##
Updated at UTC 2026-04-11T15:31:13.081971
| CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-5809 | 7.1 | 0.03% | 2 | 0 | 2026-04-11T08:16:05.503000 | The wpForo Forum plugin for WordPress is vulnerable to Arbitrary File Deletion i | |
| CVE-2026-34621 | 9.6 | 0.24% | 4 | 0 | 2026-04-11T07:16:03.633000 | Acrobat Reader versions 24.001.30356, 26.001.21367 and earlier are affected by a | |
| CVE-2026-4152 | 7.8 | 0.06% | 2 | 0 | 2026-04-11T03:30:41 | GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerabi | |
| CVE-2026-4151 | 7.8 | 0.06% | 2 | 0 | 2026-04-11T03:30:41 | GIMP ANI File Parsing Integer Overflow Remote Code Execution Vulnerability. This | |
| CVE-2026-4150 | 7.8 | 0.06% | 2 | 0 | 2026-04-11T03:30:41 | GIMP PSD File Parsing Integer Overflow Remote Code Execution Vulnerability. This | |
| CVE-2026-4157 | 7.5 | 0.19% | 2 | 0 | 2026-04-11T03:30:41 | ChargePoint Home Flex revssh Service Command Injection Remote Code Execution Vul | |
| CVE-2026-4156 | 7.5 | 0.07% | 2 | 0 | 2026-04-11T03:30:41 | ChargePoint Home Flex OCPP getpreq Stack-based Buffer Overflow Remote Code Execu | |
| CVE-2026-4155 | 7.5 | 0.24% | 2 | 0 | 2026-04-11T03:30:41 | ChargePoint Home Flex Inclusion of Sensitive Information in Source Code Informat | |
| CVE-2026-5494 | 7.8 | 0.05% | 4 | 0 | 2026-04-11T03:30:41 | Labcenter Electronics Proteus PDSPRJ File Parsing Out-Of-Bounds Write Remote Cod | |
| CVE-2026-5059 | 9.8 | 1.01% | 4 | 0 | 2026-04-11T03:30:41 | aws-mcp-server AWS CLI Command Injection Remote Code Execution Vulnerability. Th | |
| CVE-2026-5495 | 7.8 | 0.05% | 2 | 0 | 2026-04-11T03:30:41 | Labcenter Electronics Proteus PDSPRJ File Parsing Out-Of-Bounds Write Remote Cod | |
| CVE-2026-5493 | 7.8 | 0.05% | 2 | 0 | 2026-04-11T03:30:41 | Labcenter Electronics Proteus PDSPRJ File Parsing Out-Of-Bounds Write Remote Cod | |
| CVE-2026-5058 | 9.8 | 1.01% | 2 | 0 | 2026-04-11T03:30:41 | aws-mcp-server Command Injection Remote Code Execution Vulnerability. This vulne | |
| CVE-2026-5144 | 8.8 | 0.05% | 2 | 0 | 2026-04-11T03:30:41 | The BuddyPress Groupblog plugin for WordPress is vulnerable to Privilege Escalat | |
| CVE-2026-5496 | 7.8 | 0.05% | 4 | 0 | 2026-04-11T01:16:18.830000 | Labcenter Electronics Proteus PDSPRJ File Parsing Type Confusion Remote Code Exe | |
| CVE-2026-5055 | 7.8 | 0.01% | 2 | 0 | 2026-04-11T01:16:18.017000 | NoMachine Uncontrolled Search Path Element Local Privilege Escalation Vulnerabil | |
| CVE-2026-5054 | 7.8 | 0.01% | 2 | 0 | 2026-04-11T01:16:17.890000 | NoMachine External Control of File Path Local Privilege Escalation Vulnerability | |
| CVE-2026-4154 | 7.8 | 0.06% | 2 | 0 | 2026-04-11T01:16:17.093000 | GIMP XPM File Parsing Integer Overflow Remote Code Execution Vulnerability. This | |
| CVE-2026-4153 | 7.8 | 0.06% | 2 | 0 | 2026-04-11T01:16:16.963000 | GIMP PSP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerabi | |
| CVE-2026-4149 | 10.0 | 1.27% | 6 | 0 | 2026-04-11T01:16:16.430000 | Sonos Era 300 SMB Response Out-Of-Bounds Access Remote Code Execution Vulnerabil | |
| CVE-2026-40188 | 7.7 | 0.03% | 2 | 0 | 2026-04-10T21:37:28 | ### Summary The SFTP command rename sanitizes only the source path and not the d | |
| CVE-2026-5483 | 8.6 | 0.06% | 2 | 0 | 2026-04-10T21:31:15 | A flaw was found in odh-dashboard in Red Hat Openshift AI. This vulnerability in | |
| CVE-2026-6057 | 9.8 | 0.13% | 1 | 0 | 2026-04-10T21:16:28.800000 | FalkorDB Browser 1.9.3 contains an unauthenticated path traversal vulnerability | |
| CVE-2026-40189 | 0 | 0.10% | 4 | 0 | 2026-04-10T20:16:23.890000 | goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.4, goshs enforces | |
| CVE-2026-40175 | 10.0 | 0.24% | 2 | 0 | 2026-04-10T20:16:22.800000 | Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15. | |
| CVE-2026-40093 | 9.1 | 0.06% | 1 | 0 | 2026-04-10T19:55:04 | ### Impact Block timestamp validation enforces that `timestamp >= parent.timest | |
| CVE-2026-35641 | 8.6 | 0.01% | 2 | 0 | 2026-04-10T19:45:22 | > Fixed in OpenClaw 2026.3.24, the current shipping release. ### Summary During | |
| CVE-2026-35643 | 8.8 | 0.04% | 4 | 0 | 2026-04-10T19:38:05 | ## Summary Android Canvas WebView pages from untrusted origins could invoke the | |
| CVE-2026-35666 | 8.8 | 0.04% | 2 | 0 | 2026-04-10T19:37:45 | ## Summary Allow-always exec approvals did not unwrap /usr/bin/time, so an unreg | |
| CVE-2026-35595 | 8.3 | 0.03% | 2 | 0 | 2026-04-10T19:36:16 | ## Summary A user with Write-level access to a project can escalate their permi | |
| CVE-2026-40163 | 8.2 | 0.08% | 2 | 0 | 2026-04-10T19:30:28 | ### Summary Two unauthenticated path traversal vulnerabilities exist in Saltcor | |
| CVE-2026-40156 | 7.8 | 0.02% | 2 | 0 | 2026-04-10T19:26:45 | PraisonAI automatically loads a file named `tools.py` from the current working d | |
| CVE-2026-40158 | 8.6 | 0.03% | 4 | 0 | 2026-04-10T19:25:40 | PraisonAI's AST-based Python sandbox can be bypassed using `type.__getattribute_ | |
| CVE-2026-40150 | 7.7 | 0.03% | 1 | 0 | 2026-04-10T19:23:58 | ## Summary The `web_crawl()` function in `praisonaiagents/tools/web_crawl_tools | |
| CVE-2026-40116 | 7.5 | 0.03% | 1 | 0 | 2026-04-10T19:22:52 | ## Summary The `/media-stream` WebSocket endpoint in PraisonAI's call module ac | |
| CVE-2026-40113 | 8.4 | 0.02% | 1 | 0 | 2026-04-10T19:22:37 | **Summary** deploy.py constructs a single comma-delimited string for the gcloud | |
| CVE-2026-34179 | 9.1 | 0.09% | 1 | 0 | 2026-04-10T19:20:52 | ### Summary A restricted TLS certificate user can escalate to cluster admin by | |
| CVE-2026-33707 | 9.4 | 0.07% | 4 | 0 | 2026-04-10T19:16:23.950000 | Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, th | |
| CVE-2026-40200 | 8.2 | 0.01% | 4 | 0 | 2026-04-10T18:31:28 | An issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based memory co | |
| CVE-2026-32931 | 7.5 | 0.16% | 2 | 0 | 2026-04-10T18:16:42.430000 | Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, an | |
| CVE-2026-31941 | 7.7 | 0.03% | 2 | 0 | 2026-04-10T18:16:41.640000 | Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, Ch | |
| CVE-2026-35663 | None | 0.04% | 2 | 0 | 2026-04-10T17:28:09 | ## Summary Gateway Backend Reconnect lets Non-Admin Operator Scopes Self-Claim | |
| CVE-2026-35660 | None | 0.04% | 2 | 0 | 2026-04-10T17:27:04 | ## Summary Before `v2026.3.23`, the Gateway `agent` RPC accepted `/reset` and `/ | |
| CVE-2026-35653 | 8.1 | 0.04% | 2 | 0 | 2026-04-10T17:24:51 | > Fixed in OpenClaw 2026.3.24, the current shipping release. # Title `browser. | |
| CVE-2026-40157 | 0 | 0.07% | 2 | 0 | 2026-04-10T17:17:13.457000 | PraisonAI is a multi-agent teams system. Prior to 4.5.128, cmd_unpack in the rec | |
| CVE-2026-35669 | 8.8 | 0.04% | 2 | 0 | 2026-04-10T17:17:09.240000 | OpenClaw before 2026.3.25 contains a privilege escalation vulnerability in gatew | |
| CVE-2026-35668 | 7.7 | 0.05% | 4 | 0 | 2026-04-10T17:17:09.060000 | OpenClaw before 2026.3.24 contains a path traversal vulnerability in sandbox enf | |
| CVE-2026-35650 | 7.5 | 0.06% | 2 | 0 | 2026-04-10T17:17:05.627000 | OpenClaw before 2026.3.22 contains an environment variable override handling vul | |
| CVE-2026-6067 | 7.5 | 0.06% | 2 | 0 | 2026-04-10T16:16:36.437000 | A heap buffer overflow vulnerability exists in the Netwide Assembler (NASM) due | |
| CVE-2025-58913 | 8.1 | 0.11% | 2 | 0 | 2026-04-10T15:32:07 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP | |
| CVE-2026-40217 | 8.8 | 0.19% | 2 | 0 | 2026-04-10T15:32:07 | LiteLLM through 2026-04-08 allows remote attackers to execute arbitrary code via | |
| CVE-2026-33092 | 7.8 | 0.01% | 2 | 0 | 2026-04-10T15:32:05 | Local privilege escalation due to improper handling of environment variables. Th | |
| CVE-2026-40088 | 9.7 | 0.05% | 1 | 0 | 2026-04-10T14:41:51 | The `execute_command` function and workflow shell execution are exposed to user- | |
| CVE-2025-5804 | 7.5 | 0.07% | 2 | 0 | 2026-04-10T14:16:25.450000 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP | |
| CVE-2026-5412 | 9.9 | 0.04% | 2 | 0 | 2026-04-10T13:16:45.780000 | In Juju versions prior to 2.9.57 and 3.6.21, an authorization issue exists in th | |
| CVE-2026-1115 | 9.6 | 0.04% | 1 | 0 | 2026-04-10T13:16:43.970000 | A Stored Cross-Site Scripting (XSS) vulnerability was identified in the social f | |
| CVE-2026-6029 | 9.8 | 0.89% | 1 | 0 | 2026-04-10T09:31:21 | A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. The affec | |
| CVE-2026-6025 | 9.8 | 0.89% | 1 | 0 | 2026-04-10T06:31:49 | A vulnerability was identified in Totolink A7100RU 7.4cu.2313_b20191024. This af | |
| CVE-2026-6016 | 8.8 | 0.05% | 1 | 0 | 2026-04-10T06:31:44 | A vulnerability was found in Tenda AC9 15.03.02.13. The affected element is the | |
| CVE-2026-6014 | 8.8 | 0.04% | 1 | 0 | 2026-04-10T06:31:44 | A flaw has been found in D-Link DIR-513 1.10. This issue affects the function fo | |
| CVE-2026-6013 | 8.8 | 0.04% | 1 | 0 | 2026-04-10T06:31:44 | A vulnerability was detected in D-Link DIR-513 1.10. This vulnerability affects | |
| CVE-2026-6015 | 8.8 | 0.05% | 1 | 0 | 2026-04-10T06:16:06.510000 | A vulnerability has been found in Tenda AC9 15.03.02.13. Impacted is the functio | |
| CVE-2026-6012 | 8.8 | 0.04% | 1 | 0 | 2026-04-10T05:16:07.027000 | A security vulnerability has been detected in D-Link DIR-513 1.10. This affects | |
| CVE-2026-5994 | 9.8 | 0.89% | 2 | 0 | 2026-04-10T03:31:16 | A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. Th | |
| CVE-2026-5996 | 9.8 | 0.89% | 2 | 0 | 2026-04-10T03:31:16 | A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191 | |
| CVE-2026-5993 | 9.8 | 0.89% | 1 | 0 | 2026-04-10T03:31:16 | A vulnerability was identified in Totolink A7100RU 7.4cu.2313_b20191024. This vu | |
| CVE-2026-25203 | 7.8 | 0.01% | 1 | 0 | 2026-04-10T03:31:16 | Samsung MagicINFO 9 Server Incorrect Default Permissions Local Privilege Escalat | |
| CVE-2026-4351 | 8.1 | 0.06% | 1 | 0 | 2026-04-10T03:31:16 | The Perfmatters plugin for WordPress is vulnerable to arbitrary file overwrite v | |
| CVE-2026-3360 | 7.5 | 0.10% | 1 | 0 | 2026-04-10T03:31:16 | The Tutor LMS – eLearning and online course solution plugin for WordPress is vul | |
| CVE-2026-5997 | 9.8 | 0.89% | 2 | 0 | 2026-04-10T02:16:04.247000 | A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. The impac | |
| CVE-2026-33170 | None | 0.01% | 2 | 0 | 2026-04-10T01:59:00 | ### Impact `SafeBuffer#%` does not propagate the `@html_unsafe` flag to the newl | |
| CVE-2026-5995 | 9.8 | 0.89% | 2 | 0 | 2026-04-10T01:16:42.490000 | A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. Impacte | |
| CVE-2026-35638 | 8.8 | 0.04% | 1 | 0 | 2026-04-10T00:30:38 | OpenClaw before 2026.3.22 contains a privilege escalation vulnerability in the C | |
| CVE-2026-5983 | 8.8 | 0.04% | 1 | 0 | 2026-04-10T00:30:38 | A vulnerability was determined in D-Link DIR-605L 2.13B01. This issue affects th | |
| CVE-2026-5982 | 8.8 | 0.04% | 1 | 0 | 2026-04-10T00:30:38 | A vulnerability was found in D-Link DIR-605L 2.13B01. This vulnerability affects | |
| CVE-2026-5981 | 8.8 | 0.04% | 1 | 0 | 2026-04-10T00:30:38 | A vulnerability has been found in D-Link DIR-605L 2.13B01. This affects the func | |
| CVE-2026-5988 | 8.8 | 0.05% | 1 | 0 | 2026-04-10T00:30:38 | A vulnerability was detected in Tenda F451 1.0.0.7. This impacts the function fo | |
| CVE-2026-5992 | 8.8 | 0.05% | 1 | 0 | 2026-04-10T00:30:38 | A vulnerability was determined in Tenda F451 1.0.0.7. This affects the function | |
| CVE-2026-5991 | 8.8 | 0.05% | 1 | 0 | 2026-04-10T00:30:38 | A vulnerability was found in Tenda F451 1.0.0.7. Affected by this issue is the f | |
| CVE-2026-5989 | 8.8 | 0.05% | 1 | 0 | 2026-04-10T00:30:38 | A flaw has been found in Tenda F451 1.0.0.7. Affected is the function fromRouteS | |
| CVE-2026-33778 | 7.5 | 0.06% | 1 | 0 | 2026-04-10T00:30:37 | An Improper Validation of Syntactic Correctness of Input vulnerability in the I | |
| CVE-2026-33785 | 8.8 | 0.01% | 1 | 0 | 2026-04-10T00:30:37 | A Missing Authorization vulnerability in the CLI of Juniper Networks Junos OS on | |
| CVE-2026-33790 | 7.5 | 0.04% | 1 | 0 | 2026-04-10T00:30:37 | An Improper Check for Unusual or Exceptional Conditions vulnerability in the flo | |
| CVE-2026-33793 | 7.8 | 0.01% | 1 | 0 | 2026-04-10T00:30:37 | An Execution with Unnecessary Privileges vulnerability in the User Interface (UI | |
| CVE-2026-35625 | 7.8 | 0.03% | 1 | 0 | 2026-04-10T00:30:37 | OpenClaw before 2026.3.25 contains a privilege escalation vulnerability where si | |
| CVE-2026-35645 | 8.1 | 0.03% | 1 | 0 | 2026-04-10T00:30:37 | OpenClaw before 2026.3.25 contains a privilege escalation vulnerability in the g | |
| CVE-2026-33788 | 7.8 | 0.02% | 1 | 0 | 2026-04-10T00:30:30 | A Missing Authentication for Critical Function vulnerability in the Flexible PIC | |
| CVE-2026-5990 | 8.8 | 0.05% | 1 | 0 | 2026-04-10T00:16:36.363000 | A vulnerability has been found in Tenda F451 1.0.0.7. Affected by this vulnerabi | |
| CVE-2026-34424 | 9.8 | 0.15% | 2 | 0 | 2026-04-09T23:17:00.540000 | Smart Slider 3 Pro version 3.5.1.35 for WordPress and Joomla contains a multi-st | |
| CVE-2026-5984 | 8.8 | 0.02% | 1 | 0 | 2026-04-09T22:16:37.873000 | A vulnerability was identified in D-Link DIR-605L 2.13B01. Impacted is the funct | |
| CVE-2026-40154 | 9.3 | 0.03% | 2 | 0 | 2026-04-09T22:16:36.503000 | PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAI treats remo | |
| CVE-2026-40149 | 7.9 | 0.01% | 1 | 0 | 2026-04-09T22:16:35.750000 | PraisonAI is a multi-agent teams system. Prior to 4.5.128, the gateway's /api/ap | |
| CVE-2026-35639 | 8.8 | 0.20% | 1 | 0 | 2026-04-09T22:16:33.317000 | OpenClaw before 2026.3.22 contains a privilege escalation vulnerability in the d | |
| CVE-2026-34512 | 8.1 | 0.03% | 1 | 0 | 2026-04-09T22:16:29.757000 | OpenClaw before 2026.3.25 contains an improper access control vulnerability in t | |
| CVE-2026-33784 | 9.8 | 0.04% | 1 | 0 | 2026-04-09T22:16:27.820000 | A Use of Default Password vulnerability in the Juniper Networks Support Insigh | |
| CVE-2025-13914 | 8.7 | 0.03% | 1 | 0 | 2026-04-09T22:16:22.697000 | A Key Exchange without Entity Authentication vulnerability in the SSH implementa | |
| CVE-2026-5978 | 9.8 | 0.89% | 1 | 0 | 2026-04-09T21:31:37 | A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191 | |
| CVE-2026-5977 | 9.8 | 0.89% | 1 | 0 | 2026-04-09T21:31:37 | A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. This im | |
| CVE-2026-5980 | 8.8 | 0.04% | 1 | 0 | 2026-04-09T21:31:37 | A flaw has been found in D-Link DIR-605L 2.13B01. Affected by this issue is the | |
| CVE-2026-5975 | 9.8 | 0.89% | 1 | 0 | 2026-04-09T21:31:36 | A vulnerability was identified in Totolink A7100RU 7.4cu.2313_b20191024. The imp | |
| CVE-2026-5979 | 8.8 | 0.04% | 1 | 0 | 2026-04-09T21:16:13.967000 | A vulnerability was detected in D-Link DIR-605L 2.13B01. Affected by this vulner | |
| CVE-2026-5976 | 9.8 | 0.89% | 1 | 0 | 2026-04-09T20:16:29.763000 | A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. Th | |
| CVE-2026-39987 | 0 | 2.70% | 2 | 0 | template | 2026-04-09T18:17:02.807000 | marimo is a reactive Python notebook. Prior to 0.23.0, Marimo has a Pre-Auth RCE |
| CVE-2026-39885 | 7.5 | 0.03% | 1 | 0 | 2026-04-09T14:29:54 | ## Summary The `mcp-from-openapi` library uses `@apidevtools/json-schema-ref-pa | |
| CVE-2026-39891 | 8.8 | 0.05% | 2 | 0 | 2026-04-09T14:29:51 | ## Summary Direct insertion of unescaped user input into template-rendering tool | |
| CVE-2026-39890 | 9.8 | 0.29% | 1 | 0 | 2026-04-09T14:29:47 | ## Summary The `AgentService.loadAgentFromFile` method uses the `js-yaml` librar | |
| CVE-2026-39889 | 7.5 | 0.04% | 2 | 0 | 2026-04-09T14:29:17 | The A2U (Agent-to-User) event stream server in PraisonAI exposes all agent activ | |
| CVE-2026-39429 | 8.2 | 0.07% | 1 | 0 | 2026-04-09T14:28:53 | ### Summary The cache server is directly exposed by the root shard and has no a | |
| CVE-2024-1490 | 7.2 | 0.08% | 1 | 0 | 2026-04-09T12:31:22 | An authenticated remote attacker with high privileges can exploit the OpenVPN co | |
| CVE-2026-5852 | 9.8 | 0.89% | 1 | 0 | 2026-04-09T09:31:56 | A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. Affecte | |
| CVE-2026-5854 | 9.8 | 0.23% | 1 | 0 | 2026-04-09T09:31:56 | A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected | |
| CVE-2026-5853 | 9.8 | 0.89% | 1 | 0 | 2026-04-09T07:16:05.273000 | A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191 | |
| CVE-2026-5850 | 9.8 | 0.89% | 2 | 0 | 2026-04-09T06:30:36 | A vulnerability was identified in Totolink A7100RU 7.4cu.2313_b20191024. This af | |
| CVE-2026-5851 | 9.8 | 0.89% | 2 | 0 | 2026-04-09T06:30:35 | A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. Th | |
| CVE-2026-1830 | 9.8 | 0.18% | 2 | 0 | 2026-04-09T06:30:35 | The Quick Playground plugin for WordPress is vulnerable to Remote Code Execution | |
| CVE-2026-5844 | 7.2 | 0.19% | 1 | 0 | 2026-04-09T05:16:06.653000 | A vulnerability was found in D-Link DIR-882 1.01B02. Impacted is the function sp | |
| CVE-2026-4326 | 8.8 | 0.08% | 1 | 0 | 2026-04-09T03:31:24 | The Vertex Addons for Elementor plugin for WordPress is vulnerable to Missing Au | |
| CVE-2026-5830 | 8.8 | 0.05% | 1 | 0 | 2026-04-09T03:31:24 | A vulnerability was identified in Tenda AC15 15.03.05.18. This affects the funct | |
| CVE-2026-5173 | 8.5 | 0.02% | 2 | 1 | 2026-04-09T00:32:08 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.9. | |
