RouterSecurity #Belkin
##🟠 CVE-2026-5629 - High (8.8)
A vulnerability was detected in Belkin F9K1015 1.00.10. The affected element is the function formSetFirewall of the file /goform/formSetFirewall. The manipulation of the argument webpage results in stack-based buffer overflow. The attack can be ex...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5629/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T13:20:11.643000
4 posts
1 repos
Critical File Upload Vulnerability Reported in Ninja Forms Plugin for WordPress
A critical unauthenticated arbitrary file upload vulnerability in the Ninja Forms – File Upload plugin (CVE-2026-0740) allows attackers to achieve remote code execution.
**If you are using the Ninja Forms File Upload plugin, this is urgent! Immediately update to version 3.3.27. You can't hide WordPress from the internet, it's made to be visible online. Since this flaw is being actively scanned for, any delay in patching leaves your site exposed to automated attacks. After the update, review server logs for suspicious requests targeting the handle_upload action.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-file-upload-vulnerability-in-ninja-forms-plugin-exposes-50000-wordpress-sites-j-m-6-0-i/gD2P6Ple2L
Critical File Upload Vulnerability Reported in Ninja Forms Plugin for WordPress
A critical unauthenticated arbitrary file upload vulnerability in the Ninja Forms – File Upload plugin (CVE-2026-0740) allows attackers to achieve remote code execution.
**If you are using the Ninja Forms File Upload plugin, this is urgent! Immediately update to version 3.3.27. You can't hide WordPress from the internet, it's made to be visible online. Since this flaw is being actively scanned for, any delay in patching leaves your site exposed to automated attacks. After the update, review server logs for suspicious requests targeting the handle_upload action.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-file-upload-vulnerability-in-ninja-forms-plugin-exposes-50000-wordpress-sites-j-m-6-0-i/gD2P6Ple2L
🚨 CRITICAL: CVE-2026-0740 in Ninja Forms - File Uploads (≤3.3.26) lets unauthenticated attackers upload arbitrary files, enabling RCE. Patch to 3.3.27+ now! https://radar.offseq.com/threat/cve-2026-0740-cwe-434-unrestricted-upload-of-file--9ec11832 #OffSeq #WordPress #Vuln #BlueTeam
##🔴 CVE-2026-0740 - Critical (9.8)
The Ninja Forms - File Uploads plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'NF_FU_AJAX_Controllers_Uploads::handle_upload' function in all versions up to, and including, 3.3.26. This make...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0740/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T13:20:11.643000
1 posts
🟠 CVE-2026-31842 - High (7.5)
Tinyproxy through 1.11.3 is vulnerable to HTTP request parsing desynchronization due to a case-sensitive comparison of the Transfer-Encoding header in src/reqs.c. The is_chunked_transfer() function uses strcmp() to compare the header value against...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-31842/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T13:20:11.643000
1 posts
🟠 CVE-2026-34896 - High (7.5)
Cross-Site Request Forgery (CSRF) vulnerability in Analytify Under Construction, Coming Soon & Maintenance Mode allows Cross Site Request Forgery.This issue affects Under Construction, Coming Soon & Maintenance Mode: from n/a through 2.1.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34896/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T13:20:11.643000
3 posts
🚨 CRITICAL: goshs (<2.0.0-beta.3) vulnerable to path traversal (CVE-2026-35471). Remote attackers can access/delete files outside restricted dirs. Patch with 2.0.0-beta.3 ASAP! https://radar.offseq.com/threat/cve-2026-35471-cwe-22-improper-limitation-of-a-pat-515b5296 #OffSeq #infosec #golang #CVE202635471
##🔴 CVE-2026-35471 - Critical (9.8)
goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.3, tdeleteFile() missing return after path traversal check. This vulnerability is fixed in 2.0.0-beta.3.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35471/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔔 CRITICAL: CVE-2026-35471 in patrickhener goshs (<2.0.0-beta.3) allows path traversal via tdeleteFile(), enabling attackers to access or delete files outside the intended directory. Upgrade to 2.0.0-beta.3 ASAP! https://radar.offseq.com/threat/cve-2026-35471-cwe-22-improper-limitation-of-a-pat-515b5296 #OffSeq #CVE202635471 #GoLang #PathTraversal
##updated 2026-04-07T13:20:11.643000
1 posts
1 repos
🟠 CVE-2026-5465 - High (8.8)
The Booking for Appointments and Events Calendar – Amelia plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.1.3. This is due to the `UpdateProviderCommandHandler` failing to validate c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5465/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T13:20:11.643000
2 posts
🔴 CVE-2026-35171 - Critical (9.8)
Kedro is a toolbox for production-ready data science. Prior to 1.3.0, Kedro allows the logging configuration file path to be set via the KEDRO_LOGGING_CONFIG environment variable and loads it without validation. The logging configuration schema su...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35171/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-35171 - Critical (9.8)
Kedro is a toolbox for production-ready data science. Prior to 1.3.0, Kedro allows the logging configuration file path to be set via the KEDRO_LOGGING_CONFIG environment variable and loads it without validation. The logging configuration schema su...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35171/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T13:20:11.643000
1 posts
🟠 CVE-2026-35021 - High (7.8)
Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in the prompt editor invocation utility that allows attackers to execute arbitrary commands by crafting malicious file paths. Attackers can inject shell m...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35021/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T13:20:11.643000
1 posts
🟠 CVE-2026-35203 - High (7.5)
ZLMediaKit is a streaming media service framework. the VP9 RTP payload parser in ext-codec/VP9Rtp.cpp reads multiple fields from the RTP payload based on flag bits in the first byte, without verifying that sufficient data exists in the buffer. A c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35203/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T13:20:11.643000
1 posts
🟠 CVE-2026-35442 - High (8.1)
Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.17.0, aggregate functions (min, max) applied to fields with the conceal special type incorrectly return raw database values instead of the masked placehol...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35442/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T13:20:11.643000