| CVE-2026-5815 | 8.8 | 0.08% | 1 | 0 | 2026-04-09T00:32:08 | A vulnerability was detected in D-Link DIR-645 1.01/1.02/1.03. Impacted is the f | |
| CVE-2026-3199 | None | 0.07% | 1 | 0 | 2026-04-09T00:32:08 | A vulnerability in the task management component of Sonatype Nexus Repository ve | |
| CVE-2026-40031 | 7.8 | 0.01% | 2 | 0 | 2026-04-09T00:32:07 | MemProcFS before 5.17 contains multiple unsafe library-loading patterns that ena | |
| CVE-2026-40032 | 7.8 | 0.02% | 1 | 0 | 2026-04-09T00:32:07 | UAC (Unix-like Artifacts Collector) before 3.3.0-rc1 contains a command injectio | |
| CVE-2026-40029 | 7.8 | 0.02% | 1 | 0 | 2026-04-09T00:32:07 | parseusbs before 1.9 contains an OS command injection vulnerability in parseUSBs | |
| CVE-2026-40035 | 9.1 | 0.10% | 2 | 0 | 2026-04-09T00:32:07 | Unfurl through 2025.08 contains an improper input validation vulnerability in co | |
| CVE-2026-1092 | 7.5 | 0.02% | 1 | 0 | 2026-04-09T00:32:01 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 12.10 | |
| CVE-2025-12664 | 7.5 | 0.02% | 1 | 0 | 2026-04-08T23:16:56.200000 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 13.0 | |
| CVE-2026-5859 | 0 | 0.03% | 1 | 0 | 2026-04-08T22:16:25.383000 | Integer overflow in WebML in Google Chrome prior to 147.0.7727.55 allowed a remo | |
| CVE-2026-40036 | 7.5 | 0.10% | 1 | 0 | 2026-04-08T22:16:24.190000 | Unfurl before 2026.04 contains an unbounded zlib decompression vulnerability in | |
| CVE-2026-40030 | 7.8 | 0.02% | 1 | 0 | 2026-04-08T22:16:23.483000 | parseusbs before 1.9 contains an OS command injection vulnerability where the vo | |
| CVE-2026-1340 | 9.8 | 67.82% | 3 | 2 | 2026-04-08T21:34:17 | A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve | |
| CVE-2026-2942 | 9.8 | 0.13% | 1 | 0 | 2026-04-08T21:33:41 | The ProSolution WP Client plugin for WordPress is vulnerable to arbitrary file u | |
| CVE-2026-25776 | 9.8 | 0.05% | 1 | 0 | 2026-04-08T21:26:35.910000 | Movable Type provided by Six Apart Ltd. contains a code injection vulnerability | |
| CVE-2026-5208 | 8.2 | 0.05% | 1 | 0 | 2026-04-08T21:26:13.410000 | Command injection in alerts in CoolerControl/coolercontrold <4.0.0 allows authen | |
| CVE-2026-39394 | 8.1 | 0.02% | 1 | 0 | 2026-04-08T21:26:13.410000 | CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, mo | |
| CVE-2026-33756 | 7.5 | 0.08% | 1 | 0 | 2026-04-08T21:26:13.410000 | Saleor is an e-commerce platform. From 2.0.0 to before 3.23.0a3, 3.22.47, 3.21.5 | |
| CVE-2026-35401 | 7.5 | 0.04% | 1 | 0 | 2026-04-08T21:26:13.410000 | Saleor is an e-commerce platform. From 2.0.0 to before 3.23.0a3, 3.22.47, 3.21.5 | |
| CVE-2026-23869 | 7.5 | 0.32% | 1 | 2 | 2026-04-08T21:26:13.410000 | A denial of service vulnerability exists in React Server Components, affecting t | |
| CVE-2026-5436 | 8.1 | 0.18% | 1 | 0 | 2026-04-08T21:26:13.410000 | The MW WP Form plugin for WordPress is vulnerable to Arbitrary File Move/Read in | |
| CVE-2026-39888 | 9.9 | 0.08% | 1 | 0 | 2026-04-08T21:25:14.927000 | PraisonAI is a multi-agent teams system. Prior to 1.5.115, execute_code() in pra | |
| CVE-2026-39393 | 8.1 | 0.01% | 1 | 0 | 2026-04-08T19:15:59 | ## Summary The install route guard in ci4ms relies solely on a volatile cache c | |
| CVE-2026-4338 | 7.5 | 0.04% | 1 | 0 | 2026-04-08T18:35:58 | The ActivityPub WordPress plugin before 8.0.2 does not properly filter posts to | |
| CVE-2026-33466 | 8.1 | 0.28% | 1 | 0 | 2026-04-08T18:34:20 | Improper Limitation of a Pathname to a Restricted Directory (CWE-22) in Logstash | |
| CVE-2026-33461 | 7.7 | 0.06% | 1 | 0 | 2026-04-08T18:34:08 | Incorrect Authorization (CWE-863) in Kibana can lead to information disclosure v | |
| CVE-2026-4498 | 7.7 | 0.05% | 1 | 0 | 2026-04-08T18:34:08 | Execution with Unnecessary Privileges (CWE-250) in Kibana’s Fleet plugin debug r | |
| CVE-2026-27806 | 7.8 | 0.01% | 1 | 0 | 2026-04-08T18:03:54 | ## Summary The Orbit agent's FileVault disk encryption key rotation flow on col | |
| CVE-2026-28261 | 7.8 | 0.01% | 1 | 0 | 2026-04-08T15:31:50 | Dell Elastic Cloud Storage, version 3.8.1.7 and prior, and Dell ObjectScale, ver | |
| CVE-2026-5301 | 7.6 | 0.02% | 1 | 0 | 2026-04-08T15:31:50 | Stored XSS in log viewer in CoolerControl/coolercontrol-ui <4.0.0 allows unauthe | |
| CVE-2026-3396 | 7.5 | 0.08% | 1 | 0 | 2026-04-08T12:31:36 | WCAPF – WooCommerce Ajax Product Filter plugin is vulnerable to time-based SQL I | |
| CVE-2026-3243 | 8.8 | 0.20% | 1 | 0 | 2026-04-08T12:31:36 | The Advanced Members for ACF plugin for WordPress is vulnerable to arbitrary fil | |
| CVE-2026-3535 | 9.8 | 0.28% | 1 | 0 | 2026-04-08T09:31:42 | The DSGVO Google Web Fonts GDPR plugin for WordPress is vulnerable to arbitrary | |
| CVE-2026-34197 | 8.8 | 5.60% | 1 | 6 | template | 2026-04-07T15:30:49 | Improper Input Validation, Improper Control of Generation of Code ('Code Injecti |
| CVE-2026-35616 | 9.8 | 25.25% | 1 | 5 | template | 2026-04-06T18:12:57.863000 | A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through |
| CVE-2026-34040 | 8.8 | 0.01% | 1 | 0 | 2026-04-03T16:51:28.670000 | Moby is an open source container framework. Prior to version 29.3.1, a security | |
| CVE-2026-34504 | 8.3 | 0.05% | 2 | 0 | 2026-04-02T12:20:31.950000 | OpenClaw before 2026.3.28 contains a server-side request forgery vulnerability i | |
| CVE-2026-21643 | 9.8 | 13.70% | 1 | 2 | template | 2026-03-30T13:16:22.063000 | An improper neutralization of special elements used in an sql command ('sql inje |
| CVE-2026-27654 | 8.2 | 0.03% | 2 | 1 | 2026-03-24T15:30:36 | NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_dav_module | |
| CVE-2026-32011 | 7.5 | 0.06% | 1 | 0 | 2026-03-20T21:13:05 | ## Impact OpenClaw webhook handlers for BlueBubbles and Google Chat accepted an | |
| CVE-2026-3497 | None | 0.03% | 1 | 0 | 2026-03-18T21:34:00 | Vulnerability in the OpenSSH GSSAPI delta included in various Linux distribution | |
| CVE-2026-23060 | 5.5 | 0.01% | 1 | 0 | 2026-03-13T21:32:48 | In the Linux kernel, the following vulnerability has been resolved: crypto: aut | |
| CVE-2026-20127 | 10.0 | 39.66% | 2 | 6 | 2026-02-25T18:31:45 | A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controlle | |
| CVE-2026-27486 | None | 0.04% | 1 | 0 | 2026-02-23T22:28:51 | ## Summary OpenClaw CLI process cleanup used system-wide process enumeration an | |
| CVE-2026-1281 | 9.8 | 71.80% | 1 | 2 | 2026-01-30T00:31:29 | A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve | |
| CVE-2026-22200 | 7.5 | 74.45% | 2 | 2 | template | 2026-01-27T21:31:40 | Enhancesoft osTicket versions up to and including 1.18.2 contain an arbitrary fi |
| CVE-2025-68161 | None | 0.03% | 1 | 0 | 2025-12-19T22:08:03 | The Socket Appender in Apache Log4j Core versions 2.0-beta9 through 2.25.2 does | |
| CVE-2025-6218 | 7.8 | 4.76% | 1 | 6 | 2025-12-09T21:31:29 | RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability. This vuln | |
| CVE-2025-55182 | 10.0 | 84.89% | 2 | 100 | template | 2025-12-09T16:53:25 | ### Impact There is an unauthenticated remote code execution vulnerability in R |
| CVE-2025-8088 | 8.8 | 7.05% | 1 | 32 | 2025-10-22T00:34:26 | A path traversal vulnerability affecting the Windows version of WinRAR allows th | |
| CVE-2024-27297 | 6.3 | 0.05% | 1 | 0 | 2025-06-27T13:15:23.240000 | Nix is a package manager for Linux and other Unix systems. A fixed-output deriva | |
| CVE-2024-34359 | 9.6 | 56.67% | 1 | 0 | 2024-11-21T09:18:30.130000 | llama-cpp-python is the Python bindings for llama.cpp. `llama-cpp-python` depend | |
| CVE-2020-8562 | 2.2 | 0.06% | 1 | 0 | 2024-11-21T05:39:02.180000 | As mitigations to a report from 2019 and CVE-2020-8555, Kubernetes attempts to p | |
| CVE-2026-32892 | 0 | 0.19% | 4 | 0 | N/A | ||
| CVE-2026-31940 | 0 | 0.04% | 2 | 0 | N/A | ||
| CVE-2026-31939 | 0 | 0.04% | 2 | 0 | N/A | ||
| CVE-2026-33618 | 0 | 0.05% | 2 | 0 | N/A | ||
| CVE-2026-33710 | 0 | 0.03% | 2 | 0 | N/A | ||
| CVE-2026-32252 | 0 | 0.02% | 2 | 0 | N/A | ||
| CVE-2026-33698 | 0 | 0.05% | 2 | 0 | N/A | ||
| CVE-2026-40168 | 0 | 0.04% | 2 | 0 | N/A | ||
| CVE-2026-40089 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2026-0234 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2026-0233 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2026-30461 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2026-34392 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-33350 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-35169 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-35446 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-35478 | 0 | 0.07% | 1 | 0 | N/A | ||
| CVE-2026-39863 | 0 | 0.11% | 1 | 0 | N/A | ||
| CVE-2026-39860 | 0 | 0.02% | 1 | 0 | N/A |
updated 2026-04-11T08:16:05.503000
2 posts
🛡️ CVE-2026-5809: HIGH severity vuln in wpForo Forum plugin ≤3.0.2 lets subscriber+ users delete arbitrary files (e.g., wp-config.php). No patch yet — restrict permissions & monitor topic edits for abuse. https://radar.offseq.com/threat/cve-2026-5809-cwe-73-external-control-of-file-name-7d1ff4ec #OffSeq #WordPress #Vuln #InfoSec
##🛡️ CVE-2026-5809: HIGH severity vuln in wpForo Forum plugin ≤3.0.2 lets subscriber+ users delete arbitrary files (e.g., wp-config.php). No patch yet — restrict permissions & monitor topic edits for abuse. https://radar.offseq.com/threat/cve-2026-5809-cwe-73-external-control-of-file-name-7d1ff4ec #OffSeq #WordPress #Vuln #InfoSec
##updated 2026-04-11T07:16:03.633000
4 posts
🚨 CRITICAL: CVE-2026-34621 in Adobe Acrobat Reader (≤26.001.21367) enables arbitrary code execution via prototype pollution if a user opens a malicious file. No patch yet — exercise caution! https://radar.offseq.com/threat/cve-2026-34621-improperly-controlled-modification--1b9951d5 #OffSeq #Adobe #Security
##🚨 CRITICAL: CVE-2026-34621 in Adobe Acrobat Reader (≤26.001.21367) enables prototype pollution & arbitrary code execution via malicious files. No patch yet — avoid opening untrusted PDFs. Monitor advisories. https://radar.offseq.com/threat/cve-2026-34621-improperly-controlled-modification--1b9951d5 #OffSeq #Adobe #Vuln #Infosec
##🚨 CRITICAL: CVE-2026-34621 in Adobe Acrobat Reader (≤26.001.21367) enables arbitrary code execution via prototype pollution if a user opens a malicious file. No patch yet — exercise caution! https://radar.offseq.com/threat/cve-2026-34621-improperly-controlled-modification--1b9951d5 #OffSeq #Adobe #Security
##🚨 CRITICAL: CVE-2026-34621 in Adobe Acrobat Reader (≤26.001.21367) enables prototype pollution & arbitrary code execution via malicious files. No patch yet — avoid opening untrusted PDFs. Monitor advisories. https://radar.offseq.com/threat/cve-2026-34621-improperly-controlled-modification--1b9951d5 #OffSeq #Adobe #Vuln #Infosec
##updated 2026-04-11T03:30:41
2 posts
🟠 CVE-2026-4152 - High (7.8)
GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerabilit...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4152/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-4152 - High (7.8)
GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerabilit...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4152/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-11T03:30:41
2 posts
🟠 CVE-2026-4151 - High (7.8)
GIMP ANI File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4151/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-4151 - High (7.8)
GIMP ANI File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4151/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-11T03:30:41
2 posts
🟠 CVE-2026-4150 - High (7.8)
GIMP PSD File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4150/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-4150 - High (7.8)
GIMP PSD File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4150/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-11T03:30:41
2 posts
🟠 CVE-2026-4157 - High (7.5)
ChargePoint Home Flex revssh Service Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of ChargePoint Home Flex devices. Authentication i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4157/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-4157 - High (7.5)
ChargePoint Home Flex revssh Service Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of ChargePoint Home Flex devices. Authentication i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4157/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-11T03:30:41
2 posts
🟠 CVE-2026-4156 - High (7.5)
ChargePoint Home Flex OCPP getpreq Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of ChargePoint Home Flex EV chargers. Auth...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4156/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-4156 - High (7.5)
ChargePoint Home Flex OCPP getpreq Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of ChargePoint Home Flex EV chargers. Auth...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4156/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-11T03:30:41
2 posts
🟠 CVE-2026-4155 - High (7.5)
ChargePoint Home Flex Inclusion of Sensitive Information in Source Code Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of ChargePoint Home Flex charging ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4155/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-4155 - High (7.5)
ChargePoint Home Flex Inclusion of Sensitive Information in Source Code Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of ChargePoint Home Flex charging ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4155/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-11T03:30:41
4 posts
🟠 CVE-2026-5494 - High (7.8)
Labcenter Electronics Proteus PDSPRJ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Labcenter Electronics Proteus. User intera...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5494/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-5494 - High (7.8)
Labcenter Electronics Proteus PDSPRJ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Labcenter Electronics Proteus. User intera...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5494/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-5494 - High (7.8)
Labcenter Electronics Proteus PDSPRJ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Labcenter Electronics Proteus. User intera...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5494/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-5494 - High (7.8)
Labcenter Electronics Proteus PDSPRJ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Labcenter Electronics Proteus. User intera...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5494/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-11T03:30:41
4 posts
🔴 CVE-2026-5059 - Critical (9.8)
aws-mcp-server AWS CLI Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of aws-mcp-server. Authentication is not required to exploit this vulnerab...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5059/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-5059 - Critical (9.8)
aws-mcp-server AWS CLI Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of aws-mcp-server. Authentication is not required to exploit this vulnerab...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5059/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-5059 - Critical (9.8)
aws-mcp-server AWS CLI Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of aws-mcp-server. Authentication is not required to exploit this vulnerab...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5059/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-5059 - Critical (9.8)
aws-mcp-server AWS CLI Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of aws-mcp-server. Authentication is not required to exploit this vulnerab...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5059/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-11T03:30:41
2 posts
🟠 CVE-2026-5495 - High (7.8)
Labcenter Electronics Proteus PDSPRJ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Labcenter Electronics Proteus. User intera...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5495/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-5495 - High (7.8)
Labcenter Electronics Proteus PDSPRJ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Labcenter Electronics Proteus. User intera...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5495/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-11T03:30:41
2 posts
🟠 CVE-2026-5493 - High (7.8)
Labcenter Electronics Proteus PDSPRJ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Labcenter Electronics Proteus. User intera...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5493/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-5493 - High (7.8)
Labcenter Electronics Proteus PDSPRJ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Labcenter Electronics Proteus. User intera...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5493/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-11T03:30:41
2 posts
🔴 CVE-2026-5058 - Critical (9.8)
aws-mcp-server Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of aws-mcp-server. Authentication is not required to exploit this vulnerability.
...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5058/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-5058 - Critical (9.8)
aws-mcp-server Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of aws-mcp-server. Authentication is not required to exploit this vulnerability.
...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5058/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-11T03:30:41
2 posts
🟠 CVE-2026-5144 - High (8.8)
The BuddyPress Groupblog plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.9.3. This is due to the group blog settings handler accepting the `groupblog-blogid`, `default-member`, and `groupblog-sile...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5144/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-5144 - High (8.8)
The BuddyPress Groupblog plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.9.3. This is due to the group blog settings handler accepting the `groupblog-blogid`, `default-member`, and `groupblog-sile...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5144/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-11T01:16:18.830000
4 posts
🟠 CVE-2026-5496 - High (7.8)
Labcenter Electronics Proteus PDSPRJ File Parsing Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Labcenter Electronics Proteus. User interaction...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5496/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-5496 - High (7.8)
Labcenter Electronics Proteus PDSPRJ File Parsing Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Labcenter Electronics Proteus. User interaction...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5496/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-5496 - High (7.8)
Labcenter Electronics Proteus PDSPRJ File Parsing Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Labcenter Electronics Proteus. User interaction...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5496/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-5496 - High (7.8)
Labcenter Electronics Proteus PDSPRJ File Parsing Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Labcenter Electronics Proteus. User interaction...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5496/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-11T01:16:18.017000
2 posts
🟠 CVE-2026-5055 - High (7.8)
NoMachine Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of NoMachine. An attacker must first obtain the ability to execute low...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5055/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-5055 - High (7.8)
NoMachine Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of NoMachine. An attacker must first obtain the ability to execute low...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5055/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-11T01:16:17.890000
2 posts
🟠 CVE-2026-5054 - High (7.8)
NoMachine External Control of File Path Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of NoMachine. An attacker must first obtain the ability to execute low-pri...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5054/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-5054 - High (7.8)
NoMachine External Control of File Path Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of NoMachine. An attacker must first obtain the ability to execute low-pri...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5054/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-11T01:16:17.093000
2 posts
🟠 CVE-2026-4154 - High (7.8)
GIMP XPM File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4154/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-4154 - High (7.8)
GIMP XPM File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4154/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-11T01:16:16.963000
2 posts
🟠 CVE-2026-4153 - High (7.8)
GIMP PSP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerabilit...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4153/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-4153 - High (7.8)
GIMP PSP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerabilit...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4153/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-11T01:16:16.430000
6 posts
⚠️ CVE-2026-4149: Sonos Era 300 (v17.5) has a CRITICAL remote code execution vulnerability via SMB, allowing kernel-level compromise without auth. No patch yet — restrict SMB access! https://radar.offseq.com/threat/cve-2026-4149-cwe-119-improper-restriction-of-oper-dcf90312 #OffSeq #Sonos #Infosec #RCE
##🔴 CVE-2026-4149 - Critical (10)
Sonos Era 300 SMB Response Out-Of-Bounds Access Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Sonos Era 300. Authentication is not required to exploit this vu...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4149/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL: CVE-2026-4149 in Sonos Era 300 (v17.5) allows unauth RCE via SMB out-of-bounds flaw (CVSS 10.0). No patch yet — restrict SMB access, monitor advisories. https://radar.offseq.com/threat/cve-2026-4149-cwe-119-improper-restriction-of-oper-dcf90312 #OffSeq #Sonos #Vuln #RCE
##⚠️ CVE-2026-4149: Sonos Era 300 (v17.5) has a CRITICAL remote code execution vulnerability via SMB, allowing kernel-level compromise without auth. No patch yet — restrict SMB access! https://radar.offseq.com/threat/cve-2026-4149-cwe-119-improper-restriction-of-oper-dcf90312 #OffSeq #Sonos #Infosec #RCE
##🔴 CVE-2026-4149 - Critical (10)
Sonos Era 300 SMB Response Out-Of-Bounds Access Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Sonos Era 300. Authentication is not required to exploit this vu...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4149/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL: CVE-2026-4149 in Sonos Era 300 (v17.5) allows unauth RCE via SMB out-of-bounds flaw (CVSS 10.0). No patch yet — restrict SMB access, monitor advisories. https://radar.offseq.com/threat/cve-2026-4149-cwe-119-improper-restriction-of-oper-dcf90312 #OffSeq #Sonos #Vuln #RCE
##updated 2026-04-10T21:37:28
2 posts
🟠 CVE-2026-40188 - High (7.7)
goshs is a SimpleHTTPServer written in Go. From 1.0.7 to before 2.0.0-beta.4, the SFTP command rename sanitizes only the source path and not the destination, so it is possible to write outside of the root directory of the SFTP. This vulnerability ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40188/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-40188 - High (7.7)
goshs is a SimpleHTTPServer written in Go. From 1.0.7 to before 2.0.0-beta.4, the SFTP command rename sanitizes only the source path and not the destination, so it is possible to write outside of the root directory of the SFTP. This vulnerability ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40188/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T21:31:15
2 posts
🟠 CVE-2026-5483 - High (8.5)
A flaw was found in odh-dashboard in Red Hat Openshift AI. This vulnerability in the `odh-dashboard` component of Red Hat OpenShift AI (RHOAI) allows for the disclosure of Kubernetes Service Account tokens through a NodeJS endpoint. This could ena...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5483/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-5483 - High (8.5)
A flaw was found in odh-dashboard in Red Hat Openshift AI. This vulnerability in the `odh-dashboard` component of Red Hat OpenShift AI (RHOAI) allows for the disclosure of Kubernetes Service Account tokens through a NodeJS endpoint. This could ena...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5483/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T21:16:28.800000
1 posts
CVE-2026-6057: CRITICAL path traversal in FalkorDB Browser 1.9.3 (file upload API). Unauthenticated attackers can write arbitrary files, risking RCE. No patch yet — restrict access and monitor logs. https://radar.offseq.com/threat/cve-2026-6057-cwe-22-path-traversal-in-falkordb-fa-80645f49 #OffSeq #Vulnerability #FalkorDB #InfoSec
##updated 2026-04-10T20:16:23.890000
4 posts
CVE-2026-40189 (CRITICAL): patrickhener goshs <2.0.0-beta.4 has a missing auth bug — attackers can upload, delete, or remove auth files, exposing protected dirs. Upgrade to 2.0.0-beta.4 ASAP. https://radar.offseq.com/threat/cve-2026-40189-cwe-862-missing-authorization-in-pa-3a1ae9b4 #OffSeq #CVE202640189 #GoLang #infosec
##🚨 CVE-2026-40189: goshs <2.0.0-beta.4 has a CRITICAL auth bypass. Attackers can upload, delete, and remove folder auth to access protected files. Mitigate by upgrading now! https://radar.offseq.com/threat/cve-2026-40189-cwe-862-missing-authorization-in-pa-3a1ae9b4 #OffSeq #CVE202640189 #infosec #GoLang
##CVE-2026-40189 (CRITICAL): patrickhener goshs <2.0.0-beta.4 has a missing auth bug — attackers can upload, delete, or remove auth files, exposing protected dirs. Upgrade to 2.0.0-beta.4 ASAP. https://radar.offseq.com/threat/cve-2026-40189-cwe-862-missing-authorization-in-pa-3a1ae9b4 #OffSeq #CVE202640189 #GoLang #infosec
##🚨 CVE-2026-40189: goshs <2.0.0-beta.4 has a CRITICAL auth bypass. Attackers can upload, delete, and remove folder auth to access protected files. Mitigate by upgrading now! https://radar.offseq.com/threat/cve-2026-40189-cwe-862-missing-authorization-in-pa-3a1ae9b4 #OffSeq #CVE202640189 #infosec #GoLang
##updated 2026-04-10T20:16:22.800000
2 posts
🔴 CVE-2026-40175 - Critical (10)
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.0, the Axios library is vulnerable to a specific "Gadget" attack chain that allows Prototype Pollution in any third-party dependency to be escalated into Remote Code E...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40175/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-40175 - Critical (10)
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.0, the Axios library is vulnerable to a specific "Gadget" attack chain that allows Prototype Pollution in any third-party dependency to be escalated into Remote Code E...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40175/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T19:55:04
1 posts
🟠 CVE-2026-40093 - High (8.1)
nimiq-blockchain provides persistent block storage for Nimiq's Rust implementation. In 1.3.0 and earlier, block timestamp validation enforces that timestamp >= parent.timestamp for non-skip blocks and timestamp == parent.timestamp + MIN_PRODUCER_T...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40093/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T19:45:22
2 posts
🟠 CVE-2026-35641 - High (7.8)
OpenClaw before 2026.3.24 contains an arbitrary code execution vulnerability in local plugin and hook installation that allows attackers to execute malicious code by crafting a .npmrc file with a git executable override. During npm install executi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35641/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35641 - High (7.8)
OpenClaw before 2026.3.24 contains an arbitrary code execution vulnerability in local plugin and hook installation that allows attackers to execute malicious code by crafting a .npmrc file with a git executable override. During npm install executi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35641/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T19:38:05
4 posts
🟠 CVE-2026-35643 - High (8.8)
OpenClaw before 2026.3.22 contains an unvalidated WebView JavascriptInterface vulnerability allowing attackers to inject arbitrary instructions. Untrusted pages can invoke the canvas bridge to execute malicious code within the Android application ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35643/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35643 - High (8.8)
OpenClaw before 2026.3.22 contains an unvalidated WebView JavascriptInterface vulnerability allowing attackers to inject arbitrary instructions. Untrusted pages can invoke the canvas bridge to execute malicious code within the Android application ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35643/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35643 - High (8.8)
OpenClaw before 2026.3.22 contains an unvalidated WebView JavascriptInterface vulnerability allowing attackers to inject arbitrary instructions. Untrusted pages can invoke the canvas bridge to execute malicious code within the Android application ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35643/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35643 - High (8.8)
OpenClaw before 2026.3.22 contains an unvalidated WebView JavascriptInterface vulnerability allowing attackers to inject arbitrary instructions. Untrusted pages can invoke the canvas bridge to execute malicious code within the Android application ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35643/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T19:37:45
2 posts
🟠 CVE-2026-35666 - High (8.8)
OpenClaw before 2026.3.22 contains an allowlist bypass vulnerability in system.run approvals that fails to unwrap /usr/bin/time wrappers. Attackers can bypass executable binding restrictions by using an unregistered time wrapper to reuse approval ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35666/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35666 - High (8.8)
OpenClaw before 2026.3.22 contains an allowlist bypass vulnerability in system.run approvals that fails to unwrap /usr/bin/time wrappers. Attackers can bypass executable binding restrictions by using an unregistered time wrapper to reuse approval ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35666/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T19:36:16
2 posts
🟠 CVE-2026-35595 - High (8.3)
Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, the CanUpdate check at pkg/models/project_permissions.go:139-148 only requires CanWrite on the new parent project when changing parent_project_id. However, Vikunja's p...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35595/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35595 - High (8.3)
Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, the CanUpdate check at pkg/models/project_permissions.go:139-148 only requires CanWrite on the new parent project when changing parent_project_id. However, Vikunja's p...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35595/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T19:30:28
2 posts
🟠 CVE-2026-40163 - High (8.2)
Saltcorn is an extensible, open source, no-code database application builder. Prior to 1.4.5, 1.5.5, and 1.6.0-beta.4, the POST /sync/offline_changes endpoint allows an unauthenticated attacker to create arbitrary directories and write a changes.j...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40163/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-40163 - High (8.2)
Saltcorn is an extensible, open source, no-code database application builder. Prior to 1.4.5, 1.5.5, and 1.6.0-beta.4, the POST /sync/offline_changes endpoint allows an unauthenticated attacker to create arbitrary directories and write a changes.j...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40163/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T19:26:45
2 posts
🟠 CVE-2026-40156 - High (7.8)
PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAI automatically loads a file named tools.py from the current working directory to discover and register custom agent tools. This loading process uses importlib.util.spec_from_file_...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40156/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-40156 - High (7.8)
PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAI automatically loads a file named tools.py from the current working directory to discover and register custom agent tools. This loading process uses importlib.util.spec_from_file_...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40156/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T19:25:40
4 posts
🟠 CVE-2026-40158 - High (8.6)
PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAI's AST-based Python sandbox can be bypassed using type.__getattribute__ trampoline, allowing arbitrary code execution when running untrusted agent code. The _execute_code_direct f...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40158/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-40158 - High (8.6)
PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAI's AST-based Python sandbox can be bypassed using type.__getattribute__ trampoline, allowing arbitrary code execution when running untrusted agent code. The _execute_code_direct f...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40158/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-40158 - High (8.6)
PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAI's AST-based Python sandbox can be bypassed using type.__getattribute__ trampoline, allowing arbitrary code execution when running untrusted agent code. The _execute_code_direct f...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40158/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-40158 - High (8.6)
PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAI's AST-based Python sandbox can be bypassed using type.__getattribute__ trampoline, allowing arbitrary code execution when running untrusted agent code. The _execute_code_direct f...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40158/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T19:23:58
1 posts
🟠 CVE-2026-40150 - High (7.7)
PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, the web_crawl() function in praisonaiagents/tools/web_crawl_tools.py accepts arbitrary URLs from AI agents with zero validation. No scheme allowlisting, hostname/IP blocklisting, or ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40150/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T19:22:52