1 posts
🟠 CVE-2026-5686 - High (8.8)
A security flaw has been discovered in Tenda CX12L 16.03.53.12. This vulnerability affects the function fromRouteStatic of the file /goform/RouteStatic. The manipulation of the argument page results in stack-based buffer overflow. The attack can b...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5686/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T13:20:11.643000
1 posts
🟠 CVE-2026-5709 - High (8.8)
Unsanitized input in the FileBrowser API in AWS Research and Engineering Studio (RES) version 2024.10 through 2025.12.01 might allow a remote authenticated actor to execute arbitrary commands on the cluster-manager EC2 instance via crafted input w...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5709/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T13:20:11.643000
1 posts
🟠 CVE-2026-5687 - High (8.8)
A weakness has been identified in Tenda CX12L 16.03.53.12. This issue affects the function fromNatStaticSetting of the file /goform/NatStaticSetting. This manipulation of the argument page causes stack-based buffer overflow. The attack may be init...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5687/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T13:20:11.643000
1 posts
🔴 CVE-2026-35050 - Critical (9.1)
text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.1.1, users can save extention settings in "py" format and in the app root directory. This allows to overwrite python files, for instance the "downl...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35050/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T13:20:11.643000
1 posts
1 repos
🟠 CVE-2026-35045 - High (8.1)
Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Prior to 2.6.4, the PUT /api/recipe/batch_update/ endpoint in Tandoor Recipes allows any authenticated user within a Space to modify any recipe in...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35045/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T13:20:11.643000
2 posts
🟠 CVE-2026-34975 - High (8.5)
Plunk is an open-source email platform built on top of AWS SES. Prior to 0.8.0, a CRLF header injection vulnerability was discovered in SESService.ts, where user-supplied values for from.name, subject, custom header keys/values, and attachment fil...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34975/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34975 - High (8.5)
Plunk is an open-source email platform built on top of AWS SES. Prior to 0.8.0, a CRLF header injection vulnerability was discovered in SESService.ts, where user-supplied values for from.name, subject, custom header keys/values, and attachment fil...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34975/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T13:20:11.643000
1 posts
🔴 CVE-2026-34208 - Critical (10)
SandboxJS is a JavaScript sandboxing library. Prior to 0.8.36, SandboxJS blocks direct assignment to global objects (for example Math.random = ...), but this protection can be bypassed through an exposed callable constructor path: this.constructor...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34208/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T13:20:11.643000
2 posts
🔴 CVE-2026-34950 - Critical (9.1)
fast-jwt provides fast JSON Web Token (JWT) implementation. In 6.1.0 and earlier, the publicKeyPemMatcher regex in fast-jwt/src/crypto.js uses a ^ anchor that is defeated by any leading whitespace in the key string, re-enabling the exact same JWT ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34950/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-34950 - Critical (9.1)
fast-jwt provides fast JSON Web Token (JWT) implementation. In 6.1.0 and earlier, the publicKeyPemMatcher regex in fast-jwt/src/crypto.js uses a ^ anchor that is defeated by any leading whitespace in the key string, re-enabling the exact same JWT ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34950/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T13:20:11.643000
1 posts
1 repos
🟠 CVE-2026-33752 - High (8.6)
curl_cffi is the a Python binding for curl. Prior to 0.15.0, curl_cffi does not restrict requests to internal IP ranges, and follows redirects automatically via the underlying libcurl. Because of this, an attacker-controlled URL can redirect reque...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33752/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T13:20:11.643000
1 posts
🟠 CVE-2026-34402 - High (8.1)
ChurchCRM is an open-source church management system. Prior to 7.1.0, authenticated users with Edit Records or Manage Groups permissions can exploit a time-based blind SQL injection vulnerability in the PropertyAssign.php endpoint to exfiltrate or...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34402/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T09:31:28
1 posts
🟠 CVE-2026-34904 - High (7.5)
Cross-Site Request Forgery (CSRF) vulnerability in Analytify Simple Social Media Share Buttons allows Cross Site Request Forgery.This issue affects Simple Social Media Share Buttons: from n/a through 6.2.0.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34904/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T09:31:22
2 posts
🔴 CVE-2026-1114 - Critical (9.8)
In parisneo/lollms version 2.1.0, the application's session management is vulnerable to improper access control due to the use of a weak secret key for signing JSON Web Tokens (JWT). This vulnerability allows an attacker to perform an offline brut...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1114/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CRITICAL: CVE-2026-1114 in parisneo/lollms v2.1.0 — weak JWT secret lets attackers brute-force, forge admin tokens & escalate privileges. Patch to v2.2.0 now! https://radar.offseq.com/threat/cve-2026-1114-cwe-284-improper-access-control-in-p-40f6ba09 #OffSeq #CVE20261114 #AppSec #infosec
##updated 2026-04-07T06:30:28
1 posts
🟠 CVE-2025-65115 - High (8.8)
Remote Code Execution Vulnerability in JP1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Management 2 - Operations Director on Windows, Job Management Partner 1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Managemen...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65115/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T00:30:28
1 posts
🟠 CVE-2026-5708 - High (8.8)
Unsanitized control of user-modifiable attributes in the session creation component in AWS Research and Engineering Studio (RES) prior to version 2026.03 could allow an authenticated remote user to escalate privileges, assume the virtual desktop h...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5708/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T00:30:28
1 posts
🟠 CVE-2026-5707 - High (8.8)