1 posts
🟠 CVE-2026-40116 - High (7.5)
PraisonAI is a multi-agent teams system. Prior to 4.5.128, the /media-stream WebSocket endpoint in PraisonAI's call module accepts connections from any client without authentication or Twilio signature validation. Each connection opens an authenti...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40116/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T19:22:37
1 posts
🟠 CVE-2026-40113 - High (8.4)
PraisonAI is a multi-agent teams system. Prior to 4.5.128, deploy.py constructs a single comma-delimited string for the gcloud run
deploy --set-env-vars argument by directly interpolating openai_model, openai_key, and openai_base without validatin...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40113/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T19:20:52
1 posts
🚨 CRITICAL: CVE-2026-34179 in Canonical LXD 4.12 – 6.7 enables privilege escalation from restricted TLS cert user to cluster admin (CVSS 9.1). No patch yet — restrict access & monitor API activity. https://radar.offseq.com/threat/cve-2026-34179-cwe-915-improperly-controlled-modif-752fa0b8 #OffSeq #LXD #PrivilegeEscalation #Vuln
##updated 2026-04-10T19:16:23.950000
4 posts
🔴 CVE-2026-33707 - Critical (9.4)
Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, the default password reset mechanism generates tokens using sha1($email) with no random component, no expiration, and no rate limiting. An attacker who knows a user's em...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33707/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔒 CRITICAL vuln in Chamilo LMS (CVE-2026-33707): Weak password reset lets attackers hijack accounts using only the victim’s email. Affected: <1.11.38, 2.0.0-alpha.1 to <2.0.0-RC.3. Upgrade ASAP! https://radar.offseq.com/threat/cve-2026-33707-cwe-640-weak-password-recovery-mech-2af5871d #OffSeq #infosec #vuln #Chamilo
##🔴 CVE-2026-33707 - Critical (9.4)
Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, the default password reset mechanism generates tokens using sha1($email) with no random component, no expiration, and no rate limiting. An attacker who knows a user's em...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33707/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔒 CRITICAL vuln in Chamilo LMS (CVE-2026-33707): Weak password reset lets attackers hijack accounts using only the victim’s email. Affected: <1.11.38, 2.0.0-alpha.1 to <2.0.0-RC.3. Upgrade ASAP! https://radar.offseq.com/threat/cve-2026-33707-cwe-640-weak-password-recovery-mech-2af5871d #OffSeq #infosec #vuln #Chamilo
##updated 2026-04-10T18:31:28
4 posts
🟠 CVE-2026-40200 - High (8.1)
An issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based memory corruption can occur during qsort of very large arrays, due to incorrectly implemented double-word primitives. The number of elements must exceed about seven million, i....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40200/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##SECURITY ADVISORY: musl libc up through 1.2.6 (present version) is affected by CVE-2026-40200 affecting qsort with large arrays.
Unless you have a setup with at least tens of terrabytes of virtual memory, this does not affect 64-bit systems, only 32-bit ones. But all users should patch.
##🟠 CVE-2026-40200 - High (8.1)
An issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based memory corruption can occur during qsort of very large arrays, due to incorrectly implemented double-word primitives. The number of elements must exceed about seven million, i....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40200/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##SECURITY ADVISORY: musl libc up through 1.2.6 (present version) is affected by CVE-2026-40200 affecting qsort with large arrays.
Unless you have a setup with at least tens of terrabytes of virtual memory, this does not affect 64-bit systems, only 32-bit ones. But all users should patch.
##updated 2026-04-10T18:16:42.430000
2 posts
🟠 CVE-2026-32931 - High (7.5)
Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, an unrestricted file upload vulnerability in the exercise sound upload function allows an authenticated teacher to upload a PHP webshell by spoofing the Content-Type hea...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32931/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-32931 - High (7.5)
Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, an unrestricted file upload vulnerability in the exercise sound upload function allows an authenticated teacher to upload a PHP webshell by spoofing the Content-Type hea...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32931/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T18:16:41.640000
2 posts
🟠 CVE-2026-31941 - High (7.7)
Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, Chamilo LMS contains a Server-Side Request Forgery (SSRF) vulnerability in the Social Wall feature. The endpoint read_url_with_open_graph accepts a URL from the user via...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-31941/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-31941 - High (7.7)
Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, Chamilo LMS contains a Server-Side Request Forgery (SSRF) vulnerability in the Social Wall feature. The endpoint read_url_with_open_graph accepts a URL from the user via...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-31941/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T17:28:09
2 posts
🟠 CVE-2026-35663 - High (8.8)
OpenClaw before 2026.3.25 contains a privilege escalation vulnerability allowing non-admin operators to self-request broader scopes during backend reconnect. Attackers can bypass pairing requirements to reconnect as operator.admin, gaining unautho...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35663/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35663 - High (8.8)
OpenClaw before 2026.3.25 contains a privilege escalation vulnerability allowing non-admin operators to self-request broader scopes during backend reconnect. Attackers can bypass pairing requirements to reconnect as operator.admin, gaining unautho...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35663/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T17:27:04
2 posts
🟠 CVE-2026-35660 - High (8.1)
OpenClaw before 2026.3.23 contains an insufficient access control vulnerability in the Gateway agent /reset endpoint that allows callers with operator.write permission to reset admin sessions. Attackers with operator.write privileges can invoke /r...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35660/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35660 - High (8.1)
OpenClaw before 2026.3.23 contains an insufficient access control vulnerability in the Gateway agent /reset endpoint that allows callers with operator.write permission to reset admin sessions. Attackers with operator.write privileges can invoke /r...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35660/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T17:24:51
2 posts
🟠 CVE-2026-35653 - High (8.1)
OpenClaw before 2026.3.24 contains an incorrect authorization vulnerability in the POST /reset-profile endpoint that allows authenticated callers with operator.write access to browser.request to bypass profile mutation restrictions. Attackers can ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35653/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35653 - High (8.1)
OpenClaw before 2026.3.24 contains an incorrect authorization vulnerability in the POST /reset-profile endpoint that allows authenticated callers with operator.write access to browser.request to bypass profile mutation restrictions. Attackers can ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35653/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T17:17:13.457000
2 posts
🚨 CRITICAL: CVE-2026-40157 in PraisonAI (<4.5.128) enables path traversal via malicious .praison bundles — risk: file overwrite & code execution. Patch to 4.5.128+ & avoid untrusted archives. Full details: https://radar.offseq.com/threat/cve-2026-40157-cwe-22-improper-limitation-of-a-pat-3d24639a #OffSeq #PraisonAI #infosec #vuln
##🚨 CRITICAL: CVE-2026-40157 in PraisonAI (<4.5.128) enables path traversal via malicious .praison bundles — risk: file overwrite & code execution. Patch to 4.5.128+ & avoid untrusted archives. Full details: https://radar.offseq.com/threat/cve-2026-40157-cwe-22-improper-limitation-of-a-pat-3d24639a #OffSeq #PraisonAI #infosec #vuln
##updated 2026-04-10T17:17:09.240000
2 posts
🟠 CVE-2026-35669 - High (8.8)
OpenClaw before 2026.3.25 contains a privilege escalation vulnerability in gateway-authenticated plugin HTTP routes that incorrectly mint operator.admin runtime scope regardless of caller-granted scopes. Attackers can exploit this scope boundary b...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35669/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35669 - High (8.8)
OpenClaw before 2026.3.25 contains a privilege escalation vulnerability in gateway-authenticated plugin HTTP routes that incorrectly mint operator.admin runtime scope regardless of caller-granted scopes. Attackers can exploit this scope boundary b...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35669/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T17:17:09.060000
4 posts
🟠 CVE-2026-35668 - High (7.7)
OpenClaw before 2026.3.24 contains a path traversal vulnerability in sandbox enforcement allowing sandboxed agents to read arbitrary files from other agents' workspaces via unnormalized mediaUrl or fileUrl parameter keys. Attackers can exploit inc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35668/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35668 - High (7.7)
OpenClaw before 2026.3.24 contains a path traversal vulnerability in sandbox enforcement allowing sandboxed agents to read arbitrary files from other agents' workspaces via unnormalized mediaUrl or fileUrl parameter keys. Attackers can exploit inc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35668/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35668 - High (7.7)
OpenClaw before 2026.3.24 contains a path traversal vulnerability in sandbox enforcement allowing sandboxed agents to read arbitrary files from other agents' workspaces via unnormalized mediaUrl or fileUrl parameter keys. Attackers can exploit inc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35668/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35668 - High (7.7)
OpenClaw before 2026.3.24 contains a path traversal vulnerability in sandbox enforcement allowing sandboxed agents to read arbitrary files from other agents' workspaces via unnormalized mediaUrl or fileUrl parameter keys. Attackers can exploit inc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35668/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T17:17:05.627000
2 posts
🟠 CVE-2026-35650 - High (7.5)
OpenClaw before 2026.3.22 contains an environment variable override handling vulnerability that allows attackers to bypass the shared host environment policy through inconsistent sanitization paths. Attackers can supply blocked or malformed overri...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35650/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35650 - High (7.5)
OpenClaw before 2026.3.22 contains an environment variable override handling vulnerability that allows attackers to bypass the shared host environment policy through inconsistent sanitization paths. Attackers can supply blocked or malformed overri...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35650/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T16:16:36.437000
2 posts
🟠 CVE-2026-6067 - High (7.5)
A heap buffer overflow vulnerability exists in the Netwide Assembler (NASM) due to a lack of bounds checking in the obj_directive() function. This vulnerability can be exploited by a user assembling a malicious .asm file, potentially leading to he...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6067/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-6067 - High (7.5)
A heap buffer overflow vulnerability exists in the Netwide Assembler (NASM) due to a lack of bounds checking in the obj_directive() function. This vulnerability can be exploited by a user assembling a malicious .asm file, potentially leading to he...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6067/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T15:32:07
2 posts
🟠 CVE-2025-58913 - High (8.1)
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in CactusThemes VideoPro allows PHP Local File Inclusion.This issue affects VideoPro: from n/a through 2.3.8.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-58913/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-58913 - High (8.1)
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in CactusThemes VideoPro allows PHP Local File Inclusion.This issue affects VideoPro: from n/a through 2.3.8.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-58913/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T15:32:07
2 posts
🟠 CVE-2026-40217 - High (8.8)
LiteLLM through 2026-04-08 allows remote attackers to execute arbitrary code via bytecode rewriting at the /guardrails/test_custom_code URI.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40217/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-40217 - High (8.8)
LiteLLM through 2026-04-08 allows remote attackers to execute arbitrary code via bytecode rewriting at the /guardrails/test_custom_code URI.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40217/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T15:32:05
2 posts
🟠 CVE-2026-33092 - High (7.8)
Local privilege escalation due to improper handling of environment variables. The following products are affected: Acronis True Image OEM (macOS) before build 42571, Acronis True Image (macOS) before build 42902.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33092/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33092 - High (7.8)
Local privilege escalation due to improper handling of environment variables. The following products are affected: Acronis True Image OEM (macOS) before build 42571, Acronis True Image (macOS) before build 42902.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33092/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T14:41:51
1 posts
🔴 CVE-2026-40088 - Critical (9.6)
PraisonAI is a multi-agent teams system. Prior to 4.5.121, the execute_command function and workflow shell execution are exposed to user-controlled input via agent workflows, YAML definitions, and LLM-generated tool calls, allowing attackers to in...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40088/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T14:16:25.450000
2 posts
🟠 CVE-2025-5804 - High (7.5)
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Case Themes Case Theme User allows PHP Local File Inclusion.This issue affects Case Theme User: from n/a before 1.0.4.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-5804/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-5804 - High (7.5)
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Case Themes Case Theme User allows PHP Local File Inclusion.This issue affects Case Theme User: from n/a before 1.0.4.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-5804/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T13:16:45.780000
2 posts
🔴 CVE-2026-5412 - Critical (9.9)
In Juju versions prior to 2.9.57 and 3.6.21, an authorization issue exists in the Controller facade. An authenticated user can call the CloudSpec API method to extract the cloud credentials used to bootstrap the controller. This allows a low-privi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5412/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-5412 - Critical (9.9)
In Juju versions prior to 2.9.57 and 3.6.21, an authorization issue exists in the Controller facade. An authenticated user can call the CloudSpec API method to extract the cloud credentials used to bootstrap the controller. This allows a low-privi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5412/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T13:16:43.970000
1 posts
⚠️ CVE-2026-1115: CRITICAL stored XSS in parisneo/lollms <2.2.0. Unsanitized input in create_post lets attackers run JS in user browsers via Home Feed. Upgrade to 2.2.0+ now! https://radar.offseq.com/threat/cve-2026-1115-cwe-79-improper-neutralization-of-in-d36d67ac #OffSeq #XSS #Vuln #Security
##updated 2026-04-10T09:31:21
1 posts
⚠️ CVE-2026-6029 (CRITICAL, CVSS 9.3): Totolink A7100RU firmware 7.4cu.2313_b20191024 is vulnerable to unauthenticated OS command injection via setVpnAccountCfg. No patch yet — restrict access and monitor for updates. https://radar.offseq.com/threat/cve-2026-6029-os-command-injection-in-totolink-a71-25809d7e #OffSeq #CVE20266029 #Infosec
##updated 2026-04-10T06:31:49
1 posts
🔴 CVE-2026-6025 - Critical (9.8)
A vulnerability was identified in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function setSyslogCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument enable leads to os command injection. ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6025/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T06:31:44