Unsanitized input in an OS command in the virtual desktop session name handling in AWS Research and Engineering Studio (RES) version 2025.03 through 2025.12.01 might allow a remote authenticated actor to execute arbitrary commands as root on the...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5707/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T00:30:27
1 posts
🟠 CVE-2026-5685 - High (8.8)
A vulnerability was identified in Tenda CX12L 16.03.53.12. This affects the function fromAddressNat of the file /goform/addressNat. The manipulation of the argument page leads to stack-based buffer overflow. The attack can be initiated remotely. T...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5685/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T00:30:27
1 posts
🟠 CVE-2026-5684 - High (8)
A vulnerability was determined in Tenda CX12L 16.03.53.12. Affected by this issue is the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter. Executing a manipulation of the argument page can lead to stack-based buffer overf...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5684/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-06T23:43:51
3 posts
🚨 CRITICAL: CVE-2026-35393 in goshs (<2.0.0-beta.3) allows unauthenticated path traversal via POST uploads. Remote attackers can write files anywhere on disk. Upgrade to 2.0.0-beta.3 now! https://radar.offseq.com/threat/cve-2026-35393-cwe-22-improper-limitation-of-a-pat-b57d1ba3 #OffSeq #Infosec #Vulnerability
##🔴 CVE-2026-35393 - Critical (9.8)
goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.3, the POST multipart upload directory not sanitized. This vulnerability is fixed in 2.0.0-beta.3.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35393/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-35393: Critical path traversal in goshs (<2.0.0-beta.3). Remote attackers can write files anywhere via unsanitized POST uploads. Upgrade to 2.0.0-beta.3 now! https://radar.offseq.com/threat/cve-2026-35393-cwe-22-improper-limitation-of-a-pat-b57d1ba3 #OffSeq #Vulnerability #GoLang #Infosec
##updated 2026-04-06T23:43:46
2 posts
🔴 CVE-2026-35392 - Critical (9.8)
goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.3, PUT upload in httpserver/updown.go has no path sanitization. This vulnerability is fixed in 2.0.0-beta.3.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35392/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-35392: goshs < 2.0.0-beta.3 has a CRITICAL path traversal flaw (CVSS 9.8). Remote attackers can write files anywhere on the server. Upgrade to 2.0.0-beta.3+ ASAP! https://radar.offseq.com/threat/cve-2026-35392-cwe-22-improper-limitation-of-a-pat-4b67dff2 #OffSeq #Infosec #GoLang #Vulnerability
##updated 2026-04-06T23:43:26
1 posts
🟠 CVE-2026-35187 - High (7.7)
pyLoad is a free and open-source download manager written in Python. In 0.5.0b3.dev96 and earlier, the parse_urls API function in src/pyload/core/api/__init__.py fetches arbitrary URLs server-side via get_url(url) (pycurl) without any URL validati...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35187/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-06T23:42:30
1 posts
🟠 CVE-2026-35209 - High (7.5)
defu is software that allows uers to assign default properties recursively. Prior to version 6.1.5, applications that pass unsanitized user input (e.g. parsed JSON request bodies, database records, or config files from untrusted sources) as the fi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35209/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-06T23:42:10
1 posts
🟠 CVE-2026-35044 - High (8.8)
BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.38, the Dockerfile generation function generate_containerfile() in src/bentoml/_internal/container/generate.py uses an unsandbo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35044/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-06T23:41:04
1 posts
🔴 CVE-2026-34841 - Critical (9.8)
Bruno is an open source IDE for exploring and testing APIs. Prior to 3.2.1, Bruno was affected by a supply chain attack involving compromised versions of the axios npm package, which introduced a hidden dependency deploying a cross-platform Remote...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34841/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-06T23:40:25
1 posts
⚠️ CRITICAL: Stored XSS in ci4-cms-erp ci4ms (<31.0.0.0) lets attackers inject JS via profile names, risking user sessions. Fixed in 31.0.0.0. Patch now! CVE-2026-34989 https://radar.offseq.com/threat/cve-2026-34989-cwe-79-improper-neutralization-of-i-bdfd6b20 #OffSeq #XSS #WebSecurity #CVE202634989
##updated 2026-04-06T23:26:04
2 posts
Critical Authentication Bypass in Dgraph Database Allows Remote Takeover
Dgraph disclosed a critical authentication bypass vulnerability (CVE-2026-34976) in its administrative API that allows unauthenticated attackers to overwrite databases and read sensitive server files.
**If you are using Dgraph, this is urgent. Immediately make sure that public access to Dgraph's administration port 8080 is blocked, and add restoreTenant to adminMutationMWConfig: "restoreTenant": gogMutMWs.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-authentication-bypass-in-dgraph-database-allows-remote-takeover-a-s-2-r-4/gD2P6Ple2L
🔴 CVE-2026-34976 - Critical (10)
Dgraph is an open source distributed GraphQL database. Prior to 25.3.1, the restoreTenant admin mutation is missing from the authorization middleware config (admin.go), making it completely unauthenticated. Unlike the similar restore mutation whic...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34976/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-06T23:16:26.987000
2 posts
1 repos
Critical Privilege Escalation Vulnerabilities Patched in OpenClaw AI Agent
OpenClaw patched eight vulnerabilities, including a critical privilege escalation flaw (CVE-2026-33579) that allows attackers to gain full administrative control over AI agent instances.
**If you use OpenClaw, firs, why? It's a terrible and extremely insecure tool. If you insist on using it, update immediately to version 2026.3.28 or later and enable mandatory authentication by setting auth.enabled to true. Most instances run wide open by default. Audit your device lists for any unauthorized admin accounts, review recent pairing approval logs, and rotate all API keys and credentials if you find anything suspicious.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-privilege-escalation-vulnerabilities-patched-in-openclaw-ai-agent-o-1-t-f-q/gD2P6Ple2L
Critical Privilege Escalation Vulnerabilities Patched in OpenClaw AI Agent
OpenClaw patched eight vulnerabilities, including a critical privilege escalation flaw (CVE-2026-33579) that allows attackers to gain full administrative control over AI agent instances.