1 posts
🟠 CVE-2026-6016 - High (8.8)
A vulnerability was found in Tenda AC9 15.03.02.13. The affected element is the function decodePwd of the file /goform/WizardHandle of the component POST Request Handler. Performing a manipulation of the argument WANS results in stack-based buffer...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6016/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T06:31:44
1 posts
🟠 CVE-2026-6014 - High (8.8)
A flaw has been found in D-Link DIR-513 1.10. This issue affects the function formAdvanceSetup of the file /goform/formAdvanceSetup of the component POST Request Handler. This manipulation of the argument webpage causes buffer overflow. It is poss...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6014/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T06:31:44
1 posts
🟠 CVE-2026-6013 - High (8.8)
A vulnerability was detected in D-Link DIR-513 1.10. This vulnerability affects the function formSetRoute of the file /goform/formSetRoute of the component POST Request Handler. The manipulation of the argument curTime results in buffer overflow. ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6013/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T06:16:06.510000
1 posts
🟠 CVE-2026-6015 - High (8.8)
A vulnerability has been found in Tenda AC9 15.03.02.13. Impacted is the function formQuickIndex of the file /goform/QuickIndex of the component POST Request Handler. Such manipulation of the argument PPPOEPassword leads to stack-based buffer over...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6015/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T05:16:07.027000
1 posts
🟠 CVE-2026-6012 - High (8.8)
A security vulnerability has been detected in D-Link DIR-513 1.10. This affects the function formSetPassword of the file /goform/formSetPassword of the component POST Request Handler. The manipulation of the argument curTime leads to buffer overfl...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6012/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T03:31:16
2 posts
⚠️ CVE-2026-5994: CRITICAL OS command injection in Totolink A7100RU (7.4cu.2313_b20191024). Remote attackers can run OS commands via setTelnetCfg. No patch yet; public exploit released. Restrict access & monitor traffic. https://radar.offseq.com/threat/cve-2026-5994-os-command-injection-in-totolink-a71-2d1c7675 #OffSeq #Vuln #RouterSecurity
##🔴 CVE-2026-5994 - Critical (9.8)
A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. This issue affects the function setTelnetCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument telnet_enabled resu...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5994/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T03:31:16
2 posts
⚠️ CRITICAL: CVE-2026-5996 in Totolink A7100RU (7.4cu.2313_b20191024) enables unauthenticated OS command injection via /cgi-bin/cstecgi.cgi. No patch yet — restrict remote access & monitor devices. More: https://radar.offseq.com/threat/cve-2026-5996-os-command-injection-in-totolink-a71-7853c72c #OffSeq #Vulnerability #IoTSecurity
##🔴 CVE-2026-5996 - Critical (9.8)
A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. The affected element is the function setAdvancedInfoShow of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument tty_serve...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5996/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T03:31:16
1 posts
🔴 CVE-2026-5993 - Critical (9.8)
A vulnerability was identified in Totolink A7100RU 7.4cu.2313_b20191024. This vulnerability affects the function setWiFiGuestCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument wifiOff leads to os c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5993/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T03:31:16
1 posts
🟠 CVE-2026-25203 - High (7.8)
Samsung MagicINFO 9 Server Incorrect Default Permissions Local Privilege Escalation Vulnerability
This issue affects MagicINFO 9 Server: less than 21.1091.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25203/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T03:31:16
1 posts
🟠 CVE-2026-4351 - High (8.1)
The Perfmatters plugin for WordPress is vulnerable to arbitrary file overwrite via path traversal in all versions up to, and including, 2.5.9. This is due to the `PMCS::action_handler()` method processing the bulk action `activate`/`deactivate` ha...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4351/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T03:31:16
1 posts
🟠 CVE-2026-3360 - High (7.5)
The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to an Insecure Direct Object Reference in all versions up to, and including, 3.9.7. This is due to missing authentication and authorization checks in the `pa...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3360/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T02:16:04.247000
2 posts
🔴 CVE-2026-5997 - Critical (9.8)
A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. The impacted element is the function setLoginPasswordCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument admpass results in os c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5997/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Totolink A7100RU (7.4cu.2313_b20191024) hit by CRITICAL OS command injection (CVE-2026-5997) — remote, unauthenticated code execution possible. No patch yet. Disable remote management & limit access! https://radar.offseq.com/threat/cve-2026-5997-os-command-injection-in-totolink-a71-76c83173 #OffSeq #CVE20265997 #RouterSecurity #Vuln
##updated 2026-04-10T01:59:00
2 posts
CVE-2026-33170 is fascinating because it breaks Rails' own XSS protection system. SafeBuffer#% operator fails to propagate the html_unsafe flag when creating new buffers, so content that should be escaped gets marked as safe.
It's a flaw in the security mechanism itself, not just another injection point. Rails apps using SafeBuffer with the % operator for formatting could be exposing XSS vulnerabilities without realising their protection layer is compromised.
##CVE-2026-33170 is fascinating because it breaks Rails' own XSS protection system. SafeBuffer#% operator fails to propagate the html_unsafe flag when creating new buffers, so content that should be escaped gets marked as safe.
It's a flaw in the security mechanism itself, not just another injection point. Rails apps using SafeBuffer with the % operator for formatting could be exposing XSS vulnerabilities without realising their protection layer is compromised.
##updated 2026-04-10T01:16:42.490000
2 posts
🔴 CVE-2026-5995 - Critical (9.8)
A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. Impacted is the function setMiniuiHomeInfoShow of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument lan_info can lead to os...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5995/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🛑 CRITICAL: CVE-2026-5995 in Totolink A7100RU (7.4cu.2313_b20191024) enables remote, unauthenticated OS command injection via /cgi-bin/cstecgi.cgi. No patch yet — disable remote mgmt & restrict access. https://radar.offseq.com/threat/cve-2026-5995-os-command-injection-in-totolink-a71-27cc3191 #OffSeq #Infosec #Vulnerability
##updated 2026-04-10T00:30:38
1 posts
🟠 CVE-2026-35638 - High (8.8)
OpenClaw before 2026.3.22 contains a privilege escalation vulnerability in the Control UI that allows unauthenticated sessions to retain self-declared privileged scopes without device identity verification. Attackers can exploit the device-less al...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35638/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T00:30:38
1 posts
🟠 CVE-2026-5983 - High (8.8)
A vulnerability was determined in D-Link DIR-605L 2.13B01. This issue affects the function formSetDDNS of the file /goform/formSetDDNS of the component POST Request Handler. Executing a manipulation of the argument curTime can lead to buffer overf...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5983/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T00:30:38
1 posts
🟠 CVE-2026-5982 - High (8.8)
A vulnerability was found in D-Link DIR-605L 2.13B01. This vulnerability affects the function formAdvNetwork of the file /goform/formAdvNetwork of the component POST Request Handler. Performing a manipulation of the argument curTime results in buf...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5982/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T00:30:38
1 posts
🟠 CVE-2026-5981 - High (8.8)
A vulnerability has been found in D-Link DIR-605L 2.13B01. This affects the function formAdvFirewall of the file /goform/formAdvFirewall of the component POST Request Handler. Such manipulation of the argument curTime leads to buffer overflow. The...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5981/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T00:30:38
1 posts
🟠 CVE-2026-5988 - High (8.8)
A vulnerability was detected in Tenda F451 1.0.0.7. This impacts the function formWrlsafeset of the file /goform/AdvSetWrlsafeset. Performing a manipulation of the argument mit_ssid results in stack-based buffer overflow. The attack can be initiat...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5988/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T00:30:38
1 posts
🟠 CVE-2026-5992 - High (8.8)
A vulnerability was determined in Tenda F451 1.0.0.7. This affects the function fromP2pListFilter of the file /goform/P2pListFilter. This manipulation of the argument page causes stack-based buffer overflow. Remote exploitation of the attack is po...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5992/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T00:30:38
1 posts
🟠 CVE-2026-5991 - High (8.8)
A vulnerability was found in Tenda F451 1.0.0.7. Affected by this issue is the function formWrlExtraSet of the file /goform/WrlExtraSet. The manipulation of the argument GO results in stack-based buffer overflow. The attack may be launched remotel...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5991/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T00:30:38
1 posts
🟠 CVE-2026-5989 - High (8.8)
A flaw has been found in Tenda F451 1.0.0.7. Affected is the function fromRouteStatic of the file /goform/RouteStatic. Executing a manipulation of the argument page can lead to stack-based buffer overflow. The attack can be launched remotely. The ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5989/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T00:30:37
1 posts
🟠 CVE-2026-33778 - High (7.5)
An Improper Validation of Syntactic Correctness of Input vulnerability in the IPsec library used by kmd and iked of Juniper Networks Junos OS on SRX Series and MX Series allows an unauthenticated, network-based attacker to cause a complete Denial...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33778/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T00:30:37
1 posts
🟠 CVE-2026-33785 - High (8.8)
A Missing Authorization vulnerability in the CLI of Juniper Networks Junos OS on MX Series allows a local, authenticated user with low privileges to execute specific commands which will lead to a complete compromise of managed devices.
Any user l...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33785/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T00:30:37
1 posts
🟠 CVE-2026-33790 - High (7.5)
An Improper Check for Unusual or Exceptional Conditions vulnerability in the flow daemon (flowd) of Juniper Networks Junos OS on SRX Series allows an attacker sending a specific, malformed ICMPv6 packet to cause the srxpfe process to crash and res...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33790/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T00:30:37
1 posts
🟠 CVE-2026-33793 - High (7.8)
An Execution with Unnecessary Privileges vulnerability in the User Interface (UI) of Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged attacker to gain root privileges, thus compromising the system.
When a configurat...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33793/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T00:30:37
1 posts
🟠 CVE-2026-35625 - High (7.8)
OpenClaw before 2026.3.25 contains a privilege escalation vulnerability where silent local shared-auth reconnects auto-approve scope-upgrade requests, widening paired device permissions from operator.read to operator.admin. Attackers can exploit t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35625/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T00:30:37
1 posts
🟠 CVE-2026-35645 - High (8.1)
OpenClaw before 2026.3.25 contains a privilege escalation vulnerability in the gateway plugin subagent fallback deleteSession function that uses a synthetic operator.admin runtime scope. Attackers can exploit this by triggering session deletion wi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35645/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T00:30:30
1 posts
🟠 CVE-2026-33788 - High (7.8)
A Missing Authentication for Critical Function vulnerability in the Flexible PIC Concentrators (FPCs) of Juniper Networks Junos OS Evolved on PTX Series allows a local, authenticated attacker with low privileges to gain direct access to FPCs insta...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33788/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T00:16:36.363000
1 posts
🟠 CVE-2026-5990 - High (8.8)
A vulnerability has been found in Tenda F451 1.0.0.7. Affected by this vulnerability is the function fromSafeEmailFilter of the file /goform/SafeEmailFilter. The manipulation of the argument page leads to stack-based buffer overflow. The attack ma...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5990/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T23:17:00.540000
2 posts
🔴 CVE-2026-34424 - Critical (9.8)
Smart Slider 3 Pro version 3.5.1.35 for WordPress and Joomla contains a multi-stage remote access toolkit injected through a compromised update system that allows unauthenticated attackers to execute arbitrary code and commands. Attackers can trig...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34424/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ CVE-2026-34424 (CRITICAL): Smart Slider 3 Pro 3.5.1.35 for WordPress/Joomla has embedded malicious code via a compromised update system. Unauth RCE, backdoors, hidden admins, data exfil possible. Remove plugin & monitor. No fix yet. https://radar.offseq.com/threat/cve-2026-34424-cwe-506-embedded-malicious-code-in--565778ad #OffSeq #WordPress #Infosec
##updated 2026-04-09T22:16:37.873000
1 posts
🟠 CVE-2026-5984 - High (8.8)
A vulnerability was identified in D-Link DIR-605L 2.13B01. Impacted is the function formSetLog of the file /goform/formSetLog of the component POST Request Handler. The manipulation of the argument curTime leads to buffer overflow. The attack is p...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5984/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T22:16:36.503000
2 posts
🔴 New security advisory:
CVE-2026-40154 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-40154-praisonai-remote-code-execution
🔴 CVE-2026-40154 - Critical (9.3)
PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAI treats remotely fetched template files as trusted executable code without integrity verification, origin validation, or user confirmation, enabling supply chain attacks through m...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40154/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T22:16:35.750000
1 posts
🟠 CVE-2026-40149 - High (7.9)
PraisonAI is a multi-agent teams system. Prior to 4.5.128, the gateway's /api/approval/allow-list endpoint permits unauthenticated modification of the tool approval allowlist when no auth_token is configured (the default). By adding dangerous tool...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40149/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T22:16:33.317000
1 posts
🟠 CVE-2026-35639 - High (8.8)
OpenClaw before 2026.3.22 contains a privilege escalation vulnerability in the device.pair.approve method that allows an operator.pairing approver to approve pending device requests with broader operator scopes than the approver actually holds. At...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35639/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T22:16:29.757000
1 posts
🟠 CVE-2026-34512 - High (8.1)
OpenClaw before 2026.3.25 contains an improper access control vulnerability in the HTTP /sessions/:sessionKey/kill route that allows any bearer-authenticated user to invoke admin-level session termination functions without proper scope validation....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34512/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T22:16:27.820000
1 posts
🔴 CVE-2026-33784 - Critical (9.8)
A Use of Default Password vulnerability in the Juniper Networks
Support Insights (JSI)
Virtual Lightweight Collector (vLWC) allows an unauthenticated, network-based attacker to take full control of the device.
vLWC software images ship with a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33784/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T22:16:22.697000
1 posts
🟠 CVE-2025-13914 - High (8.7)
A Key Exchange without Entity Authentication vulnerability in the SSH implementation of Juniper Networks Apstra allows a unauthenticated, MITM
attacker to impersonate managed devices.