**If you use OpenClaw, firs, why? It's a terrible and extremely insecure tool. If you insist on using it, update immediately to version 2026.3.28 or later and enable mandatory authentication by setting auth.enabled to true. Most instances run wide open by default. Audit your device lists for any unauthorized admin accounts, review recent pairing approval logs, and rotate all API keys and credentials if you find anything suspicious.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-privilege-escalation-vulnerabilities-patched-in-openclaw-ai-agent-o-1-t-f-q/gD2P6Ple2L
updated 2026-04-06T23:14:52
1 posts
🟠 CVE-2026-35172 - High (7.5)
Distribution is a toolkit to pack, ship, store, and deliver container content. Prior to 3.1.0, distribution can restore read access in repo a after an explicit delete when storage.cache.blobdescriptor: redis and storage.delete.enabled: true are bo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35172/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-06T23:11:46
1 posts
🟠 CVE-2026-34986 - High (7.5)
Go JOSE provides an implementation of the Javascript Object Signing and Encryption set of standards in Go, including support for JSON Web Encryption (JWE), JSON Web Signature (JWS), and JSON Web Token (JWT) standards. Prior to 4.1.4 and 3.0.5, dec...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34986/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-06T21:31:41
1 posts
🟠 CVE-2026-35020 - High (8.4)
Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in the command lookup helper and deep-link terminal launcher that allows local attackers to execute arbitrary commands by manipulating the TERMINAL enviro...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35020/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-06T21:31:41
2 posts
🔴 CVE-2026-35022 - Critical (9.8)
Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in authentication helper execution where helper configuration values are executed using shell=true without input validation. Attackers who can influence a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35022/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ CRITICAL: Anthropic Claude Code CLI & Agent SDK vulnerable to OS command injection (CVE-2026-35022, CVSS 9.3). Attackers can exploit auth helpers for arbitrary command execution. Vendor patch is server-side — confirm update. https://radar.offseq.com/threat/cve-2026-35022-cwe-78-improper-neutralization-of-s-9ed949c7 #OffSeq #CVE #CloudSecurity
##updated 2026-04-06T18:33:15
1 posts
🟠 CVE-2025-47390 - High (7.8)
Memory corruption while preprocessing IOCTL request in JPEG driver.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-47390/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-06T18:33:15
1 posts
🟠 CVE-2026-21372 - High (7.8)
Memory Corruption when sending IOCTL requests with invalid buffer sizes during memcpy operations.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21372/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-06T18:33:15
1 posts
🟠 CVE-2026-21367 - High (7.6)
Transient DOS when processing nonstandard FILS Discovery Frames with out-of-range action sizes during initial scans.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21367/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-06T18:33:15
2 posts
🟠 CVE-2026-21382 - High (7.8)
Memory Corruption when handling power management requests with improperly sized input/output buffers.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21382/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-21382 - High (7.8)
Memory Corruption when handling power management requests with improperly sized input/output buffers.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21382/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-06T18:33:15
1 posts
🟠 CVE-2026-21381 - High (7.6)
Transient DOS when receiving a service data frame with excessive length during device matching over a neighborhood awareness network protocol connection.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21381/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-06T18:33:07
2 posts
🟠 CVE-2026-21374 - High (7.8)
Memory Corruption when processing auxiliary sensor input/output control commands with insufficient buffer size validation.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21374/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-21374 - High (7.8)
Memory Corruption when processing auxiliary sensor input/output control commands with insufficient buffer size validation.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21374/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-06T18:33:06
1 posts
🟠 CVE-2026-21371 - High (7.8)
Memory Corruption when retrieving output buffer with insufficient size validation.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21371/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-06T18:33:05
1 posts
🟠 CVE-2025-47389 - High (7.8)
Memory corruption when buffer copy operation fails due to integer overflow during attestation report generation.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-47389/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-06T18:12:57.863000
11 posts
5 repos
https://github.com/BishopFox/CVE-2026-35616-check
https://github.com/0xBlackash/CVE-2026-35616
https://github.com/fevar54/CVE-2026-35616-detector.py
https://github.com/z3r0h3ro/CVE-2026-35616-poc
https://github.com/fevar54/forticlient_ems_cve_2026_35616_poc.py
CVE-2026-35616: Fortinet Releases Hotfix for Critical Exploited Vulnerability in FortiClient EMS
#CVE_2026_35616
https://arcticwolf.com/resources/blog/cve-2026-35616/
Geopolitical tensions rise as Trump issues a Strait of Hormuz ultimatum amidst Middle East oil disruptions (Apr 7). In cybersecurity, North Korea's UNC4736 is linked to a $285M crypto heist (Apr 6), and a critical Fortinet zero-day (CVE-2026-35616) is under active exploitation (Apr 6-7). Technology advances with Fortrea launching AI-enhanced clinical trial solutions (Apr 7).
##The authentication bypass flaw, tracked as CVE-2026-35616, is the latest in a series of Fortinet vulnerabilities that have been exploited in the wild. https://www.darkreading.com/vulnerabilities-threats/fortinet-emergency-patch-forticlient-zero-day
##CVE-2026-35616 : déjà exploitée, cette faille Fortinet a été patchée en urgence ! https://www.it-connect.fr/cve-2026-35616-deja-exploitee-cette-faille-fortinet-a-ete-patchee-en-urgence/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #Fortinet
##Fortinet customers confront actively exploited zero-day, with a full patch still pending https://cyberscoop.com/fortinet-forticlient-ems-zero-day-cve-2026-35616-hotfix-known-exploited/
##"Fortinet on April 4 released a hotfix for a critical 9.8 bug in FortiClient EMS 7.4.5 and 7.4.6, saying that it had observed exploitation in the wild.
The API access bypass flaw – tracked as CVE-2026-35616 – was first reported to Fortinet by DefusedCyber, which posted on X about the bug early Saturday morning."
https://www.scworld.com/news/fortinet-issues-easter-weekend-hotfix-for-forticlient-ems
##Geopolitical tensions are escalating in the Middle East, impacting global oil markets. A critical zero-day vulnerability in FortiClient EMS (CVE-2026-35616) is under active exploitation, with a hotfix released. DPRK-linked hackers are leveraging GitHub for command-and-control in South Korea-targeted attacks. AI continues to influence tech job reductions while also expanding the cyberattack surface. Japanese companies are forming a new organization to bolster cybersecurity cooperation.
##🚨 [CISA-2026:0406] CISA Adds One Known Exploited Vulnerability to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0406)
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2026-35616 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-35616)
- Name: Fortinet FortiClient EMS Improper Access Control Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Fortinet
- Product: FortiClient EMS
- Notes: Please adhere to Fortinet's guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible Fortinet products affected by this vulnerability. Apply any final mitigations provided by the vendor as soon as they become available. For more information please see: https://fortiguard.fortinet.com/psirt/FG-IR-26-099 ; https://nvd.nist.gov/vuln/detail/CVE-2026-35616
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260406 #cisa20260406 #cve_2026_35616 #cve202635616
##New #FortiClient #EMS flaw exploited in attacks, emergency patch released
##The latest Fortinet vulnerability has been added to the KEV catalogue.
CVE-2026-35616: Fortinet FortiClient EMS Improper Access Control Vulnerabilityhttps://www.cve.org/CVERecord?id=CVE-2026-35616 #CISA #Fortinet #infosec #vulnerability
##CVE ID: CVE-2026-35616
Vendor: Fortinet
Product: FortiClient EMS
Date Added: 2026-04-06
Notes: Please adhere to Fortinet's guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible Fortinet products affected by this vulnerability. Apply any final mitigations provided by the vendor as soon as they become available. For more information please see: https://fortiguard.fortinet.com/psirt/FG-IR-26-099 ; https://nvd.nist.gov/vuln/detail/CVE-2026-35616
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-35616
updated 2026-04-06T15:31:34
2 posts
🟠 CVE-2026-30078 - High (7.5)
OpenAirInterface V2.2.0 AMF crashes when it receives an NGAP message with invalid procedure code or invalid PDU-type. For example when the message specification requires InitiatingMessage but sent with successfulOutcome.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30078/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-30078 - High (7.5)
OpenAirInterface V2.2.0 AMF crashes when it receives an NGAP message with invalid procedure code or invalid PDU-type. For example when the message specification requires InitiatingMessage but sent with successfulOutcome.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30078/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-06T15:31:34
1 posts
🟠 CVE-2026-34885 - High (8.5)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in David Lingren Media LIbrary Assistant allows SQL Injection.This issue affects Media LIbrary Assistant: from n/a through 3.34.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34885/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-06T15:31:34
1 posts
🟠 CVE-2026-3524 - High (8.8)
Mattermost Plugin Legal Hold versions <=1.1.4 fail to halt request processing after a failed authorization check in ServeHTTP which allows an authenticated attacker to access, create, download, and delete legal hold data via crafted API request...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3524/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T21:57:08
2 posts
🟠 CVE-2026-35470 - High (8.8)
OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to 2.10.2, confronta_righe.php files across different modules in OpenSTAManager contain an SQL Injection vulnerability. The righe parameter received...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35470/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35470 - High (8.8)
OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to 2.10.2, confronta_righe.php files across different modules in OpenSTAManager contain an SQL Injection vulnerability. The righe parameter received...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35470/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T21:32:44
1 posts
🔴 CVE-2026-32186 - Critical (9.8)
Microsoft Bing Elevation of Privilege Vulnerability
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32186/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-03T21:31:49
1 posts
1 repos
updated 2026-04-03T16:51:28.670000
1 posts
Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access
#CVE_2026_34040
https://thehackernews.com/2026/04/docker-cve-2026-34040-lets-attackers.html
updated 2026-04-02T15:03:02.430000
1 posts
1 repos
Getting root on on TP-Link Smart Switches using CVE-2026-1668 https://lobste.rs/s/kgbtwo #networking #reversing #security
https://blog.tangrs.id.au/2026/04/06/exploiting-cve-2026-1668-part-3/
updated 2026-04-01T15:00:48.743000
1 posts
🟠 CVE-2026-35043 - High (7.8)
BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.38, the cloud deployment path in src/bentoml/_internal/cloud/deployment.py was not included in the fix for CVE-2026-33744. Line...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35043/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-27T09:31:18