Due to insufficient SSH host key validation an attacker can ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-13914/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T21:31:37
1 posts
🔴 CVE-2026-5978 - Critical (9.8)
A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected is the function setWiFiAclRules of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument mode leads to os command ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5978/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T21:31:37
1 posts
🔴 CVE-2026-5977 - Critical (9.8)
A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. This impacts the function setWiFiBasicCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument wifiOff can lead to os comma...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5977/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T21:31:37
1 posts
🟠 CVE-2026-5980 - High (8.8)
A flaw has been found in D-Link DIR-605L 2.13B01. Affected by this issue is the function formSetMACFilter of the file /goform/formSetMACFilter of the component POST Request Handler. This manipulation of the argument curTime causes buffer overflow....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5980/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T21:31:36
1 posts
🔴 CVE-2026-5975 - Critical (9.8)
A vulnerability was identified in Totolink A7100RU 7.4cu.2313_b20191024. The impacted element is the function setDmzCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument wanIdx leads to os command inj...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5975/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T21:16:13.967000
1 posts
🟠 CVE-2026-5979 - High (8.8)
A vulnerability was detected in D-Link DIR-605L 2.13B01. Affected by this vulnerability is the function formVirtualServ of the file /goform/formVirtualServ of the component POST Request Handler. The manipulation of the argument curTime results in ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5979/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T20:16:29.763000
1 posts
🔴 CVE-2026-5976 - Critical (9.8)
A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function setStorageCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument sambaEnabled results in ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5976/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T18:17:02.807000
2 posts
Marimo Python Notebook RCE Exploited Hours After Disclosure
Marimo patched a critical RCE vulnerability (CVE-2026-39987) that was exploited within 10 hours of disclosure to steal cloud credentials and SSH keys. The flaw allows unauthenticated attackers to gain full interactive shell access via a WebSocket authentication bypass.
**If you're running Marimo notebooks, update to version 0.23.0 immediately and rotate any credentials (AWS keys, SSH keys, database passwords, API secrets) that were stored on or accessible from that system. If you can't update right away, block access to the /terminal/ws endpoint or put the notebook behind a reverse proxy with authentication and never expose notebook platforms directly to the internet.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/marimo-python-notebook-rce-exploited-hours-after-disclosure-5-z-x-w-k/gD2P6Ple2L
Marimo Python Notebook RCE Exploited Hours After Disclosure
Marimo patched a critical RCE vulnerability (CVE-2026-39987) that was exploited within 10 hours of disclosure to steal cloud credentials and SSH keys. The flaw allows unauthenticated attackers to gain full interactive shell access via a WebSocket authentication bypass.
**If you're running Marimo notebooks, update to version 0.23.0 immediately and rotate any credentials (AWS keys, SSH keys, database passwords, API secrets) that were stored on or accessible from that system. If you can't update right away, block access to the /terminal/ws endpoint or put the notebook behind a reverse proxy with authentication and never expose notebook platforms directly to the internet.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/marimo-python-notebook-rce-exploited-hours-after-disclosure-5-z-x-w-k/gD2P6Ple2L
updated 2026-04-09T14:29:54
1 posts
🟠 CVE-2026-39885 - High (7.5)
FrontMCP is a TypeScript-first framework for the Model Context Protocol (MCP). Prior to 2.3.0, the mcp-from-openapi library uses @apidevtools/json-schema-ref-parser to dereference $ref pointers in OpenAPI specifications without configuring any URL...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39885/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T14:29:51
2 posts
🟠 CVE-2026-39891 - High (8.8)
PraisonAI is a multi-agent teams system. Prior to 4.5.115, the create_agent_centric_tools() function returns tools (like acp_create_file) that process file content using template rendering. When user input from agent.start() is passed directly int...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39891/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-39891 - High (8.8)
PraisonAI is a multi-agent teams system. Prior to 4.5.115, the create_agent_centric_tools() function returns tools (like acp_create_file) that process file content using template rendering. When user input from agent.start() is passed directly int...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39891/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T14:29:47
1 posts
🔴 CVE-2026-39890 - Critical (9.8)
PraisonAI is a multi-agent teams system. Prior to 4.5.115, the AgentService.loadAgentFromFile method uses the js-yaml library to parse YAML files without disabling dangerous tags (such as !!js/function and !!js/undefined). This allows an attacker ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39890/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T14:29:17
2 posts
🟠 CVE-2026-39889 - High (7.5)
PraisonAI is a multi-agent teams system. Prior to 4.5.115, the A2U (Agent-to-User) event stream server in PraisonAI exposes all agent activity without authentication. The create_a2u_routes() function registers the following endpoints with NO authe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39889/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-39889 - High (7.5)
PraisonAI is a multi-agent teams system. Prior to 4.5.115, the A2U (Agent-to-User) event stream server in PraisonAI exposes all agent activity without authentication. The create_a2u_routes() function registers the following endpoints with NO authe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39889/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T14:28:53
1 posts
🟠 CVE-2026-39429 - High (8.2)
kcp is a Kubernetes-like control plane for form-factors and use-cases beyond Kubernetes and container workloads. Prior to 0.30.3 and 0.29.3, the cache server is directly exposed by the root shard and has no authentication or authorization in place...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39429/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T12:31:22
1 posts
#OT #Advisory VDE-2024-008
Wago: Vulnerability in WBM through Open VPN
A security vulnerability has been identified in the Web-Based Management (WBM) function when OpenVPN is enabled.
#CVE CVE-2024-1490
https://certvde.com/en/advisories/vde-2024-008/
#oCSAF
#CSAF https://wago.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2024-008.json
updated 2026-04-09T09:31:56
1 posts
🔴 CVE-2026-5852 - Critical (9.8)
A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. Affected is the function setIptvCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument igmpVer causes os command injection. The ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5852/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T09:31:56
1 posts
🔴 CVE-2026-5854 - Critical (9.8)
A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected by this issue is the function setWiFiEasyCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument merge results in ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5854/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T07:16:05.273000
1 posts
🔴 CVE-2026-5853 - Critical (9.8)
A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected by this vulnerability is the function setIpv6LanCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument addr...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5853/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T06:30:36
2 posts
🛑 CRITICAL: CVE-2026-5850 in Totolink A7100RU (fw 7.4cu.2313_b20191024) enables unauthenticated OS command injection via pptpPassThru. No patch yet — restrict access & monitor advisories. https://radar.offseq.com/threat/cve-2026-5850-os-command-injection-in-totolink-a71-c437d074 #OffSeq #CVE20265850 #RouterSecurity #Infosec
##🔴 CVE-2026-5850 - Critical (9.8)
A vulnerability was identified in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function setVpnPassCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument pptpPassThru leads to os command injec...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5850/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T06:30:35
2 posts
🔒 CVE-2026-5851: CRITICAL OS command injection in Totolink A7100RU (7.4cu.2313_b20191024). Remote, unauthenticated RCE possible via /cgi-bin/cstecgi.cgi. Exploit public, no patch. Isolate device and check for updates! https://radar.offseq.com/threat/cve-2026-5851-os-command-injection-in-totolink-a71-cec71662 #OffSeq #CVE20265851 #IoTSec
##🔴 CVE-2026-5851 - Critical (9.8)
A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. This impacts the function setUPnPCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument enable results in os command injecti...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5851/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T06:30:35
2 posts
🔴 CVE-2026-1830 - Critical (9.8)
The Quick Playground plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.1. This is due to insufficient authorization checks on REST API endpoints that expose a sync code and allow arbitrary file u...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1830/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-1830: CRITICAL RCE in davidfcarr Quick Playground (WordPress ≤1.3.1). Unauthenticated users can upload PHP files via REST API flaw — patch or disable plugin now! https://radar.offseq.com/threat/cve-2026-1830-cwe-862-missing-authorization-in-dav-233f04bb #OffSeq #WordPress #Infosec #CVE20261830
##updated 2026-04-09T05:16:06.653000
1 posts
🔒 CVE-2026-5844: HIGH-severity OS command injection in D-Link DIR-882 (v1.01B02). Remote attackers can execute arbitrary OS commands. No official fix — upgrade or restrict remote access. Details: https://radar.offseq.com/threat/cve-2026-5844-os-command-injection-in-d-link-dir-8-643de94e #OffSeq #DLink #Vuln #RouterSecurity
##updated 2026-04-09T03:31:24
1 posts
🟠 CVE-2026-4326 - High (8.8)
The Vertex Addons for Elementor plugin for WordPress is vulnerable to Missing Authorization in all versions up to and including 1.6.4. This is due to improper authorization enforcement in the activate_required_plugins() function. Specifically, the...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4326/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T03:31:24
1 posts
🟠 CVE-2026-5830 - High (8.8)
A vulnerability was identified in Tenda AC15 15.03.05.18. This affects the function websGetVar of the file /goform/SysToolChangePwd. Such manipulation of the argument oldPwd/newPwd/cfmPwd leads to stack-based buffer overflow. The attack can be exe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5830/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T00:32:08
2 posts
1 repos
GitLab Security Update Fixes High-Severity CVE-2026-5173, 11 Other Flaws
GitLab has rolled out a major security update to address a series of vulnerabilities impacting both its Community Edition (CE) and Enterprise
🔗️ [Thecyberexpress] https://link.is.it/Nf3eTg
##🟠 CVE-2026-5173 - High (8.5)
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.9.6 before 18.8.9, 18.9 before 18.9.5, and 18.10 before 18.10.3 that could have allowed an authenticated user to invoke unintended server-side methods through websocket ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5173/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T00:32:08
1 posts
🟠 CVE-2026-5815 - High (8.8)
A vulnerability was detected in D-Link DIR-645 1.01/1.02/1.03. Impacted is the function hedwigcgi_main of the file /cgi-bin/hedwig.cgi. The manipulation results in stack-based buffer overflow. The attack can be launched remotely. The exploit is no...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5815/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T00:32:08
1 posts
⚠️ CRITICAL: CVE-2026-3199 in Sonatype Nexus Repository (3.22.1-3.90.2) enables arbitrary code execution via task deserialization by authenticated users. Restrict permissions & monitor activity. Patch pending. https://radar.offseq.com/threat/cve-2026-3199-cwe-502-deserialization-of-untrusted-067114aa #OffSeq #Vuln #Nexus #Infosec
##updated 2026-04-09T00:32:07
2 posts
🟠 CVE-2026-40031 - High (7.8)
MemProcFS before 5.17 contains multiple unsafe library-loading patterns that enable DLL and shared-library hijacking across six attack surfaces, including bare-name LoadLibraryU and dlopen calls without path qualification for vmmpyc, libMSCompress...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40031/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-40031 - High (7.8)
MemProcFS before 5.17 contains multiple unsafe library-loading patterns that enable DLL and shared-library hijacking across six attack surfaces, including bare-name LoadLibraryU and dlopen calls without path qualification for vmmpyc, libMSCompress...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40031/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T00:32:07
1 posts
🟠 CVE-2026-40032 - High (7.8)
UAC (Unix-like Artifacts Collector) before 3.3.0-rc1 contains a command injection vulnerability in the placeholder substitution and command execution pipeline where the _run_command() function passes constructed command strings directly to eval wi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40032/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T00:32:07
1 posts
🟠 CVE-2026-40029 - High (7.8)
parseusbs before 1.9 contains an OS command injection vulnerability in parseUSBs.py where LNK file paths are passed unsanitized into an os.popen() shell command, allowing arbitrary command execution via crafted .lnk filenames containing shell meta...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40029/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T00:32:07
2 posts
🔴 CVE-2026-40035 - Critical (9.1)
Unfurl through 2025.08 contains an improper input validation vulnerability in config parsing that enables Flask debug mode by default. The debug configuration value is read as a string and passed directly to app.run(), causing any non-empty string...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40035/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ CRITICAL: obsidianforensics unfurl up to 2025.08 enables Flask debug mode by default. Attackers can exploit CVE-2026-40035 for RCE & info disclosure. Avoid production use, disable debug mode, monitor for fixes. https://radar.offseq.com/threat/cve-2026-40035-cwe-489-active-debug-code-in-obsidi-883d1265 #OffSeq #Vuln #Flask #CVE202640035
##updated 2026-04-09T00:32:01
1 posts
🟠 CVE-2026-1092 - High (7.5)
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 12.10 before 18.8.9, 18.9 before 18.9.5, and 18.10 before 18.10.3 that could have allowed an unauthenticated user to cause denial of service due to improper input validatio...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1092/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T23:16:56.200000
1 posts
🟠 CVE-2025-12664 - High (7.5)
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 13.0 before 18.8.9, 18.9 before 18.9.5, and 18.10 before 18.10.3 that could have allowed an unauthenticated user to cause denial of service by sending repeated GraphQL quer...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-12664/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T22:16:25.383000
1 posts
⚠️ CRITICAL: CVE-2026-5859 in Chrome WebML (<147.0.7727.55) allows heap corruption via integer overflow. Remote code execution possible if exploited. Patch not fully confirmed — check vendor advisory for updates: https://radar.offseq.com/threat/cve-2026-5859-integer-overflow-in-google-chrome-baee9cba #OffSeq #Chrome #Vuln #InfoSec
##updated 2026-04-08T22:16:24.190000
1 posts
🟠 CVE-2026-40036 - High (7.5)
Unfurl before 2026.04 contains an unbounded zlib decompression vulnerability in parse_compressed.py that allows remote attackers to cause denial of service. Attackers can submit highly compressed payloads via URL parameters to the /json/visjs end...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40036/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T22:16:23.483000
1 posts
🟠 CVE-2026-40030 - High (7.8)
parseusbs before 1.9 contains an OS command injection vulnerability where the volume listing path argument (-v flag) is passed unsanitized into an os.popen() shell command with ls, allowing arbitrary command injection via crafted volume path argum...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40030/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T21:34:17
3 posts
2 repos
https://github.com/MehdiLeDeaut/CVE-2026-1281-Ivanti-EPMM-RCE
https://github.com/YunfeiGE18/CVE-2026-1281-CVE-2026-1340-Ivanti-EPMM-RCE
CISA adds CVE-2026-1340 (Ivanti EPMM) to KEV ⚠️
Active exploitation confirmed
Known vulns = real attack surface
Are KEVs in your patch priority?