1 posts
updated 2026-03-26T20:47:02.337000
1 posts
🟠 CVE-2026-35464 - High (7.5)
pyLoad is a free and open-source download manager written in Python. The fix for CVE-2026-33509 added an ADMIN_ONLY_OPTIONS set to block non-admin users from modifying security-critical config options. The storage_folder option is not in this set ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35464/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-20T15:57:42.580000
2 posts
Reading /etc/passwd via translation file upload in Tolgee's cloud platform (CVE-2026-32251, CVSS 9.3) https://simonkoeck.com/writeups/tolgee-xxe-translation-import
##Reading /etc/passwd via translation file upload in Tolgee's cloud platform (CVE-2026-32251, CVSS 9.3) https://simonkoeck.com/writeups/tolgee-xxe-translation-import
##updated 2025-12-17T13:54:45.390000
2 posts
2 repos
CVE-2025-59718 analysis shows attackers bypassing FortiGate SSO, exfiltrating configs, and establishing persistent VPN access over 2 weeks of dwell time. They targeted hypervisors, DCs, and backup infrastructure—classic pre-ransomware reconnaissance. Detection gaps: firewall config changes blend into routine admin tasks. #CVE202559718 #ransomware #firewall #incidentresponse #threatintel
##CVE-2025-59718 analysis shows attackers bypassing FortiGate SSO, exfiltrating configs, and establishing persistent VPN access over 2 weeks of dwell time. They targeted hypervisors, DCs, and backup infrastructure—classic pre-ransomware reconnaissance. Detection gaps: firewall config changes blend into routine admin tasks. #CVE202559718 #ransomware #firewall #incidentresponse #threatintel
##updated 2025-12-10T02:00:02.557000
1 posts
100 repos
https://github.com/BlackTechX011/React2Shell
https://github.com/Spritualkb/CVE-2025-55182-exp
https://github.com/Archerkong/CVE-2025-55182
https://github.com/whiteov3rflow/CVE-2025-55182-poc
https://github.com/kavienanj/CVE-2025-55182
https://github.com/msanft/CVE-2025-55182
https://github.com/yanoshercohen/React2Shell_CVE-2025-55182
https://github.com/alsaut1/react2shell-lab
https://github.com/xalgord/React2Shell
https://github.com/aliclub0x00/CVE-2025-55182-POC-NEXTJS
https://github.com/theman001/CVE-2025-55182
https://github.com/theori-io/reactguard
https://github.com/sickwell/CVE-2025-55182
https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool
https://github.com/timsonner/React2Shell-CVE-2025-55182
https://github.com/zzhorc/CVE-2025-55182
https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js
https://github.com/Cillian-Collins/CVE-2025-55182
https://github.com/jctommasi/react2shellVulnApp
https://github.com/AdityaBhatt3010/React2Shell-CVE-2025-55182
https://github.com/dwisiswant0/CVE-2025-55182
https://github.com/shamo0/react2shell-PoC
https://github.com/Rsatan/Next.js-Exploit-Tool
https://github.com/techgaun/cve-2025-55182-scanner
https://github.com/ynsmroztas/NextRce
https://github.com/BeichenDream/CVE-2025-55182-GodzillaMemoryShell
https://github.com/ThemeHackers/CVE-2025-55182
https://github.com/websecuritylabs/React2Shell-Library
https://github.com/MemerGamer/CVE-2025-55182
https://github.com/MoLeft/React2Shell-Toolbox
https://github.com/gensecaihq/react2shell-scanner
https://github.com/l4rm4nd/CVE-2025-55182
https://github.com/hexsh1dow/CVE-2025-55182
https://github.com/subhdotsol/CVE-2025-55182
https://github.com/ejpir/CVE-2025-55182-research
https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc
https://github.com/sumanrox/rschunter
https://github.com/zack0x01/CVE-2025-55182-advanced-scanner-
https://github.com/kOaDT/poc-cve-2025-55182
https://github.com/snipevx/React2Shell-POC
https://github.com/kondukto-io/vulnerable-next-js-poc
https://github.com/assetnote/react2shell-scanner
https://github.com/heiheishushu/rsc_detect_CVE-2025-55182
https://github.com/jf0x3a/CVE-2025-55182-exploit
https://github.com/ZihxS/check-react-rce-cve-2025-55182
https://github.com/Pizz33/CVE-2025-55182-burpscanner
https://github.com/Cr4at0r/Next.js-RCE-Scanner-BurpSuite-Extension-
https://github.com/xkillbit/cve-2025-55182-scanner
https://github.com/zr0n/react2shell
https://github.com/acheong08/CVE-2025-55182-poc
https://github.com/momika233/CVE-2025-55182-bypass
https://github.com/cybertechajju/R2C-CVE-2025-55182-66478
https://github.com/Updatelap/CVE-2025-55182
https://github.com/freeqaz/react2shell
https://github.com/alptexans/RSC-Detect-CVE-2025-55182
https://github.com/rix4uni/CVE-2025-55182
https://github.com/GelukCrab/React-Server-Components-RCE
https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script
https://github.com/nehkark/CVE-2025-55182
https://github.com/M4xSec/CVE-2025-55182-React2Shell-RCE-Shell
https://github.com/CymulateResearch/React2Shell-Scanner
https://github.com/hackersatyamrastogi/react2shell-ultimate
https://github.com/shyambhanushali/React2Shell
https://github.com/chrahman/react2shell-CVE-2025-55182-full-rce-script
https://github.com/hoosin/CVE-2025-55182
https://github.com/fatguru/CVE-2025-55182-scanner
https://github.com/MrR0b0t19/CVE-2025-55182-shellinteractive
https://github.com/Chocapikk/CVE-2025-55182
https://github.com/songsanggggg/CVE-2025-55182
https://github.com/RavinduRathnayaka/CVE-2025-55182-PoC
https://github.com/LemonTeatw1/CVE-2025-55182-exploit
https://github.com/im-ezboy/CVE-2025-55182-zoomeye
https://github.com/vijay-shirhatti/RSC-Detect-CVE-2025-55182
https://github.com/vulncheck-oss/cve-2025-55182
https://github.com/emredavut/CVE-2025-55182
https://github.com/c0rydoras/CVE-2025-55182
https://github.com/Tiger-Foxx/exploit-react-CVE-2025-55182
https://github.com/hidden-investigations/react2shell-scanner
https://github.com/zack0x01/vuln-app-CVE-2025-55182
https://github.com/logesh-GIT001/CVE-2025-55182
https://github.com/keklick1337/CVE-2025-55182-golang-PoC
https://github.com/Dh4v4l8/CVE-2025-55182-poc-tool
https://github.com/AliHzSec/CVE-2025-55182
https://github.com/santihabib/CVE-2025-55182-analysis
https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension
https://github.com/EynaExp/CVE-2025-55182-POC
https://github.com/alfazhossain/CVE-2025-55182-Exploiter
https://github.com/surajhacx/react2shellpoc
https://github.com/sudo-Yangziran/CVE-2025-55182POC
https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension
https://github.com/CirqueiraDev/MassExploit-CVE-2025-55182
https://github.com/StealthMoud/CVE-2025-55182-Scanner
https://github.com/VeilVulp/RscScan-cve-2025-55182
https://github.com/RuoJi6/CVE-2025-55182-RCE-shell
https://github.com/xcanwin/CVE-2025-55182-React-RCE
https://github.com/hualy13/CVE-2025-55182
Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials https://thehackernews.com/2026/04/hackers-exploit-cve-2025-55182-to.html
##updated 2025-11-24T15:07:32.807000
1 posts
6 repos
https://github.com/I3r1h0n/7Ziprowler
https://github.com/lastvocher/7zip-CVE-2025-11001
https://github.com/ranasen-rat/CVE-2025-11001
https://github.com/shalevo13/Se7enSlip
🚨 New Exploit: 7-Zip 24.00 - Directory Traversal
📋 CVE: CVE-2025-11001
👤 Author: Mohammed Idrees Banyamer
🔗 https://www.exploit-db.com/exploits/52501
#ExploitDB #InfoSec #CyberSecurity #CVE-2025-11001
##updated 2025-11-21T18:27:33.730000
1 posts
14 repos
https://github.com/verylazytech/CVE-2025-64446
https://github.com/Death112233/CVE-2025-64446-
https://github.com/soltanali0/CVE-2025-64446-Exploit
https://github.com/lincemorado97/CVE-2025-64446_CVE-2025-58034
https://github.com/D3crypT0r/CVE-2025-64446
https://github.com/lequoca/fortinet-fortiweb-cve-2025-64446-58034
https://github.com/fevar54/CVE-2025-64446-PoC---FortiWeb-Path-Traversal
https://github.com/sxyrxyy/CVE-2025-64446-FortiWeb-CGI-Bypass-PoC
https://github.com/mrk336/Silent-WebStorm-Fortinet-s-Hidden-Exploits
https://github.com/BaoSec/CVE2025-64446-58034
https://github.com/sensepost/CVE-2025-64446
https://github.com/AN5I/cve-2025-64446-fortiweb-exploit
🚨 New Exploit: FortiWeb 8.0.2 - Remote Code Execution
📋 CVE: CVE-2025-64446
👤 Author: Mohammed Idrees Banyamer
🔗 https://www.exploit-db.com/exploits/52502
#ExploitDB #InfoSec #CyberSecurity #CVE-2025-64446
##updated 2025-11-04T22:16:43.413000
1 posts
🚨 New Exploit: SQLite 3.50.1 - Heap Overflow
📋 CVE: CVE-2025-6965
👤 Author: Mohammed Idrees Banyamer
🔗 https://www.exploit-db.com/exploits/52499
#ExploitDB #InfoSec #CyberSecurity #CVE-2025-6965
##updated 2025-10-27T17:13:29.327000
1 posts
2 repos
https://github.com/mbanyamer/MSC-EvilTwin-Local-Privilege-Escalation
🚨 New Exploit: Microsoft MMC MSC EvilTwin - Local Admin Creation
📋 CVE: CVE-2025-26633
👤 Author: Mohammed Idrees Banyamer
🔗 https://www.exploit-db.com/exploits/52498
#ExploitDB #InfoSec #CyberSecurity #CVE-2025-26633
##updated 2025-10-24T12:54:49.670000
1 posts
1 repos
CISA just added CVE-2023-48788 to its Known Exploited Vulnerabilities catalog and is giving federal agencies until Friday to patch FortiClient EMS.
Read more: https://steelefortress.com/nuy028
##updated 2025-09-29T14:06:57.020000
1 posts
🚨 New Exploit: Horilla v1.3 - RCE
📋 CVE: CVE-2025-48868
👤 Author: nakleh
🔗 https://www.exploit-db.com/exploits/52497
#ExploitDB #InfoSec #CyberSecurity #CVE-2025-48868
##updated 2025-09-23T16:45:09.443000
7 posts
1 repos
Critical Flowise RCE Vulnerability Actively Exploited, Thousands of Systems at Risk
A critical Flowise RCE vulnerability is now being actively exploited. The flaw, tracked as CVE-2025-59528, carries a maximum severity rating and...
🔗️ [Thecyberexpress] https://link.is.it/xZ20c1
##Critical Flowise RCE Vulnerability Actively Exploited, Thousands of Systems at Risk
A critical Flowise RCE vulnerability is now being actively exploited. The flaw, tracked as CVE-2025-59528, carries a maximum severity rating and...
🔗️ [Thecyberexpress] https://link.is.it/xZ20c1
##Flowise AI Platform Targeted by Active Exploitation of Critical RCE Flaw
Flowise is facing active exploitation of CVE-2025-59528, a critical vulnerability that allows attackers to execute arbitrary JavaScript and take full control of AI workflow servers.
**If you're running Flowise, this is urgent. Your tool is being attacked. Make sure Flowise is isolated from the internet unless absolutely necessary, and update to version 3.0.6 ASAP. Until you can update, restrict access to trusted IPs only. After isolating or patching (whichever comes first), rotate all API tokens and credential.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/flowise-ai-platform-targeted-by-active-exploitation-of-critical-rce-flaw-c-6-9-l-n/gD2P6Ple2L
Max severity Flowise RCE vulnerability now exploited in attacks
Hackers are exploiting a maximum-severity vulnerability, tracked as CVE-2025-59528, in the open-source platform Flowise for building custom LLM...
🔗️ [Bleepingcomputer] https://link.is.it/LhP5de
##updated 2025-05-21T21:32:25
1 posts
4 repos
https://github.com/ftz7/PoC-CVE-2025-48703
https://github.com/Skynoxk/CVE-2025-48703
updated 2025-04-12T10:46:40.837000
1 posts
1 repos
#OT #Advisory VDE-2026-013
Helmholz: Use of a Broken or Risky Cryptographic Algorithm
Vulnerabilities in PROFINET-Switch devices with firmware <= V1.12.010 that allow an attacker to gain control over the device.