💬 Engage
🔔 Follow TechNadu
CISA has added two industrial advisories today: https://www.cisa.gov/
An Ivanti vulnerability was added yesterday:
CVE-2026-1340: Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-1340 #infosec #CISA #Ivanti #vulenrability
##🚨 [CISA-2026:0408] CISA Adds One Known Exploited Vulnerability to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0408)
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2026-1340 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1340)
- Name: Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Ivanti
- Product: Endpoint Manager Mobile (EPMM)
- Notes: Please adhere to Ivanti's guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible Ivanti products affected by this vulnerability. Apply any final mitigations provided by the vendor as soon as possible. For more information please see: https://hub.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US ; https://support.mobileiron.com/mi/vsp/AB1786671/ivanti-security-update-1761642-1.1.0S-5.noarch.rpm ; https://support.mobileiron.com/mi/vsp/AB1786671/ivanti-security-update-1761642-1.1.0L-5.noarch.rpm ; https://nvd.nist.gov/vuln/detail/CVE-2026-1340
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260408 #cisa20260408 #cve_2026_1340 #cve20261340
##updated 2026-04-08T21:33:41
1 posts
🔴 CVE-2026-2942 - Critical (9.8)
The ProSolution WP Client plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'proSol_fileUploadProcess' function in all versions up to, and including, 1.9.9. This makes it possible for unauthent...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2942/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T21:26:35.910000
1 posts
🔴 CVE-2026-25776 - Critical (9.8)
Movable Type provided by Six Apart Ltd. contains a code injection vulnerability which may allow an attacker to execute arbitrary Perl script.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25776/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T21:26:13.410000
1 posts
🟠 CVE-2026-5208 - High (8.2)
Command injection in alerts in CoolerControl/coolercontrold <4.0.0 allows authenticated attackers to execute arbitrary code as root via injected bash commands in alert names
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5208/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T21:26:13.410000
1 posts
🟠 CVE-2026-39394 - High (8.1)
CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to 0.31.4.0, the Install::index() controller reads the host POST parameter without any validation a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39394/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T21:26:13.410000
1 posts
🟠 CVE-2026-33756 - High (7.5)
Saleor is an e-commerce platform. From 2.0.0 to before 3.23.0a3, 3.22.47, 3.21.54, and 3.20.118, Saleor supports query batching by submitting multiple GraphQL operations in a single HTTP request as a JSON array but wasn't enforcing any upper limit...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33756/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T21:26:13.410000
1 posts
🟠 CVE-2026-35401 - High (7.5)
Saleor is an e-commerce platform. From 2.0.0 to before 3.23.0a3, 3.22.47, 3.21.54, and 3.20.118, a malicious actor can include many GraphQL mutations or queries in a single API call using aliases or chaining multiple mutations, resulting in resour...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35401/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T21:26:13.410000
1 posts
2 repos
🟠 CVE-2026-23869 - High (7.5)
A denial of service vulnerability exists in React Server Components, affecting the following packages: react-server-dom-parcel, react-server-dom-turbopack and react-server-dom-webpack (versions 19.0.0 through 19.0.4, 19.1.0 through 19.1.5, and 19....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23869/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T21:26:13.410000
1 posts
🟠 CVE-2026-5436 - High (8.1)
The MW WP Form plugin for WordPress is vulnerable to Arbitrary File Move/Read in all versions up to and including 5.1.1. This is due to insufficient validation of the $name parameter (upload field key) passed to the generate_user_file_dirpath() fu...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5436/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T21:25:14.927000
1 posts
🔴 CVE-2026-39888 - Critical (9.9)
PraisonAI is a multi-agent teams system. Prior to 1.5.115, execute_code() in praisonaiagents.tools.python_tools defaults to sandbox_mode="sandbox", which runs user code in a subprocess wrapped with a restricted __builtins__ dict and an AST-based b...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39888/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T19:15:59
1 posts
🟠 CVE-2026-39393 - High (8.1)
CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to 0.31.4.0, the install route guard in ci4ms relies solely on a volatile cache check (cache('setti...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39393/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T18:35:58
1 posts
🟠 CVE-2026-4338 - High (7.5)
The ActivityPub WordPress plugin before 8.0.2 does not properly filter posts to be displayed, allowed unauthenticated users to access drafts/scheduled/pending posts
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4338/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T18:34:20
1 posts
🟠 CVE-2026-33466 - High (8.1)
Improper Limitation of a Pathname to a Restricted Directory (CWE-22) in Logstash can lead to arbitrary file write and potentially remote code execution via Relative Path Traversal (CAPEC-139). The archive extraction utilities used by Logstash do n...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33466/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T18:34:08
1 posts
🟠 CVE-2026-33461 - High (7.7)
Incorrect Authorization (CWE-863) in Kibana can lead to information disclosure via Privilege Abuse (CAPEC-122). A user with limited Fleet privileges can exploit an internal API endpoint to retrieve sensitive configuration data, including private k...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33461/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T18:34:08
1 posts
🟠 CVE-2026-4498 - High (7.7)
Execution with Unnecessary Privileges (CWE-250) in Kibana’s Fleet plugin debug route handlers can lead reading index data beyond their direct Elasticsearch RBAC scope via Privilege Abuse (CAPEC-122). This requires an authenticated Kibana user wi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4498/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T18:03:54
1 posts
🟠 CVE-2026-27806 - High (7.8)
Fleet is open source device management software. Prior to 4.81.1, the Orbit agent's FileVault disk encryption key rotation flow on collects a local user's password via a GUI dialog and interpolates it directly into a Tcl/expect script executed via...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27806/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T15:31:50
1 posts
🟠 CVE-2026-28261 - High (7.8)
Dell Elastic Cloud Storage, version 3.8.1.7 and prior, and Dell ObjectScale, versions prior to 4.1.0.3 and version 4.2.0.0, contains an Insertion of Sensitive Information into Log File vulnerability. A low privileged attacker with local access co...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28261/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T15:31:50
1 posts
🟠 CVE-2026-5301 - High (7.6)
Stored XSS in log viewer in CoolerControl/coolercontrol-ui <4.0.0 allows unauthenticated attackers to take over the service via malicious JavaScript in poisoned log entries
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5301/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T12:31:36
1 posts
🟠 CVE-2026-3396 - High (7.5)
WCAPF – WooCommerce Ajax Product Filter plugin is vulnerable to time-based SQL Injection via the 'post-author' parameter in all versions up to, and including, 4.2.3 due to insufficient escaping on the user supplied parameter and lack of sufficie...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3396/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T12:31:36
1 posts
🟠 CVE-2026-3243 - High (8.8)
The Advanced Members for ACF plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the create_crop function in all versions up to, and including, 1.2.5. This makes it possible for authenticated a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3243/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T09:31:42
1 posts
🔴 CVE-2026-3535 - Critical (9.8)
The DSGVO Google Web Fonts GDPR plugin for WordPress is vulnerable to arbitrary file upload due to missing file type validation in the `DSGVOGWPdownloadGoogleFonts()` function in all versions up to, and including, 1.1. The function is exposed via ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3535/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T15:30:49
1 posts
6 repos
https://github.com/AtoposX-J/CVE-2026-34197-Apache-ActiveMQ-RCE
https://github.com/dinosn/CVE-2026-34197
https://github.com/KONDORDEVSECURITYCORP/CVE-2026-34197
https://github.com/DEVSECURITYSPRO/CVE-2026-34197
PoC for the ActiveMQ RCE as per Horizon3 post https://github.com/dinosn/CVE-2026-34197
##updated 2026-04-06T18:12:57.863000
1 posts
5 repos
https://github.com/fevar54/forticlient_ems_cve_2026_35616_poc.py
https://github.com/z3r0h3ro/CVE-2026-35616-poc
https://github.com/fevar54/CVE-2026-35616-detector.py
Noch ein Notfall-Update bei Fortinet
Mal etwas ganz neues - ach nein, ist ja leider nicht neu, sondern fast normal. Der US-Hersteller von Geräten für den Netzwerk-Perimeter Fortinet musste schon wieder ein Notfall-Update veröffentlichen. Die damit geflickte Sicherheiitslücke CVE-2026-35616 wird mindestens seit Ende März bereits für Angriffe ausgenutzt (Zero-Day Exploit). Das ist schon der zweite Zero-Day innerhalb weniger Wochen. Bereits im März musste CVE-2026-21643 geflickt werden. Wiederholung: Wer das Intranet gegen das wilde wüste Internet schützen möchte, muss zu FOSS greifen.
https://www.pc-fluesterer.info/wordpress/2026/04/11/noch-ein-notfall-update-bei-fortinet/
#Allgemein #Empfehlung #Hintergrund #Warnung #0day #closedsource #cybercrime #exploits #hersteller #sicherheit #UnplugTrump #usa
##updated 2026-04-03T16:51:28.670000
1 posts
Docker : la faille CVE-2026-34040 permet d’obtenir un accès root sur l’hôte ! https://www.it-connect.fr/docker-la-faille-cve-2026-34040-permet-dobtenir-un-acces-root-sur-lhote/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #Docker
##updated 2026-04-02T12:20:31.950000
2 posts
From over a week ago but anyway, CVE-2026-34504 in OpenClaw's image generation pipeline is a reminder that AI agent frameworks inherit all the classic web vulnerabilities plus their own unique attack surface.
An SSRF in the Fal provider means a malicious relay can have the agent fetch internal URLs and leak metadata through the generated output.
I switched from OpenClaw to Hermes Agent a couple of weeks ago, and I need to explore in detail how Hermes handles this stuff.
##From over a week ago but anyway, CVE-2026-34504 in OpenClaw's image generation pipeline is a reminder that AI agent frameworks inherit all the classic web vulnerabilities plus their own unique attack surface.
An SSRF in the Fal provider means a malicious relay can have the agent fetch internal URLs and leak metadata through the generated output.
I switched from OpenClaw to Hermes Agent a couple of weeks ago, and I need to explore in detail how Hermes handles this stuff.
##updated 2026-03-30T13:16:22.063000
1 posts
2 repos
Noch ein Notfall-Update bei Fortinet
Mal etwas ganz neues - ach nein, ist ja leider nicht neu, sondern fast normal. Der US-Hersteller von Geräten für den Netzwerk-Perimeter Fortinet musste schon wieder ein Notfall-Update veröffentlichen. Die damit geflickte Sicherheiitslücke CVE-2026-35616 wird mindestens seit Ende März bereits für Angriffe ausgenutzt (Zero-Day Exploit). Das ist schon der zweite Zero-Day innerhalb weniger Wochen. Bereits im März musste CVE-2026-21643 geflickt werden. Wiederholung: Wer das Intranet gegen das wilde wüste Internet schützen möchte, muss zu FOSS greifen.
https://www.pc-fluesterer.info/wordpress/2026/04/11/noch-ein-notfall-update-bei-fortinet/
#Allgemein #Empfehlung #Hintergrund #Warnung #0day #closedsource #cybercrime #exploits #hersteller #sicherheit #UnplugTrump #usa
##updated 2026-03-24T15:30:36
2 posts
1 repos
Claude + Humans vs nginx: CVE-2026-27654 https://blog.calif.io/p/claude-humans-vs-nginx-cve-2026-27654
##Claude + Humans vs nginx: CVE-2026-27654 https://blog.calif.io/p/claude-humans-vs-nginx-cve-2026-27654
##updated 2026-03-20T21:13:05
1 posts
🚨 EUVD-2026-21476
📊 Score: 6.9/10 (CVSS v3.1)
📦 Product: OpenClaw, OpenClaw
🏢 Vendor: OpenClaw
📅 Updated: 2026-04-10
📝 OpenClaw before 2026.3.24 contains an incomplete fix for CVE-2026-32011 where the Feishu webhook handler accepts request bodies with permissive limits of 1MB and 30-second timeout before signature verification. An unauthenticated attacker can exh...
🔗 https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-21476
##updated 2026-03-18T21:34:00
1 posts
updated 2026-03-13T21:32:48
1 posts
updated 2026-02-25T18:31:45
2 posts
6 repos
https://github.com/abrahamsurf/sdwan-scanner-CVE-2026-20127
https://github.com/sfewer-r7/CVE-2026-20127
https://github.com/BugFor-Pings/CVE-2026-20127_EXP
https://github.com/yonathanpy/CVE-2026-20127-Cisco-SD-WAN-Preauth-RCE
https://github.com/zerozenxlabs/CVE-2026-20127---Cisco-SD-WAN-Preauth-RCE
This week's release features a 2x faster msfvenom bootup time and new modules, including exploits for the Cisco Catalyst SD-WAN Controller Authentication Bypass (CVE-2026-20127) and osTicket Arbitrary File Read (CVE-2026-22200). https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-04-10-2026/
##This week's release features a 2x faster msfvenom bootup time and new modules, including exploits for the Cisco Catalyst SD-WAN Controller Authentication Bypass (CVE-2026-20127) and osTicket Arbitrary File Read (CVE-2026-22200). https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-04-10-2026/
##updated 2026-02-23T22:28:51
1 posts
🚨 EUVD-2026-21480
📊 Score: 6.9/10 (CVSS v3.1)
📦 Product: OpenClaw, OpenClaw
🏢 Vendor: OpenClaw
📅 Updated: 2026-04-10
📝 OpenClaw before 2026.3.24 contains an incomplete fix for CVE-2026-27486 where the !stop chat command uses an unpatched killProcessTree function from shell-utils.ts that sends SIGKILL immediately without graceful SIGTERM shutdown. Attackers can tr...
🔗 https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-21480
##updated 2026-01-30T00:31:29
1 posts
2 repos
https://github.com/MehdiLeDeaut/CVE-2026-1281-Ivanti-EPMM-RCE
https://github.com/YunfeiGE18/CVE-2026-1281-CVE-2026-1340-Ivanti-EPMM-RCE
🚨 [CISA-2026:0408] CISA Adds One Known Exploited Vulnerability to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0408)
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2026-1340 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1340)
- Name: Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Ivanti
- Product: Endpoint Manager Mobile (EPMM)
- Notes: Please adhere to Ivanti's guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible Ivanti products affected by this vulnerability. Apply any final mitigations provided by the vendor as soon as possible. For more information please see: https://hub.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US ; https://support.mobileiron.com/mi/vsp/AB1786671/ivanti-security-update-1761642-1.1.0S-5.noarch.rpm ; https://support.mobileiron.com/mi/vsp/AB1786671/ivanti-security-update-1761642-1.1.0L-5.noarch.rpm ; https://nvd.nist.gov/vuln/detail/CVE-2026-1340
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260408 #cisa20260408 #cve_2026_1340 #cve20261340
##updated 2026-01-27T21:31:40
2 posts
2 repos
This week's release features a 2x faster msfvenom bootup time and new modules, including exploits for the Cisco Catalyst SD-WAN Controller Authentication Bypass (CVE-2026-20127) and osTicket Arbitrary File Read (CVE-2026-22200). https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-04-10-2026/
##This week's release features a 2x faster msfvenom bootup time and new modules, including exploits for the Cisco Catalyst SD-WAN Controller Authentication Bypass (CVE-2026-20127) and osTicket Arbitrary File Read (CVE-2026-22200). https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-04-10-2026/
##updated 2025-12-19T22:08:03
1 posts
🚨 EUVD-2026-21407
📊 Score: 6.3/10 (CVSS v3.1)
📦 Product: Apache Log4j Core, Apache Log4j Core
🏢 Vendor: Apache Software Foundation
📅 Updated: 2026-04-10
📝 The fix for CVE-2025-68161 https://logging.apache.org/security.html#CVE-2025-68161 was incomplete: it addressed hostname verification only when enabled via the log4j2.sslVerifyHostName https://logging.apache...