#CVE CVE-2016-2183
https://certvde.com/en/advisories/vde-2026-013/
#oCSAF
#CSAF https://helmholz.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2026-013.json
updated 2024-11-21T08:05:03.337000
1 posts
1 repos
https://github.com/complexusprada/Xibo-CMS-Zip-Slip-RCE-Exploit-CVE-2023-33177
🚨 New Exploit: xibocms 3.3.4 - RCE
📋 CVE: CVE-2023-33177
👤 Author: complexusprada
🔗 https://www.exploit-db.com/exploits/52500
#ExploitDB #InfoSec #CyberSecurity #CVE-2023-33177
##updated 2024-04-04T06:40:24
1 posts
🟠 CVE-2026-35576 - High (8.7)
ChurchCRM is an open-source church management system. Prior to 7.0.0, a stored cross-site scripting (XSS) vulnerability exists in ChurchCRM within the Person Property Management subsystem. This issue persists in versions patched for CVE-2023-38766...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35576/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-39318 - High (8.8)
ChurchCRM is an open-source church management system. Prior to 7.1.0, the GroupPropsFormRowOps.php file contains a SQL injection vulnerability. User input in the Field parameter is directly inserted into SQL queries without proper sanitization. Th...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39318/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-39332 - High (8.7)
ChurchCRM is an open-source church management system. Prior to 7.1.0, a reflected Cross-Site Scripting (XSS) vulnerability in GeoPage.php allows any authenticated user to inject arbitrary JavaScript into the browser of another authenticated user. ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39332/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-39331 - High (8.1)
ChurchCRM is an open-source church management system. Prior to 7.1.0, an authenticated API user can modify any family record's state without proper authorization by simply changing the {familyId} parameter in requests, regardless of whether they p...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39331/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-39330 - High (8.8)
ChurchCRM is an open-source church management system. Prior to 7.1.0, an SQL injection vulnerability was found in the endpoint /PropertyAssign.php in ChurchCRM. Authenticated users with the role Manage Groups & Roles (ManageGroups) and Edit Record...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39330/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-39328 - High (8.9)
ChurchCRM is an open-source church management system. Prior to 7.1.0, a stored cross-site scripting vulnerability exists in ChurchCRM's person profile editing functionality. Non-administrative users who have the EditSelf permission can inject mali...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39328/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-39339 - Critical (9.1)
ChurchCRM is an open-source church management system. Prior to 7.1.0, a critical authentication bypass vulnerability in ChurchCRM's API middleware (ChurchCRM/Slim/Middleware/AuthMiddleware.php) allows unauthenticated attackers to access all prote...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39339/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-39334 - High (8.8)
ChurchCRM is an open-source church management system. Prior to 7.1.0, an SQL injection vulnerability was found in the endpoint /SettingsIndividual.php in ChurchCRM 7.0.5. Authenticated users without any specific privileges can inject arbitrary SQL...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39334/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-39344 - High (8.1)
ChurchCRM is an open-source church management system. Prior to 7.1.0, there is a Reflected Cross-Site Scripting (XSS) vulnerability on the login page, which is caused by the lack of sanitization or encoding of the username parameter received from ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39344/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-39341 - High (8.1)
ChurchCRM is an open-source church management system. Prior to 7.1.0, The application is vulnerable to time-based SQL injection due to an improper input validation. Endpoint Reports/ConfirmReportEmail.php?familyId= is not correctly sanitising user...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39341/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-39355 - Critical (9.9)
Genealogy is a family tree PHP application. Prior to 5.9.1, a critical broken access control vulnerability in the genealogy application allows any authenticated user to transfer ownership of arbitrary non-personal teams to themselves. This enables...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39355/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34990 - High (7.8)
OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, a local unprivileged user can coerce cupsd into authenticating to an attacker-controlled localhost IPP service with ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34990/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35164 - High (8.8)
Brave CMS is an open-source CMS. Prior to 2.0.6, an unrestricted file upload vulnerability exists in the CKEditor upload functionality. It is found in app/Http/Controllers/Dashboard/CkEditorController.php within the ckupload method. The method fai...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35164/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35182 - High (8.8)
Brave CMS is an open-source CMS. Prior to 2.0.6, this vulnerability is a missing authorization check found in the update role endpoint at routes/web.php. The POST route for /rights/update-role/{id} lacks the checkUserPermissions:assign-user-roles ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35182/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-35174 - Critical (9.1)
Chyrp Lite is an ultra-lightweight blogging engine. Prior to 2026.01, a path traversal vulnerability exists in the administration console that allows an administrator or a user with Change Settings permission to change the uploads path to any fold...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35174/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34982 - High (8.2)
Vim is an open source, command line text editor. Prior to version 9.2.0276, a modeline sandbox bypass in Vim allows arbitrary OS command execution when a user opens a crafted file. The `complete`, `guitabtooltip` and `printheader` options are miss...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34982/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33510 - High (8.8)
Homarr is an open-source dashboard. Prior to 1.57.0, a DOM-based Cross-Site Scripting (XSS) vulnerability has been discovered in Homarr's /auth/login page. The application improperly trusts a URL parameter (callbackUrl), which is passed to redirec...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33510/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33510 - High (8.8)
Homarr is an open-source dashboard. Prior to 1.57.0, a DOM-based Cross-Site Scripting (XSS) vulnerability has been discovered in Homarr's /auth/login page. The application improperly trusts a URL parameter (callbackUrl), which is passed to redirec...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33510/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-26027 - High (7.5)
GLPI is a free asset and IT management software package. From 11.0.0 to before 11.0.6, an unauthenticated user can store an XSS payload through the inventory endpoint. This vulnerability is fixed in 11.0.6.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26027/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##