🔗 https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-21407
##updated 2025-12-09T21:31:29
1 posts
6 repos
https://github.com/absholi7ly/CVE-2025-6218-WinRAR-Directory-Traversal-RCE
https://github.com/speinador/CVE-2025-6218_WinRAR
https://github.com/ignis-sec/CVE-2025-6218
https://github.com/Chrxstxqn/CVE-2025-6218-WinRAR-RCE-POC
Robin Dost analyses a fresh UAC-0226 sample from 9 April 2026 and identifies it as a GIFTEDCROOK stealer variant. The chain starts with CVE-2025-6218 and CVE-2025-8088, then uses a LNK to launch a payload that decodes another binary, uses chunked data exfiltration, and reconstructs its C2 at runtime. https://blog.synapticsystems.de/obfuscation-without-effort-breaking-a-uac-0226-giftedcrook-stealer/
##updated 2025-12-09T16:53:25
2 posts
100 repos
https://github.com/MoLeft/React2Shell-Toolbox
https://github.com/ynsmroztas/NextRce
https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension
https://github.com/mrknow001/RSC_Detector
https://github.com/freeqaz/react2shell
https://github.com/zzhorc/CVE-2025-55182
https://github.com/im-ezboy/CVE-2025-55182-zoomeye
https://github.com/AdityaBhatt3010/React2Shell-CVE-2025-55182
https://github.com/snipevx/React2Shell-POC
https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension
https://github.com/alptexans/RSC-Detect-CVE-2025-55182
https://github.com/surajhacx/react2shellpoc
https://github.com/assetnote/react2shell-scanner
https://github.com/Spritualkb/CVE-2025-55182-exp
https://github.com/techgaun/cve-2025-55182-scanner
https://github.com/shyambhanushali/React2Shell
https://github.com/santihabib/CVE-2025-55182-analysis
https://github.com/xalgord/React2Shell
https://github.com/sickwell/CVE-2025-55182
https://github.com/ejpir/CVE-2025-55182-research
https://github.com/CirqueiraDev/MassExploit-CVE-2025-55182
https://github.com/zack0x01/CVE-2025-55182-advanced-scanner-
https://github.com/zack0x01/vuln-app-CVE-2025-55182
https://github.com/sumanrox/rschunter
https://github.com/Archerkong/CVE-2025-55182
https://github.com/M4xSec/CVE-2025-55182-React2Shell-RCE-Shell
https://github.com/rix4uni/CVE-2025-55182
https://github.com/acheong08/CVE-2025-55182-poc
https://github.com/hexsh1dow/CVE-2025-55182
https://github.com/c0rydoras/CVE-2025-55182
https://github.com/hoosin/CVE-2025-55182
https://github.com/chrahman/react2shell-CVE-2025-55182-full-rce-script
https://github.com/msanft/CVE-2025-55182
https://github.com/songsanggggg/CVE-2025-55182
https://github.com/ZihxS/check-react-rce-cve-2025-55182
https://github.com/l4rm4nd/CVE-2025-55182
https://github.com/xkillbit/cve-2025-55182-scanner
https://github.com/hackersatyamrastogi/react2shell-ultimate
https://github.com/StealthMoud/CVE-2025-55182-Scanner
https://github.com/kondukto-io/vulnerable-next-js-poc
https://github.com/cybertechajju/R2C-CVE-2025-55182-66478
https://github.com/heiheishushu/rsc_detect_CVE-2025-55182
https://github.com/dwisiswant0/CVE-2025-55182
https://github.com/Chocapikk/CVE-2025-55182
https://github.com/momika233/CVE-2025-55182-bypass
https://github.com/MemerGamer/CVE-2025-55182
https://github.com/CymulateResearch/React2Shell-Scanner
https://github.com/kavienanj/CVE-2025-55182
https://github.com/RuoJi6/CVE-2025-55182-RCE-shell
https://github.com/aliclub0x00/CVE-2025-55182-POC-NEXTJS
https://github.com/theori-io/reactguard
https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script
https://github.com/alfazhossain/CVE-2025-55182-Exploiter
https://github.com/vulncheck-oss/cve-2025-55182
https://github.com/Rsatan/Next.js-Exploit-Tool
https://github.com/gensecaihq/react2shell-scanner
https://github.com/alsaut1/react2shell-lab
https://github.com/websecuritylabs/React2Shell-Library
https://github.com/theman001/CVE-2025-55182
https://github.com/yanoshercohen/React2Shell_CVE-2025-55182
https://github.com/hualy13/CVE-2025-55182
https://github.com/jctommasi/react2shellVulnApp
https://github.com/LemonTeatw1/CVE-2025-55182-exploit
https://github.com/zr0n/react2shell
https://github.com/GelukCrab/React-Server-Components-RCE
https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool
https://github.com/keklick1337/CVE-2025-55182-golang-PoC
https://github.com/Cillian-Collins/CVE-2025-55182
https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js
https://github.com/BeichenDream/CVE-2025-55182-GodzillaMemoryShell
https://github.com/timsonner/React2Shell-CVE-2025-55182
https://github.com/nehkark/CVE-2025-55182
https://github.com/sudo-Yangziran/CVE-2025-55182POC
https://github.com/Updatelap/CVE-2025-55182
https://github.com/whiteov3rflow/CVE-2025-55182-poc
https://github.com/ThemeHackers/CVE-2025-55182
https://github.com/shamo0/react2shell-PoC
https://github.com/Dh4v4l8/CVE-2025-55182-poc-tool
https://github.com/xcanwin/CVE-2025-55182-React-RCE
https://github.com/jf0x3a/CVE-2025-55182-exploit
https://github.com/kOaDT/poc-cve-2025-55182
https://github.com/VeilVulp/RscScan-cve-2025-55182
https://github.com/subhdotsol/CVE-2025-55182
https://github.com/emredavut/CVE-2025-55182
https://github.com/AliHzSec/CVE-2025-55182
https://github.com/Tiger-Foxx/exploit-react-CVE-2025-55182
https://github.com/logesh-GIT001/CVE-2025-55182
https://github.com/Cr4at0r/Next.js-RCE-Scanner-BurpSuite-Extension-
https://github.com/vijay-shirhatti/RSC-Detect-CVE-2025-55182
https://github.com/ejpir/CVE-2025-55182-bypass
https://github.com/RavinduRathnayaka/CVE-2025-55182-PoC
https://github.com/Pizz33/CVE-2025-55182-burpscanner
https://github.com/fatguru/CVE-2025-55182-scanner
https://github.com/EynaExp/CVE-2025-55182-POC
https://github.com/hidden-investigations/react2shell-scanner
https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc
https://github.com/MrR0b0t19/CVE-2025-55182-shellinteractive
⚪️ React2Shell vulnerability used for automated credential theft
🗨️ Cisco Talos researchers have discovered a large-scale campaign for automated credential theft exploiting the React2Shell vulnerability (CVE-2025-55182). In just 24 hours, the attackers managed to compromise 766 hosts across various cloud providers worldwide and steal database passwords, AWS keys,…
##CVE-2025-55182 Exploitation Hits the Smart Home
Shortly after details of CVE-2025-55182 became public, we began noticing large volumes of exploitation attempts across our endpoint and network...
🔗️ [Bitdefender] https://link.is.it/jU5kX8
##updated 2025-10-22T00:34:26
1 posts
32 repos
https://github.com/nuky-alt/CVE-2025-8088
https://github.com/AdityaBhatt3010/CVE-2025-8088-WinRAR-Zero-Day-Path-Traversal
https://github.com/0xAbolfazl/CVE-2025-8088-WinRAR-PathTraversal-PoC
https://github.com/knight0x07/WinRAR-CVE-2025-8088-PoC-RAR
https://github.com/hexsecteam/CVE-2025-8088-Winrar-Tool
https://github.com/nhattanhh/CVE-2025-8088
https://github.com/pentestfunctions/CVE-2025-8088-Multi-Document
https://github.com/travisbgreen/cve-2025-8088
https://github.com/techcorp/CVE-2025-8088-Exploit
https://github.com/xi0onamdev/WinRAR-CVE-2025-8088-Exploitation-Toolkit
https://github.com/ghostn4444/CVE-2025-8088
https://github.com/undefined-name12/CVE-2025-8088-Winrar
https://github.com/walidpyh/CVE-2025-8088
https://github.com/pexlexity/WinRAR-CVE-2025-8088-Path-Traversal-PoC
https://github.com/papcaii2004/CVE-2025-8088-WinRAR-builder
https://github.com/hbesljx/CVE-2025-8088-EXP
https://github.com/pescada-dev/-CVE-2025-8088
https://github.com/DeepBlue-dot/CVE-2025-8088-WinRAR-Startup-PoC
https://github.com/shaheeryasirofficial/CVE-2025-8088
https://github.com/kitsuneshade/WinRAR-Exploit-Tool---Rust-Edition
https://github.com/Jessica74016/CVE-2025-8088
https://github.com/jordan922/CVE-2025-8088
https://github.com/IsmaelCosma/CVE-2025-8088
https://github.com/Syrins/CVE-2025-8088-Winrar-Tool-Gui
https://github.com/Markusino488/cve-2025-8088
https://github.com/sxyrxyy/CVE-2025-8088-WinRAR-Proof-of-Concept-PoC-Exploit-
https://github.com/lennertdefauw/CVE-2025-8088
https://github.com/Shinkirou789/Cve-2025-8088-WinRar-vulnerability
https://github.com/starfallreverie/winrar-exploit
https://github.com/pentestfunctions/best-CVE-2025-8088
Robin Dost analyses a fresh UAC-0226 sample from 9 April 2026 and identifies it as a GIFTEDCROOK stealer variant. The chain starts with CVE-2025-6218 and CVE-2025-8088, then uses a LNK to launch a payload that decodes another binary, uses chunked data exfiltration, and reconstructs its C2 at runtime. https://blog.synapticsystems.de/obfuscation-without-effort-breaking-a-uac-0226-giftedcrook-stealer/
##updated 2025-06-27T13:15:23.240000
1 posts
🔴 CVE-2026-39860 - Critical (9)
Nix is a package manager for Linux and other Unix systems. A bug in the fix for CVE-2024-27297 allowed for arbitrary overwrites of files writable by the Nix process orchestrating the builds (typically the Nix daemon running as root in multi-user i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39860/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2024-11-21T09:18:30.130000
1 posts
Llama Drama:AIアプリ開発用Pythonパッケージに重大な欠陥 システムやデータが侵害される恐れ(CVE-2024-34359) | Codebook|Security News https://www.yayafa.com/2776397/ #AgenticAi #AI #ArtificialGeneralIntelligence #ArtificialIntelligence #LLAMA #Meta #MetaAI #エージェント型AI #人工知能 #汎用人工知能
##updated 2024-11-21T05:39:02.180000
1 posts
Next in my series of blogs on unpatchable Kubernetes vulnerabilities is out. This time it's about TOCTOUs and SSRF
https://securitylabs.datadoghq.com/articles/unpatchable-kubernetes-vulnerabilities-cve-2020-8562/
##Chamilo LMS CRITICAL vuln (CVE-2026-32892): OS Command Injection via move_to POST param in fileManage.lib.php. Auth'd teachers can run arbitrary commands as www-data. Patch: 1.11.38/2.0.0-RC.3. Details: https://radar.offseq.com/threat/cve-2026-32892-cwe-78-improper-neutralization-of-s-5b2019d4 #OffSeq #Chamilo #CVE202632892 #infosec
##🔴 CVE-2026-32892 - Critical (9.1)
Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, Chamilo LMS contains an OS Command Injection vulnerability in the file move function. The move() function in fileManage.lib.php passes user-controlled path values direct...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32892/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Chamilo LMS CRITICAL vuln (CVE-2026-32892): OS Command Injection via move_to POST param in fileManage.lib.php. Auth'd teachers can run arbitrary commands as www-data. Patch: 1.11.38/2.0.0-RC.3. Details: https://radar.offseq.com/threat/cve-2026-32892-cwe-78-improper-neutralization-of-s-5b2019d4 #OffSeq #Chamilo #CVE202632892 #infosec
##🔴 CVE-2026-32892 - Critical (9.1)
Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, Chamilo LMS contains an OS Command Injection vulnerability in the file move function. The move() function in fileManage.lib.php passes user-controlled path values direct...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32892/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-31940 - High (7.5)
Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, in main/lp/aicc_hacp.php, user-controlled request parameters are directly used to set the PHP session ID before loading global bootstrap. This leads to session fixation....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-31940/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-31940 - High (7.5)
Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, in main/lp/aicc_hacp.php, user-controlled request parameters are directly used to set the PHP session ID before loading global bootstrap. This leads to session fixation....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-31940/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-31939 - High (8.3)
Chamilo LMS is a learning management system. Prior to 1.11.38, there is a path traversal in main/exercise/savescores.php leading to arbitrary file feletion. User input from $_REQUEST['test'] is concatenated directly into filesystem path without ca...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-31939/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-31939 - High (8.3)
Chamilo LMS is a learning management system. Prior to 1.11.38, there is a path traversal in main/exercise/savescores.php leading to arbitrary file feletion. User input from $_REQUEST['test'] is concatenated directly into filesystem path without ca...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-31939/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33618 - High (8.8)
Chamilo LMS is a learning management system. Prior to .0.0-RC.3, the PlatformConfigurationController::decodeSettingArray() method uses PHP's eval() to parse platform settings from the database. An attacker with admin access (obtainable via Advisor...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33618/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33618 - High (8.8)
Chamilo LMS is a learning management system. Prior to .0.0-RC.3, the PlatformConfigurationController::decodeSettingArray() method uses PHP's eval() to parse platform settings from the database. An attacker with admin access (obtainable via Advisor...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33618/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33710 - High (7.5)
Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, REST API keys are generated using md5(time() + (user_id * 5) - rand(10000, 10000)). The rand(10000, 10000) call always returns exactly 10000 (min == max), making the for...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33710/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33710 - High (7.5)
Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, REST API keys are generated using md5(time() + (user_id * 5) - rand(10000, 10000)). The rand(10000, 10000) call always returns exactly 10000 (min == max), making the for...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33710/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-32252 - High (7.7)
Chartbrew is an open-source web application that can connect directly to databases and APIs and use the data to create charts. Prior to 4.9.0, a cross-tenant authorization bypass exists in Chartbrew in GET /team/:team_id/template/generate/:project...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32252/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-32252 - High (7.7)
Chartbrew is an open-source web application that can connect directly to databases and APIs and use the data to create charts. Prior to 4.9.0, a cross-tenant authorization bypass exists in Chartbrew in GET /team/:team_id/template/generate/:project...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32252/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔔 CVE-2026-33698: Chamilo LMS (<1.11.38) has a CRITICAL flaw — exposed install/ dir lets unauth attackers execute PHP & modify files. Upgrade to 1.11.38+ & restrict install/ directory access now! Details: https://radar.offseq.com/threat/cve-2026-33698-cwe-552-files-or-directories-access-2b2046ff #OffSeq #Chamilo #Vuln
##🔔 CVE-2026-33698: Chamilo LMS (<1.11.38) has a CRITICAL flaw — exposed install/ dir lets unauth attackers execute PHP & modify files. Upgrade to 1.11.38+ & restrict install/ directory access now! Details: https://radar.offseq.com/threat/cve-2026-33698-cwe-552-files-or-directories-access-2b2046ff #OffSeq #Chamilo #Vuln
##🟠 CVE-2026-40168 - High (8.2)
Postiz is an AI social media scheduling tool. Prior to 2.21.5, the /api/public/stream endpoint is vulnerable to SSRF. Although the application validates the initially supplied URL and blocks direct private/internal hosts, it does not re-validate t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40168/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-40168 - High (8.2)
Postiz is an AI social media scheduling tool. Prior to 2.21.5, the /api/public/stream endpoint is vulnerable to SSRF. Although the application validates the initially supplied URL and blocks direct private/internal hosts, it does not re-validate t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40168/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-40089 - Critical (9.9)
Sonicverse is a Self-hosted Docker Compose stack for live radio streaming. The Sonicverse Radio Audio Streaming Stack dashboard contains a Server-Side Request Forgery (SSRF) vulnerability in its API client (apps/dashboard/lib/api.ts). Installation...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40089/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Palo Alto posted several advisories yesterday, if you missed them:
- Critical: CVE-2026-0234 Cortex XSOAR: Improper Verification of Cryptographic Signature in Microsoft Teams integration https://security.paloaltonetworks.com/CVE-2026-0234
- PAN-SA-2026-0004 Chromium: Monthly Vulnerability Update (April 2026) https://security.paloaltonetworks.com/PAN-SA-2026-0004
- CVE-2026-0233 Autonomous Digital Experience Manager: Improper validation of ADEM certificate https://security.paloaltonetworks.com/CVE-2026-0233 #PaloAlto #infosec #vulnerability #Chromium
##Palo Alto posted several advisories yesterday, if you missed them:
- Critical: CVE-2026-0234 Cortex XSOAR: Improper Verification of Cryptographic Signature in Microsoft Teams integration https://security.paloaltonetworks.com/CVE-2026-0234
- PAN-SA-2026-0004 Chromium: Monthly Vulnerability Update (April 2026) https://security.paloaltonetworks.com/PAN-SA-2026-0004
- CVE-2026-0233 Autonomous Digital Experience Manager: Improper validation of ADEM certificate https://security.paloaltonetworks.com/CVE-2026-0233 #PaloAlto #infosec #vulnerability #Chromium
##"It's just dev mode."
PTT-2025-028 / CVE-2026-30461 disagrees. Any authenticated user on a FuelCMS dev instance can drop a PHP shell via git submodule and call it from the browser. One HTTP request. Full RCE. CVSS 8.8 High.
No patch coming. Project's been dormant for almost 4 years.
Found by Raul Bledea and Matei "Mal" Bădănoiu.
Full PoC: https://pentest-tools.com/research
##🟠 CVE-2026-34392 - High (7.5)
LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. From 20.0.0 to before 27.0.3 and 28.0.1, a bug in the static file router can allow an at...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34392/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33350 - High (7.5)
LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. Prior to 27.0.3 and 28.0.1, a SQL injection has been identified in some code sections fo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33350/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35169 - High (8.7)
LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. From to before 27.0.3 and 28.0.1, the help_editor module of LORIS did not properly sani...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35169/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35446 - High (7.7)
LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. From 24.0.0 to before 27.0.3 and 28.0.1, an incorrect order of operations in the FilesDo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35446/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35478 - High (8.3)
InvenTree is an Open Source Inventory Management System. From 0.16.0 to before 1.2.7, any authenticated InvenTree user can create a valid API token attributed to any other user in the system — including administrators and superusers — by suppl...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35478/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-39863 - High (7.5)
Kamailio is an open source implementation of a SIP Signaling Server. Prior to 6.1.1, 6.0.6, and 5.8.8, an out-of-bounds access in the core of Kamailio (formerly OpenSER and SER) allows remote attackers to cause a denial of service (process crash) ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39863/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-39860 - Critical (9)
Nix is a package manager for Linux and other Unix systems. A bug in the fix for CVE-2024-27297 allowed for arbitrary overwrites of files writable by the Nix process orchestrating the builds (typically the Nix daemon running as root in multi-user i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39860/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##